Hoax mail intended to scare people Emails requesting money Pyramid schemes Email attempting to gather information Illegally using someone else's computer or "posing" as someone else on the Internet. Using spyware to gather information about people. COMPUTER FRAUD Computer fraud covers a variety of activity that is harmful to people. Computer fraud is using the computer in some way to commit dishonesty by obtaining an advantage or causing loss of something of value
Do not give personal information to anyone or to any company you’ve never heard of before. This includes your full name, your address, your phone number, credit card number, social security numbers, or information about the people in your household.
Do not pay attention to get rich quick schemes. If they seem too good to be true, they absolutely are.
Do not open emails from strangers. Install anti-viral software.
Do not open emails from strangers. Install anti-viral software and spam
blocking programs on your computer and your email program
Copywright laws protect all types of work including Literary works, musical works, dramatic works, pantomimes and choregraphic works, pictorial, graphic, and sculptural works, motion pictures, personal correspondence, sound recordings and architectural works
What is protected?
Ideas, procedures, processes, systems, methods of operation, concepts, principles, discoveries, and facts cannot be copyrighted, but the expression of a work is copyrightable. Works created by officers and employees of the United States government as part of their jobs cannot be copyrighted.
first look to see if there is a permission statement on the web site.
a few software companies have graphic image libraries that contain images that can be downloaded but ask that you list their company and web site as a source for these images.
If no permission statement is given, look for an e-mail address for the author or content owner. Send an e-mail to this address containing:
Your company, organization, or school and your title
A description of what you want to use
How you want to use it
Any additional information
Individual Privacy and Cookies Laura Resnizky and Jerry Santa Ana
Individual Privacy and Cookies Definition It is the ability of an individual or group to seclude themselves or information about themselves and thereby reveal themselves selectively. The boundaries and content of what is considered private differ among cultures and individuals, but share basic common themes. Privacy is sometimes related to anonymity the wish to remain unnoticed or unidentified in the public realm. When something is private to a person , it usually means there is something within them that is considered inherently special or personally sensitive. The degree to which private information is exposed therefore depends on how the public will receive this information, which differs between places and over time. Privacy is broader than security and includes the concepts of appropriate use and protection of information.
Concern over privacy looks to have increased over the last two years.
• By using a 1 to 5 scale where 1 meant ‘very concerned’ and 5 ‘not concerned at all’, 59% of all respondents declared a high degree of concern, that is 1+2 on the scale. This is the highest result yet recorded in an intermittent series going back to 2001.
• Comparisons over time for this question should however be treated with caution, because ‘individual privacy’ was asked about on its own in 2010 but alongside a randomised list of other possible concerns in all previous years.
• 39% nominated the highest level of concern (point 1 on the scale).
• Around a quarter (23%) said they were not concerned (4+5 on the scale).
Like in 2008, the level of concern was fairly even across most demographics.
• However, blue collar workers were more concerned than white collar workers (71% and 56% respectively), and those who use social network sites were slightly more concerned (62%) than those who don’t use them (57%).
COOKIES A cookie has many different names including HTTP cookie, web cookie, or browsers cookie. Cookies are like markers which allow a site, computer, preference, or many other things to be identified and authenticated quickly by a computer.
A computer virus is created when a programmer puts or infects a disk or computer program with computer code that has the capability to replicate itself, hide, watch for a certain event to occur, and/or deliver a destructive or prankish payload
The most important way to avoid getting a computer virus is to buy antivirus software for your computer and to make sure it is up to date, current, and activated. Be sure to avoid suspicious e-mails and notify friends if you get infected with an e-mail generated virus.
Typical symptoms of computer viruses are a breakdown of computer software functions,Files begin to disappear or are corrupt, and computer shutdown or unwillingness to turn on.