SPIT Manual
SPIT Manual
Unit 1
History of Computing
What is computing?
Computing is any goal-oriented activity requiring, benefiting from, or creating computers.
Computing includes designing, developing and building hardware and software systems;
designing a mathematical sequence of steps known as an algorithm; processing, structuring,
and managing various kinds of information; doing scientific research on and with computers;
making computer systems behave intelligently; and creating and using communications and
entertainment media. The field of computing includes computer engineering, software
engineering, computer science, information systems, and information technology.
What is Computation?
Computation is any type of calculation that includes both arithmetical and non-arithmetical
steps and follows a well-defined model, for example an algorithm.
1.1 Prehistory of computing
Before 1935, a computer was a person who performed arithmetic calculations. Between 1935
and 1945 the definition referred to a machine, rather than a person. The modern machine
definition is based on von Neumann's concepts: a device that accepts input, processes data,
stores data, and produces output. We have gone from the vacuum tube to the transistor, to the
microchip. Then the microchip started talking to the modem. Now we exchange text, sound,
photos and movies in a digital environment.
14th century - Abacus - an instrument for performing calculations by sliding counters along
rods or in grooves.
17th century - Slide rule - a manual device used for calculation that consists in its simple
form of a ruler and a movable middle piece which are graduated with similar logarithmic
scales.
1642 -Pascaline- a mechanical calculator built by Blaise Pascal, a 17th century
mathematician, for whom the Pascal computer programming language was named .
1804 - Jacquard loom - a loom programmed with punched cards invented by Joseph Marie
Jacquard.
1937 Atanasoff–Berry computer design was the first digital electronic computer (though not
programmable).
And Now!!
1.2 History of computer hardware
It covers the developments from early simple devices to aid calculation to modern day
computers
Computing hardware
Compiled By: 1. Trailokya Raj Ojha, Assistant Professror, Nepal Engineering College (nec)
1 2. Ishwor Pokhrel, Assistant Professor, Nepal Engineering College (nec)
Course Manual on: Social and Professional Issues in IT (SPIT)
Before the 20th century, most calculations were done by humans. Early mechanical tools to
help humans with digital calculations, such as the abacus, were called "calculating
machines", called by proprietary names, or referred to as calculators. The machine operator
was called the computer.
Early devices
1. Ancient Era
Devices have been used to aid computation for thousands of years, mostly using one-to-one
correspondence with fingers. The earliest counting device was probably a form of tally stick.
Later record keeping aids throughout the Fertile Crescent included calculi (clay spheres,
cones, etc.) which represented counts of items, probably livestock or grains, sealed in hollow
unbaked clay containers. The use of counting rods is one example. The abacus was early used
for arithmetic tasks. What we now call the Roman abacus was used in Babylonia as early as
c. 2700–2300 BC. Since then, many other forms of reckoning boards or tables have been
invented. In a medieval European counting house, a cloth would be placed on a table, and
markers moved around on it according to certain rules, as an aid to calculating sums of
money.
Several analog computers were constructed in ancient and medieval times to perform
astronomical calculations. These included the south-pointing chariot (c. 1050–771 BC) from
ancient China, and the astrolabe and Antikythera mechanism from the Hellenistic world (c.
150–100 BC). In Roman Egypt, Hero of Alexandria (c. 10–70 AD) made mechanical devices
including automata and a programmable cart. Other early mechanical devices used to perform
one or another type of calculations include the plan sphere and other mechanical computing
devices invented by Abu Rayhan al-Biruni (c. AD 1000); the equatorium and universal
latitude-independent astrolabe by Abū Ishāq Ibrāhīm al-Zarqālī (c. AD 1015); the
astronomical analog computers of other medieval Muslim astronomers and engineers; and the
astronomical clock tower of Su Song (1094) during the Song dynasty. The castle clock, a
hydro-powered mechanical astronomical clock invented by Ismail al-Jazari in 1206, was the
first programmable analog computer. Ramon Llull invented the Lullian Circle: a notional
machine for calculating answers to philosophical questions (in this case, to do with
Christianity) via logical combinatorics. This idea was taken up by Leibniz centuries later, and
is thus one of the founding elements in computing and information science.
2. Renaissance calculating tools
Scottish mathematician and physicist John Napier discovered that the multiplication and
division of numbers could be performed by the addition and subtraction, respectively, of the
logarithms of those numbers. While producing the first logarithmic tables, Napier needed to
Compiled By: 1. Trailokya Raj Ojha, Assistant Professror, Nepal Engineering College (nec)
2 2. Ishwor Pokhrel, Assistant Professor, Nepal Engineering College (nec)
Course Manual on: Social and Professional Issues in IT (SPIT)
perform many tedious multiplications. It was at this point that he designed his 'Napier's
bones', an abacus-like device that greatly simplified calculations that involved multiplication
and division.
Since real numbers can be represented as distances or intervals on a line, the slide rule was
invented in the 1620s, shortly after Napier's work, to allow multiplication and division
operations to be carried out significantly faster than was previously possible. Edmund Gunter
built a calculating device with a single logarithmic scale at the University of Oxford. His
device greatly simplified arithmetic calculations, including multiplication and division.
William Oughtred greatly improved this in 1630 with his circular slide rule. He followed this
up with the modern slide rule in 1632, essentially a combination of two Gunter rules, held
together with the hands. Slide rules were used by generations of engineers and other
mathematically involved professional workers, until the invention of the pocket calculator.
3. Mechanical calculators
Wilhelm Schickard, a German polymath, designed a calculating machine in 1623 which
combined a mechanised form of Napier's rods with the world's first mechanical adding
machine built into the base. Because it made use of a single-tooth gear there were
circumstances in which its carry mechanism would jam. A fire destroyed at least one of the
machines in 1624 and it is believed Schickard was too disheartened to build another.
(Fig. View through the back of Pascal's calculator. Pascal invented his machine in 1642)
In 1642, while still a teenager, Blaise Pascal started some pioneering work on calculating
machines and after three years of effort and 50 prototypes he invented a mechanical
calculator. He built twenty of these machines (called Pascal's calculator or Pascaline) in the
following ten years. Nine Pascalines have survived, most of which are on display in European
museums. A continuing debate exists over whether Schickard or Pascal should be regarded as
the "inventor of the mechanical calculator" and the range of issues to be considered is
discussed elsewhere.
Gottfried Wilhelm von Leibniz invented the stepped reckoner and his famous stepped drum
mechanism around 1672. He attempted to create a machine that could be used not only for
addition and subtraction but would utilise a moveable carriage to enable long multiplication
and division. Leibniz once said "It is unworthy of excellent men to lose hours like slaves in
the labour of calculation which could safely be relegated to anyone else if machines were
used." However, Leibniz did not incorporate a fully successful carry mechanism. Leibniz also
described the binary numeral system, a central ingredient of all modern computers. However,
up to the 1940s, many subsequent designs (including Charles Babbage's machines of the
1822 and even ENIAC of 1945) were based on the decimal system.
Compiled By: 1. Trailokya Raj Ojha, Assistant Professror, Nepal Engineering College (nec)
3 2. Ishwor Pokhrel, Assistant Professor, Nepal Engineering College (nec)
Course Manual on: Social and Professional Issues in IT (SPIT)
Around 1820, Charles Xavier Thomas de Colmar created what would over the rest of the
century become the first successful, mass-produced mechanical calculator, the Thomas
Arithmometer. It could be used to add and subtract, and with a moveable carriage the
operator could also multiply, and divide by a process of long multiplication and long division.
It utilised a stepped drum similar in conception to that invented by Leibniz. Mechanical
calculators remained in use until the 1970s.
4. Punched card data processing
In 1804, Joseph-Marie Jacquard developed a loom in which the pattern being woven was
controlled by a paper tape constructed from punched cards. The paper tape could be changed
without changing the mechanical design of the loom. This was a landmark achievement in
programmability. His machine was an improvement over similar weaving looms. Punched
cards were preceded by punch bands, as in the machine proposed by Basile Bouchon. These
bands would inspire information recording for automatic pianos and more recently numerical
control machine tools.
In the late 1880s, the American Herman Hollerith invented data storage on punched cards
that could then be read by a machine. To process these punched cards he invented the
tabulator, and the keypunch machine. His machines used electromechanical relays and
counters. Hollerith's method was used in the 1890 United States Census. That census was
processed two years faster than the prior census had been. Hollerith's company eventually
became the core of IBM.
By 1920, electromechanical tabulating machines could add, subtract and print accumulated
totals. Machine functions were directed by inserting dozens of wire jumpers into removable
control panels. When the United States instituted Social Security in 1935, IBM punched card
systems were used to process records of 26 million workers. Punched cards became
ubiquitous in industry and government for accounting and administration.
Leslie Comrie's articles on punched card methods and W.J. Eckert's publication of Punched
Card Methods in Scientific Computation in 1940, described punched card techniques
sufficiently advanced to solve some differential equations or perform multiplication and
division using floating point representations, all on punched cards and unit record machines.
Such machines were used during World War II for cryptographic statistical processing, as
well as a vast number of administrative uses. The Astronomical Computing Bureau,
Columbia University, performed astronomical calculations representing the state of the art in
computing.
The book IBM and the Holocaust by Edwin Black outlines the ways in which IBM's
technology helped facilitate Nazi genocide through generation and tabulation of punch cards
based upon national census data.
5. Calculators
By the 20th century, earlier mechanical calculators, cash registers, accounting machines, and
so on were redesigned to use electric motors, with gear position as the representation for the
state of a variable. The word "computer" was a job title assigned to primarily women who
used these calculators to perform mathematical calculations. By the 1920s, British scientist
Compiled By: 1. Trailokya Raj Ojha, Assistant Professror, Nepal Engineering College (nec)
4 2. Ishwor Pokhrel, Assistant Professor, Nepal Engineering College (nec)
Course Manual on: Social and Professional Issues in IT (SPIT)
Lewis Fry Richardson's interest in weather prediction led him to propose human computers
and numerical analysis to model the weather; to this day, the most powerful computers on
Earth are needed to adequately model its weather using the Navier–Stokes equations.
Companies like Friden, Marchant Calculator and Monroe made desktop mechanical
calculators from the 1930s that could add, subtract, multiply and divide.[34] In 1948, the Curta
was introduced by Austrian inventor Curt Herzstark. It was a small, hand-cranked mechanical
calculator and as such, a descendant of Gottfried Leibniz's Stepped Reckoner and Thomas's
Arithmometer.
The world's first all-electronic desktop calculator was the British Bell Punch ANITA,
released in 1961. It used vacuum tubes, cold-cathode tubes and Dekatrons in its circuits, with
12 cold-cathode "Nixie" tubes for its display. The ANITA sold well since it was the only
electronic desktop calculator available, and was silent and quick. The tube technology was
superseded in June 1963 by the U.S. manufactured Friden EC-130, which had an all-
transistor design, a stack of four 13-digit numbers displayed on a 5-inch (13 cm) CRT, and
introduced reverse Polish notation (RPN).
First general-purpose computing device
Charles Babbage, an English mechanical engineer and polymath, originated the concept of a
programmable computer. Considered the "father of the computer", he conceptualized and
invented the first mechanical computer in the early 19th century. After working on his
revolutionary difference engine, designed to aid in navigational calculations, in 1833 he
realized that a much more general design, an Analytical Engine, was possible. The input of
programs and data was to be provided to the machine via punched cards, a method being used
at the time to direct mechanical looms such as the Jacquard loom. For output, the machine
would have a printer, a curve plotter and a bell. The machine would also be able to punch
numbers onto cards to be read in later. It employed ordinary base-10 fixed-point arithmetic.
The Engine incorporated an arithmetic logic unit, control flow in the form of conditional
branching and loops, and integrated memory, making it the first design for a general-purpose
computer that could be described in modern terms as Turing-complete.
Analog computers
In the first half of the 20th century, analog computers were considered by many to be the
future of computing. These devices used the continuously changeable aspects of physical
phenomena such as electrical, mechanical, or hydraulic quantities to model the problem being
solved, in contrast to digital computers that represented varying quantities symbolically, as
their numerical values change. As an analog computer does not use discrete values, but rather
continuous values, processes cannot be reliably repeated with exact equivalence, as they can
with Turing machines.
The first modern analog computer was a tide-predicting machine, invented by Sir William
Thomson, later Lord Kelvin, in 1872. It used a system of pulleys and wires to automatically
calculate predicted tide levels for a set period at a particular location and was of great utility
to navigation in shallow waters. His device was the foundation for further developments in
analog computing.
Compiled By: 1. Trailokya Raj Ojha, Assistant Professror, Nepal Engineering College (nec)
5 2. Ishwor Pokhrel, Assistant Professor, Nepal Engineering College (nec)
Course Manual on: Social and Professional Issues in IT (SPIT)
Compiled By: 1. Trailokya Raj Ojha, Assistant Professror, Nepal Engineering College (nec)
6 2. Ishwor Pokhrel, Assistant Professor, Nepal Engineering College (nec)
Course Manual on: Social and Professional Issues in IT (SPIT)
business brains of two generations. Hardware is important, but in a very real sense the history
of information technology is the history of software.
Computer Networks
Motivation was to enable remote use of computers
Compiled By: 1. Trailokya Raj Ojha, Assistant Professror, Nepal Engineering College (nec)
7 2. Ishwor Pokhrel, Assistant Professor, Nepal Engineering College (nec)
Course Manual on: Social and Professional Issues in IT (SPIT)
o 2008: Open Flow protocol was designed by Nick McKeown, leading to software
defined networking (SDN)
o Next: ?
1989 Invented World Wide Web. With Robert Cailliau, sent first HTTP
Tim Berners-Lee
1990 communication between client and server.
1847 George Boole Formalized Boolean algebra, the basis for digital logic and
Compiled By: 1. Trailokya Raj Ojha, Assistant Professror, Nepal Engineering College (nec)
9 2. Ishwor Pokhrel, Assistant Professor, Nepal Engineering College (nec)
Course Manual on: Social and Professional Issues in IT (SPIT)
Compiled By: 1. Trailokya Raj Ojha, Assistant Professror, Nepal Engineering College (nec)
10 2. Ishwor Pokhrel, Assistant Professor, Nepal Engineering College (nec)
Course Manual on: Social and Professional Issues in IT (SPIT)
1965 James Cooley With John W. Tukey, created the fast Fourier transform.
With John Mauchly, designed and built the ENIAC, the first
1943
J. Presper Eckert modern (all electronic, Turing-complete) computer, and the
1951
UNIVAC I, the first commercially available computer.
Best known for inventing the computer mouse (in a joint effort
with Bill English); as a pioneer of human-computer interaction
1963 Douglas Engelbart
whose Augment team developed hypertext, networked computers,
and precursors to GUIs.
Her team defined a simple text file format for Internet host
names.[29] The list evolved into the Domain Name System and
1974 Elizabeth Feinler
her group became the naming authority for the top-level domains
of .mil, .gov, .edu, .org, and .com.
Designed and built the Mark 1 and the ten improved Mark 2
1943 Tommy Flowers Colossus computers, the world's first programmable, digital,
electronic, computing devices.
1994 Sally Floyd Is known for her work on Transmission Control Protocol.
Compiled By: 1. Trailokya Raj Ojha, Assistant Professror, Nepal Engineering College (nec)
11 2. Ishwor Pokhrel, Assistant Professor, Nepal Engineering College (nec)
Course Manual on: Social and Professional Issues in IT (SPIT)
computer science".
André Truong
1972 Invention of the Micral N, the earliest commercial, non-kit
Trong Thi and
1973 personal computer based on a microprocessor.
François Gernelle
1991 Linus Torvalds Created the first version of the Linux kernel.
Compiled By: 1. Trailokya Raj Ojha, Assistant Professror, Nepal Engineering College (nec)
12 2. Ishwor Pokhrel, Assistant Professor, Nepal Engineering College (nec)
Course Manual on: Social and Professional Issues in IT (SPIT)
Compiled By: 1. Trailokya Raj Ojha, Assistant Professror, Nepal Engineering College (nec)
13 2. Ishwor Pokhrel, Assistant Professor, Nepal Engineering College (nec)
Course Manual on: Social and Professional Issues in IT (SPIT)
Unit 2
Social Context of Computing
2.1 Society and Technology
2.1.1 Impact of technology on society and vice versa
Innovation and changes in all spheres of life and makes life convenient,
economical and easier.
Technology and development go hand on hand
Technology and stress comes together
Technology made communication/mass communication possible and
easier but made people isolated from society
Compiled By: 1. Trailokya Raj Ojha, Assistant Professror, Nepal Engineering College (nec)
14 2. Ishwor Pokhrel, Assistant Professor, Nepal Engineering College (nec)
Course Manual on: Social and Professional Issues in IT (SPIT)
Nepal's GDP Per Capita reached 1,003.64 USD in first quarter of 2018, compared
with 866.48 USD in Jul 2017. (you can check it here:
https://www.ceicdata.com/en/indicator/nepal/gdp-per-capita)
More than 25% of population is under the poverty line.
Extreme poverty – those who is living on less than 1USD per day.
Technologies that is capable to alleviate poverty-
Radio
Television
Telephone
Computer and Internet
Compiled By: 1. Trailokya Raj Ojha, Assistant Professror, Nepal Engineering College (nec)
15 2. Ishwor Pokhrel, Assistant Professor, Nepal Engineering College (nec)
Course Manual on: Social and Professional Issues in IT (SPIT)
―An applied science concerned with designing and arranging things people use so that the
people and things interact most efficiently and safely — called also biotechnology, human
engineering, human factors‖
―Ergonomics is a way to work smarter not harder by designing of tools, equipments, work
station and tasks to fit the job to the worker- not the worker to the job‖
Simple things to think:
-Layout/ type of controls and displays
-Lighting and temperature
-Process (Height, weight ....)
Ergonomic Advices
Posture and Positioning
Maintain good posture when working at the keyboard. Utilize a chair with back
support. Keep your feet supported on the floor or on a footrest when you work to
reduce pressure on your lower back
Avoid twisting or bending your trunk or neck. Frequently used items should be
positioned directly in front of you and angled upward on a copyholder when working.
Keep your shoulders relaxed with your elbows close to your sides.
Avoid resting your elbows on the hard surface or edge of your table. Pads can be used
to protect your elbows if necessary.
Elbows should be positioned at 100 to 110 degrees when working in order to keep a
relaxed position at the keyboard. This could require a slight negative tilt (front of
keyboard higher than back) when working in upright positions. If reclined in your
chair, the keyboard could be at a positive angle to maintain this relaxed position.
Your wrists should be in a neutral or straight position when keying or using a pointing
device or calculator. Wrist rests can assist you in maintaining a neutral position when
used properly during pauses. Float your arms above the keyboard and wrist rest when
keying. Avoid planting your wrists on the table or wrist rest. This can result in
bending the wrists either up and down or side to side.
Take breaks. These breaks can be brief and should include stretches for optimal
results. If possible, take a one or two-minute break every 15 to 20 minutes, or a five-
Compiled By: 1. Trailokya Raj Ojha, Assistant Professror, Nepal Engineering College (nec)
16 2. Ishwor Pokhrel, Assistant Professor, Nepal Engineering College (nec)
Course Manual on: Social and Professional Issues in IT (SPIT)
minute break every hour. Every few hours, get up, move around, and do an alternative
activity.
Work Technique
Reduce keystrokes with the use of macros or software programs allowing "sticky
keys." Use scroll locks and keystroke combinations to reduce pointing-device
movements.
Alternate tasks to make changes in your working position to avoid making the same
movements for prolonged periods of time.
Keep your fingers and knuckles relaxed when working at the keyboard.
Never hold a pen or pencil in your hand when keying.
Avoid hitting the keyboard with excessive force. Studies have shown that the average
user hits the keyboard with four times the required force when keying.
Avoid holding your pointing device tightly. Your hand should be relaxed.
Rest your eyes by refocusing on distant objects intermittently when working.
Work Environment
Avoid excessive reaching. Your keyboard, pointing device, files and telephone should
be within easy reach.
Use a keyboard tray to properly position your keyboard and pointing device.
Use a copyholder positioned in line with your monitor and keyboard.
When writing at the computer, avoid excessive reaching over the keyboard or work
materials. A sturdy in-line copyholder can double as a writing surface if appropriately
positioned.
Position the monitor so that the viewed part of the screen allows you to keep your
neck in a neutral or straight position. The monitor should be cantered directly in front
of you. The top of the computer screen should be slightly below the top of your head,
so that you are looking at it with a slightly downward gaze.
Position your monitor to eliminate excessive glare or reflections from windows and
lighting.
Customize your computer by using your software. The screen font, contrast, pointer
size, speed, and colour can all be adjusted to maximize your comfort and efficiency.
Lifestyle
Aerobic exercise will help to sustain strength, improve cardiovascular conditioning,
and counteract the strain of sedentary computer use.
Routine use of non-prescribed medications or a wrist brace is not recommended. If
you begin to develop symptoms, notify your supervisor. Slight changes made early
can avoid future complications.
Compiled By: 1. Trailokya Raj Ojha, Assistant Professror, Nepal Engineering College (nec)
17 2. Ishwor Pokhrel, Assistant Professor, Nepal Engineering College (nec)
Course Manual on: Social and Professional Issues in IT (SPIT)
While coming to the negative aspects of the internet, there is so much illegal and
inappropriate information available on internet without any restrictions. Even children can get
access to mature and blood related games, pornography and other stuff which is not suitable
for their age. Internet is becoming a platform to share copyrighted or illegal material, music,
videos and other documents. Computer viruses, phishing, Trojans etc. are increasing rapidly
creating several crimes. Financial crimes are also growing at a steady pace which requires
attention amongst all internet users. The freedom of use to internet at anytime and by anyone
is luring the criminals to do heinous crimes via internet. Another aspect of internet is people
can spend unlimited amount of time without any bore or hard feeling. Recent trends shows
that the publicizing the personal life and information in social network websites is increasing
and the tendency of considering the virtual online world as real world is increasing very
rapidly. Recent medical studies show that addiction of internet is causing personal,
professional as well as social problems.
It refers to the gap between individuals, households, business and geographic areas at
different socio-economic levels with regard both to their opportunities to access information
and communication technologies (ICTs) and to their use of the internet for the wide variety of
activities.
This rapid technological change has brought many benefits to the poor and has been nothing
short of transformational:
For example, in Kenya, after the introduction of the M-Pesa digital payment system,
the cost of sending remittances for workers in urban areas with families in the
countryside dropped by up to 90 percent.
Compiled By: 1. Trailokya Raj Ojha, Assistant Professror, Nepal Engineering College (nec)
18 2. Ishwor Pokhrel, Assistant Professor, Nepal Engineering College (nec)
Course Manual on: Social and Professional Issues in IT (SPIT)
In India, the Aadhar digital identification system has already reached more than 1
billion people, enabling many of the poor to access services more easily and saving
the government billion each year by reducing corruption and waste.
The small country of Estonia is perhaps closest to becoming a digital society as
citizens can access more than 3,000 public and private services using nothing more
than their mobile phones.
And here in China, Alibaba‘s e-commerce platform has created more than 8 million
netprenuers (net entrepreneurs), of which 62 percent are small-scale entrepreneurs,
one-third are women, and one percent are people with disabilities.
NEPAL???
World banks World Development Report 2016 Digital Dividends documents many more
examples like these where digital technologies have promoted inclusion, efficiency and
innovation. The payoff is considerable: faster economic growth, more jobs, and better
services—what we call digital dividends.
And yet, the claim that the benefits of this digital revolution will automatically trickle down
to everyone and everywhere is far from clear: we all know that many people around the world
have yet to see these benefits. Digital adoption by firms in developing countries has been
slow. Automation is disrupting labour markets, and will displace a significant number of jobs
over the next few decades.
So why are these benefits not being shared universally?
One big reason is the persistent digital divide. Six billion people lack access to high speed
internet and four billion still have no internet access at all. So, we must invest in
infrastructure, in particular by incentivizing the private sector to expand access of telecom
and internet services to all.
But connectivity is not enough. That alone is not going to solve basic development problems
that have persisted for decades. Indeed, countries need broader digital development agendas
that promote connectivity, but also much more. They need to strengthen the analog
foundations of the digital revolution.
2.2.2 Governance of internet
-Internet governance is the development and application of shared principles, norms, rules,
decision-making procedures, and programs that shape the evolution and use of the Internet.
This article describes how the Internet was and is currently governed, some of the
controversies that occurred along the way, and the ongoing debates about how the Internet
should or should not be governed in the future.
Compiled By: 1. Trailokya Raj Ojha, Assistant Professror, Nepal Engineering College (nec)
19 2. Ishwor Pokhrel, Assistant Professor, Nepal Engineering College (nec)
Course Manual on: Social and Professional Issues in IT (SPIT)
-The term internet governance has evolved over time, and various groups have attempted to
develop working definitions. As the internet first opened to commerce and the wider public in
the mid-1990s, the term referred to a limited set of policy issues associated with the global
synchronization and management of domain names (e.g., samplesite.com) and IP addresses
(e.g., 192.168.1.1).
-Internet governance refers to the process impact how the internet is managed.
-Governance mechanism relies on relies on users, business and governments.
E-government refers to the use of information and communication technologies that has the
ability to transfer information between government agencies and public and vice versa. Some
definitions restrict e-government to Internet-enabled applications only, or only to interactions
between government and outside groups. Here, we do not - all digital ICTs are included; all
public sector activities are included.
There are three main domains of e-government, illustrated in figure below.
Improving government processes: eAdministration
Connecting citizens: eCitizens and eServices
Building external interactions: eSociety
Compiled By: 1. Trailokya Raj Ojha, Assistant Professror, Nepal Engineering College (nec)
20 2. Ishwor Pokhrel, Assistant Professor, Nepal Engineering College (nec)
Course Manual on: Social and Professional Issues in IT (SPIT)
Compiled By: 1. Trailokya Raj Ojha, Assistant Professror, Nepal Engineering College (nec)
21 2. Ishwor Pokhrel, Assistant Professor, Nepal Engineering College (nec)
Course Manual on: Social and Professional Issues in IT (SPIT)
Compiled By: 1. Trailokya Raj Ojha, Assistant Professror, Nepal Engineering College (nec)
22 2. Ishwor Pokhrel, Assistant Professor, Nepal Engineering College (nec)
Course Manual on: Social and Professional Issues in IT (SPIT)
Unit 3
Computer ethics and ethical theories
Ethics Law .
-as a guideline -as a rule
- free to follow -must follow
Ethics - moral principles that govern a person's behaviour or the conducting of an activity.
―Branch of philosophy that address the questions about moral, i.e. questions about what is
good and what is bad, right or wrong.‖
Computer Ethics
―Computer ethics is a part of practical philosophy concerned with how computing
professionals should make decisions regarding professional and social conduct. Any informal
code of ethical conduct that exists in the work place. Exposure to formal codes of ethics.‖
This is the study of the ethical questions that arises as a consequence of the development and
deployment of the computers and computing technologies.
It involves the following activities
1. Identifying and bringing focus in to the issues and problems that fall within the scope,
raising awareness of the ethical dimension of a particular situation.
2. Providing an approach to these issues, a means of advancing our understanding of,
and suggesting ways of reaching wise solution to these problems.
3.1 Philosophical and professional ethics
Philosophical ethics
- Assumes that human are basically good and can be more ethical.
- Reason is sufficient basis for developing ethics.
We may conveniently divide contemporary philosophical ethics into at least four parts. Meta-
ethics conducts an analysis of moral concepts, ethical justification, and the meaning of moral
language. Descriptive ethics describes ethical behaviour among various people and in various
cultures. (Social scientists now do most of this work.) Normative ethics contemplates the
norms, standards, or criteria that serve as theories or principles for ethical behaviour. Applied
ethics applies normative theories to particular ethical problems like abortion, euthanasia,
capital punishment, sexuality etc. Some areas of applied ethics have become their own sub-
specialties like medical, environmental, business, or computer ethics.
Professional ethics
Professionally accepted standards of personal and business behavior, values and guiding
principles. Codes of professional ethics are often established by professional organizations to
Compiled By: 1. Trailokya Raj Ojha, Assistant Professror, Nepal Engineering College (nec)
23 2. Ishwor Pokhrel, Assistant Professor, Nepal Engineering College (nec)
Course Manual on: Social and Professional Issues in IT (SPIT)
help guide members in performing their job functions according to sound and consistent
ethical principles.
Purpose: help professionals to act in particular situation ethically.
Complexity: can be many people working together-many issues might be involves-may be
historical issues-may be an issue on what to decide- who decide.
3.2 Moral and Legal issues
Legal
- Know what protection law provides for computer and data.
- Appreciate laws that protect the right of others with respect to computer, program and
data.
- Understand existing laws as a basis for recommending new laws to protect computers,
program and data.
Moral
- Moral issues are those which involve a difference of belief and not a matter of
preference.
A moral dispute would involve a factual disagreement (or a disagreement in belief)
where one or the other or neither belief is correct. It would not involve a disagreement
in attitude (or a disagreement in feeling).
- Moral issues are those which involve the experience of a special kind of feeling.
This feeling is said to differ intuitively from other kinds of feelings such as religious
or aesthetic feelings. (E.g., some people think these feelings arise from arise from
conscience.)
- Moral issues are those which involve the specific kind of situation where actions
affect other people.
On this view, essentially, whenever people interact, issues of moral concern would
arise.
By inference, then, there would be no matters of moral concern for persons such as
Robinson Crusoe.
3.3 Descriptive and Normative Claims
Descriptive ethics
Descriptive claims do not make value judgments.
- Empirically based, aim to describe and discover moral benefits of a specific culture.
- Deals with the meanings of moral utterances, the relationship between them and
moral actors and the nature of moral argumentation.
- Descriptive ethics may take a sociological, philosophical, psychological, ethnographic
approach.
Examples
―The mug of coffee in front of me is now at room temperature.‖
Compiled By: 1. Trailokya Raj Ojha, Assistant Professror, Nepal Engineering College (nec)
24 2. Ishwor Pokhrel, Assistant Professor, Nepal Engineering College (nec)
Course Manual on: Social and Professional Issues in IT (SPIT)
consequences lead to happiness (absence of pain), and wrong if it ends in unhappiness (pain).
Since the link between actions and their happy or unhappy outcomes depends on the
circumstances, no moral principle is absolute or necessary in itself under utilitarianism.
Proposed by the English philosopher-reformer Jeremy Bentham (1748-1832) in his 1789
book Principles Of Morals And Legislation it was developed by the English philosopher-
economist John Stuart Mill (1806-73) in his 1863 book Utilitarianism.
There are basically two branches of utilitarianism. They both agree that the goal of ethics is
to maximize happiness. But they disagree on where that decision should be applied:
Act Utilitarianism argues that we should always choose our actions based on what
will cause the greatest amount of happiness.
Rule Utilitarianism argues that we should figure out what sort of behaviour usually
causes happiness, and turn it into a set of rules.
Example: the Trolley Problem
Imagine there is a trolley heading toward a group of 5 workers on the tracks. You are sitting
in a control centre several miles away, and you have a button that can switch the trolley onto
another track where there‘s only 1 worker. If you flip the switch, one person will die. If you
do nothing, 5 people will die. Should you flip the switch?
In surveys, most people in America and Britain say yes. 1 death is better than 5 deaths, so if
you have to choose, you should try to minimize the loss of life by flipping the switch. This is
an example of utilitarian reasoning, and the survey results show that this school of thought is
popular in British and American culture. (In other cultures, people think about the problem
differently.)
Deontological Theories
-Deontological theories claim that the morality of an action depends on its intrinsic nature, on
its motives, or on its being in accord with some rule or principle.
-Emphasizes duty and absolute rules
-Rules should apply to determine with what is good.
-Treat people as an ends (not a means)
Compiled By: 1. Trailokya Raj Ojha, Assistant Professror, Nepal Engineering College (nec)
26 2. Ishwor Pokhrel, Assistant Professor, Nepal Engineering College (nec)
Course Manual on: Social and Professional Issues in IT (SPIT)
and literal policy that the employer had imposed, irrespective of whether the need for
originals instead of copies made any difference.
Example: Customer Service Manager
The manager of a retail store with a posted merchandise return policy may choose to honour
the policy or to make exceptions, depending on the circumstances of a particular return.
Managers with a strong duty-based ethic will typically hold closely to the literal text of the
policy and make fewer exceptions, because she views upholding her employer's policy as her
job. Consequentiality -- that is, people who favour evaluating the outcome of an act rather
than the act itself -- may be more willing to grant exceptions to keep customers happy.
3.6 Rights
Rights are legal, social, or ethical principles of freedom or entitlement; that is, rights are the
fundamental normative rules about what is allowed of people or owed to people, according to
some legal system, social convention, or ethical theory. Rights are of essential importance in
such disciplines as law and ethics, especially theories of justice and deontology.
Rights are often considered fundamental to civilization, for they are regarded as established
pillars of society and culture, and the history of social conflicts can be found in the history of
each right and its development. According to the Stanford Encyclopaedia of Philosophy,
"rights structure the form of governments, the content of laws, and the shape of morality as it
is currently perceived"
Natural Vs. Legal rights
Natural rights are rights which are "natural" in the sense of "not artificial, not man-
made", as in rights deriving from human nature or from the edicts of a god. They are
universal; that is, they apply to all people, and do not derive from the laws of any
specific society. They exist necessarily, inhere in every individual, and can't be taken
away. For example, it has been argued that humans have a natural right to life. These
are sometimes called moral rights or inalienable rights.
Legal rights, in contrast, are based on a society's customs, laws, statutes or actions by
legislatures. An example of a legal right is the right to vote of citizens. Citizenship,
itself, is often considered as the basis for having legal rights, and has been defined as
the "right to have rights". Legal rights are sometimes called civil rights or statutory
rights and are culturally and politically relative since they depend on a specific
societal context to have meaning.
Compiled By: 1. Trailokya Raj Ojha, Assistant Professror, Nepal Engineering College (nec)
27 2. Ishwor Pokhrel, Assistant Professor, Nepal Engineering College (nec)
Course Manual on: Social and Professional Issues in IT (SPIT)
Unit 4
Professional Ethics
4.1 Profession
A Profession is a vocation founded upon specialized educational training, the purpose of
which is to supply disinterested counsel and service to others, for a direct and definite
compensation, wholly apart from expectation of other business gain.
A Professional is a member of a vocation founded upon specialized educational training.
Similarly, Professionalism is the standing, practice, or methods of a professional, as
distinguished from an amateur.
Profession, Professional & Professionalism
Compiled By: 1. Trailokya Raj Ojha, Assistant Professror, Nepal Engineering College (nec)
29 2. Ishwor Pokhrel, Assistant Professor, Nepal Engineering College (nec)
Course Manual on: Social and Professional Issues in IT (SPIT)
Professional responsibility is the area of legal practice that encompasses the duties of
attorneys to act in a professional manner, obey the law, avoid conflicts of interest, and put the
interests of clients ahead of their own interests.
The basic rights of engineers include the right to live freely and pursue their legitimate
interests as any human being, along with the right to be against racial or sexual
discrimination, receiving one‘s salary according to the work, choosing of political activities,
etc., as other employees. Besides all of them, engineers have some special rights as
professionals.
The rights that engineers have as professionals are called Professional Rights. These
professional rights include −
The basic right of professional conscience.
The right of conscientious refusal.
The right of professional recognition.
Right of Professional Conscience
This is a basic right which explains that the decisions taken while carrying on with the duty,
where they are taken in moral and ethical manner, cannot be opposed. The right of
professional conscience is the moral right to exercise professional judgement in pursuing
professional responsibilities. It requires autonomous moral judgement in trying to uncover the
most morally reasonable courses of action, and the correct courses of action are not always
obvious.
There are two general ways to justify the basic right of professional conscience.
The exercise of moral reflection and conscience that justifies professional duties is
necessary, with respect to that duty.
The general duties to respect persons and rule-utilitarianism would accent the public
good of allowing engineers to pursue their professional duties.
Right of Conscientious Refusal
The right of conscientious refusal is the right to refuse to engage in unethical behavior. This
can be done solely because it feels unethical to the doer. This action might bring conflicts
within the authority-based relationships.
The two main situations to be considered here are −
When it is already stated that certain act is unethical in a widely shared agreement
among all the employees.
When there occurs disagreement among considerable number of people whether the
act is unethical.
Hence it is understood that engineers and other professionals have a moral right to refuse the
unethical acts such as bribery, forging documents, altering test results, lying, padding payrolls
or coercing employees into acting by threatening, etc.
Compiled By: 1. Trailokya Raj Ojha, Assistant Professror, Nepal Engineering College (nec)
30 2. Ishwor Pokhrel, Assistant Professor, Nepal Engineering College (nec)
Course Manual on: Social and Professional Issues in IT (SPIT)
Right to Recognition
An engineer has a right to the recognition of one‘s work and accomplishments. An engineer
also has right to speak about the work one does by maintaining confidentiality and can
receive external recognition. The right for internal recognition which includes patents,
promotions, raises etc. along with a fair remuneration, are also a part of it.
The fulfilment of right to recognition motivates the employee to be a trustful member of the
organization, which also benefits the employer. This makes the employee morally bound
which enhances the ethical nature to be abided by the professional ethics.
4.2.1 Conflict of Interests and Whistleblowing
A widely used definition is: "A conflict of interest is a set of circumstances that creates a risk
that professional judgment or actions regarding a primary interest will be unduly influenced
by a secondary interest.―
Primary interest refers to the principal goals of the profession or activity, such as the
protection of clients, the health of patients, the integrity of research, and the duties of public
officer. Secondary interest includes personal benefit and is not limited to only financial gain
but also such motives as the desire for professional advancement, or the wish to do favors for
family and friends. These secondary interests are not treated as wrong in and of themselves,
but become objectionable when they are believed to have greater weight than the primary
interests.
Conflict of interest rules in the public sphere mainly focus on financial relationships since
they are relatively more objective, fungible, and quantifiable, and usually involve the
political, legal, and medical fields.
Compiled By: 1. Trailokya Raj Ojha, Assistant Professror, Nepal Engineering College (nec)
32 2. Ishwor Pokhrel, Assistant Professor, Nepal Engineering College (nec)
Course Manual on: Social and Professional Issues in IT (SPIT)
Ethics
Ethics, also known as moral philosophy is a branch of philosophy that addresses questions
about morality—that is, concepts such as good and evil, right and wrong, virtue and vice,
justice, etc.
A set of principles of right conduct.
A theory or a system of moral values
Compiled By: 1. Trailokya Raj Ojha, Assistant Professror, Nepal Engineering College (nec)
33 2. Ishwor Pokhrel, Assistant Professor, Nepal Engineering College (nec)
Course Manual on: Social and Professional Issues in IT (SPIT)
Engineering Ethics mean the rules or standards governing the conduct of a person or the
members of a engineering profession. It is the field of applied ethics which examines and sets
standards for engineers' obligations to the public, their clients, employers and the profession.
Compiled By: 1. Trailokya Raj Ojha, Assistant Professror, Nepal Engineering College (nec)
34 2. Ishwor Pokhrel, Assistant Professor, Nepal Engineering College (nec)
Course Manual on: Social and Professional Issues in IT (SPIT)
Compiled By: 1. Trailokya Raj Ojha, Assistant Professror, Nepal Engineering College (nec)
35 2. Ishwor Pokhrel, Assistant Professor, Nepal Engineering College (nec)
Course Manual on: Social and Professional Issues in IT (SPIT)
Uncertain outcomes
Personal Implications
Methods of making Proper Decision
Utilitarianism : A decision or act is right or good only if it generates the greatest
amount of benefit for the largest number people with lowest cost and harms to others.
Universalism : A decision or act is right or good only if everyone faced with the same
set of circumstances should be expected to make same decision.
Based on Existing Law and Tradition
Distributive Justice: A decision or act is right or good only if the least advantaged
member of the society somehow enjoy a better standard after the decision compared
to as they did before.
Personal Liberty: A decision or act is right or good only if all the member of our
society somehow have a greater freedom to develop their own lives after the decision.
Compiled By: 1. Trailokya Raj Ojha, Assistant Professror, Nepal Engineering College (nec)
37 2. Ishwor Pokhrel, Assistant Professor, Nepal Engineering College (nec)
Course Manual on: Social and Professional Issues in IT (SPIT)
NEC Rules 2057 also lays down the professional code of conduct for engineers registered
with the Council.
The code directs the relationships of Nepalese Engineers with:
Public
Employers and Clients
Other Engineers
Nepal Engineering Council Rules, 2057 has also been prepared and approved by then His
Majesty's Government as per the provision of Clause 37 of the Act. The first Executive
Council was formed on Magh 2056 under the chairmanship of Er. Ram Babu Sharma and
completed its tenure on Magh 2060.
Engineering Profession according to Nepal Engineering Council
Nepal Engineering Council Act 2057 defines the engineering profession as the occupation
which is done by the engineers. The engineer has been defined as a person having
graduate degree in engineering from the institute recognized by the council.
It can be defined various way, generally it is defined as “it’s a practice with the act of
designing, composing, advising, reporting, directing or supervising where in the
safeguarding of, health, property or the public welfare is concerned and that requires the
application of engineering principles.”
Jurisdiction (Scope) of NEC
Licensing or registration of Engineer
Accreditation of Certificates of academic qualification.
Recognition of academic institutions
Produce and monitor the professional code of conduct
Objectives of NEC
The objective of NEC is to make engineering profession effective by mobilizing it in a more
systematic and scientific and also to register the engineers as per their qualifications. Its
duties and responsibilities are:
To prepare policies, plans and programs for the smooth functioning of the
engineering profession and to execute them
To grant permission and approval to carry out engineering education to
those engineering colleges and institutions that meet the required norms
and standards and to honour their degrees and certificates
To set norms and standards for engineering education in Nepal
To monitor and inspect the quality of engineering education provided by
the engineering colleges and institutions
To fix the qualification necessary in order to practice engineering
profession and to register their name in the Council
To remove their name from the registration of the engineering council if
found to violate the code of ethics.
Compiled By: 1. Trailokya Raj Ojha, Assistant Professror, Nepal Engineering College (nec)
38 2. Ishwor Pokhrel, Assistant Professor, Nepal Engineering College (nec)
Course Manual on: Social and Professional Issues in IT (SPIT)
Registration of NEC
The council categorized the engineers as under according to Section - 2 of the
Engineering Council Acts:
A - General Registered Engineers.
Compiled By: 1. Trailokya Raj Ojha, Assistant Professror, Nepal Engineering College (nec)
39 2. Ishwor Pokhrel, Assistant Professor, Nepal Engineering College (nec)
Course Manual on: Social and Professional Issues in IT (SPIT)
B - Professional Engineers.
C - Non-Nepalese Registered Engineers.
Registration Requirements
Application with approved format
Copies of certificates of academic qualification
Registration Fees
Other relevant documents
Nepal Engineer’s Association (NEA)
Nepal Engineers' Association is an independent non profit organization of Nepalese
Engineers. It was established in 1968 AD (2024 BS).
NEA during 1968-1989 was successful in establishing this very organization. The organizing
of the World Engineering Congress along with first three national conventions were major
milestones in this period.
Nepal Engineers Association office is located at Pulchowk behind UNDP building.
NEA during 1990-1999 was successful in membership drive. Similarly the organizing of
the interaction program among the four Ps (Press, Public, Professional and Politician) was
a major step achieved by NEA in promoting the profession and in improving the image of
its fellow members.
NEA was successful in expansion of in- country NEA centers, conversion of existing
ones to Regional Centers as well as establishment of an international wings.
During the past decade, NEA broadened its activities by expanding its relation with
international Engineering societies. NEA became member of World Federation of
Engineering Organizations (WFEO) and was successful to establish Federation of
Engineering Institute of South and Central Asia (FEISCA).
During the past decade, NEA has been successful in construction of its own building at
Pulchowk behind UNDP building.
Objectives of NEA
To promote development of the engineering science and technology in Nepal.
To promote fellowship goodwill and cooperation assistance among the
Nepalese engineers and safeguard their rights and interests.
To continuously enhance the highest professional ideals among the members
and widen it.
By utilizing, to the highest extent possible, the participation of the national
engineering manpower of the country in the national development activities of
Nepal, make effort towards ending foreign dependency in this regard.
Compiled By: 1. Trailokya Raj Ojha, Assistant Professror, Nepal Engineering College (nec)
40 2. Ishwor Pokhrel, Assistant Professor, Nepal Engineering College (nec)
Course Manual on: Social and Professional Issues in IT (SPIT)
Compiled By: 1. Trailokya Raj Ojha, Assistant Professror, Nepal Engineering College (nec)
41 2. Ishwor Pokhrel, Assistant Professor, Nepal Engineering College (nec)
Course Manual on: Social and Professional Issues in IT (SPIT)
2. To avoid real or perceived conflicts of interest whenever possible, and to disclose them
to affected parties when they do exist;
3. To be honest and realistic in stating claims or estimates based on available data;
4. To reject bribery in all its forms;
5. To improve the understanding of technology, its appropriate application, and potential
consequences;
6. To maintain and improve our technical competence and to undertake technological tasks
for others only if qualified by training or experience, or after full disclosure of pertinent
limitations;
7. To seek, accept, and offer honest criticism of technical work, to acknowledge and
correct errors, and to credit properly the contributions of others;
8. To treat fairly all persons regardless of such factors as race, religion, gender, disability,
age, or national origin;
9. To avoid injuring others, their property, reputation, or employment by false or malicious
action;
10. To assist colleagues and co-workers in their professional development and to support
them in following this code of ethics.
Compiled By: 1. Trailokya Raj Ojha, Assistant Professror, Nepal Engineering College (nec)
42 2. Ishwor Pokhrel, Assistant Professor, Nepal Engineering College (nec)
Course Manual on: Social and Professional Issues in IT (SPIT)
Compiled By: 1. Trailokya Raj Ojha, Assistant Professror, Nepal Engineering College (nec)
43 2. Ishwor Pokhrel, Assistant Professor, Nepal Engineering College (nec)
Course Manual on: Social and Professional Issues in IT (SPIT)
sure you reply to one person and not the whole list, unless you want the whole list to
read what you have to say.
Compiled By: 1. Trailokya Raj Ojha, Assistant Professror, Nepal Engineering College (nec)
44 2. Ishwor Pokhrel, Assistant Professor, Nepal Engineering College (nec)
Course Manual on: Social and Professional Issues in IT (SPIT)
Unit 5
Risk and Responsibilities
5.1 Computer Liability
Computer Liability includes:
Causes of Software Failures
Risks
Consumer Protection
Improving Software Quality
Producer Protection
Complex application software defects
Operating system failures
On-line transaction processing performance issues
Security issues
Database architecture disputes
International licensing disputes
Shrink-wrap software disclaimers
Consulting errors and omissions
Software Issues: Risks and Liabilities
For healthy relationship between software developer and clients, we must consider
following things
(1) Standards – universally accepted level of confidence
Standards depend on:
Development testing
Verification and Validation
(2) Reliability – software reliability does not depend on age and wear and tear like
hardware
Software reliability - is the probability that the software does not encounter an input
sequence resulting into failure.
(3) Security- software is secure if it does not contain trapdoors through which an intruder can
access the system.
(4) Safety – the safety of a software product means the absence of a likelihood of an accident,
a hazard, or a risk
Compiled By: 1. Trailokya Raj Ojha, Assistant Professror, Nepal Engineering College (nec)
45 2. Ishwor Pokhrel, Assistant Professor, Nepal Engineering College (nec)
Course Manual on: Social and Professional Issues in IT (SPIT)
Compiled By: 1. Trailokya Raj Ojha, Assistant Professror, Nepal Engineering College (nec)
46 2. Ishwor Pokhrel, Assistant Professor, Nepal Engineering College (nec)
Course Manual on: Social and Professional Issues in IT (SPIT)
Risk
Risk is a hazard level together with the likelihood of an accident to occur and the severity of
the potential consequences. A hazard is a state or set of conditions of a system or an object
that, together with other conditions in the environment of the system, or object, will lead
inevitably to an accident
• Software risks are caused by:
Personnel shortfalls
Unrealistic schedules and budgets
Developing the wrong functions and properties
Developing the wrong user interface
Continuing stream of requirements changes
Shortfalls in externally furnished components
Shortfalls in externally performed tasks
Real-time performance shortfalls
Straining computer-science capabilities
Consumer Protection and the Law
• Buyer‘s rights:
• Replacement
• Refunds
• Updates
• Understanding software complexity- software as:
• Product
• Service
• Mix
Costumer protection tools:
(1) Contract (used with products):
• Express warranties
• Implied warranties
• Third-party beneficiary
• Breach of contract – lack of compliance
(2) Tort (used with services): Tort is any private or public action, which leads to loss or
damages
Compiled By: 1. Trailokya Raj Ojha, Assistant Professror, Nepal Engineering College (nec)
47 2. Ishwor Pokhrel, Assistant Professor, Nepal Engineering College (nec)
Course Manual on: Social and Professional Issues in IT (SPIT)
• Intentional
• Unintentional
Torts includes-
• Negligence – careless, lack of competence, etc..
• Malpractice
• Strict liability
• Misrepresentation
If vendors were responsible for harmful consequences of defects
• Companies would test software more
• They would purchase liability insurance
• Software would cost more
• Start-ups would be affected more than big companies
• Less innovation in software industry
• Software would be more reliable
• Making vendors responsible for harmful consequences of defects may be wrong.
• Consumers should not have to pay for bug fixes .
Improving Software Quality
The safety and reliability of a software product defines the quality of that software. Software
quality can only be improved during the development cycle. The following techniques done
during the software development phase can improve software quality:
• Final review
• Inspection
• Walk-through
• Phased-inspection
Producer Protection and the Law
• Protection against:
• Piracy
• Illegal copying/downloading of copyrighted software
• Fraudulent lawsuits by customers
• Seek protection from the courts
Safety critical systems
Compiled By: 1. Trailokya Raj Ojha, Assistant Professror, Nepal Engineering College (nec)
48 2. Ishwor Pokhrel, Assistant Professor, Nepal Engineering College (nec)
Course Manual on: Social and Professional Issues in IT (SPIT)
Systems with a component of real-time control that can have a direct life-threatening impact.
Some of the examples are as below-
• Aircraft, air traffic control
• Nuclear reactor control
• Missile systems
• Medical treatment systems
• Safety critical software used in the design of physical systems can have massive
impact.
Accuracy vs. Democracy in Internet
The Internet is one of the final frontiers. Untamed and unregulated, it offers huge opportunity
for individual freedom in exploration and communication. With a smartphone, you have
access to anything you want to know at all times. However, the price of this great freedom is
increased personal responsibility.
Compiled By: 1. Trailokya Raj Ojha, Assistant Professror, Nepal Engineering College (nec)
49 2. Ishwor Pokhrel, Assistant Professor, Nepal Engineering College (nec)
Course Manual on: Social and Professional Issues in IT (SPIT)
3. How would someone who holds a different view interpret the article?
Put yourself in the shoes of someone who does not hold your views. This can be one
of the most effective ways to help you be objective and find where there are holes in
the article.
Skill to develop to identify the accuracy
Three Skills to Develop
1. Evaluating research to identify quality, valid studies.
2. Separating data from opinion.
3. Critical thinking: stepping out of emotionality and using objective analysis.
Democracy In Internet
Internet users have the potential to
• Share what‘s on their minds(social media have becomes important media for voicing
one‘s opinion)
• Express their thoughts
• Connect with others or join groups who share their opinions.
The internet has also become an important medium for the expression of criticism or dissent,
especially in socio-political matters.
How Internet promotes Democracy?
• The spread of free information through the internet has encouraged freedom and
human development. The internet is used for promoting human rights, including free
speech, religion, expression, peaceful assembly, to governments accountability, and
the right of knowledge and understanding. These rights support democracy.
• "The freedom to connect – the idea that governments should not prevent people from
connecting to the internet, to websites, or to each other. The freedom to connect is like
the freedom of assembly, only in cyberspace. It allows individuals to get online, come
together, and hopefully cooperate.
• Unmediated mass communication on the internet, such as through newsgroups, chat
rooms, and others.
• practical issues involving e-democracy include: effective participation; voting
equality at decision stage; enlightened understanding; control of the agenda; and
inclusiveness.
• This collective decision making and problem-solving gives more power to the citizens
and helps politicians make decisions faster.
Compiled By: 1. Trailokya Raj Ojha, Assistant Professror, Nepal Engineering College (nec)
51 2. Ishwor Pokhrel, Assistant Professor, Nepal Engineering College (nec)
Course Manual on: Social and Professional Issues in IT (SPIT)
Compiled By: 1. Trailokya Raj Ojha, Assistant Professror, Nepal Engineering College (nec)
52 2. Ishwor Pokhrel, Assistant Professor, Nepal Engineering College (nec)
Course Manual on: Social and Professional Issues in IT (SPIT)
We should stop fighting and work with the Engineering groups on the establishing
standards for a new ―flavor‖ of Engineer, either ―Software Engineer‖ or ―Computer
Engineer‖. We should take the advantage of the experience that this groups have in
setting professional standards. We should use existing legislations to enforce those
standards.
2. Develop better educational programs.
We are not ready to work with the accreditation committees even if they are:
• Little agreement on the essential knowledge required of those practicing
Software Engineering
• We need to remember that Engineering is not Management our current
programs and literature confuse them.
3. Develop accreditation procedures for Software Engineering programs
It is time to develop standards for the educational programs that will be uniquely
designed and target needs of Software Engineering as a discipline not as a
subprogram of Electrical Engineering or Computer Science.
The aim [of education] must be the training of independently acting and thinking
individuals who, however, see in the service to the community their highest life
achievement. – Albert Einstein
Compiled By: 1. Trailokya Raj Ojha, Assistant Professror, Nepal Engineering College (nec)
54 2. Ishwor Pokhrel, Assistant Professor, Nepal Engineering College (nec)
Course Manual on: Social and Professional Issues in IT (SPIT)
Unit 6
Privacy
6.1 Privacy and its values
Privacy
Privacy is the ability of an individual or group to seclude themselves, or information about
themselves, and thereby express them selectively. When something is private to a person, it
usually means that something is inherently special or sensitive to them.
The domain of privacy partially overlaps security (confidentiality), which can include the
concepts of appropriate use, as well as protection of information.
Values of Privacy
• The right to be let alone
• The option to limit the access others have to one's personal information
• Secrecy, or the option to conceal any information from others
• Control over others' use of information about oneself
• States of privacy
• Personhood and autonomy
• Self-identity and personal growth
• Protection of intimate relationships
Privacy Risks
Risks associated with the collection, use and management of an agency‘s personal
information holdings.
Top 10 Privacy Risks
• Web Application Vulnerabilities
• Operator-sided Data Leakage
• Insufficient Data Breach Response
• Insufficient Deletion of personal data
• Non-transparent Policies, Terms and Conditions
Compiled By: 1. Trailokya Raj Ojha, Assistant Professror, Nepal Engineering College (nec)
55 2. Ishwor Pokhrel, Assistant Professor, Nepal Engineering College (nec)
Course Manual on: Social and Professional Issues in IT (SPIT)
Compiled By: 1. Trailokya Raj Ojha, Assistant Professror, Nepal Engineering College (nec)
56 2. Ishwor Pokhrel, Assistant Professor, Nepal Engineering College (nec)
Course Manual on: Social and Professional Issues in IT (SPIT)
• Privacy breach
• Location-based service and geo-location.
• Web surfing behavior or user preferences using persistent cookies
6.3 Privacy of Consumer Information
6.3.1 Privacy of Database and personal records
Database security concerns the use of a broad range of information security controls to
protect databases (potentially including the data, the database applications or stored
functions, the database systems, the database servers and the associated network links)
against compromises of their confidentiality, integrity and availability.
Security risks to database systems
• unintended activity or misuse by authorized database users, database administrators,
or network/systems managers, or by unauthorized users or hackers (e.g. inappropriate
access to sensitive data, metadata or functions within databases, or inappropriate
changes to the database programs, structures or security configurations);
• Malware infections causing incidents such as unauthorized access, leakage or
disclosure of personal or proprietary data, deletion of or damage to the data or
programs, interruption or denial of authorized access to the database, attacks on other
systems and the unanticipated failure of database services;
• Overloads, performance constraints and capacity issues resulting in the inability of
authorized users to use databases as intended;
• Physical damage to database servers caused by computer room fires or floods,
overheating, lightning, accidental liquid spills, static discharge, electronic
breakdowns/equipment failures and obsolescence;
• Design flaws and programming bugs in databases and the associated programs and
systems, creating various security vulnerabilities (e.g. unauthorized privilege
escalation), data loss/corruption, performance degradation etc.;
• Data corruption and/or loss caused by the entry of invalid data or commands, mistakes
in database or system administration processes, sabotage/criminal damage
Ways to security control in database
• Access control
• Auditing
• Authentication
• Encryption
• Integrity controls
• Backups
• Application security
Compiled By: 1. Trailokya Raj Ojha, Assistant Professror, Nepal Engineering College (nec)
57 2. Ishwor Pokhrel, Assistant Professor, Nepal Engineering College (nec)
Course Manual on: Social and Professional Issues in IT (SPIT)
Compiled By: 1. Trailokya Raj Ojha, Assistant Professror, Nepal Engineering College (nec)
58 2. Ishwor Pokhrel, Assistant Professor, Nepal Engineering College (nec)
Course Manual on: Social and Professional Issues in IT (SPIT)
Compiled By: 1. Trailokya Raj Ojha, Assistant Professror, Nepal Engineering College (nec)
59 2. Ishwor Pokhrel, Assistant Professor, Nepal Engineering College (nec)
Course Manual on: Social and Professional Issues in IT (SPIT)
PGP Message
Compiled By: 1. Trailokya Raj Ojha, Assistant Professror, Nepal Engineering College (nec)
60 2. Ishwor Pokhrel, Assistant Professor, Nepal Engineering College (nec)
Course Manual on: Social and Professional Issues in IT (SPIT)
Compiled By: 1. Trailokya Raj Ojha, Assistant Professror, Nepal Engineering College (nec)
61 2. Ishwor Pokhrel, Assistant Professor, Nepal Engineering College (nec)
Course Manual on: Social and Professional Issues in IT (SPIT)
Compiled By: 1. Trailokya Raj Ojha, Assistant Professror, Nepal Engineering College (nec)
62 2. Ishwor Pokhrel, Assistant Professor, Nepal Engineering College (nec)
Course Manual on: Social and Professional Issues in IT (SPIT)
Compiled By: 1. Trailokya Raj Ojha, Assistant Professror, Nepal Engineering College (nec)
63 2. Ishwor Pokhrel, Assistant Professor, Nepal Engineering College (nec)
Course Manual on: Social and Professional Issues in IT (SPIT)
• Web-bug.
• Spyware: keystroke loggers.
Email security
• Interception of email.
• Can be encrypted using PGP or S/MIME
• Email monitored legallly.
• Anonymous E-mail and remailers
• Sending anonymous emails.
• Spoofing and spamming.
Impact on Emerging technologies
• RFID tags
• RFID and privacy issues:
• Consumer products. How can this be exploited?
• RFID in individuals.
• Electronic voting
• Privacy issues.
• VoIP and Skype
• Privacy issues.
6.4 Protect your privacy
Somehow we all are protecting our privacy in internet. For example, we all make our social
media account secure by using the provided security options. But what if that did not work?
Follow the following instructions to protect your privacy.
• Don‘t fill out your social media profile.
• Be choosy about sharing your social security number—even the last 4 digits.
• Lock down your hardware.
• Turn on private browsing.
• Use a password vault that generates and remembers strong and unique passwords.
• Use two-factor authentication.
• Set up a Google alert for your name.
• Pay for things with cash.
• Keep your social network activity private.
• Don‘t give your zip code when making credit card purchases.
Compiled By: 1. Trailokya Raj Ojha, Assistant Professror, Nepal Engineering College (nec)
65 2. Ishwor Pokhrel, Assistant Professor, Nepal Engineering College (nec)
Course Manual on: Social and Professional Issues in IT (SPIT)
• Uses
• Object analysis
• Image recognition
• Popular Internet filters
– ContentProtect
– CYBERsitter
– NetNanny
– CyberPatrol
• HateFilter
• ICRA(Investment Information & Credit Rating Agency) rating system
o Questionnaire for Web authors
o Generates a content label
Uses Platform for Internet Content Selection (PICS) standard
o Users can configure browsers to read the label to block content
o Relies on Web authors to rate their site
o Complement to other filtering techniques
• ISP blocking
o Blocking is performed on the ISP server
o ClearSail/Family.NET prevents access to certain Web sites
• Federally financed schools and libraries must block computer access to
o Obscene material
o Pornography
o Anything considered harmful to minors
• Schools and libraries subject to CIPA do not receive Internet access discounts
unless they certify that Internet safety measures are in place
o Required to adopt a policy to monitor the online activities of minors
• CIPA does not require the tracking of Internet use by minors or adults
• Acceptable use policy agreement is an essential element of a successful
program in schools
o Signed by
Students
Parents
Employees
Compiled By: 1. Trailokya Raj Ojha, Assistant Professror, Nepal Engineering College (nec)
68 2. Ishwor Pokhrel, Assistant Professor, Nepal Engineering College (nec)
Course Manual on: Social and Professional Issues in IT (SPIT)
Compiled By: 1. Trailokya Raj Ojha, Assistant Professror, Nepal Engineering College (nec)
69 2. Ishwor Pokhrel, Assistant Professor, Nepal Engineering College (nec)
Course Manual on: Social and Professional Issues in IT (SPIT)
Unit 7
Computer and Cyber Crimes
7.1 Introduction to computer crime and cyber crime
A computer crime is any unlawful activity that is done using a computer.
Cybercrime is any criminal activity that involves a computer, networked device or a network.
While most cybercrimes are carried out in order to generate profit for the cybercriminals,
some cybercrimes are carried out against computers or devices directly to damage or disable
them, while others use computers or networks to spread malware, illegal information, images
or other materials. Some cybercrimes do both i.e., target computers to infect them with
viruses, which are then spread to other machines and, sometimes, entire networks.
Compiled By: 1. Trailokya Raj Ojha, Assistant Professror, Nepal Engineering College (nec)
70 2. Ishwor Pokhrel, Assistant Professor, Nepal Engineering College (nec)
Course Manual on: Social and Professional Issues in IT (SPIT)
A primary impact from cybercrime is financial, and cybercrime can include many different
types of profit-driven criminal activity, including ransom ware attacks, email and internet
fraud and identity fraud, as well as attempts to steal financial account, credit card or other
payment card information. Cybercriminals may target private personal information, as well as
corporate data for theft and resale.
The U.S. Department of Justice divides cybercrime into three categories: crimes in which the
computing device is the target, for example, to gain network access; crimes in which the
computer is used as a weapon, for example, to launch a denial-of-service (DoS) attack; and
crimes in which the computer is used as an accessory to a crime, for example, using a
computer to store illegally obtained data.
The Council of Europe Convention on Cybercrime, to which the United States is a signatory,
defines cybercrime as a wide range of malicious activities, including the illegal interception
of data, system interferences that compromise network integrity and availability, and
copyright infringements. Other forms of cybercrime include illegal gambling, the sale of
illegal items, like weapons, drugs or counterfeit goods, as well as the solicitation, production,
possession or distribution of child pornography.
The ubiquity of internet connectivity has enabled an increase in the volume and pace of
cybercrime activities because the criminal no longer needs to be physically present when
committing a crime. The internet's speed, convenience, anonymity and lack of borders make
computer-based variations of financial crimes, such as ransomware, fraud and money
laundering, as well as hate crimes, such as stalking and bullying, easier to carry out.
Cybercriminal activity may be carried out by individuals or small groups with relatively little
technical skill or by highly organized global criminal groups that may include skilled
developers and others with relevant expertise. To further reduce the chances of detection and
prosecution, cybercriminals often choose to operate in countries with weak or nonexistent
cybercrime laws.
The First Incident of Cyber Crime
• The first major computer crimes came into being in the 1960‘s when a group of
hackers emerged from Massachusetts Institute of Technology (MIT).
• The first virus came into being in 1981. It was created on the Apple II operating
software and was spread through floppy disk, containing the operating software.
7.2 Types of Cyber Crimes
Compiled By: 1. Trailokya Raj Ojha, Assistant Professror, Nepal Engineering College (nec)
71 2. Ishwor Pokhrel, Assistant Professor, Nepal Engineering College (nec)
Course Manual on: Social and Professional Issues in IT (SPIT)
Example of DOS
One such vulnerability is a weakness that allows a hacker to enter the system and take it over
remotely. Then all he or she has to do is prevent a legitimate user from accessing or working
on the system. Lockouts are possible, where the denial of service (DoS) prevents legitimate
Compiled By: 1. Trailokya Raj Ojha, Assistant Professror, Nepal Engineering College (nec)
72 2. Ishwor Pokhrel, Assistant Professor, Nepal Engineering College (nec)
Course Manual on: Social and Professional Issues in IT (SPIT)
users from accessing their system. This comes from the fact that many systems have
authentication features, such as a login name and password. It is also typical that there are a
limited number of attempts that can be used in order to gain access, and reaching that limit
locks out the user. So a hacker can manipulate the login account limit and lockout the user.
3. Malware
Malware means malicious software. It is designed to secretly access an individual‘s computer
without his/her permission. Most malware are software‘s created with the intent of stealing
data. Using these software‘s, which are usually disguised as harmless pop-ups and such,
information about the users is collected without their knowledge.
4. Hacking
Hacking is unauthorized access over a computer system, and it usually involves modifying
computer hardware or software to accomplish a goal outside the creator‘s purpose.
5. Software Piracy
Unauthorized copying of purchased software is called software piracy. Making copies of the
software for commercial distribution, or resale is illegal. However software piracy is still
rampant around the globe, because it is almost impossible to put an end to it.
6. Fraud
Online fraud and cheating is one of the most lucrative businesses that are growing today in
the cyber space. Some of the cases of online fraud and cheating that have come to light are
Compiled By: 1. Trailokya Raj Ojha, Assistant Professror, Nepal Engineering College (nec)
73 2. Ishwor Pokhrel, Assistant Professor, Nepal Engineering College (nec)
Course Manual on: Social and Professional Issues in IT (SPIT)
those relating to credit card crimes, bank fraud, contractual crimes, internet scams, identity
theft, extortion etc.
7. Cyber stalking
Cyber stalking involves following a person's movements across the Internet by posting
threatening messages on the bulletin boards frequented by the victim, entering the chat-rooms
frequented by the victim, and constantly bombarding the victim with emails.
8. Obscene or Offensive Content
Includes contents of websites that may be distasteful, obscene, or offensive in many ways.
One of the major victims of this type of crime is child pornography.
Child pornography includes sexual images involving children under puberty, and post-
puberty and computer-generated images that appear to involve them in sexual acts.
9. Online Harassment
Any comment that may be considered degratory or offensive is considered harassment.
Harassment via the internet occurs in chat rooms, social networking sites, and e-mails.
10. Trafficking
Trafficking may assume different forms. It may be trafficking in drugs, human beings, arms
or weapons. These forms of trafficking are carried on under pseudonyms, encrypted emails,
and other internet technology.
11. Computer Vandalism
Vandalism means deliberately destroying or damaging property of another.
These acts may take the form of the theft of a computer, some part of a computer or a
peripheral attached to the computer, or by physically damaging a computer or its peripherals.
12. Spam
The unwanted sending of bulk e-mail for commercial purposes is called spam.
Although this is a relatively minor crime, recently new anti-spam laws have cropped up to
restrict the sending of these e-mails.
13. Phishing
• A criminal activity using social engineering techniques (a collection of techniques
used to manipulate people into performing actions or divulging confidential
information).
Compiled By: 1. Trailokya Raj Ojha, Assistant Professror, Nepal Engineering College (nec)
74 2. Ishwor Pokhrel, Assistant Professor, Nepal Engineering College (nec)
Course Manual on: Social and Professional Issues in IT (SPIT)
Compiled By: 1. Trailokya Raj Ojha, Assistant Professror, Nepal Engineering College (nec)
75 2. Ishwor Pokhrel, Assistant Professor, Nepal Engineering College (nec)
Course Manual on: Social and Professional Issues in IT (SPIT)
Web site owners should watch internet traffic and check any
irregularity on the site. Putting host-based intrusion detection
devices on servers may do this.
Use a security program that gives control over the cookies and
sends information back to the site, as leaving the cookies
unguarded might prove fatal.
Compiled By: 1. Trailokya Raj Ojha, Assistant Professror, Nepal Engineering College (nec)
76 2. Ishwor Pokhrel, Assistant Professor, Nepal Engineering College (nec)
Course Manual on: Social and Professional Issues in IT (SPIT)
Armenia
Bangladesh
Azerbaijan
7.3 Introduction to digital forensics
Digital Forensics is the preservation, identification, extraction, interpretation and
documentation of computer evidence which can be used in the court of law.
Branches of Digital Forensics
• Branches of Digital Forensics include:
– Network Forensics
– Firewall Forensics
– Database Forensics
– Mobile Device forensics
• The names of the different branches speak to the different areas which they focus on.
Compiled By: 1. Trailokya Raj Ojha, Assistant Professror, Nepal Engineering College (nec)
77 2. Ishwor Pokhrel, Assistant Professor, Nepal Engineering College (nec)
Course Manual on: Social and Professional Issues in IT (SPIT)
Compiled By: 1. Trailokya Raj Ojha, Assistant Professror, Nepal Engineering College (nec)
78 2. Ishwor Pokhrel, Assistant Professor, Nepal Engineering College (nec)
Course Manual on: Social and Professional Issues in IT (SPIT)
Compiled By: 1. Trailokya Raj Ojha, Assistant Professror, Nepal Engineering College (nec)
79 2. Ishwor Pokhrel, Assistant Professor, Nepal Engineering College (nec)
Course Manual on: Social and Professional Issues in IT (SPIT)
Case #1
• On Friday September 03, 2010 in Abu Dhabi, United Arab Emirates, a case
concerning the alleged raping of a 14 year old Brazilian girl was brought to the courts.
• As details of the case unfolded in the court the charges changed from rape to
consensual sex.
• Digital forensics helped in uncovering evidence in the form of intimate text messages
and photographs sent by the girl to the man from her mobile phone.
• The girl was eventually sentenced to six months in jail followed by deportation and
the 25 year old Pakistani bus driver was sentenced to one year in jail followed by
deportation.
• Digital forensics played an important role in the final verdict of the case
Case #2
• A large publicly traded financial institution contacted reputable firm Global Digital
Forensics (GDF) for assistance after suspecting multiple instance of fraud . It is
alleged that the company charged customer ‗hidden fees‘ to customers accounts.
• The problem one party faced included going through over 50 million transaction
records to find evidence that would increase the damages to be paid by the company.
• GDF using knowledge of the technology created processes that calculated the
information needed and assisted in drafting deposition notices and document requests
that narrowed the scope of the inquiry.
• This eased the concerns related to finding critical evidence and not spending huge
amounts of money doing it.
Case #3
• A pharmaceutical company received complaints that there was a dip in the usually
high sales in some geographical locations.
• It was discovered that large amounts of drugs were being diverted into the US and
being resold locally. An investigation led to the seizure of millions of dollar of
diverted drugs , computers and other electronic equipment.
• There was however a problem as all communication done between the perpetrators
through email which was encrypted and fairly complex as well as in a foreign
language.
• The Global Digital forensics (GDF) firm was contacted to carry out a digital analysis
of the computers seized to gain evidence.
• GDF forensic specialist decrypted and extracted a wealth of information from the
systems. GDF was able to provide documentation show that :
Compiled By: 1. Trailokya Raj Ojha, Assistant Professror, Nepal Engineering College (nec)
80 2. Ishwor Pokhrel, Assistant Professor, Nepal Engineering College (nec)
Course Manual on: Social and Professional Issues in IT (SPIT)
• The diverted drugs were being purchased from European and Canadian
Distributor and shipped to the US.
• The distributors controlled several pharmacies and nursing homes in the area.
• The distributors have been engaged in drug diversion for over 10 years.
• The distributor was repackaging vitamins manufactured to appear the same as
the prescription drugs and selling and shipping them to Asia
• The distributor was operating unlicensed pharmacies and nursing homes.
• The company suffered 13 million dollars a year in lost revenues.
What is the Future for Digital forensics?
• There is an increasing wide array of tools used to preserve and analyze digital
evidence.
• The single approach to utilize single evidence such as hard drives will change as
there is increasing size of hundreds of Gigabytes and Terabytes to be used.
• Huge targets will require more sophisticated analysis techniques and equipment.
• There will also be better collaborative functions to allow forensics investigators to
perform investigations a lot more efficiently that they do presently.
Compiled By: 1. Trailokya Raj Ojha, Assistant Professror, Nepal Engineering College (nec)
81 2. Ishwor Pokhrel, Assistant Professor, Nepal Engineering College (nec)
Course Manual on: Social and Professional Issues in IT (SPIT)
Unit 8
Intellectual property and legal issues
8.1 Intellectual Properties
Intellectual property (IP) is a category of property that includes intangible creations of the
human intellect. There are many types of intellectual property, and some countries recognize
more than others. The most well-known types are copyrights, patents, trademarks, and trade
secrets. It was not until the 19th century that the term "intellectual property" began to be
used, and not until the late 20th century that it became commonplace in the majority of the
world.
The main purpose of intellectual property law is to encourage the creation of a wide variety
of intellectual goods. To achieve this, the law gives people and businesses property rights to
the information and intellectual goods they create, usually for a limited period of time. This
gives economic incentive for their creation, because it allows people to profit from the
information and intellectual goods they create. These economic incentives are expected to
stimulate innovation and contribute to the technological progress of countries, which depends
on the extent of protection granted to innovators.
The intangible nature of intellectual property presents difficulties when compared with
traditional property like land or goods. Unlike traditional property, intellectual property is
"indivisible" – an unlimited number of people can "consume" an intellectual good without it
being depleted. Additionally, investments in intellectual goods suffer from problems of
appropriation – a landowner can surround their land with a robust fence and hire armed
guards to protect it, but a producer of information or an intellectual good can usually do very
little to stop their first buyer from replicating it and selling it at a lower price. Balancing
rights so that they are strong enough to encourage the creation of intellectual goods but not so
strong that they prevent the goods' wide use is the primary focus of modern intellectual
property law.
• Intellectual Property (IP) is a group of legal rights that provides protection over things
people create or invent.
• Typical methods of protection:
• Contract
• Trade Secrets
• Copyrights
• Trademarks
• Patents
Compiled By: 1. Trailokya Raj Ojha, Assistant Professror, Nepal Engineering College (nec)
82 2. Ishwor Pokhrel, Assistant Professor, Nepal Engineering College (nec)
Course Manual on: Social and Professional Issues in IT (SPIT)
Compiled By: 1. Trailokya Raj Ojha, Assistant Professror, Nepal Engineering College (nec)
83 2. Ishwor Pokhrel, Assistant Professor, Nepal Engineering College (nec)
Course Manual on: Social and Professional Issues in IT (SPIT)
• Copyrights
• Trademarks
• Trade Secrets
• Patents
Contracts
Contracts protect inventions in ways a patent or patent application can‘t. For example,
a contract can:
1. Limit the other person‘s ability to exploit your idea
2. Require the other person to assign an invention to you
3. Limit a manufacturer‘s ability to use your tooling for others
4. Require them to keep your idea a secret
A patent cannot do any of these things. Only a contract can do these things. A contract is an
agreement with those you have direct contact with, such as investors, independent
contractors, employees, and manufacturers.
• Affordable cost to gain protection
– Protection defined by contract
– Examples:
• non-compete terms
• anti-reverse engineering terms
• assignment of IP rights
• Length of time protection lasts
– Flexible
– Depends on terms of the contract
• Commercial Importance
– always important at some stage of business
• Enforcement – contract…
Copyrights
• ―Expression‖
– Art, Writing, Music, Movies, etc…
– Any ―work‖ reduced to a tangible medium of expression
• Policy
Compiled By: 1. Trailokya Raj Ojha, Assistant Professror, Nepal Engineering College (nec)
84 2. Ishwor Pokhrel, Assistant Professor, Nepal Engineering College (nec)
Course Manual on: Social and Professional Issues in IT (SPIT)
Compiled By: 1. Trailokya Raj Ojha, Assistant Professror, Nepal Engineering College (nec)
86 2. Ishwor Pokhrel, Assistant Professor, Nepal Engineering College (nec)
Course Manual on: Social and Professional Issues in IT (SPIT)
• Enforcement…
• Enforcement complicated by variation in State law
Patents
• Protects implementation of technical ideas
– Article of Manufacture (e.g., light bulb)
– System (e.g., cell phone)
– Composition of Matter (e.g., compounds)
– Process (e.g., process of making or using)
• Microwaving Food (Spencer)
• Search engine (Google)
• 1-click purchase (Amazon)
• Types of Patents
– Utility Patent
– Design Patent
– Plant Patent
• Relatively expensive to obtain
– Initial filing ~$8,000 - $12,000
– Prosecution ~ $10,000+
– Limited term of protection
– 20 years from filing
– Commercial Benefits
– Exclusivity
– Monopoly Pricing
– Licensing
• What is the standard for getting a patent?
– New
– Useful
– Non-obvious
• What do you get if you meet the standard?
– Right to exclude others from the invention for a limited time
– Not a right to use the invention
• What do you give up by getting a patent?
Compiled By: 1. Trailokya Raj Ojha, Assistant Professror, Nepal Engineering College (nec)
87 2. Ishwor Pokhrel, Assistant Professor, Nepal Engineering College (nec)
Course Manual on: Social and Professional Issues in IT (SPIT)
– You have to teach others how to make and use the invention
• What do you risk by not patenting your invention?
– i.e., trying to keep it a trade secret
– Someone else can patent it and exclude you from using it.
• Selecting what to Patent?
– Business Value:
• What is the likely value of the technology?
• Will exclusivity provide a competitive advantage?
• Does the technology align with your commercial products?
– Legal Strength:
• What is the novelty over prior art?
• Business Methods?
– Exclusivity:
• Will competitors have viable design-around options?
• Can infringement be detected?
• Patent Strategy - Benefits from Patents
– Monopoly Pricing
• Increase profit margins through exclusionary power
– Extra Income
• Generate income through licensing activities
– Access to Technology
• Cross-license to access other technologies
– Business Asset
• Can be used to assist in securing funding or obtaining desired exit
valuations
– Marketing Tool
• Patent Pending
• Chilling effect on competition
• Demonstrated expertise in a particular field
• Patent Strategies
– Aggressive/Licensing strategy
• Patent everything
Compiled By: 1. Trailokya Raj Ojha, Assistant Professror, Nepal Engineering College (nec)
88 2. Ishwor Pokhrel, Assistant Professor, Nepal Engineering College (nec)
Course Manual on: Social and Professional Issues in IT (SPIT)
IPR in Nepal
PLEASE FIND SEPARATE ATTACHMENT!
IT Related Laws in Nepal
Compiled By: 1. Trailokya Raj Ojha, Assistant Professror, Nepal Engineering College (nec)
90 2. Ishwor Pokhrel, Assistant Professor, Nepal Engineering College (nec)