2. INTRODUCTION
• In the rapidly changing technological environment in which we live; ethical issues are
increasingly been raised, demanding attention and efforts towards resolution.
• The explosive growth of ICT and the use of its enabling technologies have had major impacts
on society and thus raise serious ethical questions for individuals and organizations.
• The pressing issues raised by ICT include the invasion of individual and corporate privacy,
intellectual property rights, individual and societal rights, values preservation and
accountability for the consequences arising from the use of ICT, etc.
• These issues have thrown up important challenges in the area of employment; working
conditions and individuality.
• However, not much progress has been made in addressing these issues and challenges
associated with ICT. This is because of lack of clear understanding of the issues involved.
3. Continue……
• Cyber space is a metaphysical space created by networked computers in which users may shop,
chat, or learn.
• It is the dynamic and virtual space that such networks of machine-clones create. In other
words, cyberspace is the web of consumer electronics, computers, and communication
network which interconnect the world.
• The term “Cyberspace” was initially introduced by William Gibson in his book “Neuromancer”
in 1984.
• The global uses of computer and Internet with advance technology in the cyber space have
made people easier to commit various cyber crimes
• More and more criminals are exploiting the speed, convenience of the modern technology to
commit more diverse types of cyber crimes.
4. Computer Ethics
• Computer ethics is a set of moral principles or code of conducts
that regulate the use of computers systematically without
making harm to other users.
• It gives awareness to the user regarding the immoral behavior
and activities in the computing field.
• They are a set of moral standards that govern the use of
computers.
• It is society’s views about the use of computers, both hardware
and software.
• Privacy concerns, intellectual property rights and effects on the
society are some of the common issues of computer ethics.
5. Commandments of Computer Ethics
➢ Do not use a computer to harm other people.
➢ Do not use a computer to publish fake information.
➢ Do not search the file or record of other people.
➢ Do not destroy or delete the records of other people.
➢ Do not use a computer to steal someone's privacy.
➢ Do not interfere with other people's computer work.
➢ Do not snoop around in other people's files.
➢ Do not use or copy software for which you have not paid.
➢ Do not use other people's computer resources without authorization.
6. Cyber Ethics
❖ Cyber ethics is a code of behavior for using the Internet.
❖ It is acceptable behavior on the Internet which is very much the same as
acceptable behavior in everyday life.
❖ Cyber ethics is the ethics applied to the online environment
Do’s & Don’ts of Cyber Ethics
Do Don’t
Do use the Internet to help you do your schoolwork. Don't copy information from the Internet and call it your
own.
Do use the Internet to learn about music, video and
games.
Don't use the Internet to download or share copyrighted
material.
Do use the Internet to communicate with friends and
family.
Don't use the Internet to communicate with strangers.
Don't pretend to be someone else.
Don't be rude or use bad language
Don't give anyone personal information or passwords.
7. DOMAINS OF CYBER ETHICS
▪ Privacy
▪ Property
▪ Security
▪ Accuracy
▪ Accessibility
▪ Censorship and Filtering
8. Digital Citizenship
• Digital citizenship refers to the responsible use of technology
by anyone who uses computers, the Internet, and digital
devices to engage with society on any level.
• Digital citizenship is the responsible use of technology and
etiquette pertaining to an online presence.
• This includes behaviors and responses to others within a digital
community in which one is a member.
• Digital citizenship typically refers to those who use the internet
regularly and is part of one or more online communities.
9. Continuation…..
1.Empathy - to understand how people talk and behave online.
2.How the Internet works
3.Understanding user data
4.Practicing digital literacy
5.Acknowledging the digital divide
6.Practicing digital wellness
7.Securing digital devices
Seven Key Concepts
10. HOW TO BE A DIGITAL CITIZEN?
The way you can be a good citizen are as follows:
1. Encourage community members to present their views
2. See all types of conversations as learning opportunities
3. Take sufficient time to read the post before leaving any comments
4. Protect your private information
5. Reflect ideas of others
Advantages of being digital citizen
1. Information can easily be accessed with digital services.
2. We can communicate with people globally.
3. Internet is a very easy access for entertainment purposes
4. We can easily make payments through digital devices
5. Most importantly, internet can play a vital role to widen our education
and learning
11. Elements of digital citizenship:
1. Digital Access: The state of full electronic participation in society
2. Digital Commerce: The act of promoting the purchase of goods through electronic
means
3. Digital Communication: Electronic exchange of information
4. Digital literacy: Teaching and learning about teaching and technology
5. Digital Security: Electronic precautions Computer Science : Grade 10 37
6. Digital Health: The solution to health problems using digital technology
7. Digital Law: Act, rules and regulations required for performing electrical work
12. Digital Footprint
▪ Digital Footprint means the recording of interaction with
the digital world.
▪ We leave behind the Digital Footprint trail using
online technology. These include digital cameras, i-
pods, smartphones, and computers.
▪ A digital footprint is like an invisible report card which is
stored for many years.
▪ This gives a general reflection of our online activity.
▪ Digital Footprints can be used for both good and bad
purpose.
13. Things to be considered while managing Digital
Footprint
▪ Subscribed accounts and unused social media accounts which are no longer in
use should be unsubscribed or deleted.
▪ Ensure the content posted protect your privacy.
▪ Not to forget that online posts are private.
▪ To note that parents, teachers and other people can view the content posted.
▪ Ensure the content posted does not damage yours or others reputation.
14. CYBERBULLYING
➢ Cyberbullying includes sending, posting, or sharing negative, harmful, false, or mean content about
someone else. Some cyberbullying crosses the line into unlawful or criminal behavior.
– Where Does Cyberbullying Happen?
• E-mail. You may think e-mail is mostly used in offices. On the contrary, e-mail is incredibly popular
amongst children and teens. This information, which can include inappropriate images and revenge
porn, can be easily shared. Sometimes, teens will share passwords
• Texting. . Most students with the ability to send and receive texts at all times, targets cannot escape the
cruelty of their bullies. Teens can send and receive harmful messages even when doing school work.
• Instant Messaging. Instant messaging sites and apps are still a popular choice– especially when it
comes to cyberbullying. Many believe these messages are anonymous or cannot be traced. These
platforms easily become a means to harass their victims.
• Social Media. Bullies can instantly post embarrassing or personal photos, send direct messages, create
harassing group chats or post humiliating statuses directed toward their targets. Therefore, it is even
more important to monitor their social media accounts
15. Examples of Cyberbullying
➢ Harassing or threatening someone or sending mean messages through instant messages (IMs),
phone calls, text messages or emails
➢ Posting private or embarrassing photos online or sending them to others
➢ Starting a website that rates someone’s appearance or popularity
➢ Verbally abusing other players in multiplayer online games, Internet-connected console games
and virtual worlds
➢ Creating fake Facebook or Twitter accounts that ridicule someone
➢ Stealing someone’s password and impersonating them online
Spreading gossip, secrets or rumors about another person that will damage that person’s
reputation
➢ Engaging someone in instant messaging and tricking them into revealing personal information
and then forwarding that information to others
➢ Breaking into an email account and sending hurtful materials to others under an assumed
identity
➢ Creating blogs or websites that have stories, cartoons, pictures or jokes ridiculing others
16. Cyber Law
➢Cyber law describes the legal issues related to using of inter-networked
information technology. Cyber law is a term that encapsulates the legal issues
related to the use of communicative, transactional, and distributive aspects of
networked information devices and technologies.
➢IT includes several layers of physical equipment (hardware), virtualization and
management or automation tools, operating systems and applications
(software) used to perform essential functions such as laptops, smartphones
etc.
➢Combination of information technology and telecommunication technology is
called information communication technology (ICT).
➢The government of Nepal revised the former policy and came up with the
Information Communication Policy 2072 (2015) intending to regulate
Information Communication Nepal's Technology as a whole.
17. Goals of Cyber Law
• Enhancement of overall national ICT readiness with the objective of being at least in the top
second quartile of the international ICT development index and e-Government rankings by
2020
• 75 % of the population to have digital literacy skills by the end of 2020
• Universal broadband access to all people on an equitable basis to be in place. By 2020, 90
percent of the population to have access to broadband services
• The role and significance of ICT industries and services (including telecom services) to increase
in the Nepali economy with ICT value added (including digital content and service industry)
accounting for at least 7.5% of GDP by 2020
• Apex level institutional arrangement to be restructured to effectively drive ICT agenda in the
country in the light of emerging technologies and application trends shaping the sector
• By 2020, entire population of Nepal to have access to Internet
• 80% of all citizens facing government services to be offered online by 2020
• e-Procurement to be promoted as means of driving transparency through government
procurement processes covering all public procurement of goods and services irrespective of
cost and volume of such procurements by 2018
• G2G implementation to be promoted with a view to achieve complete automation of the
operations of land administration, revenue administration and management, vital registration,
passport and citizenship certificate services by 2020
18. ELECTRONIC TRANSACTION ACT(ETA)
➢ Electronic Transaction Act (ETA) deals with issues related to cybercrime and also help in making and
implementing laws over cybercrime.
➢ The house of representative (HoR) of the government of Nepal approved the electronic transaction
act- 2063 on Mangsir 18, 2063 (December 4, 2006) and the era of electronic transaction is started in
Nepal.
➢ Objectives of ETA
1. To make legal provision for authentication and regulation of electronic data.
2. To make a reliable date generation, communication, and transmission.
3. To make a secured and authentic means of electronic communication.
4. To regulate all the relating matters of electronic transactions.#
➢ Provisions of ETA
• It has the provision relating to electronic records and digital signature.
• It has the provision relating to dispatch, receive an acknowledgment of electronic records.
• It has the provision of few regulating bodies and their functions, rights, and duties
• It has the provision relating the use of digital signature and certificate.
• It has the provision relating to government use of the digital signature.
• It has a provision relating to the computer network and network services providers.
• It has the provision relating to computer-related crimes and punishments.
19. Social Media
• Social medias are the websites and applications that enable users to create and share content or to
participate in social networking.
• Social media includes activities such as photo sharing, blogging, social networks, video sharing,
business networks, virtual worlds, etc.
• It also provides a platform to build career opportunities and share the thoughts, feelings, insight and
emotions.
• . Social media is an important approach to digital marketing. It is an indispensable tool for business.
• Even governments and politicians use social media to engage with constituents and voters.
• Social media is continuously evolving with all marketing channels. It is providing tremendous
opportunities for various brands to reach their customers.
20. Opportunities and Benefits of Social Media
Brand Development
• Branding is an important stage in any business that focuses on long-term business.
• Social media is a spectacular tool to grow a business.
• It allows customers to connect and interact with the business on a more personal level.
Target Audience
• A social media target audience is the specific group of people you want to reach with your social
channels.
• They are the people who are most likely to be interested in your content, products, or services.
• They are likely united by some common characteristics, like demographics and behaviors
21. Opportunities and Benefits of Social Media
Customer Interaction
• A customer interaction is a communication between a customer and a company.
• Every interaction with a customer is a chance to connect with them, delight them, and
increase their retention and advocacy.
• It’s important to have a framework to ensure opportunities to connect with customers aren’t
missed.
1. Identify Your Ideal Client.
2. Discover Where Your Customer Lives.
3. Know Your Business Inside and Out.
4. Position Yourself as the Answer.
5. Try Direct Response Marketing.
6. Build Partnerships.
7. Follow Up.
Attracting Audience
The ways to attract the audience(customer) are:
22. Opportunities and Benefits of Social Media
Research
• Research is a process of systematic inquiry that entails collection of data;
documentation of critical information; and analysis and interpretation of
that data/information, in accordance with suitable methodologies set by
specific professional fields and academic disciplines.
• Social media helps to understand social consumers or market trends.
• Simply logging on to it you can see what your competitors are doing or
finding out what your customers are saying about your brand may be a
valuable exercise.
23. Social Media Threats
Social Engineering
1.Social engineering is a manipulation technique that exploits human error to gain private
information, access, or valuables.
2.In cybercrime, these “human hacking” scams tend to lure unsuspecting users into exposing
data, spreading malware infections, or giving access to restricted systems.
3.It allows attackers to find personal information that can be used to target specific individuals
Target Phishing Attacks
1.Spear phishing is the act of sending and emails to specific and well-researched targets while
purporting to be a trusted sender. The aim is to either infect devices with malware or
convince victims to hand over information or money.
2. Targeted phishing threats are an elevated form of phishing virus attacks that use social
engineering to get a specific person to reveal sensitive information.
24. Social Media Threats
Research
1.A fake profile is anywhere the person is misrepresenting their true identity.
2.Shuttering almost 1.3 billion fake accounts across Q4 of 2017 and Q1 of
2018, Facebook stated that bogus profiles only amount to three to four
percent of monthly active users.
25. What Are The Top 10 Reasons For Using Social Media?
• To stay in touch with what friends are doing (42%)
• To stay up-to-date with news and current events (41%)
• To fill up spare time (39%)
• To find funny or entertaining content (37%)
• General networking with other people (34%)
• Because friends are already on them (33%)
• To share photos or videos with others (32%)
• To share opinions (30%)
• To research new products to buy (29%)
• To meet new people (27%)