.

Friday, September 27, 2019

21st Century Children Using or Abused By ICT Essay

21st Century Children Using or Abused By ICT - Essay Example Cultural Relativism too is against the interest of the child and both these theories would violate the UN convention on the Rights of the Child. Freedom to spam is against the ethics of the computers and the Marxist tradition recognizes the conflict and the paradox that ICT presents. Children today misuse the computer as an accessory, a weapon and as a target. The basic human rights to security and privacy have to be maintained and for this, the children have to be provided the necessary guidance. They need to understand the rights as well as the responsibilities connected with ICT. With the right amount of freedom and the right amount of restraint, ICT should be a blessing rather than a curse. Information and Communication Technology (ICT) is changing the world; it has become infused in life and it brings many challenges with it. Apart from the moral and ethical impacts, these technological changes affect the society as well. Children are vulnerable and due to lack of proper guidance succumb to the distractions that this technology offers. ICT can and should be used for e-Learning, entertainment and communication but today the abuse far outweighs the use of this technology. As technology is integrated in life, the responsibility too increases. A critical assessment of the social impact of information system would help to understand the changes that could make the computer user-friendly for the children as well as protect them from harmful effects. To help the children derive the right benefits, firstly the system itself has to be protected. Children start using computers at the age of 4 or 5 and hence the physical terminal design needs to be remodeled. The configurations should be such that the keys are close enough for them to reach and at the same time does not pose a problem as the kids grow up. A certain level of optimality with regard to standards must be attained. As an added security measure, which

No comments:

Post a Comment