societal impact
societal impact
societal impact
LEARNING OBJECTIVES
At the end of this chapter students will be able to understand
• Digital Footprint
• Net And Communication Etiquettes
• Data Protection
• Intellectual Property Rights (IPR)
o Plagiarism
o Licensing And Copyright
• Free And Open Source Software (FOSS)
• Cybercrime And Cyber Laws
o Hacking
o Phishing
o Cyber Bullying
o Overview Of Indian IT Act
• E-Waste: Hazards And Management
• Awareness About Health Concerns Related To The Usage Of
Technology
Digital Footprints
Our “digital footprint” includes traces of our online activities like when we
post something online, share content, comment on social media posts and
shop online. Even when a website collects our information (IP address,
your login details, and other personal information) that we reveal online by
installing cookies on our device, we create a digital trail. This includes your
IP address, your login details, and other personal information that you
reveal online. Information that is posted about us also gets added to our
data trail.
Digital footprints can be classified into two broad categories — active and
passive footprints — which depends on how our information is acquired.
Active footprints are those which we leave deliberately on the
Internet. For e.g. when we post online, send an email, publish a blog post
or a tweet, or upload a photo on social media.
Passive footprints are those that we put up on the internet unintentionally.
For example, website collects our information (IP address, your login
details, and other personal information) that we reveal online by installing
cookies on our device. Besides this searches and online purchases, online
reviews and feedback are among the activities that add passive data traces
to your digital footprint.
Manage Your Digital Footprint
A user digital footprint is a very important factor that might leave a great
impact on a person’s life and therefore, it should be protected carefully.
Following are some tips to protect your digital footprints:
• Be consistent and cordial about what you say online
• Ensure that you check your privacy settings regularly, especially on
social media
• Log out the account each time you leave the platform and Delete old
accounts
• Make regular software updates
• Create strong passwords
• Avoid using public Wi-Fi and publicly available USB ports
Data Protection
Personal data is any information relating to you, whether it relates to your
private, professional, or public life. In the online environment, where vast
amounts of personal data are shared and transferred around the
globe instantaneously, it is increasingly difficult for people to maintain
control of their personal information. This is where data protection comes
in.
Data protection refers to the practices, safeguards, and binding rules put in
place to protect your personal information and ensure that you remain in
control of it. In short, you should be able to decide whether or not you want
to share some information, who has access to it, for how long, for what
reason, and be able to modify some of this information, and more.
It's important to use sound practices to keep your sensitive personal
information safe and secure. Here are a few best practices for securing
your important digital information:
• Patching and updating softwareas soon as options are available.
• High-grade encryption for sensitive data.
• Upgrading devices when the software is no longer supported by the
manufacturer.
• Enforcing BYOD security policies, like requiring all devices to use
a business-grade VPN service and antivirus protection.
• Enforcing strong credentials and multi-factor authentication to
encourage better user cybersecurity practices. Encouraging users to
start using a password manager can help.
• Educating employees on best security practices and ways to avoid
socially engineered attacks.
Creative Commons
Creative Commons licenses give everyone from individual creators to large
institutions a standardized way to grant the public permission to use their
creative work under copyright law.
There are six Creative Commons licenses and the public domain
dedication tool which give creators a range of options. The best way to
decide which is appropriate for you is to think about why you want to share
your work, and how you hope others will use that work.
GNU General Public License
The GNU General Public License (GPL) is a free, copyleft license used
primarily for software. The GNU GPL allows users to change and share all
versions of a program. GPL is provided through the Free Software
Foundation, a nonprofit corporation that works to provide free software for
the GNU Project.
The GPL license gives the user of the software the rights to modify it, copy
or it redistribute it, as well as any software developed based on it. Unlike
many other open software licenses, GPL gives licensees the right to charge
for the software.
Apache License
The Apache License is a permissive free software license written by
the Apache Software Foundation (ESF). It allows users to use the software
for any purpose, to distribute it, to modify it, and to distribute modified
versions of the software under the terms of the license, without concern for
royalties.
One major reason for the growth and use of FOSS technology is because
users have access to the source so it is much easier to fix faults and
improve the applications. In combination with the open license, this
simplifies the development process for many enterprises and gives them
flexibility that simply isn't available within the confines of a proprietary or
commercial product.
Some of the common examples of FOSS are:
Linux, Ubuntu, Google Chrome OS: Operating systems and Desktop
environments
Android, Symbian smart phone OS: Phone Operating System
GIMP, Inkspace, Blender, Audacity: Graphics and multimedia
Python, PHP, Pearl, MySQL, Java: Programming related
HACKING
Hacking is an unauthorized entry into a network or a computer to steal or
manipulate information, data or files. The person involved in this process is
named as a hacker. Computer hacking is done using several types of
programs such as Rootkit, Trojan, Keylogger etc. Hackers also employ
techniques like browser hijacks, spoofing, phishing etc. to capture user’s
personal or financial details.
PHISHING
Phishing is a type of online scam where criminals send out fraudulent email
messages to steal the sensitive information or infect a computer with
malware. The email appears to come from a legitimate source and usually
contains a link. It is designed to trick the recipient into entering confidential
information (ex: account numbers, passwords, pin, birthday) into a fake
website by clicking on a link.
Phishing scams differ in terms of complexity, attackers’ objectives and so
on. Different types of cyber-attacks have emerged such as Spear Phishing,
Clone Phishing, Whaling, and Deceptive Phishing. These techniques are
used by hackers for their specific motives.
CYBER BULLYING
Cyberbullying is bullying that takes place over digital devices like cell
phones, computers, and tablets. Cyberbullying can occur through SMS,
Text, and apps, or online in social media, forums, or gaming where people
can view, participate in, or share content. Cyberbullying includes sending,
posting, or sharing negative, harmful, false, or mean content about
someone else. It can include sharing personal or private information about
someone else causing embarrassment or humiliation. Some cyberbullying
crosses the line into unlawful or criminal behaviour.
Indian IT Act
The Information Technology Act, 2000 (also known as ITA-2000, or
the IT Act) is an Act of the Indian Parliament (No 21 of 2000) notified on 17
October 2000. It is the primary law in India dealing
with cybercrime and electronic commerce.
The act provides legal framework for electronic governance by giving
recognition to electronic records and digital signatures. It also outlines
cyber crimes and penalties for them.