0% found this document useful (0 votes)
20 views

Module II

This document discusses several topics related to social informatics and information technology. It defines social informatics as the study of the social impact of information technology. It also discusses the global village concept and digital divide. Some key IT applications in business are also outlined such as e-business, e-commerce, and enterprise resource planning systems. The document also covers ICT in education and various Indian government initiatives. Computer health issues, cyber ethics, and cyber addiction are also summarized.

Uploaded by

gibinshaji2
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views

Module II

This document discusses several topics related to social informatics and information technology. It defines social informatics as the study of the social impact of information technology. It also discusses the global village concept and digital divide. Some key IT applications in business are also outlined such as e-business, e-commerce, and enterprise resource planning systems. The document also covers ICT in education and various Indian government initiatives. Computer health issues, cyber ethics, and cyber addiction are also summarized.

Uploaded by

gibinshaji2
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 20

MODULE II

SOCIAL INFORMATICS
Social Informatics
Social Informatics is the study of social impact of Information technology.

Global village
Global village is a metaphoric shrinking of the world into a village through the use
of information technology tools, electronic media and internet.

Digital Divide
It is the gap between those who have access to digital technologies and those who do
not have.
IT Applications in Commerce, business & industry

 E-Business
 E-Commerce
 Electronic Retailing
 EDI
 CAD & CAM
 E-Marketing
 Communication System
 ERP
 Enterprise Collaboration Systems
 Business Application softwares
 E-CRM ( Electronic customer relationship management)
 MIS( Management Information System)
 EPS ( Electronic payment systems)
ICT & EDUCATION
 Indira Gandhi National Open University (IGNOU)
 SWAYAM (Study Webs of Active-Learning for Young Aspiring
Minds)
 National programme on technology enhanced learning:
 SWAYAM Prabha
 Ekalavya initiative
 IIT Kanpur has developed ‘Brihaspati’
 ERNET & EDUSAT Systems
 INFONET & CEC (Consortium for Educational Communication)
 Information and Library Network Centre.
 UGC MOOCs(Massive open online courses)
Computer and Health Issues
Computer and Health Issues
1. Eyestrain & Vision problems – Continuously staining at the monitor screen
without taking breaks or blinking can cause eyestrains and dry eyes.
2. Muscular Problems – Back pain, chest pain, pain or numbness in arms, neck,
shoulder and feet are common symptoms due to incorrect posture while using the
computer.
3. Repetitive strain injury – It is caused by repetitive tasks or awkward positions.
Pain in the neck, shoulder or anywhere from the shoulder to fingers.
4. Headache - Prolonged use can affect eye power which result in headache.
5. Mental stress – Long hours in front of the computer and work pressure can have a
negative bearing in the mental setup of computer users.
Proper posture while using computer
Proper usage of Computers & Internet
A) Cyber Ethics
Ethics is the branch of knowledge that deals with moral principles that govern a
person’s behavior or conducting an activity.
Cyber ethics is a branch that studies ethics pertaining to computers ,code of
responsible behavior in Internet.
Ethical practices are listed below
 Respect and protect the privacy of others online.
 Respect digital ownership rights while using information from the internet.
 Do not cyber bully.
 Do not break someone else computer.
 Do not try to make someone else computer unusable.
 Adhere to copyright restrictions when downloading material from the internet.
 Don’t pretend to be someone else.
 Respect and protect available electronic resources.
B) Cyber addiction
It means excessive use of computer or internet or gaming that interfaces with daily life.
Addiction is defined as compulsive need for and use of a habit characterized by well-defined
symptoms upon withdrawal.
Cyber addiction is also known as Internet Addiction Disorder(IAD)
Eg: Excessive video gaming,
compulsive online shopping,
internet uses
excessive use of smartphones.
Problems
 affects social life
 Personal relationship
 Tremendous anxiety
 Difficult to face real life
 Fear to communicate with others

 There are three types of Internet addictions


1. Excessive gaming
2. Sexual preoccupations
3. Email or text messaging
Cyber Crimes

 Cyber crimes can involve criminal activities that are traditional in nature, such as theft,
forgery, defamation and mischief.
 It can be categorized into two
1. The computer as a target – Using a computer to attack other computers.
Eg: Hacking, Virus/Worms attacks, DoS attack etc.
2. The computer as a weapon – Using a computer to commit real world crimes.
Eg: Cyber terrorism, credit Card fraud, Electronic Fund Transfer
Frauds(ETF),Pornography etc.
List of Common Cyber Crimes

1. Unauthorized access and Hacking - Any kind of access to


computer system or network without permission from concerned authority.
 2. Trojan attack
A malware which seems to be useful but causes serious
destruction is called Trojan virus. When activated it can perform
any number of attacks on the host , like deleting files, stealing
data, or activating and spreading other viruses.
3. Virus and Worm attack
Virus is a malware that propagates by inserting a copy of
itself into and becoming part of another program.
Worms are similar to viruses as they can duplicate copies
of themselves to cause damage. They do not require an infected host file or human
help to propagate.
4. Email Spoofing
It is a fraudulent activity of hiding email origins. It is done
by altering the email sender’s information while delivering emails. Hence it’s a
forgery of an email header.
5. Email Spamming
It means sending email to thousands and thousands of users. Spam
is an unsolicited mail or electronic junk mail.
6. Emails with malicious codes
It is used to send viruses ,worms etc.
7. Email Bombing
It involves repeatedly sending an identical email message,
threatening emails or defamatory emails to a particular address.
8. Logic Bomb
It is a malicious program that is intentionally designed to execute when specific
conditions are met.
9. Denial of service attacks
Flooding a computer resource with more requests than it can handle is
called DoS. The system or network get entirely disabled so that service is denied to authorized
users.
10. Forgery
It implies making fake documents using computers, printers or scanners.
11. Intellectual Property Right violation
Violating one’s right on Intellectual Property through activities like
software piracy, copyright infringement, trade marks violations, theft of computer source code
and patent violation.
12. Banking /credit card related crimes
Using stolen card information or fake credit/debit card s to steal money or
to gain access to confidential financial information.
13. Cyber Stalking
Following a person’s movements across internet is called Cyber
stalking.
14. Data Diddling
It is the manipulation of data during or before it is entered into a computer.
Information is changed from the way it should be entered either manually or through computer
program.
15.Theft of Internet Hours
Illicitly gaining access to internet service or unauthorized use of internet
hours paid for by another person.
16. Phishing
Making websites or sending emails that looks like original and extracting
usernames, password, credit card details etc.
17.Cyber Squatting
It refers to registering domain names and creating trademarks identical to
popular service providers with a view to exploit benefit by attracting their users.
18. Cyber terrorism
Engaging in terrorism in the cyber world by way of attacking
telecommunication networks, air traffic control, military and government installations,
communication satellite etc

CA3 (2020-07-22) (1).html


E-Waste
 It is defined as discarded, obsolete, non-functional computers, office electronic equipment,
entertainment device electronics, mobile phones, television sets and refrigerators.

 It includes used electronics which are destined for reuse, resale, salvage, recycling, or
disposal as well as re-usables and secondary scraps
Green Computing
 Green computing , also known as green technology or clean technology is the
environmentally responsible and eco-friendly use of computers and electronic devices.
 It is also defined as the study of designing , engineering, manufacturing , using and
disposing of computing devices in a way that reduces their environmental impact.
 Four approaches for promoting green computing are
1. Green design
2. Green manufacturing
3. Green use
4. Green disposal

You might also like