You are on page 1of 24
Po Society, Law and Ethics In Tis Charter Introduction E-Waste Management 17.6 Gender Issues while Teaching/Using Computers 17.7 Disabilty Issues while Teaching Technology and Society and Using Computers: Ethical Issues Open Source Philosophy and Sofware Licences 17.1 INTRODL JON We are now living an era called the information age where we see that most our activities are technology-influenced, be it making an online payment, creating or development of own piece of art or information (such as writing articles or clicking photographs and so forth). With the reach of technology to our day to day life, there has been a paradigm shift, and it has also raised specific issues and problems related to society, ethics and law. In this chapter, we shall talk about topics about this very domain such as intellectual property rights, plagiarism, cybercrime, cyberlaw, e-waste management ete. 17.2. ETHICAL ISSU! ‘These days, we can easily say that our society is information society and our era is information era. As we all know that information is the means to acquire knowledge. In other words, we can say that information forms the intellectual capital for a person or body. However, there are many ethical issues involved with the usage and availability of information. Some common ethical issues are : (i Intellectual property rights (ii) Plagiarism —_(iii) Digital property rights Property Rights piece of information is ‘As mentioned earlier, information makes intellectual property. Any : The cost factor is also produced or created with a lot of efforts and it consumes a lot of time. ff ay crt 17 SOCIETY, LAW AND. ETHICS aah me F scart eM OI ERNE ha (0) Plaglarism (i) Copyright infringement (ii) Trademark infringement tion Plagiarism : 1 Pls an . i. ‘simply put, Plagiarism means stenting. Surprise [Piscianisy | See - * nglish dict tealing. Surprised? If you look Plagiarism is stealing someone won into. an English dictionary to find the meaning of word ears Wtalctal work ahd °B) soe plagiarism, it will give somewhat like “the unauthorized use representing tas you own wort wt ting te source of or close imitation of the language and thoughts of another author , ‘information, | and the representation of them as one’s own original work.” Thus, Plagiarism is stealing someone else’s intellectual work (can be an idea, literary work oF academic work etc.) and representing, it as your own work without giving eredit to creator OF without citing the source of information. Any of the following acts would be termed as Plagiarism © Using some other author's work without giving credit to the author. ‘© Using someone else's work in incorrect form than intended originally by the author/ereator. | © Modifying/lifting, someone's production such as nucsic-composition ete. without attributing i it to the creator of the work © Giving incorrect or incorrect source of information ie, wrongful citation, ging the contribution of others in a collaborative © Failure in giving credit or acknowledg effort, to which you are also part of. How not to Plagiarize @ | ‘As most universities! put in their student-handbook. ‘To avoid plagiarism | You must give credit whenever you use © another person’s idea, opinion, or theory; © quotations of another person's actual spoken or written words j oF © Paraphrase of another person’s spoken or written words. Plagiarism is Offence “af plagiarism involves copying not only ideas but also a substantial portion of a copyrighted attribution and without permission, it would amount to both copyright work without lation of the ‘special right’ of the author to be credited. infringement and the viol violation of an author's right to be credited are both civil wrongs Copyright infringement and the and criminal charges may also be filed’? and criminal offences. A civil suit may be instituted, Both civil suit and criminal charges are punishable offences and amounto fine and penalties. II. Copyright Infringement ‘A copyright infringement refers to using copyti of the copyright holder. The infringement of intellectual property als fabricate copywriters’ work intentionally or unintentionally without if you use an image or a video available online, without asking, ghted work without the consent or permission ‘occurs when an individual or group of individu giving them credit, For instance, Found in most universities’ guidelines for students/ student-handbooks 2. www.mxmindia.com (interview of Nandita Saikia) 548 COMPUTE NCE Yr Pion the Internet is et lay be copyright infringemen ot everything which is available ngement beca wailable for free use. Mi ihingatel lable online are a for free use. Most of the things avai 3 copyright Other exai ther examples of co; pytight infringement include © Sling prt es are ae ‘using copyrighted wor ne © Selling pirated software eee za © Performing forming a play in public without obtaining per A '¥ and many other such acts. rademark Infringement Sodas mission from the playright \ The trademark infringem mark that is identical ‘or aces trademark. The te ae 1 oF deceptively similar toa registered Thetrademarkln consumer looks at the mark, it is likely to Sheetal Ceci /her of the origin of the goods or services. - a ae ‘s are crimes and the owner can initiate a legal action against the LE to any Digital property or digtal assets) formation ab you that exists in teers taleny Inormtalatel gital form, either online or on an electronic storage device. ial ae a igital property comprises what is known as _ Gites purmettter online ron an pee electron storage device 17.2.2 Digital Property Rights Digital property (or digital assets) refers information about you or created by di perty include : any online personal accounts, such as email and media accounts, shopping accounts, photo and video sharing accounts, ine storage accounts, and websites and blogs that you may manage ; domain ed in your name ; i r including copyrighted materials, trademarks, oare tools created by you or games or apps created by you) any software or code (¢ you may have written and o Digital property rights lie with the owner. Legally a person who has created it or the owner who has got it developed by paying legally is the legal owner of a digital property. Only the owner can use and decide who all and in what form can his/her digital asset may be used by other, whether by making payments or by buying it or by obtaining its license or usage rights) etc. But this is not the case generally; there are many threats to digital properties. roperties Let us briefly talk about common threats to digital properties 1. Digital software penetration tools. Although one needs to buy usage rights or license to use a digital property, there are many software penetration tools such as cracks and keygens, tools created by hackers to penetrate your software's registration system and ‘ble unauthorized users to freely access your software without actually paying for tt ag only 17 = SOCIETY, LAW AND ETHICS 549 3 Stealing and plagiarizing codes SPYright somehow get hold of your odes of your digital properties. Sometimes other developers of your code and use tin thelr own softwree ene an create laglasized versions = Source code and use ig net oH software. In other words they seal your software's Sot pares heir own versions of it, and then sell it under their own "of tn ao Digital Property Rights Protection — As there are multiple types of threats to di y hreats to digital properties, there are many ways you can ensure 1. Anti-Temper Solutions. 1 crane inet Selutions: There are many anti-tamper solution available today which Fray Ut your digital property is tamper-proof. These anttemper solutions use @ my host of advanced technologies to prevent hackers from hacking, reverse-engineering OF a , aS ing your digital properties such as utility tools, software, apps, video games and so forth. S the egal Clauses. Add legal clause in the clauses of use of your software/digital properties. at parent clause in your software's Terms of Service that prohibits the scraping of your software's source code for reuse. This is a sound legal backup for Limit the sharing of software code. You should share your software code only with’ trusted individuals who are part of development team. You should also use a Digital Rights Management (DRM) solution to protect your software from being scraped for source code using decompilers etc. 17.3 OPEN SOURCE PHILOSOPHY AND SOFTWARE LICENCES | Broadly the term ‘open source software is used to refer to those categories of software / programs! whose licenses do not impose much conditions. Such software, generally, give users freedom to run/use the software for any purpose, to study and modify the program, and to redistribute copies of either the original or modified program (without having to pay royalties to previous developers). There are many categories of software that may be referred to as open source software. Following subsection is going to talk about the same, 17.3.1. Terminolog; Before we talk about various terms and definitions pertaining to ‘Open’ world, you must be clear about lo terms which are often misunderstood or misinterpreted. These terms are © Free software and © Open source software Free Sofware Free Software means the software is freely accessible and can be freely used, changed, improved, copied and distributed by all who wish to do so. And no payments are needed to be made fox free software ‘The definition of Free Software is published by Richard Stallman’s Free Softtoare Foundation, Here is the key text? of that definition 3, Excerpt courtesy Free Software Foundation. This keytext is available at ww. gnaxora/phitosophy/free-sw.html. COMPUTER SCIENCE WITH pr HON » Free software” isa matter of bert) hot price 7o understand the oneeze aR REG fief’ i mt of iy et are me of ee a run, copy, distribute, study, change and improve the software. More ecsti laieiaa aalaly f freedom, for the users of the software © The freedom to run the program, for any purpose (freedom 0) © The freedom to sty how te program works, and adapt 10 your mek Ree A daa source code is a precondition for this ‘© The freedom to redistribute copies so you can help your neighbor (freedom vovements tothe public, tease your improvements to the publ 6 Hal ty, prove the program, and : code is a precondition for this. © The freedom toi community benefits (freedom 3). Access f rs have all of these freedoms. A program is free software if us Open Source Software Open Source Softtoare, on the other hand, can be freely used (in terms of making modification, constructing business models around the software and so on) but it does not have tobe free of charge. Here the company constructing, the business models around oper source softoare may receive payments concerning support, further development. What is important to know herejs that in open source software, the source code is freely available to the customer. 7.3.2 Philosophy of Open Sourc lly defined by the open source definition at ware is officia Open source sof It states that The distribution terms ng criteria ith the fol Open source doesn’t just me: ast comp oftware of open-sour: Free Redistribution No restriction on the re-distribution of the software whether as a whole orin part. ae Source Code ‘The program must include source code, and must allow distribution in source code as well as compiled form ‘The license must allow modifications and derived works, and must allow them’ Derived Works to be distributed under the same terms as the license of the original software, The integrity of the author’source code must be maintained. Any additions Integrity of the modifications should carry a different name or version number from the Author's Source Code original software. The license must not discriminate against any person or group of persons. ‘No Discrimination Against Persons or Groups f The license must not restrict anyone from making use of the program in & specific field of endeavor. For example, it may not restrict the program from being used in a business, or from being used for genetic research. No Discrimination Against Fields of Endeavor Distribution of License The rights attached to the program must apply to all to whom the Program is redistributed There must not be any restriction on the rights attached to the program Hes there should not be a condition on the program’s being part of a particulat software distribution. License must not be Specific to a Product FS " 1-17: SOGIETY, LAW AND ETHICS 551 ce must be No 1 ie be ‘0 provision of the license | A software which is free as well as open belongs to category FOSS (Free and Open Source Software) The terms Free and Open represent 3 differing emphasis on importance of freedom (free software) oF technical $3 De progress open source software). Reseeeeecine te ciceet discus on eminclogy end defintons pean oper sr Sa =a | | TOSS available to customer FLO avallable fo customers and It can be modified and redetibated aa a An OSS may come free of cost or wth a payment of nominal charges thats developers harge in the nuante Of development, suppor Of seftrareill es (OSS and OSS refers to op which refers to software whose source code is | FLOSS refers to Free Libre and Open S : FLOSS refers tm Free Libre and. Open Source Sofware or 0 Ee age aga ier te eee a nn sofeore eo wel 45 pet soa cof, Here woe hr (eSeri Gnu 1US refers to GNU's No SNU Pi GNU refer to GNP Not Unis. GNU Drolet ei a The GNU ject was initiated by Ricard M. Saman with an objective to esate an ope operating system. Now, it offers a wide range of software, including applications apart from operating system. im - FSF IEE is Fre Sf FSF is a non-profit organization ereated for the purpose of supporting free software movement. Ri an founded FSF in 1985 to support GNU project and GNU licences. Now a days, it also works on legal and structural issues for the free software community ‘ ost OSI is Open Source Initiative. Its an organization dedicated to cause of promoting open source software. Bruce Perens and Erics Raymond were the founders of OSI, that was founded in February 1998 \ OSI specifies the criteria for open source software and properly defines the terms and specifications of open source softoare Gpen source doesn’t just mean access to the source code. The distibuton fxs of Fea source software must comply with the Open Source Definition by OST. | Freeware The term freeware is generally used for software, which is available fies of cost andl which allows copying and further distribution, but not modification and whose source code is not available. Freeware should not be scrtwage, Freeware is distributed in binary form (ready t run) without any licensing, pon tr some instances the right to uee the software is limited to eer 0 of users, for instance, for private and non-commercial purposes: One example is Microsoft Internet Explorer, which is made available as freeware sive acronymis the one thatusesits abbrevi mistaken for open software ot for free 4, GNUis recrusive acronym for GNU's Not Unix. A recur ation in fll form e.9., VISA is also recursive acronym - VISA International service Association 552 its evolution and ensure its interoperability normally not available. iti time » then a license fee should be paid. not allowed, enses and Domain: As per Open Source Initiative, “Oper Defin COMPUTER SCNCE YT rig a beds wse i ata atte seb to its full potential by developing common protocols tha ald ‘The World Wide Web Consortium (W3C) describes itself as follows sotential of the Web, The World Wide Web Comortam exist alle the fall The WC isan indsty conor that seks Beano aa a satiny betwen precy rng pea age Scare. Although nota! members fad WAGs vendonneita a ga a Hy availabe eal a reprictary — Propreta be Sofhone’” — Provrictary software is the software that i neither open nor fly alae, Wg if regulated ancl further distribution and modification is either forbidden or ate {Beal permission by the supplier or vendor. Source code Of propiary gt Shareware tribute ware Shareware is software, whichis made available with the right to redistribute copgg p-- Stipulated that if one intends to use the software, often after a cerain peat Shareware isnot the same thing as free and oper source softuare (FOSS) for mn Reasons () the sourcecode is no available and, (i) modifications the sata The objective of shareware isto make the software available to try fr as man Possible This is done in onder to increase prospective users” Will pay for he sees ‘The software is distributed in binary form and often includes a built-in timed mech, , which usually limits fanetonalty after tal period of usually Copyleied Copyleted software is fc software whose dltrbutin terms ensure that allele Software all versions carry more or less the same distribution terms. This means, for instanee, that copyleft licenses generally disallow others to add additional requirements to the software) and require making source code available. This shields the ‘program, and its modified versions from some af the common ways of making a progian prope, ne to three months #t comply with the Open Source ed, and shared.” Open-source licenses make it easy for others to contribute to a project without having to seek special permission. Italso protects you as the original creator, making sure you atleast getsome credit for your contributions. Italso helps to prevent others from claiming your work as theirown, Broadly used open source licences are being given below for your reference 1. Creative Commons Licenses (CC licenses) CC licences, issued by Creative Commons organisation (non-profit organisation), allow the creator of the work to sct how they want others to use the work. When a creator releases theit work under a CC licence, people only need to seek the creator's permission when they wantto use the work in a way not permitted by the licence. Standard rights and obligations of CC licenses. CC provides six core licences, each of which allow members of the pubic to use the material in different ways, but each of them include certain standard rights and obligations as listed below : Note mt ‘The CC licenses give permissions to copy, modify, distribute the original ‘works by attributing the ereator of the work. copter 17 © SOCIETY, LAW AND ETHICS 553 User Rights Copy the work (¢¢, download, upon 4 share copies of the work; | Get permis from the crealor ida ang hal a ; “commercial use of the work); | | Communicate the work (e.g., make tl i re ig | Format shit verbatim copies af he work(s. copy | Whenever you make dang 1 he wah | nal See OTe aes Da coe ans Mit] accede tht reat d of | = _— | Hindi translation of the original work, X}. | an 2. GNU General Public License (GPl) sn The GNU Caner Peis Looe (Gr) pay oe tare a oftware, This means, with GPL, a user Gan z Copy the software Copy the software as many times as needed. There's no limit to the number of copies one can make sofhwoare There is no restriction of distribution methods and styles = can be in Distrib however you want copied form or printed form or weblink form, After modifying the software, you can even charge for your software are charging them but the we should still explaining why you nder GNU GPL ‘You are free to make any kind of modifications to the GNU GPL The only catch is that the other project must also be released PL software under the GI rights to users. These rights can be applied to both The Apache License, grants a number of copyrights and patents. ‘The Apache License offers Rights are perpetual ‘Once granted, you can continue to use them forever Rights are worldwide Ifthe rights are granted in one country, then they're granted inal countries, no perusage fee or any other basis Rights are granted for no There is up fee or royalty. either Rights are non-exclusive. You are not the sle-censee; other can also use he licensed work. ts away once they're granted. Rights are irrevocable No one can take these rig « giving proper credit to contributors to the code andl the same Redistributing code require software extension. license (Apache) would remain with the 554 a Public-domain soy ve led Ba a ane " iftware is free and can be used without restrictions. The term public-domain softy, doc a ee i aa nature, outside the pyight and eensing [Ronee aorian some | ; tinea On the contrary, there is {ir Goth source) | : Proprietary software, which is | = : neither free nor available for | [sagt ix | Public. Theres a proper license | LL_emisve lense _ [eNwanou sameeye attached to it. User has to buy ' copylefed software the licence in order to use it, . originally made by Chao-Kuei® Softw that describes the categories of software. Figre 17. Categories and domains of 17.4 TECHNOLOGY AND SOCIETY , ie. technologies whose value and impact arise primarily, ICTs are general purpose technologie sectors. Thee capabilities are especially important from their use in other economic and 50 for economic and social development. ICTs — enable greater efficiency in economic and social processes ; — enhance the effectiveness of cooperation between different stakeholders ; and — increase the volume and range of information available to people, businesses and governments, Systemic impacts which ICTs have had on the development of economies, societies and culture, include Economic Impacts include the globalisation of production in goods and services, changes in trade and distribution networks, changes in pattems of consumption, the international products and behaviours, and the growing importance of the ICT sector virtualisation of some within the world and national economies. Social Impacts include mass market access to an enormously increased range of information resources, enhanced freedom of expression and association, new patterns of work and human. settlement, changes in the relationships between government, citizen and the state, and ‘and associated challenges to traditional ideas of privacy and individuality between citizens, 1 Economic ‘The impact of ICT on the economic sector has a positive multiplier effect on the Business World. Some major benefits include 1, Secure Transactions. Banks and similar institutions could be said to be the sector that have benefited the most from latest developments in ICT. Fund transfer can now bemade in matter of seconds within a locality and to the most parts of the world with a greater secunity than ever and available under GNU GPL v2. while dis devices. pe it YOR camera's not eno format form W EWa: Withi elects and Con elen Pla Th 17. o Ba E: 17: SOCIETY, LAW AND ETHICS, 555, 2, Fase and Availal Pre eu ee to stand in long queues for fund withdrawal wrany time of the day d and Internet banking, the banking, eet Herre co of lls buchos UU TEE lowed. Such transactions could even y, water rates et 3, Net Banking, With onli h online or Internet banking online via one’s bank account at the c ng a lots of payments and bly can be 200 eae at the convenience of one's home or Offic eit SA VSITES anking ensures both s m cree rai With ICT, now the market is entire globe. A small bt tran ko rng to sbayerin yt fie we Serer Fee is own market, (s)he can now have id buyer's access 1s not jm ac an now have access to the all world market, courtesy Internet E-WASTE MANAGEMENT lectronic waste, e-W. s Electronic waste, e-Waste, e-Scrap, or Waste Electrical and Electronic Equipment (WEEE) ‘Electronic waste” may also be defined as describes discarded electrical or electronic devices. jevice electronics, mobile electronic equipment, entertainment di discarded computers, office .s used electronics which are destined for phones, television sets and refrigerators. This include reuse, resale, salvage, recycling, or disposal. has the characteristics of : (a) the fastest Of all the different types of waste, electronic waste growing segment of waste (W) most valuable due to its basic composition (¢) very hazardous if not handled carefully ding e-Waste ern of Disca while discarding e-waste, you should be careful about the data stored in discarded storage devices. It is very important that you delete everything stored in them manvaally, permanently, be it your computer systems’ hard disc, laptop's disk, smartphone’s memory disks, digital ‘and so forth. Just deleting the digital data is can still undelete it. So, take care to .r tools that shred the data ina Use proper tools to delete or shred data before disposing off any ld or camera's storage not enough, someone it or delete it using prope! format be undeleted or unt form which can neve! formatted later Sey eee sal Process jad class of hazardous waste. 4 by the government of India under the Bro ategories such small household appliances, xs and related equipment Vaste Disr E-Waste is categorize Within e-Waste, there are and electronic toys as Large and 9 several C mnt, tools, compute electrical and sporting equipmel and so forth. waste, Electrical and Electronic equipment contains metallic and non metallic ‘d_ compounds such as Copper "aluminum, Goldy Sivenm ne lacaaay ad, Iron, Sulphur, Phosphorous, Arsenic etc colves proper recycting and recovery of the disposed anit operations: ous substances ‘ning, valuable Composition of e- elements, alloys an Platinum, Nickel, Tin, Le ment inv’ ‘material. The includes the following 4 arts containing dange sible parts _contai metal containing parts): The E-waste manage! recycle and recovery 1. Dismantling. Removal of ps PCB); removal of easily acc containing copper, steel, iron, precious, (CECs, Hg switches, substances (cable 556 COMPUTER SCIEN HENCE ON - nee! 2. Segregation of f | a 5 ry nn ead ca moe Maat a la The ogg | Eg Mt 3. Refurbishment and reuse. Refu ‘ used electrical an eee Refurbishment and reise of waite ab pes ae wantin equipments which can be easily refurbished tg puy nt 0d al its percen 4. Recyclingjrecovery of val is : Recycling/recovery of valuable materials. Ferrous metals in electrical are ae {ore ferrous metals in smelting plants, precious metals in separating works, i Treatment/disposal of dangerous materials and waste. Shredder light fac ~ isposed off in landfill sites o aS i ie r sometimes incinerated (expensive), chlorofluoro-carhn.” Py a eects treated thermally, Printed Circuit Board(PCB) is incinerated or cca st underground storages, Mercury(Hg) is often recycled or dis Rea 1ges, Mercury(Hg) is often recycled or disposed off in undergrours ee 17.5.2 Benefis ind az Bi er s of e-Woste Recycling ee The eWaste disposal and proper recycling is_very much necessary and Important for ind * of people , environment and the nation. The key benefits are ( 1. Allows for recovery of valuable preci contain ae A ry of valuable precious metals. Most consumer electronics sma Yaluable materials lke copper, gold and zine that can and should be reyeled Vi als faterials are significantly more costly than recycled materials for manufacturing seer 2. Protects public health and water quality. E-waste contains a variety of toxic substances, which may include lead, mercury and cadmium. When e-waste is disposed B into landfills, these toxins can be released into the atmosphere or leak in through the es Jand and have negative health and environmental effects. in 3. Creates Jobs. Recycling e-waste domestically creates jobs for professional recyclers and E refurbishers and creates new markets for the valuable components that are dismantled, 4 4. Toxic Waste. Mining produces toxic waste, which are linked with erop devastation and human health crisis due to water contamination ; 5, Saves landfill space. E-waste is a growing waste stream. Recycling these items will help conserve landfill space. 17.6 GENDER ISSUES WHILE TEACHING/USING COMPUTERS The subject ‘computers’ is introduced in primary classes in most of the schools, ‘Computer i Pp P a Science’ as a major subject gets introduced only in high school. While teaching computers, there are many gender specific issues that must be addressed to enforce gender equity in compute. science education. Let us talk about these issues. 2 17.6.1 Gender Issue’ Gurvinder and Bela are Computer Science teachers at two different co-educational schools. Both said that in the class of the subject ‘Computer Science’, 60-70%® are boys and rest are itis This frend i, more boys opt for ‘Computer Science’ than girls, has been continuing for Years no" So ‘under representation’ of girls is one major issue. et us discuss some major gender issues at schoollevel There are some other issues as well. Li Computer Science education. 6. Arough figure as estimated in an informal talk. og ration 557 : is 1, Under Representation aces A leading engineering institution of India has ener eee, aap a porcraniediat cea are ¢ 2s reported that there has been about 17% of girls | Pt Science’ engines a es paca tC ae atbong (@ Preconceived Notions. There Fores wore bahia ee e ys are better at technical th i carer and Teng Stel ee ety They must not take up high involvement e care of your family’, etc. have i us re area aa AIRS ota ns ay a portant role while deciding about subjects and fend up taking other subjects than ‘Computer Science’ Me Gumnmandl ial : uring primitive years, children often play games |] Also, at homes boys get to play more on computerslsmartphone (keeping in aig te eae an a nea i ct pees Girls are pressurised to choose a career option which will give them the directly/indirectly in households that yor ani oe ea in Ms tat youhavete pay ener nd (iv) Lack of Role Models. Girls these days see less of role models in the field of ‘Computer Science’ whom they can imitate. TV, movies, advertisements, every where itis portrayed that is Ip technical fields like ‘Computers Science’, are men’s fields. If you see a woman scientist in a team, there are 10 other scientists who are males, in a movie/advertisement etc, what would you think’ | sub-consciously. All these things influence girls sub-psychologically and they infer that ‘Computer Science’ is for boys and do not take up the subject (0) Lack of Encouragement in class. As there are lesser number of girls ina class, the teachers for most work-assignments end up choosing more boys. Also, less number of girls means, lesser peer-encouragement, Also, some teachers pin point on their roles in society such ‘giels will get married and may not take it up as career’. All this may play as a hindrance and girls do not develop as much interest as they can in ‘Computer Science’ subjects. 2. Not Girl-Friendly Work-Culture Ithas been observed that when, in schools, work-partners are chosen, boys prefer boys over girls, ‘And even ifa gitl and a boy are made work-partners, boys prefer to work actively and make girls silent observers, Boys are not comfortable in situations where they arent playing activeroles uters to work on, they are very shy of working actively. As Even if girls are given separate comy ; er File Oe Bee H in a computer room are like : ‘insufficient enti As per a study, the problems mentioned by git! u xe Tike recess time’ “difficulty with maintenance’ of insaftcien! Enid 4 gg to problems mentioned by boys such as ‘soft quality of help’ etc. ware not usable’, ‘limitations of software’, “poor 558 COMPUTER SCIENCE WITH Pigg 0 17.6.1A Possible Solutions The issues listed above handling are not intentionally created, hence they need a different iy Pe og ( There should be Siam shel be more nates and progam that encour is 0 ke up fslence subject. Presently there are many snatives Supported BY S0verimen fe oo slants to encourage more gitls to take up “Computer Science spa! {The Film and TV censor board should ensure fair representation of female role me cinema etc. so that more girls get encouraged to take up ‘Computer Scene (iti) Im the practical . tn the practical rooms, gis should be encouraged more to work on comput wn and also to find solutions of their routine problems such as Paine available’ They should assertively speak to the lab atendant to ge all he periph devices they want, They should be encouraged to celbrat small Succes in a (Guch asa bug succesfully removed) to big sucess Such 8 pros working supe will instill more confidence and more interest in girls to work with Science’ subject. e eae 17.7 DISABILITY ISSUES WHILE TEACHING AND USING COMPUTERS Increased focus on ‘inclusive edueation’ and promoting access for students with disabilities ang Painnents, in the field of technology and computes seen: Hae made today’s classroom Teall diverse and inal Wheaton’ end fig positively aided to the cause of “inclusive education’; on the otherside, there are many issues that have risen and those must fo taken of in order to impart real education. = In the specially abled students, there can be one or more disabilities (i) Locomotor disabilities. Severe deformities, polio, leprosy, cerebral. palsy. .. Hearing impairment, speech aphasia, (i) Hearing and speech disabil (iii) Cognitive impairment. Specific leaming deficits (Dyslexia, Dyscalculia), Down's syndrome, Autism. } (iv) Vision impairment. low vision, blindness | Various disability issues faced in the teaching/using computers with regard to above disabilities are being discussed below. aching Materials/Aids Students with different disabilities need different types of teaching aids/materials. For instance, hhallenged students would want that there are screen readers that could read the amming lessons should not involve visual inputs (6g. it «for programming concepts : Python for visually impaired Jnavailability of T visually ¢ digital content to them ; also progr 9-10 there are two alternatives atch for others). Similarly, hearing impaired students would want more of visual input than orator rather ructions should be available in sign language if possible. with locomotor disabilities are both keyboard disabled virtual keyboards for writing computer programs. following types of hardware are required + classes students and oratory in: and mouse A lot of children, not all, ei disabled; however, they can use For vit 1s supporting such students, 1. Sophisticated virtual keyboard software, keyboard ), Down's to above instance, read the 5 (eg, in mpaired y, rather | mouse - virtual SOCIETY, LAW AND ETHics, al stick that is speci Berens i SPE 1 the needs of ee 7 a programming editor that we eee Of the child ‘ can be require any mouse move interfaced ements, with the vie Virtual keyboard, and d ison students, Brai Land does not yorlow-vison students, Braille keyboard Fefeen readers should be made ywanige ae mo tors, and Braille printers along with to facilitate thet fomputers. hd Br ee ir learning and working on unavailability of such supportive e ndled by schools Programming aids har and their man ond sotonthe : anagements, | software area bg issue that must be tock of Spectal Needs Teachers yor different types of special needs, if wir needs addressed in right special needs teachers are available a one ae ght manner, fo keane to converse in sign language would be i impaired students, a teacher who is able traditional methods. able to convey and explain the study material than ‘There should be teachers who know what types of hardware, software, tools te can be use for ee eee, able students as per their specific needs, eg spedal types of spedalizad hardware such as Braille keyboards, monitors, printer 8, Special types of speci ee ee cease ee software ‘There are many types of software features and voice ass i Thera ssistants that visually impaired students © Microsoft's Narrator and Cortana and Ubuntu's Orca and onBoard, the voice assistants which blind people can use for a variety of essential tasks. ‘© A special version of Linux called BLinux especially meant forthe blind. © host of accessibility features of various Office software that can be easily activated. These features are present in both Microsoft Office and open source offerings such as Apache OpenOffice and LibreOffice. © Specialized editor for visually impaired students for typing programs 3, Lack of Supporting Curriculum Curriculum should be designed while keeping focus on. inclusive education. There always should be possible si Sr" 1 alternatives keeping in mind special ‘needs of the students. Zi s should be so used so that the 1. What is IPR? 2, What is Plagiarism ? Software and program: “isabled students can easily work on that. For example, office software based curriculum can easily Pe implemented forall types of students as nearly al office sofas provide Differentiate between copyright and ecossibilty features. Similarly, 2 programms language trademark s What is digital property ? that requires manual code typing, such 85 Python, aco Define these terms be used for teaching pees ane nee (08s i) Foss (ii) FLOSS editors are also ealaieg Oy irs ae Differentiate between freeware and ogramming language shot Se ecessibility features Licenses. Name some Open Source 560 al! COMPUTER ScENCE vam oe Further, dhe computer sce — Pe al eater Slence contents and programming contests should be so \ oe dents can participate in them, inclusively. Conducted 45 Possible Solutions a ble solutions for Samed ; fe a disability issues are straight forward ools must work toward making availabl i ene eS als to fulgy Schl must wr ig available the required teaching aids/materials eee oe with disabilities. There should be proper budget allocated quired material and equipment to promote inclusive education, cS © School must emy ust employ special needs teach \d should in pene ae eachers and should alao| ali ¢tae eam to interact with students with special needs soas to help them leam ina bag ins bs Inclusive way. There a «5 Melsive way There shouldbe spl budgtallocated for trining the sal abot uch Schools must support the inch r 4 : Schools mus lusive curriculum and refrain from any other practi clly o indirectly pus the disabled students at the disadvantaged side, LET Us REVISE ——a % Intellectual property i Zrellectal propery rights are the right ofthe ower of information 0 decide how much formation Ie i nged, shared or distributed; and to decide te price or doing (exchanging/sharing/dsrbutng) so, igiarism is stealing someone else's intellectual work and representing It as your awn work without giving credit Digital property (or gital property (or digital asses) refers to any information about you or created by you that exss I digital form either online or on an electronic storage device. ae t0 Open Source Sofeware, which refers to software whose source code is available fo customers andi can be modified and redistributed without any limitation. An OSS may come free of cost or with a payment of nominal charges that its developers may charge in the name of development, support of software, ©. FLOSS refers to Free Libre and Open Source Software or to Free Livre and Open Source Software. The term FLOSSis used to refer to a sofeware which is both fre software as wel as open source software. Here the words libre (a Spanish word) and livre (a Portuguese word) mean freedom. Fraud committed using the Internet is called Online fraud (e.g, fraudulent payments, identity theft ete.) Secure data transmission means applying enough technical safeguards so that data travels safely to its tag, without being compromised or eavesdropped. Phishing is the practice of attempting o acquire sensitive information from individuals over the internet, by meas of deception. & Any fraudulent business practice that extracts money from an unsuspecting, ignorant person is ealled a seam Digital’computer forensics refers to methods used for Interpretation of computer media for digital evidengs Gender issues while teaching/using computers are : under representation of girls, not girl-friendly work-culture, | sching/using computers are unavailability of teaching materialsais,lackof speciale Disability issues while tea teachers and lack of supporting curriculum. yYbjective Type Questions 6 —— oTas Questions Multiple 1. A software that can be freely accessed and modified is called (b) Package Software (a) Synchronous Software (c) Open Source Software (@) Middleware ~ Nay ed so nein for vel] 17 SOCIETY LAW AND ETHICS oot 5a ian exemple of an Open Source DBMS, P(g MySQL ©) Oracte en source image editor si (0) SQL Serv . an open ige editor similar to Adobe ee rer (@ Sybase oe . oth m eae © mee what is another name given to ‘proprietary eis ne | (@) Open source software : ite 2 e spoke software {9 Tailor Made software 5, What is meant by ‘proprietary’ software 7 (@ Software owned by an org. (@) Closed source software janisation, you mai (@ Freely available, constantly upgraded by What is meant by 5 Wy need to buy a license for. : \ users. No fee. ‘open source’ software ? . (@) Software owned by an organisatis 'Banisation, you may need to buy a license for (b) Freely available, constantly upgraded by users. No f 7, Which of the following would be a creativ: 7 work protected by copyright ? (@ A list of all Indian President names Ps you vost dent names (6) A portrait of your family Sot og ) The name of your pel §. What is an example of e-waste ? g pe (@) a ripened banana © volcom (0 old clothes (@) empty soda cans 9. tine: ie cee eg., online email account, social media account or handle, online shopping account, online photo sharing account, trademarks, patents, own registered domain name ete. are collectively called _ : : a (H) Online estate (4) Digital property er_of information to decide how buted, are collectively known as _ (IPR). (H) Intellectual Property Rights (a) Instance Property Rights cesenting it as own, is called (@) Online ident (0) Digital identit 10, The rights of the < shared/exchanged/d much information is to be (a) Intelligent Property Rights (0) Interactive Property Rights intellectual work and repr 1 Stealing someone else’s i (@) Intellectual steal (b) Pluckism (©) Plagiarism (@) Pickism: Fill in the Blanks hts of the owner of creative information/work to decide about the 1 ___ are the rig usage or price of his work. ae 1se’s intellectual work and representing it.as Your own without giving ce is stealing someone ¢l cat vn Internet or on an electronic device, is rm either oF 3. Any work/information that exists in digital form either known as property. es are known as ——~ 40 a iscarded electrical tation of computer one ai e is ‘media for finding digital evidence o the methods used for i s refers t interpre! against some crime/fraud. 6. The original code written by f own as programmers for @ software is known tl Q COMPUTER SCIENCE WITH Prnggy ——— Means no price is to be paid for the software —— —— means freedom to use the software. is the protection of pe sonal information given online, e/False Questions Open Source Software can be used for commercial purposes, Shareware software i su rare ee a > : De vel i cybercrime. Be a 2. Ikis okay to copy Freeware sitive information of someone else using online means, 5 a Freeware and free software mean the same thing NOTE : Answers for OTQs are given at the end of the book. Solved Problems , 1. What is Online Solution. Fraud committed using the Internet is called Online fraud. Online fraud may occur jn many forms such as non-delivered goods ; non-existent companies ; stealing information ; fraudulent payments ete. 2. What is secure data smission ? What technical rays are used to ensure the secure data transmission ? ‘olution. Secure data transmission means applying enough technical safeguards so that data travels safely to its ta get, without bei promised or eavesdropped. To ensure secure data transmission, majorly following techniques are applied () SSL secure data transmission. SSL. (Secure Sockets Layer) is a standard security protocol which ensures data security by establishing enerypted online links between a web server anda browser (i) Data encryption. Encrypted data when sent over Internet is hard to steal and henceis Safer (iii) Using Safe protocols such as for files, secure FTP protocol Solution. Intellectual property rights are the of the owner of information to decide how muuch information is to be exchanged, shared or distributed. Also it gives the owner a right to deade the price for doing (exchanging/sharing/ distributing) so. Why should in ty rights be protected ? .. The intellectual property rights must be protected because protecting them. © encourages individuals and businesses to create new software and new soltWats as well as improving existing applications, applicatic y distributed, ideas and technologies are wi ational economy. ensures ne’ © promotes investment in the r

You might also like