Presentation is loading. Please wait.

Presentation is loading. Please wait.

E-Ethics.

Similar presentations


Presentation on theme: "E-Ethics."— Presentation transcript:

1 E-Ethics

2 Objectives To discover ethical issues in electronic media and the Internet. To identify different areas of Internet crime. To assess where one should go to report Internet crime. To recommend computer security measures to students.

3 Did You Know? One in five Web surfing children have been sexually solicited online Journal of the American Medical Association 35% of software today is used without licenses Nine million Americans will have their identity stolen this year Federal Trade Commission:

4 E-Ethics The study of moral values and rules in electronic media and the Internet

5 E-Ethics Are needed to avoid the spread of electronic crimes, such as:
pirating online predators hacking identity theft wire fraud phishing counterfeit auctions spyware viruses password trafficking internet harassment cyber bullying hate mail copyright infringement

6 Cybercrime Is defined as any crime involving computers including:
pirating online predators cracking identity theft wire fraud phishing counterfeiting goods online creating malicious viruses stealing passwords Internet harassment cyberbullying

7 Pirating Is the illegal stealing, copying or exchanging of media including: software movies music Accounts for almost 35% of software today Can result in fines of millions of dollars

8 Predators Take advantage of teens by:
using instant messaging, and social network sites gaining victims trust and engaging in sexually explicit conversations trying to arrange face-to-face meetings

9 Hacking Is modifying electronics such as an Xbox®, cell phone or iPod®
Hacker: an individual who alters electronics legally someone who modifies their computer for better performance Security Cracker: an individual who illegally alters computer hardware or breaches computer systems crackers are often mislabeled “hackers” in mass-media

10 Identity Theft Is when someone steals your personal information including: your name credit card information Social Security number Nine million Americans have their identities stolen each year

11 Wire Fraud Scams that take place over interstate wires, such as telemarketing fraud, phishing, or spam related schemes Considered a federal crime because the crime goes across state lines Example

12 Phishing Example Amazon Example Netflix
s pretending to originate from banks or online retailers such as Amazon Looks very similar to an actual originating from retailer Tries to gather financial information, user names and passwords from victims if recipient visits the fake retailer they may receive malicious viruses or spyware Example Amazon Example Netflix

13 Online Auctions Example Have become hotbeds for counterfeit goods
eBay ® has recently been sued by companies for auctioning counterfeit goods. These companies include the following: L’Oreal ® Louis Vuitton ® Dior Couture ® Gucci Example

14 Password Trafficking Is the illegal obtaining, giving or selling of passwords An American Eagle® employee was indicted for giving out passwords to the American Eagle® computer network to a Yahoo® message board. The indictment carries a penalty of 11 years in prison and/or a $350,000 fine.

15 Internet Harassment When e-mails or texts are abusive
Can be unwanted s (SPAM) or texts Arises if conversations text turn hostile Talk becomes threatening

16 Hate Mail Offensive messages sent through e-mail
Involve s including the following:  racial prejudice Sexism Religious hatred Can result in jail time A Washington man was sent to jail for 41 months after he was convicted of sending at least 700 people hate mail.

17 Cyberbullying Is Internet harassment
Tips for dealing with a cyberbully: take a break to reduce tension and calm down cut off all communication with the cyberbully tell an adult

18 Cybercrime Should be reported to the following authorities depending on the seriousness of the crime: Federal Bureau of Investigation U.S. Secret Service IC3 Internet Crime Complaint Center

19 Tips to Avoid Cybercrime
Protect your personal information Use anti-virus software Back up important files Learn who to contact if cybercrime occurs

20 Prevent Identity Theft
Protect your Social Security number use it only when absolutely required  Secure your trash by the following: cutting up old credit cards tearing up receipts shredding bank statements Safeguard your passwords - use a combination of letters and numbers to increase security

21 Federal Trade Commission
Created the Identity Theft Program in 1998 to handle the skyrocketing increase of identity theft reports Handles identity theft complaints at

22 IC3 (Internet Crime Complaint Center)
Is a partnership between the FBI and the National White Collar Crime Center File complaints about cybercrime at

23 United States Computer Emergency Readiness Team (USCERT)
Is a partnership between the Department of Homeland Security and the public and private sectors Protects our nation against cyber attacks examine cyber attacks spread warnings to public organize response actions

24 Copyrights Protect an author’s original work
Are automatic on any work produced Provide protection only in the United States No longer require the symbol to be protected

25 Stop Here

26 Cookies Are small files stored on your computer
Collect information used for: customizing Web sites collecting demographic information for advertisers tracking user preferences

27 Spyware Is software installed discreetly altering the usability of a computer Usually installs with other programs, such as file sharing programs Includes side-effects such as pop-up advertisements and crashing of the computer

28 Viruses Are software programs which spread from computer to computer
Are malicious in nature Can delete information on your computer Spread through and Internet downloads Alter the normal functions of your computer

29 Virus Prevention Steps to prevent viruses include:
use virus protection software implement an Internet firewall, a buffer between your computer and the Internet install security updates be careful opening and downloading materials online

30 E-Ethics Example Kevin illegally downloaded a new rock album using the Internet. He says corporations and rock stars already have enough money and he is short on cash. His friend Scott thinks although the people who get the money from the album are wealthy, stealing is stealing. Scott plans to buy the album legally. - Who is right in your mind? Who is right under law? - What would you do? - What would you say if you were Kevin and were caught?

31 E-Ethics Example Jack is 13 and wants to register for MySpace®. While filling out the registration form, he lies and says he is 15 to start an account. - What issues might younger children face on the Internet? - Are they more likely to be victims of online predators? - Is this his parents’ problem for not monitoring his computer use or MySpace® problem for not having enough safeguards to verify Jack’s age?

32 Review E-ethics avoid the spread of illegal electronic acts
Cybercrime can be avoided by protecting personal information, using anti-virus software, backing up important files, and knowing who to call in case of a crime Cookies are small files stored on your computer and can be good or bad depending on their use Copyrights vary in duration and protect an author’s original work There are several regulations and agencies that focus on e-ethics and cyber space protection

33 Quiz Define E-ethics in your own words. What is pirating?
What is the difference between a hacker and a cracker? Electronic searches and seizures are regulated by the ______ amendment. first second third fourth 1. Answers will vary 2. The illegal stealing, copying or spreading of software, movies and music 3. A cracker is malicious in intent. 4. D

34 Quiz What is cybercrime and what are steps to protect yourself?
What is the IC3 and what does it stand for? Do you have to file for a copyright to obtain copyright protection? 5. Cybercrime is any crime involving a computer. To protect yourself take care of your personal information, use anti-virus programs, back-up your files and contact the proper authorities if you believe you have become a victim of cybercrime. 6. IC3 stands for the Internet Crime Complaint Center, a place where individuals can complain about a cybercrime. 7. No, copyright protection is granted when a work is created.

35 Quiz Why do some consider cookies to be good while others see them as an invasion of privacy? Which of the following companies are frequently impersonated by phishers? banks online auctions Web sites needing personal information all of the above What age group is associated with cyberbullying? Why might one cyberbully? 8. Answers will vary 9. D 10. Teens and children. Answers will vary

36 Resources Computer Crime & Intellectual Property Section. (2008). Retrieved October 6, 2008, from United States Department of Justice: Fighting Back Against Identity Theft. (2008). Retrieved October 6, 2008, from Federal Trade Commission: Online predators: Help minimize the risk. (2007, January 15). Retrieved October 6, 2008, from Microsoft: Princeton University. (2006). Retrieved October 6, 2008, from WordNet: SEARCHES AND SEIZURES IN A DIGITAL WORLD. (2005). Retrieved October 6, 2008, from Hardvard Law Review:

37 Resources (2008, September 3). Retrieved October 6, 2008, from U.S. Copyright Office: (2008). Retrieved October 6, 2008, from StopFakes.Gov: (2008). Retrieved October 6, 2008, from APWG: (2008). Retrieved October 6, 2008, from Stop Cyberbullying: What is spyware? (2008). Retrieved October 6, 2008, from Microsoft.com:

38 Resources ( ). Retrieved October 6, 2008, from CookieCentral.Com: 7 Practices for Computer Security. (2008). Retrieved October 6, 2008, from OnGuard Online: Former Employee of American Eagle Outfitters Indicted on Charges of Password Trafficking and Computer Damage. (2003, February 26). Retrieved October 6, 2008, from U.S. Department of Justice: McGann, C. (2003, September 13). Man sent to prison in hat case. Seattle PI . What is SSL? ( ). Retrieved October 6, 2008, from SSL.Com:

39 Resources (n.d.). Retrieved October 6, 2008, from Internet Crime Complaint Center: Cyberbullying on the Internet. (2005). Retrieved October 6, 2008, from Cyberbullying: How to help prevent computer viruses. (2006, September 23). Retrieved October 6, 2008, from Microsoft.Com: What is a Computer Virus? (2006, October 23). Retrieved October 6, 2008, from Microsoft.Com:

40 Resources (2008). Retrieved October 7, 2008, from US-CERT: Federal Trade Commission. ( ). Retrieved October 7, 2008, from FTC Overview of the Identity Theft Program: Mitchell, K.J., Finkelhor, D., & Wolak, J. (2001). Risk factors & impact of online solicitation of youth. JAMA, 285, 23: STOP Initiative Targets Piracy, Counterfeit Trade . (2004, October 4). Retrieved October 7, 2008, from The United States Mission to the European Union:

41 Acknowledgements Production Coordinator: Production Manager:
Justin Jones Production Manager: Dusty Moore Project Coordinator: Maggie Bigham Executive Producers: Gordon Davis, Ph.D., Jeff Lansdell Graphic Designer: Ann Adams © MMIX CEV Multimedia, Ltd.


Download ppt "E-Ethics."

Similar presentations


Ads by Google