Societal Impact: Active Digital Footprint
Societal Impact: Active Digital Footprint
Societal Impact: Active Digital Footprint
Digital footprint:- a digital footprint is a data that is left behind when user have
been online
There are two types of digital footprint which are :-
1. Active digital footprint
2. Passive digital footprint
Active digital footprint
An active digital footprint is when the user has deribately shared information
about themselves either by using social media sites or by using websites.
Digital footprint
Posting on face book ,instagram and twitter or any other social media
platforms.
Filling out online forms, when signifying up to receive email or text.
Agree to install cookies on a devices
Passive digital footprint
A passive digital footprint is made when the information is collected from the
users without the person knowing, this is happening.
E.g of passive digital footprint
Website that install cookies in a device without disclassing us apps and
websites that used the geolocated to pin point a location.
Social media news channels and advertisement that use like share and
comment.
Managing our digital footprint
Following are the different reasons care and managing our digital footprinting:
To protect our image or reputation.
To prevent our financial losses.
To make safe personal information.
Risk due to digital footprint
Privacy concern
Identity theft
Fake website
Scams
Netiquettes
Netiquette short of internet etiquette or communication etiquette over the
internet. It is just like a human etiquettes – a code of polite beheviour in the
society similarly, netiquette is a code of good behavior on the internet.
Netiquette include several aspect of internet, social media, email, online chats,
website comments, online gaming or any other types of online communication.
Do’s and don’t
Do’s Don’t
Protect personal in formation. Respond to internet progress.
Verify fetch before responding or Posting offencing comment.
reporting. Post private and embracing
Keep message and post verify. images.
Use desecration. Stick to the topic.
Obey copy writing. Spam others by sending large
Helps others. emails.
Thanks other for online help. Talk behind others back.
Express sence less and offensive
opinions.
Data protection
Data protection refers to the practice safeguard and bringing rules put in place to
protect our personal information and ensure that it remains in control.
Consequences of unprotected data
Physical data loss
Hit with viruses
Targeted by hackers
Intellectual properties at risk
Damaged downtown
Suffer from security attack.
How we can protect personal data online
Use security software.
Keep your password private and strong.
Encrypt your data.
Don’t over sharing on social media
Avoid phishing and span emails.
Be wise about wifi.
Intellectual properties
IP is a properties created by a person as a group of person using their own
intellectual for ultimate use in commerce and which is already not available in the
public domains.
E.g:- which are an invention relating to the product or any process, a new design a
literacy, a article work a artistic work a trademark (symbol, logo, name etc.)
IPR(Intellectual Property Right)
IPR is a statutory right granted by the government to the owner of the intellectual
properties to exclude from other exploiting it commereely for a certain time
period.
Why should be protected
1. IP owner can sell or license the ip for commercial use
2. IP is an asset and can be exploited by the owners for commercial benefits in
any manner.
3. IPR certificate established legal and valid ownership about an IP.
Kinds of IPR
1. Patent(to protect the chronology) by the patient act.
2. Trade mark(to protect the company or domain name, logo, sign, lable)by
the trade mark act.
3. Design(to protect the onment origin)by the design act.
4. Copyright(to protect the literacy and artiste work) by copyright act.
5. Geographical indication (GI).
Act year
1. The patient act (1970)
2. The trade mark act (1999)
3. The design act (2000)
4. Copyright (1957)
5. Geographical indication (1999)
Plagiarism
Plagiarism is the act preventing the words, idea, images, sound or any creative
expression of others as it is your creation.
The word Plagiarism is derived from the lattin word Plagiare, which means
kidnapped or abduct.
Why plagiarism is important
1. Plagiarism is a cheating process.
2. Plagiarism is an data thefting process.
3. Plagiarism is a academic offence.
4. Plagiarism is a academic theft.
5. Plagiarism is a stealing of intelactual property.
Types of plagriarism
Mainly there is two types of Plagiarism.
1. Intentional Plagiarism.
2. Unintentional Plagiarism.
Intentional plagiarism
Cut and paste fron electronic resousces.
Borrowing and buying assignment.
Copying others work.
Downloading text, article, story, essay, poetry, presentation etc
Unintentional plagiarism
Not knowing how to acknowledge or incorporate sources of information
through proper summarizing or citation.
Careless copying and cutting from electronic database.
Flour to use our own voice.
How to avoid plagiarism
Following are the points to avoid Plagiarism.
Develop your writing skill.
Take careful notes.
Use your own ideas.
Rewrite other ideas in your own word.
Software license
A software license is a document that provides legally binding guidliness to the
person who hold its for the use of distribution of software.
Software license typically provides and use with right to make one or more copies
of software without violating copywrite.
Software license terms and conditions usually include the fair use of software the
limitation of liabilities worthies and protection.
Benefits of software license
The right software license can save our money.
The license holder receives around the clock license support.
Using unlicensed software against the law.
Software copywrite
Software copywrite used by software developer companies to prevent
unauthorized copying of software.
Free open source license are relay on copywrite law to enforce third term.
Protect our rights
It protect software part frequency and organization.
It prevent our software structure.
FOSS(free open source software)
FOSS is a kind of software that allows us to use freely run the program for any
purpose but also provides user access to its source code. it also allows us to
modify as we wish freely distribute copies of the original version.
1. Modify version can redistribute.
2. Source code must be include.
3. Anyone must be allow to modified the source code.
4. It must be free.
E.G of FOSS:- linux, unix, ubuntu.
Types of software based on users
1. free use software.
2. Open source software.
3. Proprietary software.
Free software:- free software are those which use freely access, changed,
improved, copy and distributed. It provides all types of freedom to the user.
Open source software:- it can be also used freely and it also be changed,
improved, copied and redistributed by the user but it may have some cost for
media and support for the future development.
Proprietory software:- they are available neither open nor free they must have
some cost orr source code is not given since it is property of developed
organization. In such kind of software no changes, copies and distribution are
allowed to the user.
Cyber crime
Any crime that include a computer and a network is called cyber crime or digital
crime, computer crime.
In some other words cyber crime is type of crime in which a computer is the
object of crime like hacking, spaming, phishing or is used as a tool to comit an
offence.
Steps to protect against cyber crime
1. Go offline when don’t need an internet work.
2. Less amount of sharing online.
3. Think and check properly when you are using any other persons wifi.
4. If any doubt don’t click or open any unknown and suspicious link or
website.
5. Make sure your security software is installed and updated.
6. Log off or log out your digital account or system when not in need.
Hacking
Hacking is the process of gaining access into any computer device or group of
computers unauthorisely this is done through cracking of password and code
which gives access to system.
Difference between hackers and crackers
The main diff between hackers and crackers is that a cracker breaks the security
of computer system but a hacker is a person who likes to explore the computer
system and computer devices.
Types of hackers
1. Black hat
2. Grey hat
3. White hat
Black hat:- are individuals hackers with extra ordinary knowledge of computers
skills reshorting to melacious or distructive activity.
Black hat hackers use their knowledge and skills for own personal gains by hurting
others.
Grey hat:- are individuals who work both offencevly and diffensive at the
different time and different conditions. The grey hat hackers behaviour can’t be
judge or predict because sometime the hacker use their skills for the diffensive
work or some time use their skill for the offensive works.
White hat:- are those individuals who use their hacking skills for defensive
purpose in other words white hat hackers use knowledge and skills for good work
or betterment of society.
Hacking process
1. Digital footprint.
2. Scanning.
3. Gaining access.
4. Maintaining access.
How to prevent hacking
Do not click on the unknown or random email attachment.
Never store and share login info.
Download software from authorized website.
Scan all type media and hardware before using.
Make strong password and don’t describe it.
Phishing
It is an cyber attack that user disguised email as a weapon. The goal is to trick the
email receipent into beliveing that message is something we want or need.
The receiptent filled or sent some sensitive information like phone no., user id,
password etc.
How to prevent phishing
Watch out for url redirects that sent to the different website with identical
design.
Always check the speling of url before clicking.
Don’t post any personal data as information on the social media like DOB,
mobile, vehicle no., adhaar no. etc.
Cyber bulling:- it is the use of technology to harassed, threaten or humiliate a
target . E.g sending email, text, posting false information, sharing of embrassing
photos and videos.
Types of cyber bulling
There are different types of cyber bulling like:-
1. Doxing
2. Harresment
3. Cyber stalking
4. Impersonation
How to prevent cyber bulling
We should teach/guide/aware the cyber bulling with the help of following
precautions.
Watch for the following sign of cyber bulling in childrens.
Be aware in online activity.
Avoid to discussing what they are doing online.
Deactivating social media accounts.
Be alert about emotional response.
Cyber law
Cyber law is a part of legal system that deals with the cyber space, internet and
other legal issue. Cyber law cover a wide area like freedom of expression, access
to and utilization of internet and online security and privacy.
Importance of cyber law
Cyber law plays a very important role in the current scenario and technology’s
world. It is important as it is concerned to almost all aspect activities and
transaction that take place either on the internet or any other communication
devices.
IT ACT
Information technology act of india is also known as ITA 2000 or it is also called it
act. IT act is an act of Indian parliament it was notified law in india that deals with
the digital crimes, cybercrime.
Key points/key functions of it act
Digital signature are given legal validity with in the IT Act.
Email is known as legal and valid form of communication.
Issue digital certificate by the certifying authorties to new business of the
companies.
In case of any harms or less done to the company by criminals the it act
provides a remedy to the company in the form of money.
Offence and penalty (By IT act)
Following are the penalty by the it act according to offence.
offence penalty
67 A – publishing images Imprisonment upto 7 years
containing sexual material. Imprisonment upto 5 years and
67 B – publishing child fine of 10 lakhs.
pornography. Imprisonment upto 5 years with
67 C – failure to maintain records. or without fine.
Sec 68 – failure or refusal to Imprisonment upto 3 years with
comply orders. fine upto 20lakhs.
Sec 69 – failure or refusal to Imprison upto 7 years.
descript data. Imprison upto 7 years and fine.
Sec 70 – securing access to a Imprison upto 3 years with fine of
protected system. 1 lakhs.
Sec 71 – Mispresentation
E waste
Whenever electronic devices cover up its working life or become non-usable due
to some technological advancement or become a non-function is called E waste
or such kind of electroinc material comes under the category of electronic waste.
Managing such kind of non-functional electronic devices is named as E-waste
management.
E-waste management/E-waste hazards:
The E-waste hazards can be categorized in two parts:-
1. Environmental.
2. Human health.
Environmental
1. air pollution
2. ground water pollution
3. acidification of soil
4. land fill with lead and heavy material
human health
1. chronic damage of the brain
2. DNA damage
3. Lung cancer
4. Asthmatic bronchitis
Ways to dispose E-waste
1. Sale of your outdated technology
2. Give your E-waste to a certified E-waster.
3. Visit civics institutions.
4. Donating your outdated technology.
Physical problem
Loss of attention and stress.
Sleeping disorder.
Decrease of productivity.
Computer vision syndrome.
Various types of radiation.
Different types of medical issue.
Pshychological problem
Computer anxiety
Fear of technology
Internet addiction
Infornography
Youtube addiction
Google stalking
Ego surfing
Blog striking