1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.

Slides:



Advertisements
Similar presentations
Protecting People and Information
Advertisements

How to protect yourself, your computer, and others on the internet
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Crime and Security in the Networked Economy Part 4.
Breaking Trust On The Internet
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
1 COMPUTER SECURITY AND ETHICS Chapter Five. Computer Security Risks 2.
Chapter 17 Legal, Ethical, and Social Impacts of EC.
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
Security, Privacy, and Ethics Online Computer Crimes.
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Chapter 10 Privacy and Security McGraw-Hill
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
SPYWARE  Do you know where your personal information is?
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
How It Applies In A Virtual World
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Issues Raised by ICT.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Lecture 5 ref: Chapter 16 Regulatory, Ethical, and Compliance Issues in EC PREPARED BY L. Nouf Almujally 1.
Chapter 11 Security and Privacy: Computers and the Internet.
Protecting People and Information: Threats and Safeguards
BUS1MIS Management Information Systems Semester 1, 2012 Week 7 Lecture 1.
Unit 19 INTERNET SECURITY
Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-1 ACS 1803 Lecture Outline 15 ETHICS AND COMPUTER CRIME.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
E-commerce Vocabulary Terms. E-commerce Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the Internet.
E-commerce Vocabulary Terms By: Laura Kinchen. Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the.
Computer Security. 2 Computer Crime and Cybercrime Computer crimes occur when intruders gain unauthorized access to computer systems Cybercrime is crime.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Security, Social and Legal Issues Regarding Software and Internet.
Electronic Marketing: Integrating Electronic Resources into the Marketing Process, 2e 11/5/2015  2004 Joel Reedy and Shauna Schullo Electronic Marketing.
Topic 5: Basic Security.
Internet Safety Internet Safety LPM
Cybercrime What is it, what does it cost, & how is it regulated?
Alert against Online Shopping Frauds. Online Shopping A form of electronic commerce whereby consumers directly buy goods or services from a seller over.
Computer Skills and Applications Computer Security.
Internet safety By Suman Nazir
SPYWARE Spyware, a new class of malicious programs, is just as dangerous as viruses but generally Is underreported. The issues are no longer those of privacy,
DATA ACCURACY- one of the issues of computer ethics. Providing inaccurate data input results in erroneous information & decision making. Information on.
INTRODUCTION & QUESTIONS.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Security and Ethics Safeguards and Codes of Conduct.
Cybersecurity Test Review Introduction to Digital Technology.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Issues for Computer Users, Electronic Devices, Computer and Safety.
CIW Lesson 8 Part B. Malicious Software application that installs hidden services on systems term for software whose specific intent is to harm computer.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Security, Social and Legal Issues Regarding Software and Internet
Computer Security INSM 180- Belasco Bryant and Stratton Fall 2011
3.6 Fundamentals of cyber security
IT Security  .
BCT 2.00 Analyze Technology Issues
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
Social Issues in Computing
Social Issues in Computing
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Privacy, Security, and Ethics
Presentation transcript:

1 Law, Ethical Impacts, and Internet Security

2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered to be right and wrong What is unethical in one culture may be perfectly acceptable in another

3 Legal Issues vs. Ethical Issues The Major Ethical and Legal Issues Discussed in this lecture Privacy Intellectual property rights and online piracy Unsolicited electronic ads and spamming Free speech versus censorship Consumer and merchant protection against fraud

4 Privacy Privacy — the right to be left alone and the right to be free of unreasonable personal intrusions Two rules have been followed closely in court decisions: The right of privacy is not absolute. Privacy must be balanced against the needs of society The public ’ s right to know is superior to the individual ’ s right of privacy

5 Web Site Registration Cookies Spyware and Similar Methods Privacy of Employees Privacy of Patients Collecting Information about Individuals

6 Cookies Allows a web site to store data on the user's PC. When the customer returns to the website, the cookies can be used to find what the customer did in the past.

7 What is Spyware? Software that gathers user's information without the user's knowledge. Originally designed to allow freeware authors to make money on their products Spyware stays on the user's hard drive and continually tracks the user's actions, periodically sending information on the user's activities to the owner of the spyware and then used for advertising purposes.

8 Intellectual Property Rights Intellectual property (IP) — creations of the mind, such as inventions, literary and artistic works, and symbols, names, images, and designs used in commerce © ®

9 Unsolicited Electronic Ads: Problems and Solutions Spamming unsolicited commercial (UCE) The use of to send unwanted ads

10 Free Speech Versus Censorship and Other Legal Issues On the Internet, censorship refers to government ’ s attempt to control, in one way or another, the material that is presented.

11 EC Fraud -Identity Theft A criminal act in which someone presents himself (herself) as another person and uses that person ’ s social security number, bank account numbers, and so on, to obtain loans, purchase items, sell stocks, etc.

12 EC Fraud-Phishing It refers to a person or a group of cyber-criminals who use , pop- up messages or an imitation or copy of an existing legitimate webpage to trick users into providing sensitive personal information such as credit card numbers, bank account numbers, and passwords.

13 Security Issues Hacker He is a person who accesses networks and the computers on the network without authorization. Firewall It is a computer program that protects a computer or network from unauthorized access by hackers. Computer Virus It is a computer program that damages your computer system. Antivirus It is a computer program that protects a computer from viruses. Transactional risks Data can be stolen when exchanged, encryption can be used to protect data while it is transferred Encryption is changing readable data to unreadable data to prevent steal

14 Types of Technical Attacks Denial-of-Service attacks an attack on a web site in which an attacker uses specialized software to send a flood of data packets to the target computer with the aim of overloading its resources. Malicious Code: Virus Trojan Horses: a program that appears to have a useful function but that contains a hidden function that presents a security risk.

15 Other Security and Privacy Concerns in EC Some of the methods used in market research and for tracking customers: Cookies Spyware Transaction logs: created by a log file and records the used activities at the company's web site (where visitors are coming from, how often they return, how they navigate through a site and data from shopping cart)