Saturday, February 1, 2025

1.2 Ethical and Social Issues in ICT - SEE COMPUTER SCIENCE 2081

 


1.2 Ethical and Social Issues in ICT

 

Computer ethics

Computer ethics is a set of moral principles or code of conducts that regulate the use of computers systematically without making harm to other users.

It gives awareness to the user regarding the immoral behaviour and activities in the computing field.

 

Commandments of computer ethics

v Do not use a computer to harm other people.

v Do not use a computer to publish fake information.

v Do not search the file or record of other people.

v Do not destroy or delete the records of other people.

v Do not use a computer to steal someone's privacy.

v Do not interfere with other people's computer work.

 

Why is ethics important in information technology?

Ethics is important in information technology because ethics make us become more discipline because we need to follow the rules and procedures of the organization. It gives awareness to the user regarding the immoral behaviour and activities in the computing field

 

What is the importance of ICT in this digital society? Explain.

ICT is really important in our digital world. It helps us talk to people anywhere, find information easily, and get more work done. It lets us learn and work from home, use online services, and create new ideas. ICT makes our everyday life better and helps our economy grow.

 

Digital citizenship

Digital citizenship refers to the responsible and ethical use of technology and the internet which involves understanding, practicing, and promoting appropriate behavior when using digital tools and resources.

 

Any two tips to maintain digital reputation.

v Think carefully before sharing online, as it can be difficult to remove or change once it's posted.

v Use privacy settings to choose who can see your posts and keep your personal info, like your phone number and address, private.

 

Elements of digital citizenship

v Digital Access: The state of full electronic participation in society.

v Digital Commerce: The act of promoting the purchase of goods through electronic means.

v Digital Communication: Electronic exchange of information.

v Digital literacy: Teaching and learning about teaching and technology.

v Digital Security: Electronic precautions.

v Digital Health: The solution to health problems using digital technology.

v Digital Law: Act, rules and regulations required for performing electrical work

 

Digital footprint

A digital footprint is the trail of data and information left behind by an individual's online activities which includes social media posts, website visits, online purchases, and other digital engagements.

 

Any two importance are:

v Reputation: What we share online affects how people see us. Good posts make a positive impression, while bad ones can hurt how others view us.

v Future Jobs: When we apply for jobs later, employers might look at your online profiles. A clean, positive digital footprint can help you get hired.

 

Any two points to reduce the size of digital footprint while using internet are:

- avoid sharing personal information publicly

- regularly delete unused accounts.

 

The following should be considered when managing Digital Footprint:

·      Subscribed accounts and unused social media accounts which are no longer in use should be unsubscribed or deleted.

·      Ensure the content posted protect your privacy.

·      To note that parents, teachers and other people can view the content posted.

·      Ensure the content posted does not damage yours or others reputation.

 

Cyber bullying

Cyberbullying refers to harassment or bullying that takes place through electronic devices and digital platforms, such as the internet, social media, or messaging apps.

 

 

Examples of cyber bullying:

Sending rude emails, texts or instant messages online or on the phone

Posting hurtful things about someone on social media

Taking an embarrassing photo or video and sharing it without permission

Pretending to be another person by creating a fake online profile.

 

Cyber law
The law which governs the legal issues in the cyber space regarding the internet or WWW for digital data processing and transaction is called cyber law.

 

The importance of cyber law is that it controls cyber-crime and misuse of computer.

 

Examples of cyber law

v Electronic and Digital Signature Law, Cyber Crime Law

v Intellectual property Law, Data Protection and Privacy Law etc.

 

Aims  / Objectives of formulating cyber law in Nepal / Why is cyber law needed?

v To legalize the transaction through electronic media to control various types of electronic frauds

v To punish a person who does criminal activities through electronic means especially on computers.

 

What is the cyber law of Nepal called?

The cyber law of Nepal is called The Electronic Transaction and Digital Signature Act-Ordinance.

 

Cyber law was introduced in Nepal in 30th Bhadra, 2061 [15 September, 2004]

 

Cyberspace

Cyberspace is the virtual environment created by the Internet and devices and services related to the Internet.

 

Cyber crime
Cybercrime refers to illegal activities carried out using computers, networks, or the internet, such as hacking, identity theft, online fraud, and spreading malicious software.

ICT (Information and Communication Technology)

ICT (Information and Communication Technology) refers to the use of computers, the internet, and other digital tools to manage, communicate, and share information.

 

Challenges of ICT

Security Risks: Protecting data and systems from cyberattacks, hacking, and malware.

Privacy Concerns: Ensuring personal information is kept confidential and not misused.

Digital Divide: Addressing the gap between those who have access to technology and those who do not.

Technical Issues: Dealing with system failures, software bugs, and hardware malfunctions.

 

IT Policy 2072

v IT Policy launch in Nepal – 2000 AD (2057 BS)

v Most recent and the latest information technology policy– ICT Policy 2015 (2072 BS)

v Total laws & Strategies in ICT policies 2015 (2072 BS) – 21 Policies and 21 Strategies

 

Objectives of IT Policy 2000

v To establish knowledge based industry

v To increase employment

v To build knowledge based society

 

Vision of ICT Policy 2015

To transform Nepal into information and knowledge-based society and economy.

 

Mission of ICT Policy 2015

To create conditions for the intensified development and growth of ICT sector as a key driver for Nepal’s sustainable development and poverty reduction strategies.

 

 

 

 

Goals of ICT policy

·      At least 75 percent of the population will have digital literacy skills by the end of 2020. 

·      80% of all citizen facing government services would be offered on line by 2020

·      By 2020, entire population of Nepal to have access to Internet.

·      By 2020, 90 percent of the population to have access to broadband service

 

Any Two major uses of IT policy

·      IT policies offer clear guidelines for employees on how to use technology in the organization, ensuring they understand what's expected of them.

·      It sets rules to protect digital assets and data from cyber threats, breaches, and unauthorized access.

 

ETA (Electronic Transaction Act)

ETA (Electronic Transaction Act) is a law that deals with issues related to cybercrime and also help in making and implementing laws over cybercrime.

Maintaining privacy in the cyberspace, creating strong passwords, updating the security software, updating password are some of the techniques to keep secure.

The action against such crimes and punishment will be in the range of a minimum Rs 50,000 to a maximum Rs 3,00,000 in cash and six months to three years imprisonment.

 

Objectives of the Electronic Transaction Act 2063

a)   To make legal provision for authentication and regulation of electronic data.

b)   To make a reliable data generation, communication, and transmission.

c)   To make a secured and authentic means of electronic communication.

d)    To regulate all the relating matters of electronic transactions.

 

When was Electronic transaction act 2063 authenticated and published in Nepal?

December 8 2006 (22 Mangshir 2063)

 

Scopes of the Electronic Transaction Act 2063

a)   Creation and use of digital signature

b)   Control cyber/computer-related crimes.

c)   Protection of intellectual property.

d)   Protection of confidentiality.

 

Social Media

Social media refers to online platforms and applications, such as Facebook, Twitter, Instagram, TikTok, and LinkedIn, that allow users to create, share, and interact with content while connecting with others.

 

Write any one reason why social media is popular nowadays.

It's popular now a days because it enables instant communication, allowing people to connect and share information globally in real-time.

 

Social media enables users to:

Share Content: Post updates, photos, videos, and other types of media.

Connect with Others: Follow, friend, or message other users and join online communities.

Engage: Like, comment on, and share others' posts, as well as participate in discussions.

Create Profiles: Build personal or professional profiles to represent themselves or their businesses.

 

Opportunities of using social media

·      Networking: Connect globally, build relationships, and join communities.

·      Marketing and Branding: Promote businesses and engage with customers.

·      Information Sharing: Quickly access and share news and educational content.

·      Customer Engagement: Interact with customers and provide real-time support.

 

Threats of using social media

·      Privacy Risks: Personal information can be exposed or misused.

·      Cyberbullying: Harassment or bullying through online interactions.

·      Identity Theft: Risk of personal information being stolen for fraudulent use.

·      Misinformation: Spread of false or misleading information.

 

List four ways to stay safe on social networks.

·      Use Privacy Settings: Control who sees your posts and info.

·      Keep Info Private: Don’t share sensitive details like address or phone number.

·      Be Cautious with Requests: Only accept connections from people you know.

·      Use Strong Passwords: Create and update unique, strong passwords.

 

 

 

No comments:

Post a Comment