• Home
  • About
  • Contact
  • Home
  • About
  • Contact

Internet Research​ Topics

Madison Siemsen
Computer Science Principles

Image from Freepik

learn more

Topics

Privacy Risks

Internet usage has exploded over the past decade, which has led to many innovations and advanced technology, but it also leads to increased dangers, especially concerning your data privacy. Data privacy is the protection of your personal information on the internet, but sometimes this privacy can be invaded. Every time you visit a website or download an app data gets stored, sometimes against your knowledge or consent. When you give access and information to third parties they can steal your information and you're at risk of data loss, reputational damage, and regulatory fines. Even if you think your data is safe, organizations may be tracking you.

Your data is worth money, which is why your online privacy is at threat. Through indirect or direct permission companies collect consumer data, such as your online behavior, transactional history, and your locations and activities. By tracking your history, advertisers can target you with ads catered to your search activity. For example, if you watch a lot of baking videos, advertisers can market recipes, kitchen tools, and other gadgets. In the US there are no laws that outlaw the collection and selling of your data which makes it easier for businesses to take that information, creating a lack of transparency between the users, government, and companies.

Consumers may be unaware of their data being collected, but in our advanced age of technology, about six in ten people believe they are tracked online. The collection and storing of personal information creates a lack of control and transparency and the data that is collected can be used in harmful ways, such as identity theft and fraud. Data privacy is important but it is constantly at risk of being exposed or shared online.

Internet Misuse and Protection

        Computing resources misuse includes cyberbullying, hacking, identity theft, and unauthorized downloading. A common form of misuse people see today is creating a fake social media account or hacking someone else’s account. Computing misuse is classified as a range of activities, but it is anything that illegally or improperly causes harm to somebody or their property. Some ways to prevent the misuse of computing resources are by protecting your password, being aware of phishing, and reporting suspicious activity.


        Protecting your passwords is one of the easiest and most important ways to stay safe. Some ways that you can do this is by creating a hard-to-guess password and never sharing your password with anyone. Phishing messages are unsolicited emails or messages pretending to be someone else. If you think the information in the email is important, try verifying it because you give any information away. If you see something suspicious, report it. Even if you take precautions reporting strange activity can protect you.
        Computer misuse is the abuse of resources that may cause harm and can go against the law. It’s easy to accidentally misuse or be targeted by the misuse of resources, but by staying safe on the internet, you can avoid being hacked, bullied, reported, or experiencing fraud. 

        Unauthorized access is when someone gains access to a computer system, network, or data without permission. Any access to information that violates a company's security policy or that users shouldn’t have access to is considered unauthorized access. It is normally committed by hackers, who are trying to steal sensitive information, cause damage, or hold data hostage. However, sometimes innocent users may stumble upon information that they don’t have permission to see. No matter the circumstances it is a violation of a person or organization's security and privacy.
        Unauthorized access can be gained in many different ways, guessing passwords correctly, exploiting software or human vulnerabilities, or corporate espionage. Cybercriminals can use personal information or software to manually or automatically guess a company's password to sensitive information. They can also exploit software bugs to gain entry into networks and applications. Social engineering is the act of tricking someone into doing something harmful, and cybercriminals use this tactic and psychological manipulation, such as phishing, to convince you to hand over information. Criminals may even steal physical resources such as laptops to hack into unauthorized networks.
        Access to sensitive information can cause problems such as reputational damage, disrupt electronic systems, and harm the target physically or mentally. Some ways to stay safe are by creating complex and protected passwords, having regular security ​​checks, paying attention to user activity, and storing your data smartly.

How is unauthorized access to information is gained?

How can computing inovations be beneficial and harmful?

        Computing innovations are very versatile and created for a wide variety of jobs, but all of these innovations can have beneficial and harmful consequences. As innovations evolve and develop it impacts people’s day-to-day lives. People can take advantage of the advancements and the progress that has been made, but it can also hurt people. Innovations in technology have developed many new problems, such as identity theft and cyberbullying. Although computing innovations have problems it is very beneficial and crucial to our lives.
        Some benefits of computing innovations are the improvement of machinery, communication advancements, and the impact and influence of the artistic world. Innovations have made it possible for machinery to become much more advanced helping the world in medical, engineering, and scientific research and data. It has also allowed for instantaneous communication and an increase in cultural connectivity.
        Harmful effects of computing innovations are loss of privacy, replacement of humans with technology, dependence on technology, and negative health effects. Data privacy is a big concern since your information can easily be stolen by cybercriminals. As more technology develops it replaces humans in their jobs creating not only a dependence on technology but job loss. Technology can create a negative environment through social media and other platforms where you might see cyberbullying. 

Impact Beyond

        Computing innovations can have an impact beyond their intended purpose such as developments in other fields or in ways the creator never intended for it to evolve. There are many positive and negative impacts alike that computing innovations have led to. Advances in computing have created and increased innovation in other fields, such as medicine, engineering, communications, and art.
        The World Wide Web was originally intended to only provide rapid and easy exchange of information within the scientific community, but today it is available to everyone and shares much more than scientific research. It has widely increased communication and now anyone can rapidly share information with their family, friends, or strangers on the internet. Rapid sharing of a program can connect hundreds of thousands of users in seconds.
        Machines have also evolved much more than was expected and other computing innovations have led to the growth of fields like medicine, business, and science. However new information and data have made it possible for discrimination and conflict between groups. For example, more data on the unfair employment and wages of women compared to men are more easily accessed and brought to attention. Other information on social and political issues can be accessed by anyone and also led to the spread of misinformation.
        Computing Innovations have evolved beyond what they were originally meant for and this has impacted economic, social, and political statuses in the world. The positive and negative effects of this have led to the society we live in and continue to allow us to evolve and make advancements in technology today.      

Image from Freepik

Sources: https://usa.kaspersky.com/resource-center/threats/internet-and-individual-privacy-protection  https://www.gao.gov/products/gao-22-106096 https://security.virginia.edu/prevent-it-abuse https://www.investopedia.com/terms/c/computer-abuse.asp#:~:text=Cyber%2Dbullying%2C%20hacking%2C%20identity,enforceable%20at%20the%20federal%20level. https://nordvpn.com/blog/unauthorized-access/  

Sample text. Click to select the Text Element.

Website Templates

created with

Website Builder Software .