In other words, plagiarism is an act of fraud. It involves both stealing someone else's work and lying about it afterward
Digital rights management
DRM – A scheme that controls access to copyrighted material using
technological means.
It means applying technology on copyrighted material in such a way that
it can be used or it remain in read only mode but further
production/copying is restricted.
Licensing
A software license is a document that provides
legally binding guidelines to the person who holds
it for the use and distribution of software.
It typically provide end users with the right to make
one or more copies of the software without
violating copyrights. It also defines the
responsibilities of the parties entering into the
license agreement and may impose restrictions on
how the software can be used. Software licensing
terms and conditions usually include fair use of the
software, the limitations of liability, warranties and
disclaimers and protections.
Licensing (Creative Commons )
Creative Commons (CC) is an internationally active non-profit organization to
provide free licenses for creators to use it when making their work available to the
public in advance under certain conditions.
Licensing (GPL)
GPL - General Public License( GPL), is the most commonly used free
software license, written by Richard Stallman in 1989 of Free Software
Foundation for Project. This license allows software to be freely
used(means freedom for use,not price wise free), modified, and redistributed
by anyone. WordPress is also an example of software released under the
GPL license, that’s why it can be used, modified, and extended by anyone.
Licensing (Apache)
The Apache License is a free and open source software (FOSS) licensing
agreement from the Apache Software Foundation (ASF). Beginning in 1995,
the Apache Group (later the Apache Software Foundation) Their initial
license was essentially the same as the old BSD license. Apache did
likewise and created the Apache License v1.1 - a slight variation on the
modified BSD license. In 2004 Apache decided to depart from the BSD
model a little more radically, and produced the Apache License v2. (
Berkeley Software Distribution (BSD), )
Open Source
open source means any program whose
source code is made available publically for use or
modification as users or other developers see fit.
Open source software is usually made freely
available.
Open data
Open data is data which can be accessed, used and shared by any
one to bring about social, economic and environmental benefits.
Open data becomes usable when made available in a common ,
machine-readable format.
Privacy
Privacy is the aspect of information technology which deals with the
ability of an organization or individual to determine what data in a
computer system can be shared with third parties.
* privacy laws
privacy law - Regulations that protects a person's/organization’s data private and
governs collection, storage, and release of his or her financial, medical, and other
personal information to third party.
Classification of privacy laws
• General privacy laws that have an overall bearing on the personal information of
individuals
• Specific privacy laws that are designed to regulate specific types of information.
E.g Communication privacy laws, Financial privacy laws,Health privacy
laws,Information privacy laws ,Online privacy laws ,Privacy in one’s home.
Fraud
Computer fraud is using a computer and/or internet to
take or alter electronic data, or to gain unlawful use of
a computer/internet.
Illegal computer activities include phishing, social
engineering, viruses.
Cyber crime
Any crime that involves a computer and a network is
called a “Computer Crime” or “Cyber Crime.
Or in other term ,it is a crime in which a computer is the
object of the crime (hacking, phishing, spamming) or is
used as a tool to commit an offense (child pornography,
hate crimes).
Cyber crime (Phishing)
Phishing is a cyber attack that uses disguised email as a
weapon.The attackers masquerade as a trusted entity of
some kind, The goal is to trick the email recipient into
believing that the message is something they want or
need — recipient fills/send sensitive information like
account no, username ,password etc. ,then attacker use
these.
Cyber crime (Illegal downloading)
Illegal downloading is obtaining files or computer
resources that w do not have the right to use from the
Internet. Copyright laws prohibit Internet users from
obtaining copies of media that we do not legally
purchase. These laws exist to prevent digital piracy,
much of which is generally conducted through Internet
file sharing.
Cyber crime(Child pornography)
Child pornography is considered to be any depiction of a
minor or an individual who appears to be a minor who is
engaged in sexual or sexually related conduct. This
includes pictures, videos, and computer-generated
content. Even altering an image or video so that it
appears to be a minor can be considered child
pornography.
Cyber crime (Scams)
Scams: With the growth in online services and internet use, there
are many opportunities for criminals to commit scams and
fraud. These are dishonest schemes that seek to take
advantage of unsuspecting people to gain a benefit (such
as money, or access to personal details). These are often
contained in spam and phishing messages.
Cyber crime (Cyber forensics)
Cyber forensics is a way or an electronic discovery
technique which is used to determine and reveal technical
criminal evidence. Various capabilities of cyber forensics
IT Act 2000
The Information Technology Act, 2000 provides legal recognition to
the transaction done via an electronic exchange of data and other
electronic means of communication or electronic commerce
transactions.Some of sections under it act 2000 are given below.
SECTI
ON , OFFENCE , PENALTY
67A
Publishing images containing sexual
acts
Imprisonment up to seven years, or/and with fine up
to Rs. 1,000,000
67B
Publishing child porn or predating
children online
Imprisonment up to five years, or/and with fine up
to Rs.1,000,000 on first conviction. Imprisonment up to
seven years, or/and with fine up to Rs.1,000,000 on
second conviction.
67C
Failure to maintain records
Imprisonment up to three years, or/and with fine.
Technology and society:
Technology affects the way individuals communicate,learn,andthink.Technology has both positive and negative affects on society including the possible improvement or declination of society. Society is defined as,"the sum of social relationships among humanbeings "and technology is defined as, "the body of knowledge available to acivilization that is of use in fashioning implements, practicing manual arts and skills, and extracting or collecting materials. "Technology shapes our society and has both positive and negative affects".
Societal issues and cultural changes induced by technology
Cultural changes–
Technology has completely changed our culture. From our
values, To our means of communication. Now, Many people
have trouble having a face to face conversation, Skype does
not count. When people spend time with friends, Its on their
phones, Tablets, Or computers. Also, Now people judge
others by how techy their car is, Or if they have the newest
iPhone or Tablet Most people want to put their headphones in
and listen to music rather than listening to another person.
Video games isolate all things from the world. Most people
prefer technology today, Just because that is all they know.
Today it’s all about touch screen cell phones. Technology just
isolates people from reality. People now a days don’t know
how to communicate in real world situations like personal
relationships, Problem solving and exhibiting adult behaviors.
E-waste Management:
Whenever an electronic device covers up its working life,or becomes non-usable due to technological advancements or becomes non-functional, it is not used any more and comes under the category of e-waste or electronic waste. As the technology is changing day by day, more and more electronic devices are becoming non-functional and turning in to e-waste. Managing such non-functional electronic devices is termed as e-waste management.
E-waste Management:(Proper disposal of used electronic gadgets)
E-waste is a growing problem for us in India. As an 132cr
strong economy, we produce e- waste in large quantities.
It is very important to dispose off waste in a pragmatic
manner.
Ways to dispose off e-waste:
1. Give Back to Your Electronic Companies and Drop Off
Points
2. Visit Civic Institutions
3. Donating Your Outdated Technology
4. Sell Off Your Outdated Technology
5. Give Your Electronic Waste to a Certified E-Waste
Recycler
Identity theft:
Identity theft occurs when some one uses our identity or personal information—such as our name, our license,or our Unique ID number—without our permission to commit a crime or fraud.
Unique IDs and biometrics
A unique identifier (UID) is a numeric or alphanumeric string that is associated with a single entity with in a given system. UIDs make it possible to address that entity, so that it can be accessed and interacted with.
Biometrics is the science of analyzing physical or behavioral characteristics specific to each individual in order to be able to authenticate their identity.
Gender and disability issues while teaching/using computers
Disability Issues
1.Unavailability of teaching materials/aids
2.Lack of special needs teachers
3.Lack of supporting curriculum
Possible Solution
•Enough teaching aids must be prepared for specially abled students
•Must employ special needs teachers
•Curriculum should be designed with students with specially abled students in mind.