0% found this document useful (0 votes)
43 views5 pages

Unit 3 Notes Cs

Uploaded by

jayden meinrad
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
43 views5 pages

Unit 3 Notes Cs

Uploaded by

jayden meinrad
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

Unit 3 Notes: Society, Law, and Ethics

1. Society and Technology

 Technology influences how people communicate and form


communities. Social media, for example, connects people globally
but can also lead to issues like reduced face-to-face interaction.

 Impact: Technology can bring people closer (e.g., video calls) but
also raise concerns about overuse, privacy, and misinformation.

Example: Smartphones enable instant global communication, yet


excessive screen time may harm real-life relationships.

2. Law and Technology

 Laws regulate technology to protect intellectual property, ensure


data privacy, and combat cybercrime.

 Intellectual Property Rights (IPR) include:

o Copyright: Protects original works like books or music.


Example: Publishing a story without the author’s permission
is a copyright violation.

o Patents: Safeguard inventions, granting inventors exclusive


rights.
Example: A patented foldable smartphone design prevents
others from copying it.

o Trademarks: Protect logos or brand identifiers.


Example: The Nike “swoosh” ensures authenticity of their
products.

Why It Matters:

 Protects creativity, fosters innovation, and ensures fair competition.

3. Ethics in Technology

 Ethics guide decisions in areas like AI, data privacy, and equitable
access to technology.

 AI Ethics: Addresses concerns over computers making critical


decisions, such as medical diagnoses.
Example: Should a self-driving car prioritize passenger safety or
pedestrians in emergencies?
 Digital Divide: Highlights the gap between those with access to
technology and those without, raising questions about fairness.

Key Challenge: Balancing the benefits of technology (efficiency,


innovation) with moral responsibilities.

4. Digital Footprint

 Your digital footprint is the trail of data left by your online activities.

o Active Footprint: Intentional actions like posting on social


media.

o Passive Footprint: Data collected without your direct input,


such as browsing history.

Why It Matters:

 Affects privacy, reputation, and security.


Example: Employers may review social media profiles before hiring;
an embarrassing post could harm your chances.

Tips for Managing Your Footprint:

1. Think before you post: Avoid sharing sensitive or inappropriate


content.

2. Adjust privacy settings: Restrict who can view your profiles.

3. Regularly search your name: Identify and remove unwanted


information.

5. Cybercrime

 Cybercrime includes hacking, phishing, ransomware, and


cyberbullying.

Types and Examples:

1. Hacking: Unauthorized access to computer systems.


Example: Breaking into email accounts to steal sensitive data.

2. Phishing: Fake emails or messages to steal personal information.


Example: Scammers pretending to be a bank to obtain passwords.

3. Ransomware: Malware locks files and demands payment to unlock


them.
Example: An attack encrypts your computer files, asking for
payment in cryptocurrency.
4. Cyberbullying: Harassment using digital platforms.
Example: Sending harmful messages on social media to intimidate
someone.

Why It Matters:

 Awareness of these threats ensures you can protect yourself and


others online.

6. Open Source Software (OSS)

 OSS allows users to inspect, modify, and distribute software freely,


encouraging collaboration.

 Key Licenses:

o Creative Commons: Protects creative works while allowing


controlled sharing.
Example: An illustration shared under CC BY allows others to
reuse it with attribution.

o GPL (General Public License): Ensures modifications to


software remain open-source.
Example: Linux operating system is GPL-licensed.

o Apache License: Offers flexibility in combining open-source


and proprietary uses.

Why It Matters:

 Promotes innovation, cost-efficiency, and community collaboration.

7. E-Waste Management

 E-waste refers to discarded electronics like phones or computers.


Proper disposal protects the environment and allows recovery of
valuable materials like gold or silver.

How to Dispose E-Waste:

1. Recycling Programs: Local centers handle electronic waste safely.

2. Manufacturer Take-Back: Companies recycle old gadgets (e.g.,


trade-in programs for smartphones).

3. Donate: Working devices can benefit schools or charities.

Why It Matters:
 Prevents harmful chemicals (e.g., mercury) from polluting the
environment and conserves resources.

8. The Information Technology Act (IT Act), 2000

 Provides a legal framework for electronic transactions, cybercrime


regulation, and e-governance in India.

 Key Elements:

o Legal recognition of electronic records and signatures.

o Facilitates e-governance by enabling secure online


transactions.

o Addresses cybercrime, including hacking and identity theft.

Real-World Example:
Electronic contracts are legally valid, ensuring businesses can operate
digitally without physical paperwork.

Why It Matters:

 Builds trust in digital systems, supports cybersecurity, and promotes


e-commerce.

9. Technology and Society: Gender and Disability Issues

 Technology should be accessible to everyone, but challenges exist.

Gender Issues:

 Gender gap in tech fields due to stereotypes or lack of


encouragement.
Example: Few women in coding workshops may discourage
participation.

Disability Issues:

 Accessibility challenges like lack of screen readers for visually


impaired users.
Example: A student with visual impairment needs text-to-speech
features to navigate websites.

Solutions:

1. Inclusive Design: Create tech that works for all users (e.g., websites
with screen readers).
2. Awareness: Train educators and developers on accessibility.

3. Encouragement: Promote participation through targeted programs


(e.g., coding workshops for girls).

Why It Matters:

 Ensures equitable access to technology and benefits from diverse


perspectives.

You might also like