Types of accessibility Video Facts Argument Government Statistics
Social networking Sites › Facebook › Twitter › LinkedIn Telecommunications Companies › Comcast › Verizon Phishing Scams › Website Pop ups ›
Information accessibility › Information is recorded and transferred through the internet Privacy › No single law in the US that provide a comprehensive treatment of data protection (Stratford & Stratford, 2011)
Ease of access › No privacy › damage Safety › Stalkers › Access to children Loss of ownership › Personal information belongs to the site entered Everyone is entitled to an opinion
Where is the line? › No boundary identified › Intangible place Who can you trust? › This the perception of the individual › No one
Everyone must educate themselves (Cyberethics)
Cyberethics - refers to a code of safe and responsible behavior for the Internet community. Privacy act of 1974 – is itemized to protect the rights of individuals DOJ, 2011
This chart outlines identity theft statistics by region. These statistics have a direct relationship to identity theft attempts. ITAC, 2011
Questions
DOJ. Cyberethics. (2011): Retrieved from FTC. Consumer alert. How not to get hooked by Phishing Scam. (2011) Retrieved from alt127.shtm alt127.shtm Stratford, Jean, Stratford, Juri. Data protection and privacy in the US and Europe (2011). N.pag.Web 20 Nov ITAC. Research and Statistics. (2011) Retrieved from p?cateid=47 p?cateid=47