Presentation is loading. Please wait.

Presentation is loading. Please wait.

Lecture2 Networking. Overview Email and spam World Wide Web Censorship Freedom of expression Children and inappropriate content Breaking trust on the.

Similar presentations


Presentation on theme: "Lecture2 Networking. Overview Email and spam World Wide Web Censorship Freedom of expression Children and inappropriate content Breaking trust on the."— Presentation transcript:

1 Lecture2 Networking

2 Overview Email and spam World Wide Web Censorship Freedom of expression Children and inappropriate content Breaking trust on the Internet Internet addiction 1-2

3 Networking = Online Behavior 3-3 Internet Web Email Spam Online Pornography Censorship Identity Theft Sexting

4 Email and Spam How Email Works Email: Messages embedded in files transferred between computers Messages broken into packets Routers transfer packets from sender’s mail server to receiver’s mail server 1-4

5 Routers Pass Email from LAN to LAN 1-5

6 Spam Spam: Unsolicited, bulk email Spam is profitable – Profitable even if only 1 in 100,000 buys product Amount of email that is spam has ballooned – 8% in 2001 – 90% in 2009 1-6

7 The Spam 1-7

8 Spam How Companies get email addresses – Web sites, chat-room conversations, newsgroups – Computer viruses harvest addresses from PC address books – Dictionary attacks – Contests Spam filters block most spam before it reaches users’ inboxes 1-8

9 Reaction to Spam Slide 4- 9

10 2. The World Wide Web Attributes of the Web It is decentralized Every Web object has a unique address It is based on the Internet 1-10

11 How We Use the Web Shopping Socializing (e.g., Facebook) Contributing content (e.g., wikis, blogs) Blogging Learning Entering virtual worlds Paying taxes Gambling Taking humanitarian action Lots more! 1-11

12 Tim B-L’s 1 st Web Browser - WWW Slide 4- 12 From http://www.w3.org/History/1994/WWW/Journals/CACM/screensnap2_24c.gif

13 Twitter More than 200 million users Blogging tool (+) Social networks lead to politicization (-) Ties in social networks too weak for high- risk activism 1-13

14 Governmental Control: Too Much or Too Little? Burma,Cuba, North Korea: Internet virtually inaccessible Saudi Arabia: centralized control center United States: Repeated efforts to limit access of minors to pornography 1-14

15 Censorship Forms of Direct Censorship State ownership of media Prepublication review Licensing and registration Control media,also can lead for censorship. 3-15

16 Internet Censorship Is Control The Dissemination Of And Access To Information On The Internet, And Are Used In control Technology relies On A Firewall Or Proxy, And This Is Done By Forcing All Dealers with The Network To Pass Through Proxy Servers Before Access To The Network, Definition of Internet censorship 1-16

17 Challenges Posed by the Internet Many-to-many communications Dynamic connections Huge numbers of Web sites Extends beyond national borders, laws 1-17

18 Freedom of Expression Freedom of Expression: History Not exist prior restraints on publication … publish as you, please. American states adopted freedom of expression Freedom of Expression, Threat to loyalty Various restrictions on freedom of expression exist 3-18

19 Children and Inappropriate Content Web Filters Web filter: Software that prevents display of certain Web pages – May be installed on an individual PC Methodologies – Examine content for Inappropriate words/phrases 1-19

20 Child Internet Protection Act You have to filter their networks of libraries of content inappropriate for children 1-20

21 Sexting describe the creation and transmission of sexual images by minors. In a 2009 survey, 9% of U.S. teenagers admitted to sending a sext, 17% admitted to receiving a sext Case of Jesse Logan Case of Phillip Alpert Case of Ting-Yi Oei 1-21

22 Breaking Trust on the Internet Identity Theft Identity theft: When a person uses another person’s electronic identity identity theft is credit card fraud Financial institutions contribute to problem by making it easy to open new accounts About 10 million cases of identity theft in U.S. in 2010 1-22

23 Identity Theft Nearly half of cases from lost credit card, checkbook, etc. In 20% of cases, credit card number stolen at time of making purchase. About 1 million cases of identity theft annually in United States from online activities 1-23

24 Chat-Room Predators Chat room: Supports real-time discussions among many people connected to network Instant messaging and chat rooms replacing telephone for many people Some pedophiles meeting children through chat rooms 1-24


Download ppt "Lecture2 Networking. Overview Email and spam World Wide Web Censorship Freedom of expression Children and inappropriate content Breaking trust on the."

Similar presentations


Ads by Google