SlideShare a Scribd company logo
MORAL STUDIES (MPW 2153) MISUSED   INTERNET GROUP MEMBER  : TAM HUEI  ZHIN      LEE YUAN YEE     WONG KHAI LING         55203                           55441                        57446
Misused of  Internet
1. Hacking: breaking into computer systems.   2. Instant Messaging: a type of communications service that enables you to create a kind of private chat room with another individual in order to communicate in real time over the Internet.   3. Porn: A slang term used to describe e-mail spam specifically of                  adult content or of a pornographic nature. Such as   profane and vulgar language, expletives,                  revealing attire, adult situations, criminal activity, nudity  
4. Viruses/Malicious codes: Malicious code is the term used to                                               describe any code in any part of a                                               software system or script that is                                               intended to cause undesired                                               effects, security breaches or                                               damage to a system.    5. Cyber Bullying: Slang term used to describe online                                harassment, which can be in the form of                                flames, comments made in chat rooms, the                                sending of offensive or cruel e-mail, or                                even harassing others by posting on blogs,                                Webpages or social networking
6. Gambling: Sites that promote or practice gambling                       involving the use of actual money, illegally                       or  otherwise, in the form of online casinos,                       lotteries, or sports betting.   7. Drug/Alcohol Abuse: Sites encouraging or glamorizing                                         the use of alcohol, tobacco, or                                         illicit drugs, instructions for                                         manufacturing illegal substances,                                         references to drug paraphernalia,                                         “drug culture”, and promoting /                                         selling alcohol and/or tobacco to  minors.
Uncommon examples  Of computer misuse
1.  Attempts to gain unauthorized access to a facility 2.  Using someone else's username and/or password 3.  Giving your password to someone else to use and/or      disclosing your password to someone else and/or being      otherwise careless with your password             4.  Disregarding the privacy of other people's files 5.  Generating messages which appear to originate with      someone else, or otherwise attempting to impersonate      someone else 6.  Accessing, storing, creating, distributing or displaying offensive or      explicit material especially in a public place 7.  Trying to interfere with someone else's use of the facilities 8.  Disregard for 'computer etiquette' 9.  Being wasteful of computer or network resources 10.Software piracy (including infringement of software license or       copyright provisions)
The Effects of  Misusing  Internet
1. Limited Knowledge: With the growing use of internet for                                        research purposes,there is now a decline                                        in the number of books used for research.                                        Also theinformation available on the                                        internet is limited and mostly pertains to                                        thedeveloped nations; a result, the                                        knowledge obtained is limited. Since                                        informationabout developing nations                                        such as Pakistan is scarce.   2. Isolation: Due to spending countless hours on the internet,                     children now spend avery limited time with family                     and actual friends. Therefore, there is a weakeningof                     the family bond and also limited interaction with                     actual people. As a result, thechildren may miss out                     on real life interaction with different relatives’ results                     indistorted social skills & limited real life social                     network.  
3. Feeling of Deprivation: Since most of the information available                                            online is aboutthe developed nations,                                            the people in developing countries, feel                                            that the developednations are much                                            better off and they have a feeling of                                            deprivation.   4. Addiction to the Internet: The children also have an unrealistic                                              feeling of powerand control, when                                              using the internet and as a result, they                                              become addicted to theinternet.    
5. Negative Impact of Uncensored Material:In today’s day and age it is harder tokeep a check on the     websites, a child is visiting and therefore, a lot of children     arenow being exposed to obscene, sexual material online     such as pornography. Alsosince the identity of an     individual is concealed online, there are a number of sexual predators online, who take advantage of children.   6. Exposure to Violence: With the growing use of the internet                                          by children, there isan increase in                                          online games. These games are very                                          violent and expose children toexplicit content and violent                                          situations thus desensitizing the                                          children and makingthem more                                          prone to inflicting self harm, as well                                          as harm on others.
  7. Distorted Sense of Reality: Since the online games     are completely cut off fromreality, the children       tend to confuse the “real world” from their “game     world”. This results in a distorted sense of     reality. Can result in Identity Confusion. Besides,     online, a person’s identity is concealed and     therefore people act likethemselves and have no     inhibitions saying how they feel. As a result, racist,     sexistpeople have made hate sites. And this     is a growing problem.  
Internet Misuse Prevention Methods
Filters : For companies and schools, filters can be set to block              access to unauthorized sites. A blacklist of websites that              employees and students should not access should also be              constructed and employees and students should be              required to confirm that they have read the acceptable use              policy and that they understand the related guidance and              rules.  Internal monitoring tools : It can act as the most effective                                            deterrent and are the ultimate shield                                            against misuse. It is legal for                                            companies and schools to monitor and                                            control their employees’ and students’                                            Internet usage. The facilities belong to                                            them and therefore they reserve every                                            right to safeguard them.  
Government : -They should ensure that education regarding Internet safety is   well reflected in guidance and integrate it into the curriculum.   The independent review of the primary curriculum should also be   done which must take full notice of e-safety issues.  - The TDA should take steps to ensure that new teachers entering    the profession are equipped with e-safety knowledge and skills.  -  They should also encourage school owners and teachers to focus    on e-safety by identifying it as a national priority for continuous    professional development of teachers and the wider school    workforce. -Lastly, in all schools, action must be taken at a whole-school    level to ensure that e-safety is mainstreamed throughout the    school's teaching, learning and other practices.
Parents: ,[object Object]
Spending time online with your child is one of the best ways to monitor them and teach them what is right and what is wrong. This will help a lot in cutting down internet crimes and misuse.-  Parents can also ask children to share their favorite Web sites    and what they like about them. Help them discover websites    that can help them with their homework, hobbies, and other    special interests. Doing so will help parents make their    children use the internet for the good purposes instead of the    bad. -Parents should also consider locating the home computer in a family area where use can be shared and monitored and teach their children "netiquette", how to behave online.
Conclusion
 Companies which are utilizing the Internet as a powerful business tool are now realizing that misuse of the same asset could turn out to be very expensive, eating into their resources such as their bandwidth and time, and compromising on security and employee productivity. Even worse, it could lead to computer-related firings, corporate misunderstanding, distrust and sexual harassment.   Though such instances might not be as widespread in India as in the US and Europe, the threats nevertheless exist. Viral Raval, vice president of Network and Systems at Kale Consultants, points out that the Internet is a resource which, if not controlled and monitored, can not only disrupt normal functioning but also seriously impair the more serious business usage when required.  

More Related Content

What's hot

Keeping your child safe online
Keeping your child safe onlineKeeping your child safe online
Keeping your child safe online
LuciusonSecurity
 
Internet Safety for Parents presentation 2017
Internet Safety for Parents presentation 2017Internet Safety for Parents presentation 2017
Internet Safety for Parents presentation 2017
KanelandSvihlik
 
Glow Internet Safety Talk
Glow Internet Safety TalkGlow Internet Safety Talk
Glow Internet Safety Talk
Ollie Bray
 
Internet safetypresentationghs
Internet safetypresentationghsInternet safetypresentationghs
Internet safetypresentationghs
fkompar
 
KidSafe - Parental Training Presentation
KidSafe  - Parental Training PresentationKidSafe  - Parental Training Presentation
KidSafe - Parental Training Presentation
OCTF Industry Engagement
 
Internet safetypresentation
Internet safetypresentationInternet safetypresentation
Internet safetypresentationfkompar
 
Internet Safety and Responsible Use: NQT Presentation - August 2009
Internet Safety and Responsible Use: NQT Presentation - August 2009Internet Safety and Responsible Use: NQT Presentation - August 2009
Internet Safety and Responsible Use: NQT Presentation - August 2009
Ollie Bray
 
Digital footprints & criminal investigations
Digital footprints & criminal investigationsDigital footprints & criminal investigations
Digital footprints & criminal investigations
CreepSquash
 
Keeping your child safe online
Keeping your child safe onlineKeeping your child safe online
Keeping your child safe onlineamulhall
 
Online safety for children
Online safety for childrenOnline safety for children
Online safety for children
Kumar Manish
 
Dangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareDangers Of Internet - Parents Beware
Dangers Of Internet - Parents Beware
Nurizcka
 
Parenting in digital world
Parenting in digital worldParenting in digital world
Parenting in digital world
Dan Bowen
 
How big is your digital footprint fall 2012
How big is your digital footprint fall 2012How big is your digital footprint fall 2012
How big is your digital footprint fall 2012
kschermerhorn
 
Top ten-tips
Top ten-tipsTop ten-tips
Top ten-tips
Amit Pal Singh
 
Cohoes Jan 13 Cyberbullying
Cohoes Jan 13 CyberbullyingCohoes Jan 13 Cyberbullying
Cohoes Jan 13 Cyberbullying
kschermerhorn
 

What's hot (16)

Keeping your child safe online
Keeping your child safe onlineKeeping your child safe online
Keeping your child safe online
 
Internet Safety for Parents presentation 2017
Internet Safety for Parents presentation 2017Internet Safety for Parents presentation 2017
Internet Safety for Parents presentation 2017
 
Glow Internet Safety Talk
Glow Internet Safety TalkGlow Internet Safety Talk
Glow Internet Safety Talk
 
Internet safetypresentationghs
Internet safetypresentationghsInternet safetypresentationghs
Internet safetypresentationghs
 
KidSafe - Parental Training Presentation
KidSafe  - Parental Training PresentationKidSafe  - Parental Training Presentation
KidSafe - Parental Training Presentation
 
Internet safetypresentation
Internet safetypresentationInternet safetypresentation
Internet safetypresentation
 
Internet Safety and Responsible Use: NQT Presentation - August 2009
Internet Safety and Responsible Use: NQT Presentation - August 2009Internet Safety and Responsible Use: NQT Presentation - August 2009
Internet Safety and Responsible Use: NQT Presentation - August 2009
 
Social networking leaflet
Social networking leafletSocial networking leaflet
Social networking leaflet
 
Digital footprints & criminal investigations
Digital footprints & criminal investigationsDigital footprints & criminal investigations
Digital footprints & criminal investigations
 
Keeping your child safe online
Keeping your child safe onlineKeeping your child safe online
Keeping your child safe online
 
Online safety for children
Online safety for childrenOnline safety for children
Online safety for children
 
Dangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareDangers Of Internet - Parents Beware
Dangers Of Internet - Parents Beware
 
Parenting in digital world
Parenting in digital worldParenting in digital world
Parenting in digital world
 
How big is your digital footprint fall 2012
How big is your digital footprint fall 2012How big is your digital footprint fall 2012
How big is your digital footprint fall 2012
 
Top ten-tips
Top ten-tipsTop ten-tips
Top ten-tips
 
Cohoes Jan 13 Cyberbullying
Cohoes Jan 13 CyberbullyingCohoes Jan 13 Cyberbullying
Cohoes Jan 13 Cyberbullying
 

Similar to Moral presentation

Cybercrimes (Against Children)
Cybercrimes (Against Children)Cybercrimes (Against Children)
Cybercrimes (Against Children)
Can R. PAHALI
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
pscl
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
Yumna Ali
 
Net Cetera: Chatting with Kids About Being Online 2014
Net Cetera: Chatting with Kids About Being Online 2014Net Cetera: Chatting with Kids About Being Online 2014
Net Cetera: Chatting with Kids About Being Online 2014
- Mark - Fullbright
 
Children-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptxChildren-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptx
Rahuljain40418
 
Internet Safety for Your Child
Internet Safety for Your ChildInternet Safety for Your Child
Internet Safety for Your Childcpitchford
 
Know it All - Parents eSafety Presentation
Know it All - Parents eSafety PresentationKnow it All - Parents eSafety Presentation
Know it All - Parents eSafety Presentation
alexfinvle
 
Safeguarding_Guidance to Keep Children Safe Online Eng.pptx
Safeguarding_Guidance to Keep Children Safe Online Eng.pptxSafeguarding_Guidance to Keep Children Safe Online Eng.pptx
Safeguarding_Guidance to Keep Children Safe Online Eng.pptx
ajav252888
 
Pengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remajaPengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remaja
Andri Priyatna
 
Social Media SSPS
Social Media SSPSSocial Media SSPS
Social Media SSPSmicaja
 
Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling final
Karen Brooks
 
2.InternetSafety.ppt
2.InternetSafety.ppt2.InternetSafety.ppt
2.InternetSafety.ppt
Sanil Shrivastava
 
How to keep your teens safe on social media
How to keep your teens safe on social mediaHow to keep your teens safe on social media
How to keep your teens safe on social mediaKwazi Communications
 
Online risks that children face
Online risks that children faceOnline risks that children face
Online risks that children face
Avanzo net
 
Cyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & ChildrenCyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & Children
HomeGuides
 
Internet ethics and rules
Internet ethics and rulesInternet ethics and rules
Internet ethics and rules
Mazni Salleh
 
Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07
E Robertson
 
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2
JayMarkBandoy1
 
Internet Safety and Chldren
Internet Safety and ChldrenInternet Safety and Chldren
Internet Safety and ChldrenJoe Drumgoole
 

Similar to Moral presentation (20)

Cybercrimes (Against Children)
Cybercrimes (Against Children)Cybercrimes (Against Children)
Cybercrimes (Against Children)
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Net Cetera: Chatting with Kids About Being Online 2014
Net Cetera: Chatting with Kids About Being Online 2014Net Cetera: Chatting with Kids About Being Online 2014
Net Cetera: Chatting with Kids About Being Online 2014
 
Children-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptxChildren-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptx
 
Internet Safety for Your Child
Internet Safety for Your ChildInternet Safety for Your Child
Internet Safety for Your Child
 
Know it All - Parents eSafety Presentation
Know it All - Parents eSafety PresentationKnow it All - Parents eSafety Presentation
Know it All - Parents eSafety Presentation
 
Safeguarding_Guidance to Keep Children Safe Online Eng.pptx
Safeguarding_Guidance to Keep Children Safe Online Eng.pptxSafeguarding_Guidance to Keep Children Safe Online Eng.pptx
Safeguarding_Guidance to Keep Children Safe Online Eng.pptx
 
Pengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remajaPengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remaja
 
Social Media SSPS
Social Media SSPSSocial Media SSPS
Social Media SSPS
 
Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling final
 
2.InternetSafety.ppt
2.InternetSafety.ppt2.InternetSafety.ppt
2.InternetSafety.ppt
 
How to keep your teens safe on social media
How to keep your teens safe on social mediaHow to keep your teens safe on social media
How to keep your teens safe on social media
 
Online risks that children face
Online risks that children faceOnline risks that children face
Online risks that children face
 
Cyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & ChildrenCyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & Children
 
Internet ethics and rules
Internet ethics and rulesInternet ethics and rules
Internet ethics and rules
 
Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07
 
Koreja
KorejaKoreja
Koreja
 
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2
 
Internet Safety and Chldren
Internet Safety and ChldrenInternet Safety and Chldren
Internet Safety and Chldren
 

Recently uploaded

PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
Jen Stirrup
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
UiPathCommunity
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 

Recently uploaded (20)

PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 

Moral presentation

  • 1. MORAL STUDIES (MPW 2153) MISUSED INTERNET GROUP MEMBER : TAM HUEI ZHIN LEE YUAN YEE WONG KHAI LING 55203 55441 57446
  • 2. Misused of Internet
  • 3. 1. Hacking: breaking into computer systems.   2. Instant Messaging: a type of communications service that enables you to create a kind of private chat room with another individual in order to communicate in real time over the Internet.   3. Porn: A slang term used to describe e-mail spam specifically of adult content or of a pornographic nature. Such as profane and vulgar language, expletives, revealing attire, adult situations, criminal activity, nudity  
  • 4. 4. Viruses/Malicious codes: Malicious code is the term used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system.   5. Cyber Bullying: Slang term used to describe online harassment, which can be in the form of flames, comments made in chat rooms, the sending of offensive or cruel e-mail, or even harassing others by posting on blogs, Webpages or social networking
  • 5. 6. Gambling: Sites that promote or practice gambling involving the use of actual money, illegally or otherwise, in the form of online casinos, lotteries, or sports betting.   7. Drug/Alcohol Abuse: Sites encouraging or glamorizing the use of alcohol, tobacco, or illicit drugs, instructions for manufacturing illegal substances, references to drug paraphernalia, “drug culture”, and promoting / selling alcohol and/or tobacco to minors.
  • 6. Uncommon examples Of computer misuse
  • 7. 1. Attempts to gain unauthorized access to a facility 2. Using someone else's username and/or password 3. Giving your password to someone else to use and/or disclosing your password to someone else and/or being otherwise careless with your password 4. Disregarding the privacy of other people's files 5. Generating messages which appear to originate with someone else, or otherwise attempting to impersonate someone else 6. Accessing, storing, creating, distributing or displaying offensive or explicit material especially in a public place 7. Trying to interfere with someone else's use of the facilities 8. Disregard for 'computer etiquette' 9. Being wasteful of computer or network resources 10.Software piracy (including infringement of software license or copyright provisions)
  • 8. The Effects of Misusing Internet
  • 9. 1. Limited Knowledge: With the growing use of internet for research purposes,there is now a decline in the number of books used for research. Also theinformation available on the internet is limited and mostly pertains to thedeveloped nations; a result, the knowledge obtained is limited. Since informationabout developing nations such as Pakistan is scarce.   2. Isolation: Due to spending countless hours on the internet, children now spend avery limited time with family and actual friends. Therefore, there is a weakeningof the family bond and also limited interaction with actual people. As a result, thechildren may miss out on real life interaction with different relatives’ results indistorted social skills & limited real life social network.  
  • 10. 3. Feeling of Deprivation: Since most of the information available online is aboutthe developed nations, the people in developing countries, feel that the developednations are much better off and they have a feeling of deprivation.   4. Addiction to the Internet: The children also have an unrealistic feeling of powerand control, when using the internet and as a result, they become addicted to theinternet.    
  • 11. 5. Negative Impact of Uncensored Material:In today’s day and age it is harder tokeep a check on the websites, a child is visiting and therefore, a lot of children arenow being exposed to obscene, sexual material online such as pornography. Alsosince the identity of an individual is concealed online, there are a number of sexual predators online, who take advantage of children.   6. Exposure to Violence: With the growing use of the internet by children, there isan increase in online games. These games are very violent and expose children toexplicit content and violent situations thus desensitizing the children and makingthem more prone to inflicting self harm, as well as harm on others.
  • 12.   7. Distorted Sense of Reality: Since the online games are completely cut off fromreality, the children tend to confuse the “real world” from their “game world”. This results in a distorted sense of reality. Can result in Identity Confusion. Besides, online, a person’s identity is concealed and therefore people act likethemselves and have no inhibitions saying how they feel. As a result, racist, sexistpeople have made hate sites. And this is a growing problem.  
  • 14. Filters : For companies and schools, filters can be set to block access to unauthorized sites. A blacklist of websites that employees and students should not access should also be constructed and employees and students should be required to confirm that they have read the acceptable use policy and that they understand the related guidance and rules. Internal monitoring tools : It can act as the most effective deterrent and are the ultimate shield against misuse. It is legal for companies and schools to monitor and control their employees’ and students’ Internet usage. The facilities belong to them and therefore they reserve every right to safeguard them.  
  • 15. Government : -They should ensure that education regarding Internet safety is well reflected in guidance and integrate it into the curriculum. The independent review of the primary curriculum should also be done which must take full notice of e-safety issues. - The TDA should take steps to ensure that new teachers entering the profession are equipped with e-safety knowledge and skills. - They should also encourage school owners and teachers to focus on e-safety by identifying it as a national priority for continuous professional development of teachers and the wider school workforce. -Lastly, in all schools, action must be taken at a whole-school level to ensure that e-safety is mainstreamed throughout the school's teaching, learning and other practices.
  • 16.
  • 17. Spending time online with your child is one of the best ways to monitor them and teach them what is right and what is wrong. This will help a lot in cutting down internet crimes and misuse.- Parents can also ask children to share their favorite Web sites and what they like about them. Help them discover websites that can help them with their homework, hobbies, and other special interests. Doing so will help parents make their children use the internet for the good purposes instead of the bad. -Parents should also consider locating the home computer in a family area where use can be shared and monitored and teach their children "netiquette", how to behave online.
  • 19.  Companies which are utilizing the Internet as a powerful business tool are now realizing that misuse of the same asset could turn out to be very expensive, eating into their resources such as their bandwidth and time, and compromising on security and employee productivity. Even worse, it could lead to computer-related firings, corporate misunderstanding, distrust and sexual harassment.   Though such instances might not be as widespread in India as in the US and Europe, the threats nevertheless exist. Viral Raval, vice president of Network and Systems at Kale Consultants, points out that the Internet is a resource which, if not controlled and monitored, can not only disrupt normal functioning but also seriously impair the more serious business usage when required.  
  • 20. With companies, it's about the ability to draw the right line between customer satisfaction, security measures and associate delight when implementing an Internet Usage Policy. A tough balance to arrive at, but nevertheless imperative to ensure that the Internet at the workplace is indeed a powerful business rather than recreational tool. All this while giving employees the freedom to harness its full potential. After all, if there is excessive monitoring on these issues, it may prove to be detrimental to the organization and backfire, thereby defeating the purpose itself. The Internet can be a powerful tool to further knowledge and improve business practices and methods, therefore, sane usage rather than complete restraint is ultimately the best policy. The best check in such a scenario is to see that it is being used as a guideline for effective usage and not as an enforcing memo.