Societalimpacts XII
Societalimpacts XII
Societalimpacts XII
In recent years, the world around us has seen a lot of changes due to use of ‘Digital Technologies’. These changes have
made a dramatic impact on our lives, making things more convenient, faster, and easier to handle. In the past, a letter
would take days to reach, and every recipient would get his or her own copy and respond separately. Today, one can
send and receive emails to more than one person at a time. The instantaneous nature of electronic communications has
made us more efficient and productive.
From the banking industry to aviation, industrial production to e-commerce, especially with regard to the delivery of
their goods and services, all are now dependent on the use of computers and digital technologies. Applications of digital
technologies have redefined and evolved all spheres of human activities. Today more and more people are using digital
technologies through smartphones, computers, etc., with the help of high speed Internet.
Why did the digital technologies become so widespread? The introduction of personal computers (PCs) and Internet
followed by smartphones has brought these technologies to the common man.
While we reap the benefits of digital technologies, these technologies can also be misused. Let’s look at the impact of
these technologies on our society and the best practices that can ensure a productive and safe
digital environment for us.
Net Etiquettes
Netiquette is short for "Internet etiquette." Just like etiquette is a code of polite behavior in society, netiquette is a code
of good behavior on the Internet. This includes several aspects of the Internet, such as email, social media, online chat,
web forums, website comments, multiplayer gaming, and other types of online communication. One should be ethical,
respectful and responsible while surfing the Internet.
Be Ethical:
• No copyright violation: We should not use copyrighted materials without the permission of the creator or
owner.
• Share the expertise: it is good to share information and knowledge on Internet so that others can access it.
Be Respectful:
• Respect privacy: In general, privacy means the protection of personal information while using the internet. We
should respect this privacy and should not share those images, documents, files, etc., with any other digital
citizen without each others’ consent. Just as we expect others to respect our privacy, so should we respect the
privacy of others.
• Respect diversity: In a group or public forum, we should respect the diversity of the people in terms of
knowledge, experience, culture and other aspects.
Be Responsible:
• Avoid cyber bullying: any insulting, degrading or intimidating online behaviour like repeated posting of rumours,
giving threats online, posting the victim’s personal information, sexual harassment or comments aimed to
publicly ridicule a victim is termed as cyber bullying.
• Don’t feed the troll: an Internet troll is a person who deliberately sows discord on the Internet by starting
quarrels or upsetting people, by posting inflammatory or off topic messages in an online community, just for
amusement. Since trolls thrive on attention, the best way to discourage trolls is not to pay any attention to their
comments.
Communication Etiquettes
Digital communication includes email, texting, instant messaging, talking on the cell phone, audio or video conferencing,
posting on forums, social networking sites, etc.
Be Precise:
• Respect time: we should not waste precious time in responding to unnecessary . Also, we should not always
expect an instant response as the recipient may have other priorities.
• Respect Data Limits: very large attachments may be Avoided or compressed files or link of the files can be send
through cloud shared storage like Google Drive, Microsoft OneDrive, Yahoo Dropbox, etc.
Be Polite: During the communication we should be polite, non-aggressive and should avoid being abusive even if we
don’t agree with other’s point o view.
Be Credible: We should be cautious while making a comment, replying or writing an email or forum post as such acts
decide our credibility over a period of time.
Patent: A patent is usually granted for inventions. Unlike copyright, the inventor needs to apply (file) for patenting the
invention. When a patent is granted, the owner gets an exclusive right to prevent others from using, selling, or
distributing the protected invention. Patent gives full control to the patentee to decide whether or how the invention
can be used by others. A patent protects an invention for 20 years, after which it can be freely used.
Trademark: Trademark includes any visual symbol, word, name, design, slogan, label, etc., that distinguishes the brand
or commercial enterprise, from other brands or commercial enterprises. It also prevents others from using a confusingly
similar mark, including words or phrases. However, it may be possible to apply for the already existing trademark for
unrelated goods (any other goods/products).
Violation of IPR
Violation of intellectual property right may happen in one of the following ways:
Plagiarism: Plagiarism is stealing someone else’s intellectual work (idea, literary work, art etc) and representing it as
your own work without citing the source of information/owner. Even, failing in giving credit or acknowledging the
contribution of others in a collaborative effort/work to which you are also part of is also a Plagiarism. It is a serious
ethical offense and sometimes considered as an act of fraud. Even if we take contents that are open for public use, we
should cite the author or source to avoid plagiarism.
Copyright Infringement: Copyright infringement is when we use other person’s work without obtaining their permission
to use or we have not paid for it, if it is being sold.
Trademark Infringement: Trademark Infringement means unauthorised use of other’s trademark on products and
services. An owner of a trademark may commence legal proceedings against someone who infringes its registered
trademark.
Public Access and Open Source Software
Copyright sometimes put restriction on the usage of the copyrighted works by anyone else. If others are allowed to use
and built upon the existing work, it will encourage collaboration and would result in new innovations in the same
direction. Licenses provide rules and guidelines for others to use the existing work. When authors share their
copyrighted works with others under public license, it allows others to use and even modify the content.
Broadly the term open source software is used to refer to those categories of software programs whose licenses do not
impose much conditions. Such software, generally, give users freedom to run / use the software for many purpose, to
study and modify the program and to redistribute copies of either the original and modified program (without having to
pay royalties to previous developers).
The GNU General public license (GPL) and the Creative Commons (CC) are two popular categories of public licenses.
GPL (General Public License): GPL is the most widely used free software license which grants the recipients, rights to
copy, modify and redistribute the software and that the same rights are preserved in all derivative works.
CC (Creative Commons): CC licenses are a set of copyright licenses that give the recipients, rights to copy, modify and
redistribute the creative material, but giving the authors, the liberty to decide the conditions of licensing.
GNU GPL: GNU GPL is another free software license, which provides end users the freedom to run, study, share and
modify the software, besides getting regular updates.
Free Software: Free software means the software is freely accessible and can be freely used, changed,
improved, copied and distributed by all who wish to do so. And no payments are needed to be made for free
software.
Note: The main difference is that the Free Software emphasis on the importance of Freedom while Open
Source Software emphasis on the importance of technical process and business rules.
FOSS (Free and Open Source Software): A software which is free as well as open belongs to this category.
FLOSS (Free Libre / Livre and Open Source Software) : It refers to a software which is free software as well as
open source software. Here the word libre (Spanish word) and livre (Portuguese word) means freedom.
Freeware: ( note: should not be mistaken for open software or for fee software. It is different)
• The term freeware is generally used for software which is available free of cost and which allows
copying and further distribution but not modification and whose source code is not available.
• Freeware is distributed in binary form (ready to use) without any licensing fee. Ex. Microsoft Internet
Explorer
• Freeware is often used in marketing situations in order to sell additional products and to gain market
advantages and popularity.
Shareware:
• Made available with the right to use and redistribute copies but often after a certain period of time, a
license fee should be paid. (for trial periods)
• The source code is not available.
• Modifications to the software are not allowed.
• Distributed in binary form (ready to use) and often includes a built-in-timed mechanism or usually
limits functionality after a trial period.
Objective: to make the software available to try for as many users as possible.
Proprietary Software:
• Proprietary software is the software that is neither open nor freely available.
• Its use is regulated and further distribution and modification is either forbidden or requires special
permissions by the supplier or vendor.
• Source code of proprietary software is normally not available.
GNU (GNU’s Not Unix) : Its logotype show a gnu, an animal living in freedom. The GNU project was initiated by
Richard M. Stallman with an objective to create a system compatible with Unix but not identical with it. With
time, GNU project expanded and now it is not limited to only an operating system. Now it offers a wide range
of software including applications apart from operating system.
FSF (Free Software Foundation): It is a non-profit organization created for the purpose of supporting free
software movement. (founded by Richard Stallman)
OSI (Open Source Initiative): It is an organization for the purpose of supporting / promoting open source
software. OSI specifies the criteria for open source software and properly defines the terms and specifications
of open source software. (Founded by Bruce Perens and Erics Raymond)
W3C (World Wide Web Consortium): W3C is responsible for producing the software standards for World
Wide Web. Although industrial members fund W3C, it is vendor-neutral, and its products are freely available
to all.
Cyber Crime
Criminal activities or offences carried out in a digital environment can be considered as cyber crime. In such
crimes, either the computer itself is the target or the computer is used as a tool to commit a crime. Cyber
crimes are carried out against either an individual, or a group, or an organization or even against a country,
with the intent to directly or indirectly cause physical harm, financial loss or mental harassment. A cyber
criminal attacks a computer or a network to reach other computers in order to disable or damage data or
services. Apart from this, a cyber criminal may spread viruses and other malwares in order to steal private and
confidential data for blackmailing and extortion.
Hacking: Hacking is the act of unauthorized access to a computer, computer network or any digital system.
Hackers usually have technical expertise of the hardware and software. They look for bugs to exploit and
break into the system.
Hacking, when done with a positive intent, is called ethical hacking. Such ethical hackers are known as white
hat hackers. They are specialists in exploring any vulnerability or loophole during testing of the software. Thus,
they help in improving the security of a software or website.
A non-ethical hacker is the one who tries to gain unauthorized access to computers or networks in order to
steal sensitive data with the intent to damage or bring down systems. They are called black hat hackers or
crackers. Their primary focus is on security cracking and data stealing. They use their skill for illegal or
malicious purposes. Such hackers try to break through system securities for identity theft, monetary gain, to
bring a competitor or rival site down, to leak sensitive information, etc.
Phishing (Fraud Emails): It is the act of illegally acquiring personal and sensitive information such as online banking
details, credit card details, login details from a individual, using an authenticate looking email id or website. Phishing
attempts through phone calls or text messages are also common these days.
Identity Theft: Identity theft is the deliberate use of someone else's identity, usually as a method to gain a financial
advantage or obtain credit and other benefits in the other person's name, and perhaps to the other person's
disadvantage or loss. Identity thieves increasingly use personal information stolen from computers or computer
networks, to commit fraud by using the data gained unlawfully. A user’s identifiable personal data like demographic
details, email ID, banking credentials, passport, PAN, Aadhaar number and various such personal data are stolen and
misused by the hacker on behalf of the victim.
Given below are a few examples:
• Financial identity theft: when the stolen identity is used for financial gain.
• Criminal identity theft: criminals use a victim’s stolen identity to avoid detection of their true identity.
• Medical identity theft: criminals can seek medical drugs or treatment using a stolen identity.
Ransomware: This is another kind of cyber crime where the attacker gains access to the computer and blocks the user
from accessing, usually by encrypting the data. The attacker blackmails the victim to pay for getting access to the data,
or sometimes threaten to publish personal and sensitive information or photographs unless a ransom is paid.
Ransomware can get downloaded when the users visit any malicious or unsecure websites or download software from
doubtful repositories. Some ransomware are sent as email attachments in spam mails. It can also reach our system
when we click on a malicious advertisement on the Internet.
Dumpster Diving: It is the process of searching trash to obtain useful information about a person/business that can later
be used for the hacking purpose.
Shoulder Surfing: Shoulder surfing refers to the act of obtaining personal (ATM PIN, CREDIT CARD TRANSACTION) while
filling a form or the lock code of a phone by personal observation. This is especially effective in crowded places where a
person uses a computer, smartphone or ATM. If shoulder surfing occurs when there are very few people, the act
becomes suspicious very quickly. Binoculars, video cameras and vision-enhancing devices also are used, depending on
location and situation.
Cookies: Cookies are small data files, which are sent by the website you visit, used to track your record of visit to a
particular website.
Malware: Any malicious program on a computer or mobile device such as virus, worm, Trojan horse, spyware etc. are
collectively called Malware.
Virus: A computer virus is some lines of malicious code that can copy/multiply itself and can have detrimental effect on
the computers, by destroying data or corrupting the system.
1. It is able to replicate
2. It requires a host program to live
3. It is activated by external process (virus may exist on a system but will not be active or able to spread until a user
runs or opens the malicious host file or program.)
Worms: A worm is a self replicating program which eats up the entire disk space or memory. A worm keeps on creating
its copies until all the disk space or memory is filled. Ex. Super-nova, Mydoom, Melissa etc.
1. It is able to replicate
2. It is self-contained and does not require any host.
3. It is activated by creating process (it needs a multitasking system)
Spam / Spamming: Spamming refers to the sending of bulk mail by an identified or unidentified source. In non-malicious
form, bulk advertising mail is sent to many accounts. In malicious form (eg. Email bombing), the attacker keeps on
sending bulk mail until the mail server runs out of disk space.
How to avoid spams:
1. Create a filter that finds and does something to e-mail that you suspect to spam.
2. Do not register yourself with true id to sign up for things on internet.
Spyware: Spyware is a software which is installed on your computer to spy on your activities and report this data to
people willing to pay for it. These are used to spy on some-one either for legal or illegal purpose. Ex. Cool web search,
Zango etc. Some anti-spy software: AVG-Anti-spyware, Zone Alarm firewall, Microsoft Anti-spyware etc.
Adware: These are the programs that deliver unwanted ads to your computer (generally in pop-up form). They consume
your network bandwidth.
Trojan Horses: A Trojan horse is a program that appears harmless (such as text editor, utility software, game etc) but
actually performs malicious functions such as deleting or damaging files.
Sweeper: This is another malicious program used by hackers. It sweeps or deletes all the data from the system.
Denial of Services: This type of attack eats up all the resources of a system and the system or application come to halt.
These are the attacks which prevent the legitimate users of the system, from accessing or using the resources,
information or the capabilities of the system.
Impact on Health: As digital technologies have penetrated into different fields, we are spending more time in front of
screens, be it mobile, laptop, desktop, television, gaming console, music or sound device. But interacting in an improper
posture can be bad for us — both physically, and mentally. Besides, spending too much time on Internet can be
addictive and can have a negative impact on our physical and psychological well being. However, these health concerns
can be addressed to some extent by taking care of the way we position such devices and the way we position our
posture.
Ergonomics is a branch of science that deals with designing or arranging workplaces including the furniture, equipments
and systems so that it becomes safe and comfortable for the user. Ergonomics helps us in reducing the strain on our
bodies — including the fatigue and injuries due to prolonged use. When we continuously look at the screen for
watching, typing, chatting or playing games, our eyes are continuously exposed to the glare coming from the screens.
Looking at small handheld devices makes it worse. Eye strain is a symptom commonly complained by users of digital
devices. Ergonomically maintaining the viewing distance and angle, along with the position can be of some help.
The figure shows the posture to be
maintained in order to avoid fatigue
caused due to prolonged use of computer
system and other digital devices. However,
to get rid of dry, watering, or itchy eyes, it
is better to periodically focus on distant
objects, and take a break for outdoor
activities.
Bad posture, backaches, neck and
shoulder pains can be prevented by
arranging the workspace as recommended
by ergonomics. Overuse of keyboards (be
it physical keyboard or touch-screen-base
d virtual keyboard) not aligned
ergonomically, can give rise to a painful
condition of wrists and fingers, and may
require medical help in the long run.
Stress, physical fatigue and obesity are the
other related impacts the body may face if
one spends too much time using digital
devices.