Unit III: Society, Law, and Ethics

 Unit III: Society, Law, and Ethics

Digital footprints
Digital footprints are the traces of data that individuals leave behind while using the internet. These footprints can be categorized into two main types: active and passive.




Types of Digital Footprints

1. Active Digital Footprints:
  • Social Media Posts: Updates, photos, and comments on platforms like Facebook, Instagram, and Twitter.
  • Emails: Sent and received emails.
  • Online Forms: Information filled out on online forms, surveys, or registrations.
  • Blog Posts and Comments: Content published on blogs or comments left on various websites.
  • Online Purchases: Information about items bought online, including reviews and feedback.
2. Passive Digital Footprints:
  • Browsing History: Records of websites visited, even if not actively interacting with them.
  • IP Addresses: Data associated with the IP addresses that identify devices on the internet.
  • Cookies: Small files stored on devices by websites to track user behavior and preferences.
  • Location Data: Information on where a device has been, often collected through apps and services.
Importance and Implications
  • Privacy Concerns: Digital footprints can reveal personal information, leading to privacy breaches if not managed properly.
  • Security Risks: Hackers can exploit digital footprints to gain unauthorized access to personal and financial data.
  • Personal Branding: Online presence, including professional networks and personal posts, contributes to one's personal brand.
  • Data Analytics: Businesses use digital footprints to analyse consumer behaviour and preferences for targeted marketing.
Managing Digital Footprints
  • Privacy Settings: Regularly update privacy settings on social media and other platforms to control what information is shared publicly.
  • Clear Browsing Data: Frequently clear cookies and browsing history to           minimize  passive footprints.
  • Use Strong Passwords: Implement strong, unique passwords for different   accounts to protect against unauthorized access.
  • Be Mindful of Sharing: Think twice before posting personal information online  and avoid oversharing.
  • Use Encryption: Use encrypted communication methods for sensitive information to enhance security.
Digital Society and Netizen: net etiquettes, communication etiquettes, social media etiquettes




Netiquette:

Netiquette refers to the correct or acceptable way of communicating on the internet. Key principles include:
1.Be Respectful: Treat others with respect, regardless of differences in opinions or beliefs.
2.Avoid Trolling: Do not post inflammatory or offensive comments to provoke others.
3.Respect Privacy: Do not share personal information of others without their consent.
4.Use Appropriate Language: Avoid using foul or abusive language.
5.Be Constructive: Provide constructive feedback and engage in meaningful discussions.

Communication Etiquettes:

Communication etiquette involves proper conduct when communicating via digital means, including email, instant messaging, and video calls. 
Important guidelines are:
1.Clear and Concise Messages: Keep messages clear and to the point.
2.Professional Tone: Maintain a professional tone, especially in work-related communications.
3.Timely Responses: Respond to messages in a timely manner to maintain effective communication.
4.Proper Formatting: Use proper grammar, spelling, and formatting.
5.Subject Lines: Use relevant subject lines in emails to indicate the content of the message.

Social Media Etiquettes:
Social media etiquette encompasses the proper way of interacting on platforms like Facebook, Twitter, Instagram, and LinkedIn. Key practices include:
1.Respectful Interaction: Engage respectfully with others, avoiding arguments and personal attacks.
2.Think Before Posting: Consider the potential impact and permanence of posts before sharing.
3.Credit Sources: Always credit original sources when sharing content created by others.
4.Be Authentic: Maintain authenticity and honesty in your posts and interactions.
5.Avoid Spamming: Do not flood timelines or feeds with excessive posts, tags, or messages.

Data protection:

Data protection encompasses various aspects of safeguarding information and respecting intellectual property rights (IPR). Understanding the different types of IPR, recognizing violations, and comprehending open-source software and licensing are crucial in the digital age.




Intellectual Property Rights (IPR)

Intellectual property rights are legal rights that protect creations of the mind. These include:

1. Copyright:
  • Definition: Protects original works of authorship such as literature, music, and art.
  • Duration: Generally lasts for the lifetime of the author plus 70 years.
  • Rights Granted: Exclusive rights to reproduce, distribute, perform, display, or license the work.
2. Patent:
  • Definition: Protects new inventions or discoveries.
  • Duration: Typically lasts for 20 years from the filing date.
  • Rights Granted: Exclusive rights to make, use, sell, and import the invention.
3. Trademark:
  • Definition: Protects symbols, names, and slogans used to identify goods or services.
  • Duration: Can last indefinitely, as long as the trademark is in use and properly renewed.
  • Rights Granted: Exclusive rights to use the mark in commerce and to prevent others from using similar marks that could cause confusion.
Violation of IPR

Violations of intellectual property rights include:

1. Plagiarism:
  • Definition: The act of using someone else's work or ideas without proper attribution.
  • Implications: Academic and professional consequences, legal penalties, and reputational damage.
2. Copyright Infringement:
  • Definition: Unauthorized use of copyrighted material.
  • Examples: Copying and distributing music, movies, books, or software without permission.
  • Penalties: Legal action, fines, and potential imprisonment.
3. Trademark Infringement:
  • Definition: Unauthorized use of a trademark that causes confusion about the origin of goods or services.
  • Examples: Using a similar logo or brand name to mislead consumers.
  • Penalties: Legal action, financial damages, and injunctions against further use.
Open-Source Software and Licensing:

Open-source software is software with source code that anyone can inspect, modify, and enhance. Key open-source licenses include:

1. Creative Commons (CC):
  • Purpose: Provides a variety of licenses that creators can use to specify permissions for their works.
  • Types: Ranges from the most permissive (CC BY) to the most restrictive (CC BY-NC-ND).
2. General Public License (GPL):
  • Purpose: Ensures that software remains free and open, requiring any derivative works to also be distributed under the same license.
  • Key Feature: Copyleft provision, which mandates that modifications and derived works must be open source under the GPL.
3. Apache License:
  • Purpose: Provides a permissive license allowing users to use the software for any purpose, distribute it, modify it, and distribute modified versions.
  • Key Feature: Does not require derivative works to be open source, allowing for incorporation into proprietary projects.

Cyber Crime:

Cyber crime encompasses illegal activities conducted via the internet or other computer networks. These crimes exploit vulnerabilities in digital systems and can cause significant harm to individuals, organizations, and society at large. Key types of cyber crime include hacking, eavesdropping, phishing, ransomware, cyber trolling, and cyber bullying.




Cyber Crime:
  • Definition: Illegal activities conducted using computers, networks, or the internet.
  • Impact: Can lead to financial loss, data breaches, identity theft, and emotional distress.
Types of Cyber Crime

1. Hacking:
  • Definition: Unauthorized access to computer systems or networks.
  • Methods: Exploiting vulnerabilities, using malware, or brute force attacks.
  • Consequences: Data theft, system damage, and loss of privacy.
2. Eavesdropping:
  • Definition: Intercepting private communications without permission.
  • Methods: Man-in-the-middle attacks, network sniffing.
  • Consequences: Exposure of sensitive information, loss of confidentiality.
3. Phishing and Fraud Emails:
  • Definition: Fraudulent attempts to obtain sensitive information by masquerading as a trustworthy entity.
  • Methods: Fake emails, websites, or messages that prompt recipients to provide personal information.
  • Consequences: Identity theft, financial loss, and unauthorized access to accounts.
4. Ransomware:
  • Definition: Malware that encrypts a victim's data and demands payment for the decryption key.
  • Methods: Phishing emails, malicious downloads, exploit kits.
  • Consequences: Data loss, financial extortion, and operational disruptions.
5. Cyber Trolls:
  • Definition: Individuals who deliberately provoke or harass others online to elicit emotional responses.
  • Methods: Posting inflammatory, off-topic, or offensive comments.
  • Consequences: Disruption of online communities, psychological distress.
6. Cyber Bullying:
  • Definition: The use of digital communication tools to bully, harass, or intimidate someone.
  • Methods: Social media harassment, threatening messages, spreading rumors.
  • Consequences: Emotional trauma, mental health issues, and, in severe cases, suicidal thoughts.
Cyber Safety

Cyber safety involves practices and measures to protect oneself and one's information while using the internet. It includes safely browsing the web, protecting your identity, and maintaining the confidentiality of your data.





Safely Browsing the Web

1. Use Secure Connections:
  • HTTPS: Always check that websites use HTTPS instead of HTTP. The 'S' stands for secure, meaning that the data sent between your browser and the website is encrypted.
  • VPN: Use a Virtual Private Network (VPN) to encrypt your internet connection, especially when using public Wi-Fi. This prevents attackers from eavesdropping on your online activities.
2. Avoid Suspicious Websites:
  • Check URLs: Be cautious of URLs that look unusual or unfamiliar. Cybercriminals often use slightly altered URLs to trick users into visiting malicious sites.
  • Security Indicators: Look for a padlock icon in the address bar and verify the site’s certificate to ensure it’s legitimate.
3. Use Safe Browsing Tools:
  • Browser Extensions: Install extensions that block ads, trackers, and malicious sites. Examples include uBlock Origin and Privacy Badger.
  • Antivirus Software: Use reputable antivirus software that provides real-time protection against malware and phishing attempts.
4. Regularly Update Software:
  • Browsers and OS: Keep your web browser and operating system up to date to protect against security vulnerabilities.
  • Plugins: Update plugins like Java and Flash or disable them if not needed, as they can be exploited by attackers.
5. Be Cautious with Downloads:
  • Sources: Download software and files only from trusted sources. Avoid pirated software, as it can contain malware.
  • Scans: Use antivirus software to scan files before opening them.
Identity Protection
1.Use Strong Passwords:
  • Complexity: Create passwords that are at least 12 characters long and include a mix of letters, numbers, and special characters.
  • Uniqueness: Avoid reusing passwords across different accounts. Use unique passwords for each account.
2.Enable Two-Factor Authentication (2FA):
  • Extra Security: Enable 2FA on all accounts that offer it. This adds an extra layer of security by requiring a second form of verification, such as a code sent to your phone.
  • Methods: Use authentication apps like Google Authenticator or Authy instead of SMS-based 2FA for better security.
3.Be aware of Phishing Scams:
  • Emails and Links: Be cautious of emails or messages asking for personal information or containing suspicious links. Verify the sender’s email address and look for signs of phishing.
  • Attachments: Do not open attachments from unknown sources.
4.Monitor Personal Information:
  • Credit Reports: Regularly check your credit reports for any suspicious activity.
  • Account Activity: Monitor your bank and online accounts for unauthorized transactions.
Confidentiality
1. Data Encryption:
  • Storage: Encrypt sensitive data stored on your devices. Tools like BitLocker (Windows) or FileVault (Mac) can encrypt your hard drive.
  • Communication: Use encrypted communication tools for sending sensitive information. Apps like Signal and WhatsApp offer end-to-end encryption.
2. Secure Backups:
  • Regular Backups: Regularly back up important data to an external drive or cloud service. Ensure that backups are encrypted and stored securely.
  • Offsite Storage: Consider using an offsite location for storing backups to protect against physical threats like theft or fire.
3. Access Controls:
  • Permissions: Restrict access to sensitive information based on user roles. Ensure that only authorized individuals have access to certain data.
  • Authentication: Use strong authentication methods for accessing sensitive systems and data.
4. Secure Disposal:
  • Data Wiping: Use secure methods to erase data from devices before disposal. Simply deleting files is not enough; use tools that perform a complete wipe of the storage.
  • Physical Destruction: For highly sensitive information, consider physically destroying storage media to ensure data cannot be recovered.
Malware

Malware, short for malicious software, is any software intentionally designed to cause damage to a computer, server, client, or computer network. Malware can steal, encrypt, or delete data, alter or hijack core computing functions, and spy on computer activity without the user's knowledge or permission.

Types of Malware:

1. Viruses :

Definition: A computer virus is a type of malware that attaches itself to a legitimate program or file and spreads to other programs and files on the same system, eventually affecting other systems.

Characteristics:
  • Replication: Viruses can replicate themselves and spread to other programs and files when the infected program or file is executed.
  • Activation: Often, viruses lay dormant until the infected file is run or a specific condition is met.
  • Payload: They can carry a payload that performs malicious actions like corrupting data, logging keystrokes, or even creating backdoors.
Prevention and Protection:
  • Antivirus Software: Regularly update and run antivirus software to detect and remove viruses.
  • Avoid Suspicious Links and Downloads: Be cautious when opening email attachments or downloading files from unknown sources.
  • System Updates: Keep your operating system and applications up-to-date to protect against known vulnerabilities.
2. Trojans:

Definition: A Trojan horse, or Trojan, is a type of malware that disguises itself as legitimate software. Users are typically tricked into loading and executing Trojans on their systems.

Characteristics:
  • Deception: Trojans appear as harmless or useful software but perform malicious activities once installed.
  • Variety of Malicious Actions: They can create backdoors, steal information, or download additional malware.
  • No Self-Replication: Unlike viruses and worms, Trojans do not replicate themselves but rely on social engineering to spread.
Types of Trojans:

  • Backdoor Trojans: Allow remote control over the infected system.
  • Downloader Trojans: Download and install other malicious software.
  • Spyware Trojans: Monitor user activities and steal sensitive information.
  • Banking Trojans: Target online banking credentials and financial information.

Prevention and Protection:
  • Download from Trusted Sources: Only download software from reputable and official sources.
  • Be Wary of Unexpected Emails: Avoid downloading or opening attachments from unknown or unexpected email sources.
  • Security Software: Use comprehensive security software that can detect and block Trojans.
3. Adware

Definition: Adware is a type of malware that automatically delivers advertisements to the user’s device. It is often bundled with free software and installed without the user's knowledge or consent.

Characteristics:

  • Pop-Up Ads: Generates frequent and intrusive advertisements, often in the form of pop-up windows.
  • User Tracking: Adware can track the user’s browsing habits and send this data back to advertisers.
  • Performance Impact: Can slow down system performance and use up bandwidth.
Types of Adware:

  • Legitimate Adware: Comes with user consent, often bundled with freeware or shareware, and can usually be removed by uninstalling the associated software.
  • Potentially Unwanted Programs (PUPs): Adware that is installed without explicit user consent and is often more difficult to remove.

Prevention and Protection:

  • Adblockers: Use browser extensions that block ads and pop-ups.
  • Careful Installation: Pay attention to installation prompts and opt out of installing additional software that you do not need.
  • Anti-Adware Tools: Use security software that can detect and remove adware.

E-Waste Management

E-waste, or electronic waste, refers to discarded electronic appliances and devices. With the rapid pace of technological advancement, the accumulation of e-waste has become a significant environmental issue. Proper e-waste management is essential to mitigate its harmful effects on the environment and human health.




Importance of Proper E-Waste Management

  • Environmental Protection: E-waste contains hazardous materials such as lead, mercury, cadmium, and brominated flame retardants, which can contaminate soil and water if not disposed of properly.
  • Resource Conservation: Many electronic devices contain valuable materials like gold, silver, copper, and rare earth elements. Proper recycling can recover these materials and reduce the need for mining new resources.
  • Health Protection: Improper disposal and informal recycling processes can expose workers and the public to toxic substances, leading to health issues like respiratory problems, skin diseases, and neurological damage.

Steps for Proper E-Waste Management


1. Reduce, Reuse, and Recycle:
  • Reduce: Minimize e-waste generation by buying only what you need, choosing durable products, and avoiding unnecessary upgrades.
  • Reuse: Extend the life of your electronic devices by repairing them, donating them to others, or selling them.
  • Recycle: Ensure that old and non-functional devices are recycled properly through authorized e-waste recycling programs.
2. Identify E-Waste:
  • Common E-Waste Items: Computers, laptops, mobile phones, tablets, televisions, printers, refrigerators, and other household appliances.
  • Batteries and Accessories: Include batteries, chargers, earphones, and other electronic accessories in your e-waste disposal plans.
3. Responsible Disposal:
  • Certified E-Waste Recyclers: Use certified e-waste recycling services to ensure that the devices are dismantled and recycled in an environmentally friendly manner.
  • Manufacturer Take-Back Programs: Many electronics manufacturers offer take-back programs to recycle their products. Check with the manufacturer or retailer for such programs.
  • Municipal Collection Programs: Participate in local government e-waste collection events or drop-off programs.
4. Data Security:
  • Data Wiping: Before disposing of or recycling electronic devices, ensure that all personal data is securely erased. Use software tools to wipe data from hard drives, phones, and other storage devices.
  • Physical Destruction: For highly sensitive data, consider physically destroying the storage media to prevent data recovery.
5 Regulations and Guidelines:
  • Follow Local Laws: Adhere to local, state, and national regulations regarding e-waste disposal and recycling.
  • Stay Informed: Keep updated with guidelines and best practices for e-waste management from reputable sources such as environmental organizations and government agencies.

E-Waste Recycling Process




1. Collection and Transportation:

E-waste is collected from various sources, including households, businesses, and institutions, and transported to recycling facilities.

2. Sorting and Dismantling:

Devices are manually sorted and dismantled into various components, such as plastics, metals, circuit boards, and glass.

3. Shredding and Separation:

The dismantled components are further shredded into smaller pieces and separated using techniques like magnetic separation (for ferrous metals), eddy current separation (for non-ferrous metals), and flotation (for plastics).

4. Recovery and Refinement:

Precious metals and other valuable materials are extracted and refined using chemical and electrochemical processes.

5. Disposal of Residual Waste:

Non-recyclable and hazardous materials are disposed of in compliance with environmental regulations to minimize environmental impact.


Information Technology Act (IT Act)

The Information Technology Act (IT Act), enacted in 2000 in India, is a comprehensive legal framework to address the issues related to cybercrime and electronic commerce. Here are the basic points of the IT Act:

1. Objective

  • Primary Purpose: To provide legal recognition for transactions carried out by means of electronic data interchange and other means of electronic communication, commonly referred to as "e-commerce".
  • Cybercrime: To address the emerging legal issues related to online activities, cybercrime, and digital signatures.

2. Key Provisions

  • Legal Recognition of Electronic Documents: Provides legal recognition to electronic documents, thus facilitating electronic governance.
  • Digital Signatures: Legal recognition of digital signatures for the authentication of electronic records.
  • Certifying Authorities: Establishes a framework for the accreditation of certifying authorities, who issue digital certificates.
  • Electronic Contracts: Recognition of electronic contracts, making them legally enforceable.

3. Offenses and Penalties:

  • Unauthorized Access: Penalties for gaining unauthorized access to computer systems, including hacking.
  • Data Theft: Punishments for stealing data stored in a computer, such as copying or extracting data without permission.
  • Virus Attacks: Penalties for introducing viruses, worms, or other malicious software into computer systems.
  • Identity Theft: Penalties for identity theft and fraud involving the use of digital identities.
  • Cyber Terrorism: Stringent penalties for cyber terrorism activities.

4. Adjudication and Regulation:
  • Cyber Appellate Tribunal: Establishment of a Cyber Appellate Tribunal to handle appeals against orders from adjudicating officers related to contraventions under the Act.
  • Regulation of Certifying Authorities: Guidelines for the regulation and functioning of certifying authorities who issue digital signatures.
  • Appointment of Adjudicating Officers: Appointment of adjudicating officers to handle disputes and grievances related to the provisions of the IT Act.
5. Amendments and Updates:
  • IT (Amendment) Act, 2008: Significant amendments to address evolving cyber threats, including:
    • Child Pornography: Prohibition of child pornography and punishments for related offenses.
    • Phishing and Spam: Provisions to combat phishing attacks and spamming.
    • Data Protection: Introduction of data protection measures, including safeguards for sensitive personal information.
6. E-Governance and E-Commerce
  • Electronic Governance: Promotion of electronic governance and the use of digital signatures for government transactions.
  • E-Commerce: Legal recognition and facilitation of electronic commerce, making online business transactions legally binding.
7. Liability of Intermediaries:
  • Intermediary Guidelines: Defines the roles and responsibilities of intermediaries (e.g., ISPs, web hosts) in managing and removing unlawful content.
  • Safe Harbor Provisions: Provides safe harbor protection to intermediaries, limiting their liability for third-party content under certain conditions.
8. Miscellaneous Provisions
  • Privacy Protection: Provisions to safeguard the privacy of individuals and data protection requirements.
  • Computer Resource Tampering: Penalties for tampering with computer resources, including data alteration and system interference.
  • Confidentiality: Obligations on maintaining the confidentiality and security of electronic records and digital signatures.
Technology and society: Gender and disability issues while teaching and using computers

Technology plays a pivotal role in modern society, impacting various facets of life, including education and accessibility for different demographics such as gender and individuals with disabilities. Here’s an exploration of how technology interacts with these issues in teaching and computer use:




Multiple choice questions

1) Which of the following best describes a digital footprint?
  • A. The physical trails left behind by someone on the internet
  • B. The environmental impact of digital devices
  • C. The collection of all the traces and activities someone leaves online
  • D. The programming languages used in digital technology
2) What can contribute to your digital footprint?
  • A. Browsing websites
  • B. Posting on social media
  • C. Sending emails
  • D. All of the above
3) Which of the following actions can help you manage and reduce your digital      footprint?
  • A. Regularly clearing your browser history and cookies
  • B. Using strong, unique passwords for different accounts
  • C. Adjusting privacy settings on social media platforms
  • D. All of the above

4) Which of the following is considered good netiquette when participating in an   online discussion?
  • A. Using all caps to emphasize your points
  • B. Respecting others' opinions and responding politely
  • C. Posting off-topic comments
  • D. Ignoring other participants' contributions

5) What should you do if you receive an email that appears to be a phishing   attempt?
  • A. Forward it to all your contacts
  • B. Click on any links to verify if they are safe
  • C. Delete the email and report it to your email provider
  • D. Reply to the email asking for more information
6) Which of the following best describes malware?
  • A. Software designed to protect your computer from viruses
  • B. Malicious software intended to damage or disable computers and computer systems
  • C. A type of hardware that speeds up your computer
  • D. An operating system feature
7) What type of malware disguises itself as legitimate software but performs malicious activities?
  • A. Virus
  • B. Trojan Horse
  • C. Worm
  • D. Spyware
8) Which type of malware replicates itself in order to spread to other computers?
  • A. Adware
  • B. Spyware
  • C. Worm
  • D. Ransomware
9) What is the primary goal of e-waste management?
  • A. To increase the production of electronic devices
  • B. To dispose of electronic waste in landfills
  • C. To recycle and properly dispose of electronic waste to minimize environmental impact
  • D. To store electronic waste indefinitely
10) Which of the following is a common practice in e-waste recycling?
  • A. Burning electronic devices to retrieve metals
  • B. Disposing of electronic waste in household trash bins
  • C. Dismantling electronic devices to recover valuable materials
  • D. Using electronic devices as landfill cover
Competency Based Questions

Q 1) Describe a situation where you had to manage your digital footprint. What   steps did you take, and what was the outcome?

Answer: 
In college, I realized that my social media presence could impact job prospects. I reviewed my profiles, adjusted privacy settings, and removed any unprofessional content. Additionally, I started sharing industry-relevant articles and my own projects. As a result, I noticed a more positive response from recruiters during interviews.

Q 2) Have you ever dealt with a cyber troll? How did you handle the situation?

Answer:
 Yes, I managed a community forum where a user began posting inflammatory comments. I addressed the issue by enforcing the community guidelines, warning the user, and eventually banning them after repeated offenses. This action maintained a positive environment for other users.

Q 3) Describe a time when you had to deal with a malware infection. What was your approach? 
Answer:
Our office network was once infected with malware, causing several computers to malfunction. I isolated the affected systems, ran antivirus scans to remove the malware, and restored data from backups. Post-incident, we updated our security software and implemented stricter email filtering to prevent future attacks.

Q 8) How have you contributed to e-waste management in your organization?

Answer:
 I initiated an e-waste recycling program where employees could safely dispose of old electronics. We partnered with a certified e-waste recycler and organized quarterly collection drives. This initiative not only reduced our environmental footprint but also raised awareness about e-waste management.

Q 10) How have you adapted your teaching methods to accommodate students with disabilities?

Answer:
 In my computer classes, I used screen readers for visually impaired students and provided keyboard shortcuts for those with motor disabilities. I also ensured that all course materials were accessible and offered one-on-one support to address individual needs. These adaptations helped all students fully participate and succeed in the course.

**********




No comments:

Post a Comment

Note: Only a member of this blog may post a comment.

XII CS : Sample Paper and Suggested Practicals and Projects

Topic wise study material  S.No. Chapter Name PDF link Video link 1. Revision Tou...