Chapter 10 Privacy and Other Social Issues. Old Florida saying Only two things in the water after dark. Gators and gator food.

Slides:



Advertisements
Similar presentations
The Internet.
Advertisements

Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
1 Identity Theft and Phishing: What You Need to Know.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Fraud and Identity Theft Test Review. Who should you contact if you are a victim of identity theft?
Breaking Trust On The Internet
Consumer Issues Chapter 28.
Legal and Ethical Issues: Privacy and Security Chapter Five.
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
Software programs that enable you to view world wide web documents. Internet Explorer and Firefox are examples. Browser.
Chapter 10 Privacy and Other Social Issues. Copyright © 2003, Addison-Wesley What Is Privacy? Freedom from observation, intrusion, or attention of others.
Principles of Information Systems, Sixth Edition Electronic Commerce Chapter 8.
Chapter 17 Legal, Ethical, and Social Impacts of EC.
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Chapter 10 Privacy and Security McGraw-Hill
Copyright © 2004 Pearson Education, Inc. Slide 7-1 E-commerce Kenneth C. Laudon Carol Guercio Traver business. technology. society. Second Edition.
McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Chapter 8 Threats and Safeguards Chapter 8 PROTECTING PEOPLE AND INFORMATION Threats.
CSC101 FINAL PROJECT by Sally Fletcher & Nicole Seguin December 11 th, 2003.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
1010 CHAPTER PRIVACY AND SECURITY. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Competencies Describe concerns associated with computer.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
Teach a man (person) to Phish Recognizing scams, spams and other personal security attacks July 17 th, 2013 High Tea at IT, Summer, 2013.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Privacy in Computing Legal & Ethical Issues in Computer …Security Information Security Management …and Security Controls Week-9.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Technology Ethics, Computer Crime, Cybercrime, Hacking Tactics, Cyber Theft, Internet Abuses in the Workplace, Software Piracy, Theft of Intellectual Property,
Chapter 11 Security and Privacy: Computers and the Internet.
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Cyber Crimes.
C4- Social, Legal, and Ethical Issues in the Digital Firm
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.
Adapted from Computer Concepts, New Perspectives, Thompson Course Technology EDW 647: The Internet Dr. Roger Webster & Dr. Nazli Mollah 24 Cookies: What.
INTERNET PRIVACY Marketing companies The cookie leak security hole in the HTML messages The Web Bug Can we trust the privacy.
BA J. Galván1 PRIVACY and Other Social Issues.
Privacy, Security, and Ethics © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Computing Essentials 2013.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
COPYRIGHT © 2011 South-Western/Cengage Learning. 1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears,
Electronic Marketing: Integrating Electronic Resources into the Marketing Process, 2e 11/5/2015  2004 Joel Reedy and Shauna Schullo Electronic Marketing.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
Protecting Privacy “Most people have figured out by now you can’t do anything on the Web without leaving a record” - Holman W. Jenkins, Jr
Phishing Internet scams. Phishing phishing is an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
DATA ACCURACY- one of the issues of computer ethics. Providing inaccurate data input results in erroneous information & decision making. Information on.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Cyberlaw. “The moving finger writes; and, having writ Moves on: nor all thy piety nor wit Shall lure it back to cancel half a line. Nor all thy tears.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Any criminal action perpetrated primarily through the use of a computer.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Unit 2- Privacy and Cyberspace Kaizen MIDTERM Definition of Terms How is Technology eroding our privacy and anonymity? Protecting privacy online.
Top Ten Ways to Protect Privacy Online -Abdul M. Look for privacy policies on Web Sites  Web sites can collect a lot of information about your visit.
Global One internet, worldwide Uncitral WTO Some laws: –Communications Decency Act –Child Online Protectioon Act –Children’s Internet Protection Act.
CNP Fraud. Occurs when a fraudster falsifies an application to acquire a credit card using an individual’s personal information. (Eg: postal intercept)
Privacy and Other Social Issues
Computer Security INSM 180- Belasco Bryant and Stratton Fall 2011
IT Security  .
Chapter 10 Cyberlaw, Social Media, and Privacy
Legal and Ethical Issues in E-Commerce
Chapter 10: Privacy, Security, and Ethics
Presentation transcript:

Chapter 10 Privacy and Other Social Issues

Old Florida saying Only two things in the water after dark. Gators and gator food.

Arthur C. Clarke, science fiction author Any sufficiently advanced technology is indistinguishable from magic.

Copyright © 2003, Addison-Wesley The FUD Factor Fear, uncertainty, and doubt What you do not know can hurt you The gators in Upper Myakka Lake The lowlifes on the Web Online access opens new opportunities A little knowledge is your best defense

Scott McNealy, CEO, Sun Microsystems, Inc. You have zero privacy. Get over it.

Copyright © 2003, Addison-Wesley What Is Privacy? Freedom from observation, intrusion, or attention of others Society’s needs sometimes trump individual privacy Privacy rights are not absolute Balance needed Individual rights Society’s need

Copyright © 2003, Addison-Wesley Some Privacy Issues and Tools Issues Industrial espionage Information theft Data modification Software modification Pirated software Snooping Tracking Identity theft Perpetrators &Tools Hackers Script kiddies Viruses and worms Cookies Backdoors Denial of service Packet sniffers IP spoofing TEMPEST

Copyright © 2003, Addison-Wesley Privacy and the Law No constitutional right to privacy The word “privacy” is not in the Constitution Congress has passed numerous laws Not particularly effective Issue is pace of change Privacy is a function of culture Privacy means different things in different countries and regions Serious problem on global Internet

Copyright © 2003, Addison-Wesley Figure 10.1 Some U.S. privacy laws. Year Title Intent 1970Fair Credit Reporting Act Limits the distribution of credit reports to those who need to know. 1974Privacy ActEstablishes the right to be informed about personal information on government databases. 1978Right to Financial Privacy Act Prohibits the federal government from examining personal financial accounts without due cause. 1986Electronic Communications Privacy Act Prohibits the federal government from monitoring personal without a subpoena. 1988Video Privacy Protection Act Prohibits disclosing video rental records without customer consent or a court order. 2001Patriot ActStreamlines federal surveillance guidelines to simplify tracking possible terrorists.

Copyright © 2003, Addison-Wesley Collecting Personal Information Notice/awareness You must be told when and why Choice/consent Opt-in or opt-out Access/participation You can access and suggest corrections Integrity/security Collecting party is responsible Enforcement/redress You can seek legal remedies

Copyright © 2003, Addison-Wesley Figure Amazon.com’s privacy policy.

Copyright © 2003, Addison-Wesley Figure 10.4 Dell displays the BBB seal. Seal of approval BBB TRUSTe WebTrust Enhances Web site’s credibility

Copyright © 2003, Addison-Wesley Collecting Personal Information Often voluntary Filling out a form Registering for a prize Supermarket “Rewards” cards Legal, involuntary sources Demographics Change of address Various directories Government records

Copyright © 2003, Addison-Wesley Figure 10.5 Online personal information.

Copyright © 2003, Addison-Wesley Completing the Picture Aggregation Combining data from multiple sources Complete dossier Demographics Finding missing pieces Browser supplied data – TCP/IP Public forums – monitoring Samurai

Copyright © 2003, Addison-Wesley Capturing Clickstream Data Record of individual’s Internet activity Web sites and newsgroups visited Incoming and outgoing addresses Tracking Secretly collecting clickstream data ISP in perfect position to track you All transactions go through ISP Using cookies Using Web bugs

Copyright © 2003, Addison-Wesley Figure 10.6 Tracking with cookies. Client requests Acme page Acme returns page Client requests embedded banner from Gotcha Gotcha returns banner and cookie

Copyright © 2003, Addison-Wesley Figure 10.7 A cookie from DoubleClick. “Gotcha” and DoubleClick sell aggregated data

Copyright © 2003, Addison-Wesley Tracking with Web Bugs Web bug – single-pixel clear GIF Image reference buried in HTML Browser requests image Server returns bug plus cookie Request provides clickstream data Difficult to spot a Web bug Web bug in HTML formatted Secret return receipt

Copyright © 2003, Addison-Wesley Figure 10.8 A demonstration Web bug. This Web bug is designed to be seen

Copyright © 2003, Addison-Wesley Figure 10.9 A Web bug buried in an e- mail message. Again, this one is designed to be seen

Copyright © 2003, Addison-Wesley Some Useful Sites Tracking Illustration of how a company can track you Consumer, business, and telephone data A sense of what is available Cookies Everything you want to know about cookies

Copyright © 2003, Addison-Wesley Surveillance and Monitoring Surveillance Continual observation Tampa – facial scanning at Super Bowl Packet sniffing Monitoring The act of watching someone or something Web bugs Workplace monitoring is legal

Copyright © 2003, Addison-Wesley Surveillance and Monitoring Tools Spyware Sends collected data over back channel Snoopware Records target’s online activities Retrieved later Screen shots, logs, keystrokes Other surveillance/monitoring sources OnStar and GPS tracking E-ZPass systems Phone calls and credit card purchases

Copyright © 2003, Addison-Wesley Spam Electronic junk mail Hackers dislike spammers Flame attacks Spammers use anonymous r ers Mailing list sources Online personal information services Dictionary attack software Do not respond in any way!

Copyright © 2003, Addison-Wesley Anonymous R ers Some good FAQs An example What they know about you Not an endorsement

Copyright © 2003, Addison-Wesley Figure This banner ad mimics a dialog box. Do not click OK. Fake banner ads like this one are very annoying Spawner – spawns its own pop-up ads Mouse-trapper Turns off browser’s Back button Disable pop-ups ad’s close button No way to close ad – must reboot Spam is a source of spawners and mouse-trappers

Copyright © 2003, Addison-Wesley Fraud The crime of obtaining money or some other benefit by deliberate deception. We will consider Identity theft Credit card fraud Scammers and con artists Financial swindles

Copyright © 2003, Addison-Wesley Identity Theft The act of using another person’s identity to surf the web, make purchases, etc. Not necessarily online Dumpster diving Shred those credit card offers Protect your social security number Protect your credit card number The Web simplifies identity theft

Copyright © 2003, Addison-Wesley Credit Card Fraud As old as credit cards Cost of doing business Can be controlled, but not eliminated Not necessarily online SSL reduces risk Greatest risk Attack on merchant’s database Attractive target

Copyright © 2003, Addison-Wesley Scammers and Con Artists Social engineering – ask for credit card Pyramid schemes or Ponzi schemes Cash flow depends on new participants Dialer programs Scam Web site terminates ISP connection Establish expensive long-distance connection Rogue Web sites Clones and misspelled URLs Auction fraud Shill bidding

Copyright © 2003, Addison-Wesley Financial Swindles Stock fraud Pump-and-dump Buy cheap stock Hype it online – chat rooms Dump it when price goes up Popular organized crime tool Fee for credit card or loan Requests for social security or credit card number

Copyright © 2003, Addison-Wesley Pornography and Gambling Online pornography is thriving business Worldwide distribution Free speech and free press protected by US Constitution Prosecution difficult Porn napping Taking over lapsed or innocent URLs Gambling, or gaming Legal in most states and offshore Who do you call? The police?

Copyright © 2003, Addison-Wesley Protecting Your Online Privacy Implement appropriate security measures Get a copy of your credit report Use: Junk account Anonymous r er Stealth surfing service Common sense Deal with recognized, trusted e-retailers Keep important numbers and passwords secret Use good passwords If your computer acts strangely, find out why