cloud computing
internet of things
The Internet of Things refers to “smart” devices that can
connect, exchange data and work together. Some devices sold today, such as cars
, doorbells, thermostats, and refrigerators, have them.
Smart home devices can be convenient and safe, such as
doorbells with built-in video cameras and remotely adjustable thermostats. On
the other hand, they can threaten security when hacked or used to invade
privacy. They can also be difficult to maintain; a smart fridge can keep a
grocery list up to date, but is nearly impossible to fix due to a lack of
trained technicians.
Cities are also using the Internet of Things. For example,
Toronto has traffic lights that vary their cycles depending on traffic
congestion.
Did you know ?
In the late 2010s, Toronto is the planned site for the
establishment of the world's first smart neighborhood. The development, called
Quayside, would have been built from the ground up from the internet. However,
critics worry about who owns the data collected through numerous devices and
sensors. The stakes are especially high because Quayside is said to have set a
precedent for similar projects to follow. Sidewalk Labs, which is owned by the
same company as Google, withdraws its proposal during the pandemicoutbreak of
2020. The company says uncertain economic conditions have made Quayside less
financially viable.
Cybercrime in Canada
Widespread use of the internet has led to increased crime in
terms of information theft, exploitation, harassment and commerce. In 2015, the
Protecting Canadians from Online Crime Act was passed, which amended the
Criminal Code and other laws to help law enforcement investigate cases of child
sexual exploitation and organized crime in line.
The most common online crimes involve the breach of
information belonging to individuals or organizations. Hackers often attack
e-commerce sites. They mainly target credit card numbers , which can be sold or
used to defraud other companies. Other targets are usernames and passwords,
which can be used to hack other sites. These kinds of attacks underscore the
importance of the privacy protections set out in the Personal Information
Protection and Electronic Documents Act (PIPEDA), which compels private
companies to notify people whose data has been stolen.
Some people are targeted for phishing scams, which are
emails that appear to come from a legitimate sender, such as a bank , and
contain a link to a website .
Pedophiles use the internet to access and distribute child
pornography . Sexual predators use it to lure their potential victims into
meeting them. To this end, they use social media, email and other online
communication tools. Several cases of online stalking, or harassment through
these tools, have also been reported. Hateful posts and comments against
religious and ethnic minorities are also commonplace.
Cyberbullying is a serious problem among young people. It
sometimes leads to those who are victims of mental health problems , isolation
and lack of self-esteem that can lead to suicide . For example, Amanda Todd, a
teenager from British Columbia , committed suicide in 2012 after several years
of cyberbullying due to a photo showing her topless, forcibly taken and posted
on the web by her attacker. Another teenage girl, Rehtaeh Parsons, of Nova
Scotia , took her own life in 2013 after a video of her sexual assault
emergedon social media. After his death, several investigations are carried
out. A provincial law was then proposed to protect children from cyberbullying,
but the Supreme Court of Nova Scotia struck it down in 2015 because it violated
the freedom of expression section of the Charter of Rights and Freedoms . .
Comments
Post a Comment