Society - Law and Ethics (SLE-2) (15 Theory)

Download as pdf or txt
Download as pdf or txt
You are on page 1of 5

Unit 4: Society, Law and Ethics (SLE-2) (15 Theory)

INTELLECTUAL PROPERTY RIGHTS : is a category of property that includes intangible Assets By


Human Intelligence :
Examples
● copyrights, A copyright gives the creator of an original work exclusive rights to it, usually for a
limited time
❖ patents, A patent is a form of right granted by the government to an inventor or their
successor-in-title, giving the owner the right to exclude others from making, using, selling,
offering to sell
❖ trademarks, A trademark is a recognizable sign, design or expression which

32
distinguishes products or services of a particular trader from similar products or services of
other traders

58
❖ trade secrets. A trade secret is a formula, practice, process, design, instrument, pattern, or
compilation of information which is not generally known or reasonably ascertainable, by which

36
a business can obtain an economic advantage over competitors and customers (Coca Cola).
Advantage : investments in intellectual goods suffer from problems of appropriation:

49
(i.e. a producer of information or literature can usually do very little to stop their
first buyer from replicating it and selling it at a lower price )

96
unlimited number of people can "consume"
Dis. Advt. :
intellectual property presents difficulties when compared with traditional property like
land or goods
A
RW
intellectual property is "indivisible

PLAGIARISM: is the "wrongful appropriation" and "stealing and publication" of another author's
KA

"language, thoughts, ideas, or expressions" and the representation:


L.

DIGITAL PROPERTY RIGHTS are those human rights and legal rights that allow individuals to
access, use, create, and publish digital media or to access and use computers, other electronic devices,
M.

and telecommunications networks

Types of Software
BY

Proprietary software, also known as


closed-source software,
ED


● is a non-free computer software
● copyright of the source code
AR

Example : All Anti-Viruses, Microsoft Office, Oracle DB etc.


EP

Open Source Software : Open-source software (OSS)


● source code is released under a license
PR

● rights to study,
● change, and distribute the software to anyone
● Right to Redistribute
freedom to run, study, share, and modify the software)
Examples of free software license / open-source licenses
Apache License,
BSD license,
GNU General Public License,
GNU Lesser General Public License,
MIT License, Eclipse Public License Mozilla Public License. Creative
Commons Creative Commons (CC) is an American non-profit organization
Data Privacy : Information privacy is the relationship between the collection and dissemination
of data, technology, the public expectation of privacy, legal and political issues surrounding them. It is
also known as data privacy[2] or data protection

Privacy laws : Privacy law refers to the laws that deal with the regulation, storing, and using
of personally identifiable information of individuals, which can be collected bygovernments, public or
private organisations, or other individuals.

32
Online fraud : Internet fraud is a type of fraud which makes use of the Internet and could involve
hiding of information or providing incorrect information for the purpose of tricking victims out of

58
money, property, and inheritance.
● Charity fraud

36
● Gambling fraud
● Online gift card fraud

49
CYBERCRIME- a crime that involves a computer and a network. The computer may have been used

96
in the commission of a crime, or it may be the target.[
Examples
o Phishing is the fraudulent attempt to obtain sensitive information such as usernames,

A
passwords and credit card details by disguising one-self as a trust worthy entity in an electronic
RW
communication
o Illegal downloading is obtaining files that you don't have the right to use from the internet.
o Digital piracy involves illegally sharing copyrighted media such as games, music, movies, TV
KA

shows and software.


o Child pornography is a form of child sexual exploitation. any visual depiction of sexually
explicit conduct involving a minor (persons less than 18 years old).
L.

o scams :
M.

o Identity Theft. : also known as identity fraud, is a crime in which an imposter obtains key
pieces of personally identifiable information, such as Social Security or driver's license numbers,
in order to impersonate someone else
BY

o Transaction Fraud. A fraudulent transaction is one unauthorized by the credit card holder.
Such transactions are categorized as lost, stolen, not received, issued on a fraudulent
o Hacking.: the gaining of unauthorized access to data in a system or computer
ED

o Crackng The term “cracking” means trying to get into computer systems in order to steal,
corrupt, or illegitimately view data..
AR

o Software Piracy: illegally copying software that does not belong to you in a manner that violates the
copyright. A example of software piracy is when you download a copy of Microsoft Word from a file-sharing
EP

website without paying for it


PR

CYBER FORENSICS, : Computer forensics is the application of investigation and analysis techniques
to gather and preserve evidence from a particular computing device in a way that is suitable for
presentation in a court of law.

Computer Forensics : Lab experts forensically analyse all types of data stored in computer hard
drives, USB memory sticks, cloud spaces, social media, cameras and mobile phones to find relevant
digital evidence

Exp. : Deleted files Revoery


Steganography
INFORMATION TECHNOLOGY ACT, 2000 (also known as ITA-2000, or the IT Act)

is an Act of the Indian Parliament (No 21 of 2000) notified on 17 October 2000. It is the primary law
in India dealing with cybercrime and electronic commerce .
INFORMATION TECHNOLOGY ACT, 2008 (AMENDMENT) :
Child pornography is any kind of representation of sexually explicit or obscene images of a
minor under 18 years old.

SOCIAL NETWORKS INTERNET RISKS:

32
● Online Grooming
● Cyberbullying

58
● Cyber-suicide
● Internet addiction

36
● Online scams
● Electronic Gambling

49
E-WASTE MANAGEMENT:

96
Electronic waste or e-waste describes discarded electrical or electronic devices. Used electronics

A
which are destined for refurbishment, reuse, resale, salvage recycling through material recovery, or
RW
disposal are also considered e-waste.

Proper Disposal of used electronic gadgets.


KA

● Land Filling
● Recycling of e-waste. ...
L.

● Reuse of electronic devices.


M.

● Give Your Electronic Waste to a Certified E-Waste Recycler


● Sell Off Your Outdated Technology
● Donating Your Outdated Technology
BY

● Visit Civic Institutions


● Give Back to Your Electronic Companies and Drop Off Points
● Upgrade your computer instead of simply replacing
ED
AR

Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of
personally identifiable information, such as Social Security or driver's license numbers, in order to
EP

impersonate someone else.


Methods / Theft
PR

● Data Breaches
● •Internet Hacking
● •Malware Activity
● •Credit Card Theft
● •Mail Theft
● •Phishing and Spam Attacks
● •Wi-Fi Hacking
● •Mobile Phone Theft
● •ATM Skimmers
Protection of Identity Theft : UNIQUE IDS, : Aadhar, Voter-ID Card , and biometrics.
● Biometrics is the science of analysing physical or behavioural characteristics specific to each
individual in order to be able to authenticate their identity.
GENDER AND DISABILITY ISSUES WHILE TEACHING AND USING COMPUTERS.
Gender Issues
● Preconceived notions–Notions like“boys are better at technical and girls are good at
humanities
● Lack of interest
● Lack of motivation
● Not girl friendly work culture
● Lack of encouragement in class

32
● Race, Class, Gender, and Disability
DISABILITY ISSUES

58
● 1.Unavailability of teaching materials/aids
● 2.Lack of special needs teachers

36
● 3.Lack of supporting curriculum
POSSIBLE SOLUTION

49
● Enough teaching aids must be prepared for specially abled students
● Must employ special needs teachers
● Curriculum should be designed with students with specially abled students in

96
mind.

ROLE OF NEW MEDIA IN SOCIETY:


A
RW
● New Media–Means mass communication using IT tools and techniques/digital
technologies such as Internet
KA

Forms of new media


● Internet
● Websites
L.

● Computermultimedia
M.

● Socialnetworking
● Videogames
● •Blogs
BY

Advantages of new media


● On demand availability
● Any Time Availability
ED

● Any Place Availability


● Convertible as per Device
AR

● Interactive
● Easily Sharable
EP

Disadvantages of new media


PR

● Not a Reliable Source


● Privacy Issues
● Cyber Bullying
● Troll
Online campaigns, By developing an online marketing campaign to promote your product or service,
you can significantly improve your consumer reach and cultivate a more personal relationship with
potential customers at a far lower cost than you can with mass marketing.

Online Campaign can deliver benefits such as:


● Growth in potential
● Reduced expenses
● Elegant communications
● Better control
● Improved customer service
● Competitive advantage
Step of Online campaign
● Step1-Identify Customer
● Step2-Choose Your Targets
● Step3–Budget
● Step4-Creating campaign Content

32
● Step5-Tracking and Monitoring campaign/ads
Disadvantages/ limitations of online campaign

58
● Customers Ignore Ads
● Viewing Problems

36
● Expensive Ad Prices
● Consumers Get Distracted

49
● Too Many Options
● Face-to-Face Contact is Limited

A 96
RW
KA
L.
M.
BY
ED
AR
EP
PR

You might also like