Creating Volunteer Online Police in Virtual Worlds

Slides:



Advertisements
Similar presentations
Fair Credit Reporting Act You must be told if information in your file has been used against you You can find out what is in your file You can dispute.
Advertisements

Ethics Ethics are the rules of personal behavior and conduct established by a social group for those existing within the established framework of the social.
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
How It Applies In A Virtual World. Phishing Definition: n. To request confidential information over the Internet under false pretenses in order to fraudulently.
P2P NETWORKS Legal Risks. Who’s On First Identity crisis Each computer can be client Each computer can be server “Servent”
Chapter 7 Database Auditing Models
Eleonora Babayants Galaxy Consulting. Information Governance  It is the set of policies, procedures, processes, roles, metrics, and controls implemented.
Information Resources and Communications University of California, Office of the President System-Wide Strategies for Achieving IT Security at the University.
Incident Response Updated 03/20/2015
How It Applies In A Virtual World
11 WORKING WITH USER ACCOUNTS Chapter 6. Chapter 6: WORKING WITH USER ACCOUNTS2 CHAPTER OVERVIEW Understand the differences between local user and domain.
Meeting the Demands for Vital Statistics: The Challenges of Collecting, Preparing, and Promoting Baltimore, MD May 31 st – June 4 th, 2009 Vital Records.
Unit 9 Communication Services
Cyber Crimes.
WELCOME Title V Emissions Inventory SPARS Training – Site Management.
ISBN Prentice-Hall, 2006 Chapter 10 Delivering the System Copyright 2006 Pearson/Prentice Hall. All rights reserved.
An Insight into the Relationship Between Social Media and the Susceptibility to Malicious Intent Presented by Rebecca Morgan 15/05/2015 >>>>2.
On-Line Service Voucher Log (SVL) Overview. To Be On-line You Must… Be an Enrolled ABC Child Care Provider Have internet access Have Web Browser Internet.
1 iBizBuilder from ClearPath Welcome to the ClearPath Networks iBizaBuilder online Tool! This innovative tool will be an online source for automating your.
Security of systems Security risks come from two areas: employees (who introduce accidental and intentional risks) and external computer crime. Unfortunately.
GUIDE TO SMALL BUSINESS RECORDKEEPING. CONTENTS INTRODUCTION BASIC CONSIDERATIONS FURTHER CONSIDERATIONS WHAT TO KEEP & FOR HOW LONG SETTING UP YOUR BOOKKEEPING.
The Islamic University of Gaza
Emportant Technologies Pvt Ltd Emportant HRMS Attendance Management.
ONLINE INFORMATION SAFETY & SECURITY Place yourself to be VICTIM while online?
Private and Confidential. Levels of Identity Verification Is this person who they claim to be? Knowledge based Authentication Is this a real identity?
Asset & Security Management Chapter 9. IT Asset Management (ITAM) Is the process of tracking information about technology assets through the entire asset.
Welcome To Follow along with the Demonstrations go to
Legal Division CSAA Insurance Group, a AAA Insurer Protecting Your Identity: What to Know, What to Do 2015 Risky Business Week.
National Conference on Student Assessment June 2014 Balancing Test Security and Accessibility on Next Generation Online Assessments: One State’s Perspective.
Interstate Compact Offender Tracking System End-User Training.
Passwords. Outline Objective Authentication How/Where Passwords are Used Why Password Development is Important Guidelines for Developing Passwords Summary.
Identity Theft Ashley Gowin Sabrina Prophet. What is Identity Theft? Identity theft is when someone uses your personal information such as your name,
 Why is this important to you?  How do digital footprints connect with digital citizenship?  Does everyone have a digital footprint?
RDECOM EVALUATOR GUIDE DAVISON ASSOCIATES ENTRIES IN THE FEDERAL VIRTUAL REALITY CHALLENGE.
Identity Theft Since 2005, there has been a dramatic increase in the occurrence of identity theft among students online.
WHO’s IN YOUR “WALLET” WHO’s IN YOUR “WALLET” YOU BETER “RECOGNIZE” YOU BETER “RECOGNIZE” STEPPING $2o0 $300 $400 $500 $400 $300 $200 $500 $400 $300.
1 Policy Types l Program l Issue Specific l System l Overall l Most Generic User Policies should be publicized l Internal Operations Policies should be.
WebAdvisor TRAINING GUIDE FOR STUDENTS. What is WebAdvisor? WebAdvisor is an online tool designed to allow students to register for classes, make payment,
©Dr. Respickius Casmir Network Security Best Practices – Session 2 By Dr. Respickius Casmir.
State of Washington Customer Management Staff Level Training Presentation.
Objectives  Legislation:  Understand that implementation of legislation will impact on procedures within an organisation.  Describe.
CYBER CRIMES Know how's of cyber crimes. I’M HERE………
Internet2 Base CAMP Topics in Middleware: Authentication.
Digital Citizenship Project Submitted by: Etta Pope Instructor: Laurie Fowler.
Identity Theft It’s a crime!
ONBOARDING INFORMATION THROUGH PEOPLE ADMIN/ APPLICANT TRACKING
StudentTranscripts Service Overview
ZOOM Applications.
Lutheran Church of Our Saviour
StudentTranscripts Service Overview
StudentTranscripts Service Overview
Protecting Your Identity:
How eBay partners with brands on IP protection
FAFSA on the Web Preview Presentation
Internet Safety Part I Social Media
Social Media And What Not To Share!
Experience the Magic of Online Ordering
StudentTranscripts Service Overview
Protecting Yourself from Fraud including Identity Theft
StudentTranscripts Service Overview
ICT Communications Lesson 3: Internet Life and Privacy
ONBOARDING INFORMATION THROUGH PEOPLE ADMIN/ APPLICANT TRACKING
StudentTranscripts Service Overview
Customer Portal Instructions
AUP, EDP, & Centralized Printing
CONVERCENT INCIDENT REPORTING Employee Training
Record your QUESTIONS as your read.
Laws Against Computer Hacking
Presentation transcript:

Creating Volunteer Online Police in Virtual Worlds “Because behind every Avatar there is a real person!” Jaque Davison Davison Associates (703) 644-7354 VR4YourPC@aol.com ©2009 All Rights Reserved

Overview Guidelines – Terms of service Crimes and enforcement tools Organization Training academy Implementation

Guidelines - Terms of Service Set by the owner Shrink-wrap principle Failing got follow is grounds to deny service Too many users for the owner Community talent Real crimes require real police

Crimes Flaming Land disputes Vandalism Stalking Content violation Account theft Password cracking Social engineering Credit card fraud *

Enforcement Tools Muting Suspension of rights Ejection Banning Object deletion Special Bots Manifesting as an Avatar Multiple location presence Teleporting Chat capability Object copy and move functions Chat and incident logging

Special Tools

Organization

Academy

Training Sites

Academy Tracking

Patrolling

Ejection Technique Change the subject Use humor Capture chat The user name The user's IP address The date and the time The world where the infraction occurred A transcript of the offending text taken from a chat log Change the subject Use humor Capture chat Warn in whisper Warn in bold Eject Report

Implementation Step 1 Policy and procedures Step 2 Initial operations Involve the community Recruit Step 3 sustainment Set up the academy Record keeping Special operations

A Sign on the Wall

AWSource

TRADOC World

UCanFnsh

The briefing is over… Thank you The White Paper “Creating Volunteer Online Police in Virtual Worlds” is available on request from: VR4YourPC@aol.com