6.1 Introduction
The introduction of digital technologies has significantly changed the world in recent years, making communication faster and more convenient.
These technologies are now essential in various sectors, including banking, aviation, industrial production, and e-commerce, for the delivery of goods and services.
The widespread use of digital technologies can be attributed to the availability of personal computers (PCs), the Internet, and smartphones.
However, digital technologies can also be misused, making it crucial to follow best practices that ensure a safe and productive digital environment.
More people are using digital technologies through smartphones and computers, highlighting the need for a secure and efficient online experience.
======
6.2 Digital Footprints
Digital footprints are data trails that reflect online activities, created through web applications like email, online purchases, and game scores.
This data can include websites visited, emails sent, computer IP address, location, and device-specific details, and can be used for targeted advertising or misused.
There are two types of digital footprints: active, which includes intentional data submission (emails, posts), and passive, which includes unintentional data generation (website visits, browsing).
Digital footprints can grow with increased internet usage and are stored in application servers, with no guarantee of complete elimination.
Online activities leave data traces on the internet and computing devices, which can be used to trace user, location, device, and usage details.
======
6.3 Digital Society and Netizen
Digital society is a society where digital technologies are used in various human activities like communication, social networking, banking, shopping, entertainment, education, transportation, etc.
A netizen or digital citizen is an individual who uses digital technology and internet.
Good netizens are responsible digital citizens who practice safe, ethical, and legal use of digital technology.
Netiquettes, communication etiquettes, and social media etiquettes are essential practices for a responsible netizen.
Various services that can be availed online include communication, social networking, banking, shopping, entertainment, education, and transportation.
======
6.3.1 Net Etiquettes
Net etiquettes include being ethical, respectful, and responsible while surfing the Internet.
Being ethical involves not violating copyrights and sharing expertise by providing true and unambiguous information.
Respecting privacy and diversity is essential while interacting with other digital citizens in a group or public forum.
Being responsible includes avoiding cyberbullying and understanding its implications, and knowing how to report abusive or inappropriate posts.
It is crucial not to pay attention to Internet trolls to discourage them, as they thrive on attention.
======
6.3.2 Communication Etiquettes
Digital communication includes various forms such as email, texting, instant messaging, and audio/video conferencing.
It’s important to follow communication etiquettes in digital forums, including being precise, polite, and credible.
Being precise means respecting time and data limits, for example by avoiding unnecessary emails or large attachments.
It’s important to note that anything posted on the internet becomes part of the user’s digital footprint and cannot be permanently deleted.
Being polite involves avoiding aggression and abuse, even when disagreeing with others’ points of view. Credibility is built over time through cautious and reliable online communication.
======
6.3.3 Social Media Etiquettes
Social media etiquettes are essential for safe and responsible use of social media platforms.
Users should choose strong and frequently changed passwords, never share personal credentials, and be cautious while befriending unknown people.
It is important to think before sharing personal photos and uploading/sending sensitive files, as they can’t be completely deleted.
Users should be aware of fake news, messages, and posts, and not blindly believe everything they come across.
Always mention the source of ideas or resources used in projects or writeups to maintain integrity and avoid plagiarism.
======
6.4 Data Protection
Data protection is primarily concerned with the privacy of digital data.
Sensitive data, if breached or compromised, can cause harm, embarrassment, inconvenience, or unfairness to an individual.
Examples of sensitive data include biometric information, health information, financial information, and personal documents or media.
Privacy of sensitive data can be ensured through encryption, authentication, and other secure methods.
Countries have their own data protection policies (laws) to guide users on processing, storage, and transmission of sensitive information, with the aim of protecting such information from unauthorized modification or disclosure.
======
6.4.1 Intellectual Property Right (IPR)
Intellectual Property Rights (IPR) refer to the protection of inventions, literary and artistic expressions, designs and symbols, names and logos.
Copyrights, patents, and trademarks are forms of IPR. Copyrights are automatically granted to creators for original works, preventing others from copying, using, or selling the work without permission.
Patents are granted for inventions, giving the owner exclusive rights to prevent others from using, selling, or distributing the protected invention for 20 years.
Trademarks distinguish brand or commercial enterprises from others, preventing others from using confusingly similar marks.
End User License Agreement (EULA) outlines the terms and conditions of software purchase, including the number of copies that can be installed, source availability, and modification/redistribution permissions.
======
6.4.2 Licensing
Licensing is the legal term for the agreement that permits use of copyrighted material, often for a price.
Copyright is the legal right of the creator to protect original work, distinct from licensing.
Plagiarism is using others’ work without proper citation, while copyright infringement is using another’s work without permission or payment.
Software licensing outlines the authorized use of digital material, including software and digital art or literature.
Violation of license agreement guidelines is a criminal offense, considered an infringement of Intellectual Property Rights (IPR).
======
6.4.3 Violation of IPR
Plagiarism is presenting someone else’s idea or work as one’s own. It includes copying contents from the internet without citing the source or the original creator, or deriving an idea or a product from an already existing one without giving credit.
Copyright Infringement is using another person’s work without their permission or not paying for it, if it is being sold. Downloading an image from the internet and using it in a project without the owner’s permission, even after giving reference, is a violation of copyright.
Trademark Infringement is the unauthorized use of another’s trademark on products and services. The owner of a trademark can take legal action against someone who infringes its registered trademark.
CC licenses allow the recipients to copy, modify, and redistribute creative material, while giving the authors the liberty to decide the conditions of licensing.
GPL is the most widely used free software license, granting the recipients rights to copy, modify, and redistribute the software, with the same rights preserved in all derivative works.
======
6.4.4 Public Access and Open Source Software
Copyright restrictions can limit the usage of copyrighted works by others, but public licenses can allow use and modification.
Open source licenses, such as GNU General Public License (GPL) and Creative Commons (CC), provide guidelines for using existing work.
CC is used for creative works, allowing distribution and building upon the work, while GPL is primarily for software, allowing modification and distribution.
Free and open source software (FOSS) is freely available for anyone, with source code open for modification and improvement.
Software piracy is the unauthorized use or distribution of software, and should be avoided as it affects the software industry and economy.
======
6.5 Creative Commons
The Creative Commons (CC) licenses allow varying degrees of use and distribution of creative work.
The most accommodating license is CC BY, which allows others to distribute, remix, tweak, and build upon the work, even commercially, as long as they credit the original creator.
CC BY-SA allows others to remix, tweak, and build upon work for commercial purposes, as long as credit is given and the new creations are licensed under identical terms.
CC BY-ND allows others to reuse the work for any purpose, including commercially, but it cannot be shared with others in adapted form, and credit must be provided to the original creator.
CC BY-NC permits others to remix, tweak, and build upon the work non-commercially, with credit given to the original creator.
The most restrictive CC license, CC BY-NC-ND, only allows others to download and share the work with others, as long as they credit the original creator and do not change or use it commercially.
======
6.6 Cyber Crime
Cyber crime refers to criminal activities or offenses carried out in a digital environment, with the intent to directly or indirectly cause physical harm, financial loss, or mental harassment.
The computer can be both the target and tool for committing cyber crimes. Cyber criminals can attack a computer or network to disable or damage data or services, spread viruses and malware to steal private data for blackmailing and extortion.
A computer virus is malicious code that can copy itself and have detrimental effects on computers, while malware is software designed to gain unauthorized access to computer systems.
The nature of cyber crimes is increasing rapidly, with frequent reports of hacking, ransomware attacks, denial-of-service, phishing, email fraud, banking fraud, and identity theft.
To unsubscribe from a mail group or block an email sender, one can use the unsubscribe option at the bottom of the email or block the sender’s email address in the email settings.
======
6.6.1 Hacking
Hacking is unauthorized access to a computer, network, or digital system, often exploiting bugs.
Ethical hacking, or white hat hacking, is hacking with positive intent, used for exploring vulnerabilities to improve security.
Ethical hackers may exploit a website to discover security loopholes, then report their findings to the owner.
Non-ethical hackers, or black hat hackers, hack for illegal purposes like data theft, system damage, or identity theft.
It’s crucial to only open email links or attachments from trusted sources to avoid potential viruses or malicious websites.
======
6.6.2 Phishing and Fraud Emails
Phishing is an unlawful activity using fake websites or emails to fraudulently collect sensitive personal details.
The most common phishing method is email spoofing, where a fake email address is used, often resembling a trusted source.
Identity theft is a type of phishing attack where a user’s personal data is stolen and misused, often for monetary gain or to avoid detection of true identity.
Examples of identity theft include financial, criminal, and medical identity theft.
To file a complaint regarding cybercrime, one can approach the local cyber cell after gathering necessary information and evidence.
======
6.6.3 Ransomware
Ransomware is a type of cyber crime where the attacker gains access to the victim’s computer, encrypts the data, and demands payment in exchange for decryption.
It can be downloaded through malicious or unsecure websites, software from doubtful repositories, email attachments in spam mails, or malicious advertisements on the Internet.
Digital signatures are the digital equivalent of paper certificates, working on a unique digital ID issued by a Certificate Authority (CA) to the user.
Digital signatures can authenticate a document by attaching the user’s identity to it.
In India, digital signatures can be issued by a licensed Certifying Authority (CA) under Section 24 of the IT-Act 2000.
======
6.6.4 Combatting and Preventing Cyber Crime
Cyber crime can be combatted using a proactive approach: staying alert and seeking legal help.
Safety measures to reduce risk include taking regular data backups and using antivirus software.
Users should avoid pirated software, download only from secure sites, and keep system software updated.
It’s important to use strong, unique passwords, avoid untrusted websites, and be cautious with cookies and online transactions.
Securing wireless networks with strong passwords and regular changes is also crucial.
======
6.7 Indian Information Technology Act (IT Act)
The Information Technology Act, 2000 (IT Act) in India provides guidelines for processing, storage, and transmission of sensitive information to protect sensitive personal data and safeguard the rights of Internet users.
The IT Act outlines cyber crimes and penalties, and establishes the Cyber Appellate Tribunal to resolve disputes arising from cyber crimes, such as tampering with computer source documents, hacking, and using another person’s password.
The IT Act provides a legal framework for electronic governance, giving recognition to electronic records and digital signatures.
The IT Act is necessary for people to perform transactions over the Internet through credit cards without fear of misuse, and empowers government departments to accept filing, creation, and storage of official documents in digital format.
In many Indian states, there are cyber cells in police stations where one can report any cyber crime. The IT Act is amended in 2008 to keep up with the changing nature of fraudulent activities and crimes.
======
6.8 E-waste: Hazards and Management
E-waste, or electronic waste, consists of discarded electric or electronic gadgets and devices.
Leaching is a process of removing a substance from another substance by passing water through it.
E-waste is a rapidly growing environmental hazard, with more than 5% of municipal solid waste being e-waste globally.
The increase in electronic equipment usage has led to a significant rise in discarded products.
Lack of awareness and appropriate skills to manage e-waste is a major concern for countries worldwide.
Proper disposal of e-waste is essential to minimize damage to the environment and society.
======
6.8.1 Impact of e-waste on environment
E-waste contributes to environmental degradation.
Improper disposal of e-waste causes air, water, and soil pollution.
Certain elements or metals in e-waste can leach when they come in contact with air and moisture.
This leaching causes soil pollution as harmful chemicals seep into the soil.
When this contaminates natural groundwater, it causes water pollution, making the water unfit for human, animal, and agricultural use.
Dust particles loaded with heavy metals from e-waste can also cause air pollution.
======
6.8.2 Impact of e-waste on humans
E-waste contains toxic and carcinogenic materials like lead, beryllium, cadmium, and plastics.
Improper disposal of e-waste can lead to lead poisoning, affecting the kidneys, brain, and central nervous system, with children being particularly vulnerable.
Burning of e-waste can create harmful chemicals such as beryllium, causing skin diseases, allergies, and an increased risk of lung cancer.
Mercury in electronic devices can cause respiratory disorders and brain damage, while cadmium can damage kidneys, liver, and bones.
Plastics in e-waste can react with air and moisture, releasing harmful chemicals into soil and water resources, leading to immune system damage and psychological issues.
======
6.8.3 Management of e-waste
E-waste management involves reducing, reusing, and recycling to efficiently dispose of electronic waste.
Reducing e-waste can be achieved by purchasing electronic devices according to need, using them to their maximum capacity, and discarding them only after their useful life has ended.
Reusing involves slightly modifying and re-using electronic equipment that still functions. This can be done by donating or selling the equipment to someone who can still use it.
Refurbishing is the process of re-selling old electronic goods at lower prices.
Recycling is the conversion of electronic devices into something that can be used again. This should be done for products that cannot be repaired, refurbished, or re-used.
Many companies and NGOs provide door-to-door pick-up facilities for collecting e-waste from homes and offices to promote recycling.
======
6.8.4 E-waste Management in India
The Environmental Protection Act, 1986 in India enforces the “Polluter pays Principle” to punish those responsible for pollution.
The Central Pollution Control Board (CPCB) has guidelines for e-waste handling and disposal, making manufacturers responsible for safe disposal.
The Department of Information Technology has a technical guide for environmental management in the IT industry, including e-waste recycling and reuse guidelines.
Companies have initiated consumer awareness programs for e-waste recycling.
Computer system safety guidelines include regular cleaning, avoiding direct heat/sunlight, and keeping food/drinks away from the keyboard.
======
6.9 Impact on Health
Prolonged use of digital devices can lead to health issues, including physical strain and mental fatigue.
Ergonomics, which deals with designing user-friendly workplaces, can help reduce strain by suggesting appropriate device positioning and posture.
Maintaining the correct viewing distance, angle, and position can alleviate eye strain, while periodically focusing on distant objects and taking breaks for outdoor activities is also beneficial.
Correct workspace arrangement can prevent bad posture and resulting pains in the back, neck, and shoulders.
Overuse of non-ergonomic keyboards can cause wrist and finger pain, while excessive use of digital devices can contribute to stress, physical fatigue, and obesity.
To maintain overall well-being, it’s essential to balance digital device usage with other activities, including real-life interactions and hobbies.
======