ICT advancements and its undesired ramifications

  • Authors

    • Abdul Haseeb Ansari
    2018-06-08
    https://doi.org/10.14419/ijet.v7i2.34.14014
  • .
  • Information and communication technology (ICT) has the credit to be relatively more closely related to the society facilitating economic transactions to be easy and fast and social wellbeing in all walks of life. It has had global and international importance, as it has worked as an important tool in globalizing the world, and has become a pressing necessity of the globalized world. Moreover, its relevance in the globalized world is intensifying, as its constructive role is every day spiraling. Its vale in that sense will go on mounting. On the other hand, its evil-ridden uses and abuses are menacing the people and countries around the world. Delinquent people and rogue countries are using the technology for achieving their sinister objectives. This aspect of the technology is bothering policymakers, business executives and individuals in the society. In view of this, two pertinent questions arise: one, which of the two aspects of the information and communication technology is dominant; and second, what preventive and punitive measures should we adopt in order to mitigate the evil use of the technology. A vivid comparison of both, which has been carried out in the paper, demonstrates that the beneficial use of the information and communication technology is predominantly high. Thus, our strategy, as the paper suggests, should be to support the useful aspect of the technology with useful conditionality so that it could abate and control its evil use, and to adopt preventive and punitive measures in order to defeat the evil-doers. For that, both legal and extralegal tools should be adhered to. Towards these, the paper offers some useful suggestions.

  • References

    1. [1] Abdul Haseeb Ansari, “Principle 10, Aarhus Convention and Status of Public Participation in Environmental Matters in the Malaysian Laws with Special Reference to EIAsâ€, IIU Law Journal, vol. 17 Number 1, 2009, p. 57.

      [2] Ibid

      [3] “Personal Data Protection†at: http://www.echr.coe.int/Documents/FS_Data_ENG.pdf (Accessed on 12 September 2016).

      [4] “These Cybercrimes Statistics Will Make You Think Twice About Your Password: Where is The CSI Cyber team when you need them?â€, at: http://www.cbs.com/shows/csi-cyber/news/1003888/these-cybercrime-statistics-will-make-you-think-twice-about-your-password-where-s-the-csi-cyber-team-when-you-need-them-/ (Accessed on 12 September 2016)

      [5] Center for Strategic and International Studies, “Net Losses: Estimating the Global Cost of Cybercrimesâ€, 2014, at: http://www.mcafee.com/us/resources/reports/rp-economic-impact-cybercrime2.pdf 9Accessed on 20 September 2016).

      [6] Steve Morgan, “Cybercrime Cost Projected to Reach $2 Trillion by 2019â€, at: http://www.forbes.com/sites/stevemorgan/2016/01/17/cyber-crime-costs-projected-to-reach-2-trillion-by-2019/#a1d0b7d3bb0c (Accessed on 12 July 2016).

      [7] “2016 Cybercrime Re4load: Our Predictions for the Year Aheadâ€, at: https://securityintelligence.com/2016-cybercrime-reloaded-our-predictions-for-the-year-ahead/ (Accessed on 12 July 2016).

      [8] Computer Crime Research Centre, A. Snhetlor, “Some Problem of Cybercrime and Cyber Terrorism fighting†, at: http://www.crime-research.org/library/Schetilov.htm (Accessed on 13 June 2016).

      [9] The National Centers of Victims of Crimes, Bulletins for Teens Stalking, at: http://victimsofcrime.org/help-for-crime-victims/get-help-bulletins-for-crime-victims/bulletins-for-teens/stalking (accessed on 12.10 2016).

      [10] RAS Conference, “Cybercrime and Effective Cyber Law Enforcementâ€, at: :https://www.rsaconference.com/blogs/cybercrime-and-effective-cyber-law-enforcement (Accessed on 10 July 2016).

      [11] Find Law, “defamation and Social Media: What You Need To Knowâ€, at: http://injury.findlaw.com/torts-and-personal-injuries/defamation-and-social-media--what-you-need-to-know.html (accessed on 17 September 2016).

      [12] “10 Alarming Cyber Security Facts the Threaten Your Data (updated on 12 May 2016)â€, at: https://heimdalsecurity.com/blog/10-surprising-cyber-security-facts-that-may-affect-your-online-safety/ (Accessed on 20 July 2016).

      [13] “Public Service ICT Strategyâ€, January 2015 at: http://ictstrategy.per.gov.ie/ictstrategy/files/Public%20Service%20ICT%20Strategy.pdf (Accessed on 20 AUGUST2016).

      [14] Ahmed, S. F. (2007, December). A new approach in Industrial automation application" Embedded system design for Injection Molding Machine". In Multitopic Conference, 2007. INMIC 2007. IEEE International (pp. 1-5). IEEE

      [15] Ahmed, S. F., Kushsairy, K., Bakar, M. I. A., Hazry, D., & Joyo, M. K. (2015, April). Attitude stabilization of Quad-rotor (UAV) system using Fuzzy PID controller (an experimental test). In Computing Technology and Information Management (ICCTIM), 2015 Second International Conference on (pp. 99-104). IEEE.

  • Downloads

  • How to Cite

    Haseeb Ansari, A. (2018). ICT advancements and its undesired ramifications. International Journal of Engineering & Technology, 7(2.34), 93-97. https://doi.org/10.14419/ijet.v7i2.34.14014