Working group discussion 1 Cyber Risk Security, Privacy ?

Slides:



Advertisements
Similar presentations
Tiffany Phillips CIS What is a Social Networking Website? Social networking websites function like an online community of internet users. Depending.
Advertisements

Cyber Stalking Cyber Stalking Phishing Hacker 1. Never reveal your home address !!! This rule is especially important for women who are business professionals.
Online Holiday Shopping Brings Great Deals – and Fraud This lesson is part of the iKeepCurrent TM Program, provided by iKeepSafe TM.
Internet Safety James Fuller Internet Rules To Remember When asked by friends or strangers, online or offline, never share Account IDs and Passwords.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
How to stay safe online A guide for students. e-Safety e-Safety relies on selecting appropriate privacy levels, knowing how to behave online and understanding.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
1 Enterprise Security Your Information Security and Privacy Responsibilities © 2008 Providence Health & Services This information may be replicated for.
Instructions for Weds. Jan Get your Century 21 Jr. textbook 2.Log in to the computers 3.On page 80, read the Objectives listed under “Lesson 13:
Social and Economic Impacts of IT Professor Matt Thatcher.
Company LOGO Internet Safety A Community Approach.
MANAGING YOUR ONLINE PROFILE WHAT DOES THIS MEAN AND WHY SHOULD YOU CARE? Sarah Morris UT Libraries.
INTERNET SAFETY Lynn W Zimmerman, PhD.  Hacking  Identity theft  Stolen passwords  Invasion of privacy POTENTIAL PROBLEMS  Stalking  Cyber-bullying.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
Staying Safe Online Keep your Information Secure.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
Chapter 12 by Lisa Reeves Bertin Securing Information in a Network.
OBJECTIVE 3 ELECTRONIC COMMUNICATIONS. USES OF COMPUTING Pros Made tasks such as clerical work and computing easier and faster Buying, banking, and paying.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets.
Cyber Security & Fraud – The impact on small businesses.
Aware the Effect of Social Network For 1 Malaysia’s Safety Towards A Healthy Virtual Socialization.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
E-Safety E-safety relates to the education of using new technology responsibly and safely focusing on raising awareness of the core messages of safe content,
School of Computing. The Information Security Awareness Research Group.
Feminist Cyborgs: Activism, Fundraising and Security Online Jan Moolman, Association for Progressive Communications, Women’s Rights Programme: 3 December.
Chat Room Safety How to keep your child safe!. Welcome Middle School Parents! You are about to begin your journey through Chat Room Safety! Pay close.
Technology in Action Chapter 1 Why Computers Matter to You: The Importance of Becoming Computer Fluent.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Lee County’s intent is to provide free and equal access to resources via the internet. All school rules for appropriate use of technology also apply.
Online Safety Issues in Our School Topics of Discussion All about Acceptable Use Policies Significance of Signatures on an AUP What is included in an.
MIS 2000 Ethical and Legal Aspects of Information Systems Updated: June 2015.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Activity 4 Protecting Ourselves. Keeping Safe There are lots of different ways we can be at risk on the Internet. How can we protect ourselves and keep.
Cyber Safety. Protect Your Identity Choose screen names/logins that do not give you away Choose password that cannot be easily guessed Do not give away.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
Privacy and Data Mining What Do “They” Know About You?
Cybersecurity Essentials Lesson 1 Protecting Your Identity ICT Demonstrate an Understanding of Internet Safety and Ethics 3.08 Identify and apply.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
James Fox Shane Stuart Danny Deselle Matt Baldwin Acceptable Use Policies.
Society & Computers PowerPoint
Security and Ethics Safeguards and Codes of Conduct.
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
DIGITAL CITIZENSHIP.  Privacy - Protect Personal Information  Respect - Plagiarism, Downloading Music Appropriately.  Self Expression - Create your.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
By: Rathi Raja Section 1055, 005 About Internet Privacy  Should we have Internet Privacy? Why do we need it? Can having internet privacy help us and.
Internet Safety Mrs. Blue 4 th -5 th Grade. Why do I need to learn about internet safety? Even though you can’t always see it, there are dangers that.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
Digital & Internet Safety. Understanding your personal data Defining “Big Data” Protecting your data, computer & devices Avoiding identity theft.
DIGITAL FOOTPRINTS 11 TIPS FOR MONITORING YOUR DIGITAL FOOTPRINT AND 5 TIPS TO MAKE IT POSITIVE.
Digital Citizenship Project Justin Lann. Netiquette Netiquette on Social Media Sites – A set of social conventions that facilitate interactions over networks.
Information Technology Security Office of the Vice President for Information Technology New Employee Orientation II.
Ethical dilemmas arising from information management strategies used by organisations Ethics & Information Systems.
DIGITAL CITIZENSHIP ED 505 TECHNOLOGY AND EDUCATION (REVISION)
As modern children, we have a huge number of electronic devices available to us. We might use computers, tablets, mobile phones or games consoles; for.
Creating your online identity
PCS Technology for Staff: Acceptable Use, Privacy, and Safety
How to use the internet safely and How to protect my personal data?
Freedom Independence Transition
Electronic Communications
Choosing your FBLA Competitive Event
Scams, Identity Theft, and Viruses Kelly & Caitlin
Information Security Session October 24, 2005
Who Uses Encryption? Module 7 Section 3.
HOW DO I KEEP MY COMPUTER SAFE?
E SAFETY ASSEMBLY.
Privacy and Data Mining
Privacy and Data Mining
Presentation transcript:

working group discussion 1 Cyber Risk Security, Privacy ?

working group discussion 1 Surveillance cameras everywhere, web cams Private photos on the web Government browsing E.mails Encryption of E.mails is a solved problem since more than 15 years but not applied Manipulating private data of stolen pieces of new technologies Links between mobile industries and factories and network providers Facts

working group discussion 1 Website and privacy? Updated and dynamic Information is difficult to control in real time People who create system with risk never share with people who are aware of risk‘s (identity card, mobile, controlling moving through GPS...) Everybody feels suspicious but a few does anything (copyright, giving their bank account number.....) Human agents collapse with digital agents (for example Konstanz / Bodensee crash) Facts

working group discussion 1 Use of Technology precedes the Conscience of this Using ( for example E.voting...) Evolution of Privacy during centuries (local life vs global life) Even if a technology makes it possible, we are not allowed to escape the human rights (digital pictures without permission on the web) Taking responsibility or taking risk ? How to educate the users ? Informational self determination as a part of human rights ? Questions

working group discussion 1 We don‘t have to create a system we can‘t control ( the role of agents in information systems) Open sources are the best guarantees to uncontrolled agents Take care with cookies and customer profiles No advertisement or no link to an internet service without an agreement guaranties protection of privacy Recommendations We have to protect minors in educational system (difference between children in school an employees) We have to inform and to educate the user Educate the user to understand the code of ethic

working group discussion 1 Human Computer tool Agent machine Responsibility Decision Computer Calculation

working group discussion 1 Concrete actions Practical exercises, simulation of cyber societies (i.e : role play, study cases...) to train students on cyber risk on an emotional and cognitive level Discussing general issues of ethics, freedom, responsibility, dangerousness... Your proposals ?