besidedegree@gmail.com
+9779709005491
Back to Home
School SEE Science

Ethical and Social Issues in ICT

Highlight Save
This note covers Ethics and ICT, explaining digital responsibility, safe use of technology, cyber law, privacy, and moral behavior in computing. It provides clear Grade-10 level points for easy study and exam preparation.

1. Ethics and ICT

Ethics means principles that guide people to decide what is right or wrong.
The word comes from the Greek term ethos, meaning character or beliefs.
As ICT becomes a major part of daily life, it affects personal, social and moral values. The Internet does not have strict global rules, creating concerns about privacy, security and responsible use. This leads to the need for ethical use of ICT.

1.2.1 Computer Ethics

Computer Ethics is a set of moral principles that guide the proper use of computers without harming others.
As computers spread into society, ethical issues like privacy invasion, misuse of data and unauthorized access appeared. Over time, rules were formed and many became formal laws.

Important Commandments of Computer Ethics

  1. Do not use a computer to harm others.
  2. Do not publish fake information.
  3. Do not search or destroy others’ files or records.
  4. Do not steal personal data or privacy.
  5. Do not interfere with others’ computer work.
  6. Do not use or copy software without paying.
  7. Do not access others’ computer resources without permission.

1.2.2 Cyber Ethics

Cyber Ethics refers to rules of proper behaviour on the Internet.
The same values that apply in real life, such as honesty and respect, apply online as well.
Cyber ethics teaches users how to behave responsibly in the digital environment.

Difference Between Cyber Ethics and Cyber Law

  1. Cyber Ethics: Moral behaviour and good practices on the Internet.
  2. Cyber Law: Official rules made by the government to control online activities.

Do’s and Don’ts of Cyber Ethics

DO:

  1. Use the Internet to study or learn.
  2. Learn about music, videos and games.
  3. Communicate with friends and family.

DON’T:

  1. Copy online work and claim it as your own.
  2. Download or share copyrighted content.
  3. Talk to strangers online.
  4. Pretend to be someone else.
  5. Use abusive language.
  6. Share personal details or passwords.

Domains of Cyber Ethics

  1. Privacy
  2. Property
  3. Security
  4. Accuracy
  5. Accessibility
  6. Censorship and Filtering

1.2.3 Digital Citizenship

Digital Citizenship is responsible behaviour while using technology in society.
A digital citizen uses the Internet safely, legally and effectively.

Elements of Digital Citizenship

  1. Digital Access: Equal participation in digital society.
  2. Digital Commerce: Buying and selling online.
  3. Digital Communication: Electronic exchange of information.
  4. Digital Literacy: Knowledge and skills to use technology.
  5. Digital Security: Protecting data and devices.
  6. Digital Health: Using technology to improve health.
  7. Digital Law: Rules and regulations for electronic activities.

1.2.4 Digital Footprint

A Digital Footprint is the trail of data a person leaves while using digital devices or services.
It reflects online behaviour and can be used positively or negatively.

Managing Digital Footprints

  1. Delete unused accounts.
  2. Maintain privacy in posted content.
  3. Remember online posts are permanent.
  4. Be aware that teachers, parents and others can see your posts.
  5. Avoid posting content that harms your or others’ reputation.

1.2.5 Cyberbullying

Cyberbullying is bullying through digital devices like smartphones, computers and tablets.
It includes negative, harmful, fake or humiliating content shared online.

Common Places for Cyberbullying

  1. Social media (Facebook, Instagram, Snapchat, Twitter)
  2. SMS or text messages
  3. Instant messaging apps
  4. Emails
  5. Online gaming

Examples of Cyberbullying

  1. Sending rude messages
  2. Excluding someone from online groups
  3. Offensive chats during gaming
  4. Posting hurtful content
  5. Spreading rumours
  6. Making fun in group chats
  7. Creating fake profiles
  8. Threatening someone
  9. Sharing embarrassing photos or videos without permission

1.2.6 Cyber Law

Cyber Law regulates activities on the Internet and protects users from online crimes.
It provides guidelines for secure electronic transactions and controls misuse of technology.

Cyber law covers:

  1. Hacking
  2. Intellectual property theft
  3. Credit card cloning
  4. Phishing
  5. Cyberbullying
  6. Privacy issues
  7. Freedom of expression
  8. Jurisdiction of online crimes

Nepal introduced the Electronic Transaction Act (ETA) 2063 to control cybercrimes and regulate electronic records and transactions.

1.2.7 ICT Policy 2072 (2015)

Nepal enacted the ICT Policy 2072 to guide the development and use of Information and Communication Technology.

Main Goals

  1. Improve national ICT readiness
  2. Achieve 75% digital literacy
  3. Ensure universal broadband access
  4. Increase ICT’s contribution to GDP
  5. Provide Internet access to all citizens
  6. Offer 80% of government services online
  7. Promote e-procurement
  8. Implement G2G (Government to Government) automation

The policy supports development in education, health, agriculture, tourism, research and e-commerce.

1.2.8 Electronic Transaction Act (ETA) 2063

The ETA deals with cybercrime, electronic records, digital signatures and secure online transactions.
It was approved on Mangsir 18, 2063 (December 4, 2006).
The act defines punishments and rules for cybercrimes such as unauthorized access, data alteration, online fraud and misuse of electronic records.

1.2.9 Opportunities and Threats in Social Media

Opportunities

Brand Development: Helps businesses grow and connect with customers.

Target Audience: Easier to reach specific groups of people.

Customer Interaction: Quick communication and feedback.

Attracting Customers: Promotional posts and giveaways increase followers.

Research: Helps understand customer needs and market trends.

Threats

Social Engineering: Attackers collect personal data to deceive users.

Targeted Phishing: Fake messages designed to steal money or data.

Fake Accounts: Used to trick or manipulate people.

Spam and Malware: Harmful content spread through messages, comments or posts.

 

Related Videos

Ethics and Social Issues in ICT by EduPrayas