Download presentation
Presentation is loading. Please wait.
Published byLorraine McCarthy Modified over 9 years ago
2
Types of accessibility Video Facts Argument Government Statistics
3
Social networking Sites › Facebook › Twitter › LinkedIn Telecommunications Companies › Comcast › Verizon Phishing Scams › Website Pop ups › Email
5
Information accessibility › Information is recorded and transferred through the internet Privacy › No single law in the US that provide a comprehensive treatment of data protection (Stratford & Stratford, 2011)
6
Ease of access › No privacy › damage Safety › Stalkers › Access to children Loss of ownership › Personal information belongs to the site entered Everyone is entitled to an opinion
7
Where is the line? › No boundary identified › Intangible place Who can you trust? › This the perception of the individual › No one
8
Everyone must educate themselves (Cyberethics)
9
Cyberethics - refers to a code of safe and responsible behavior for the Internet community. Privacy act of 1974 – is itemized to protect the rights of individuals DOJ, 2011
10
This chart outlines identity theft statistics by region. These statistics have a direct relationship to identity theft attempts. ITAC, 2011
11
Questions
12
DOJ. Cyberethics. (2011): Retrieved from http://www.cybercrime.gov/cyberethics.htm http://www.cybercrime.gov/cyberethics.htm FTC. Consumer alert. How not to get hooked by Phishing Scam. (2011) Retrieved from http://www.ftc.gov/bcp/edu/pubs/consumer/alerts/ alt127.shtm http://www.ftc.gov/bcp/edu/pubs/consumer/alerts/ alt127.shtm Stratford, Jean, Stratford, Juri. Data protection and privacy in the US and Europe (2011). N.pag.Web 20 Nov. 2011. ITAC. Research and Statistics. (2011) Retrieved from http://www.identitytheftassistance.org/pageview.ph p?cateid=47 http://www.identitytheftassistance.org/pageview.ph p?cateid=47
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.