In this blog we will learn about following
- ICT and computer ethics
- Digital citizenship and footprint
- IT policy of Nepal 2072
- Electronic Transaction Act 2063
- opportunities and threats in Social Media
ICT refers to technologies that provide access to information through telecommunication which used various digital technologies to process raw data data into digital format. ICT has created world a "global village" in which people can communicate with other across the world as if they are physically siting next to one another.
Computer ethics is set of moral principle or code of conducts that we need follow while we are using computer systematically without making harm to other users. It deals with procedures, values and practices that controls the process of consuming/using computer technology without damaging or violating the moral value.
10 commandments of computer ethics are as follows:
Digital Citizenship
in simple word A digital citizen is a person utilizing information technology (IT) in order to
engage in society, politics, and government .Digital citizenship refers to responsible use of technology by anyone who use computer, internet or any digital device to engage with society or any level. Now a days internet is widely used technology that is very advance and the whole world is being more dependent on the internet for day to day activities. Now a days we use internet for taking our online class, for checking bank account, purchasing a product, or simply keeping in touch. We can also connect with each other through social media. We
act as digital citizens.
Advantage of digital citizenship
- keeps you connect
- you can express yourself
- Quick communication
- people can share ideas
- Brings people with the same interests together
- Enhance the learning experience by allowing students to communication
Digital citizenship is composed of different elements. Following are the elements of digital citizenship.:
- Digital Access: access to technology and online resource
- Digital Commerce: The act of promoting the purchase of goods through electronic means
- Digital Communication and collaboration: Electronic exchange of information
- Digital literacy: Teaching and learning about technology digital citizen are technically sound
- Digital Etiquette: behaving with good behavior or ethics in society electronically
- Digital Fluency: process of understanding technology and its use
- Digital Health: The solution to health problems using digital technology
- Digital Law: Act, rules and regulations required for performing electrical work or electronic responsibility for action and deeds along with the creating of rules and policy that address issues related to the online world
- Digital right and responsibilities: set of right of digital citizens to have privacy and speech
- Digital security and Privacy: is electronic precaution to guarantee safety. digital citizen should be safe by practicing . Safety measure like password, virus protection and backup data should be done by digital citizen
Digital Footprint
Digital Footprint means the recording of interaction with the digital world. We leave
behind the Digital Footprint trail using online technology.
These include digital cameras, i-pods, smartphones, laptops
and computers. Therefore, a digital footprint is like an
invisible report card which is stored for many years. This
gives a general reflection of our online activity. Digital
Footprints can be used for both good and bad purpose.
The
following should be considered when managing Digital
Footprint:
- Subscribed accounts and unused social media accounts which are no longer in use should be unsubscribed or deleted.
- Ensure the content posted protect your privacy.
- Not to forget that online posts are private.
- To note that parents, teachers and other people can view the content posted.
- Ensure the content posted does not damage yours or others reputation.
advantage of digital footprint:
- Fraud or legal issues can more easily be detected
- Personalization(like suggested products or related advertising) serves to add value to our use of internet
- companies can easily offer incentives based on interest and needs
some disadvantage of digital footprint
- personal data can be used to generate revenue with out knowledge
- can be annoying and distracting because of internet
- Purchase behavior data may be used as a basis to reduce credit limits or increase interest rate
There may be few advantage of digital footprint but in future it is going to play very crucial role in serving right content to web user and it will help online web service providers to understand their clients and serve accordingly
Cyberbullying
Bullying is unwanted, aggressive behavior among school aged children that involves a real or perceived power imbalance. It has bad consequences. Kids who are bullied can experience negative physical, social, emotional, academic, and mental health issues. kids who bully other can also engage in violent and other risky behaviors into adulthood. Kids who bully are more likely to Abuse alcohol and other drugs, criminals activities and different bad activities.
Cyber bullying is bullying that takes place over digital devices like cell phones,
computers, and tablets. Cyberbullying can occur through SMS, Text, and apps, or
online in social media, forums, or gaming
where people can view, participate in, or share
content. Cyberbullying includes sending,
posting, or sharing negative, harmful, false,
or mean content about someone else. It can
include sharing personal or private information
about someone else causing embarrassment or humiliation. Some cyberbullying crosses
the line into unlawful or criminal behavior.
The most common places where cyberbullying occurs are:
- Social Media, such as Facebook, Instagram, Snap Chat, and Twitter
- SMS (Short Message Service) also known as Text Message sent through cell phone
- Instant Message (via devices, email provider services, apps, and social media messaging features)
- Email Examples of cyberbullying:
- Sending rude emails, texts or instant messages online or on the phone
- Being excluded from online groups or forums
- Offensive chat on online gaming
- Posting hurtful things about someone on social media
- Spreading rumours or gossip about someone online
- Making fun of someone in an online chat that includes multiple people
- Attacking or killing an avatar or character in an online game, constantly and on purpose
- Pretending to be another person by creating a fake online profile
- Threatening or intimidating someone online or in a text message
- Taking an embarrassing photo or video and sharing it without permission
Cyber Law
With the development of the internet, the access of people in
the computers worldwide has increased. It has provided many new opportunities. But along with these new opportunities, there were people trying to take advantage of these
developments to harm others. That is the reason cyber law is required. A law should be considered as a tool to punish the wrongdoers. Absence of proper law makes difficulty
for the authorities to regulate and control the activities.
The legal issues related to using of inter-networked information
technology. Cyber law is a term that encapsulates the legal issues related to the use
of communicative, transactional, and distributive aspects of networked information
devices and technologies. Cyber law is not one law but it is a set of different laws meant to control and regularize
the activities taking place in the cyberspace. (Cyberspace is the virtual environment
created by the Internet and devices and services related to the Internet.) Some leading
topics of cyber law include hacking, intellectual property theft, credit card cloning,
phishing, cyberbullying, privacy issue; freedom of expression, jurisdiction and the list
goes on and on. To regulate the crime in this dimension of our life, governments come
up with “Cyber Law.”
ICT Policy 2072
Information technology (IT) is the use of any computers, storage, networking and other physical devices, infrastructure to create, process, store, secure and exchange all forms of electronic data. IT includes several layers of physical equipment (hardware), virtualization and management or automation tools, operating systems and applications (software) used to perform essential functions such as laptops, smartphones etc. Combination of information technology and telecommunication technology is called information communication technology (ICT). The government of Nepal revised the former policy and came up with the Information Communication Policy 2072 (2015) intending to regulate Information Communication Technology as a whole. This policy emphasizes the need for a precise and consistent enactment and regulatory framework for addressing converged regime of telecommunications, broadcasting and ICT. The use of ICT can make the government more efficient and effective, facilitate more accessible government services, allow greater public access to information, and make government more accountable. It is the most cost-effective tool in improving public service delivery and government to government (G2G) communication.
This policy is primarily designed to guide and mainstream the use of ICTs in all sectors
of the Nepalese economy within the overall context of socio-economic development
and poverty reduction agenda pursued by the country. The policy states that appropriate
programs will be developed and implemented to improve following sectors like
education, agriculture, health, research and development, industry, promotion of
e-Commerce, tourism, cloud computing, telecommunication and so on through the
use of ICTs.
The followings are the few goals the policy envisages to achieve:
- Enhancement of overall national ICT readiness with the objective of being at least in the top second quartile of the international ICT development index and e-Government rankings by 2020
- 75 % of the population to have digital literacy skills by the end of 2020
- Universal broadband access to all people on an equitable basis to be in place. By 2020, 90 percent of the population to have access to broadband services
- The role and significance of ICT industries and services (including telecom services) to increase in the Nepali economy with ICT value added (including digital content and service industry) accounting for at least 7.5% of GDP by 2020
- Apex level institutional arrangement to be restructured to effectively drive ICT agenda in the country in the light of emerging technologies and application trends shaping the sector
- By 2020, entire population of Nepal to have access to Internet
- 80% of all citizens facing government services to be offered online by 2020
- e-Procurement to be promoted as means of driving transparency through government procurement processes covering all public procurement of goods and services irrespective of cost and volume of such procurements by 2018
- G2G implementation to be promoted with a view to achieve complete automation of the operations of land administration, revenue administration and management, vital registration, passport and citizenship certificate services by 2020
click here to know about IT policy easily and briefly
Electronic Transaction Act(ETA)
Electronic Transaction Act (ETA) deals
with issues related to cybercrime and also
help in making and implementing laws
over cybercrime. It has made different
requirements so that if anyone found
committing cybercrime, he/she will be
punished according to the nature of the crime.
The legal provisions for authentication and regularization of the recognition, validity,
integrity and reliability of generation, production, processing, storage, communication
and transmission system of electronic records by making the transactions to be
carried out by means of electronic data exchange or by any other means of electronic
communications, reliable and secured and for controlling the acts of unauthorized use
of electronic records or of making alteration in such records through the illegal manner
ETA has been enacted to regulate electronic business.
The house of representative (HoR) of the government of Nepal approved the electronic
transaction act- 2063 on Manghir 18, 2063 (December 4, 2006) and the era of electronic
transaction is started in Nepal.
Cyber law of Nepal is commonly known as Electronic Transaction and Digital signature Act. First cyber law was established in 30th Bhadra 2061 BS (15th September 2004AD).
The cyber law in Nepal was formulated after making a thorough discussion of the IT Acts already implemented in other countries.
It contains strong provision of punishment against cyber crimes according to the nature of crime. The different crime mentioned in the law include hacking, damage to computer source code, breach of privacy and faking digital signatures. As per the provision of law government is fully authorized to punished cyber criminals - both an individual or an institution with imprisonment are fine
offences of ETA
- provide punishment for cyber offenders with 5 years of imprisonment or fine up to 50000 rs . Punishments depends upon severity of crime.
- provides provision of an appellate judicial body to listen to complaints, cases and cyber related crime
- provides punishment to hacker who
- download , copies or extract data from database without permission of owner
- introduce computer virus into any computer or computer network
- Damage programs or data residing in a computer or network or illegally copies them
- Disrupts a computer or network
- Provides legal status for various banking transactions through electronic media, which will be instrumental in boosting economic activities throughout the world via internet
Opportunities and Threats in Social Media
Social media is a process of performing a variety of tech-enabled activities via
virtual communities and network. It plays a vital role in changing the way of people
communicate and keep in touch. Social media includes activities such as photo sharing,
blogging, social networks, video sharing, business networks, virtual worlds, etc. It
also provides a platform to build career opportunities and share the thoughts, feelings, insight and emotions. Social media is an important approach to digital marketing. It is
an indispensable tool for business. Even governments and politicians use social media
to engage with constituents and voters. Social media is continuously evolving with all
marketing channels. It is providing tremendous opportunities for various brands to reach
their customers.
Some of the opportunities and benefits of social media are as follows:
i. Brand Development
Branding is an important stage in any business that focuses on long-term business.
Social media is a spectacular tool to grow a business. It allows customers to connect
and interact with the business on a more personal level.
ii. Target Audience
Social media is one of the effective platforms to reach the target audience. For example,
83% of social advertisers get connected to Instagram in order to attract a younger
audience whereas 80% of social media leads come from LinkedIn.
iii. Customer Interaction
Social media makes easy for brands to share the contents. It provides an easy platform
to respond questions and feedbacks.
iv. Attracting Customer
Social media can be a good way of attracting new customers. The customers can be
attracted with various promotional or giveaway posts. Once you have a good following
you can focus on more personalized social media campaign to encourage them to stay.
v. Research
Social media helps to understand social consumers or market trends. Simply logging on
to it you can see what your competitors are doing or finding out what your customers
are saying about your brand may be a valuable exercise.
Social Media Threats
i. Unethical Social Engineering
One of the biggest threats of social media is social engineering. It allows attackers to find personal information that can be used to target specific individuals.
ii. Targeted Phishing Attacks
These attacks are carried out to steal money or certain confidential information. Targeted
Phishing attacks are frequently successful as they focus on the organization's weakest
point "Employee".
iii. Fake Accounts
In July 2010, a fake profile named Robin Sage was made to request connections to
random people, which most of them accepted without knowing who the woman was.
The seriousness of such social media threats are underscored and is considered that
the fake account, in this case, was successful in connecting thousands of peoples from
various different fields.
iv. Social Media used for spreading spam and malware
Certain users in social media are found sharing malicious contents. They create unwanted
spam and are shared through chat, comments and more. The spam and malicious contents
can appear in many forms such as bulk messages, hate speech, fake friends and many
more
Comments
Post a Comment