1: Computers have enabled the over interconnection of people, there is a lack of privacy. Cyberstalking is on the rise. Criminals are much more equipped to electronically stalk people and obtain their information. People on social media platforms with enabled location settings are much more susceptible to being stalked. This poses a serious issue where a cyberstalker can geolocate your position, exploit them when they are at the most vulnerable, and commit a various slew of crimes.
2: Computers have allowed electronic transactions, which makes the money vulnerable. Cyber theft has made the world less safe because thieves who are technically savvy do not have to execute traditional theft where they physically have to rob a bank and be at the point of crime. Instead, they can be across the world and in a different country, run an exploit on a business or regular citizen, and steal money from them.
3: Computers have made the world less safe by listening, gathering, and using data from our everyday lives. “Siri is always listening.” Computers listen to everything we say and do; they record every keystroke that we input and there are algorithms that are meant to help suggest things for us to buy, do, and explore. However, the pitfall of this is that there are companies using this information to make money off of the data that is collected.
MORE
1: The incorporation of cryptography has made the cyber world safer because it keeps unwanted and unauthorized players from accessing readable information pertaining a transmission between parties. Cryptography can allow safer transactions to be made and obfuscate information possibly pertaining to user login and password authentication.
2: The implementation of computers by cybersecurity specialists and ethical hackers makes the world safer because they are able to leverage their technological prowess to place controls on information and find vulnerabilities in a given system. Computers have many checks and balances which are
3: Computers made the world safer by safeguarding information from people that are not supposed to see it. In the circumstance that a person walks by a paper envelop and a locked computer, both with the same information on it, the person walking by will most likely get through the envelope before the locked computer. This allows computers, with authentication implemented, to safeguard intellectual property, information, and overall communication from unauthorized actors.