Unit 4 Societal Impacts
Unit 4 Societal Impacts
Unit 4 Societal Impacts
SOCIETAL IMPACTS
MIND MAP
BE ETHICAL
DIGITAL BE PRECISE
SOCIETY NET ETIQUETTES
&
BE POLITE
NETIZEN
BE CREDIBLE
BE SECURE
COMMUNICATION
ETIQUETTES
101
BE RELIABLE
DIGITAL FOOTPRINT
The digital footprint is created knowingly or unknowingly while using the internet. Wherever
data is asked to fill up for the interaction you are leaving your digital footprint. Whatever data we
are providing through the internet on websites or apps, it may be used for any purposes including
showing relevant ads to your devices, or it can be misused or exploited for any other purposes.
Net Etiquettes
No Copyright Share the Respect Diversity Respect Privacy Don’t feed Avoid Cyber
Violation expertise the tr oll bullying
• No copyright violation: While uploading media like audio, video, or images and creating
content we should not use any material created by others without their consent. We should
always try to make our own content.
• Share the expertise: You can share your knowledge to help people on the internet. There
are many platforms like a blog, you tube, podcast and affiliate marketing etc. You should
follow the simple stuff before sharing your knowledge on the internet. The information
should be true.
102
• Respect Privacy: We should not share anything on the internet related to others without their
consent. This is called respect for privacy.
• Respect Diversity: There is a different kind of people having different kind of mindset and
opinion, knowledge, experience, culture and other aspects. So we have to respect their
diversity in the groups or community or forum.
• Avoid cyber bullying: Cyber bullying refers to the activities done internet with an
intention to hurt someone or insult someone, degrading or intimidating online
behaviour such as spreading or sharing rumours without any knowledge or fact check
on the ground, sharing threats online, posting someone’s personal information, sexual
harassment or comments publicly ridicule. These type of activities have very serious
impacts on the victims. Always remeber, your activities can be tracked through your
digital footprints.
MIND MAP
COPYRIGHT
PATENT
IPR
TRADEMARK
LICENSING
PLAGIARISM
VIOLATION OF IPR
COPYRIGHT
INFRINGEMENT
DATA
PROTECTION TRADEMARK
PUBLIC ACCESS AND INFRINGEMENT
OPEN SOURCE
SOFTWARE
103
DATA PROTECTION
Security and control on data stored digitally to avoid any inconvenience, harm, loss or
embarrassment.
Each country has its own data protection law to ensure right protection of data from any
changes or breach.
If a person owns a house it is considered as his own property. Similarly, if a person is posting
something with his unique ideas and concepts is called a person’s intellectual property. Intellectual
Property refers to inventions, literary and artistic expressions, designs and symbols, names and logos.
The Intellectual Property Right gives ownership to the creator of the Intellectual Property
holder. By this, they can get recognition and financial benefits from their property. These intellectual
properties are legally protected by copyrights, patents, trademarks, etc.
Copyrights:
Copyrights refers to the legal rights to use a material like writing, articles, photographs,
audios, videos, software or any other literacy or artistic work. Copyrights are automatically granted
to the creators or the owners.
Patent:
The patents are given for the inventions. Here the creator needs to apply for the invention.
When the patent is granted the owner gets rights to prevent others from using, selling or distributing
the protected invention. Patent gives full control to the patentee to decide how others can use the
invention. A patent protects an invention for 20 years, after that public can use it freely.
Trademark:
Trademark is applicable for the visual symbol, word, name, design, slogan, label etc. for the
product. It provides uniqueness for the other brands and commercial enterprise. It also gives
recognition to the company. The trademark product denoted by ® or ™ symbols. There is no expiry
time for the trademark.
Licensing:
Similarly, a software license is an agreement that provides legal rights to the authorised use
of digital material. All the software, digital documents or games you are downloading from the
104
internet provides the license agreement to use the material. If anyone is not following will be
considered a criminal offence.
Violation of IPR:
Knowingly or unknowingly, people are violating IPR while doing work. So the violation of
IPR done in following ways:
✓ Plagiarism
✓ Copyright Infringement
✓ Trademark Infringement
Plagiarism:
Plagiarism refers to copy or share the intellectual property of someone on the internet without
giving any credit or any mention of the creator. Sometimes if you derived an idea or product which
is already available, then also it is considered plagiarism. Sometimes it is also considered fraud.
Whenever you are using any online material for your personal use or for any purpose, always cite
the author and source to avoid plagiarism.
Copyright Infringement:
When you use the work of others without taking their written permission or don’t paid for
that using that is considered as copyright infringement. If you download an image from google and
use in your work even after giving the credit or reference you are violating copyright. So before
downloading any content check it for copyright violation.
Trademark Infringement:
For the encouragement towards the innovation and new creations, the way of accessing the
material and resources should be available. So there are some public access and open-source licenses
are made for them. Open source allows using the material without any special permission.
Some software is there which are available for free of cost and allows redistribution. User
can use them, copy them and redistribute them. They are available with modifiable source code. Free
and Open Source Software (FOSS) is a large community of users and developers who are
contributing towards open source software. These tools are Linux, Ubuntu, open office, Firefox are
examples of open source software.
Creative common:
105
✓ Creative common is non-profit organization provides public CC license free of charge.
✓ CC license is governed by Copyright law.
✓ CC is used for all kind of creative works like websites, music, film, literature etc.
✓ Six different Creative Commons licenses:
❖ CC BY,
❖ CC BY-SA,
❖ CC BY-NC,
❖ CC BY-ND,
❖ CC BY-NC-SA,
❖ CC BY-NC-ND
Among these, CC BY is the most open license.
Cyber crime:
The cybercrime covers phishing, credit card frauds, illegal downloading, cyber bullying,
creation and distribution of viruses, spam etc. These type of activities increasing day by day through
hacking, ransomware like attacks, denial-of-service attack, phishing, email fraud, banking fraud and
identity theft.
Hacking:
Hacking refers to entering into someone’s account without the user’s consent or stealing login
information from someone’s account and unauthorized access to data. When people share them on
the internet through different websites like emails, online shopping etc. some expert people trying to
break the system security and gain unauthorized access.
If this hacking is done for positive intent then it is known as Ethical Hacking or White Hat
Hacking. The hacker is known as Ethical Hacker or White Hat Hacker. They help to protect the
system from hacking and improves the security of the system.
A Black Hat Hacker or Unethical Hacker tries to gain untheorized access and steal the
sensitive information with the aim to damage or break down the system. Their main focus is security
cracking and stealing the sensitive information.
Phishing:
Phishing is a type of attack on a computer device where the attacker tries to find the sensitive
information of users in a fraud manner through electronic communication by intending to be from
a related trusted organization in an automated manner.
Ransomware:
Ransomware is a form of malicious software that prevents computer users from accessing
their data by encrypting it. Cybercriminals use it to extort money from individuals or organizations
whose data they have hacked, and they hold the data hostage until the ransom is paid.
If the cybercriminals do not pay the ransom within the specified time frame, the data may
leak to the public or be permanently damaged. One of the most serious issues that businesses face
is ransomware.
106
Steps to stop Ransomware:
▪ Avoid Unverified Links:
▪ Frequently Update Your Operating System and Software:
▪ Make a System Backup:
▪ Restrict Access To Your Data:
▪ Disable vulnerable plug-ins:
▪ Create Strong Passwords:
Indian Information Technology Act (IT Act)
The Indian IT Act provides guidelines and rules to the user on the processing, storage and
transmission of sensitive information. The states of our country have their own cyber cells in the
police station to report cybercrime. The IT act provides legal provisions and implications against
cybercrime. If the cybercrime is proved then the accused may get the penalties also.
• Computers
• Televisions
• VCRs
• Stereos
• Copiers, and
• Fax machines
Impacts of E-Waste on the humans.
Electronic devices are made up of metals and elements like lead, beryllium, cadmium,
plastics, etc. Out of these materials most of them are difficult to recycle. These materials are very
toxic and unsafe for human beings because they may cause disease like cancer.
E-Waste management:
• Reduce: Reduce the purchase of electronic devices by using some alternates or as per
the need only. They can only be discarded only after their useful life ends. Good
maintenance of these devices increases its life.
• Reuse: The devices can be modified and reused for other purposes. The discarded
devices can be supplied or sold to someone who can use them. The process of re-
selling old electronic goods at lower prices is called refurbishing.
• Recycle: Recycling refers to the process of conversion of electronic devices into
something else which can be used again and again. The e-waste which cannot be
107
recycled can be repaired re-used. Many NGOs provide doorstep services to collect e-
waste.
Recycle Reduce
Reuse
According to the Environmental Protection Act, 1986 - “Polluter pays Principle” means that
anyone causing the pollution will pay for the damage caused. Any kind of violation will be punished
according to this act. The Central Pollution Control Board(CPCB) has issued guidelines for the
proper handling and disposal of e-waste. The guideline says that the manufacture of the product will
be responsible for the disposal of the product when it becomes e-waste.
The Department of Information Technology (DIT) issued a comprehensive technical guide
on “Environmental Management for Information Technology Industry in India.
WORKSHEET
L1
1) Jack is a good programmer and wants to contribute to the features of one of the softwares,
that he uses. What kind of software he can contribute to?
a) Proprietary software b) Free software
c) Open source software d) Shareware
2) Digital footprints are stored ______________
a) Temporarily (for few days) c) for 7 days only
b) Permanently d) for 3 days
3) What is hazardous pollutant released from mobile phone ?
a) Lithium b) Barium c) Lead d) Copper
L3
1) Any information created by us that exists in digital form is called
a) Digital footprint b) Cyber print c) Internet print d) Web finger print
2) A fraudulent process that extracts money from an ignorant person is called
a) Spamming b) Phishing c) Scam d) None of these
3) The term Intellectual property rights cover
a) Trademark b) Copyright c) Patents d) All of these
4) Using someone’s Twitter handle to post something will be termed as
110
a) Fraud b) Identity theft c) Online stealing d) Phishing
5) Which of the following are not ways of data protection?
a) Using password b) Using User IDs
c) Using encryption techniques. d) None of these
6) A mail or message sent to a large number of people indiscriminately
without their consent is called ______________.
a) Spam b) Cookies c) Adware d) Malware
7) FOSS stands for __________
a) For open source software
b) Free and open set software
c) Free and open source software
d) None of the above
Short Answer Questions
8) List some health hazards related to excessive use of technology.
9) What is Intellectual Property (IP)? Give some examples.
ANSWERS
1) Option a. Digital footprint
2) Option c. Scam
3) Option d. All of these
4) Option b. Identity theft
5) Option b. Using User IDs
6) Option a. Spam
7) Option c. Free and open source software
8) 1. Neck strain
2. Vision Problem
3. Sense of isolation
4. Sleeping disorder
5. Stress
6. Loss of attention
7. Problem in social relationships of individuals.
8. Computer anxiety
9. Internet addiction etc.
9) It is a property which is scientific, innovatory invention created by a person or group of
persons using their own intellect for ultimate use in commerce and which is already not available
in the public domain.
Following are examples of intellectual property :-
These are an invention relating to a product or any process, a new design, a literary or artistic
work and a trademark (a word, a symbol and /or a logo etc.)
*******************
111