You are on page 1of 7

The Disadvantages of ICT

• Cybercrimes

• Combatting cybercrimes
At the end of this lesson, the students should be
able to:

1. understand the several problems ICT has created in


their generation; and

2. write a reflective essay on how ICT can change the


world for better or for worse.
Cybercrimes

Cybercrimes are illegal acts


done through the use of the
Internet.
In 2012, Stephen Nale (Complex.com)
posted a list of ten most common Internet
cybercrimes as follows:

1. Phishing/Spoofing – the act of sending multiple


emails to multiple users in hopes of having a
number of them clicking on the links or malwares
attached to the email.

2. Blackmail/Extortion – the act of using the


Internet to threaten or damage someone’s
reputation to extort money or anything else of
value. This can be avoided if you are aware of what
you should post on the Internet.
3. Accessing Stored Communications – or hacking; the act
of obtaining unauthorized access to data from a computer
network.

4. Sports Betting – the act of wagering on any sports event


over the Internet. In some countries, gambling (including sports
betting) is illegal even if you are doing it over the Internet.

5. Non-Delivery of Merchandise – the act of devising a


scheme wherein a culprit posts an item or service for sale over
the Internet and once the transactions have been done, does
not really give the item or service.

6. Electronic Harassment – the act of anonymously using the


Internet to harass, abuse, threaten, or annoy other people.
7. Child Pornography – the act of using the Internet to show
child pornography. This act is highly punishable by law.

8. Drug Trafficking – the act of selling illegal substances


using the Internet.

9. Criminal Copyright Infringement – the act of piracy


mainly for financial gain. In late 2014, the number one pirate
website, ThePirateBay, was raided for the second time due to
years of pirating movies, music, games, books, and other
software. These kinds of websites earn money through
advertising.
Combatting Cybercrimes

1. Network Security. Before a hacker can get through the


unauthorized files he or she is targeting, the hacker has to
get through several security measures like firewalls, secure
connections, passwords, anti-malwares, and data
encryptions. The Disadvantages of ICT 177
2. Investigation. URL tracing and logging are used by
websites to track your unique IP addresses. This can be used
by investigators to trace hackers. In piracy, trackers are used
to identify IP addresses currently sharing a pirated file.
3. Penalties. More and more laws are being created and
implemented today. Penalties include both a fine and
imprisonment.

You might also like