1. 1.To discover ethical issues in electronic media and the Internet. 2.To identify different areas of Internet crime. 3.To assess where one should go.

Slides:



Advertisements
Similar presentations
By Andy Scott, Michael Murray and Adam Kanopa
Advertisements

Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
How to protect yourself, your computer, and others on the internet
Primary Threats to Computer Security
Security at Home The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Polling Stations There are four questions posted in the classroom Indicate a “yes” response by placing a tally mark on the white board The results of the.
The Internet.
Fraud, Scams and ID Theft …oh my! Deb Ramsay ESD 101 Chief Information Officer Technology Division.
Breaking Trust On The Internet
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
INTERNET SAFETY.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Chapter 9 Information Systems Ethics, Computer Crime, and Security.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Security, Privacy, and Ethics Online Computer Crimes.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
Instructions for Weds. Jan Get your Century 21 Jr. textbook 2.Log in to the computers 3.On page 80, read the Objectives listed under “Lesson 13:
Internet Guidelines. Cyberspace Cyberspace is like a big city. libraries, universities, museums, places to have fun, Places to meet people. But, like.
Identity-Theft is the fastest growing crime in America; 9.9 MILLION victims were reported last year, according to a Federal Trade Commission survey!
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
How It Applies In A Virtual World
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Issues Raised by ICT.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Cyber Crimes.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.
Mrs. Jefferson Business Information Management I.
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
Digital Citizenship Project.  The etiquette guidelines that govern behavior when communicating on the internet have become known as netiquette.
Unethical use of Computers and Networks
CYBER CRIME.
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Inappropriate Content Hackers Phishers Scammers Child Abusers Bullies.
Internet Safety Internet Safety LPM
By: Asfa Khan and Huda Mukhtar
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Internet Guidelines. Cyberspace Cyberspace is like a big city. libraries, universities, museums, places to have fun, Places to meet people. But, like.
Cyber Safety Jamie Salazar.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Issues for Computer Users, Electronic Devices, Computer and Safety.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Presented By: Jennifer Thayer, SPHR, SHRM-SCP.  Identify CyberCrime and Types  Identify Steps to Take to Prevent Identity Theft  Learn Tips and Tricks.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
WHEN SHARING IS NOT CARING: INTERNET ETHICS By Baikgopodi “Bai” Ditiso Presented at CLTD– 09 May 2016.
E-Ethics.
IT Security  .
Internet Safety Vocabulary
E-Ethics.
Presentation transcript:

1

1.To discover ethical issues in electronic media and the Internet. 2.To identify different areas of Internet crime. 3.To assess where one should go to report Internet crime. 4.To recommend computer security measures to students. 2

One in five Web surfing children have been sexually solicited online –Journal of the American Medical Association 35% of software today is used without licenses Nine million Americans will have their identity stolen this year Federal Trade Commission: identity-theft.html 3

The study of moral values and rules in electronic media and the Internet 4

pirating online predators hacking identity theft wire fraud phishing counterfeit auctions spyware viruses password trafficking internet harassment cyber bullying hate mail copyright infringement 5 Are needed to avoid the spread of electronic crimes, such as:

Is defined as any crime involving computers including: –pirating –online predators –cracking –identity theft –wire fraud –phishing –counterfeiting goods online –creating malicious viruses –stealing passwords –Internet harassment –cyberbullying 6

Is the illegal stealing, copying or exchanging of media including: –software –movies –music Accounts for almost 35% of software today Can result in fines of millions of dollars 7

Take advantage of children by: –using instant messaging, and social network sites –gaining victims trust and engaging in sexually explicit conversations –trying to arrange face-to-face meetings 8

Is modifying electronics such as an Xbox ®, cell phone or iPod ® Hacker: an individual who alters electronics legally –someone who modifies their computer for better performance Cracker: an individual who illegally alters computer hardware or breaches computer systems –crackers are often mislabeled “hackers” in mass- media 9

Is when someone steals your personal information to commit fraud or other crimes including: –your name –credit card information –Social Security number Nine million Americans have their identities stolen each year 10

Is illegally stealing money or property using interstate “wires” Is considered a federal crime because the crime goes across state lines 11

Involves s pretending to originate from banks or online retailers such as eBay ® or PayPal ® Looks very similar to an actual originating from a retailer Tries to gather financial information, user names and passwords from victims –if recipient visits the fake retailer they may receive malicious viruses or spyware 12

Have become hotbeds for counterfeit goods –eBay ® has recently been sued by companies for auctioning counterfeit goods. These companies include the following: L’Oreal ® Louis Vuitton ® Dior Couture ® Gucci ® 13

Is software installed discreetly altering the usability of a computer Usually installs with other programs, such as file sharing programs Includes side-effects such as pop-up advertisements and crashing of the computer 14

Are software programs which spread from computer to computer Are malicious in nature Can delete information on your computer Spread through and Internet downloads Alter the normal functions of your computer 15

Steps to prevent viruses include: –use virus protection software –implement an Internet firewall, a buffer between your computer and the Internet –install security updates –be careful opening and downloading materials online 16

Is the illegal obtaining, giving or selling of passwords 17 An American Eagle ® employee was indicted for giving out passwords to the American Eagle ® computer network to a Yahoo ® message board. The indictment carries a penalty of 11 years in prison and/or a $350,000 fine.

Is the online counterpart of harassment Can happen when s are abusive May occur with unwanted s (SPAM) Arises if conversations in instant messenger turn hostile May occur if talk in online forums becomes threatening 18

Is a form of cybercrime where offensive letters are sent through Involve s including the following: –racism prejudice –sexism Can result in jail time 19 A Washington man was sent to jail for 41 months after he was convicted of sending at least 700 people hate mail.

Is Internet harassment Tips for dealing with a cyberbully: –take a break to reduce tension and calm down –cut off all communication with the cyberbully –tell an adult 20

Should be reported to the following authorities depending on the seriousness of the crime: –Federal Bureau of Investigation –U.S. Secret Service –IC3 Internet Crime Complaint Center 21

Protect your personal information Use anti-virus software Backup important files Learn who to contact if cybercrime occurs 22

Protect your Social Security number - use it only when absolutely required Secure your trash by the following: - cutting up credit cards, tearing up receipts and shredding bank statements Safeguard your passwords - place passwords on your vital accounts - use a combination of letters and numbers to increase security 23

Are small files stored on your computer Saved when a user visits Web sites Collect information used for: –customizing Web sites –collecting demographic information for advertisers –tracking user preferences 24

Could be considered an invasion of privacy Track which Web sites you visit Track where you go on the Web site Can be pulled from multiple sources to build a “profile” of your habits –users may be unaware any of these actions are taking place 25

Are useful for customizing advertisements –prevent young people from being targeted with walkers and the elderly do not end up with banner ads for skydiving 26 At what point do cookies go from helping advertisers to invading your privacy?

Is a security measure used on today’s Internet Is labeled as SSL –Secure Sockets Layer Insures data is secure Is shown as a lock in the right hand corner of a browser Assures the site is authentic and not a fake, deterring phishers Is common in banks and other financial institutions 27

Protect an authors original work –automatically held when a work is created –denoted by the symbol © Provide protection only in the United States No longer require the symbol to be protected Are no longer valid on works created before 1989 Are automatic on any work produced 28

Professional productions –95 years from publication or 120 years from creation, whichever is shorter Individual productions –protected for life of author plus 70 years after authors death 29

30 CopyrightsPatentsTrademarks protect original works protect inventions and discoveries protect words or symbols used to identify the source of goods and services Collectively copyrights, patents and trademarks are known as “intellectual property”

Are governed by the Fourth Amendment to the U.S. Constitution –because computers are historically young, future court decisions will become landmark cases 31 The Fourth Amendment: -designed to control searches and seizures of homes and property -will now be adapted and applied to searches and seizures of computers

Created the Identity Theft Program in 1998 to handle the skyrocketing increase of identity theft reports Regulates identity theft Handles identity theft complaints at FTC.gov 32