E-Ethics.

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

How to protect yourself, your computer, and others on the internet
Primary Threats to Computer Security
Security at Home The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues.
Polling Stations There are four questions posted in the classroom Indicate a “yes” response by placing a tally mark on the white board The results of the.
The Internet.
Breaking Trust On The Internet
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
INTERNET SAFETY.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Chapter 9 Information Systems Ethics, Computer Crime, and Security.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Security, Privacy, and Ethics Online Computer Crimes.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Internet Guidelines. Cyberspace Cyberspace is like a big city. libraries, universities, museums, places to have fun, Places to meet people. But, like.
Identity-Theft is the fastest growing crime in America; 9.9 MILLION victims were reported last year, according to a Federal Trade Commission survey!
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
How It Applies In A Virtual World
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Issues Raised by ICT.
Internet safety By Lydia Snowden.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Cyber Crimes.
Digital Citizenship By: Miranda Scorver.
The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.
IT security By Tilly Gerlack.
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
Inappropriate Content Hackers Phishers Scammers Child Abusers Bullies.
Internet Safety Internet Safety LPM
1. 1.To discover ethical issues in electronic media and the Internet. 2.To identify different areas of Internet crime. 3.To assess where one should go.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Internet Guidelines. Cyberspace Cyberspace is like a big city. libraries, universities, museums, places to have fun, Places to meet people. But, like.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Issues for Computer Users, Electronic Devices, Computer and Safety.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Presented By: Jennifer Thayer, SPHR, SHRM-SCP.  Identify CyberCrime and Types  Identify Steps to Take to Prevent Identity Theft  Learn Tips and Tricks.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
Allison Gladkowski.  About privacy and why it matters  Spyware and spam vocabulary and examples  Identity theft  Unapproved access  Today's big issues.
Chapter 15 Digital Citizenship Section 15.1 Communicating in a Digital Society.
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Done by… Hanoof Al-Khaldi Information Assurance
GCSE ICT SECURITY THREATS.
Computer Security INSM 180- Belasco Bryant and Stratton Fall 2011
IT Security  .
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Protect Your Computer Against Harmful Attacks!
COMPUTER CRIME.
BCT 2.00 Analyze Technology Issues
Internet Safety Vocabulary
Protecting Yourself from Fraud including Identity Theft
HOW DO I KEEP MY COMPUTER SAFE?
E-Ethics.
Protecting Yourself from Fraud including Identity Theft
ICT Communications Lesson 3: Internet Life and Privacy
Ethical Use of Computers
Entering the World of Cybercrime
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Protecting Yourself from Fraud including Identity Theft
Privacy, Security, and Ethics
COSC-100 (Elements of Computer Science) Prof. Juola
Presentation transcript:

E-Ethics

Objectives To discover ethical issues in electronic media and the Internet. To identify different areas of Internet crime. To assess where one should go to report Internet crime. To recommend computer security measures to students.

Did You Know? One in five Web surfing children have been sexually solicited online Journal of the American Medical Association 35% of software today is used without licenses Nine million Americans will have their identity stolen this year Federal Trade Commission: http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/about-identity-theft.html

E-Ethics The study of moral values and rules in electronic media and the Internet

E-Ethics Are needed to avoid the spread of electronic crimes, such as: pirating online predators hacking identity theft wire fraud phishing counterfeit auctions spyware viruses password trafficking internet harassment cyber bullying hate mail copyright infringement

Cybercrime Is defined as any crime involving computers including: pirating online predators cracking identity theft wire fraud phishing counterfeiting goods online creating malicious viruses stealing passwords Internet harassment cyberbullying

Pirating Is the illegal stealing, copying or exchanging of media including: software movies music Accounts for almost 35% of software today Can result in fines of millions of dollars

Predators Take advantage of children by: using instant messaging, e-mail and social network sites gaining victims trust and engaging in sexually explicit conversations trying to arrange face-to-face meetings

Hacking Is modifying electronics such as an Xbox®, cell phone or iPod® Hacker: an individual who alters electronics legally someone who modifies their computer for better performance Cracker: an individual who illegally alters computer hardware or breaches computer systems crackers are often mislabeled “hackers” in mass-media

Identity Theft Is when someone steals your personal information to commit fraud or other crimes including: your name credit card information Social Security number Nine million Americans have their identities stolen each year

Wire Fraud Is illegally stealing money or property using interstate “wires” through companies like Western Union and Moneygram Is considered a federal crime because the crime goes across state lines

Phishing Involves e-mails pretending to originate from banks or online retailers such as eBay ® or PayPal ® Looks very similar to an actual e-mail originating from retailer Tries to gather financial information, user names and passwords from victims if recipient visits the fake retailer they may receive malicious viruses or spyware

Online Auctions Have become hotbeds for counterfeit goods eBay ® has recently been sued by companies for auctioning counterfeit goods. These companies include the following: L’Oreal ® Louis Vuitton ® Dior Couture ® Gucci ®

Spyware Is software installed from a Trojan Horse to discreetly altering the usability of a computer Usually installs with other programs, such as file sharing programs Includes side-effects such as pop-up advertisements and crashing of the computer

Viruses Are software programs which spread from computer to computer Are malicious in nature Can delete information on your computer Spread through e-mail and Internet downloads Alter the normal functions of your computer

Virus Prevention Steps to prevent viruses include: use virus protection software implement an Internet firewall, a buffer between your computer and the Internet install security updates be careful opening e-mail and downloading materials online

Password Trafficking Is the illegal obtaining, giving or selling of passwords   An American Eagle® employee was indicted for giving out passwords to the American Eagle® computer network to a Yahoo® message board. The indictment carries a penalty of 11 years in prison and/or a $350,000 fine. http://www.usdoj.gov/criminal/cybercrime/pattersonIndict.htm

Internet Harassment Is the online counterpart of harassment Can happen when e-mails are abusive May occur with unwanted e-mails (SPAM) Arises if conversations in instant messenger turn hostile May occur if talk in online forums becomes threatening

Hate Mail Is a form of cybercrime where offensive letters are sent through e-mail Involve e-mails including the following:  racism prejudice sexism Can result in jail time A Washington man was sent to jail for 41 months after he was convicted of sending at least 700 people hate mail.

Cyberbullying Is Internet harassment Tips for dealing with a cyberbully: take a break to reduce tension and calm down cut off all communication with the cyberbully tell an adult

Cybercrime Report to: Federal Bureau of Investigation U.S. Secret Service IC3 Internet Crime Complaint Center

Tips to Avoid Cybercrime Protect your personal information Use anti-virus software Back up important files Learn who to contact if cybercrime occurs

Prevent Identity Theft Protect your Social Security number - use it only when absolutely required  Secure your trash by the following: - cutting up credit cards, tearing up receipts and shredding bank statements Safeguard your passwords - place passwords on your vital accounts - use a combination of letters and numbers to increase security

Cookies Are small files stored on your computer Saved when a user visits Web sites Collect information used for: customizing Web sites collecting demographic information for advertisers tracking user preferences

Bad Cookies Could be considered an invasion of privacy Track which Web sites you visit Track where you go on the Web site Can be pulled from multiple sources to build a “profile” of your habits users may be unaware any of these actions are taking place

Good Cookies Are useful for customizing advertisements prevent young people from being targeted with walkers and the elderly do not end up with banner ads for skydiving At what point do cookies go from helping advertisers to invading your privacy?

Encryption Is a security measure used on today’s Internet Is labeled as SSL –Secure Sockets Layer Insures data is secure Is shown as a lock in the right hand corner of a browser Assures the site is authentic and not a fake, deterring phishers Is common in banks and other financial institutions

Copyrights Protect an authors original work automatically held when a work is created denoted by the symbol ©  Provide protection only in the United States No longer require the symbol to be protected Are no longer valid on works created before 1989 Are automatic on any work produced

Copyrights vs. Patents vs. Trademarks protect original works protect inventions and discoveries protect words or symbols used to identify the source of goods and services Collectively copyrights, patents and trademarks are known as “intellectual property” KNOW THE DIFFERENCE BETWEEN THESE.

Electronic Search and Seizures Are governed by the Fourth Amendment to the U.S. Constitution because computers are historically young, future court decisions will become landmark cases MUST have a warrant to search and seize. The Fourth Amendment: designed to control searches and seizures of homes and property will now be adapted and applied to searches and seizures of computers

Federal Trade Commission Created the Identity Theft Program in 1998 to handle the skyrocketing increase of identity theft reports Regulates identity theft Handles identity theft complaints at FTC.gov

IC3 Internet Crime Complaint Center Is a partnership between the FBI and the National White Collar Crime Center serves as a place for individuals and law enforcement to file complaints about cybercrime http://www.ic3.gov/