ch 2: Ethical and Social Issues in ICT

Write the full form of:

i. IT → Information Technology

ii. ICT → Information and Communication Technology

iii. G2G → Government to Government

iv. E- Commerce → Electronic Commerce

v. ETA → Electronic Transaction Act


Give appropriate technical terms for the following:

a. The set of moral principles or code of conduct. Ethics

b. A code of behavior for using the Internet. Netiquette

C. The state of full electronic participation in society. E-inclusion / Digital Inclusion

d. A process of performing a variety of tech-enabled activities via virtual communities and networks. Social Networking

e.The issues related to cybercrime also help in making and implementing laws against cybercrime. Cyber Law

f. A process of performing a variety of tech-enabled activities via virtual communities and networks. Social Networking

 

Very Short Answer Questions:

 a.Define Information and Communication Technology.

Information and communication technology is the use of computers, internet, and communication tools to collect, process, store, and share information.

b.What is computer ethics?

Computer ethics are the moral principles and guidelines that control the proper and fair use of computers and technology.

c. What is hacking?

Hacking is the act of gaining unauthorized access to another person’s computer system, data, or network.

d.Define digital citizenship.

Digital citizenship is the responsible and appropriate use of technology and the internet by individuals.

e. What is digital footprint?

A digital footprint is the trail of data and online activities that a person leaves behind while using the internet.

f. What is cybercrime?

Cybercrime is a criminal activity carried out by using computers, networks, or the internet.

g. Define ICT Policy 2072.

ICT Policy 2072 is the national policy of Nepal introduced in the year 2072 B.S. to promote the development and use of information and communication technology.

h. What is the Electronic Transaction Act?

The electronic transaction act is a law in Nepal that regulates digital transactions, online activities, and helps prevent cybercrimes.

 

Short answer questions

a. What is computer ethics? Write any two of them.

Computer ethics are the moral principles and standards that guide the proper and fair use of computers and technology. They help in using technology responsibly without harming others.

 Two examples of computer ethics are:

 1. Do not access other people’s files without permission.

2. Do not use a computer to harm or steal information from others.

  b. Why is ethics important in information technology?

Ethics in information technology is important because it ensures that technology is used in a fair, safe, and responsible way. It prevents misuse such as hacking, software piracy, and spreading false information. Ethical practices build trust, protect privacy, and help society use technology for positive purposes.

 c. Write any four commandments of computer ethics.

The four commandments of computer ethics are:

1. Do not use a computer to harm other people.

2. Do not interfere with other people’s computer work.

3. Do not snoop around in other people’s files.

4. Do not use a computer to steal or commit fraud.

  d. What is meant by hacking? What is the purpose of hacking?

Hacking is the act of breaking into a computer system, network, or data without permission. It is done by using technical knowledge and programming skills.

The purposes of hacking may include stealing data, damaging systems, spreading viruses, testing system security, or gaining financial and personal benefits.

 e. What is digital footprint? Mention examples of digital footprint.

A digital footprint is the record of online activities and data left behind when a person uses the internet. It shows where and how someone has used technology.

Examples of digital footprint are:

1. Posting photos or comments on social media.

2. Browsing websites or searching on Google.

3. Sending emails or messages.

4. Online shopping and payment history.

 f. Define cyberbullying with any four examples.

Cyberbullying is the use of computers, mobile phones, or the internet to harass, threaten, or harm someone repeatedly. It is a form of online bullying that affects people’s mental and emotional well-being.

Examples of cyberbullying are:

1. Sending threatening or abusive messages online.

2. Spreading false rumors or lies on social media.

3. Sharing private photos or videos without permission.

4. Creating fake accounts to insult or embarrass others.

 g. Briefly explain cyber law.

Cyber law is the body of legal rules that deals with crimes and activities done using computers, the internet, and digital devices. It helps to protect people’s data, ensure safe online transactions, and punish cybercriminals. In Nepal, the Electronic Transaction Act (ETA) 2063 is an example of cyber law, which deals with issues like hacking, fraud, software piracy, and misuse of digital systems.

 h. Write any four opportunities and threats in social media.

Opportunities:

1. Easy communication and information sharing.

2. Platform for education, learning, and awareness.

3. Promotion of business and online marketing.

4. Building networks and communities worldwide.

 Threats:

1. Risk of cyberbullying and online harassment.

2. Spread of false information and rumors.

3. Addiction and misuse leading to less productivity.

4. Privacy issues and chances of identity theft.

 

 Notes

Cyber law and its importance

Cyber law: The law which governs all the legal issues of cyber space, controls cyber crime, provide legal status to online transaction and covers several activity related to internet is called cyber law.

Importance of cyber law:

  • 1.       To control cyber crime.
  • 2.       Mitigates misuse of technology.
  • 3.       To flourish IT industry in the nation.
  • 4.       To legalize online transaction.
  • 5.       To adopt and use new and modern technology.

Cyber law in Nepal was introduced in 30th Bhadra 2061 BS (15th September 2004 AD). The name of the cyber law of Nepal is “Electronic Transaction and Digital Signature Act - Ordinance. 

Provisions of cyber law of Nepal.

  • 1.       Identify and punish cyber criminals.
  • 2.       Help to provide legal status to IT industry.
  • 3.       Implementation of IT in governmental activities.
  • 4.       Monitors data privacy and misuse of technology.
  • 5.       Cyber ethics and crime

Computer ethics: The moral principles and values or the code of conduct that must be followed by every computer user is called computer ethics. Commandments of computer ethics.

  • 1.       Do not use computer to commit crime.
  • 2.       Always use computer in the welfare of human being.
  • 3.       Don’t use computer to steal data and file.
  • 4.       Don’t use computer to publish fake news and information.
  • 5.       Don’t use computer to bear false witness.

Cybercrime: The criminal activity or a crime committed by using computer, internet or any electronic means and media is called cybercrime. Cybercriminal are also considered as a criminal hence, cyber law has appropriate provision of punishing the cyber criminals. For eg, piracy, hacking, cyber bullying, phishing, salami saving, pornography, data diddling, spreading computer virus etc

Terms to understand:

Intellectual property right: The law through which the creation(music, art, writings etc) made by creator gets actual reward and not being misused without proper compensation.

Patent right: The law through which inventor protect his/her invention(technological) from being used without proper compensation.

Digital signature: It is the technology used to ensure the correct delivery of message over a network. It use private and public key for encryption and decryption of data.

Encryption: The feature by which readable data and message are converted into unreadable code and its vice versa is called decryption.

Trade mark: The sign or symbol used to represent brand.

Trade secret: The main secret principle or philosophy of running unique business.

Hacker: The person who enter into other system without proper authorization.



 Short answer questions:

(a)  What do you mean by virtual identity?

In online virtual communities, such as online chat rooms or in online games, a virtual identity is one created by the human user that acts as an interface between the physical person and virtual person other users see on their computer screen.

 

(b)  What is Cyber bullying?

Cyber bullying is a kind of harassment using electronic devices such as mobile and computers

(c)  What is digital law?

        Digital law is the electronic responsibility for actions, deeds which is either                 ethical     or unethical.

 

    (d) Mention any one law includes in cyber law of Nepal.

    Electronic and Digital Signature Law

 

    (e)  What is digital citizenship?

        Digital citizenship can be defined as the norms or appropriate, responsible                 behavior with regard to technology use.

 

 Long answer questions:

(a)  List some benefits and challanges of ICT.

Benefits of ICT:

(1) Global village

(2) Cost Effective

(3) Bridging the cultural gap

(4) Creation of new jobs

(5) Educational Opportunities

Challenges of ICT:

(1) Virtual Identity

(2) Security

(3) Privacy Issues

(4) Copyright

(5) Cyber Bullying

(6) Social Behaviour

 (7) Digital Divide:

(b)  What do you mean by copyright?

Copyright is a legal right, existing in many countries, that grants the creator of an original work exclusive rights to determine whether, and under that                         conditions, this original work may be used by others.

(c)  What do you mean by digital divide?

        Gap between rich and poor in terms of information technology is called digital         divide.

(d)  What do you mean by compute ethics?

        Computer ethic is defined as " to follow the rules and regulation of computer             technology and not to harm other computer users knowingly or unknowingly."

(e)  Write any five provisions of computer ethics.

Five provisions in computer ethics are:

(i)           You should not use a computer to harm other people.

(ii)                You should not search the file or record of other people.

(iii)        You should not destroy, steal and use the computer password of other people.

(iv)             You should not steal, destroy and use digital signatures.

(v)               You should not destroy, erase or edit personal or group records

(f)   What do you mean by cyber law?

Cyber law refers to the laws regarding the Internet and cyberspace. Cyber law includes a wide variety of legal issues related to the use of communications technology. It includes the use of Internet as well as any other form of computer or Digital Processing Devices.

 

(g)  What are the major components of cyber law?

The major components included in the cyber law are:

(i) Electronic and Digital Signature Law

(ii) Computer Crime/Cyber Crime Law

(iii)Intellectual Property laws

(iv) Data Protection and Privacy Laws

(v) Telecommunication Laws

(h)  Write the major five goals of IT policy 2072 of Nepal.

Five goals of IT policy 2072 of Nepal are:

(i) By 2020, entire population of Nepal would have access to the Internet.

(ii) 80% of all citizens facing government services would be offered online by 2020.

(iii) Special funding arrangements will be developed and implemented within 2018 to support innovation and incubation of on-line businesses and start-ups.

(iv) At least 75 percent of the population will have digital literacy skills by the end of 2020.

 (v) A universal broadband access to all people on an equitable basis will be in place. By 2020, 90 percent of the population will be able to access the broadband services.

(i) Write the vision and mission of IT policy of Nepal of 2072. Vision : Transform Nepal into an information and Knowledge based society and economy. Mission : To create conditions for the intensified development and growth of ICT sector as a key driver for Nepal’s sustainable development and poverty reduction strategies.

(j) Write the objectives of electronic transaction act of 2063. Objectives of the electronic transaction act 2063

(a) To make legal provision for authentication and regulation of electronic data.

(b) To make a reliable data generation, communication, and transaction

           (c) To make a secured and authentic means of electronic communication

(d) To regulate all the relating matters of electronic transactions

 

Popular posts from this blog

Computer