Chapter 5 Legal & Ethical Issues; Privacy & Security Kristin Berglund Meredith Bratus Kathy Sypek.

Slides:



Advertisements
Similar presentations
Property Inventory Valuation Replacement Cost Value The amount it would take to replace property with like property of the same quality and construction.
Advertisements

Chapter 27 Your Credit and the Law pp Learning Objectives 1.Explain 1.Explain how government protects credit rights. 2. Name 2. Name federal.
Jennifer Perry. We help victims of e-crime and other online incidents – Web based service – Providing practical, plain language advice – No-nonsense advice.
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Computer Crime and Identity Theft Abe Orabi Tom Ballaro Tim Williams.
Polling Stations There are four questions posted in the classroom Indicate a “yes” response by placing a tally mark on the white board The results of the.
Consumer Powers and Protections
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
PERSONAL FINANCIAL MANAGEMENT
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
Houston, We Have a Problem. When Things go Wrong Ed Carter & Steve Hoffer Information Security Office Ohio University.
World has change Which side do CHOOSE you. A fight between GOOD EVIL.
Hacker Hunters Plug-In B6 p.341 Matt Spindler CIS 429.
Legal and Ethical Issues: Privacy and Security Chapter Five.
Public Information Online. Timothy WhitneyCaroline Aaron.
CSC101 FINAL PROJECT by Sally Fletcher & Nicole Seguin December 11 th, 2003.
Protect Yourself from Identity Theft
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
External Threats to Healthcare Data Joshua Spencer, CPHIMS, C | EH.
Are you safe? Alyssa Caputo & Niki Labella Itech 1101 Dr. Nagel.
Topics in Business English E-Business: Doing Business Online
Identity Theft Insurance Charles P. Orlowicz November CAS Annual Meeting – Session CS04 A division of the property and casualty subsidiaries.
What distinguishes cyber crime from “traditional” crime? What distinguishes cyber crime from “traditional” crime? How has the Internet expanded opportunities.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Protecting Your Identity While Attending College.
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
WHO’S IN YOUR “WALLET” WHO’S IN YOUR “WALLET” YOU BETTER “RECOGNIZE” YOU BETTER “RECOGNIZE” STEPPING $200 $200 $300 $400 $500 $400 $300 $200 $500 $400.
An Insight into the Relationship Between Social Media and the Susceptibility to Malicious Intent Presented by Rebecca Morgan 15/05/2015 >>>>2.
Identity Theft.  What is it?  How is it perpetrated?  Can you avoid it?  What if you become a victim?
Identity Theft By: Chelsea Thompson. What is identity theft? The crime of obtaining the personal or financial information of another person for the purpose.
ONLINE INFORMATION SAFETY & SECURITY Place yourself to be VICTIM while online?
A Step Into The Computer Underground 1 “By Understanding The Enemy We Are Better Prepared To Defend Ourselves”
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web 1 Component 4/Unit 2Health IT Workforce Curriculum.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
IDENTITY THEFT. Identity Theft Defined When someone uses another person’s name, address, social security number, bank or credit card account number, or.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
-Tyler. Social/Ethical Concern Security -Sony’s Playstation Network (PSN) hacked in April Hacker gained access to personal information -May have.
Do you believe in this? Due to its very nature, the Internet is NOT a safe or secure environment. It is an ever-changing medium where anyone and everyone.
PRIVACY IN COMPUTING BY: Engin and Will. WHY IS PRIVACY IMPORTANT? They can use your computer to attack others (money, revenge) They can use your computer.
LESSON 2: Internet, Computer Ethics and Security
WHO’s IN YOUR “WALLET” WHO’s IN YOUR “WALLET” YOU BETER “RECOGNIZE” YOU BETER “RECOGNIZE” STEPPING $2o0 $300 $400 $500 $400 $300 $200 $500 $400 $300.
Back to Table of Contents pp Chapter 27 Your Credit and the Law.
Identity Theft The Nation’s Fastest Growing Crime.
Managing the Information Copyright © Texas Education Agency, All rights reserved.
“The entire essence of America is the hope to first make money—then make money with money—then make lots of money with lots of money.” Paul Erdman.
Chapter 27 Your Credit and the Law pp Learning Targets 1.Explain 1.Explain how government protects credit rights. 2. Name 2. Name federal laws.
 Identity theft: When someone steals another identity, usually to obtain credit or other benefits in that person’s name  Phishing: Attempting to acquire.
SECURITY ISSUES. TYPES BLUE JACKING SENDING MESSAGES TO OPEN BLUETOOTH CONNECTION VIRUSES HARMFUL PROGRAMS THAT SPREAD WITHIN DIGITAL DEVICES COOKIES.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
PROTECTING YOUR CREDIT PG NAME, TEACHER AND DATE.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
By : Syed Shabi Ul Hassan. What is Cyber Crime?  Crimes that have been made possible by computers.  Such as Identity Theft, Bullying, Hacking, Internet.
Online Banking. Learning Objectives To learn how society has been affected by online banking.
SCAMS and FRAUDS How to Recognize Them and Ways You Can Protect Yourself Presented by the Criminal Investigations Division, Morganton Department of Public.
By: Micah Stevens Identity Theft in the World Today.
Online Banking. Learning Objectives To learn how society has been affected by online banking.
Credit Privacy Numbers and Identity Fraud Chris Montuori Director, Product Management Clarity Services.
Identity Theft It’s a crime!
Identity Theft Chelsea Weser.
Security, Social and Legal Issues Regarding Software and Internet
Antisocial use of ICT and Computer Fraud
Chapter 10 Cyberlaw, Social Media, and Privacy
Personal spaces.
Digital Citizenship Middle School
#1 Consumer Fraud Complaint – 5th straight year!
Who Uses Encryption? Module 7 Section 3.
Prepared By : Binay Tiwari
Protecting Yourself from Fraud including Identity Theft
Protecting Yourself from Fraud including Identity Theft
Presentation transcript:

Chapter 5 Legal & Ethical Issues; Privacy & Security Kristin Berglund Meredith Bratus Kathy Sypek

Childhood Obesity Fueled by Marketing Tactics  300% increase in the rate of U.S. children who are either overweight or obese Why??  Marketing Why??  Marketing 40,000 commercials/year, online advertising40,000 commercials/year, online advertising  Children are unable to judge the difference between ads and entertainment  Children are a vulnerable group  Ethical and legal concerns

Search Engines and Privacy  "Online Search Engines Help Lift Cover of Privacy"  Google: how it works  “Google hacking”  “Digital gatekeepers”  Crawlers  Effects of Google hacking Secure information that is being obtained through Google's search engine has lead to identity theft, bank account and credit card fraud. Secure information that is being obtained through Google's search engine has lead to identity theft, bank account and credit card fraud.  Relating to the text

A Key Weapon to Thwart Cybercrime  FBI’s Internet crime bust: Operation Cyber Sweep 125 arrests and indictments in the US 125 arrests and indictments in the US responsible for $100 million worth of crimes responsible for $100 million worth of crimes  Most of these cyber-crimes are money-driven: hacking into credit-card companies, banks, credit-reporting agencies’ databases, Phishing hacking into credit-card companies, banks, credit-reporting agencies’ databases, Phishing Increased broadband connections  increased understanding of how data centers deal with data Increased broadband connections  increased understanding of how data centers deal with data  What they suggest we can do: Build coalitions with law-enforcement agencies Build coalitions with law-enforcement agencies Give consumers the right information Give consumers the right information Train consumers Train consumers Create a system notifying consumers when credit file has been accessed Create a system notifying consumers when credit file has been accessed  Internet Marketing says: some complaints also involved employment (get-rich-quick, work-at- home) loans or insurance cost inflation. some complaints also involved employment (get-rich-quick, work-at- home) loans or insurance cost inflation. definition of “fraud” definition of “fraud” “Hackers” vs. “Crackers” “Hackers” vs. “Crackers”