Technology computers-hardware

The Disadvantages of Using Computers for Communication

    Privacy

    • Many types of computer communication can be viewed by others. Email is similar to a postcard instead of a secure letter. A variety of people along the way could view the message. That can especially cause a problem at work where negative comments could get back to the person they were written about. The same thing can happen when writing a blog or using social networking tools such as Facebook or MySpace.

    Anonymity

    • Anytime communication is conducted totally by computer, there is a possibility that someone might portray themselves as something other than what they are. At the best, this wastes the other person's time. At the worst, these relationships are used by predators or people engaging in criminal activities. Thus, it is important to approach anonymous people with a great deal of caution.

    Bullying and Harassment

    • The lack of personal contact allows people to be very cruel with few repercussions. Students can post unpleasant and offensive comments about other students or teachers. These comments not only make social networking unpleasant for the victim, but can lead to bullying and harassment at school. Others use the anonymity of computer communication to harass and stalk those they communicate with. This can go beyond cyber-stalking and cyber-harassment if the perpetrator learns personal information about the victim such as their address, phone number or place of work.

    Scams

    • Not every business is what it claims to be. The anonymity of computer communication makes it easy for people to pose as legitimate businesses while engaging in illegal activities without getting caught. It is very important that people know exactly who they are dealing with and that their business is legitimate.

    Inaccuracy

    • Those who turn to the Internet for news and information may be getting inaccurate information. Anyone can write a blog or post information on a social network. Traditional news sources such as newspapers and television stations hire trained reporters who must have their stories approved by editors and producers. Those who write for blogs or social networks often have few safeguards to guarantee the accuracy of their information.

    Viruses

    • This is especially a problem when downloading material such as email attachments. A virus can destroy files, or even the computer. Thus, an email attachment should never be opened unless the user knows who sent it and that the attachment is free of viruses.

Related posts "Technology : computers-hardware"

Is There a Way to Recover Data From an S RAM Card?

Hardware

How to Create a DVD With More Than One Video File Separated Into Titles

Hardware

How to Troubleshoot Your Dell Notebook With a Projector

Hardware

Printing On A Constant Progression

Hardware

Tips on Using a Digital Pen Efficiently

Hardware

How to Fix a Master Boot Record in Vista Ultimate

Hardware

Setting Up a PC as a Wireless Router

Hardware

How to Upgrade a MacBook

Hardware

How to Disable the Touch Pad on a Dell Precision M90 Laptop

Hardware

Leave a Comment