E-Ethics.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

The Internet.
Fraud, Scams and ID Theft …oh my! Deb Ramsay ESD 101 Chief Information Officer Technology Division.
Breaking Trust On The Internet
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
INTERNET SAFETY.
What is identity theft, and how can you protect yourself from it?
Hacker Hunters Plug-In B6 p.341 Matt Spindler CIS 429.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Internet Safety/Cyber Ethics
Security, Privacy, and Ethics Online Computer Crimes.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Instructions for Weds. Jan Get your Century 21 Jr. textbook 2.Log in to the computers 3.On page 80, read the Objectives listed under “Lesson 13:
Internet Guidelines. Cyberspace Cyberspace is like a big city. libraries, universities, museums, places to have fun, Places to meet people. But, like.
Cyber-bullying & Cyber Security UNM Anderson School of Management For Jefferson Middle School’s 8 th Grade InfoTech Class.
Felicia Cervantes. Using someone's personal identifying data for unlawful purpose. (This is a SERIOUS crime.) More than 8 million American Adults fell.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
National Cybersecurity Awareness Campaign: Chatting with Kids About Being Online.
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Issues Raised by ICT.
Internet safety By Lydia Snowden.
Cyber Crimes.
Scams & Schemes Common Sense Media.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Online Security By:. The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access.
Unethical use of Computers and Networks
Personal Privacy and Security Zenia C. Bahorski Ph.D. Department of Computer Science Eastern Michigan University Personal Privacy & Security - Z. Bahorski,
CYBER CRIME.
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Issues and Problems Concerning the Internet Copyright ◦ Users pass off as others work and post it as their own work without giving credit to the source.
Inappropriate Content Hackers Phishers Scammers Child Abusers Bullies.
Internet Safety Internet Safety LPM
1. 1.To discover ethical issues in electronic media and the Internet. 2.To identify different areas of Internet crime. 3.To assess where one should go.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Internet Guidelines. Cyberspace Cyberspace is like a big city. libraries, universities, museums, places to have fun, Places to meet people. But, like.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Any criminal action perpetrated primarily through the use of a computer.
WHAT IS IDENTITY THEFT?  Identity thieves take your personal information and use it to harm you in various ways, including these:  User names, passwords,
Issues for Computer Users, Electronic Devices, Computer and Safety.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Presented By: Jennifer Thayer, SPHR, SHRM-SCP.  Identify CyberCrime and Types  Identify Steps to Take to Prevent Identity Theft  Learn Tips and Tricks.
WHEN SHARING IS NOT CARING: INTERNET ETHICS By Baikgopodi “Bai” Ditiso Presented at CLTD– 09 May 2016.
E-Ethics.
Scams & Schemes Common Sense Media.
GCSE ICT SECURITY THREATS.
Computer Security INSM 180- Belasco Bryant and Stratton Fall 2011
IT Security  .
Digital Citizenship Middle School
A Project on CYBER SECURITY
How to build a good reputation online
Protect Your Computer Against Harmful Attacks!
Appropriate Use of Technology
COMPUTER CRIME.
Cyber Issues Facing Medical Practice Managers
Identity Theft This presentation will focus on identity theft. What do you already know about identity theft? Do you know anyone who has had their identity.
Internet Safety Vocabulary
Protecting Yourself from Fraud including Identity Theft
HOW DO I KEEP MY COMPUTER SAFE?
Follow safety rules so that YOU: Avoid getting HURT.
Protecting Yourself from Fraud including Identity Theft
ICT Communications Lesson 3: Internet Life and Privacy
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Protecting Yourself from Fraud including Identity Theft
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

E-Ethics

Objectives To discover ethical issues in electronic media and the Internet. To identify different areas of Internet crime. To assess where one should go to report Internet crime. To recommend computer security measures to students.

Did You Know? One in five Web surfing children have been sexually solicited online Journal of the American Medical Association 35% of software today is used without licenses Nine million Americans will have their identity stolen this year Federal Trade Commission: http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/about-identity-theft.html

E-Ethics The study of moral values and rules in electronic media and the Internet

E-Ethics Are needed to avoid the spread of electronic crimes, such as: pirating online predators hacking identity theft wire fraud phishing counterfeit auctions spyware viruses password trafficking internet harassment cyber bullying hate mail copyright infringement

Cybercrime Is defined as any crime involving computers including: pirating online predators cracking identity theft wire fraud phishing counterfeiting goods online creating malicious viruses stealing passwords Internet harassment cyberbullying

Pirating Is the illegal stealing, copying or exchanging of media including: software movies music Accounts for almost 35% of software today Can result in fines of millions of dollars

Predators Take advantage of teens by: using instant messaging, e-mail and social network sites gaining victims trust and engaging in sexually explicit conversations trying to arrange face-to-face meetings

Hacking Is modifying electronics such as an Xbox®, cell phone or iPod® Hacker: an individual who alters electronics legally someone who modifies their computer for better performance Security Cracker: an individual who illegally alters computer hardware or breaches computer systems crackers are often mislabeled “hackers” in mass-media

Identity Theft Is when someone steals your personal information including: your name credit card information Social Security number Nine million Americans have their identities stolen each year

Wire Fraud Scams that take place over interstate wires, such as telemarketing fraud, phishing, or spam related schemes Considered a federal crime because the crime goes across state lines Example email

Phishing Example Amazon Example Netflix E-mails pretending to originate from banks or online retailers such as Amazon Looks very similar to an actual e-mail originating from retailer Tries to gather financial information, user names and passwords from victims if recipient visits the fake retailer they may receive malicious viruses or spyware Example Amazon Example Netflix

Online Auctions Example Have become hotbeds for counterfeit goods eBay ® has recently been sued by companies for auctioning counterfeit goods. These companies include the following: L’Oreal ® Louis Vuitton ® Dior Couture ® Gucci Example

Password Trafficking Is the illegal obtaining, giving or selling of passwords   An American Eagle® employee was indicted for giving out passwords to the American Eagle® computer network to a Yahoo® message board. The indictment carries a penalty of 11 years in prison and/or a $350,000 fine. http://www.usdoj.gov/criminal/cybercrime/pattersonIndict.htm

Internet Harassment When e-mails or texts are abusive Can be unwanted e-mails (SPAM) or texts Arises if conversations text turn hostile Talk becomes threatening

Hate Mail Offensive messages sent through e-mail Involve e-mails including the following:  racial prejudice Sexism Religious hatred Can result in jail time A Washington man was sent to jail for 41 months after he was convicted of sending at least 700 people hate mail.

Cyberbullying Is Internet harassment Tips for dealing with a cyberbully: take a break to reduce tension and calm down cut off all communication with the cyberbully tell an adult

Cybercrime Should be reported to the following authorities depending on the seriousness of the crime: Federal Bureau of Investigation U.S. Secret Service IC3 Internet Crime Complaint Center

Tips to Avoid Cybercrime Protect your personal information Use anti-virus software Back up important files Learn who to contact if cybercrime occurs

Prevent Identity Theft Protect your Social Security number use it only when absolutely required  Secure your trash by the following: cutting up old credit cards tearing up receipts shredding bank statements Safeguard your passwords - use a combination of letters and numbers to increase security

Federal Trade Commission Created the Identity Theft Program in 1998 to handle the skyrocketing increase of identity theft reports Handles identity theft complaints at www.FTC.gov

IC3 (Internet Crime Complaint Center) Is a partnership between the FBI and the National White Collar Crime Center File complaints about cybercrime at http://www.ic3.gov/

United States Computer Emergency Readiness Team (USCERT) Is a partnership between the Department of Homeland Security and the public and private sectors Protects our nation against cyber attacks examine cyber attacks spread warnings to public organize response actions

Copyrights Protect an author’s original work Are automatic on any work produced Provide protection only in the United States No longer require the symbol to be protected

Stop Here

Cookies Are small files stored on your computer Collect information used for: customizing Web sites collecting demographic information for advertisers tracking user preferences

Spyware Is software installed discreetly altering the usability of a computer Usually installs with other programs, such as file sharing programs Includes side-effects such as pop-up advertisements and crashing of the computer

Viruses Are software programs which spread from computer to computer Are malicious in nature Can delete information on your computer Spread through e-mail and Internet downloads Alter the normal functions of your computer

Virus Prevention Steps to prevent viruses include: use virus protection software implement an Internet firewall, a buffer between your computer and the Internet install security updates be careful opening e-mail and downloading materials online

E-Ethics Example Kevin illegally downloaded a new rock album using the Internet. He says corporations and rock stars already have enough money and he is short on cash. His friend Scott thinks although the people who get the money from the album are wealthy, stealing is stealing. Scott plans to buy the album legally. - Who is right in your mind? Who is right under law? - What would you do? - What would you say if you were Kevin and were caught?

E-Ethics Example Jack is 13 and wants to register for MySpace®. While filling out the registration form, he lies and says he is 15 to start an account. - What issues might younger children face on the Internet? - Are they more likely to be victims of online predators? - Is this his parents’ problem for not monitoring his computer use or MySpace® problem for not having enough safeguards to verify Jack’s age?

Review E-ethics avoid the spread of illegal electronic acts Cybercrime can be avoided by protecting personal information, using anti-virus software, backing up important files, and knowing who to call in case of a crime Cookies are small files stored on your computer and can be good or bad depending on their use Copyrights vary in duration and protect an author’s original work There are several regulations and agencies that focus on e-ethics and cyber space protection

Quiz Define E-ethics in your own words. What is pirating? What is the difference between a hacker and a cracker? Electronic searches and seizures are regulated by the ______ amendment. first second third fourth 1. Answers will vary 2. The illegal stealing, copying or spreading of software, movies and music 3. A cracker is malicious in intent. 4. D

Quiz What is cybercrime and what are steps to protect yourself? What is the IC3 and what does it stand for? Do you have to file for a copyright to obtain copyright protection? 5. Cybercrime is any crime involving a computer. To protect yourself take care of your personal information, use anti-virus programs, back-up your files and contact the proper authorities if you believe you have become a victim of cybercrime. 6. IC3 stands for the Internet Crime Complaint Center, a place where individuals can complain about a cybercrime. 7. No, copyright protection is granted when a work is created.

Quiz Why do some consider cookies to be good while others see them as an invasion of privacy? Which of the following companies are frequently impersonated by phishers? banks online auctions Web sites needing personal information all of the above What age group is associated with cyberbullying? Why might one cyberbully? 8. Answers will vary 9. D 10. Teens and children. Answers will vary

Resources Computer Crime & Intellectual Property Section. (2008). Retrieved October 6, 2008, from United States Department of Justice: http://www.usdoj.gov/criminal/cybercrime/reporting.htm#cc Fighting Back Against Identity Theft. (2008). Retrieved October 6, 2008, from Federal Trade Commission: http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/about-identity-theft.html Online predators: Help minimize the risk. (2007, January 15). Retrieved October 6, 2008, from Microsoft: http://www.microsoft.com/protect/family/guidelines/predators.mspx Princeton University. (2006). Retrieved October 6, 2008, from WordNet: http://wordnet.princeton.edu/ SEARCHES AND SEIZURES IN A DIGITAL WORLD. (2005). Retrieved October 6, 2008, from Hardvard Law Review: http://www.harvardlawreview.org/issues/119/Dec05/Kerr.pdf

Resources (2008, September 3). Retrieved October 6, 2008, from U.S. Copyright Office: http://www.copyright.gov/ (2008). Retrieved October 6, 2008, from StopFakes.Gov: http://www.stopfakes.gov/ (2008). Retrieved October 6, 2008, from APWG: http://www.antiphishing.org (2008). Retrieved October 6, 2008, from Stop Cyberbullying: http://www.stopcyberbullying.org/ What is spyware? (2008). Retrieved October 6, 2008, from Microsoft.com: http://www.microsoft.com/protect/computer/basics/spyware.mspx

Resources (1996-2007). Retrieved October 6, 2008, from CookieCentral.Com: http://www.cookiecentral.com 7 Practices for Computer Security. (2008). Retrieved October 6, 2008, from OnGuard Online: http://onguardonline.gov/stopthinkclick.html Former Employee of American Eagle Outfitters Indicted on Charges of Password Trafficking and Computer Damage. (2003, February 26). Retrieved October 6, 2008, from U.S. Department of Justice: http://www.usdoj.gov/criminal/cybercrime/pattersonIndict.htm McGann, C. (2003, September 13). Man sent to prison in hate-mail case. Seattle PI . What is SSL? (2003-2006). Retrieved October 6, 2008, from SSL.Com: http://info.ssl.com/article.aspx?id=10241

Resources (n.d.). Retrieved October 6, 2008, from Internet Crime Complaint Center: http://www.ic3.gov/default.aspx Cyberbullying on the Internet. (2005). Retrieved October 6, 2008, from Cyberbullying: http://www.bullyonline.org/related/cyber.htm How to help prevent computer viruses. (2006, September 23). Retrieved October 6, 2008, from Microsoft.Com: http://www.microsoft.com/protect/computer/viruses/prevent.mspx What is a Computer Virus? (2006, October 23). Retrieved October 6, 2008, from Microsoft.Com: http://www.microsoft.com/protect/computer/basics/virus.mspx

Resources (2008). Retrieved October 7, 2008, from US-CERT: http://www.us-cert.gov Federal Trade Commission. (1998-2003). Retrieved October 7, 2008, from FTC Overview of the Identity Theft Program: http://www.ftc.gov/bcp/edu/microsites/idtheft/downloads/ftc_overview_id_theft.pdf Mitchell, K.J., Finkelhor, D., & Wolak, J. (2001). Risk factors & impact of online solicitation of youth. JAMA, 285, 23:3011-3014. STOP Initiative Targets Piracy, Counterfeit Trade . (2004, October 4). Retrieved October 7, 2008, from The United States Mission to the European Union: http://useu.usmission.gov/Article.asp?ID=7A2C3004-AAB2-4BC3-AAD6-A9A71EFDCD95

Acknowledgements Production Coordinator: Production Manager: Justin Jones Production Manager: Dusty Moore Project Coordinator: Maggie Bigham Executive Producers: Gordon Davis, Ph.D., Jeff Lansdell Graphic Designer: Ann Adams © MMIX CEV Multimedia, Ltd.