StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

The Real Computer Virus - Essay Example

Cite this document
Summary
Cannon covered in detail the much-ignored ubiquitous nature of disinformation in his article (2001) in the backdrop of new fast paced communication technologies such as the Internet and email. He illustrated his observations using several instances of belief in and spread of…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.1% of users find it useful
The Real Computer Virus
Read Text Preview

Extract of sample "The Real Computer Virus"

Hazards of Misinformation First Last Dr. TeacherFirst TeacherLast Number 9 May 2008 Hazards of MisinformationCannon covered in detail the much-ignored ubiquitous nature of disinformation in his article (2001) in the backdrop of new fast paced communication technologies such as the Internet and email. He illustrated his observations using several instances of belief in and spread of unverified information with effects ranging from the very benign to the ridiculous to, sometimes, very dangerous.

He cited several examples such as the imagined fate of the men who signed the Declaration of Independence and the glorification of Vicente Fox, a Mexican politician, by propagation of myths of education in Harvard and position in Coca Cola Company associated with him. It is, however, examples with dangerous consequences that give a chilling shock to readers and forces them to take notice of effects of disinformation.Careless use of unsubstantiated information can have dangerous and lingering effects on social groups.

Cannon recalled that in a “PrimeTime Live” show hosted by Dianne Sawyer, she claimed a “government statistic” indicated that gay teenagers were thrice as likely to commit suicide than others. Though she later shunned responsibility by attributing this information to Ellen Degeneres, the guest on the show, the effects were long lasting.Investigation revealed that this assertion about gay teenagers was not a statistic but just an opinion of a social worker in San Francisco. In fact, real studies by professional organizations like the CDC had concluded that there was no evidence to back this claim.

Still, the myth of gay teenagers being amenable to suicide crept into the Internet domain and newspapers of repute such as New York Times, Chicago Tribune and others. Television networks picked it up and propagated it further. Gay rights activists too, including a Governor of Massachusetts, used it to gain public relation victories. In reality, however, this compartmentalized the gay community further and labelled them as suicide prone. Other than unsubstantiated labelling of a social community, this disinformation also could become a false refuge for gay teenagers who struggle for their identity.

In yet another example, a major health disaster loomed over South Africa as a result of believeing an already discredited piece of information on the Internet. President Thabo Mbeki, refused discounts for South Africa on life-saving drugs for AIDS simply because he believed they were not the cure. His source of this information, or rather disinformation, was a website.With many theories surrounding the disease of AIDS, the question of whether HIV causes it or not has been thoroughly researched.

Theories which claim that HIV does not cause AIDS have been rejected each time by the scientific community. However, believing in this disinformation, Mbeki made it difficult for millions of South African sufferers of AIDS to get the drug AZT for HIV. In fact, he even took away support for various programs to control HIV.The problem wasn’t simply limited to a single website or a single powerful individual who caused it. In a recursive fashion, by propagation of news, Mbeki’s actions found way into the mainstream media and confused many sufferers of AIDS.

ReferencesCannon, C. M. (2001). The Real Computer Virus. American Journalism Review, 23(3).Retrieved 8 May, 2008 from http://www.ajr.org/article.asp?id=225

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“The Real Computer Virus Essay Example | Topics and Well Written Essays - 500 words”, n.d.)
The Real Computer Virus Essay Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/miscellaneous/1546361-the-real-computer-virus
(The Real Computer Virus Essay Example | Topics and Well Written Essays - 500 Words)
The Real Computer Virus Essay Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/miscellaneous/1546361-the-real-computer-virus.
“The Real Computer Virus Essay Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/miscellaneous/1546361-the-real-computer-virus.
  • Cited: 0 times

CHECK THESE SAMPLES OF The Real Computer Virus

Network Issues That Led to Shamoon Incident at Aramco

Indeed, in the same day after Cutting Sword of Justice asserted this, Saudi Aramco confirmed that part of its computer system used by its employees is under cyber-attack courtesy of a computer virus.... hellip; Major antivirus companies like Kaspersky named the virus that affected this company as "Shamoon.... This was the first malware used by the hacktivism front and hence the company's network was not in a position to handle the complexity of this virus....
4 Pages (1000 words) Case Study

SHORT written assignment

Computer hacking and cyber terrorism: the real threats in the new millennium?... An example of a virus is the ‘exploit' which causes unanticipated or unintended events to occur in a computer's operating system or application in the process of propagating itself within a computer's system (Elms, LaPrade & Maurer, 2008).... The exploit virus grants a hacker unlimited access to a computer beyond what can be granted by the system administrator....
1 Pages (250 words) Essay

Spyware and Viruses

Spyware is kind of malware, which is installed on a computer without approval or awareness of the owner with the aim of gathering the private information of the owner.... It is usually hidden such that the user can not know about it, and collects information regarding the internet… In addition, they can affect the performance of a computer negatively by the installation of more software, which redirects the web browser searchers, reducing the speeds of connections, changing Moreover, it can be used as a kind of adware, whereby the unsolicited pop-up ads are delivered by the software on top of tracking the behavior of the user....
17 Pages (4250 words) Term Paper

Computer Crimes Categories

The virus has had devastating impacts on the information stored in the computers, causing unexpected disruptions in the flow of activities.... The paper "computer Crimes Categories" states that while shopping online, it is of paramount importance to be extra cautious of the authenticity of the sites prior to making any payments.... Primarily, cybercrime does utilize the computer to commit various crimes not morally acceptable, such as child pornography, software piracy, fraud or copyright theft....
6 Pages (1500 words) Essay

Computer virus

Considering the high level of the defense hackers can physically implant the virus to the computer and it can cause to all effects described above.... If we work with the company that has access to the internet and work with it very often we should underline infecting the computer with viruses or backdoors, special malicious application which allow attacker to take control over the infected computer and maintain any action attacker want.... Motivating factor to attack the computer can be both personal gain (fulfilling the order produced by the company-competitor) and the undermining of the company's competitors systems to have some benefits during the drop of the company's activity (Singer)....
1 Pages (250 words) Coursework

Computer Antivirus

Top Free Computer Antivirus Avast Free Antivirus Software Avast, Free Antivirus combines highly rated all round freeware virus detection with a well-designed and speedy package.... Studies have shown that in customary signature-based virus tests, Avast scored highly by detecting approximately 95% of sampled malware, which according to analysts is neither bad nor good.... The software additionally recorded a decent performance when tasked with the detection of real-world viruses by successfully detecting and, blocking completely about 75% of virus attacks and partially thwarting about 5% of virus attacks, a performance that was categorized as average....
3 Pages (750 words) Research Paper

The Impact of Computer Viruses on Business and Users

The virus programs which are getting more and more popularity for their risks and threats are highly important to be considered when storing confidential information.... The banks and business websites are being used by the virus designers to satisfy their needs.... An example of such a virus is the ILOVEYOU virus which started from the Philippines and gradually infected many computers around the globe.... The virus was initially transferred via electronic emails and whoever opened the attached file welcomed the virus in their computers....
6 Pages (1500 words) Essay

Data Privacy and Security

This essay "Data Privacy and Security" presented some of the important features of computer security those need to be maintained for the sake of effective security management.... hellip; The data saved on a computer are in danger to few risks unless the computer is connected to other systems using a network.... In view of the fact that the use of computer networks has turned out to be persistent, the thought of computer security system extended to point out problems covered in the way of networked use of computers and data resources....
8 Pages (2000 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us