Friday, May 10, 2019

21st Century Children Using or Abused By ICT Essay

21st coke Children Using or Abused By ICT - Essay ExampleCultural Relativism too is against the interest of the kidskin and both these theories would violate the UN convention on the Rights of the Child. Freedom to spam is against the ethics of the computers and the Marxist tradition recognizes the contradict and the paradox that ICT presents. Children today misuse the computer as an accessory, a weapon and as a target. The basal human rights to security and privacy have to be maintained and for this, the children have to be provided the necessary guidance. They indispensability to understand the rights as well as the responsibilities connected with ICT. With the right measuring of freedom and the right amount of restraint, ICT should be a blessing rather than a curse.Information and Communication Technology (ICT) is changing the being it has become infused in life and it brings many challenges with it. Apart from the moral and ethical oppositions, these technological changes affect the familiarity as well. Children are vulnerable and due to lack of proper guidance succumb to the distractions that this technology offers. ICT female genital organ and should be used for e-Learning, entertainment and communication but today the abuse far outweighs the use of this technology. As technology is integrated in life, the responsibility too increases. A critical assessment of the social impact of information system would help to understand the changes that could make the computer user-friendly for the children as well as protect them from harmful effects.To help the children derive the right benefits, firstly the system itself has to be protected. Children start victimization computers at the age of 4 or 5 and hence the physical terminal design call for to be remodeled. The configurations should be such that the keys are close enough for them to reach and at the same magazine does not pose a problem as the kids grow up. A certain level of optimality with impl y to standards must be attained. As an added security measure, which

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.