NA in the digital age Early attempts Bulletin boards/modems/user groups AOL (email, boards, chat) alt. groups (alt.recovery.na, etc.) NArchive (first.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
BlueRedGreenPurpleOrange.
1 Computer and Internet Security JCCAA Presentation 03/14/2009 Yu-Min (Phillip) Hsieh Sr. System Administrator Information Technology Rice University.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Facebook Security and Privacy Issues Brian Allen Network Security Analyst Washington University December 2, 2010 Alumni House.
Trojan Horse Program Presented by : Lori Agrawal.
1 I ntegrated S ite S ecurity for G rids © Members of the ISSeG Collaboration, 2008 See: ISS e G Computer Security: Advice for computer.
Introduction to Security Computer Networks Computer Networks Term B10.
Threats To A Computer Network
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
1 The Information School of the University of Washington Nov 17fit spyware © 2006 University of Washington The Dark Side of the Internet INFO/CSE.
MOBILE MALWARE TOPIC #5 – INFORMATION ASSURANCE AND SECURITY Michael Fine 1.
Quiz Review.
How It Applies In A Virtual World
Hierarchical file system Hierarchical file system - A hierarchical file system is how drives, folders, and files are displayed on an operating system.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Digital Citizenship Project
Staying Safe Online Keep your Information Secure.
 We all know we need to stay safe while using the Internet, but we may not know just how to do that. In the past, Internet safety was mostly about.
Chapter 11 Computers and Society, Security, Privacy, and Ethics.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Twelfth Edition.
Business Software What is database software? p. 145 Allows you to create, access, and manage data Add, change, delete, sort, and retrieve data Next.
E-P RAGUE AND THE P ROSPECTS OF E-G OVERNMENT : D ISCUSSION P ANELS James Melitski, PhD and Tony Carrizales, PhD E-governance Institute National Center.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
 Two types of malware propagating through social networks, Cross Site Scripting (XSS) and Koobface worm.  How these two types of malware are propagated.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
INTERNET SAFETY RULES. TECHNOLOGY Technology has become an important part of today’s classroom as well as the world. Students need to be able to use and.
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
PLUG IT IN SIX Protecting Your Information Assets.
The Teacher Is In Charge There are dozens of free services, but Gaggle.Net is the only service designed specifically for classroom use. The biggest.
From 0 to “e” in 60 minutes A quick overview of MnOnline – related IT work efforts (minus D2L and web-enabled ISRS) MnOnline Summit – July 2004.
Government IT Professionals Online Survey Results FINAL REPORT September 2010.
Jan 11 Encryption and Hacking. Your Answer Data encryption is used to keep information safe from unauthorised users. Data encryption software makes the.
DTCC Confidential DTCC Social Networking Policy Task Force January, 2008.
The Internet CSC September 30, History of the Internet Developed for secure military communications Evolved from Advanced Research Projects.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
 The meaning of multimedia is the use of a variety of artistic or communicative media.
INTERNET. Objectives Explain the origin of the Internet and describe how the Internet works. Explain the difference between the World Wide Web and the.
Internet Security and Your Computer Welcome to Boot Camp.
What is Spam? d min.
Digital Citizenship Project Created By: Celeste Jackson ED 505-Dr. Martha Hocutt.
Business Technology Applications What is Malware.
Cybersecurity Test Review Introduction to Digital Technology.
Social Networking Practices. Information Security Purpose is to protect your information’s Confidentiality Integrity Availability.
Any criminal action perpetrated primarily through the use of a computer.
Smart, Safe, and Secure Online Spam commercial messages that you didn’t ask for (a company trying to sell things by sending out thousands of messages at.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Digital Citizenship Project Justin Lann. Netiquette Netiquette on Social Media Sites – A set of social conventions that facilitate interactions over networks.
ETHICS Internet And Online Community Week 10.
Safety.
Managing Windows Security
CYBER SECURITY...
Information Security 101 Richard Davis, Rob Laltrello.
Internet And Online Community Week 10
System And Application Software
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
ICT Communications Lesson 3: Internet Life and Privacy
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
Introduction-Cyber Safety
Defencebyte THE PERFECT SECURITY FOR YOUR COMPUTER.
Presentation transcript:

NA in the digital age Early attempts Bulletin boards/modems/user groups AOL ( , boards, chat) alt. groups (alt.recovery.na, etc.) NArchive (first real history site) Personal websites Wsoinc.com late 1995 Home page, 3 other pages, 2 addresses and NA-L and NA-Admin MAGNAWS

Today Bulletin boards (some general, some specific orientation) Online chat rooms, electronic meetings Main NA website – (evolved steadily since 1998) Numerous local service committee websites Streaming audio sites offering NA recovery messages Multimedia offerings: PSAs, Flash presentations, video Facebook, Twitter, etc. Outside enterprises offering one-stop recovery community Etc., etc. (from the time this presentation was developed, there are probably a number of new efforts) NA in the digital age

Challenges Strive towards Vision StatementVision Statement Cultural and linguistic diversity - mapmap Maintain fellowship ownership of recovery literature and logos (FIPT) Anonymity Sharing local experience/resources (therapeutic value…) Database (by the time the information is entered, it has changed) Volume of info vs. user-friendliness (what makes sense to each audience) Cannot please everyone all the time—prioritization/resources NA in the digital age

NA service committee website considerations (in planning for a local website – PRHB Chapter 10 and Resources) Who is your audience? – –NA members – –General public – –Professionals/referrers – –Service committee members Size and scope? – –Is the site aimed at all audiences or select ones – –Content aimed at audience(s) – –Design – –Usability Hosting NA in the digital age

NA SERVICE COMMITTEE WEBSITE CHALLENGES (generally agreed) What are normal challenges? – –Human (who will develop and maintain website, training/mentoring) – –Accountability (who has oversight) – –Updates (how often is the information checked and updated) – –How does your audience find your website (search) – –Traditions (anonymity, shared domain, opinions on boards, referrals, etc.) – –NA-speak (does your audience understand the language and idioms) Other challenges – –Bulletin boards/chat rooms (monitoring, responding) – –Service committee records (privacy, anonymity) – –Linkages (to other websites, maps, other services) NA in the digital age

Other challenges facing NA online Popular services such as Facebook and Twitter – –Mixing personal and business lives online – –Anonymity issues (pictures, privacy, etc.) Miscellaneous – –Bulletin boards – private or public browsing? – –Webinars – considerable knowledge and training needed to make it truly interactive – –Have and have-nots (those with computers and those without) – how do you keep a level playing field at the local level? – –Streaming media and anonymity NA in the digital age

Other challenges facing NA online Security (twice as much malicious code is being developed as legitimate software) – –Personal computers Malware – software meant to secretly access a computer without the owner’s informed consent; e.g. virii, worms, phishing (identity theft), trojan horses, scareware, spyware, rootkits – –Websites (over 1,000,000 websites infected in 2010) Makes no difference whether it is Linux or Windows; e.g. between June 7-9, 2010, over 110,000 websites running Windows were infected Types – –SQL-injection – any website that is running a database can be impacted, unless host has taken strong security precautions. – –Cross-site scripting – java script hidden in links leads to potentially wide variety of actions from redirection to installing rootkits and/or trojans, silently. – –HTML-injection – many web editors have vulnerabilities that leave them open to be hacked Possible results: redirection, used for spamming, being listed as hosting malware, being blocked, losing website. NA in the digital age

Q & A

What’s next 10 min break NA in the Digital Age, Part Two NA in the digital age

Panel discussion “What benefits/dangers do you foresee for NA in the digital age?” NA in the digital age

Q & A