SlideShare a Scribd company logo
1 of 19
Download to read offline
Internet Privacy,
Ethics, and Online
Security
Paul Berryman
Melissa Pabon
Introduction
The topic for this module is Internet Privacy, Ethics, and Online
Security. We have divided this topic into the following sub-
topics: Internet Privacy, including laws enacted to protect the
privacy of children; Internet Ethics, including plagiarism and
cyberbullying; and Online Security.
Introduction
Each of these areas are gradually evolving with the development
of new technology. Traditionally, most issues addressed by these
topics have only general guidelines governing users’ behavior;
however, some structured rules are starting to develop to maintain
a safe environment online.
Introduction
• Internet Privacy – The protection of sensitive and personal
  information, sometimes called Personally Identifiable
  Information (PII), from unauthorized or inappropriate
  disclosure.

• Internet Ethics – The acceptable behavior while using the
  Internet; being honest and respecting the rights of others on the
  Internet.

• Online security – is protecting students from inappropriate
  material online and protecting students and teachers from
  threats from outsiders and each other.
The 5 Big Questions
Why is it used? or why is it an important issue?
Who uses it? or who is affected by it?
How is it used? or how does it work?
What is needed to use it? or what does it do?
What else is important about this technology tool or topic?
Why is it used? or why is it an important issue?
• Internet privacy, ethics, and online security are important issues
  because they are present in every action taken by every user
  online. With incidents of hacking, cyberbullying, and identity
  theft rising, it is clear that students and teachers need directions
  now more than ever.
• Yet, not every case has a clear-cut answer. Is hacking always
  wrong? Are there ever cases where it’s acceptable for
  companies and advertisers to collect data about customers
  online, without violating their privacy? With these vague areas,
  it is valuable to explore and discuss the boundaries of security,
  privacy, and ethics.
Who uses it? or who is affected by it?
• Anyone who interacts online, in a closed off network (i.e.
  school network), or even just uses a stand-alone computer is
  affected by these topics.
• Internet ethics are practiced by, and affect, every user online.
  While each person lives by his or her own moral code, Internet
  ethics can be thought of as a general set of guidelines that users
  follow.
How is it used? or how does it work?
• Privacy, ethics, and security is a combination of user education,
  technological tools, and administrative policies and procedures.
  Each group of individuals has a responsibility to protect users,
  data, and systems from a variety of threats.
What is needed to use it? or what does it do?
• Organizations, from the top down, must take security seriously
  and do their best to protect students, teachers, faculty, and
  administrators. Administrations should conduct due diligence
  and pay for good technical support and tools to protect the
  network. But most importantly schools must educate their
  faculty and students that they are the first line of defense in
  security and maintain privacy.
What else is important about PRIVACY?
Lee Rainie (2005) gives several basic insights about Internet
  privacy:
1. Privacy is a value for most, but not all people.
    •   About two thirds of Americans will give up information in
        return for something of value.
2. Privacy means different things to different people.
    •   Privacy can be divided into the categories of Anonymity,
        Confidentiality, and Security.
3. There is a variety of privacy violations.
    •   These range from Embarrassment to Personal Loss and Theft.
4. Not all information is guarded at the same level.
    • Health and financial information is considered to be more
        valuable.

5. People want control over information that relates to them.
    • 86% of Americans say that Internet companies should ask
       permission to use personal information.
What else is important about ETHICS?
The Internet Architecture Board (IAB) issued RFC 1087 'Ethics
  and the Internet,' a policy concerning Internet ethics in 1989.
An excerpt from the policy:
 The IAB strongly endorses the view of the Division Advisory Panel of the National
 Science Foundation Division of Network, Communications Research and
 Infrastructure which, in paraphrase, characterized as unethical and unacceptable any
 activity which purposely:
  •   Seeks to gain unauthorized access to the resources of the Internet.
  •   Disrupts the intended use of the Internet.
  •   Wastes resources (people, capacity, computer) through such actions.
  •   Destroys the integrity of computer-based information.
  •   Compromises the privacy of users.
RFC 1087 has since resulted in regulations concerning spamming
 messages, privacy policies for websites requesting users to
 provide personal details, and debate over whether governments
 or individuals should monitor ethics on the Internet.
Educational Relevance
As technology evolves, teachers try to keep up by encouraging
 students to utilize the Internet both inside and outside the
 classroom. However, teachers and students face privacy
 concerns, ethical concerns, and online security threats, along
 with growing Internet use. School administrations must
 develop plans for staying ahead of new issues, such as
 plagiarism, cyberbullying, and privacy threats to students’
 personal information.
Educational Relevance
Additionally, it is important for schools to stay current with laws
 pertaining to student Internet use. The Children’s Internet
 Protection Act (CIPA) was enacted in 2000 to protect children
 from accessing harmful content over the Internet. Eligible
 schools and libraries are required to follow certain
 requirements under CIPA in order to receive discounts for
 Internet access though the E-rate program. These requirements
 include having an Internet safety policy that includes
 technology protection measures that block access to harmful
 content. This policy must include monitoring the online
 activities of minors.
Educational Relevance
An amendment to CIPA, called the Protecting Children in the
 21st Century Act, further requires that schools educate students
 about appropriate online behavior, including cyberbullying
 awareness and response.
Educational Relevance
• In regards to online security, there are several factors that make
  it important for educators to understand. First, and foremost, is
  for teachers of K-12 students. Children do not understand the
  risks they may be taking by providing personal information on
  the Internet.
Educational Relevance
• Besides the risk from cyberbulling and child stalkers, children
  may unintentionally compromise their or others personal
  information. Finally, their lack of understand makes them
  prime targets for criminals and for virus/malware infections.
  They are more likely to trust links in emails or other messages
  and be exposed to attacks from fake websites and email
  attachments.

More Related Content

What's hot

computer ethics slides
computer ethics slidescomputer ethics slides
computer ethics slidesthothakhail
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentationguest65a1c4
 
History of internet
History of internetHistory of internet
History of internetUsman Sajid
 
Presentation of ict impacts
Presentation of ict impactsPresentation of ict impacts
Presentation of ict impactsBeing Aabis
 
Intellectual property rights
Intellectual property rightsIntellectual property rights
Intellectual property rightsKomal Sahu
 
Computer ethics
Computer ethicsComputer ethics
Computer ethicsJagan Nath
 
Computer ethics & copyright
Computer ethics & copyrightComputer ethics & copyright
Computer ethics & copyrightAdyns
 
Computer Ethics and Legal Issues
Computer Ethics and Legal IssuesComputer Ethics and Legal Issues
Computer Ethics and Legal IssuesKak Yong
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer SecurityVibrant Event
 
Common Security Issues on the Internet
Common Security Issues on the InternetCommon Security Issues on the Internet
Common Security Issues on the InternetBretz Harllynne Moltio
 
Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICTRoshanMaharjan13
 

What's hot (20)

Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
computer ethics slides
computer ethics slidescomputer ethics slides
computer ethics slides
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 
History of internet
History of internetHistory of internet
History of internet
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Presentation of ict impacts
Presentation of ict impactsPresentation of ict impacts
Presentation of ict impacts
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computer
 
Cyber security
Cyber securityCyber security
Cyber security
 
Intellectual property rights
Intellectual property rightsIntellectual property rights
Intellectual property rights
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Computer ethics and crime
Computer ethics and crimeComputer ethics and crime
Computer ethics and crime
 
Internet Ethics
Internet EthicsInternet Ethics
Internet Ethics
 
Computer ethics & copyright
Computer ethics & copyrightComputer ethics & copyright
Computer ethics & copyright
 
Computer Ethics and Legal Issues
Computer Ethics and Legal IssuesComputer Ethics and Legal Issues
Computer Ethics and Legal Issues
 
Ethics for IT Professionals
Ethics for IT ProfessionalsEthics for IT Professionals
Ethics for IT Professionals
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer Security
 
Common Security Issues on the Internet
Common Security Issues on the InternetCommon Security Issues on the Internet
Common Security Issues on the Internet
 
Computer ethics
Computer ethics Computer ethics
Computer ethics
 
Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICT
 

Viewers also liked

Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationHajarul Cikyen
 
Privacy issues and internet privacy
Privacy issues and internet privacyPrivacy issues and internet privacy
Privacy issues and internet privacyvinyas87
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacyrealpeterz
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information PrivacyPerry Slack
 
Ethics On The Internet
Ethics On The InternetEthics On The Internet
Ethics On The InternetDebra Boardman
 
“Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation “Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation tomasztopa
 
Online Privacy
Online PrivacyOnline Privacy
Online PrivacyIWMW
 
Internet privacy presentation
Internet privacy presentationInternet privacy presentation
Internet privacy presentationMatthew Momney
 
Privacy on the Internet
Privacy on the InternetPrivacy on the Internet
Privacy on the InternetPhil Bradley
 
Lesson on Digital Ethics & Copyrights
Lesson on Digital Ethics & CopyrightsLesson on Digital Ethics & Copyrights
Lesson on Digital Ethics & Copyrightscomputerswithredin
 
Internet privacy
Internet privacyInternet privacy
Internet privacyhafsan
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodcharvill
 
Internet Ethics
Internet EthicsInternet Ethics
Internet Ethicsvincentl33
 
Computer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & PrivacyComputer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & PrivacySamudin Kassan
 
Online Privacy and Security
Online Privacy and SecurityOnline Privacy and Security
Online Privacy and SecurityAlex Hyer
 
Marketing online shopping - consumer’s perception on online shopping
Marketing   online shopping - consumer’s perception on online shoppingMarketing   online shopping - consumer’s perception on online shopping
Marketing online shopping - consumer’s perception on online shoppingRadhe Jha
 
Hacking and Online Security
Hacking and Online SecurityHacking and Online Security
Hacking and Online SecurityJeanie Arnoco
 

Viewers also liked (20)

Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics Presentation
 
Privacy issues and internet privacy
Privacy issues and internet privacyPrivacy issues and internet privacy
Privacy issues and internet privacy
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacy
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information Privacy
 
Ethics On The Internet
Ethics On The InternetEthics On The Internet
Ethics On The Internet
 
“Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation “Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation
 
Online Privacy
Online PrivacyOnline Privacy
Online Privacy
 
Internet privacy presentation
Internet privacy presentationInternet privacy presentation
Internet privacy presentation
 
Privacy on the Internet
Privacy on the InternetPrivacy on the Internet
Privacy on the Internet
 
Internet ethics
Internet ethicsInternet ethics
Internet ethics
 
Lesson on Digital Ethics & Copyrights
Lesson on Digital Ethics & CopyrightsLesson on Digital Ethics & Copyrights
Lesson on Digital Ethics & Copyrights
 
Internet privacy
Internet privacyInternet privacy
Internet privacy
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd period
 
Internet Ethics
Internet EthicsInternet Ethics
Internet Ethics
 
Online Security
Online SecurityOnline Security
Online Security
 
Computer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & PrivacyComputer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & Privacy
 
Online ethics
Online ethicsOnline ethics
Online ethics
 
Online Privacy and Security
Online Privacy and SecurityOnline Privacy and Security
Online Privacy and Security
 
Marketing online shopping - consumer’s perception on online shopping
Marketing   online shopping - consumer’s perception on online shoppingMarketing   online shopping - consumer’s perception on online shopping
Marketing online shopping - consumer’s perception on online shopping
 
Hacking and Online Security
Hacking and Online SecurityHacking and Online Security
Hacking and Online Security
 

Similar to Internet Privacy, Ethics and Security

Naughty or nice: Ethical concerns for technology
Naughty or nice:  Ethical concerns for technologyNaughty or nice:  Ethical concerns for technology
Naughty or nice: Ethical concerns for technologyJohan Koren
 
Naughty or nice 2003 version
Naughty or nice 2003 versionNaughty or nice 2003 version
Naughty or nice 2003 versionJohan Koren
 
Naughty or nice 2007 version
Naughty or nice 2007 versionNaughty or nice 2007 version
Naughty or nice 2007 versionJohan Koren
 
Naughty or nice: Ethical concerns with technology
Naughty or nice:  Ethical concerns with technologyNaughty or nice:  Ethical concerns with technology
Naughty or nice: Ethical concerns with technologyJohan Koren
 
Education Privacy
Education Privacy Education Privacy
Education Privacy emilyensign
 
Cyber_Safety_K-12_Fact_Sheet_508C.pdf
Cyber_Safety_K-12_Fact_Sheet_508C.pdfCyber_Safety_K-12_Fact_Sheet_508C.pdf
Cyber_Safety_K-12_Fact_Sheet_508C.pdfMi Ra Lavandelo
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenshipegschool
 
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...mulingoh
 
NAESP Conference - July 12, 2014
NAESP Conference - July 12, 2014NAESP Conference - July 12, 2014
NAESP Conference - July 12, 2014emilyensign
 
Digital citizenship @ your school
Digital citizenship @ your schoolDigital citizenship @ your school
Digital citizenship @ your schoolJune Wall
 
Ethical issues related to is design and its use
Ethical  issues  related  to  is  design  and its useEthical  issues  related  to  is  design  and its use
Ethical issues related to is design and its useNoriha Nori
 
Point2Protect - keeping children safe
Point2Protect - keeping children safePoint2Protect - keeping children safe
Point2Protect - keeping children safePoint2Protect
 
Digital citizenship pp
Digital citizenship ppDigital citizenship pp
Digital citizenship ppKatie Ward
 
Ruth Hammond - Saftguarding Children in a Digital World
Ruth Hammond - Saftguarding Children in a Digital WorldRuth Hammond - Saftguarding Children in a Digital World
Ruth Hammond - Saftguarding Children in a Digital WorldNaace Naace
 
Ethical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and UseEthical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and Useuniversity of education,Lahore
 

Similar to Internet Privacy, Ethics and Security (20)

Naughty or nice: Ethical concerns for technology
Naughty or nice:  Ethical concerns for technologyNaughty or nice:  Ethical concerns for technology
Naughty or nice: Ethical concerns for technology
 
Naughty or nice 2003 version
Naughty or nice 2003 versionNaughty or nice 2003 version
Naughty or nice 2003 version
 
Naughty or nice 2007 version
Naughty or nice 2007 versionNaughty or nice 2007 version
Naughty or nice 2007 version
 
Naughty or nice: Ethical concerns with technology
Naughty or nice:  Ethical concerns with technologyNaughty or nice:  Ethical concerns with technology
Naughty or nice: Ethical concerns with technology
 
Education Privacy
Education Privacy Education Privacy
Education Privacy
 
Cyber_Safety_K-12_Fact_Sheet_508C.pdf
Cyber_Safety_K-12_Fact_Sheet_508C.pdfCyber_Safety_K-12_Fact_Sheet_508C.pdf
Cyber_Safety_K-12_Fact_Sheet_508C.pdf
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
NAESP Conference - July 12, 2014
NAESP Conference - July 12, 2014NAESP Conference - July 12, 2014
NAESP Conference - July 12, 2014
 
Ict Issues
Ict IssuesIct Issues
Ict Issues
 
Digital citizenship @ your school
Digital citizenship @ your schoolDigital citizenship @ your school
Digital citizenship @ your school
 
Ethical issues related to is design and its use
Ethical  issues  related  to  is  design  and its useEthical  issues  related  to  is  design  and its use
Ethical issues related to is design and its use
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Point2Protect - keeping children safe
Point2Protect - keeping children safePoint2Protect - keeping children safe
Point2Protect - keeping children safe
 
Digital citizenship pp
Digital citizenship ppDigital citizenship pp
Digital citizenship pp
 
Common ethical issues
Common ethical issuesCommon ethical issues
Common ethical issues
 
eSafety policy
eSafety policyeSafety policy
eSafety policy
 
Ruth Hammond - Saftguarding Children in a Digital World
Ruth Hammond - Saftguarding Children in a Digital WorldRuth Hammond - Saftguarding Children in a Digital World
Ruth Hammond - Saftguarding Children in a Digital World
 
Ethical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and UseEthical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and Use
 

Internet Privacy, Ethics and Security

  • 1. Internet Privacy, Ethics, and Online Security Paul Berryman Melissa Pabon
  • 2. Introduction The topic for this module is Internet Privacy, Ethics, and Online Security. We have divided this topic into the following sub- topics: Internet Privacy, including laws enacted to protect the privacy of children; Internet Ethics, including plagiarism and cyberbullying; and Online Security.
  • 3. Introduction Each of these areas are gradually evolving with the development of new technology. Traditionally, most issues addressed by these topics have only general guidelines governing users’ behavior; however, some structured rules are starting to develop to maintain a safe environment online.
  • 4. Introduction • Internet Privacy – The protection of sensitive and personal information, sometimes called Personally Identifiable Information (PII), from unauthorized or inappropriate disclosure. • Internet Ethics – The acceptable behavior while using the Internet; being honest and respecting the rights of others on the Internet. • Online security – is protecting students from inappropriate material online and protecting students and teachers from threats from outsiders and each other.
  • 5. The 5 Big Questions Why is it used? or why is it an important issue? Who uses it? or who is affected by it? How is it used? or how does it work? What is needed to use it? or what does it do? What else is important about this technology tool or topic?
  • 6. Why is it used? or why is it an important issue? • Internet privacy, ethics, and online security are important issues because they are present in every action taken by every user online. With incidents of hacking, cyberbullying, and identity theft rising, it is clear that students and teachers need directions now more than ever. • Yet, not every case has a clear-cut answer. Is hacking always wrong? Are there ever cases where it’s acceptable for companies and advertisers to collect data about customers online, without violating their privacy? With these vague areas, it is valuable to explore and discuss the boundaries of security, privacy, and ethics.
  • 7. Who uses it? or who is affected by it? • Anyone who interacts online, in a closed off network (i.e. school network), or even just uses a stand-alone computer is affected by these topics. • Internet ethics are practiced by, and affect, every user online. While each person lives by his or her own moral code, Internet ethics can be thought of as a general set of guidelines that users follow.
  • 8. How is it used? or how does it work? • Privacy, ethics, and security is a combination of user education, technological tools, and administrative policies and procedures. Each group of individuals has a responsibility to protect users, data, and systems from a variety of threats.
  • 9. What is needed to use it? or what does it do? • Organizations, from the top down, must take security seriously and do their best to protect students, teachers, faculty, and administrators. Administrations should conduct due diligence and pay for good technical support and tools to protect the network. But most importantly schools must educate their faculty and students that they are the first line of defense in security and maintain privacy.
  • 10. What else is important about PRIVACY? Lee Rainie (2005) gives several basic insights about Internet privacy: 1. Privacy is a value for most, but not all people. • About two thirds of Americans will give up information in return for something of value. 2. Privacy means different things to different people. • Privacy can be divided into the categories of Anonymity, Confidentiality, and Security. 3. There is a variety of privacy violations. • These range from Embarrassment to Personal Loss and Theft.
  • 11. 4. Not all information is guarded at the same level. • Health and financial information is considered to be more valuable. 5. People want control over information that relates to them. • 86% of Americans say that Internet companies should ask permission to use personal information.
  • 12.
  • 13. What else is important about ETHICS? The Internet Architecture Board (IAB) issued RFC 1087 'Ethics and the Internet,' a policy concerning Internet ethics in 1989. An excerpt from the policy: The IAB strongly endorses the view of the Division Advisory Panel of the National Science Foundation Division of Network, Communications Research and Infrastructure which, in paraphrase, characterized as unethical and unacceptable any activity which purposely: • Seeks to gain unauthorized access to the resources of the Internet. • Disrupts the intended use of the Internet. • Wastes resources (people, capacity, computer) through such actions. • Destroys the integrity of computer-based information. • Compromises the privacy of users.
  • 14. RFC 1087 has since resulted in regulations concerning spamming messages, privacy policies for websites requesting users to provide personal details, and debate over whether governments or individuals should monitor ethics on the Internet.
  • 15. Educational Relevance As technology evolves, teachers try to keep up by encouraging students to utilize the Internet both inside and outside the classroom. However, teachers and students face privacy concerns, ethical concerns, and online security threats, along with growing Internet use. School administrations must develop plans for staying ahead of new issues, such as plagiarism, cyberbullying, and privacy threats to students’ personal information.
  • 16. Educational Relevance Additionally, it is important for schools to stay current with laws pertaining to student Internet use. The Children’s Internet Protection Act (CIPA) was enacted in 2000 to protect children from accessing harmful content over the Internet. Eligible schools and libraries are required to follow certain requirements under CIPA in order to receive discounts for Internet access though the E-rate program. These requirements include having an Internet safety policy that includes technology protection measures that block access to harmful content. This policy must include monitoring the online activities of minors.
  • 17. Educational Relevance An amendment to CIPA, called the Protecting Children in the 21st Century Act, further requires that schools educate students about appropriate online behavior, including cyberbullying awareness and response.
  • 18. Educational Relevance • In regards to online security, there are several factors that make it important for educators to understand. First, and foremost, is for teachers of K-12 students. Children do not understand the risks they may be taking by providing personal information on the Internet.
  • 19. Educational Relevance • Besides the risk from cyberbulling and child stalkers, children may unintentionally compromise their or others personal information. Finally, their lack of understand makes them prime targets for criminals and for virus/malware infections. They are more likely to trust links in emails or other messages and be exposed to attacks from fake websites and email attachments.