Hoax mail intended to scare people Emails requesting money Pyramid schemes Email attempting to gather information Illegally using someone else's computer or "posing" as someone else on the Internet. Using spyware to gather information about people. COMPUTER FRAUD Computer fraud covers a variety of activity that is harmful to people. Computer fraud is using the computer in some way to commit dishonesty by obtaining an advantage or causing loss of something of value
Do not give personal information to anyone or to any company you’ve never heard of before. This includes your full name, your address, your phone number, credit card number, social security numbers, or information about the people in your household.
Do not pay attention to get rich quick schemes. If they seem too good to be true, they absolutely are.
Do not open emails from strangers. Install anti-viral software.
Do not open emails from strangers. Install anti-viral software and spam
blocking programs on your computer and your email program
Don´t download attachments from people you don´t know.
Teach your children about safe communication on the Internet to protect them from Internet predators.
Don't keep passwords on your computer, and do not use common passwords or guessable words. Never give your password to someone else.
If you bank online, make sure you stay at your computer for the entire transaction, and then be sure you sign off completely when you are done.
Ask to have your account and credit card statements sent to you online directly from your bank or credit card company.
COMPUTER FRAUD (How to prevent it)
Copyright 1. What is the law? 2. Rights for educators 3. Permission
What is the Copyright Law?
An Overview of Copyright Law
Copywright laws protect all types of work including Literary works, musical works, dramatic works, pantomimes and choregraphic works, pictorial, graphic, and sculptural works, motion pictures, personal correspondence, sound recordings and architectural works
What is protected?
Ideas, procedures, processes, systems, methods of operation, concepts, principles, discoveries, and facts cannot be copyrighted, but the expression of a work is copyrightable. Works created by officers and employees of the United States government as part of their jobs cannot be copyrighted.
Rights for Educators (copyright)
Educators can make single copies of some copyrighted materials for scholarly research, preparation for teaching, or teaching a class. These materials include:
A chapter from a book
A magazine article
A newspaper article
A short story, essay, or poem
A chart, graph, diagram, drawing, cartoon, or picture
Educators can also make multiple copies of the above materials as long as they meet the following requirements:
The amount copied is not more than roughly 10 percent of the total work.
The teacher does not have time to ask for formal permission to use the material.
The teacher does not make more than nine multiple copies for one course during a term.
The copies cannot be in replacement of materials regularly used. Consumable materials cannot be copied.
To get permission (copyright)
first look to see if there is a permission statement on the web site.
a few software companies have graphic image libraries that contain images that can be downloaded but ask that you list their company and web site as a source for these images.
If no permission statement is given, look for an e-mail address for the author or content owner. Send an e-mail to this address containing:
Your company, organization, or school and your title
A description of what you want to use
How you want to use it
Any additional information
Individual Privacy and Cookies Laura Resnizky and Jerry Santa Ana
Individual Privacy and Cookies Definition It is the ability of an individual or group to seclude themselves or information about themselves and thereby reveal themselves selectively. The boundaries and content of what is considered private differ among cultures and individuals, but share basic common themes. Privacy is sometimes related to anonymity the wish to remain unnoticed or unidentified in the public realm. When something is private to a person , it usually means there is something within them that is considered inherently special or personally sensitive. The degree to which private information is exposed therefore depends on how the public will receive this information, which differs between places and over time. Privacy is broader than security and includes the concepts of appropriate use and protection of information.
Concerns About Individual Privacy
Concern over privacy looks to have increased over the last two years.
• By using a 1 to 5 scale where 1 meant ‘very concerned’ and 5 ‘not concerned at all’, 59% of all respondents declared a high degree of concern, that is 1+2 on the scale. This is the highest result yet recorded in an intermittent series going back to 2001.
• Comparisons over time for this question should however be treated with caution, because ‘individual privacy’ was asked about on its own in 2010 but alongside a randomised list of other possible concerns in all previous years.
• 39% nominated the highest level of concern (point 1 on the scale).
• Around a quarter (23%) said they were not concerned (4+5 on the scale).
Like in 2008, the level of concern was fairly even across most demographics.
• However, blue collar workers were more concerned than white collar workers (71% and 56% respectively), and those who use social network sites were slightly more concerned (62%) than those who don’t use them (57%).
COOKIES A cookie has many different names including HTTP cookie, web cookie, or browsers cookie. Cookies are like markers which allow a site, computer, preference, or many other things to be identified and authenticated quickly by a computer.
How to avoid them
A computer virus is created when a programmer puts or infects a disk or computer program with computer code that has the capability to replicate itself, hide, watch for a certain event to occur, and/or deliver a destructive or prankish payload
The most important way to avoid getting a computer virus is to buy antivirus software for your computer and to make sure it is up to date, current, and activated. Be sure to avoid suspicious e-mails and notify friends if you get infected with an e-mail generated virus.
Typical symptoms of computer viruses are a breakdown of computer software functions,Files begin to disappear or are corrupt, and computer shutdown or unwillingness to turn on.
A computer hacker is a person who is able to access computer files and data, especially remotely.
They are generally interested in stealing personal information from corporations, businesses, or individuals.
There is also a type of computer hacker that enjoys messing with non-tech savvy people for their own amusement.
Prevent Computer Hackers/Viruses from affecting you
Make sure to have firewall protection and use reliable internet sources
Don´t make your information available to the public
Don't share passwords or keep them saved in your e-mail accounts or computer files
Don't download unknown files or from sites that may be untrustworthy
Dangers in new Technology 1. Health 2. Violence in Society 3. Uncontrolable students in the classroom.