Robert Crawford, MBA West Middle School.  Summarize the danger of sharing personal information on the internet.  Explain how cookies and global unique.

Slides:



Advertisements
Similar presentations
The Internet and the Web
Advertisements

Review Ch. 3 – Connecting to the Worlds Information © 2010, 2006 South-Western, Cengage Learning.
Hart District Acceptable Use Policy Acceptable Use Policy.
Technology in Education Issues we need to know. Social, Ethical, and Legal. By: Kara Bushey ECED 201.
Cookies Are small text filer with or unique ID tag that are embedded in a Web browser and saved on the user hard drive. Cookies also make it possible.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
TC2-Computer Literacy Mr. Sencer February 4, 2010.
17 April Using Technology. Where Can You Use Technology? Product Sales Marketing Operations Finances Salaries Inventory Logistics Analysis Market Customer.
9 99 CHAPTER Privacy and Security. 9 © The McGraw-Hill Companies, Inc Objectives 1.Privacy 2.Security 3.Ergonomics 4.Environment.
Web-tracking and Adware Hannah Muihrienne Julie Chris.
Robert Crawford, MBA West Middle School
Robert Crawford, MBA West Middle School.  Describe what an operating system does.  Summarize why compatibility is an issue for computer users.  Explain.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
MANAGING YOUR ONLINE PROFILE WHAT DOES THIS MEAN AND WHY SHOULD YOU CARE? Sarah Morris UT Libraries.
The Internet & Web Browsers Business Webpage Design Kelly Seale.
E - Safety What is it?. When do we need to be e-safe?
By: Mr Hashem Alaidaros MKT 445 Lecture 3 Title: Affiliate Marketing.
Section 2.1 Compare the Internet and the Web Identify Web browser components Compare Web sites and Web pages Describe types of Web sites Section 2.2 Identify.
The World-Wide Web. Why we care? How much of your personal info was released to the Internet each time you view a Web page? How much of your personal.
INLS 200 today’s line-up online privacy short video discussion questions from you? ethics cases? Ulrich’s Guide to Periodicals.
Ch15QQ 1. Hardware theft includes the theft of portable computers as well as desktop computers. 2. A surge suppressor can be used to protect a computer.
Technology as a Tool in Elementary Guidance Counseling Meghan Moran Click on my picture to see a video greeting! Meghan’s Website:
Domain name selection and registration MBA 563 WEEK 2.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
E-commerce Vocabulary Terms. E-commerce Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the Internet.
E-commerce Vocabulary Terms By: Laura Kinchen. Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the.
Day 2. The norms of appropriate, responsible behavior with regard to technology use Communic ation Commerce Literacy Access Etiquette Law Rights & Responsibi.
The Internet Industry Week Four. RISE OF THE INTERNET THE INTERNET – a global system of interconnected private, public, academic, business, and government.
Do you believe in this? Due to its very nature, the Internet is NOT a safe or secure environment. It is an ever-changing medium where anyone and everyone.
 Why is this important to you?  How do digital footprints connect with digital citizenship?  Does everyone have a digital footprint?
Information Security Training for People who Supervise Computer Users.
Networking Components Michelle Vega Network System Administrations LTEC /026 Mr. West.
● A system of Internet servers that support specially formatted documents. The documents are formatted in a markup language called HTML. What is the World.
CHAPTER 7 THE INTERNET AND INTRANETS 1/11. What is the Internet? 2/11 Large computer network ARPANET (Dept of Defense) It is international and growing.
Networks Am I hooked up?. Networks definition sizes of networks types advantages and disadvantages how data is sent transmission media business uses.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Digital Communication and Networks. Go to this website 10 minutes looking Pick an article Prepare a 5 slide pp Take into account.
Internet Essentials. The History of the Internet The Internet started when the Advanced Research Projects Agency (ARPA) of the United States Defense Department.
Privacy and Data Mining What Do “They” Know About You?
Digital Citizenship By Teneka Cannon. . Digital Etiquette also known as Netiquette Definition: a basic set of rule everyone should follow to make Internet.
WHAT IS E-COMMERCE? E-COMMERCE is a online service that helps the seller/buyer complete their transaction through a secure server. Throughout the past.
PRIVACY, LAW & ETHICS MBA 563. Source: eMarketing eXcellence Chaffey et al. BH Overview: Establishing trust and confidence in the online world.
What’s the Big Deal about Internet Privacy Marrs Computer Club.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY INTRODUCTION TO ICT COMPUTER ETHICS AND LEGAL ISSUES.
Computer Systems Networking. What is a Network A network can be described as a number of computers that are interconnected, allowing the sharing of data.
Lecture 9 ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS (continued) © Prentice Hall
Part 2.  Transmission methods used  Bandwidth:  The speed at which Data can be carried.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Internet Flow By: Terry Hernandez. Getting from the customers computer onto the internet Internet Browser
E-Safety Many people around the world use internet For entertainment, social lives and Work. However, nobody knows what YOU could be getting yourself.
Digital Communication and Networks. When people visit web sites their ◦IP address, ◦browser software, ◦operating system ◦viewing.
Wednesday, August 7 th 2013 By the Improvisors.  An Internet Protocol (IP) address is a protocol rule which contains the address of a digital device.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Internet Privacy Define PRIVACY? How important is internet privacy to you? What privacy settings do you utilize for your social media sites?
Robert Crawford, MBA West Middle School.  Describe ways criminals obtain passwords  Discuss ways to protect your computer from being accessed by others.
The Internet & Web Browsers Business Webpage Design Created by Kelly Seale Adapted by Jill Einerson.
Top Ten Ways to Protect Privacy Online -Abdul M. Look for privacy policies on Web Sites  Web sites can collect a lot of information about your visit.
DIGITAL FOOTPRINTS 11 TIPS FOR MONITORING YOUR DIGITAL FOOTPRINT AND 5 TIPS TO MAKE IT POSITIVE.
Lead Generation with Effective Marketing Services Mail to: Marketing Services Provider.
Glencoe Introduction to Multimedia Chapter 2 Multimedia Online 1 Internet A huge network that connects computers all over the world. Show Definition.
Internet Basics 10/23/2012. What is the Internet? It’s a world-wide network of computer networks. It grows hourly and involves national governments, communities,
GCSE COMPUTER SCIENCE The Bigger Picture
The Internet Industry Week Two.
Internet Safety Grade 5.
DigiDay 2016 Darren Trofimczuk
PART 2.
Privacy and Data Mining
WJEC GCSE Computer Science
Digital Footprint By: Jamie Purdy.
Presentation transcript:

Robert Crawford, MBA West Middle School

 Summarize the danger of sharing personal information on the internet.  Explain how cookies and global unique identifiers endanger privacy. Essential Question What are some of the threats to our privacy online?

 Global Unique Identifier (GUID)  Infringe In book, but not listed as a key term (these are the ones you need to write down) :  Cookie Not in book:  Digital Footprint

 What is Privacy?  I will provide a couple of definitions: noun I.the state or condition of being free from being observed or disturbed by other people. II.the state of being free from public attention.

Page 452 We share information both: Knowingly Unknowingly

 Sources Include: ◦ Public Records ◦ Directly from the individual  Website registration  Online Purchases  Warranty Registration  Sweepstakes Entries ◦ This information is then, often, sold to other companies, such as marketing companies. ◦ The information is also saved, forming your “digital footprint.”

 Digital Footprint (not in text)  A digital footprint is the data that is left behind by users on digital services.  There are two main classifications for digital footprints: passive and active. ◦ A passive digital footprint is created when data is collected without the owner knowing ◦ An active digital footprint is created when personal data is released deliberately by a user for the purpose of sharing information about oneself by means of websites or social media. Mention Amazon Adaptive Pricing

Different countries have different standards of online privacy Most restricted Restricted Some restrictions Minimal restrictions Effectively no restrictions No legislation or no information

 It is not enough to guard your own privacy online.  You have an ethical, and increasingly legal, responsibility to protect the privacy of others online. ◦ Infringe:  mid 16th century: from Latin infringere, from in- 'into' +frangere 'to break'.Latin

 It is not enough to guard your own privacy online.  You have an ethical, and increasingly legal, responsibility to protect the privacy of others online. The “Golden Rule” isn’t enough

 Is your truly private? ◦ This is particularly relevant as the school goes to a Google domain  Soon the school will be issuing you an address  Your is not private. ◦ Firstly, it is easily forwarded. ◦ Secondly, anything on a computer system belongs to whoever owns the system.  I am not saying this is right, only that it is. ◦ Do not ever send anything by that you would be deeply embarrassed if it were to become public information.

Page 453

 We frequently share information about ourselves knowingly (we are aware that we are sharing information). ◦ Do we ever share information unknowingly?  Remember the Passive Digital Footprint.  A digital footprint is the data that is left behind by users on digital services.  A passive digital footprint is created when data is collected without the owner knowing Remarketing Related video

 As relates to computers, what is a cookie?  As relates to computers, a cookie is a small file that is stored on your hard drive when you visit some websites.  What do cookies provide? ◦ They provide the website with a means of storing information about you. ◦ You can mange the cookie settings on your computer

 Global unique Identifier (GUID) ◦ A unique number assigned to a person, a piece of software, or a piece of hardware ◦ Similar to a MAC Address, except that people are not aware of its presence.  A media access control address (MAC address) is a unique identifier assigned to network interfaces for communications on the physical network segment. MAC addresses are used as a network address for most IEEE 802 network technologies, including Ethernet and WiFi.  getmac ifconfig/all (can be spoofed) ◦ Because people are not aware they are being tracked, the information can be abused.

 Summarize the danger of sharing personal information on the internet.  Explain how cookies and global unique identifiers endanger privacy.

 Global Unique Identifier (GUID)  Infringe In book, but not listed as a key term:  Cookie Not in book (these are the ones you need to write down)  Digital Footprint