0% found this document useful (0 votes)
833 views

Unit 1.2 Ethical & Social Issues in ICT

The document discusses several ethical and social issues related to information and communication technology (ICT) and social media. It outlines opportunities and risks of social media use, including connectivity, education, and threats like hacking and cyberbullying. It also covers the concept of digital citizenship and footprint, and the need to develop policies to promote safe, responsible and positive online behavior.

Uploaded by

Siddhartha Dahal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
833 views

Unit 1.2 Ethical & Social Issues in ICT

The document discusses several ethical and social issues related to information and communication technology (ICT) and social media. It outlines opportunities and risks of social media use, including connectivity, education, and threats like hacking and cyberbullying. It also covers the concept of digital citizenship and footprint, and the need to develop policies to promote safe, responsible and positive online behavior.

Uploaded by

Siddhartha Dahal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 19

Ethical and Social Issues in ICT

Introduction
● ICT is the technology that uses computers, the internet, different devices and
broadcast medias for retrieving, storing and exchanging information among different
people.
● With the help of different ICT tools like- social networking sites, email, video
conferencing etc, people can get connected easily.
● Similarly, the misuse of internet and social media has raised ethical issues about
the protection of personal privacy, protection of intellectual property, user
responsibility, acceptable access and use of information, software licence and
piracy.
Social Media
● Different Social media
● Facebook
● Instagram
● Youtube
● Twitter
● Viber
● Whatsapp
● Emo
● Snapchat
Opportunities in social media
● Connectivity
● Education
● Information and news
● Business promotion
● Awareness
● Building communities
Threats or Risks in social media
● Hacking
● Fake account
● Spam or Malware attack
● Cyber-bullying
● Fake news
Disadvantages of social media
● Cyber-bullying
● Hacking
● Addiction
● Health issues
● Security issues
● Fraud and scams
● Reputation
● Relationship issues
How to stay safe online?
● Never share password to anyone.
● Always use strong password and change it often.
● Never visit untrustworthy websites.
● Setup two factor authentication.
● Only talk with people you actually know.
● Don’t share false news, hateful contents. Be sure the content you share is true.
● Always logout your account when you close apps.
● Install internet security / firewall protection programs and update it regularly.
Digital Citizenship
● A person having the skills and knowledge of using digital technology is known as
digital citizen.
● Every digital citizen has responsibilities and duties & must know what is right and
wrong while using the digital technology.
● The responsibilities and duties of a digital citizen in a digital community is known as
digital citizenship.
Digital Footprint
● The data traces of all the online activities of a person is known as digital
footprint.
○ Types: Active & Passive
■ The active digital footprint are those traces of data which are
intentionally created when a user performs some activities on the
internet.
■ The passive digital footprint are those traces of data which are
created without the knowledge of user. It is a hidden process and
user may not know about it.
Usage of Digital Footprint
● A digital footprint can trace the user’s online activities. It can trace the IP
address of user, their login details and other personal informations.
● Digital footprints can be used by the law enforcers, universities and
employees as a basis of character of a person.
● So it is always good to have a better digital footprint. It makes the user aware
about sending scathing emails and posting/commenting means/hatred
contents.
Protecting digital footprint
● Don’t share too much personal information of the social sites.
● Use privacy setting to private or viewable by only close friends and families.
● Keep separate account and separate passwords for different purpose and change
passwords frequently.
● Keep track of your user details and passwords. Never share your passwords with
anyone and logout of social sites after use.
● Keep your softwares upto date.
Ways to develop a positive footprint
● Share only limited personal information
● Be careful with what you share, post or comment online.
● Add positive aspects of your life - achievements, learning experiences or
articles.
Information Technology Policy 2072
● Objectives
○ To make information technology affordable and accessible to all the people.
○ To develop good governance through use of ICT.
○ To develop and promote the sustainable, wider development of social
economic status.
○ To develop human resource in the field of ICT.
○ To encourage exploration of latest use ICT tools, research and development to
address technological challenges.
Goals
○ Nepal will strive towards enhancing overall national ICT readiness.
○ At least 75% of population will have digital literacy by end of 2020.
○ At least 90% of population will have access to broadband by end of
2020.
○ At least 2.5% increase in GDP by ICT sector (excluding telecom) by end
of 2020.
○ E-governance services would be given to at least 80% by 2020.
○ By end of 2020, all Nepalese will have internet access.
Cyber Crime
● The criminal activities committed using the computational devices and the internet is
called cyber crime.
● The activities related to cyber crime are:
○ Software piracy
○ Hacking
○ Online fraud
○ Cyber-bullying
○ Spam and malware attack
○ Many other intentional activities that harms the computer system
or other forms of digital property
Electronic Transaction Act
The House of Representative of Nepal has issued Electronic Transaction Act 2061 on
Bhadra 30th 2061 B.S. (2004) and Electronic Transaction Act 2063 on Bhadra 24, 2063 B.S.
(2006) It is also known as Cyber Law of Nepal.

Provision of ETA
● Provision of legal acceptance of digital signatures, electronic recordings,
electronic data processing, transferring, acceptance & receiving of documents.
● Provision of network service
● Provision of bodies to create, control and verify digital signatures.
● Provision of duties and responsibilities of the subscriber
● Provision on punishment of cyber crime
● Provision of formation of judicial body
Cyber law deals with:
● Digital signature
● Use of telecommunication law
● Intellectual property rights law
● Cyber crime law
● Data protection and privacy law
● Electronic transaction act
Need of Cyber Law
● To make electronic transaction reliable and secured.
● To provide a detailed provision for controlling and verifying the authorities to
use digital data.
● To provide legal provision to give safe online banking, electronic fund transfer,
any forms of online transaction etc.
● To give legal provision to use digital signature which is very essential to verify
and identify the digital documents.
● To provide provision of the appeal judicial body to address the cyber crimes.
● To provide the provisions to punish to hackers according to nature of cyber
crime.
Source: Computer Science Oxbridge

You might also like