SlideShare a Scribd company logo
1 of 21
Computer Science –
Societal Impact
Chapter 11
DIGITAL FOOTPRINTS
• The websites we visit, emails we send, any information we post online, etc., as
well as the IP address, location, and other device-specific information of the
computer this is known as digital footprint. or you can say data left behind by
users after they utilise the internet is known as a digital footprint.
• Example of digital footprint
a. Search history
b. Photos and Videos
c. Like/ dislike in social media
d. Browser history
Compiled By - Nayan Chabri Information has been taken from varied sources and compiled.
Chances of possible errors persist.
DIGITAL FOOTPRINTS
• We leave two different types of digital footprints.
• Active digital footprint – data that we consciously submit online is
included in our active digital footprints.
This would include any emails we send, comments or postings we make on
various websites or apps, etc.
• Passive digital footprints – are the traces of data we unwittingly leave
online. Included in this are the data produced when we access a website,
utilise a mobile app, explore the internet, etc.
Compiled By - Nayan Chabri Information has been taken from varied sources and compiled.
Chances of possible errors persist.
Digital Society and Netizen
• A digital citizen, often known as a netizen, is someone who uses digital
technology and the Internet. A good netizen uses digital technology in a safe,
moral, and legal manner. Internet etiquette, communication etiquette, and social
media etiquette must all be followed by a responsible netizen.
• Net Etiquettes – When we engage with others, we adhere to specific social
norms. Similar to this, we must act appropriately and politely when using the
internet. While online, one should behave ethically, respectfully, and responsibly.
Compiled By - Nayan Chabri Information has been taken from varied sources and compiled.
Chances of possible errors persist.
Digital Society and Netizen
• Be Ethical
No copyright violation – We should not use copyrighted materials without
the permission of the creator or owner.
Share the expertise – It is beneficial to share expertise and information
online so that others can use it. However, we must be confident that we are
sufficiently knowledgeable about a subject before sharing any information.
• Be Respectful
Respect privacy – As good digital citizens we have the right to privacy and
the freedom of personal expression. At the same time, we have to
understand that other digital citizens also have the same rights and
freedoms.
Respect diversity – in a group or public forum, we should respect the
diversity of the people in terms of knowledge, experience, culture and other
aspects.
Compiled By - Nayan Chabri Information has been taken from varied sources and compiled.
Chances of possible errors persist.
Digital Society and Netizen
• Be Responsible
Avoid cyber bullying – We have to avoid insulting, degrading or intimidating
online behaviour like repeated posting of rumours, giving threats online,
posting the victim’s personal information or sexual harassment. We need to
realise that bullying online can have very serious implications on the other
person (victim).
Don’t feed the troll – An Internet troll is someone who intentionally sows
conflict online by provoking arguments, upsetting people, or by publishing
controversial or irrelevant statements in online communities for fun.
Compiled By - Nayan Chabri Information has been taken from varied sources and compiled.
Chances of possible errors persist.
Communication Etiquettes
• Email, texting, instant messaging, cell phone conversations, audio and video conferencing,
forum posting, social networking site posting, etc. are all examples of digital
communication. All of them are great opportunities to interact with others and share
information, ideas, and knowledge.
• Be Precise
Respect time – we should not waste precious time in responding to unnecessary
emails or comments unless they have some relevance for us.
Respect data limits – For concerns related to data and bandwidth, very large
attachments may be avoided. Rather send compressed files or link.
• Be Polite
We should be polite and non-aggressive in our communication. We should avoid being
abusive even if we don’t agree with others’ point of view.
• Be Credible
We should be cautious while making a comment, replying or writing an email or forum
post as such acts decide our credibility over a period of time.
Compiled By - Nayan Chabri Information has been taken from varied sources and compiled.
Chances of possible errors persist.
Social Media Etiquettes
• We are familiar with several social networking platforms and may even have an
account there. These websites enable users to submit or upload photographs of
their ideas and experiences. It has started to influence how politics, business,
entertainment, education, and other things turn out. There are certain social
media etiquettes we must adhere to as well.
Compiled By - Nayan Chabri Information has been taken from varied sources and compiled.
Chances of possible errors persist.
Social Media Etiquettes
• Be Secure
Choose password wisely – Users need to be aware of how to protect themselves
and their accounts. Having a strong password that is updated periodically is the
way to minimize the risk from hackers.
Know who you befriend – We must take precautions while making friends with
strangers because their motives may be dangerous and harmful.
Beware of fake information – In social networks, fake posts, messages, and news
are common. We should be aware of them as users.
• Be Reliable
Think before uploading – On social networks, almost anything can be uploaded.
But keep in mind that once posted, the file remains on the remote server even if
we delete it. Therefore, we must tread cautiously while transmitting or uploading
private or sensitive files that could compromise our privacy.
Compiled By - Nayan Chabri Information has been taken from varied sources and compiled.
Chances of possible errors persist.
Data Protection
• Every nation in the globe has its unique data protection legislation (laws). These
policies, which are formal legal papers, give the user instructions on how to
handle, store, and transmit sensitive data. The goal of putting these policies into
place is to guarantee that sensitive data is properly protected from change or
disclosure.
• Intellectual Property Right (IPR) - It is the inventor’s intellectual property if they
come up with a novel idea. Intellectual property includes innovations, literary and
artistic works, visual arts, names, and logos. The originator or intellectual
property owner is the rightful proprietor of such concepts.
Compiled By - Nayan Chabri Information has been taken from varied sources and compiled.
Chances of possible errors persist.
Data Protection
• Copyright
Copyright gives creators legal protection for their original works, including
writing, photography, audio and video recordings, computer software,
sculptures, architectural creations, and other types of creative output like
literary and artistic works. Copyrights are automatically granted to creators
and authors.
• Patent
Inventions are granted a patent. In opposed to copyright, the creator must
submit an application (file) to patent the innovation. After receiving a patent,
the owner gains the only authority to prohibit anyone from making, using, or
selling the invention.
• Trademark
Any visual symbol, word, name, design, slogan, label, etc. that sets the brand
or business apart from other brands or businesses is considered a trademark.
Compiled By - Nayan Chabri Information has been taken from varied sources and compiled.
Chances of possible errors persist.
Violation of IPR
• The following are some ways that intellectual property rights may be violated –
• Plagiarism
Text, images, and videos may all be easily copied or shared. Plagiarism is the
process of representing the thoughts or works of another person as one’s
own. Plagiarism is defined as the act of taking someone else’s work and
using it without crediting the author name or source.
• Copyright Infringement
When we utilise someone else’s creative work without asking permission or,
if the work is being sold, without paying for it, we are infringing their
copyright.
• Trademark Infringement
Unauthorized use of another’s trademark on goods and services is known as
trademark infringement. Anyone who violates a trademark registered to
them may face legal action from the trademark owner.
Compiled By - Nayan Chabri Information has been taken from varied sources and compiled.
Chances of possible errors persist.
Public Access and Open Source Software
• Two well-known types of public licences are the GNU General Public License
(GPL) and Creative Commons (CC).
• Creative Common License – All types of creative works, including websites,
music, movies, books, etc., use Creative Commons. CC makes it possible to
distribute a copyrighted work freely.
• General Public License – Another free software licence, the GNU GPL, allows
users to run, study, share, and modify the software while also receiving frequent
updates.
Compiled By - Nayan Chabri Information has been taken from varied sources and compiled.
Chances of possible errors persist.
Cyber Crime
• To disrupt or harm data or services, a cybercriminal targets a computer or a
network that connects it to other computers. Additionally, a cybercriminal could
spread viruses and other malware in order to obtain private and confidential data
for extortion and blackmail. Cybercrimes are committed with the goal to directly
or indirectly cause physical harm, financial loss, or mental harassment against an
individual, a group, an organisation, or even a country.
Compiled By - Nayan Chabri Information has been taken from varied sources and compiled.
Chances of possible errors persist.
Cyber Crime
• Hacking
• Unauthorized access to a computer, computer network, or other digital system is
known as hacking. Hackers frequently possess technical knowledge of both
software and hardware. They search for bugs that they can use to access the
system.
• Phishing and Fraud Emails
• Phishing is an illegal practise in which users are provided with false websites or
emails that appear genuine or original in order to illegally obtain sensitive and
personal information, including usernames, passwords, banking information, and
credit card numbers.
Compiled By - Nayan Chabri Information has been taken from varied sources and compiled.
Chances of possible errors persist.
Cyber Crime
• Identity Theft Identity thieves are increasingly leveraging personal data obtained
illegally from computers or computer networks to conduct fraud.
• Ransomware
• The attacker gains access to the computer in this case and prevents the user from
using it, typically by encrypting the data. When a ransom is not paid, the attacker
may threaten to disclose the victim’s private and sensitive information or photos
or use blackmail to force the victim to pay for access to the data.
Compiled By - Nayan Chabri Information has been taken from varied sources and compiled.
Chances of possible errors persist.
Cyber Crime
• Combatting and Preventing Cyber Crime
• With the dual strategy of being cautious and seeking legal assistance, the
difficulties of cybercrime can be reduced.
The following items can be thought of as safety precautions to lower the danger
of cybercrime:
• Take regular backup of important data
• Use an antivirus software and keep it updated always
• Avoid installing pirated software. Always download software from known and
secure (HTTPS) sites
Compiled By - Nayan Chabri Information has been taken from varied sources and compiled.
Chances of possible errors persist.
Cyber Crime
• Combatting and Preventing Cyber Crime
• Always update the system software which include the Internet browser and other
application software
• Do not visit or download anything from untrusted websites
• In most cases, the browser warns users about dubious websites whose security certificate
could not be confirmed; stay away from such sites.
• For web logins, use strong passwords, and change them frequently. Use a different
password for each website. Use a variety of alphanumeric character combinations,
including special characters. Don’t include common names or words in your password
• Don’t let your browser remember your password or auto-fill information when using
someone else’s computer, and attempt to browse in a private browser window.
Compiled By - Nayan Chabri Information has been taken from varied sources and compiled.
Chances of possible errors persist.
Indian Information Technology Act (IT Act)
• The Information Technology Act, 2000 (commonly known as the IT Act) of the
Government of India, as revised in 2008, offers instructions to the user on the
handling, storing, and transfer of sensitive data.
• There are cyber cells in police stations in various Indian states where one can
report any cybercrime. By recognising digital signatures and electronic records,
the legislation creates a legal framework for electronic government. The statute
describes cybercrimes and their associated consequences.
Compiled By - Nayan Chabri Information has been taken from varied sources and compiled.
Chances of possible errors persist.
Impact on Health
• We are spending more time in front of screens, whether on our phones, laptops,
desktop computers, televisions, gaming consoles, or music or sound equipment,
as digital technologies have permeated several industries. However, conversing
while hunched over might be detrimental to our health on both a physical and
mental level.
• The science of ergonomics is the design or arrangement of workplaces, including
the systems, furniture, and equipment, to make them safe and comfortable for
the user. We can lessen the burden on our bodies thanks to ergonomics,
including weariness and ailments brought on by continuous use.
Compiled By - Nayan Chabri Information has been taken from varied sources and compiled.
Chances of possible errors persist.
END OF TOPIC

More Related Content

Similar to Computer Science – societal impact.pptx

Ethics and safety measures in Computing
Ethics and safety measures in ComputingEthics and safety measures in Computing
Ethics and safety measures in ComputingAnkit Malviya
 
Legal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptxLegal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptxfatimagull32
 
NETIQUgggggggggggggggggggggyyyyETTE.pptx
NETIQUgggggggggggggggggggggyyyyETTE.pptxNETIQUgggggggggggggggggggggyyyyETTE.pptx
NETIQUgggggggggggggggggggggyyyyETTE.pptxCatherineBagaan
 
Society_law_and_ethics.pdf
Society_law_and_ethics.pdfSociety_law_and_ethics.pdf
Society_law_and_ethics.pdfManyaThakur12
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxRheamaeLiwan
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxJakeTorio1
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxEhraicaSaquing
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxDineLiwan
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxLiberty Aquino
 
Chp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxChp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxHarishParthasarathy4
 
INTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptxINTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptxBHUt6
 
CONCEPTS OF DIGITAL CITIZENSHIP AND DIGITAL CITIZEN TRAITS
CONCEPTS OF DIGITAL CITIZENSHIP AND DIGITAL CITIZEN TRAITSCONCEPTS OF DIGITAL CITIZENSHIP AND DIGITAL CITIZEN TRAITS
CONCEPTS OF DIGITAL CITIZENSHIP AND DIGITAL CITIZEN TRAITSMariaDelaCruz421438
 
[r]evolution Digital Literacy Workshop Slides
[r]evolution Digital Literacy Workshop Slides[r]evolution Digital Literacy Workshop Slides
[r]evolution Digital Literacy Workshop SlidesNathanielCarlson2
 
Computer ethics cyber security and technology of it
Computer ethics cyber security and technology of itComputer ethics cyber security and technology of it
Computer ethics cyber security and technology of itsr24production
 
Ethics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxEthics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxAarush59
 
Online-safety-security-ethics-and-etiquette.pdf
Online-safety-security-ethics-and-etiquette.pdfOnline-safety-security-ethics-and-etiquette.pdf
Online-safety-security-ethics-and-etiquette.pdfmarissaramos007
 

Similar to Computer Science – societal impact.pptx (20)

Ethics and safety measures in Computing
Ethics and safety measures in ComputingEthics and safety measures in Computing
Ethics and safety measures in Computing
 
Legal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptxLegal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptx
 
NETIQUgggggggggggggggggggggyyyyETTE.pptx
NETIQUgggggggggggggggggggggyyyyETTE.pptxNETIQUgggggggggggggggggggggyyyyETTE.pptx
NETIQUgggggggggggggggggggggyyyyETTE.pptx
 
Society_law_and_ethics.pdf
Society_law_and_ethics.pdfSociety_law_and_ethics.pdf
Society_law_and_ethics.pdf
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docx
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
REVIEWER ETECH
REVIEWER ETECHREVIEWER ETECH
REVIEWER ETECH
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docx
 
Empowerment Technology
Empowerment Technology Empowerment Technology
Empowerment Technology
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
Chp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxChp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptx
 
Cyber Safety ppt.pptx
Cyber Safety ppt.pptxCyber Safety ppt.pptx
Cyber Safety ppt.pptx
 
INTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptxINTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptx
 
CONCEPTS OF DIGITAL CITIZENSHIP AND DIGITAL CITIZEN TRAITS
CONCEPTS OF DIGITAL CITIZENSHIP AND DIGITAL CITIZEN TRAITSCONCEPTS OF DIGITAL CITIZENSHIP AND DIGITAL CITIZEN TRAITS
CONCEPTS OF DIGITAL CITIZENSHIP AND DIGITAL CITIZEN TRAITS
 
[r]evolution Digital Literacy Workshop Slides
[r]evolution Digital Literacy Workshop Slides[r]evolution Digital Literacy Workshop Slides
[r]evolution Digital Literacy Workshop Slides
 
Computer ethics cyber security and technology of it
Computer ethics cyber security and technology of itComputer ethics cyber security and technology of it
Computer ethics cyber security and technology of it
 
Ethics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxEthics and safety measures in computing.pptx
Ethics and safety measures in computing.pptx
 
Online-safety-security-ethics-and-etiquette.pdf
Online-safety-security-ethics-and-etiquette.pdfOnline-safety-security-ethics-and-etiquette.pdf
Online-safety-security-ethics-and-etiquette.pdf
 

Recently uploaded

_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxAnaBeatriceAblay2
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 

Recently uploaded (20)

TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 

Computer Science – societal impact.pptx

  • 1. Computer Science – Societal Impact Chapter 11
  • 2. DIGITAL FOOTPRINTS • The websites we visit, emails we send, any information we post online, etc., as well as the IP address, location, and other device-specific information of the computer this is known as digital footprint. or you can say data left behind by users after they utilise the internet is known as a digital footprint. • Example of digital footprint a. Search history b. Photos and Videos c. Like/ dislike in social media d. Browser history Compiled By - Nayan Chabri Information has been taken from varied sources and compiled. Chances of possible errors persist.
  • 3. DIGITAL FOOTPRINTS • We leave two different types of digital footprints. • Active digital footprint – data that we consciously submit online is included in our active digital footprints. This would include any emails we send, comments or postings we make on various websites or apps, etc. • Passive digital footprints – are the traces of data we unwittingly leave online. Included in this are the data produced when we access a website, utilise a mobile app, explore the internet, etc. Compiled By - Nayan Chabri Information has been taken from varied sources and compiled. Chances of possible errors persist.
  • 4. Digital Society and Netizen • A digital citizen, often known as a netizen, is someone who uses digital technology and the Internet. A good netizen uses digital technology in a safe, moral, and legal manner. Internet etiquette, communication etiquette, and social media etiquette must all be followed by a responsible netizen. • Net Etiquettes – When we engage with others, we adhere to specific social norms. Similar to this, we must act appropriately and politely when using the internet. While online, one should behave ethically, respectfully, and responsibly. Compiled By - Nayan Chabri Information has been taken from varied sources and compiled. Chances of possible errors persist.
  • 5. Digital Society and Netizen • Be Ethical No copyright violation – We should not use copyrighted materials without the permission of the creator or owner. Share the expertise – It is beneficial to share expertise and information online so that others can use it. However, we must be confident that we are sufficiently knowledgeable about a subject before sharing any information. • Be Respectful Respect privacy – As good digital citizens we have the right to privacy and the freedom of personal expression. At the same time, we have to understand that other digital citizens also have the same rights and freedoms. Respect diversity – in a group or public forum, we should respect the diversity of the people in terms of knowledge, experience, culture and other aspects. Compiled By - Nayan Chabri Information has been taken from varied sources and compiled. Chances of possible errors persist.
  • 6. Digital Society and Netizen • Be Responsible Avoid cyber bullying – We have to avoid insulting, degrading or intimidating online behaviour like repeated posting of rumours, giving threats online, posting the victim’s personal information or sexual harassment. We need to realise that bullying online can have very serious implications on the other person (victim). Don’t feed the troll – An Internet troll is someone who intentionally sows conflict online by provoking arguments, upsetting people, or by publishing controversial or irrelevant statements in online communities for fun. Compiled By - Nayan Chabri Information has been taken from varied sources and compiled. Chances of possible errors persist.
  • 7. Communication Etiquettes • Email, texting, instant messaging, cell phone conversations, audio and video conferencing, forum posting, social networking site posting, etc. are all examples of digital communication. All of them are great opportunities to interact with others and share information, ideas, and knowledge. • Be Precise Respect time – we should not waste precious time in responding to unnecessary emails or comments unless they have some relevance for us. Respect data limits – For concerns related to data and bandwidth, very large attachments may be avoided. Rather send compressed files or link. • Be Polite We should be polite and non-aggressive in our communication. We should avoid being abusive even if we don’t agree with others’ point of view. • Be Credible We should be cautious while making a comment, replying or writing an email or forum post as such acts decide our credibility over a period of time. Compiled By - Nayan Chabri Information has been taken from varied sources and compiled. Chances of possible errors persist.
  • 8. Social Media Etiquettes • We are familiar with several social networking platforms and may even have an account there. These websites enable users to submit or upload photographs of their ideas and experiences. It has started to influence how politics, business, entertainment, education, and other things turn out. There are certain social media etiquettes we must adhere to as well. Compiled By - Nayan Chabri Information has been taken from varied sources and compiled. Chances of possible errors persist.
  • 9. Social Media Etiquettes • Be Secure Choose password wisely – Users need to be aware of how to protect themselves and their accounts. Having a strong password that is updated periodically is the way to minimize the risk from hackers. Know who you befriend – We must take precautions while making friends with strangers because their motives may be dangerous and harmful. Beware of fake information – In social networks, fake posts, messages, and news are common. We should be aware of them as users. • Be Reliable Think before uploading – On social networks, almost anything can be uploaded. But keep in mind that once posted, the file remains on the remote server even if we delete it. Therefore, we must tread cautiously while transmitting or uploading private or sensitive files that could compromise our privacy. Compiled By - Nayan Chabri Information has been taken from varied sources and compiled. Chances of possible errors persist.
  • 10. Data Protection • Every nation in the globe has its unique data protection legislation (laws). These policies, which are formal legal papers, give the user instructions on how to handle, store, and transmit sensitive data. The goal of putting these policies into place is to guarantee that sensitive data is properly protected from change or disclosure. • Intellectual Property Right (IPR) - It is the inventor’s intellectual property if they come up with a novel idea. Intellectual property includes innovations, literary and artistic works, visual arts, names, and logos. The originator or intellectual property owner is the rightful proprietor of such concepts. Compiled By - Nayan Chabri Information has been taken from varied sources and compiled. Chances of possible errors persist.
  • 11. Data Protection • Copyright Copyright gives creators legal protection for their original works, including writing, photography, audio and video recordings, computer software, sculptures, architectural creations, and other types of creative output like literary and artistic works. Copyrights are automatically granted to creators and authors. • Patent Inventions are granted a patent. In opposed to copyright, the creator must submit an application (file) to patent the innovation. After receiving a patent, the owner gains the only authority to prohibit anyone from making, using, or selling the invention. • Trademark Any visual symbol, word, name, design, slogan, label, etc. that sets the brand or business apart from other brands or businesses is considered a trademark. Compiled By - Nayan Chabri Information has been taken from varied sources and compiled. Chances of possible errors persist.
  • 12. Violation of IPR • The following are some ways that intellectual property rights may be violated – • Plagiarism Text, images, and videos may all be easily copied or shared. Plagiarism is the process of representing the thoughts or works of another person as one’s own. Plagiarism is defined as the act of taking someone else’s work and using it without crediting the author name or source. • Copyright Infringement When we utilise someone else’s creative work without asking permission or, if the work is being sold, without paying for it, we are infringing their copyright. • Trademark Infringement Unauthorized use of another’s trademark on goods and services is known as trademark infringement. Anyone who violates a trademark registered to them may face legal action from the trademark owner. Compiled By - Nayan Chabri Information has been taken from varied sources and compiled. Chances of possible errors persist.
  • 13. Public Access and Open Source Software • Two well-known types of public licences are the GNU General Public License (GPL) and Creative Commons (CC). • Creative Common License – All types of creative works, including websites, music, movies, books, etc., use Creative Commons. CC makes it possible to distribute a copyrighted work freely. • General Public License – Another free software licence, the GNU GPL, allows users to run, study, share, and modify the software while also receiving frequent updates. Compiled By - Nayan Chabri Information has been taken from varied sources and compiled. Chances of possible errors persist.
  • 14. Cyber Crime • To disrupt or harm data or services, a cybercriminal targets a computer or a network that connects it to other computers. Additionally, a cybercriminal could spread viruses and other malware in order to obtain private and confidential data for extortion and blackmail. Cybercrimes are committed with the goal to directly or indirectly cause physical harm, financial loss, or mental harassment against an individual, a group, an organisation, or even a country. Compiled By - Nayan Chabri Information has been taken from varied sources and compiled. Chances of possible errors persist.
  • 15. Cyber Crime • Hacking • Unauthorized access to a computer, computer network, or other digital system is known as hacking. Hackers frequently possess technical knowledge of both software and hardware. They search for bugs that they can use to access the system. • Phishing and Fraud Emails • Phishing is an illegal practise in which users are provided with false websites or emails that appear genuine or original in order to illegally obtain sensitive and personal information, including usernames, passwords, banking information, and credit card numbers. Compiled By - Nayan Chabri Information has been taken from varied sources and compiled. Chances of possible errors persist.
  • 16. Cyber Crime • Identity Theft Identity thieves are increasingly leveraging personal data obtained illegally from computers or computer networks to conduct fraud. • Ransomware • The attacker gains access to the computer in this case and prevents the user from using it, typically by encrypting the data. When a ransom is not paid, the attacker may threaten to disclose the victim’s private and sensitive information or photos or use blackmail to force the victim to pay for access to the data. Compiled By - Nayan Chabri Information has been taken from varied sources and compiled. Chances of possible errors persist.
  • 17. Cyber Crime • Combatting and Preventing Cyber Crime • With the dual strategy of being cautious and seeking legal assistance, the difficulties of cybercrime can be reduced. The following items can be thought of as safety precautions to lower the danger of cybercrime: • Take regular backup of important data • Use an antivirus software and keep it updated always • Avoid installing pirated software. Always download software from known and secure (HTTPS) sites Compiled By - Nayan Chabri Information has been taken from varied sources and compiled. Chances of possible errors persist.
  • 18. Cyber Crime • Combatting and Preventing Cyber Crime • Always update the system software which include the Internet browser and other application software • Do not visit or download anything from untrusted websites • In most cases, the browser warns users about dubious websites whose security certificate could not be confirmed; stay away from such sites. • For web logins, use strong passwords, and change them frequently. Use a different password for each website. Use a variety of alphanumeric character combinations, including special characters. Don’t include common names or words in your password • Don’t let your browser remember your password or auto-fill information when using someone else’s computer, and attempt to browse in a private browser window. Compiled By - Nayan Chabri Information has been taken from varied sources and compiled. Chances of possible errors persist.
  • 19. Indian Information Technology Act (IT Act) • The Information Technology Act, 2000 (commonly known as the IT Act) of the Government of India, as revised in 2008, offers instructions to the user on the handling, storing, and transfer of sensitive data. • There are cyber cells in police stations in various Indian states where one can report any cybercrime. By recognising digital signatures and electronic records, the legislation creates a legal framework for electronic government. The statute describes cybercrimes and their associated consequences. Compiled By - Nayan Chabri Information has been taken from varied sources and compiled. Chances of possible errors persist.
  • 20. Impact on Health • We are spending more time in front of screens, whether on our phones, laptops, desktop computers, televisions, gaming consoles, or music or sound equipment, as digital technologies have permeated several industries. However, conversing while hunched over might be detrimental to our health on both a physical and mental level. • The science of ergonomics is the design or arrangement of workplaces, including the systems, furniture, and equipment, to make them safe and comfortable for the user. We can lessen the burden on our bodies thanks to ergonomics, including weariness and ailments brought on by continuous use. Compiled By - Nayan Chabri Information has been taken from varied sources and compiled. Chances of possible errors persist.