Protecting yourself on the internet

Ace your homework & exams now with Quizwiz!

Copyright

A form of protection provided for "original works of authorship" Includes literary, dramatic, musical, architectural, cartographic, choreographic, pantomimic, pictorial, graphic, sculptural, and audiovisual creations. Does not exten to any idea, procedure, process, system, title, principle, or discovery. Also, names, titles, short phrases, slogans, familiar symbols, mere variations of typographic ornamentation, lettering, coloring, and listings of contents or ingredients.

Creative Commons

A global nonprofit organization that seeks to increase the number of works in the public domain.

Radio Frequency Identification

RFID- Uses radio transmissions (electrostatic coupling) to locate and identify objects. Uses programmable RFID tags or chips, inexpensive technology, does not require line of sight scanning.

Employee-monitoring software best practices

Be honest Set filters Check reports regularly to keep abuses from becoming widespread.

Digital Identity

Digital presence created online by an individual or organization using a digital device. Comprised of a username and password, online accounts, personal data including SSN, birthdate and address, purchasing behavior. Is permanent and hard to change.

E-Commerce

Electronic Commerce or selling productions and services via the web. 3 Categories are B2C, C2C, and B2B.

EFT

Electronic Funds Transfer- uses computers and various technologies in place of checks and other paper transactions to transfer funds.

EDI

Electronice Data Interchange - communication standards for business transactions. Allows businesses to make online transactions with confidence.

Creating a personal brand

5 steps- Check your online presence Create a personal website. Be focused on what you share. How do you want to be perceived> Create connections with the 3 C's: Company, College, Colleauges

Electronic Etiquette

A code of respectful behavior governing the use of electronic communications software and hardware. AKA Netiquette- becoming increasingly important in today's educational and professional landscape. Covers the use of text messages, email, social media, and a variety of digital communications software and hardware.

WhatsApp

A cross platform messaging app that allows you to send and receive messages without having to pay for SMS (text messaging). Uses your internet data plan to exchange messages and can be used with Wi-FI connections.

Acceptable use Policy

AUP- A written document that provides a framework of rules to be followed by users of computers, networks, websites, and computer resources such as printers and scanners. States what a user is and is not allowed to do with these resources.

Internet Acronyms

Abbreviations used specifically in email, chat and text messages as a form of informal correspondence. Don't use in formal messages

RIsk of using Twitter

Accounts contain personal information. most of the communication taking place is viewable by everyone. You can protect tweets. You can file formal complaints if need be. Block-keeps another account from following your tweets. Mute- Removes an account's tweets from your timeline.

Pinterest

An online pinboard that uses visuals/images to post content. All posts include images, which are called PINS (visual bookmarks). When you share another's pin it is called repin. Pinboards are pins grouped together by topic.

Risk of using Facebook

Anything posted is not private. Photo tagging creates a link to your facebook timeline. Cyberstalking an online predators are a problem.

EFT examples

Automated teller machines, direct deposit, debit cards, and electronic checks.

Common Internet Acronyms

BTW- By the way FWIW- For what it's worth LOL- Laughing out loud TBH- To be honest.

Emoticon

Blending of the words emotion and icon- refers to keyboard characters and small images. Convey feelings without the use of words keyboard characters are used as shortcuts emoji are computer generated emoticons

B2B

Business to Business - A restaurant placing an online order for food from an established vendor.

B2C

Business to Consumer - Purchasing a book from Amazon.

Children's Online Privacy Protection Act

COPPA, gives parents control over what information websites can collect from their kids.

Transponder

Can be programmed to contain a variety of information including pet ownership data, product identification, and package content.

Intellectual property

Consists of human knowledge and ideas that the law protects against unauthorized use by others. Consists of patents, trademarks, copyrights and trade secrets.

C2C

Consumer to Consumer - Purchasing an item from another consumer via EBay.

Personal websites

Created by students, professionals, athletes, and anyone wanting to enhance their digital brand image.

Digital Millennium Copyright ACT

DMCA was signed into law by President Clinton in 1998. The Act implements two world intellectual Property Organization treaties. Deals with copyright laws on digital material.

Employee-Monitoring Software

Designed to track and record the use of network and hardware resources in the workplace by employees. Used to track email, monitor network and intern usages and set web filters.

LinkedIn Practices

Edit or remove inaccurate endorsements. Use to apply for jobs Respond to job postings Resume building tool Use keywords in your profile.

Federal Trade Commission

FTC- The main government agency responsible for internet privacy protection.

BSA - The Software Alliance

Formerly the Business Software Alliance - leading advocate against software piracy. Members include Apple, Adobe, Microsoft.

Paypal

Free app that lets you send money and accept payments without revealing your personal financial info. An intermediary between your financial institution and the seller, provides buyer protection, No fee for making purchase.

LinkedIn

Free social network site for business professionals. Exchange contact information, knowledge, and ideas for employment opportunities. An integrated component of creating your professional brand identity. Post should be kept professional.

RFID works

Has 3 parts, antenna (transmits the signal via radio waves), Transceiver (both sends and receives information), Transponder (comes in the form of a RFID tag (chip)).

Internet Piracy

Illegally copying, distributing, modifying or selling software.

Social Media

Internet-based software applications and interfaces that are designed to allow individuals, businesses, and other entities to interact with one another with images, videos and messages. Media sharing is interactive and immediate.

Facebook

Largest social networking site. Share web content, images, videos, and commentary. Pages are for businesses, brands and organizations to share their stories and connect with people.

RFID range

Low-Frequency 6 feet, High-Frequency 90 feet, Ultra high-frequency - over 300 feet.

Protect against RFID data theft

Many important items such as passports and credit cards contain RFIDS. RFID protection sleeves keep tags from being scanned.

U.S. Internet Privacy Laws

Many laws attempt to protect citizens and businesses from Internet Privacy attacks.

MMORPG or MMO

Massive Multiplayer Online Role Playing Games.

Viber

Messaging app that emphasizes internet phone calling. Allows you to receive calls and messages without having to pay cellular fees.

Ergonomic workstations

Monitor position should be slightly lower than eye level. Keyboard should be positioned to keep your wrists as straight as possible. Arms should be positioned at a 45 degree angle. Chair should set your back position to almost vertical.

Debit card risks

No guarantee that your money will be replaced. Loss of access to money in your account for up to 10 days. You may ow 5.00 - 500.00 (depending on your bank and reporting time)

Open Educational Resources

OER, free openly licensed learning resources available online. This includes textbooks, assignments, educational games, and digital media. Sites offering OER resources include The Hewlett Foundation and Lumen Learning

Instagram

Photo sharing app- links easily to other social networking apps. Can share on flickr, facebook and twitter,. has filters to edit photos. Calls itself a fun and quirky way to share your life with friends through a series of pictures.

Snapchat

Picture and video sharing application that uses "Snaps". Viewed fur up to 10 seconds. Can be saved in the photo gallery and shared with others.

Emoji

Pictures or graphics used in text and email messages. Emoji are computer generated emoticons

BitTorrent

Popular protocol for sharing large files such as movies, tv shows, music and software. Has no central server - uses a peer-to-peer structure. Divides large files into smaller ones called torrents.

Social Networking

Practice of using social media to expand the number of business and social contacts people have. The first SM site was sixdegrees.com (1997)

Personal Branding

Process used by individuals to make them stand out from others by identifying and expressing their unique traits and values (Both professional and personal). A combination of how you present your unique traits via various communications means.

Risk of using Instagram

Profile section lists name, birthday, gender and phone number, can track your location. If you do not adjust your privacy settings anyone can see your photos and follow you.

Email Composition

Properly formatted professional email messages should have 5 main components: Subject Salutation Body Complimentary close Signature line

Pros and cons of online dating

Pros- wide variety of people. Great for shy people. Initiate contact without having to meet in person. Cons- profiles and photos are easily faked. Can lie about themselves. Heavy emphasis on physical attractiveness.

Intellectual property laws

Protect against unauthorized software use, sale, or distribution of software, music, movies, video games, and many other digital products.

Computer Games

Referred to PC Games, some are designed to be played only on a computer but most are available on a variety of gaming platforms. Most are online, multiplayer games. Players interact with objects displayed on a screen for entertainment purposes using a computer.

Gramm-Leach_billey Act

Requires financial institutions- companies that offer consumers financial products or services like loans, investments or insurance, to explain their information sharing practices to their customers and to safeguard sensitive data.

Red Flags Rule

Requires many businesses and organizations to implement a written identity theft prevention program designed to detect the warning signs or red flags of identity theft in their day-to-day operations

Using social Media to create brand identity

Respond quickly to mentions of your name on social media sites. Use the same name, profile, pictures and imagery across all social media platforms. Post regularly to your social media sites. Consider joining chat and internet groups that reflect your personal and professional interests.

Software Theft/Piracy

Stealing software, Illegally copying a program, Intentionally erasing a program not belonging to you, illegally activating/registering a program. As long as the program has been erased you are allowed to sell your copy.

Personal branding techniques

Social Media Web presence Interpersonal Skills

Online gaming risks

Technological risks- viruses, worms and malware. Compromised game servers. Insecure game coding. Social Risks- Identity theft, Virtual mugging and protection schemes, computer game addicition. Cyber prostitution.

Internet privacy

The right of personal privacy concerning the storing, distributing and displaying information concerning oneself via the internet. (How data is used, who has access to the data, techniques and technologies used to protect sensitive and private data, communications and preferences).

Ergonomics

The study of human interaction with the objects they use. Concerned with fitting the task to the user rather than fitting the user to the task.

Downloading

Transferring file from the internet to your digital device

Online Dating

Uses the internet as the conduit for creating dialog that leads to developing personal romantic relationships. Can be free or fee. You provide personal information such as age, gender, and general location. Use VOIP, IM, Chat . Match, Zoosk, and eHarmony.

International Privacy Laws

Vary greatly- Nations do not agree on standardized internet privacy laws. The EU- Data Protection Directive- Personal data can only be gathered legally under strict conditions.

DMCA titles that directly Impact digital issues are

WIPO, Online Copyright Infringment Liability Limitation, Computer Maintenance Competition Assurance, And Miscellaneous provisions for digital copyrights

Waze

Worlds largest community based traffic and navigation app. Allows you to join other drivers in your area who share real-time traffic and road info. People in community update this in real-time: such as traffic accidents, weather and police updates. Type in destination address and drive with phone open.

Email Etiquette

Write messages carefully Use proper spelling and grammar Avoid the use of all uppercase letters Brevity is important Avoid ambiguity State the purpose of the message in the subject line In professional messages avoid the use of emoticons or acronyms. Don't use texting style.

Downloading Risks

You can give outsiders access to your computer. Files can contain malware. Pirated software is a crime. Many corrupted files and viruses are hidden in free downloads.

Ethical issues with Social Media

Your actions are recorded. Data benefits marketers, businesses and any entity that tracks online behavior. Consumers have little control over what data is collected or used.

Twitter

an information network made up of 140-character messages called tweets which can be made up of text, images and video. # categorize tweets and help them show more easily in twitter search. No more than 2 hashtags per tweet.

Branding

term used in business marketing, practice of creating a name, symbol or design, such as a logo, that differentiates one product or service from other products or services. Gives businesses a competitive edge.


Related study sets

MKT 3305 Baylor University Mrs. David

View Set

QUIZ- TRAVEL, FOOD AND NUTRITION

View Set

Army Health System Support to Detainee Operations ATP 4-02.46

View Set

Graph and Picture Questions Biology 2 Final

View Set

bio 5 cha p t e r r r r r r r rr r. rrr

View Set