Download as pdf or txt
Download as pdf or txt
You are on page 1of 59

SOCIETY, LAW AND ETHICS

Societal Impacts-Digital footprint, Netiquettes, Data


protection, IPR, FOSS

Class XI
Society, Law and Ethics

Digital Footprint –
A digital footprint is data that is left behind when users have been
online. There are two types of digital footprints which are active
and passive.

An active digital footprint is where the user has purposely shared


information about themselves either by using social media sites or
by using websites.
A passive digital footprint is made when information is collected
from the user without the person knowing this is happening.
Society, Law and Ethics
Examples of active digital footprints
▪ Posting on Instagram,Facebook, Instagram, Twitter,
and other
social media platforms
▪ Filling out online forms, i.e. when signing up to receive emails or
texts
▪ Agreeing to install cookies on our devices when prompted by the
browser
Examples of passive digital footprints
▪ Websites that install cookies in our device without disclosing it
to us
▪ Apps and websites that use geolocation to pinpoint our location
▪ Social media news channels and advertisers that use our likes,
shares, and comments to profile us and to serve up
advertisements based on our interests
Society, Law and Ethics
How digital footprint is being used for marketing
purposes
Digital footprints are also known as cyber Actual site
shadow, electronic footprint, visiting Visitor leaves
shadow areor generally collected with the help
digital
of tracking cookies. These cookies
are using popular sites. Whatever
created while
we search is stored in these along with our
dates, GPS relevant data. These are shared
by actual site we are visiting to the popular Web visitor
sites. Visitor is brought back
Popular sites in turn analyze these data and
revert back in the form of advertise later on. Popular sites
For e.g. we search for a flight from x location
to y location for a particular date.
Next day if we open search engine ,ads automatically popups even if we have
booked our tickets.
Society, Law and Ethics 1
why we should care about managing our digital
footprint For following four reasons
1. To protect our reputation
2. To make safe personal information
3. To prevent financial loss
4. To preserve our freedom

Risk due to digital footprint


• Privacy concern
• Scam
• Identity theft
• Fake websites
Society, Law and Ethics
1
How to manage digital
footprints
• Double-check privacy settings, but don't
trust them
• Create strong, memorable passwords
• Keep all our software up to date.
• Review our mobile use. Delete
useless files(temp.)
• Build reputation through behavior.
Society, Law and Ethics

Netiquettes
It is the abbreviation of Internet etiquette or network etiquette,
refers to online manners while using internet or working online.
While online you should be courteous, truthful and respectful of
others. It includes proper manners for sending e-mail, conversing
online, and so on.
Some basic rules of netiquette are:
● Be respectful
● Think about who can see what you have shared.
● Read first, then ask
● Respect the privacy of others
● Do not share personal information
Society, Law and Ethics
Communication Etiquettes
• Digital communication includes email, texting,
instant messaging, talking on the cell phone, audio
or video conferencing, posting on forums, social
networking sites, etc. All these are the popular
ways to connect with people in order to exchange
ideas, share data and knowledge.
• Be Precise
•Respect time
•Respect data limits
• Be Polite
• Be Credible
Society, Law and Ethics

Net or communication
etiquettes
Do Don’t
▪ Keep Messages and Posts Brief ▪ posting inflammatory /offensive
▪ Protect Personal Information comments shout
▪ Obey Copyright Laws ▪ respond to Internet Trollers
▪ Help Others ▪ Post private or
▪ Respect other people's privacy embarrassing
▪ Verify facts before reposting images/comments
▪ Check messages and respond ▪ Name-call or express offensive
promptly opinions
▪ Thank others who help you online ▪ Exclude people or talk behind
▪ Show good sportsmanship when their backs
playing online games ▪ spam others by sending
large amounts of unsolicited
email.
Society, Law and Ethics
Social Media
Etiquettes
• Now a days, we are using different kinds social media and we
may have an account on Facebook, Google+, Twitter, Instagram,
Pinterest, or the YouTube channel. Social media are websites or
applications that enable their users to participate in social
networking by creating and sharing content with others in the
community.
• These platforms encourage users to share their thoughts and
experiences through posts or pictures.
• Be Secure
• Choose password wisely
• Know who you be friend
• Beware of fake information
• Be Reliable
• Think before uploading
Society, Law and Ethics

Data protection - refers to the practices,


safeguards, and binding rules put in place to
protect our personal information and ensure
that it remain in control. In short, we should
be able to decide whether or not we want to
share some information, who has access to
it, for how long, for what reason, and be able
to modify some of this information, and
more.
Society, Law and Ethics

Consequences of Unprotected Data/Data


breaches
▪ Suffer from security breach/attack
▪ Physical data loss
▪ Hit with a virus
▪ Targeted by hackers
▪ Lose of money
▪ Intellectual property at risk
Society, Law and Ethics

How we can protect our personal data online


• Encrypt the Data
• Keep Passwords Private and secure
• Don't Share personal data on Social Networking Sites
or share it wisely
• Use Security Software
• Avoid Phishing Emails
• Avoid using public Wi-Fi
• Safely Dispose of Personal Information
Society, Law and Ethics
Intellectual Property (IP) – is a property created by a person or group of
persons using their own intellect for ultimate use in commerce and which
is already not available in the public domain.

Examples of IP
• an invention relating to a product or any process
• a new design
• a literary or artistic work and a trademark (a word, a symbol and / or a
logo, etc.)

Intellectual Property Right (IPR) is the statutory right granted by the


Government, to the owner(s) of the intellectual property or applicant(s) of
an intellectual property (IP) to exclude others from exploiting the IP
commercially for a given period of time, in lieu of the discloser of his/her
IP in an IPR application.
Society, Law and Ethics

Why should an IP be protected?


⮚ IP is an assets and can be used by
the owner for commercial gains any manner
⮚ IP owner may intend to stop others from manufacturing and
selling products and services which are dully protected by him
⮚ IP owner can sell and/or license the IP for commercial gains
⮚ IP can be used to establish the goodwill and brand value in the
market.
⮚ IP can be mention in resumes of it’s creator and thus show
competence of it’s creator
⮚ IPR certificate establishes legal and valid ownership about an
intellectual property
Society, Law and Ethics

Kinds of IPRs
• Patent (to protect technologies - The Patent Act)
• Trade Mark (to protect words, signs, logos, labels –The
Trade Mark Act)
• Design (to protectouter ornamental configuration
–The
Designs Act)
• Geographical Indications (GI) (to protectregion
specific
product –The Geographical Indications of Goods Act)
• Copyright (to protectliterary and artistic work –The
Copyright Act)
Society, Law and Ethics

IPRs are protected in accordance with the provisions of


legislations of a country specific. In India, IPRs can be protected
and monopolized as per the act. Some of them are

1 The Patent Act, 1970,


2 The Designs Act, 2000,
3 The Trade Mark Act, 1999,
4The Geographical Indications of Goods Act, 1999,
5- The Copyright Act, 1957,
6- Protection of Integrated Circuits Layout and Designs Act, 2000,
7- Protection of Plant Varieties and Farmers Rights Act, 2001, and
also Trade Secret
Society, Law and Ethics
VIOLATION OF IPR
Violation of intellectual property right may happen in one of the following ways:
Plagiarism
is the act of presenting the words, ideas, images,
sounds, or the creative expression of others as it is your creation or
your own.
The word plagiarism is derived from the Latin word plagiare, which
means to kidnap or abduct

Why is it important to understand Plagiarism?


• Plagiarism is stealing of intellectual
property
• Plagiarism is cheating
• Plagiarism is an Academic offence
• Plagiarism is Academic theft!
Society, Law and Ethics

• Two Types of Plagiarism


• Intentional Plagiarism • Unintentional Plagiarism
• Copying other’s work * Not knowing how to
• Borrowing/buying acknowledge or
incorporate sources of
assignments
information through
• Cut , paste from proper paraphrasing,
electronic resources summarizing and
• Downloading essays/text quotation
from the Internet and *Careless copying or cutting
and pasting from
presenting as our own electronic databases
work
Society, Law and Ethics

How to avoid plagiarism


1: Use your own ideas
2: Cite the sources-When someone else's ideas are used,
always acknowledge the sources and tell your reader WHERE
THE IDEAS ARE FROM.
3: Rewrite other's ideas in your own words
4: Take careful notes
5: Develop your writing skills
Society, Law and Ethics

Copyright infringement
Copyright infringement occurs when a party exercises
any of the creator’s exclusive rights to the work without
permission.
• Illegally downloading music files
• Downloading licensed software from an
unauthorized site
• Recording a movie in a theatre etc.
Society, Law and Ethics

Trademark infringement
Trademark infringement is defined as the unauthorized
use of a trademark or service mark.
Society, Law and Ethics

A software license is a legal agreement between the


software creator, or licensor, and the end user, or licensee,
outlining the terms and conditions for using a particular
software program. It serves as a set of rules that govern how
the software can be installed, accessed, and utilized.
Software licenses are crucial in the digital realm to protect
the intellectual property of developers and ensure that their
creations are used in a manner consistent with their
intentions.

Benefits of Using Licensed Software


• Using Unlicensed Software Against the Law
• The Right Software License Can Save our Money
• We have access to 24/7 license support.
Society, Law and Ethics

Software copyright is used software


by developers/software softwar
companies/proprietary
companies to prevent the unauthorized copyingeof their
softwares. Free and open source licenses also rely on
copyright law to enforce their terms.
Reason for copyright our software
• Our work(software development) is an
asset Protect our rights
• It protects our software structures
• It protects software code,sequencing and
organization It enhances protection against
license agreements
Society, Law and Ethics

Difference between licensing and copyright


• Copyright is like a shield that protects ideas and
creations. Licensing is a way to manage the risk of
losing that protection.
• It's like giving permission, and this permission is
detailed in a special agreement called a licensing
agreement.
• This agreement says what material can be used, how it
can be used, and for how long.
• So, it's a way for the owner (licensor) to control and
allow others to use their copyrighted stuff.
Society, Law and Ethics

Difference between licensing and copyright


The GNU General public license (GPL) and the Creative Commons
(CC) are two popular categories of public licenses.
CC is used for all kind of creative works like websites, music, film,
literature, etc. CC enables the free distribution of an others
copyrighted work.
It is used when an author wants to give people the right to share,
use and build upon a work that they have created.
GPL is primarily designed for providing public licence to a software.
GNU GPL is another free software license, which provides end users
the freedom to run,study, share and modify the software, besides
getting regular updates.
Society, Law and Ethics

Free and Open Source software(FOSS)


FOSS is a kind of software that all allows users to not only
freely run the program for any purpose, but also provides
users access to its source code. Moreover, it also allows us
to modify as we wish, as well as freely distribute copies of
the original version or their altered version.
Following criteria must be met for FOSS
▪ Source code must be included.
▪ Anyone must be allowed to modify the source code.
▪ Modified versions can be redistributed.
▪ It must be free.
Society, Law and Ethics

Example of Free and Open source


• As Operating system – linux,Ubuntu
software
• As dbms – mysql,mongodb,SQlite
• As Programming language –
java,php,python browser/webserve –
• As internet apache
r http
chromium,firefo server,apache
x/ tomcat
Society, Law and Ethics 1
Types of Software based on use:
1.Free Software:
• Definition: Software that gives users the freedom to use, modify, and
distribute it, often following the principles outlined by the Free
Software Foundation (FSF).
• Example: Linux operating system.
2.Open Source Software:
• Definition: Software whose source code is made available to the
public, allowing anyone to view, modify, and distribute it.
• Example: Apache HTTP Server.
3.Free and Open Source Software (FOSS):
• Definition: Software that combines the principles of both free
software and open source software, providing users with freedom
and access to the source code.
• Example: Mozilla Firefox browser.
Society, Law and Ethics
Types of Software based on use:
4. Proprietary Software:
• Definition: Software that is owned by a company or an individual, and its
source code is not publicly available. Users typically have limited rights
to use, modify, or distribute it.
• Example: Microsoft Office.
5. Freeware:
• Definition: Software that is available for free, but its source code may or
may not be accessible. Users are allowed to use it without payment.
• Example: Adobe Acrobat Reader.
6. Shareware:
• Definition: Software distributed on a trial basis, allowing users to try it
before purchasing. After a trial period, users are usually required to pay
for continued use.
• Example: WinZip.
Aspect Free Software Open Source Software
Emphasizes user freedom and Emphasizes practical benefits,
Philosophical ethical considerations, as per the focusing on collaborative
Foundation Free Software Foundation's development and high-quality
principles. software.
Users have the freedom to use the Users have the freedom to use
Freedom to Use
software for any purpose. the software for any purpose.
Users have access to the source Users have access to the source
Freedom to Study code and can study how the code and can study how the
software works. software works.
Users can modify the software and Users can modify the software
Freedom to Modify
share their modifications. and share their modifications.
Users can distribute both the Users can distribute both the
Freedom to Share original and modified versions of the original and modified versions of
software. the software.
Examples include the GNU General Examples include GPL, MIT,
License Types
Public License (GPL). Apache License.
Primary Advocate
Free Software Foundation (FSF) Open Source Initiative (OSI)
Organization
Focus on User
Yes Yes
Freedom
Focus on
May prioritize freedom over other May prioritize collaboration,
Society, Law and Ethics

Cyber Crime - Any crime that involves a computer and a


network is called a “Computer Crime” or “Cyber Crime.
Or in other term ,it is a crime in which a computer is the object of
the crime (hacking, phishing, spamming) or is used as a tool to
commit an offense .
STEPS TO PROTECT YOURSELF AGAINST CYBER CRIME
1. Make sure your security software is
current – and update it regularly.
2. Lock or log off your computer when you step away.
3. Go offline when you don’t need an internet connection.
4. Consider sharing less online.
5. Think twice about using public Wi-Fi.
6. When in doubt, don’t click.
Society, Law and Ethics

Types of Cyber
Crime
A computer is the target of the attack—for example, a
data breach on a bank site

A computer is an accessory to a criminal act—for


example, digital identity theft which leads to theft of
funds from a bank account
Society, Law and Ethics
Hacking
Hacking is the process of gaining unauthorized access into
a computing device, or group of computer systems. This
is done through cracking of passwords and codes which
gives access to the systems.

Difference between hacker and cracker is that a cracker


breaks the security of computer systems, and a hacker is
a person who likes to explore computer systems and
master them.
Society, Law and Ethics
Types of
Black hat
Hackers hackers or are individuals with
computing
crackers skills, resorting to malicious extraordinary
/ destructive activities. Black
hat hackers use their knowledge and skill for their own personal gains
probably by hurting others.
White hat hackers are those individuals who use their hacking skills for
defensive purposes. This means that the white hat hackers use their
knowledge and skill for the good of others and for the common good.
Ethical hacking also known as penetration testing or white-hat
hacking, involves the same tools, tricks, and techniques that hackers
use,but with one major difference that Ethical hacking is legal.
Grey-Hat Hackers These are individuals who work both offensively and
defensively at different times. Their behavior can’t be predicted.
Sometimes they use their skills for the common good while in some
other times he uses them for their personal gains.
Society, Law and Ethics

Hacking Process
▪ Foot Printing - Whois lookup,NS lookup,IP lookup
▪ Scanning - Port Scanning,Network Scanning
▪ Gaining Access-Password Attacks,Social Engineering,Viruses
▪ Maintaining Access - Os BackDoors,Trojans,Clears Tracks
Required Skills of an Ethical Hacker
❑ Microsoft: skills in operation, configuration and management.
❑ Linux:knowledge of Linux/Unix;security setting, configuration, services.
❑ Network Protocols: TCP/IP; how they function and can be manipulated.
❑ Firewalls: configurations, and operation of intrusion detection systems.
❑ Project Management: leading, planning, organizing, and
controlling a
penetration testing team.
❑ Routers: knowledge of routers, routing protocols, access control lists
❑ Mainframes
Society, Law and Ethics

What do hackers do after hacking?


⮚ Clear logs and hide themselves
⮚ Install rootkit ( backdoor ) -The hacker who hacked the system can use the
system later, It contains trojan virus, and so on
⮚ Install exploit program
⮚ Install denial of service program
⮚ Use all of installed programs silently
How to Prevent Hacking?
▪ Download software from authorized websites
▪ Scan all types of hard drives before running
▪ use strong passwords
▪ Never store or share login information
▪ Do not click on random email attachments
Society, Law and Ethics

Eavesdropping
It is the unauthorized real-time interception of a communication, such as a
phone call, instant message, videoconference or fax transmission.
Society, Law and Ethics

Phishing It is an unlawful activity where fake websites or emails


appear as original or authentic .This sites when clicked by the user
will collect sensitive and personal details like usernames, password,
credit card details etc
How to prevent phishing
• Always check the spelling of the URLs before click
• Watch out for URL redirects, that sent to a different website
with identical design
• If receive an email from that seems suspicious,
contact that source with a new email, rather than
just hitting reply
• Don't post personal data, like your birthday, vacation plans, or
your address or phone number, publicly on social media
Society, Law and Ethics

Ransomware This is another kind of cyber crime where the attacker


gains access to the computer and blocks the user from accessing,
usually by encrypting the data. The attacker blackmails the victim
to pay for getting access to the data, or sometimes threatens to
publish personal and sensitive information or photographs unless a
ransom is paid. Ransomware can get downloaded when the users
visit any malicious or unsecure websites or download software
from doubtful repositories.
Society, Law and Ethics

Preventing cyber crime


• Use strong password
• Secure your computer
• Protect your data
• Secure your mobile devices
• Secure wireless network
Society, Law and Ethics

Introduction-Cyber Safety
Cyber safety is the safe and responsible use of Internet &
ICT(Information & Communication Technology). Cyber safety is
about to not only keeping information safe and secure, but also
being responsible with that information, being respectful of
other people online. As per Cyber safety peoples are advised to
use good 'netiquette' (internet etiquettes).
Society, Law and Ethics
Safely Browsing the Web
Viruses and malware spread, easily and quickly through websites/web
browsing. Through clicking over the links found on web pages or in email
mistakenly our computer may be infected. An infected computer can run
slow, barrage us with pop-ups, download other programs without our
permission, or allow our sensitive personal information to others.
Tips for Safe Web Browsing
⮚ Common sense-(never respond to spam & disclose personal
information).
⮚ Use an antivirus & Firewall-It provide
realtime malware protection.
⮚ Create strong passwords
⮚ Mind your downloads -Be sure to review all pre-checked boxes
prompted at download & un-check any extra applications which
we don’t want to install.
⮚ Stay updated- Update O.S.,Applications & Anti-virus.
Society, Law and Ethics
Identity Protection
Protection against theft of personal information over Cyber Space
without consent, usually for financial gain is known as Identity
Protection.
Tips to Prevent Identity Theft
⮚ Use strong passwords and PINs & Keep passwords and PINs safe.
⮚ Create log-in passwords for all devices.
⮚ Beware of phishing scams.
⮚ Restore old computers to factory settings.
⮚ Encrypt your hard drive
⮚ Check security when shopping online-check links
authenticity which are received from an unsolicited email.
⮚ Take care when posting on social media-Check security settings on social
media accounts, and avoid posting personal information publicly, or publicly "checking in"
⮚ Secure your home Wi-Fi network& Avoid using insecure public Wi-Fi networks
Society, Law and Ethics
Confidentiality of Information
Allows authorized users to access sensitive and
secured data maintains the Confidentiality of
Information.
Tips to Protect Information Confidential
⮚ Build strong passwords
⮚ Use multifactor authentication- a computer user is granted access only after
successfully presenting 2 or more pieces of evidence.
⮚ Masking -The free version of MaskMe creates an alternate e-mail address whenever a
Web site asks for a user’s e-mail. E-mails from that site can be accessed via a MaskMe in-
box or forwarded to a user’s regular e-mail account.
⮚ Private Browsing & Safe Browsing-Purpose of pvt browsing is to avoid leaving a
history of one's browsing in the browser history on the computer we are using.Use updated
brower for safe browsing & browse privately.
⮚ Encryption-Use https based sites,as HTTPS ensures data security over the network -
mainly public networks like Wi-Fi. HTTP is not encrypted and is vulnerable to attackers.
PGP is a popular program used to encrypt and decrypt email over the Internet, as well as
authenticate messages with digital signatures and encrypted stored files.
Society, Law and Ethics

Cyberbullying It is the use of technology to harass , threaten


or humiliate a target .
Example: sharing of embarrassing photos or videos, posting
false information, sending mean text., etc.
Society, Law and Ethics

How to Prevent Cyber Bullying?


▪ Be aware of child’s online activities
▪ Watch for the following signs of cyberbullying in children:
⮚ Refusal to allow to see what they are doing online
⮚ Avoidance of discussing what they are doing online
⮚ Sudden, unexplained increase or decrease in online activity
⮚ Deactivating social media accounts
⮚ Emotional responses (including sadness, anger,
happiness) linked to their device usage
Adults should also teach children to recognize and be aware of
the signs of cyberbullying themselves.
Society, Law and Ethics

Cyber Trolling has become a more common term for any kind of
purposeful online abuse on social media sites like Twitter or
Facebook.
Society, Law and Ethics
Computer Security Threats
Malware: Malware could be computer viruses, worms, Trojan horses, dishonest
spyware, and malicious .
computer virus: It is a small piece of software that can spread from one infected
computer to another. It can corrupt, steal, or delete data on your computer/hard
drive.
Trojan horse: can do anything from record your passwords by logging keystrokes
(known as a keylogger) to hijacking your webcam to watch and record your every
move.
Computer worm: A computer worm is a software program that can copy itself from
one computer to another, without human interaction.
Spam: unwanted messages in your email inbox sent through computer generated
program.
Phishing:Phishing are fraudulent attempts by
cybercriminals to obtain private information. For e.g.a message
prompt your personal information by pretending that bank/mail service provider is
updating its website.
spyware: spyware is used to spy on their victims. An e.g. is keylogger software that
records a victim’s every keystroke on his or her keyboard.
Adware : unwanted ads shown while surfing internet.
Society, Law and Ethics
Safely accessing web sites
⮚ How to prevent/remove Adware/malware
▪ Uninstall the malicious programs from Windows
▪ Use antivirus program for malware and unwanted programs
▪ Reset the browser settings to their original defaults
▪ Scan for malicious programs antivirus/antimalware program

⮚ How to prevent/remove virus


▪ Beware of Fake Download Buttons
▪ Use a Secure Browser
▪ Avoid Public Torrent Sites
▪ Don’t Open Email Attachments Forwarded to You
▪ Don’t Use Your PC’s Admin Account
▪ Scan All New Files and Disks

⮚ How to prevent/remove Trojan


▪ Never open unsolicited emails from unknown senders
▪ Avoid downloading and installing programs unless you fully trust publisher
▪ Use firewall software
▪ Use a fully updated antivirus program
Society, Law and Ethics

The Information Technology Act of India, 2000

“The Information Technology Act, 2000 (also known as


ITA-2000, or the IT Act) is an act of the Indian Parliament
(no 21 of 2000),it was notified on 17th
October 2000. It is the most important law in India that
deals with the digital crimes or cyber crimes
and electronic commerce.
Society, Law and Ethics

Some key points of the Information Technology (IT)


Act 2000 are as follows:
❑ Act has given birth to new business to companies to issue digital certificates
by becoming the Certifying Authorities.
❑ This Act allows the government to issue notices
on internet through e- governance.
❑ E-mail is now considered as a valid and legal form of communication.
❑ Digital signatures are given legal validity within the Act.
❑ The communication between the companies or between the company and
the government can be done through internet.
❑ Addressing the issue of security is the most important feature of this Act. It
introduced the construct of digital signatures that verifies the identity of an
individual on internet.
❑ In case of any harm or loss done to the company by criminals, the Act
provides a remedy in the form of money to the company
Society, Law and Ethics
E-Waste -Whenever an electronic device covers up its working life, or becomes
non-usable due to technological advancements or becomes non-functional, it is not
used anymore and comes under the category of e-waste or electronic waste. As the
technology is changing day by day, more and more electronic devices are becoming
non-functional and turning into e-waste. Managing such non-functional electronic
devices is termed as e-waste management.
Ewaste Hazards -
On environment
⮚ Acidification of soil
⮚ Air pollution
⮚ Pollution of ground water
⮚ Landfills with lead and heavy metals
On Human Health
⮚ Lung cancer
⮚ DNA damage
⮚ Asthmatic bronchitis
⮚ Chronic damage to the brain
⮚ Damage to heart, liver and spleen
Society, Law and Ethics

E-waste management can be defined as the practical and holistic approach and the
founding pillar of cutting down waste from our mother earth. It is reusing and
recycling of e-waste which is no longer in use and can be salved for some of its
components. We are on the verge of a
technological breakthrough with the introduction of AI and we
need to dispose off toxic e-waste from our home before we pile up more and
more e-waste. We are is dire need of introducing a customer awareness campaign
because of lack of interest and knowledge regarding e-waste. Proper disposal of
used electronic gadgets
E-waste is a growing problem for us in India. As an 132cr strong economy, we
produce e- waste in large quantities. It is very important to dispose off waste in a
pragmatic manner.
Ways to dispose off e-waste:
1. Give Back to Your Electronic Companies and Drop Off Points
2. Visit Civic Institutions
3. Donating Your Outdated Technology
4. Sell Off Your Outdated Technology
5. Give Your Electronic Waste to a Certified E-Waste Recycler
Society, Law and Ethics

Awareness of Health concerns related to the usage of


technology. Physical Problems:
• Repetitive Strain Injury: the pain exists even when resting and that the lightest
work becomes hard to do.
• Carpal Tunnel Syndrome: This is an illness caused by injuries that occur due to
force on the median nerve found in the wrist.Its symptoms can occur as tingling
in hands and fingers and the feeling of lethargy, sudden pain in wrists and arms
and sometimes even in shoulders, neck and in the body
• Computer Vision Syndrome: Experts stated that people blink their eyes more
frequently while using a computer than they do at other times and that they
face some problems related to this situation.
• Radiation: Computer screens produce radiations of various types. There have
always been doubts that Individuals will have illnesses such as headaches and
inattentiveness
• Sleeping Disorders and Decrease in Productivity
• Loss of Attention and Stress
Society, Law and Ethics

Awareness of Health concerns related to the usage of


technology. Psychological Problems:
⮚ Fear of technology
⮚ Computer anxiety
⮚ Internet addiction
• Egosurfing: An illness of regularly searching for one’s own name on the web and
checking what information is available about one’s own on the net.
•Infornography: The word, derived from pornography and information, describes the
state of "trying to soothe hunger for information on the net.”
• Blog streaking: A desire to spread information online that shouldn’t be known by
everybody.
•Youtube-Narcissism: Constantly uploading one’s own videos in order to introduce
and make himself or herself known tooth ers.
• Google-Stalking: Trying to get information about
all his or her relatives or
acquaintances in the web.
• Photolurking: Looking at the photo albums of others’ on the net.
•Wikipediholism: Contributing to the internet encyclopedia, Wikipedia, sending some
one’s own writings, and revising the present texts.
Society, Law and Ethics

GENDER AND DISABILITY ISSUES WHILE TEACHING AND USING COMPUTERS


GENDER ISSUES
• Preconceived notions
• Lack of interest
• Lack of motivation
• Lack of role models
• Lack of encouragement in class
• Unavailability of teaching material / aids
Society, Law and Ethics
Disability Issues
In the specially abled students, there can be
one or more disabilities:
(i) Locomotor disabilities –polio, leprosy,
cerebral palsy.
(ii) Hearing and speech disabilities – Hearing
impairment, speech aphasia.
(iii) Cognitive impairment – Specific learning
deficits (Dyslexia, Dyscalculia). Down’s
syndrome, Autism.
(iv)Vision impairment. low vision, blindness.
Society, Law and Ethics

• Lack of special needs teachers


• Lack of supporting curriculum.
• Lack of resources

You might also like