1.2 Ethical and Social Issues in ICT
Computer ethics
Computer
ethics is a set of moral principles or code of conducts that regulate the use
of computers systematically without making harm to other users.
It gives awareness to the user
regarding the immoral behaviour and activities in the computing field.
Commandments
of computer ethics
·
Do not use a computer to publish fake information.
·
Do not search the file or record of other people.
· Do not destroy or delete the records of other people.
· Do not use a
computer to steal someone's privacy.
· Do not snoop
around in other people's files.
· Do not use other people's
computer resources without authorization.
Digital
citizenship
Digital citizenship refers
to the responsible and ethical use of technology and the internet which
involves understanding, practicing, and promoting appropriate behavior when
using digital tools and resources.
Elements of digital citizenship
lDigital Access:
The state of full electronic participation in society
l Digital Commerce:
The act of promoting the purchase of goods through electronic means
l Digital
Communication: Electronic exchange of information
l Digital literacy:
Teaching and learning about teaching and technology
l Digital Security:
Electronic precautions
lDigital Health:
The solution to health problems using digital technology
l Digital Law: Act,
rules and regulations required for performing electrical work
Digital
footprint
A digital footprint is the trail of data and information left behind by
an individual's online activities which includes social media posts, website
visits, online purchases, and other digital engagements.
The following should be considered when managing Digital Footprint:
l Subscribed accounts and unused social media accounts
which are no longer in use should be unsubscribed or deleted.
l Ensure the
content posted protect your privacy.
l Not to forget
that online posts are private.
l To note that
parents, teachers and other people can view the content posted.
l Ensure the
content posted does not damage yours or others reputation.
Cyber bullying
Cyberbullying refers to harassment
or bullying that takes place through electronic
devices and digital platforms, such as the internet, social media, or messaging
apps..
Examples of cyber bullying:
·
Sending rude emails, texts or instant messages online or
on the phone
·
Posting hurtful things about someone on social media
· Taking an embarrassing photo or video and sharing it without permission
· Pretending to be another person by creating a fake online profile.
· Spreading rumours
or gossip about someone online
· Offensive chat on
online gaming.
Cyber law
The
law which governs the legal issues in the cyber space regarding the internet or
WWW for digital data processing and transaction is called cyber law. The
importance of cyber law is that it controls cyber-crime and misuse of computer.
Aims of formulating cyber law in
Nepal
- To legalize the transaction through electronic media
to control various types of electronic frauds
- To punish a person who does criminal activities
through electronic means especially on computers.
Cyber law was introduced in Nepal in 30th Bhadra, 2061 [15
September, 2004]
Cyberspace
Cyberspace
is the virtual environment created by the Internet and devices and services
related to the Internet.
Cyber crime
Cyber
crime refers to criminal activities that are carried out using computers,
networks and the internet.
E.g. Software
piracy, hacking, cracking, pornography etc.
Computer
hacking means stealing and destroying other data, information, files and
program.
Digital signature
· Digital signature
is a security mechanism system used on the internet for data and information
transaction by attaching a code at the end of the electronic message that
confirms the authenticity of sent message.
·
The
importance of digital signature is that it provides legal framework to
facilitate and safeguard electronic transaction in the electronic media.
ICT (Information and
Communication Technology)
A technology which
collects stores and processes data into information and communication through
computer system is known as ICT.
Challenges of ICT
·
Internet criminals enter into the system by
creating fake identities and use the system for their benefits which is
difficult to recognize and control.
·
Hacking or unauthorized access of system is
increasing.
·
Sharing unnecessary information of individual
or group of people is the danger of ICT in this era.
·
The Digital Divide is a
social issue referring to the differing (conflicting) amount of information
between those who have access to the Internet (especially broadband access) and
those who do not have access.
IT Policy 2072
·
IT
Policy launch in Nepal – 2000 AD (2057 BS)
·
Most
recent and the latest information technology policy– ICT Policy 2015 (2072 BS)
·
Total
laws in ICT policies 2015 (2072 BS) – 21 Policies
·
Strategies
in ICT policies 2015 (2072 BS) – 21 Strategies
·
Percentage
of the population will have digital skills by the end of 2020? – 75%
·
Percentage
of the population will be able to access the broadband services by 2020? – 90%
·
Percentage
of the population of Nepal will have internet access by 2020? – 100%
·
Percent
of government services will be provided online by 2020? – 80%
Objectives of IT Policy 2000
a)
To
establish knowledge based industry
b)
To
increase employment
c)
To
build knowledge based society
Vision of ICT Policy 2015
v To transform Nepal
into information and knowledge based society and economy.
Mission of ICT Policy 2015
· To create
conditions for the intensified development and growth of ICT sector as a key
driver for Nepal’s sustainable development and poverty reduction strategies.
Goals of ICT policy
·
At
least 75 percent of the population will have digital literacy skills by the end
of 2020.
·
80%
of all citizen facing government services would be offered on line by 2020
· By 2020, entire
population of Nepal to have access to Internet.
· By 2020, 90
percent of the population to have access to broadband service
ETA (Electronic Transaction Act)
v ETA (Electronic Transaction Act) deals
with issues related to cybercrime and also help in making and implementing laws
over cybercrime.
v Maintaining privacy in the cyberspace,
creating strong passwords, updating the security software, updating password
are some of the techniques to keep secure him /her.
v The action against such crimes and
punishment will be in the range of a minimum Rs 50,000 to a maximum Rs 3,00,000
in cash and six months to three years imprisonment.
When was Electronic
transaction act 2063 authenticated and published in Nepal?
December 8 2006 (22
Mangshir 2063)
Objectives of the
Electronic Transaction Act 2063
a) To make legal provision for
authentication and regulation of electronic data.
b) To make a reliable data
generation, communication, and transmission.
c) To make a secured and
authentic means of electronic communication.
d) To regulate all the
relating matters of electronic transactions.
Scopes of the Electronic
Transaction Act 2063
a) Creation and use of digital
signature
b) Control
cyber/computer-related crimes.
c) Protection of intellectual
property.
d) Protection of
confidentiality.
Social Media
Social Media is an online tool that helps us to stay
connected with the whole world
Different platforms of
Social media
Facebook Twitter Instagram LinkedIn Blogs
Wikipedia
Opportunities of using social
media
a) It creates awareness and innovate the way people live
b) Social media let us share anything with others around the
world.
c) It keeps us informed about the world.
d) It creates brand exposure for business to the largest
audience.
Threats of using social media
a) Personal data and privacy can be easily hacked and shared
on the internet.
b) More chances of creating fake accounts.
c) Negative impact on the health.
d) Decrease the working efficiency of people.
e)
Spreading false or unreliable information.
No comments:
Post a Comment