SlideShare a Scribd company logo
1 of 1
Download to read offline
Select a recent Internet scandal/event/news media happening. Describe the details of the scandal
(who, what, when, where, why, how) and explain how you think it changed user’s behavior or
attitudes towards technology.
(2016 Democratic National Committee (DNC) emails that were leaked and subsequently
published by WikiLeaks on July 22, 2016...)
[This is for an Ethics in Information Technology Class]
Solution
The 2016 Democratic National Committee email leak is the scandal when a series of emails
exchanged between high level DNC officials were leaked by wikileaks. These were leaked in
July 2016 before the Democatric nation convention and led to the resignation of DNC chair
Debbie Wasserman Schultz. Later other high level DNC officials also resigned. The source of
the leak is still not known and russian intelligence services are suspected. FBI is currently
investigating the source of the hack.
This once again has shown the security loop holes in to our personal communications. Although
the merits and demerits of this particular hack can be debated, never the less the emails also
included personal conversations which should not be on public domain. The leak also consists of
donor list including their credit card numbers and Social security numbers. This is very sensitive
information. The issue has again highlighted how cautious we should be about our security loop
holes. Unfortunately the hack has again shown that there should not be any reasonal expectation
of privacy while using technology. Users are now a more concious about what security systems
they are using and also what kind of thins they say on emails.

More Related Content

Similar to Select a recent Internet scandaleventnews media happening. Describ.pdf

Presentation on Cybersecurity presented by Katie Rapp for Information Policy ...
Presentation on Cybersecurity presented by Katie Rapp for Information Policy ...Presentation on Cybersecurity presented by Katie Rapp for Information Policy ...
Presentation on Cybersecurity presented by Katie Rapp for Information Policy ...
wookyluvr
 
Bitcoin Blockchains on Twitter timelines: A Social Media analysis of cryptocu...
Bitcoin Blockchains on Twitter timelines: A Social Media analysis of cryptocu...Bitcoin Blockchains on Twitter timelines: A Social Media analysis of cryptocu...
Bitcoin Blockchains on Twitter timelines: A Social Media analysis of cryptocu...
Alexia Maddox
 
Com 427 final presentation
Com 427 final presentationCom 427 final presentation
Com 427 final presentation
Kyle Basedow
 
Com 427 final presentation
Com 427 final presentationCom 427 final presentation
Com 427 final presentation
Kyle Basedow
 
Privacy as identity territoriality re-conceptualising behaviour in cyberspace
Privacy as identity territoriality  re-conceptualising behaviour in cyberspacePrivacy as identity territoriality  re-conceptualising behaviour in cyberspace
Privacy as identity territoriality re-conceptualising behaviour in cyberspace
Fabrice Epelboin
 
eCrypt Technologies
eCrypt TechnologieseCrypt Technologies
eCrypt Technologies
Chuck Brooks
 
San Francisco Isaca Fall Security Conference G32 Wiki Leaks Social Media &amp...
San Francisco Isaca Fall Security Conference G32 Wiki Leaks Social Media &amp...San Francisco Isaca Fall Security Conference G32 Wiki Leaks Social Media &amp...
San Francisco Isaca Fall Security Conference G32 Wiki Leaks Social Media &amp...
Pw Carey
 

Similar to Select a recent Internet scandaleventnews media happening. Describ.pdf (20)

Presentation on Cybersecurity presented by Katie Rapp for Information Policy ...
Presentation on Cybersecurity presented by Katie Rapp for Information Policy ...Presentation on Cybersecurity presented by Katie Rapp for Information Policy ...
Presentation on Cybersecurity presented by Katie Rapp for Information Policy ...
 
RSA Monthly Online Fraud Report -- May 2013
RSA Monthly Online Fraud Report -- May 2013RSA Monthly Online Fraud Report -- May 2013
RSA Monthly Online Fraud Report -- May 2013
 
SANSFIRE - Elections, Deceptions and Political Breaches
SANSFIRE - Elections, Deceptions and Political BreachesSANSFIRE - Elections, Deceptions and Political Breaches
SANSFIRE - Elections, Deceptions and Political Breaches
 
Cyber securityincidents 2016
Cyber securityincidents 2016Cyber securityincidents 2016
Cyber securityincidents 2016
 
Bitcoin Blockchains on Twitter timelines: A Social Media analysis of cryptocu...
Bitcoin Blockchains on Twitter timelines: A Social Media analysis of cryptocu...Bitcoin Blockchains on Twitter timelines: A Social Media analysis of cryptocu...
Bitcoin Blockchains on Twitter timelines: A Social Media analysis of cryptocu...
 
What is cyber fraud?
What is cyber fraud?What is cyber fraud?
What is cyber fraud?
 
COM 427 Social Media and Security
COM 427 Social Media and SecurityCOM 427 Social Media and Security
COM 427 Social Media and Security
 
Com 427 final presentation
Com 427 final presentationCom 427 final presentation
Com 427 final presentation
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 
Com 427 final presentation
Com 427 final presentationCom 427 final presentation
Com 427 final presentation
 
COM 427 Social Media and Security
COM 427 Social Media and SecurityCOM 427 Social Media and Security
COM 427 Social Media and Security
 
Privacy as identity territoriality re-conceptualising behaviour in cyberspace
Privacy as identity territoriality  re-conceptualising behaviour in cyberspacePrivacy as identity territoriality  re-conceptualising behaviour in cyberspace
Privacy as identity territoriality re-conceptualising behaviour in cyberspace
 
Report on Hacking
Report on HackingReport on Hacking
Report on Hacking
 
Looking Ahead Why 2019 Will Be The year of Cyberwarfare
Looking Ahead Why 2019 Will Be The year of CyberwarfareLooking Ahead Why 2019 Will Be The year of Cyberwarfare
Looking Ahead Why 2019 Will Be The year of Cyberwarfare
 
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
 
eCrypt Technologies
eCrypt TechnologieseCrypt Technologies
eCrypt Technologies
 
San Francisco Isaca Fall Security Conference G32 Wiki Leaks Social Media &amp...
San Francisco Isaca Fall Security Conference G32 Wiki Leaks Social Media &amp...San Francisco Isaca Fall Security Conference G32 Wiki Leaks Social Media &amp...
San Francisco Isaca Fall Security Conference G32 Wiki Leaks Social Media &amp...
 
San Francisco Isaca Fall Security Conference G32 Wiki Leaks Social Media &amp...
San Francisco Isaca Fall Security Conference G32 Wiki Leaks Social Media &amp...San Francisco Isaca Fall Security Conference G32 Wiki Leaks Social Media &amp...
San Francisco Isaca Fall Security Conference G32 Wiki Leaks Social Media &amp...
 
Letter of Intent - Open Society Fellowship
Letter of Intent - Open Society FellowshipLetter of Intent - Open Society Fellowship
Letter of Intent - Open Society Fellowship
 
Open Web Data Feeds for Cybersecurity & Homeland Security Intelligence
Open Web Data Feeds for Cybersecurity & Homeland Security IntelligenceOpen Web Data Feeds for Cybersecurity & Homeland Security Intelligence
Open Web Data Feeds for Cybersecurity & Homeland Security Intelligence
 

More from nishadvtky

Enzymes are organic molecules that are essential raw materials for a.pdf
Enzymes are organic molecules that  are essential raw materials for a.pdfEnzymes are organic molecules that  are essential raw materials for a.pdf
Enzymes are organic molecules that are essential raw materials for a.pdf
nishadvtky
 
C++ 1.MAIN OBJECTIVEThe goal of this project is to design.pdf
C++ 1.MAIN OBJECTIVEThe goal of this project is to design.pdfC++ 1.MAIN OBJECTIVEThe goal of this project is to design.pdf
C++ 1.MAIN OBJECTIVEThe goal of this project is to design.pdf
nishadvtky
 
Dada la ecuacion de la conica -6x_1^2 + 20 x_1 x_2 + 8x_2^2 + 30 x_1.pdf
Dada la ecuacion de la conica  -6x_1^2 + 20 x_1 x_2 + 8x_2^2 + 30 x_1.pdfDada la ecuacion de la conica  -6x_1^2 + 20 x_1 x_2 + 8x_2^2 + 30 x_1.pdf
Dada la ecuacion de la conica -6x_1^2 + 20 x_1 x_2 + 8x_2^2 + 30 x_1.pdf
nishadvtky
 
Assume that a new oxygen-transport protein has been discovered in ce.pdf
Assume that a new oxygen-transport protein has been discovered in ce.pdfAssume that a new oxygen-transport protein has been discovered in ce.pdf
Assume that a new oxygen-transport protein has been discovered in ce.pdf
nishadvtky
 
Describe in words the phylogenetic relationships among Eusthenoptero.pdf
Describe in words the phylogenetic relationships among Eusthenoptero.pdfDescribe in words the phylogenetic relationships among Eusthenoptero.pdf
Describe in words the phylogenetic relationships among Eusthenoptero.pdf
nishadvtky
 
Which system performs better using OFDM to service two different us.pdf
Which system performs better using OFDM to service two different us.pdfWhich system performs better using OFDM to service two different us.pdf
Which system performs better using OFDM to service two different us.pdf
nishadvtky
 
what are the consequences of HWE on allele and genotype frequencies.pdf
what are the consequences of HWE on allele and genotype frequencies.pdfwhat are the consequences of HWE on allele and genotype frequencies.pdf
what are the consequences of HWE on allele and genotype frequencies.pdf
nishadvtky
 
Three kinds of macromolecules are present in cell membranes. What ar.pdf
Three kinds of macromolecules are present in cell membranes. What ar.pdfThree kinds of macromolecules are present in cell membranes. What ar.pdf
Three kinds of macromolecules are present in cell membranes. What ar.pdf
nishadvtky
 

More from nishadvtky (20)

Find the complex zeros of the polynomial function. Write f in factor.pdf
Find the complex zeros of the polynomial function. Write f in factor.pdfFind the complex zeros of the polynomial function. Write f in factor.pdf
Find the complex zeros of the polynomial function. Write f in factor.pdf
 
Enzymes are organic molecules that are essential raw materials for a.pdf
Enzymes are organic molecules that  are essential raw materials for a.pdfEnzymes are organic molecules that  are essential raw materials for a.pdf
Enzymes are organic molecules that are essential raw materials for a.pdf
 
C++ 1.MAIN OBJECTIVEThe goal of this project is to design.pdf
C++ 1.MAIN OBJECTIVEThe goal of this project is to design.pdfC++ 1.MAIN OBJECTIVEThe goal of this project is to design.pdf
C++ 1.MAIN OBJECTIVEThe goal of this project is to design.pdf
 
Can the peak to peak ripple current, IL, of a inductor be measured .pdf
Can the peak to peak ripple current,  IL, of a inductor be measured .pdfCan the peak to peak ripple current,  IL, of a inductor be measured .pdf
Can the peak to peak ripple current, IL, of a inductor be measured .pdf
 
A statistic is a number describing an aspect of the scores in a samp.pdf
A statistic is a number describing an aspect of the scores in a samp.pdfA statistic is a number describing an aspect of the scores in a samp.pdf
A statistic is a number describing an aspect of the scores in a samp.pdf
 
Angle in standavd position10pi7 =SolutionAn angle is in standa.pdf
Angle in standavd position10pi7 =SolutionAn angle is in standa.pdfAngle in standavd position10pi7 =SolutionAn angle is in standa.pdf
Angle in standavd position10pi7 =SolutionAn angle is in standa.pdf
 
Dada la ecuacion de la conica -6x_1^2 + 20 x_1 x_2 + 8x_2^2 + 30 x_1.pdf
Dada la ecuacion de la conica  -6x_1^2 + 20 x_1 x_2 + 8x_2^2 + 30 x_1.pdfDada la ecuacion de la conica  -6x_1^2 + 20 x_1 x_2 + 8x_2^2 + 30 x_1.pdf
Dada la ecuacion de la conica -6x_1^2 + 20 x_1 x_2 + 8x_2^2 + 30 x_1.pdf
 
Assume that a new oxygen-transport protein has been discovered in ce.pdf
Assume that a new oxygen-transport protein has been discovered in ce.pdfAssume that a new oxygen-transport protein has been discovered in ce.pdf
Assume that a new oxygen-transport protein has been discovered in ce.pdf
 
You are lost in the national park of Bandrika. Tourists comprise 23.pdf
You are lost in the national park of Bandrika. Tourists comprise 23.pdfYou are lost in the national park of Bandrika. Tourists comprise 23.pdf
You are lost in the national park of Bandrika. Tourists comprise 23.pdf
 
Describe in words the phylogenetic relationships among Eusthenoptero.pdf
Describe in words the phylogenetic relationships among Eusthenoptero.pdfDescribe in words the phylogenetic relationships among Eusthenoptero.pdf
Describe in words the phylogenetic relationships among Eusthenoptero.pdf
 
Why do scientists refer to Charles Darwins ideas about evolution a.pdf
Why do scientists refer to Charles Darwins ideas about evolution a.pdfWhy do scientists refer to Charles Darwins ideas about evolution a.pdf
Why do scientists refer to Charles Darwins ideas about evolution a.pdf
 
Which of the following terms refers to the ability to attend to cert.pdf
Which of the following terms refers to the ability to attend to cert.pdfWhich of the following terms refers to the ability to attend to cert.pdf
Which of the following terms refers to the ability to attend to cert.pdf
 
Which system performs better using OFDM to service two different us.pdf
Which system performs better using OFDM to service two different us.pdfWhich system performs better using OFDM to service two different us.pdf
Which system performs better using OFDM to service two different us.pdf
 
Which of the following is a method of reproduction that plants canno.pdf
Which of the following is a method of reproduction that plants canno.pdfWhich of the following is a method of reproduction that plants canno.pdf
Which of the following is a method of reproduction that plants canno.pdf
 
What is an interface How is extending a class different from impl.pdf
What is an interface How is extending a class different from impl.pdfWhat is an interface How is extending a class different from impl.pdf
What is an interface How is extending a class different from impl.pdf
 
Using Windows Batch in command prompt. - Call this programCreate a.pdf
Using Windows Batch in command prompt. - Call this programCreate a.pdfUsing Windows Batch in command prompt. - Call this programCreate a.pdf
Using Windows Batch in command prompt. - Call this programCreate a.pdf
 
what are the consequences of HWE on allele and genotype frequencies.pdf
what are the consequences of HWE on allele and genotype frequencies.pdfwhat are the consequences of HWE on allele and genotype frequencies.pdf
what are the consequences of HWE on allele and genotype frequencies.pdf
 
What are three major operating characteristics of air filtersSo.pdf
What are three major operating characteristics of air filtersSo.pdfWhat are three major operating characteristics of air filtersSo.pdf
What are three major operating characteristics of air filtersSo.pdf
 
What are “nonsense syllables” and what is their importanceSolut.pdf
What are “nonsense syllables” and what is their importanceSolut.pdfWhat are “nonsense syllables” and what is their importanceSolut.pdf
What are “nonsense syllables” and what is their importanceSolut.pdf
 
Three kinds of macromolecules are present in cell membranes. What ar.pdf
Three kinds of macromolecules are present in cell membranes. What ar.pdfThree kinds of macromolecules are present in cell membranes. What ar.pdf
Three kinds of macromolecules are present in cell membranes. What ar.pdf
 

Recently uploaded

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 

Recently uploaded (20)

Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 

Select a recent Internet scandaleventnews media happening. Describ.pdf

  • 1. Select a recent Internet scandal/event/news media happening. Describe the details of the scandal (who, what, when, where, why, how) and explain how you think it changed user’s behavior or attitudes towards technology. (2016 Democratic National Committee (DNC) emails that were leaked and subsequently published by WikiLeaks on July 22, 2016...) [This is for an Ethics in Information Technology Class] Solution The 2016 Democratic National Committee email leak is the scandal when a series of emails exchanged between high level DNC officials were leaked by wikileaks. These were leaked in July 2016 before the Democatric nation convention and led to the resignation of DNC chair Debbie Wasserman Schultz. Later other high level DNC officials also resigned. The source of the leak is still not known and russian intelligence services are suspected. FBI is currently investigating the source of the hack. This once again has shown the security loop holes in to our personal communications. Although the merits and demerits of this particular hack can be debated, never the less the emails also included personal conversations which should not be on public domain. The leak also consists of donor list including their credit card numbers and Social security numbers. This is very sensitive information. The issue has again highlighted how cautious we should be about our security loop holes. Unfortunately the hack has again shown that there should not be any reasonal expectation of privacy while using technology. Users are now a more concious about what security systems they are using and also what kind of thins they say on emails.