SlideShare a Scribd company logo
1 of 79
Introduction to Information Technology
10.1. Internet Privacy, Internet Security, and Netiquette
Introduction to Information Technology
INT-1010
Prof C
Luis R Castellanos
1
10
Internet Privacy, Internet Security, and
Netiquette
Introduction to Information Technology
10.1. Internet Privacy, Internet Security, and Netiquette
2
POTUS 45
The most important thing in life is
to love what you’re doing, because
that’s the only way you’ll ever be
really good at it.
Introduction to Information Technology
10.1. Internet Privacy, Internet Security, and Netiquette
3
If you are in a race, and you pass
the runner who was in second
place, in which place do you
finish the race?
a) First place
b) Second place
c) Third place
d) Last
Introduction to Information Technology
10.1. Internet Privacy, Internet Security, and Netiquette
9. Web
Development
4
Previous Chapter:
✓ Brief history of the
Internet
✓ Website design
✓ Development
✓ IDE
✓ Creating HTML files
✓ Fonts and Text
decorations
Introduction to Information Technology
10.1. Internet Privacy, Internet Security, and Netiquette
5
The growing internet intrusions
have devastating implications for
our right to privacy.
But more than just privacy is
threatened when everything we say,
everywhere we go, and everyone we
associate with is fair game.
There are certain rules required to
protect your data and ensure proper
etiquette when using the internet.
Introduction to Information Technology
10.1. Internet Privacy, Internet Security, and Netiquette
6
✓ Define computer security
✓ Understand what industries are affected by
computer security
✓ Use tools for communicating online
Objectives
Introduction to Information Technology
10.1. Internet Privacy, Internet Security, and Netiquette
7
This chapter has three topics:
Internet Privacy Internet Security Netiquette
Introduction to Information Technology
10.1. Internet Privacy, Internet Security, and Netiquette
Introduction to Information Technology
INT-1010
Prof C
Luis R Castellanos
2022
8
10.1
Internet Privacy, Internet Security,
and Netiquette:
Internet Privacy
Introduction to Information Technology
10.1. Internet Privacy, Internet Security, and Netiquette
9
Introduction to Information Technology
10.1. Internet Privacy, Internet Security, and Netiquette
10
Internet privacy involves the right or
mandate of personal privacy
concerning the storing, re-purposing,
provision to third parties, and
displaying of information pertaining to
oneself via the Internet.
Internet privacy is a subset of data
privacy.
Privacy concerns have been articulated
from the beginnings of large-scale
computer sharing.
Introduction to Information Technology
10.1. Internet Privacy, Internet Security, and Netiquette
11
Privacy can entail either Personally-
Identifying Information (PII) or non-
PII information such as a site visitor’s
behavior on a website.
PII refers to any information that can
be used to identify an individual.
For example, age and physical address
alone could identify who an individual
is without explicitly disclosing their
name, as these two factors are unique
enough to typically identify a specific
person.
Introduction to Information Technology
10.1. Internet Privacy, Internet Security, and Netiquette
12
Some experts such as Steve Rambam, a
private investigator specializing in Internet
privacy cases, believe that privacy no
longer exists; saying, “Privacy is dead – get
over it”.
In fact, it has been suggested that the
“appeal of online services is to broadcast
personal information on purpose”.
On the other hand, in his essay The Value
of Privacy, security expert Bruce
Schneier says, “Privacy protects us from
abuses by those in power, even if we’re
doing nothing wrong at the time of
surveillance.”
Introduction to Information Technology
10.1. Internet Privacy, Internet Security, and Netiquette
13
Levels of Privacy Risks to Internet
Privacy
Cookies Photos on Internet
Internet Privacy
Introduction to Information Technology
10.1. Internet Privacy, Internet Security, and Netiquette
14
Levels of Privacy
Internet Privacy, Internet
Security, and Netiquette
Introduction to Information Technology
10.1. Internet Privacy, Internet Security, and Netiquette
15
Internet and digital privacy are viewed
differently from traditional expectations of
privacy.
Internet privacy is primarily concerned with
protecting user information.
Law Professor Jerry Kang explains that the
term privacy expresses space, decision, and
information.
In terms of space, individuals have an
expectation that their physical spaces (i.e.
homes, cars) not be intruded on.
Privacy within the realm of decision is best
illustrated by the landmark case Roe vs Wade.
Introduction to Information Technology
10.1. Internet Privacy, Internet Security, and Netiquette
16
Roe vs Wade, 410 U.S. 113 (1973), was
a landmark decision of the U.S.
Supreme Court in which the Court
ruled that the Constitution of the US
protects a pregnant woman's liberty to
choose to have an abortion without
excessive government restriction.
"Jane Roe"—who in 1969 became
pregnant with her 3rd child, wanted an
abortion but lived in Texas, where
abortion was illegal. The local DA was
Henry Wade.
https://en.wikipedia.org/wiki/Roe_v._Wade
Introduction to Information Technology
10.1. Internet Privacy, Internet Security, and Netiquette
17
Lastly, information privacy is in regards to the
collection of user information from a variety of
sources, which produces great discussion.
The 1997 Information Infrastructure Task
Force (IITF) created under President Clinton
defined information privacy as “an individual’s
claim to control the terms under which
personal information–information identifiable
to the individual–is acquired, disclosed, and
used.”
At the end of the 1990s, with the rise of the
internet, it became clear that the internet and
companies would need to abide by new rules to
protect individuals’ privacy.
Introduction to Information Technology
10.1. Internet Privacy, Internet Security, and Netiquette
18
With the rise of the internet and mobile networks,
the salience of internet privacy is a daily concern
for users.
People with only a casual concern for Internet
privacy need not achieve total anonymity.
Internet users may protect their privacy through
controlled disclosure of personal information.
The revelation of IP addresses, non-personally-
identifiable profiling, and similar information
might become acceptable trade-offs for the
convenience that users could otherwise lose using
the workarounds needed to suppress such details
rigorously.
Introduction to Information Technology
10.1. Internet Privacy, Internet Security, and Netiquette
19
On the other hand, some people desire much
stronger privacy.
In that case, they may try to achieve Internet
anonymity to ensure privacy — use of the Internet
without giving any third parties the ability to link the
Internet activities to personally-identifiable
information of the Internet user.
In order to keep their information private, people
need to be careful with what they submit and look at
online.
When filling out forms and buying merchandise, that
becomes tracked and because the information was
not private, companies are now sending Internet
users spam and advertising on similar products.
Introduction to Information Technology
10.1. Internet Privacy, Internet Security, and Netiquette
20
Email spam, also referred to as junk email or simply spam, is unsolicited
messages sent in bulk by email (spamming).
The name comes from a Monty Python sketch in which the name of the
canned pork product Spam is ubiquitous, unavoidable, and repetitive.
https://en.wikipedia.org/wiki/Email_spam
Introduction to Information Technology
10.1. Internet Privacy, Internet Security, and Netiquette
21
There are also several governmental organizations
that protect individuals’ privacy and anonymity on
the Internet, to a point.
In an article presented by the FTC, in October 2011,
a number of pointers were brought to attention
that helps an individual internet user avoid
possible identity theft and other cyber-attacks.
Preventing or limiting the usage of Social Security
numbers online, being wary and respectful of
emails including spam messages, being mindful of
personal financial details, creating and managing
strong passwords, and intelligent web-browsing
behaviors are recommended, among others.
Introduction to Information Technology
10.1. Internet Privacy, Internet Security, and Netiquette
22
Posting things on the Internet can be harmful or in
danger of malicious attack.
Some information posted on the Internet is
permanent, depending on the terms of service, and
privacy policies of particular services offered online.
This can include comments written on blogs, pictures,
and Internet sites, such as Facebook and Twitter.
It is absorbed into cyberspace and once it is posted,
anyone can potentially find it and access it.
Some employers may research a potential employee
by searching online for the details of their online
behaviors, possibly affecting the outcome of the
success of the candidate.
Introduction to Information Technology
10.1. Internet Privacy, Internet Security, and Netiquette
23
Introduction to Information Technology
10.1. Internet Privacy, Internet Security, and Netiquette
24
Levels of Privacy Risks to Internet
Privacy
Cookies Photos on Internet
Internet Privacy
Introduction to Information Technology
10.1. Internet Privacy, Internet Security, and Netiquette
25
Risks to Internet
Privacy
Internet Privacy, Internet
Security, and Netiquette
Introduction to Information Technology
10.1. Internet Privacy, Internet Security, and Netiquette
26
Companies are hired to watch what
internet sites people visit, and then use
the information, for instance by
sending advertising based on one’s
browsing history.
There are many ways in which people
can divulge their personal information,
for instance by use of “social media”
and by sending bank and credit card
information to various websites.
Introduction to Information Technology
10.1. Internet Privacy, Internet Security, and Netiquette
27
Jan 2021
https://www.visualcapitalist.com/the-50-
most-visited-websites-in-the-world/
Introduction to Information Technology
10.1. Internet Privacy, Internet Security, and Netiquette
28
Moreover, directly observed behavior, such
as browsing logs, search queries, or
contents of the Facebook profile can be
automatically processed to infer potentially
more intrusive details about an individual,
such as sexual orientation, political and
religious views, race, substance use,
intelligence, and personality.
Those concerned about Internet privacy
often cite a number of privacy risks —
events that can compromise privacy —
which may be encountered through Internet
use.
Introduction to Information Technology
10.1. Internet Privacy, Internet Security, and Netiquette
29
These range from the gathering of statistics
on users to more malicious acts such as the
spreading of spyware and the exploitation
of various forms of bugs (software faults).
Several social networking sites try to
protect the personal information of their
subscribers.
On Facebook, for example, privacy settings
are available to all registered users: they
can block certain individuals from seeing
their profile, they can choose their
“friends”, and they can limit who has access
to one’s pictures and videos.
Introduction to Information Technology
10.1. Internet Privacy, Internet Security, and Netiquette
30
Privacy settings are also available on
other social networking sites such as
Google Plus and Twitter.
The user can apply such settings when
providing personal information on the
internet.
In late 2007 Facebook launched the
Beacon program where user rental
records were released to the public for
friends to see.
Many people were enraged by this
breach of privacy, and the Lane v.
Facebook, Inc. case ensued.
Introduction to Information Technology
10.1. Internet Privacy, Internet Security, and Netiquette
31
Children and adolescents often use the
Internet (including social media) in ways
that risk their privacy: a cause for growing
concern among parents.
Young people also may not realize that all
their information and browsing can and may
be tracked while visiting a particular site and
that it is up to them to protect their own
privacy.
They must be informed about all these risks.
For example, on Twitter, threats include
shortened links that lead one to potentially
harmful places.
Introduction to Information Technology
10.1. Internet Privacy, Internet Security, and Netiquette
32
In their e-mail inbox, threats include
email scams and attachments that get
them to install malware and disclose
personal information.
On Torrent sites, threats include
malware hiding in video, music, and
software downloads.
Even when using a smartphone,
threats include geolocation, meaning
that one’s phone can detect where they
are and post it online for all to see.
Introduction to Information Technology
10.1. Internet Privacy, Internet Security, and Netiquette
33
Introduction to Information Technology
10.1. Internet Privacy, Internet Security, and Netiquette
34
Users can protect themselves by
updating virus protection, using
security settings, downloading patches,
installing a firewall, screening e-mail,
shutting down spyware, controlling
cookies, using encryption, fending off
browser hijackers, and blocking pop-
ups.
However, most people have little idea
how to go about doing many of these
things.
Introduction to Information Technology
10.1. Internet Privacy, Internet Security, and Netiquette
35
How can the average user with no training
be expected to know how to run their own
network security (especially as things are
getting more complicated all the time)?
Many businesses hire professionals to take
care of these issues, but most individuals
can only do their best to learn about all
this.
In 1998, the Federal Trade Commission in
the USA considered the lack of privacy for
children on the Internet and created the
Children Online Privacy Protection Act
(COPPA).
Introduction to Information Technology
10.1. Internet Privacy, Internet Security, and Netiquette
36
COPPA limits the options which gather
information from children and created
warning labels if potential harmful
information or content was presented.
In 2000, Children’s Internet Protection
Act (CIPA) was developed to
implement safe Internet policies such
as rules and filter software.
These laws, awareness campaigns,
parental and adult supervision
strategies, and Internet filters can all
help to make the Internet safer for
children around the world.
Introduction to Information Technology
10.1. Internet Privacy, Internet Security, and Netiquette
37
Levels of Privacy Risks to Internet
Privacy
Cookies Photos on Internet
Internet Privacy
Introduction to Information Technology
10.1. Internet Privacy, Internet Security, and Netiquette
38
Cookies
Internet Privacy, Internet
Security, and Netiquette
Introduction to Information Technology
10.1. Internet Privacy, Internet Security, and Netiquette
39
HTTP Cookies
An HTTP cookie is data stored on a
user’s computer that assists in
automated access to websites or web
features, or other state information
required in complex websites.
It may also be used for user-tracking
by storing special usage history data in
a cookie, and such cookies—for
example, those used by Google
Analytics—are called tracking cookies.
Cookies are a common concern in the
field of Internet privacy.
Introduction to Information Technology
10.1. Internet Privacy, Internet Security, and Netiquette
40
Although website developers most commonly use cookies
for legitimate technical purposes, cases of abuse occur.
In 2009, two researchers noted that social networking
profiles could be connected to cookies, allowing the
social networking profile to be connected to browsing
habits.
In the past, websites have not generally made the user
explicitly aware of the storing of cookies, however,
tracking cookies and especially third-party tracking
cookies are commonly used as ways to compile long-term
records of individuals’ browsing histories — a privacy
concern that prompted European and US lawmakers to
take action in 2011.
Introduction to Information Technology
10.1. Internet Privacy, Internet Security, and Netiquette
41
Cookies can also have implications for
computer forensics.
In past years, most computer users
were not completely aware of cookies,
but recently, users have become
conscious of possible detrimental
effects of Internet cookies: a recent
study done has shown that 58% of
users have at least once, deleted
cookies from their computer and that
39% of users delete cookies from their
computer every month.
Introduction to Information Technology
10.1. Internet Privacy, Internet Security, and Netiquette
42
Since cookies are advertisers’ main way of
targeting potential customers, and some
customers are deleting cookies, some
advertisers started to use persistent Flash
cookies and zombie cookies, but
modern browsers and anti-malware
software can now block or detect and
remove such cookies.
The original developers of cookies intended
that only the website that originally
distributed cookies to users could retrieve
them, therefore returning only data already
possessed by the website.
Introduction to Information Technology
10.1. Internet Privacy, Internet Security, and Netiquette
43
However, in practice programmers can
circumvent this restriction.
Possible consequences include:
✓ the placing of a personally-identifiable tag
in a browser to facilitate web profiling, or,
✓ use of cross-site scripting or other
techniques to steal information from a
user’s cookies.
Cookies do have benefits that many
people may not know.
One benefit is that for websites that
one frequently visits that require a
password, cookies make it so they do
not have to sign in every time.
Introduction to Information Technology
10.1. Internet Privacy, Internet Security, and Netiquette
44
A cookie can also track one’s preferences
to show them websites that might
interest them.
Cookies make more websites free to use
without any type of payment.
Some of these benefits are also seen as
negative.
For example, one of the most common
ways of theft is hackers taking one’s user
name and password that a cookie saves.
While a lot of sites are free, they have to
make a profit somehow so they sell their
space to advertisers.
Introduction to Information Technology
10.1. Internet Privacy, Internet Security, and Netiquette
45
These ads, which are personalized to one’s
likes, can often freeze one’s computer or
cause annoyance.
Cookies are mostly harmless except for
third-party cookies.
These cookies are not made by the website
itself, but by web banner advertising
companies.
These third-party cookies are so dangerous
because they take the same information that
regular cookies do, such as browsing habits
and frequently visited websites, but then they
give out this information to other companies.
Introduction to Information Technology
10.1. Internet Privacy, Internet Security, and Netiquette
46
Cookies are often associated with pop-
up windows because these windows are
often, but not always, tailored to a
person’s preferences.
These windows are an irritation
because they are often hard to close out
of because the close button is
strategically hidden in an unlikely part
of the screen.
In the worst cases, these pop-up ads
can take over the screen and while
trying to exit out of it, can take one to
another unwanted website.
Introduction to Information Technology
10.1. Internet Privacy, Internet Security, and Netiquette
47
Cookies are seen so negatively because
they are not understood and go
unnoticed while someone is simply
surfing the Internet.
The idea that every move one makes
while on the Internet is being watched,
would frighten most users.
Some users choose to disable cookies in
their web browsers.
Such an action can reduce some privacy
risks, but may severely limit or prevent
the functionality of many websites.
Introduction to Information Technology
10.1. Internet Privacy, Internet Security, and Netiquette
48
All significant web browsers have this disabling ability built-in, with no external
program required.
As an alternative, users may frequently delete any stored cookies.
Some browsers (such as Mozilla Firefox and Opera) offer the option to clear
cookies automatically whenever the user closes the browser.
A third option involves allowing cookies in general, but preventing their abuse.
Introduction to Information Technology
10.1. Internet Privacy, Internet Security, and Netiquette
49
Introduction to Information Technology
10.1. Internet Privacy, Internet Security, and Netiquette
50
Some Desktop/Laptop browsers
69.2% 7.8% 7.5%
5.2%
3.7%
1.1%
Ranking Feb 2022. https://netmarketshare.com/
Introduction to Information Technology
10.1. Internet Privacy, Internet Security, and Netiquette
51
Introduction to Information Technology
10.1. Internet Privacy, Internet Security, and Netiquette
52
There are also a host of wrapper
applications that will redirect cookies
and cache data to some other location.
Concerns exist that the privacy benefits
of deleting cookies have been over-
stated.
The process of profiling (also known as
“tracking”) assembles and analyzes
several events, each attributable to a
single originating entity, in order to
gain information (especially patterns of
activity) relating to the originating
entity.
Introduction to Information Technology
10.1. Internet Privacy, Internet Security, and Netiquette
53
Some organizations engage in the
profiling of people’s web browsing,
collecting the URLs of sites visited.
The resulting profiles can potentially
link with information that personally
identifies the individual who did the
browsing.
Some web-oriented marketing-
research organizations may use this
practice legitimately, for example: in
order to construct profiles of ‘typical
Internet users’.
Introduction to Information Technology
10.1. Internet Privacy, Internet Security, and Netiquette
54
Such profiles, which describe average
trends of large groups of Internet users
rather than of actual individuals, can then
prove useful for market analysis.
Although the aggregate data does not
constitute a privacy violation, some people
believe that the initial profiling does.
Profiling becomes a more contentious
privacy issue when data-matching
associates the profile of an individual with
personally identifiable information of the
individual.
Introduction to Information Technology
10.1. Internet Privacy, Internet Security, and Netiquette
55
Governments and organizations may set up
honeypot websites – featuring controversial
topics – with the purpose of attracting and
tracking unwary people.
This constitutes a potential danger for
individuals.
A honeypot is a computer or computer system intended to
mimic likely targets of cyberattacks. It can be used to
detect attacks or deflect them from a legitimate target.
https://us.norton.com/internetsecurity-iot-what-is-a-honeypot.html
Introduction to Information Technology
10.1. Internet Privacy, Internet Security, and Netiquette
62
Levels of Privacy Risks to Internet
Privacy
Cookies Photos on Internet
Internet Privacy
Introduction to Information Technology
10.1. Internet Privacy, Internet Security, and Netiquette
63
Photographs on
the Internet
Internet Privacy, Internet
Security, and Netiquette
Introduction to Information Technology
10.1. Internet Privacy, Internet Security, and Netiquette
64
Today many people have [smart phone
cameras and/or] digital cameras and post their
photographs online, for example, street
photography practitioners do so for artistic
purposes and social documentary photography
practitioners do so to document the common
people in everyday life.
The people depicted in these photos might not
want to have them appear on the Internet.
Police arrest photos, considered public records
in many jurisdictions, are often posted on the
internet by numerous online mug-shot
publishing sites.
Introduction to Information Technology
10.1. Internet Privacy, Internet Security, and Netiquette
65
Some organizations attempt to respond
to this privacy-related concern.
For example, the 2005 Wikimania
conference required that photographers
have the prior permission of the people
in their pictures, albeit this made it
impossible for photographers to
practice candid photography, and doing
the same in a public place would violate
the photographers’ free speech rights.
Some people wore a ‘no photos’ tag to
indicate they would prefer not to have
their photo taken.
Introduction to Information Technology
10.1. Internet Privacy, Internet Security, and Netiquette
66
The Harvard Law Review published a
short piece called “In The Face of
Danger: Facial Recognition and Privacy
Law”, much of it explaining how “privacy
law, in its current form, is of no help to
those unwillingly tagged”.
Any individual can be unwillingly tagged
in a photo and displayed in a manner
that might violate them personally in
some way, and by the time Facebook gets
to taking down the photo, many people
will have already had the chance to view,
share, or distribute it.
Introduction to Information Technology
10.1. Internet Privacy, Internet Security, and Netiquette
67
Furthermore, traditional tort law does
not protect people who are captured by
a photograph in public because this is
not counted as an invasion of privacy.
The extensive Facebook privacy policy
covers these concerns and much more.
For example, the policy states that they
reserve the right to disclose member
information or share photos with
companies, lawyers, courts,
government entities, etc. if they feel it
absolutely necessary.
Introduction to Information Technology
10.1. Internet Privacy, Internet Security, and Netiquette
68
The policy also informs users that profile
pictures are mainly to help friends connect to
each other.
However, these, as well as other pictures, can
allow other people to invade a person’s
privacy by finding out information that can be
used to track and locate a certain individual.
In an article featured in ABC News, it was
stated that two teams of scientists found out
that Hollywood stars could be giving up
information about their private whereabouts
very easily through pictures uploaded to the
Internet.
Introduction to Information Technology
10.1. Internet Privacy, Internet Security, and Netiquette
69
Moreover, it was found that pictures taken by
some phones and tablets including iPhones
automatically attach the latitude and longitude of
the picture taken through metadata unless this
function is manually disabled [Geotags].
Face recognition technology can be used to gain
access to a person’s private data, according to a
new study.
Researchers at Carnegie Mellon University
combined image scanning, cloud computing, and
public profiles from social network sites to
identify individuals in the offline world.
Introduction to Information Technology
10.1. Internet Privacy, Internet Security, and Netiquette
70
Data captured even included a user’s social security
number.
Experts have warned of the privacy risks faced by the
increased merging of our online and offline identities.
The researchers have also developed an augmented
reality mobile app that can display personal data over
a person’s image captured on a smartphone screen.
Since these technologies are widely available, our
future identities may become exposed to anyone with
a smartphone and an Internet connection.
Researchers believe this could force us to reconsider
our future attitudes to privacy.
Introduction to Information Technology
10.1. Internet Privacy, Internet Security, and Netiquette
71
GDPR is a privacy and security law
drafted and passed by the
European Union (EU), that
imposes obligations onto
organizations anywhere, so long as
they target or collect data related
to people in the EU. The regulation
was put into effect on May 25,
2018.
https://gdpr.eu/what-is-gdpr/
General Data Protection Regulation
Introduction to Information Technology
10.1. Internet Privacy, Internet Security, and Netiquette
72
Introduction to Information Technology
10.1. Internet Privacy, Internet Security, and Netiquette
73
Internet privacy involves the
right or mandate of personal
privacy concerning the storing,
re-purposing, provision to third
parties, and displaying of
information pertaining to oneself
via the Internet.
Introduction to Information Technology
10.1. Internet Privacy, Internet Security, and Netiquette
74
Privacy can entail either
Personally-Identifying
Information (PII) or non-PII
information such as a site
visitor’s behavior on a website.
PII refers to any information that
can be used to identify an
individual.
Introduction to Information Technology
10.1. Internet Privacy, Internet Security, and Netiquette
75
Email spam, also referred to
as junk email or simply spam,
is an unsolicited message sent
in bulk by email (spamming).
Introduction to Information Technology
10.1. Internet Privacy, Internet Security, and Netiquette
76
Posting things on the Internet can be
harmful or in danger of malicious
attack.
Some information posted on the
Internet is permanent, depending on
the terms of service, and privacy
policies of particular services offered
online.
Introduction to Information Technology
10.1. Internet Privacy, Internet Security, and Netiquette
77
Children and adolescents often use
the Internet (including social media)
in ways that risk their privacy: a cause
for growing concern among parents.
They don’t realize that all their
information and browsing can and
may be tracked while visiting a
particular site and that it is up to
them to protect their own privacy.
Introduction to Information Technology
10.1. Internet Privacy, Internet Security, and Netiquette
78
In their e-mail inbox, threats
include email scams and
attachments that get them to
install malware and disclose
personal information.
When using a smartphone,
threats include geolocation,
meaning that one’s phone can
detect where they are and post it
online for all to see.
Introduction to Information Technology
10.1. Internet Privacy, Internet Security, and Netiquette
79
An HTTP cookie is data stored
on a user’s computer that assists
in automated access to websites
or other information required in
complex websites.
It may also be used for user-
tracking by storing special usage
history data, and such cookies—
for example, those used by
Google Analytics—are called
tracking cookies.
Introduction to Information Technology
10.1. Internet Privacy, Internet Security, and Netiquette
81
Today many people have cameras and
post their photographs online.
The people depicted in these photos
might not want to have them appear on
the Internet.
Be respectful (and careful) with the
pictures you post on Internet.
Introduction to Information Technology
10.1. Internet Privacy, Internet Security, and Netiquette
82
Introduction to Information Technology
10.1. Internet Privacy, Internet Security, and Netiquette
Introduction to Information Technology
10.1. Internet Privacy, Internet Security, and Netiquette
Textbook
84
https://eng.libretexts.org/Courses/Prince_
Georges_Community_College/INT_1010%
3A_Concepts_in_Computing
Purchase of a book is not
required.
Introduction to Information Technology
10.1. Internet Privacy, Internet Security, and Netiquette
Professor C
85
castellr@pgcc.edu
eLearning Expert
BS & MS in Systems Engineering
BS & MS in Military Science and Arts
HC Dr in Education
IT Professor | Spanish Instructor
LCINT1010.wordpress.com
Presentation created in 01/2022.
Slides last updated on 06/2023
Introduction to Information Technology
10.1. Internet Privacy, Internet Security, and Netiquette
Introduction to Information Technology
INT-1010
Prof C
Luis R Castellanos
86
10.1
Internet Privacy, Internet Security,
and Netiquette:
Internet Privacy

More Related Content

More from Luis R Castellanos (20)

INT 1010 08-4.pdf
INT 1010 08-4.pdfINT 1010 08-4.pdf
INT 1010 08-4.pdf
 
INT 1010 08-3.pdf
INT 1010 08-3.pdfINT 1010 08-3.pdf
INT 1010 08-3.pdf
 
INT 1010 08-1.pdf
INT 1010 08-1.pdfINT 1010 08-1.pdf
INT 1010 08-1.pdf
 
INT 1010 04-2.pdf
INT 1010 04-2.pdfINT 1010 04-2.pdf
INT 1010 04-2.pdf
 
INT 1010 04-3.pdf
INT 1010 04-3.pdfINT 1010 04-3.pdf
INT 1010 04-3.pdf
 
INT 1010 04-1.pdf
INT 1010 04-1.pdfINT 1010 04-1.pdf
INT 1010 04-1.pdf
 
INT 1010 04-4.pdf
INT 1010 04-4.pdfINT 1010 04-4.pdf
INT 1010 04-4.pdf
 
INT 1010 04-5.pdf
INT 1010 04-5.pdfINT 1010 04-5.pdf
INT 1010 04-5.pdf
 
INT 1010 03.pdf
INT 1010 03.pdfINT 1010 03.pdf
INT 1010 03.pdf
 
INT 1010 02.pdf
INT 1010 02.pdfINT 1010 02.pdf
INT 1010 02.pdf
 
INT 1010 01.pdf
INT 1010 01.pdfINT 1010 01.pdf
INT 1010 01.pdf
 
INT 1010 10-2.pdf
INT 1010 10-2.pdfINT 1010 10-2.pdf
INT 1010 10-2.pdf
 
INT 1010 09-1.pdf
INT 1010 09-1.pdfINT 1010 09-1.pdf
INT 1010 09-1.pdf
 
INT 1010 09-2.pdf
INT 1010 09-2.pdfINT 1010 09-2.pdf
INT 1010 09-2.pdf
 
INT 1010 08-2.pdf
INT 1010 08-2.pdfINT 1010 08-2.pdf
INT 1010 08-2.pdf
 
INT 1010 07-4.pdf
INT 1010 07-4.pdfINT 1010 07-4.pdf
INT 1010 07-4.pdf
 
INT 1010 07-3.pdf
INT 1010 07-3.pdfINT 1010 07-3.pdf
INT 1010 07-3.pdf
 
INT 1010 07-1.pdf
INT 1010 07-1.pdfINT 1010 07-1.pdf
INT 1010 07-1.pdf
 
INT 1010 07-6.pdf
INT 1010 07-6.pdfINT 1010 07-6.pdf
INT 1010 07-6.pdf
 
INT 1010 07-2.pdf
INT 1010 07-2.pdfINT 1010 07-2.pdf
INT 1010 07-2.pdf
 

Recently uploaded

ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayMakMakNepo
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Planning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxPlanning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxLigayaBacuel1
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationAadityaSharma884161
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 

Recently uploaded (20)

ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up Friday
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"
 
Planning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxPlanning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptx
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint Presentation
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 

INT 1010 10-1.pdf

  • 1. Introduction to Information Technology 10.1. Internet Privacy, Internet Security, and Netiquette Introduction to Information Technology INT-1010 Prof C Luis R Castellanos 1 10 Internet Privacy, Internet Security, and Netiquette
  • 2. Introduction to Information Technology 10.1. Internet Privacy, Internet Security, and Netiquette 2 POTUS 45 The most important thing in life is to love what you’re doing, because that’s the only way you’ll ever be really good at it.
  • 3. Introduction to Information Technology 10.1. Internet Privacy, Internet Security, and Netiquette 3 If you are in a race, and you pass the runner who was in second place, in which place do you finish the race? a) First place b) Second place c) Third place d) Last
  • 4. Introduction to Information Technology 10.1. Internet Privacy, Internet Security, and Netiquette 9. Web Development 4 Previous Chapter: ✓ Brief history of the Internet ✓ Website design ✓ Development ✓ IDE ✓ Creating HTML files ✓ Fonts and Text decorations
  • 5. Introduction to Information Technology 10.1. Internet Privacy, Internet Security, and Netiquette 5 The growing internet intrusions have devastating implications for our right to privacy. But more than just privacy is threatened when everything we say, everywhere we go, and everyone we associate with is fair game. There are certain rules required to protect your data and ensure proper etiquette when using the internet.
  • 6. Introduction to Information Technology 10.1. Internet Privacy, Internet Security, and Netiquette 6 ✓ Define computer security ✓ Understand what industries are affected by computer security ✓ Use tools for communicating online Objectives
  • 7. Introduction to Information Technology 10.1. Internet Privacy, Internet Security, and Netiquette 7 This chapter has three topics: Internet Privacy Internet Security Netiquette
  • 8. Introduction to Information Technology 10.1. Internet Privacy, Internet Security, and Netiquette Introduction to Information Technology INT-1010 Prof C Luis R Castellanos 2022 8 10.1 Internet Privacy, Internet Security, and Netiquette: Internet Privacy
  • 9. Introduction to Information Technology 10.1. Internet Privacy, Internet Security, and Netiquette 9
  • 10. Introduction to Information Technology 10.1. Internet Privacy, Internet Security, and Netiquette 10 Internet privacy involves the right or mandate of personal privacy concerning the storing, re-purposing, provision to third parties, and displaying of information pertaining to oneself via the Internet. Internet privacy is a subset of data privacy. Privacy concerns have been articulated from the beginnings of large-scale computer sharing.
  • 11. Introduction to Information Technology 10.1. Internet Privacy, Internet Security, and Netiquette 11 Privacy can entail either Personally- Identifying Information (PII) or non- PII information such as a site visitor’s behavior on a website. PII refers to any information that can be used to identify an individual. For example, age and physical address alone could identify who an individual is without explicitly disclosing their name, as these two factors are unique enough to typically identify a specific person.
  • 12. Introduction to Information Technology 10.1. Internet Privacy, Internet Security, and Netiquette 12 Some experts such as Steve Rambam, a private investigator specializing in Internet privacy cases, believe that privacy no longer exists; saying, “Privacy is dead – get over it”. In fact, it has been suggested that the “appeal of online services is to broadcast personal information on purpose”. On the other hand, in his essay The Value of Privacy, security expert Bruce Schneier says, “Privacy protects us from abuses by those in power, even if we’re doing nothing wrong at the time of surveillance.”
  • 13. Introduction to Information Technology 10.1. Internet Privacy, Internet Security, and Netiquette 13 Levels of Privacy Risks to Internet Privacy Cookies Photos on Internet Internet Privacy
  • 14. Introduction to Information Technology 10.1. Internet Privacy, Internet Security, and Netiquette 14 Levels of Privacy Internet Privacy, Internet Security, and Netiquette
  • 15. Introduction to Information Technology 10.1. Internet Privacy, Internet Security, and Netiquette 15 Internet and digital privacy are viewed differently from traditional expectations of privacy. Internet privacy is primarily concerned with protecting user information. Law Professor Jerry Kang explains that the term privacy expresses space, decision, and information. In terms of space, individuals have an expectation that their physical spaces (i.e. homes, cars) not be intruded on. Privacy within the realm of decision is best illustrated by the landmark case Roe vs Wade.
  • 16. Introduction to Information Technology 10.1. Internet Privacy, Internet Security, and Netiquette 16 Roe vs Wade, 410 U.S. 113 (1973), was a landmark decision of the U.S. Supreme Court in which the Court ruled that the Constitution of the US protects a pregnant woman's liberty to choose to have an abortion without excessive government restriction. "Jane Roe"—who in 1969 became pregnant with her 3rd child, wanted an abortion but lived in Texas, where abortion was illegal. The local DA was Henry Wade. https://en.wikipedia.org/wiki/Roe_v._Wade
  • 17. Introduction to Information Technology 10.1. Internet Privacy, Internet Security, and Netiquette 17 Lastly, information privacy is in regards to the collection of user information from a variety of sources, which produces great discussion. The 1997 Information Infrastructure Task Force (IITF) created under President Clinton defined information privacy as “an individual’s claim to control the terms under which personal information–information identifiable to the individual–is acquired, disclosed, and used.” At the end of the 1990s, with the rise of the internet, it became clear that the internet and companies would need to abide by new rules to protect individuals’ privacy.
  • 18. Introduction to Information Technology 10.1. Internet Privacy, Internet Security, and Netiquette 18 With the rise of the internet and mobile networks, the salience of internet privacy is a daily concern for users. People with only a casual concern for Internet privacy need not achieve total anonymity. Internet users may protect their privacy through controlled disclosure of personal information. The revelation of IP addresses, non-personally- identifiable profiling, and similar information might become acceptable trade-offs for the convenience that users could otherwise lose using the workarounds needed to suppress such details rigorously.
  • 19. Introduction to Information Technology 10.1. Internet Privacy, Internet Security, and Netiquette 19 On the other hand, some people desire much stronger privacy. In that case, they may try to achieve Internet anonymity to ensure privacy — use of the Internet without giving any third parties the ability to link the Internet activities to personally-identifiable information of the Internet user. In order to keep their information private, people need to be careful with what they submit and look at online. When filling out forms and buying merchandise, that becomes tracked and because the information was not private, companies are now sending Internet users spam and advertising on similar products.
  • 20. Introduction to Information Technology 10.1. Internet Privacy, Internet Security, and Netiquette 20 Email spam, also referred to as junk email or simply spam, is unsolicited messages sent in bulk by email (spamming). The name comes from a Monty Python sketch in which the name of the canned pork product Spam is ubiquitous, unavoidable, and repetitive. https://en.wikipedia.org/wiki/Email_spam
  • 21. Introduction to Information Technology 10.1. Internet Privacy, Internet Security, and Netiquette 21 There are also several governmental organizations that protect individuals’ privacy and anonymity on the Internet, to a point. In an article presented by the FTC, in October 2011, a number of pointers were brought to attention that helps an individual internet user avoid possible identity theft and other cyber-attacks. Preventing or limiting the usage of Social Security numbers online, being wary and respectful of emails including spam messages, being mindful of personal financial details, creating and managing strong passwords, and intelligent web-browsing behaviors are recommended, among others.
  • 22. Introduction to Information Technology 10.1. Internet Privacy, Internet Security, and Netiquette 22 Posting things on the Internet can be harmful or in danger of malicious attack. Some information posted on the Internet is permanent, depending on the terms of service, and privacy policies of particular services offered online. This can include comments written on blogs, pictures, and Internet sites, such as Facebook and Twitter. It is absorbed into cyberspace and once it is posted, anyone can potentially find it and access it. Some employers may research a potential employee by searching online for the details of their online behaviors, possibly affecting the outcome of the success of the candidate.
  • 23. Introduction to Information Technology 10.1. Internet Privacy, Internet Security, and Netiquette 23
  • 24. Introduction to Information Technology 10.1. Internet Privacy, Internet Security, and Netiquette 24 Levels of Privacy Risks to Internet Privacy Cookies Photos on Internet Internet Privacy
  • 25. Introduction to Information Technology 10.1. Internet Privacy, Internet Security, and Netiquette 25 Risks to Internet Privacy Internet Privacy, Internet Security, and Netiquette
  • 26. Introduction to Information Technology 10.1. Internet Privacy, Internet Security, and Netiquette 26 Companies are hired to watch what internet sites people visit, and then use the information, for instance by sending advertising based on one’s browsing history. There are many ways in which people can divulge their personal information, for instance by use of “social media” and by sending bank and credit card information to various websites.
  • 27. Introduction to Information Technology 10.1. Internet Privacy, Internet Security, and Netiquette 27 Jan 2021 https://www.visualcapitalist.com/the-50- most-visited-websites-in-the-world/
  • 28. Introduction to Information Technology 10.1. Internet Privacy, Internet Security, and Netiquette 28 Moreover, directly observed behavior, such as browsing logs, search queries, or contents of the Facebook profile can be automatically processed to infer potentially more intrusive details about an individual, such as sexual orientation, political and religious views, race, substance use, intelligence, and personality. Those concerned about Internet privacy often cite a number of privacy risks — events that can compromise privacy — which may be encountered through Internet use.
  • 29. Introduction to Information Technology 10.1. Internet Privacy, Internet Security, and Netiquette 29 These range from the gathering of statistics on users to more malicious acts such as the spreading of spyware and the exploitation of various forms of bugs (software faults). Several social networking sites try to protect the personal information of their subscribers. On Facebook, for example, privacy settings are available to all registered users: they can block certain individuals from seeing their profile, they can choose their “friends”, and they can limit who has access to one’s pictures and videos.
  • 30. Introduction to Information Technology 10.1. Internet Privacy, Internet Security, and Netiquette 30 Privacy settings are also available on other social networking sites such as Google Plus and Twitter. The user can apply such settings when providing personal information on the internet. In late 2007 Facebook launched the Beacon program where user rental records were released to the public for friends to see. Many people were enraged by this breach of privacy, and the Lane v. Facebook, Inc. case ensued.
  • 31. Introduction to Information Technology 10.1. Internet Privacy, Internet Security, and Netiquette 31 Children and adolescents often use the Internet (including social media) in ways that risk their privacy: a cause for growing concern among parents. Young people also may not realize that all their information and browsing can and may be tracked while visiting a particular site and that it is up to them to protect their own privacy. They must be informed about all these risks. For example, on Twitter, threats include shortened links that lead one to potentially harmful places.
  • 32. Introduction to Information Technology 10.1. Internet Privacy, Internet Security, and Netiquette 32 In their e-mail inbox, threats include email scams and attachments that get them to install malware and disclose personal information. On Torrent sites, threats include malware hiding in video, music, and software downloads. Even when using a smartphone, threats include geolocation, meaning that one’s phone can detect where they are and post it online for all to see.
  • 33. Introduction to Information Technology 10.1. Internet Privacy, Internet Security, and Netiquette 33
  • 34. Introduction to Information Technology 10.1. Internet Privacy, Internet Security, and Netiquette 34 Users can protect themselves by updating virus protection, using security settings, downloading patches, installing a firewall, screening e-mail, shutting down spyware, controlling cookies, using encryption, fending off browser hijackers, and blocking pop- ups. However, most people have little idea how to go about doing many of these things.
  • 35. Introduction to Information Technology 10.1. Internet Privacy, Internet Security, and Netiquette 35 How can the average user with no training be expected to know how to run their own network security (especially as things are getting more complicated all the time)? Many businesses hire professionals to take care of these issues, but most individuals can only do their best to learn about all this. In 1998, the Federal Trade Commission in the USA considered the lack of privacy for children on the Internet and created the Children Online Privacy Protection Act (COPPA).
  • 36. Introduction to Information Technology 10.1. Internet Privacy, Internet Security, and Netiquette 36 COPPA limits the options which gather information from children and created warning labels if potential harmful information or content was presented. In 2000, Children’s Internet Protection Act (CIPA) was developed to implement safe Internet policies such as rules and filter software. These laws, awareness campaigns, parental and adult supervision strategies, and Internet filters can all help to make the Internet safer for children around the world.
  • 37. Introduction to Information Technology 10.1. Internet Privacy, Internet Security, and Netiquette 37 Levels of Privacy Risks to Internet Privacy Cookies Photos on Internet Internet Privacy
  • 38. Introduction to Information Technology 10.1. Internet Privacy, Internet Security, and Netiquette 38 Cookies Internet Privacy, Internet Security, and Netiquette
  • 39. Introduction to Information Technology 10.1. Internet Privacy, Internet Security, and Netiquette 39 HTTP Cookies An HTTP cookie is data stored on a user’s computer that assists in automated access to websites or web features, or other state information required in complex websites. It may also be used for user-tracking by storing special usage history data in a cookie, and such cookies—for example, those used by Google Analytics—are called tracking cookies. Cookies are a common concern in the field of Internet privacy.
  • 40. Introduction to Information Technology 10.1. Internet Privacy, Internet Security, and Netiquette 40 Although website developers most commonly use cookies for legitimate technical purposes, cases of abuse occur. In 2009, two researchers noted that social networking profiles could be connected to cookies, allowing the social networking profile to be connected to browsing habits. In the past, websites have not generally made the user explicitly aware of the storing of cookies, however, tracking cookies and especially third-party tracking cookies are commonly used as ways to compile long-term records of individuals’ browsing histories — a privacy concern that prompted European and US lawmakers to take action in 2011.
  • 41. Introduction to Information Technology 10.1. Internet Privacy, Internet Security, and Netiquette 41 Cookies can also have implications for computer forensics. In past years, most computer users were not completely aware of cookies, but recently, users have become conscious of possible detrimental effects of Internet cookies: a recent study done has shown that 58% of users have at least once, deleted cookies from their computer and that 39% of users delete cookies from their computer every month.
  • 42. Introduction to Information Technology 10.1. Internet Privacy, Internet Security, and Netiquette 42 Since cookies are advertisers’ main way of targeting potential customers, and some customers are deleting cookies, some advertisers started to use persistent Flash cookies and zombie cookies, but modern browsers and anti-malware software can now block or detect and remove such cookies. The original developers of cookies intended that only the website that originally distributed cookies to users could retrieve them, therefore returning only data already possessed by the website.
  • 43. Introduction to Information Technology 10.1. Internet Privacy, Internet Security, and Netiquette 43 However, in practice programmers can circumvent this restriction. Possible consequences include: ✓ the placing of a personally-identifiable tag in a browser to facilitate web profiling, or, ✓ use of cross-site scripting or other techniques to steal information from a user’s cookies. Cookies do have benefits that many people may not know. One benefit is that for websites that one frequently visits that require a password, cookies make it so they do not have to sign in every time.
  • 44. Introduction to Information Technology 10.1. Internet Privacy, Internet Security, and Netiquette 44 A cookie can also track one’s preferences to show them websites that might interest them. Cookies make more websites free to use without any type of payment. Some of these benefits are also seen as negative. For example, one of the most common ways of theft is hackers taking one’s user name and password that a cookie saves. While a lot of sites are free, they have to make a profit somehow so they sell their space to advertisers.
  • 45. Introduction to Information Technology 10.1. Internet Privacy, Internet Security, and Netiquette 45 These ads, which are personalized to one’s likes, can often freeze one’s computer or cause annoyance. Cookies are mostly harmless except for third-party cookies. These cookies are not made by the website itself, but by web banner advertising companies. These third-party cookies are so dangerous because they take the same information that regular cookies do, such as browsing habits and frequently visited websites, but then they give out this information to other companies.
  • 46. Introduction to Information Technology 10.1. Internet Privacy, Internet Security, and Netiquette 46 Cookies are often associated with pop- up windows because these windows are often, but not always, tailored to a person’s preferences. These windows are an irritation because they are often hard to close out of because the close button is strategically hidden in an unlikely part of the screen. In the worst cases, these pop-up ads can take over the screen and while trying to exit out of it, can take one to another unwanted website.
  • 47. Introduction to Information Technology 10.1. Internet Privacy, Internet Security, and Netiquette 47 Cookies are seen so negatively because they are not understood and go unnoticed while someone is simply surfing the Internet. The idea that every move one makes while on the Internet is being watched, would frighten most users. Some users choose to disable cookies in their web browsers. Such an action can reduce some privacy risks, but may severely limit or prevent the functionality of many websites.
  • 48. Introduction to Information Technology 10.1. Internet Privacy, Internet Security, and Netiquette 48 All significant web browsers have this disabling ability built-in, with no external program required. As an alternative, users may frequently delete any stored cookies. Some browsers (such as Mozilla Firefox and Opera) offer the option to clear cookies automatically whenever the user closes the browser. A third option involves allowing cookies in general, but preventing their abuse.
  • 49. Introduction to Information Technology 10.1. Internet Privacy, Internet Security, and Netiquette 49
  • 50. Introduction to Information Technology 10.1. Internet Privacy, Internet Security, and Netiquette 50 Some Desktop/Laptop browsers 69.2% 7.8% 7.5% 5.2% 3.7% 1.1% Ranking Feb 2022. https://netmarketshare.com/
  • 51. Introduction to Information Technology 10.1. Internet Privacy, Internet Security, and Netiquette 51
  • 52. Introduction to Information Technology 10.1. Internet Privacy, Internet Security, and Netiquette 52 There are also a host of wrapper applications that will redirect cookies and cache data to some other location. Concerns exist that the privacy benefits of deleting cookies have been over- stated. The process of profiling (also known as “tracking”) assembles and analyzes several events, each attributable to a single originating entity, in order to gain information (especially patterns of activity) relating to the originating entity.
  • 53. Introduction to Information Technology 10.1. Internet Privacy, Internet Security, and Netiquette 53 Some organizations engage in the profiling of people’s web browsing, collecting the URLs of sites visited. The resulting profiles can potentially link with information that personally identifies the individual who did the browsing. Some web-oriented marketing- research organizations may use this practice legitimately, for example: in order to construct profiles of ‘typical Internet users’.
  • 54. Introduction to Information Technology 10.1. Internet Privacy, Internet Security, and Netiquette 54 Such profiles, which describe average trends of large groups of Internet users rather than of actual individuals, can then prove useful for market analysis. Although the aggregate data does not constitute a privacy violation, some people believe that the initial profiling does. Profiling becomes a more contentious privacy issue when data-matching associates the profile of an individual with personally identifiable information of the individual.
  • 55. Introduction to Information Technology 10.1. Internet Privacy, Internet Security, and Netiquette 55 Governments and organizations may set up honeypot websites – featuring controversial topics – with the purpose of attracting and tracking unwary people. This constitutes a potential danger for individuals. A honeypot is a computer or computer system intended to mimic likely targets of cyberattacks. It can be used to detect attacks or deflect them from a legitimate target. https://us.norton.com/internetsecurity-iot-what-is-a-honeypot.html
  • 56. Introduction to Information Technology 10.1. Internet Privacy, Internet Security, and Netiquette 62 Levels of Privacy Risks to Internet Privacy Cookies Photos on Internet Internet Privacy
  • 57. Introduction to Information Technology 10.1. Internet Privacy, Internet Security, and Netiquette 63 Photographs on the Internet Internet Privacy, Internet Security, and Netiquette
  • 58. Introduction to Information Technology 10.1. Internet Privacy, Internet Security, and Netiquette 64 Today many people have [smart phone cameras and/or] digital cameras and post their photographs online, for example, street photography practitioners do so for artistic purposes and social documentary photography practitioners do so to document the common people in everyday life. The people depicted in these photos might not want to have them appear on the Internet. Police arrest photos, considered public records in many jurisdictions, are often posted on the internet by numerous online mug-shot publishing sites.
  • 59. Introduction to Information Technology 10.1. Internet Privacy, Internet Security, and Netiquette 65 Some organizations attempt to respond to this privacy-related concern. For example, the 2005 Wikimania conference required that photographers have the prior permission of the people in their pictures, albeit this made it impossible for photographers to practice candid photography, and doing the same in a public place would violate the photographers’ free speech rights. Some people wore a ‘no photos’ tag to indicate they would prefer not to have their photo taken.
  • 60. Introduction to Information Technology 10.1. Internet Privacy, Internet Security, and Netiquette 66 The Harvard Law Review published a short piece called “In The Face of Danger: Facial Recognition and Privacy Law”, much of it explaining how “privacy law, in its current form, is of no help to those unwillingly tagged”. Any individual can be unwillingly tagged in a photo and displayed in a manner that might violate them personally in some way, and by the time Facebook gets to taking down the photo, many people will have already had the chance to view, share, or distribute it.
  • 61. Introduction to Information Technology 10.1. Internet Privacy, Internet Security, and Netiquette 67 Furthermore, traditional tort law does not protect people who are captured by a photograph in public because this is not counted as an invasion of privacy. The extensive Facebook privacy policy covers these concerns and much more. For example, the policy states that they reserve the right to disclose member information or share photos with companies, lawyers, courts, government entities, etc. if they feel it absolutely necessary.
  • 62. Introduction to Information Technology 10.1. Internet Privacy, Internet Security, and Netiquette 68 The policy also informs users that profile pictures are mainly to help friends connect to each other. However, these, as well as other pictures, can allow other people to invade a person’s privacy by finding out information that can be used to track and locate a certain individual. In an article featured in ABC News, it was stated that two teams of scientists found out that Hollywood stars could be giving up information about their private whereabouts very easily through pictures uploaded to the Internet.
  • 63. Introduction to Information Technology 10.1. Internet Privacy, Internet Security, and Netiquette 69 Moreover, it was found that pictures taken by some phones and tablets including iPhones automatically attach the latitude and longitude of the picture taken through metadata unless this function is manually disabled [Geotags]. Face recognition technology can be used to gain access to a person’s private data, according to a new study. Researchers at Carnegie Mellon University combined image scanning, cloud computing, and public profiles from social network sites to identify individuals in the offline world.
  • 64. Introduction to Information Technology 10.1. Internet Privacy, Internet Security, and Netiquette 70 Data captured even included a user’s social security number. Experts have warned of the privacy risks faced by the increased merging of our online and offline identities. The researchers have also developed an augmented reality mobile app that can display personal data over a person’s image captured on a smartphone screen. Since these technologies are widely available, our future identities may become exposed to anyone with a smartphone and an Internet connection. Researchers believe this could force us to reconsider our future attitudes to privacy.
  • 65. Introduction to Information Technology 10.1. Internet Privacy, Internet Security, and Netiquette 71 GDPR is a privacy and security law drafted and passed by the European Union (EU), that imposes obligations onto organizations anywhere, so long as they target or collect data related to people in the EU. The regulation was put into effect on May 25, 2018. https://gdpr.eu/what-is-gdpr/ General Data Protection Regulation
  • 66. Introduction to Information Technology 10.1. Internet Privacy, Internet Security, and Netiquette 72
  • 67. Introduction to Information Technology 10.1. Internet Privacy, Internet Security, and Netiquette 73 Internet privacy involves the right or mandate of personal privacy concerning the storing, re-purposing, provision to third parties, and displaying of information pertaining to oneself via the Internet.
  • 68. Introduction to Information Technology 10.1. Internet Privacy, Internet Security, and Netiquette 74 Privacy can entail either Personally-Identifying Information (PII) or non-PII information such as a site visitor’s behavior on a website. PII refers to any information that can be used to identify an individual.
  • 69. Introduction to Information Technology 10.1. Internet Privacy, Internet Security, and Netiquette 75 Email spam, also referred to as junk email or simply spam, is an unsolicited message sent in bulk by email (spamming).
  • 70. Introduction to Information Technology 10.1. Internet Privacy, Internet Security, and Netiquette 76 Posting things on the Internet can be harmful or in danger of malicious attack. Some information posted on the Internet is permanent, depending on the terms of service, and privacy policies of particular services offered online.
  • 71. Introduction to Information Technology 10.1. Internet Privacy, Internet Security, and Netiquette 77 Children and adolescents often use the Internet (including social media) in ways that risk their privacy: a cause for growing concern among parents. They don’t realize that all their information and browsing can and may be tracked while visiting a particular site and that it is up to them to protect their own privacy.
  • 72. Introduction to Information Technology 10.1. Internet Privacy, Internet Security, and Netiquette 78 In their e-mail inbox, threats include email scams and attachments that get them to install malware and disclose personal information. When using a smartphone, threats include geolocation, meaning that one’s phone can detect where they are and post it online for all to see.
  • 73. Introduction to Information Technology 10.1. Internet Privacy, Internet Security, and Netiquette 79 An HTTP cookie is data stored on a user’s computer that assists in automated access to websites or other information required in complex websites. It may also be used for user- tracking by storing special usage history data, and such cookies— for example, those used by Google Analytics—are called tracking cookies.
  • 74. Introduction to Information Technology 10.1. Internet Privacy, Internet Security, and Netiquette 81 Today many people have cameras and post their photographs online. The people depicted in these photos might not want to have them appear on the Internet. Be respectful (and careful) with the pictures you post on Internet.
  • 75. Introduction to Information Technology 10.1. Internet Privacy, Internet Security, and Netiquette 82
  • 76. Introduction to Information Technology 10.1. Internet Privacy, Internet Security, and Netiquette
  • 77. Introduction to Information Technology 10.1. Internet Privacy, Internet Security, and Netiquette Textbook 84 https://eng.libretexts.org/Courses/Prince_ Georges_Community_College/INT_1010% 3A_Concepts_in_Computing Purchase of a book is not required.
  • 78. Introduction to Information Technology 10.1. Internet Privacy, Internet Security, and Netiquette Professor C 85 castellr@pgcc.edu eLearning Expert BS & MS in Systems Engineering BS & MS in Military Science and Arts HC Dr in Education IT Professor | Spanish Instructor LCINT1010.wordpress.com Presentation created in 01/2022. Slides last updated on 06/2023
  • 79. Introduction to Information Technology 10.1. Internet Privacy, Internet Security, and Netiquette Introduction to Information Technology INT-1010 Prof C Luis R Castellanos 86 10.1 Internet Privacy, Internet Security, and Netiquette: Internet Privacy