Page 342 - Computer Science Class 11 Without Functions
P. 342

14                                SOCIETY, LAW AND ETHICS














          Chapter Outline


          14.1 Digital Footprints                            14.2 Social Networks
          14.3 Cyber Threats                                 14.4 Malware
          14.5 Browsing the Web Safely                       14.6 Data Protection
          14.7 Open Data                                     14.8 Licensing
          14.9 Cybercrime                                    14.10 Indian Information Technology Act (IT Act) 2000
          14.11 Technology and Society


        Introduction

        We live in the age of information technology. The use of Internet-enabled devices has increased manifold over the past
        decade. This has led to an increase in web services for communication, resource sharing, and e-commerce. Technology
        has substantially changed the way we communicate with each other, share information, and do business. Many of us
        use services such as email, video conferencing, online shopping, social networking, and e-banking for our day-to-day
        work. In this chapter, we will study various types of social networks and their impacts on society.  However, one must
        be cautious while using online services. People with malicious intentions might harm you for personal gain, and some
        people may harm you just for fun. For example, an intruder might entice you to install a malicious app on your phone
        so they can steal your password and use it to make money or spread rumours on social media using your Facebook
        account. Similarly, a malicious app may harm you by installing malware on your system that could secretly spy on you.
        We will explore ways to protect ourselves from security breaches. To protect our intellectual resources, we will talk
        about security measures such as copyrights, patents, and trademarks in the context of cybercrimes like plagiarism,
        copyright infringement, and trademark violation. We will also study the Indian IT Act 2000, which provides a legal
        framework for the use of IT-enabled services and prescribes legal remedies and punishments for violating the law.

        14.1 Digital Footprints

        A digital footprint is a trail of personal data that one leaves behind while using the Internet. It
        could include things like the sites you visit, how long you stay on each site, and the personal
        information you use to log in to a portal. It includes information that you share voluntarily on
        social media posts, blog profiles, online forms, etc., as well as information that is collected without
        your knowledge through cookies or other tracking apps. Various applications may collect your
        footprint in two different ways. While the information you leave willingly is known as an active
        digital footprint, the information that companies collect without your knowledge or approval is
        known as a passive digital footprint.

         340   Touchpad Computer Science-XI
   337   338   339   340   341   342   343   344   345   346   347