Unit 4 Societal Impacts

Download as pdf or txt
Download as pdf or txt
You are on page 1of 11

UNIT-IV

SOCIETAL IMPACTS
MIND MAP

BE ETHICAL

SOCIAL MEDIA BE RESPECTFUL


ETIQUETTES
BE RESPONSIBLE

DIGITAL BE PRECISE
SOCIETY NET ETIQUETTES

&
BE POLITE
NETIZEN

BE CREDIBLE

BE SECURE
COMMUNICATION
ETIQUETTES
101
BE RELIABLE

DIGITAL FOOTPRINT

The digital footprint is created knowingly or unknowingly while using the internet. Wherever
data is asked to fill up for the interaction you are leaving your digital footprint. Whatever data we
are providing through the internet on websites or apps, it may be used for any purposes including
showing relevant ads to your devices, or it can be misused or exploited for any other purposes.

Digital Society & Netizen:

Net Etiquettes

Be Ethical Be Respectful Be Responsible

No Copyright Share the Respect Diversity Respect Privacy Don’t feed Avoid Cyber
Violation expertise the tr oll bullying

Be ethical: Follow the following rules to be ethical on the internet.

• No copyright violation: While uploading media like audio, video, or images and creating
content we should not use any material created by others without their consent. We should
always try to make our own content.
• Share the expertise: You can share your knowledge to help people on the internet. There
are many platforms like a blog, you tube, podcast and affiliate marketing etc. You should
follow the simple stuff before sharing your knowledge on the internet. The information
should be true.

Be respectful: We should be respectful on the internet with following aspects:

102
• Respect Privacy: We should not share anything on the internet related to others without their
consent. This is called respect for privacy.
• Respect Diversity: There is a different kind of people having different kind of mindset and
opinion, knowledge, experience, culture and other aspects. So we have to respect their
diversity in the groups or community or forum.

Be responsible: While using internet, we should be responsible whatever we are doing.

• Avoid cyber bullying: Cyber bullying refers to the activities done internet with an
intention to hurt someone or insult someone, degrading or intimidating online
behaviour such as spreading or sharing rumours without any knowledge or fact check
on the ground, sharing threats online, posting someone’s personal information, sexual
harassment or comments publicly ridicule. These type of activities have very serious
impacts on the victims. Always remeber, your activities can be tracked through your
digital footprints.

MIND MAP

COPYRIGHT

PATENT
IPR

TRADEMARK

LICENSING

PLAGIARISM

VIOLATION OF IPR

COPYRIGHT
INFRINGEMENT
DATA
PROTECTION TRADEMARK
PUBLIC ACCESS AND INFRINGEMENT
OPEN SOURCE
SOFTWARE

103
DATA PROTECTION

Security and control on data stored digitally to avoid any inconvenience, harm, loss or
embarrassment.

Each country has its own data protection law to ensure right protection of data from any
changes or breach.

Intellectual Property Rights:

If a person owns a house it is considered as his own property. Similarly, if a person is posting
something with his unique ideas and concepts is called a person’s intellectual property. Intellectual
Property refers to inventions, literary and artistic expressions, designs and symbols, names and logos.

The Intellectual Property Right gives ownership to the creator of the Intellectual Property
holder. By this, they can get recognition and financial benefits from their property. These intellectual
properties are legally protected by copyrights, patents, trademarks, etc.

Copyrights:
Copyrights refers to the legal rights to use a material like writing, articles, photographs,
audios, videos, software or any other literacy or artistic work. Copyrights are automatically granted
to the creators or the owners.
Patent:
The patents are given for the inventions. Here the creator needs to apply for the invention.
When the patent is granted the owner gets rights to prevent others from using, selling or distributing
the protected invention. Patent gives full control to the patentee to decide how others can use the
invention. A patent protects an invention for 20 years, after that public can use it freely.

Trademark:

Trademark is applicable for the visual symbol, word, name, design, slogan, label etc. for the
product. It provides uniqueness for the other brands and commercial enterprise. It also gives
recognition to the company. The trademark product denoted by ® or ™ symbols. There is no expiry
time for the trademark.

Licensing:

A license refers to a contract or permission or agreement given to any party by acreator to


use their product or service or creation. A license can be purchased by paying money. License is the
term that gives special rights to the user to use the copyrighted material.

Similarly, a software license is an agreement that provides legal rights to the authorised use
of digital material. All the software, digital documents or games you are downloading from the

104
internet provides the license agreement to use the material. If anyone is not following will be
considered a criminal offence.

Violation of IPR:

Knowingly or unknowingly, people are violating IPR while doing work. So the violation of
IPR done in following ways:

✓ Plagiarism
✓ Copyright Infringement
✓ Trademark Infringement

Plagiarism:

Plagiarism refers to copy or share the intellectual property of someone on the internet without
giving any credit or any mention of the creator. Sometimes if you derived an idea or product which
is already available, then also it is considered plagiarism. Sometimes it is also considered fraud.
Whenever you are using any online material for your personal use or for any purpose, always cite
the author and source to avoid plagiarism.

Copyright Infringement:

When you use the work of others without taking their written permission or don’t paid for
that using that is considered as copyright infringement. If you download an image from google and
use in your work even after giving the credit or reference you are violating copyright. So before
downloading any content check it for copyright violation.

Trademark Infringement:

The unauthorized use of trademark product is known as trademark infringement. The


trademark owner can take a legal action for trademark infringement.

Public access and open source:

For the encouragement towards the innovation and new creations, the way of accessing the
material and resources should be available. So there are some public access and open-source licenses
are made for them. Open source allows using the material without any special permission.

Some software is there which are available for free of cost and allows redistribution. User
can use them, copy them and redistribute them. They are available with modifiable source code. Free
and Open Source Software (FOSS) is a large community of users and developers who are
contributing towards open source software. These tools are Linux, Ubuntu, open office, Firefox are
examples of open source software.

Creative common:

105
✓ Creative common is non-profit organization provides public CC license free of charge.
✓ CC license is governed by Copyright law.
✓ CC is used for all kind of creative works like websites, music, film, literature etc.
✓ Six different Creative Commons licenses:
❖ CC BY,
❖ CC BY-SA,
❖ CC BY-NC,
❖ CC BY-ND,
❖ CC BY-NC-SA,
❖ CC BY-NC-ND
Among these, CC BY is the most open license.

Cyber crime:

The cybercrime covers phishing, credit card frauds, illegal downloading, cyber bullying,
creation and distribution of viruses, spam etc. These type of activities increasing day by day through
hacking, ransomware like attacks, denial-of-service attack, phishing, email fraud, banking fraud and
identity theft.

Hacking:

Hacking refers to entering into someone’s account without the user’s consent or stealing login
information from someone’s account and unauthorized access to data. When people share them on
the internet through different websites like emails, online shopping etc. some expert people trying to
break the system security and gain unauthorized access.

If this hacking is done for positive intent then it is known as Ethical Hacking or White Hat
Hacking. The hacker is known as Ethical Hacker or White Hat Hacker. They help to protect the
system from hacking and improves the security of the system.

A Black Hat Hacker or Unethical Hacker tries to gain untheorized access and steal the
sensitive information with the aim to damage or break down the system. Their main focus is security
cracking and stealing the sensitive information.

Phishing:

Phishing is a type of attack on a computer device where the attacker tries to find the sensitive
information of users in a fraud manner through electronic communication by intending to be from
a related trusted organization in an automated manner.

Ransomware:
Ransomware is a form of malicious software that prevents computer users from accessing
their data by encrypting it. Cybercriminals use it to extort money from individuals or organizations
whose data they have hacked, and they hold the data hostage until the ransom is paid.
If the cybercriminals do not pay the ransom within the specified time frame, the data may
leak to the public or be permanently damaged. One of the most serious issues that businesses face
is ransomware.
106
Steps to stop Ransomware:
▪ Avoid Unverified Links:
▪ Frequently Update Your Operating System and Software:
▪ Make a System Backup:
▪ Restrict Access To Your Data:
▪ Disable vulnerable plug-ins:
▪ Create Strong Passwords:
Indian Information Technology Act (IT Act)
The Indian IT Act provides guidelines and rules to the user on the processing, storage and
transmission of sensitive information. The states of our country have their own cyber cells in the
police station to report cybercrime. The IT act provides legal provisions and implications against
cybercrime. If the cybercrime is proved then the accused may get the penalties also.

E-Waste Hazards and Management:


E-Waste in India:
As India is the fifth largest E-waste producing country in the world, aspirants should know
that E-waste is a term used for those electronic products which are near to the end of their useful life.
Some examples of E-waste are:

• Computers
• Televisions
• VCRs
• Stereos
• Copiers, and
• Fax machines
Impacts of E-Waste on the humans.
Electronic devices are made up of metals and elements like lead, beryllium, cadmium,
plastics, etc. Out of these materials most of them are difficult to recycle. These materials are very
toxic and unsafe for human beings because they may cause disease like cancer.

E-Waste management:

The efficient disposal of e-waste is E-Waste management. It is not possible to dispose it


completely but at certain level it can be reduced through Reduce, Recycle and Reuse.

• Reduce: Reduce the purchase of electronic devices by using some alternates or as per
the need only. They can only be discarded only after their useful life ends. Good
maintenance of these devices increases its life.
• Reuse: The devices can be modified and reused for other purposes. The discarded
devices can be supplied or sold to someone who can use them. The process of re-
selling old electronic goods at lower prices is called refurbishing.
• Recycle: Recycling refers to the process of conversion of electronic devices into
something else which can be used again and again. The e-waste which cannot be
107
recycled can be repaired re-used. Many NGOs provide doorstep services to collect e-
waste.

Recycle Reduce

Reuse
According to the Environmental Protection Act, 1986 - “Polluter pays Principle” means that
anyone causing the pollution will pay for the damage caused. Any kind of violation will be punished
according to this act. The Central Pollution Control Board(CPCB) has issued guidelines for the
proper handling and disposal of e-waste. The guideline says that the manufacture of the product will
be responsible for the disposal of the product when it becomes e-waste.
The Department of Information Technology (DIT) issued a comprehensive technical guide
on “Environmental Management for Information Technology Industry in India.

WORKSHEET
L1

1) Jack is a good programmer and wants to contribute to the features of one of the softwares,
that he uses. What kind of software he can contribute to?
a) Proprietary software b) Free software
c) Open source software d) Shareware
2) Digital footprints are stored ______________
a) Temporarily (for few days) c) for 7 days only
b) Permanently d) for 3 days
3) What is hazardous pollutant released from mobile phone ?
a) Lithium b) Barium c) Lead d) Copper

4) Nitish received an email warning him of closure of his bank accounts if he


did not update his banking information as soon as possible. He clicked the
link in the email and entered his banking information. Next he got to know
that he was duped.
i) This is an example of _____ .
ii) Someone steals Nitish’s personal information to commit theft or fraud, it
is called ____________
iii) Nitish’s Online personal account, personal website are the examples of __
5) Which of the following come under cybercrime?
1. Theft of a brand new sealed laptop.
2. Access to a bank account for an unauthorized money transaction.
3. Modification in a company’s data with unauthorized access.
4. Photocopying a printed report.
Assertion & Reasoning
108
Mark the correct choice as
a. Both A and R are true and R is the correct explanation for A
b. Both A and R are true and R is not the correct explanation for A
c. A is True but R is False
d. A is false but R is True
6) Assertion ( A) : Plagiarism is stealing someone else’s intellectual work and representing it
as your own work.
Reason (R) : Using someone else’s work and giving credit to the author or creator.
7) Assertion ( A) : Intellectual Property Rights are the rights of the owner of information to
decide how much information is to be exchanged.
Reason (R) : The owner has the right to protect his/her intellectual property
Short Answer Questions
8) Ms. Sunitha has many electronic gadgets which are not usable due to outdated hardware
and software. Help her to find any three best ways to dispose the used electronic gadgets.
9) Sumit got good marks in all the subjects. His father gifted him a laptop. He would like to
make Sumit aware of health hazards associated with inappropriate use of laptop. Help his
father to list the points which he should discuss with Sumit.
10) Give Difference between Licensing and Copyright
ANSWERS
1) Option c. Open source software
2) Option b. Permanently
3) Option a. Lithium
4) i) Phishing ii) Identity theft iii) Digital Property
5) Ans. (2) and (3)
6) Option c. A is true but R is false.
7) Option a. Both A and R are true and R is the correct explanation for A
8) i) Give your electronic watse to a certified e-waste cycler.
ii) Donating your outdated technology.
iii) Give back to your electronic companies at drop off points.

9) Hazards associated with excessive use of laptop are:


i) Headache and eyes strain.
ii) Excessive use of laptop may distract him from studies.
iii) He will not be able to use his time properly.
10) Copyright is a type of intellectual property protection and licensing is a kind of risk control
measure that can be applied to control copyright and less exposure, so the licensor (copyright
owner) can grant permission that usually takes the form of a licensing agreement to use its
copyrighted material. This agreement specifies the exact material to be used, purpose of the work
and the duration of the license.
L2
1) In FOSS, source code is hidden from
109
a) All users b) Purchaser c) Only the vendor d) In FOSS source code is not
hidden.
2) Mr. Raghavendra found that after posting some images in social media ,some people were
writing negative messages. This is an instance of
(a) Phishing b) Trolling c) Hacking d) Spamming
3) Sneha found that her picture posted in a social networking site has been merged with an
unknown person and published. What should she do?
a) Ignore the instance
b) Report it to the cyber crime cell
c) Try to delete the posts
d) Enjoy the instance.
4) A person complains that his/her debit/credit card is safe with him still
somebody has done shopping /ATM transaction on this card.
a) Identity theft. b) Bank Fraud c) Cyber theft d) Cyber Crime
Assertion & Reasoning
Mark the correct choice as
a. Both A and R are true and R is the correct explanation for A
b. Both A and R are true and R is not the correct explanation for A
c. A is True but R is False
d. A is false but R is True
5) Assertion (A) : Cyber crime involves the use of computer and network in
attacking computers and networks as well.
Reason(R ) : Cyber bullying is an act of cyber law.
6) Assertion ( A) : Scams committed over the Internet are called Online scams.
Reason ( R) : It is a fraudulent business practice that extracts money from an unsuspecting,
ignorant person called a Scam.
ANSWERS
1) Option d. In FOSS source code is not hidden.
2) Option b. Trolling
3) Option b. Report it to the cyber crime cell.
4) Option a. Identity theft
5) Option c. c. A is True but R is False
6) Option a. Both A and R are true and R is the correct explanation of A

L3
1) Any information created by us that exists in digital form is called
a) Digital footprint b) Cyber print c) Internet print d) Web finger print
2) A fraudulent process that extracts money from an ignorant person is called
a) Spamming b) Phishing c) Scam d) None of these
3) The term Intellectual property rights cover
a) Trademark b) Copyright c) Patents d) All of these
4) Using someone’s Twitter handle to post something will be termed as
110
a) Fraud b) Identity theft c) Online stealing d) Phishing
5) Which of the following are not ways of data protection?
a) Using password b) Using User IDs
c) Using encryption techniques. d) None of these
6) A mail or message sent to a large number of people indiscriminately
without their consent is called ______________.
a) Spam b) Cookies c) Adware d) Malware
7) FOSS stands for __________
a) For open source software
b) Free and open set software
c) Free and open source software
d) None of the above
Short Answer Questions
8) List some health hazards related to excessive use of technology.
9) What is Intellectual Property (IP)? Give some examples.
ANSWERS
1) Option a. Digital footprint
2) Option c. Scam
3) Option d. All of these
4) Option b. Identity theft
5) Option b. Using User IDs
6) Option a. Spam
7) Option c. Free and open source software
8) 1. Neck strain
2. Vision Problem
3. Sense of isolation
4. Sleeping disorder
5. Stress
6. Loss of attention
7. Problem in social relationships of individuals.
8. Computer anxiety
9. Internet addiction etc.
9) It is a property which is scientific, innovatory invention created by a person or group of
persons using their own intellect for ultimate use in commerce and which is already not available
in the public domain.
Following are examples of intellectual property :-
These are an invention relating to a product or any process, a new design, a literary or artistic
work and a trademark (a word, a symbol and /or a logo etc.)

*******************

KENDRIYA VIDYALAYA SANGATHAN, CHENNAI REGION

111

You might also like