Chapter 11 Societal Impact
Chapter 11 Societal Impact
Introduction
Digital Technologies: - Digital technologies have significantly transformed
communication and everyday operations, making tasks more efficient, convenient,
and faster.
Applications: - Various industries such as banking, aviation, industrial produc-
tion, and e-commerce heavily rely on digital technologies for delivering goods
and services.
Widespread Use: - The advent of personal computers, the Internet, and
smartphones has democratized access to digital technologies, making them a
part of everyday life for the common man.
Dual Impact: - While digital technologies bring numerous benefits such as
enhanced productivity and connectivity, they also pose risks of misuse and
require awareness and caution.
Digital Footprint
Definition: - Digital footprints refer to the data trail left by an individual’s
online activities, which can include websites visited, emails sent, and information
submitted online.
1
Types: - Active Digital Footprints: Data intentionally submitted by users
such as posts, emails, and responses. - Passive Digital Footprints: Data
generated without the user’s explicit intention like browsing history and device-
specific details.
Awareness: - Being aware of one’s digital footprint is crucial as it can be used
for targeted advertising or potentially be misused. Users should be cautious
about their online actions as digital footprints are difficult to completely erase.
2
Netizen: - A digital citizen who uses digital technologies and the Internet
responsibly, ethically, and legally.
Responsibilities of a Netizen: - Abide by net etiquettes, communication
etiquettes, and social media etiquettes.
3
Net Etiquettes
4
Communication Etiquettes
5
Be cautious when connecting with unknown individuals to avoid malicious
interactions. - Beware of Fake Information: Develop the ability to discern
genuine information from fake news and posts.
Be Reliable: - Think carefully before uploading or sharing sensitive information
as once uploaded, it can remain on servers indefinitely even if deleted from a
user’s account.
Data Protection
Privacy: - Safeguarding sensitive information such as biometric, health, and
financial data.
Methods: - Employing encryption, authentication, and secure data handling
practices.
Laws: - Different countries have specific regulations to protect personal data.
Violation of IPR
Types of Violations: - Plagiarism: Using someone else’s work or ideas
without proper attribution. - Copyright Infringement: Using copyrighted
material without permission. - Trademark Infringement: Unauthorized use
of a registered trademark.
6
Cyber Crime
Definition: - Cyber Crime includes illegal activities conducted using computers
or networks aiming to harm individuals, organizations, or nations.
Types of Cyber Crimes: - Hacking: Unauthorized access to computer
systems. It can be ethical (white hat) or malicious (black hat). - Phishing and
Fraud Emails: Creating fake websites or emails to steal sensitive information
like usernames and passwords. Identity Theft is a common form of phishing
where stolen personal data is used for fraudulent activities. - Ransomware:
Encrypting a victim’s data and demanding a ransom to restore access. It often
spreads through malicious websites, email attachments, or advertisements.
Combatting and Preventing Cyber Crime: - Regular data backups, using
updated antivirus software, avoiding pirated software, using strong passwords,
and securing wireless networks.
7
Impact on Health