Download presentation
Presentation is loading. Please wait.
Published byDiane Parsons Modified over 9 years ago
2
Ways in which Information can be Misused
3
Misuses Of Information THE Misuse of information By: Antoinette Harris, Nickietha Phinn, Ashley Williams and Racquel Murray
4
SUB-TOPICS Ways in which information can be misused and computer crimes Software piracy Industrial Espionage Computer Fraud Electronic Eavesdropping SSurveillance
5
Misuses Of Information 1. Software piracy Software Piracy is the unauthorised use, lending, copying, downloading, selling or otherwise distribution of computer programs without the permission of the software licence owner
6
When we ‘buy’ software all we are really buying is permission to use it, usually on one computer. We do not actually own the software, it remains the property of the programmer or company that created it. We get a licence to use it. To share it or sell it to anyone else is a violation of the copyright law and is called software piracy. Misuses Of Information
7
Copyright infringement of this kind is extremely common. Most countries have copyright laws which apply to software, but they are better enforced in some countries than others.
8
Misuses Of Information 2. Industrial Espionage This is an attempt to access information about a company’s plans, product, clients or trade secrets. While this may have nothing to do with technology, the use of the computer makes industrial espionage easier. Competitors can hack into the computer network of another organisation and illegally access their information.
9
Industrial Espionage Trade Secrets Bribery Blackmail Technological Surveillance Industrial espionage can involve :
10
3. Computer Fraud Computer fraud is the act of using a computer to commit fraud (A deception deliberately practiced in order to secure unfair or unlawful gain.). Computer fraud is a type of computer crime. A computer crime is using the computer to perform an illegal act or using the computer illegally.
11
4. Electronic eavesdropping Electronic eavesdropping is the term applied to monitoring electronic radiation from computer equipment and reconstituting it into discernible information i.e. using electronic means to monitor communication between parties without their permission.
12
Electronic eavesdropping Most common type is wiretapping. Wiretapping monitors telephonic and telegraphic communication. It was forbidden in the US as early as 1862. In England permission to wiretap is only given in cases of serious offense. Intercepting and spying on emails is also electronic eavesdropping
13
Misuses Of Information Surveillance is the observation of people and their activities from a distance by means of electronic equipment or interception of electronically transmitted information Misuses Of Information 5. Surveillance
14
Misuses Of Information Surveillance can be done using hardware or software These methods secretly monitors user’s action without their knowledge. They acquire private information about an person or organization. Misuses Of Information 5. Surveillance
15
Misuses Of Information Surveillance The hardware method key logging The software method Spyware
16
Misuses Of Information Fun trivia W hat is Industrial Piracy? What is Industrial Espionage? What are the two(2) types of surveillance?
17
Misuses Of Information Please do Be careful what you do on your computer. Do not ever misuse information. Report fraud and theft. Wiretapping is illegal.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.