Friday 1 June 2007

Week Twelve

Social and Ethical Issues: Protecting yourself and your PC on the World Wide Web

Lecture Notes


For this lecture Justine was sick so we had a different lecturer. This was interesting I thought as we were getting the same information just from a different persons angle. She involved us (students) in the lecture more and asked us questions and for our opinions. Whilst doing this we talked about the problems of the Internet and why they are problems.
Intellectual Property are things that come from your mind, and to protect your property, your work, you can put a COPYRIGHT © on your work.
Whilst discussing the problems with security on the Internet we where talking about emails, and I learnt that they don't go straight from one computer to another. It goes through a router first. I learnt that an Avatar is a virtual representation of ones self. And that security is a huge issue on the Internet, especially when it comes to emails.


Tutorial Tasks

Task One
Australian Copyright Council
www.copyright.org.au
The information sheets that I think will be relevant to me in my Undergraduate course and University.
1. Education Institutions
2. Music
3. Quotes and Extracts: copyright obligations
4. An introduction to copyright in Australia




Task Two
US Department of Justice's Intellectual Property
http://www.usdoj.gov/criminal/cybercrime/ipcases.html
U.S vs Sankas
Sankus was in the market for illegally distributing pirated software, games, and movies over the Internet, through his online site of DrinkOrDie. His online name was eriFlleH (hellfire backwards). He, and his fellow friends in his online gang where caught and Sankas plead guilty, and was sentenced to 46 months (3 years 10 months in gaol).




Week Twelve Readings
1. EFF's Top 12 Ways to Protect Your Online Privacy http://www.eff.org/Privacy/eff_privacy_top_12.html
This site is informing the reader about ways to protect themselves on the Internet. It offers different examples and strategies for doing this and ways in which you could be giving out information that is not needed. The site has twelve steps you can follow to protect yourself, these being:
1. Not to reveal to much of your personal information
2. Use cookie management software on your computer, and to make sure it is turned on
3. Have an email address that is appropriate to you, for example don't have an email address that is hot4you@hotmail.com
4. Don't reveal information about yourself to new people or new friends or have met on the Internet, they could be anybody
5. Keep your personal emails to your home computer and your work emails to your work computer, as your work email may be monitored
6. Be wary of sites that say they give rewards for you telling them your personal details
7. Ignore, Delete and definatly don't reply to spam emails and messages
8. Constantly be conscious of sites you are on and your web security levels
9. Be conscious of home computer security
10. Always read the privacy policy and agreements in regards to everything on the Internet and emails
11. Remember that you have the power, as only you can give out your personal information and,
12. Choose only passwords you know. Put codes in them if you have to. Having your password to your bank accounts on the Internet as Password or your name, isn't as safe as having a password like your mothers birthday or the date you moved house.



2. Ethics in Computing
http://ethics.csc.ncsu.edu/social/workplace/monitoring/
This page is just eh connecting site to other pages on similar topics. On this particular page it talks about different types of ways you can monitor your computer, personal information and Internet, Privacy Issues and Suggested ways to protect yourself. I found it useful as it covers all areas of ethics with computing on the Internet everyone should know.




3. A History of Computer Viruses, and The Open Architecture of the Internet
http://myecu.ecu.edu.au/webapps/portal/frameset.jsp?tab=courses&url=%2Fbin%2Fcommon%2Fcourse.pl%3Fcourse_id%3D_38602_1
This PDF file is all about computer viruses and where they started from. It discusses a brief history of viruses and how they got the name virus. It goes on to talk about how they not meant to initially destroy computers, but how they were to just get into computers and life off it as such. I found this page to be very interesting and I read the whole page without thinking when it was going to end.



4. Brown and Michaels Intellectual Property Overview
http://www.bpmlegal.com/overview.html
This web page informs of ways to help people protect their companies and work on the Internet. It covers all aspects, from Copyright, to Trade Mark and which they have called a 'trade secret'. I think this would be excellent if you own a business and want to set up your own web pages to help your company. I will definalty be referring this page to my Dad, who owns businesses and has web pages for them also.




5. Pro-Music: Music Copyright and the Internet
http://www.pro-music.org/copyright/faq.htm
This web page is all about music on the Internet and all the different copyright laws and are associated with it. The site lists a total of fourteen questions that you can click on and is linked to the answers. It answers all fourteen of these questions rather basically, but gives enough information that if a teenager went onto the site and was enquiring about the music they download, it would answer all their questions. My sister downloads a lot of music to out onto her iPod so I will defianlty be telling her and showing her this site.



6. Tinker-tech.com
http://www.tinkertech.net/tutor/virus.htm
This web page is informing the reader about attachments on emails and viruses. It has pictures and shows the reader the picture they will get in their email if it has an attachment and then goes on to explain whether it is safe or not to open the attachment with the specific picture it has. I think this site is a wonderful idea and should be more commonly known. I showed it to my Mum and she said that she had learnt something and to only open file attachments if you know what they are.


No comments: