Societal Impacts-Reference Material
Unit 4: Societal Impacts of Digital Footprint
Digital Footprint
Definition: A digital footprint, also known as a digital dossier, is the data created while using the Internet.
Includes:
Websites visited
Emails sent
Information submitted to online services
Types of Digital Footprint:
Passive Digital Footprint:
Created without the owner’s knowledge.
Example: Search history saved by search engines while logged in.
Active Digital Footprint:
Created with the user's intentional sharing of information.
Examples: Emails, blogs, social media updates including tweets, Facebook statuses, and Instagram photos.
Netiquette (Internet Etiquette)
Definition: Netiquette is a code of good behavior on the Internet similar to social etiquette.
Purpose: Respect others online while communicating across various platforms including:
Email
Social media
Online chats
Web forums
Multiplayer gaming
Rules of Good Netiquette:
Avoid posting inflammatory or offensive comments.
Respect others' privacy by not sharing unwanted personal information.
Do not send large amounts of unsolicited email (spam).
Exhibit good sportsmanship in online games.
Avoid trolling in forums or comments.
Stay on topic when commenting.
Refrain from using offensive language.
Respond positively to negative comments.
Offer help if you know the answer to someone's question.
Thank those who assist you online.
Data Protection
Definition: Practices and regulations that safeguard personal information and ensure individuals can control their data.
Key Aspects:
Individuals should decide on the sharing of their information.
Challenges arise in the fast-paced online environment where data is widely shared.
Personal Data: Information relating to an individual in various contexts (private, professional, public).
Intellectual Property Rights (IPR)
Definition: Intellectual property refers to intangible creations of the mind, such as:
Copyright
Trademark
Patent
Categories of Intellectual Property:
Industrial Property: Protects inventions (patents), commercial names, industrial designs.
Copyright: Protects literary and artistic works.
Plagiarism
Definition: Plagiarism involves copying others' work without giving credit.
Types of Plagiarism:
Accidental/Unintentional: Careless paraphrasing or excessive quoting.
Deliberate/Intentional: Intentional copying or using someone’s work without permission.
How to Avoid Plagiarism:
Use your own words and ideas.
Provide references for sourced information.
Use online tools to check for plagiarism.
Licensing and Copyright
Software License: Legal permission for software use and redistribution.
Types of Licenses:
Proprietary Licenses: Rights retained by the developer, restricting user modifications.
Free and Open Source Software (FOSS): Software that can be freely used, modified, and shared.
Types of Software Licenses
Permissive Licenses: Allow almost any modification or use without strict conditions.
Copyleft Licenses: Require derived work to be shared under the same license.
Copyright: Protects authors by preventing unauthorized copying and use of their works.
Cyber Crime
Definition: Illegal behavior conducted through electronic means targeting computer systems and data.
Includes:
Identity theft
Unauthorized access
Online predatory crimes
Categories of Cyber Crime:
Crimes targeting computer networks or devices (e.g., viruses, DoS attacks).
Crimes using networks to advance other criminal activities (e.g., cyber-stalking).
Cyber Laws
Definition: Laws related to Internet and cyberspace activities.
Importance:
Regulates online transactions.
Monitors all activities over the Internet.
Influences every action in cyberspace.
Hacking
Definition: Exploiting weaknesses in systems to gain unauthorized access.
Examples: Password cracking for system access.
Phishing
Definition: Attempting to steal user credentials by mimicking trustworthy entities.
Method: Sending spam emails with links to fake websites.
Cyber Bullying
Definition: Bullying carried out via digital devices.
Platforms: Social media, chat rooms, gaming platforms.
Types: Includes sharing negative or false information for humiliation.
The Indian IT Act, 2000
Overview: Law regulating cyber crimes and electronic commerce in India.
Key Features:
Covers all individuals committing crimes involving computers in India.
It comprises provisions for monitoring and compliance.
Penalties for specific offenses:
Section 67A: Publishing images containing sexual acts - Up to 7 years imprisonment.
Section 67B: Child pornography - Up to 5 years imprisonment.
E-Waste Management
Definition: Refers to waste from electronic appliances.
Hazards:
Contains toxic chemicals that can pollute air and water if improperly disposed.
Management Steps:
Dismantling to recover valuable components.
Separation of harmful materials.
Refurbishment of reusable electronics.
Proper disposal of hazardous materials.
Health Concerns Related to Technology
Health Issues:
Neck strain, vision problems, sleeping disorders, stress, and internet addiction.
Prevention:
Educate users on the health implications of technology usage.
Implement necessary precautions to avoid serious health concerns.