A website that allows the easy creation and editing of any number of interlinked web pages via a web browser using a simplified markup language
Censorship
The attempt to suppress or regulate public access to material considered offensive or harmful
Types of Censorship
Direct Censorship - Government monopolization, to monitor government secrets
Self-Censorship - Most common form of censorship, group decides for itself not to publish
Identity Theft
When a person uses another person's electronic identity
Significant number of people were victims of identity theft due to their online activities
Phishing
Use of email or Web pages to attempt to deceive people into revealing personal information
Mill's Principle of Harm
The only ground on which intervention is justified is to prevent harm to others; the individual's own good is not a sufficient condition
Chat room
Supports real-time discussions among many people connected to network
The quality of Web-based information varies widely
Cyberbullying
The use of the Internet or the phone system to inflict psychological harm on another person. Frequently, a group of persons gangs up to cyberbully the victim
Factors contributing to Internet Addiction
Social factors - Peer groups
Situational factors - Stress, Lack of social support and intimacy, Limited opportunities for productive activity
Individual factors - Tendency to pursue activities to excess, Lack of achievement, Fear of failure, Feeling of alienation
Intellectual property
Works of the mind—such as art, books, films, formulas, inventions, music, and processes—that are distinct and owned or created by a single person or group
Intellectual Property Laws
Trade Secrets - rights on confidential information which may be sold or licensed
Copyright - Protects authored works
Patent - Exclusive right granted for a product, process or an improvement of a product or process which is new, inventive and useful
Trademark - Protects a business' brand identity
Copyright infringement
The use or production of copyright-protected material without the permission of the copyright holder
The use of copyrights to protect computer software raises many complicated issues of interpretation
Fair Use
The right given to a copyright owner to reproduce a work without permission of the copyright holder
Digital rights management (DRM)
Actions owners of intellectual property may take to protect their rights
Peer-to-peer networks
A transient network allowing computers running the same networking program to connect with each other and access files stored on each other's hard drives
Cyberlockers
Internet-based file-sharing services that allow users to upload password-protected files
Plagiarism
Act of stealing someone's ideas or words as one's own
Reverse Engineering
Process of taking something apart in order to understand it, build a copy of it, or improve it
Open-source code
Any program whose source code is made available for use or modification, as users or other developers see fit
Cybersquatting
Registering, selling or using a domain name with the intent of profiting from the goodwill of someone else's trademark
Data Privacy
The right of an individual not to have private information about himself disclosed, and to live freely from surveillance and intrusion
REPUBLIC ACT 10173 DATA PRIVACY ACT OF 2012 (DPA) is an act protecting individual personal information in information and communications systems in the government and the private sector, creating for this purpose a National Privacy Commission, and for other purposes
Who must comply with the Data Privacy Act
Companies with 250 employees or 1000 data subjects
Data subject
An individual whose personal information is processed. It is the customer whom we serviced
Types of Identity
Offline Identity - Identification cards we use on a day-to-day basis to authenticate identity in the physical world
Online identity - A social identity that an internet user establishes in online communities and websites
Personal Identifiable Information
Any information whether recorded in a material form or not, from which the identity of an individual is apparent or can be reasonably and directly ascertained
Who Controls the data
Personal Information Controller (PIC) - A person or organization who controls the collection, holding, processing or use of personal information
Personal Information Processor (PIP) - Any natural or juridical person or any other body to whom a PIC may outsource or instruct the processing of personal data pertaining to a data subject
Consent
Giving data subjects genuine choice and control over how a Personal Information Controller (PIC) uses their data
Hacker (original meaning)
An explorer, a risk taker, someone who was trying to make a system do something it had never done before
Hacker (current meaning)
A person who gains unauthorized access to computers and computer networks
Low-tech techniques for obtaining login names and passwords
Eavesdropping - Looking over the shoulder of a legitimate computer user
Dumpster diving - Looking through garbage for interesting bits of information
Social engineering - Manipulation of a person inside the organization to gain access to confidential information
REPUBLIC ACT NO.8792 provides for the recognition and use of electronic commercial and non-commercial transactions, penalties for unlawful use thereof, and other purposes
Hacking or cracking
Unauthorized access into or interference in a computer system/server or information and communication system; or any access in order to corrupt, alter, steal or destroy using a computer or other similar information and communication devices, without the knowledge and consent of the owner
Types of Malware
Computer viruses
Worms
Trojan horses
Spyware
Virus
A piece of self-replicating code embedded within another program called the host
Worm
A self-contained program that spreads through a computer network by exploiting security holes in the computers connected to the network
The Sasser worm, launched in April 2004, exploited a previously identified security weakness with PCs running the Windows operating system