0% found this document useful (0 votes)
8 views

Socio Cyberinformatics

Socio cyber informatics
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views

Socio Cyberinformatics

Socio cyber informatics
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

Chapter 4.

SOCIO CYBER INFORMATICS

Social Ethics issues of information Technology:


1. Privacy and Freedom.
2. Internet and Privacy.
3.Information systems and intellectual Property
4. Accountability, Liability and Control.
5.System Quality and Related issues.
6.Employment and Productivity.
7.Individuality.
8.The Quality of life.
9.Computer Crime and Abuse
10.Health problems.
DIGITAL DIVIDE.
The digital divide is a term that refers to the gap between
demographics and regions that have access to modern information
and communications technology (ICT), and those that don't or have
restricted access.
FACTORS THAT CONTRIBUTES TO THE DIGITAL DIVIDE.
1.Gender
2.Physical disability.
3.Physical access.
4.Lack of ICT skills
5.Age.
6.Family structure.
7.Motivation.

EFFECTS OF DIGITAL DIVIDE.


1.Economic inequality.
2.Effect on Education.
3.Democracy.
4.Economic Growth.
5.Social Mobility.

DIGITAL NATIVES
A digital native is a person who grew up with the presence of digital
technology or in the information age. Having grown up in IT's
presence, digital natives are comfortable with and fluent in
technology.

Cyberspace
Cyberspace is an interconnected digital environment. It is a type of
virtual world popularized with the rise of the Internet.
IT INDUSTRY OPPORTUNITIES.
1.Infrastructure Outsourcing.
2.Hardwarev support.
3.IT consulting.
4.Business Process outsourcing.
5.Infrastructure and Network integration service.
6.Application and software related services.
7.Hardware.

IT INDUSTRY NEW THREEATS.


1.Hardware and software failure
2.Malware
3.Viruses.
4.Spam, Scams and phishing.
5.Humon error.
SPAM.
Spam is any unsolicited communication sent in bulk. Usually sent via
email, spam is also distributed through text messages (SMS), social
media, or phone calls. Spam messages often come in the form of
harmless (though annoying) promotional emails. But sometimes spam is
a fraudulent or malicious scam.
METHODS TO AVOID SPAM.
1. Be careful about releasing your email address. ...
2. Check privacy policies. ...
3. Be aware of options selected by default. ...
4. Use filters or spam tagging. ...
5. Report messages as spam. ...
6. Don't follow links in spam messages. ...
7. Disable the automatic downloading of graphics in HTML mail

COOKIES
A cookie is a piece of data from a website that is stored within a
web browser that the website can retrieve at a later time. Cookies
are used to tell the server that users have returned to a particular
website.
ADWARE
Adware in cyber security refers to a type of malware that displays
unwanted advertisements on your computer or device. Adware is
commonly activated unknowingly when users are trying to install
legitimate applications that adware is bundled with.

SPYWARE
Spyware is malicious software that enters a user's computer,
gathers data from the device and user, and sends it to third parties
without their consent. A commonly accepted spyware definition is a
strand of malware designed to access and damage a device without
the user's consent.
WHO IS SPYING?
1.Online Attackers
2.Marketing Organizations.
3.Spying by a trusted insider.
MALEWARE
Malware, short for malicious software, refers to any intrusive
software developed by cybercriminals (often called hackers) to steal
data and damage or destroy computers and computer systems.
Examples of common malware include viruses, worms, Trojan
viruses, spyware, adware, and ransomware.
PHISHING.
A technique for attempting to acquire sensitive data, such as bank
account numbers, through a fraudulent solicitation in email or on a
web site, in which the perpetrator masquerades as a legitimate
business or reputable person.
INTERNET HOAX.
A hoax news report conveys a half-truth used deliberately to
mislead the public. Hoax may serve the goal of propaganda or
disinformation – using social media to drive web traffic and amplify
their effect.
HACKING.
A commonly used hacking definition is the act of compromising digital
devices and networks through unauthorized access to an account or
computer system. Hacking is not always a malicious act, but it is most
commonly associated with illegal activity and data theft by cyber
criminals.
TYPES OF HACKING.
1.Website hacking.
2.Network hacking.
3.Email hacking.
4.Ethical hacking.
5.Password hacking.
REMEDIES OF HACKING.
1.Checking system securities.
2.Use of firewalls
3.Data encryption.
TROJAN HORSES
A Trojan Horse Virus is a type of malware that downloads onto a computer
disguised as a legitimate program.
* Deleting data
* Blocking data
* Modifying data
* Copying data

COMPUTER THREATS

1. Computer Virus
A computer virus is a type of malicious software, or malware, that
spreads between computers and causes damage to data and
software. Computer viruses aim to disrupt systems, cause major
operational issues, and result in data loss and leakage.
Protection from virus
+ Antivirus programs
+ Acquisition of software from reliable sources
+ Testing new applications in single computer

2. WORMS
A computer worm is a type of malware whose primary function is to
self-replicate and infect other computers while remaining active on
infected systems. A computer worm duplicates itself to spread to
uninfected computers.
3. LOGIC BOMBS AND TIME BOMBS
A logic bomb is a set of instructions in a program carrying a
malicious payload that can attack an operating system,
program, or network.
A time bomb is a malicious piece of code that activates at a
specific date and time or after a certain amount of time has
elapsed.
4. WEB JACKING.
The hackers implant a fake website, which, when you open it,
takes you to another fraudulent website, where the attackers
try to extract sensitive information.
5. Email bombing
An e-mail bomb is the sending of a huge number of e-mails to one system or
person. We also call it a ‘mail bomb.’ It is a kind of technological attack
or cyber attack.

6. Salami attacks.
A salami attack is a type of cybercrime that attackers typically use to commit financial
crimes. Criminals steal money or resources from financial accounts on a system one
at a time. This attack occurs when several minor attacks combine to form a powerful
attack.

CYBER ETHICS
Cyber ethics is a branch of applied ethics that examines
moral, legal, and social issues at the intersection of
computer/information and communication technologies.
Cybercrime is a type of crime involving a computer or a computer
network. The computer may have been used in committing the
crime, or it may be the target.

CYBER ADDICTIONS
Relationship
Money
Information searching.
Gaming.
Sex.

RISK FACTORS FOR INTERNET ADDICTIONS


1. Anxiety
2. Depression
3. Other addictions
4. Lack of social support
5. Teenagers

INFORMATION OVERLOAD.
Information overload is a state of being overwhelmed by the
amount of data presented for one's attention or processing.

HEALTH ISSUES.
Increased blood pressure
Low mood
Low energy
A decreased brain performance
Difficult to concentrate
Impaired vision
Diminished productivity
Insomnia
Vivid dreams
Tiredness.

SOLUTIONS TO INFORMATION OVERLOAD


1. Filtering
2. Multitasking
3. Escaping
4. Delegating
5. Shifting
6. Limit time TV and internet.
7. Send only necessary email
8. Use charts and diagrams
9. Write clear and short
10. Limit web page content.

E-WASTE
E-waste or electronic waste is created when an electronic
product is discarded after the end of its useful life. The rapid
expansion of technology and the consumption driven society
results in the creation of a very large amount of e-waste.

IMPACT OF E WASTE
1. Environmental impact
2. Economic impact

MANAGEMENT OF E WASTE
1. Inventory management
2. Production process modification
3. Volume reduction
4. Recovery and reuse
5. Sustainable product design
MANAGEMENT OF E WASTE IN INDIA.
E-waste management refers to properly disposing and managing
electronic waste, including old or discarded electronic gadgets such
as phones, computers, and televisions. The following are the some
of the management options suggested for the government,
industries and the public.
1. Responsibilities of the government
 Proper disposal of hazardous waste is required
 Government should setup regulatory agencies in
each district
 Government must encourage research in to the
development and standard hazardous waste
disposal
 Government should enforce strict regulation
 Heavy fine levied on industries
 Government should encourage and support NGOs
2. Responsibility of industries
 Generators of waste should take responsibility to
determine the output
 All personnel involved in handling e-waste
 Companies should adopt waste minimisation
techniques
 Manufacturers, distributors and retailers should
undertake the responsibility of recycling/disposal of
their own products.
3. Responsibilities of citizen
 Recycling
 Donating electronics
Green computing
Green computing, or sustainable computing, is the practice of
maximizing energy efficiency and minimizing environmental impact
in the ways computer chips, systems and software are designed
and used.
Why green computing
This is the exact mission of green computing: to reduce the
environmental impact that computing systems have on our planet
and ultimately encourage the use of more sustainable technologies.
Green computing, when executed well, can be extremely beneficial
for the environment.
1. Green use
2. Green disposal
3. Green design
4. Green manufacturing

The benefits of green technology are:


 Reduced energy consumption
 Reduced waste
 Improved product design and performance
 Reduced business expenses
 Eco-friendly agriculture
 Reduced water consumption
 Reduced air pollution
 Reduced carbon footprint
 Employment opportunities
 Tax incentives and government grants

E-governance
E-governance, meaning 'electronic governance' is using information
and communication technologies (ICTs) (such as Wide Area
Networks, the Internet, and mobile computing) at various levels of
the government
Stages of E-governance
1. Computerisation
2. Networking
3. Websites
4. Online interactivity
Types of E-governance
1. G2G
2. G2C
3. G2B
4. G2E
Advantages of E-governance
1. Quality services for citizen
2. Access to information
3. Time saving
4. Reduce cost
5. Transparency
6. Accountability
7. Improved efficiency

Disadvantages of E-governance
1. Lack of equality in access to the internet
2. Cyber crime
3. Lack of trust
4. False sense
5. Costly infrastructure
E-governance initiatives in INDIA
1. Friends
Fast reliable efficient network for disbursement of
services is a part of the Kerala state IT mission
2. Bhoomi
The department of in Karnataka state as computerized
20 million records of land ownership.
3. E-seva
Its is improved version of the twins project, cities of
Hyderabad and Secunderabad in Andrapradesh
4. CARD
The computer aided administration of registration
department in Andrapradesh
5. Gyandoot
Gyandoot, which means 'purveyor of knowledge' in Hindi, is a
government-to-citizen, intranet-based service portal, implemented in the
Dhar district of the state of Madhya Pradesh, India, in January 2000.
6.Vidya Vahini
The Vidya Vahini project was launched in 2003 to offer IT
education in schools. Under this project, the schools are provided
computer labs to facilitate IT education, access to the Internet, online
library, academic services, web broadcast and E-learning.
7.Akshaya.
Akshaya has to surpass many challenges, everyone who respect its
potential is keen to seek something innovative. Akshaya, an ambitious endeavor of
the State of Kerala was inaugurated by Dr. APJ Abdul Kalam, on November 18,
2002.

The end

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy