Presentation is loading. Please wait.

Presentation is loading. Please wait.

Home Research II - 2008 Instructional Technology Program East Stroudsburg University Yvette Raven.

Similar presentations


Presentation on theme: "Home Research II - 2008 Instructional Technology Program East Stroudsburg University Yvette Raven."— Presentation transcript:

1

2 Home Research II - 2008 Instructional Technology Program East Stroudsburg University Yvette Raven

3 NEXT  previous  HOME How We Use the Internet Social Networking has become an important part of why we use the Internet. Sharing information with people around you and in the world may be the goal, but also the reason why personal information and privacy are lost.

4 NEXT  previous  HOME How We Use the Internet How do you determine when it is safe to share information? This module will discuss how to evaluate websites as being trusted, reliable, and secure. Using Facebook®, a popular social networking site, this lesson will discuss that site.

5 NEXT  previous  HOME How We Use the Internet What is the Internet? Most people know what the Internet is because of how they use it. We use it for email, surfing “the net”, connecting to friends through social networks, text messaging, shopping at our favorite stores or watching videos on YouTube®.

6 NEXT  previous  HOME How We Use the Internet How do we use the Internet? Send email (communicate) Send instant messages (IM) (real-time) Text messaging with cell phones Buy and sell on web sites

7 NEXT  previous  HOME How We Use the Internet How do we use the Internet? Social networking, i.e., MySpace®, FaceBook® View/upload videos to YouTube® Do research at a library in another state or country.

8 NEXT  previous  HOME Where is the Internet? The Internet is not a place—It is a Network that allows computers to interact with each other.

9 NEXT  previous  HOME Where is the Internet? The Internet is a “what”. It is the Network we connect to to view websites, and send/receive email and text messages. We use the Internet to connect to people, places, and things.

10 NEXT  previous  HOME Rules of the Internet The Rules of the Internet Internet Service Providers (ISP) sell you access to the Network. No one polices the Internet. The Internet is global.

11 NEXT  previous  HOME The Internet is a Networkthat we connect to. We use the Internet to connect to the World Wide Web. What is the Internet?

12 NEXT  previous  HOME What is the World Wide Web? The World Wide Web are the websites that you access using the Internet. It is the destination. Websites are known by web addresses that begin with “www”.

13 NEXT  previous  HOME What is the World Wide Web? Anyone with any skill can create and publish a website. How many websites are there? At last count, a few billion. Remember, the Internet is global.

14 NEXT  previous  HOME The World Wide Web The World Wide Web is not the Internet The Internet is not a place—It is the physical connection of cables and wires. The World Wide Web are the websites that you access using the Internet. It is the destination.

15 NEXT  previous  HOME The World Wide Web The World Wide Web is not the Internet While the Internet and the World Wide Web are not the same, they are described as the same. It is okay to use the Internet as a way to discuss the websites that make up the World Wide Web.

16 NEXT  previous  HOME Portals Portals are website types where people navigate most:  News/Information Retail Mail  Games/Video/Audio  Research  Social Networking Banking

17 NEXT  previous  HOME Portals Every portal is not equal. Some portals try to protect you from your lack of knowledge about criminal activity. They make you feel “safe” that they are filtering out the bad actors. While they want you on their sites, they are NOT all your friends.

18 NEXT  previous  HOME Portals From the list of Portals, there are probably only three (3) website types that you might consider work in your best interest: banks, known retailers, and academic institutions

19 NEXT  previous  HOME Portals

20 NEXT  previous  HOME Gateways Most websites use you for advertising revenue. You are, what is called, “traffic” to and through their websites and that traffic buys advertising space and links to other websites for a fee. You = $$$$

21 NEXT  previous  HOME Gateways When you access websites, small files called “cookies” can be placed onto your personal computer.

22 NEXT  previous  HOME Gateways Your activity is tracked and the advertisers can capture personal data. This data drives more advertising directed at you. By visiting websites, you are causing more back and forth activity between you and that site.

23 NEXT  previous  HOME Trusted, Reliable, Secure The three (3) questions you must ask yourself about any website: 1. Is it trusted? 2. Is it reliable? 3. Is it secure?

24 NEXT  previous  HOME Trusted, Reliable, Secure Like a three-legged stool, the best web sites are the ones that can meet all three standards, especially if you are sharing personal information.

25 NEXT  previous  HOME Trusted, Reliable, Secure If you share your personal information on a website, make sure all three criteria are met. What are the rules?

26 NEXT  previous  HOME Trusted, Reliable, Secure What is personal information? Your name (first and last), address, phone number, date of birth, social security number, school and location, your schedule; your parents name, employers, financial information, banking information, mother’s maiden name, father’s last name.

27 NEXT  previous  HOME Trusted, Reliable, Secure What is personal information? Any website that asks you for any personal information must be trusted, reliable and secure. Why?

28 NEXT  previous  HOME Trusted, Reliable, Secure What is personal information? For the obvious reason, criminals seek to steal and use your personal information and create credit card debt in your name. Personal information can present an opening for strangers to know where you live, work, or go to school.

29 NEXT  previous  HOME Trusted, Reliable, Secure What is personal information? Don’t allow anyone to have personal information unless they are secure. What does it mean to be secure?

30 NEXT  previous  HOME Trusted, Reliable, Secure Secure: A secure website usually has an “s” in the web address and usually has a lock in the closed position. https://www.trustedsite.com Trusted banks and financial transaction companies must be secure.

31 NEXT  previous  HOME Trusted, Reliable, Secure A reliable website is one that is under the jurisdiction of American rules, laws, and guidelines. This is the most important AFTER being secure. Reliable ensures the following is true and provable:

32 NEXT  previous  HOME Trusted, Reliable, Secure A trusted website is one that is tested to be valid and traceable. Example trusted websites: Target.com Amazon.com Apple.com

33 NEXT  previous  HOME Trusted, Reliable, Secure Reliable and Trusted websites: 1.Are under the jurisdiction of your country. 2.Have a help desk. 3.Have a customer service number.

34 NEXT  previous  HOME Trusted, Reliable, Secure Reliable and Trusted websites: 4.Provide receipts. 5.Have better business credentials. 6.Have a credit card transaction history.

35 NEXT  previous  HOME Trusted, Reliable, Secure Reliable and Trusted A reliable website may have a logo or “seal” that says TRUSTe, which means they are recognized by an organization that certifies privacy policies on the Internet.

36 NEXT  previous  HOME Facebook Case Study: Facebook® Facebook® is a website that allows anyone to build and create a personal web page or “presence” and share that information with friends, family and strangers.

37 NEXT  previous  HOME Facebook Facebook® According to Facebook® they are a “social utility that connects you with the people around you.” In order to use this utility, you must go through a screen called “registration” which begins the process of providing personal information.

38 NEXT  previous  HOME Facebook Login Screen - Sign Up

39 NEXT  previous  HOME Facebook Login Screen - Personal Information

40 NEXT  previous  HOME Facebook Login Screen - Security This screen is where the user must agree to read both the Terms of Use and the Privacy Policy.

41 NEXT  previous  HOME Facebook Facebook® - Terms of Use The Terms of Use document at 2-point type is over 6 pages. This document at 10-point type is over 12 pages. Terms of Use Policy - Must Read 

42 NEXT  previous  HOME Facebook Facebook® - Privacy Policy The Privacy Policy document viewed at 2-point type is over 5 pages. This document viewed at 10-point type is over 9 pages. Privacy Policy - Must Read Privacy Policy - Must Read 

43 NEXT  previous  HOME Facebook Facebook® - Other Documents There are other documents that Facebook® would like you to read. They include “Facebook® Principles,” “Facebook® Safety,” and the “TRUSTe Terms and Conditions”. In total, there are another 10 - 12 pages to review.

44 NEXT  previous  HOME Facebook Facebook® - Other Documents TRUSTe is an organization that helps websites “build trust and drive revenue with privacy seals. Displaying the TRUSTe seal demonstrates that your site complies with our best practices.”

45 NEXT  previous  HOME Facebook Facebook® - Other Documents Unfortunately, TRUSTe privacy seals can be taken directly from their site and easily placed on any website as was done on this page. The TRUSTe has a 4-page Terms and Conditions page. Terms and Conditions

46 NEXT  previous  HOME Facebook Facebook® - Age Policy Upon reading the documents, you will discover that if users are under 18 years of age, then they must meet this criteria: 13 years of age or older, and attend high school or college.

47 NEXT  previous  HOME Facebook Facebook® - Age Policy It is suggested that 13-year olds consult with their parents before using Facebook®. That “suggestion” is contained in the reading material discussed earlier.

48 NEXT  previous  HOME Facebook Facebook® - User Responsibility There are many other details contained in these documents that this instruction does not expect anyone to be able to recite. The bottom line appears to be, the USER is responsible for using the site.

49 NEXT  previous  HOME Facebook Facebook® - Overall Policy The USER is supposed to “check back” often to review the policies to see if it has changed. By entering the site, you have “implied” that you have reviewed ALL the policies for updates.

50 NEXT  previous  HOME Conclusion Let’s apply the original question to Facebook®: 1. Is it trusted? 2. Is it reliable? 3. Is it secure?

51 NEXT  previous  HOME Conclusion Facebook® - Overall Policy 1. Trusted Implies that the rules are on file with a company called TRUSTe, which monitors how a site operates and displays its privacy policies. The logo is to “promote trust” in the website.

52 NEXT  previous  HOME Conclusion Facebook® - Overall Policy 2. Reliable Though considered reliable, the rules may change. The USER is responsible for being aware that the rules have changed. There is NO liability to the website.

53 NEXT  previous  HOME Conclusion Facebook® - Overall Policy 3. Secure Facebook® makes it clear that: “no security measures are perfect or impenetrable. We cannot control the actions of other Users with whom you may choose to share your pages and information. Therefore, we cannot and do not guarantee that User Content you post on the Site will not be viewed by unauthorized persons.”

54 NEXT  previous  HOME Conclusion Facebook® - Overall Policy While Facebook® may be trusted and reliable, it is NOT secure. Your privacy can be violated even with controls. The following article shows a recent example of why Facebook® is NOT secure. Facebook® Security Lapse - Must Read 

55 NEXT  previous  HOME Conclusion Thank you. You have completed the lecture portion of the instruction. Please select the link below to complete the lesson. Facebook® Feedback and Review 


Download ppt "Home Research II - 2008 Instructional Technology Program East Stroudsburg University Yvette Raven."

Similar presentations


Ads by Google