David Th.

About ICT, Cyber Crime, Cyber law & Computer ethics and many more all over the world.

                                                      ICT, Cyber Crimes and Cyber laws.


ICT 


­- Introduction to ICT
The ICT stands for Information Communication Technology.The phrase "Information and Communication Technology" has been used by academic researchers
since the 1980s and it became popular after it was used in a report to the UK government by Dennis Stevenson in 1997.

                    It is a set of technology tools and resources used to communicate, create, disseminate, store and manage information. It uses various digital technologies
 to process raw data into meaningful information so that such information can be transmitted to intended destination using communication technology. A computer
and other technologies plays very important role for better use of ICT. The ICT also includes the various devices, services, applications and communication systems
associated with it. Broadly ICT is a combined form of two major terms. They are:

 * Information technology: Information technology (IT)  is the application of computers which is basically concerned to the data processing, management, storage
 and retrieval system. This term is also commonly used as a synonym for computers and computer networks.

* Communication technology: Communication technology is the connection and transmission way of information over a long distance by using different mean such
as telephone, radio, television, satellite, internet, cable etc. The modern communication enables the user for sharing information and resources globally.

- Impact of ICT in the society
ICT has both positive and negative impact in the society. Some of the positive and negative impacts in the society are listed below:

* Positive impact of ICT in the society are:
- To perform any task quickly and accurately.
- To maintain document secrecy.
- To process error free result.
- To use in different fields in the society.
- To prepare and process reliable information.
- To transmit information globally.

* Negative impact of ICT in the society are:
- The initial set up cost to implement ICT is very high.
- The use of ICT may increase unemployment problem in the society.
- Cyber crimes are originated and increased.
- The problem of fast and frequent changing technology.





- Information Communication Technology Tools
   The audio/video cassettes, radio, television, cellular phones, computers and internet etc are the common ICT tools. The ICTs such as printer, audio/video
cassettes, radio and TV broadcasts, computer or the internet may be used for presentation and demonstration. Computer is the main tool of ICT.

- Application of Information Communication Technology
The development of ICT has made our life more easier and compitetive. Due to the development of information and communication technology, the world
has changed into a small global village. The ICT has a great impact on every aspect of mankind thus plays very important role for various applications.
Some of the common applications of ICT are described below:

* ICT  in education: ICT in education can be used as teaching learning aid, information sharing, research means etc by the teachers, students as well administrators.
Teachers can use ICT research materials; participate in online forums ans prepare teaching plans. Likewise students can use ICT as reference tools, online study,
computer based training etc.

* ICT  in communication: ICT is massively used in communication these days. In communication, ICT is used in different forms such as email, information sharing,
chatting, video conferencing through internet and networks etc. The user also can view and post news and comments on bulletin board services.

* ICT in offices: The ICT enabled office is known as electronic office. In offices, ICT can be used to keep employees database, prepare reports, letters, notices and
other day to day activities. The ICT in offices also helps computerized accounting, payroll preperation, data analysis, auditing, inventory cantrol, annual planning etc.

* ICT in health: ICT in health is widely used which helps keeping patients records, treatment analysis, getting information on patients disease etc. Doctors can
be benefitted from virtual surgery, expert system. It also provides telemedicine technology to patients.

* ICT in banking: The use of ICT in banking sector is very common these days. In banks, ICT is used to keep customers whole records, handle transactions,
maintain ledger, provide online service, ATM service, ABBS(Any Branch Banking Service) etc. Thus, ICT provides online and electronic banking service to the customer.

Click Here to learn about Viruses and its way of Protections.

Cyber Crime

Any type of illegal activity associated with computer system, networks, Internet etc to steal and destroy data as well harm the ICT related properties is cyber crime.
Thus, Cyber crime is an electronic fraud comited by the people using ICT and computers. It is also known as computer crime where cyber related restricted activities
are done and resources are utilized. The following are the common and popular cyber crimes:

* Password Guessing: Password is a secret and authorized set of characters which acts as key to lock or unlock computer, data and software. It is an illegal activity to guess and use other's password. If any attacker finds password, he/she will access complete information from the computer. The attacker takes a dictionary of words and names and tries each one to guess and understand password.

* Hacking: Hacking is the process of gaining unauthorized access to individual computers or computer networks. It is done by ICT experts called hackers who are fully engaged in computer programming and computer technology. Once hackers enter in to the system, they steal, transfer, inspect or tamper the data, programs and other resources without the knowledge of authorized user.

* Cracking: Cracking is the process of breaking into the copyrighted software or an information system with the intend of releasing software so that it can be used without paying royalties. Cracking is done by the persons known as cracker who steal confidential data, acquire free access to perform the malicious destructions of files.

* Software piracy: Software piracy is the act of illegally using, copying, or distributing software without the permission of Software Company or vendors. It is a type of cyber crime in which software or programs are used without paying and having no legal rights of the software.

* Pornography: Pornography is the representation of human body or human sexual behavior for the purpose of sexual stimulation which is distributed through internet to the computer user. Now days, pornography on internet is available easily in different formats which is giving negative impact to the society especially to the children and teenagers.

 Learn about Computer network and Internet

Cyber laws:

The cyber law deals with the legal issues related to Information Communication Technologies particularly internet, computer networks, web sites, software, electronic
devices, electronic transaction etc. It is the term that includes rules and regulations established to govern, prevent and resolve disputes which arise in the field of cyber space. The term cyberspace is virtual space created by computer networks, internet and various transmission mediums used to make communication. Thus cyber law is used to control and abuse cyber crime. The common Area of Cyber Law are:

* Digital Signature: A digital signature is the digital identity of the sender that uniquely indentify the particular sender electronically which is based on public key and private key. Digital signature uses two different keys for authentication; one for creating a digital signature or transforming data (private key) and another key is used for verifying a digital signature or returning a message to its original form (public key).

* Copyright Law: The copyright act prevents the unauthorized copying of a work of authorship. However only the copying of work is prohibited but anyone can copy the ideas contained within the work. Copyright can be registered in copyright office but newly created works do not need to be registered. Thus it is included in cyber law.

* Trademark Law: Trademark law governs the use of a device (including word, phrase, symbol, product shape or logo) by a manufacturer to identify its goods and to distinguish those goods from those made or sold by another. Therefore, trademark law falls in the category of cyber law.

* Telecommunication Law: Development  in telecommuication has been rapid since some years. Almost all people are using the facility provided by telecommuication. People use computer with the telecommunication tools to share and transfer messages, database from one location to another in the form of electronic data. Therefore, the necessary rules to systemize telecommunication also fall within the area of cyber law.

* Data Protection and Privacy Law: Data protection is necessary and very important for the securing of data from being lost, damaged or corrupted. The unauthorized users or persons may access or copy the personal and confidential data illegally. Therefore, data protection and privacy law is also included under cyber law.

* Electronic Transaction act (law): The use of electronic transaction is being increased in different sectors. The various means of electronic transactions are online payment, E-payment, E-commerce, debit and credit card transfer etc. There may be several frauds during these electronic transactions. Therefore, it is necessary to control and prevent such frauds with the systematic law which could be cyber law.


Cyber Law of Nepal:

Nepal is one of the developing countries and marching up gradually in the field of ICT. As the use of information and communication technology is increasing in different sectors, the illegal activities are also originated and resulting the cyber crimes. The Ministry of Science and Technology and National Information TechnologyCenter is regularly working to uplift the proper use and development of ICTs in the country.

 As the result, the government of Nepal introduced the Cyber law of
Nepal on 30th Bhadra 2061 B.S. (i.e. 15th September, 2004 AD) after approving by the council of ministers for the first time to  control and abuse cyber crimes.
Later, the government of Nepal revised and released the Electronic Transaction Act (ETA) -2063 B.S. in order to regulate and legalize all the electronic transactions
and digital signatures.

* Provisions of Cyber law of Nepal
The cyber law of Nepal has formulated the various provisions to regulate and systemize the cyber related issues. Some of the major provisions are listed below:

- Provision of monetary fine from Rs. Fifty thousand to Rs. Three lakhs.
- Provision of imprisonment from six months to three months.
- Provision of digital signature, electronic data processing etc.
- Provision of legal hearing of cyber related problems through IT Tribunal and Appellate Tribunal.

Computer Ethics:
The concept of computer ethics was originated in 1950 by a MIT professor "Nobert Wiener" for the first time. He was the inventor of an information feedback system called "cyberethics" in the book "The human use of human beings" he published. This book laid the basic foundation of computer ethics and made "Nobert Wiener" the father of computer ethics.

Computer ethics are the moral and practical issues or general behaviour that every computer user must follow as the norms in the society in the use of ICT. Beside the law, it includes the consideration of both personal and social policies for the better and safe use of computer related technologies. So, computer ethics is these of moral principle or practical behaviours that regulate the use of computers.

The commandments of computer ethics are:
- We should not use computer to harm others.
- We should not open and disclose the secrecy of computer.
- We should not use proprietary software for which we have not paid.
- We should not spare illegal or false information to the society.
- We should not guess the password of others.
- We should not use the computer to steal data and itself.
- We should not use others computer resources without permission.
- We should not snoop around in other's files and data.



To be continued......
( Daily updates and new posts.) And if you have any doubt or if you want to post something valid  you can contact me  or ask me on comment   below.

If you have any questions or doubt on something then please ask me on comment below, don't forget
to leave your feedback .I hope you guys find this post helpful. Contact us if you want to work with us, or if you want us something to write about then please be free to ask.

Some interesting Quotes, check it out for inner peace:





Thanks for watching please don't forget to share and follow my page for your kind support and for more updates !!!


David Th.

About David Th. -

James is a Senior Brand Manager, where he helps oversee the organization’s branding, communications efforts, marketing and other general helps. James has created dozens of articles, videos and seminars on all things ecommerce, ranging from online marketing to web design and customer experience (many more). Beyond being a certified nerd, James is an college football player, enthusiastic home cook and a self-admitted musician. If you want to hire or contact with James then contact with us or comment us.

Subscribe to this Blog via Email :

3 comments

Write comments
Unknown
AUTHOR
August 16, 2018 at 9:31 PM delete

Explain the notion that ICT is tool for cyber crime

Reply
avatar
ABC
AUTHOR
November 9, 2020 at 4:19 PM delete

About Computer Virus, remedy and Protection

Reply
avatar
Anonymous
AUTHOR
March 30, 2022 at 9:22 PM delete

About Ict, Cyber Crime, Cyber Law And Computer Ethics And Many More All Over The World. - All Round Nepal >>>>> Download Now

>>>>> Download Full

About Ict, Cyber Crime, Cyber Law And Computer Ethics And Many More All Over The World. - All Round Nepal >>>>> Download LINK

>>>>> Download Now

About Ict, Cyber Crime, Cyber Law And Computer Ethics And Many More All Over The World. - All Round Nepal >>>>> Download Full

>>>>> Download LINK

Reply
avatar