Introduction Social Implications & EthicsSocial Implications & Ethics Since the introduction of the Internet, many policies have been introduced as a way.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Keeping Your Child Safe on the Internet. Welcome We are first-generation Internet parents Our children are the first generation to be born and raised.
By Andy Scott, Michael Murray and Adam Kanopa
How to protect yourself, your computer, and others on the internet
Northside I.S.D. Acceptable Use Policy
Part I: Making Good Online Choices
Victoria ISD Common Sense Media Grade 6: Scams and schemes
Fraud, Scams and ID Theft …oh my! Deb Ramsay ESD 101 Chief Information Officer Technology Division.
Breaking Trust On The Internet
INTERNET SAFETY.
INTERNET SAFETY FOR STUDENTS
Security, Privacy, and Ethics Online Computer Crimes.
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
STOP.THINK.CONNECT™ A NATIONAL CYBERSECURITY AWARENESS CAMPAIGN OLDER AMERICANS PRESENTATION.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Quiz 2 - Review. Identity Theft and Fraud Identity theft and fraud are: – Characterized by criminal use of the victim's personal information such as a.
INTERNET SAFETY FOR STUDENTS
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
INTERNET SAFETY Lynn W Zimmerman, PhD.  Hacking  Identity theft  Stolen passwords  Invasion of privacy POTENTIAL PROBLEMS  Stalking  Cyber-bullying.
Threats to I.T Internet security By Cameron Mundy.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Tia Dimou.  The internet is a wonderful resource for people of all ages  Users must be cautious and aware of what information they input  Credit card.
1 ITGS - introduction A computer may have: a direct connection to a net (cable); or remote access (modem). Connect network to other network through: cables.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Keeping Your Child Safe on the Internet. Welcome We are first-generation Internet parents Our children are the first generation to be born and raised.
IT security By Tilly Gerlack.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
By Taylor Ivy, Mark Sarosky, Elliott Bays, Ovidiu Ravasan, and Dave Martin SOCIAL IMPLICATIONS AND ETHICS OF THE INTERNET.
 Facebook  Twitter  MySpace  Windows LiveSpace.
-Tyler. Social/Ethical Concern Security -Sony’s Playstation Network (PSN) hacked in April Hacker gained access to personal information -May have.
Privacy & Security Online Ivy, Kris & Neil Privacy Threat - Ivy Is Big Brother Watching You? - Kris Identity Theft - Kris Medical Privacy - Neil Children’s.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
BEING CYBERSMART! ABOUT ONLINE SAFETY AND SECURITY AT SCHOOLS Redelivery Part 1: The AUP.
Electronic Marketing: Integrating Electronic Resources into the Marketing Process, 2e 11/5/2015  2004 Joel Reedy and Shauna Schullo Electronic Marketing.
Lee County’s intent is to provide free and equal access to resources via the internet. All school rules for appropriate use of technology also apply.
McLean HIGHER COMPUTER NETWORKING Lesson 8 E-Commerce Explanation of ISP Description of E-commerce Description of E-sales.
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
Issues and Problems Concerning the Internet Copyright ◦ Users pass off as others work and post it as their own work without giving credit to the source.
Topic 5: Basic Security.
Internet Safety Internet Safety LPM
RESPONSIBLE DIGITAL CITIZENSHIP At the Safety Booth.
When young people go online:  13% received unwanted sexual solicitations  34% communicate with individuals they never met  11% establish close personal.
Computer crimes.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
INTRODUCTION & QUESTIONS.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Chichester School District is providing students access to the district’s electronic network. This network includes Internet access, computer services,
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Laws and Rules That Govern Internet Safety Ashley Martin.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Smart, Safe, and Secure Online Spam commercial messages that you didn’t ask for (a company trying to sell things by sending out thousands of messages at.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Global One internet, worldwide Uncitral WTO Some laws: –Communications Decency Act –Child Online Protectioon Act –Children’s Internet Protection Act.
ICT in Product Manufacture ISDN, LAN, WAN, Intranets and extranets, global networks
Are your children safe online?. Welcome You are first-generation Internet parents Our children are the first generation to be born and raised with the.
Safety.
Misuses of ICT Malpractice and crime © Folens 2008.
Internet Identity, Safety, & Security
Freedom Independence Transition
Year 10 ICT ECDL/ICDL IT Security.
Internet Safety Vocabulary
Computer Security.
CYBERSAFETY & Personal information
Presentation transcript:

Introduction Social Implications & EthicsSocial Implications & Ethics Since the introduction of the Internet, many policies have been introduced as a way to govern the use of computers.Since the introduction of the Internet, many policies have been introduced as a way to govern the use of computers. The Internet has become wide spread throughout the world and everyone is has the ability to obtain any piece of information they choose to download just by searching for it.The Internet has become wide spread throughout the world and everyone is has the ability to obtain any piece of information they choose to download just by searching for it. The capabilities of users to get any information about someone increases the vulnerability of the other users of the system.The capabilities of users to get any information about someone increases the vulnerability of the other users of the system.

Increasing the Capabilities of an Individual Fraud and Identity theftFraud and Identity theft –The internet makes it easy to have your information stolen by somebody because they don’t have to have face verification when using a credit card and can easily use this to go online and buy anything they want. The extent of the damage done to you is at the will of the person who steals your identity.The extent of the damage done to you is at the will of the person who steals your identity. The computer is the new tool of a super- criminal.The computer is the new tool of a super- criminal.

User Vulnerability Have you ever received an that asked for your bank account numbers? Or have you ever had a website asking for your username and password on a site that is not the site you know?Have you ever received an that asked for your bank account numbers? Or have you ever had a website asking for your username and password on a site that is not the site you know? s and messages that you receive online do not always have the integrity that they should. This makes you vulnerable.. s and messages that you receive online do not always have the integrity that they should. This makes you vulnerable..

Ethics of Internet users by Wm. Eric Eggleston

Ethics Ethics are often summed up in what is considered the “golden rule”—do unto others as you would have them do unto you. While this makes sense as a general rule of thumb, it does not truly offer much in terms of helping one to make moral decisions in daily life.Ethics are often summed up in what is considered the “golden rule”—do unto others as you would have them do unto you. While this makes sense as a general rule of thumb, it does not truly offer much in terms of helping one to make moral decisions in daily life.

The Main Points of Ethics IntegrityIntegrity CommitmentCommitment TruthTruth ConfidentialityConfidentiality LegalityLegality

Ethics of Internet Users False information False information – Users going on websites and posting information that is not true. “Wikipedia” DownloadingDownloading –Users downloading music, movies or softer ware for there own personal use. “ limewire, Kasa” PrivacyPrivacy –User posting pictures and videos of friends and family on websites “ Myspace, Facebook and Youtube”

Ethics of Internet Users Computer AbuseComputer Abuse –Computer Crimes Users hacking in to personal information and taking identities of people.Users hacking in to personal information and taking identities of people. stealing a username and passwordstealing a username and password creating or releasing a malicious computer program “virus”creating or releasing a malicious computer program “virus”

Ethics of Internet Service Provider (ISP) By Indira Pabbathi

What is an Internet Service Provider (ISP) A company or organization that supplies Internet connectivity to home and/or business customers. ISPs support one or more forms of Internet access, ranging from traditional modem dial- up to DSL and cable modem broadband service. An ISP may provide a combination of services including Internet access, domain name registration, hosting, and Web hosting.A company or organization that supplies Internet connectivity to home and/or business customers. ISPs support one or more forms of Internet access, ranging from traditional modem dial- up to DSL and cable modem broadband service. An ISP may provide a combination of services including Internet access, domain name registration, hosting, and Web hosting. ISPs policies concerns, 'cookies,' third party sites and access, collection of personal information - what, how and usage, security of information, regulation of children's access to the Internet, globalization issues and legal issues.ISPs policies concerns, 'cookies,' third party sites and access, collection of personal information - what, how and usage, security of information, regulation of children's access to the Internet, globalization issues and legal issues.

What is prohibited content? ISP prohibits sexual activity, child pornography, depictions of bestiality, material containing excessive violence or sexual violence, detailed instruction in crime, violence or drug use, and/or material that advocates the doing of a terrorist act.ISP prohibits sexual activity, child pornography, depictions of bestiality, material containing excessive violence or sexual violence, detailed instruction in crime, violence or drug use, and/or material that advocates the doing of a terrorist act.

What other responsibilities do ISPs have? ISPs to take appropriate steps to protect the public from prohibited content. The codes set out opt-in filtering arrangements that require ISPs to offer customers filters on a cost recovery basis. Filters are made available either directly or via a filter software portal maintained by the Internet Industry Association.ISPs to take appropriate steps to protect the public from prohibited content. The codes set out opt-in filtering arrangements that require ISPs to offer customers filters on a cost recovery basis. Filters are made available either directly or via a filter software portal maintained by the Internet Industry Association. Consider the use of law enforcement or civil action against spammers and hackers when appropriate.Consider the use of law enforcement or civil action against spammers and hackers when appropriate. Providers has to protect the users information. Example: credit card, address or personal information.Providers has to protect the users information. Example: credit card, address or personal information. ISP uses cookies to collect non-personally identifiable informationISP uses cookies to collect non-personally identifiable information

What if an ISP does not comply with an industry code of practice –Some mechanisms, such as withdrawal of industry association rights or privileges, and compliance incentives, such as the right to display compliance symbols will need to be approved by government authorities. –Otherwise Contravention of an online provider rule is a criminal offence and a continuing offence for each day the contravention continues.

References spam/isp-general.htmlhttp://nemesis.lonestar.org/reference/internet/mail/anti- spam/isp-general.htmlhttp://nemesis.lonestar.org/reference/internet/mail/anti- spam/isp-general.htmlhttp://nemesis.lonestar.org/reference/internet/mail/anti- spam/isp-general.html Ethics.htmlhttp:// Ethics.htmlhttp:// Ethics.htmlhttp:// Ethics.html