Download as pdf or txt
Download as pdf or txt
You are on page 1of 27

Computer Science

SOCIETY, LAW AND ETHICS

Chapter 16
INTRODUCTION

In computer technology, Ethics and Law help us do


the right thing. They make sure we follow rules and
respect privacy when creating technology.
Understanding these helps us use technology in a
good way that follows the law and bene its everyone.

f
INTELLECTUAL PROPERTY RIGHTS

Any piece of information is produced or created with a lot of efforts and it consumes
a lot of time. Though once produced, it becomes very easy to duplicate or share
with others.

The Owner has right to protect his/her original work . Intellectual Property Rights
(IPR) are the rights of the owner of information to decide:

● How much information is to be exchanged or share or distributed.

● To decide the price for exchange or share


WHY MUST IPR BE PROTECTED?

• Encourage individuals and businesses to create new software


or ideas as well as improving existing software

• Ensure new ideas and technologies are widely distributed

• Promotes investment in the national economy.


HOW TO PROTECT IPR

TRADEMARKS COPYRIGHTS PATENTS

A distinctive/ catchy phrase, Original creative works are New and useful Inventions or
slogans, logos etc. are protected protected, And the author has the improvements on existing
for as long as the mark is used in right to control distribution, inventions are protected for a span
business. This gives the right to replication and displays of of 20 years. The inventor has the
prevent others from using same copyrighted works, for a span of right to prevent others from
and/or very similar marks, which the author’s life and 60 years, in making, selling, or importing a
could cause defamation. India. patented invention.
VIOLATION OF IPR/ IPR INFRINGEMENT

1. Plagiarism
2. Copyright Infringement
3. Trademark Infringement
PLAGIARISM
It is stealing someone else’s intellectual work and representing it as your
own work with mentioning the source of information.

For examples:

● Using other authors work without giving credit to the author.

● Modifying/lifting someone’s production such as music-composition

● Giving incorrect or incorrect source of information


HOW TO AVOID PLAGIARISM

You must give credit whenever you use

● Another person’s idea, opinion, or theory

● Quotations of another person’s actual spoken or written

● Paraphrase of another person’s spoken or written words.

Remember Plagiarism is an offence both civil and criminal with


amount to ine, so avoid it.
f
COPYRIGHT INFRINGEMENT

It refers to using copyrighted work without the consent or


permission of the copyright holder.
For examples
● Selling pirated books
● Selling copied/duplicated artwork
● Selling pirated software
● Online piracy and many other such acts.
TRADEMARK INFRINGEMENT

It refers to unauthorized usage of a mark that is identical


or similar to a registered trademark.

Remember all type of IPR infringement are crimes and the


owner can initiate a legal action against the people/
companies who do it.
DIGITAL PROPERTY
OR DIGITAL ASSETS
Examples:

Online personal account,


email account, social media
Digital property refers to any information
account, online storage,
about a person or created by the person that
exists on digital form, either online or on an websites, blogs, photos, videos,
electronic storage device. domain names, copyright
materials, trademarks, patents
Digital Property rights lie with the owner. and any software or code.
They can choose how their digital assets are
used and distributed.
THREATS TO DIGITAL ASSETS
Digital software Penetration tools

These tools are created by hackers to enable unauthorised users to freely


access protected software without paying for it.

Stealing and plagiarising codes of digital assets

This means other developers get hold of your software’s source code, replicate
it and sell it as their own.
DIGITAL ASSET PROTECTION
Anti-Tamper Solutions: These ensure your assets are tamper proof.
They prevent Hackers from manipulating and accessing user assets.

Legal Clauses: Adding a clear legal clause in software’s Terms of


Service that prohibits the usage of the software’s source code. This
acts as a legal backup.

Limit the sharing of source code: Software code should not be


shared with everyone. A Digital Rights Management (DRM) solution
must be used to protect software
OPEN SOURCE PHILOSOPHY AND SOFTWARE LICENSES

Open Source Software refers to those categories of software/ programs


whose licences(permissions/ conditions of use) don't have many conditions.
This software allows users to use the software, modify it, and to redistribute it.

Distinguishing between ‘Free Software’ and ‘Open Source Software’

Free Software: This is freely accessible and no payments are needed. Can be
changed, improved and distributed by all.

Open Source Software: These are also freely accessible, but may not be free of
charge. The Developers may receive payments for support and further
development. The source code is freely available to the customer.
LICENSES
Creative Commons Licences (CC licence):

If others want to use the creators work; in a way that is not allowed in the
cc licence, they must only ask for creators permission

GNU General Public Licence:

It grants and guarantees a wide range of rights to developers who work


on Open-source projects. It allows user to legally copy, distribute, and
modify.
DOMAINS OF OPEN SOURCE TECHNOLOGY

Public-Domain software:

It is free and can be used without restrictions.

Proprietary Software

This is neither free nor available for public. There is a licence attached
to it, A user has to buy this licence in order to use it.
TECHNOLOGY AND SOCIETY
INFORMATION COMMUNICATION TECHNOLOGY (ICT)

ICTs are general purpose technologies i.e. technology whose value and impact
a ects economic and social development.
Economic Impact: include the globalizations of production in goods and services,
change in international trade & distribution network, change in pattern of
consumption, Virtualization of some products and behaviours, importance in
world and national economics.
Social Impact: include mass market access to people with range of information
resources, enhanced freedom of expression and association, new patterns of
work, changes in relationships between government, citizens and state and
challenges to traditional ideas of privacy.
ff
ECONOMIC BENEFITS OF ICT

1.Secure Transactions- Banks and similar institutions


could be said to be most bene ited from ICT.
2.Ease and availability
3.Net Banking
4.Open Global Market
f
E-WASTE
MANAGEMENT
E-Waste or e-Scrape, or Waste
Electrical and Electronic
Equipment(WEEE) describes
discarded electrical or electronic
devices. It is made up of deadly
chemical such as mercury, cadmium,
beryllium etc. which are dangerous
to our health and our environment.
ECO-FRIENDLY WASTE DISPOSAL TECHNIQUES

• Give your waste to a certi ied E-waste Recycler


• Sell off your outdated technology
• Donate your outdated technology
• Visit your civic institution
• Give back to your electronic companies drop-off points
f
PRECAUTIONS TO BE TAKEN BEFORE RECYCLING

• Upgrade your computer instead of simply replacing it


• Format all your personal information from your
product before discarding it

• Take out he batteries from your gadgets before


getting rid of them
BENEFITS OF E-WASTE RECYCLING

• Create jobs
• Removal of toxic waste
• Protect public health and water quality
• Recovery of valuable metals
• Saves land ill space
f
GENDER ISSUES IN THE FIELD OF COMPUTER SCIENCE

• Under Representation
• Preconceived Notions
• Lack of interest
• Lack of motivation
• Lack of role model
• Not Women friendly work culture
• Lack of encouragement in class
POSSIBLE SOLUTIONS FOR GENDER ISSUES

1. There should be more initiatives and programs that


encourage girls to take up computer science as a subject.

2. Girls should be encouraged to do more practical work on


computers on their own and also ind solutions themselves.

3. Government & Companies should ensure adequate jobs for


girls in technical areas.
f
DISABILITY ISSUES
Various disability issues are faced in
the ield of computer science such as:
Unavailability of teaching
1. Locomotor disabilities(polio, leprosy,
material/aids
cerebral palsy, severe deformation.

2. Hearing and speech disabilities. Lack of Special Needs Teachers


3. Vision impairment(low vision,
blindness) Lack of Supporting Curriculum

4. Cognitive impairment(speci ic
learning de icits)
f
f
f
POSSIBLE SOLUTIONS FOR DISABILITY ISSUES

For locomotor disabilities

1. Sophisticated virtual keyboard software

2. A joystick that is speci ic to the needs of the child

3. For Low-Vision students: Braille keyboards, Braille monitors, Braille printers

For hearing impaired students, a teacher who is able to converse in sign language. A
teacher should be well trained with the software/hardware used for disable students.

Curriculum should be design with adequate alternatives for special need students. For
example of ice based software can easily be implemented.
f
f

You might also like