Ji Yeon Chu, Lindsey Fong, Jonathan Bender, Yi Low, and Umang Patel.

Slides:



Advertisements
Similar presentations
Unit 1: Module 1 Objective 10 identify tools used in the entry, retrieval, processing, storage, presentation, transmission and dissemination of information;
Advertisements

09/04/2015Unit 2 (b) Back-Office processes Unit 2 Assessment Criteria (b) 10 marks.
Unit 11 Using the Internet & Browsing the Web.  Define the Internet and the Web  Set up & troubleshoot an Internet connection  Categorize webs sites.
Google Chrome & Search C Chapter 18. Objectives 1.Use Google Chrome to navigate the Word Wide Web. 2.Manage bookmarks for web pages. 3.Perform basic keyword.
17 April Using Technology. Where Can You Use Technology? Product Sales Marketing Operations Finances Salaries Inventory Logistics Analysis Market Customer.
Internet Cookies: Changing Internet Use and Privacy Lindsay Maidment & Katherine Hollander November 8, 2006.
The Internet. What is the Internet? A community with about 100 million users Available in almost every country about 160,000 people are added each month.
Tracking, Privacy, You & The 21 st Century When you talk online the internet listens.
Google Account Basics: Getting Started with free Google applications.
Smartphones. Lesson Objectives To understand and demonstrate an understanding of Smartphones.
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
The Internet & Web Browsers Business Webpage Design Kelly Seale.
How It Applies In A Virtual World
The Internet and World Wide Web.  Understand how the Internet evolved  Describe common Internet communication methods and activities  Setting up your.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
E-Commerce. What is E-Commerce Industry Canada version Commercial activity conducted over networks linking electronic devices (usually computers.) Simple.
Privacy Aziz Doumith Michael Kot Luis Pacheco Emory Petermann Wyatt Pierson Henry Stigler.
The Internet. The World’s largest computer network A world wide collection of networks that connects millions of businesses, government agencies, educational.
Website Development. Internet Internet (Net) – Global network connecting millions of computers. Network – Group of computers and associated devices that.
Exchanging information. Communication services Voice phones SMS (short messaging service) – more commonly known as texting Fax Instant messaging – real.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
The Internet and New Technologies: The Media Converge Chapter 2.
Online Goods and Services. Topics Online Shops and Physical Goods Online Shops and Physical Goods Booking Systems Banking Education and Training Gaming.
Nilsa Polanco CMP 230 LA01 Meta Search Engine Presentation.
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web 1 Component 4/Unit 2Health IT Workforce Curriculum.
How did the internet develop?. What is Internet? The internet is a network of computers linking many different types of computers all over the world.
Personal Privacy and Security Zenia C. Bahorski Ph.D. Department of Computer Science Eastern Michigan University Personal Privacy & Security - Z. Bahorski,
The Internet. Network - Collection of computers and devices connected together via communications devices Internet - Worldwide collection of networks.
 Cable companies are experimenting with tracking and target individual households cable boxes;
 Why is this important to you?  How do digital footprints connect with digital citizenship?  Does everyone have a digital footprint?
L ESSON 2 A website is a collection of different types of data, which can be anything like text, graphics, videos etc. combined together to provide.
About Phishing Phishing is a criminal activity using social engineering techniques.criminalsocial engineering Phishers attempt to fraudulently acquire.
COM 354 Week 2.1 New Media Ethics. Twitter Updates What accounts to follow? Stories of the week?
Minding your business on the internet Kelly Trevino Regional Director October 6,2015.
MODULE 3 Internet Basics © Paradigm Publishing, Inc.1.
Jeopardy ProtocolsPartsPrograms General Internet HTML Q $100 Q $200 Q $300 Q $400 Q $500 Q $100 Q $200 Q $300 Q $400 Q $500 Final Jeopardy.
Internet Privacy: What’s Yours and What Never Was 14 April 2011 Ms. Foster and Ms. McCabe Street Law.
Jeff Reintjes, Kevin Hao, Carinne Rawlins. Background 1975 in Redmond, WA 3 rd most successful start-up company ever Founded by Bill Gates and Paul Allen.
THE INTERNET. TABLE OF CONTENT CONNECTING TO THE INTERNET ELECTRONIC MAIL WORLD WIDE WEB INTERNET SERVICES.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Organisations and Data Management 1 Data Collection: Why organisations & individuals acquire data & supply data via websites 2Techniques used by organisations.
Digital Communication and Networks. Go to this website 10 minutes looking Pick an article Prepare a 5 slide pp Take into account.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
SECURITY ISSUES. TYPES BLUE JACKING SENDING MESSAGES TO OPEN BLUETOOTH CONNECTION VIRUSES HARMFUL PROGRAMS THAT SPREAD WITHIN DIGITAL DEVICES COOKIES.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
BTT 10. What is the internet?  A question to all of you…  how-many-people-use-the-internet- more-than-2-billion-infographic/
COM: 111 Introduction to Computer Applications Department of Information & Communication Technology Panayiotis Christodoulou.
E-Safety Many people around the world use internet For entertainment, social lives and Work. However, nobody knows what YOU could be getting yourself.
Digital Communication and Networks. When people visit web sites their ◦IP address, ◦browser software, ◦operating system ◦viewing.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
Legislation 32 Legislation 32. Legislation 32 Our last topic is a BIG fave in the exam! It has often been the subject of the final question that’s worth.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Internet Privacy Define PRIVACY? How important is internet privacy to you? What privacy settings do you utilize for your social media sites?
Protecting your search privacy A lesson plan created & presented by Maria Bernhey (MLS) Adjunct Information Literacy Instructor
The Internet & Web Browsers Business Webpage Design Created by Kelly Seale Adapted by Jill Einerson.
Top Ten Ways to Protect Privacy Online -Abdul M. Look for privacy policies on Web Sites  Web sites can collect a lot of information about your visit.
Digital devices and Impact on organisations. Computers What do they use it for  Storing data  Design tasks  Products tasks (controlling machine) 
Why Does The Site Need an SSL Certification?. Security should always be a high concern for your website, but do you need an SSL certificate? A secure.
Facebook privacy policy
Managing Windows Security
Chapter 9 e-Commerce Systems.
Protecting Yourself and Your Information
Evolution of Internet.
HOW DO I KEEP MY COMPUTER SAFE?
Unit# 5: Internet and Worldwide Web
Ethics & Privacy CSCI 101.
ICT Communications Lesson 3: Internet Life and Privacy
Browsing in Private Mode
Presentation transcript:

Ji Yeon Chu, Lindsey Fong, Jonathan Bender, Yi Low, and Umang Patel

Impact for Internet Users  The internet began as a project of the US Defense Department’s Advanced Research Project Agency (ARPA)  It was called the ARPANET  Linked computers and networks owned by the military and schools who carried out defense research

Impact for Internet Users  Technological changes over the years Connectivity Data collection and storage Computational power Advances in sensor technology  Societal Trends Globalization Social networking Electronic communication Mobility

Impact for Internet Users Health History Credit Card History Marital History Education Employment History Details of Phone Calls Magazine Subscriptions Travel History Books Bought Cash Withdrawal s PURCHASES Websites Visited

Impact for Internet Users  Google- first company to implement expiration date for collected data  Google & Microsoft- 18 months  Yahoo & AOL- 13 months  Ask.com- option to prevent recording IP - The Washington Post (Sept 15, 2007)

Impact for Internet Users  “Google’s cookies don’t expire until 2038”  Search queries are windows into our souls  Gmail users- every  Google Maps, Google Book Search, Google Earth, Google Scholar, Talk, Images, Video, Calendar, Reader, News - motherjones.com

Computer Privacy  When a computer accesses a webpage, logs into a site, or searches a term in an engine like Google, it is stored on the computer and often elsewhere (your ISP or Google)  That information can then be retrieved at any time by someone searching for it  It is very difficult to navigate the internet today without leaving a footprint somewhere that someone could find

Issues  The revelation of some information is necessary, but how much is required? Some companies track the sites their customers go to as well as their search histories and sell that information to advertisers  Cookies allow for users to keep site settings whenever they return to a particular site Cookies can also track which sites a user goes to, which can also be sold to advertisers for targeted ads

Specific Cases Google Searching - In 2006, a hacker was found guilty after evidence was found that he had used Google Search in order to learn how to make a device that would interfere with wireless networks. - Court did not specify how the FBI found this information, but it has been known that Google gives access to search terms to law enforcement.

More Specific Cases US v Zeigler - In 2006, Zeigler argued that he had privacy on his own work computer which contained child pornography. - The court decided that the employer can overrule and give consent to a government search that does not violate the Forth Ammendment. State v Reid - Reid changed her employer’s password and shipping information on an online site. - This prompted the state of New Jersey to set more privacy rights than the federal courts set.

Protection  Safe browsing Cookies/cache/authentication Encryption  Spyware/adware/malware  Phishing  Social networks  Know who you’re dealing with