3.-Ethical-and-Social-Issues-In-ICT.pptx

PurnaBahadurRana1 156 views 26 slides Jun 04, 2024
Slide 1
Slide 1 of 26
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26

About This Presentation

Course of Computer science class 10


Slide Content

Ethical and Social Issues in ICT Chapter 2

Introduction Ethics generally refers to the principles to make the decisions to lead our society or an individual for a better life. As ICT has totally dominated our lives, it has influenced our personal, social and moral values as well. As day by day more and more people are getting connected with the present digital world through the Internet which does not have a strong body to govern the rules and regulations to safeguard or guarantee the proper and improper usage of the technology. This has created a lot of issues which has encouraged our digital society to focus on the ethics relating to ICT.

Computer Ethics Computer ethics is a set of moral principles or code of conducts that regulate the use of computers systematically without making harm to other users . It gives awareness to the user regarding the immoral behavior and activities in the computing field. Some important commandments of computer ethics are: Do not use a computer to harm other people. Do not use a computer to publish fake information Do not destroy or delete the records of other people. Do not use a computer to steal someone's privacy. Do not snoop around in other people's files. Do not use or copy software for which you have not paid.

Cyber Ethics Cyber ethics is a code of behavior for using the Internet. Ethics is a broad philosophical concept that goes beyond simple right and wrong, and looks towards "the good life". The objective of cyber ethics is “ESTABLISHING A CULTURE OF PROPER USE of the Internet and Computers .”

Cyber Ethics Cyber ethics mainly deals with the following domains: 1. Privacy 2. Property 3. Security 4. Accuracy 5. Accessibility 6. Censorship and Filtering

Digital Citizenship A digital citizen is a person who is skilled in using the Internet in order to communicate with others, buy and sell things, and take part in politics, and who understands how to do this in a safe and responsible way. Digital Citizenship refers to the use of technology as a measure of behavior responsible for a digital society. Its importance is working in cyberspace and learning how to safely and legally compute.

Digital Citizenship Following are the elements of digital citizenship: Digital Access: The state of full electronic participation in society Digital Commerce: The act of promoting the purchase of goods through electronic means Digital Communication: Electronic exchange of information Digital literacy: Teaching and learning about teaching and technology Digital Security: Electronic precautions Digital Health: The solution to health problems using digital technology Digital Law: Act, rules and regulations required for performing electrical work

Digital Citizenship

Digital Footprint Digital Footprint means the recording of interaction with the digital world. It is the record or track left by the things we do online. Like our social media activity, the information on the personal websites, browsing history, online subscription, any photo or video that we have uploaded.

Digital Footprint A digital footprint, sometimes called a digital record, is the body of data that exists as a result of actions and communications online that can in some way be traced back to an individual. There are two main classifications for digital footprints: 1. Passive digital footprint: It is data collected without the owner knowing. 2. Active digital footprint: They are created when personal data is released deliberately by a user for the purpose of sharing information about oneself by means of websites or social media.

Digital Footprint The following should be considered when managing Digital Footprint: Subscribed accounts and unused social media accounts which are no longer in use should be unsubscribed or deleted. Ensure the content posted protect your privacy. Not to forget that online posts are private. To note that parents, teachers and other people can view the content posted. Ensure the content posted does not damage yours or others reputation .  

Digital Footprint

Cyberbullying Cyberbullying is bullying that takes place over digital devices like cell phones, computers, and tablets. Cyberbullying can occur through SMS, Text, and apps, or online in social media, forums, or gaming where people can view, participate in, or share content. Cyberbullying includes sending, posting, or sharing negative, harmful, false, or mean content about someone else. It can include sharing personal or private information about someone else causing embarrassment or humiliation. Some cyberbullying crosses the line into unlawful or criminal behavior.

Cyberbullying The most common places where cyberbullying occurs are: Social Media, such as Facebook, Instagram, Snap Chat, and Twitter SMS (Short Message Service) also known as Text Message sent through cell phone Instant Message (via devices, email provider services, apps, and social media messaging features Email

Cyberbullying Examples of cyberbullying: Sending rude emails, texts or instant messages online or on the phone Posting hurtful things about someone on social media Spreading rumors or gossip about someone online Taking an embarrassing photo or video and sharing it without permission Pretending to be another person by creating a fake online profile Making fun of someone in an online chat that includes multiple people Offensive chat on online gaming

Cyber Crime Cyber crime is a crime committed by using cyber means/ computer technology. All the illegal activities committed by using or with the application as computer technology is called cyber crime. Damage to computer and computer system Acts to gain illegal access into the system Use as weapons to commit other crimes Some of the cyber crimes defined by Electronic Transaction Act: Creating fake documents Blackmailing/ social media abuse Piracy of intellectual properties Spreading computer viruses

Electronic Transaction Act (ETA) The electronic transaction is transactions of electronic records data by using any types of electronic means. Electronic Transaction Act (ETA) deals with issues related to cybercrime and also help in making and implementing laws over cybercrime. The house of representative ( HoR ) of the government of Nepal approved the electronic transaction act- 2063 on Mangsir 18, 2063 (December 4, 2006) and the era of electronic transaction is started in Nepal .

Electronic Transaction Act (ETA) Objectives of the Electronic Transaction Act 2063 To make legal provision for authentication and regulation of electronic data. To make a reliable data generation, communication, and transmission. To make a secured and authentic means of electronic communication. To regulate all the relating matters of electronic transactions.

Social Media Social media is a computer based technology that facilitates the sharing of ideas, thoughts and information through the building of virtual network and communities. For example: Facebook, Twitter, WhatsApp, Instagram, WeChat

Opportunities in Social Media 1. Worldwide connectivity 2. Real time information sharing 3. A social networking service an online platform which people use to build social networks or social relationship 4 . Brand Development: Branding is an important stage in any business that focuses on long-term business. Social media is a spectacular tool to grow a business. It allows customers to connect and interact with the business on a more personal level.

Opportunities in Social Media 5 . Customer Interaction: Social media makes easy for brands to share the contents. It provides an easy platform to respond questions and feedbacks. 6. Research: Social media helps to understand social consumers or market trends. Simply logging on to it you can see what your competitors are doing or finding out what your customers are saying about your brand may be a valuable exercise.

Threats in Social Media 1. Leakage of personal information 2. Social scams and phishing attacks P hishing scams use social media to trick people into giving personal information such as banking details and passwords. 3. Depression and loneliness 4. Fake accounts 5. Human error People unknowingly click on a phishing link, interact with a fake account, or accidently fill out a spam my form with sensitive information . 6. M alicious apps

IT Policy 2015 (2072) IT policy is the policy that is formed to develop the economic condition, political norms and values, economic source, increases mental power and to changes the lifestyle of people removing the poverty through the use of ICT. IT policy is very much important for the developing countries like Nepal because it develops the economic condition, political norms and values, economical source and increases the mental power. It changes the lifestyle of people and helps to eradicate the poverty and it is the best way to avoid the global degradation.

IT Policy 2015 (2072) Strategies: ICT in education, research & development Access, media and Content ICT for Government service innovation and good governance ICT Industry ICT in health ICT in Agriculture ICT in tourism Cloud computing Telecommunications infrastructure