3. Hoax mail intended to scare people Emails requesting money Pyramid schemes Email attempting to gather information Illegally using someone else's computer or "posing" as someone else on the Internet. Using spyware to gather information about people. COMPUTER FRAUD Computer fraud covers a variety of activity that is harmful to people. Computer fraud is using the computer in some way to commit dishonesty by obtaining an advantage or causing loss of something of value
11. Individual Privacy and Cookies Definition It is the ability of an individual or group to seclude themselves or information about themselves and thereby reveal themselves selectively. The boundaries and content of what is considered private differ among cultures and individuals, but share basic common themes. Privacy is sometimes related to anonymity the wish to remain unnoticed or unidentified in the public realm. When something is private to a person , it usually means there is something within them that is considered inherently special or personally sensitive. The degree to which private information is exposed therefore depends on how the public will receive this information, which differs between places and over time. Privacy is broader than security and includes the concepts of appropriate use and protection of information.
12.
13. COOKIES A cookie has many different names including HTTP cookie, web cookie, or browsers cookie. Cookies are like markers which allow a site, computer, preference, or many other things to be identified and authenticated quickly by a computer.
14.
15.
16.
17.
18. Dangers in new Technology 1. Health 2. Violence in Society 3. Uncontrolable students in the classroom.