Unit 3 - Society, Law and Ethics
Unit 3 - Society, Law and Ethics
CBSE – CLASS – XI
Computer Science with Python (New)
(Subject Code : 083)
OBJECTIVE
2
Cyber safety means being secure online. The online environment is
rife(common / widespread) with threats to our safety and security. ... Cyber
safety helps to avoid those risks but also helps to protect against their
consequences, because it is impossible to avoid all hazards.
3
SAFELY BROWSING THE WEB
• These DAys we must know the THREATS while browsing the web.
• SAFE browsing on web needs you to know MANY things like:
• WHAT ARE possible DANGERS?
• How to avoid these?
• How to virtually conduct yourself while browsing web
5
SOLUTION OF IDENTITY FRAUD
6
ANONYMOUS BROWSING
• All the ways discussed earlier of identity leakage is resolved by either ANONYMOUS
OR PRIVATE BROWSING.
ANONYMOUS BROWSING: (VPN, Tor, Proxy Server)
• Allows users to view websites without revealing any personnel information of user
like IP address, machine type, location.
• An anonymous browser lets users access websites anonymously.
• It can also be as a tool for government, journalists and everyday security-conscious
surfers.
7
ANONYMOUS BROWSING
• Proxy: acts as a middleman between your computer and the website you want to
access.
• Now the tracking website will get the IP address and information that belongs to the
proxy site, so you are effectively getting the same content from another source
without getting to know your browsing details.
• Virtual private network (VPN): is a method to add security and privacy to private
and public networks like wi-fi hotspot and the internet.
• VPNs are most often used by corporation to protect sensitive data.
• VPN were originally meant for business employees working offsite to gain access to
shared drive.
8
PRIVATE BROWSING
• There ARE other WAYs to use internet without REVEAling our SEArch history and SHARING
our DATA:
• INCOGNITO BROWSING:
• Opens up A version of the browser thAT will not TRACK your ACTIVITY.
• Its PARTiCULArly useful if you ARE entering sensitive DATA like BANK details into the browser
AS it CAn minimize the risk of our information being SAVED to THAT computer.
9
10
CONFIDENTIALITY OF INFORMATION
11
PRACTICES TO ENSURE CONFIDENTIALITY
OF INFORMATION
1) Use Firewall wherever possible :
We must secure our system such that only authentic users can connect to it.
Firewall is one very good solution.
Firewall is a program/hardware that monitors all communications (inbound and
outbound) packets.
Most OS now comes with firewall preinstalled.
12
PRACTICES TO ENSURE CONFIDENTIALITY
OF INFORMATION
2. Control browser setting to block tracking :
As we know that website can track our surfing on their site by IP address, to minimize
these threats we can turn our default settings to exclude third party cookies since they can
be used to build up detailed profiles of our surfing pattern over time.
• In Google Chrome :
• Open settings, -> Privacy and Security -> Content Settings-> Cookies -> “Enable”
Block Third party cookie.
13
PRACTICES TO ENSURE CONFIDENTIALITY
OF INFORMATION
3. Browse privately wherever possible:
to avoid the tracking as discussed earlier try to browse anonymously or privately.
4. Be Careful while posting on Internet :
When you post anything to public Internet such as social networking site like Instagram
or Facebook etc.
Newsgroup, mailing list or chat room you generally give up rights to the content and any
expectation or privacy or confidentiality is useless.
So never post crucial information like you personal details such as address, mobile
phone numbers, bank details, credit card details. Etc. On public internet sites.
14
PRACTICES TO ENSURE CONFIDENTIALITY
OF INFORMATION
5. Ensure Safe sites while entering crucial Information :
while entering or giving crucial information like Passwords, Bank Details always ensure
the website is working on https not on http.
Https means website is Secure i.e. Secure Socket Layer. For e.g. (next slide)
15
Closed Lock PAD (Secure Connection)
16
PRACTICES TO ENSURE CONFIDENTIALITY
OF INFORMATION
• Carefully handle emails: while opening emails, make sure you know the
sender.
• Never open email of unknown or if by curiosity/accidentally opened the mail
never click on any link inside it or open any attachment.
• It may lead to your fraudulent site, or trap for you or may be a Trojan, which
will act as a Spy in your computer for sending information to the sender without
your knowledge.
17
PRACTICES TO ENSURE CONFIDENTIALITY
OF INFORMATION
• Avoid using Public Computer : Always try not to use the public computer
specially if you have to deal with your crucial data. But if it is an urgency then
do remember:
• Browse privately
• Never save your login information (ID/Password)
• Avoid entering sensitive information
• Don’t leave computer unattended with sensitive information on screen
• Disable the features that stores passwords
• Properly logout before you leave the computer
• Erase history and traces of your work i.e. Clear history and cookies
18
• It involves the terms like : Phishing, Credit Card Frauds, illegal downloading,
child pornography, cyber bullying, cyber stalking, cyber terrorism, creation
and /or distribution of viruses, spam and so on.
19
EXAMPLE OF CYBERCRIME
• Typically these stalkers know their victims instead of resorting to offline stalking,
they use the internet to stalk, etc.
21
REPORTING CYBERCRIME
• If any cyber crime happens, one must report it firstly to parents, school authorities
and then to police.
• The local police stations can be approached for filing complaints just as the cybercrime
cells specially designation with the jurisdiction to register complaint
• In addition, provisions have now been made for filing of E-FIR in most of the states
• In addition, the ministry of Home Affairs is also launching a website for registering
crimes against women and children online including cybercrimes.
22
DIGITAL FOOTPRINT
• Are the records and traces individuals leave behind as they use
the Internet.
• Your interaction on social media, your friend circle on social
media sites, site you visits, online purchase, location visited
through Facebook check-ins. etc. all make up your Digital
Footprints.
23
2
APPROPRIATE USAGE OF
SOCIAL NETWORKS
24
COMMON SOCIAL NETWORKING SITES
• Facebook : it is a platform where you can share your ideas in form of posts, share
photos, videos etc.
• Twitter : micro blogging site which allows to post very small messages up to 280
chars.
• Linkedln : social network for professionals. Provides features to make profiles look
sort of detailed resumes, with sections for work experience, education, volunteer
work, certifications, awards etc.
• Instagram : on of the most popular social networks for online photo sharing. Offer
features like sharing real-time photos and short videos while on the go.
25
APPROPRIATE USAGE OF SOCIAL
NETWORKS
• Whatever we do online – post something or visit friends pages or search something
etc leaves a permanent footprints called digital footprints and it remains for years
storing trails of your online activities.
• We are using this platform for personal reasons and visible to anyone who looks for
it, this might not cause any problem now BUT sometimes later it can pose potential
problems when it comes to matter like
– taking admissions in higher education or looking for job or even when looking for
a life partner
• These days many universities look for digital footprints of applicant students before
giving them admissions, similarly employers may look for digital footprint of
candidates and so on.
26
WHAT YOU SHOULD KNOW?
• While using social networking sites, you should know about what the right
online behaviors are and what is considered a cybercrime
• If anyone thinks by making fake profile he/she can do such activity without
being caught he/she is certainly mistaken.
• Modern technology tools can find anyone online using IP address, locations etc.
So one must not indulge in these activities at all.
27
PRIVACY SETTINGS
• When you start social media, you should not go with default privacy settings.
• Rather it is always a good idea to set-up privacy settings yourself by using Account
Settings. Through privacy settings you can control :
• Who all can see what you have posted
• Who all can send requests to you
• What all information about you is visible to others, even to you contacts etc.
28
WHAT YOU SHOULD DO – USAGE RULES
31
COMPUTER SECURITY THREATS
• Computer worm: A computer worm is a software program that can copy itself
from one computer to another, without human interaction.
• Spam: unwanted messages in your email inbox.
• Phishing: Phishing are fraudulent attempts by cyber criminals to obtain private
information. For eg: a message prompt your personal information by
pretending that bank / mail service provider is updating its website.
• spyware: spyware is used to spy on their victims. An eg: is key logger software
that records a victim’s every keystroke on his/her keyboard.
• Eavesdropping: is the act of intercepting communications between two points
33
HOW TO PREVENT/REMOVE ADWARE/MALWARE
34
HOW TO PREVENT/REMOVE VIRUS
35
HOW TO PREVENT/REMOVE TROJAN
36
4
SAFELY COMMUNICATING DATA
37
ETHICAL ISSUES
• There are various ethical issues involved with usage and availability of
information:
• Intellectual Property Rights
• Plagiarism
• Digital Rights Management
• Licensing
38
INTELLECTUAL PROPERTY RIGHTS (IPR)
• Intellectual property is the product of the human intellect including creativity
concepts, inventions, industrial models, trademarks, songs, literature,
symbols, names, brands, etc.
• Intellectual Property Rights(IPR) do not differ from other property rights.
• They allow their owner to completely benefit from his/her product which was
initially an idea that developed and crystallized.
• They also entitle him/her to prevent others from using, dealing or tampering
with his/her product without prior permission from him/her.
• He/she can in fact legally sue them and force them to stop and compensate for
any damages.
39
PLAGIARISM
• Plagiarism refers to using some other person's ideas and information
without acknowledging that specific person as the source.
• Similar to all other forms of theft, plagiarism also has many disadvantages
associated with it.
• It means you are actually not giving credit to the original creator whose work
you are using or copying.
• It can be classified as :
• Accidental / Unintentional
• Deliberate / Intentional
40
DIGITAL RIGHTS MANAGEMENT (DRM)
• Digital property include data, information, internet account, files (Word processor,
spreadsheet, etc) stored in computer, online or any electronic storage.
• Generally the person who has created the digital property owns it right.
• So the owner can decide who can use this in which form by making payment or giving
credit it other form.
• But other than, this there are many other Digit Property threats.
41
THREATS TO DIGITAL RIGHTS
• There are many tools available by which we can crack the unlicensed
software to registered software by generating product key using Keygen
software or other tools.
• The hackers may get the actual source code of your digital work and
modifies it and release it with their name.
• We can protect these kind of threat by mean of Anti- temper software
which prevent reverse engineering, or by adding legal clause in the form
of “Term of Service” or by limiting the sharing of code or only to
authorized persons/organization.
42
LICENSING
• A license or license is an official permission or permit to do, use, or own something.
• A license can be granted by a party to another party as an element of an agreement
between those parties.
• There are various types of license in term of digital elements:
• Creative Commons
• GPL
• Apache
43
CREATIVE COMMON LICENSE (CCL)
• A Creative Commons (CC) license is one of several public copyright
licenses that enable the free distribution of an otherwise copyrighted "work".
• A CC license is used when an author wants to give other people the right to
share, use, and build upon a work that they (the author) have created.
• CC provides an author flexibility (for example, they might choose to allow
only noncommercial uses of a given work) and protects the people who use
or redistribute an author's work from concerns of copyright infringement as
long as they abide by the conditions that are specified in the license by
which the author distributes the work. 44
GENERAL PUBLIC LICENSE (GPL)
45
APACHE LICENSE
• It is written by Apache Software foundation (ASF)
• It allows user to use the software for any purpose, modify, redistribute
the software under the term of license without concern for royalties.
• Apache License offers:
• Rights once granted can be continued forever(Perpetual/ lifetime )
• Rights are worldwide
• Rights are granted for no fee or royalty
• It is non exclusive (license can be given to multiple users/ transferable)
• Rights once give cannot be revoked.
46
OPEN SOURCE
• is computer software that is available in source code form: the source code and
certain other rights normally reserved for copyright holders are provided under a
free software license that permits users to study, change, improve and at times also to
distribute the software.
• Its source code is available.
• Open source software is modified and redistributed free of cost of with nominal
charges.
• Open source software are generally developed in collaboration and made freely
available.
47
OPEN SOURCE OFFERS
48
OPEN DATA
• The idea of Open Data is some data should be freely available to everyone to use and
republish as they want, without restriction from copyright, patent or any other
mechanism.
• It is the data that any one can access, use or share by attributing to creator.
• It is mostly available on subjects like science, medicine, maps, chemical compound,
or any other field which is in the benefit of common people.
49
THREE IMPORTANT PRINCIPLE OF BEHIND THE
DEFINITION OF OPEN DATA
50
OPEN DATA
51
DATA PRIVACY (INFORMATION PRIVACY)
• It deals with the ability of an organization or individual has to determine what data in
a computer system can be shared with third parties.
• As more and more world is digitizing, we share most of the data on line, so data
privacy is taking greater importance.
• When data that should be kept private gets in the wrong hands, bad things can
happen.
• A data breach at a government agency, for example, put top secret information in the
hands of an enemy state.
• A breach at a corporation can put proprietary data in the hands of a competitor.
52
TIPS TO HELP /PROTECT YOUR PERSONAL
DATA
• Make sure to secure your Home Wi-Fi with strong password so that no one can
“eavesdrop” your online activity.
• Think before you share personal information with others, check whether it is actually
needed, if so make sure they will protect your privacy.
• Use Strong and unique password for all online activities.
53
TECHNOLOGY AND SOCIETY
56
IMPACT OF INTERNET ON SOCIETY
• Increased access to information
• Ease of accessing knowledge
• Online communication is helping to build social relationships
around the World.
• Internet added influence factors in social interactions such as
trustworthiness, selfless guides, blogs and profile descriptions.
• Internet provided freedom of options to share feelings and thoughts
within society and this is the positive advantages of the internet in
evolving new ways for social development.
57
NEGATIVE IMPACT OF TECHNOLOGY ON
SOCIETY
• Most people are addicted to Internet and its features,and they are losing the
connection and bond of having a family, friends and relatives.
• Earlier we were wishing personally on special occasion, but now with Internet
Best wishes, Happy birthday, Anniversary, etc. are now sent by using the Internet
and this is nothing but artificial care.
• The Internet is also helping the politicians to infect society by dividing the unity
of people by producing communalism and casteism material on the internet.
• Internet also host some material which are not suitable for children,teenagers.
• Many hacking information are available and children are interested in these
things.
58
SOCIAL ISSUES CREATED BY COMPUTER
• Communication Breakdown
• Defamation of Character
• Identity Theft
• Cyber Bullying
• Gaming Addiction
• Privacy
• Health & Fitness
• Education-Only copy paste
• Terrorism & Crime 59
• Sexuality
E-WASTE MANAGEMENT
60
E-WASTE MANAGEMENT
original use.
E-WASTE MANAGEMENT CONTI…
63
BENEFITS OF E-WASTE MANAGEMENT
• The e-waste disposal and proper recycling is very much necessary and important for
the benefit of people, environment and nation. The key benefits are:
• Allow for recovery of valuable precious metals like copper, gold and zinc that should be
recycled
• Protects public health and water quality: e-Waste contains a variety of toxic
substances, which may include lead, mercury and cadmium, which should be disposed
off systematically
• Recycling e-Waste domestically creates job for professional recyclers and refurbishes.
• Toxic Waste(all form of waste that cause harm)
• Saves landfill spaces: e-Waste is a growing waste stream Recycling these items will
help conserve landfill space. 64
IDENTITY THEFT
65
IDENTITY THEFT CONTI…
• Online identity theft is carried out through mix of actions such as:
• Through phishing via your email account
• Stealing your online purchase information where you give out sensitive information such
as your credit card number or your Aadhaar details
66
PROTECTION AGAINST IDENTITY THEFT
• 1. Protect Personal Information
• 2. Use Unique Ids to protect your devices and accounts.
• 3. Biometric Protection.
67
GENDER ISSUE WHILE TEACHING
COMPUTER
• While teaching computers, there are many gender specific issues that must be
addressed to enforce gender equality in computer science education.
• GENDER ISSUE : The trend that more boys opt for Computer Science than girls has
been continuing for years now. So under representation of girls is one major issue.
There are some other issues as well, lets discuss gender issue at school-level
Computer Science education.
• Under representation : A leading engineering institution of India has reported that
there has been about 17% of girls represented in Computer Science engineering
recent years. There are many factors as:
68
GENDER ISSUE WHILE TEACHING
COMPUTER
• A. Preconceived Notion : There are preconceived notions prevalent that
subconsciously play a role. Notions like ―boys are better at technical things,
girls are good at hUManities, arts, etc. girls MUST take UP career keeping in mind
that they have to rise family. They MUST not take UP high involvement careers and
Teaching is the best option for girls as it gives YOU half day off and ample of
holidays” have their impact in decision making of girls while taking up subjects.
• India parents also plays important role while option subjects, and parents directly or
indirectly pushes girls based on preconceived notion to take subject other than
computer science.
69
GENDER ISSUE WHILE TEACHING
COMPUTER
• Lack of Interest : Most games available today are boys-centric that increases their
interest in computers. Also at home boys get to play more on computers/smart phones
and develop more interest in computers than girls
• Lack of Motivation : Girls are pressurized to choose career option which will give them
‘work life balance’ in favour of family roles they have to play later on
• Lack of Role Models : Girls these days see less of role models in the field of ‘Computer
Science’ whom they can imitate. TV, movies, advertisement, every where it is portrayed
that is technical fields like Computer Science are men’s field. All these things influence
girls sub psychologically and they infer that CS is for boys and do not take subject.
• Lack of encouragement in class : As lesser number of girls in class, teacher choose boy
for most work assignment. Because of lesser number of girls, lesser encouragement. Also
some teachers pin point on their roles in society such ‘girls will get married and may not
take it up as career’. All this may play as Hindrance and girls do not develop as much
interest as they can in ‘Computer Science. 70
GENDER ISSUE WHILE TEACHING
COMPUTER
• Not Girl Friendly Environment : It has been observed that when, in schools, work-
partners are chosen, boys prefer boys over girls. And even if a girl and a boy are
made work-partners, boys prefer to work effectively and make girls silent observers.
Boys are not comfortable in situations where they are not playing active roles.
• Even if girls are given separate computers to work on, they are very shy of working
actively. As per a study, the problems mentioned by girls in a computer room are
like: ’insufficient access time’, ‘insufficient peripherals available’ etc. contrary to
problems mentioned by boys such as ‘software not usable’, ‘limitation of software’,
‘poor quality of help’ etc.
71
POSSIBLE SOLUTION OF GENDER ISSUE
• There should be more initiative and programmes that encourage girls to take up
Computer Science subject. Presently there are many initiative supported by
government and run by many tech giants to encourage more girls to take up
‘Computer Science’ subject.
• The film and TV censor board should ensure fair representation of female role
models in TV, cinema etc....so that more girls to take up ‘Computer Science’ subject
• In the practical room, girls should be encouraged more to work on their own and also
to find solutions of their routine problems such as ‘peripheral not available’.
• They should assertively speak to the lab attendant to get all the peripheral devices
they want.
• They should be encouraged to celebrate small success in the lab (such as an error is
72
removed from program) to big success
DISABILITY ISSUE WHILE TEACHING USING
COMPUTER
• Increased focus on inclusive education and promoting access for students with
disabilities and impairments, in the field of technology and computer science have
made today’s classroom really diverse and inclusive.
• In specially – abled students, there can be one or more disabilities:
• Locomotors Disability: Polio, Leprosy, Cerebral palsy.
• Hearing and speech disabilities : Hearing disability, speech aphasia
• Cognitive impairment : Dyslexia, dyscalculia, Down’s syndrome, etc.
• Vision Impairment : Low vision, blindness
73
VARIOUS DISABILITY ISSUES
75
VARIOUS DISABILITY ISSUES
76
POSSIBLE SOLUTIONS FOR DISABILITY
ISSUES
• School must work towards making available the required teaching aids/materials to
fulfill special needs of students with disability.
• There should be proper budget allocated for buying the required material and
equipment to promote inclusive education
• School must employ special needs teachers and should also train other teachers as
well about how to interact with students with social needs so as to help them learn in
a better inclusive way.
• School must support the inclusive curriculum and refrain from any other practice that
directly or indirectly uts the disabled studens at the disadvantaged side.
77
THANK YOU
By Gubert L
Dept of Computer Science
78