Ways in Which Information Can Be Misused. In this information age in which we live information is a precious and powerful commodity Unfortunately it can.

Slides:



Advertisements
Similar presentations
The IT Workplace Kaye Burton & Karen Le Rossignol Communication in an IT Environment (2000)
Advertisements

Computer Crimes A criminal act committed through the use of a computer. It can also involve the theft of a computer and any equipment associated with the.
ACCEPTABLE USE POLICIES.  Use network resources for school work only  Always Log-on/Log-off  AUP/RUP training and signature pages are required  Always.
Technology: Unethical Behavior and Its Consequences Prepared by Tami Genry March 2004.
Woodland Hills School District Computer Network Acceptable Use Policy.
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Chapter 9 Information Systems Ethics, Computer Crime, and Security.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
GCSE ICT Computers and the Law. Computer crime The growth of use of computerised payment systems – particularly the use of credit cards and debit cards.
U.S criminal law’s reinforcement of technological measures protecting property: where the DMCA fits in Elliot N. Turrini Assistant U.S. Attorney Computer.
Define and identify unethical practices such as hacking, phone fraud, online piracy, cyberstalking, and data vandalism. Use of employer’s computers for.
Security, Privacy, and Ethics Online Computer Crimes.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Copyright Infringement
Software Copyright. Learning Objectives: By the end of this topic you should be able to:
Chapter 9 Information Systems Ethics, Computer Crime, and Security
1 Lesson 17 Technology, the Workplace, and Society Computer Concepts BASICS 4 th Edition Wells.
INTERNET and CODE OF CONDUCT
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
ByBrendanMalindaRachael. Electronic Monitoring Electronic monitoring can take many forms, this happens because technology is becoming cheaper and very.
Computer Misuse Act (1990). What is Computer Misuse Act (1990)? The Computer Misuse Act of 1990 is a law in the UK that makes illegal certain activities,
The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.
Computer Ethics Prepared by. Discuss “Character is what you do when no one is watching.” --old adage.
Chapter 18-Internet Law www World Wide Web-Wild,Wild West? New Global Community has caused many ethical dilemmas Unequal Access increasing wealth gap.
Bordoloi CMIS 108 Dr. Bijoy Bordoloi Privacy. Bordoloi Computers and Privacy These notes focus on the various topics associated with maintaining individual.
Cyber Crimes.
G041: Lecture 16 Section B Revision Questions
FatMax Licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 2.5 LicenseCreative Commons Attribution-NonCommercial-ShareAlike 2.5.
Copyright What Educators Should Know. What is Copyright?  Copyright is a property right granted to authors of original work  The purpose is to protect.
Mrs. Jefferson Business Information Management I.
Unethical use of Computers and Networks
Application Software Performs a specific job or task. Helps people use their computers to perform their work more effectively. Categorized in two ways.
Computers Are Your Future Tenth Edition Spotlight 1: Ethics Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1.
Section 2 Section 2 Information and Information Technology.
Legal issues. Computer Misuse Act 1990 Deals with misuse of ICT systems.
Digital Citizenship Project By Allen Naylor Ed 505.
Ways in which Information can be Misused Misuses Of Information THE Misuse of information By: Antoinette Harris, Nickietha Phinn, Ashley Williams and.
Copyright and the Law For more information contact:
Intellectual Property Basics
The health and safety act was introduced to protect the welfare of people of the workplace. Before being introduced in 1974 it was estimated that 8.
The Ethical Use of Electronic Media. V Computer Ethics  Resources such as images and text on the Internet are copyrighted.  Plagiarism (using.
The Computer Misuse Act of1990 The Copyright, Designs & Patents Act of
CISB 412 Social and Professional Issues Understanding Intellectual Property.
Laws Jamie Dunn.
Granbury I.S.D. Acceptable Use Policy for Technology Resources
Surveillance For IB-1 ITGS By Indrani.  Surveillance is the use of IT to monitor the actions of people.  For example, monitoring may be used to track,
TEMPEST AND ECHELON BY – Y.SRUTHI.  TEMPEST and ECHELON are the method of spying in a sophisticated manner.  Both technologies are a part of secret.
Computer crimes.
Comprehensive Volume, 18 th Edition Chapter 11: Cyberlaw.
Legal Issues Now that we have looked at ethics, some of these issues are also dealt by the law. We will consider laws in the following catagories: Intellectual.
How these affect the use of computers. There are 4 main types of legislation that affect the use of computers. 1.Data Protection Act 2.Copyright 3.Computer.
Legal issues. Computer Misuse Act 1990 Deals with misuses of ICT systems.
Woodland Hills School District Computer Network Acceptable Use Policy.
ICT Legislation  Copyright, Designs and Patents Act (1988);  Computer Misuse Act (1990);  Health and Safety at Work Act (1974);  EU Health and Safety.
11-1 McGraw-Hill/Irwin Copyright © 2007 by The McGraw-Hill Companies, Inc. All rights reserved.
By Alex Mayak.  What is spyware?  History of spyware.  What effect does spyware have on your computer?  What spreads spyware?
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
ICT, Communication & related Legislations. Produced by Neil Liggett. Acts of Law – shared data & information.
Copyright Computer crime and cyber security.
Legal and ethical issues
MODUS OPERANDI OF CYBER CRIME
Chapter 11 crime and security in the networked economy
Regulation of Investigatory Powers Act 2000
BCT 2.00 Analyze Technology Issues
Copyright, Designs and Patents Act 1988
Information Technology Topic: The internet
Top Five Computer Related Crimes
Ethical Use of Computers
Woodland Hills School District
Introduction to Digital Forensics
Presentation transcript:

Ways in Which Information Can Be Misused

In this information age in which we live information is a precious and powerful commodity Unfortunately it can be used for good as well as for bad.

This presentation will be about: ╚ Software piracy ╚ Industrial espionage ╚ Computer fraud ╚ Electronic eavesdropping and ╚ Surveillance

What is SOFTWARE PIRACY? This is the unauthorized use, copying or distribution of computer software

Software Piracy cont’d When we ‘buy’ software what we are really buying is the licence to use it on (usually) one computer. It is illegal to install it on other computers or to copy it and give / sell it your friends.

The rate of infringement of copyrighted software in the Asia- Pacific Region has been estimated as Year Percentage 53% 82% Imagine it how much it has grown since then!

Software does not actually belong to us, it belongs to the programmer. We only have a licence to use it. When we violate the terms of that licence, we are involved in software piracy.

SURVEILLANCE This is the monitoring of the behavior of a person or a group of people, often in surreptitious manner

Ways and Items used in Surveillance CCTV camera (close circuit television ) Internet traffic Phone calls Computer usage The computer now plays a large part in most surveillance systems

Surveillance Many organisations or government bodies carry out surveillance on people The knowledge gained about you when you are under surveillance can be misused to your detriment. Do you feel comfortable with the thought of being under surveillance?

Industrial Espionage

Industrial espionage is the act of obtaining an organisation’s information without the permission of the company for commercial purposes

Industrial Espionage involves Activities such as … ╘ Theft of trade secrets ╘ Bribery lackmail ╘ Technology surveillance

The purpose of espionage is to gather knowledge about a competitor's operations, plans and strategies. This may be done by a spy or someone in the company maybe bribed to do it. An organisation may also attempt to hack into another organisation’s computer system to get at their data.

Electronic Eavesdropping Electronic eavesdropping is intercepting electronic communication (such as s) without the authority of the communicating parties.

Electronic eavesdropping usually involves monitoring electronic radiation from computing equipment and reconstituting it into desirable information

What is Computer Fraud? Computer fraud is any dishonest deed in which the use of the computer plays a significant part

The term ‘computer fraud’ therefore covers a wide range of illegal activities from hacking to computer theft.

THE END!!

Courtesy of Team 3.2