Skip to main content

SOCIETAL IMPACTS NOTES - GRADE XII

 

SOCIETAL IMPACTS

GRADE XII

 

LEARNING OBJECTIVES

At the end of this chapter students will be able to understand

Ÿ         Digital Footprint

Ÿ         Net And Communication Etiquettes

Ÿ         Data Protection

Ÿ         Intellectual Property Rights (IPR)

Ÿ         Plagiarism

Ÿ         Licensing And Copyright

Ÿ         Free And Open Source Software (FOSS)

Ÿ         Cybercrime And Cyber Laws

Ÿ         Hacking

Ÿ         Phishing

Ÿ         Cyber Bullying

Ÿ         Overview Of Indian IT Act

Ÿ         E-Waste: Hazards And Management

Ÿ         Awareness About Health Concerns Related To The Usage Of Technology

 

Digital Footprints

Our “digital footprint” includes traces of our online activities like when we post something online, share content, comment on social media posts and shop online. Even when a website collects our information (IP address, your login details, and other personal information) that we reveal online by installing cookies on our device, we create a digital trail. This includes your IP address, your login details, and other personal information that you reveal online. Information that is posted about us also gets added to our data trail.

Digital footprints can be classified into two broad categories — active and passive footprints — which depends on how our information is acquired.

Active footprints are those which we leave deliberately on the Internet. For e.g. when we post online, send an email, publish a blog post or a tweet, or upload a photo on social media.

 Passive footprints are those that we put up on the internet unintentionally. For example, website collects our information (IP address, your login details, and other personal information) that we reveal online by installing cookies on our device.  Besides this searches and online purchases, online reviews and feedback are among the activities that add passive data traces to your digital footprint.

Manage Your Digital Footprint

A user digital footprint is a very important factor that might leave a great impact on a person’s life and therefore, it should be protected carefully. Following are some tips to protect your digital footprints:

Ÿ         Be consistent and cordial about what you say online

Ÿ         Ensure that you check your privacy settings regularly, especially on social media

Ÿ         Log out the account each time you leave the platform and Delete old accounts

Ÿ         Make regular software updates

Ÿ         Create strong passwords

Ÿ         Avoid using public Wi-Fi and publicly available USB ports

 

Net And Communication Etiquettes

Net and communication etiquettes also known as netiquettes are defined as a set of rules for acceptable online behaviour. Some of the practices for good netiquettes are:

Net Etiquettes

Ÿ         Be Ethical: Obey Copyright Laws. Never copy someone else’s work and post it as your own. It is against copyright law because it is considered stealing.

Ÿ         Be Respectful: Show respect for the opinions of others, even if you don’t agree, and refrain from name-calling. Avoid gossiping or saying anything negative about others.

Ÿ         Be Responsible: Don't forward information sent to you without checking with the authenticity and avoid cyber bullying.

Communication Etiquettes

Ÿ         Make Clear and Brief Points. It is best to use short and clear sentences when trying to explain something.

Ÿ         Use Respectful Language, be polite, kind and courteous.

Social Media Etiquettes

Ÿ         Be Secure: Choose long and strong password, know who you befriend, beware of fake information

Ÿ         Think before you share anything online

 

Data Protection

Personal data is any information relating to you, whether it relates to your private, professional, or public life. In the online environment, where vast amounts of personal data are shared and transferred around the globe instantaneously, it is increasingly difficult for people to maintain control of their personal information. This is where data protection comes in.

Data protection refers to the practices, safeguards, and binding rules put in place to protect your personal information and ensure that you remain in control of it. In short, you should be able to decide whether or not you want to share some information, who has access to it, for how long, for what reason, and be able to modify some of this information, and more.

It's important to use sound practices to keep your sensitive personal information safe and secure. Here are a few best practices for securing your important digital information:

Ÿ         Patching and updating software as soon as options are available.

Ÿ         High-grade encryption for sensitive data.

Ÿ         Upgrading devices when the software is no longer supported by the manufacturer.

Ÿ         Enforcing BYOD security policies, like requiring all devices to use a business-grade VPN service and antivirus protection.

Ÿ         Enforcing strong credentials and multi-factor authentication to encourage better user cybersecurity practices. Encouraging users to start using a password manager can help.

Ÿ         Educating employees on best security practices and ways to avoid socially engineered attacks.

Intellectual Property Rights (IPR)

“Intellectual Property” (IP) refers to the intellectual work of people like inventions, literary and artistic works, designs, and symbols, names and logos etc. From the mobile phones we use to connect with our friends to food we eat, nearly everything we come across in our daily lives has been made possible through IP. It is important to protect intellectual property because it often takes years of hard work and financial investment to turn an idea into a product. If the inventor’s work is used by others without getting due recognition and incentives he may be demotivated and refrain from creating new work and sharing it with others.

This would make it even more difficult for society to benefit from life-changing inventions. IP can be protected in several different ways, allowing the people who invent/create intellectual property to get recognition and are rewarded for their hard work and contribution to the world.

Some of the legal ways to protect intellectual property are:

Ÿ         Trademarks are signs or symbols (e.g. logos, designs, slogans, etc.) which distinguish products or services from those of other businesses and gives the owner the exclusive right to use the mark. 

 

 Domain names

www.google.com, www.youtube.com

Ÿ         Copyright: Copyrights protect creators of original works (e.g. books, photographs, music, paintings, sculpture and films, to computer programs, databases, advertisements, maps and technical drawings). Copyrights generally last for the owner’s lifetime plus 70 years.

Ÿ         Patent: Patents provide exclusive rights over new inventions or improvements to prior inventions. An invention can be a product or a process that provides a new way of doing something or offers a new technical solution to a problem. For utility patents protection lasts for 20 years before entering public domain. In return for patent protection, patent owners are obliged to disclose information on their invention. Patents typically cover inventions like machines, electronics, methods of production, software, methods of doing business, chemicals, and pharmaceuticals. For e.g.,

Ÿ         The Lightbulb: (Patent held by Thomas Alva Edison and Joseph Swan)

Ÿ         The Telephone: (Patent held by Alexander Graham Bell)

Ÿ         The Computer: (Patent held by John Mauchly and J Presper Eckert)

Ÿ         Bluetooth: (Patent held by Jaap Haartsen)

Licensing

A license is an agreement through which a creators/inventor of the original work (i.e., licensor) grants rights to other person (i.e., licensee) to use their work. It hereby allows people to use the copyrighted work legally.

A software licence agreement is a legal document that specifies a number of key terms between a software company or developer and a user in order to allow the software to be used.

The GNU General Public License (GPL), the Creative Commons (CC) and the Apache License are three popular categories of public licenses.

Ÿ         CC licences allow the creator of the work to select how they want others to use the work.  These licences help the creator to give permission for others to use the work in advance under certain conditions. There are six Creative Commons licenses and the public domain dedication tool which give creators a range of options. The best way to decide which is appropriate for you is to think about why you want to share your work, and how you hope others will use that work.

Ÿ         GPL is the most widely used free software license which grants the recipients the freedom to run the software for any purpose, to study the source code and change the software for any purpose, to share the software with others, to share your own modified versions of the software with others.

Ÿ         The Apache Licenseis a permissive free software license written by the Apache Software Foundation (ESF). It allows users to use the software for any purpose, to distribute it, to modify it, and to distribute modified versions of the software under the terms of the license, without concern for royalties.

Violation of IPR

Ÿ         Plagiarism is presenting someone else's work or ideas as our own. For eg copying information from a source without acknowledging it, improper paraphrasing, using someone else’s idea without giving due credits, presenting someone else’s work as your own etc.

Ÿ         Copyright Infringement refers to the use of a copyrighted work by a third party without the knowledge/permission of the owner. Depending on how the work is used in the market, a copyright might be infringed in a variety of ways. For e.g.,

Ÿ         Making and selling copies of the copyrighted work.

Ÿ         Distribution or display of the work through the public exhibition.

Ÿ         Any copyrighted work that is performed or played in front of a paying audience.

Ÿ         Exploitation of the owner’s rights through piracy or reproduction of the work.

Ÿ         Trademark Infringement refers to the violation of the rights of the owner of the registered Trademark. It is an unauthorised use of other persons’ registered trademark on products and services without their permission. The most typical examples of trademark infringement are the use of deceptively similar brand names or logos for related goods and services.

How can you know whether your intellectual property is protectable?

Before patenting your property, it’s a good idea to do a thorough search on the http://www.ipindia.nic.in (Official website of Intellectual Property India). There you can see whether someone else already has patented it or something sufficiently similar to it. The same exercise works for when you want to patent a trademark, product or business name.

Keep in mind that confidentiality is crucial. If your invention is publicly disclosed, you have only a year to file a patent.

 What remedies can be included in an intellectual property dispute?

Ÿ         Confiscation of property that was used to create infringing products

Ÿ         Cease and desist orders in cases of unauthorized use of trademarks

Ÿ         Monetary damages to compensate for losses

 

FREE AND OPEN SOURCE SOFTWARE (FOSS)

Acronym for Free or Open Source Software. FOSS programs are those that have licenses that allow users to freely run the program for any purpose, modify the program as they want, and also to freely distribute copies of either the original version or their own modified version.

One major reason for the growth and use of FOSS technology is because users have access to the source so it is much easier to fix faults and improve the applications. In combination with the open license, this simplifies the development process for many enterprises and gives them flexibility that simply isn't available within the confines of a proprietary or commercial product.

Some of the common examples of FOSS are:

Linux, Ubuntu, Google Chrome OS: Operating systems and Desktop environments

Android, Symbian smart phone OS: Phone Operating System

GIMP, Inkspace, Blender, Audacity: Graphics and multimedia

Python, PHP, Pearl, MySQL, Java: Programming related

 

Cybercrime And Cyber Laws

Cybercrime is criminal activity that either targets or uses a computer, a computer network or a networked device. Most cybercrime falls under two main categories:

Ÿ         Criminal activity that targets: Cybercrime that targets computers often involves viruses and other types of malware. Cybercriminals may infect computers with viruses and malware to damage devices or stop them working. They may also use malware to delete or steal data.

Ÿ         Criminal activity that uses: computers to commit other crimes: Cybercrime that uses computers to commit other crimes may involve using computers or networks to spread malware, illegal information or illegal images.

 

HACKING

Hacking is an unauthorized entry into a network or a computer to steal or manipulate information, data or files. The person involved in this process is named as a hacker. Computer hacking is done using several types of programs such as Rootkit, Trojan, Keylogger etc. Hackers also employ techniques like browser hijacks, spoofing, phishing etc. to capture user’s personal or financial details.

 PHISHING

Phishing uses electronic communication to exploit an end user into providing personal information or clicking on malicious links.  In this a type of cybercrime a person posing as a genuine organisation contacts a target or targets via email, phone, or text message to persuade them to provide sensitive data such as personally identifying information, banking and credit card information, and passwords. The data is then utilised to get access to sensitive accounts, which can lead to identity theft and financial loss.

Some of the common types of phishing attacks include Spear Phishing(email phishing), vishing(Voice Phishing), smishing(SMS Phishing), Clone Phishing, and Whaling(targeting high profile).  These techniques are used by hackers for their specific motives.

 CYBER BULLYING

Cyberbullying is bullying that takes place over digital devices like cell phones, computers, and tablets. Cyberbullying can occur through SMS, Text, and apps, or online in social media, forums, or gaming where people can view, participate in, or share content. Cyberbullying includes sending, posting, or sharing negative, harmful, false, or mean content about someone else. It can include sharing personal or private information about someone else causing embarrassment or humiliation. Some cyberbullying crosses the line into unlawful or criminal behaviour.

Tips to Combat Cyber Crimes

Ÿ         Keep software and operating system updated

Ÿ         Use anti-virus software and keep it updated

Ÿ         Use strong passwords

Ÿ         Never open attachments in spam emails

Ÿ         Do not click on links in spam emails or untrusted websites

Ÿ         Do not give out personal information unless secure

Ÿ         Be mindful of which website URLs you visit

Ÿ         Download software from authorized websites

  Indian IT Act

The Information Technology Act, 2000 (also known as ITA-2000, or the IT Act) is an Act of the Indian Parliament (No 21 of 2000) notified on 17 October 2000. It is the primary law in India dealing with cybercrime and electronic commerce.

The act provides legal framework for electronic governance by giving recognition to electronic records and digital signatures. It also outlines cyber crimes and penalties for them.

 

E-Waste: Hazards And Management

E-waste broadly covers waste from all electronic and electrical appliances and comprises of items such as computers, mobile phones, digital music recorders/players, refrigerators, washing machines, televisions (TVs) and many other household consumer items.

Improper handling of e-waste is detrimental to the environment and mankind. Since this waste is nothing but a combination of plastics and toxic chemicals, these get released into the environment. Pollutants such as dioxins and furans from polyvinyl chloride, lead, beryllium, cadmium, mercury, etc. get into our environment and cause the following health hazards:

Ÿ         Reproductive issues

Ÿ         Developmental problems

Ÿ         Damage to the immune system

Ÿ         Interference with regulatory hormones

Ÿ         Damage to the nervous system

Ÿ         Kidney damage

Ÿ         Hamper’s brain development in children

Ÿ         May lead to lung cancer

Ÿ         Chronic beryllium disease

Ÿ         Skin ailments

Ÿ         Cadmium accumulations on liver and kidney

Ÿ         Asthmatic bronchitis

Ÿ         DNA damage

Ÿ         Muscle weakness

Ÿ         Endocrine system disruption

 Exposure to harmful chemicals present in e-waste can lead to severe health hazards that are at times fatal. These toxins enter our body through inhalation, skin absorption, or ingestion. After that, humans run the risk of developing any of the above-mentioned conditions. It is time that we find out sustainable ways to dispose of e-waste, ones that are organised and safe. Organisations like Cerebra Integrated Technologies are striving to make this world safer and better through activities like deploying collection vans, tying up with local clubs and schools to increase awareness, and more.

Awareness About Health Concerns Related To The Usage Of Technology

Technology can have a large impact on users' mental and physical health. Being overly connected can cause psychological issues such as distraction, narcissism, expectation of instant gratification, and even depression. Too much

screen time can also cause behavioral problems, less time for play and loss of social skills, obesity, sleep problems and violence.

Beside affecting users' mental health, use of technology can also have negative repercussions on physical health causing vision problems, hearing loss, and neck strain. Prolonged use of computers, tablets, and cellphones can lead to digital eye strain, repetitive strain injuries of the fingers, thumbs, and wrists and can interfere with sleep. You can take the following steps to reduce these issues:

Ÿ         Take frequent breaks to stretch

Ÿ         Create an ergonomic workspace

Ÿ         Maintain proper posture while using your devices

Ÿ         Following the 20-20-20 rule, taking a 20-second break from the screen every 20 minutes and looking at something 20 feet away

Ÿ         Reduce overhead lighting to eliminate screen glare

Ÿ         Position yourself at arm's distance away from the screen for proper viewing distance when at a computer

Ÿ         Increase text size on devices to ease content viewing

 

                  x-------------------------------------------------x---------------------------------------------x

Comments

Popular posts from this blog

CS - SORTING/SEARCHING ALGORITHMS

  SORTING ALGORITHMS                       SORTING ALGORITHM PDF LINK #Bubble Sort          ·        The outer loop iterates through the entire array. ·        The inner loop compares adjacent elements and swaps them if they are out of order. ·        The outer loop runs n times, and each pass moves the largest element to its correct position. arr=[3,8,5,2,1] n = len(arr) print(n) for i in range(n):  #traverse through all the elements         # Last i elements are already sorted, no need to check them         for j in range(0, n-i-1):              # Swap if the element found is greater than the next element              if arr[j] > arr[j+1]:               ...

GRADE XI - NESTED FOR LOOP

                                                         NESTED FOR LOOP 1. for var1 in range(3):      print(var1,"OUTER LOOP")          # 0 outer loop       1 outer loop      2 outer loop          for var2 in range(2):                  print(var2+1,"INNER LOOP")    #1  2 inner loop     1  2  inner loop   1 2 inner loop  2. Print the following pattern using for loop: 1  1 2  1 2 3  1 2 3 4  Sol: for r in range(1,5):   #ROWS     for c in range(1,r+1):   #COLUMNS         print(c,end=" ")     print() 3. Print the following pattern using for loop: @  @ @  @ @ @...

LIST IN PYTHON - 14TH AUG

  LIST IN PYTHON BEGINNERS PRACTICE QUESTIONS 1. Creating List by accepting data from user List1=[] #Empty list n=int(input("Enter number of elements"))    i=0 while i < n:     num= int(input("Enter element " + str(i) + ": "))     List1+=[num]       i+=1 print(List1) OR #Creating List by accepting data from user List1=[ ] n=int(input("Enter number of elements"))   i=0 while i < n:     List1+=[int(input("Enter the element"))]       i+=1     print(List1) 2.Write a program to input the size and the list of elements from user. Count the number of elements  which are divisible by 5 list1= [ ] s =int (input("Enter no of elements")) for i in range(s):     list1 += [int (input("Enter the Elements"))] count=0 for num in list1:         if num % 5 ==0:             count = count+1 print("No. of elements divisible by 5--",c...