Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Cit101 social aspects_and_issues_of_the_internet spring 2012


Published on

Internet Privacy, Security, and Social Issues

Published in: Education, Technology
  • Be the first to comment

  • Be the first to like this

Cit101 social aspects_and_issues_of_the_internet spring 2012

  1. 1. Privacy and securityonline; social issuesfor a social networkCIT101I: Using the InternetApril 18, 2012
  2. 2. Wireless LAN Uses a wireless medium — such as radio frequency transmissions — to connect computers, printers, and other devices RF is most common for WiFi hotspots IR or Bluetooth for short2 range devices
  3. 3. Networking Basics3
  4. 4. Location-Based Servicesand GPS  Handheld wireless devices, such as smartphones and tablets, are ubiquitous in today’s modern mobile societies 4
  5. 5. Location-Based Servicesand GPS Location-based services (LBS) are wireless services offered to customers based on their physical location  E9-1-1 At the heart of this and other LBSs are the global positioning system (GPS) satellite network and receivers mounted in automobiles or placed in cell phones or other handheld devices 5 Chapter 6: Understanding Internet Technologies and Security
  6. 6. Location-Based Servicesand GPS  Geosocial networking is a term used to describe the combination of LBS with social networking providers  Foursquare  Yelp  Google Latitude 6 Chapter 6: Understanding Internet Technologies and Security
  7. 7. Internet Telephony and Web Conferencing Internet telephony  Voice over IP (VoIP)  Uses TCP/IP and packet switching to send voice transmissions over private or public IP network • E-businesses, such as Vonage, offer digital telephony services • Computer to computer calling using special software, such as Skype 7 Chapter 6: Understanding Internet Technologies and Security
  8. 8. Internet Telephony and WebConferencing8 Chapter 6: Understanding Internet Technologies and Security
  9. 9. Security/privacy Security: how safe is our data and equipment? Privacy: how safe is my information?  Passwords (biometrics?)  Firewalls  Viruses  Data encryption  Spam and spyware  Cookies  Browser history and cache  Cyberstalking  Cyberbullying Questions to ask about sharing information online:  Who, what, when, where, why, and how?
  10. 10. Network Security Issues and Technologies Internal threats  Security policies and procedures  Authorized network access  Wireless network security  Data backup and restore  Disaster recovery planning 10
  11. 11. Network Security Issues and Technologies External threats  Unauthorized network access  Computer viruses  Web page hacking  Firewalls and proxy servers  Internet filtering software  Security audits 11
  12. 12. Network Security Issues and Technologies Transactional risks  Protecting and validating online transaction information 12
  13. 13. Virtual Private Networks 13 Chapter 6: Understanding Internet Technologies and Security
  14. 14. The digital divide Nearly 1 in 5 American adults does not use the Internet (78% do, plus 95% of teens) Least likely users (% who use Internet):  Adults over 65 – 41%  <$30,000 household income – 62%  No HS diploma – 43% 62% have broadband, 3% dial-up, lots of mobile use (88% have cell phones) 65% of Internet users use social networks (50% of adults) What can’t you do without the Internet? (48% of non- users say it’s not relevant to their lives) Pew Internet and American Life Survey in 2012
  15. 15. Copyright & file sharing Print, e-books, MP3 audio, video Protecting copyright of digital items Easier digitization of existing items Easier sharing of illegal copies (file sharing, etc.) Lack of legislative guidance (old law) DRM – Digital Rights Management  Limiting copying and printing  Breaks fair use exemptions? Stopping file sharing networks