Académique Documents
Professionnel Documents
Culture Documents
ETHICS
Member group:
NIHAYATUL AZIZAH BT. IMAM SYAFII
SITI NUR ATIKAH BT. IBRAHIM
INTAN NURUL SYAFINAZ BT. AZMAN
LIM YI HUI @VIVIEN
NABILAH BT.SHAMSUDDIN
INTRODUCTION
The ubiquitous use of computers and
technology prompts some very important
questions about the use of personal data and
our right to privacy.
This chapter covers issues related to yhe
impact of technology on people ourselves on
the Web.
PRIVACY
Privacy concerns the collection and use of data
about individuals
Three primary privacy issues:
Accuracy
Property
Access
LARGE DATABASES
Large organizations compile information about us.
Federal government has over 2,000 database
Telephone companies- Reverse directory lists of
calls we make
Supermarkets What we buy and when
Information resellers or information brokers
Collect and sell personal data
Electronic profiles easily created
PRIVATE NETWORK
Employers can monitor e-mail legally
75% of all businesses search employees electronic
mail and computer files using snoopware
A proposed law could prohibit this type of
monitoring or at least require the employer to notify
the employee first.
Illusion of anonymity
-People are not concerned about privacy when surfing the internet or when
sending e-mail.
History file in Web browser
-Include the locations or addresses of sites that you have recently visited.
-Contain web page content and instruction for displaying this content.
-But,if you leave a site and then return later,these files are used to quickly
Cookies
-web activity can be monitor with cookies.
-small data files that are deposited on hard disk from websites that you
have
visited.
-it can be accepted or blocked,based on browsers settings.
-can stored information,preferences and browsing habits and it
depends on:
1. First-party cookie
-generated (and then read) only by the website that currently visit.
-use to store information about the current session,general
preferences and
activity on the site.
-to provide a personalized experience on a particular site.
Private mode
-ensures that your browser activity is not recorded on your hard disk.
-for example,Internet Explorer 9 provides InPrivate Browsing and
Safari
provides Private Browsing.
Web bugs
-invisible images or HTML code hidden within a web page or
e-mail message,can be used to transmit information without your
knowledge.
Spyware
-used to describe a wide range of programs that are designed to secretly
record
and report an individuals activities on the internet.
-run in the background,invisible to the everage user.
-to exercise caution when visiting new websites and downloading
software
from an unknown source.
ONLINE IDENTITY
-the information that people voluntarily post
about themselves
online.
-think online identity as something shared
between friend,the
archiving and search features of the web
make it available
indefinitely to anyone who cares to look.
M A J O R L AW S O N P R I VA C Y
-federal laws governing privacy matters have been created :
-Gramm-Leach-Bliley act:
-protects personal financial information.
-Health Insurance Portability and Accountability Act
(HIPAA):
-protects medical records.
-Family Educational Right and Privacy Act (FERPA):
-restricts disclosure of educational records.
SECURTY
CYBERCRIME
Any criminal offense that involve a computer and a network
Cybercrime can take various form like creation of malicious
program,denial of service attacks,internet scam,identify
theft,cyerberbulling,rogue Wi-Fi hotspot,and data manipulation.
i-Malicious program:
Virus
Program that migrate through network and operating system,and most
attach themselves to different programs and database
Worms
Program that simply replicate themselve over and over again.A recent
worm traveled across the world within hours,stopping tens of thousand
of computer along its ways.
Trojan Horses
Programs that appear to be harmless,however the contain malicious
programs.Trojan houses not a virus but carries virus.When user install
one programs,Trojan also secretly install.
ii-Zombie
Computer infected by a virus,worm,or Trojan horses that allow them to be
remotely controlled by malicious pupose.A collection of zombie is known
botnet or robot network.Botnet harness combines power of many zombie like
password cracking or sending junk e-mail.
iii-Denial of service
Attempt to slow down or stop a computer system or network by flooding a
computer or network with request for information and data.The target it attack
is internet vice provider(ISPs) ad specific websites.If it attack,ISP or website is
effectively shut down.
Vii-Identity Theft
Illegal assumption of someone identity for the purpose of economic gain.Once an identity is stolen ,the
criminal applies for and obtain new credit card in the victim name and then use the card to purchase
clothes,card and even house.
X-Internet Scam
A scam is a fraudulent or deception act or operation designed to trick individual into providing personal
information or spending their times and money for little or no return.
Internet scam is simply a scam using the internet.A technique often employed by scammer is phishing
which is to trick internet user into thinking a fake but official-looking websites or e-mail is legitimate.
Xi-cyberbullying
Use the internet ,cell-phone,or other device to send or post content intended to hurt or embarras another
person.
THE END ..
THANKS YOU