asssnm3
asssnm3
Retail and Customer Service: Self-checkout kiosks, online shopping platforms, and chatbots powered by
AI have significantly reduced the need for human cashiers, customer service representatives, and stock
clerks. These automated systems can handle transactions and answer customer queries around the
clock, resulting in fewer jobs for humans in these areas.
Data Entry and Processing: Computers, software, and AI systems can now process large amounts of data
automatically, reducing the need for human data entry clerks, typists, and accountants. Advanced
machine learning algorithms and optical character recognition (OCR) technology can analyze, process,
and categorize information much faster than humans, leading to job displacement.
2.) Software piracy:refers to the illegal copying, distribution, and use of software without proper
authorization from the software publisher. It includes activities such as downloading cracked software
from unofficial websites or distributing unlicensed copies.
Software lifting: is the act of using software beyond the allowed number of installations or copying
software for use on multiple computers without purchasing additional licenses.
3.) Security Risks: Pirated software often lacks the latest security updates or patches, leaving systems
vulnerable to malware, hacking, and other cyber threats.
-Lack of Support: Users of pirated software do not have access to official support from the software
developer, meaning they might face issues with compatibility, usability, or performance that cannot be
fixed.
-Loss of Revenue for Developers: Piracy deprives software companies of revenue, affecting their ability to
fund development, create new versions, and maintain quality. It also discourages innovation and can
harm the software economy.
- Legal and Compliance Issues: Using pirated or unlicensed software can lead to legal penalties and fines,
especially in corporate environments where software licenses need to be tracked for compliance.
With the rise of mobile money platforms, social media, and online banking, cybercrime, such as
identity theft, hacking, and phishing scams, has increased in Kenya. Cybercriminals target individuals and
businesses to steal financial information.
Terrorist groups in Kenya have been known to use the internet to recruit members, spread extremist
propaganda, and organize attacks.
- IT Solutions: The government uses social media monitoring tools and AI-driven algorithms to track
and monitor online activity for signs of radicalization. Law enforcement agencies also cooperate with
tech companies to shut down extremist content.
Illegal poaching and trafficking of endangered species, such as elephants and rhinos, have been
persistent problems in Kenya.
-IT Solutions: Drones equipped with cameras, GPS tracking devices, and AI-powered surveillance
systems are now being used to monitor wildlife parks. Additionally, data analytics and blockchain
technology are being used to track the movement of wildlife products to prevent trafficking.
The adoption of cloud-based collaboration tools (e.g., Google Workspace, Microsoft Teams) has
enabled employees to work remotely and interact in real time across geographic locations. This has
reduced the need for centralized offices and hierarchical communication structures, fostering a more
collaborative and flexible work environment.
Automated Decision-Makin IT has allowed organizations to implement data analytics and machine
learning algorithms to assist with decision-making processes. These technologies can analyze large sets
of data and provide actionable insights, which reduces the reliance on traditional hierarchical decision-
making models and empowers employees at different levels to make data-driven decisions.
Virtual Teams and Global Workforce: With IT, organizations can now hire employees from anywhere in
the world, enabling them to build virtual teams The use of video conferencing, project management
software, and communication tools allows teams to collaborate effectively across time zones, changing
the organizational structure to be more global and flexible.
6.)Positive Impact on Communication: Social media platforms have revolutionized the way people
communicate, making it easier to stay in touch with family, friends, and colleagues worldwide. It has also
created spaces for people to share ideas, knowledge, and experiences, promoting global connectivity.
Negative Impact on Mental Health: Social media has been linked to mental health issues, particularly
among adolescents. Studies have shown that excessive use of social media can contribute to anxiety,
depression, and feelings of inadequacy, as people compare their lives to idealized portrayals of others
online.
Spread of Misinformation and Fake News: Social media platforms have become breeding grounds for
misinformation, fake news, and conspiracy theories. False information can spread rapidly, causing social
unrest, influencing elections, and creating confusion during crises, such as the COVID-19 pandemic.
Impact on Privacy: The massive amount of personal information shared on social media has raised
significant privacy concerns. Users often share sensitive details about their lives, which can be exploited
by third parties for advertising, data mining, or even criminal activities like identity theft.
7.) Privacy Concerns: With the increase in data collection and monitoring in workplaces, employees may
feel that their privacy is compromised.
Digital Discrimination and Bias: The use of AI and algorithms in recruitment, promotions, or
performance evaluations may lead to digital discrimination. Bias in algorithms, whether unintentional or
based on flawed training data, can result in unfair treatment of certain groups based on gender, race, or
other factors.
Workplace Stress and Burnout:The constant availability through digital tools and the expectation of
always being "on" can contribute to workplace stress and burnout Employees may feel pressure to
respond to emails, messages, and requests outside of working hours, leading to a poor work-life balance.
Job Displacement Due to Automation: As more workplaces implement automation, employees may
face the risk of job displacement, particularly in roles that involve repetitive tasks. Ethical considerations
about the fairness of automation and the need for retraining programs are central to this issue.
8.) Antivirus Software: Antivirus programs detect and remove malware, viruses, worms, and other
malicious software from a computer. Regular updates and scans help ensure that the system remains
secure against emerging threats.
Firewalls: A firewall acts as a barrier between a trusted internal network and external networks,
blocking unauthorized access while allowing legitimate traffic. Both hardware and software firewalls are
used to safeguard computer systems from hacking attempts.
Data Encryption: Encrypting sensitive data ensures that even if hackers gain access to a system, they
cannot easily read or misuse the data. Encryption can be applied to files, emails, and communications.
Strong Passwords and Multi-Factor Authentication (MFA): Using strong, unique passwords for accounts
and systems, combined with multi-factor authentication, adds an extra layer of security by requiring
something you know (password) and something you have (e.g., a smartphone app) before granting
access.
Regular Software Updates: Keeping all software, including operating systems and applications, up to
date ensures that security vulnerabilities are patched. Cybercriminals often exploit outdated software to
gain unauthorized access to systems.