Professional Documents
Culture Documents
Submitted By
Prerna Singh
Of
RD NATIONAL COLLEGE
BANDRA (W),MUMBAI-400055
2021-22
CERTIFICATE
This is to certify that the project entitled “CONTROL AND MISUSE OF TECHNOLOGY ” is a true
and satisfactory work done by PRERNA SINGH,SYBA,ROLL NO.20242. The project report is
submitted to University Of Mumbai in partial fulfillment for the requirements of the award of the degree
of “BACHELOR OF ARTS STUDY” for the academic year 2021-2022.
----------------------------- ---------------------------------
----------------------------- ----------------------------------
College Seal
DECLARATION
I,PRERNA SINGH, student of RD NATIONAL COLLEGE,SYBA (SEM-IV) hereby declare that I have
completed the project on “CONTROL AND MISUSE OF TECHNOLOGY ” in the academic year
2021-2022.
The subject matter contained in this project is research and most of the work carried out is
original and was done under the guidance of my project guide Dr Kiran Sawant Sir and Dr Ravi
Shukla.
Prerna Singh
SYBA SEM IV
ROLL NO-20242
ACKNOWLEDGEMENT
I would like to express a deep sense of thanks and gratitude to my project guide Dr Ravi Shukla
and Dr Kiran Sawant sir for guiding me immensely through the course of the project. They
always showed keen interest in my work. Their constant guidance,advice and motivation have
been responsible for the successful completion of this project.
My sincere thanks to the entire administration of RD National College and to the principal
Dr.Neha Jagtiani,for her coordination in extending every possible support for the completion of
this project.
I would also thank my parents for their support and motivation.I am immensely grateful to my
classmates for their timely help in the compilation of this project.
Last but not the least, I would like to thank all those who had helped directly or indirectly
towards the completion of this project.
PRERNA SINGH
SYBA SEM IV
ROLL NO-20242
TABLE OF CONTENT
1 INTRODUCTION
2 OBJECTIVES
3 METHODOLOGY
4 TECHNOLOGY
7 DATA ANALYSIS
8 CONCLUSION
9 BIBLIOGRAPHY
INTRODUCTION
The Internet is widely considered to be one of the most important
technological innovations of the late twentieth century.
Despite the additional benefits of this tool for learning, teaching, and
research, there are still a number of issues with Internet access and
usage.Although the long-term impacts of screen time are still being
researched, the consequences of excessive internet and smartphone usage
are well-known. Internet use that is "pathological" has been related to
depression in teenagers, and it may even reduce brain matter.
Unauthorized conduct.
Internet surfing habits are being tracked.
Selling data traffic and misusing network bandwidth are two
different things.
Harassment of people.
Pornography.
Unauthorized computer usage (via Telnet or suing remote desktop
connection).
There is no end to social networking.
Video streaming for non-academic purposes.
METHODOLOGY
A mix of qualitative and quantitative approaches was executed to
develop the following research study which allowed for a combination
of numerical measurement and in-depth exploration. Statistical datas, pie
charts, survey method ,which is the quantitative approach, was used to
assess the scale on how grave the issue of misusing technology is . The
qualitative approach gave a purposive process of data gathering,
analyzing, classifying and tabulating data about the prevailing
conditions,practices,trends, beliefs,processes impacts and cause-effect
relationships and then adequate and accurate interpretation about such
data with aid of statistical treatment. Random sampling was also used
from different strata of the population.An analysis of the past records
and articles was made to draw out a well informed thesis. A reference to
the official secured government websites was also made in order to
understand the various ways it impacted the citizens.Along with that and
the help of various newspaper articles that provided numerous case
studies helped in drawing out conclusions and results for the thesis
project.Before analysis the gathered data was prepared. The dataset was
checked for missing data and outliers. For this the “outlier labeling rule”
was used. All values outside the calculated range were considered
outliers.
TECHNOLOGY
What is technology?
Some youngsters use cellphones as early as the age of ten. This isn't
always a negative thing because many parents work and must leave their
children with a babysitter, thus they require a means of communication
with their children. Children nowadays not only desire telephones, but
they also want the most recent version. If youngsters do not have it, they
may feel embarrassed in front of their peers and prefer to keep their old
smartphone at home. Furthermore, many recent smartphones include a
built-in camera, which some people utilise to take photographs or
movies that may harm the reputation of others. As a result of these
factors, some individuals believe that technology is to blame and that it
is harmful to society.
Tracking
Every time misconduct has been discovered recently, a same pattern has
developed.
Is it true that once we opt out, they will no longer collect our data?
Would they share the information they've gathered with us? And if we
asked for our data to be wiped, would they comply? To be candid, we
have no idea. And, as end customers, we don't have much power over the
situation.
A New York Times piece published recently revealed how much fine
grained data is obtained and preserved by relatively obscure consumer
rating organizations. A third-party corporation knew the writer Kashmir
Hill ordered chicken tikka masala, vegetable samosas, and garlic naan on
a Saturday night in April three years ago using her iPhone. At this pace,
skepticism about internet privacy will only grow if nothing is done.
Hacking
My Twitter account has been hacked," we've all heard this phrase, but it's
not true. Your Twitter account wasn't really hacked; instead, your
password was insufficiently strong, or you provided your password to a
friend and forgot to reset it.
Anyone who uses a computer that is linked to the Internet is at risk from
hacker groups and internet fraud. To distribute hazardous malware
attacks and damage your computer security, these online criminals
generally utilize phishing schemes, spam email or instant messaging, and
phony websites.
Identity theft
Through the virus programme to which we all fall prey, thieves get
access to our personal information. Second, anything we post on social
networking platforms is viewable by a large number of people. How can
you be certain that you don't have any phony accounts on your friend
list?
Not only may your identity be taken, but your photos can also be
cropped and found in different places like porn sites or blatant ads.
Stalking online
Social media refers to the sharing of information and human
conversation via a tablet, mobile phone, or computer. In today's world,
social media has become an indispensable tool. Various websites, such as
Facebook, Twitter, and Instagram, make it easy to socialize and engage.
Social media has a tremendous influence on our culture. Misuse of social
media has a variety of negative and positive consequences.
The internet provides you with almost everything you will ever need in
your everyday life, employment, education, or even health.
However, it also supplies you with material that may have a detrimental
impact on you, such as violent films and serial killer documentaries.
GROVER is an AI system that can create a false news item based just on
a title. Articles published by AI systems like GROVER are more
credible than those authored by humans. OpenAI, a nonprofit sponsored
by Elon Musk, developed "deepfakes for text" that recreate news stories
and works of fiction so convincingly that the organization initially opted
not to share the study with the public in order to prevent hazardous
exploitation of the technology. It may have major repercussions for
individuals, corporations, and governments when fraudulent news is
promoted and spread as factual.
Facial Identification
Facial recognition has a lot of good uses, but it may also be exploited for
nefarious purposes. China has been accused of utilising face recognition
technology for racial discrimination and surveillance. China's cameras
have not only been used to catch jaywalkers, but they've also been used
to monitor and control Minority communities in the nation. Russia's
cameras scour the streets for "persons of interest," while Israel is said to
be tracking certain castes in the West Bank. Facial recognition is
hampered with prejudice, in addition to following people without their
knowledge. When a machine learning system is trained on a dataset that
isn't diverse, it becomes less accurate and more likely to misidentify
people.
Cyber Terrorism
- The government should filter out the violate webpages like illegal
download websites,pirated movies sites, unlawful porn sites and
etc
- Hold awareness campaigns about the correct and sensible use of
technology
In this era of fast technological development, automation, and machine learning,
the challenge for society is to harness these opportunities to improve not just our
quality of life, but also our purpose.
This technological revolution has provided us with new tools and ways for learning
more about the forces and processes that regulate life on our planet, as well as
adapting our work practises in light of what we've learned.
With each passing day, we learn more about our environment and how it functions.
Technology is allowing us to be more sensitive to change as it occurs, giving us
with a plethora of real-time data and insight into humanity's myriad interactions
with nature and their consequences.Furthermore, technology requires us to be more
responsible in our management of the earth and its resources. Information
necessitates taking action. As a result of our increased understanding of the
consequences of our activities on the planet, we must behave responsibly.
People who use social media passively (such as ingesting information and
browsing through other people's postings) report lower levels of happiness,
according to research. People that use social media more actively (by publishing
material, exchanging ideas, or commenting on other people's interactions) may not
experience any negative effects. Engage in your social networks to get the most
out of them. (Also, keep in mind that people's lives are rarely as picture-perfect as
they appear on social media.)
While digital technology and social media make it simple to remain in touch, they
may also make it difficult to connect with the people you're with in person.
Face-to-face contacts are also crucial for mental health.
Data analysis
• 66 percent said that collecting user information was usual practise for
mobile apps, and
• 74% thought that collecting user information was usual practise for
websites.
The Stress in America survey found 44% of people who check email, texts, and
social media often or constantly report feeling disconnected from their family, even
when they’re together. When you’re with friends and family, make an effort to
unplug. To avoid temptation, silence your phone and put it out of reach at dinner
time or during family outings.
Shopping, paying utility bills, credit card payments, entry fees, e-commerce, and
online banking are all common uses of the Internet nowadays. Many firms in the
marketing field are using the internet to advertise and sell their products and build
brands. Cities, municipalities, states, and nations use the internet to provide
extensive tourism and event information in the field of travel. Travelers from all
over the world may quickly access information on tourism, sightseeing, lodging,
weather, maps, event schedules, and transit schedules, as well as purchase tickets
to numerous tourist attractions and locations. Communication has grown
considerably faster and easier since the introduction of technology in
communication, which includes telephones, fax machines, cellular phones, the
Internet, multimedia, and email. In many ways, it has changed and altered
relationships. We don't have to rely on mailing physical letters and waiting for a
response for many days. Technology has simplified communication to the point
that you can contact or message anyone from anywhere using a mobile phone or a
variety of messaging applications that are free to download. Communication
technology innovation has had a huge impact on social life. The use of social
networking sites, dating, and even marriage services available on mobile
applications and websites has made human socialization simpler.
CONCLUSION
Along with the beneficial aspects of today's technology, there is no
denying that in the wrong hands, it can be quite hazardous.
/blog.insideout.io/en/2014/03/26/misuse-of-technology/
greetinglines.com/essay-on-technology/
theconversation.com/the-ugly-truth-tech-companies-are-tracking-and-mi
susing-our-data-and-theres-little-we-can-do-127444
councilonrecovery.org/technology-misuse-abuse-addiction-among-teena
gers/