Societal Impact PDF
Document Details
Uploaded by StaunchMountainPeak
Tags
Summary
This document provides an overview of societal impact, focusing on data protection, intellectual property rights and cybercrime. It details various aspects of these areas, including copyright, patents, trademarks and the ethical implications of their use. The document clearly discusses data protection, and intellectual property rights.
Full Transcript
Societal Impact 235 need to be cautious while uploading or sending Activity 11.3 sensitive or confidential files which have a bearing Supose someone'...
Societal Impact 235 need to be cautious while uploading or sending Activity 11.3 sensitive or confidential files which have a bearing Supose someone's email on our privacy. password is ‘tecnnology’ which is weak. Can 11.4 Data Protection you suggest a stronger password? In this digital age, data or information protection is mainly about the privacy of data stored digitally. Elements of data that can cause substantial harm, embarrassment, inconvenience and unfairness to an individual, if breached or compromised, is called sensitive data. Examples of sensitive data include biometric information, health information, financial information, or other personal documents, images or audios or videos. Privacy of sensitive data can be implemented by encryption, authentication, and other secure methods to ensure that such data is accessible only to the authorised user and is for a legitimate purpose. All over the world, each country has its own data protection policies (laws). These policies are legal Think and Reflect documents that provide guidelines to the user on Why should we always processing, storage and transmission of sensitive mention the source information. The motive behind implementation of from which we got an these policies is to ensure that sensitive information is idea or used resources (text, image, audio, appropriately protected from modification or disclosure. video, etc.) to prepare a project or a writeup? 11.4.1 Intellectual Property Right (IPR) When someone owns a house or a motorcycle, we say that the person owns that property. Similarly, if someone comes out with a new idea, this original idea is that person’s intellectual property. Intellectual Property refers to the inventions, literary and artistic expressions, designs and symbols, names and logos. The ownership of such concepts lies with the creator, or the holder of the intellectual property. This enables the creator or copyright owner to earn recognition or financial benefit by using their creation or invention. Intellectual Property is legally protected through copyrights, patents, trademarks,etc. (A) Copyright Copyright grants legal rights to creators for their original works like writing, photograph, audio recordings, video, sculptures, architectural works, computer software, and other creative works like literary and artistic work. 2024-25 Ch 11.indd 235 21-May-19 12:44:19 PM 236 Computer Science – Class xi Copyrights are automatically granted to creators and authors. Copyright law gives the copyright holder a set Executing IPR: say for a of rights that they alone can avail legally. The rights software include right to copy (reproduce) a work, right to create √√ Code of the software derivative works based upon it, right to distribute copies will be protected by of the work to the public, and right to publicly display a copyright or perform the work. It prevents others from copying, √√ Functional using or selling the work. For example, writer Rudyard expression of the idea will be protected by a Kipling holds the copyright to his novel, ‘The Jungle patent Book’, which tells the story of Mowgli, the jungle boy. √√ The name and logo It would be an infringement of the writer’s copyright if of the software someone used parts of the novel without permission. To will come under a use other’s copyrighted material, one needs to obtain a registered trademark license from them. (B) Patent A patent is usually granted for inventions. Unlike copyright, the inventor needs to apply (file) for patenting the invention. When a patent is granted, the owner gets an exclusive right to prevent others from using, selling, or distributing the protected invention. Patent gives full control to the patentee to decide whether or how the invention can be used by others. Thus it encourages inventors to share their scientific or technological findings with others. A patent protects an invention for 20 years, after which it can be freely used. Recognition and/or financial benefit foster the right environment, and provide motivation for more creativity and innovation. (C) Trademark Trademark includes any visual symbol, word, name, design, slogan, label, etc., that distinguishes the brand or commercial enterprise, from other brands or commercial enterprises. For example, no company other than Nike can use the Nike brand to sell shoes or clothes. It also prevents others from using a confusingly similar mark, including words or phrases. For example, confusing brands like “Nikke” cannot be used. However, it may be possible to apply for the Nike trademark for unrelated goods like notebooks. 11.4.2 Violation of IPR Violation of intellectual property right may happen in one of the following ways: 2024-25 Ch 11.indd 236 08-Apr-19 12:32:00 PM Societal Impact 237 (A) Plagiarism Activity 11.4 With the availability of Internet, we can instantly copy Explore the follouing or share text, pictures and videos. Presenting someone websites to know about else’s idea or work as one’s own idea or work is called open/public licensing: plagiarism. If we copy some contents from Internet, (i) creativecommons.org but do not mention the source or the original creator, for cc, and then it is considered as an act of plagiarism. Further, if (ii) gnu.org for GNU GPL someone derives an idea or a product from an already existing idea or product, but instead presents it a new idea, then also it is plagiarism. It is a serious ethical offense and sometimes considered as an act of fraud. Even if we take contents that are open for public use, we should cite the author or source to avoid plagiarism. (B) Copyright Infringement Copyright infringement is when we use other person’s work without obtaining their permission to use or we have not paid for it, if it is being sold. Suppose we download an image from the Internet and use it in our project. But if the owner of the copyright of the image does not permit its free usage, then using such an image even after giving reference of the image in our project Beware!! is a violation of copyright. Just because it is on the √√ Plagiarism means Internet, does not mean that it is free for use. Hence, using other’s work check the copyright status of writer’s work before using and not giving adequate citation it to avoid plagiarism. for use. (C) Trademark Infringement √√ Copyright Trademark Infringement means unauthorised use of infringement means other’s trademark on products and services. An owner using another person’s work, of a trademark may commence legal proceedings against without permission someone who infringes its registered trademark. or without paying for it, if it is being sold. 11.4.3 Public Access and Open Source Software Copyright sometimes put restriction on the usage of the copyrighted works by anyone else. If others are allowed to use and built upon the existing work, it will encourage collaboration and would result in new innovations in the same direction. Licenses provide rules and guidelines for others to use the existing work. When authors share their copyrighted works with others under public license, it allows others to use and even modify the content. Open source licenses help others to contribute to existing work or project without seeking special individual permission to do so. 2024-25 Ch 11.indd 237 21-May-19 12:45:19 PM 238 Computer Science – Class xi The GNU General public license (GPL) and the Creative Commons (CC) are two popular categories of public licenses. CC is used for all kind of creative works like websites, music, film, literature, etc. CC enables the free distribution of an otherwise copyrighted work. It is used when an author wants to give people the right to share, use and build upon a work that they have created. GPL is primarily designed for providing public licence to a software. GNU GPL is another free software license, which provides end users the freedom to run, study, share and modify the software, besides getting regular updates. Remember Users or companies who distribute GPL license √√ CC licenses are works may charge a fee for copies or give them free of a set of copyright charge. This distinguishes the GPL license from freeware licenses that give the recipients, rights software licenses like Skype, Adobe Acrobat reader, to copy, modify and etc. that allow copying for personal use but prohibit redistribute the commercial distribution, or proprietary licenses where creative material, but copying is prohibited by copyright law. giving the authors, the liberty to decide Many of the proprietary software that we use are sold the conditions commercially and their program code (source code) are of licensing. not shared or distributed. However, there are certain √√ GPL is the most software available freely for anyone and their source widely used free code is also open for anyone to access, modify, correct software license which grants the and improve. Free and open source software (FOSS) recipients, rights to has a large community of users and developers who are copy, modify and contributing continuously towards adding new features redistribute the software and that or improving the existing features. For example, Linux the same rights kernel-based operating systems like Ubuntu and Fedora are preserved in all come under FOSS. Some of the popular FOSS tools are derivative works. office packages, like Libre Office, browser like Mozilla Firefox, etc. Software piracy is the unauthorised use or distribution of software. Those who purchase a license for a copy of the software do not have the rights to make additional copies without the permission of the copyright owner. It amounts to copyright infringement regardless of whether it is done for sale, for free distribution or for copier’s own use. One should avoid software piracy. Using a pirated software not only degrades the performance of a computer system, but also affects the software industry which in turn affects the economy of a country. 2024-25 Ch 11.indd 238 08-Apr-19 12:32:00 PM Societal Impact 239 11.5 Cyber Crime Criminal activities or offences carried out in a digital environment can be considered as cyber crime. In such crimes, either the computer itself is the target or the computer is used as a tool to commit a crime. Cyber crimes are carried out against either an individual, or a group, or an organisation or even against a country, with the intent to directly or indirectly cause physical harm, financial loss or mental harassment. A cyber criminal attacks a computer or a network to reach other computers in order to disable or damage data or services. Apart from this, a cyber criminal may spread viruses and other malwares in order to steal private and confidential data for blackmailing and extortion. A computer virus is some lines of malicious code that can copy itself and can have detrimental effect on the computers, by destroying data or corrupting the system. Similarly, malware is a software designed to specifically gain unauthorised Remember!! access to computer systems. The nature of criminal Cyber crime is defined activities are alarmingly increasing day-by-day, with as a crime in which frequent reports of hacking, ransomware attacks, computer is the medium of crime (hacking, denial-of-service, phishing, email fraud, banking fraud phishing, spamming), or and identity theft. the computer is used as a tool to commit crimes 11.5.1 Hacking (extortion, data breaches, Hacking is the act of unauthorised access to a computer, theft). computer network or any digital system. Hackers usually have technical expertise of the hardware and software. They look for bugs to exploit and break into the system. Hacking, when done with a positive intent, is called ethical hacking. Such ethical hackers are known as white hat hackers. They are specialists in exploring any vulnerability or loophole during testing of the software. Thus, they help in improving the security of a software. An ethical hacker may exploit a website in order to discover its security loopholes or vulnerabilities. He then reports his findings to the website owner. Thus, ethical hacking is actually preparing the owner against any cyber attack. Activity 11.5 A non-ethical hacker is the one who tries to gain How can you unauthorised access to computers or networks in order unsubscribe from a to steal sensitive data with the intent to damage or mail group or block an bring down systems. They are called black hat hackers email sender? 2024-25 Ch 11.indd 239 08-Apr-19 12:32:00 PM 240 Computer Science – Class xi or crackers. Their primary focus is on security cracking and data stealing. They use their skill for illegal or Beware !! malicious purposes. Such hackers try to break through system securities for identity theft, monetary gain, to Accepting links from untrusted emails can be bring a competitor or rival site down, to leak sensitive hazardous, as they may information, etc. potentially contain a virus or link to malicious 11.5.2 Phishing and Fraud Emails website. We should ensure Phishing is an unlawful activity where fake websites or to open any email link or attachment only when it is emails that look original or authentic are presented to from a trusted source and the user to fraudulently collect sensitive and personal doesn’t look doubtful. details, particularly usernames, passwords, banking and credit card details. The most common phishing method is through email spoofing where a fake or forged email address is used and the user presumes it to be from an authentic source. So you might get an email from an address that looks similar to your bank or educational institution, asking for your information, but if you look carefully you will see their URL address is fake. They will often use logo’s of the original, making them difficult to detect from the real! Phishing attempts through phone calls or text messages are also common these days. (A) Identity Theft Identity thieves increasingly use personal information stolen from computers or computer networks, to commit fraud by using the data gained unlawfully. A user’s identifiable personal data like demographic details, email ID, banking credentials, passport, PAN, Aadhaar number and various such personal data are stolen and misused by the hacker on behalf of the victim. This is one type of phishing attack where the intention is largely for monetary gain. There can be many ways in which the criminal takes advantage of an individual’s stolen identity. Given below are a few examples: Financial identity theft: when the stolen identity is used for financial gain. Criminal identity theft: criminals use a victim’s stolen identity to avoid detection of their true identity. Medical identity theft: criminals can seek medical drugs or treatment using a stolen identity. 2024-25 Ch 11.indd 240 08-Apr-19 12:32:00 PM Societal Impact 241 11.5.3 Ransomware Activity 11.6 This is another kind of cyber crime where the attacker Explore and find out gains access to the computer and blocks the user from how to file a complaint accessing, usually by encrypting the data. The attacker with the cyber cell in your area. blackmails the victim to pay for getting access to the data, or sometimes threaten to publish personal and sensitive information or photographs unless a ransom is paid. Ransomware can get downloaded when the users visit any malicious or unsecure websites or download software from doubtful repositories. Some ransomware are sent as email attachments in spam mails. It can also reach our system when we click on a malicious advertisement on the Internet. 11.5.4 Combatting and Preventing Cyber Crime The challenges of cyber crime can be mitigated with the twin approach of being alert and taking legal help. Following points can be considered as safety measures to reduce the risk of cyber crime: Take regular backup of important data Use an antivirus software and keep it updated always Avoid installing pirated software. Always download software from known and secure (HTTPS) sites Always update the system software which include the Internet browser and other application software Do not visit or download anything from untrusted websites Usually the browser alerts users about doubtful websites whose security certificate could not be verified; avoid visiting such sites Use strong password for web login, and change it periodically. Do not use same password for all the websites. Use different combinations of alphanumeric characters including special characters. Ignore common words or names in password While using someone else’s computer, don’t allow browser to save password or auto fill data, and try to browse in your private browser window 2024-25 Ch 11.indd 241 08-Apr-19 12:32:00 PM 242 Computer Science – Class xi For an unknown site, do not agree to use cookies when asked for, through a Yes/No option. Perform online transaction like shopping, ticketing, and other such services only through well-known and secure sites Always secure wireless network at home with strong password and regularly change it. 11.6 Indian Information Technology Act (IT Act) With the growth of Internet, many cases of cyber crimes, Digital signatures are frauds, cyber attacks and cyber bullying are reported. the digital equivalent of a paper certificate. Digital The nature of fraudulent activities and crimes keeps signatures work on a changing. To deal with such menaces, many countries unique digital ID issued by a Certified Authority have come up with legal measures for protection of (CA) to the user. Signing a sensitive personal data and to safeguard the rights of document digitally means attaching that user's Internet users. The Government of India’s Information identity which can be used Technology Act, 2000 (also known as IT Act), amended in to authenticate. 2008, provides guidelines to the user on the processing, A licensed CA who has been granted a license to storage and transmission of sensitive information. issue it under section 24 of In many Indian states, there are cyber cells in police the indian IT-Act 2000, can issue the digital signature. stations where one can report any cyber crime. The act provides legal framework for electronic governance by giving recognition to electronic records and digital signatures. The act outlines cyber crimes and penalties for them. Cyber Appellate Tribunal has been established to resolve disputes arising from cyber crime, such as tampering with computer source documents, hacking the computer system, using password of another person, publishing sensitive personal data of others without their consent, etc. The act is needed so that people can perform transactions over the Internet through credit cards without fear of misuse. Not only people, the act empowers government departments also to accept Think and Reflect filing, creation and storage of official documents in the digital format. Do you follow precautions to stay healthy — physically, 11.7 Impact on Health mentally as well as As digital technologies have penetrated into different emotionally while using digital fields, we are spending more time in front of screens, be technologies? it mobile, laptop, desktop, television, gaming console, 2024-25 Ch 11.indd 242 08-Apr-19 12:32:00 PM Societal Impact 243 music or sound device. But interacting in an improper posture can be bad for us — both physically, and mentally. Besides, spending too much time on Device Safety: Ensures Internet can be addictive and can have a negative Good Health of a impact on our physical and psychological well being. Computer System However, these health concerns can be addressed √√ Regularly clean it to some extent by taking care of the way we position to keep the dust off. Use a liquid such devices and the way we position our posture. solution specifically Ergonomics is a branch of science that deals with formulated for designing or arranging workplaces including the the cleaning of furniture, equipments and systems so that it becomes electronic screens. safe and comfortable for the user. Ergonomics helps √√ Wipe monitor’s us in reducing the strain on our bodies — including screen often using the regular microfibre the fatigue and injuries due to prolonged use. soft cloth (the one When we continuously look at the screen for used for spectacles). watching, typing, chatting or playing games, our √√ Keep it away from eyes are continuously exposed to the glare coming direct heat, sunlight from the screens. Looking at small handheld and put it in a room with enough devices makes it worse. Eye strain is a symptom ventilation for air commonly complained by users of digital devices. circulation. √√ Do not eat food or drink over the Viewing Distance 19”-24” keyboard. Food Vie crumbs that fall into win gA the gaps between ngl e3 00 the keys or spilled over liquid can cause issues to the devices. Wrist Straight Lumber 900 Support for Lower Back Seat Back Angle 900 900 Knee Angle Adjustable Seat 23”-28” Feet on floor Height footrest for shorter people Figure 11.5: Correct posture while sitting in front of a computer 2024-25 Ch 11.indd 243 15-Jun-21 11:19:58 AM 244 Computer Science – Class xi Ergonomically maintaining the viewing distance and angle, along with the position can be of some help. Figure 11.5 shows the posture to be maintained in Maintain a Balance!! order to avoid fatigue caused due to prolonged use of Enjoy the exciting world of computer system and other digital devices. However, digital devices in tandem with other pursuits to get rid of dry, watering, or itchy eyes, it is better to of thrilling sports and periodically focus on distant objects, and take a break hobbies. Online friends for outdoor activities. are good, but spending Bad posture, backaches, neck and shoulder pains time with friends in real life is very fulfilling. Often can be prevented by arranging the workspace as the wholesome nature of recommended by ergonomics. Overuse of keyboards real interactions cannot (be it physical keyboard or touchscreen-based virtual be compared to just online keyboard) not aligned ergonomically, can give rise to a social networking. painful condition of wrists and fingers, and may require medical help in the long run. Stress, physical fatigue and obesity are the other related impacts the body may face if one spends too much time using digital devices. Summary Digital footprint is the trail of data we leave behind when we visit any website (or use any online application or portal) to fill-in data or perform any transaction. A user of digital technology needs to follow certain etiquettes like net-etiquettes, communication- etiquettes and social media-etiquettes. Net-etiquette includes avoiding copyright violations, respecting privacy and diversity of users, and avoiding cyber bullies and cyber trolls, besides sharing of expertise. Communication-etiquette requires us to be precise and polite in our conversation so that we remain credible through our remarks and comments. While using social media, one needs to take care of security through password, be aware of fake information and be careful while befriending unknowns. Care must be taken while sharing anything on social media as it may create havoc if being mishandled, particularly our personal, sensitive information. Intellectual Property Rights (IPR) help in data protection through copyrights, patents and trademarks. There are both ethical and legal 2024-25 Ch 11.indd 244 08-Apr-19 12:32:01 PM