(1.2)
Ethical and Social Issues in ICT
Computer ethics
Computer
ethics is a set of moral principles or code of conducts that regulate the use
of computers systematically without making harm to other users.
It gives awareness to the user
regarding the immoral behaviour and activities in the computing field.
Commandments of
computer ethics
v Do not use a
computer to harm other people.
v Do not use a
computer to publish fake information.
v Do not search the
file or record of other people.
v Do not destroy or
delete the records of other people.
v Do not use a
computer to steal someone's privacy.
v Do not interfere
with other people's computer work.
v Do not snoop
around in other people's files.
v Do not use or copy
software for which you have not paid.
v Do not use other
people's computer resources without authorization.
Digital citizenship
Digital citizenship
refers to the responsible and ethical use of technology and the internet which
involves understanding, practicing, and promoting appropriate behavior when
using digital tools and resources.
Elements of digital citizenship
lDigital Access:
The state of full electronic participation in society
l Digital Commerce:
The act of promoting the purchase of goods through electronic means
l Digital
Communication: Electronic exchange of information
l Digital literacy:
Teaching and learning about teaching and technology
l Digital Security:
Electronic precautions
lDigital Health:
The solution to health problems using digital technology
l Digital Law: Act,
rules and regulations required for performing electrical work
Any two tips to maintain digital reputation.
v Be transparent
v Respond to every review
Digital footprint
A digital footprint is the trail of data and information left behind by
an individual's online activities which includes social media posts, website
visits, online purchases, and other digital engagements.
Any two importance are:
v
It serves as a
reflection of our identity, both personally and professionally.
v
Our digital footprint
promotes responsible online behavior: protect our information, respect privacy,
and think critically about online content.
The
following should be considered when managing Digital Footprint:
l Subscribed
accounts and unused social media accounts which are no longer in use should be
unsubscribed or deleted.
l Ensure the
content posted protect your privacy.
l Not to forget
that online posts are private.
l To note that
parents, teachers and other people can view the content posted.
l Ensure the
content posted does not damage yours or others reputation.
Cyber bullying
Cyberbullying refers to harassment
or bullying that takes place through electronic devices and digital platforms,
such as the internet, social media, or messaging apps..
Examples of cyber bullying:
·
Sending rude emails, texts or instant messages online or
on the phone
·
Posting hurtful things about someone on social media
·
Taking an embarrassing photo or video and sharing it
without permission
·
Pretending to be another person by creating a fake online
profile.
·
Spreading
rumors or gossip about someone online
·
Offensive
chat on online gaming.
Cyber law
The
law which governs the legal issues in the cyber space regarding the internet or
WWW for digital data processing and transaction is called cyber law. The
importance of cyber law is that it controls cyber-crime and misuse of computer.
Examples
of cyber law
v Electronic and Digital Signature Law
v Cyber Crime Law
v Intellectual property Law
v Data Protection and Privacy Law etc.
Aims / Objectives of formulating cyber law in Nepal
/ Why is cyber law needed?
- To legalize the transaction
through electronic media to control various types of electronic frauds
- To punish a person who does
criminal activities through electronic means especially on computers.
Cyber
law was introduced in Nepal in 30th Bhadra, 2061 [15 September,
2004]
Cyberspace
Cyberspace
is the virtual environment created by the Internet and devices and services
related to the Internet.
Cyber crime
Cyber
crime refers to criminal activities that are carried out using computers,
networks and the internet.
E.g. Software
piracy, hacking, cracking, pornography etc.
Computer
hacking means stealing and destroying other data, information, files and
program.
Digital signature
· Digital signature
is a security mechanism system used on the internet for data and information
transaction by attaching a code at the end of the electronic message that
confirms the authenticity of sent message.
·
The
importance of digital signature is that it provides legal framework to
facilitate and safeguard electronic transaction in the electronic media.
ICT (Information and Communication
Technology)
A technology which collects stores and processes
data into information and communication through computer system is known as
ICT.
Challenges of ICT
· Internet criminals
enter into the system by creating fake identities and use the system for their
benefits which is difficult to recognize and control.
· Hacking or
unauthorized access of system is increasing.
· Sharing
unnecessary information of individual or group of people is the danger of ICT
in this era.
· The Digital Divide is a social issue
referring to the differing (conflicting) amount of information between those
who have access to the Internet (especially broadband access) and those who do
not have access.
IT
Policy 2072
· IT Policy launch in Nepal – 2000 AD (2057 BS)
· Most recent and
the latest information technology policy– ICT Policy 2015 (2072 BS)
· Total laws in ICT
policies 2015 (2072 BS) – 21 Policies
· Strategies in ICT policies
2015 (2072 BS) – 21 Strategies
· Percentage of the
population will have digital skills by the end of 2020? – 75%
· Percentage of the
population will be able to access the broadband services by 2020? – 90%
· Percentage of the
population of Nepal will have internet access by 2020? – 100%
· Percent of
government services will be provided online by 2020? – 80%
Objectives of IT Policy 2000
a)
To
establish knowledge based industry
b)
To
increase employment
c)
To
build knowledge based society
Vision of ICT Policy 2015
v To transform Nepal
into information and knowledge based society and economy.
Mission of ICT Policy 2015
· To create
conditions for the intensified development and growth of ICT sector as a key
driver for Nepal’s sustainable development and poverty reduction strategies.
Goals
of ICT policy
· At least 75 percent of the population will have digital
literacy skills by the end of 2020.
· 80% of all citizen facing government services would be
offered on line by 2020
· By 2020, entire
population of Nepal to have access to Internet.
· By 2020, 90
percent of the population to have access to broadband service
Any Two major uses of IT policy
IT
policies offer clear guidelines for employees on how to use technology in the
organization, ensuring they understand what's expected of them.
It
sets rules to protect digital assets and data from cyber threats, breaches, and
unauthorized access.
ETA (Electronic Transaction Act)
v ETA (Electronic Transaction Act)
deals with issues related to cybercrime and also help in making and
implementing laws over cybercrime.
v Maintaining privacy in the
cyberspace, creating strong passwords, updating the security software, updating
password are some of the techniques to keep secure him /her.
v The action against such crimes and
punishment will be in the range of a minimum Rs 50,000 to a maximum Rs 3,00,000
in cash and six months to three years imprisonment.
When was
Electronic transaction act 2063 authenticated and published in Nepal?
December 8 2006 (22
Mangshir 2063)
Objectives of the Electronic
Transaction Act 2063
a)
To
make legal provision for authentication and regulation of electronic data.
b)
To
make a reliable data generation, communication, and transmission.
c)
To
make a secured and authentic means of electronic communication.
d)
To
regulate all the relating matters of electronic transactions.
Scopes of the
Electronic Transaction Act 2063
a)
Creation
and use of digital signature
b)
Control
cyber/computer-related crimes.
c)
Protection
of intellectual property.
d)
Protection
of confidentiality.
Social Media
Social Media is an
online tool that helps us to stay connected with the whole world
Different
platforms of Social media
Facebook Twitter Instagram LinkedIn Blogs
Wikipedia
Opportunities of using social media
a)
It
creates awareness and innovate the way people live
b)
Social
media let us share anything with others around the world.
c)
It
keeps us informed about the world.
d)
It
creates brand exposure for business to the largest audience.
Threats of using social media
a)
Personal
data and privacy can be easily hacked and shared on the internet.
b)
More
chances of creating fake accounts.
c)
Negative
impact on the health.
d)
Decrease
the working efficiency of people.
e)
Spreading
false or unreliable information.
List four ways to stay safe on social networks.
v Pick strong passwords and
update them frequently.
v Report harassment or
inappropriate content.
v Pause before you post.
v Look before you click.
No comments:
Post a Comment