ch 2: Ethical and Social Issues in ICT
Write the full form of:
i. IT → Information Technology
ii. ICT → Information and Communication Technology
iii. G2G → Government to Government
iv. E- Commerce → Electronic Commerce
v. ETA → Electronic Transaction Act
Give
appropriate technical terms for the following:
a. The set of moral principles or code of conduct. Ethics
b.
A code of behavior for using the Internet. Netiquette
C.
The state of full electronic participation in society. E-inclusion / Digital
Inclusion
d.
A process of performing a variety of tech-enabled activities via virtual
communities and networks. Social Networking
e.The
issues related to cybercrime also help in making and implementing laws against
cybercrime. Cyber Law
f.
A process of performing a variety of tech-enabled activities via virtual
communities and networks. Social Networking
Very Short Answer
Questions:
a.Define Information and Communication Technology.
Information and communication technology is the use
of computers, internet, and communication tools to collect, process, store, and
share information.
b.What is computer
ethics?
Computer ethics are the moral principles and
guidelines that control the proper and fair use of computers and technology.
c. What is hacking?
Hacking is the act of gaining unauthorized access to
another person’s computer system, data, or network.
d.Define digital
citizenship.
Digital citizenship is the responsible and
appropriate use of technology and the internet by individuals.
e. What is digital
footprint?
A digital footprint is the trail of data and online
activities that a person leaves behind while using the internet.
f. What is cybercrime?
Cybercrime is a criminal activity carried out by using
computers, networks, or the internet.
g. Define ICT Policy
2072.
ICT Policy 2072 is the national policy of Nepal
introduced in the year 2072 B.S. to promote the development and use of
information and communication technology.
h. What is the
Electronic Transaction Act?
The electronic transaction act is a law in Nepal
that regulates digital transactions, online activities, and helps prevent
cybercrimes.
Short answer questions
a.
What is computer ethics? Write any two of them.
Computer
ethics are the moral principles and standards that guide the proper and fair
use of computers and technology. They help in using technology responsibly
without harming others.
Two examples of computer ethics are:
1. Do not access other people’s files without permission.
2.
Do not use a computer to harm or steal information from others.
b. Why is ethics important in information technology?
Ethics
in information technology is important because it ensures that technology is
used in a fair, safe, and responsible way. It prevents misuse such as hacking,
software piracy, and spreading false information. Ethical practices build
trust, protect privacy, and help society use technology for positive purposes.
c. Write any four commandments of computer ethics.
The
four commandments of computer ethics are:
1.
Do not use a computer to harm other people.
2.
Do not interfere with other people’s computer work.
3.
Do not snoop around in other people’s files.
4.
Do not use a computer to steal or commit fraud.
d. What is meant by hacking? What is the purpose of hacking?
Hacking
is the act of breaking into a computer system, network, or data without
permission. It is done by using technical knowledge and programming skills.
The
purposes of hacking may include stealing data, damaging systems, spreading
viruses, testing system security, or gaining financial and personal benefits.
e. What is digital footprint? Mention examples of digital footprint.
A
digital footprint is the record of online activities and data left behind when
a person uses the internet. It shows where and how someone has used technology.
Examples
of digital footprint are:
1.
Posting photos or comments on social media.
2.
Browsing websites or searching on Google.
3.
Sending emails or messages.
4.
Online shopping and payment history.
f. Define cyberbullying with any four examples.
Cyberbullying
is the use of computers, mobile phones, or the internet to harass, threaten, or
harm someone repeatedly. It is a form of online bullying that affects people’s
mental and emotional well-being.
Examples
of cyberbullying are:
1.
Sending threatening or abusive messages online.
2.
Spreading false rumors or lies on social media.
3.
Sharing private photos or videos without permission.
4.
Creating fake accounts to insult or embarrass others.
g. Briefly explain cyber law.
Cyber
law is the body of legal rules that deals with crimes and activities done using
computers, the internet, and digital devices. It helps to protect people’s
data, ensure safe online transactions, and punish cybercriminals. In Nepal, the
Electronic Transaction Act (ETA) 2063 is an example of cyber law, which deals
with issues like hacking, fraud, software piracy, and misuse of digital
systems.
h. Write any four opportunities and threats in social media.
Opportunities:
1.
Easy communication and information sharing.
2.
Platform for education, learning, and awareness.
3.
Promotion of business and online marketing.
4.
Building networks and communities worldwide.
Threats:
1.
Risk of cyberbullying and online harassment.
2.
Spread of false information and rumors.
3.
Addiction and misuse leading to less productivity.
4.
Privacy issues and chances of identity theft.
Notes
Cyber
law and its importance
Cyber
law: The law which governs all the legal issues of cyber space, controls
cyber crime, provide legal status to online transaction and covers several
activity related to internet is called cyber law.
Importance
of cyber law:
- 1. To
control cyber crime.
- 2. Mitigates
misuse of technology.
- 3. To
flourish IT industry in the nation.
- 4. To
legalize online transaction.
- 5. To
adopt and use new and modern technology.
Cyber law in Nepal was introduced in 30th Bhadra 2061 BS (15th
September 2004 AD). The name of the cyber law of Nepal is “Electronic
Transaction and Digital Signature Act - Ordinance.
Provisions
of cyber law of Nepal.
- 1. Identify
and punish cyber criminals.
- 2. Help
to provide legal status to IT industry.
- 3. Implementation
of IT in governmental activities.
- 4. Monitors
data privacy and misuse of technology.
- 5. Cyber
ethics and crime
Computer
ethics: The
moral principles and values or the code of conduct that must be followed by
every computer user is called computer ethics. Commandments of computer ethics.
- 1. Do
not use computer to commit crime.
- 2. Always
use computer in the welfare of human being.
- 3. Don’t
use computer to steal data and file.
- 4. Don’t
use computer to publish fake news and information.
- 5. Don’t
use computer to bear false witness.
Cybercrime: The criminal activity or a
crime committed by using computer, internet or any electronic means and media
is called cybercrime. Cybercriminal are also considered as a criminal hence,
cyber law has appropriate provision of punishing the cyber criminals. For
eg, piracy, hacking, cyber bullying, phishing, salami saving, pornography, data
diddling, spreading computer virus etc
Terms to understand:
Intellectual
property right: The
law through which the creation(music, art, writings etc) made by creator gets
actual reward and not being misused without proper compensation.
Patent
right: The
law through which inventor protect his/her invention(technological) from being
used without proper compensation.
Digital
signature: It
is the technology used to ensure the correct delivery of message over a
network. It use private and public key for encryption and decryption of data.
Encryption: The feature by which readable
data and message are converted into unreadable code and its vice versa is
called decryption.
Trade
mark: The
sign or symbol used to represent brand.
Trade
secret: The
main secret principle or philosophy of running unique business.
Hacker: The person who enter into
other system without proper authorization.
Short
answer questions:
(a) What do you mean by virtual
identity?
In online
virtual communities, such as online chat rooms or in online games, a virtual
identity is one created by the human user that acts as an interface between the
physical person and virtual person other users see on their computer screen.
(b) What is Cyber bullying?
Cyber bullying
is a kind of harassment using electronic devices such as mobile and computers
(c) What is digital law?
Digital law is the electronic responsibility for actions, deeds
which is either
ethical or unethical.
(d) Mention any one law includes in cyber law of
Nepal.
Electronic and Digital Signature Law
(e) What is digital citizenship?
Digital citizenship can be defined as the norms or appropriate,
responsible
behavior with regard to technology use.
Long
answer questions:
(a) List some benefits and
challanges of ICT.
Benefits of ICT:
(1) Global
village
(2) Cost
Effective
(3) Bridging
the cultural gap
(4) Creation
of new jobs
(5)
Educational Opportunities
Challenges of ICT:
(1) Virtual
Identity
(2) Security
(3) Privacy
Issues
(4) Copyright
(5) Cyber
Bullying
(6) Social
Behaviour
(7)
Digital Divide:
(b) What do you mean by
copyright?
Copyright is a legal right, existing in
many countries, that grants the creator of an original work exclusive
rights to determine whether, and under that
conditions,
this original work may be used by others.
(c) What do you mean by digital
divide?
Gap between rich and poor in terms of information
technology is called digital divide.
(d) What do you mean by compute
ethics?
Computer ethic is defined as " to follow the
rules and regulation of computer
technology and not to harm other computer users
knowingly or unknowingly."
(e) Write any five provisions of
computer ethics.
Five
provisions in computer ethics are:
(i) You should not use a computer to harm other people.
(ii) You should not search the file or record of
other people.
(iii) You should not destroy, steal and use the computer
password of other people.
(iv) You should not steal, destroy and use digital
signatures.
(v) You should not destroy, erase or edit personal or
group records
(f) What do you mean by cyber
law?
Cyber law
refers to the laws regarding the Internet and cyberspace. Cyber law includes a
wide variety of legal issues related to the use of communications technology.
It includes the use of Internet as well as any other form of computer or
Digital Processing Devices.
(g) What are the major
components of cyber law?
The major
components included in the cyber law are:
(i)
Electronic and Digital Signature Law
(ii) Computer
Crime/Cyber Crime Law
(iii)Intellectual
Property laws
(iv) Data
Protection and Privacy Laws
(v)
Telecommunication Laws
(h) Write the major five goals
of IT policy 2072 of Nepal.
Five goals of
IT policy 2072 of Nepal are:
(i) By 2020,
entire population of Nepal would have access to the Internet.
(ii) 80% of
all citizens facing government services would be offered online by 2020.
(iii) Special
funding arrangements will be developed and implemented within 2018 to support
innovation and incubation of on-line businesses and start-ups.
(iv) At least
75 percent of the population will have digital literacy skills by the end of
2020.
(v) A
universal broadband access to all people on an equitable basis will be in
place. By 2020, 90 percent of the population will be able to access the
broadband services.
(i) Write the vision and mission of IT policy of Nepal of 2072. Vision : Transform Nepal into an
information and Knowledge based society and economy. Mission : To create
conditions for the intensified development and growth of ICT sector as a key
driver for Nepal’s sustainable development and poverty reduction strategies.
(j) Write the objectives of electronic transaction act of 2063. Objectives of the electronic
transaction act 2063
(a) To make
legal provision for authentication and regulation of electronic data.
(b) To make a
reliable data generation, communication, and transaction
(c) To make a secured and authentic
means of electronic communication
(d) To
regulate all the relating matters of electronic transactions