Send the link below via email or IMCopy
Present to your audienceStart remote presentation
- Invited audience members will follow you as you navigate and present
- People invited to a presentation do not need a Prezi account
- This link expires 10 minutes after you close the presentation
- A maximum of 30 users can follow your presentation
- Learn more about this feature in our knowledge base article
Transcript of Internet Identities
against sexual predators Ethical Considerations Universality Principle and Cyber-bullying: CBS Houston blogger comments under pen name 'Claire Crawford'
about weight of Oklahoma City cheerleader Kelsey Williams: What is the effect of having False Identities in a social networking setting? Social Networking Emily Holden Technological Issues Kelvin Wong How the Internet works A platform to provide connections between computing devices.
Data transmitted through physical links.
Protocols (HTTP, TCP/IP)
Applications (Webservers, browsers, Skype) A typical example Internet is not safe! Packet Sniffing Pharming Hackers take control of DNS
When victim asks for a website's IP address, the DNS returns a false address that directs the victim to a malicious website. Phishing Solutions SQL Injection SQL is a computer language that used to control database system
Hackers find "bugs" in the website where they can inject SQL codes.
The hackers then can directly control the database, and access the information stored. Creepy or Legally Invasive? Fourth Amendment Ethical Considerations Right to Privacy vs. Right to Safety
how much privacy should we be willing to sacrifice to prevent crime?
Should privacy be considered an inalienable right?
Does a lack of privacy interfere with Free Speech?
How much protection should the Fourth Amendment offer internet profiles and communications? Government Surveillance Phone wiretapping was legalized in 1934
In 1968, Congress rules "To safeguard the privacy of innocent persons, the interception of wire or oral communications ... should be allowed only when authorized by a court of competent jurisdiction and should remain under the control and supervision of the authorizing court."
How much of wiretapping laws should apply to the internet?
Internet surveillance is "going dark"
Criminals have moved to the internet to communicate due to the current lack of surveillance Criminal Investigations Internet Legislation What else happened in 1986? Solutions Internet Privacy Nicole Voyen Internet Identity Brian Downey, Emily Holden
Nicole Voyen, Jingxu Li
Kelvin Wong Identity Theft Jingxu Li Commercial Use of Information Brian Downey Collection of Information The Consumer Certain Information is given readily
Financial/personal info for online shopping
Establishes trust with certain companies
Usage of privacy statements
Majority of consumers ignore privacy polices on websites Ownership of Information Misconceptions about information given online
Websites own submitted information
Privacy polices do not have to grant individuals rights to their information
All forms of gathered information can be owned by websites
Searches, clicks, pictures, etc Usage of Consumer Information Ad Tailoring
Selling of information to a third party
Mostly consists of companies interested in marketing
Creating consumer profiles
Gathering data from multiple sources Ethical Considerations How consent is judged by corporations
How much protection is really offered
Practices to avert attention from privacy policies Current Legislation Information gathered by online businesses not protected by federal law
Online Privacy Protection Act (California)
Requires companies to explicitly post privacy information on their websites
Comparison with non-Internet Privacy
Garbage Specific Solutions Refraining from giving out valuable information
Raising awareness of privacy information
Software that manages and hides PC information Voluntary input
Profile based websites
Tracking clicks in a browser
Search engine queries
Establishing trust with the consumer
brand names 1) User enters “google.com” into browser
2) Browser gets address of Google by DNS
3) Browser sends a request to Google
4) Google sends back a response
5) Browser displays contents on the screen Our Internet Identities may be acquired by malice users.
SQL injection "Privacy is dead." "The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized." Bullies use pseudonyms to hide under a
shield while posting anything they want "What do you think? Is this chick too chunky to be a cheerleader? What are the issues? Fake emails or Website with very similar contents with the popular ones.
The victims enters their personal information
Malice users can easily obtain users' identity Emily Internet Identity Theft False identities can turn social networking websites from fun and 'harmless' into very dangerous Public Profiles sometimes leads to this... What is ID theft ? The use of false identities creates an unsafe environment on the internet that: Crime vs. 1) Enables bullies to hide behind a shield while harming others
2) Gives power to manipulative or dangerous individuals "Reasonably Expected" Private Information Internet Privacy is not explicitly protected by US Government
Technological Advancement is at a point where personal information is always at risk
Unethical business practices lead to violation of individual rights
Implementation of new legislation and overall awareness is paramount to protecting personal information on the internet do not have personal information readily available fo all t Safety Considerations:
Do not interact with people you have not met in real life
Do not have personal information readily available for all to see
Keep accounts private Figure 1: Corporate ID Theft Pending Cases (FBI, 2006) Internet Identity Theft Trojan Horses Virus How is works legislation should be created prohibiting false identities, or at least keeping people legally accountable for their actions on the internet Emily Brian Emily Brian Brian Brian Brian It is a program that is downloaded usually with a music or move file.
They usually will erase memory, send credit card numbers and passwords to hackers Brian Phishing Brian Fake e-mail messages from a company with warning that you must update your information.
Fake charities asking you for money. Social and Ethical Issues When data is being transmitted from sender to receiver, it will pass through some intermediate devices.
Attacker may modify the setting of these devices and have the devices forward them the data Identity theft is a violation of right to justice
FBI and anti-virus companies fail on duty ethics Solutions Emily People can create false identities targeted directly to 'pull one over' on someone Be careful attachments
Update your anti-virus software frequently
Apply password protection, and change password frequently Solutions FBI should use more criminal, cyber resources to stop crime groups in their early stages
Every one has duty to reduce criminal. Report it to FBI: Internet Fraud Complaint Center (IFCC) Jingxu Jingxu Jingxu Jingxu Jingxu Jingxu Jingxu Jingxu personal user information
identity of anonymous posters
customer reviews (Cyber-SLAPPs) Data encryption
Developers write websites carefully Kelvin Kelvin Kelvin Kelvin Kelvin Kelvin Kelvin Kelvin USA PATRIOT Act
CALEA Electronic Communications Privacy Act of 1986 1961-1969- Ronald Reagan was president January 16, 1986- Apple introduced the Macintosh Plus May 16, 1986- Top Gun was released in theaters May 14, 1986- Mark Zuckerberg turns 2! References Chaudhari, Nilesh. How Pharming Works. Digital image. Palisade. N.p., Mar. 2006. Web. 04 June 2013.
Siegler, M G. Phishing Attack Underway At Facebook. Don't Sign In To Fbaction.net. Digital image. Techcrunch. N.p., 29 Apr. 2009. Web. 4 June 2013.
V, John. How packet sniffers manage to grab passwords. Digital image. Jscape. N.p., 11 Dec. 2012. Web. 4 June 2013.
Chaffin, Bryan. Encryption. Digital image. The Mac Observer. N.p., 4 Apr. 2013. Web. 4 June 2013.
"US Man 'stole 130m Card Numbers'" BBC News. BBC, 18 Aug. 2009. Web.04 June 2013.
The FBI Federal Bureau of Investigation, 2006, Financial Crimes Report to the Public Fiscal Year 2006, 48p.
Bob B., CNN: Technology, 2001, Navy issues warning on Y2K Trojan Horse [http://www.cnn.com/TECH/computing/9910/22/navy.trojan.horse.idg/; October 22, 1999]
Bob, S., Feb 22, 2012, Survey: ID theft on the rise again, card victims jump by 2 million annually: NBANEWS. [http://redtape.nbcnews.com/_news/2012/02/22/10471719-survey-id-theft-on-the-rise-again-card-victims-jump-by-2-million-annually?lite]
Vangie, b., How to Defend Yourself Against Identity Theft, 2013, Webopedia. [http://www.webopedia.com/DidYouKnow/Internet/2006/identity_theft.asp; September 1, 2006]
Ani K., 2013, A New Trojan Horse Attacks the Military and The Banks.[http://voices.yahoo.com/a-trojan-horse-attacks-military-banks-6013508.html?cat=15; May 13, 2010]
Mary L., May 31, 2006, Antivirus Software: About.com. [http://antivirus.about.com/b/2006/05/31/whats-a-trojan-horse-virus.htm]
BullGuard, 2003, What is a Trojan house?: Complete Internet Security. [http://www.bullguard.com/bullguard-security-center/pc-security/computer-threats/what-is-a-trojan-horse.aspx]
Chris E. M., 2013, Phishing Scams: Internet Identity Theft: Crime Doctor.
"Target.com : Furniture, Baby, Electronics, Toys. N.p., n.d. Web. 05 June 2013. <http://www.target.com/>. "Amazon.com: Online Shopping for Electronics, Apparel, Computers, Books, DVDs & More." Amazon.com: Online Shopping for Electronics, Apparel, Computers, Books, DVDs & More. N.p., n.d. Web. 05 June 2013. <http://www.amazon.com/>.
"Check out at the Counter." Send Money, Pay Online or Set Up a Merchant Account. N.p., n.d. Web. 05 June 2013. <https://www.paypal.com/>.
Google. N.p., n.d. Web. 05 June 2013. <http://www.google.com/>.
Castañeda, J. Alberto, Francisco J. Montoso, and Teodoro Luque. "The Dimensionality of Customer Privacy Concern on the Internet." Online Information Review 31.4 (2007): 420-39. Print.
Boscheck, Ralf. "Internet and Consumer Privacy: Considering the FTC’s “Do Not Track” Proposal." Socialogical Abstracts, n.d. Web. 05 June 2013.
Gabisch, Jason A. "THE IMPACT OF ONLINE INFLUENCE STRATEGIES ON CONSUMER RESPONSE AND PRIVACY EXPECTATIONS." Sociological Abstracts (2011): n. pag. Print.
Fernback, J., and Z. Papacharissi. "Online Privacy as Legal Safeguard: The Relationship among Consumer, Online Portal, and Privacy Policies." New Media & Society 9.5 (2007): 715-34. Print.
Wang, Huaiqing, Matthew Lee, and Chen Want. "Consumer Privacy Concerns about Internet Marketing." Communications of the ACM 41.3 (n.d.): n. pag. Print.
Tate, Amethyst. "Kelsey Williams Fat Critic Claire Crawford Fired After Saying NBA Cheerleader Is 'Too Chunky' To Wear Oklahoma City Thunder Uniform." International Business Times. 1 May 2013. Web. 05 June 2013. <http://www.ibtimes.com/kelsey- williams-fat-critic-claire-crawford-fired-after-saying-nba-cheerleader-too-chunky-wear>.
Burke, Timothy, and Jack Dickey. "Manti Te'o's Dead Girlfriend, The Most Heartbreaking And Inspirational Story Of The College Football Season, Is A Hoax." Deadspin. 16 Jan. 2013. Web. 05 June 2013. <http://deadspin.com/manti-teos-dead-girlfriend-the-most-heartbreaking-an-5976517>.
Press, Associated. "Hoaxer Was in Love with Manti Te'o." ESPN. ESPN Internet Ventures, 31 Jan. 2013. Web. 05 June 2013. <http://espn.go.com/college- football/story/_/id/8900688/ronaiah-tuiasosopo-says-was-love-manti-teo>.
"InternetSafety101.org: Statistics." InternetSafety101.org: Statistics. Web. 05 June 2013. <http://www.internetsafety101.org/Predatorstatistics.htm>.
"Stats About Online Predators and Precautions Parents Should Take - Sudbury, MA Patch." Sudbury Patch. Web. 05 June 2013. <http://sudbury.patch.com/blog_posts/stats-about- online-predators-and-precautions-parents-should-take>.
“Social Networking Sites." Social Networking Sites. Web. 05 June 2013. <http://education.illinois.edu/wp/netfiles.uiuc.edu/kleckaus/www/Social_Networking_Sit es.html>.
Anonymous. "Ronald Reagan Biography." Bio. True Story. A&E Networks Television, n.d. Web. <http://www.biography.com/people/ronald-reagan-9453198>.
Dutta, S., Dutton, W.H., Law, Ginette, 2011, The New Internet World A Global Perspective on Freedom of Expression, Privacy, Trust and Security Online: INSEAD Working Papers Collection, v. 89, pp. 3-34.
Hibbard, Christa M. "Wiretapping the Internet: The Expansion of the Communications Assistance to Law Enforcement Act to Extend Government Surveillance." Federal Communications Law Journal 64 (2011-2012): 371-99.
Ingram, Matthew. "Google Now: Is It Magic, or Just Plain Creepy?" Technology. Bloomberg Business Week, 6 May 2013. Web. <http://www.businessweek.com/articles/2013-05-06/google-now-is-it-magic-or-just-plain-creepy>.
"Larry Talks Tech." Larry Talks Tech. N.p., 23 Apr. 2013. Web. <http://www.larrytalkstech.com/keep-your-mac-safe-for-free-part-1/>.
Newman, Jared. "Google Now Gets Even Creepier (and Why That's a Good Thing)." Time 7 Dec. 2012: n. pag. Web. <http://techland.time.com/2012/12/07/google-now-gets-even-creepier-and-thats-a-good-thing/>.
Milligan, Paul. "Caught Bread-handed: Dopey Car Thieves Jailed after Flaunting Money and Posing with a 'CASH SANDWICH' on Facebook." Mail Online. Daily Mail, 25 Apr. 2013. Web. <http://www.dailymail.co.uk/news/article-2314843/Brazen-luxury-car-thieves-pictures-cash-sandwich-Facebook-jailed-series-raids.html>
Pretzels SOPA Blackout Mockup." Wikimedia Common. Wikimedia Common, n.d. Web. <http://commons.wikimedia.org/wiki/File:Pretzels_SOPA_Blackout_Mockup_v4.png>.
Randall, Gregory C. "WRITING 4 DEATH: My Love Affair With Apple." WRITING 4 DEATH: My Love Affair With Apple. N.p., 24 Apr. 2013. Web. <http://writing4death.blogspot.com/2013/04/my-love-affair-with-apple.html>.
Richards, Robert D. "Compulsory Process in Cyberspacce: Rethinking Privacy in the Social Networking Age." Harvard Journal of Law & Public Policy36.2 (2013): 519-48.
"SALON." Saloncom RSS. N.p., 23 Apr. 2013. Web. <http://www.salon.com/2013/04/16/the_boston_bombing_privacy_lesson/>.
Sveback, Ross. "BIRTHDAY CAKE 2 Year Old." Ross Sveback RSS. N.p., 12 Aug. 2012. Web. <http://www.rosssveback.com/2008/11/let-them-eat-cake.html/birthday-cake-2-year-old>.
""Top Gun" to Get 3D IMAX and Blu-ray Releases in February." NewsOK: Oklahoma City News, Sports, Weather, Business & Entertainment OKC. NewsOK, 11 Dec. 2012. Web. 05 June 2013. <http://newsok.com/top-gun-to-get-3d-imax-and-blu-ray-releases-in-february/article/3832307>.
Thierer, Adam. "THE PURSUIT OF PRIVACY IN A WORLD WHERE INFORMATION CONTROL IS FAILING." Harvard Journal of Law & Public Policy 36.2 (2013): 409-55.
Wortham, Jenna. "Will Google’s Personal Assistant Be Creepy or Cool?" Bits Will Googles Personal Assistant Be Creepy or Cool Comments. New York Times, 28 June 2012. Web. <http://bits.blogs.nytimes.com/2012/06/28/will-googles-personal-assistant-be-creepy-or-cool/>. A) Williams has the perfect look to be an NBA cheerleader
B) She could use some tightening up in her midsection
C) She has no business wearing that outfit in front of people" Former Notre Dame linebacker Manti Te'o finds himself in a relationship with a 'woman' he had never met 'Cat·fish [kat-fish]: To pretend to be someone you're not online by posting false information, such as someone else's pictures, on social media sites, usually with the intention of getting someone to fall in love with you.' 'Lannay Kekeu' fabricated by Ronaiah Tuiasosopo using photographs from an old school friend Emily Cyber-Bullying... "One million children were harassed, threatened or subjected to other forms of cyber-bullying on Facebook during the past year." Why Do it?... "81% of youth agree that bullying online is easier to get away with than bullying in person." Emily But not all false identities
are simply looking to prank... "65% of online sex offenders used the victim's social networking site to gain home and school information about the victim." "70 percent of kids accept “friend” requests regardless of whether they know who they are friending." "There is a fifty percent chance that when a child is in a chat room designated for under aged children, the stranger he or she is talking to is some sort of sexual predator logged within a false identity." Emily Emily If everyone in the world bullies others through the internet, is that acceptable? Virtue Ethics and Online Predators: What norm permits people to make false identities and use them to take sexual advances towards others, especially children? Freedom and Safety: With these two conflicting values, which takes precedence on the internet? Some effort has been made to stop
misuse of social networking sites... 'To Catch a Predator'
on NBC Dateline Children learn in school about the dangers of cyber-bullying -Mark Zuckerberg Larger focus on applying foundations of the Constitution to internet technologies
Corporate transparency in Terms and Conditions
Internet user education Passed on October 21, 1986
Enacted to protect internet users from government intrusion on electronic communication
Extremely outdated Nicole Nicole Nicole Nicole Nicole Nicole Nicole Nicole Nicole