Uses and Misuses of Bronfenbrenner’s Bioecological Theory of Human Development
Ways in which Information can be Misused Misuses Of Information THE Misuse of information By:...
-
Upload
diane-parsons -
Category
Documents
-
view
213 -
download
0
Transcript of Ways in which Information can be Misused Misuses Of Information THE Misuse of information By:...
![Page 1: Ways in which Information can be Misused Misuses Of Information THE Misuse of information By: Antoinette Harris, Nickietha Phinn, Ashley Williams and.](https://reader030.fdocuments.us/reader030/viewer/2022032414/56649ee15503460f94bf2183/html5/thumbnails/1.jpg)
Ways in which Information can be Misused
![Page 2: Ways in which Information can be Misused Misuses Of Information THE Misuse of information By: Antoinette Harris, Nickietha Phinn, Ashley Williams and.](https://reader030.fdocuments.us/reader030/viewer/2022032414/56649ee15503460f94bf2183/html5/thumbnails/2.jpg)
Misuses Of Information
THE Misuse of information
By: Antoinette Harris, Nickietha Phinn, Ashley
Williams and Racquel Murray
![Page 3: Ways in which Information can be Misused Misuses Of Information THE Misuse of information By: Antoinette Harris, Nickietha Phinn, Ashley Williams and.](https://reader030.fdocuments.us/reader030/viewer/2022032414/56649ee15503460f94bf2183/html5/thumbnails/3.jpg)
Misuses Of Information
SUB-TOPICSWays in which information can be
misused and computer crimes
Software piracy
Industrial Espionage
Computer Fraud
Electronic Eavesdropping
Surveillance
![Page 4: Ways in which Information can be Misused Misuses Of Information THE Misuse of information By: Antoinette Harris, Nickietha Phinn, Ashley Williams and.](https://reader030.fdocuments.us/reader030/viewer/2022032414/56649ee15503460f94bf2183/html5/thumbnails/4.jpg)
Misuses Of Information
1. Software piracySoftware Piracy is
the unauthorised use, lending, copying, downloading, selling or otherwise distribution of computer programs without the permission of the software licence owner
![Page 5: Ways in which Information can be Misused Misuses Of Information THE Misuse of information By: Antoinette Harris, Nickietha Phinn, Ashley Williams and.](https://reader030.fdocuments.us/reader030/viewer/2022032414/56649ee15503460f94bf2183/html5/thumbnails/5.jpg)
When we ‘buy’ software all we are really buying is permission to use it, usually on one computer. We do not actually own the software, it remains the property of the programmer or company that created it. We get a licence to use it.
To share it or sell it to anyone else is a violation of the copyright law and is called software piracy.
Misuses Of Information
![Page 6: Ways in which Information can be Misused Misuses Of Information THE Misuse of information By: Antoinette Harris, Nickietha Phinn, Ashley Williams and.](https://reader030.fdocuments.us/reader030/viewer/2022032414/56649ee15503460f94bf2183/html5/thumbnails/6.jpg)
Misuses Of Information
Copyright infringement of this kind is extremely common.
Most countries have copyright laws which apply to software, but they are better enforced in some countries than others.
![Page 7: Ways in which Information can be Misused Misuses Of Information THE Misuse of information By: Antoinette Harris, Nickietha Phinn, Ashley Williams and.](https://reader030.fdocuments.us/reader030/viewer/2022032414/56649ee15503460f94bf2183/html5/thumbnails/7.jpg)
Misuses Of Information
2. Industrial Espionage
This is an attempt to access information about a company’s plans, product, clients or trade secrets.
While this may have nothing to do with technology, the use of the computer makes industrial espionage easier.
Competitors can hack into the computer network of another organisation and illegally access their information.
![Page 8: Ways in which Information can be Misused Misuses Of Information THE Misuse of information By: Antoinette Harris, Nickietha Phinn, Ashley Williams and.](https://reader030.fdocuments.us/reader030/viewer/2022032414/56649ee15503460f94bf2183/html5/thumbnails/8.jpg)
Industrial Espionage
Trade Secrets
Bribery
Blackmail
Technological Surveillance
Industrial espionage can involve :
![Page 9: Ways in which Information can be Misused Misuses Of Information THE Misuse of information By: Antoinette Harris, Nickietha Phinn, Ashley Williams and.](https://reader030.fdocuments.us/reader030/viewer/2022032414/56649ee15503460f94bf2183/html5/thumbnails/9.jpg)
3. Computer Fraud
Computer fraud is the act of using a computer to commit fraud (A deception deliberately practiced in order to secure unfair or unlawful gain.).
Computer fraud is a type of computer crime. A computer crime is using the computer to perform an illegal act or using the computer illegally.
![Page 10: Ways in which Information can be Misused Misuses Of Information THE Misuse of information By: Antoinette Harris, Nickietha Phinn, Ashley Williams and.](https://reader030.fdocuments.us/reader030/viewer/2022032414/56649ee15503460f94bf2183/html5/thumbnails/10.jpg)
4. Electronic eavesdropping
Electronic eavesdropping is the term applied to monitoring electronic radiation from computer equipment and reconstituting it into discernible information
i.e. using electronic means to monitor communication between parties without their permission.
![Page 11: Ways in which Information can be Misused Misuses Of Information THE Misuse of information By: Antoinette Harris, Nickietha Phinn, Ashley Williams and.](https://reader030.fdocuments.us/reader030/viewer/2022032414/56649ee15503460f94bf2183/html5/thumbnails/11.jpg)
Electronic eavesdropping
Most common type is wiretapping.Wiretapping monitors telephonic and
telegraphic communication.It was forbidden in the US as early as
1862.In England permission to wiretap is only
given in cases of serious offense.Intercepting and spying on emails is also
electronic eavesdropping
![Page 12: Ways in which Information can be Misused Misuses Of Information THE Misuse of information By: Antoinette Harris, Nickietha Phinn, Ashley Williams and.](https://reader030.fdocuments.us/reader030/viewer/2022032414/56649ee15503460f94bf2183/html5/thumbnails/12.jpg)
Misuses Of Information
Surveillance is the observation of people and their activities from a distance by means of electronic equipment or interception of electronically transmitted information
Misuses Of Information
5. Surveillance
![Page 13: Ways in which Information can be Misused Misuses Of Information THE Misuse of information By: Antoinette Harris, Nickietha Phinn, Ashley Williams and.](https://reader030.fdocuments.us/reader030/viewer/2022032414/56649ee15503460f94bf2183/html5/thumbnails/13.jpg)
Misuses Of Information
Surveillance can be done using hardware or software
These methods secretly monitors user’s action without their knowledge .
They acquire private information about an person or organization .
Misuses Of Information
5. Surveillance
![Page 14: Ways in which Information can be Misused Misuses Of Information THE Misuse of information By: Antoinette Harris, Nickietha Phinn, Ashley Williams and.](https://reader030.fdocuments.us/reader030/viewer/2022032414/56649ee15503460f94bf2183/html5/thumbnails/14.jpg)
Misuses Of Information
Surveillance
The hardware methodkey logging
The software methodSpyware
![Page 15: Ways in which Information can be Misused Misuses Of Information THE Misuse of information By: Antoinette Harris, Nickietha Phinn, Ashley Williams and.](https://reader030.fdocuments.us/reader030/viewer/2022032414/56649ee15503460f94bf2183/html5/thumbnails/15.jpg)
Misuses Of Information
Fun trivia
W hat is Industrial Piracy?What is Industrial Espionage?What are the two(2) types of
surveillance?
![Page 16: Ways in which Information can be Misused Misuses Of Information THE Misuse of information By: Antoinette Harris, Nickietha Phinn, Ashley Williams and.](https://reader030.fdocuments.us/reader030/viewer/2022032414/56649ee15503460f94bf2183/html5/thumbnails/16.jpg)
Misuses Of Information
Please do
Be careful what you do on your computer.
Do not ever misuse information.Report fraud and theft.Wiretapping is illegal.