3SOME OF THE WAYS IN WHICH INFORMATION CAN BE MISUSED Violation of privacyPropagandaSoftware piracyComputer fraudElectronic eavesdroppingIndustrial espionageSurveillanceIdentity theftCredit card fraud
4Working in pairs you are required to conduct in-depth research on each area and document your findings on the sheets provided. The following slide lists the questions you must answer. Please write them down
5Questions : 1. What is…. 2. Is it illegal. 3 Questions : 1. What is…? 2. Is it illegal? 3. What are the negative effects? 4. What role does the computer play in …? 5. One example is … 6. How can one protect ones self from …?
6The following slides contain resources on the www that will help you as your research these topics. Note that this list is not exhaustive and your are expected to locate others on your own in order to complete your assignment.
7When you are through (at the end of the hour) you must email your file to firstname.lastname@example.org
8VIOLATION OF PRIVACY/644-9.htmdictionary.org/vi/violation+of+privacy.htmlses/ViolationofPrivacy/tabid/108/language/en- US/Default.aspx