(1) will trigger global social unrest in a certain period of time. As mentioned above, the development of digital technology has brought new wealth to mankind, and the network has gradually eroded the boundaries of countries. In the digital age, some people are deprived of their power, and a new round of power distribution has begun. Global culture will annex the weak culture. At the same time, global violence has not disappeared, and some political groups or ethnic and racial entities may create turmoil to safeguard their own interests. Moreover, the competition for bit control rights will also aggravate this chaos. Therefore, in a certain period of time, it will cause instability in human society. However, if people can join hands for the overall interests of mankind, this turmoil may become a catalyst for the arrival of the bit era.
(2) The crowd is divided and the interpersonal relationship is indifferent. The network will divide people into different interest groups. With the forgetting of national boundaries, the network will become bigger and more important, and the world may be divided into different network groups such as China Network, Indian Network, Environmental Network, Medical Network, Women Network and Financial Network. Network will change social production and lifestyle, and deepen the alienation between people. Social interaction is mediated by computers, so direct communication between people is reduced, interpersonal relationships are weakened, human feelings tend to be indifferent, and the world is more "cold".
(3) High-tech crimes have increased. The development of digital technology has also facilitated crime. Using information network to engage in high-tech crimes will become a major social problem in the bit era. Criminals can enter cyberspace, engage in theft and economic fraud, engage in pornographic transactions, or engage in electronic gambling. Any illegal activity based on computer technology knowledge is called computer crime. In developed countries, the use of computers for criminal activities began in the 1960s, with the vicious expansion of cases in the 1970s and the increasingly serious social problems in the 1980s. At present, computer crimes are mainly concentrated in confidential information systems and financial systems. It has caused serious damage and threat to national security and national defense, politics and economy, science and technology and social life.
1983 may 12, chase bank in London received a computer instruction from Colombian central bank, and transferred13.5 million USD to new york Morgan Trust and Guarantee Bank through chase bank in new york, then to Israeli Chaplin Bank in Zurich and then to a bank in Panama. Because the accomplices did not have the correct documents to withdraw cash, the money was transferred to Europe again, in the same year.
Star Wars 1986 In May, four criminals in the Federal Republic of Germany used computers to change the password of the tape on their credit cards and defrauded 65,438+million marks. He was arrested after committing a crime.
1988 Bathias Speer, a computer student at the University of Hanover, Federal Republic of Germany, connected his computer with the computers of the US military and military contractors, and stole a large number of US defense secrets in two years, including the "Star Wars" plan of the United States, the nuclear weapons of the North American Air Defense Command and the information of communication satellites.
Because the security system of NASA's global data network is flawed, it has been used by computer enthusiasts in the Federal Republic of Germany. These people stole some keywords and entered the data network of NASA, so they can see the safety investigation and rocket accident of the space shuttle research contract system through their own computer screens, they can contact the e-mails of users of this data network, and even paralyze the whole data network.
The first case of stealing depositors' deposits by computer in China occurred in Shenzhen from 65438 to 0986. In recent years, there have been hundreds of criminal cases of computer theft, embezzlement and misappropriation of cash in China banking system, involving tens of millions of yuan, with the largest amount as high as150,000 yuan.
1at the end of 992, a securities company found a serious case in which internal staff used computers to misappropriate more than 800,000 yuan of public funds to make profits in stock trading. According to the introduction of relevant departments, since the opening of Shenzhen stock market, there have been many cases in which insiders, especially computer programmers and operators collude with each other to misappropriate public funds for stock trading.
There is also the most intractable telecom fraud problem at present. Criminals intercept radio waves from the air, use computers and special software to decipher passwords, then implant these stolen passwords into empty mobile phones, and concoct mobile phones with the same number as legitimate users for free use, and the communication fees are paid by the legitimate holders of the original numbers. These criminals who use computers for criminal activities not only steal telephone recordings, private long-distance telephone passwords and illegal decryption software, but also use advanced equipment for criminal activities such as fraud.
Faced with rampant computer crimes, the State Council promulgated the Regulations on the Security Protection of Information Systems in People's Republic of China (PRC). In this way, China's computer security problems have laws to follow and rules to follow, which can effectively curb the momentum of computer crimes, intensify the crackdown and promote the healthy development of China's computer industry.
(4) Alienation of human nature. In the age of Bits, individuals were submerged in information and formed "digital people". People tend to react quickly to high technology, but they escape from reality, are unwilling to associate with others, are indifferent to others, are prevalent in individualism and have a poor sense of security; Although personal privacy has certain anonymity, it spreads to a large audience and is fast; Various abnormal behaviors and mental diseases have increased; There is a lack of trust between people and human nature is alienated.
(5) The widening gap between the rich and the poor, the prevalence of "information first", information pollution, information deception and other negative effects will have a negative impact on the future society, which should be paid enough attention and studied.