Download presentation
Presentation is loading. Please wait.
1
E-Ethics
2
Objectives To discover ethical issues in electronic media and the Internet. To identify different areas of Internet crime. To assess where one should go to report Internet crime. To recommend computer security measures to students.
3
Did You Know? One in five Web surfing children have been sexually solicited online Journal of the American Medical Association 35% of software today is used without licenses Nine million Americans will have their identity stolen this year Federal Trade Commission:
4
E-Ethics The study of moral values and rules in electronic media and the Internet
5
E-Ethics Are needed to avoid the spread of electronic crimes, such as:
pirating online predators hacking identity theft wire fraud phishing counterfeit auctions spyware viruses password trafficking internet harassment cyber bullying hate mail copyright infringement
6
Cybercrime Is defined as any crime involving computers including:
pirating online predators cracking identity theft wire fraud phishing counterfeiting goods online creating malicious viruses stealing passwords Internet harassment cyberbullying
7
Pirating Is the illegal stealing, copying or exchanging of media including: software movies music Accounts for almost 35% of software today Can result in fines of millions of dollars
8
Predators Take advantage of children by:
using instant messaging, and social network sites gaining victims trust and engaging in sexually explicit conversations trying to arrange face-to-face meetings
9
Hacking Is modifying electronics such as an Xbox®, cell phone or iPod®
Hacker: an individual who alters electronics legally someone who modifies their computer for better performance Cracker: an individual who illegally alters computer hardware or breaches computer systems crackers are often mislabeled “hackers” in mass-media
10
Identity Theft Is when someone steals your personal information to commit fraud or other crimes including: your name credit card information Social Security number Nine million Americans have their identities stolen each year
11
Wire Fraud Is illegally stealing money or property using interstate “wires” through companies like Western Union and Moneygram Is considered a federal crime because the crime goes across state lines
12
Phishing Involves s pretending to originate from banks or online retailers such as eBay ® or PayPal ® Looks very similar to an actual originating from retailer Tries to gather financial information, user names and passwords from victims if recipient visits the fake retailer they may receive malicious viruses or spyware
13
Online Auctions Have become hotbeds for counterfeit goods
eBay ® has recently been sued by companies for auctioning counterfeit goods. These companies include the following: L’Oreal ® Louis Vuitton ® Dior Couture ® Gucci ®
14
Spyware Is software installed from a Trojan Horse to discreetly altering the usability of a computer Usually installs with other programs, such as file sharing programs Includes side-effects such as pop-up advertisements and crashing of the computer
15
Viruses Are software programs which spread from computer to computer
Are malicious in nature Can delete information on your computer Spread through and Internet downloads Alter the normal functions of your computer
16
Virus Prevention Steps to prevent viruses include:
use virus protection software implement an Internet firewall, a buffer between your computer and the Internet install security updates be careful opening and downloading materials online
17
Password Trafficking Is the illegal obtaining, giving or selling of passwords An American Eagle® employee was indicted for giving out passwords to the American Eagle® computer network to a Yahoo® message board. The indictment carries a penalty of 11 years in prison and/or a $350,000 fine.
18
Internet Harassment Is the online counterpart of harassment
Can happen when s are abusive May occur with unwanted s (SPAM) Arises if conversations in instant messenger turn hostile May occur if talk in online forums becomes threatening
19
Hate Mail Is a form of cybercrime where offensive letters are sent through Involve s including the following: racism prejudice sexism Can result in jail time A Washington man was sent to jail for 41 months after he was convicted of sending at least 700 people hate mail.
20
Cyberbullying Is Internet harassment
Tips for dealing with a cyberbully: take a break to reduce tension and calm down cut off all communication with the cyberbully tell an adult
21
Cybercrime Report to: Federal Bureau of Investigation
U.S. Secret Service IC3 Internet Crime Complaint Center
22
Tips to Avoid Cybercrime
Protect your personal information Use anti-virus software Back up important files Learn who to contact if cybercrime occurs
23
Prevent Identity Theft
Protect your Social Security number - use it only when absolutely required Secure your trash by the following: - cutting up credit cards, tearing up receipts and shredding bank statements Safeguard your passwords - place passwords on your vital accounts - use a combination of letters and numbers to increase security
24
Cookies Are small files stored on your computer
Saved when a user visits Web sites Collect information used for: customizing Web sites collecting demographic information for advertisers tracking user preferences
25
Bad Cookies Could be considered an invasion of privacy
Track which Web sites you visit Track where you go on the Web site Can be pulled from multiple sources to build a “profile” of your habits users may be unaware any of these actions are taking place
26
Good Cookies Are useful for customizing advertisements
prevent young people from being targeted with walkers and the elderly do not end up with banner ads for skydiving At what point do cookies go from helping advertisers to invading your privacy?
27
Encryption Is a security measure used on today’s Internet
Is labeled as SSL –Secure Sockets Layer Insures data is secure Is shown as a lock in the right hand corner of a browser Assures the site is authentic and not a fake, deterring phishers Is common in banks and other financial institutions
28
Copyrights Protect an authors original work
automatically held when a work is created denoted by the symbol © Provide protection only in the United States No longer require the symbol to be protected Are no longer valid on works created before 1989 Are automatic on any work produced
29
Copyrights vs. Patents vs. Trademarks
protect original works protect inventions and discoveries protect words or symbols used to identify the source of goods and services Collectively copyrights, patents and trademarks are known as “intellectual property” KNOW THE DIFFERENCE BETWEEN THESE.
30
Electronic Search and Seizures
Are governed by the Fourth Amendment to the U.S. Constitution because computers are historically young, future court decisions will become landmark cases MUST have a warrant to search and seize. The Fourth Amendment: designed to control searches and seizures of homes and property will now be adapted and applied to searches and seizures of computers
31
Federal Trade Commission
Created the Identity Theft Program in 1998 to handle the skyrocketing increase of identity theft reports Regulates identity theft Handles identity theft complaints at FTC.gov
32
IC3 Internet Crime Complaint Center
Is a partnership between the FBI and the National White Collar Crime Center serves as a place for individuals and law enforcement to file complaints about cybercrime
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.