0% found this document useful (0 votes)
3 views8 pages

Chapter 11 Societal Impact

Chapter 11 discusses the societal impact of digital technologies, highlighting their transformative role in various industries and everyday life while also addressing the risks associated with digital footprints and cyber crime. It emphasizes the responsibilities of netizens and the importance of data protection, intellectual property rights, and ethical online behavior. Additionally, the chapter covers the health implications of prolonged digital device usage and the legal framework established by the Indian IT Act 2000.

Uploaded by

anju.k10301
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views8 pages

Chapter 11 Societal Impact

Chapter 11 discusses the societal impact of digital technologies, highlighting their transformative role in various industries and everyday life while also addressing the risks associated with digital footprints and cyber crime. It emphasizes the responsibilities of netizens and the importance of data protection, intellectual property rights, and ethical online behavior. Additionally, the chapter covers the health implications of prolonged digital device usage and the legal framework established by the Indian IT Act 2000.

Uploaded by

anju.k10301
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

Chapter 11 Societal Impact

Introduction
Digital Technologies: - Digital technologies have significantly transformed
communication and everyday operations, making tasks more efficient, convenient,
and faster.
Applications: - Various industries such as banking, aviation, industrial produc-
tion, and e-commerce heavily rely on digital technologies for delivering goods
and services.
Widespread Use: - The advent of personal computers, the Internet, and
smartphones has democratized access to digital technologies, making them a
part of everyday life for the common man.
Dual Impact: - While digital technologies bring numerous benefits such as
enhanced productivity and connectivity, they also pose risks of misuse and
require awareness and caution.

Digital Footprint
Definition: - Digital footprints refer to the data trail left by an individual’s
online activities, which can include websites visited, emails sent, and information
submitted online.

1
Types: - Active Digital Footprints: Data intentionally submitted by users
such as posts, emails, and responses. - Passive Digital Footprints: Data
generated without the user’s explicit intention like browsing history and device-
specific details.
Awareness: - Being aware of one’s digital footprint is crucial as it can be used
for targeted advertising or potentially be misused. Users should be cautious
about their online actions as digital footprints are difficult to completely erase.

Digital Society and Netizen


Digital Society: - The integration of digital technologies into various aspects
of daily life including communication, social networking, banking, shopping,
entertainment, education, and transportation.

2
Netizen: - A digital citizen who uses digital technologies and the Internet
responsibly, ethically, and legally.
Responsibilities of a Netizen: - Abide by net etiquettes, communication
etiquettes, and social media etiquettes.

3
Net Etiquettes

Be Ethical: - No Copyright Violation: Avoid using copyrighted material


without permission. Respect intellectual property rights when streaming, down-
loading, or sharing content. - Share Expertise: Share accurate and verified
information to contribute positively to the online community.
Be Respectful: - Respect Privacy: Protect personal communication and
respect the privacy of others by not sharing private content without consent. -
Respect Diversity: Acknowledge and respect the diversity of opinions, cultures,
and experiences in online interactions.
Be Responsible: - Avoid Cyberbullying: Refrain from engaging in harmful
online behaviors such as spreading rumors, giving threats, or public ridicule. -
Don’t Feed the Troll: Ignore inflammatory comments from trolls to discourage
their disruptive behavior.

4
Communication Etiquettes

Be Precise: - Respect Time: Avoid wasting time with unnecessary emails or


comments and be mindful of others’ priorities. - Respect Data Limits: Use
data and bandwidth efficiently by avoiding large attachments and opting for
compressed files or cloud storage links.
Be Polite: - Maintain a polite and non-aggressive tone in both synchronous
(real-time) and asynchronous (delayed) communications.
Be Credible: - Build and maintain credibility by being cautious and thoughtful
in comments, replies, and posts, which influences others’ trust in your contribu-
tions.

Social Media Etiquettes

Be Secure: - Choose Password Wisely: Use strong, frequently changed


passwords and never share personal credentials. - Know Who You Befriend:

5
Be cautious when connecting with unknown individuals to avoid malicious
interactions. - Beware of Fake Information: Develop the ability to discern
genuine information from fake news and posts.
Be Reliable: - Think carefully before uploading or sharing sensitive information
as once uploaded, it can remain on servers indefinitely even if deleted from a
user’s account.

Data Protection
Privacy: - Safeguarding sensitive information such as biometric, health, and
financial data.
Methods: - Employing encryption, authentication, and secure data handling
practices.
Laws: - Different countries have specific regulations to protect personal data.

Intellectual Property Rights (IPR)


Definition: - Intellectual Property Rights protect the creations of individuals,
allowing them to earn recognition or financial benefits.
Types of IPR: - Copyright: Grants legal rights to creators of original works
like writing, photographs, software, and more. It allows the holder to reproduce,
distribute, display, or perform the work and prevents others from using it without
permission. - Patent: Protects inventions, giving the inventor exclusive rights
to use, sell, or distribute the invention for a certain period (usually 20 years). -
Trademark: Includes symbols, names, designs, or phrases that distinguish a
brand or product. It prevents others from using similar marks that could cause
confusion.

Violation of IPR
Types of Violations: - Plagiarism: Using someone else’s work or ideas
without proper attribution. - Copyright Infringement: Using copyrighted
material without permission. - Trademark Infringement: Unauthorized use
of a registered trademark.

Public Access and Open Source Software


Definition: - Public Access and Open Source Software licenses allow others
to use, modify, and distribute the work under certain conditions, promoting
collaboration and innovation.
Examples: - GNU General Public License (GPL) - Creative Commons (CC)
licenses

6
Cyber Crime
Definition: - Cyber Crime includes illegal activities conducted using computers
or networks aiming to harm individuals, organizations, or nations.
Types of Cyber Crimes: - Hacking: Unauthorized access to computer
systems. It can be ethical (white hat) or malicious (black hat). - Phishing and
Fraud Emails: Creating fake websites or emails to steal sensitive information
like usernames and passwords. Identity Theft is a common form of phishing
where stolen personal data is used for fraudulent activities. - Ransomware:
Encrypting a victim’s data and demanding a ransom to restore access. It often
spreads through malicious websites, email attachments, or advertisements.
Combatting and Preventing Cyber Crime: - Regular data backups, using
updated antivirus software, avoiding pirated software, using strong passwords,
and securing wireless networks.

Indian IT Act 2000


Indian Information Technology Act (IT Act): - The Indian IT Act 2000
provides a legal framework for electronic governance and outlines penalties for
cyber crimes. It empowers the government to accept digital documents and
establishes a Cyber Appellate Tribunal for resolving disputes.

7
Impact on Health

Digital Technology’s Impact on Health: - Physical and psychological effects


from prolonged screen time, improper posture, and internet addiction.
Ergonomics: - Helps design safe and comfortable workspaces to reduce physical
strain.
Common Health Issues: - Eye Strain: Caused by prolonged screen exposure.
- Postural Issues: Back, neck, and shoulder pain from improper posture. -
Overuse Injuries: Wrist and finger pain from excessive typing. - Stress and
Obesity: Resulting from excessive use of digital devices.

You might also like