SX1009 & SX1509 Rights in the Digital Society Wendy Moncur / Phil Marston Dept. of Computing Science.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Review Ch. 3 – Connecting to the Worlds Information © 2010, 2006 South-Western, Cengage Learning.
Hart District Acceptable Use Policy Acceptable Use Policy.
Cybersafety Elimbah State School Cybersafety and cyberbullying: A guide for parents and caregivers, May 2012., Dept of Education, Training and Employment.
INTERNET SAFETY.
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
$100 $200 $300 $400 $500 $400 $300 $200 $100 $500 $400 $300 $200 $100 $500 $400 $300 $200 $100 $500 $400 $300 $200 $100 $200 $300 $400 $500.
1 Hackers 101 Julie Keil JoAna Swan John Adamo John Ponessa Arturo Jose` Ortiz.
SX1009/SX1509 The Digital Society Judith Masthoff, Computing Science.
CYBER CRIME AND SECURITY TRENDS
E - Safety What is it?. When do we need to be e-safe?
INTERNET SAFETY Lynn W Zimmerman, PhD.  Hacking  Identity theft  Stolen passwords  Invasion of privacy POTENTIAL PROBLEMS  Stalking  Cyber-bullying.
CENTRAL SCOTLAND POLICE Data Protection & Information Security Stuart Macfarlane Information Governance Unit Police Service of Scotland.
Introduction Online gaming Webcams and videos File sharing , IM, and chat rooms Social networking.
Copyright © 2014 Pearson Education, Inc. 1 IS Security is a critical aspect of managing in the digital world Chapter 10 - Securing Information Systems.
PowerPoint Presentation by Charlie Cook The University of West Alabama CHAPTER 14 Student Version © 2010 Cengage Learning. All Rights Reserved. May not.
COMP 2903 A12 – Privacy Legislation and Surveillance Software Danny Silver JSOCS, Acadia University.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Cyber Crimes.
Enw / Name. How legislation affects business computer users How important is health and safety legislation to a business and how does it affect a workers.
Electronic Use Policies.   Social Media  Internet.
Cyber crime & Security Prepared by : Rughani Zarana.
A Step Into The Computer Underground 1 “By Understanding The Enemy We Are Better Prepared To Defend Ourselves”
Social impact of using I.T Fahimul Hoque. Local Community Development in IT have lead to changes in the way local communities work. IT has changed the.
ISNE101 Dr. Ken Cosh. Review  Dependability  Reliability  How do we improve it?  Security  Threats & Countering the Threats.
Online Safety and Awareness. Introductions We are students at UNM We are taking an Information Security course this semester. It is our mission to teach.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Online Security By:. The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access.
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
ANTI-BULLYING AT KNIGHTLOW CYBER BULLYING. Cyber bullying: fact or fiction? 1. There are at least 7 forms of bullying that happen using technology True.
DIGITAL CITIZENSHIP/CYBER BULLYING.  Privacy - Protect Personal Information  Respect – Avoiding Cyberbullying, Plagiarism, Downloading Music Appropriately.
Tim Reid Malvern Parish C.E Primary School Internet Safety.
Computers, Cell Phones & the Internet JOSE CANO AND SAMIE GIDDENS.
Monitoring Employees on Networks: Unethical or Good Business?
COMP1321 Networks in Organisations Richard Henson March 2014.
BEING CYBERSMART! ABOUT ONLINE SAFETY AND SECURITY AT SCHOOLS Redelivery Part 1: The AUP.
Why the Data Protection Act was brought in  The 1998 Data Protection Act was passed by Parliament to control the way information is handled and to give.
Lee County’s intent is to provide free and equal access to resources via the internet. All school rules for appropriate use of technology also apply.
Netiquette/Internet Safety Presentation VAHS Boys Swim Team.
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
CYBER CRIMES PREVENTIONS AND PROTECTIONS Presenters: Masroor Manzoor Chandio Hira Farooq Qureshi Submitted to SIR ABDUL MALIK ABBASI SINDH MADRESA TUL.
What vulnerabilities do you face in cyberspace?  Cyberbullying  Cyberstalking  Racial hatred  Exposure to violent, disturbing and/or illegal material.
Digital Citizenship Eagle Ridge’s School Policy. Expectations for Students  Students are invited to use their personal devices as directed by their teacher.
Digital Citizenship. What is Netiquette? Netiquette is known as the “social code of the internet.” Netiquette comes from the words “network” and “etiquette.”
Technology: Friend or Foe? Thinking about Information Ethics.
LAUSD Responsible Use Policy (RUP) BUL – Attachment A.
Julie Latham Digital Citizenship: An Informational Guide.
How these affect the use of computers. There are 4 main types of legislation that affect the use of computers. 1.Data Protection Act 2.Copyright 3.Computer.
INTRODUCTION & QUESTIONS.
Legislation 32 Legislation 32. Legislation 32 Our last topic is a BIG fave in the exam! It has often been the subject of the final question that’s worth.
E-safety Helping your children stay safe on-line A presentation for Parents.
Cyber Crime in China: Current Situation and Countermeasures He Xing Cyber Crime Investigation Division Ministry of Public Security, China.
Types of Cybercrime (FBI, 2000) 1.Unauthorized access by insiders (such as employees) 2.System penetration by outsiders (such as hackers) 3.Theft of proprietary.
Ministry of Education & Religious Affairs, Culture & Civilisation Greek School Network nternet-safety.sch.gr.
Raising Digitally Literate Citizens Curbar Primary School March 2016.
8 THINGS PARENTS CAN DO TO PREVENT CYBER BULLYING Belhaven Middle School, Linwood NJ from the New Jersey Principals and Supervisors Association Cyber Safety.
BTEC NAT Unit 15 - Organisational Systems Security ORGANISATIONAL SYSTEMS SECURITY Unit 15 Lecture 7 EMPLOYMENT CONTRACTS & CODES OF CONDUCT.
OCR Nationals - Unit 8 E-commerce – go to slide 11.
Cyber crime and security issues
Moral, Ethical, legal and cultural issues How technical innovation leads to moral, ethical, legal and cultural issues How our own moral and ethical beliefs.
Operation Uncool: Online Youth Consultation on Cyberbullying
Business Threats What could it mean for you?
Year 10 ICT ECDL/ICDL IT Security.
Information Security Footprint.
Digital Citizenship EIT, Author Gay Robertson, 2017.
Communication Technology in a Changing World
LO1 - Know about aspects of cyber security
Discursive Writing Performance Criteria.
Digital Literacies for learning
Presentation transcript:

SX1009 & SX1509 Rights in the Digital Society Wendy Moncur / Phil Marston Dept. of Computing Science

Rights in the Digital Society Freedom of expression and privacy: civil rights in a digital society Ownership in a digital world Cyber-crime, cyber-terrorism and cyber-bullying Information credibility and authority in a Web2.0 world Details of assessment

The extent of the Digital Society Recording everything, forgetting nothing Where? – Internet – Mobile phones – Cameras – Smart appliances – Buildings – Furniture – Vehicles – clothing –

The extent of the Digital Society “By year end 2012, physical sensors will create 20% of non-video internet traffic.” Gartner Group

Civil rights: Freedom of expression

Civil rights: Freedom of expression

Civil rights: Privacy Who stores our data? Where? Who can access it? What does this data say about us?

Civil rights: Privacy MPs expenses scandal triggered by info on FaceBook

Ownership in a digital world Who ‘owns’ this photo? Who can delete it? What is your impression of these people? Would you employ them?

Ownership in a digital world

Cyber-crime financial scams computer hacking downloading pornographic images from the internet virus attacks stalking by creating websites that promote racial hatred..... and more..... “...the use of any computer network for crime” British Police

Cyber-crime: a big problem 90% of US companies detected computer security breaches in the previous year 74% acknowledged financial losses as a result of the breaches of security 273 organisations quantified their financial losses: the total bill came to $265m. 25% of respondents detected penetration from outside their company 79% detected employee abuse of the internet, for example downloading pornography or pirated software 85% detected computer viruses

Cyber-terrorism “Terrorist groups are increasingly using new information technology and the Internet to formulate plans, raise funds, spread propaganda, and engage in secure communications. Cyberterrorism-–meaning the use of cyber tools to shut down critical national infrastructures (such as energy, transportation, or government operations) for the purpose of coercing or intimidating a government or civilian population– -is clearly an emerging threat.” Dale L. Watson, Executive Assistant Director, Counterterrorism/Counterintelligence Division, FBI

Cyber-bullying What constitutes cyber-bullying?

Information credibility Data is not perfect Whose fault was this accident?

Information credibility Publicly available app. Sense of safety, or greater fear? Is the information correct? Does this app incite illegal vigilante activity? “Sex Offender Tracker App is a new mobile app that provides users with access to the location of registered sex offenders through the lens of augmented reality.”

A Balancing Act Information credibility and authority in a Web2.0 world Freedom of expression Right to Privacy Ownership of online materials Cyber-crime, cyber-terrorism Cyber-bullying

Assessment (1) In the practical, you will be randomly assigned to a group, and to one of the following topics: A.Google StreetView (and similar applications) B.Sensors to monitor elderly people in their homes C.Activist websites – eg- environmental, political. Choose at least one specific example. D.UK use of CCTV E.Wikileaks Iraq War logs

Assessment (2) You will take part in an online debate about your allocated topic. You will either put forward arguments about the advantages or disadvantages of the debate topic, depending on your group.

Assessment (3): What to debate? Arguments should cover relevant aspects of: – Civil rights in a digital society – Ownership in a digital society – Cyber-crime/ cyber-terrorism/ cyber-bullying – Information credibility and authority in a Web 2.0 world

Some rules.... You should only argue your allocated side of the argument, even if you do not really agree with it. You are expected to use grammatically correct English. No text-speak please. Your arguments should be well thought through, and based in the research that you do on your topic. Your arguments should only be about the topic. They should be courteous, even if you disagree strongly with someone else's opinion. You will be marked both on your individual contribution to the debate, and on your support of other students who are taking the same stance as you (ie - positive or negative). Marks will be given for the number and content of your arguments.