Professional Documents
Culture Documents
OF ICT
Structure
1.1 Introduction
1.2 Objectives
1.3 Evolution of ICT
1.4 Meaning of ICT
1.5 Benefits of ICT
1.6 E-readiness Assessment of States/UTs
1.7 The Global Scenario
1.8 ICT and Economic Growth
1.9 Summary
1.10 Terminal Questions
1.11 Answers and Hints
1.12 References and Suggested Readings
1.1 INTRODUCTION
ICT deals with how digital information passes between the devices. The most prolific
example is the Internet, a worldwide network of computers linked together by
telephone lines. There are however, other examples, like mobile phones, interactive
televisions and personal organizers. It is a cross cutting theme in the objective of the
programme because of the recognition by the European Commission and UK
Government that ICT has the potential to have a major impact on the prosperity of
Merseyside. When ICT is applied to business, it can Lower Costs, raise productivity
and improve customer and supplier relationship. In learning, ICT widens participation
and raises attainment. In public services, ICT engages people with services more
effectively and in communities, ICT links people to economic opportunity and brings
together those with common agendas.
1.2 OBJECTIVES
After going through this unit, you should be able to:
• describe the meaning and different forms of ICT;
• explain the evolution of ICT;
• list the advantages of ICT;
• state the E-readiness assessment of States/UTs;
• discuss the global scenario of ICT; and
• discuss the role of ICT in economic growth. 5
Introduction to ICT and
Cyberspace 1.3 EVOLUTION OF ICT
The first major use of Information Technology (IT) could be said to have started
with the introduction of early mainframe computers to respond to the needs of scientific
research and the Government’s statistical data gathering and processing, where the
technology helped to speed up research and forecasting. These techniques were
later applied to the business environment where mainframe computers and robotics
were used to automate business processes and number crunching functions. From
automation of business processes, IT was then applied to higher value-adding,
functions such as design, resource planning, sophisticated manufacturing and
mission critical functions the developments and applications of IT have stretched
beyond imagination. Together with the rapid development and innovation in
telecommunication technology and the Internet, this evolution has ushered in many
new business models and applications.
ICT is robust that it can be harnessed in many ways, but its true potential is limited
only to the human mind. With ICT, the physical boarder dissipates as information
moves freely through the digital medium which is less controlled as compared to
other existing mass media. Globalisation is said to accelerate, and enabled by ICT,
making market bigger and more accessible by business with strong capital,
management and technology. Business or E-commerce has started to be done virtually
and transaction occurs at a click of a mouse anywhere and any time. Scientific
findings churn faster and newer discoveries and inventions through the journal and
reports are made available through ICT. The technology that began life as a faster
way to process data and compute statistics has become pervasive in almost all parts
of our life today. So ICT has become the backbone of Techsavvy Society, having
combined both information technology and communication through digital
environment today.
ICT will almost certainly cover the above examples of ICT in action, perhaps focusing
on the use of the key applications such as spreadsheets, databases, presentations,
graphics and web design software.
It will also consider the following important topics that deal with the way ICT is used
and managed in an organization:
− The nature of information (the “I” in ICT): this covers topics such as the meaning
and value of information, how information is controlled, the limitations of ICT,
legal considerations;
− Management of information: this covers how data is captured, verified and
stored for effective use the manipulation, processing and distribution of
information, keeping information secure, designing networks to share
information; and
− Information systems strategy: this considers how ICT can be used within a
business or organization as part of achieving goals and objectives.
Thus, ICT is a broad and fast-changing subject.
A new generation of computer network software aims at building virtual communities:
permanent (or at least recurring) online meeting places where people can work and
play, buy and sell, gossip and govern, flirt and fight and generally seek their fortunes.
The first such places are being built more or less ad hoc. Their builders are mostly
innocent of the history of human efforts to shape the spaces where people live so
that these might better serve people’s needs and express their dreams. Construction
tools appropriate to the physical (i.e. electronic) constraints of shared online
environments are rapidly becoming available. But there is no generally accepted
conceptual framework for their design, nobody of validated experience to guide
their construction. There is not yet any architecture for cyberspace.
In a world so new that its most fundamental properties are still being created (gravity,
for example), cyberspace designers confront - consciously or unconsciously − many
of the classic architectural challenges which may be classified as:
i) Selecting from alternative construction approaches and materials: The “native”
medium of cyberspace, a finely woven mesh of polygons with subtly refractive
polychrome surfaces, demands more machine resources than most visitors can
currently afford to. A richly realised environment is thus, in cyberspace as
elsewhere, inevitably an elitist one. Buildings based on simple cubes covered
with low-resolution bitmaps are accessible to all, but are also banal and
dispiriting. How can we build virtual villages that are at once idiomatic,
pleasant to be in and socially inclusive?
ii) Using pre-fabricated elements to reduce costs and speed up construction.
Cyberspace is made of software; and software engineers have been wrestling
for decades with a problem that is also central to modern architecture − how
systems can be modularly designed to make them more economic and more
reliable. Here, however, the issues are more complex, since cyberspace
communities are built on a constantly shifting infrastructure. In fact, the
relationship between structure and infrastructure is all but reversed; how can 9
Introduction to ICT and we design places for human community that can survive a continual re-design
Cyberspace
of the foundations on which they are built?
iii) Supporting sensible patterns of traffic flow: In most virtual settings, people can
fly. In some, they can also “beam” instantly from one point to the next, ignoring
all barriers. People may be present without taking up any visible space, or
alternatively their virtual representative (“avatar”) may be so huge or so resource-
intensive that it fills a space intended to hold a hundred visitors. What is “traffic”
when the users of a space are themselves constructs produced by other
(perhaps even antagonistic) designers?
iv) Designing to human scale: In the virtual world, the role of “size” as a design
factor is disconcertingly variable. It depends on the visitor’s/user’s field of view
and functional reach, which in turn depends on the power of the user’s display
and controls. It is like the shift to electronic music, where timbre, volume and
tonal range, once given by the physical nature of instrument, become variables,
which the composer/performer must learn to control. Issues of appropriate
scale do not go away, but must be redefined in relative terms: what is the ratio
of sizes that must be maintained to support different experiences?
v) Designing new structures (or re-purposing the old ones) to enhance existing
settings: The Musee D’Orsay and the new subterranean entrance arcade created
for the Louvre will soon have their analogues in cyberspace; perhaps a
conference room smuggled into the design model of an automobile engine, or
an entire city whose “streets” are the circuit diagrams of a computer processor.
Current work to build a database of 3D mages (the “Digital Human”) to serve
as an explorable setting for medical education suggests part of the challenge;
how can virtual reality help making physical/natural structures more accessible?
The far broader issue is: how can we connect the various virtual environments
we build to one another? What design criteria can be established to aid the
process of linking new worlds to the old?
There would-be cyber-architect navigating this maze of conflicting constraints in
search of more than just the solution to a puzzle. In cyberspace as in the physical
world, the goal of architectural design is always a place which, while fulfilling its
various functions, also communicates something to (and about) the people.
Please answer the following Self Assessment Question.
In the current report, effort has been given to analyse the time series data to understand
how states have adopted strategies/action plan to improve the network-readiness.
The section on case studies in the current report would not only confine to appearing
projects but also would examine e-governance initiatives undertaken, general
governance changes, policy changes initiated as per the act of increased penetration
of ICT etc.
The network readiness index framework will be used for the e-readiness study
2005 and is based on the following broad parameters, which are further classified
into sub indication:
The degree of usage of ICT by (and hence the impact of ICT on) the
three stakeholders is linked to their degrees of readiness (or capability) to
use and benefit from ICT.
A factor analytic technique will be used to construct the e-readiness index and based
on this, the states will be classified into following six categories:
• Leaders
• Aspiring Leaders
• Encepeatants
• Average Achievers
• Leant Achievers
12
Please answer the following Self Assessment Auestion. Evolution and
Growth of ICT
1.9 SUMMARY
• ICT stands for information, communication and technology.
• ICT is concerned with the storage, retrieval, manipulation, transmission or receipt
of digital data. Importantly it is also concerned with the way these different
uses can work with each other.
• ICT is very essential for businesses, individual and government.
• E-readiness is the degree to which a country/state is prepared to participate in
the networked world and demand the adoption of important applications of
ICTs in offering interconnection between the government, business and citizens.
• It is important to regularly take stock of e-readiness at the country level, states/
UTs level and in major verticals to ascertain the status of under lying
infrastructure, human resources, policy regimes, investments climate etc and
arrive at what steps need to be taken to optimize investment and reach free
potential.
• ICT has the potential to bring in multiple benefits in the areas of governance,
integration of marginalized section, development of rural areas profitability and
productive improvement in major sectors of the country’s economy.
• In practice, state reforms and government modernisation can hardly proceed
16 without calling upon ICT.
Evolution and
1.10 TERMINAL QUESTIONS Growth of ICT
17
Introduction to ICT and
Cyberspace
UNIT 2 COMPUTER HARDWARE,
SOFTWARE AND PACKAGES
Structure
2.1 Introduction
2.2 Objectives
2.3 Evolution and Development of Computing
2.4 Hardware Components of Computers
2.5 What is Software?
2.5.1 Difference between System Software and Application Software
2.1 INTRODUCTION
Modern computers are equipped with powerful hardware facilities driven by extensive
software packages. Today computing speed is very high and it is capable of doing
huge amount of work within seconds with proper accuracy. Nowadays computing
and telecommunication both controls the whole universe with multiple manners. To
access the state of art of computing, it is always better to review the historical
milestones in the developments of computers. Nowadays the computer system plays
such a vital role that no corporate or individual can survive without it by any means.
Starting from the country’s national security to any common issue, the use of the
computer system is enormous.
In general, the computer accepts inputs, then processes it, and gives the output.
2.2 OBJECTIVES
After studying this unit, you will be able to:
• describe the evolution and development of computing;
• list hardware components of a computer;
• explain what is software and the different types of software; and
• discuss major problems faced by the management, namely software crisis.
18
Computer Hardware,
2.3 EVOLUTION AND DEVELOPMENT OF Software and Packages
COMPUTING
As far as hardware technology is concerned, the first generations (1945-1954)
used vacuum tubes and relay memories interconnected by insulated wires. The second
generation (1955-1964) was marked by the use of discrete transistors, diodes, and
magnetic ferrite cores, interconnected by printed circuits. The third generation (1965-
1974) was started with integrated circuits (ICs) for both logic and memory in small
scale or medium scale integration (SSI or SMI) and multilayered printed circuits.
The fourth generation (1974-1991) was started with large scale or very large scale
integration (LSI or VLSI) having core memory replaced with semiconductor memory.
High density and high-speed processors are used in the fifth generation (1991-
Present) and memory chips based on even more improved VLSI technology are
used. For example, 64-bit 3.0 GHz microprocessors are now available on a single
chip. Random Access Memory (RAM) of more than 1024 MB is commonly available
in the market now.
The First Generation: From architectural and software point of view, these were
built with a single central processing unit (CPU) which performed serial fixed-point
arithmetic using a program counter, branch instructions, and an accumulator. The
CPU must be involved in all memory access and input/output (I/O) operations.
Machine and assembly language were used in first generation computers.
The Electronic Numerical Integrator And Calculator (ENIAC), built at the school
of the University of Pennsylvania in 1950, was the first model of the first generation
Computers.
The Third Generation: These were being started with microprogrammed control.
Pipelining and cache memory were introduced to close up the speed gap between
the CPU and main memory. The idea of multiprogramming was implemented to
interleave CPU and I/O activities across multiple user programs. Example of the
third generation system is IBM/360-370 series.
The Fifth Generation: The development in the fifth generation is still in progress.
Here more importance is placed on massively parallel processing (MPP). Scalable 19
Introduction to ICT and and latency to lerant architecture is being adopted in MPP system using VLSI silicon,
Cyberspace
GaAs technologies, high-density packaging and optical technologies.
Finally, the basic difference between both of them is the application programs primarily
manipulate data or test to produce or provide information where as system programs
manipulate computer hardware resources.
Multiprocessing occurs when a computer system with two or more processors can
run more than one program, or thread, at a given time by assigning them to different
processors. Multiprocessing uses simultaneous processing with multiple CPUs,
whereas multiprogramming involves concurrent processing with one CPU. The idea
of multiprocessing is, all the processors will continue different jobs of the application
program without interrupting or waiting for the other processor, to complete or
release the resources, multiprocessing is highly recommended where application
response time is critical like less than one millisecond.
Virtual memory simulates more main memory than what actually exists in the
computer system. It allows a program to behave as if it had access to the full storage
capacity of a computer, rather than just access to the amount of primary storage
installed on the computer. Virtual memory divides an application program or module
into fixed-length portions called pages. The system executes some pages of
instructions while pulling others from the secondary storage. In effect, primary storage
is extended into a secondary storage device, allowing users to write programs as if
the primary storage were larger than it actually is. This enlarged capability boosts
the speed of the computer and allows it to efficiently run programs with very large
number of instructions. Virtual memory is not good for high memory intensive
program. High memory intensive program requires higher memory space and memory
access time, since the virtual memory is defined or secondary storage, to access the
page of program or data again required some I/O operation or extra CPU and other
resource cycle.
The operating system is responsible for resource management of the system like, file
management, memory management or device management and security management
up to some extent. The file management is to create and manages a directory structure
that allows file to be created and retrieved by name, and it also responsible to
manage the indexes for it is internal usages. It may control access to those files
based on permissions and access controls. The operating system provides other
forms of security as well. For example, it must typically provide protected memory
and maintain access control on files in the file system. The operating system also
must keep track of the users and their authority level as well as audit charges to
security permissions.
Fault tolerance is the ability of a system to produce correct results and to continue to
operate even in the presence of fault or errors. Fault tolerance can involve error- 23
Introduction to ICT and correcting memory, redundant computer components and related software that
Cyberspace
protect the system from hardware, operating systems or user errors.
Although operating systems perform some of their functions automatically, for certain
tasks, the user interacts directly with the computer through the system software. The
ease or difficulty of such interaction is to a large extent determined by the interface
design. Older text-based interfaces like Disk Operating System ( DOS) needed
typing in cryptic commands. In an effort to make computers user-friendlier, the
Geographical User Interface (GUI) was developed.
The GUI allows users to have direct control of visible objects (such as icons) and
actions that replace complex command syntax. The GUI was developed by
researchers at Xerox Palo Alto Research Center (PARC) and then popularized by
the Apple Macintosh computer. Microsoft soon introduced its GUI-based Windows
operating system for IBM-style PCs. The next generation of GUI technology will
improve features such as wireless communication, artificial intelligence, etc. The
next step in the evolution of GUIs is social interfaces. A social interface is a user
interface that guides the user through computer applications by using carttonlike
characters, graphics, animations and voice commands. The carttonlike characters
can be cast as puppets, narrators, guides, inhabitant’s avatars (computer generated
human like figures), or hosts.
Types of Operating System: If hardware is the skeleton and software is the body
then operating system (O.S.) is the soul of the system. It manages all the hardware
and gives operating environments, from which the user can communicate with the
system, it allows system developers to create system applications or share the system
resources by requesting the allowed operating system services and allow the
application developers to develop the run user application from application
environment. Operating system can directly and indirectly interact with user programs.
Operating environments are not operating systems, but work only with an operating
system. For example, the early versions of Windows were operating environments
that provided a graphical user interface and worked only with MS-DOS.
Operating system can be categorised by the number of users they support as well as
by their level of sophistication. OS, for mobile devices, are designed to support a
single person using a mobile, handled device, or information appliance. Desktop
operating systems are designed to support a single user or a small workgroup of
users. Departmental server OSs generally support thousands of simultaneous users
and millions or billions of simultaneous transactions. Super computer operating system
supports the particular processing needs of a supercomputer.
Supercomputer and enterprise server operating system offer the greatest functionality,
followed by departmental server operating systems, desktop operating systems and
finally mobile device operating systems. An important exception is that the user
interface, which is most sophisticated on desktop operating system is least
sophisticated on supercomputer and enterprise server operating systems.
Mobile device operating systems are Embedded Linux, Windows CE 32 bit, Pocket
PC, Windows Embedded NT 4.0 32 bit, and Palm Operating System.
Windows 95, released in 1995, was the first version of a series of products in the
Windows operating system that provided a streamlined GUI by using icons to provide
instant access to common tasks. It is a 32 bit processing that features multitasking,
multithreading, networking, etc. It also offers plug-and-play capabilities, which is a
feature that can automate the installation of the new hardware by enabling the
operating system to recognise the new hardware and install the needed software
(called device drivers) automatically.
System utilities are the programs that have been written to accomplish common
tasks such as sorting records and checking the integrity of diskettes and creating
directories and subdirectories. They also restore accidentally erased files, locate
files within the directory structure, manage memory usage, and redirect the output.
System performance monitors are programs that monitor the processing of jobs on
a computer system. They monitor computer system performance and produce reports
containing detailed statistics relating to the use of system resources such as processor
time, memory space, and application program. These reports are used to plan and
control the efficient use of the computer system resources and to help troubleshoot
the system in case of problems.
System security monitors are programs that monitor the use of a computer system
to protect it and its resources from unauthorized use, fraud or destruction. Such
programs provide the computer security needed to allow only authorized users access
to the system. Security monitor also controls the use of the hardware, software and
data resources of a computer system.
Word Processing: It allows the user to manipulate the text rather than just numbers.
Modern word processors contain many productive writing and editing features. MS
Word is popular in this regard.
Graphics: It allows the user to create, store and display or print charts, graphs and
maps and drawings. There are basically three categories of graphics software
packages: presentation graphics, analysis graphics and computer aided-design
software. Example of this software is PhotoShop and CorelDraw, etc.
Multimedia: It combines at least two media for input or output of data. These
media include audio, voice, animation, video, text, graphics, and images.
So the importance of software in the computer system has brought new issues to the
forefront for the organizational managers. These issues include software evaluation
and selection, software testing, software upgradations, open systems, and open
source software.
2.9 SUMMARY
• Computer accepts Inputs, then processes the inputs and finally produces the
output.
• The VLSI technology is the latest technology used in the modern computers.
• The electronic and mechanical parts of a computer are generally called Hardware
components of the system.
• A computer system consists of a CPU, monitor, keyboard, mouse and
multimedia the device.
• For simple Internet connection, an autonomous computer with modem or LAN
card, an Internet account or broadband connection and browsing software are
must.
• Broadband connection means an Internet connection with speed more than
256 KBPS without interruption.
• Modem stands for modulator /demodulator. It is the most popular type of Data
Circuit Termination Equipment.
• Software is a program, which controls the hardware and the user interface.
• System Software is a set of instructions that serves primarily as an intermediary
between computer hardware and application program.
• Application software is a set of instructions that provides more functionality to
the user.
• Software crisis are the unbalanced situation between changing hardware and
software version.
29
Introduction to ICT and
Cyberspace UNIT 3 NETWORKING CONCEPTS
Structure
3.1 Introduction
3.2 Objectives
3.3 Types of Networks
3.4 Network Topology
3.5 Reference Models
3.6 Networking Protocols
3.6.1 TELNET
3.1 INTRODUCTION
Two computers are said to be interconnected if they are able to exchange information
by any means. Basically in this chapter, computer networks to mean an interconnected
connection of autonomous computers. If one computer can forcibly start, stop or
control another one, the computers are not autonomous, system with one control
unit and many slaves is not a network; nor is a large computer with remote printers
and terminals.
When the concept of network comes to mind before that we have to understand the
confusion between computer networks and Distributed system. In a network, each
system treated as a node or terminal and each terminal must have an unique
identification on the network. A node can share its own resources like file system or
its own resources like printer using network spooling. It is also possible to define
multiple subnet networks under main network under one or multiple domain. Parent
domain normally use to control the user access or authentication and sub domain
can have fine grain authentication. It is also possible to create a virtual network
under a network, where other people can access or utilize the resources of virtual
network under certain rule and access rights. In computer network each node or
participant agreed to communicate with certain rules and protocols layer like TCP/
IP , IPX or netBois.
Users must explicitly log onto one machine, can submit jobs remotely, or move
files around and generally handle all the network management personally. With a
distributed system, nothing has to be done explicitly; it is all automatically done by
the system without the user’s knowledge.
30
A network is a set of devices (often referred to as nodes) connected by the media Networking Concepts
links. Node can be a computer, printer, or any other device capable of sending and/
or receiving data generated by other nodes on the network. The links connecting the
devices are often called communication channels.
Data communication is the exchange of data (in the form of 0s and 1s) between two
devices via some form of transmission medium (such as a wire cable). The
effectiveness of a data communication system depends on three fundamental
characters:
• Delivery
• Accuracy
• Timeliness
3.2 OBJECTIVES
After studying this unit, you should be able to:
• describe different types of networks, viz. local, metropolitan and wide networks;
• explain the topologies on which networks work;
• list the difference between OSI and TCP Reference Model;
• describe protocols used for networks; and
• list organizations dedicated for establishing standards for controlling the
Internet.
36
These above protocols are very much vital when the concept of network stands. Networking Concepts
But in case of the Internet, Domain Name System (DNS) is a very important aspect
by which Uniform Resource Locator (URL) address is being maintained globally.
DNS is a protocol that can be used in different platforms in the Internet. The domain
name space (tree) is divided into three different sections: generic domains, country
domains and inverse domains.
Generic Domains define registered hosts according to the generic behavior. These
are com, edu, gov, int, mil, net, and org.
The Country Domain system follows the same format as the generic domains but
uses two-character country abbreviations (e.g. in for India). But at present the country
domain can be like www.mtnl.in (for Example).
Inverse Domain is used to map an address to a name. This may happen, for example,
when a server has received a request from a client to do a task. Where the server
has a file that contains a list of authorized clients, the server lists only the IP address
of the client (extracted from the received IP packet).
3.6.1 TELNET
It is a general-purpose client-server application program. It is an abbreviation of
Terminal Network. It enables the establishment of a connection to a remote system
in such a way that the local terminal appears to be a terminal at the remote system.
Both local login and remote login are quite possible through TELNET. It solves the
remote login problem by defining a universal interface called the network virtual
terminal (NVT) character set. Through this interface, the client TELNET translates
characters (data and commands) that come from the local terminal into NVT form
and delivers them to the network. The server TELNET, on the other hand, translates
data and the commands from NVT form into the form acceptable by the remote
computer.
File Transfer Protocol (FTP) is the standard mechanism provided by TCP/IP for
copying a file from one host to another. Transferring files from one computer to
another is one of the most common tasks expected from networking or
internetworking environment. These problems can be solved by FTP: two systems
may use different file name conventions. Again two systems may have different ways
to represent text and data. Two systems may have different directory structure. All
the above problems are solved by FTP in a very simple and elegant approach.
The actual mail transfer is done through mail transfer agents( MTAs). To send a
mail, a system must have a client MTA, and to receive a mail, a system must have a
server MTA. Although Simple Mail Transfer Protocol (SMTP) does not define a
specific MTA, send mail is commonly used by the UNIX system MTA.
The post office protocol (POP) is used for retrieving a message. POP3 version is
very popular to download messages from server.
The Simple Network Management Protocol (SNMP) is a framework for managing
devices in an Internet using TCP/IP protocol suite. It provides a set of fundamentals
operations for monitoring and maintaining the Internet.
The Hypertext Transfer protocol (HTTP) is a protocol used mainly to access data
on the World Wide Web. The protocol transfers data in the form of plain text,
37
Introduction to ICT and hypertext, audio, video, and so on. It functions like a combination of FTP and SMTP.
Cyberspace
It is similar to FTP because it transfers files and uses the services of TCP.
The World Wide Web (WWW) is a repository of information spread all over the
world and linked together. It has a unique combination of flexibility, portability, and
user-friendly features that distinguish it from other services provided by the Internet.
It is a subset of the Internet. It must be clear that the term Internet and World Wide
Web are not similar.
Please answer the following Self Assessment Question.
3.8 SUMMARY
• A network is a set of device (often referred to as nodes) connected by media
links.
• Three types of networks are LAN, MAN and WAN.
• The Internet is the bigger version of WAN.
• Network topology is the way in which network is laid out either physically or
logically. 39
Introduction to ICT and • Some important topologies are bus, star, ring, tree and mesh.
Cyberspace
• TCP/IP and OSI are two basic reference models.
• OSI has seven layers where as TCP/IP has four layers.
• TCP/IP is the main protocol suite on which the Internet is based.
• TELNET is a general purpose client-server application program.
• Through TELNET both local login and remote login are possible.
• To control the naming system worldwide, previously domain name system
(DNS) was invented. It is primarily used for mapping host names and e-mail
destinations to IP addresses.
• ICANN is a non-profit private organization that controls the domain name
system in the Internet.
3.9 TERMINALQUESTIONS
1) What is the basic difference between OSI and TCP/IP models?
2) Write about TELNET and FTP.
3) What are the advantages of LAN?
4) Discuss various Network Topologies.
41
Introduction to ICT and
Cyberspace UNIT 4 INTRODUCTION TO
CYBERSPACE AND ITS
ARCHITECTURE
Structure
4.1 Introduction
4.2 Objectives
4.3 The Difference Between Real Space and Cyberspace
4.4 Overview: What is Digital Identity
4.4.1 Working Definition of Identity
4.4.2 Identity as a Commodity
4.1 INTRODUCTION
Cyberspace is such a term, which is not yet completely defined and also has no
geographical limitation. It is a term associated with application of the Internet world-
wide. It is also called as a virtual space as physical existence of cyberspace is not
detectable at all. Cyberspace is “the total interconnectedness of human beings
through computers and telecommunication without regard to physical geography.
Cyberspace is a term coined by science fiction author William Gibson to describe
the whole range of information resources available through computer networks. For
our purposes, cyberspace is a realm in which communication and interaction between
two individuals or between an individual and a computer is facilitated by digital data
exchanged over computer networks. This interaction or communication can be used
for a host of different purposes.
The Internet is currently the biggest network for linking computers, but cyberspace,
as a concept, is independent of the Internet. Cyberspace communication began
before the Internet and the World Wide Web, and cyberspace interaction and
42
communication will continue to take place after the Internet is no longer the network Introduction to
Cyberspace and Its
of choice. Architecture
Currently there is no generic system for identification in cyberspace. It is not possible
to absolutely identify an entity or to accurately tell whether an object has a specific
characteristic. Digital environments have inherent differences from real space which
causes this discrepancy, and when implementing an identity system for cyberspace
one needs to consider more than just the architectural nature of the system any system
chosen will have the social repercussions which need to be also taken into account.
Identity is a unique piece of information associated with an entity. Identity itself is
simply a collection of characteristics which are either inherent or are assigned by
another. The colour of a person’s hair is good or bad and whether he is attractive or
not is part of a person’s identity which is usually reviewed by another person.
Interactions done in real space inherently carry the identity of the person originating
the transaction. Generally, physical traits are carried along in a transaction - for example
when one purchases a book from a book store, the book dealer may remember the
buyer’s face or build.
4.2 OBJECTIVES
After studying this unit, you should be able to:
• describe what is Cyberspace;
• explain the difference between Real Space and Cyberspace;
• explain the concept of Digital Identity;
• describe Computer and Cyber Crimes;
• describe the architecture of Cyberspace;
• state implications of choosing the link system; and
In real space, it is difficult to select, to verify or reveal portions of one’s identity: most
forms of identification contain more information than is needed for any transaction.
The unbundling that is possible in cyberspace allows portions of identity to be
disassociated and verified by a third party. This not only creates the ability to verify via
the least revealing means, but it also creates the framework for anonymous transactions
− it is possible to merely verify the proper information without ever distributing the
same characteristic. Further, cyberspace users have control over the strength of the
link between their real world and the cyber-identities.
No two identities are the same. Each identity maps to a unique set of characteristics.
Two people may share some of the same characteristics, such as being old enough to
44
drive or having the same hair colour, but that does not mean that they have the same Introduction to
identity. If Jow Jindo 2 can identified himself as Joe Jindo 1 then Joe Jindo 2 can Cyberspace and Its
Architecture
access and manipulate all the private information of Joe Jindo 1 which is called
identity theft.
..............................................................................................................................
45
Introduction to ICT and sending a signed letter to someone. In the real space, I reveal to the recipient the
Cyberspace
exact form of my signature, but the difficulty of mastering the art of forgery protects
me from the possibility that the recipient would begin signing letters with my
signature. However, if I send a digital letter that contains the digital representation of
my signature, the recipient could easily duplicate and use my signature to assume my
identity when signing documents. The seriousness of this problem is highlighted when
you consider that future technologies will allow extremely important identifiers, such
as a retinal scan or a fingerprint, to be represented digitally. These biometrics
characteristics are protected in real space because they are embedded in the physical
body of the person. This is lost in cyberspace. Thus, cyberspace needs a system
that allows individuals to verify their identities to others without revealing to them the
digital representation of their identities. A verification system would let Bob, for
example, know the identity of Alice or that she possesses a particular trait, but
would not give him the ability to impersonate Alice or use the trait identifier as if it
was his own. In our digital letter example, Bob would be able to verify that the letter
contains Alice’s signature but would not let him sign the documents as Alice. Similarly,
a verification that someone is of the proper age to purchase alcohol would not give
the person a change to verify this identifier anything that would allow him to represent
himself as being of the proper age to purchase alcohol. Such a system helps both the
parties obtain what they want out of exchanging identity information without the risk
of identity theft.
............................................................................................................................
.............................................................................................................................
48
Introduction to
4.8 PREVENTING CRIMES Cyberspace and Its
Architecture
The issue then becomes one of the preventing crimes, while simultaneously attempting
to mitigate this potential “chilling effect” on free speech. At the heart of this discussion,
lies the distinction between transactional information and content information.
Transactional information is the information regarding the sender, recipient, and other
information associated with the transmission of the information, but not regarding the
content of the information. Thus, so far the argument has centered on transactional
information; however, the value of content to law enforcement must be considered: if
it is absolutely necessary to have content as well as transactional information, then it
will do no good to consider offering the latter without the former. If, on the other hand,
transactional information without content is a tool that can be utilized, it may result
an effective compromise between the needs of law enforcement and the desires of
the society.
Encryption represents the single largest barrier to law enforcement obtaining content
from a computer. This is an issue that is relatively unique to cyberspace, as handwritten
and telephone encryption is relatively rare. One choice can be made with respect to
encryption: allow it, without regulation, or disallow it. Disallowing encryption altogether
is pragmatically different from allowing only key escrowed encryption, but for the
purposes of this discussion, they are effectively the same. The overwhelming response
of the government has been that, encryption controls are in fact necessary, and several
initiatives have been proposed to this effect; however, both the public and legal reaction
to these initiatives have been negative: many organizations are resisting the degree of
control which law enforcement would be given, and the Communications Decency
Act was recently ruled as too general to be constitutional. In this situation, law
enforcement’s claims of what it needs to be effective are strongly disputed by the
public: the equilibrium between the two is harder to strike in cyberspace.
4.11 SUMMARY
• There is no proper definition of Cyberspace yet. Only some concepts have been
derived.
52
• Cyberspace architecture, which is not properly defined now, is a design in Introduction to
Cyberspace and Its
which virtual space transactions are being made through digital environment. Architecture
5.2 Objectives
5.7 Browsers
5.9 E-commerce
5.9.1 Types of E-commerce
5.9.2 Application of E-commerce
5.9.3 Security in Electronic Payment
5.10 Summary
5.1 INTRODUCTION
There are so many networks exiting in the world, often with different hardware and
software. But Internet is a term which is very common to all irrespective to any age
group. Perhaps there is no such human being in the universes, who is unaware of the
term Internet. In other words, Internet is the backbone of rapid growth of
technological revolution. The word Internet is derived from Internetworking that is a
collection of individual networks, connected by intermediate networking devices
that function as a single large network. Network is a collection of terminals, computer
servers and components which allow for the easy flow of data and use of resources
between one another. In simple words, a network is a group of two or more computer
54 systems linked together.
Evolution and Basic
5.2 OBJECTIVES Concepts of Internet
5.7 BROWSERS
To get connected into the Internet, a browser is the minimum requirement. It is
capable of communicating via HTTP, managing HTML and displaying certain data
types such as Graphic Interchange Format (GIF) and Joint Photographic Experts
Group (JPEG) for graphics. The two leading browsers are Internet Explorer from
Microsoft and Netscape Navigator. The competition between both of them has
been extremely beneficial for the users, providing them highly capable applications
at almost no costs. Microsoft’s strategy is to minimize the importance of the browser
as a distinct application by building the browser functionality directly into its latest
operating system. Netscape’s strategy is to make the browser the core of a compelling
suite of applications for corporate users.
Netscape’s Browser Suite
It includes Netscape Navigator, Netscape Mail, Netscape Instant Manager,
Netscape Composer and Netscape Address Book. The suite provides functions
for running web applets, audio playback, streaming media, web content, and
Net2phone for free PC-to-phone calls anywhere within the United States. Netscape
communicator is a comprehensive set of components that integrates e-mail, web-
based word processing, and chat to allow users to easily communicate, share and
access the information.
Microsoft’s Internet Explorer
This software comes with the window operating system for free. AS Netscape has
established its own market, so Microsoft embarked on a strategy to gain market
62
share and penetrate the installed base. It also provides all the facilities that are
provided by Netscape. At present, IE 6.0 version is very much popular in the Evolution and Basic
Concepts of Internet
browser market. IE 7.0 from Microsoft is the most reliable browser available today
for PC world. Many browsers are platform/OS oriented.
Beside these two browsers, there are so many browsers available in the market,
like Fire Fox, which comes with so many advanced options.
Offline browsers (pull products) enable a user to retrieve pages automatically from
web sites at predetermined sites, often during the night. Web Whacker and Web
Copier are offline browsers that allow the users to define a group of sites by their
URLs and then download the text and images from those sites to their local storage.
Please answer the following Self Assessment Question.
5.10 SUMMARY
• ARPANET was the first Network in the world.
• Internet is defined as the network of networks. It has mainly the following
applications: 65
Introduction to ICT and E-mail,
Cyberspace
Search,
File Transfer,
Research, and
Electronic Transactions.
• The Internet is based upon TCP/IP protocol. Every host and router over the
Internet has a unique IP address. All IP addresses are 32 bits long.
• The lowest IP address is 0.0.0.0 and highest is 255.255.255.255.
• There are six common top levels domains: com, net, gov, edu, mil and org.
• At present, broadband connection is the best one to access the Internet for
home or remote users (speed more than 256 Kbps).
• World Wide Web (WWW) is the basic infrastructure on which HTTP works.
• Browsers are the browsing software for the Internet. For example, the Internet
Explorer.
• Search Engines are the internet Tools to search a file from various locations
from the Internet within some seconds.
• E-commerce is the electronic way on which buying, selling and exchange of
products is possible over the Internet.
• Secure Socket Layer (SSL) is the Internet security protocol for online financial
or secure transactions. 40 bits, 64 bits and 128 bits SSL are available in the
market.
• Due to the demand of the Internet, many challenges have to be faced in future
regarding Internet Regulation, New Technology, Internet Expansion and Internet
Privacy etc. As far as India is concerned, it should formulate a suitable Data
protection legal framework to cope with the International standard. Again the
Information Technology Act 2000 has to be modified with strong a technological
as well as legal concept.
67
UNIT 6 INTERNET OWNERSHIP
AND STANDARDS AND
ROLE OF ISPs
Structure
6.1 Introduction
6.2 Objectives
6.1 INTRODUCTION
Internet is the network of networks around the globe or interconnections of
Networks. Lakhs of computers are connected through Internet so the term “Internet
ownership” is very critical in terms of language. But from the maintenance point of
view, these must be maintained by humans by, machine or with the help of technology,
within a legal framework. Everyone understands that the internet is crucial for the
functioning of modern economecs, societies, and even governments, and everybody
it should to be reliable and secure. But internet possesses such a decentralized status
that there is no authority to control over cyberspace. So internet ownership has no
exact definition till now as far as cyberspace is concerned.
5
Cyberspace
6.2 OBJECTIVES
After studying this unit, you should be able to:
• explain the basic concepts behind Internet and its ownership status;
• describe the code of conduct prescribed for Internet Service Providers;
• enlist the roles and liability of ISPs; and
• develop a vision for better technology.
• Network design
• Performance guarantees
• ISPs (Internet Service Providers) are the service providers for Internet access.
There are two types of ISPs. One is national ISPs and others are local ISPs.
ISDN.
• Value added services are: Web Hosting, VPN, Internet Telephony and E-mail.
• Web Site owner/ISPs are also liable for any defamatory statement published
on its site.
3) Web hosting, Virtual Private Network, Voice over Internet, E-mail, Cable
Intranet
4) The major cost items for an Internet Service Provider are infrastructure and
access cost.
19
Cyberspace Terminal Questions
20
Data Security and
UNIT 7 DATA SECURITY AND Management
MANAGEMENT
Structure
7.1 Introduction
7.2 Objectives
7.3 Security Problem vis-à-vis Internet
7.3.1 Threats to Computing System
7.1 INTRODUCTION
During the first few decades of their existence, computer networks were primarily
used by defense personnel for security by university researchers for research purposes
and by corporate employees for sharing printers and other peripherals. Under these
conditions, security of data transmission did not get much attention as there were
very few people using the networks. But in the new corporate scenario, millions of
ordinary citizens are using networks for online banking, shopping and filling their
returns through E-governance etc.and so data security is looming on the horizon as
a potentially massive problem.
7.2 OBJECTIVES
After studying this unit, you should be able to:
• describe threats posed to computing systems;
• enlist security measures to protect the system; 21
Cyberspace • explain the need and aim of security policy;
• enlist who should be involved in forming policy;
• determine what makes a good security policy and security mechanisms that
could be implemented to provide identification and authentication services;
• describe how to control access and types of security mechanisms that could be
implemented to provide access control service; and
• explain the concept of security management.
Trap Door: The designer of a program or system might leave a hole in the software
that only he or she is capable of using. This type of security breach was shown in the
movie “WAR GAMES”. For instance, the code might check for a specific user
identifier or password, and might circumvent normal security procedures. There
have been cases of people being arrested for embezzling from banks by including
rounding errors in their code, and having the occasional half-cent credited to their
accounts. This account crediting can add up to a large amount of money, considering
the number of transactions that a large bank executes.
System Threats
The two most common methods for achieving misuse in an operation system are
worms and viruses.
Worms: A worm is a process that uses the spawn mechanism to clobber system
performance. The worm spawns copies of itself, using up system resources and
perhaps locking out system use by all other processes. On computer networks,
worms are particularly patent, since they may reproduce themselves among systems
and thus shut down the entire network.
Viruses: Another form of computer attack is virus. Like worms, viruses are designed
to spread into other programs and can wreak havoc in a system including modifying
or destroying files and causing system crashes and program malfunctions. A worm is
structured as a complete, standalone program while a virus is a fragment of a code
embedded in a legitimate program. Viruses are major problems for computer users,
especially users of microcomputer systems.
The best protection against it is prevention, or the practice of safe computing. Another
safeguard, although it does not prevent infection, does permit early detection.
Worms and viruses are generally considered to pose security, rather than protection,
problems.
Please answer the following Self Assessment Question.
23
Cyberspace
7.4 SECURITY MEASURES TO PROTECT THE
SYSTEM
To protect the system, security measures must be taken at two levels:
Physical: The site or sites containing the computer systems must be physically
secured against armed or surreptitious entry by intruders.
Human: Users must be screened carefully so that the chance of authorizing a user
who then gives access to an intruder is reduced.
Discretionary security differs from mandatory security in that it implements the access
control decisions of the user. Mandatory controls are driven by the results of a
comparison between the user’s trust level or clearance and the sensitivity designation
of the information.
A LAN operating system may implement user profiles, capability lists or access
control lists to specify access rights for many individual users and many different
groups. Using these mechanisms allows more flexibility in granting different access
rights to different users, which may provide more stringent access control for the file
(or directory). (These more flexible mechanisms prevent a situation in which a user
has to be given more access than necessary, a common problem with the three level
approaches.) Access control lists assign the access rights of named users and named
groups to a file or directory. Capability lists and user profiles assign the files and
directories that can be accessed by a named user.
User access may exist at the directory level, or the file level. Access control at the
directory level places the same access rights on all the files in the directory. For
example, a user who has read access to the directory can read (and perhaps copy)
any file in that directory. Directory access rights may also provide an explicit negative
access that prevents the user from any access to the files in the directory. Some
LAN implementations control how a file can be accessed. (This is in addition to
controlling who can access the file.) Implementations may provide a parameter that
allows an owner to mark a file sharable, or locked. Sharable files accept multiple
accesses to the file at the same time. A locked file will permit only one user to access
it. If a file is a read only file, making it sharable allows many users to read it at the
same time.
These access controls can also be used to restrict usage between servers on the
LAN. Many LAN operating systems can restrict the type of traffic sent between
servers. There may be no restrictions, which imply that all users may be able to
access resources on all servers (depending on the user access rights on a particular
server). Some restrictions may be in places that allow only certain types of traffic,
for example only electronic mail messages, and further restrictions may allow no
exchange of traffic from server to server. The LAN policy should determine what
types of information need to be exchanged between servers. Information that is not
necessary to be shared between servers should then be restricted.
For example, the principle of least privilege should be implemented to perform the
backup function. A user who is authorized to perform the backup function needs to
have read access to all files in order to copy them to the backup media. (However
the user should not be given read access to all files through the access control
mechanism.) The user is granted a ‘privilege’ to override the read restrictions (enforced
by the access control mechanism) on all files in order to perform the backup function.
The more granular the privileges that can be granted, the more control there does
not have to grant excessive privilege to perform an authorized function. For example,
the user who has to perform the backup function does not need to have a write
override privilege, but for privilege mechanisms that are less granular, this may occur.
The types of security mechanisms that could be implemented to provide the access
control service are listed below.
• Access control mechanism using access rights (defining owner, group, world
permissions),
• Access control mechanism using access control lists or “ACLs”, user
profiles, capability lists,
• Access control using mandatory access control mechanisms (labels),
• Granular privilege mechanism,
Please answer the following Self Assessment Question.
32 11) Compliance
Data Security and
7.10 SECURITY AUDIT Management
One of the most important and critical reasons for conducting a security audit is to
ensure that the efforts spent on security is coherent with business objectives ultimately
yielding cost effective benefits. Although this may seem obvious, it is possible that
efforts might go off the requisite target missing out on the key areas where the effort
is needed. The objective of Security Audit is to find out the vulnerabilities that an
organization is facing with its IT infrastructure.
Physical Security is one of the most neglected areas in Security. Global E-Secure
helps companies to plug this area by identifying the threats in terms of location of
hosted servers, perimeter and barrier protection followed and physical measures
adopted currently to protect sensitive data such as: cages, racks, Personnel controls,
Biometrics devices, Alarm Systems and others.
This involves a complete detailed analysis of the mission critical applications of the
enterprise such as web servers, directory servers, mailing applications and enterprise
solutions of the company to which its employees, customers or partners may have
access. Since security has to complement business and should be transparent to the
user, it is essential for security to integrate seamlessly with the application.
35
Cyberspace
UNIT 8 DATA ENCRYPTION AND
DIGITAL SIGNATURES
Structure
8.1 Introduction
8.2 Objectives
8.3 Conventional Cryptography
8.3.1 Types of Ciphers
8.1 INTRODUCTION
One of the most powerful and important methods for security in computer systems
is to encrypt sensitive records and messages in transit and in storage. Cryptography
has a long and colorful history. Historically, four groups of people have used and
contributed to the art of Cryptography, the military, the diplomatic corps, diarists,
and lovers. The military has had the most sensitive role and has shaped the field.
At present, information and data security plays a vital role in the security of the
country, the security of the corporate sector and also of every individual, working
for personal benefit.
8.2 OBJECTIVES
At the end of this unit, you will able to:
36 • discuss what is conventional cryptography and types of ciphers;
• explain the meaning of encryptions ; Data Encryption and
Digital Signatures
• describe Algorithms used in Cryptology;
• discuss encryption schemes, their merits and demerits;
• explain the meaning and use of Digital Signature;
• discuss cryptographic hash functions and cryptographic protocols and
mechanism;
• describe methodology for ensuring the secure distribution of keys for
cryptographic purposes; and
• explain the concept of trusted third parties and public key certificates.
JULIUSCAESAR Plaintext
74 85 76 73 85 83 67 65 69 83 65 82 Plaintext, ASCII
70 79 82 69 88 65 77 80 76 69 83 84 Key ASCII
Figure 2
A ONE-TIME PAD
One-time pad ciphers are unbreakable because they give no information to the
cryptanalyst. The primary difficulty with one-time pad is that the key must be as long
as the message itself, so key distribution becomes a problem, since a different pad
must be used for each communication.
CONSULT Keyword
E N C RYPT Plaintext:
I ONISP E
ENCRYPTIONSPERFORMEDBYWRITINGTHEPLAINTEXT
R FORMED
B YWR ITI
N G T H E P L cipher text:
A I N T E X
TEIRBNAPPETPXCNOWTNNOFYGIRIRRHTTEDILTYSMIEE
43
Cyberspace
8.7 DIGITAL SIGNATURE
People authenticate other people by recognising their faces, voices and handwriting.
Signatures on letterhead paper handle proof of signing raised seals and so on.
Handwriting, paper, and ink experts can usually detect tampering. But none of these
options are available electronically. That’s why the concept of Digital signature came
into existence to authenticate electronic documents.
The authenticity of many legal, financial, and other documents is determined by the
presence or absence of an authorized handwritten signature. For a computerised
message system to replace the physical transport of paper and ink documents
handwritten signatures have to be replaced by Digital Signatures. Basically what is
needed, is a system by which one party can send a “signed” message to another
party in such a way that
C) The receiver cannot possibly have concocted the message himself/ herself.
A digital signature is only a technique that can be used for different authentication
purposes. For an E-record, it comes functionally very close to the traditional hand-
written signatures. The user himself/ herself can generate key pair by using specific
crypto software. Now Microsoft IE and Netscape, allow the user to create his/ her
own key pair.
Here, the most important thing is how can the user be sure that public keys belong to
his/ her partner only? In this case, a third party (TTP) will guarantee the relationship
between the identity and the public keys. The TTP are popularly called Certified
Authorities (CAs).
Issuer, Issued to, orgnization name, organization unit, validity, Version, Public Keys,
Thumbprint, algorithms etc.
Secure Socket Layer (SSL) is the widely used protocol for digital certificates. The
Uniform Resource Locator (URL) starts with “https” instead of “http” and are
secured by SSL. At the bottom of the window, a lock symbol appears for SSL.
Generally 128 bits SSL are used.40 bits SSL are also available.
Hash functions may be used for data integrity as follows. The hash-value
corresponding to a particular input is computed at some point in time. The integrity
of this hash-value is protected in some manner. At a subsequent point in time, to
verify that the input data has not been altered, the hash-value is recomputed using
the input at hand, and compared for equality with the original hash-value. Specific
applications include virus protection and software distribution.
Hash functions as discussed above are typically publicly known and involve no
secret keys. When used to detect whether the message input has been altered, they
are called modification detection codes (MDCs). Related to these are hash functions
which involve a secret key, and provide data origin authentication as well as data
integrity; these are called message authentication codes (MACs).
Example (mechanism failure) Jack and Bond are communicating using a stream
cipher.
Messages which they encrypt are known to have a special form: the first twenty bits
carry information which represents a monetary amount. An active adversary can
simply XOR an appropriate bit string into the first twenty bits of cipher text and
change the amount. While the adversary has not been able to read the underlying
message, she has been able to alter the transmission. The encryption has not been
compromised but the protocol has failed to perform adequately; the inherent
assumption that encryption provides data integrity is incorrect.
Example (forward search attack) Suppose that in an electronic bank transaction
the bit field which records the value of the transaction is to be encrypted using a
public-key scheme. This simple protocol is intended to provide privacy of the value
field – but does it? An adversary could easily take all possible entries that could be
plaintext in this field and encrypt them using the public encryption function.
(Remember that by the very nature of public-key encryption this function must be
available to the adversary.) each of the cipher texts with the one which is actually
encrypted in the transaction, the adversary can determine the plaintext. Here the
public-key encryption function is not compromised, but rather the way it is used.
8.14 SUMMARY
• Encryption is one common method of protecting information transmitted over
unreliable lines where plain text is being converted to Cipher text and then
again to plain text.
• Basically there are two algorithms used for encryption .One is RSA and other
one is DES.
• RSA is an asymmetric cryptography and DES is symmetric one.
• A system where one secret key shared is called Symmetric or Secret Key
Cryptography.
• A cryptosystem where two different keys are used for encryption and
decryption is called Asymmetric or Public Key System.
• Digital signature is a technique to secure electronic information in such a way
that the originator of the information, as well as the integrity of information can
50 be verified with proper authentication.
• Digital certificates are provided by Certified Authorities (CAs) to authenticate Data Encryption and
Digital Signatures
that a particular site is globally secured.
• There are five common CAs in India. They are Safescrypt Ltd, TCS, IDRBT,
MTNL and NIC.
• A hash function is a computationally efficient function mapping binary strings of
arbitrary length to binary strings of some fixed length called hash-values. The
most common cryptographic uses of hash functions are with digital signatures
and for data integrity.
• Key establishment is any process whereby a shared secret key becomes
available to two or more parties, for subsequent cryptographic use.
• Key establishment can be subdivided into key agreement and key transport.
• Key management is the set of processes and mechanisms, which support key
establishment and the maintenance of ongoing keying relationships between
parties, including replacing older keys with new keys as and when necessary.
3. Silberschatz. Galvin, Gagne. Operating System Concepts. 7th ed. John Wiley
& Sons, 2006.
52
Convergence, Internet
UNIT 9 CONVERGENCE, INTERNET Telephony and VPN
9.1 INTRODUCTION
In this unit we will discuss the concepts of convergence, Internet telephone and
VPN. Convergence is a term that has a different meaning for every platform. It
covers a wide area of applications. Every field of application is on the way to
convergence because of advancement of technology. For example, mechanical
convergence is quite different from communication convergence. In simple words,
convergence means taking advantage of a unified way to do an operation which is
53
Cyberspace being done through multiple ways, so that effort will be less and the same effect or
output is obtained. The VPN market is on the verge of explosive growth. A virtual
private network (VPN) broadly defined, is a temporary, secure connection over a
public network, usually the Internet. The idea of the VPN is to give the company the
same capabilities at a much lower cost by using the shared public infrastructure
rather than a private one. Internet telephony is the latest technology to dazzle both
the datacom and telecom industries. Many of those outside those sectors are now
wondering what exactly this technology is, how it works, and whether it has yet
matured into a commercially viable communications tool.
9.2 OBJECTIVES
After studying this unit, you should be able to:
• explain what is Communication Convergence;
• describe what is Virtual Private Network (VPN) its working and Architecture;
• enlist protocols that have emerged for building VPN’s; and
• describe what is Internet telephony, and explain the benefits, approval issues
and equipments required for Internet telephony.
With most remote access VPNs, it is assumed that a corporation trusts the person
at the other end of the link, which is typically a travelling or remote salesperson.
Rather than worrying that the employee might do damage to the network or steal
proprietary formation, the company is probably more concerned with the unknown
element between the two end points. These companies will generally assume a
“transparent access” policy, best described as: “The remote employee should have
unfettered access to all resources that would be available to them if they were sitting
at their desk at corporate headquarters.”
The priority, therefore, becomes encrypting the data in transit so that only the intended
recipient can decipher it. Most VPNs can meet this basic security requirement, so
evaluators should consider additional criteria, such as the strength of the encryption
cipher and the authentication method for providing additional security.
The industries that are the most leery of any kind of security risk, such as the financial,
health, and government sectors, are paradoxically the earliest adopters of VPN
technologies, which have the perception of being less secure than traditional means
of networking. In reality, the best VPN technologies are much more secure than
most leased lines and dial-up remote access, because highly secure VPNs encrypt
all data and generally provide very detailed user profiles for access control. Highly
secure remote access solutions are deployed by sophisticated IT shops with a strong
understanding of the security risks inherent in any network communication. These
shops generally adopt a “controlled access” policy for their remote users. This is
best described by the following policy statement: “The remote employee should
have tightly controlled access to specific resources on the network according to the
requirements of their job function.”
These companies deploy policy-driven VPNs to provide highly secure remote access
over the public networks. Secure policy-driven VPNs authenticate individual users,
not just IP addresses, so that a corporation knows which employee is trying to gain
access to the network. This can be accomplished through common passwords digital
certificates, token cards, smart cards, or biometrics, such as fingerprint or iris
scanning. Once an employee has authenticated to the corporate VPN server, he or
she is granted a certain level of access depending on his or her profile, which is
usually set up by a network administrator to match the corporate security policy
and enforced by a sophisticated system of data stream filters and access control
parameters. This three-tier system is essential for companies that allow their
employees to access mission-critical information, particularly when those
employees are not entirely trusted.
Any time a company wants to provide varying levels of access so that different
resources can be made available to different employees when appropriate, or when
a company wants to prevent “back-door” holes into the network, which is common
in some systems, and then a more robust VPN solution is recommended. In other
words, a highly secure VPN should be able to intercept network traffic destined for
a particular host, add the required encryption, identify individual users, and apply
restrictions and filter content accordingly.
58
9.5.3 Extranet VPNs Convergence, Internet
Telephony and VPN
Unlike intranets that are relatively isolated, extranets are intended to reach
partners, customers, and suppliers, as well as remote employees. Securing that wide
area network requires diligence and the right tools. An extranet VPN needs to be
able to provide a hierarchy of security, with access to the most sensitive data being
nested under the tightest security control. It should secure all applications, including
TCP and UDP applications, such as Real Audio, FTP, etc.; corporate vertical
applications, such as SAP, BAAN, People Soft, Oracle, etc.; and “homegrown”
applications, such as Java, Active X, Visual Basic, etc. Because most corporate
computing environments are heterogeneous with many legacy systems, a sound
VPN solution should be extremely versatile and interoperable with multiple platforms,
protocols, and authentication and encryption methods.
General vs Highly Secure Case
The main objective of an extranet or business-to-business VPN is to ensure that
mission-critical data arrive intact and in the proper hands without ever exposing
protected resources to potential threats, so companies should only consider
implementing the most secure breed of VPNs.
The security elements of a VPN can be prioritized differently, but with an extranet
VPN, all the fundamental pieces 3/4 encryption, authentication, and access control
3/4 should be integrated tightly with some type of perimeter security. Usually this
means a company will place a VPN proxy server behind an impenetrable firewall
that blocks all unauthenticated traffic. Any traffic that is allowed in is then funneled
through a common portal directly to the VPN server, which filters traffic according
to company policy. It is essential for the connection between the firewall and the
VPN to be strong and reliable, and the client software should be as transparent as
possible.
Please answer the following Self Assessment Question.
The VPN security market is young, and standards are still evolving, but a handful of
protocols have emerged as the leading choices for building VPNs. An IS manager
should not have to base his or her purchasing decision on the technology used, but
understanding the benefits of each protocol may help clarify the related strengths
and weaknesses of different VPN end products. Although there are many possible
security approaches for creating a VPN, the following protocols show the most
promise for lasting in the market, whether for the quality of their design or their
financial backing.
For secure VPNs, the technologies that VPNC supports are
• IPsec with encryption
• L2TP inside of IPsec
• SSL with encryption
For trusted VPNs, the technologies that VPNC supports are:
• MPLS with constrained distribution of routing information through BGP
(“layer 3 VPNs”)
• Transport of layer 2 frames over MPLS (“layer 2 VPNs”)
IPsec is the most dominant protocol for secure VPNs. SSL gateways for remote-
access users are also popular for secure VPNs. L2TP running under IPsec has a
much smaller but significant deployment. For trusted VPNs, the market is split on
the two MPLS-based protocols. Companies want to do their own routing the to
use layer 2 VPNs; companies that want to outsource their routing tend to use layer
3 VPNs.
The various VPN protocols are defined by a large number of standards and
recommendations that are codified by the Internet Engineering Task Force (IETF).
There are many flavours of IETF standards, recommendations, statements of common
practice, and so on. Some of the protocols used in IPsec are full IETF standards;
however, the others are often useful and stable enough to be treated as standard by
people writing IPsec software. Neither of the trusted VPN technologies are IETF
standards yet, although there is a great deal of work being done on them to get them
to become standards.
9.7.1 SOCKS v5
SOCKS v5 was originally approved by the IETF as a standard protocol for
authenticated firewall traversal, and, when combined with SSL, it provides the
foundation for building highly secure VPNs that are compatible with any firewall.
STOCKS 5, which follows a proxy server model and works at the TCP socket
level. It requires a SOCKS 5 server and appropriate software in order to work.
The SOCKS 5 client intercepts a request for service, and checks it against a security
database. If the request is granted, the server establishes an authenticated session
with the client, acting as a proxy. This allows network managers to apply specific
controls and proxied traffic, and specify which applications can cross the firewall
into the Internet.
It is most appropriately applied to VPNs that require the highest degree of security,
since its strength is access control. SOCKS v5 was developed in 1990 by David
Koblas and championed through the IETF by NEC Systems Laboratory. It is currently 61
Cyberspace the only IETF-approved standard being used to create VPNs. Though it is not as
well known as some of the other protocols, it has received widespread support
from industry leaders such as Microsoft, Netscape, and IBM. SOCKS v5 is the
protocol used in Aventail’s policy-based VPN solution.
Advantages
SOCKS v5 controls the flow of data at the session, or circuit, layer, which maps
approximately to layer five of the OSI networking model. Because of where it
functions in the OSI model, SOCKS v5 provides far more detailed access control
than protocols operating at the lower layers, which permit or reject packets based
solely on source and destination IP addresses. SOCKS v5 establishes a virtual
circuit between a client and a host on a session-by-session basis and provides
monitoring and strong access control based on user authentication without the need
to reconfigure each new application. Because SOCKS v5 and SSL operate at the
session layer, they have the unique ability to interoperate on top of IPv4, IPSec,
PPTP, L2TP, or any other lower-layer VPN protocol. In addition, SOCKS v5
and SSL have more information about the applications running above them than do
lower-layer protocols, so they can provide very sophisticated methods of securing
traffic.
SOCKS v5 stands out as the only VPN approach to use a directed architecture,
which essentially protects destination computers by proxying traffic between source
and destination computers. When used in conjunction with a firewall, data packets
are passed through a single port in the firewall (port 1080 by default) to the proxy
server, which then filters what is sent forward to a destination computer. This prevents
administrators from having to open multiple holes in their firewall for different
applications. For additional security, the VPN proxy server hides the address structure
of the network, making it more difficult for confidential data to be cracked. Another
design advantage of SOCKS v5 is that the client is non-intrusive. It runs transparently
on the user’s desktop and does not interfere with networking transport components,
as do lower-layer protocols, which often replace the Winsock DLL, TCP/IP stack,
and low-level drivers, interfering with desktop applications. SOCKS v5 is also highly
flexible. It works easily with multiple security technologies and platforms, which is
critical for IS professionals managing heterogeneous computing environments. It
offers modular plug-in support for many authentication, encryption, and key
management methods, providing IS managers the freedom to adopt the best
technologies for their needs. Plug-and-play capabilities include access control tools,
protocol filtering, content filtering, traffic monitoring, reporting, and administration
applications. SOCKS v5 can filter data streams and applications, including Java
applets and ActiveX controls, according to very detailed specifications.
Disadvantages
..........................................................................................................
63
Cyberspace
9.8 WHAT IS INTERNET TELEPHONY
The concept behind Internet telephony (also known as Voice over IP (VOIP) or IP
telephony) is a simple one: the transfer of voice messages using Internet protocol
(IP) networks. This technology enables standard data packets to transmit multimedia
information such as voice or video over the Internet or any other IP-based local- or
wide-area network. It draws on open standards and recommendations generated
by international groups such as the Internet Engineering Task Force (IETF) and the
International Telecommunication Union (ITU). All suppliers of Internet telephony
products meet these standards. At present internet telephony has already been
legalized in India. It is limited to legalizing PC to PC phone calls to India. Again PC
to landline phones is still not permissible in India under the government of India’s
guidelines.
9.8.1 Benefits of Internet Telephony
Standing to benefit most from Internet telephony, obviously, are companies that
make significant numbers of long-distance calls — for example, large organizations
with offices around the world. With Internet telephony, the customer pays only for
the call to the Internet gateway hosted by its local Internet service provider or its
own company intranet. Thus all telephone calls are billed at the local-call rate,
dramatically reducing long-distance charges. Moreover, choosing an IP network
enables a company to use a single communication medium rather than having to
maintain separate systems for voice and data communications — again lowering
costs and increasing efficiency.
In effect, then, Internet telephony offers a single method for communications,
combining voice, video, and data traffic by adopting IP as a common protocol and
merging up to three different network structures in one comprehensive medium.
9.8.2 Bandwidth Growth
One reason for the increasing acceptance of Internet telephony is the continuous
expansion of bandwidth within LANs, as Fast-Ethernet and switching are gradually
being replaced by the far more efficient asynchronous transfer mode (ATM) and
Gigabit Ethernet. The resultant oversupply of bandwidth (especially among local
networks) has in turn created a demand for new applications such as Internet
telephony. Standards now being developed will guarantee a certain level of service
in these IP-based networks, since bodies such as IETF have recognised that few or
no standards adequately addressed the transmission of voice or video over the
Internet. New technologies such as RSVP (resource reservation protocol) and RTP
(real-time transport protocol) have therefore been developed to enable real-time
operation on today’s existing IP networks. More than anything else, however, it is
the sheer improvement in voice quality that has allowed the Internet telephony
technology to compete successfully with traditional telephone companies.
9.13 SUMMARY
• Convergence is a method of doing many things in a single way. As far as our
course is concerned, Communication convergence is most important.
• Communication sector comprises broadcasting, telecom and information
technology.
• Malaysia is the first country to introduce Communication Convergence bill.
• A virtual private network (VPN) is a private data network that makes use of
the public telecommunication infrastructure, maintaining privacy through the
use of a tunneling protocol and security procedures.
• The three fundamental features that define virtual private networking are
encryption, authentication, and access control.
• VPNs can be used by is professionals via Intranet VPN, remote access VPN
and extranet VPN.
• Socks v5, PPTP (Point to Point Tunneling Protocol/ L2TPP Layer Two
66 Transport Protocol are VPN protocols.
• A corporation and its branch offices, is referred to as an “intranet VPN”. Convergence, Internet
Telephony and VPN
• The concept behind Internet telephony (also known as Voice over IP or IP
telephony) is the transfer of voice messages using Internet protocol (IP) networks.
• At present, Internet telephony is legal in India and fee has been reduced. It is
limited to legalizing PC to PC calls in India.
• PC to landlines telephony is still not permissible in India under the Government
of India Guidelines.
2. Dr. M. Jain and Satish Jain. Data communication and Networking. 1st ed .BPB,
2004.
67
The Regulability of
UNIT 10 THE REGULABILITY OF Cyberspace
CYBERSPACE
Structure
10.1 Introduction
10.2 Objectives
10.3 Desirability of Regulation of Cyberspace
10.3.1 Need for Regulation of Cyberspace
10.13 Summary
10.14 Terminal Questions
10.15 Answers and Hints
10.16 References and Suggested Readings
10.1 INTRODUCTION
Internet is not a physical or tangible entity but rather a giant network which interconnects
innumerable smaller groups of linked computer networks. The term ‘online’ (relating to
the form of communication and its mode of transmission by telecommunication lines)
can also be used. There has been a rapid increase in the use of the online environment
where millions of users have access to internet resources and are providing contents on
a daily basis. This content can be accessed from any computer connected to the network 5
Social Issues in the though the content may be actually stored on a number of different computers or ‘servers’
Regulation of Cyberspace
which need not be in the same jurisdiction as the person who is accessing the material.
Internet users may be completely unaware where the resource being accessed, is in
fact physically located. This computer networking has been very helpful for businesses
of all types for a variety of commercial transactions and consumer services. Apart from
transactions involving physical goods, delivery of digitized information products such as
music, photographs, novels, motion pictures, multimedia works and software can also
be done online. In future also it leads to an increase of economic and creative interactions
and inevitably also leads to expansion of disputes involving acquisition, use, possession,
processing and communication of information.
The rules for regulating business interaction in a country are different from rules for
online commerce. Every country in the world is regulated by law, which is the primary
source of regulation. Social norms which guides ones behaviour also function as
secondary regulatory constraint. The third constraint is the market which regulates through
price mechanism by limiting the amount which a person can spend on different needs;
another constraint may be the nature of the world in which we exist. In the real world,
the person or the entity with whom interaction relating to business is going on can be
located; and thereby the validation of a transaction is facilitated. But in Cyber Space it
is very difficult, since parties to a transaction may be sitting in adjoining rooms or in
distant locations but the network offers no way to know it. It is often argued that
cyberspace is unavoidable but it is not regulable, its behaviour can’t be regulated.
According to Dr. Dan L. Burk, Assistant Professor of Lawseton Hall University, there
is simply no coherent homology between Cyberspace and real space, and screening or
blocking of Internet resources by country is nearly impossible. On the other hand it is
argued by Lawrence Lessing in his article ,‘‘The Laws of Cyberspace”, that Cyberspace
has the potential to be the most fully and extensively regulated space that has ever been
known – anywhere at any time in our history. According to him just as in real space,
behaviour in Cyberspace is regulated by four sorts of constraint i.e. law, social norms,
market and codes (also called architecture).
Every technological revolution brings with it a new spate of legal issues and legal
problems to be addressed. The real purpose of our study is to stress the need for
regulation of Cyberspace and the possibility and scope of its regulation.
10.2 OBJECTIVES
After studying this unit, you should be able to:
• explain the need and desirability for regulation of internet content both in developed
and developing countries;
• discuss that in relation to harmful content on on-line services, the greater emphasis
is on self-regulatory scheme of industry governance;
• discuss the nation’s legal policies and framework for regulating cyberspace;
• state the desirability for international framework of principles, guidelines and rules
for global communication; and
• discuss the need for coordinated national, if not international criminal laws to deal
with illegal content on online services.
6
The Regulability of
10.3 DESIRABILITY OF REGULATION OF Cyberspace
CYBERSPACE
10.3.1 Need for Regulation of Cyberspace
The following reasons can be cited in favour of the above proposition:
1) The most visible and readily sensational concern is about the use of internet
particularly for the distribution of obscene, indecent and pornographic content.
The use of internet for child pornography and child sexual abuse and the relative
ease with which the same may be accessed calls for strict regulation.
2) The challenge that Cyberspace is posing to traditional notions of jurisdiction and
regulation is another factor. The increasing business transaction from tangible
assets to intangible assets like Intellectual Property has converted Cyberspace
from being a mere info space into important commercial space. The attempt to
extend and then protect intellectual property rights online will drive much of the
regulatory agenda and produce many technical methods of enforcement.
3) With the inventions of new technologies, the media has enhanced the possibility of
invasion of the privacy of individual and bringing it into the public domain. The
major area of concern where some sort of regulation is desirable is data protection
and data privacy so that industry, public administrators, netizens, and academics
can have confidence as on-line user.
4) Encryption is the process of converting a message or document into a form which
hides the content of the communication from the eyes of an eavesdropping third
party and needs to be decrypted if its content is to be read. New cryptographic
techniques (cryptography is the process used to encode/encrypt electronic
information) are commonly cracked in a relatively short time by computational
force or by other analytical means. Therefore another area in which regulation has
assumed importance is in the debate over whether the public should be permitted
to use ‘cryptography’ or not.
5) Internet has emerged as the ‘media of the people’ as the internet spreads fast there
were changes in the press environment that was centered on mass media. Unlike
as in the established press, there is no editor in the Internet. In the press and
publication environment, editors check the truthfulness of facts and circulate them
once the artistic values are confirmed. On the internet however, people themselves
produce and circulate what they want to say and this direct way of communication
on internet has caused many social debates. Therefore the future of Cyberspace
content demands the reconciliation of the two views of freedom of expression and
concern for community standards.
6) Another concern is that, money laundering, be ‘serious crime’ becomes much
simpler through the use of net. The person may use a name and an electronic
address, but there are no mechanisms to prove the association of a person with an
identity so that a person can be restricted to a single identity or identity can be
restricted to a single person. Viruses, rumor-mongering, hate-mail and mail box
bombardment are all describable phenomena and because of the fear of retribution
all are more likely to use fake identity or may be anonymous mailers rather then a
readily identifiable person. Therefore Cyberspace needs to be regulated to curb
this phenomenon.
Please answer the following Self Assessment Question. 7
Social Issues in the
Regulation of Cyberspace Self Assessment Question 1 Spend 3 Min.
This Act came into force on January 1, 2000. There is a provision for additional
access prevention method other than ISP blocking of overseas hosted material at
server level.
• Awareness: Making parents, teachers and children aware of the potential of the
Internet and its drawbacks, overall co-ordination and exchange of experience.
3) establishment of national hotlines for complaints regarding on-line content and for
some appropriate interconnection and interaction between national hotlines.
In 29 June 1998, on invitation by Martin Bangemann, business leaders from around the
world participated in a discussion on global communication issues, with the objective to
explore the need for strengthened international coordination which resulted in the
formation of Global Business Dialogue and it was resolved that wherever possible, it
should avoid legislation, and concentrate on market-led, industry- driven, self-regulatory
models and any regulation should ensure competition. It should focus on a well-defined
list of issues on which quick progress can be made with the close cooperation of business,
consumer groups and governments of all countries who wants to participate and work
on these issues should be industry-led and coordinated with relevant international bodies.
Two organizations closely involved in this process were the Transatlantic Business
Dialogue and the US-Japan Business Council. Attendance at the first meeting of the
GBD’s Business Steering Committee took place in New York on 14 January 1999 and
consisted largely of representations of major corporations from United States, Europe
and Japan. However, the issue of Internet content was not considered amendable to
relatively fast solutions by the GBD and so Internet content is not receiving immediate
attention from this Group.
In 27 February 1999, the first meeting of the International Network of Experts on Self-
Regulation for Responsibility and Control on the Internet was held at New York. This
network was brought together by the Bertelsmann Foundation, a charitable foundation
which owns the controlling interest in Bertelsmann Corporation, the German media and
publications enterprise, as a part of its advocacy of self-regulatory solutions to the
problems of Internet content. The three regulatory agencies represented at the meeting
were the Australian Broadcasting Authority, the Canadian Radio Telecommunications
Commission (by Mr. Ted Woodhead) and the Singapore Broadcasting Authority (by
Ms. Ling Pek Ling); all of which are actively dealing with the issues of self-regulation of
harmful content on the Internet.
The above study reflects different legal policies in the world for regulation of cyberspace
and International efforts to deal with it. However some sort of criminal penalties should
also be there in all national laws for which coordinated criminal laws are needed to deal
with illegal content on on-line services. 15
Social Issues in the 10.12.1 Organization for Economic Cooperation and
Regulation of Cyberspace
Development (OECD)
The OECD an international organization working in the area of data privacy and
information security, established an ad hoc process of meetings (the first was on 1-2
July 1997 and second on 22 October 1997) on approaches being taken in major
industrial countries for the regulation of content conduct on the Internet. The meeting
acknowledged the primary role of the private sector in regulating the Internet. However
at the joint OECD/Business and Industry Advisory Committee forum held on 25 March
1998 in Paris, the OECD resolved to do no further work in this area. On 19 April
2006, OECD task force on spam has recommended that Governments and industry
should step up their coordination to combat the global problem of spam. It calls on
governments to establish clear national anti-spam policies and give enforcement
authorities more power and resources. Co-ordination and co-operation between public
and private sectors are critical, the report notes.
10.12.2 UNESCO
The United Nations Educational, Scientific and Cultural Organization (UNESCO) was
founded on 16 November 1945. At the 29th UNESCO General Conference held in
Paris from 21 October to 12 November 1997 the Director-General of UNESCO
made a preliminary report on the feasibility of an international instrument on the
establishment of a legal framework relating to cyberspace. It recommended the
preservation of a balanced use of language on cyberspace, which represented the
concern of non-Anglophone countries at the domination of English as the language of
the Internet. Today, UNESCO functions as a laboratory of ideas and a standard-setter
to forge universal agreements on emerging ethnical issues: the organization also serves
as a clearing house – for the dissemination and sharing of information and knowledge –
while helping Member States to build their human and institutional capacities in diverse
fields.
Please answer the following Self Assessment Question.
• There has been rapid increase in use of internet for various types of commercial
transactions and consumer services.
• For the safe carriage and conduct of Cyberspace, regulation ought to be identified
as appropriate and necessary.
• The necessity arises due to the expansion of economic and creative interaction
which in term led to disputes involving acquisition, use, possession, processing
and communication of information.
• The use of internet for obscene, indecent and pornographic content, rumor
mongering, viruses, cyber crime, possibility of invasion of privacy of individuals,
all this emphasized the need for cyberspace regulation.
• Legal policies in various countries like USA, UK, European Union, and New
Zealand show that in the context of regulation of Cyberspace more emphasis is on
self regulation through use of filtering/blocking technologies.
2) What are government policies and laws regarding Cyberspace Regulation in USA,
India and UK?
1) Yes, there is a need for regulation of cyberspace. The use of internet for
distribution of obscene, indecent and pornographic content, and child
pornography; increasing numbers of business transactions through internet
and issue of intellectual property rights; issues of privacy and emerging cyber
crimes are major areas of concern today that point towards the need to regulate
cyberspace.
2) ‘Filters’ are software tools used to block access to unwanted material. Examples
are E-mail Filters, Site Blocking Filters.
2. ‘‘Internet Censorhsip: Law and Policy around the world’’. Electronic Frontiers
Australia (EFA). 28 Mar. 2002. 2 Dec.2006<http://www.efa.org.au/>.
5. James Boyle. “In a Non Delegation Doctrine for the Digital Age”. Duke L.J. 5.50.
9. Martin Bangemann’s. “New World Order for Global Communications – The Need
for an International Charter”. Speech given at International Telecommunications
Union, Geneva.8 Sept. 1997.
18
E-governance
UNIT 11 E-GOVERNANCE
Structure
11.1 Introduction
11.2 Objectives
11.10 Summary
11.1 INTRODUCTION
This is perhaps one of the most interesting times when we are undergoing such
significant changes in the way we live and operate as a society. We have witnessed
phenomenal of changes in societies around the world in a very short period, and the
source of agents of some of these changes is new technologies and the Internet. In
the past decade and a half we have seen every aspect of the lives of individuals and
organizations go through many transformation evolutions. Large, medium and small
corporations alike have discovered the need to adapt to the new technologies, or
sink in the emerging global knowledge economy. There is no facet of life in the
industrialized and developing world that has not undergone some form of alteration.
The resultant new information economy has brought with it different approaches to
work. There has been a surge in tele-workers, entrepreneurs and home-run businesses.
Corporations have downsized, and knowledge workers migrate from company to
company, open to the highest bidder and the organization with the best deal. The
highly proficient, intelligent and innovative knowledge worker is in demand. Knowledge
itself seems to have become a commodity in the marketplace of ideas. We now live
in an intensely information driven society. 19
Social Issues in the Nowhere has this been more evident than with government, who constantly have to
Regulation of Cyberspace
cope with the persistently emerging new technologies and new demands from citizens.
In today’s wired world, the interactive citizen is one of the fundamental cornerstones of
change. Governments can no longer simply be dispensers of information. New
technologies are being used not only to deliver services to the public but also to enhance
government administration and facilitate businesses. Information sharing is of
particular relevance to developing countries. The application of IT to government
processes, E-governance in short, can have a profound impact – on the efficiency,
responsiveness and accountability of government; thereby, on the quality of life and
productivity of citizens, especially the poor and ultimately, on the economic output and
growth of the country as a whole.
11.2 OBJECTIVES
After studying this unit, you should be able to:
i) Achieving visibility i.e. the general public comes to know about that organ of
Government. Most of the sites maintained by State provide certain basic
information and profile of that state.
ii) On-line access to information in public domain. Knowledge of laws, rules and
regulation reports of various commissions etc. are being provided by Government
on-line now.
With the implementation of E-governance, though many of the citizen’s worries can be
solved, the ultimate goal is to achieve ‘good-governance’; a government in which people
have active participation, a government which is transparent, responsive, effective and
result-oriented. It is the ICT internet in particular, with its capacity to break the barriers
of time and distance and to bring together a wealth of information from a virtually
unlimited number of sources, that has the potential to transform traditional governance
and to achieve good-governance. Thus comes the concept of E-governance, i.e. use of
ICT to ensure the citizen’s participation in governance and allowing him/her to
communicate with the government. The E-governance will truly allow citizens to
participate in the government at decision and policy-making process, reflect their true
needs and welfare by utilising E-government as a tool. In simple words, E-governance
is the use of ICT by Government to deliver information and services, to encourage
citizen’s participation, to redress public grievances and to make its machinery more
responsive, accountable and effective. In fact, through E-governance, the aim of
SMART governance is to be achieved:
Simple – Because there are no elaborate procedures, no paper work and no need for
frequenting government offices.
Responsiveness – Through the use of ICT; Government can be in regular touch with the
masses and get their feedback.
Transparency – The information which was shrouded in secrecy within dark file
chambers will become available to all on the click of a mouse.
21
Social Issues in the Please answer the following Self Assessment Question.
Regulation of Cyberspace
Self Assessment Question 1 Spend 3 Min.
11.10 SUMMARY
• E-governance primarily refers to use of ICT in the discharge of governmental
functions. However it is not only limited to delivery of the governmental services.
The aim of E-governance is to ensure greater citizen participation in governance.
• The components of E-governance are:
Government–Citizen Interface
Government – Government Interface
Government – Business Interface
Government – Employee Interface
Government – Society Interface
• The rationale for E-governance is its capacity to provide a government which is
efficient, responsive, and corruption-free. It strengthens democracy by increasing
the citizen’s role in policy making and information sharing.
• The benefits of E-governance are:
Automation of Administrative Processes
Workforce Reduction
Better Service Delivery
Technical and Supportive Role
Transparency
Economic and Social Development
Change in the Administrative Culture
• The ICT has been accepted by the Indian Government as a catalyst to bring
rapid institutional reforms in the governmental structure and as an effective tool to
reach out to hitherto deprived masses. The central government has framed National
E-governance Action Plan for the proper implementation of E-governance. Various
states have also started programmes related to E-governance.
• The challenges faced in implementing E-governance are:
Lack of Resources
Lack of Infrastructure 31
Social Issues in the Digital Divide
Regulation of Cyberspace
Lack of Relevant Information in Local Languages
Building E-governance Capacity
Security Issues in Cyberspace
Reluctant Bureaucracy
8. Jessop Bob. “The Rise of Governance and the Risks of Failure: The
Case of Economic Development”. International Social Sciences Journal
155(1998):29-45.
10. Prabhu, C.S.R. E-governance: Concepts and Case Studies. New Delhi:Prentice
Hall of India, 2004.
11. Saith, Aswini, and M.Vijayabaskar. ICTs and Economic Development. New
Delhi: Sage Publications, 2005.
33
Social Issues in the Appendix A
Regulation of Cyberspace
Lok Mitra is the first of its own kind of Electronic service in the state of Rajasthan. It
aims to deploy Information Technology for the benefit of the masses.
It is an e-governance project in which the computer server is linked to different
Departmental servers through Dedicated Leased Line & Dial-up Network with multiple
e-counters, which can handle all services. It has facility of making payments through
Internet using Credit Card.
SETU- A bridge for facilitation between Citizen & Government
The facility aims at providing following services
− Single windown clearance of 83 important certificates (includes renewal of leases,
permits & licences)
− Quick redressal of public grievances
− Common registry of letters, petitions for all sections of the office
− On line pendency monitoring of all above
− To provide services after office hours & on holidays also in order to save Time,
Money & Energy of the public.
Jan Mitra
Jan Mitra is an Integrated e-platform through which rural population of Rajasthan can
get desired information and avail services related to various government departments at
kiosks near their doorsteps.
It offers following services:
− Public Grievance Redressal System, Online Submission of Application forms and
Land & Revenue Records.
− Public Distribution System, BPL List, Electricity Priority Connection List, Drinking
Water Resources, Village Schemes, Citizen Charters and Immovable Property
rates.
− Health Information, Agriculture Information, Education Information and Animal
Husbandry Information.
− Agriculture Mandi rates daily Mandi rates and Weekly / Monthly Mandi rates.
Drishtee-Connecting India Village by Village
Drishtee is an organization platform for developing IT enabled services to rural and
semi-urban populations through the usgage of state-of-the-art software. Using a tiered
franchise and partnership model, Drishtee is capable of enabling the creation of
approximately 50,000 Information Kiosks all over India within a span of six years.
These kiosks would potentially serve a market of 500 million people, with aggregate
discretionary purchasing power of Rs. 100 billion (Rs. 10,000 crores). In less than two
years, Drishtee has successfully demonstrated its concept in over 90 kiosks across five
Indian states.
35
Social Issues in the States where Implemented: Haryana, Punjab, Madhya Pradesh, Gujarat, Orissa.
Regulation of Cyberspace
Aarakshi
Aarakshi is an Intranet based system that has been developed and implemented for
Jaipur City Police. This innovative system enables the city police officers to carry out
on-line sharing of crime & criminal data bases, carry out communication and perform
monitoring activities.
FAST – Transport Department Automated
The ‘Fully Automated Services of Transport’ is another e-governance project
implemented in the cities of Andhra Pradesh. The objective of FAST is to make the
transport department citizen friendly in its functioning and provide SMART services to
the public. Covering all gamut of services of Transport Department like Issue of Driving
Licences, Registration of Motor Vehicles, Issue Permits, Collection of Motor Vehicle
Taxes, etc.
VOICE (Vijayawada Online Information Centre)
The project to delivers municipal services such as building approvals, and birth and
death certificates, to the people of Vijayawada. It also handles the collection of
property, water and sewerage taxes.
MUDRA (Municipal Corporation towards Digital Revenue Administration)
The system will be useful for the Holding owners, Tax collectors, officials at
headquarter levels and Circles levels. They will have total picture of tax collection that
will help the decision makers to take suitable decision for further improvement. It is
designed to computerise the over all functions of tax collection system of Patna
Municipals Corporation.
KHAJANE (Online Treasury System)
The online treasury project, KHAJANE, implemented in computerises all the 216
treasury offices in Karnataka and is connected to a central server at the state Secretariat
through VSAT (Very Small Aperture Terminal). KHAJANE aims to bring about a more
transparent and accountable system of financial transactions and also discipline in
operations and management, resulting in efficiency and cost savings for the government.
e-Cops (e-Computerised Operations in Andhra Pradesh for Police Services)
Launched on the 17th of July 2002, as part of the VISION 2020, the state’s focus on
modernisation of police administration takes the shape of eCOPS. It will help police
stations reduce paperwork and automate the maintenance of registers, report generation,
data analysis, planning and co-ordination, enable the speedy detection of crime and
monitor prosecutions. For citizens, the project will lead to online interaction with the
police department over the Internet.
TARAhaat – Achieving Connectivity for the Poor Case Study
This project, named “TARAhaat” after the all-purpose haat (meaning a village bazaar),
comprises a commercially viable model for bringing relevant information, products and
services via the Internet to the unserved rural market of India from which an estimated
50% of the national income is derived.
36
Lok Mitra E-governance
The Lok Mitra project was formally dedicated to the people of Hamirpur in Himachal
Pradesh as a pilot phase on the 8th of May 2001. The services offered include information
about vacancies, tenders, market rates, matrimonial services, village e-mail. An interesting
feature is that citizens can use the IT enabled system as a grievance redress system.
Mahiti Shakti
Launched in 2001, in Gujarat the portal http://www.mahitishakti.net/ operates like a
single window through which the citizens can access information related to all aspects
of the government’s functioning, various benefit schemes and services ranging from
obtaining ration cards to getting sanction for old age pension.
Warana Wired Villages
The key objective of the project has been to utilize IT to increase the efficiency and
productivity of the existing sugar cane cooperative enterprises by setting up of a state-
of-the-art computer communications network. This provides agricultural, medical, and
educational information in the local language to villages around Warana Nagar in the
Kolhapur and Sangli Districts of Maharashtra.
Community Information Centre
On 22 August 2002, the Prime Minister dedicated to the people of the eight North-
Eastern states a new structure of localized governance called Community Information
Centres. Basic services to be provided by CICs include Internet access and e-mail,
printing, data entry and word processing and training for the local populace. Most
CICs charge nominal amounts from users for services, which helps them to meet day-
to-day running expenses.
Community Learning Centre Project
Set up between March and July 2001, the Community Learning Centre (CLC) is a
joint initiative between the Azim Premji Foundation (APF) and the State government of
Karnataka. Each CLC is housed in a separate room in the school and is equipped with
five to eight computers. The CLCs are used to enhance classroom learning during
school hours.
Dairy Information Services Kiosk
The project consists of two basic components — an application running at the rural
milk collection society that could be provided Internet connectivity and a portal at the
district level serving transactional and information needs of all members. DISK has
helped in the automation of the milk buying process at 2,500 rural milk collection societies.
State where Implemented: Gujarat
GramSampark
‘Gramsampark’ is a flagship ICT product of the state of Madhya Pradesh. A
complete database of available resources, basic amenities, beneficiaries of
government programmes and public grievances in all the 51,000 villages of Madhya
Pradesh can be obtained by accessing the website, Gramsampark has three sections-
Gram Paridrashya (village scenario), Samasya Nivaran (grievance redress) and
Gram Prahari (village sentinel). 37
Social Issues in the Akshaya
Regulation of Cyberspace
As part of Kerala’s ambitious e-literacy campaign, Akshaya e-Centers are being set up
throughout Kerala. These centers will initially provide e-literacy to one member from
every household and act as ICT dissemination nodes and ITeS delivery points in every
village.
Headstart
Headstart provides computer-enabled education and basic computer skills for all students
in 6000 Jan Shiksha Kendras of Madhya Pradesh. Madhya Pradesh has 6500 Jan
Shiksha Kendras (cluster resource centres) located in Middle School premises in 48
districts. Headstart will equip every Jan Shiksha Kendra in the state with computer
hardware and multimedia software.
E-chaupal
Started by ITC’s international Business Division as a cost-effective alternative supply
chain system to deal directly with the farmer to buy products for exports is getting
transformed into a meta market for rural India. The tobacco giant has already set up
over 700 choupals covering 3,800 villages in four states –– which include Madhya
Pradesh, Uttar Pradesh, Karnataka and Andhra Pradesh –– dealing with products
ranging from soya bean, coffee, acquaculture and wheat.
38
Issues Concerning
UNIT 12 ISSUES CONCERNING Democracy, National
Sovereignty, Personal
DEMOCRACY, NATIONAL Freedom
SOVEREIGNTY, PERSONAL
FREEDOM
Structure
12.1 Introduction
12.2 Objectives
12.3 Cyberspace and National Sovereignty
12.3.1 Threats Posed by Cyberspace
12.1 INTRODUCTION
The architecture and growing use of internet demands the fundamental re-examination
of the institutional structure within which rule making takes place. Traditionally, justice is
administered by law which binds together the community and enforce some rules to
prevent conflict of people within the community. This law contemplates first a community
and secondly some authority which can enforce the rules intended to prevent these
conflicts, and it is this community or organizations with rules to regulate the conduct of
the members of the community that we usually term as state. This state has four elements
(1) population – ‘i.e., citizens (members of states) (2) territory which is definite
(3) government – an instrument through which sovereign will of the state finds concrete
expression, (4) sovereignty – a body having internal supremacy and external
independence i.e., legally independent of the control of any other state.
In the context of cyberspace, which is very technological in nature, it can be said that its
very nature has affected the cultural practices of various communities in cyberspace.
John Perry Barlow in his Article, “Thinking Globally, Acting Locally”, has described
cyberspace as offering the promise of a new social space, global and anti sovereign,
within which anybody, anywhere can express to the rest of humanity whatever he or
she believes without fear. There is in these new media a foreshadowing of the intellectual
and economic liberty that might undo all the authoritarian power on earth.
39
Social Issues in the Today, in addition to nations of the world having their respective geographical territories,
Regulation of Cyberspace
the new domain that coexists is the domain of Cyberspace transcending national
boundaries and therefore the challenge before us is to determine what customary mores
it will acquire, how the concept of morality and principle of law can be enacted while
dealing with it, whether it should be subject to its own law in consideration with the
notion that it is outside the territory of the individual nation or whether it is more
appropriate to be concerned with individual morality reflected within the framework of
individual nations and their laws.
12.2 OBJECTIVES
After studying this unit, you should be able to:
• discuss the threats that are being posed to law and sovereignty by cyberspace;
• explain the concept of cyber democracy, and whether it can make the democratic
process more open and participatory;
• describe the concept of freedom of speech and expression and limitations on it;
and
• discuss impact of cyberspace on specific rights and freedom.
The term “Democracy” means government by the people i.e. the power is vested in
people, they have right to vote and choose their representative. But in today’s scenario
it is seen that elite groups can influence this political process in many ways through
money power. Further, globalisation and privatisation, free trade policies, all point
towards that now ownership is dominated by modern TNC (Trans National
Cooperation) showing shift of global power from democratic institutions to elite
institutions with growing potential of cyberspace to connect people seeming of next
concern.
According to the report on Cyber Democracy 2001: A global scan, cyber democracy
consists of the following components:
2) Cyber Voting – Internet voting for candidates as well as for policies via initiatives
and referenda.
5) Cyber Agenda-Setting – The use of the Internet and other ICTs to enhance or
redirect the political or policy agenda by established groups such as political parties
and non-governmental organizations (NGOs).
However this cyber democracy can be a two edged sword; the information technology
can either spark a renewal of democracy and civil society leading to popular sovereignty
or it can lead to populist manipulation. As the connectivity increases, more privacy
violations will occur may be by its governments, corporations or terrorists, there can be
increase in employment discrimination, loss of civic rituals and communities, causing
isolation into one’s own potential community.
2) Equality – which may be defined to mean equal opportunity or actual quality in life
conditions or equality of results.
Cyber democracy describes the democratic activities which are enhanced by Internet
and other information and communication technologies (ICT’s). Let us now discuss the
promises and threats posed by cyber democracy.
1) Cyber democracy may give citizens the opportunity to understand various current
and future issues, problems and opportunities, it will build community generate
learning by citizens and can ensure consistency between policy-making and
informed decision of citizens but the success of cyber democracy can be determined
by the ability of new ICTs to expand and enhance qualities of good political
participation and creation of new public policies reflecting the shared aspirations
and visions of citizens.
2) Elections give citizens the chance to shape the political landscape by selecting their
government representatives. Cyber voting can be said to have the potential to
facilitate the democratic process but it is argued by some scholars like the Prof. of
Political Science, Rick Valelly, that this will erode the civic ritual of standing side
by side Rich/Poor / Young / or Old standing side by side in line at the polling place.
42 There is the prospect of a greater loss of community. However success of cyber
voting can be judged by whether it makes the electoral process more responsive, Issues Concerning
Democracy, National
and helps to increase turn out or not. Sovereignty, Personal
Freedom
3) Citizen feedback to elected officials has always been a cornerstone of representative
democracy: The widespread use of internet has created a platform by cyber policy
participation with application of ICTs, thereby enhancing and creating new channels
of communication between the public and office holders. These changes are
expected to create new political communities based on shared vision and aspirations
thereby broadening the role of the citizen in a society. One thing which can be
raised here is that enhancing democratic participation is a social challenge rather
than technological one; Can the social changes of greater involvement can be
overcome and if they can be overcome for a project, can they have lasting impact
on communities where they occur.
Thus it can be said that cyber democracy is a two edged sword. It has the potential to
enhance qualities of good political participation, stimulate the creation of public policies
reflecting the supporting collective intelligence and imagination of humanity. However
there is also the possibility of harm therefore as according to report on cyber democracy,
to achieve a proper degree of foresight, it is important to concentrate specifically on the
following:
1) The opportunity for cyber democracy developments to eliminate disparities within
communities, nations and globally.
2) The option for protecting privacy, securing devices from unauthorized use and
freedom as cyber democracy advances.
3) Trying to set a particular direction for developing shared vision across countries
and also ensuring subsequent action.
4) Role that cyber democracy can play in dealing with issues of new training and
employment opportunities and ability to use such services in an interactive ways
by citizens as ICTs affect the nature of work.
Please answer the following Self Assessment Question.
................................................................................................................
................................................................................................................
................................................................................................................
45
Social Issues in the
Regulation of Cyberspace 12.6 CYBERSPACE AND ITS IMPACT ON
SPECIFIC RIGHTS AND FREEDOMS
The precepts on which the conventional discussions of liberties are based are now
shaken as cyberspace threatens the traditional notion of jurisdiction giving new shape
to specific rights and freedom.
Cyberspace has enabled building of many new patterns of human communication
breaking down the geographical boundaries; it brings freedom, but with that comes
some responsibilities also on the user. It should not give rise to unlawful or irresponsible
use of that freedom and there should be some self restraint and self regulation. Now the
demand for new information rights is emerging. In the words of Roger Clarke, the rights
relating to information are becoming unenforceable by national jurisdiction and therefore
freedom of speech and expression, freedom to access and intellectual property rights
are becoming dependent on factors other than legislation, the court and the law
enforcement agency. Therefore certain scholars are demanding for a separate electronic
rights and responsibilities to govern cyberspace. These electronic rights and
responsibilities are thought to be the basis of ethical standards with which one has to the
policies of State Corporation with regard to the internet and related multicast
communication networks. Another term ‘cyber ethics’ is also now emerging which refers
to a code of safe and responsible behaviour for the internet community. Accordingly
practising good cyber ethics involves understanding the risk of harmful and illegal
behaviour online and learning how to protect ourselves and other internet users from
such behaviour; It also involves teaching young people who may not realise the potential
for harm to themselves and others, how to use the internet safely and responsibly.
However, Internet should not merely be perceived as a new media, comparable to
mass media, but must rather be seen as a new communicative sphere encompassing
both system and the world and there is a need for positive state obligations in order to
protect individuals’ right to express themselves and to seek information free from
interference by third parties.
For the last years, states have turned to self-regulation as the preferred path when
dealing with potentially harmful content on Internet. However, self-regulation regulates
communication according to commercial system codes and the protection of
freedom of expression nor human dignity can be left to only private parties to regulate.
As Internet is both a commercial sphere (system) and a public communicative sphere
therefore it must be governed by Law of State to ensure transparency, accountability
and democracy.
Please answer the following Self Assessment Question.
13.6.2 On Development
13.1 INTRODUCTION
Information and communication technologies (ICT) can offer vast advantages to the
whole mankind. ICT could bring information and many services to those who have
been hitherto denied of them .The opportunities for social and economic development
which can not be availed by the people because of inaccessibility and lack of information
will now be available to all. This information could be used for trade, online education,
telemedicine, e-government and many other applications that solve vital problems in
the developing countries. It could open up new possibilities for more transparent and
efficient public administration/governance everywhere. It could distribute knowledge
and expertise in the areas of education and public health from the centers of expertise
to the remote corners of our country. But the advantages of ICT are not reaching to the
people who need it most. Its benefit is going mostly to those who are already well
placed. It has given birth to a new kind of division not only at international even at
national level. This division is between those who have access to ICT and those who
don’t have. This division is popularly referred as ‘Digital Divide’.
5
Emerging Social Issues
from Cyberspace 13.2 OBJECTIVES
After studying this unit, you should be able to:
• explain what is Digital Divide;
• state the reasons for the existence of digital divide;
• describe the different dimensions of the digital divide;
• list the problems created by the divide;
• explain the possible measures to bridge the divide; and
• describe the challenges posed by the digital divide and the responses of the
government of India.
First is the non availability of a reliable ICT infrastructure to access the internet. The
ICT infrastructure of a country is determined through a number of measures like number
of PCs, tele-density etc. ICT is highly advanced technology and it is available with
select countries. Hence other countries have to import the necessary structure. There is
lack of resources to invest in information infrastructure, and research and development
in most of the developing countries.
Secondly there are problems in accessing the internet regularly. There is the problem of
connectivity i.e. availability of a fast, reliable and cost effective internet connection.
Then there is the cost of accessing the internet which includes telephone tariff and line
rental and cost of Internet Service Provider (ISP). To this may be added the replacement
cost of computer. Cost of Internet access may be prohibitive for many low-income
households. The quality of service provided by ISP is also important. Because of poor
quality of services available due to backward technology it becomes difficult to exploit
benefits of ICT.
Thirdly education is one of the major factors hampering diffusion of ICT amongst
masses. Only those who are not only literates but computer literates can really benefit
from ICT. In developing countries where Governments are still trying to universalize
elementary education computer literacy is a far cry. Hence the divide is bound to exist.
Fourth reason is the availability of relevant material in one’s own language. The most
important benefit of the internet is that it is the vast reservoir of knowledge & information.
However this knowledge should be comprehensible to those who actually require it i.e.
there must be availability of web content in the language of the user. Another challenge
for the user is to find the information. The absence of relevant content may act as a
barrier to Internet access.
Fifth is the digital capacity of the society i.e., e-readiness. E-readiness is the capacity of
the society to incorporate ICT in all its pursuits. The e-readiness of the society primarily
depends upon availability of skilled human resource that is capable of using, improving,
innovating and adapting the new technologies. The different segments of the society viz
the households, business, the government etc. should be willing to accept and absorb
ICT. The government must provide a regulatory framework by making necessary laws
& rules to govern the use of ICT in different sectors of the society. Lesser the readiness,
wider the divide and vice-versa.
The global digital divide, refers to differences in availability of the ICT between countries
which is reflective of existing economic realities in the world. The developed nations
with the resources to invest in and develop ICT Infrastructure are reaping enormous
benefits from the information age, while developing nations are trailing along at a much
slower pace. This difference in rates of technological progress is widening the economic
disparity between the most developed nations of the world (primarily Canada, the
United States, Japan, and Western Europe) and the underdeveloped and developing
ones (primarily Latin America, Africa, and Southeast Asia), thus creating digital divide.
Between countries, the divide’s features have common characteristics. The level of
national income is strongly related to ICT diffusion and is clearly the distinguishing
feature of the divide between industrialized and developing countries. The cost and
availability of telecommunications determines the extent to which the Internet is used,
and per capita access costs are most often higher in poorer countries. According to the
latest UN Human Development Report, industrialized countries, with only 15% of the
world’s population, are home to 88% of all Internet users. Barely 6 per cent of the
world’s people have ever logged onto the Internet and 85 to 90 per cent of them are in
the industrialized countries. Less than 1% of people in South Asia are online even
though one-fifth of the world’s population lives here. The situation is even worse in
Africa. There are only 1 million Internet users on the entire continent of billion plus
people. In the early 21st century; residents of developed countries enjoy many Internet
services which are not available in developing & under-developed countries, including
widespread internet access, e-commerce, online education etc.
Whether digital divide is a simple divide between the haves & havenots ?
.......................................................................................................................
.......................................................................................................................
.......................................................................................................................
.......................................................................................................................
.......................................................................................................................
.......................................................................................................................
13.6.1 On Employment
In order to understand the impact of the divide on employment we have to see how
ICT has changed the work scenario in the economy. By removing the obstacles to
communication ICT has made work independent of location. ICT has created a new
class of skilled workers who are highly paid. There is huge demand of software
professionals. The creation of jobs, the nature, content and quality of work, the location
of work, the education & skills required etc. is to be determined by ICT. But the
question is: Will the information economy be a jobs economy? The World Employment
Report 2001 examines this question and is optimistic. There is evidence that employment
ratios are highest in those countries where the use of ICT is most widespread. Use of
the technologies is nevertheless associated with new patterns of job creation and job
loss. And despite the hopeful signs of employment creation, it is clear that jobs will also
be lost through three main channels: obsolescence, automation, and disintermediation.
Certain kind of works, for example, manual record keepers will become obsolete. The
producers & consumers can directly interact on-line so that there is no longer requirement
of channels of distribution. ICT replaces old tasks and occupations through automation, 9
Emerging Social Issues such as the telephone switchboard operator. But the ICT has also created new jobs
from Cyberspace
such as webpage designers or call-centre workers and a variety of new intermediaries.
Hence those who are skilled in ICT are benefited. In such a scenario if there is digital
divide, then those who are at the disadvantaged side have lower job prospects.
13.6.2 On Development
ICT is associated with productivity improvements. The exploitation of the ICT gives
industries of a country a competitive advantage. ICT opens up a whole new avenue of
economic activities including development of hardware and software, online services,
and many others. ICT offers tools that accelerate development and may become shortcut
to economic growth. The countries with the right mix of skills, infrastructure, and policies
could become important locations in global markets for ICT products generally.
Countries as diverse as Brazil, China, Costa Rica, Israel, Malaysia and Romania have
all been able to gain niches in such markets. This benefit of ICT is denied to those
countries that stand at the other side of the digital divide. Thus the existing gap between
the developing & developed countries keeps on widening. ICT has spread at an
astonishing rate. This has created disruptions and divisions in the world. Disruption
occurs because of the inadequacies of existing institutions to cope with the rapid change
and new demands. Institutions and organizations that do not cope up would, risk loss,
irrelevance and closure. Technological changes are favourable to those who are prepared
in advance. The world’s different speeds of change and different stages of preparedness
mean that the existing “digital divides” are certain to widen.
10 .......................................................................................................................
Digital Divide
13.7 MEASURES TO BRIDGE THE DIVIDE
Those who are on the less favourable side of the divide have less opportunity to take
part in new ICT based economy, in which more and more jobs are related to computers.
They have fewer opportunities to take part in the education, training, shopping,
entertainment and communications as compared to those who have access to ICT.
Since now more people are regularly making use of ICT, people who lack accesses to
it are at an increasing disadvantage. Therefore increasing the number of people who
have access to ICT is of vital importance. So now it is imperative to bridge the divide.
The solution lies in the problem itself and ICT is the very tool that can be used to bridge
this divide. There are certain steps which can narrow down the divide if not completely
close it. These have been mentioned below:
The first step to be taken in this direction is to solve the problem of non availability of
infrastructure. Since it is impossible to give everyone the required infrastructure there
can be community approach i.e. all have access to common facilities which are available
at public places like schools and libraries. The lack of infrastructure & financial resources
in many countries suggests that access at public locations will be a relatively cheaper
means for increasing internet access and use. These could either be publicly owned
libraries, community centres, etc. or private cyber cafes, internet cabins. Increasing
Internet connectivity in public places would effectively improve the internet access and
use by those who cannot afford computers.
Education is vital for reaping the advantages from the emerging ICT era. The promotion
of education and literacy generally, and digital literacy in particular, is a basic step to
bridge the divide. Educational differences underlie the different rates of penetration of
ICT and Internet usage. Efforts have to be made to provide computer education along
with schooling. Providing computer only is insufficient, teachers need to be trained in
ICT. Besides the school goers, large part of the existing workforce also needs to be
trained in ICT. Training them taking into account their needs is the key to narrow the
digital divide.
Besides the Internet, there are other information and communications technologies which
can be helpful. International Telecommunication Union has reported that mobile phones
diffuse faster than the Internet. Thus mobile phones can become alternative routes of
getting information because they are not as demanding as computers and the PC-based
Internet in terms of cost and skills. Even illiterates can use them.
Enhanced governmental support in the form of budgetary allocations, lower taxes and
a regulatory framework are essential for the transition to the ICT society. Besides
economic support the presence of an appropriate telecommunication policy is also
necessary. The deregulated telecommunications market in the European Union has led
to a substantial decline in access cost and a sharp rise in Internet users. Clearly-defined
11
Emerging Social Issues national strategies promoting the development of the Internet and other ICTs – as in the
from Cyberspace
U.K., Japan, or Korea – accelerate the diffusion of Internet use through government
sponsored projects.
5) Uneven distribution of ICT
Last but not the least understanding the causes of the uneven distribution of ICT across
countries is the most important step in bridging the digital divide. As we have seen that
digital divide has got many dimensions. Further there are various factors responsible for
the existence of the digital divide, bridging the digital divide is more complicated than
merely providing computers and internet connections. Bridging the divide has to promote
both broader access to and effective use of, the Internet. It requires cooperation between
governments, the private sectors, and non-governmental organizations.
Please answer the following Self Assessment Question.
In what way access to ICT can be provided to those who can not afford it?
.......................................................................................................................
.......................................................................................................................
.......................................................................................................................
.......................................................................................................................
.......................................................................................................................
.......................................................................................................................
In order to have the complete picture this data has to be combined with poverty &
education data. In India 30 per cent of the population lives below the poverty line and
12 40 per cent of the population is illiterate. Now the magnitude of the problem can be
visualized. All those reasons which we have discussed as responsible for the divide are Digital Divide
multiplied here. For example, in India we have so many languages and to provide the
relevant information in everyone’s mother tongue becomes a difficult task. Most of our
villages are not connected even with roads.
Governmental Response
The Government of India has taken a number of steps to provide access to ICT. On the
one hand it has relaxed import restrictions and lowered taxes on the import of hardware
so that more people can now afford personal computers. Policies for Electronics and
Information Technology Industry which can be accessed at the Department of
Information Technology website list a number of measures in this regard. To provide
maximum benefit of ICT to masses the Government has embarked on an ambitious
plan for E- Governance. It has been discussed in detail in the unit on E-governance.
Here those measures which directly aim at solving the problem of digital divide are
being mentioned. A number of measures have been taken by the central & state
governments to diffuse ICT and its benefits. Computer systems are being provided in
aided schools, colleges, universities, libraries and internet kiosks have been set up in
villages also. The Akshaya project of Kerala is notable in this regard which aims at
providing e-literacy to one member of every household and also to act as ICT
dissemination points in each village. The Headstart project in Madhya Pradesh aims at
equipping every Middle School with computer. Community Information Centres have
been established in North-Eastern states to provide internet access and e-mail, printing
and computer training to the public. One of the main objectives of governmental effort
is to make the government citizen interface easier and for this purpose efforts have been
made to computerise the functions of the government. In Kerala the citizen’s interface
with the public organizations has been made easier by the project of Fast Reliable
Instantaneous Delivery of Services (FRIENDS). Seven departments and organizations
were identified and the public who had to pay dues like electricity or water bill, property
tax, road tax etc. could, instead of going to the various offices, go to the FRIENDS
centre, which was located in the heart of the city and complete their transaction within
a very short time. In Andhra Pradesh in the Twins project 34 types of certificates and
services which are given by different departments are centralized under the 18 centres
of Twins. The E-Praman software developed by NIC Himachal Pradesh is a system,
wherein the applicant visiting the Sub-Divisional Magistrate can obtain the desired
certificate in a neat, structured and standardised form on the submission of the
application along with relevant papers, within minutes. However despite all these efforts
the situation is far from satisfactory. Most of the ICT facilities are clustered in few
states. As compared to other countries India is lagging behind in terms of technology,
infrastructure and investments. In the Broadband Policy 2004 it has been accepted by
the government that the current level of Internet and Broadband access in the country is
low as compared to many Asian countries. Penetration of Broadband, Internet and
Personal Computer (PC) in the country was 0.02%, 0.4% and 0.8% respectively at
the end of December, 2003. According to news appeared in The Hindu India stands
virtually at the bottom of the world table when it comes to high-speed networking and
digital connectivity. India lags at least ten years behind the world leaders, the United
States and Western Europe. It is at least three to four years behind countries such as
Brazil and China, and only two to three years ahead of the Central Asian Republics and
Africa. Therefore we have to go a long way before there is an appreciable decline in the
divide.
13
Emerging Social Issues Please answer the following Self Assessment Question.
from Cyberspace
Self Assessment Question 4 Spend 3 Min.
13.9 SUMMARY
• Digital Divide refers to the gap between those who have access to ICT and those
who have not.
• The divide is not a unitary concept but a multi-dimensional problem. Some of its
dimensions are
– Global digital divide i.e. the divide between the countries in their capacity to
adopt and use ICT.
– National dimension of digital divide; in a country ICT is not evenly spread in
all regions, over all societies. There is also a gender and generation based
digital divide.
– Due to technological innovations like broadband, witi etc there is an
emerging connectivity based digital divide.
• The divide exists because of:
– Non availability of ICT infrastructure;
– High installation and access cost;
– Low level of education and e-literacy;
– Lack of relevant content in mother tongue.
• The divide has adverse impact on
– Employment
– Development
– National and social interest
• Certain measures can be taken to bridge the divide. These are:
14 – Making ICT accessible to all
– Universalizing education including computer education Digital Divide
• In India the position of digital divide is serious both in terms of global and national
dimensions of digital divide.
• Governments have taken certain steps in this direction. Major steps are:
– Promotion of e-literacy
– E-governance
2) What are the reasons responsible for the existence of the digital divide?
3) Do you think that the divide can be closed? If yes, how it can be done?
4) Do you think that with the present state of infrastructure can India become global
software giant?
6. Subhash Bhatnagar. “Digital Divide: Where Does India Stand? And the Way
Forward”. Workshop on Scaling up ICT for Poverty Alleviation in India. Indian
Institute of Management. Ahmedabad. 26-27 Feb. 2004.
7. The Four Digital Divides. Ed. Kenneth Keniston and Deepak Kumar. New Delhi:
Sage Publishers, 2003.
8. Wenhong Chen and Barry Wellman Net Lab. “Charting and Bridging Digital
Divides: Comparing Socio-economic, Gender. Life Stage, and Rural-Urban
Internet Access and Use in Eight Countries’’. NetLab Centre for Urban and
Community Studies, University of Toronto, For the AMD Global Consumer
Advisory Board (GCAB). 27 Oct. 2003. Digital divide : A-T-Archive
(E-government Resource Centre). 2Dec.2005. 11 Jan. 2006. <http://
www.egov.vic.gov.au/>.
16
Digital Divide
17
Expert Committee
Prof. N.R. Madhava Menon Dr. B.K. Keayla Dr. Anirban Mazumdar
Chairman Secretary General and West Bengal National
Former Director, National Judicial Managing Trustee Centre for University of Juridical
Academy, Bhopal Sciences, Kolkata
Study of Global Trade
Member, Commission on Centre System and Development Mr. Sanjay Parikh
States Relations, New Delhi New Delhi Advocate, Supreme Court
New Delhi
Prof. D.N. Jauhar Mr. Zakir Thomas Prof. Biswajit Dhar
Department of Law Former Registrar International Institute of
Punjab University, Chandigarh Copyrights, Govt. of India Foreign Trade, New Delhi
Prof. Dinesh Kumar Abrol Addl. Director Income Tax Prof. Pandav Nayak
Senior Scientist, National New Delhi SOSS, IGNOU
Institute of Science, Technology Ms. Kiron Prabhakar Prof. Srikrishna Deva Rao
and Development Studies Advocate Director, SOL, IGNOU
New Delhi J. Sagar Associates Ms. Gurmeet Kaur
New Delhi SOL, IGNOU
Dr. Raman Mital
Reader, Faculty of Law Ms. Suneet Kashyap
Dr. G.. C. Bharuka SOL, IGNOU
University of Delhi Judge High Court (Retd.)
Delhi Mr. Anand Gupta
New Delhi
SOL, IGNOU
Programme Coordinator: Ms. Gurmeet Kaur, SOL, IGNOU
We acknowledge our thanks to Prof. S.C. Garg, Former PVC and Director (I/c) SOL and Prof. B.S.
Saraswat, former Director (I/c), SOLfor facilitating the development of the programme.
COMMONS
Structure
14.1 Introduction
14.2 Objectives
14.3 The Idea of the Commons
14.4 Intellectual Property Rights and Global Commons
14.5 Promotion of Global Commons in India
14.6 Global Publics in India
14.7 Global and Local Tensions
14.7.1 Impact of the Globalisation of Intellectual Property on the Practices
of the Marginal Electronic Culture
14.7.2 Recent Claim Made by Rajnikant for Protecting the Sign that he Uses in his
Blockbuster Baba (2002)
14.1 INTRODUCTION
Internet is a non-monetized domain of communications, it is global in nature, an open
global commons, and is made up of a host of other publicly accessible networks for the
common benefit. It has drastically reduced the cost of long distance communication as
it connects a hundred- thousand networks of the entire world, which may be hosted, by
Government agencies, private companies, universities etc. Similarly the content of
Internet is a voluntary common, anyone can be publishers, and every type of subject
matter of all levels of quality is available. As the Internet is the most suitable medium for
global trade and exchange of services, it becomes necessary to understand the idea of
global commons being articulated in the context of politics of protection of legal rights in
artistic and literary works, inventions, trademarks and other original creations. Such
rights are collectively known as Intellectual Property Rights (IPR) in this era of
globalisation. 17
Emerging Social Issues
from Cyberspace 14.2 OBJECTIVES
After studying this unit, you should be able to:
• explain the concept of global commons as identified with the realms of high
technology (cyberspace);
• describe the usage of the term ‘public’ in India within the realm of cyberspace and
new media;
• illustrate the global publics in India used as symbolic fiction to critically evaluate
the intellectual property rights;
• determine the impact that globalisation has on intellectual property rights; and
• know about the creative commons movement, icommons and digital commons.
GLOBAL COMMONS
The basic concept of intellectual property law arose in the 18th century out of the
technological and social individualism of cultural production. According to Lawrence
Liang, IPR has come to dominate almost every aspect of life, what we call the public
domain is now dominated by images, signs, inventions and products which are protected
by one form of intellectual property or another and those who oppose current practices
of Intellectual Property Law, often argued that:
1) Expansion of IPR into public life has resulted in a privatisation of the public domain
itself, where increasingly almost every cultural resource is the subject of protection
and therefore has caused shrinkage of the public domain.
2) Scholars like Rosemary Coombe have consistently argued that the very practice
of a political public domain has relied on the ability of various people (consumers)
to engage in critical dialogic practices and these practices do not merely take
existing signs for what they are but through processes of appropriation, re-
codification and transformation determine what meaning itself has.
3) If all signs are the subject of IPR and entitled to protection, there is a danger that
dialogic practices themselves are under threat as the owner of the sign will have
the ability to determine the scope of the use of such signs, and that the owners of
these signs will have the ability to freeze the meanings of these signs and hence
curtail the very possibility of critical dialogue.
However at a wider level it raises the larger issue of the relationship between information
and property and the forms and the implications that the internet and cyberspace have
for the classical understanding of information and property.
No doubt the commerce on Internet has paved the way for a global trade: Some of the
potential IPR issues that arose with regard to electronic copyrights are:–
1) The liability of on-line service providers.
2) Fair use of copyrighted material, effective management of copyright information.
3) An effective patent system.
4) International standards for determining the validity of patent claims.
5) Litigation that may arise due to trademarks.
6) Similarity of Internet domain names and registered trademarks.
14.11 SUMMARY
• Internet is an open global common connecting a number of networks of the entire
world thereby reducing the cost of long distance communication.
• In the era of globalisation, the idea of the common got articulated in the context of
protection of intellectual property rights.
• To understand the spread of cyber practice in India, the concept of ‘public’ in
relation to India has to be understood.
• The term ‘public’ as identified in the Indian context can be categorised as national
public, cyber elites and global public.
• The idea of global common can be used as symbolic fiction in determining the
policies framed for protection of intellectual property rights and this can be done
by identifying global publics in India, pointing the global economy through the
instance of entertainment and film industry.
• In mapping out the space of global common within that of nation or local, the issue
of the impact of globalisation on practices of electronic culture often arises.
25
Emerging Social Issues • For the growth of international trade, the need is to promote global commons
from Cyberspace
through the principle of reciprocity.
• Creative commons movement was founded by Lawrence Lessig with the aim to
help creators to give up some of their copyrights to encourage sharing and openness.
• icommon is an international organization and has grown out of the creative
commons movement.
• Now there is a move towards formation of new global space of digital commons
where users are creating culture and knowledge for e.g. by making videos, remixing
songs etc.
3. David M Berry. “The Global Digital Commons and other unlikely tales’’. open
democracy.net. 26 June.2006. 21 Dec. 2006<http://www.opendemocracy.net>.
26
Promotions of Global
4. Elizabeth. “free culture and the internet a new semiotic democracy’’. open Commons
democracy.net. 20 June.2006. 21 Dec. 2006<http://www.opendemocracy.net>.
5. Lawrence Liang. “Global Commons, Public Space and Contemporary IPR”. Media
Development 18 Dec. 2004. 19 Oct. 2006<http://www.altlawforum.org/
PUBLICATIONS/document.>.
9. Satellite Communication Group. NIC, DIT, MoCIT, Govt of India. 2 Jan. 2007
<http://satcom.nic.in/about.html.>.
10. Suresh t. Vishvanathan. The Indian Cyber Laws. 2nd ed. New Delhi: Bharat Law
House, 2001.
27
Emerging Social Issues
from Cyberspace UNIT 15 OPEN SOURCE MOVEMENT
Structure
15.1 Introduction
15.2 Objectives
15.10 Summary
15.1 INTRODUCTION
Open source is a set of principles and practices that promote access to the design and
productions of goods and knowledge. The term is commonly applied to the source
code knowledge. The term is commonly applied to the source code of software that is
available to the general public with relaxed or non-existent intellectual property rights.
This allows users to create software content through incremental individual effort or
through collaboration. Open source denotes that the origins of a product are publicly
accessible in part or in whole. The term open source refers to software in which the
source code is freely available for others to view, amend and adapt. Typically it is
created and maintained by a team of developers that crosses international and national
boundaries.
15.2 OBJECTIVES
After studying this unit, you should be able to:
• describe the difference between open source software and proprietary software;
During the 1960’s when IBM and other companies were selling large scale commercial
computers, they came with some software which was free (Libre), free in the sense that
it could be freely shared among users. This came with a source code, and hence could
be improved and modified. However in the late 1960’s and mid 70’s the proprietary
software started making their place in the market.
In the late 70’s and early 80’s Richard Stallman, an American software developer who
had an idea that sharing source-code and ideas is fundamental to freedom of speech
developed a ‘free’ version of the widely used ‘UNIX’ operating system. This resulted
in a ‘GNU’ program which got released under a specially created General Public Licence
(‘GNU.GPL’). The GPL is the license under which much Open Source code is
distributed. It enshrines the idea that computer code, like speech, should be free to be
copied, interpreted, modified and generally mashed-up. This was designed in such a
way that source-code could remain openly available to all. This software was basically
designed for commercial usage or distribution. Such an approach was called ‘free
software’. Thus the term “free” denotes that anyone could modify the software as per
his/her needs.
During the 80’s and the early 90’s open source software continued its development.
USENET and Internet actually helped out to co-ordinate transnational efforts, and to
build up strong user communities.
What was the first open source software available in the beginning?
.......................................................................................................................
.......................................................................................................................
.......................................................................................................................
.......................................................................................................................
Flexibility – how easily the software can meet the needs on different devices
Switching Costs – the expense for moving from one system to another
Total Cost of Ownership (TCO) – the total cost expense over the lifetime of the software.
Since the source code is available and one can modify it, it is an important characteristic.
This enables the unlimited timing and improvement of a software product. This also
makes it possible to port the code to new hardware, to adapt it to the changing
conditions, and to reach a detailed understanding of how the system works. Now
experts understand that to increase the lifetime of an application, it must be available in
a source form. It has been seen that binary only application does not survive for more
than ten years in an unmodified form. However open source software systems have
survived for more than twenty years and are still in widespread use. Because of the
availability of source code, one can also isolate bugs and fix them.
Technical motivations are common because there are at times different ways to perform
a work and one may not decide which one is better. So if the two parties do not reach
a consensus and the user base is quite large, the code then splits into two, but both
continues development. If the reasons for the split comes to an end, and both the
parties agree then there may be a reunification. In other cases a ‘fork’ is used to co-
ordinate work.
E.g. the Linux kernel has two distinct code bases, one stable and one experimental.
This way one can introduce new and potentially dangerous technologies without
disrupting the stable ones.
Another advantage of open source software is that no per copy fee can be asked for
modified versions and thus anyone can use the current code base to start whatever new
projects. One can gather knowledge at a very low cost. This is the reason why the
internet software systems have become an important factor in the new economy. All
new aspirants who are trying new technologies are now able to integrate and adopt
them immediately without any licence agreements. The right to freely modify them is a
bonus which has led to innumerable expansions in the number of communication
protocols and systems, each based on the needs of one and all. This is one of the
reasons for the success of the Linux Kernel, which is widely used by the students during
32 the start up phase till they turn into entrepreneurs.
Another advantage of OSS is that there are minimal conflicting priorities due to marketing Open Source Movement
pressures. This is due to the fact that there is no single commercial entity pushing for
precise delivery dates or features that must be supported. Usually OSS is made available
to people only when it is ready and when the development team believes that it is good
enough in its quality for use.
Finally, OSS gives a new platform for democratic action. One can say that it provides
a platform for democratic action in the sense that it is designed the way people need
it, improvements are made as per their needs, thus the collective desire of the
community determines the overall direction of development, and modification and
without compelling anyone to do that. Thus the public opinion is the backing force
which leads to the progress of such a software.
Please answer the following Self Assessment Question.
Now, as we know, software where source code and object code both are freely available
is called ‘open source software’. In copyleft open source software, source code and
object code are freely available to be used, modified and improved without any changes.
The term open source software is often used in the sense of open source software that
is copy left.
The scenario in US is that for business processes the software can be patented. In EU
currently ‘business processes’ are not patentable.
33
Emerging Social Issues
from Cyberspace 15.8 OTHER SUCCESSFUL OPEN SOURCE
SOFTWARE
1) Open office.orgsuite
2) Mozilla
3) Ximian
Office suite provides bundle of softwares that are used in an office. The most popular
office suite is Microsoft Office Suite. Open Office.Org suite is similar to it.
Software which permits one to access internet is called Web Browser. There are many
such softwares. Opera, Internet Explorer etc. Mozilla is a web browser open office.
Org suite and Mozilla both can be operated in Linux as well as Windows.
Pharmaceuticals: There have been several proposals for open source pharma-
ceutical development, like the one which led to the establishment of the tropical
disease initiative. There are also a number of not for profit “virtual pharmas” such as
the Institute for one World Health and the Drugs for Neglected Diseases Initiatives.
15.10 SUMMARY
● Open source software in other words means software where the source code is
made available to all, and a licence is given for the modification and development
of the software as per the need of the user.
● The availability of the source code makes it simpler to use by the user.
● However, there are legal issues related to such software which are copyright and
patent issues.
● The open source movement is gaining momentum in other fields other than the
software i.e. we now have open colas, open source in software, hardware,
pharmaceutical industries etc.
2) Discuss the advantage of open source software over the proprietary software.
1) Libre was the first open source software used in the beginning.
2) Licence is given to modify and develop the software as per ones need.
4) Mozilla, Linux.
Terminal Questions
2. ‘‘A little history the first virtual community’’. open3.org. 24 Mar. 2006
<http://<www.open3.org>.
6. Jim Watch. “Open sources is good for democracy”. open democracy.net. 24 Mar.
2006 <www.open democracy.net>.
10. Richard Paynder. “the open source movement”. Infotoday. 20 Jan. 2006.
<http:// www. Infotoday.com.>.
36