Cookies Are small text filer with or unique ID tag that are embedded in a Web browser and saved on the user hard drive. Cookies also make it possible.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

What is Bad ? Spam, Phishing, Scam, Hoax and Malware distributed via
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Chapter 11 – Section 4-5.  Techniques use to Access the network  War Driving or access point mapping ▪ Individuals attempt to detect wireless network.
Software programs that enable you to view world wide web documents. Internet Explorer and Firefox are examples. Browser.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Threats To A Computer Network
Chapter 1 - Introduction to Computers and the Internet Basic functions of a Computer Input – entering info into the computer (e.g. keyboard, mouse, mic,
Don’t Lose Your Identity – Protect Yourself from Spyware Dan Frommer Sherry Minton.
McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Chapter 8 Threats and Safeguards Chapter 8 PROTECTING PEOPLE AND INFORMATION Threats.
Business Plug-In B7 Ethics.
1 SESSION 5 ETHICAL AND SOCIAL ISSUES IN THE DIGITAL FIRM.
1 MIS, Chapter 4 ©2011 Course Technology, a part of Cengage Learning PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER.
Copyright ©2016 Cengage Learning. All Rights Reserved
Business Plug-In B7 Ethics.
Quiz Review.
Discovering Computers 2010
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Issues Raised by ICT.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.
Digital Citizenship By Web Design.  It is a system to teach students and teachers the way to use technology correctly. As new technology appears we all.
Protecting People and Information: Threats and Safeguards
Cyber Crimes.
C4- Social, Legal, and Ethical Issues in the Digital Firm
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Chapter 11 Computers and Society, Security, Privacy, and Ethics.
Keyloggers At Work Jason Clark. History Believed to have been first used by the government Believed that they were used in the early 1990’s Software key.
Privacy, Security, and Ethics © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Computing Essentials 2013.
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
CHAPTER 8 PROTECTING PEOPLE AND INFORMATION Threats and Safeguards.
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
Chapter 18 Technology in the Workplace Section 18.2 Internet Basics.
Protecting Students on the School Computer Network Enfield High School.
About Phishing Phishing is a criminal activity using social engineering techniques.criminalsocial engineering Phishers attempt to fraudulently acquire.
THE INTERNET. TABLE OF CONTENT CONNECTING TO THE INTERNET ELECTRONIC MAIL WORLD WIDE WEB INTERNET SERVICES.
Presenter: Le Quoc Thanh SPYWARE ANALYSIS AND DETECTION.
MIS 2000 Social Implications of IST. Outline Law & Ethics Accountability and Liability Information Rights Privacy Computer Abuse and Crime Intellectual.
SPYWARE Spyware, a new class of malicious programs, is just as dangerous as viruses but generally Is underreported. The issues are no longer those of privacy,
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI.
Discovering Computers 2008 Chapter 11 Computer Security, Ethics and Privacy.
Information Technology Issues How has the proliferation of IT impacted society? Adapted from Prof. Brenda Timmerman.
Is a worldwide collection of computer networks, cooperating with each other to exchange data. The Internet provides the following main facilities: 1. .
Lecture 9 ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS (continued) © Prentice Hall
Phishing Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money)
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Cybersecurity Test Review Introduction to Digital Technology.
Introduction Web analysis includes the study of users’ behavior on the web Traffic analysis – Usage analysis Behavior at particular website or across.
TECH VOCAB. ETHICS The rules that we use to define behaviors as “right” or “wrong” page 6.
CIW Lesson 8 Part B. Malicious Software application that installs hidden services on systems term for software whose specific intent is to harm computer.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Web bugs are tiny graphic files embedded in messages and Web pages that are designed to monitor who is reading the message or Web page and.
OCR Nationals - Unit 8 E-commerce – go to slide 11.
Copyright ©2016 Cengage Learning. All Rights Reserved
Computer Security INSM 180- Belasco Bryant and Stratton Fall 2011
CHAPTER FOUR OVERVIEW SECTION ETHICS
3.6 Fundamentals of cyber security
IT Security  .
Ethical, Social, and Political Issues in E-commerce
Computers: Tools for an Information Age
Chapter 1 - Introduction to Computers and the Internet
Section 14.1 Section 14.2 Identify the technical needs of a Web server
Copyright ©2016 Cengage Learning. All Rights Reserved
HOW DO I KEEP MY COMPUTER SAFE?
CHAPTER FOUR OVERVIEW SECTION ETHICS
Ethical and Social Issues in Information Systems
Presentation transcript:

Cookies Are small text filer with or unique ID tag that are embedded in a Web browser and saved on the user hard drive. Cookies also make it possible for Web site to customize pages for users. Spyware – is software that secretly gathers information about users while they browse the Web. Spyware can also interfere with user’s control of their computing by installing additional software and redirecting Web browser.

Adware- is a form of spyware that collects information about the user to display advertisement in the Web browser based on information it collects from the user browsing patterns. Phishing- is ending fraudulent s that seen to come from legitimate sources such as a bank or university. Key Loggers- monitor and record keystrokes and can be software or hardware devices. However keyloggers can be use for malicious purposes. Sniffing- is capturing and recording network traffic. Spoofing- is an attempt to gain access to a network by posing as an authorized user to find sensitive information.

They’ve created some concerns about privacy workplace. For example some players search social networking sites, such as facebook or MySpace to find background information on applicants. - Is widely used it present some serious privacy. Spamming- unsolicited sent for advertising purposes.

Log File- which are generated by Web server software record users actions or a Web sites. 3. Ethical Issues of Information Technology Information system professionals believe that information technology offers many oportunities for unethical behavior. Censorship- Is the censoring of books, plays, films or reports, especially by government officials.

1. Public 2. Private Another type of censoring is restricting access to the Internet. Intellectual Property Is a legal umbrella covering protections that involve copyrights trademark secret and patents for creation of the mind. Cyber Squatting- is registering selling or using a domain name to profit from someone else trademark.

Social Divisions- social stratification resulting from the unequal distribution of wealth, power and prestige Digital Divide- information technology and the internet have created a digital divide. Computers still aren’t affordable for many people. The digital divide has implication for education. 2 types of societal group: 1. The information rich 2. The information poor

Information technologies have a direct effect on the nature of jobs. Have made some jobs more interesting by handling repetitive and boring tasks so some workers are more satisfied with their jobs. Virtual Organization- are network of independent companies, suppliers, customer, and manufacturers connected via information technologies so that they can share skills and cost have access to each others markets.

Information Technology and Health Issues The health problems are associated with the environment in which computers are used. Health problems related to computer equipment include vision problems. Recent health issue is the amount of tome some people spend on the Web playing games, participating in chat rooms and other activities.

Presented by: Richelle D. Ambrocio Presented to: Prof. Anecito Ganancial