0% found this document useful (0 votes)
13 views78 pages

Unit 3 - Society, Law and Ethics

The document discusses the importance of cyber safety, identity protection, and ethical issues related to internet usage. It covers various aspects of safely browsing the web, including anonymous browsing, confidentiality practices, and the implications of cybercrime. Additionally, it addresses the significance of digital footprints and the ethical considerations surrounding intellectual property rights and plagiarism.

Uploaded by

Sanjay Mehta
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views78 pages

Unit 3 - Society, Law and Ethics

The document discusses the importance of cyber safety, identity protection, and ethical issues related to internet usage. It covers various aspects of safely browsing the web, including anonymous browsing, confidentiality practices, and the implications of cybercrime. Additionally, it addresses the significance of digital footprints and the ethical considerations surrounding intellectual property rights and plagiarism.

Uploaded by

Sanjay Mehta
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 78

UNIT 3.

SOCIETY, LAW AND ETHICS

CBSE – CLASS – XI
Computer Science with Python (New)
(Subject Code : 083)
OBJECTIVE

2
Cyber safety means being secure online. The online environment is
rife(common / widespread) with threats to our safety and security. ... Cyber
safety helps to avoid those risks but also helps to protect against their
consequences, because it is impossible to avoid all hazards.
3
SAFELY BROWSING THE WEB

• These DAys we must know the THREATS while browsing the web.
• SAFE browsing on web needs you to know MANY things like:
• WHAT ARE possible DANGERS?
• How to avoid these?
• How to virtually conduct yourself while browsing web

• You must remember,


• not every site you visit is SAFe.
• WHAtever you post or do online is visible to others.
• Not everything you see or is promised online is true.
4
IDENTITY PROTECTION WHILE USING
INTERNET
• Identity fraud is when personal details that have been accessed or stolen are
used to commit fraudulent acts posing as someone else with stolen identity
• We surf internet for a variety of reasons, from using social media, buying and selling
goods, to exchange information.
• When we give private data to businesses and other internet users (such as while
filling online form or making payment online), we trust them to use that
information for legitimate purposes.
• This information can be used for harmful reasons like hacking, stalking an identify
fraud.

5
SOLUTION OF IDENTITY FRAUD

• Most common solution to this is :


• Private Browsing OR Anonymous Browsing
• Before we understand this, let us TALK about what happens when we browse the
internet…

6
ANONYMOUS BROWSING

• All the ways discussed earlier of identity leakage is resolved by either ANONYMOUS
OR PRIVATE BROWSING.
ANONYMOUS BROWSING: (VPN, Tor, Proxy Server)
• Allows users to view websites without revealing any personnel information of user
like IP address, machine type, location.
• An anonymous browser lets users access websites anonymously.
• It can also be as a tool for government, journalists and everyday security-conscious
surfers.

7
ANONYMOUS BROWSING
• Proxy: acts as a middleman between your computer and the website you want to
access.
• Now the tracking website will get the IP address and information that belongs to the
proxy site, so you are effectively getting the same content from another source
without getting to know your browsing details.
• Virtual private network (VPN): is a method to add security and privacy to private
and public networks like wi-fi hotspot and the internet.
• VPNs are most often used by corporation to protect sensitive data.
• VPN were originally meant for business employees working offsite to gain access to
shared drive.
8
PRIVATE BROWSING

• There ARE other WAYs to use internet without REVEAling our SEArch history and SHARING
our DATA:
• INCOGNITO BROWSING:
• Opens up A version of the browser thAT will not TRACK your ACTIVITY.
• Its PARTiCULArly useful if you ARE entering sensitive DATA like BANK details into the browser
AS it CAn minimize the risk of our information being SAVED to THAT computer.

• In google chrome, just press: ctrl + shift + n to open in incognito mode

9
10
CONFIDENTIALITY OF INFORMATION

• Internet is a public platform.


• The sites you visit, the products you search, the posts that you put on social
media are all visible to public.
• But there must be some information like Credit Card Details, Bank Details
which you do not want to make public i.e. you want to keep this information
confidential.

11
PRACTICES TO ENSURE CONFIDENTIALITY
OF INFORMATION
1) Use Firewall wherever possible :
 We must secure our system such that only authentic users can connect to it.
 Firewall is one very good solution.
 Firewall is a program/hardware that monitors all communications (inbound and
outbound) packets.
 Most OS now comes with firewall preinstalled.

12
PRACTICES TO ENSURE CONFIDENTIALITY
OF INFORMATION
2. Control browser setting to block tracking :
As we know that website can track our surfing on their site by IP address, to minimize
these threats we can turn our default settings to exclude third party cookies since they can
be used to build up detailed profiles of our surfing pattern over time.
• In Google Chrome :
• Open settings, -> Privacy and Security -> Content Settings-> Cookies -> “Enable”
Block Third party cookie.

13
PRACTICES TO ENSURE CONFIDENTIALITY
OF INFORMATION
3. Browse privately wherever possible:
to avoid the tracking as discussed earlier try to browse anonymously or privately.
4. Be Careful while posting on Internet :
 When you post anything to public Internet such as social networking site like Instagram
or Facebook etc.
 Newsgroup, mailing list or chat room you generally give up rights to the content and any
expectation or privacy or confidentiality is useless.
 So never post crucial information like you personal details such as address, mobile
phone numbers, bank details, credit card details. Etc. On public internet sites.
14
PRACTICES TO ENSURE CONFIDENTIALITY
OF INFORMATION
5. Ensure Safe sites while entering crucial Information :
 while entering or giving crucial information like Passwords, Bank Details always ensure
the website is working on https not on http.
 Https means website is Secure i.e. Secure Socket Layer. For e.g. (next slide)

15
Closed Lock PAD (Secure Connection)

16
PRACTICES TO ENSURE CONFIDENTIALITY
OF INFORMATION
• Carefully handle emails: while opening emails, make sure you know the
sender.
• Never open email of unknown or if by curiosity/accidentally opened the mail
never click on any link inside it or open any attachment.
• It may lead to your fraudulent site, or trap for you or may be a Trojan, which
will act as a Spy in your computer for sending information to the sender without
your knowledge.

17
PRACTICES TO ENSURE CONFIDENTIALITY
OF INFORMATION
• Avoid using Public Computer : Always try not to use the public computer
specially if you have to deal with your crucial data. But if it is an urgency then
do remember:
• Browse privately
• Never save your login information (ID/Password)
• Avoid entering sensitive information
• Don’t leave computer unattended with sensitive information on screen
• Disable the features that stores passwords
• Properly logout before you leave the computer
• Erase history and traces of your work i.e. Clear history and cookies
18

• Look for any suspicious device connected to computer


CYBERCRIME

• Cybercrime is any criminal offense that is facilitated by, or involves use of


electronic communications of information system including any electronic
device, computer or the Internet.

• It involves the terms like : Phishing, Credit Card Frauds, illegal downloading,
child pornography, cyber bullying, cyber stalking, cyber terrorism, creation
and /or distribution of viruses, spam and so on.

19
EXAMPLE OF CYBERCRIME

• CYBER TROLLS AND BULLYING:

o It refers to a person who purposely post opposing,


sarcastic, demeaning or insulting- comments
about something or someone with an aim of
targeting a person online.

o The provocative messages posted this way are also


called trolls.

o It is a cyber crime and is a form of cyber bullying. 20


EXAMPLE OF CYBERCRIME

• CYBER BULLYING: Harassing, demeaning, embarrassing, defaming, someone using


modern technologies like internet, cell phones, instant messengers, social networks
etc. is called Cyber Bullying.

• CYBER STALKING: It is a kind of online harassment wherein the victim is subjected


to barrage (Bombard)of online messages and emails.

• Typically these stalkers know their victims instead of resorting to offline stalking,
they use the internet to stalk, etc.

21
REPORTING CYBERCRIME

• If any cyber crime happens, one must report it firstly to parents, school authorities
and then to police.
• The local police stations can be approached for filing complaints just as the cybercrime
cells specially designation with the jurisdiction to register complaint
• In addition, provisions have now been made for filing of E-FIR in most of the states

• In addition, the ministry of Home Affairs is also launching a website for registering
crimes against women and children online including cybercrimes.

22
DIGITAL FOOTPRINT

• Are the records and traces individuals leave behind as they use
the Internet.
• Your interaction on social media, your friend circle on social
media sites, site you visits, online purchase, location visited
through Facebook check-ins. etc. all make up your Digital
Footprints.

23
2
APPROPRIATE USAGE OF
SOCIAL NETWORKS

24
COMMON SOCIAL NETWORKING SITES

• Facebook : it is a platform where you can share your ideas in form of posts, share
photos, videos etc.
• Twitter : micro blogging site which allows to post very small messages up to 280
chars.
• Linkedln : social network for professionals. Provides features to make profiles look
sort of detailed resumes, with sections for work experience, education, volunteer
work, certifications, awards etc.
• Instagram : on of the most popular social networks for online photo sharing. Offer
features like sharing real-time photos and short videos while on the go.

25
APPROPRIATE USAGE OF SOCIAL
NETWORKS
• Whatever we do online – post something or visit friends pages or search something
etc leaves a permanent footprints called digital footprints and it remains for years
storing trails of your online activities.
• We are using this platform for personal reasons and visible to anyone who looks for
it, this might not cause any problem now BUT sometimes later it can pose potential
problems when it comes to matter like
– taking admissions in higher education or looking for job or even when looking for
a life partner
• These days many universities look for digital footprints of applicant students before
giving them admissions, similarly employers may look for digital footprint of
candidates and so on.
26
WHAT YOU SHOULD KNOW?

• While using social networking sites, you should know about what the right
online behaviors are and what is considered a cybercrime
• If anyone thinks by making fake profile he/she can do such activity without
being caught he/she is certainly mistaken.
• Modern technology tools can find anyone online using IP address, locations etc.
So one must not indulge in these activities at all.

27
PRIVACY SETTINGS

• When you start social media, you should not go with default privacy settings.
• Rather it is always a good idea to set-up privacy settings yourself by using Account
Settings. Through privacy settings you can control :
• Who all can see what you have posted
• Who all can send requests to you
• What all information about you is visible to others, even to you contacts etc.

28
WHAT YOU SHOULD DO – USAGE RULES

• Be Authentic : Be honest about your identity


• Use a Disclaimer : if you are associated with any institution / organization and you
are sharing you personal views about something, do make it clear that these are you
personal views and you do not represent any institution/organization.
• Don’t Pick Fights Online : Don’t pick fight online if you do not like anyone's
comments on your post.
• Don’t use Fake names : Never pretends to be someone else.
• Protect Your Identity :While you should be honest about yourself, BUT you should
never provide or post personal information online. These information can be used to
conduct fraud or crime.
• Does your Information / Post pass the publicity test ? : if your post is not acceptable
for face-to- face conversation, over the telephone then it is NOT ACCEPTABLE for a
29
social networking site too.
WHAT YOU SHOULD DO – USAGE RULES CONTI…

• Respect you audience : sometimes school/college students talk in slang or use


some abusive words which they find okay within their small group. But these
things must not be posted online because it would not be acceptable in you
connected world.
• Respect other’s Sentiments : you should always respects others’ privacy and be
considerate for topics that may be considered sensitive – such as politics and
religion.
• Monitor Comments : most people who maintain social media sites welcome
comments
– it builds credibility and community. You should prefer to review and approve
comments before posting them on you site. This way you will ensure quality of
comments 30
3
SAFELY ACCESSING WEB SITES

31
COMPUTER SECURITY THREATS

• Adware: unwanted ads shown while surfing internet.


• Malware: Malware could be computer viruses, worms, Trojan horses,
dishonest spyware, and malicious.
• Computer virus: It is a small piece of software that can spread from one
infected computer to another. It can corrupt, steal, or delete data on your
computer/hard drive.
• Trojan horse: can do anything from record your passwords by logging
keystrokes (known as a key logger) to hijacking your webcam to watch and
record your every move.
32
COMPUTER SECURITY THREATS

• Computer worm: A computer worm is a software program that can copy itself
from one computer to another, without human interaction.
• Spam: unwanted messages in your email inbox.
• Phishing: Phishing are fraudulent attempts by cyber criminals to obtain private
information. For eg: a message prompt your personal information by
pretending that bank / mail service provider is updating its website.
• spyware: spyware is used to spy on their victims. An eg: is key logger software
that records a victim’s every keystroke on his/her keyboard.
• Eavesdropping: is the act of intercepting communications between two points
33
HOW TO PREVENT/REMOVE ADWARE/MALWARE

• Uninstall the malicious programs from Windows


• Use antivirus program for malware and unwanted programs
• Reset the browser settings to their original defaults
• Scan for malicious programs antivirus/anti malware program

34
HOW TO PREVENT/REMOVE VIRUS

• Beware of Fake Download Buttons


• Use a Secure Browser
• Avoid Public Torrent Sites
• Don’t Open Email Attachments Forwarded to You
• Don’t Use Your PC’s Admin Account
• Scan All New Files and Disks

35
HOW TO PREVENT/REMOVE TROJAN

• Never open unsolicited emails from unknown senders


• Avoid downloading and installing programs unless you fully trust publisher
• Use firewall software
• Use a fully updated antivirus program

36
4
SAFELY COMMUNICATING DATA

37
ETHICAL ISSUES

• There are various ethical issues involved with usage and availability of
information:
• Intellectual Property Rights
• Plagiarism
• Digital Rights Management
• Licensing

38
INTELLECTUAL PROPERTY RIGHTS (IPR)
• Intellectual property is the product of the human intellect including creativity
concepts, inventions, industrial models, trademarks, songs, literature,
symbols, names, brands, etc.
• Intellectual Property Rights(IPR) do not differ from other property rights.
• They allow their owner to completely benefit from his/her product which was
initially an idea that developed and crystallized.
• They also entitle him/her to prevent others from using, dealing or tampering
with his/her product without prior permission from him/her.
• He/she can in fact legally sue them and force them to stop and compensate for
any damages.
39
PLAGIARISM
• Plagiarism refers to using some other person's ideas and information
without acknowledging that specific person as the source.
• Similar to all other forms of theft, plagiarism also has many disadvantages
associated with it.
• It means you are actually not giving credit to the original creator whose work
you are using or copying.
• It can be classified as :
• Accidental / Unintentional
• Deliberate / Intentional

40
DIGITAL RIGHTS MANAGEMENT (DRM)

• Digital property include data, information, internet account, files (Word processor,
spreadsheet, etc) stored in computer, online or any electronic storage.
• Generally the person who has created the digital property owns it right.
• So the owner can decide who can use this in which form by making payment or giving
credit it other form.
• But other than, this there are many other Digit Property threats.

41
THREATS TO DIGITAL RIGHTS

• There are many tools available by which we can crack the unlicensed
software to registered software by generating product key using Keygen
software or other tools.
• The hackers may get the actual source code of your digital work and
modifies it and release it with their name.
• We can protect these kind of threat by mean of Anti- temper software
which prevent reverse engineering, or by adding legal clause in the form
of “Term of Service” or by limiting the sharing of code or only to
authorized persons/organization.

42
LICENSING
• A license or license is an official permission or permit to do, use, or own something.
• A license can be granted by a party to another party as an element of an agreement
between those parties.
• There are various types of license in term of digital elements:
• Creative Commons
• GPL
• Apache

43
CREATIVE COMMON LICENSE (CCL)
• A Creative Commons (CC) license is one of several public copyright
licenses that enable the free distribution of an otherwise copyrighted "work".

• A CC license is used when an author wants to give other people the right to
share, use, and build upon a work that they (the author) have created.
• CC provides an author flexibility (for example, they might choose to allow
only noncommercial uses of a given work) and protects the people who use
or redistribute an author's work from concerns of copyright infringement as
long as they abide by the conditions that are specified in the license by
which the author distributes the work. 44
GENERAL PUBLIC LICENSE (GPL)

• The GNU General Public License (GNU GPL or GPL) is a widely-


used free software license, which guarantees end users the freedom to
run, study, share and modify the software.
• GPL allows:
• Copy the software
• Distribute the software
• Charge a fee to distribute
• Modification of software

45
APACHE LICENSE
• It is written by Apache Software foundation (ASF)
• It allows user to use the software for any purpose, modify, redistribute
the software under the term of license without concern for royalties.
• Apache License offers:
• Rights once granted can be continued forever(Perpetual/ lifetime )
• Rights are worldwide
• Rights are granted for no fee or royalty
• It is non exclusive (license can be given to multiple users/ transferable)
• Rights once give cannot be revoked.
46
OPEN SOURCE

• is computer software that is available in source code form: the source code and
certain other rights normally reserved for copyright holders are provided under a
free software license that permits users to study, change, improve and at times also to
distribute the software.
• Its source code is available.
• Open source software is modified and redistributed free of cost of with nominal
charges.
• Open source software are generally developed in collaboration and made freely
available.
47
OPEN SOURCE OFFERS

Freedom to run the software for any purpose


Freedom to distribute the copies
Freedom to study how program works
Freedom to improve the software and release your improvement to public

48
OPEN DATA

• The idea of Open Data is some data should be freely available to everyone to use and
republish as they want, without restriction from copyright, patent or any other
mechanism.
• It is the data that any one can access, use or share by attributing to creator.
• It is mostly available on subjects like science, medicine, maps, chemical compound,
or any other field which is in the benefit of common people.

49
THREE IMPORTANT PRINCIPLE OF BEHIND THE
DEFINITION OF OPEN DATA

• Availability and Access : easily get the data


• Re-use and Redistribution : reuse and share the data
• Universal Participation : anyone around the world can use it.

50
OPEN DATA

51
DATA PRIVACY (INFORMATION PRIVACY)

• It deals with the ability of an organization or individual has to determine what data in
a computer system can be shared with third parties.
• As more and more world is digitizing, we share most of the data on line, so data
privacy is taking greater importance.
• When data that should be kept private gets in the wrong hands, bad things can
happen.
• A data breach at a government agency, for example, put top secret information in the
hands of an enemy state.
• A breach at a corporation can put proprietary data in the hands of a competitor.

52
TIPS TO HELP /PROTECT YOUR PERSONAL
DATA
• Make sure to secure your Home Wi-Fi with strong password so that no one can
“eavesdrop” your online activity.
• Think before you share personal information with others, check whether it is actually
needed, if so make sure they will protect your privacy.
• Use Strong and unique password for all online activities.

53
TECHNOLOGY AND SOCIETY

• Technology is the application of scientific knowledge to the making of


tools to solve specific problems.
• Technological advances such as automobiles, airplanes, radio,
television, cellular phones, computers, modems, and fax machines
have brought major advances and changes to the world.
• Indeed, 20th century technology has completely—and irreversibly—
changed the way people meet, interact, learn, work, play, travel,
worship, and do business.
• Social Change :
• Alterations in the norms, cultural values, and behavioral patterns
54
after some time
RELATIONSHIP BETWEEN TECHNOLOGY
AND SOCIAL CHANGES
• Technological improvements increases information and
knowledge
• Technological improvements leads to better technology.
• Impact of cell phone on society:
• Improved communication.
• Improved access to information.
• Increased convenience through research, banking and voice recording.
• Message notifications interrupts people.
• Additional phone features keeps people addicted in busy environment. 55
IMPACT OF COMPUTER IN THE SOCIETY
• Increased interconnectivity
• Efficient information capabilities
• Computers perform complex mathematical problems in nanoseconds
• Numerous applications in driving and other manufacturing locations

56
IMPACT OF INTERNET ON SOCIETY
• Increased access to information
• Ease of accessing knowledge
• Online communication is helping to build social relationships
around the World.
• Internet added influence factors in social interactions such as
trustworthiness, selfless guides, blogs and profile descriptions.
• Internet provided freedom of options to share feelings and thoughts
within society and this is the positive advantages of the internet in
evolving new ways for social development.
57
NEGATIVE IMPACT OF TECHNOLOGY ON
SOCIETY
• Most people are addicted to Internet and its features,and they are losing the
connection and bond of having a family, friends and relatives.
• Earlier we were wishing personally on special occasion, but now with Internet
Best wishes, Happy birthday, Anniversary, etc. are now sent by using the Internet
and this is nothing but artificial care.
• The Internet is also helping the politicians to infect society by dividing the unity
of people by producing communalism and casteism material on the internet.
• Internet also host some material which are not suitable for children,teenagers.
• Many hacking information are available and children are interested in these
things.
58
SOCIAL ISSUES CREATED BY COMPUTER

• Communication Breakdown
• Defamation of Character
• Identity Theft
• Cyber Bullying
• Gaming Addiction
• Privacy
• Health & Fitness
• Education-Only copy paste
• Terrorism & Crime 59

• Sexuality
E-WASTE MANAGEMENT

60
E-WASTE MANAGEMENT

• E-waste or electronic waste describes discarded electrical or electronic


devices.
• Used electronics which are destined for refurbishment, reuse, resale, salvage
recycling through material recovery or disposal are also called e-waste.
• E-waste is categorized by the Govt. of India under the broad class of hazardous
waste.
• With in e-waste, there are several categories such as large and small household
appliances.
• Electrical and electronic toys and sporting equipment, tools, computer and
related equipment and so forth.
61
E-WASTE MANAGEMENT CONTI…
• Composition of e-waste: Electrical and electronic equipment contains metallic and
non metallic elements, alloys and compounds such as Copper, Aluminum, Gold, Silver,
Palladium, Platinum, Nickel, Tin, Lead, Iron., Sulphur, Phosphorous, Arsenic etc.
• This process involves proper recycling and recovery of the disposed material.
• The recycle and recovery includes the following unit operations:
• Dismantling : Removal of parts containing dangerous substances(CFCs, switches,
PCB); removal of easily accessible parts containing valuable substances(cable containing
copper, steel, iron, precious metals containing parts)

• Segregation of ferrous metal, non-ferrous metal and plastic:


• This process is normally done in a shredder process.
• Refurbishment and reuse : Refurbishment and reuse of e-waste has potential for those
used in electrical and electronic equipment which can be easily refurbished to put to its 62

original use.
E-WASTE MANAGEMENT CONTI…

• Recycling / Recovery of valuable materials :


• Ferrous metals in electrical arc furnaces, non-ferrous metals in smelting plants,
precious metals in separating works.

• Treatment /disposal of dangerous materials and waste :


• Chlorofluorocarbons(CFCs) are treated thermally, Printed Circuit Board(PCB)
disposed of in underground storages, Mercury(Hg) is recycled or disposed off
underground

63
BENEFITS OF E-WASTE MANAGEMENT
• The e-waste disposal and proper recycling is very much necessary and important for
the benefit of people, environment and nation. The key benefits are:
• Allow for recovery of valuable precious metals like copper, gold and zinc that should be
recycled
• Protects public health and water quality: e-Waste contains a variety of toxic
substances, which may include lead, mercury and cadmium, which should be disposed
off systematically
• Recycling e-Waste domestically creates job for professional recyclers and refurbishes.
• Toxic Waste(all form of waste that cause harm)
• Saves landfill spaces: e-Waste is a growing waste stream Recycling these items will
help conserve landfill space. 64
IDENTITY THEFT

• It occurs when someone uses another person’s personal information


such as name, Aadhar number, credit card number, or other identifying
information to take on persons’ identity in order to commit fraud or
other crime
• Stealing an identity is, unfortunately, surprisingly easy to do and
happens mostly to unsuspecting victims.
• Online identity theft is the theft of personal information in order to
commit fraud.

65
IDENTITY THEFT CONTI…
• Online identity theft is carried out through mix of actions such as:
• Through phishing via your email account
• Stealing your online purchase information where you give out sensitive information such
as your credit card number or your Aadhaar details

• Various kinds of fraud can be committed by Identity theft :


• Credit/Debit Card Fraud
• Change your personal information
• Bank / Financial fraud
• Other fraud

66
PROTECTION AGAINST IDENTITY THEFT
• 1. Protect Personal Information
• 2. Use Unique Ids to protect your devices and accounts.
• 3. Biometric Protection.

67
GENDER ISSUE WHILE TEACHING
COMPUTER
• While teaching computers, there are many gender specific issues that must be
addressed to enforce gender equality in computer science education.
• GENDER ISSUE : The trend that more boys opt for Computer Science than girls has
been continuing for years now. So under representation of girls is one major issue.
There are some other issues as well, lets discuss gender issue at school-level
Computer Science education.
• Under representation : A leading engineering institution of India has reported that
there has been about 17% of girls represented in Computer Science engineering
recent years. There are many factors as:

68
GENDER ISSUE WHILE TEACHING
COMPUTER
• A. Preconceived Notion : There are preconceived notions prevalent that
subconsciously play a role. Notions like ―boys are better at technical things,
girls are good at hUManities, arts, etc. girls MUST take UP career keeping in mind
that they have to rise family. They MUST not take UP high involvement careers and
Teaching is the best option for girls as it gives YOU half day off and ample of
holidays” have their impact in decision making of girls while taking up subjects.
• India parents also plays important role while option subjects, and parents directly or
indirectly pushes girls based on preconceived notion to take subject other than
computer science.

69
GENDER ISSUE WHILE TEACHING
COMPUTER
• Lack of Interest : Most games available today are boys-centric that increases their
interest in computers. Also at home boys get to play more on computers/smart phones
and develop more interest in computers than girls
• Lack of Motivation : Girls are pressurized to choose career option which will give them
‘work life balance’ in favour of family roles they have to play later on
• Lack of Role Models : Girls these days see less of role models in the field of ‘Computer
Science’ whom they can imitate. TV, movies, advertisement, every where it is portrayed
that is technical fields like Computer Science are men’s field. All these things influence
girls sub psychologically and they infer that CS is for boys and do not take subject.
• Lack of encouragement in class : As lesser number of girls in class, teacher choose boy
for most work assignment. Because of lesser number of girls, lesser encouragement. Also
some teachers pin point on their roles in society such ‘girls will get married and may not
take it up as career’. All this may play as Hindrance and girls do not develop as much
interest as they can in ‘Computer Science. 70
GENDER ISSUE WHILE TEACHING
COMPUTER
• Not Girl Friendly Environment : It has been observed that when, in schools, work-
partners are chosen, boys prefer boys over girls. And even if a girl and a boy are
made work-partners, boys prefer to work effectively and make girls silent observers.
Boys are not comfortable in situations where they are not playing active roles.
• Even if girls are given separate computers to work on, they are very shy of working
actively. As per a study, the problems mentioned by girls in a computer room are
like: ’insufficient access time’, ‘insufficient peripherals available’ etc. contrary to
problems mentioned by boys such as ‘software not usable’, ‘limitation of software’,
‘poor quality of help’ etc.

71
POSSIBLE SOLUTION OF GENDER ISSUE
• There should be more initiative and programmes that encourage girls to take up
Computer Science subject. Presently there are many initiative supported by
government and run by many tech giants to encourage more girls to take up
‘Computer Science’ subject.
• The film and TV censor board should ensure fair representation of female role
models in TV, cinema etc....so that more girls to take up ‘Computer Science’ subject
• In the practical room, girls should be encouraged more to work on their own and also
to find solutions of their routine problems such as ‘peripheral not available’.
• They should assertively speak to the lab attendant to get all the peripheral devices
they want.
• They should be encouraged to celebrate small success in the lab (such as an error is
72
removed from program) to big success
DISABILITY ISSUE WHILE TEACHING USING
COMPUTER
• Increased focus on inclusive education and promoting access for students with
disabilities and impairments, in the field of technology and computer science have
made today’s classroom really diverse and inclusive.
• In specially – abled students, there can be one or more disabilities:
• Locomotors Disability: Polio, Leprosy, Cerebral palsy.
• Hearing and speech disabilities : Hearing disability, speech aphasia
• Cognitive impairment : Dyslexia, dyscalculia, Down’s syndrome, etc.
• Vision Impairment : Low vision, blindness

73
VARIOUS DISABILITY ISSUES

• Unavailability of Teaching Aid


• Students with different disabilities need different types of teaching aids/materials. For
example visually challenged students would want that there are screen readers that could
read the digital content to them
• Similarly, hearing impaired students would want more of visual input than oratory, rather
oratory instructions should be available in sign language if possible .
• Students with locomotors disability can use virtual keyboards, joy sticks and programming
editors that can support virtual keyboards.
• For low vision students, Braille keyboards, braille monitors and braille Printer should be
made available.
74
VARIOUS DISABILITY ISSUES

• Lack of Special Needs Teachers


• For different types of special needs, if special needs teachers are available, disabled students
get their needs addressed in right manner.
• There should be teacher who know what type of HW/SW TOOLS etc can be used for the
differently able students as per their specific needs. .
• There are many types of software features and voice assistant that visually impaired students
can use are:
• Microsoft Narrator, Cortana and Ubuntu Orca and Onboard voice assistant
• Linux version Blinux for Blind
• Accessibility features of Office software
• Specialized editors for visually impaired students for typing programs.

75
VARIOUS DISABILITY ISSUES

• Lack of Supporting Curriculum


• Curriculum should be designed while keeping focus on inclusive education. There always
should be possible alternatives keeping in mind special needs of the students.
• Software and programs should be so used so that the disabled

• students can easily work on that.


• Programming language that require manual coding such as Python, can also be used for
teaching programming as long as specialized editors are available.
• The computer science contests and programming contests should be conducted so that all
types of students can participate in them, inclusively.

76
POSSIBLE SOLUTIONS FOR DISABILITY
ISSUES
• School must work towards making available the required teaching aids/materials to
fulfill special needs of students with disability.
• There should be proper budget allocated for buying the required material and
equipment to promote inclusive education
• School must employ special needs teachers and should also train other teachers as
well about how to interact with students with social needs so as to help them learn in
a better inclusive way.
• School must support the inclusive curriculum and refrain from any other practice that
directly or indirectly uts the disabled studens at the disadvantaged side.

77
THANK YOU

By Gubert L
Dept of Computer Science

78

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy