Presentation is loading. Please wait.

Presentation is loading. Please wait.

Company LOGO BREAKING TRUST ON THE INTERNET. BY WISDOM.C.AGUNTA. stdno.:127760 & Geoffrey Laah. stdno.:068345.

Similar presentations

Presentation on theme: "Company LOGO BREAKING TRUST ON THE INTERNET. BY WISDOM.C.AGUNTA. stdno.:127760 & Geoffrey Laah. stdno.:068345."— Presentation transcript:

1 Company LOGO BREAKING TRUST ON THE INTERNET. BY WISDOM.C.AGUNTA. stdno.: & Geoffrey Laah. stdno.:068345

2 Way my presentation is going to go: 1. Introduce myself/topic, which I did previously. 2. Introduction to the topic. 3. Into the topic proper 3. Into the topic proper 4. Summary / Conclusion 5. Final Thought. 6. Question Time. ITEC 317

3 INTRODUCTION: First of all, I will start with the definition of trust. Trust is Believe in the reliability, truth, ability, or strength of something. Then this presentation is on the BREAK of that trust in the accept of internet perspective. ITEC 317

4 Breaking Trust on the Internet Identity Theft Phishing and Examples. Chat Room Predators Ethical Evaluations of Police Sting Operations False Information Cyber Bulling ITEC 317

5 Identity Theft Definition: when someone uses your personal information without your permission to commit fraud or other crime. This can be done in various ways like using someones Name. Social security number. Date of birth. Credit card number. Bank account number. Etc. ITEC 317

6 Identity Theft ITEC 317

7 How it Occurs: Good, Old fashioned stealing. ITEC 317

8 How it Occurs: Dumpster diving. Skimming: The act of using a skimmer to illegally collect data from the magnetic stripe of a credit, debit or ATM card. ITEC 317

9 How it Occurs: Phishing: s that appear to be from IRS requesting you to confirm information. s that are thanking you for a recent purchase (or something you didnt buy). Phone Phishing ITEC 317 Examples of Phishing:

10 ITEC 317

11 Chat-Room Predators: Chat room : supports real-time discussions among many people connected to network Some pedophiles(any sexual interest in children or the act of child sexual abuse, often termed "pedophilic behavior".) meeting children. Through chat rooms. Police countering with string operations. ITEC 317

12 Ethical Evaluations of Strings Utilitarian Evaluation: in normative ethics, a tradition stemming from the late 18th- and 19th-century English philosophers and economists Jeremy Bentham and John Stuart Mill that an action is right if it tends to promote happiness and wrong if it tends to produce the reverse of happinessnot just the happiness of the performer of the action but also that of everyone affected by it. Such a theory is in opposition to egoism, the view that a person should pursue his own self-interest, even at the expense of others, and to any ethical theory that regards some acts or types of acts as right or wrong independently of their consequences.ethicsJeremy BenthamJohn Stuart Millhappinessegoism ITEC 317

13 Ethical Evaluations of Strings Kantian Evaluation Social contract Theory Evaluation: is the view that persons moral and/or political obligations are dependent upon a contract or agreement among them to form the society in which they live. ITEC 317

14 Cyber bullying CYBER BULLYING TYPES Flaming: Online fights using electronic messages with angry and vulgar language Harassment: Repeatedly sending offensive, rude, and insulting messages ITEC 317 Use of the Internet or phone system to inflict psychological harm

15 CYBER BULLYING TYPES Cyber stalking: Repeatedly sending messages that include threats of harm or are highly intimidating. Engaging in other on-line activities that make a person afraid for his or her own safety Denigration: Dissing someone online. Sending or posting cruel gossip or rumors about a person to damage his or her reputation or friendships Impersonation: Pretending to be someone else and sending or posting material online that makes that person look bad, gets that person in trouble or danger, or damages that persons reputation or friendships ITEC 317

16 CYBER BULLYING TYPES Outing and Trickery: Sharing someones secret or embarrassing information online. Tricking someone into revealing secrets or embarrassing information which is then shared online Exclusion: Intentionally excluding someone from an on-line group, like a buddy list ITEC 317

17 CYBER BULLYING LEGAL ISSUES What Everyone Needs to Know About Cyber Bullying (Aftab) Many cases of child cyber bullying, like adult counterparts of cyber-harassment, not criminal Law Enforcement needs to be aware of: Difference between annoying and dangerous communications How to investigate a cyber crime How to obtain information from an ISP ITEC 317

18 A Cyberbullying Suicide Story 6 - Ryan Halligan Story o o Cyberbullying - (British) Cyber Bullying - No dialogue ITEC 317 Watch video on Cyber bullying :

19 Question For You To Answer Are you a cyber bully? ITEC 317

20 False information: Quality of web-based information varies widely. Other media also have information of varying quality like The New York Times v. The Nation Enquirer 60muintes v. Conspiracy Theory Google (panda, penguin) attempts to reward quality of web-based content. Ranking uses voting algorithm. If many links point to a page goggle search engine ranks the page higher in web-based content. ITEC 317

21 Summary In summary all we have been taking about is BREAKING TRUST ON THE INTERNET. Deter, Detect, Defend (At Home and At Work). Deter (how do you prevent all of these) Detect (how do you find out ) Defend (restoring your good name) ITEC 317

22 Final thoughts: When in doubt, ask or call back Know this, your bank will NEVER ask you for account number or password if they initiated the communication. If you notice any sign of cyber bullying please go the nearest police station and report the case or let me say HAND OVER the case to the police officers. ITEC 317


24 NA ONLY ME?? ITEC 317

Download ppt "Company LOGO BREAKING TRUST ON THE INTERNET. BY WISDOM.C.AGUNTA. stdno.:127760 & Geoffrey Laah. stdno.:068345."

Similar presentations

Ads by Google