Latest Post:
Loading...

Unit 1.2 Ethical and Social Issues in ICT (grade 10)

 1.2 Ethical and Social Issues in ICT


ICT (Information and Communication Technology)

Information and Communication Technology (ICT) refers to technologies that provide access to information through telecommunications

Challenges of ICT

1. Virtual Identity

Internet criminals enter into the system by creating fake identities and use the system for their benefits which is difficult to recognize and control.

2. Security

a) Hacking (unauthorized access) of system is increasing.

b) Loss of data and information.

3. Privacy Issues

a) Cyber bullying is a kind of harassment using mobiles or computers.

b) Sharing unnecessary information of individual or group of people is the danger of ICT in this era.

4. Copyright

A copyright is a type of intellectual property that gives its owner the exclusive right to copy, distribute, adapt, display, and perform a creative work, usually for a limited time.

Copyright is the exclusive right that the owner of an intellectual property has to that property.

a) A legal right that grants the creator of an original work.

5. Social Behavior

a) Excessive use of internet has changed ta. he behavior of the people.

b) Negative effects on sleep, work and academic achievements of the students.

c) Usage of unethical sites has increased negative behaviors and crimes in society.

d) Employees use internet at their workplace for non-productive works.

6. Digital Divide

The Digital Divide is a social issue referring to the differing (conflicting) amount of information between those who have access to the Internet (especially broadband access) and those who do not have access.

Computer Ethics

Computer ethics are the set of moral principles for using the computer and internet. It is the acceptable behaviors on the internet.

Major Provisions/commandments included in computer ethics are:

a) Do not use a computer to harm other people.

b) Do not search the file or record of other people.

c) Do not spread false and illegal information.

d) Do not destroy or delete the records of other people.

e) Do not snoop around in other people’s files. 

f) Do not use other people's computer resources without authorization.

Some examples of do's and don'ts in cyber ethics, particularly regarding the use of the internet and computers are:

Do's of Cyber Ethics:

  • Use the Internet to help with schoolwork.
  • Utilize the Internet to explore music, video, and games.
  • Communicate with friends and family online.

Don'ts of Cyber Ethics:

  • Copy information from the Internet and claim it as your own.
  • Download or share copyrighted material.
  • Communicate with strangers.
  • Pretend to be someone else.
  • Use rude language or behavior.
  • Share personal information or passwords.

Cybercrime

Cyber-crime is an illegal and criminal activity done by using computer and internet technology. Cybercrime is also known as computer-related crime.

Illegal activities committed using computer technology

a) Damage to computer and computer system.

b) Acts to gain illegal access into the system.

c) Use as weapons to commit other crimes.

d) Acts against the provision of cyber law.

Examples of cyber/computer crimes

a) Creating fake documents

b) Blackmailing/social media abuse

c) Distribution of pornography materials

d) Piracy of intellectual properties

e) Spreading computer viruses/malware

f) Cyber bullying, identity theft, software piracy, data diddling

Cyberbullying

Cyberbullying is a form of bullying that occurs through digital devices, involving the use of electronic communication to bully a person, typically by sending intimidating or threatening messages.

Examples of cyberbullying behavior are:

  • Sending rude emails, texts, or instant messages
  • Exclusion from online groups
  • Offensive chat during online gaming
  • Posting hurtful things about someone on social media
  • Spreading rumors or gossip online
  • Making fun of someone in online chats
  • Attacking or killing avatars or characters in online games intentionally
  • Pretending to be someone else online

Common platforms where cyberbullying typically occurs are.

  • Social media platforms like Facebook, Instagram, Snapchat, and Twitter
  • SMS (text messages)
  • Instant messaging services
  • Email

Hacker

A hacker is a person with advanced computer skills who gains unauthorized access to computer systems or networks.

Hacking

Hacking is gaining unauthorized access to computer systems or networks to manipulate or exploit them for various purposes.

Purpose of hacking.

Hacking can involve unauthorized access to computer systems, networks, or data for various purposes, such as stealing information, causing damage, or gaining control over systems.

Cracker

A cracker is someone who breaks into computer systems or networks without authorization, often with malicious intent.

Cyber Law

Cyber law refers to the laws that prevent cybercrime, legalize electronic transactions and digital data processing, and punish cyber criminals.

Cyber Law (also known as Electronic Transaction and Digital Signature Act (ETDSA)) was passed on 30th Bhadra 2061 (15 September 2004).

The major components included in cyber law are:

  • Electronic and Digital Signature Law
  • Computer Crime / Cyber Crime Law
  • Intellectual property Law
  • Data Protection and Privacy Law
  • Telecommunication Law

International Cyber Law

a) Fair Credit Reporting Act in 1970

b) Freedom of Act in 1970

c) Federal Privacy Act in 1974

d) Video Privacy Protection Act in 1988

e) Copyright Act 1992

Copyright Law

Copyright law grants creators of original works exclusive rights to their creations, protecting against unauthorized copying or distribution.

Digital citizenship

Digital citizenship refers to the responsible use of technology by anyone who uses computers,

the internet, and digital devices to engage with society on any level.

A digital citizen is anyone who uses digital tools such as computers, cell phones, or the Internet. You can use these tools in your work, at school or for recreation.

  • Good digital citizenship engages young students and shows them how to connect with   one another, empathize (understand) with each other, and create lasting relationships through digital tools.
  • Bad digital citizenship, on the other hand, entails (involves) cyber bullying, irresponsible social media usage, and a general lack of knowledge about how to safely use the Internet.

Examples of Digital Citizenship

a) Communicating with respect

b) Respecting other's privacy

c) Adding helpful information/context to a discussion or wiki 

d) Supporting others by offering useful feedback

e) Encouraging them, or sharing work they're proud of, etc.

Digital footprint

Digital footprint is a trial of data you create while using the Internet. It includes the websites you visit, emails you send, and information you submit to online services.

How can we manage our digital footprint?

  • Ensure the content posted protects your privacy.
  • Not to forget that online posts are private.
  • Ensure the content posted doesn’t damage yours or other reputation

Types of digital footprints

a) Active digital footprint

b) Passive digital footprint

Active digital footprints

a) An active digital footprint is where a user knows that they're sharing the information.

b) Posting on Face book, Instagram, Snap chat, Twitter, and other social media platforms

c) Filling out online forms, such as when signing up to receive emails or texts

d) Agreeing to install cookies on your devices when prompted by the browser

Passive digital footprints

a) A passive digital footprint is the information collected from a user without their knowledge.

b) Websites that install cookies in your device without disclosing it to you

c) Apps and websites that use geo location to pinpoint your location

d) Social media news channels and advertisers that use your likes, shares, and comments to profile you and to serve up advertisements based on your interests

"Everything leaves a digital footprint. Whatever gets created may never go away. If they don’t want to see it tomorrow, they'd better not post it today"

IT Policy 2072

IT Policy launch in Nepal – 2000 AD (2057 BS)

Most recent and the latest information technology policy– ICT Policy 2015 (2072 BS)

Objectives of IT Policy 

  • To empower and facilitate Nepal’s participation in the Global Knowledge Society.
  • To promote ICT to further productivity among the sectors that is key drivers of the national economy.
  • To promote research and innovation on the role of ICT on the resilience of low-income communities amid potential environmental, economic and social shocks
  • To create easily accessible, affordable and innovative public access points under a
  • comprehensive E-community / Village network initiative.

 Vision of ICT Policy 2015

To transform Nepal into information and knowledge-based society and economy.

Mission of ICT Policy 2015

To create conditions for the intensified development and growth of ICT sector as a key driver for Nepal's sustainable development and poverty reduction strategies.

Objectives of National Information and Communication Technology Policy

a) To empower and facilitate Nepal’s participation in the Global Knowledge Society.

b) To promote ICT to further productivity among the sectors that is key drivers of the national economy.

c) To deploy ICTs at all levels of Nepali educational system in order to improve educational outcomes while expanding access to education and training facilities

d) To facilitate the participation of youths and women in ICTs particularly in media and content development initiatives.

Electronic Transaction

Transactions of electronic records data by using any types of electronic means.

Contains electric records and valid digital medium.

ETA (Electronic Transaction Act)

  • ETA (Electronic Transaction Act) deals with issues related to cybercrime and also help in making and implementing laws over cybercrime.

Q. When was Electronic transaction act 2063 authenticated and published in Nepal?

Ans: December 8 2006 (22 Mangshir 2063)

Objectives of the Electronic Transaction Act 2063

a) To make legal provision for authentication and regulation of electronic data.

b) To make a reliable date generation, communication, and transmission.

c) To make a secured and authentic means of electronic communication.

d) To regulate all the relating matters of electronic transactions.

Scopes of the Electronic Transaction Act 2063

a) Creation and use of digital signature

b) Control cyber/computer-related crimes.

c) Protection of intellectual property.

d) Protection of confidentiality.

Digital Signature

A digital signature is an electronic form of a signature that can be used to authenticate the identity of the sender of a message or the signer of a document and ensure that the original content of the message or document that has been sent is unchanged.

it uses two keys public and private keys for to authenticate documents. 

 Social Media 

The 'social' part refers to interacting with other people by sharing information with them and receiving information from them.

The 'media' part: refers to an instrument of communication, like the internet (while TV, radio, and newspapers are examples of more traditional forms of media).

Social media is computer-based technology that facilitates the sharing of ideas, thoughts, and information through the building of virtual networks and communities.

Different platforms of social media

Facebook - Facebook is a free social networking Web platform that promotes and facilitates interaction between friends, family and colleagues. Facebook was founded in 2004 by Mark Zuckerberg and several Harvard University classmates.

Twitter – Twitter is a free social networking microblogging service that allows registered members to broadcast short posts called tweets. Twitter was created in March 2006 by Jack Dorsey, Noah Glass, Biz Stone, and Evan Williams, launched in July of that year.

Instagram – Instagram is the name of an online photo sharing social Web service that lets you share your life with friends through a series of pictures captured with a mobile device. Instagram also supports video uploads.

LinkedIn – LinkedIn is a social networking website designed for business professionals. It allows you to share work-related information with other users and keep an online list of professional contacts.

Blogs – A blog (shortening of “weblog”) is an online journal or informational website displaying information in the reverse chronological order, with the latest posts appearing first. It is a platform where a writer or even a group of writers share their views on an individual subject.

Wikipedia – Wikipedia is a free, open content online encyclopedia created through the collaborative effort of a community of users known as Wikipedians. Anyone registered on the site can create an article for publication; registration is not required to edit articles.

Opportunities of using social media

  • Information Sharing and Awareness
  • Business Promotion and Brand Building
  • Creative Expression and Collaboration
  • Attracting customer

Threats of using social media

  • Online Harassment and Bullying
  • Privacy and Security Risks
  • Spread of Misinformation and Fake News
  • Addiction and Mental Health Issues
  • Fake Accounts 



Post a Comment