SlideShare a Scribd company logo
1 of 20
LEGAL AND SOCIAL IMPACTS ON ICT
QUALITY OF ONLINE INFORMATION
• Anyone can post information on
the Internet.
• Unlike text books or other
published documents that are
thoroughly reviewed before
becoming public, a web page has
no formal evaluation before being
uploaded into the public domain.
PRIMARY SOURCE OF INFORMATION
• Primary sources are the materials
on a topic upon which
interpretations or studies are
based. Anything that is first hand
knowledge is considered a primary
source.
• For example if researching for new
Apple products, you could go
directly to the primary source – the
official Apple website –
www.apple.com, rather than
viewing a fan club page on any site
like Facebook.
SECONDARY SOURCE OF INFORMATION
• Secondary Source, on the other hand,
offer an analysis or a summary of
primary sources. They often attempt
to describe or explain primary sources.
• Examples of secondary sources
include: dictionaries, encyclopedias,
textbooks, and books or articles that
interpret or review research works, fan
club websites, unofficial websites.
COMPARE PRIMARY AND SECONDARY SOURCES:
Primary source Secondary source
Art Original artwork A picture in a digital museum
Literature Poem Article on a particular type of poetry
Theatre Videotape of a performance Biography of a playwright
Celebrity Official website sponsored by celebrity Fan club site
Product Corporate website Review about the product
ASSESS THE QUALITY OF INFORMATION
Any type of information, be it electronic like on the internet or in
print such as a magazine or a book, it is always important to
consider the source. The following is the list of criteria to be used
when viewing any information on the Internet:
• Who is the author?
• Why is this information available?
• What information is being shared?
• What is your Overall impression?
COPYRIGHT AND PLAGIARISM ©
• Accessing online information is a great way for research. However,
before “taking” what you want form various web pages you must first
understand intellectual copyright. If not, you could unintentionally
commit a crime.
• Copyright is the right of the owner or creator of art work, music,
literature, video, or software to determine who can use the material
and how can they use it.
• The copyright symbol © appears on a web page with the date and
name of the owner; such as © 2012, Technokids. When you see this
symbol you can be almost certain that you cannot use the material on
your own web page.
WHAT IS FAIR USE?
• Copyrighted material which can be used without obtaining
permission from owner is Fair Use.
• The idea behind fair use is that you can use the material if it is for
non-profit educational purposes or will not harm the owner of
the copyright in any form.
• However, to be safe it is best to obtain permission before using
any material that is copyrighted protected.
RULES FOR INTERNET SAFETY
• Use good judgment when viewing online content.
• Do not purposefully seek out inappropriate content.
• If uncertain about online content talk to elders immediately.
• Do not share your private data such as credit information, pictures,
phone numbers, address etc., to persons you meet on the
Internet.
• Never arrange to visit someone that you meet online without the
consent of your elders.
USING INTERNET TO FIND INFORMATION
Advantages Disadvantage
There is vast amount of information There can be too much information
Information can be found quickly compared with
manually searching a library book.
It is difficult to decide if information is useful,
accurate, out of date or false.
There is information on almost every topic.
Some information may be inappropriate for reading
or viewing.
QUALITY OF LIFE FOR DISABLED PEOPLE
The quality of life for disabled people can be enhanced by using specialized hardware and
software.
Hardware Device Use
Foot Mouse
In place of a normal mouse for people who cannot use
their arms or hands.
Braille Keyboard
By visually impaired people to type data into a
computer.
Head Pointer
To tap keys on a keyboard for people who cannot use
their limbs.
SPECIAL SOFTWARE
1. Zoom Features or Special
Software enlarges parts of the
screen so it can be seen clearly.
2. Speech-to-text software turns
spoken words into commands
and Text-to-speech software
turns written words into spoken
words.
HEALTH IMPACT OF ICT
REPETITIVE STRAIN INJURY (RSI)
• A range of conditions affecting the muscles and
joints in neck, shoulders, arms, wrists and hands.
• Occurs when the same muscle groups perform
the same actions over and over again, such as
constantly keying data using keyboard.
How to minimize RSI?
• Take regular breaks.
• Use and ergonomically designed keyboard and
mouse.
EYESTRAIN
• Headaches, blurred vision and deterioration in
eyesight
How to minimize RSI?
• Use an anti-glare screen.
• Use screen with adjustable brightness and
contrast.
• Have regular eye tests.
BACK PAIN
• Discomfort leading to back pain.
• Can be related to sitting position at the
computer.
How to minimize RSI?
• Take regular breaks.
• Use an adjustable chair with height and backrest
adjustment.
• Don’t sit continuously for long time.
RADIATION
• Computer screens can give out extremely low
frequency radiation.
• Illness may occur if the user works for long
periods in front of screen.
How to minimize RSI?
• Take regular breaks.
• Use anti-glare filters.
• Use a low-emission screen.
COMPUTER MISUSE ACT
• This law deals with problems involving hacking, viruses and other
problems by making them illegal.
Unauthorized
Work
Deliberate
data
destruction
Fraud Data theft
Hacking
Installing
Viruses
Program theft
(Software Piracy)
HACKING
• People involved in digital crimes are
known as hackers. They
intentionally access computer
Systems without consent or
authorization.
• Hacking can happen remotely
through the Internet.
• Hacking can involve the ‘Planting of
a virus’
COMPUTER VIRUS
• A virus is a piece of software designed to
disrupt the normal operation of a computer.
• Virus can be attached to an e-mail and
activated when the e-mail is opened.
• Some virus can destroy files, others display
annoying message while some store
themselves as hidden files on your computer.
• Spyware is a program that install itself
automatically and collect personal date
without user’s consent.
ENVIRONMENTAL CONCERN IN USING ICT
• Power Management
• Allow computers to go into hibernate or sleep mode if they are not being used or use screen
saver to reduce power consumption.
• Peripheral Usage
• Purchase energy saving devices.
• Purchase multi-function devices such as all-in-one printer.
• Printer Usage
• Print only if its necessary.
• Optimize printer controls such as double sided printing.
• Obsolete Equipment
• Recycle your unused Hardware.

More Related Content

What's hot (20)

Computer Networking
Computer NetworkingComputer Networking
Computer Networking
 
Network Slides
Network SlidesNetwork Slides
Network Slides
 
Diagnostic Software Tools.pptx
Diagnostic Software Tools.pptxDiagnostic Software Tools.pptx
Diagnostic Software Tools.pptx
 
slideshow about windows xp and features
slideshow about windows xp and featuresslideshow about windows xp and features
slideshow about windows xp and features
 
Network basics
Network basicsNetwork basics
Network basics
 
Computer networks grade 7
Computer networks grade 7Computer networks grade 7
Computer networks grade 7
 
HDD Partition
HDD PartitionHDD Partition
HDD Partition
 
Computer Network
Computer NetworkComputer Network
Computer Network
 
How the-internet-works
How the-internet-worksHow the-internet-works
How the-internet-works
 
Getting started
Getting startedGetting started
Getting started
 
Connecting to the Internet
Connecting to the InternetConnecting to the Internet
Connecting to the Internet
 
Basic Computer Troubleshooting
Basic Computer TroubleshootingBasic Computer Troubleshooting
Basic Computer Troubleshooting
 
Networks topologies Lec#2
Networks topologies Lec#2Networks topologies Lec#2
Networks topologies Lec#2
 
Types of Computer Network
Types of Computer NetworkTypes of Computer Network
Types of Computer Network
 
iGCSE networks
iGCSE networksiGCSE networks
iGCSE networks
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
 
Operating system notes pdf
Operating system notes pdfOperating system notes pdf
Operating system notes pdf
 
Router
RouterRouter
Router
 
Virus and Worms
Virus and WormsVirus and Worms
Virus and Worms
 
Bios ( Basic Input Output System )
Bios ( Basic Input Output System )Bios ( Basic Input Output System )
Bios ( Basic Input Output System )
 

Similar to Legal and social impacts on ICT

L2 COMPUTER ETHICS PPT [Autosaved].pptx
L2 COMPUTER  ETHICS  PPT [Autosaved].pptxL2 COMPUTER  ETHICS  PPT [Autosaved].pptx
L2 COMPUTER ETHICS PPT [Autosaved].pptxJoshCasas1
 
Module 1 content EN.pptx
Module 1 content EN.pptxModule 1 content EN.pptx
Module 1 content EN.pptxITStudy Ltd.
 
2. ETECH Module 2 - Internet Safety and Security.pptx
2. ETECH Module 2 - Internet Safety and Security.pptx2. ETECH Module 2 - Internet Safety and Security.pptx
2. ETECH Module 2 - Internet Safety and Security.pptxKarmel7
 
Cyber Security.pptx
Cyber Security.pptxCyber Security.pptx
Cyber Security.pptxsaththiyans1
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxRheamaeLiwan
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxJakeTorio1
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxEhraicaSaquing
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxDineLiwan
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxLiberty Aquino
 
Its Not Your Parents’ Internet Jay
Its Not Your Parents’ Internet JayIts Not Your Parents’ Internet Jay
Its Not Your Parents’ Internet Jayjstaker
 
Computer Science – societal impact.pptx
Computer Science – societal impact.pptxComputer Science – societal impact.pptx
Computer Science – societal impact.pptxNano894860
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersStephen Thomas, CISSP
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersStephen Thomas, CISSP
 
empowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationempowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationSheryldeVilla2
 
Copyright Crash Course 6340.60
Copyright Crash Course 6340.60Copyright Crash Course 6340.60
Copyright Crash Course 6340.60ylflores
 

Similar to Legal and social impacts on ICT (20)

L2 COMPUTER ETHICS PPT [Autosaved].pptx
L2 COMPUTER  ETHICS  PPT [Autosaved].pptxL2 COMPUTER  ETHICS  PPT [Autosaved].pptx
L2 COMPUTER ETHICS PPT [Autosaved].pptx
 
Online ethics
Online ethicsOnline ethics
Online ethics
 
Module 1 content EN.pptx
Module 1 content EN.pptxModule 1 content EN.pptx
Module 1 content EN.pptx
 
2. ETECH Module 2 - Internet Safety and Security.pptx
2. ETECH Module 2 - Internet Safety and Security.pptx2. ETECH Module 2 - Internet Safety and Security.pptx
2. ETECH Module 2 - Internet Safety and Security.pptx
 
Cyber Security.pptx
Cyber Security.pptxCyber Security.pptx
Cyber Security.pptx
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docx
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
REVIEWER ETECH
REVIEWER ETECHREVIEWER ETECH
REVIEWER ETECH
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docx
 
Empowerment Technology
Empowerment Technology Empowerment Technology
Empowerment Technology
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
Introduction to the Internet
Introduction to the InternetIntroduction to the Internet
Introduction to the Internet
 
Its Not Your Parents’ Internet Jay
Its Not Your Parents’ Internet JayIts Not Your Parents’ Internet Jay
Its Not Your Parents’ Internet Jay
 
Computer Science – societal impact.pptx
Computer Science – societal impact.pptxComputer Science – societal impact.pptx
Computer Science – societal impact.pptx
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th Graders
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th Graders
 
empowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationempowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentation
 
Copyright Crash Course 6340.60
Copyright Crash Course 6340.60Copyright Crash Course 6340.60
Copyright Crash Course 6340.60
 

More from Middle East International School (17)

Networking
NetworkingNetworking
Networking
 
Web terminology
Web terminologyWeb terminology
Web terminology
 
Computer hardware
Computer hardwareComputer hardware
Computer hardware
 
Network topology
Network topologyNetwork topology
Network topology
 
Computer networks
Computer networksComputer networks
Computer networks
 
Impact of computers on society
Impact of computers on societyImpact of computers on society
Impact of computers on society
 
Input output devices
Input  output devicesInput  output devices
Input output devices
 
Information system
Information systemInformation system
Information system
 
Computer fundamentals
Computer fundamentalsComputer fundamentals
Computer fundamentals
 
Windows environment
Windows environmentWindows environment
Windows environment
 
The windows hierarchy
The windows hierarchyThe windows hierarchy
The windows hierarchy
 
Software
SoftwareSoftware
Software
 
Smart phones and tablets
Smart phones and tabletsSmart phones and tablets
Smart phones and tablets
 
Computer ethics and crime
Computer ethics and crimeComputer ethics and crime
Computer ethics and crime
 
More about the internet
More about the internetMore about the internet
More about the internet
 
Introduction to e commerce
Introduction to e   commerceIntroduction to e   commerce
Introduction to e commerce
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 

Recently uploaded

How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 

Recently uploaded (20)

How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 

Legal and social impacts on ICT

  • 1. LEGAL AND SOCIAL IMPACTS ON ICT
  • 2. QUALITY OF ONLINE INFORMATION • Anyone can post information on the Internet. • Unlike text books or other published documents that are thoroughly reviewed before becoming public, a web page has no formal evaluation before being uploaded into the public domain.
  • 3. PRIMARY SOURCE OF INFORMATION • Primary sources are the materials on a topic upon which interpretations or studies are based. Anything that is first hand knowledge is considered a primary source. • For example if researching for new Apple products, you could go directly to the primary source – the official Apple website – www.apple.com, rather than viewing a fan club page on any site like Facebook.
  • 4. SECONDARY SOURCE OF INFORMATION • Secondary Source, on the other hand, offer an analysis or a summary of primary sources. They often attempt to describe or explain primary sources. • Examples of secondary sources include: dictionaries, encyclopedias, textbooks, and books or articles that interpret or review research works, fan club websites, unofficial websites.
  • 5. COMPARE PRIMARY AND SECONDARY SOURCES: Primary source Secondary source Art Original artwork A picture in a digital museum Literature Poem Article on a particular type of poetry Theatre Videotape of a performance Biography of a playwright Celebrity Official website sponsored by celebrity Fan club site Product Corporate website Review about the product
  • 6. ASSESS THE QUALITY OF INFORMATION Any type of information, be it electronic like on the internet or in print such as a magazine or a book, it is always important to consider the source. The following is the list of criteria to be used when viewing any information on the Internet: • Who is the author? • Why is this information available? • What information is being shared? • What is your Overall impression?
  • 7. COPYRIGHT AND PLAGIARISM © • Accessing online information is a great way for research. However, before “taking” what you want form various web pages you must first understand intellectual copyright. If not, you could unintentionally commit a crime. • Copyright is the right of the owner or creator of art work, music, literature, video, or software to determine who can use the material and how can they use it. • The copyright symbol © appears on a web page with the date and name of the owner; such as © 2012, Technokids. When you see this symbol you can be almost certain that you cannot use the material on your own web page.
  • 8. WHAT IS FAIR USE? • Copyrighted material which can be used without obtaining permission from owner is Fair Use. • The idea behind fair use is that you can use the material if it is for non-profit educational purposes or will not harm the owner of the copyright in any form. • However, to be safe it is best to obtain permission before using any material that is copyrighted protected.
  • 9. RULES FOR INTERNET SAFETY • Use good judgment when viewing online content. • Do not purposefully seek out inappropriate content. • If uncertain about online content talk to elders immediately. • Do not share your private data such as credit information, pictures, phone numbers, address etc., to persons you meet on the Internet. • Never arrange to visit someone that you meet online without the consent of your elders.
  • 10. USING INTERNET TO FIND INFORMATION Advantages Disadvantage There is vast amount of information There can be too much information Information can be found quickly compared with manually searching a library book. It is difficult to decide if information is useful, accurate, out of date or false. There is information on almost every topic. Some information may be inappropriate for reading or viewing.
  • 11. QUALITY OF LIFE FOR DISABLED PEOPLE The quality of life for disabled people can be enhanced by using specialized hardware and software. Hardware Device Use Foot Mouse In place of a normal mouse for people who cannot use their arms or hands. Braille Keyboard By visually impaired people to type data into a computer. Head Pointer To tap keys on a keyboard for people who cannot use their limbs.
  • 12. SPECIAL SOFTWARE 1. Zoom Features or Special Software enlarges parts of the screen so it can be seen clearly. 2. Speech-to-text software turns spoken words into commands and Text-to-speech software turns written words into spoken words.
  • 13. HEALTH IMPACT OF ICT REPETITIVE STRAIN INJURY (RSI) • A range of conditions affecting the muscles and joints in neck, shoulders, arms, wrists and hands. • Occurs when the same muscle groups perform the same actions over and over again, such as constantly keying data using keyboard. How to minimize RSI? • Take regular breaks. • Use and ergonomically designed keyboard and mouse.
  • 14. EYESTRAIN • Headaches, blurred vision and deterioration in eyesight How to minimize RSI? • Use an anti-glare screen. • Use screen with adjustable brightness and contrast. • Have regular eye tests.
  • 15. BACK PAIN • Discomfort leading to back pain. • Can be related to sitting position at the computer. How to minimize RSI? • Take regular breaks. • Use an adjustable chair with height and backrest adjustment. • Don’t sit continuously for long time.
  • 16. RADIATION • Computer screens can give out extremely low frequency radiation. • Illness may occur if the user works for long periods in front of screen. How to minimize RSI? • Take regular breaks. • Use anti-glare filters. • Use a low-emission screen.
  • 17. COMPUTER MISUSE ACT • This law deals with problems involving hacking, viruses and other problems by making them illegal. Unauthorized Work Deliberate data destruction Fraud Data theft Hacking Installing Viruses Program theft (Software Piracy)
  • 18. HACKING • People involved in digital crimes are known as hackers. They intentionally access computer Systems without consent or authorization. • Hacking can happen remotely through the Internet. • Hacking can involve the ‘Planting of a virus’
  • 19. COMPUTER VIRUS • A virus is a piece of software designed to disrupt the normal operation of a computer. • Virus can be attached to an e-mail and activated when the e-mail is opened. • Some virus can destroy files, others display annoying message while some store themselves as hidden files on your computer. • Spyware is a program that install itself automatically and collect personal date without user’s consent.
  • 20. ENVIRONMENTAL CONCERN IN USING ICT • Power Management • Allow computers to go into hibernate or sleep mode if they are not being used or use screen saver to reduce power consumption. • Peripheral Usage • Purchase energy saving devices. • Purchase multi-function devices such as all-in-one printer. • Printer Usage • Print only if its necessary. • Optimize printer controls such as double sided printing. • Obsolete Equipment • Recycle your unused Hardware.