You are on page 1of 25

Project Report On

“Control And Misuse Of Technology”

Submitted By

Prerna Singh

Semester IV, SYBA B


Roll no- 242

Under The Guidance Of

DR KIRAN SAWANT & DR RAVI SHUKLA

Submitted to University Of Mumbai n Partial Fulfillment of the Requirements For the


Award of Degree

Of

BACHELOR OF ARTS STUDY

RD NATIONAL COLLEGE

BANDRA (W),MUMBAI-400055

2021-22
CERTIFICATE

This is to certify that the project entitled “CONTROL AND MISUSE OF TECHNOLOGY ” is a true
and satisfactory work done by PRERNA SINGH,SYBA,ROLL NO.20242. The project report is
submitted to University Of Mumbai in partial fulfillment for the requirements of the award of the degree
of “BACHELOR OF ARTS STUDY” for the academic year 2021-2022.

----------------------------- ---------------------------------

Signature of Project Guide Signature of External Examiner

----------------------------- ----------------------------------

Signature of the Candidate Signature of the Principal

College Seal
DECLARATION

I,PRERNA SINGH, student of RD NATIONAL COLLEGE,SYBA (SEM-IV) hereby declare that I have
completed the project on “CONTROL AND MISUSE OF TECHNOLOGY ” in the academic year
2021-2022.

The subject matter contained in this project is research and most of the work carried out is
original and was done under the guidance of my project guide Dr Kiran Sawant Sir and Dr Ravi
Shukla.

The information submitted is true and original to the best of my knowledge.

Prerna Singh

SYBA SEM IV

ROLL NO-20242
ACKNOWLEDGEMENT

I would like to express a deep sense of thanks and gratitude to my project guide Dr Ravi Shukla
and Dr Kiran Sawant sir for guiding me immensely through the course of the project. They
always showed keen interest in my work. Their constant guidance,advice and motivation have
been responsible for the successful completion of this project.

My sincere thanks to the entire administration of RD National College and to the principal
Dr.Neha Jagtiani,for her coordination in extending every possible support for the completion of
this project.

I would also thank my parents for their support and motivation.I am immensely grateful to my
classmates for their timely help in the compilation of this project.

Last but not the least, I would like to thank all those who had helped directly or indirectly
towards the completion of this project.

PRERNA SINGH

SYBA SEM IV

ROLL NO-20242
TABLE OF CONTENT

1 INTRODUCTION

2 OBJECTIVES

3 METHODOLOGY

4 TECHNOLOGY

5 USE AND MISUSE

6 NEED FOR CONTROL

7 DATA ANALYSIS

8 CONCLUSION

9 BIBLIOGRAPHY
INTRODUCTION
The Internet is widely considered to be one of the most important
technological innovations of the late twentieth century.

Despite the additional benefits of this tool for learning, teaching, and
research, there are still a number of issues with Internet access and
usage.Although the long-term impacts of screen time are still being
researched, the consequences of excessive internet and smartphone usage
are well-known. Internet use that is "pathological" has been related to
depression in teenagers, and it may even reduce brain matter.

Technology is present in many aspects of life and is not going away


anytime soon. Instead of watching the world around them, teenagers
look down at their iPhones or keep their eyes glued to a tablet or laptop.
It's not uncommon to see two friends sitting next to one another on a bus,
texting frantically on their phones rather than communicating. The
reliance depicted by everyone on technology appears to make sense in
today's society, but it may also have detrimental implications.

Many elements of contemporary life have been transformed by


technology, including how corporations run, how individuals obtain
information, and how countries conduct war. Certain technologies, such
as mobile phones and the Internet, and moreover satellites, drones, and
many types of sensors, are revolutionizing the task of conflict resolution
and developing peaceful communities. Rapid advancements in digital
technology's capabilities and availability have placed advanced
communications equipment in the hands of the majority of the world's
population.
Objectives Of The Study
The goal of this project is to create a comprehensive tool that can
monitor a single action or a broad set of behaviours on the internet, and
that can be used to unearth potential evidence in a variety of situations,
such as identity theft.

​ Unauthorized conduct.
​ Internet surfing habits are being tracked.
​ Selling data traffic and misusing network bandwidth are two
different things.
​ Harassment of people.
​ Pornography.
​ Unauthorized computer usage (via Telnet or suing remote desktop
connection).
​ There is no end to social networking.
​ Video streaming for non-academic purposes.
METHODOLOGY
A mix of qualitative and quantitative approaches was executed to
develop the following research study which allowed for a combination
of numerical measurement and in-depth exploration. Statistical datas, pie
charts, survey method ,which is the quantitative approach, was used to
assess the scale on how grave the issue of misusing technology is . The
qualitative approach gave a purposive process of data gathering,
analyzing, classifying and tabulating data about the prevailing
conditions,practices,trends, beliefs,processes impacts and cause-effect
relationships and then adequate and accurate interpretation about such
data with aid of statistical treatment. Random sampling was also used
from different strata of the population.An analysis of the past records
and articles was made to draw out a well informed thesis. A reference to
the official secured government websites was also made in order to
understand the various ways it impacted the citizens.Along with that and
the help of various newspaper articles that provided numerous case
studies helped in drawing out conclusions and results for the thesis
project.Before analysis the gathered data was prepared. The dataset was
checked for missing data and outliers. For this the “outlier labeling rule”
was used. All values outside the calculated range were considered
outliers.
TECHNOLOGY

What is technology?

Technology encompasses all techniques, skills, methods, and procedures


employed in the manufacture of goods or services, as well as the
achievement of goals such as scientific research. Technology can be
defined as the knowledge of procedures, processes, and the like, or it can
be integrated in machines to allow for functioning without a thorough
understanding of how they operate. Technology systems or technical
systems are systems (e.g. machines) that apply technology by accepting
an input, modifying it according to the system's usage, and then
providing an output.

Technology development is not just the responsibility of a single


business or country. A technical product can be invented, developed, and
sold by any individual researcher or group. Similarly, technology use is
not limited to a specific demographic. Every civilization in the world
today is touched by technology growth and is a part of it. Technology is
no longer just a product for industrial processing or communication
progress.

Technology is a tool that, when utilized correctly, may provide several


advantages. Communication, productivity, social connectedness,
education, cognitive development, creativity and expression, and digital
literacy are just a few of the benefits that technology may provide. When
utilized in a balanced manner, all of these are quite beneficial. Adults
who misuse or abuse these tools to substitute real-world activities and
face-to-face relationships with virtual experiences might cause problems.

What is Technology misuse?The major issue with technology usage can


be summed up in two words: education and culture. Some individuals
aren't well-cultured enough to utilise technology effectively as a tool
because they use it as a quick fix or to keep up with the latest trends.
Furthermore, these individuals lack the necessary education to properly
utilise technology. Because technology provides hundreds of services,
there are numerous ways to injure people and squander time. People
waste their time by harming others, despite the fact that they are aware
that this is not a nice thing to do. People who make it, for example, use it
as weapons to destroy others rather than better themselves. People are
concerned about technological misuse and abuse.

According to society, internet use causes intimidation or threats to


people, as well as facilitating piracy by providing the framework for
unlawful activity.music or software downloads and plagiarism.
Educational institutions are worried about students' development in their
classes due to misuses of technology. For instance, learners are using
cellphones, playing games, and surfing on some pornographic web sites
and other non suitable sites during class. Our culture has a close
relationship with technology, from online concerns like cyberbullying,
copyright infringement, and cyberstalking to an overdependence on
technology, whether it's watching too much TV or texting too much.
Technology controls are a system or policy that offers a reasonable
assurance that an organization's information technology is working as
intended, that data is accurate, and that the organization is following all
applicable laws and regulations. Controls are used as a check on business
operations in information technology, and they can be physical or
logical.

Some youngsters use cellphones as early as the age of ten. This isn't
always a negative thing because many parents work and must leave their
children with a babysitter, thus they require a means of communication
with their children. Children nowadays not only desire telephones, but
they also want the most recent version. If youngsters do not have it, they
may feel embarrassed in front of their peers and prefer to keep their old
smartphone at home. Furthermore, many recent smartphones include a
built-in camera, which some people utilise to take photographs or
movies that may harm the reputation of others. As a result of these
factors, some individuals believe that technology is to blame and that it
is harmful to society.

People must realise, however, that this is occurring as a result of


technological misuse. Technology, as a tool, poses no harm to
civilization; rather, it is the abuse of technology that poses a hazard.
Humans are the ones who utilise technology to damage civilization; the
problem lies with the user, not with the technology itself.

Tracking

Every time misconduct has been discovered recently, a same pattern has
developed.

Users will be given an "opt-out" method or a dashboard to monitor what


personal data is being gathered (for example, Google Privacy Checkup),
as well as an apology from the firm responsible.

Is it true that once we opt out, they will no longer collect our data?
Would they share the information they've gathered with us? And if we
asked for our data to be wiped, would they comply? To be candid, we
have no idea. And, as end customers, we don't have much power over the
situation.

When it comes to personal data, it's incredibly difficult to distinguish


between legal and illegal collects since several aspects must be taken
into account, including the context in which the data is gathered, the
methods used to get user consent, and country-specific legislation.

Furthermore, determining whether or not user data is being exploited


within a corporation or in business-to-business contacts is very
impossible.

Despite public uproar to preserve online privacy, the Cambridge


Analytica crisis occurred last year, in which a third-party corporation
was allowed to collect personal information from millions of Facebook
users and exploit it in political campaigns.
Human annotators were rumored to be used by both Amazon and Apple
earlier this year to listen to personal conversations captured via their
individual virtual assistants Alexa and Siri.

A New York Times piece published recently revealed how much fine
grained data is obtained and preserved by relatively obscure consumer
rating organizations. A third-party corporation knew the writer Kashmir
Hill ordered chicken tikka masala, vegetable samosas, and garlic naan on
a Saturday night in April three years ago using her iPhone. At this pace,
skepticism about internet privacy will only grow if nothing is done.

Hacking

My Twitter account has been hacked," we've all heard this phrase, but it's
not true. Your Twitter account wasn't really hacked; instead, your
password was insufficiently strong, or you provided your password to a
friend and forgot to reset it.

Anyone who uses a computer that is linked to the Internet is at risk from
hacker groups and internet fraud. To distribute hazardous malware
attacks and damage your computer security, these online criminals
generally utilize phishing schemes, spam email or instant messaging, and
phony websites.

Identity theft

Through the virus programme to which we all fall prey, thieves get
access to our personal information. Second, anything we post on social
networking platforms is viewable by a large number of people. How can
you be certain that you don't have any phony accounts on your friend
list?

Not only may your identity be taken, but your photos can also be
cropped and found in different places like porn sites or blatant ads.

Stalking online
Social media refers to the sharing of information and human
conversation via a tablet, mobile phone, or computer. In today's world,
social media has become an indispensable tool. Various websites, such as
Facebook, Twitter, and Instagram, make it easy to socialize and engage.
Social media has a tremendous influence on our culture. Misuse of social
media has a variety of negative and positive consequences.

Stalking is defined as a criminal offense in the Crimes Act of 1958.


Stalking occurs when a person engages in behavior with the intent of
physically or mentally harming the opponent. Contacting the victim by
email, message, or phone call, following the victim, posting any material
linked with the victim online, hacking the victim's computer, delivering
objectionable information to the victim, monitoring the victim, and so on
are just a few instances.Individual privacy is at risk on social media
networking websites, which is one of the most pressing issues nowadays.
Personal information is requested on social networking websites these
days, and it is freely accessible by individuals all over the world. Despite
the fact that there are several privacy options, many users are unaware of
them or are unconcerned about the nuances. Another negative of social
media networking is that people do not learn how to interact with others.
This is due to the fact that students prefer online talking over
face-to-face conversation. Elements that must be completed in the
physical world are completed in the digital world through social media.

The negative well

The internet provides you with almost everything you will ever need in
your everyday life, employment, education, or even health.
However, it also supplies you with material that may have a detrimental
impact on you, such as violent films and serial killer documentaries.

Bots that spread fake news

GROVER is an AI system that can create a false news item based just on
a title. Articles published by AI systems like GROVER are more
credible than those authored by humans. OpenAI, a nonprofit sponsored
by Elon Musk, developed "deepfakes for text" that recreate news stories
and works of fiction so convincingly that the organization initially opted
not to share the study with the public in order to prevent hazardous
exploitation of the technology. It may have major repercussions for
individuals, corporations, and governments when fraudulent news is
promoted and spread as factual.

Facial Identification

Facial recognition has a lot of good uses, but it may also be exploited for
nefarious purposes. China has been accused of utilising face recognition
technology for racial discrimination and surveillance. China's cameras
have not only been used to catch jaywalkers, but they've also been used
to monitor and control Minority communities in the nation. Russia's
cameras scour the streets for "persons of interest," while Israel is said to
be tracking certain castes in the West Bank. Facial recognition is
hampered with prejudice, in addition to following people without their
knowledge. When a machine learning system is trained on a dataset that
isn't diverse, it becomes less accurate and more likely to misidentify
people.

Cyber Terrorism

Cyberterrorism is the use of the Internet to carry out or threaten violent


activities that result in or threaten the death or serious bodily damage of
others in order to obtain political or ideological advantage through fear
or intimidation. Acts of planned, large-scale disruption of computer
networks, particularly personal computers connected to the Online, using
tools like computer viruses, computer worms, phishing, malicious
software, hardware devices, and programming scripts can all be
considered kinds of internet terrorism.

Terrorist organisations and their supporters are increasingly using the


Internet for a variety of purposes, including training,financing,
recruitment, propaganda, incitement to commit terrorist acts, and the
gathering and dissemination of information for terrorist purposes, thanks
to technological advancements. While the Internet's many benefits are
self-evident, it can also be used to facilitate communication within
terrorist organisations and to transmit information about, as well as
material support 12 for, planned acts of terrorism, all of which
necessitate specific technical knowledge for effective investigation.
NEED FOR CONTROL
So what can we do?

- The government should filter out the violate webpages like illegal
download websites,pirated movies sites, unlawful porn sites and
etc
- Hold awareness campaigns about the correct and sensible use of
technology
In this era of fast technological development, automation, and machine learning,
the challenge for society is to harness these opportunities to improve not just our
quality of life, but also our purpose.

This technological revolution has provided us with new tools and ways for learning
more about the forces and processes that regulate life on our planet, as well as
adapting our work practises in light of what we've learned.

With each passing day, we learn more about our environment and how it functions.
Technology is allowing us to be more sensitive to change as it occurs, giving us
with a plethora of real-time data and insight into humanity's myriad interactions
with nature and their consequences.Furthermore, technology requires us to be more
responsible in our management of the earth and its resources. Information
necessitates taking action. As a result of our increased understanding of the
consequences of our activities on the planet, we must behave responsibly.

People who use social media passively (such as ingesting information and
browsing through other people's postings) report lower levels of happiness,
according to research. People that use social media more actively (by publishing
material, exchanging ideas, or commenting on other people's interactions) may not
experience any negative effects. Engage in your social networks to get the most
out of them. (Also, keep in mind that people's lives are rarely as picture-perfect as
they appear on social media.)

While digital technology and social media make it simple to remain in touch, they
may also make it difficult to connect with the people you're with in person.
Face-to-face contacts are also crucial for mental health.

Data analysis

In a study of 2,000 people conducted last year, Privacy Australia


discovered that 57.9% of respondents lacked confidence in corporations'
ability to secure personal data.
A similar level of skepticism was reported in the 2017 Australian
Community Attitudes to Privacy Survey, which polled 1,800 individuals
and found:

• 79 percent of interviewees said targeted advertising based on their


internet behaviors made them feel uneasy.

• 83 percent felt uneasy about social media corporations storing their


personal information.

• 66 percent said that collecting user information was usual practise for
mobile apps, and

• 74% thought that collecting user information was usual practise for
websites.

In 2017, the University of Sydney's Digital Rights and Governance


Project released the Digital Rights in Australia study, which found that
62% of 1,600 participants felt they had no control over their online
privacy. Around 47% were also frightened that the government may
invade their privacy.

The Stress in America survey found 44% of people who check email, texts, and
social media often or constantly report feeling disconnected from their family, even
when they’re together. When you’re with friends and family, make an effort to
unplug. To avoid temptation, silence your phone and put it out of reach at dinner
time or during family outings.
Shopping, paying utility bills, credit card payments, entry fees, e-commerce, and
online banking are all common uses of the Internet nowadays. Many firms in the
marketing field are using the internet to advertise and sell their products and build
brands. Cities, municipalities, states, and nations use the internet to provide
extensive tourism and event information in the field of travel. Travelers from all
over the world may quickly access information on tourism, sightseeing, lodging,
weather, maps, event schedules, and transit schedules, as well as purchase tickets
to numerous tourist attractions and locations. Communication has grown
considerably faster and easier since the introduction of technology in
communication, which includes telephones, fax machines, cellular phones, the
Internet, multimedia, and email. In many ways, it has changed and altered
relationships. We don't have to rely on mailing physical letters and waiting for a
response for many days. Technology has simplified communication to the point
that you can contact or message anyone from anywhere using a mobile phone or a
variety of messaging applications that are free to download. Communication
technology innovation has had a huge impact on social life. The use of social
networking sites, dating, and even marriage services available on mobile
applications and websites has made human socialization simpler.
CONCLUSION
Along with the beneficial aspects of today's technology, there is no
denying that in the wrong hands, it can be quite hazardous.

For human civilisation, technology has been a double-edged sword. On


the one hand, we are misusing technology in a variety of industries.
Some individuals are not sufficiently educated to utilize technology as a
suitable instrument, even in the cultural and educational fields.

However, by making nuclear and hydrogen weapons viable, it


contributes to increased pollution and the emergence of new dangerous
illnesses.

As a result, the only feasible answer to the dilemma we confront today is


to maximize the use of efficient technology that can ensure humanity's
long-term sustainability.

The manual method of storing files has been replaced by technology.


Files are now saved on the cloud and may be viewed at any time and
from any location. Companies may use technology to make rapid
judgments, move quickly on solutions, and remain adaptive. Technology
has improved resource use and connected enterprises all around the
world. If the consumer is in America, for example, the services can be
supplied from India. They can instantly converse with one another.
Virtual meeting tools, corporate social networks, tablets, and smart
customer relationship management apps are used by every firm to speed
up the flow of data and information.
Bibliography
bernardmarr.com/the-7-most-dangerous-technology-trends/

/blog.insideout.io/en/2014/03/26/misuse-of-technology/

greetinglines.com/essay-on-technology/

theconversation.com/the-ugly-truth-tech-companies-are-tracking-and-mi
susing-our-data-and-theres-little-we-can-do-127444

councilonrecovery.org/technology-misuse-abuse-addiction-among-teena
gers/

You might also like