Presentation on theme: "CSEC INFORMATION TECHNOLOGY"— Presentation transcript:
1 CSEC INFORMATION TECHNOLOGY MISUSE OFINFORMATION
2 This is a WEB QUEST On the MISUSE OF INFORMATION
3 SOME OF THE WAYS IN WHICH INFORMATION CAN BE MISUSED Violation of privacyPropagandaSoftware piracyComputer fraudElectronic eavesdroppingIndustrial espionageSurveillanceIdentity theftCredit card fraud
4 Working in pairs you are required to conduct in-depth research on each area and document your findings on the sheets provided. The following slide lists the questions you must answer. Please write them down
5 Questions : 1. What is…. 2. Is it illegal. 3 Questions : 1. What is…? 2. Is it illegal? 3. What are the negative effects? 4. What role does the computer play in …? 5. One example is … 6. How can one protect ones self from …?
6 The following slides contain resources on the www that will help you as your research these topics. Note that this list is not exhaustive and your are expected to locate others on your own in order to complete your assignment.
7 When you are through (at the end of the hour) you must email your file to email@example.com
8 VIOLATION OF PRIVACY/644-9.htmdictionary.org/vi/violation+of+privacy.htmlses/ViolationofPrivacy/tabid/108/language/en- US/Default.aspx
Your consent to our cookies if you continue to use this website.