Ip Theory 2

Download as pdf or txt
Download as pdf or txt
You are on page 1of 12

3/14/24, 4:46 PM Online Notepad

UNIT – IV: SOCIETAL IMPACTS CHAPTER-5


SOCIETAL IMPACTS

Cyber Safety
Cyber safety is the act all about the responsible and safe use of Internet services by dealing with the risk which
is associated using the Internet. This behaviour helps us to protect our personal information and minimize the
danger online.
When we use Internet we need to be careful about sharing our personal information. Share your personal
information only with the trustworthy sources. If someone succeeds in stealing your personal information it
could create great danger.

Digital Footprint
Digital footprint is data that is left behind when users have been online.
Digital Tattoos: Digital footprints are also termed as Digital Tattoos.
Whatever a person does online , creates a trail or shadow. These trails or traces are termed as digital
footprint.
Digital footprint includes e-mail you sent, information you shared, websites you visited and the activities you
took part online.
Digital footprint is used for several reason for example marketers use your digital footprint to find out what
kind of product you have interested in and a interviewer what kind of activities the candidates perform online,
it gives better idea about the candidate’s personality.

Digital footprint is of two types:


1. Active Digital Footprint: When a user knowingly share the personal data in order to share information about
the user by means of social networking digital platform.
e.g. when user makes a comment or post something on social media.
2. Passive Digital Footprint: When the personal data of the user is collected without letting him know or
collection of personal data of user without the permission of him is known as passive digital footprint.
e.g. when user visits any website traces his physical location using user ’s device IP address.

How can you make your digital footprint positive?


You can make your digital footprint positive by being little careful when you are surfing.
You can do following things:
Always check the content you post on web. If you are not careful about what you do online then there is the
possibility of your negative digital footprint.
Don’t keep the attitude that you can do anything online and no one will come to know.
You should always know what you exactly want because the confusion can create wrong footprint and can
mislead the one who is looking for your digital footprint.

Advantage of digital footprints-:


Digital footprint makes our online experience friendly.
Digital footprint decreases the complexity of the online world.
Without digital footprint, our net surfing may not be easy as it is today.
Digital footprint helps Google Ad Sense to serve as best. Using our digital footprint, Google Ad Sense provides
us appropriate advertisement. If they haven’t used our digital footprint it may happen that when we are
searching for job information and our search is fed with with railway booking information.
These days most of the devices are GPS enabled with digital footprint, online maps provide you best root
possible.

https://onlinenotepad.org/notepad 1/12
3/14/24, 4:46 PM Online Notepad

Net and communication etiquettes (Netiquettes)


Netiquette is a way to communicate over Internet.

1.Be ethical

2.Be respectful

3.Be responsible

Good netiquette:
(i) Don’t send same message again and again, it creates negative effect and irritate other people, no matter how
good this message is.
(ii) Always take permission of other person before sharing their personal information, photos etc.
(iii) Never make bad comments about anyone on social media.
(iv) Never post abusive content on social media.

Do’s
Keep messages and posts brief.
Reread your posts or emails to make sure they say what you intend.
Remember that you leave a digital footprint.
Use discretion.
Include a subject line in an email.
Protect personal information.
Obey copyright laws.
Stay focused and stick to the topic.

Don’ts
Post inflammatory/offensive comments.
Write in ALL CAPS. It is considered as SHOUTING on the net.
Respond to internet trollers/personal attacks.
Post private or embarrassing images/comments.
Use sarcasm.
Violet copyright laws.
Exclude people or talk behind their backs.
Spam others by sending large number of unsolicited e-mails.

https://onlinenotepad.org/notepad 2/12
3/14/24, 4:46 PM Online Notepad

Data protection
It is the process of safeguarding important information from corruption, compromise or loss.
Ability to decide whether or not you want to share some information, who has access to it, for how long, for
what reason and be able to modify some of this information and more.
A large part of a data protection strategy is ensuring that data can be restored quickly after any corruption or
loss.
Protecting data from compromise and ensuring data privacy are other key components of data protection.

There are two key areas of data management used in data protection-
(i) Data life cycle management is the process of automating the movement of critical data to online and offline
storage.
(ii) Information life cycle management is a comprehensive strategy for valuing, cataloguing and protecting
information assets from application and user errors, malware and virus attacks, machine failure or facility
outage and disruptions.

Purpose of data protection-


Storage technologies that can be used to protect data include a disk or tape backup that copies designated
information to a disk based storage array or a tape cartridge device so it can be safely stored.
Mirroring can be used to create an exact replica of a website or files so they are available from more than one
place.
Storage snapshots can automatically generate a set of pictures to information stored on tape or disk, enabling
faster data recovery while continuous data protection backs up all the data in an enterprise whenever a change
is made.

https://onlinenotepad.org/notepad 3/12
3/14/24, 4:46 PM Online Notepad

Intellectual Property
When someone owns a house or a motorcycle, we say that the person owns that property.
Similarly, if someone comes out with a new idea, this original idea is that person’s intellectual property.
Intellectual property refers to the inventions, literary and artistic expressions, designs and symbols, names
and logos.
The ownership of such concepts lies with the creator or the holder of the intellectual property.
This enables the creator or copyright owner to earn recognition or financial benefit by using their creations or
inventions.
Intellectual property is legally protected through copyright patents, trademarks etc.

(i) Copyright:
It grants legal rights to creators for their original works like writing, photograph, audio recordings, video,
sculptures, architectural works, computer software, and other creative works like literary and artistic work.
Copyrights are automatically granted to creators and authors.
Copyright law gives the copyright holder a set of rights, that they alone can avail legally.
The rights include right to copy a work,
right to create derivative works based upon it,
right to distribute copies of the work to the public and right to publicly display or perform the work.
It prevents others from copying, using or selling the work. For example, any writer holds the copyright to his
book.
It would be an infringement of the writer’s copyright if someone used parts of his book without permission.
To use other’s copyrighted material, one needs to obtain a license from them.

(ii) Patent:
It is usually granted for inventions.
The inventor needs to file for patenting the invention.
When a patent is granted, the owner gets an exclusive right to prevent others from using selling or distributing
the protected invention.
Patent gives full control to the patentee to decide whether or how the invention can be used by others.
A patent protects an invention for 20 years, after which it can be freely used.
Recognition and financial benefits right the environment and provide motivation for more creativity and
innovation.

(iii) Trademark:
It includes any visual symbol, word, name, design, slogan, label etc., that distinguishes the brand or commercial
enterprise, from other brands or commercial enterprise.
For example, no company other than ABC can use the ABC brand to sell shoes or clothes.
It also prevents others from using a confusingly similar mark, including words or phrases.

Intellectual Property Rights (IPR)


Intellectual Property Rights are the exclusive rights given to the person over his/her creation for specific time
period.
These rights allow the patents or owner to buy, sell, exchange their licensed goods to different people or
organisations.
Intellectual property rights are largely covered by laws governing to patents.

https://onlinenotepad.org/notepad 4/12
3/14/24, 4:46 PM Online Notepad

Violation of IPR-
Violation of IPR may happen in one of the following ways:

(i) Plagiarism:
Presenting someone else’s idea or works as one’s own idea or work is called plagiarism.
If we copy some contents from Internet, but do not mention the source or the original creator, then it is
considered as an act of plagiarism.
If someone derives an idea or a product from an already existing idea or product, but instead presents it as a
new idea then also it is plagiarism.
It is a serious ethical offense and sometimes considered as an act of fraud.
Even if we take contents that are open for public use, we should cite the author or sources to avoid plagiarism.

Types of Plagiarism:
1. Direct Plagiarism- word to word transcription of a section of someone elses work without attribution and
without quotation marks.
2. Self Plagiarism- occurs when a student submits his or her own previous work or mixes parts of previous work.
3. Mosaic Plagiarism- occurs when a student borrows phrases from a source without using quotation marks.
4. Accidental Plagiarism- occurs when a person neglects to cite their sources or misquotes their sources.

(ii) Copyright Infringement:


Copyright infringement is when we use other person’s copyrighted work without obtaining their permission to
use or we have not paid for it, if it is being sold. Suppose we download an image from the Internet and use it in
our project. But if the owner of the copyright of the image does not permit its free usage, then using such image
even after giving reference of the image in our project is a violation of copyright. Just because it is on the
Internet, does not mean that it is free for use. Hence, check the copyright status of writer ’s work before using it
to avoid plagiarism.

(iii) Trademark Infringement:


Trademark infringement means unauthorised use of other ’s trademark on products and services. An owner of a
trademark may commence legal proceedings against someone who infringes its registered trademark.

https://onlinenotepad.org/notepad 5/12
3/14/24, 4:46 PM Online Notepad

Software License
It is a document that provides legally binding guidelines for the use and distribution of software.
Software licenses typically provide end users with the right to one or more copies of the software without
violating copyrights.

Types of Software License:

Proprietary license
License where the copyright stays with the produces and the user is granted the right to use the software.

GNU General Public License (GPL)


Agreements under which open source are usually licensed.
Provides public license to a software.
Provides users the freedom to run, study, share and modify the software.
Users or companies who distribute GNU licensed work may charge a fee or give them free of charge.

This distinguishes the GPL license from freeware software licenses likes Skype, Adobe acrobat reader that
allow copying for personal use but prohibit commercial distribution or proprietary license where copying is
prohibited by copyright law.

Creative Commons
Creative commons (CC) license is a public copyright license that enables free distribution of a copyrighted
work.
Used for all kinds of creative works like website, music, film, literature.
Non profit organisation.
Aims to build a publicly accessible Global platform where a range of Creative and academic works are shared
free.
Anyone across the globe can access them, share them and even use them for creating their own work out of it
without infringing the copyright or intellectual property rights of the owners
The creative commons organisation provides creative commons license free of charge.
Creative common license is a type of copyright license that enables the free distribution of anybody is
copyrighted work

Apache is the most popular web server software that enables a computer to host one or more websites.
It is open source and free to use hence enabling web hosting companies to offer web hosting solutions at
minimal costs.
Platforms supported by Apache: Linux, Windows and Macintosh operating systems.
Apache web server software is also known as Apache HTTP server.

Free and Open Source Software (FOSS)


Software available freely for anyone and their source code is also open for anyone to access, modify, correct
and improve.
Free and open source software may also be referred to us Free/libre open source software (FLOSS) or free
open source software (FOSS).
One major reason for the growth and use of FOSS technology is because users have access to the source so it
is much easier to fix faults and improve the applications.
For example, Linux Kernel based operating systems like Ubuntu and Fedora come under FOSS,
Some of the popular FOSS tools are office packages, like Libre office, browser like Mozilla Firefox etc.

https://onlinenotepad.org/notepad 6/12
3/14/24, 4:46 PM Online Notepad

Software Piracy-:
Software piracy is the unauthorised use for distribution of software.
Those who purchase a licence for a copy of the software do not have the rights to make additional copies
without the permission of the copyright owner.
It amounts to copyright in French mint regardless of whether it is done for sale for free distribution or for
copiers own use.
One should avoid software piracy.
Using pirated software not only degrades the performance of a computer system but also affect the software
industry which in turn affects the economy of the country

Keywords-:
Open Source:
The term open source refers to something people can modify and share because its design is publicly accessible.
OSS:
An OSS (open source software) refers to freedom to use, share and/or modify the source code and allow
copyrights to other users.
Shareware:
Shareware are copyrighted software that can be shared for a limited period for free on a trial basis with the
understanding that if the user decides to use it, he will pay for it.
Copyleft Licenses:
It allows modification and distribution of software with source code.
Proprietary software (sometimes referred to as closed source software):
is software that legally remains the property of the organisation, group, or individual who created it.

https://onlinenotepad.org/notepad 7/12
3/14/24, 4:46 PM Online Notepad

Cyber Crime-
Criminal activities or offences carried out in a digital environment can be considered as a cyber crime. In such
crimes, either the computer itself is the target or the computer is used as a tool to commit a crime.
Cyber crimes are carried out against either an individual or a group or an organisation or even against a
country, with the intent to directly or indirectly cause physical harm, financial loss or mental harassment.
A cyber criminal may spread viruses and other malwares in order to steal private and confidential data for
blackmailing and extortion.
A Computer virus is a type of malicious code that can copy itself and can have detrimental effect on the
computers, by destroying data or corrupting the system.
A malware is a software designed to specifically gain unauthorised access to computer systems.

1. Hacking
Hacking is the act of unauthorised access to a computer, computer network or any digital system.
Hackers usually have technical expertise of the hardware and software.
They look for bugs to exploit and break into the system.

Hacking, when done with a positive intent is called ethical hacking.


Such ethical hackers are known as white hat hackers.
They are specialists in exploring any vulnerability or loophole during testing of the software.
They help in improving the security of a software.

A non-ethical hacker is the one who tries to gain unauthorised access to computers or networks in order to
steal sensitive data with the intent to damage or bring down systems.
They are called black hat hackers or crackers.
Their primary focus is on security cracking and data stealing.
They use their skills for illegal or malicious purposes.
Such hackers try to break through system securities for identity theft, monetary gain, to bring a competitor or
rival site down, to leak sensitive information etc.

2. Phishing and Fraud e-Mails


Phishing is an unlawful activity where fake websites or e-mails that look original or authentic are presented to
the user to fraudulently collect sensitive and personal details, particularly user names, passwords, banking and
credit card details.
The most common phishing method is through e-mail spoofing where a fake or forged e-mail address is used
and the user presumes it to be from an authentic source.
So you might get an e-mail from an address that looks similar to your bank or educational institution, asking for
your information, but if you look carefully you will see their URL address is fake.
They will often use logos of the original website, making them difficult to recognise if it is real or fake.
Fraud phone calls or text messages are also common these days.

(i) Identity Theft:


Identity thieves increasingly use personal information stolen from computers or computer networks, to
commit fraud by using the data gained unlawfully.
A user’s identifiable personal data like e-mail Id, banking credentials, passport, PAN, Aadhaar number and
various such personal data are stolen and misused by the hacker on behalf of the victim.
This is one type of phishing attack where the intention is largely for monetary gain.

There can be many ways in which the criminal takes advantage of an individual’s stolen identity.
Examples:
Financial identity theft: When the stolen identity is used for financial gain.
Criminal identity theft: Criminals use a victim’s stolen identity to avoid detection of their true identity.
Medical identity theft: Criminals can seek medical drugs or treatment using a stolen identity.

https://onlinenotepad.org/notepad 8/12
3/14/24, 4:46 PM Online Notepad

3. Ransomware
This is another kind of cyber crime where the attacker gains access to the computer and blocks the user from
accessing, usually by encrypting the data.
The attacker blackmails the victim to pay for getting access to the data or sometimes threaten to publish
personal and sensitive information or photographs unless a ransom is paid.
Ransomware can get downloaded when the user visit any malicious or unsecure websites or download
software from doubtful repositories.
Some ransomware are sent as an e-mail attachments in spam mails.
It can also reach our system when we click on a malicious advertisement on the Internet.

Combatting and Preventing Cyber Crime-


The challenges of cyber crime can be mitigated with the twin approach of being alert and taking legal help.
Safety measures to reduce the risk of cyber crime:
Take regular backup of important data
Use an antivirus software
Avoid installing pirated software.
Always download software from known and secure (HTTPs) sites.
Update the system software regularly.
Do not visit or download anything from untrusted websites.
Use strong password for web login, and change it periodically. Use different combinations of alphanumeric
characters including special characters.
Perform online transaction like shopping, ticketing, and other such services only through well known and
secure sites.

Cyber Bullying
Cyberbullying or bullying that takes place over digital devices like cell phones, computers and tablets.
Cyberbullying can occur through SMS, text and apps or online in social media, forums or gaming where people
can view, participate or share content.
Cyberbullying includes sending, posting or sharing negative, harmful, false or mean content about someone
else.
It can include sharing personal or private information about someone else causing embarrassment or
humiliation.

The most common places where cyberbullying occurs are:


Social media such as Facebook Instagram, Snapchat.
Text messaging and messaging apps on mobile or tablet devices.
Instant messaging, direct messaging and online chatting over the Internet.
Online forums, chat rooms and message boards such as Reddit
e-Mail
Online gaming communities eg. MUDS (Multi-User Dungeons)

https://onlinenotepad.org/notepad 9/12
3/14/24, 4:46 PM Online Notepad

Cyber Law
These are the laws that apply to the Internet and Internet related technologies.
Cyber law is one of the newest areas of the legal system.
Cyber law provides legal protections to people using the Internet.
This includes both businesses and everyday citizens.
Cyber law has also been referred to as the “law of the Internet”.

Importance of Cyber law-


It covers all transactions over Internet.
It keeps eyes on all activities over Internet.
It touches every action and every reaction in cyberspace.

Evolution of Cyber law in India-


With an increase in the dependency on the use of technology, the need for cyber law was necessary.
The rise of the 21st century marked the evolution of cyberlaw in India with the Information Technology Act,
2000 (popularly known as IT Act).

India Information Technology Act,2000 (IT Act)


With the growth of Internet, many cases of cyber crimes, frauds, cyber attacks and cyber bullying are
reported.
The nature of fraudulent activities and crimes keeps changing.
To deal with such menace, many countries have come up with legal measures for protection of sensitive
personal data and to safeguard the rights of Internet users.
The Parliament of India passed its first Cyber law the Information Technology (IT) Act, 2000, on the 17
October 2000.
It provides the legal infrastructure for e-commerce in India.

The Government of India’s Information Technology Act, 2000 amended in 2008,


-provides guidelines to the user for the processing, storage and transmission of sensitive information.
-In many Indian states, there are cyber cells in police stations where one can report any cyber crime.
-The act provides legal framework for electronic governance by giving recognition to electronic records and
digital signatures.

Some of the important concepts introduced in the IT Act, 2000 are:


Electronic record
Secure electronic record
Digital signature
Secure digital signature
Certifying authority
Digital signature certificate.

https://onlinenotepad.org/notepad 10/12
3/14/24, 4:46 PM Online Notepad

E-Waste Management
E-waste is actually the old electronic goods that people simply give away to garbage trucks that are then
dumped into landfill or similar sites.
Electronics have a number of harmful elements(Lead,Beryllium,Cadmium,Plastic,Mercury) that react with air
and water to create problems of e-waste such as water, air and soil pollution as well as problems that affect
human beings in the form of diseases.
Thus, everything that falls into electronics category, that you intend to throw away, is e-waste (electronic
waste). This includes computers, laptops, tablets, smart-phones and so on.

Treating e-Waste-
The two methods of treatment of e-waste are Recycling and refurbishing.

E-Waste management Rules in India-


Environmental protection act - 1986
The Environment, Forest, and Climate Change Ministry (MoEF&CC) have announced the E-Waste Management
Rules 2016.
These new rules replaced the earlier E-Waste (Management and Handling) Rules of 2011.

Department of Information and Technology,


Ministry of Communication and Information and Technology
Has issued a comprehensive technical guide on
"Environmental Management for Information and Technology Industry in India"
The industries have to follow the guidelines for recycling and reusing E-waste.

https://onlinenotepad.org/notepad 11/12
3/14/24, 4:46 PM Online Notepad

Awareness about health concerns related to the usage of technology-:


As digital technologies have penetrated into different fields, we are spending more time in front of screens, be it
mobile, laptop, desktop, television, gaming console, music or sound device.
But interacting in an improper posture can be bad for us-both physically and mentally.
Besides, spending too much time on the Internet can be addictive and can have a negative impact on our
physical and psychological well being.

Ergonomics is a branch of science are deals with designing or arranging work places including the furniture
equipments & systems so that it becomes safe and comfortable for the user. Ergonomics helps us in reducing
the strain on our bodies including the fatigue and injuries due to prolonged use.

Impact of technology on our Health-:


(i) Eyes strain:
When we gaze at a screen for long periods of time, we often forget to blink.
Reading the smaller fonts on a smartphone or other portable device can intensify the strain.

(ii) Sleep Disorders:


Late night technology use can interfere with your ability to sleep.
To avoid sleep disruption, try replacing late night technology use with sleep conducive activities such as taking a
bath or reading in bed.

(iii) Physical Inactivity/Obesity:


When we are using technology like computers, video games or TVs, we generally are not exercising.
Spending more time on watching TV or playing video games reduces the time you spend staying active.

(iv) Mental Health:


Social media addiction is linked to a rise in mental health disorders like depression, suicidal ideation,
particularly in teenagers.

https://onlinenotepad.org/notepad 12/12

You might also like