SlideShare a Scribd company logo
Misuse of Computer
and Computer Issues
G R O U P M E M B E R S :
• M U H A M M A D A S A D U L L A H ( B S C S F 1 4 M 0 3 7 )
• M U H A M M A D A Y A Z M E H M O O D ( B S C S F 1 4 M 0 2 4 )
• S Y E D A L I H A S S A N S H E R A Z I ( B S C S F 1 4 M 0 3 8 )
• M A L I K S I K A N D A R ( B S C S F 1 4 M 0 )
ASAD
• Computers are a central part of everyday life.
• People use them to keep records, purchase items, balance checkbooks, and find
entertainment.
• Computers make lives easier with their ability to find information quickly.
• Communications for personal and business uses are faster and more efficient than ever
before, and with all the positive aspects of computer use come the negatives.
• Misuse of computer technology is a deviant activity with possible legal ramifications for the
perpetrators.
IMPORTANCE OF COMPUTER
• Businesses, government and academic institutions are increasingly reliant on the Internet for
their day-to-day business, while consumers are using e-commerce more and more for
purchasing goods and services.
• This implies ever-increasing opportunities for hackers and virus writers to disrupt the
activities of their fellow citizens.
• Hacking first became a prominent issue in the 1980's, with the publicity achieved by exploits
such as the Internet Worm, but at that time it was not clear how law enforcement agencies
could best tackle this new threat.
• Hackers were not causing physical damage to anyone's property; if they refrained from
modifying files but simply logged on to a system without permission, it was hard to see what
crime they could be committing under existing law apart from the theft of a negligible amount
of electricity.
COMPUTER MISUSE
• An incident that many people might not think of as computer abuse is creating a fake social
media account.
• If the social media service’s terms and conditions require users to provide accurate
information about their identities when creating an account, they could be prosecuted under
the CFAA.
• Another example of the unintended consequences of expanding the Computer Fraud and
Abuse Act was the threat of a 35-year prison sentence for internet activist Aaron Swartz for
allegedly downloading millions of academic articles to which access was restricted through a
subscription service, probably with the intent to freely distribute them. Arguably, Swartz’s
alleged actions would be constituted as theft, but did the proposed punishment fit the alleged
crime? Swartz did not seem to think so – he took his own life before the case could go to trial.
EXAMPLES OF MISUSE
• Two journalists discovered a password that gave them unbilled access to British Telecom's
Prestel service.
• When they were discovered it was clear that they had obtained this access dishonestly but it
was less clear what they could be charged with.
• Could not be charged with fraud since under UK law this entails that someone has been
deceived. The law does not recognize computers as having minds: therefore they cannot be
said to have been ` ”deceived".
• Eventually the two were prosecuted under laws against forgery and counterfeiting, on the
grounds that they had effectively forged the password.
• This was overturned by the appeal court on various grounds, one of which was that the
password they had used was genuine (not a forgery) even if they had made dishonest use of
it.
A PROMINENT CASE IN UK (1980)
SIKANDAR
1. Career and Social Networking :
Career networking websites allow professionals to post profiles describing their work
experience and current position. Using career networking sites encourages communication
between professionals within the same and related industries. Human resource departments
use these sites to recruit new employees. Social networking sites are geared toward a person's
social life. These sites make it easy to stay in touch with friends and family that move away.
Users can post pictures, videos and some sites even allow blogging. Many people use popular
social networking sites like Facebook to promote their own business.
WAYS IN WHICH COMPUTER CAN CAUSE HARM
2. Entertainment :
Computers are vehicles for many forms of entertainment. The Internet features movies, video
games and music and all are available for downloading. In the absence of the Internet, games
can be purchased at retail stores and installed on the computer. Movies can be viewed from a
computer that has the proper software and online gaming sites allow users to play with other
members globally. Some websites allow members to upload videos of funny situations and
events.
WAYS IN WHICH COMPUTER CAN CAUSE HARM
3. Cybercrime
White-collar crimes can involve the misuse of computers. Economic white-collar crimes include
embezzlement, fraud, racketeering, and money laundering. White-collar crime has risen with the
ease of conducting fraudulent business transactions at the great distances computers provide.
Other computer misusers, called hackers, create and spread viruses via the Internet that crash
systems and steal personal information. Bank account and credit histories are then
compromised with the use of this information.
WAYS IN WHICH COMPUTER CAN CAUSE HARM
4. Cyberbullying
Cyberbullying is the act by a minor of directing verbal assaults and/or death threats towards
another minor. Cyberbullying-by-proxy is the act of a minor aiding another with the bullying of a
target. Cyberbullying has legal ramifications, and depending on the child's age, they will be
charged with a misdemeanor or an act of juvenile delinquency. More serious state and federal
charges will result if their actions include hacking or stealing personal information. Schools have
recently implemented programs to teach students of the effects and dangers of cyberbullying
WAYS IN WHICH COMPUTER CAN CAUSE HARM
AYAZ
Misuse of computers and communications systems comes in several forms:
Hacking
Hacking is where an unauthorised person uses a network, Internet or modemconnection to gain
access past security passwords or other security to see data stored on another computer.
Hackers sometimes use software hacking tools and often target, for example, particular sites on
the Internet.
Viruses
Viruses are relatively simple programs written by people and designed to cause nuisance or
damage to computers or their files.
TYPES OF COMPUTER MISUSE
Data misuse and unauthorised transfer or copying
Copying and illegal transfer of data is very quick and easy using online computers and large
storage devices such as hard disks, memory sticks and DVDs. Personal data, company
research and written work, such as novels and textbooks, cannot be copied without the
copyright holder's permission.
TYPES OF COMPUTER MISUSE
Copying and distributing copyrighted software, music and film
This includes copying music and movies with computer equipment and distributing it on the
Internet without the copyright holder's permission. This is a widespread misuse of both
computers and the Internet that breaks copyright regulations.
TYPES OF COMPUTER MISUSE
Email and chat room abuses
Internet services such as chat rooms and email have been the subject of many well-publicised
cases of impersonation and deception where people who are online pretend to have a different
identity. Chat rooms have been used to spread rumours about well known personalities. A
growing area of abuse of the Internet is email spam, where millions of emails are sent to
advertise both legal and illegal products and services.
TYPES OF COMPUTER MISUSE
Identity and financial abuses
This topic includes misuse of stolen or fictional credit card numbers to obtain goods or services
on the Internet, and use of computers in financial frauds. These can range from complex well
thought out deceptions to simple uses such as printing counterfeit money with colour printers.
TYPES OF COMPUTER MISUSE
ALI
The Computer Misuse Act (1990)
This was passed by Parliament and made three new offences:
• Accessing computer material without permission, e.g. looking at someone else's files.
• Accessing computer material without permission with intent to commit further criminal
offences, e.g. hacking into the bank's computer and wanting to increase the amount in your
account.
• Altering computer data without permission, e.g. writing a virus to destroy someone else's
data, or actually changing the money in an account.
STEPS TAKEN AGAINST THIS ABUSE
The Data Protection Act
This was introduced to regulate personal data. This helps to provide protection against the
abuse of personal information. Find out more about the Data Protection Act.
Copyright law
This provides protection to the owners of the copyright and covers the copying of written,
musical, or film works using computers. FAST is the industry body which is against software
theft. You can find out more about it in the Copyright section.
There have been cases where laws such as Copyright have been used to crack down on file
sharing websites or individuals who store and illegally distribute copyrighted material, eg music.
There is a massive problem with many people around the world obtaining copyrighted material
illegally.
STEPS TAKEN AGAINST THIS ABUSE
Close down chat rooms
• Some chat rooms have been closed down due to abuses, especially where children are
vulnerable.
• Some have moderators who help to prevent abuses. Advice about sensible use is important;
especially to never give personal contact details or arrange meetings without extreme
caution.
STEPS TAKEN AGAINST THIS ABUSE
Reduce email spamming
This may be reduced by:
• Never replying to anonymous emails.
• Setting filters on email accounts.
• Reporting spammers to ISPs, who are beginning to get together to blacklist email abusers.
• Governments passing laws to punish persistent spammers with heavy fines.
STEPS TAKEN AGAINST THIS ABUSE
Regular backups and security
• Just making something illegal or setting up regulations does not stop it happening.
• Responsible computer users need to take reasonable steps to keep their data safe.
• This includes regular backups and sufficient security with passwords.
STEPS TAKEN AGAINST THIS ABUSE
The End
Misuse of computer and computer issues (professional practices) IMPORTANCE OF COMPUTER
Misuse of computer and computer issues (professional practices) IMPORTANCE OF COMPUTER

More Related Content

Recently uploaded

The Canoga Gardens Development Project. PDF
The Canoga Gardens Development Project. PDFThe Canoga Gardens Development Project. PDF
The Canoga Gardens Development Project. PDF
Rahsaan L. Browne
 
Acorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutesAcorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutes
IP ServerOne
 
Bitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXOBitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXO
Matjaž Lipuš
 
Hi-Tech Industry 2024-25 Prospective.pptx
Hi-Tech Industry 2024-25 Prospective.pptxHi-Tech Industry 2024-25 Prospective.pptx
Hi-Tech Industry 2024-25 Prospective.pptx
ShivamM16
 
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
0x01 - Newton's Third Law:  Static vs. Dynamic Abusers0x01 - Newton's Third Law:  Static vs. Dynamic Abusers
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
OWASP Beja
 
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
OECD Directorate for Financial and Enterprise Affairs
 
123445566544333222333444dxcvbcvcvharsh.pptx
123445566544333222333444dxcvbcvcvharsh.pptx123445566544333222333444dxcvbcvcvharsh.pptx
123445566544333222333444dxcvbcvcvharsh.pptx
gargh1099
 
05232024 Joint Meeting - Community Networking
05232024 Joint Meeting - Community Networking05232024 Joint Meeting - Community Networking
05232024 Joint Meeting - Community Networking
Michael Orias
 
Writing Sample 2 -Bridging the Divide: Enhancing Public Engagement in Urban D...
Writing Sample 2 -Bridging the Divide: Enhancing Public Engagement in Urban D...Writing Sample 2 -Bridging the Divide: Enhancing Public Engagement in Urban D...
Writing Sample 2 -Bridging the Divide: Enhancing Public Engagement in Urban D...
Rahsaan L. Browne
 
Pollinator Ambassador Earth Steward Day Presentation 2024-05-22
Pollinator Ambassador Earth Steward Day Presentation 2024-05-22Pollinator Ambassador Earth Steward Day Presentation 2024-05-22
Pollinator Ambassador Earth Steward Day Presentation 2024-05-22
LHelferty
 
Getting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control TowerGetting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control Tower
Vladimir Samoylov
 
527598851-ppc-due-to-various-govt-policies.pdf
527598851-ppc-due-to-various-govt-policies.pdf527598851-ppc-due-to-various-govt-policies.pdf
527598851-ppc-due-to-various-govt-policies.pdf
rajpreetkaur75080
 
Eureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 PresentationEureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 Presentation
Access Innovations, Inc.
 
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Orkestra
 

Recently uploaded (14)

The Canoga Gardens Development Project. PDF
The Canoga Gardens Development Project. PDFThe Canoga Gardens Development Project. PDF
The Canoga Gardens Development Project. PDF
 
Acorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutesAcorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutes
 
Bitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXOBitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXO
 
Hi-Tech Industry 2024-25 Prospective.pptx
Hi-Tech Industry 2024-25 Prospective.pptxHi-Tech Industry 2024-25 Prospective.pptx
Hi-Tech Industry 2024-25 Prospective.pptx
 
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
0x01 - Newton's Third Law:  Static vs. Dynamic Abusers0x01 - Newton's Third Law:  Static vs. Dynamic Abusers
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
 
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
 
123445566544333222333444dxcvbcvcvharsh.pptx
123445566544333222333444dxcvbcvcvharsh.pptx123445566544333222333444dxcvbcvcvharsh.pptx
123445566544333222333444dxcvbcvcvharsh.pptx
 
05232024 Joint Meeting - Community Networking
05232024 Joint Meeting - Community Networking05232024 Joint Meeting - Community Networking
05232024 Joint Meeting - Community Networking
 
Writing Sample 2 -Bridging the Divide: Enhancing Public Engagement in Urban D...
Writing Sample 2 -Bridging the Divide: Enhancing Public Engagement in Urban D...Writing Sample 2 -Bridging the Divide: Enhancing Public Engagement in Urban D...
Writing Sample 2 -Bridging the Divide: Enhancing Public Engagement in Urban D...
 
Pollinator Ambassador Earth Steward Day Presentation 2024-05-22
Pollinator Ambassador Earth Steward Day Presentation 2024-05-22Pollinator Ambassador Earth Steward Day Presentation 2024-05-22
Pollinator Ambassador Earth Steward Day Presentation 2024-05-22
 
Getting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control TowerGetting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control Tower
 
527598851-ppc-due-to-various-govt-policies.pdf
527598851-ppc-due-to-various-govt-policies.pdf527598851-ppc-due-to-various-govt-policies.pdf
527598851-ppc-due-to-various-govt-policies.pdf
 
Eureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 PresentationEureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 Presentation
 
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
 

Featured

PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
SpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Lily Ray
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
Rajiv Jayarajah, MAppComm, ACC
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
Christy Abraham Joy
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
Vit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
MindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
GetSmarter
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
Project for Public Spaces & National Center for Biking and Walking
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
DevGAMM Conference
 
Barbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy Presentation
Erica Santiago
 

Featured (20)

PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
 
Barbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy Presentation
 

Misuse of computer and computer issues (professional practices) IMPORTANCE OF COMPUTER

  • 1. Misuse of Computer and Computer Issues G R O U P M E M B E R S : • M U H A M M A D A S A D U L L A H ( B S C S F 1 4 M 0 3 7 ) • M U H A M M A D A Y A Z M E H M O O D ( B S C S F 1 4 M 0 2 4 ) • S Y E D A L I H A S S A N S H E R A Z I ( B S C S F 1 4 M 0 3 8 ) • M A L I K S I K A N D A R ( B S C S F 1 4 M 0 )
  • 3. • Computers are a central part of everyday life. • People use them to keep records, purchase items, balance checkbooks, and find entertainment. • Computers make lives easier with their ability to find information quickly. • Communications for personal and business uses are faster and more efficient than ever before, and with all the positive aspects of computer use come the negatives. • Misuse of computer technology is a deviant activity with possible legal ramifications for the perpetrators. IMPORTANCE OF COMPUTER
  • 4. • Businesses, government and academic institutions are increasingly reliant on the Internet for their day-to-day business, while consumers are using e-commerce more and more for purchasing goods and services. • This implies ever-increasing opportunities for hackers and virus writers to disrupt the activities of their fellow citizens. • Hacking first became a prominent issue in the 1980's, with the publicity achieved by exploits such as the Internet Worm, but at that time it was not clear how law enforcement agencies could best tackle this new threat. • Hackers were not causing physical damage to anyone's property; if they refrained from modifying files but simply logged on to a system without permission, it was hard to see what crime they could be committing under existing law apart from the theft of a negligible amount of electricity. COMPUTER MISUSE
  • 5. • An incident that many people might not think of as computer abuse is creating a fake social media account. • If the social media service’s terms and conditions require users to provide accurate information about their identities when creating an account, they could be prosecuted under the CFAA. • Another example of the unintended consequences of expanding the Computer Fraud and Abuse Act was the threat of a 35-year prison sentence for internet activist Aaron Swartz for allegedly downloading millions of academic articles to which access was restricted through a subscription service, probably with the intent to freely distribute them. Arguably, Swartz’s alleged actions would be constituted as theft, but did the proposed punishment fit the alleged crime? Swartz did not seem to think so – he took his own life before the case could go to trial. EXAMPLES OF MISUSE
  • 6. • Two journalists discovered a password that gave them unbilled access to British Telecom's Prestel service. • When they were discovered it was clear that they had obtained this access dishonestly but it was less clear what they could be charged with. • Could not be charged with fraud since under UK law this entails that someone has been deceived. The law does not recognize computers as having minds: therefore they cannot be said to have been ` ”deceived". • Eventually the two were prosecuted under laws against forgery and counterfeiting, on the grounds that they had effectively forged the password. • This was overturned by the appeal court on various grounds, one of which was that the password they had used was genuine (not a forgery) even if they had made dishonest use of it. A PROMINENT CASE IN UK (1980)
  • 8. 1. Career and Social Networking : Career networking websites allow professionals to post profiles describing their work experience and current position. Using career networking sites encourages communication between professionals within the same and related industries. Human resource departments use these sites to recruit new employees. Social networking sites are geared toward a person's social life. These sites make it easy to stay in touch with friends and family that move away. Users can post pictures, videos and some sites even allow blogging. Many people use popular social networking sites like Facebook to promote their own business. WAYS IN WHICH COMPUTER CAN CAUSE HARM
  • 9. 2. Entertainment : Computers are vehicles for many forms of entertainment. The Internet features movies, video games and music and all are available for downloading. In the absence of the Internet, games can be purchased at retail stores and installed on the computer. Movies can be viewed from a computer that has the proper software and online gaming sites allow users to play with other members globally. Some websites allow members to upload videos of funny situations and events. WAYS IN WHICH COMPUTER CAN CAUSE HARM
  • 10. 3. Cybercrime White-collar crimes can involve the misuse of computers. Economic white-collar crimes include embezzlement, fraud, racketeering, and money laundering. White-collar crime has risen with the ease of conducting fraudulent business transactions at the great distances computers provide. Other computer misusers, called hackers, create and spread viruses via the Internet that crash systems and steal personal information. Bank account and credit histories are then compromised with the use of this information. WAYS IN WHICH COMPUTER CAN CAUSE HARM
  • 11. 4. Cyberbullying Cyberbullying is the act by a minor of directing verbal assaults and/or death threats towards another minor. Cyberbullying-by-proxy is the act of a minor aiding another with the bullying of a target. Cyberbullying has legal ramifications, and depending on the child's age, they will be charged with a misdemeanor or an act of juvenile delinquency. More serious state and federal charges will result if their actions include hacking or stealing personal information. Schools have recently implemented programs to teach students of the effects and dangers of cyberbullying WAYS IN WHICH COMPUTER CAN CAUSE HARM
  • 12. AYAZ
  • 13. Misuse of computers and communications systems comes in several forms: Hacking Hacking is where an unauthorised person uses a network, Internet or modemconnection to gain access past security passwords or other security to see data stored on another computer. Hackers sometimes use software hacking tools and often target, for example, particular sites on the Internet. Viruses Viruses are relatively simple programs written by people and designed to cause nuisance or damage to computers or their files. TYPES OF COMPUTER MISUSE
  • 14. Data misuse and unauthorised transfer or copying Copying and illegal transfer of data is very quick and easy using online computers and large storage devices such as hard disks, memory sticks and DVDs. Personal data, company research and written work, such as novels and textbooks, cannot be copied without the copyright holder's permission. TYPES OF COMPUTER MISUSE
  • 15. Copying and distributing copyrighted software, music and film This includes copying music and movies with computer equipment and distributing it on the Internet without the copyright holder's permission. This is a widespread misuse of both computers and the Internet that breaks copyright regulations. TYPES OF COMPUTER MISUSE
  • 16. Email and chat room abuses Internet services such as chat rooms and email have been the subject of many well-publicised cases of impersonation and deception where people who are online pretend to have a different identity. Chat rooms have been used to spread rumours about well known personalities. A growing area of abuse of the Internet is email spam, where millions of emails are sent to advertise both legal and illegal products and services. TYPES OF COMPUTER MISUSE
  • 17. Identity and financial abuses This topic includes misuse of stolen or fictional credit card numbers to obtain goods or services on the Internet, and use of computers in financial frauds. These can range from complex well thought out deceptions to simple uses such as printing counterfeit money with colour printers. TYPES OF COMPUTER MISUSE
  • 18. ALI
  • 19. The Computer Misuse Act (1990) This was passed by Parliament and made three new offences: • Accessing computer material without permission, e.g. looking at someone else's files. • Accessing computer material without permission with intent to commit further criminal offences, e.g. hacking into the bank's computer and wanting to increase the amount in your account. • Altering computer data without permission, e.g. writing a virus to destroy someone else's data, or actually changing the money in an account. STEPS TAKEN AGAINST THIS ABUSE
  • 20. The Data Protection Act This was introduced to regulate personal data. This helps to provide protection against the abuse of personal information. Find out more about the Data Protection Act. Copyright law This provides protection to the owners of the copyright and covers the copying of written, musical, or film works using computers. FAST is the industry body which is against software theft. You can find out more about it in the Copyright section. There have been cases where laws such as Copyright have been used to crack down on file sharing websites or individuals who store and illegally distribute copyrighted material, eg music. There is a massive problem with many people around the world obtaining copyrighted material illegally. STEPS TAKEN AGAINST THIS ABUSE
  • 21. Close down chat rooms • Some chat rooms have been closed down due to abuses, especially where children are vulnerable. • Some have moderators who help to prevent abuses. Advice about sensible use is important; especially to never give personal contact details or arrange meetings without extreme caution. STEPS TAKEN AGAINST THIS ABUSE
  • 22. Reduce email spamming This may be reduced by: • Never replying to anonymous emails. • Setting filters on email accounts. • Reporting spammers to ISPs, who are beginning to get together to blacklist email abusers. • Governments passing laws to punish persistent spammers with heavy fines. STEPS TAKEN AGAINST THIS ABUSE
  • 23. Regular backups and security • Just making something illegal or setting up regulations does not stop it happening. • Responsible computer users need to take reasonable steps to keep their data safe. • This includes regular backups and sufficient security with passwords. STEPS TAKEN AGAINST THIS ABUSE