CSEC INFORMATION TECHNOLOGY MISUSE OF INFORMATION
This is a WEB QUEST On the MISUSE OF INFORMATION
SOME OF THE WAYS IN WHICH INFORMATION CAN BE MISUSED Violation of privacy Propaganda Software piracy Computer fraud Electronic eavesdropping Industrial espionage Surveillance Identity theft Credit card fraud
Working in pairs you are required to conduct in-depth research on each area and document your findings on the sheets provided. The following slide lists the questions you must answer. Please write them down
Questions : 1. What is…. 2. Is it illegal. 3 Questions : 1. What is…? 2. Is it illegal? 3. What are the negative effects? 4. What role does the computer play in …? 5. One example is … 6. How can one protect ones self from …?
The following slides contain resources on the www that will help you as your research these topics. Note that this list is not exhaustive and your are expected to locate others on your own in order to complete your assignment.
When you are through (at the end of the hour) you must email your file to sahsitdept@yahoo.com
VIOLATION OF PRIVACY http://www.gencourt.state.nh.us/RSA/html/LXII/644 /644-9.htm http://www.websters-online- dictionary.org/vi/violation+of+privacy.html http://www.ectaa.org/Home/Publications/PressRelea ses/ViolationofPrivacy/tabid/108/language/en- US/Default.aspx http://legal-dictionary.thefreedictionary.com/Privacy
PROPAGANDA http://dictionary.reference.com/brows e/propaganda http://www.yourdictionary.com/diction ary-articles/Definition-of- Propaganda.html http://www.answers.com/topic/propag anda
SOFTWARE PIRACY http://whatis.techtarget.com/definition/0,,sid9_gc i213592,00.html http://www.webopedia.com/TERM/S/software_pi racy.html http://www.yourdictionary.com/computer/softw are-piracy http://www.wisegeek.com/what-is-software- piracy.htm
COMPUTER FRAUD http://www.its.bldrdoc.gov/projects/devglossary/_compute r_fraud.html http://www.wisegeek.com/what-is-computer-fraud.htm http://www.encyclopedia.com/doc/1O11- computerfraud.html http://www.mariosalexandrou.com/definition/computer- crime.asp http://www.scit.wlv.ac.uk/~cm1988/CP3349%20SLAPA/co mputer_crime.htm
ELECTRONIC EAVESDROPPING http://www.britannica.com/EBchecked/t opic/183788/electronic-eavesdropping http://legal- dictionary.thefreedictionary.com/Electro nic+Surveillance http://www.rfidjournal.com/article/print/ 1401
INDUSTRIAL ESPIONAGE http://www.investorwords.com/2443/industrial _espionage.html http://www.bitpipe.com/tlist/Industrial- Espionage.html
SURVEILLANCE http://medical- dictionary.thefreedictionary.com/Electronic+Ea vesdropping http://www.thefreedictionary.com/surveillance http://encyclopedia2.thefreedictionary.com/Co mputer+surveillance http://www.knowledgerush.com/kr/encyclopedi a/Computer_surveillance/
IDENTITY THEFT http://searchsecurity.techtarget.com/sDefin ition/0,,sid14_gci801871,00.html http://www.thefreedictionary.com/identity +theft http://ezinearticles.com/?A-Definition-of- Identity-Theft&id=1016208 http://www.id-theft-info.com/
CREDIT CARD FRAUD http://ezinearticles.com/?Credit-Card- Fraud---Part-I&id=123783 http://www.yourdictionary.com/hacker/cre dit-card-fraud http://www.ehow.com/about_5085291_def inition-credit-card-fraud.html http://www.answers.com/topic/charge-card
~~~ THE END ~~~