login

IS INFORMATION TECHNOLOGY A DEVELOPMENT OR HANDICAP IN DISGUISE?

Comments ¡¤ 898 Views
ASSN: 8590889



This article devolves around the basics of information technology,the positive and negative effects on the world as a whole. It also deals with the act safeguarding information and technology in India .

IS INFORMATION TECHNOLOGY A DEVELOPMENT OR HANDICAP IN DISGUISE ?

1. INTRODUCTION

Information technology (IT) is the use of any computers, storage, networking and other physical devices, infrastructure and processes to create, process, store, secure and exchange all forms of electronic data. It is used in education, business, games, communication etc. Information Technology has become the universe of functioning in everyday life. Many decades ago, it was just a dream to bring advancement in technology and aid development in all spheres of life. But with its multi- faceted programming and operatability, there are many imperliment in economic, social,political, physical and mental domain of the life.

2. TYPES OF INFORMATION TECHNOLOGY

2.1 COMPUTING: It Includes studying as well as experimenting with algorithm processing with the development of both hardware and software

2.2 SOFTWARE: The software comprises a set of instructions, data, and programs that operate the computer and execute specific tasks. It is the opposite of hardware which primarily describes the physical aspect of the computer.

2.3 NETWORK: Computer networks primarily concern themselves with interconnecting computing devices and exchanging data and resources with one another.

2.4 DATABASE: It is an organized collection of structured data or information stored electronically in a computer system. It is looked after by the Database Management System (DBMS).

2.5 ARTIFICIAL INTELLIGENCE: This is a simulation of human intelligence that is processed by machines, especially concerning computer systems. The specific Al applications are expert systems, natural language processing, speech recognition.

2.6 COMMUNICATION: it is an umbrella that includes any communication device encompassing the segments of television, cellular phones, computer and network hardware, satellite

2.7 CYBERSECURITY: Cyber security protects internet-connected systems for hardware and software data from the verge of cyber threats. Individuals and other enterprises, therefore, use the practice to protect themselves against unauthorized access to data centers and other computerized systems. [1]

3. CAREERS IN INFORMATION TECHNOLOGY

3.1 NETWORK SECURITY: The network security engineer protects systems from cyber threats, including bugs, malware, and hacking attempts.

3.2 COMPUTER SYSTEM ANALYST: Analysts create diagrams to help programmers and architects build computer systems

3.3 COMPUTER NETWORK ARCHITECT Computer network architects, or network engineers, design and deploy computer and information networks. As part of the implementation process, network architects deploy and configure network equipment.

3.4 COMPUTER SUPPORT SPECIALIST: It analyze, troubleshoot, and maintain computer networks.Computer support specialists assist computer users and organizations. These specialists either maintain computer networks or provide technical help directly to computer users.

3.5 SERVER MANAGEMENT ADMINISTRATION: It creates new user accounts, recovers lost passwords and keeps data secure. Develops and implements network maintenance standard operating procedures.[2]

4. SUPERIORITY OF INFORMATION TECHNOLOGY

Information Technology is growing up at a very fast pace. An ordinary person has become dependent on technology for communications, completing assignments, jobs, education, travel and etc. Nowadays everyone have easy access to Internet and network. Everything has come into the fingertips of the people. The big motion full world has become a small global village.

4.1 GLOBALIZATION

The flow of technology, communication, people and services has easily made the interdependence and interconnection between the developed and developing countries It has led to business process outsourcing easy and flow of ideas and creativity from one country to another.

4.2 ECONOMIC DEVELOPMENT

Globalization, trade and expansion of market, import and export of goods and services helps to flourish economic development in the country. The Multinational Corporation opens its branches in the developing countries leds to influx of technology, resources and foreign investment which generates employment, national income and ultimately leads to improvement in the quality of life of people.

4.3 DECREASING OF CULTURAL GAP

Advancement in technology has enabled the flow of information, culture, tradition, practice, custom, style of living, language, food and cinema to break the shackles of boundary or restrictions and spread its richness worldwide. For example: K-pop bands, drama and food have global demand and is no longer an unknown element to the world. Many foreigners have even been inclined towards Hunduism and there has been growth of Islam all over the world. Even Indian foods and its rich culture, heritage etc is loved and appreciated in the entire world. It has been possible only through the hassle free flow of ideas, thoughts, belief and practices all over the world without much hurdles.

4.4 ONLINE SERVICES

Nowadays there are many modes of online services available in banking, education, food and pharmaceutical industries etc. People can avail services in the comforts of their homes without stepping out and are enjoying quality services through the advancement in IT sector.

4.5 EASY ACCESS TO VITAL NEWS

It has made vital information regarding climate change, campaign, health awareness ,cyclones, wars etc easily accessible to the people through electronic media like phone, social media etc

4.6 AVAILABILITY OF ENORMOUS INFORMATION

There has been availability of lot of information in electronic devices on various subjects and themes which has opened a broad spectrum of influx and growth of knowledge and awareness.

4.7 CHANGE IN EDUCATION

During the COVID-19 PANDEMIC, the world came to a standby but with electronic gadgets, network and apps gave rise to online education. Now students can do online coaching, studies assignment, learn skills and even apply for distance course.

4.8 AWARENESS TO FORM POLITICAL OR SOCIAL OPINION

Electronic media, social media etc helps us to know about the global situation such as climate change, corruption, election campaigns and even the events such as farmers protest, CAA protest, genocide in Palenstine etc. It helps us to formulate our views and standpoint on social and Political event all over the world

4.9 SENSE OF UNITY

It had removed all the Territorial barriers to form a sense of global unity, solidarity and brotherhood among people. For eg: There was a global protest for ceasefire, to stop Isralei occupation in Palenstine and even some countries provided aid to Palestine. There was a mass boycott of products which led to drop in the sale of Nescafe.

5. DRAWBACKS OF INFORMATION TECHNOLOGY

5.1 HEGEMONY OF STRONG NATIONS

Globalization has lead to strong nations occupying market and eradicating small producers. Even the westernisation is growing at a fast rate and is destroying other cultures of the world. The developed countries are ahead in terms of technology, employment and quality of life than the developing nation. The big Multi- national corporation is taking over local companies and expanding their production and brand worldwide The powerful is becoming more strong and the weak nation almost remain slaves to the strong nation

5.2 ADVERSE EFFECTS ON HEALTH

People have become more addictive and dependent which lead to obesity, heart attack, increase in eye power etc. Even children below 5 years are also involved in playing mobile games or using smartphone will leads to non development of fine motor skills which will become a hurdle later on in their lives.

5.3 ADVERSE EFFECTS ON ENVIRONMENT

The network tower causes lots of radiation waves which kills many birds, insects and etc. For establishment of the towers many forest are cut down causing deforestation and global warming.

5.4 LOSS OF JOBS

Artificial Intelligence possess a threat to jobs as it is more effective and accurate than the people. Many companies invests in operating Al which will cause more unemployment and poverty

5.5 ONLINE FRAUDS

As Information of people are easily available and hacking is known to many people which lead to online fraud, theft and piracy. People's hard earned money is not even safe in banks in the digital Era of fraud.

5.6 ONLINE TROLLING AND BULLYING

Nowadays smartphones and social media is a handy tool used by many people but there are bullying. and trolling which deteriorate mental health of the victim Recently an influencer committed suicide as he had been trolled for being gay and other hate comments made him take such a drastic step to end his Ilife.

5.7 MORPHING AND DEEPFAKE

Information and technology had become a curse as offenders are morphing the picture of people and defaming them for money. They are basically extorting, harrassing and looting people of their dignity and money. Recently Actress Rashmika Mandanna video was viral which was basically a deep fake of someone else's video. Police took strict action and arrested the culprits

5.8 PLAGIARISM

Plagiarism means using someone else's work without giving them proper credit. In academic writing, plagiarizing involves using words, ideas, or information from a source without citing it correctly. It is an evil which spoil the work, effort and ideas of the people in the present times.

5.9 CYBERCRIMES

Cybercrime encompasses a wide range of criminal activities that are carried out using digital devices and/or networks. These crimes involve the use of technology to commit fraud, identity theft, data breaches, computer viruses, scams, and expanded upon in other malicious acts.

5.10 EXPOSURE TO ADULT CONTENT

Teenagers are exposed to adult content which have a negative influence on them and they can be involved in anti social activities which will plunder their innocence and land them in trouble.

6. INFORMATION TECHNOLOGY ACT, 2000

The IT Act 2000 was stipulated into action in October 2000. The law can sue any offender across all the Indian states. The provisions put forward by the Indian Government depict certain features of Information Technology Act, 2000 that can punish illegal cyber activities outside the India.

7. OBJECTIVES

7.1 Grant legal recognition to any or all transactions are done via electronic exchange of information or alternative electronic suggested for e-commerce

7.2 Offer legal recognition to digital signatures for the authentication of any data or matters requiring legal authentication

7.3 Facilitate the electronic filing of documents with Government agencies and conjointly departments

7.4 Facilitate the electronic storage of information. [3]

8. FEATURES

To fortify the security aspects of online approval across any e-platforms electronic signature was introduced in place of a digitally scanned copy of the signature. This is safer as each time a transaction or consent will be cautiously approved by the concerned party

The penalties that may be imposed in the form of compensation or imprisonment to the person who commits the offences

The latest section procures fortification against malpractices performed by cybercafes.

Senior law enforcement officials and alternative officers will enter any public place and search and arrest while not warrant

9. OFFENCES UNDER INFORMATION TECHNOLOGY ACT, 2000

9.1 SECTION 43 AND 43A

It states that any act of destroying, altering or stealing computer system/network or deleting data with malicious intentions without authorization from owner of the computer is liable for the payment to be made to owner as compensation for damages

9.2 SECTION 66

Hacking of a Computer System with malicious intentions like fraud will be punished with 3 years imprisonment or the fine of Rs.5,00,000 or both

9.3 SECTION 66E

Violation of privacy by transmitting image of private area is punishable with 3 years imprisonment or 2,00,000 fine or both.

9.4 SECTION 67

This section states publishing obscene information or pornography or transmission of obscene content in public is liable for imprisonment up to 5 years or fine of Rs. 10,00,000 or both[ 4]

10. CASE LAWS

10.1 AVNISH BAJAJ VS STATE [5]

The Court further observed that the evidence collected indicates that the offence of cyber pornography cannot be attributed to Bazee.com but to some other person. The Court granted bail to Mr. Bajaj subject to the furnishing of 2 sureties Rs. 1 lakh each. However, the burden lies on the accused that he was merely the service provider and does not provide content.

10.2 SHREYA SINGHAL VS UNION OF INDIA [6]

Section 66A of the Information Technology Act, 2000 is struck down in its entirety being violative of Article 19(1)(a) and not saved under Article 19(2) of the Indian Constitution.

11. CONCLUSION

Information Technology has lots of benefit but at one hand it is just a wolf in a sheep's clothing.It has revolutionized the world with its usability but also possess a threat to the future. The debates on its pros and cons is non ending but to wisely use it without being addicted or dependent on it is required. Development and technology are inseperable so people should live a balanced life where people use skill or creativity authenticately and not to become puppets in the hand of technology. Technology has undeniably become the integral part of our lives but maturity and awareness is required while using it properly.

"Information and Technology is an useful servant but a dangerous master depending upon the choice of the person. "

12. CITATIONS

1. LAURA HOLTON, The 11 main types of IT services available at https://myva360.com/blog/the-11-main-types-of-it-services (last visited on Dec 21,2023)

2. Indeed available at https://in.indeed.com/career-advice/finding-a-job/jobs-in-it (last visited on Dec 21, 2023)

3. Toppr available at https://www.toppr.com/guides/business-laws-cs/cyber-laws/information-technology-act-2000/ (last visited on Dec 22, 2023)

4. Testbook available at https://www.google.com/amp/s/testbook.com/amp/ias-preparation/information-technology-act-2000 (last visited on Dec 22,2023)

5. (2008) 105 DRJ 721: (2008) 150 DLT 769

6. AIR 2015 SC 1523

Comments