Académique Documents
Professionnel Documents
Culture Documents
V. INTERNET ARCHITECTURE 4
A. COMPUTER 6
B. MODEM 6
C. TELEPHONE LINE 6
D. SOME SOFTWARE 6
A. WORLD-WIDE WEB 8
B. NAVIGATING THE WEB 9
1. Hypertext 9
2. Uniform Resource Locator (URL) 9
A. USING A PORTAL 13
B. USING AN INTERNET SEARCH ENGINE 14
XI. E-MAIL 16
A. ELECTRONIC MAIL 16
B. EMAIL MODELS 16
C. EMAIL ADDRESS 16
D. PARTS OF AN E-MAIL 17
E. SENDING AN E-MAIL MESSAGE 18
1. Usenet Newsgroups 29
2. Other Educational Internet Resources 30
3. Resource-Based Learning and Inquiry-Based Learning 30
4. Distance Learning 31
II. HISTORY 43
A. SOURCES OF INCIDENTS 45
B. TYPES OF INCIDENTS 45
C. INCIDENTS AND INTERNET GROWTH 46
D. INCIDENT TRENDS 47
V. IMPROVING SECURITY 49
I. COMPUTER SECURITY 54
II. TECHNOLOGY 55
IV. ACTIONS HOME USERS CAN TAKE TO PROTECT THEIR COMPUTER SYSTEMS 58
INFORMATION ETHICS
59
A. COPYRIGHT 60
B. FAIR USE DOCTRINE 60
C. SOFTWARE LICENSING 60
D. PIRATED SOFTWARE 62
IV. PRIVACY 63
A. E-MAIL 63
B. VIOLATING ONE’S PRIVACY – WHAT IS SPYWARE? 64
C. ACCEPTABLE USE POLICY 66
D. THE TEN COMMANDMENTS FOR COMPUTER ETHICS 66
E. NETIQUETTE 68
F. CASES 69