Sunday, 3 November 2019

Society, Law and Ethics-SLE-2



 The law may be understood as the systematic set of universally accepted rules and regulation created by an appropriate authority such as government, which may be regional, national, international, etc. It is used to govern the action and behavior of the members and can be enforced, by imposing penalties.

Ethics are the principles that guide a person or society, created to decide what is good or bad, right or wrong, in a given situation. It regulates a person’s behavior or conduct and helps an individual in living a good life, by applying the moral rules and guidelines.

intellectual property rights

A right that is had by a person or by a company to have exclusive rights to use its own plans, ideas, or other intangible assets without the worry of competition, at least for a specific period of time. These rights can include copyrights, patents, trademarks, and trade secrets. These rights may be enforced by a court via a lawsuit. The reasoning for intellectual property is to encourage innovation without the fear that a competitor will steal the idea and / or take the credit for it.


Plagiarism as copying another's work or borrowing someone else's original ideas. But terms like "copying" and "borrowing" can disguise the seriousness of the offense:

  • to steal and pass off (the ideas or words of another) as one's own
  • to use (another's production) without crediting the source
  • to commit literary theft
  • to present as new and original an idea or product derived from an existing source
In other words, plagiarism is an act of fraud. It involves both stealing someone else's work and lying about it afterward

Digital rights management
DRM – A scheme that controls access to copyrighted material using technological means. It means applying technology on copyrighted material in such a way that it can be used or it remain in read only mode but further production/copying is restricted.

                                                        Licensing
 A software license is a document that provides legally binding guidelines to the person who holds it for the use and distribution of software. It typically provide end users with the right to make one or more copies of the software without violating copyrights. It also defines the responsibilities of the parties entering into the license agreement and may impose restrictions on how the software can be used. Software licensing terms and conditions usually include fair use of the software, the limitations of liability, warranties and disclaimers and protections.

Licensing (Creative Commons )
Creative Commons (CC) is an internationally active non-profit organization to provide free licenses for creators to use it when making their work available to the public in advance under certain conditions.

Licensing (GPL)
GPL - General Public License( GPL), is the most commonly used free software license, written by Richard Stallman in 1989 of Free Software Foundation for Project. This license allows software to be freely used(means freedom for use,not price wise free), modified, and redistributed by anyone. WordPress is also an example of software released under the GPL license, that’s why it can be used, modified, and extended by anyone.

Licensing (Apache)
The Apache License is a free and open source software (FOSS) licensing agreement from the Apache Software Foundation (ASF). Beginning in 1995, the Apache Group (later the Apache Software Foundation) Their initial license was essentially the same as the old BSD license. Apache did likewise and created the Apache License v1.1 - a slight variation on the modified BSD license. In 2004 Apache decided to depart from the BSD model a little more radically, and produced the Apache License v2.  ( Berkeley Software Distribution (BSD), )

                                               Open Source 
open source means any program whose source code is made available publically for use or modification as users or other developers see fit. Open source software is usually made freely available.

                                               Open data
Open data is data which can be accessed, used and shared by any one to bring about social, economic and environmental benefits. Open data becomes usable when made available in a common , machine-readable format.

                                            Privacy 
Privacy is the aspect of information technology which deals with the ability of an organization or individual to determine what data in a computer system can be shared with third parties.

privacy laws
 privacy law - Regulations that protects a person's/organization’s data private and governs collection, storage, and release of his or her financial, medical, and other personal information to third party. Classification of privacy laws • General privacy laws that have an overall bearing on the personal information of individuals • Specific privacy laws that are designed to regulate specific types of information. E.g Communication privacy laws, Financial privacy laws,Health privacy laws,Information privacy laws ,Online privacy laws ,Privacy in one’s home.

     Fraud
 Computer fraud is using a computer and/or internet to take or alter electronic data, or to gain unlawful use of a computer/internet. Illegal computer activities include phishing, social engineering, viruses.

Cyber crime 
 Any crime that involves a computer and a network is called a “Computer Crime” or “Cyber Crime. Or in other term ,it is a crime in which a computer is the object of the crime (hacking, phishing, spamming) or is used as a tool to commit an offense (child pornography, hate crimes).

Cyber crime (Phishing)
Phishing is a cyber attack that uses disguised email as a weapon.The attackers masquerade as a trusted entity of some kind, The goal is to trick the email recipient into believing that the message is something they want or need — recipient fills/send sensitive information like account no, username ,password etc. ,then attacker use these.

Cyber crime (Illegal downloading)
Illegal downloading is obtaining files or computer resources that w do not have the right to use from the Internet. Copyright laws prohibit Internet users from obtaining copies of media that we do not legally purchase. These laws exist to prevent digital piracy, much of which is generally conducted through Internet file sharing.

Cyber crime(Child pornography) 
Child pornography is considered to be any depiction of a minor or an individual who appears to be a minor who is engaged in sexual or sexually related conduct. This includes pictures, videos, and computer-generated content. Even altering an image or video so that it appears to be a minor can be considered child pornography.

Cyber crime (Scams)
Scams:  With the growth in online services and internet use, there are many opportunities for criminals to commit scams and fraud. These are dishonest schemes that seek to take advantage of unsuspecting people to gain a benefit (such as money, or access to personal details). These are often contained in spam and phishing messages.

Cyber crime (Cyber forensics)
Cyber forensics is a way or an electronic discovery technique which is used to determine and reveal technical criminal evidence. Various capabilities of cyber forensics

IT Act 2000
The Information Technology Act, 2000 provides legal recognition to the transaction done via an electronic exchange of data and other electronic means of communication or electronic commerce transactions.Some of sections under it act 2000 are given below.
SECTI ON , OFFENCE  , PENALTY

67A                 
Publishing images containing sexual acts
Imprisonment up to seven years, or/and with fine up to Rs. 1,000,000

 67B 
Publishing child porn or predating children online
Imprisonment up to five years, or/and with fine up to Rs.1,000,000 on first conviction. Imprisonment up to seven years, or/and with fine up to Rs.1,000,000 on second conviction. 

67C
Failure to maintain records 
Imprisonment up to three years, or/and with fine.

Technology and society:
Technology affects the way individuals communicate,learn,andthink.Technology has both positive and negative affects on society including the possible improvement or declination of society. Society is defined as,"the sum of social relationships among humanbeings "and technology is defined as, "the body of knowledge available to acivilization that is of use in fashioning implements, practicing manual arts and skills, and extracting or collecting materials. "Technology shapes our society and has both positive and negative affects".

Societal issues and cultural changes induced by technology
Cultural changes–
Technology has completely changed our culture. From our
values, To our means of communication. Now, Many people
have trouble having a face to face conversation, Skype does
not count. When people spend time with friends, Its on their
phones, Tablets, Or computers. Also, Now people judge
others by how techy their car is, Or if they have the newest
iPhone or Tablet Most people want to put their headphones in
and listen to music rather than listening to another person.
Video games isolate all things from the world. Most people
prefer technology today, Just because that is all they know.
Today it’s all about touch screen cell phones. Technology just
isolates people from reality. People now a days don’t know
how to communicate in real world situations like personal
relationships, Problem solving and exhibiting adult behaviors.

E-waste Management:
Whenever an electronic device covers up its working life,or becomes non-usable due to technological advancements or becomes non-functional, it is not used any more and comes under the category of e-waste or electronic waste. As the technology is changing day by day, more and more electronic devices are becoming non-functional and turning in to e-waste. Managing such non-functional electronic devices is termed as e-waste management.

E-waste Management:(Proper disposal of used electronic gadgets)
E-waste is a growing problem for us in India. As an 132cr
strong economy, we produce e- waste in large quantities.
It is very important to dispose off waste in a pragmatic
manner.
Ways to dispose off e-waste:
1. Give Back to Your Electronic Companies and Drop Off
Points
2. Visit Civic Institutions
3. Donating Your Outdated Technology
4. Sell Off Your Outdated Technology
5. Give Your Electronic Waste to a Certified E-Waste
Recycler

Identity theft:

Identity theft occurs when some one uses our identity or personal information—such as our name, our license,or our Unique ID number—without our permission to commit a crime or fraud.

Unique IDs and biometrics
A unique identifier (UID) is a numeric or alphanumeric string that is associated with a single entity with in a given system. UIDs make it possible to address that entity, so that it can be accessed and interacted with.

Biometrics is the science of analyzing physical or behavioral characteristics specific to each individual in order to be able to authenticate their identity.

Gender and disability issues while teaching/using computers

Disability Issues
1.Unavailability of teaching materials/aids
2.Lack of special needs teachers
3.Lack of supporting curriculum
Possible Solution
•Enough teaching aids must be prepared for specially abled students
•Must employ special needs teachers
•Curriculum should be designed with students with specially abled students in mind.




No comments:

Post a Comment