CYBER RULE MODULE 3. LEARNING OBJECTIVES By the end of the module, you should be able to: 1.List 3 examples of cyber crimes 2.State 3 effects of cyber.

Slides:



Advertisements
Similar presentations
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Advertisements

Security, Privacy, and Ethics Online Computer Crimes.
Public Information Online. Timothy WhitneyCaroline Aaron.
Ethics of Copyright Infringement Thomas H. Mak CS 301.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
Internet Guidelines. Cyberspace Cyberspace is like a big city. libraries, universities, museums, places to have fun, Places to meet people. But, like.
e-Safety What e-Safety? E-safety is about measures and best particles for Netizens to guard their personal safety and the security of their networks.
GROUP 7 RAHUL JIMMY RONEY GEORGE SHABNAM EKKA SHEETHAL JOSEPH Cyber Laws in India- IT Act, 2000; 2004.
Computers Are Your Future Twelfth Edition Spotlight 1: Ethics Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 1.
Copyright © 2012 Knowledge Point Cyber Rule. Copyright © 2012 Knowledge Point Learning Outcomes By the end of this module, you should be able to: List.
 Provide a basis for determining who in the organization should control access to a particular item of information.
Ethics & Responsibility
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
Unit 4 – Impact of the use of IT on Business Systems.
Possible WebQuest type links  
EthicsEthics, Rules, and LawsRulesLaws Using the computer appropriat ely.
Lathrop Intermediate School Cyber Savvy Week December 1 – December 5, 2014 Be RespectfulBe ResponsibleBe Safe Science Classrooms – Thursday, December 4,
1 Is it illegal or unsuitable? SID 2013 quiz for adults who work/volunteer with children, young people and vulnerable adults © e-Safer.
Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-1 ACS 1803 Lecture Outline 15 ETHICS AND COMPUTER CRIME.
In New Digital World for better future CYBERJAYA become as a new digital city in our country E-Access.
Welcome to Technology Class
Mrs. Jefferson Business Information Management I.
Computer Ethics for Computer Users
 In most countries of the world, the “information revolution” has altered many aspects of life significantly: commerce, employment, medicine, security,
Computer Ethics Christina McCorkle.
PAPER AC 1 : E-BUSINESS AND CYBER LAWS. MEANING OF E-BUSINESS  E-business, is the application of information and communication technologies (ICT) which.
Cyberspace Rules for Mrs. Johnson’s Kindergarten Class These are the rules we will use to learn, play, and have fun on the internet.
Mrs. Stern Computer Applications II. What is Computer Crime?  Criminals Can Operate Anonymously Over the Computer Networks.  Be careful about talking.
E-Rule. What is cyber crimes Cyber crime encompasses any criminal act dealing with computers and networks (called hacking). Additionally, cyber crime.
Nu’aim Hussaini Bin Zulkefli Sr221 Csc434 Pn Noridah Binti Abu Bakar.
Do you believe in this? Due to its very nature, the Internet is NOT a safe or secure environment. It is an ever-changing medium where anyone and everyone.
Ways in which Information can be Misused Misuses Of Information THE Misuse of information By: Antoinette Harris, Nickietha Phinn, Ashley Williams and.
IPR Intellectual Property Rights Violation of IPR – basically, this means knowingly or unknowingly stealing other people’s works and ideas.
Jeopardy: Digital Citizenship Please use presentation mode!
Riding the Internet Highway Internet Safety Rules.
Computer Crimes Career & Technology Education Department.
O PROTECT YOUR RIGHTS.  E-RULE GOVERNING COMMUNICATION AND TECHNOLOGY USE INCLUDING RESPECT FOR OWNERSHIP AND AUTHORSHIP  CYBER CRIME COMPUTER CRIME,
6/2/2016MHA MPS Smuggling. 6/2/2016MHA MPS Recap Smuggler Story Stories from the news Vietnam smuggling issues ICA approach.
Ethical and Legal Practices in INFORMATION TECHNOLOGY.
Teacher Rooming Equipment Rules / Expectations Login / Passwords Technical Issues Homework Printing.
GROUP : MOMENT SA’AD BIN SABAR FB MOHD NORSHAFIQ BIN MOHD PAUZI FB POSITIVE VALUES IN USING TECHNOLOGY.
PORTFOLIO 1 CITIZEN MUHAMMAD TAUFIQ BIN TAHA FA
Cyber Literate Module 2. What is ‘Cyber Literate’?  Cyber Literate = Ability to use technology + knowing when, when not and how to use it appropriately.
 Internet crime is, Any crime or illegal activity committed online or through the internet.
Vitor Giesteira, 9E. The Nine Elements of Digital Citizenship 1. Access 2. Communication 3. Literacy 4. Security and Safety 5. Etiquette 6. Rights and.
James Keddy. Definition of digital citizenship In my own words digital citizenship is a way to conduct yourself on the internet that is respectful, responsible.
Well, sir, from the sounds of it, you've got yourself some pirated software. I'm afraid there's nothing we can do to help you.`
MIS 2000 Social Implications of IST. Outline Law & Ethics Accountability and Liability Information Rights Privacy Computer Abuse and Crime Intellectual.
Internet Guidelines. Cyberspace Cyberspace is like a big city. libraries, universities, museums, places to have fun, Places to meet people. But, like.
Copyright © 2012 Knowledge Point digital world architecture of evolution Resources:
Models for Cyber-legislation in ESCWA member countries Presented by Jean Akl & Roula Zayat Amman, December 11, 2007.
Ethics Unit 1. What does ethical mean? Following rules or doing the right thing.
Ethical Implications In The Age Of Information
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY INTRODUCTION TO ICT COMPUTER ETHICS AND LEGAL ISSUES.
Whats it all about?.  C omputer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of.
Intellectual property (IP) refers to creations of the mind: inventions, literary and artistic works, music, movies, symbols, names, images, and designs.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Types of Cybercrime (FBI, 2000) 1.Unauthorized access by insiders (such as employees) 2.System penetration by outsiders (such as hackers) 3.Theft of proprietary.
WHEN SHARING IS NOT CARING: INTERNET ETHICS By Baikgopodi “Bai” Ditiso Presented at CLTD– 09 May 2016.
Using the computer appropriately
SECURITY STANDARDS AND CYBER LAWS
高三年级 英语 Word study & reading, M10U4 授课者: 王时亮 湖南邵阳县第七中学
COPYRIGHT AND PLAGIARISM AT THE UNIVERSITY OF PRETORIA
Section 19.1 Cyberlaw and Cybercrime. Section 19.1 Cyberlaw and Cybercrime.
Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School
Information Security Footprint.
Learning Area 1 Information And Communication Technology and Society
Preventing Information Technology Crimes
Computer Misuse Act 1990 GCSE ICT.
The Legalities of Technicalities task 4
Presentation transcript:

CYBER RULE MODULE 3

LEARNING OBJECTIVES By the end of the module, you should be able to: 1.List 3 examples of cyber crimes 2.State 3 effects of cyber crimes related to individuals 3.Elaborate three benefits of having ‘Cyber Law’ in the country.

KEY WORDS & TERMS Cyber Crime الجريمة الالكترونية Reduced Productivity انخفاض الإنتاجية Governing تنظيم Offenses to Islamic Law التجاوزات للشريعة الإسلامية Cyber Law قانون الانترنت UAE Cyber Crime Law قانون الجرائم الإلكترونية الإماراتي Authorship التأليف Offenses to Community Values التجاوزات في القيم الاجتماعية Cyber RuleInternet Fraud الاحتيال عبر الإنترنت Ownership الملكية Intrusion التطفل Loss of Profits خسارة الأرباح Imprisoned مسجون Intellectual Property Infringement التعدي على الملكية الفكرية Hacking القرصنة Waste of Valuable Time مضيعة للوقت القيم Fined التغريم Copyright Law قانون حقوق الطبع Data Protection حماية البيانات Damages Reputation الأضرار بسمعة Cyber Bullying المضايقة الالكترونية Software Piracy قرصنة البرمجيات

CYBER RULE - DEFINITION Cyber Rule is defined as governing communication and technology use including respect for ownership and authorship

CYBER CRIME - DEFINITION Crimes committed using technology.

EXAMPLES OF CYBER CRIME Internet banking fraud e.g. Phishing UAE Cyber Crime Law – Article 11: Anyone convicted of ‘internet fraud’ will be imprisoned for no less than 1 year and fined no less than Dh Harassment e.g. ‘cyber bullying’ UAE Cyber Crime Law – Article 9: Anyone convicted of ‘cyber bullying’ will be imprisoned for no less than 2 years and fined no less than Dh Intellectual Property Infringement e.g. copying other peoples copyright work and claiming it as your own. Software piracy – e.g Copying software for users who have not paid for it. Intrusion e.g. Hacking Offenses of Islamic Law or Community Values UAE Cyber Crime Law – Article 15: If anyone is convicted of opposing the Islamic religion or its teaching will be imprisoned for no less than 7 years. UAE Cyber Crime Law – Article 16: If anyone is convicted of breaking family values or publishing news, pictures related to the private life of one’s own or other peoples family shall be jailed for no less than one year and fined Dh

EFFECTS OF CYBER CRIMES 1.Loss of Revenue/Profits 2.Waste of Valuable Time 3.Damaged Reputation 4.Reduced Productivity

PRACTICE EXAM QUESTIONS In SHOWBIE, Complete the following: 1.Cyber Rule - Cross Word 2.Cyber Rule – Match Key word to Definition 3.Cyber Rule – Module 3 Practice Exam Questions