1.2 Ethical and Social Issues in ICT
Computer ethics
Computer
ethics is a set of moral principles or code of conducts that regulate the use
of computers systematically without making harm to other users.
Some
commandments of computer ethics.
·
Do not use a computer to harm other people.
·
Do not use a computer to publish fake information.
·
Do not search the file or record of other people.
· Do not destroy or delete the records of other people.
Digital citizenship
Digital citizenship
refers to the responsible use of technology by anyone who uses computers, the
Internet, and digital devices to engage with society on any level.
Good digital citizenship engages young
students and shows them how to connect with one another, understand with each
other, and create lasting relationships through digital tools.
Bad digital citizenship, on the other
hand, involves cyber bullying, irresponsible social media usage, and a general
lack of knowledge about how to safely use the Internet.
Examples of Digital Citizenship
·
Communicating with respect
·
Respecting other’s privacy
·
Adding helpful information/context to a discussion or wiki
page
·
Supporting others by offering useful feedback
Digital footprint
Digital footprint is a trace
of data that is created while using the Internet.
It includes
the websites we visit, emails we send, and information we
submit to online services.
It is important to be aware
of it because anything posted online is permanent and stays forever regardless
of being deleted.
Publishing
a blog and posting social media updates are another popular
ways to expand your digital footprint.
Every tweet you
post on Twitter, every status update you publish on Face book, and every
photo you share on Instagram contributes to your digital footprint.
Even "liking" a
page or a Face book post adds to your digital footprint, since the data is
saved on Face book’s servers.
Types of digital footprints
a) Active digital footprint
b) Passive digital footprint
Active digital footprints
a) An active digital footprint
is where a user knows that they're sharing the information.
b) Posting on Face book,
Instagram, Snap chat, Twitter, and other social media platforms
Passive digital footprints
a) A passive digital footprint
is the information collected from a user without their knowledge.
b) Websites that install
cookies in your device without disclosing it to you
Cyber bullying
Cyber bullying is a kind of harassment using
mobiles or computers.
Examples of cyber bullying:
·
Sending rude emails, texts or instant messages online or
on the phone
·
Posting hurtful things about someone on social media
· Taking an embarrassing photo or video and sharing it without permission
· Pretending to be another person by creating a fake online profile
Cyber law
The
law which governs the legal issues in the cyber space regarding the internet or
WWW for digital data processing and transaction is called cyber law.
The
importance of cyber law is that it controls cyber-crime and misuse of computer.
Aims of formulating cyber law in Nepal
To legalize the transaction through
electronic media to control various types of electronic frauds
To punish a person who does criminal
activities through electronic means especially on computers.
Cyber crime [SEE 2074] [SLC 2071]
Cyber
crime is an illegal action involved in any computer, computer system or over
all computer networks like internet.
E.g.
Software piracy, hacking, cracking, pornography etc.
Computer hacking means stealing and destroying other data, information, files
and program.
Digital signature
Digital
signature is a security mechanism system used on the internet for data and
information transaction by attaching a code at the end of the electronic
message that attests the authenticity of sent message.
The
importance of digital signature is that it provides legal framework to
facilitate and safeguard electronic transaction in the electronic media.
ICT
A technology which
collects stores and processes data into information and communication through
computer system is known as ICT.
Challenges of ICT
·
Internet criminals enter into the system by
creating fake identities and use the system for their benefits which is
difficult to recognize and control.
·
Hacking or unauthorized access of system is
increasing.
·
Sharing unnecessary information of individual
or group of people is the danger of ICT in this era.
·
The Digital Divide is a
social issue referring to the differing (conflicting) amount of information
between those who have access to the Internet (especially broadband access) and
those who do not have access.
IT Policy 2072
v IT Policy launch in Nepal –
2000 AD (2057 BS)
v Most recent and
the latest information technology policy– ICT Policy 2015 (2072 BS)
v Total laws in
ICT policies 2015 (2072 BS) – 21 Policies
v Strategies in
ICT policies 2015 (2072 BS) – 21 Strategies
v Percentage of
the population will have digital skills by the end of 2020? – 75%
v Percentage of
the population will be able to access the broadband services by 2020? – 90%
v Percentage of
the population of Nepal will have internet access by 2020? – 100%
v Percent of government services will be
provided online by 2020? – 80%
Objectives of IT Policy 2000
a)
To
establish knowledge based industry
b)
To
increase employment
c)
To
build knowledge based society
Vision of ICT Policy 2015
v To transform
Nepal into information and knowledge based society and economy.
Mission of ICT Policy 2015
v
To
create conditions for the intensified development and growth of ICT sector as a
key driver for Nepal’s sustainable development and poverty reduction
strategies.
Goals of Information and Communication Technology policy
a) At least 75 percent of the
population will have digital literacy skills by the end of 2020.
b) 80% of all citizen facing
government services would be offered on line by 2020
c) G2G implementation would be
promoted with a view to achieving complete automation of the operations of land administration,
revenue administration and management, vital
registration, passport and citizenship certificate services by 2020.
d) Broadband access will be
expanded across the country with the goal of achieving a broadband Internet user penetration rate of
30% at a minimum of 512kbps and making
available at least 10 Mbps download speed on demand in urban areas by
2018.
Electronic Transaction
v Transactions of electronic
records data by using any types of electronic means.
v Contains electric records and valid digital
medium.
v The exchange of all types of records which are
in the form of electronic.
ETA
(Electronic Transaction Act)
v ETA (Electronic Transaction Act) deals
with issues related to cybercrime and also help in making and implementing laws
over cybercrime.
v He /she can be jailed for minimum from 6
months to a maximum of 3 years and has to pay the penalty according to the
offense.
v Maintaining privacy in the cyberspace,
creating strong passwords, updating the security software, updating password
are some of the techniques to keep secure him /her.
v The computer and cyber crimes such as
hacking, piracy, copyright violation, fraudulent and all other deceitful
activities have been clearly defined and punishments are set accordingly. The
action against such crimes and punishment will be in the range of a minimum Rs
50,000 to a maximum Rs 3,00,000 in cash and six months to three years
imprisonment.
v The new legislation has not only
legalized all forms of electronic transactions and digital signatures but has
also clearly spelled out ways to regulate various computer-based activities and
punish cyber crimes.
When was Electronic transaction act 2063 authenticated
and published in Nepal?
December 8 2006 (22
Mangshir 2063)
Objectives of the Electronic Transaction Act 2063
a)
To
make legal provision for authentication and regulation of electronic data.
b)
To
make a reliable date generation, communication, and transmission.
c)
To
make a secured and authentic means of electronic communication.
d)
To
regulate all the relating matters of electronic transactions.
Scopes of the Electronic Transaction Act 2063
a) Creation and use of digital
signature
b) Control
cyber/computer-related crimes.
c) Protection of intellectual
property.
d) Protection of
confidentiality.
Social Media
Social Media is an online tool that
helps us to stay connected with the whole world.
Different platforms of
Social media
a)
Facebook
b)
Twitter
c)
Instagram
d)
LinkedIn
e)
Blogs
f)
Wikipedia
Opportunities of using social media
a) It creates awareness and innovate the way people live
b) Social media let us share anything with others around the
world.
c) It keeps us informed about the world.
d) It creates brand exposure for business to the largest
audience.
Threats of using social media
a) Personal data and privacy can be easily hacked and shared
on the internet.
b) More chances of creating fake accounts.
c) Negative impact on the health.
d) Decrease the working efficiency of people.
e) Spreading false or unreliable information.
Full Forms:
ICT - Information and
Communication Technology
SMS – Short Message Service
IT – Information Technology
G2G – Government to Government
ETA – Electronic Transaction Act
HoR – House of Representative
MMS - Multimedia Messaging
Service
A person who never made a mistake never tried anything
new." —Albert Einstein
No comments:
Post a Comment