Friday, August 9, 2024

(1.2) Ethical and Social Issues in ICT

 

(1.2) Ethical and Social Issues in ICT

 

Computer ethics

Computer ethics is a set of moral principles or code of conducts that regulate the use of computers systematically without making harm to other users.

It gives awareness to the user regarding the immoral behaviour and activities in the computing field.

 

Commandments of computer ethics

v Do not use a computer to harm other people.

v Do not use a computer to publish fake information.

v Do not search the file or record of other people.

v Do not destroy or delete the records of other people.

v Do not use a computer to steal someone's privacy.

v Do not interfere with other people's computer work.

v Do not snoop around in other people's files.

v Do not use or copy software for which you have not paid.

v Do not use other people's computer resources without authorization.

 

Digital citizenship

Digital citizenship refers to the responsible and ethical use of technology and the internet which involves understanding, practicing, and promoting appropriate behavior when using digital tools and resources.

 

Elements of digital citizenship

lDigital Access: The state of full electronic participation in society

l Digital Commerce: The act of promoting the purchase of goods through electronic means

l Digital Communication: Electronic exchange of information

l Digital literacy: Teaching and learning about teaching and technology

l Digital Security: Electronic precautions

lDigital Health: The solution to health problems using digital technology

l Digital Law: Act, rules and regulations required for performing electrical work

 

Any two tips to maintain digital reputation.

v Be transparent           

v Respond to every review

 

Digital footprint

A digital footprint is the trail of data and information left behind by an individual's online activities which includes social media posts, website visits, online purchases, and other digital engagements.

 

Any two importance are:

v It serves as a reflection of our identity, both personally and professionally.

v Our digital footprint promotes responsible online behavior: protect our information, respect privacy, and think critically about online content.

 

The following should be considered when managing Digital Footprint:

l Subscribed accounts and unused social media accounts which are no longer in use should be unsubscribed or deleted.

l Ensure the content posted protect your privacy.

l Not to forget that online posts are private.

l To note that parents, teachers and other people can view the content posted.

l Ensure the content posted does not damage yours or others reputation.

Cyber bullying

Cyberbullying refers to harassment or bullying that takes place through electronic devices and digital platforms, such as the internet, social media, or messaging apps..

 

Examples of cyber bullying:

·       Sending rude emails, texts or instant messages online or on the phone

·       Posting hurtful things about someone on social media

·       Taking an embarrassing photo or video and sharing it without permission

·       Pretending to be another person by creating a fake online profile.

·       Spreading rumors or gossip about someone online

·       Offensive chat on online gaming.

 

Cyber law
The law which governs the legal issues in the cyber space regarding the internet or WWW for digital data processing and transaction is called cyber law. The importance of cyber law is that it controls cyber-crime and misuse of computer.

 

Examples of cyber law

v Electronic and Digital Signature Law

v Cyber Crime Law

v Intellectual property Law

v Data Protection and Privacy Law etc.

 

Aims  / Objectives of formulating cyber law in Nepal / Why is cyber law needed?

- To legalize the transaction through electronic media to control various types of electronic frauds

- To punish a person who does criminal activities through electronic means especially on computers.

 

Cyber law was introduced in Nepal in 30th Bhadra, 2061 [15 September, 2004]

 

Cyberspace

Cyberspace is the virtual environment created by the Internet and devices and services related to the Internet.

 

Cyber crime
Cyber crime refers to criminal activities that are carried out using computers, networks and the internet.

E.g. Software piracy, hacking, cracking, pornography etc.
Computer hacking means stealing and destroying other data, information, files and program.

 

Digital signature

·       Digital signature is a security mechanism system used on the internet for data and information transaction by attaching a code at the end of the electronic message that confirms the authenticity of sent message.

·       The importance of digital signature is that it provides legal framework to facilitate and safeguard electronic transaction in the electronic media.

 

ICT (Information and Communication Technology)

A technology which collects stores and processes data into information and communication through computer system is known as ICT.

 

 

 

 

Challenges of ICT

·       Internet criminals enter into the system by creating fake identities and use the system for their benefits which is difficult to recognize and control.

·       Hacking or unauthorized access of system is increasing.

·       Sharing unnecessary information of individual or group of people is the danger of ICT in this era.

·       The Digital Divide is a social issue referring to the differing (conflicting) amount of information between those who have access to the Internet (especially broadband access) and those who do not have access. 

 

IT Policy 2072

·       IT Policy launch in Nepal – 2000 AD (2057 BS)

·       Most recent and the latest information technology policy– ICT Policy 2015 (2072 BS)

·       Total laws in ICT policies 2015 (2072 BS) – 21 Policies

·       Strategies in ICT policies 2015 (2072 BS) – 21 Strategies

·       Percentage of the population will have digital skills by the end of 2020? – 75%

·       Percentage of the population will be able to access the broadband services by 2020? – 90%

·       Percentage of the population of Nepal will have internet access by 2020? – 100%

·       Percent of government services will be provided online by 2020? – 80%

 

Objectives of IT Policy 2000

a)     To establish knowledge based industry

b)     To increase employment

c)     To build knowledge based society

 

Vision of ICT Policy 2015

v To transform Nepal into information and knowledge based society and economy.

 

Mission of ICT Policy 2015

·       To create conditions for the intensified development and growth of ICT sector as a key driver for Nepal’s sustainable development and poverty reduction strategies.

 

Goals of ICT policy

·       At least 75 percent of the population will have digital literacy skills by the end of 2020. 

·       80% of all citizen facing government services would be offered on line by 2020

·       By 2020, entire population of Nepal to have access to Internet.

·       By 2020, 90 percent of the population to have access to broadband service

 

Any Two major uses of IT policy

IT policies offer clear guidelines for employees on how to use technology in the organization, ensuring they understand what's expected of them.

It sets rules to protect digital assets and data from cyber threats, breaches, and unauthorized access.

 

ETA (Electronic Transaction Act)

v ETA (Electronic Transaction Act) deals with issues related to cybercrime and also help in making and implementing laws over cybercrime.

v Maintaining privacy in the cyberspace, creating strong passwords, updating the security software, updating password are some of the techniques to keep secure him /her.

v The action against such crimes and punishment will be in the range of a minimum Rs 50,000 to a maximum Rs 3,00,000 in cash and six months to three years imprisonment.

 

 

When was Electronic transaction act 2063 authenticated and published in Nepal?

December 8 2006 (22 Mangshir 2063)

 

Objectives of the Electronic Transaction Act 2063

a)     To make legal provision for authentication and regulation of electronic data.

b)     To make a reliable data generation, communication, and transmission.

c)     To make a secured and authentic means of electronic communication.

d)      To regulate all the relating matters of electronic transactions.

 

Scopes of the Electronic Transaction Act 2063

a)     Creation and use of digital signature

b)     Control cyber/computer-related crimes.

c)     Protection of intellectual property.

d)     Protection of confidentiality.

 

Social Media

Social Media is an online tool that helps us to stay connected with the whole world

 

Different platforms of Social media

Facebook        Twitter            Instagram        LinkedIn         Blogs                           Wikipedia

 

Opportunities of using social media

a)     It creates awareness and innovate the way people live

b)     Social media let us share anything with others around the world.

c)     It keeps us informed about the world.

d)     It creates brand exposure for business to the largest audience.

 

Threats of using social media

a)     Personal data and privacy can be easily hacked and shared on the internet.

b)     More chances of creating fake accounts.

c)     Negative impact on the health.

d)     Decrease the working efficiency of people.

e)     Spreading false or unreliable information.

 

List four ways to stay safe on social networks.

v Pick strong passwords and update them frequently. 

v Report harassment or inappropriate content.

v Pause before you post.

v Look before you click. 


 

No comments:

Post a Comment