SOCIETAL
IMPACTS
GRADE
XII
LEARNING OBJECTIVES
At the end of this
chapter students will be able to understand
Ÿ Digital Footprint
Ÿ Net And Communication Etiquettes
Ÿ Data Protection
Ÿ Intellectual Property Rights (IPR)
Ÿ Plagiarism
Ÿ Licensing And Copyright
Ÿ Free And Open Source Software (FOSS)
Ÿ Cybercrime And Cyber Laws
Ÿ Hacking
Ÿ Phishing
Ÿ Cyber Bullying
Ÿ Overview Of Indian IT Act
Ÿ E-Waste: Hazards And Management
Ÿ Awareness About Health Concerns Related To The Usage Of
Technology
Digital Footprints
Our “digital footprint”
includes traces of our online activities like when we post something online,
share content, comment on social media posts and shop online. Even when a
website collects our information (IP address, your login details, and other personal
information) that we reveal online by installing cookies on our device, we
create a digital trail. This includes your IP address, your login details, and
other personal information that you reveal online. Information that is posted
about us also gets added to our data trail.
Digital footprints can be
classified into two broad categories — active and passive footprints — which
depends on how our information is acquired.
Active footprints are
those which we leave deliberately on the Internet. For e.g. when we post
online, send an email, publish a blog post or a tweet, or upload a photo on
social media.
Manage Your Digital
Footprint
A user digital footprint
is a very important factor that might leave a great impact on a person’s life
and therefore, it should be protected carefully. Following are some tips to
protect your digital footprints:
Ÿ Be consistent and cordial about what you say online
Ÿ Ensure that you check your privacy settings regularly,
especially on social media
Ÿ Log out the account each time you leave the platform and
Delete old accounts
Ÿ Make regular software updates
Ÿ Create strong passwords
Ÿ Avoid using public Wi-Fi and publicly available USB ports
Net And Communication
Etiquettes
Net and communication
etiquettes also known as netiquettes are defined as a set of rules for
acceptable online behaviour. Some of the practices for good netiquettes are:
Net Etiquettes
Ÿ Be Ethical: Obey Copyright Laws. Never copy someone else’s
work and post it as your own. It is against copyright law because it is
considered stealing.
Ÿ Be Respectful: Show respect for the opinions of others, even
if you don’t agree, and refrain from name-calling. Avoid gossiping or saying
anything negative about others.
Ÿ Be Responsible: Don't forward information sent to you
without checking with the authenticity and avoid cyber bullying.
Communication Etiquettes
Ÿ Make Clear and Brief Points. It is best to use short and
clear sentences when trying to explain something.
Ÿ Use Respectful Language, be polite, kind and courteous.
Social Media Etiquettes
Ÿ Be Secure: Choose long and strong password, know who you
befriend, beware of fake information
Ÿ Think before you share anything online
Data Protection
Personal data is any
information relating to you, whether it relates to your private, professional,
or public life. In the online environment, where vast amounts of personal data
are shared and transferred around the globe instantaneously, it is increasingly
difficult for people to maintain control of their personal information. This is
where data protection comes in.
Data protection refers to
the practices, safeguards, and binding rules put in place to protect your
personal information and ensure that you remain in control of it. In short, you
should be able to decide whether or not you want to share some information, who
has access to it, for how long, for what reason, and be able to modify some of
this information, and more.
It's important to use
sound practices to keep your sensitive personal information safe and secure.
Here are a few best practices for securing your important digital information:
Ÿ Patching and updating software as soon as options are
available.
Ÿ High-grade encryption for sensitive data.
Ÿ Upgrading devices when the software is no longer supported
by the manufacturer.
Ÿ Enforcing BYOD security policies, like requiring all devices
to use a business-grade VPN service and antivirus protection.
Ÿ Enforcing strong credentials and multi-factor authentication
to encourage better user cybersecurity practices. Encouraging users to start
using a password manager can help.
Ÿ Educating employees on best security practices and ways to
avoid socially engineered attacks.
Intellectual Property
Rights (IPR)
“Intellectual Property”
(IP) refers to the intellectual work of people like inventions, literary and
artistic works, designs, and symbols, names and logos etc. From the mobile
phones we use to connect with our friends to food we eat, nearly everything we
come across in our daily lives has been made possible through IP. It is
important to protect intellectual property because it often takes years of hard
work and financial investment to turn an idea into a product. If the inventor’s
work is used by others without getting due recognition and incentives he may be
demotivated and refrain from creating new work and sharing it with others.
This would make it even
more difficult for society to benefit from life-changing inventions. IP can be
protected in several different ways, allowing the people who invent/create
intellectual property to get recognition and are rewarded for their hard work
and contribution to the world.
Some of the legal ways to
protect intellectual property are:
Ÿ Trademarks are signs or symbols (e.g. logos, designs,
slogans, etc.) which distinguish products or services from those of other
businesses and gives the owner the exclusive right to use the mark.
www.google.com,
www.youtube.com
Ÿ Copyright: Copyrights protect creators of original works
(e.g. books, photographs, music, paintings, sculpture and films, to computer
programs, databases, advertisements, maps and technical drawings). Copyrights
generally last for the owner’s lifetime plus 70 years.
Ÿ Patent: Patents provide exclusive rights over new inventions
or improvements to prior inventions. An invention can be a product or a process
that provides a new way of doing something or offers a new technical solution
to a problem. For utility patents protection lasts for 20 years before entering
public domain. In return for patent protection, patent owners are obliged to
disclose information on their invention. Patents typically cover inventions
like machines, electronics, methods of production, software, methods of doing
business, chemicals, and pharmaceuticals. For e.g.,
Ÿ The Lightbulb: (Patent held by Thomas Alva Edison and Joseph
Swan)
Ÿ The Telephone: (Patent held by Alexander Graham Bell)
Ÿ The Computer: (Patent held by John Mauchly and J Presper
Eckert)
Ÿ Bluetooth: (Patent held by Jaap Haartsen)
Licensing
A license is an agreement
through which a creators/inventor of the original work (i.e., licensor) grants
rights to other person (i.e., licensee) to use their work. It hereby allows
people to use the copyrighted work legally.
A software licence
agreement is a legal document that specifies a number of key terms between a
software company or developer and a user in order to allow the software to be
used.
The GNU General Public
License (GPL), the Creative Commons (CC) and the Apache License are three
popular categories of public licenses.
Ÿ CC licences allow the creator of the work to select how they
want others to use the work. These
licences help the creator to give permission for others to use the work in
advance under certain conditions. There are six Creative Commons licenses and
the public domain dedication tool which give creators a range of options. The
best way to decide which is appropriate for you is to think about why you want
to share your work, and how you hope others will use that work.
Ÿ GPL is the most widely used free software license which
grants the recipients the freedom to run the software for any purpose, to study
the source code and change the software for any purpose, to share the software
with others, to share your own modified versions of the software with others.
Ÿ The Apache Licenseis a permissive free software license
written by the Apache Software Foundation (ESF). It allows users to use the
software for any purpose, to distribute it, to modify it, and to distribute
modified versions of the software under the terms of the license, without
concern for royalties.
Violation of IPR
Ÿ Plagiarism is presenting someone else's work or ideas as our
own. For eg copying information from a source without acknowledging it,
improper paraphrasing, using someone else’s idea without giving due credits,
presenting someone else’s work as your own etc.
Ÿ Copyright Infringement refers to the use of a copyrighted
work by a third party without the knowledge/permission of the owner. Depending
on how the work is used in the market, a copyright might be infringed in a
variety of ways. For e.g.,
Ÿ Making and selling copies of the copyrighted work.
Ÿ Distribution or display of the work through the public
exhibition.
Ÿ Any copyrighted work that is performed or played in front of
a paying audience.
Ÿ Exploitation of the owner’s rights through piracy or
reproduction of the work.
Ÿ Trademark Infringement refers to the violation of the rights
of the owner of the registered Trademark. It is an unauthorised use of other
persons’ registered trademark on products and services without their
permission. The most typical examples of trademark infringement are the use of
deceptively similar brand names or logos for related goods and services.
How can you know whether
your intellectual property is protectable?
Before patenting your
property, it’s a good idea to do a thorough search on the
http://www.ipindia.nic.in (Official website of Intellectual Property India).
There you can see whether someone else already has patented it or something
sufficiently similar to it. The same exercise works for when you want to patent
a trademark, product or business name.
Keep in mind that
confidentiality is crucial. If your invention is publicly disclosed, you have
only a year to file a patent.
Ÿ Confiscation of property that was used to create infringing
products
Ÿ Cease and desist orders in cases of unauthorized use of
trademarks
Ÿ Monetary damages to compensate for losses
FREE AND OPEN SOURCE
SOFTWARE (FOSS)
Acronym for Free or Open
Source Software. FOSS programs are those that have licenses that allow users to
freely run the program for any purpose, modify the program as they want, and
also to freely distribute copies of either the original version or their own
modified version.
One major reason for the
growth and use of FOSS technology is because users have access to the source so
it is much easier to fix faults and improve the applications. In combination
with the open license, this simplifies the development process for many enterprises
and gives them flexibility that simply isn't available within the confines of a
proprietary or commercial product.
Some of the common
examples of FOSS are:
Linux, Ubuntu, Google
Chrome OS: Operating systems and Desktop environments
Android, Symbian smart
phone OS: Phone Operating System
GIMP, Inkspace, Blender,
Audacity: Graphics and multimedia
Python, PHP, Pearl,
MySQL, Java: Programming related
Cybercrime And Cyber Laws
Cybercrime is criminal
activity that either targets or uses a computer, a computer network or a
networked device. Most cybercrime falls under two main categories:
Ÿ Criminal activity that targets: Cybercrime that targets
computers often involves viruses and other types of malware. Cybercriminals may
infect computers with viruses and malware to damage devices or stop them
working. They may also use malware to delete or steal data.
Ÿ Criminal activity that uses: computers to commit other
crimes: Cybercrime that uses computers to commit other crimes may involve using
computers or networks to spread malware, illegal information or illegal images.
HACKING
Hacking is an
unauthorized entry into a network or a computer to steal or manipulate
information, data or files. The person involved in this process is named as a
hacker. Computer hacking is done using several types of programs such as
Rootkit, Trojan, Keylogger etc. Hackers also employ techniques like browser
hijacks, spoofing, phishing etc. to capture user’s personal or financial
details.
Phishing uses electronic
communication to exploit an end user into providing personal information or
clicking on malicious links. In this a
type of cybercrime a person posing as a genuine organisation contacts a target
or targets via email, phone, or text message to persuade them to provide
sensitive data such as personally identifying information, banking and credit
card information, and passwords. The data is then utilised to get access to
sensitive accounts, which can lead to identity theft and financial loss.
Some of the common types
of phishing attacks include Spear Phishing(email phishing), vishing(Voice
Phishing), smishing(SMS Phishing), Clone Phishing, and Whaling(targeting high
profile). These techniques are used by
hackers for their specific motives.
Cyberbullying is bullying
that takes place over digital devices like cell phones, computers, and tablets.
Cyberbullying can occur through SMS, Text, and apps, or online in social media,
forums, or gaming where people can view, participate in, or share content.
Cyberbullying includes sending, posting, or sharing negative, harmful, false,
or mean content about someone else. It can include sharing personal or private
information about someone else causing embarrassment or humiliation. Some
cyberbullying crosses the line into unlawful or criminal behaviour.
Tips to Combat Cyber
Crimes
Ÿ Keep software and operating system updated
Ÿ Use anti-virus software and keep it updated
Ÿ Use strong passwords
Ÿ Never open attachments in spam emails
Ÿ Do not click on links in spam emails or untrusted websites
Ÿ Do not give out personal information unless secure
Ÿ Be mindful of which website URLs you visit
Ÿ Download software from authorized websites
The Information
Technology Act, 2000 (also known as ITA-2000, or the IT Act) is an Act of the
Indian Parliament (No 21 of 2000) notified on 17 October 2000. It is the
primary law in India dealing with cybercrime and electronic commerce.
The act provides legal
framework for electronic governance by giving recognition to electronic records
and digital signatures. It also outlines cyber crimes and penalties for them.
E-Waste: Hazards And
Management
E-waste broadly covers
waste from all electronic and electrical appliances and comprises of items such
as computers, mobile phones, digital music recorders/players, refrigerators,
washing machines, televisions (TVs) and many other household consumer items.
Improper handling of
e-waste is detrimental to the environment and mankind. Since this waste is
nothing but a combination of plastics and toxic chemicals, these get released
into the environment. Pollutants such as dioxins and furans from polyvinyl
chloride, lead, beryllium, cadmium, mercury, etc. get into our environment and
cause the following health hazards:
Ÿ Reproductive issues
Ÿ Developmental problems
Ÿ Damage to the immune system
Ÿ Interference with regulatory hormones
Ÿ Damage to the nervous system
Ÿ Kidney damage
Ÿ Hamper’s brain development in children
Ÿ May lead to lung cancer
Ÿ Chronic beryllium disease
Ÿ Skin ailments
Ÿ Cadmium accumulations on liver and kidney
Ÿ Asthmatic bronchitis
Ÿ DNA damage
Ÿ Muscle weakness
Ÿ Endocrine system disruption
Exposure to harmful chemicals present in
e-waste can lead to severe health hazards that are at times fatal. These toxins
enter our body through inhalation, skin absorption, or ingestion. After that,
humans run the risk of developing any of the above-mentioned conditions. It is
time that we find out sustainable ways to dispose of e-waste, ones that are
organised and safe. Organisations like Cerebra Integrated Technologies are
striving to make this world safer and better through activities like deploying
collection vans, tying up with local clubs and schools to increase awareness,
and more.
Awareness About Health
Concerns Related To The Usage Of Technology
Technology can have a
large impact on users' mental and physical health. Being overly connected can
cause psychological issues such as distraction, narcissism, expectation of
instant gratification, and even depression. Too much
screen time can also
cause behavioral problems, less time for play and loss of social skills,
obesity, sleep problems and violence.
Beside affecting users'
mental health, use of technology can also have negative repercussions on
physical health causing vision problems, hearing loss, and neck strain.
Prolonged use of computers, tablets, and cellphones can lead to digital eye
strain, repetitive strain injuries of the fingers, thumbs, and wrists and can
interfere with sleep. You can take the following steps to reduce these issues:
Ÿ Take frequent breaks to stretch
Ÿ Create an ergonomic workspace
Ÿ Maintain proper posture while using your devices
Ÿ Following the 20-20-20 rule, taking a 20-second break from
the screen every 20 minutes and looking at something 20 feet away
Ÿ Reduce overhead lighting to eliminate screen glare
Ÿ Position yourself at arm's distance away from the screen for
proper viewing distance when at a computer
Ÿ Increase text size on devices to ease content viewing
x-------------------------------------------------x---------------------------------------------x
Comments
Post a Comment