SlideShare une entreprise Scribd logo
1  sur  26
Télécharger pour lire hors ligne
Ethical And Social
Issues In ICT
PRESENTED BY: ROSHAN MAHARJAN
INTRODUCTION
• In the rapidly changing technological environment in which we live; ethical issues are
increasingly been raised, demanding attention and efforts towards resolution.
• The explosive growth of ICT and the use of its enabling technologies have had major impacts
on society and thus raise serious ethical questions for individuals and organizations.
• The pressing issues raised by ICT include the invasion of individual and corporate privacy,
intellectual property rights, individual and societal rights, values preservation and
accountability for the consequences arising from the use of ICT, etc.
• These issues have thrown up important challenges in the area of employment; working
conditions and individuality.
• However, not much progress has been made in addressing these issues and challenges
associated with ICT. This is because of lack of clear understanding of the issues involved.
Continue……
• Cyber space is a metaphysical space created by networked computers in which users may shop,
chat, or learn.
• It is the dynamic and virtual space that such networks of machine-clones create. In other
words, cyberspace is the web of consumer electronics, computers, and communication
network which interconnect the world.
• The term “Cyberspace” was initially introduced by William Gibson in his book “Neuromancer”
in 1984.
• The global uses of computer and Internet with advance technology in the cyber space have
made people easier to commit various cyber crimes
• More and more criminals are exploiting the speed, convenience of the modern technology to
commit more diverse types of cyber crimes.
Computer Ethics
• Computer ethics is a set of moral principles or code of conducts
that regulate the use of computers systematically without
making harm to other users.
• It gives awareness to the user regarding the immoral behavior
and activities in the computing field.
• They are a set of moral standards that govern the use of
computers.
• It is society’s views about the use of computers, both hardware
and software.
• Privacy concerns, intellectual property rights and effects on the
society are some of the common issues of computer ethics.
Commandments of Computer Ethics
➢ Do not use a computer to harm other people.
➢ Do not use a computer to publish fake information.
➢ Do not search the file or record of other people.
➢ Do not destroy or delete the records of other people.
➢ Do not use a computer to steal someone's privacy.
➢ Do not interfere with other people's computer work.
➢ Do not snoop around in other people's files.
➢ Do not use or copy software for which you have not paid.
➢ Do not use other people's computer resources without authorization.
Cyber Ethics
❖ Cyber ethics is a code of behavior for using the Internet.
❖ It is acceptable behavior on the Internet which is very much the same as
acceptable behavior in everyday life.
❖ Cyber ethics is the ethics applied to the online environment
Do’s & Don’ts of Cyber Ethics
Do Don’t
Do use the Internet to help you do your schoolwork. Don't copy information from the Internet and call it your
own.
Do use the Internet to learn about music, video and
games.
Don't use the Internet to download or share copyrighted
material.
Do use the Internet to communicate with friends and
family.
Don't use the Internet to communicate with strangers.
Don't pretend to be someone else.
Don't be rude or use bad language
Don't give anyone personal information or passwords.
DOMAINS OF CYBER ETHICS
▪ Privacy
▪ Property
▪ Security
▪ Accuracy
▪ Accessibility
▪ Censorship and Filtering
Digital Citizenship
• Digital citizenship refers to the responsible use of technology
by anyone who uses computers, the Internet, and digital
devices to engage with society on any level.
• Digital citizenship is the responsible use of technology and
etiquette pertaining to an online presence.
• This includes behaviors and responses to others within a digital
community in which one is a member.
• Digital citizenship typically refers to those who use the internet
regularly and is part of one or more online communities.
Continuation…..
1.Empathy - to understand how people talk and behave online.
2.How the Internet works
3.Understanding user data
4.Practicing digital literacy
5.Acknowledging the digital divide
6.Practicing digital wellness
7.Securing digital devices
Seven Key Concepts
HOW TO BE A DIGITAL CITIZEN?
The way you can be a good citizen are as follows:
1. Encourage community members to present their views
2. See all types of conversations as learning opportunities
3. Take sufficient time to read the post before leaving any comments
4. Protect your private information
5. Reflect ideas of others
Advantages of being digital citizen
1. Information can easily be accessed with digital services.
2. We can communicate with people globally.
3. Internet is a very easy access for entertainment purposes
4. We can easily make payments through digital devices
5. Most importantly, internet can play a vital role to widen our education
and learning
Elements of digital citizenship:
1. Digital Access: The state of full electronic participation in society
2. Digital Commerce: The act of promoting the purchase of goods through electronic
means
3. Digital Communication: Electronic exchange of information
4. Digital literacy: Teaching and learning about teaching and technology
5. Digital Security: Electronic precautions Computer Science : Grade 10 37
6. Digital Health: The solution to health problems using digital technology
7. Digital Law: Act, rules and regulations required for performing electrical work
Digital Footprint
▪ Digital Footprint means the recording of interaction with
the digital world.
▪ We leave behind the Digital Footprint trail using
online technology. These include digital cameras, i-
pods, smartphones, and computers.
▪ A digital footprint is like an invisible report card which is
stored for many years.
▪ This gives a general reflection of our online activity.
▪ Digital Footprints can be used for both good and bad
purpose.
Things to be considered while managing Digital
Footprint
▪ Subscribed accounts and unused social media accounts which are no longer in
use should be unsubscribed or deleted.
▪ Ensure the content posted protect your privacy.
▪ Not to forget that online posts are private.
▪ To note that parents, teachers and other people can view the content posted.
▪ Ensure the content posted does not damage yours or others reputation.
CYBERBULLYING
➢ Cyberbullying includes sending, posting, or sharing negative, harmful, false, or mean content about
someone else. Some cyberbullying crosses the line into unlawful or criminal behavior.
– Where Does Cyberbullying Happen?
• E-mail. You may think e-mail is mostly used in offices. On the contrary, e-mail is incredibly popular
amongst children and teens. This information, which can include inappropriate images and revenge
porn, can be easily shared. Sometimes, teens will share passwords
• Texting. . Most students with the ability to send and receive texts at all times, targets cannot escape the
cruelty of their bullies. Teens can send and receive harmful messages even when doing school work.
• Instant Messaging. Instant messaging sites and apps are still a popular choice– especially when it
comes to cyberbullying. Many believe these messages are anonymous or cannot be traced. These
platforms easily become a means to harass their victims.
• Social Media. Bullies can instantly post embarrassing or personal photos, send direct messages, create
harassing group chats or post humiliating statuses directed toward their targets. Therefore, it is even
more important to monitor their social media accounts
Examples of Cyberbullying
➢ Harassing or threatening someone or sending mean messages through instant messages (IMs),
phone calls, text messages or emails
➢ Posting private or embarrassing photos online or sending them to others
➢ Starting a website that rates someone’s appearance or popularity
➢ Verbally abusing other players in multiplayer online games, Internet-connected console games
and virtual worlds
➢ Creating fake Facebook or Twitter accounts that ridicule someone
➢ Stealing someone’s password and impersonating them online
Spreading gossip, secrets or rumors about another person that will damage that person’s
reputation
➢ Engaging someone in instant messaging and tricking them into revealing personal information
and then forwarding that information to others
➢ Breaking into an email account and sending hurtful materials to others under an assumed
identity
➢ Creating blogs or websites that have stories, cartoons, pictures or jokes ridiculing others
Cyber Law
➢Cyber law describes the legal issues related to using of inter-networked
information technology. Cyber law is a term that encapsulates the legal issues
related to the use of communicative, transactional, and distributive aspects of
networked information devices and technologies.
➢IT includes several layers of physical equipment (hardware), virtualization and
management or automation tools, operating systems and applications
(software) used to perform essential functions such as laptops, smartphones
etc.
➢Combination of information technology and telecommunication technology is
called information communication technology (ICT).
➢The government of Nepal revised the former policy and came up with the
Information Communication Policy 2072 (2015) intending to regulate
Information Communication Nepal's Technology as a whole.
Goals of Cyber Law
• Enhancement of overall national ICT readiness with the objective of being at least in the top
second quartile of the international ICT development index and e-Government rankings by
2020
• 75 % of the population to have digital literacy skills by the end of 2020
• Universal broadband access to all people on an equitable basis to be in place. By 2020, 90
percent of the population to have access to broadband services
• The role and significance of ICT industries and services (including telecom services) to increase
in the Nepali economy with ICT value added (including digital content and service industry)
accounting for at least 7.5% of GDP by 2020
• Apex level institutional arrangement to be restructured to effectively drive ICT agenda in the
country in the light of emerging technologies and application trends shaping the sector
• By 2020, entire population of Nepal to have access to Internet
• 80% of all citizens facing government services to be offered online by 2020
• e-Procurement to be promoted as means of driving transparency through government
procurement processes covering all public procurement of goods and services irrespective of
cost and volume of such procurements by 2018
• G2G implementation to be promoted with a view to achieve complete automation of the
operations of land administration, revenue administration and management, vital registration,
passport and citizenship certificate services by 2020
ELECTRONIC TRANSACTION ACT(ETA)
➢ Electronic Transaction Act (ETA) deals with issues related to cybercrime and also help in making and
implementing laws over cybercrime.
➢ The house of representative (HoR) of the government of Nepal approved the electronic transaction
act- 2063 on Mangsir 18, 2063 (December 4, 2006) and the era of electronic transaction is started in
Nepal.
➢ Objectives of ETA
1. To make legal provision for authentication and regulation of electronic data.
2. To make a reliable date generation, communication, and transmission.
3. To make a secured and authentic means of electronic communication.
4. To regulate all the relating matters of electronic transactions.#
➢ Provisions of ETA
• It has the provision relating to electronic records and digital signature.
• It has the provision relating to dispatch, receive an acknowledgment of electronic records.
• It has the provision of few regulating bodies and their functions, rights, and duties
• It has the provision relating the use of digital signature and certificate.
• It has the provision relating to government use of the digital signature.
• It has a provision relating to the computer network and network services providers.
• It has the provision relating to computer-related crimes and punishments.
Social Media
• Social medias are the websites and applications that enable users to create and share content or to
participate in social networking.
• Social media includes activities such as photo sharing, blogging, social networks, video sharing,
business networks, virtual worlds, etc.
• It also provides a platform to build career opportunities and share the thoughts, feelings, insight and
emotions.
• . Social media is an important approach to digital marketing. It is an indispensable tool for business.
• Even governments and politicians use social media to engage with constituents and voters.
• Social media is continuously evolving with all marketing channels. It is providing tremendous
opportunities for various brands to reach their customers.
Opportunities and Benefits of Social Media
Brand Development
• Branding is an important stage in any business that focuses on long-term business.
• Social media is a spectacular tool to grow a business.
• It allows customers to connect and interact with the business on a more personal level.
Target Audience
• A social media target audience is the specific group of people you want to reach with your social
channels.
• They are the people who are most likely to be interested in your content, products, or services.
• They are likely united by some common characteristics, like demographics and behaviors
Opportunities and Benefits of Social Media
Customer Interaction
• A customer interaction is a communication between a customer and a company.
• Every interaction with a customer is a chance to connect with them, delight them, and
increase their retention and advocacy.
• It’s important to have a framework to ensure opportunities to connect with customers aren’t
missed.
1. Identify Your Ideal Client.
2. Discover Where Your Customer Lives.
3. Know Your Business Inside and Out.
4. Position Yourself as the Answer.
5. Try Direct Response Marketing.
6. Build Partnerships.
7. Follow Up.
Attracting Audience
The ways to attract the audience(customer) are:
Opportunities and Benefits of Social Media
Research
• Research is a process of systematic inquiry that entails collection of data;
documentation of critical information; and analysis and interpretation of
that data/information, in accordance with suitable methodologies set by
specific professional fields and academic disciplines.
• Social media helps to understand social consumers or market trends.
• Simply logging on to it you can see what your competitors are doing or
finding out what your customers are saying about your brand may be a
valuable exercise.
Social Media Threats
Social Engineering
1.Social engineering is a manipulation technique that exploits human error to gain private
information, access, or valuables.
2.In cybercrime, these “human hacking” scams tend to lure unsuspecting users into exposing
data, spreading malware infections, or giving access to restricted systems.
3.It allows attackers to find personal information that can be used to target specific individuals
Target Phishing Attacks
1.Spear phishing is the act of sending and emails to specific and well-researched targets while
purporting to be a trusted sender. The aim is to either infect devices with malware or
convince victims to hand over information or money.
2. Targeted phishing threats are an elevated form of phishing virus attacks that use social
engineering to get a specific person to reveal sensitive information.
Social Media Threats
Research
1.A fake profile is anywhere the person is misrepresenting their true identity.
2.Shuttering almost 1.3 billion fake accounts across Q4 of 2017 and Q1 of
2018, Facebook stated that bogus profiles only amount to three to four
percent of monthly active users.
What Are The Top 10 Reasons For Using Social Media?
• To stay in touch with what friends are doing (42%)
• To stay up-to-date with news and current events (41%)
• To fill up spare time (39%)
• To find funny or entertaining content (37%)
• General networking with other people (34%)
• Because friends are already on them (33%)
• To share photos or videos with others (32%)
• To share opinions (30%)
• To research new products to buy (29%)
• To meet new people (27%)
Thank You

Contenu connexe

Tendances

Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.muhammad-Sulaiman
 
Impact of ict on society
Impact of ict on societyImpact of ict on society
Impact of ict on societyAMOSOGAGAH
 
The impact of information technology on society
The impact of information technology on societyThe impact of information technology on society
The impact of information technology on societySandra Bloomfield
 
1-LESSON-SOCIAL AND PROFESSIONAL ISSUES.pptx
1-LESSON-SOCIAL AND PROFESSIONAL ISSUES.pptx1-LESSON-SOCIAL AND PROFESSIONAL ISSUES.pptx
1-LESSON-SOCIAL AND PROFESSIONAL ISSUES.pptxMarvenParay
 
Legal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in TechnologyLegal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in TechnologyRachel Farnese
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information PrivacyPerry Slack
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenshipJohan Koren
 
Presentation of ethical and social issues of ict
Presentation of ethical and social issues of ictPresentation of ethical and social issues of ict
Presentation of ethical and social issues of ictSmritiGurung4
 
COMPUTER ETHICS
COMPUTER ETHICSCOMPUTER ETHICS
COMPUTER ETHICSRJ Khan
 
Computer ethics
Computer  ethicsComputer  ethics
Computer ethicsSKS
 
Computer ethics
Computer ethicsComputer ethics
Computer ethicsJagan Nath
 
3.5 ICT Policies
3.5 ICT Policies3.5 ICT Policies
3.5 ICT Policiesmrmwood
 
Fundamentals of ICT - Lecture 1
Fundamentals of ICT - Lecture 1Fundamentals of ICT - Lecture 1
Fundamentals of ICT - Lecture 1Junaid Qadir
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security PresentationPraphullaShrestha1
 

Tendances (20)

Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.
 
Impact of ict on society
Impact of ict on societyImpact of ict on society
Impact of ict on society
 
The impact of information technology on society
The impact of information technology on societyThe impact of information technology on society
The impact of information technology on society
 
Ethics in computing
Ethics in computingEthics in computing
Ethics in computing
 
1-LESSON-SOCIAL AND PROFESSIONAL ISSUES.pptx
1-LESSON-SOCIAL AND PROFESSIONAL ISSUES.pptx1-LESSON-SOCIAL AND PROFESSIONAL ISSUES.pptx
1-LESSON-SOCIAL AND PROFESSIONAL ISSUES.pptx
 
Legal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in TechnologyLegal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in Technology
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information Privacy
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Presentation of ethical and social issues of ict
Presentation of ethical and social issues of ictPresentation of ethical and social issues of ict
Presentation of ethical and social issues of ict
 
COMPUTER ETHICS
COMPUTER ETHICSCOMPUTER ETHICS
COMPUTER ETHICS
 
Computer ethics
Computer  ethicsComputer  ethics
Computer ethics
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Introduction to ict
Introduction to ictIntroduction to ict
Introduction to ict
 
3.5 ICT Policies
3.5 ICT Policies3.5 ICT Policies
3.5 ICT Policies
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Fundamentals of ICT - Lecture 1
Fundamentals of ICT - Lecture 1Fundamentals of ICT - Lecture 1
Fundamentals of ICT - Lecture 1
 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computer
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Internet ethics
Internet ethicsInternet ethics
Internet ethics
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 

Similaire à Ethical and Social Issues in ICT

ethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfSheejamolMathew
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber spacenitss007
 
Digital Citizenship_Lecture.pptx
Digital Citizenship_Lecture.pptxDigital Citizenship_Lecture.pptx
Digital Citizenship_Lecture.pptxJCGonzaga1
 
Respect%20 yourself/Respect Others
Respect%20 yourself/Respect OthersRespect%20 yourself/Respect Others
Respect%20 yourself/Respect Othersnealbd
 
6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_otherslisamholden
 
6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_otherslisamholden
 
6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_otherslisamholden
 
6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_otherslisamholden
 
report_ThhhhhhhhhhhhhhhhhhhhhTL TTL.pptx
report_ThhhhhhhhhhhhhhhhhhhhhTL TTL.pptxreport_ThhhhhhhhhhhhhhhhhhhhhTL TTL.pptx
report_ThhhhhhhhhhhhhhhhhhhhhTL TTL.pptxprincesskatemannag14
 
POWERPOINT_-Digital-Citizenship-by-JONALYN-VINLUAN.ppt
POWERPOINT_-Digital-Citizenship-by-JONALYN-VINLUAN.pptPOWERPOINT_-Digital-Citizenship-by-JONALYN-VINLUAN.ppt
POWERPOINT_-Digital-Citizenship-by-JONALYN-VINLUAN.pptisaacmendoza76
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenshipZephyrum
 
ICT online tools & Internet Safety
ICT online tools & Internet SafetyICT online tools & Internet Safety
ICT online tools & Internet SafetyCharina Mostierra
 

Similaire à Ethical and Social Issues in ICT (20)

ethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdf
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
 
Ethics in Cyber Space
Ethics in Cyber SpaceEthics in Cyber Space
Ethics in Cyber Space
 
Digital Citizenship_Lecture.pptx
Digital Citizenship_Lecture.pptxDigital Citizenship_Lecture.pptx
Digital Citizenship_Lecture.pptx
 
COMPUTER ETHICS
COMPUTER ETHICSCOMPUTER ETHICS
COMPUTER ETHICS
 
Online ethics
Online ethicsOnline ethics
Online ethics
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Respect%20 yourself/Respect Others
Respect%20 yourself/Respect OthersRespect%20 yourself/Respect Others
Respect%20 yourself/Respect Others
 
Nfwordle
NfwordleNfwordle
Nfwordle
 
ETECH-3.0.pptx
ETECH-3.0.pptxETECH-3.0.pptx
ETECH-3.0.pptx
 
Digital Age - Rules for Netizens
Digital Age  - Rules for NetizensDigital Age  - Rules for Netizens
Digital Age - Rules for Netizens
 
6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others
 
6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others
 
6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others
 
6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others6 kb respect_yourself_respect_others
6 kb respect_yourself_respect_others
 
report_ThhhhhhhhhhhhhhhhhhhhhTL TTL.pptx
report_ThhhhhhhhhhhhhhhhhhhhhTL TTL.pptxreport_ThhhhhhhhhhhhhhhhhhhhhTL TTL.pptx
report_ThhhhhhhhhhhhhhhhhhhhhTL TTL.pptx
 
POWERPOINT_-Digital-Citizenship-by-JONALYN-VINLUAN.ppt
POWERPOINT_-Digital-Citizenship-by-JONALYN-VINLUAN.pptPOWERPOINT_-Digital-Citizenship-by-JONALYN-VINLUAN.ppt
POWERPOINT_-Digital-Citizenship-by-JONALYN-VINLUAN.ppt
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
ICT online tools & Internet Safety
ICT online tools & Internet SafetyICT online tools & Internet Safety
ICT online tools & Internet Safety
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 

Plus de RoshanMaharjan13 (14)

E-Commerce.pptx
E-Commerce.pptxE-Commerce.pptx
E-Commerce.pptx
 
Computer security
Computer securityComputer security
Computer security
 
File handling
File handlingFile handling
File handling
 
Basic of qbasic
Basic of qbasicBasic of qbasic
Basic of qbasic
 
Ms access
Ms accessMs access
Ms access
 
Ms access
Ms accessMs access
Ms access
 
Computer Software
Computer SoftwareComputer Software
Computer Software
 
Number system
Number systemNumber system
Number system
 
Computer hardware
Computer hardwareComputer hardware
Computer hardware
 
Networking and telecommunication
Networking and telecommunication Networking and telecommunication
Networking and telecommunication
 
Categories of computer
Categories of computerCategories of computer
Categories of computer
 
Microsoft word
Microsoft wordMicrosoft word
Microsoft word
 
Modular programming
Modular programmingModular programming
Modular programming
 
Introduction to computer
Introduction to computerIntroduction to computer
Introduction to computer
 

Dernier

Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...RKavithamani
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 

Dernier (20)

Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 

Ethical and Social Issues in ICT

  • 1. Ethical And Social Issues In ICT PRESENTED BY: ROSHAN MAHARJAN
  • 2. INTRODUCTION • In the rapidly changing technological environment in which we live; ethical issues are increasingly been raised, demanding attention and efforts towards resolution. • The explosive growth of ICT and the use of its enabling technologies have had major impacts on society and thus raise serious ethical questions for individuals and organizations. • The pressing issues raised by ICT include the invasion of individual and corporate privacy, intellectual property rights, individual and societal rights, values preservation and accountability for the consequences arising from the use of ICT, etc. • These issues have thrown up important challenges in the area of employment; working conditions and individuality. • However, not much progress has been made in addressing these issues and challenges associated with ICT. This is because of lack of clear understanding of the issues involved.
  • 3. Continue…… • Cyber space is a metaphysical space created by networked computers in which users may shop, chat, or learn. • It is the dynamic and virtual space that such networks of machine-clones create. In other words, cyberspace is the web of consumer electronics, computers, and communication network which interconnect the world. • The term “Cyberspace” was initially introduced by William Gibson in his book “Neuromancer” in 1984. • The global uses of computer and Internet with advance technology in the cyber space have made people easier to commit various cyber crimes • More and more criminals are exploiting the speed, convenience of the modern technology to commit more diverse types of cyber crimes.
  • 4. Computer Ethics • Computer ethics is a set of moral principles or code of conducts that regulate the use of computers systematically without making harm to other users. • It gives awareness to the user regarding the immoral behavior and activities in the computing field. • They are a set of moral standards that govern the use of computers. • It is society’s views about the use of computers, both hardware and software. • Privacy concerns, intellectual property rights and effects on the society are some of the common issues of computer ethics.
  • 5. Commandments of Computer Ethics ➢ Do not use a computer to harm other people. ➢ Do not use a computer to publish fake information. ➢ Do not search the file or record of other people. ➢ Do not destroy or delete the records of other people. ➢ Do not use a computer to steal someone's privacy. ➢ Do not interfere with other people's computer work. ➢ Do not snoop around in other people's files. ➢ Do not use or copy software for which you have not paid. ➢ Do not use other people's computer resources without authorization.
  • 6. Cyber Ethics ❖ Cyber ethics is a code of behavior for using the Internet. ❖ It is acceptable behavior on the Internet which is very much the same as acceptable behavior in everyday life. ❖ Cyber ethics is the ethics applied to the online environment Do’s & Don’ts of Cyber Ethics Do Don’t Do use the Internet to help you do your schoolwork. Don't copy information from the Internet and call it your own. Do use the Internet to learn about music, video and games. Don't use the Internet to download or share copyrighted material. Do use the Internet to communicate with friends and family. Don't use the Internet to communicate with strangers. Don't pretend to be someone else. Don't be rude or use bad language Don't give anyone personal information or passwords.
  • 7. DOMAINS OF CYBER ETHICS ▪ Privacy ▪ Property ▪ Security ▪ Accuracy ▪ Accessibility ▪ Censorship and Filtering
  • 8. Digital Citizenship • Digital citizenship refers to the responsible use of technology by anyone who uses computers, the Internet, and digital devices to engage with society on any level. • Digital citizenship is the responsible use of technology and etiquette pertaining to an online presence. • This includes behaviors and responses to others within a digital community in which one is a member. • Digital citizenship typically refers to those who use the internet regularly and is part of one or more online communities.
  • 9. Continuation….. 1.Empathy - to understand how people talk and behave online. 2.How the Internet works 3.Understanding user data 4.Practicing digital literacy 5.Acknowledging the digital divide 6.Practicing digital wellness 7.Securing digital devices Seven Key Concepts
  • 10. HOW TO BE A DIGITAL CITIZEN? The way you can be a good citizen are as follows: 1. Encourage community members to present their views 2. See all types of conversations as learning opportunities 3. Take sufficient time to read the post before leaving any comments 4. Protect your private information 5. Reflect ideas of others Advantages of being digital citizen 1. Information can easily be accessed with digital services. 2. We can communicate with people globally. 3. Internet is a very easy access for entertainment purposes 4. We can easily make payments through digital devices 5. Most importantly, internet can play a vital role to widen our education and learning
  • 11. Elements of digital citizenship: 1. Digital Access: The state of full electronic participation in society 2. Digital Commerce: The act of promoting the purchase of goods through electronic means 3. Digital Communication: Electronic exchange of information 4. Digital literacy: Teaching and learning about teaching and technology 5. Digital Security: Electronic precautions Computer Science : Grade 10 37 6. Digital Health: The solution to health problems using digital technology 7. Digital Law: Act, rules and regulations required for performing electrical work
  • 12. Digital Footprint ▪ Digital Footprint means the recording of interaction with the digital world. ▪ We leave behind the Digital Footprint trail using online technology. These include digital cameras, i- pods, smartphones, and computers. ▪ A digital footprint is like an invisible report card which is stored for many years. ▪ This gives a general reflection of our online activity. ▪ Digital Footprints can be used for both good and bad purpose.
  • 13. Things to be considered while managing Digital Footprint ▪ Subscribed accounts and unused social media accounts which are no longer in use should be unsubscribed or deleted. ▪ Ensure the content posted protect your privacy. ▪ Not to forget that online posts are private. ▪ To note that parents, teachers and other people can view the content posted. ▪ Ensure the content posted does not damage yours or others reputation.
  • 14. CYBERBULLYING ➢ Cyberbullying includes sending, posting, or sharing negative, harmful, false, or mean content about someone else. Some cyberbullying crosses the line into unlawful or criminal behavior. – Where Does Cyberbullying Happen? • E-mail. You may think e-mail is mostly used in offices. On the contrary, e-mail is incredibly popular amongst children and teens. This information, which can include inappropriate images and revenge porn, can be easily shared. Sometimes, teens will share passwords • Texting. . Most students with the ability to send and receive texts at all times, targets cannot escape the cruelty of their bullies. Teens can send and receive harmful messages even when doing school work. • Instant Messaging. Instant messaging sites and apps are still a popular choice– especially when it comes to cyberbullying. Many believe these messages are anonymous or cannot be traced. These platforms easily become a means to harass their victims. • Social Media. Bullies can instantly post embarrassing or personal photos, send direct messages, create harassing group chats or post humiliating statuses directed toward their targets. Therefore, it is even more important to monitor their social media accounts
  • 15. Examples of Cyberbullying ➢ Harassing or threatening someone or sending mean messages through instant messages (IMs), phone calls, text messages or emails ➢ Posting private or embarrassing photos online or sending them to others ➢ Starting a website that rates someone’s appearance or popularity ➢ Verbally abusing other players in multiplayer online games, Internet-connected console games and virtual worlds ➢ Creating fake Facebook or Twitter accounts that ridicule someone ➢ Stealing someone’s password and impersonating them online Spreading gossip, secrets or rumors about another person that will damage that person’s reputation ➢ Engaging someone in instant messaging and tricking them into revealing personal information and then forwarding that information to others ➢ Breaking into an email account and sending hurtful materials to others under an assumed identity ➢ Creating blogs or websites that have stories, cartoons, pictures or jokes ridiculing others
  • 16. Cyber Law ➢Cyber law describes the legal issues related to using of inter-networked information technology. Cyber law is a term that encapsulates the legal issues related to the use of communicative, transactional, and distributive aspects of networked information devices and technologies. ➢IT includes several layers of physical equipment (hardware), virtualization and management or automation tools, operating systems and applications (software) used to perform essential functions such as laptops, smartphones etc. ➢Combination of information technology and telecommunication technology is called information communication technology (ICT). ➢The government of Nepal revised the former policy and came up with the Information Communication Policy 2072 (2015) intending to regulate Information Communication Nepal's Technology as a whole.
  • 17. Goals of Cyber Law • Enhancement of overall national ICT readiness with the objective of being at least in the top second quartile of the international ICT development index and e-Government rankings by 2020 • 75 % of the population to have digital literacy skills by the end of 2020 • Universal broadband access to all people on an equitable basis to be in place. By 2020, 90 percent of the population to have access to broadband services • The role and significance of ICT industries and services (including telecom services) to increase in the Nepali economy with ICT value added (including digital content and service industry) accounting for at least 7.5% of GDP by 2020 • Apex level institutional arrangement to be restructured to effectively drive ICT agenda in the country in the light of emerging technologies and application trends shaping the sector • By 2020, entire population of Nepal to have access to Internet • 80% of all citizens facing government services to be offered online by 2020 • e-Procurement to be promoted as means of driving transparency through government procurement processes covering all public procurement of goods and services irrespective of cost and volume of such procurements by 2018 • G2G implementation to be promoted with a view to achieve complete automation of the operations of land administration, revenue administration and management, vital registration, passport and citizenship certificate services by 2020
  • 18. ELECTRONIC TRANSACTION ACT(ETA) ➢ Electronic Transaction Act (ETA) deals with issues related to cybercrime and also help in making and implementing laws over cybercrime. ➢ The house of representative (HoR) of the government of Nepal approved the electronic transaction act- 2063 on Mangsir 18, 2063 (December 4, 2006) and the era of electronic transaction is started in Nepal. ➢ Objectives of ETA 1. To make legal provision for authentication and regulation of electronic data. 2. To make a reliable date generation, communication, and transmission. 3. To make a secured and authentic means of electronic communication. 4. To regulate all the relating matters of electronic transactions.# ➢ Provisions of ETA • It has the provision relating to electronic records and digital signature. • It has the provision relating to dispatch, receive an acknowledgment of electronic records. • It has the provision of few regulating bodies and their functions, rights, and duties • It has the provision relating the use of digital signature and certificate. • It has the provision relating to government use of the digital signature. • It has a provision relating to the computer network and network services providers. • It has the provision relating to computer-related crimes and punishments.
  • 19. Social Media • Social medias are the websites and applications that enable users to create and share content or to participate in social networking. • Social media includes activities such as photo sharing, blogging, social networks, video sharing, business networks, virtual worlds, etc. • It also provides a platform to build career opportunities and share the thoughts, feelings, insight and emotions. • . Social media is an important approach to digital marketing. It is an indispensable tool for business. • Even governments and politicians use social media to engage with constituents and voters. • Social media is continuously evolving with all marketing channels. It is providing tremendous opportunities for various brands to reach their customers.
  • 20. Opportunities and Benefits of Social Media Brand Development • Branding is an important stage in any business that focuses on long-term business. • Social media is a spectacular tool to grow a business. • It allows customers to connect and interact with the business on a more personal level. Target Audience • A social media target audience is the specific group of people you want to reach with your social channels. • They are the people who are most likely to be interested in your content, products, or services. • They are likely united by some common characteristics, like demographics and behaviors
  • 21. Opportunities and Benefits of Social Media Customer Interaction • A customer interaction is a communication between a customer and a company. • Every interaction with a customer is a chance to connect with them, delight them, and increase their retention and advocacy. • It’s important to have a framework to ensure opportunities to connect with customers aren’t missed. 1. Identify Your Ideal Client. 2. Discover Where Your Customer Lives. 3. Know Your Business Inside and Out. 4. Position Yourself as the Answer. 5. Try Direct Response Marketing. 6. Build Partnerships. 7. Follow Up. Attracting Audience The ways to attract the audience(customer) are:
  • 22. Opportunities and Benefits of Social Media Research • Research is a process of systematic inquiry that entails collection of data; documentation of critical information; and analysis and interpretation of that data/information, in accordance with suitable methodologies set by specific professional fields and academic disciplines. • Social media helps to understand social consumers or market trends. • Simply logging on to it you can see what your competitors are doing or finding out what your customers are saying about your brand may be a valuable exercise.
  • 23. Social Media Threats Social Engineering 1.Social engineering is a manipulation technique that exploits human error to gain private information, access, or valuables. 2.In cybercrime, these “human hacking” scams tend to lure unsuspecting users into exposing data, spreading malware infections, or giving access to restricted systems. 3.It allows attackers to find personal information that can be used to target specific individuals Target Phishing Attacks 1.Spear phishing is the act of sending and emails to specific and well-researched targets while purporting to be a trusted sender. The aim is to either infect devices with malware or convince victims to hand over information or money. 2. Targeted phishing threats are an elevated form of phishing virus attacks that use social engineering to get a specific person to reveal sensitive information.
  • 24. Social Media Threats Research 1.A fake profile is anywhere the person is misrepresenting their true identity. 2.Shuttering almost 1.3 billion fake accounts across Q4 of 2017 and Q1 of 2018, Facebook stated that bogus profiles only amount to three to four percent of monthly active users.
  • 25. What Are The Top 10 Reasons For Using Social Media? • To stay in touch with what friends are doing (42%) • To stay up-to-date with news and current events (41%) • To fill up spare time (39%) • To find funny or entertaining content (37%) • General networking with other people (34%) • Because friends are already on them (33%) • To share photos or videos with others (32%) • To share opinions (30%) • To research new products to buy (29%) • To meet new people (27%)