Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
10 views

Unit 3 notes cs

Uploaded by

jayden meinrad
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views

Unit 3 notes cs

Uploaded by

jayden meinrad
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

Unit 3 Notes: Society, Law, and Ethics

1. Society and Technology

 Technology influences how people communicate and form


communities. Social media, for example, connects people globally
but can also lead to issues like reduced face-to-face interaction.

 Impact: Technology can bring people closer (e.g., video calls) but
also raise concerns about overuse, privacy, and misinformation.

Example: Smartphones enable instant global communication, yet


excessive screen time may harm real-life relationships.

2. Law and Technology

 Laws regulate technology to protect intellectual property, ensure


data privacy, and combat cybercrime.

 Intellectual Property Rights (IPR) include:

o Copyright: Protects original works like books or music.


Example: Publishing a story without the author’s permission
is a copyright violation.

o Patents: Safeguard inventions, granting inventors exclusive


rights.
Example: A patented foldable smartphone design prevents
others from copying it.

o Trademarks: Protect logos or brand identifiers.


Example: The Nike “swoosh” ensures authenticity of their
products.

Why It Matters:

 Protects creativity, fosters innovation, and ensures fair competition.

3. Ethics in Technology

 Ethics guide decisions in areas like AI, data privacy, and equitable
access to technology.

 AI Ethics: Addresses concerns over computers making critical


decisions, such as medical diagnoses.
Example: Should a self-driving car prioritize passenger safety or
pedestrians in emergencies?
 Digital Divide: Highlights the gap between those with access to
technology and those without, raising questions about fairness.

Key Challenge: Balancing the benefits of technology (efficiency,


innovation) with moral responsibilities.

4. Digital Footprint

 Your digital footprint is the trail of data left by your online activities.

o Active Footprint: Intentional actions like posting on social


media.

o Passive Footprint: Data collected without your direct input,


such as browsing history.

Why It Matters:

 Affects privacy, reputation, and security.


Example: Employers may review social media profiles before hiring;
an embarrassing post could harm your chances.

Tips for Managing Your Footprint:

1. Think before you post: Avoid sharing sensitive or inappropriate


content.

2. Adjust privacy settings: Restrict who can view your profiles.

3. Regularly search your name: Identify and remove unwanted


information.

5. Cybercrime

 Cybercrime includes hacking, phishing, ransomware, and


cyberbullying.

Types and Examples:

1. Hacking: Unauthorized access to computer systems.


Example: Breaking into email accounts to steal sensitive data.

2. Phishing: Fake emails or messages to steal personal information.


Example: Scammers pretending to be a bank to obtain passwords.

3. Ransomware: Malware locks files and demands payment to unlock


them.
Example: An attack encrypts your computer files, asking for
payment in cryptocurrency.
4. Cyberbullying: Harassment using digital platforms.
Example: Sending harmful messages on social media to intimidate
someone.

Why It Matters:

 Awareness of these threats ensures you can protect yourself and


others online.

6. Open Source Software (OSS)

 OSS allows users to inspect, modify, and distribute software freely,


encouraging collaboration.

 Key Licenses:

o Creative Commons: Protects creative works while allowing


controlled sharing.
Example: An illustration shared under CC BY allows others to
reuse it with attribution.

o GPL (General Public License): Ensures modifications to


software remain open-source.
Example: Linux operating system is GPL-licensed.

o Apache License: Offers flexibility in combining open-source


and proprietary uses.

Why It Matters:

 Promotes innovation, cost-efficiency, and community collaboration.

7. E-Waste Management

 E-waste refers to discarded electronics like phones or computers.


Proper disposal protects the environment and allows recovery of
valuable materials like gold or silver.

How to Dispose E-Waste:

1. Recycling Programs: Local centers handle electronic waste safely.

2. Manufacturer Take-Back: Companies recycle old gadgets (e.g.,


trade-in programs for smartphones).

3. Donate: Working devices can benefit schools or charities.

Why It Matters:
 Prevents harmful chemicals (e.g., mercury) from polluting the
environment and conserves resources.

8. The Information Technology Act (IT Act), 2000

 Provides a legal framework for electronic transactions, cybercrime


regulation, and e-governance in India.

 Key Elements:

o Legal recognition of electronic records and signatures.

o Facilitates e-governance by enabling secure online


transactions.

o Addresses cybercrime, including hacking and identity theft.

Real-World Example:
Electronic contracts are legally valid, ensuring businesses can operate
digitally without physical paperwork.

Why It Matters:

 Builds trust in digital systems, supports cybersecurity, and promotes


e-commerce.

9. Technology and Society: Gender and Disability Issues

 Technology should be accessible to everyone, but challenges exist.

Gender Issues:

 Gender gap in tech fields due to stereotypes or lack of


encouragement.
Example: Few women in coding workshops may discourage
participation.

Disability Issues:

 Accessibility challenges like lack of screen readers for visually


impaired users.
Example: A student with visual impairment needs text-to-speech
features to navigate websites.

Solutions:

1. Inclusive Design: Create tech that works for all users (e.g., websites
with screen readers).
2. Awareness: Train educators and developers on accessibility.

3. Encouragement: Promote participation through targeted programs


(e.g., coding workshops for girls).

Why It Matters:

 Ensures equitable access to technology and benefits from diverse


perspectives.

You might also like