1.2 Ethical and Social
Issues in ICT
Computer ethics
Computer ethics is a set of moral principles or code of
conducts that regulate the use of computers systematically without making harm
to other users.
It
gives awareness to the user regarding the immoral behaviour and activities in
the computing field.
Commandments of computer ethics
v
Do
not use a computer to harm other people.
v Do not use a
computer to publish fake information.
v Do not search the
file or record of other people.
v Do not destroy or
delete the records of other people.
v Do not use a
computer to steal someone's privacy.
v
Do
not interfere with other people's computer work.
Why is ethics important in information technology?
Ethics
is important in information technology because ethics make us become more
discipline because we need to follow the rules and procedures of the
organization.
It gives awareness to the user regarding the immoral behaviour and activities
in the computing field
What is the importance of ICT in this digital society?
Explain.
ICT
is really important in our digital world. It helps us talk to people anywhere,
find information easily, and get more work done. It lets us learn and work from
home, use online services, and create new ideas. ICT makes our everyday life
better and helps our economy grow.
Digital citizenship
Digital citizenship refers to the
responsible and ethical use of technology and the internet which involves
understanding, practicing, and promoting appropriate behavior when using
digital tools and resources.
Any
two tips to maintain digital reputation.
v
Think carefully before sharing
online, as it can be difficult to remove or change once it's posted.
v
Use privacy settings to choose who
can see your posts and keep your personal info, like your phone number and
address, private.
Elements of digital citizenship
v
Digital Access: The state of full electronic
participation in society.
v
Digital
Commerce: The act of promoting the purchase of goods through electronic means.
v Digital
Communication: Electronic exchange of information.
v Digital literacy:
Teaching and learning about teaching and technology.
v Digital Security:
Electronic precautions.
v Digital Health:
The solution to health problems using digital technology.
v
Digital
Law: Act, rules and regulations required for performing electrical work
Digital footprint
A
digital footprint is the trail of data and information left behind by an
individual's online activities which includes social media posts, website
visits, online purchases, and other digital engagements.
Any two importance are:
v Reputation: What we
share online affects how people see us. Good posts make a positive impression,
while bad ones can hurt how others view us.
v Future Jobs: When we
apply for jobs later, employers might look at your online profiles. A clean,
positive digital footprint can help you get hired.
Any two points to reduce
the size of digital footprint while using internet are:
- avoid sharing
personal information publicly
- regularly delete
unused accounts.
The following should be considered when
managing Digital Footprint:
·
Subscribed
accounts and unused social media accounts which are no longer in use should be
unsubscribed or deleted.
· Ensure the content
posted protect your privacy.
· To note that
parents, teachers and other people can view the content posted.
·
Ensure
the content posted does not damage yours or others reputation.
Cyber bullying
Cyberbullying
refers to harassment or bullying that takes place through electronic devices
and digital platforms, such as the internet, social media, or messaging apps.
Examples of cyber bullying:
Sending rude emails, texts or instant messages online or
on the phone
Posting hurtful things about someone on social media
Taking an embarrassing photo or video and sharing it
without permission
Pretending to be another person by creating a fake online
profile.
Cyber law
The
law which governs the legal issues in the cyber space regarding the internet or
WWW for digital data processing and transaction is called cyber law.
The importance of
cyber law is that it controls cyber-crime and misuse of computer.
Examples of cyber law
v Electronic and Digital Signature Law, Cyber Crime Law
v Intellectual property Law, Data Protection and Privacy Law
etc.
Aims
/ Objectives of formulating cyber law in Nepal / Why is cyber law
needed?
v To legalize the transaction through electronic media
to control various types of electronic frauds
v To punish a person who does criminal activities
through electronic means especially on computers.
What is the cyber law of Nepal called?
The cyber law of Nepal is called The Electronic
Transaction and Digital Signature Act-Ordinance.
Cyber law was introduced in Nepal in 30th
Bhadra, 2061 [15 September, 2004]
Cyberspace
Cyberspace is the virtual environment created by the
Internet and devices and services related to the Internet.
Cyber crime
Cybercrime
refers to illegal activities carried out using computers, networks, or the
internet, such as hacking, identity theft, online fraud, and spreading
malicious software.
ICT (Information and Communication
Technology)
ICT (Information and Communication Technology) refers
to the use of computers, the internet, and other digital tools to manage,
communicate, and share information.
Challenges of ICT
Security Risks: Protecting data and systems from
cyberattacks, hacking, and malware.
Privacy Concerns: Ensuring personal information is
kept confidential and not misused.
Digital Divide: Addressing the gap between those who
have access to technology and those who do not.
Technical Issues: Dealing with system failures,
software bugs, and hardware malfunctions.
IT
Policy 2072
v
IT Policy launch in Nepal – 2000 AD
(2057 BS)
v Most recent and
the latest information technology policy– ICT Policy 2015 (2072 BS)
v
Total
laws & Strategies in ICT policies 2015 (2072 BS) – 21 Policies and 21
Strategies
Objectives of IT Policy 2000
v
To
establish knowledge based industry
v To increase
employment
v
To
build knowledge based society
Vision of ICT Policy 2015
To
transform Nepal into information and knowledge-based society and economy.
Mission of ICT Policy 2015
To
create conditions for the intensified development and growth of ICT sector as a
key driver for Nepal’s sustainable development and poverty reduction
strategies.
Goals
of ICT policy
·
At least 75 percent of the
population will have digital literacy skills by the end of 2020.
·
80% of all citizen facing government
services would be offered on line by 2020
·
By
2020, entire population of Nepal to have access to Internet.
·
By
2020, 90 percent of the population to have access to broadband service
Any Two major uses of IT policy
· IT policies offer clear guidelines for employees on how to use
technology in the organization, ensuring they understand what's expected of
them.
· It sets rules to protect digital assets and data from cyber
threats, breaches, and unauthorized access.
ETA (Electronic Transaction Act)
ETA (Electronic
Transaction Act) is a law that deals with issues related to cybercrime and also
help in making and implementing laws over cybercrime.
Maintaining privacy in
the cyberspace, creating strong passwords, updating the security software,
updating password are some of the techniques to keep secure.
The action against such
crimes and punishment will be in the range of a minimum Rs 50,000 to a maximum
Rs 3,00,000 in cash and six months to three years imprisonment.
Objectives of the
Electronic Transaction Act 2063
a)
To
make legal provision for authentication and regulation of electronic data.
b)
To
make a reliable data generation, communication, and transmission.
c)
To
make a secured and authentic means of electronic communication.
d)
To
regulate all the relating matters of electronic transactions.
When was
Electronic transaction act 2063 authenticated and published in Nepal?
December 8 2006
(22 Mangshir 2063)
Scopes of the Electronic Transaction Act
2063
a)
Creation
and use of digital signature
b)
Control
cyber/computer-related crimes.
c)
Protection
of intellectual property.
d)
Protection
of confidentiality.
Social
Media
Social media refers to online
platforms and applications, such as Facebook, Twitter, Instagram, TikTok, and
LinkedIn, that allow users to create, share, and interact with content while
connecting with others.
Write any one reason why social media is popular nowadays.
It's popular now a days because it enables instant
communication, allowing people to connect and share information globally in
real-time.
Social media enables users to:
Share
Content: Post updates, photos, videos, and other types of media.
Connect
with Others: Follow, friend, or message other users and join online
communities.
Engage:
Like, comment on, and share others' posts, as well as participate in
discussions.
Create
Profiles: Build personal or professional profiles to represent themselves or
their businesses.
Opportunities of using social media
·
Networking:
Connect globally, build relationships, and join communities.
·
Marketing
and Branding: Promote businesses and engage with customers.
·
Information
Sharing: Quickly access and share news and educational content.
·
Customer
Engagement: Interact with customers and provide real-time support.
Threats of using social media
·
Privacy
Risks: Personal information can be exposed or misused.
· Cyberbullying:
Harassment or bullying through online interactions.
· Identity Theft:
Risk of personal information being stolen for fraudulent use.
·
Misinformation:
Spread of false or misleading information.
List
four ways to stay safe on social networks.
·
Use Privacy Settings: Control who sees your posts and info.
·
Keep Info Private: Don’t share sensitive details like address
or phone number.
·
Be Cautious with Requests: Only accept connections from
people you know.
·
Use Strong Passwords: Create and update unique, strong
passwords.
No comments:
Post a Comment