Latest Post:
Loading...

Unit 1.2 Ethical and Social Issues in ICT (grade 10)

 1.2 Ethical and Social Issues in ICT



The development of ICT has made it possible to store large amount of data in the virtual world and make communication through it. At the same time, computer crimes and abuse of data, privacy violations, pornography are increasing.

Challenges of ICT

1. Virtual Identity

a) A major problem in the ICT environment.

b) Internet criminals enter into the system by creating fake identities and use the system for their benefits which is difficult to recognize and control.

2. Security

a) Hacking (unauthorized access) of system is increasing.

b) Loss of data and information.

3. Privacy Issues

a) Cyber bullying is a kind of harassment using mobiles or computers.

b) Sharing unnecessary information of individual or group of people is the danger of ICT in this era.

4. Copyright

A copyright is a type of intellectual property that gives its owner the exclusive right to copy, distribute, adapt, display, and perform a creative work, usually for a limited time.

Copyright is the exclusive right that the owner of an intellectual property has to that property.

a) A legal right that grants the creator of an original work.

5. Social Behavior

a) Excessive use of internet has changed ta. he behavior of the people.

b) Negative effects on sleep, work and academic achievements of the students.

c) Usage of unethical sites has increased negative behaviors and crimes in society.

d) Employees use internet at their workplace for non-productive works.

Digital Divide

  • The Digital Divide is a social issue referring to the differing (conflicting) amount of information between those who have access to the Internet (especially broadband access) and those who do not have access.
  • In education sector, developing countries have poor old education systems, so students will not be aware of new information technologies.
  • In remote areas, they do not even have power, so information technology looks like computer cannot be used.
  • To get ICT benefits, developing countries should train their human resource and also adopt new culture which is a bit costly.

Computer Ethics

Computer ethics are the set of moral principles for using the computer and internet. It is the acceptable behaviors on the internet.

Major Provisions/commandments included in computer ethics are:

a) Do not use a computer to harm other people.

b) Do not search the file or record of other people.

c) Do not spread false and illegal information.

d) Do not destroy or delete the records of other people.

e) Do not snoop around in other people’s files. 

f) Do not use other people's computer resources without authorization.

Cyber Law

  • Cyber law refers to the laws that prevent cybercrime, legalize electronic transactions and digital data processing, and punish cyber criminals.
  • Cyber Law (also known as Electronic Transaction and Digital Signature Act (ETDSA)) was passed on 30th Bhadra 2061 (15 September 2004).

The major components included in cyber law are:

  • Electronic and Digital Signature Law
  • Computer Crime / Cyber Crime Law
  • Intellectual property Law
  • Data Protection and Privacy Law
  • Telecommunication Law

International Cyber Law

a) Fair Credit Reporting Act in 1970

b) Freedom of Act in 1970

c) Federal Privacy Act in 1974

d) Video Privacy Protection Act in 1988

e) Copyright Act 1992

Digital Signature

A digital signature is an electronic form of a signature that can be used to authenticate the identity of the sender of a message or the signer of a document and ensure that the original content of the message or document that has been sent is unchanged. 

Cybercrime

Cyber-crime is an illegal and criminal activity done by using computer and internet technology. Cybercrime is also known as computer-related crime.

Illegal activities committed using computer technology

a) Damage to computer and computer system.

b) Acts to gain illegal access into the system.

c) Use as weapons to commit other crimes.

d) Acts against the provision of cyber law.

Examples of cyber/computer crimes

a) Creating fake documents

b) Blackmailing/social media abuse

c) Distribution of pornography materials

d) Piracy of intellectual properties

e) Spreading computer viruses/malware

f) Cyber bullying, identity theft, software piracy, data diddling

Digital citizenship

Digital citizenship refers to the responsible use of technology by anyone who uses computers,

the internet, and digital devices to engage with society on any level.

A digital citizen is anyone who uses digital tools such as computers, cell phones, or the Internet. You can use these tools in your work, at school or for recreation.

  • Good digital citizenship engages young students and shows them how to connect with   one another, empathize (understand) with each other, and create lasting relationships through digital tools.
  • Bad digital citizenship, on the other hand, entails (involves) cyber bullying, irresponsible social media usage, and a general lack of knowledge about how to safely use the Internet.

Examples of Digital Citizenship

a) Communicating with respect

b) Respecting other's privacy

c) Adding helpful information/context to a discussion or wiki 

d) Supporting others by offering useful feedback

e) Encouraging them, or sharing work they're proud of, etc.

Digital footprint

Digital footprint is a trial of data you create while using the Internet. It includes the websites you visit, emails you send, and information you submit to online services.

How can we manage our digital footprint?

  • Ensure the content posted protects your privacy.
  • Not to forget that online posts are private.
  • Ensure the content posted doesn’t damage yours or other reputation

Types of digital footprints

a) Active digital footprint

b) Passive digital footprint

Active digital footprints

a) An active digital footprint is where a user knows that they're sharing the information.

b) Posting on Face book, Instagram, Snap chat, Twitter, and other social media platforms

c) Filling out online forms, such as when signing up to receive emails or texts

d) Agreeing to install cookies on your devices when prompted by the browser

Passive digital footprints

a) A passive digital footprint is the information collected from a user without their knowledge.

b) Websites that install cookies in your device without disclosing it to you

c) Apps and websites that use geo location to pinpoint your location

d) Social media news channels and advertisers that use your likes, shares, and comments to profile you and to serve up advertisements based on your interests

"Everything leaves a digital footprint. Whatever gets created may never go away. If they don’t want to see it tomorrow, they'd better not post it today"

IT Policy 2072

IT Policy launch in Nepal – 2000 AD (2057 BS)

Most recent and the latest information technology policy– ICT Policy 2015 (2072 BS)

Objectives of IT Policy 

  • To empower and facilitate Nepal’s participation in the Global Knowledge Society.
  • To promote ICT to further productivity among the sectors that is key drivers of the national economy.
  • To promote research and innovation on the role of ICT on the resilience of low-income communities amid potential environmental, economic and social shocks
  • To create easily accessible, affordable and innovative public access points under a
  • comprehensive E-community / Village network initiative.

 Vision of ICT Policy 2015

To transform Nepal into information and knowledge-based society and economy.

Mission of ICT Policy 2015

To create conditions for the intensified development and growth of ICT sector as a key driver for Nepal's sustainable development and poverty reduction strategies.

Objectives of National Information and Communication Technology Policy

a) To empower and facilitate Nepal’s participation in the Global Knowledge Society.

b) To promote ICT to further productivity among the sectors that is key drivers of the national economy.

c) To deploy ICTs at all levels of Nepali educational system in order to improve educational outcomes while expanding access to education and training facilities

d) To facilitate the participation of youths and women in ICTs particularly in media and content development initiatives.

Electronic Transaction

Transactions of electronic records data by using any types of electronic means.

Contains electric records and valid digital medium.

ETA (Electronic Transaction Act)

  • ETA (Electronic Transaction Act) deals with issues related to cybercrime and also help in making and implementing laws over cybercrime.
  • It has made different requirements so that if anyone found having cybercrime, he/she will be punished according to the scene of the crime.
  • Maintaining privacy in the cyberspace, creating strong passwords, updating the security software, updating password are some of the techniques to keep secure him /her.
  • The computer and cybercrimes such as hacking, piracy, copyright violation, fraudulent and all other deceitful activities have been clearly defined and punishments are set accordingly. The action against such crimes and punishment will be in the range of a minimum Rs 50,000 to a maximum Rs 3,00,000 in cash and six months to three years imprisonment.

Q. When was Electronic transaction act 2063 authenticated and published in Nepal?

Ans: December 8 2006 (22 Mangshir 2063)

Objectives of the Electronic Transaction Act 2063

a) To make legal provision for authentication and regulation of electronic data.

b) To make a reliable date generation, communication, and transmission.

c) To make a secured and authentic means of electronic communication.

d) To regulate all the relating matters of electronic transactions.

Scopes of the Electronic Transaction Act 2063

a) Creation and use of digital signature

b) Control cyber/computer-related crimes.

c) Protection of intellectual property.

d) Protection of confidentiality.

 Social Media 

The 'social' part refers to interacting with other people by sharing information with them and receiving information from them.

The 'media' part: refers to an instrument of communication, like the internet (while TV, radio, and newspapers are examples of more traditional forms of media).

Social media is computer-based technology that facilitates the sharing of ideas, thoughts, and information through the building of virtual networks and communities.

Different platforms of social media

Facebook - Facebook is a free social networking Web platform that promotes and facilitates interaction between friends, family and colleagues. Facebook was founded in 2004 by Mark Zuckerberg and several Harvard University classmates.

Twitter – Twitter is a free social networking microblogging service that allows registered members to broadcast short posts called tweets. Twitter was created in March 2006 by Jack Dorsey, Noah Glass, Biz Stone, and Evan Williams, launched in July of that year.

Instagram – Instagram is the name of an online photo sharing social Web service that lets you share your life with friends through a series of pictures captured with a mobile device. Instagram also supports video uploads.

LinkedIn – LinkedIn is a social networking website designed for business professionals. It allows you to share work-related information with other users and keep an online list of professional contacts.

Blogs – A blog (shortening of “weblog”) is an online journal or informational website displaying information in the reverse chronological order, with the latest posts appearing first. It is a platform where a writer or even a group of writers share their views on an individual subject.

Wikipedia – Wikipedia is a free, open content online encyclopedia created through the collaborative effort of a community of users known as Wikipedians. Anyone registered on the site can create an article for publication; registration is not required to edit articles.

Opportunities of using social media

  • Information Sharing and Awareness
  • Business Promotion and Brand Building
  • Creative Expression and Collaboration
  • Attracting customer

Threats of using social media

a) Online Harassment and Bullying

b) Privacy and Security Risks

c) Spread of Misinformation and Fake News

d) Addiction and Mental Health Issues

e) Fake Accounts 



Post a Comment