SlideShare a Scribd company logo
1 of 6
Digital Ethics

Lauren Raymond
   CMSY 129
Privacy
 Precautions need to made when
  using the internet due to many
  threats and privacy issues.
 Privacy can be defined as the
  condition of being secret.
Privacy
 Computers have risked the privacy of many
  users.
 Common ways for computer technology to invade
  privacy is through:
   Social media sites
   Hackers
   Tracking devices
   Spy satellites


  (MIT.edu)
Behavioral Targeting
 Behavioral targeting is a user is tracked using
 their internet history. This information to put into
 a cookie and the cookie is stored on the user’s
 hard drive. When the user revisits site, the
 cookie is sent to the server
   Pcmag.com
Behavioral Targeting
 Behavioral targeting may seem as
 though it is harmless, web sites and
 cookies can store important information
 that could threaten personal privacy.
Souces
 The Computer Language Company. "Behavioral Targeting." PC
    Mag. The Computer Language Company, n.d. Web. 11 Feb.
    2013.
    <http://www.pcmag.com/encyclopedia_term/0,1237,t=behavioral
    +targeting&i=58438,00.asp>.
   Farlex. The Free Dictionary. Farlex, n.d. Web. 11 Feb. 2013.
    <http://www.thefreedictionary.com/privacy>.
   Infusionsoft Team. "Is Behavioral Targeting Evil?" Big Ideas Blog.
    Infusionsoft, 3 Sept. 2009. Web. 11 Feb. 2013.
    <http://bigideasblog.infusionsoft.com/is-behavioral-targeting-
    evil/>.
   Marx, Gary. "Privacy and Technology." Privacy and Technology.
    MIT, 1 Nov. 1999. Web. 11 Feb. 2013.
    <http://web.mit.edu/gtmarx/www/privantt.html>.
   Privacy. N.d. Photograph.
    Http://www.galvserv.com/assets/images/Privacy.JPG, n.p.
   Target. N.d. Photograph. Google Images. Google. N.p.: n.p., n.d.
    N. pag. Web. 11 Feb. 2013.

More Related Content

What's hot

Out in the open protecting your privacy in the digital age
Out in the open  protecting your privacy in the digital ageOut in the open  protecting your privacy in the digital age
Out in the open protecting your privacy in the digital agecomplianceonline123
 
The Corporate Web Security Landscape
The Corporate Web Security LandscapeThe Corporate Web Security Landscape
The Corporate Web Security LandscapePeter Wood
 
Library On Internet Security
Library On Internet SecurityLibrary On Internet Security
Library On Internet Securitymomac
 

What's hot (6)

Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Out in the open protecting your privacy in the digital age
Out in the open  protecting your privacy in the digital ageOut in the open  protecting your privacy in the digital age
Out in the open protecting your privacy in the digital age
 
The Corporate Web Security Landscape
The Corporate Web Security LandscapeThe Corporate Web Security Landscape
The Corporate Web Security Landscape
 
Ap fake tweet
Ap fake tweetAp fake tweet
Ap fake tweet
 
Library On Internet Security
Library On Internet SecurityLibrary On Internet Security
Library On Internet Security
 
Jalynn johnshea
Jalynn johnsheaJalynn johnshea
Jalynn johnshea
 

Viewers also liked

Corporate Social Responsibility - Analysis & Impact India Inc.
Corporate Social Responsibility - Analysis & Impact India Inc.Corporate Social Responsibility - Analysis & Impact India Inc.
Corporate Social Responsibility - Analysis & Impact India Inc.DHEERAJ KHANNA
 
8. pedro y la roca
8. pedro y la roca8. pedro y la roca
8. pedro y la rocaA L
 
Highlightsoftax reforms 2011
Highlightsoftax reforms 2011Highlightsoftax reforms 2011
Highlightsoftax reforms 2011cyril pathirana
 
Media evaluation question 1
Media evaluation question 1Media evaluation question 1
Media evaluation question 1floam123
 
Tempo February 2014
Tempo February 2014 Tempo February 2014
Tempo February 2014 Tempoplanet
 
Αεροπορικη ιδεα
Αεροπορικη ιδεαΑεροπορικη ιδεα
Αεροπορικη ιδεαgeormak
 
Tempo December 2013
Tempo December 2013 Tempo December 2013
Tempo December 2013 Tempoplanet
 
20130125
2013012520130125
20130125trafica
 
10. la ira de eliú
10. la ira de eliú10. la ira de eliú
10. la ira de eliúA L
 
11. pedro y el gran conflicto
11. pedro y el gran conflicto11. pedro y el gran conflicto
11. pedro y el gran conflictoA L
 
5. la controversia continúa
5. la controversia continúa5. la controversia continúa
5. la controversia continúaA L
 
Rachel Fullmer-portfolio
Rachel Fullmer-portfolioRachel Fullmer-portfolio
Rachel Fullmer-portfolioskeez0526
 

Viewers also liked (20)

Corporate Social Responsibility - Analysis & Impact India Inc.
Corporate Social Responsibility - Analysis & Impact India Inc.Corporate Social Responsibility - Analysis & Impact India Inc.
Corporate Social Responsibility - Analysis & Impact India Inc.
 
8. pedro y la roca
8. pedro y la roca8. pedro y la roca
8. pedro y la roca
 
Smp 2009
Smp 2009Smp 2009
Smp 2009
 
Highlightsoftax reforms 2011
Highlightsoftax reforms 2011Highlightsoftax reforms 2011
Highlightsoftax reforms 2011
 
Advanced composition
Advanced compositionAdvanced composition
Advanced composition
 
Media evaluation question 1
Media evaluation question 1Media evaluation question 1
Media evaluation question 1
 
Tempo February 2014
Tempo February 2014 Tempo February 2014
Tempo February 2014
 
Facebook
FacebookFacebook
Facebook
 
7 stra ff
7 stra ff7 stra ff
7 stra ff
 
Αεροπορικη ιδεα
Αεροπορικη ιδεαΑεροπορικη ιδεα
Αεροπορικη ιδεα
 
Presentation1 walentynka od grzecha
Presentation1 walentynka od grzechaPresentation1 walentynka od grzecha
Presentation1 walentynka od grzecha
 
Tempo December 2013
Tempo December 2013 Tempo December 2013
Tempo December 2013
 
5èb bongoh
5èb bongoh5èb bongoh
5èb bongoh
 
20130125
2013012520130125
20130125
 
Roma
RomaRoma
Roma
 
10. la ira de eliú
10. la ira de eliú10. la ira de eliú
10. la ira de eliú
 
11. pedro y el gran conflicto
11. pedro y el gran conflicto11. pedro y el gran conflicto
11. pedro y el gran conflicto
 
5. la controversia continúa
5. la controversia continúa5. la controversia continúa
5. la controversia continúa
 
Odnoklassniki_Serebryaniy_luchnik
Odnoklassniki_Serebryaniy_luchnikOdnoklassniki_Serebryaniy_luchnik
Odnoklassniki_Serebryaniy_luchnik
 
Rachel Fullmer-portfolio
Rachel Fullmer-portfolioRachel Fullmer-portfolio
Rachel Fullmer-portfolio
 

Similar to Digital ethics

Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet SecurityAshley Zimmerman
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet SecurityJFashant
 
Data privacy over internet
Data privacy over internetData privacy over internet
Data privacy over internetdevashishicai
 
Lkw Security Part 1_MVPs Azra & Sanjay
Lkw Security Part 1_MVPs Azra & SanjayLkw Security Part 1_MVPs Azra & Sanjay
Lkw Security Part 1_MVPs Azra & SanjayQuek Lilian
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityRamiro Cid
 
ID-20305090 Fahim Montasir.pptx
ID-20305090 Fahim Montasir.pptxID-20305090 Fahim Montasir.pptx
ID-20305090 Fahim Montasir.pptxFahimMuntasir21
 
1 introit security
1 introit security1 introit security
1 introit securityricharddxd
 
Computer Ethics
Computer EthicsComputer Ethics
Computer EthicsRamki M
 
Running Head DATA BREACH .docx
Running Head DATA BREACH                                        .docxRunning Head DATA BREACH                                        .docx
Running Head DATA BREACH .docxtodd271
 
Chap13 Security and Ethical Challenges
Chap13 Security and Ethical ChallengesChap13 Security and Ethical Challenges
Chap13 Security and Ethical ChallengesAqib Syed
 
Notes to The Ten Commandments of Online Security and Privacy
Notes to The Ten Commandments of Online Security and PrivacyNotes to The Ten Commandments of Online Security and Privacy
Notes to The Ten Commandments of Online Security and PrivacyJonathan Bacon
 
Security in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudSecurity in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudITDogadjaji.com
 
Online Privacy Lilyana Ruiz
Online Privacy Lilyana RuizOnline Privacy Lilyana Ruiz
Online Privacy Lilyana Ruizlilyanariz
 
Computer Security Policy
Computer Security PolicyComputer Security Policy
Computer Security Policyeverestsky66
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Preventionijsrd.com
 
Multitenency - Solving Security Issue
Multitenency - Solving Security Issue Multitenency - Solving Security Issue
Multitenency - Solving Security Issue MANVENDRA PRIYADARSHI
 
Fog Computing:The Justifying Insider Data Stealing Attacks in the Cloud
Fog Computing:The Justifying Insider Data Stealing Attacks in the CloudFog Computing:The Justifying Insider Data Stealing Attacks in the Cloud
Fog Computing:The Justifying Insider Data Stealing Attacks in the CloudIJSRD
 
Intro to Android, IOT, Hacking & Web Designinng
Intro to Android, IOT, Hacking & Web DesigninngIntro to Android, IOT, Hacking & Web Designinng
Intro to Android, IOT, Hacking & Web DesigninngI am Cipher
 

Similar to Digital ethics (20)

Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet Security
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet Security
 
Data privacy over internet
Data privacy over internetData privacy over internet
Data privacy over internet
 
Lecture #22: Web Privacy & Security Breach
Lecture #22: Web Privacy & Security BreachLecture #22: Web Privacy & Security Breach
Lecture #22: Web Privacy & Security Breach
 
Lkw Security Part 1_MVPs Azra & Sanjay
Lkw Security Part 1_MVPs Azra & SanjayLkw Security Part 1_MVPs Azra & Sanjay
Lkw Security Part 1_MVPs Azra & Sanjay
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
ID-20305090 Fahim Montasir.pptx
ID-20305090 Fahim Montasir.pptxID-20305090 Fahim Montasir.pptx
ID-20305090 Fahim Montasir.pptx
 
1 introit security
1 introit security1 introit security
1 introit security
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Running Head DATA BREACH .docx
Running Head DATA BREACH                                        .docxRunning Head DATA BREACH                                        .docx
Running Head DATA BREACH .docx
 
Chap13 Security and Ethical Challenges
Chap13 Security and Ethical ChallengesChap13 Security and Ethical Challenges
Chap13 Security and Ethical Challenges
 
Notes to The Ten Commandments of Online Security and Privacy
Notes to The Ten Commandments of Online Security and PrivacyNotes to The Ten Commandments of Online Security and Privacy
Notes to The Ten Commandments of Online Security and Privacy
 
Security in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudSecurity in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and Cloud
 
Online Privacy Lilyana Ruiz
Online Privacy Lilyana RuizOnline Privacy Lilyana Ruiz
Online Privacy Lilyana Ruiz
 
Computer Security Policy
Computer Security PolicyComputer Security Policy
Computer Security Policy
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Prevention
 
Multitenency - Solving Security Issue
Multitenency - Solving Security Issue Multitenency - Solving Security Issue
Multitenency - Solving Security Issue
 
Fog Computing:The Justifying Insider Data Stealing Attacks in the Cloud
Fog Computing:The Justifying Insider Data Stealing Attacks in the CloudFog Computing:The Justifying Insider Data Stealing Attacks in the Cloud
Fog Computing:The Justifying Insider Data Stealing Attacks in the Cloud
 
Ch12
Ch12Ch12
Ch12
 
Intro to Android, IOT, Hacking & Web Designinng
Intro to Android, IOT, Hacking & Web DesigninngIntro to Android, IOT, Hacking & Web Designinng
Intro to Android, IOT, Hacking & Web Designinng
 

Digital ethics

  • 2. Privacy  Precautions need to made when using the internet due to many threats and privacy issues.  Privacy can be defined as the condition of being secret.
  • 3. Privacy  Computers have risked the privacy of many users.  Common ways for computer technology to invade privacy is through:  Social media sites  Hackers  Tracking devices  Spy satellites (MIT.edu)
  • 4. Behavioral Targeting  Behavioral targeting is a user is tracked using their internet history. This information to put into a cookie and the cookie is stored on the user’s hard drive. When the user revisits site, the cookie is sent to the server  Pcmag.com
  • 5. Behavioral Targeting  Behavioral targeting may seem as though it is harmless, web sites and cookies can store important information that could threaten personal privacy.
  • 6. Souces  The Computer Language Company. "Behavioral Targeting." PC Mag. The Computer Language Company, n.d. Web. 11 Feb. 2013. <http://www.pcmag.com/encyclopedia_term/0,1237,t=behavioral +targeting&i=58438,00.asp>.  Farlex. The Free Dictionary. Farlex, n.d. Web. 11 Feb. 2013. <http://www.thefreedictionary.com/privacy>.  Infusionsoft Team. "Is Behavioral Targeting Evil?" Big Ideas Blog. Infusionsoft, 3 Sept. 2009. Web. 11 Feb. 2013. <http://bigideasblog.infusionsoft.com/is-behavioral-targeting- evil/>.  Marx, Gary. "Privacy and Technology." Privacy and Technology. MIT, 1 Nov. 1999. Web. 11 Feb. 2013. <http://web.mit.edu/gtmarx/www/privantt.html>.  Privacy. N.d. Photograph. Http://www.galvserv.com/assets/images/Privacy.JPG, n.p.  Target. N.d. Photograph. Google Images. Google. N.p.: n.p., n.d. N. pag. Web. 11 Feb. 2013.