ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

The grey areas of information technology!

Updated on September 24, 2015

cyber crimes.

Be cautious before surfing in social and financial sites!

What we gained is instant communication but what we have lost is human relationships.

Technology has made our life easy and comfortable. We need not stir from our room or desktop. Every thing possible under the sky is executed by the wonderful internet. Previously, for each task, we need to go to different places in time, wait in long “Q” and complete any transaction after couple of hours. Whether it is banking, post office or paying bills for various services, it was really tiresome. Only one work can be undertaken in a day due to traffic problems, time constraints, office duties and many such limitations. There was lot of risks in each such errand. Going out by elders nowadays is highly risky. Moreover there were due dates for bill payments, otherwise you have to cough up fines also.

Shopping too has been made easy by online orders on e commerce sites. Many governments in the world have adopted e governance for the convenience of its citizens. All these things have made the life of middle class man more comfortable. Of course connectivity is a taboo in many places on earth due to acute poverty and paucity of basic necessities of life like food, clothing, water and medicines. Sadly many people are living in refugee camps all over the world due to civil wars and rebellion etc. The cheapest mode of communication is a mobile phone which could be obtained for even 15 dollars. But many of our poor brethren could not afford even for such essential gadget.

Having dwelt on the positive aspects of information technology, we need to think about various negatives in instant communications. First of all, human relationships have dwindled to low ebb. We constantly communicate by mail or chatting. The human interaction is missing. Dealing with computer applications, we too have become a robot so far as our family and friends are concerned. The mail and message culture sans the customary addressing have become like telegraphic messages of yore.

The freedom with which youngsters access the net has developed daring interactions with unknown people in social sites like face book, twitter and other such big sites. Many have lost their money and peace of mind in net access. There are luring advertisements in every nook and corner of the web which force every youngster to try something new and the list is endless. Many participants are subjected to browbeating by bullies; many are trapped in fraudulent sites. Some of the websites have become crime centers which attract anyone to fall in the trap. In the quest of easy money, many people reveal their personal data with the result they are made pauper in no time. Cyber crime has become a major issue in every country. Besides this many terrorists are luring young unwary persons into their organization.

Now the Police and crime branch personals are breaking their head to track the unknown, anonymous criminals behind the laptops or tablets. Hence cyber security has become a global problem. Mainly governments, banks and business people spend substantially to keep their servers safe from intruders. But these unknown criminals are outwitting government agencies to eavesdrop in their sites and steal vital data. Defense, space programs, automic energy establishments, has become easy targets. The stock markets have become vulnerable to such threats. Many people are risking their money and lives when transacting with such sites thinking that such sites are secure. Of course many layers of security have been incorporated in financial and defense sectors.

Hence the initial euphoria of information technology has changed to fear of losing vital data. There are already media reports on large scale data loss everywhere. Of course there are sleuths in every administration who patch up these loopholes as soon as they find something amiss. Hence the risks are more compared to the advantages. Hence beware of the snoopers in every single site!

Beware of using credit cards on-line!

Comments

    0 of 8192 characters used
    Post Comment

    No comments yet.

    working

    This website uses cookies

    As a user in the EEA, your approval is needed on a few things. To provide a better website experience, hubpages.com uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

    For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at: https://hubpages.com/privacy-policy#gdpr

    Show Details
    Necessary
    HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
    LoginThis is necessary to sign in to the HubPages Service.
    Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
    AkismetThis is used to detect comment spam. (Privacy Policy)
    HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
    HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
    Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
    CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
    Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the googleapis.com or gstatic.com domains, for performance and efficiency reasons. (Privacy Policy)
    Features
    Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
    Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
    Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
    Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
    Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
    VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
    PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
    Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
    MavenThis supports the Maven widget and search functionality. (Privacy Policy)
    Marketing
    Google AdSenseThis is an ad network. (Privacy Policy)
    Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
    Index ExchangeThis is an ad network. (Privacy Policy)
    SovrnThis is an ad network. (Privacy Policy)
    Facebook AdsThis is an ad network. (Privacy Policy)
    Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
    AppNexusThis is an ad network. (Privacy Policy)
    OpenxThis is an ad network. (Privacy Policy)
    Rubicon ProjectThis is an ad network. (Privacy Policy)
    TripleLiftThis is an ad network. (Privacy Policy)
    Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
    Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
    Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
    Statistics
    Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
    ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
    Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)