Saturday, October 1, 2022

1.2 Ethical and Social Issues in ICT

 1.2 Ethical and Social Issues in ICT

 

Computer ethics

Computer ethics is a set of moral principles or code of conducts that regulate the use of computers systematically without making harm to other users.

 

Some commandments of computer ethics.

·       Do not use a computer to harm other people.

·       Do not use a computer to publish fake information.

·       Do not search the file or record of other people.

·      Do not destroy or delete the records of other people.

 

Digital citizenship

Digital citizenship refers to the responsible use of technology by anyone who uses computers, the Internet, and digital devices to engage with society on any level. 

 

Good digital citizenship engages young students and shows them how to connect with one another, understand with each other, and create lasting relationships through digital tools.

 

Bad digital citizenship, on the other hand, involves cyber bullying, irresponsible social media usage, and a general lack of knowledge about how to safely use the Internet.

 

 

 

Examples of Digital Citizenship

·       Communicating with respect

·       Respecting other’s privacy

·       Adding helpful information/context to a discussion or wiki page

·       Supporting others by offering useful feedback

 

Digital footprint

Digital footprint is a trace of data that is created while using the Internet.

It includes the websites we visit, emails we send, and information we submit to online services.

 

It is important to be aware of it because anything posted online is permanent and stays forever regardless of being deleted.

 

Publishing a blog and posting social media updates are another popular ways to expand your digital footprint.

 

Every tweet you post on Twitter, every status update you publish on Face book, and every photo you share on Instagram contributes to your digital footprint.

 

Even "liking" a page or a Face book post adds to your digital footprint, since the data is saved on Face book’s servers.

Types of digital footprints

a)     Active digital footprint

b)     Passive digital footprint

 

Active digital footprints

a)     An active digital footprint is where a user knows that they're sharing the information.

b)     Posting on Face book, Instagram, Snap chat, Twitter, and other social media platforms

Passive digital footprints

a)     A passive digital footprint is the information collected from a user without their knowledge.

b)     Websites that install cookies in your device without disclosing it to you

 

Cyber bullying

Cyber bullying is a kind of harassment using mobiles or computers.

 

Examples of cyber bullying:

·       Sending rude emails, texts or instant messages online or on the phone

·       Posting hurtful things about someone on social media

·       Taking an embarrassing photo or video and sharing it without permission

·       Pretending to be another person by creating a fake online profile

 

Cyber law
The law which governs the legal issues in the cyber space regarding the internet or WWW for digital data processing and transaction is called cyber law.

The importance of cyber law is that it controls cyber-crime and misuse of computer.

 

 

Aims of formulating cyber law in Nepal

To legalize the transaction through electronic media to control various types of electronic frauds

To punish a person who does criminal activities through electronic means especially on computers.

 

Cyber crime [SEE 2074] [SLC 2071]
Cyber crime is an illegal action involved in any computer, computer system or over all computer networks like internet.

E.g. Software piracy, hacking, cracking, pornography etc.
Computer hacking means stealing and destroying other data, information, files and program.

 

Digital signature
Digital signature is a security mechanism system used on the internet for data and information transaction by attaching a code at the end of the electronic message that attests the authenticity of sent message.

The importance of digital signature is that it provides legal framework to facilitate and safeguard electronic transaction in the electronic media.

 

ICT

A technology which collects stores and processes data into information and communication through computer system is known as ICT.

 

Challenges of ICT

·       Internet criminals enter into the system by creating fake identities and use the system for their benefits which is difficult to recognize and control.

·       Hacking or unauthorized access of system is increasing.

·       Sharing unnecessary information of individual or group of people is the danger of ICT in this era.

·       The Digital Divide is a social issue referring to the differing (conflicting) amount of information between those who have access to the Internet (especially broadband access) and those who do not have access. 

 

IT Policy 2072

v IT Policy launch in Nepal – 2000 AD (2057 BS)

v Most recent and the latest information technology policy– ICT Policy 2015 (2072 BS)

v Total laws in ICT policies 2015 (2072 BS) – 21 Policies

v Strategies in ICT policies 2015 (2072 BS) – 21 Strategies

v Percentage of the population will have digital skills by the end of 2020? – 75%

v Percentage of the population will be able to access the broadband services by 2020? – 90%

v Percentage of the population of Nepal will have internet access by 2020? – 100%

v  Percent of government services will be provided online by 2020? – 80%

Objectives of IT Policy 2000

a)     To establish knowledge based industry

b)     To increase employment

c)     To build knowledge based society

 

Vision of ICT Policy 2015

v To transform Nepal into information and knowledge based society and economy.

 

Mission of ICT Policy 2015

v To create conditions for the intensified development and growth of ICT sector as a key driver for Nepal’s sustainable development and poverty reduction strategies.

 

Goals of Information and Communication Technology policy

a)     At least 75 percent of the population will have digital literacy skills by the end of 2020. 

b)     80% of all citizen facing government services would be offered on line by 2020

c)     G2G implementation would be promoted with a view to achieving complete automation  of the operations of land administration, revenue administration and management, vital  registration, passport and citizenship certificate services by 2020.

d)     Broadband access will be expanded across the country with the goal of achieving a  broadband Internet user penetration rate of 30% at a minimum of 512kbps and making  available at least 10 Mbps download speed on demand in urban areas by 2018.

Electronic Transaction

v Transactions of electronic records data by using any types of electronic means.

v  Contains electric records and valid digital medium.

v  The exchange of all types of records which are in the form of electronic.

 

ETA (Electronic Transaction Act)

v ETA (Electronic Transaction Act) deals with issues related to cybercrime and also help in making and implementing laws over cybercrime.

v He /she can be jailed for minimum from 6 months to a maximum of 3 years and has to pay the penalty according to the offense. 

v Maintaining privacy in the cyberspace, creating strong passwords, updating the security software, updating password are some of the techniques to keep secure him /her.

v The computer and cyber crimes such as hacking, piracy, copyright violation, fraudulent and all other deceitful activities have been clearly defined and punishments are set accordingly. The action against such crimes and punishment will be in the range of a minimum Rs 50,000 to a maximum Rs 3,00,000 in cash and six months to three years imprisonment.

v The new legislation has not only legalized all forms of electronic transactions and digital signatures but has also clearly spelled out ways to regulate various computer-based activities and punish cyber crimes.

 

When was Electronic transaction act 2063 authenticated and published in Nepal?

  December 8 2006 (22 Mangshir 2063)

 

Objectives of the Electronic Transaction Act 2063

a)     To make legal provision for authentication and regulation of electronic data.

b)     To make a reliable date generation, communication, and transmission.

c)     To make a secured and authentic means of electronic communication.

d)      To regulate all the relating matters of electronic transactions.

 

Scopes of the Electronic Transaction Act 2063

a)     Creation and use of digital signature

b)     Control cyber/computer-related crimes.

c)     Protection of intellectual property.

d)     Protection of confidentiality.

 

Social Media

Social Media is an online tool that helps us to stay connected with the whole world.

 

Different platforms of Social media

a)      Facebook

b)     Twitter

c)      Instagram

d)     LinkedIn

e)      Blogs

f)      Wikipedia

 

Opportunities of using social media

a)     It creates awareness and innovate the way people live

b)     Social media let us share anything with others around the world.

c)     It keeps us informed about the world.

d)     It creates brand exposure for business to the largest audience.

 

Threats of using social media

a)     Personal data and privacy can be easily hacked and shared on the internet.

b)     More chances of creating fake accounts.

c)     Negative impact on the health.

d)     Decrease the working efficiency of people.

e)     Spreading false or unreliable information.

 

Full Forms:

ICT - Information and Communication Technology

SMS – Short Message Service

IT – Information Technology

G2G – Government to Government

ETA – Electronic Transaction Act

HoR – House of Representative

MMS - Multimedia Messaging Service

 

A person who never made a mistake never tried anything new." —Albert Einstein


 

No comments:

Post a Comment