1
1.To discover ethical issues in electronic media and the Internet. 2.To identify different areas of Internet crime. 3.To assess where one should go to report Internet crime. 4.To recommend computer security measures to students. 2
One in five Web surfing children have been sexually solicited online –Journal of the American Medical Association 35% of software today is used without licenses Nine million Americans will have their identity stolen this year Federal Trade Commission: identity-theft.html 3
The study of moral values and rules in electronic media and the Internet 4
pirating online predators hacking identity theft wire fraud phishing counterfeit auctions spyware viruses password trafficking internet harassment cyber bullying hate mail copyright infringement 5 Are needed to avoid the spread of electronic crimes, such as:
Is defined as any crime involving computers including: –pirating –online predators –cracking –identity theft –wire fraud –phishing –counterfeiting goods online –creating malicious viruses –stealing passwords –Internet harassment –cyberbullying 6
Is the illegal stealing, copying or exchanging of media including: –software –movies –music Accounts for almost 35% of software today Can result in fines of millions of dollars 7
Take advantage of children by: –using instant messaging, and social network sites –gaining victims trust and engaging in sexually explicit conversations –trying to arrange face-to-face meetings 8
Is modifying electronics such as an Xbox ®, cell phone or iPod ® Hacker: an individual who alters electronics legally –someone who modifies their computer for better performance Cracker: an individual who illegally alters computer hardware or breaches computer systems –crackers are often mislabeled “hackers” in mass- media 9
Is when someone steals your personal information to commit fraud or other crimes including: –your name –credit card information –Social Security number Nine million Americans have their identities stolen each year 10
Is illegally stealing money or property using interstate “wires” Is considered a federal crime because the crime goes across state lines 11
Involves s pretending to originate from banks or online retailers such as eBay ® or PayPal ® Looks very similar to an actual originating from a retailer Tries to gather financial information, user names and passwords from victims –if recipient visits the fake retailer they may receive malicious viruses or spyware 12
Have become hotbeds for counterfeit goods –eBay ® has recently been sued by companies for auctioning counterfeit goods. These companies include the following: L’Oreal ® Louis Vuitton ® Dior Couture ® Gucci ® 13
Is software installed discreetly altering the usability of a computer Usually installs with other programs, such as file sharing programs Includes side-effects such as pop-up advertisements and crashing of the computer 14
Are software programs which spread from computer to computer Are malicious in nature Can delete information on your computer Spread through and Internet downloads Alter the normal functions of your computer 15
Steps to prevent viruses include: –use virus protection software –implement an Internet firewall, a buffer between your computer and the Internet –install security updates –be careful opening and downloading materials online 16
Is the illegal obtaining, giving or selling of passwords 17 An American Eagle ® employee was indicted for giving out passwords to the American Eagle ® computer network to a Yahoo ® message board. The indictment carries a penalty of 11 years in prison and/or a $350,000 fine.
Is the online counterpart of harassment Can happen when s are abusive May occur with unwanted s (SPAM) Arises if conversations in instant messenger turn hostile May occur if talk in online forums becomes threatening 18
Is a form of cybercrime where offensive letters are sent through Involve s including the following: –racism prejudice –sexism Can result in jail time 19 A Washington man was sent to jail for 41 months after he was convicted of sending at least 700 people hate mail.
Is Internet harassment Tips for dealing with a cyberbully: –take a break to reduce tension and calm down –cut off all communication with the cyberbully –tell an adult 20
Should be reported to the following authorities depending on the seriousness of the crime: –Federal Bureau of Investigation –U.S. Secret Service –IC3 Internet Crime Complaint Center 21
Protect your personal information Use anti-virus software Backup important files Learn who to contact if cybercrime occurs 22
Protect your Social Security number - use it only when absolutely required Secure your trash by the following: - cutting up credit cards, tearing up receipts and shredding bank statements Safeguard your passwords - place passwords on your vital accounts - use a combination of letters and numbers to increase security 23
Are small files stored on your computer Saved when a user visits Web sites Collect information used for: –customizing Web sites –collecting demographic information for advertisers –tracking user preferences 24
Could be considered an invasion of privacy Track which Web sites you visit Track where you go on the Web site Can be pulled from multiple sources to build a “profile” of your habits –users may be unaware any of these actions are taking place 25
Are useful for customizing advertisements –prevent young people from being targeted with walkers and the elderly do not end up with banner ads for skydiving 26 At what point do cookies go from helping advertisers to invading your privacy?
Is a security measure used on today’s Internet Is labeled as SSL –Secure Sockets Layer Insures data is secure Is shown as a lock in the right hand corner of a browser Assures the site is authentic and not a fake, deterring phishers Is common in banks and other financial institutions 27
Protect an authors original work –automatically held when a work is created –denoted by the symbol © Provide protection only in the United States No longer require the symbol to be protected Are no longer valid on works created before 1989 Are automatic on any work produced 28
Professional productions –95 years from publication or 120 years from creation, whichever is shorter Individual productions –protected for life of author plus 70 years after authors death 29
30 CopyrightsPatentsTrademarks protect original works protect inventions and discoveries protect words or symbols used to identify the source of goods and services Collectively copyrights, patents and trademarks are known as “intellectual property”
Are governed by the Fourth Amendment to the U.S. Constitution –because computers are historically young, future court decisions will become landmark cases 31 The Fourth Amendment: -designed to control searches and seizures of homes and property -will now be adapted and applied to searches and seizures of computers
Created the Identity Theft Program in 1998 to handle the skyrocketing increase of identity theft reports Regulates identity theft Handles identity theft complaints at FTC.gov 32