LESSON 2: Internet, Computer Ethics and Security

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Review Ch. 3 – Connecting to the Worlds Information © 2010, 2006 South-Western, Cengage Learning.
Digital Citizenship Corbin Elementary.
ACCEPTABLE USE POLICIES.  Use network resources for school work only  Always Log-on/Log-off  AUP/RUP training and signature pages are required  Always.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Technology in Education Issues we need to know. Social, Ethical, and Legal. By: Kara Bushey ECED 201.
Cyber crime impact on Businesses Bogdan Manolea RITI dot-Gov.
Eneken Tikk // EST. Importance of Legal Framework  Law takes the principle of territoriality as point of departure;  Cyber security tools and targets.
Emily Snyder, William Darras, Stephanie Berger.  40Y 40Y.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
Instructions for Weds. Jan Get your Century 21 Jr. textbook 2.Log in to the computers 3.On page 80, read the Objectives listed under “Lesson 13:
VISD Acceptable Use Policy
Internet Ethics. Internet Ethics Cyberspace Cyberspace is like a big city. There are libraries, universities, museums, places to have fun, and plenty.
Cyber Crimes.
Digital Citizenship By: Miranda Scorver.
Ashley Chambliss ED 505 Fall 2. “Digital Citizenship is a way for teachers to prepare you for a world full of technology.” (Ribble, ) “A means.
Digital Literacy Tour Google/iKeepSafe/YouTube Presenter Introduction Davina Pruitt-Mentle, Ph.D. Ed Tech Policy, Research and Outreach.
What is internet? The internet is a worldwide collection of computer networks, cooperating with each other to exchange data using a common software standard.
A Boon or a Curse. What is the ‘Internet’?  It is a network of networks that consists of millions of private, public, academic, business, and government.
ISNE101 Dr. Ken Cosh. Review  Dependability  Reliability  How do we improve it?  Security  Threats & Countering the Threats.
What does “secure” mean? Protecting Valuables
Section 6 Theory Software Copyright, Viruses and Hacking.
Computer Ethics for Computer Users
What it is About  This poster is about The Nine Elements of Digital Citizenship.  It also has a lot of information about Cyber bullying.  There were.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Digital Citizen Project Katie Goodall Educational Technology 505.
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
Digital Citizenship Created By: Kelli Stinson June 2011.
Technology Lab Rules, Procedures, Acceptable Use Policy Review Kindergarten-Second Grade This PowerPoint is meant to be used as a quick review! Students.
According to netiquette simply refers to our behavior the internet.
Digital Citizenship Project By Allen Naylor Ed 505.
Digital Citizenship By: Amanda Thurber. Netiquette on Social Media Sites According to networketiquette.net, netiquette is the social code of the internet.
Are You a Good Digital Citizen? By Abby Buchanan Image from Microsoft Clip Art.
L ESSON 2 A website is a collection of different types of data, which can be anything like text, graphics, videos etc. combined together to provide.
Digital Citizenship Lesson 3. Does it Matter who has your Data What kinds of information about yourself do you share online? What else do you do online.
Information Systems Ethics (Cyberethics) Dr. Robert Chi Department of Information Systems California State University, Long Beach.
What is Internet? - Is a worldwide collection of computers networks, cooperating with each other to exchange data using a common software standard, on.
The way to avoid being trap into cyber crime. What is cyber crime? The Department of Justice categorizes computer crime in three ways: 1. The computer.
AUP, Netiquette, Copyright & Fair Use Wilkes University – Internet Literacy for Educators Cathy W. Dowd Spring 2009.
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
Digital Citizenship Laura Locke ED 505. Netiquette on Social Media Sites  Netiquette is simply defined as “network etiquette.
 Internet crime is, Any crime or illegal activity committed online or through the internet.
Internet Services Web browsing Chat/Messaging Newsgroups Social networking Shopping Information –Text –Pictures –Movies –Music And more! 3.
Lesson 15 : Networks And The Internet
 Carla Bates Technology and Education ED 505.  Social Media Sites are interactive webpages, blogs, and other user created sites that all others to create,
Digital Citizenship. What is Netiquette? Netiquette is known as the “social code of the internet.” Netiquette comes from the words “network” and “etiquette.”
Digital Citizenship Project Created By: Celeste Jackson ED 505-Dr. Martha Hocutt.
Computer Ethics & Netiquette
Digital Citizen Project By: Frances Murphey Technology and Education.
Computer crimes.
Credit:  Cyber law refers to any laws relating to protecting the Internet and other online communication technologies.
Digital Citizenship By Lisa Brackett ED 505. Netiquette on Social Media Sites What is it? “Netiquette is the etiquette guidelines that govern behavior.
Is a worldwide collection of computer networks, cooperating with each other to exchange data. The Internet provides the following main facilities: 1. .
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Chapter 11 Implementing Social Commerce Systems. Learning Objectives 1.Describe the major issues in the social commerce implementation landscape. 2.Discuss.
WHAT IS CYBER SECURITY? Governments, military, corporations, financial institutions, hospitals and other businesses collect, process and store a great.
TECH VOCAB. ETHICS The rules that we use to define behaviors as “right” or “wrong” page 6.
D IGITAL C ITIZENSHIP By Raquel Laliberty. Digital access is the equal ability for people in different countries and societies to access digital technology.
A properly constructed virus can disrupt productivity causing billions of dollars in damage A virus is a small piece of software that piggybacks on real.
INTERNET SAFETY, NETIQUETTE, AND COPYRIGHT LAWS By Alex Pagliaro.
Lecture 3 1Norazirah Ayob, FEB. Ch  Technology advances allow individuals to self-select  what,  when, and  where messages are sent and received.
Digital Citizenship Project Submitted by: Etta Pope Instructor: Laurie Fowler.
Digital Citizenship Project Justin Lann. Netiquette Netiquette on Social Media Sites – A set of social conventions that facilitate interactions over networks.
ST. JOHN WHAT IS INTERNET?? The internet is a worldwide collection of computer network The internet provides following main facilities: 1 2 chat.
A Project on CYBER SECURITY
Emily Snyder, William Darras, Stephanie Berger
Chapter 13 Security and Ethical Challenges.
– Communication Technology in a Changing World
Internet Vocabulary Terms
Web Page Design and Development I Standards
Presentation transcript:

LESSON 2: Internet, Computer Ethics and Security OBJECTIVES Review the basics Internet Concepts and its types Determine the computer ethics and netiquette Discuss different kinds of computer risks Name some computer and internet crimes List ways how to secure computer and Internet security measures WHAT IS INTERNET? Is the Worldwide collection of networks, cooperating with each other to exchange data using a common software standard, on which end –user services.

The Internet provides following main facilities: WHAT IS WEBSITE? Is a collection of different types of data, which can be anything like text, graphics, videos etc. combined together to provide some kind of useful information. E-mail Chat Searching Jobs Advertising for Business E-commerce Searching Information

TYPES OF WEBSITE Advocacy Website Blogs Website Wiki Website Portal website News Website Informational Website Business / Marketing Website Small Business Websites Large Business Websites Educational Website Entertainment Website Advocacy Website Blogs Website Wiki Website Content Aggregator Website Social Network website Search Engine , Directories, Yellow pages and Portals Website

COMPUTER ETHICS Real People Exist Behind The Computers It is the RESPONSIBLE USE of computers and computer networks. NETIQUETTE Or net etiquette, refers to etiquette on the Internet. GOOD NETIQUETTE INVOLVES RESPECTING OTHER’S PRIVACY AND NOT DOING ANYTHING ONLINE THAT WILL ANNOY OR FRUSTRATE OTHER PEOPLE. It is about proper ways in which to use a network and to determine whether information reliable, while emphasizing 3 important Points. Real People Exist Behind The Computers Protect your Privacy Avoid Spamming

Day-to-Day Ethics All of us must know these already, because their modified forms of ethics today told by us by our grandparents/parents, like don’t open letters of others, don’t copy the home work from others, don’t listen to any conversation secretly etc. the following discusses the basic day-today ethics to observe when using computers. Software Piracy Computer Viruses/Worms Plagiarism Hacking File privacy Intellectual Property Rights Copyright Information Privacy

THE REPUBLIC ACT 10175: ANTI-CYBERCRIME LAW the Law defines cybercrime offenses with definitive punishments. Illegal Access Illegal Interception Data Interference System Interference Misuse of Devices Cyber squatting Computer –Related Forgery Computer –Related Fraud Computer –Related Identity Theft Cybersex Child Pornography Unsolicited Commercial Libel COMPUTER SECURITY RISKS This is a very general statement because many things are in fact, computer security risks. A RISKS is a vulnerability that could allow lost of confidentiality , integrity, or availability of computer services and where there is a possibility of the vulnerability being exploited. THE REPUBLIC ACT 10175: ANTI-CYBERCRIME LAW - The purpose of this act define, provide for the prevention , investigation , suppression and penalties therefore and other purpose.

Facebook is spying on your mom, your relationship and your Political Views Facebook has been spying on user’s ethnicities, political views, romantic and partners, and even how they talk to their children. ( Unlike the mood study, the facebook studies listed below are observational; they don’t attempt to change user’s behavior. )

It’s unlikely Facebook users have heard about most these studies, they’ve consented to them; the social network’s Data Use Policy states. “We may use the information we receive about you…for internal operations, including troubleshooting, data analysis, testing, research and service improvement.”

How to Prevent Cyber Crime Prevention will always be your best Line of defense against cyber criminals. Like any other criminal activity, those vulnerable tend to be first targeted. Ideally, you’ll want to work with a IT security expert to assess your specific needs and vulnerabilities, but there are certainly some universal steps you can take that will greatly reduce your likelihood of attack.