Protecting Yourself on the Internet

¡Supera tus tareas y exámenes ahora con Quizwiz!

PayPal

A free app that allows you to pay, send money, and accept payments online without revealing your financial details No fee for making purchases using PayPal An intermediary between your financial institution and the seller PayPal also provides buyer protection.

Monitoring software-best practices

Be honest with the people in your organization about the presence of monitoring software Use Internet filters Check reports regularly to keep misuse from becoming widespread

E-commerce

Electronic commerce - selling products and services via the Web 3 E-commerce categories: ---B2C - between businesses and consumers ---C2C - between consumers and consumers ---B2B - between businesses

Proper email composition

4 components: Salutation: ---Dear (formal) ---Hello or Hi (informal) Body - clear and concise Complimentary close: ---Sincerely ---All the best ---Cordially ---Thank you Signature line

BitTorrent

A popular protocol, or procedure for sharing movies, TV shows, music and software Has no central servers - uses a peer-to-peer structure Each downloading user becomes a source for another user who wants the same file Breaks large files into smaller fragments called torrents Movie streaming and torrent sites account for more than half of all Internet traffic

Internet acronyms

Abbreviations used specifically in email, chat, and text messages as a form of informal correspondence Don't use in formal messages. Common Internet acronyms: ---BTW - By the way ---FWIW - For what it's worth ---LOL - Laughing out loud ---TBH - To be honest

How RFID works

An RFID systems consists of three components: ---Antenna - transmits the signal via radio waves ---Transceiver - both sends and receives information ---Transponder - comes in the form of an RFID tag (chip) Transponder can be programmed to contain a variety of information

Pinterest

An online "pinboard" that uses images to post content Popular for recipes, crafts and DIY All posts include images The image is known as a "Pin"- a visual bookmark. Clicking a Pin brings you to the site/source that posted RePin - sharing someone else's pin Pinboard - Pins grouped together by topic

Social media

Apps designed to allow individuals, businesses, and other entities to interact with one another Integrates a variety of multimedia including images, videos, and messages Made possible by Web 2.0

Electronic etiquette

Code of respectful behavior governing the use of electronic communications software and hardware Electronic etiquette covers the use of text messages, email, social media, and digital communications software and hardware. Known as netiquette

Electronic Data Interchange (EDI)

Communication standards for business transactions Allows for the exchange of data for making purchase orders and invoices 2 Nearly all businesses that participate in e-commerce use EDI Used internationally as well as in the U.S.

Internet downloading risks

Consider the following when downloading from the Internet: You may unknowingly give outsiders access to your computer Files downloaded from unknown sites and file sharing sites often contain malware Downloading pirated software is a crime

Your digital identity

Created and stored in many locations Should be considered permanent Main concerns are privacy and security Attributes include: -Username and password -Browsing history -Online accounts /activity -Personal data -Purchasing behavior

Employee monitoring software

Designed to track and record the use of computer resources in the workplace by employees Tracks email Monitors network and Internet usage Set Web filters Use of employee-monitoring software should be stated in the AUP of the organization

Facebook - things to consider

Don't consider anything posted on Facebook private Any shared items can easily be sent to others Photo tagging creates links to your Facebook Timeline and Profile Cyberstalking and online predators are real problems

Emoticons and Emojis

Emoticon - blending the words emotion and icon Represent facial expressions <:o) Convey feelings without the use of words Emoji - computer generated emoticons Many keyboard characters are used as shortcuts that insert an emoji

BSA - The Software Alliance

Formerly the Business Software Alliance - leading advocate against software piracy Members include Apple, Adobe, Microsoft, etc. Headquartered in Washington, DC - operates in more than 60 countries If you suspect you have received pirated software, report the incident to the BSA, www.reporting.bsa.org

Open Educational Resources (OER)

Free openly licensed learning resources - available online OER resources include textbooks, assignments, educational games, and digital media. Creative Commons - a global nonprofit organization ---Promotes OER ---Facilitates OER development

LinkedIn

Free social network site for business professionals Exchange contact information, knowledge, and ideas for employment opportunities An integrated component of creating your professional brand identity Posts should be kept professional

Risks of using a debit card online

If there's fraudulent use of your card: --No guarantee that your money will ever be replaced ---Loss of access to money in your account for up to 10 days ---Financial responsibility of $50-$500, depending on your bank and time of reporting the loss

Facebook

Largest social networking site for sharing web content, images, videos, and commentary Profile - collection of the photos, stories and experiences about you and your experiences Friend Request - connects you with other FB accounts Page - FB site for business or organization Like - Makes you a "fan" of a page

Instagram

Photo sharing app - links easily to other social networking sites Share photos on Flickr, Facebook, and Twitter Includes filters that let you easily edit your photos You can specify photo locations If you specify a location with your photo, you can opt to have Instagram check you in on Foursquare

Snapchat

Picture and video sharing application Snaps - pictures or video messages Snaps can be viewed for up to 10 seconds, depending on what the user chooses, and then disappear Be aware that Snaps are not temporary and can be saved and forwarded to others!

Internet Privacy

Privacy concerning the storing, distributing and displaying of information concerning oneself via the Internet A variety of considerations including: -How data is used -Who has access to data -Techniques and technologies used to protect sensitive and private data and communications

Con of online dating

Profiles/photos can be faked or enhanced Are they really who they say they are? Sites put an emphasis on physical attractiveness

Computer games

Referred to as PC games Some games are designed to be played only on a computer, some are also played on game consoles Most are online, multiplayer games

Software theft

Stealing software programs Illegally copying a program (piracy) Intentionally erasing a program not belonging to you Illegally activating/registering a program

Twitter

Socialmedia/information network using 140-character messages, called Tweets Tweets can be made up of text, images, and video Hashtags (#) categorize Tweets. Use no more than two hashtags per Tweet To read Tweets - find and follow friends, celebrities, and other Twitter accounts Trending -Hashtags with the most followers

Electronic Funds Transfer (EFT)

Technical term for electronic or online banking EFT uses computers and various technologies in place of checks and other paper transactions to transfer funds Governed by the federal Electronic Fund Transfer Act (EFT Act)

Risks of online computer gaming

Technological risks: ---Viruses, worms, and malware ---Insecure or compromised game servers ---Insecure game coding Social Risks: ---Identity theft ---Virtual mugging and protection schemes ---Computer/game addiction

Instagram - things to consider

The Profile section on Instagram lists your name, birthday, gender, and phone number All information begins as viewable by the public unless you change the settings to private Instagram can track your location If you don't want to be tracked turn off geo-tagging in the settings under Location Services

Ergonomics

The study of human interaction with the objects they use In the computer world refers to the interaction humans have with computer hardware devices and computers Focuses on fitting the task to the user rather than fitting the user to the task

Best practices when using social media

To create a personal brand: ---Respond quickly to mentions of your name on social media sites ---Pay attention to detail ---Use consistent imagery and names across all social media platforms. ---Post regularly to your social media sites ---Join Internet groups that reflect your interests ---A general guideline is to have 4 consistent shares of each type of activity

Radio Frequency Identification (RFID)

Uses radio transmissions, electrostatic coupling, to locate and identify objects Uses programmable RFID tags Relatively inexpensive technology Unlike barcodes or UPCs, RFIDs don't require line of sight scanning. Low-frequency - 6' range High-frequency - 90' range

Social networking

Using social media to expand the number of business and social contacts Based on the six degrees of separation - anyone in the world is just 6 introductions away! The first social media site to allow users to create profiles, organize groups, and invite friends was called SixDegrees.com (1997)

Ethical concerns with social media

Whenever you search the Web, post on social media, or make an online purchase your actions are recorded Your online activities leave "footprints" Data is collected by nearly all online companies including Google, Apple, Facebook, Instagram and Twitter The data that is collected is beneficial to marketers and retailers who study your online behavior

Email etiquette

Write your messages carefully Use proper spelling and grammar Don't use all uppercase letters Brevity is important Avoid ambiguity State the purpose of the message in the subject line Don't use emoticons in professional correspondence

Acceptable use policy (AUP)

Written statement of rules for users of company computers, networks, websites, and computer resources Should clearly state: ---What a user is allowed to do with these resources ---General etiquette to follow when using shared resources

Personal websites

Created by students, professionals, athletes, and anyone wanting to enhance their digital brand image A critical element in building an awesome personal brand Created to showcase your skills and differentiate yourself from the competition Include information about schools attended, jobs, and extracurricular activities

Branding

Creating a name, symbol/design (logo) that differentiates one product/service/person from others Allows consumers to identify and distinguish Derived from: ---What they are ---What they want to be ---What people perceive them to

Intellectual property

Human knowledge and ideas that the law protects against unauthorized use 4 categories: -Patents -Trademarks -Copyrights -Trade secrets

Software piracy

Illegally copying, distributing, modifying or selling software Studies show consumers spend $25 billion and waste 1.2 billion hours per year as a result of downloading pirated software Companies spend nearly $500 billion on issues relating to pirated software

Protecting against RFID theft

Many important items such as passports and credit cards have RFID chips RFID protection sleeves keep tags from being scanned If your credit/debit card has a RFID chip but the seller doesn't have a scanner, the seller is liable in the case of fraud

Internet privacy laws

Many laws attempt to protect against Internet privacy attacks U.S. Internet privacy laws/rules include: -The Red Flags Rule -The Children's Online Privacy --Protection Act (COPPA) -The Gramm-Leach-Bliley Act The Federal Trade Commission (FTC) - agency mainly responsible for Internet privacy protection

LinkedIn - Best practices

Many techniques can maximize LinkedIn benefits Edit or remove inaccurate endorsements Use LinkedIn to apply for jobs. Respond quickly to job postings Use the resume building tool to create a professional resume Use keywords in your profile

MMORPG or MMO

Massive Multiplayer Online Role Playing Games Players create online identities and use them to participate in virtual games Capable of supporting large numbers of players simultaneously in the same virtual world Some games are free, others require a monthly subscription fee

WhatsApp

Messaging app Allows you to send and receive messages without having to pay for SMS (text messaging) Uses the Internet to exchange calls & messages Users can create groups, and send unlimited images, video and audio messages as long as they're online

Viber

Messaging app - similar to WhatsApp, but focuses on Internet phone calls Allows you to send and receive calls & messages without having to pay cell phone fees Uses the Internet to exchange calls & messages Users can create groups, and send unlimited images, video and audio messages as long as they're online

Pros of online dating

Online dating allows for access to a wide variety of people Can be great for shy people You can initiate contact without actually having to meet in person

Copyright

Protection provided for original works of authorship Copyright - exclusive rights granted by law to copyright owners for protection of published works Does not extend to any idea, procedure, or process - only the manner in which it's expressed

The Digital Millennium Copyright Act (DMCA)

Protects authorship of digital material Four parts impact digital copyright: --Title 1 - WIPO Copyright and Phonograms Treaties and Implementation Act --Title 2 - Online Copyright Infringement Liability Limitation --Title 3 - Computer Maintenance Competition Assurance --Title 4 - Digital copyrights

Online dating services

Provide matchmaking services for free or for a fee Members provide personal information such as age, gender, and location before they can search for prospective dates Many sites integrate VoIP, IM, chat, and a variety of multimedia Popular sites include Match, Zoosk, and eHarmony

Downloading

Transferring a file from the Internet to your digital device Commonly downloaded files include: software programs/apps, updates, music, images, documents, and video files Also refers to copying files from one digital device to another, such as putting images from your phone onto a tablet computer

Twitter - things to consider

Twitter accounts contain personal information You can protect Tweets so that manual approval is required to view them Block ---Keeps another account from following your Tweets Mute ---Removes an account's Tweets from your timeline

International Internet privacy laws

Vary greatly- nations don't agree on standardized Internet privacy laws Use discretion on the Internet when traveling or living abroad Some protections exist. The European Union (EU) -Data Protection Directive states: -Personal data can only be gathered legally under strict conditions.


Conjuntos de estudio relacionados

Ch.46 Diabetes Mellitus & Hypoglycemia

View Set

Spanish 2, Seleccionar: Fotonovela, Lesson 10

View Set

CH.1 Analytics in Accounting and Business

View Set

Ch.5 Cost Approach - Cost Estimating

View Set

Chapter 8: Cardiorespiratory Responses to Acute Exercise

View Set

Chapter 4 Igneous Rocks: Solids From Melts

View Set