Personal Privacy Rights & Abuses of
the Internet
Andrew Whalin, Robby Deaver, Manvinder Chohan, Brandon Lott, Erika Wallfred, Shawn McGregor
• Many experienced hoaxes continue to resurface the net– taking advantage of new users.
• Usually take the general form of proportion – to be a warning about – some dangerous email message, – piece of software, etc.
SPAM
• Spamming is the abuse of electronic messaging systems to indiscriminately send unsolicited bulk messages.
- E-mail spam- Instant messaging spam- Web search engine spam- Spam in blogs- Mobile phone messaging spam
Viruses
• A computer virus is a program that is hidden within the code of another program.– Viruses can be destructive or benign. – The virus is set up to replicate itself
and spread to other programs on a person’s computer.
Spoofing
• E-mail sent from someone pretending to be someone else is known as spoofing. – Spoofing is a technique commonly used for
spam e-mail and phishing to hide the origin of an e-mail message.
– It is often associated with website spoofing which mimics an actual, well-known website but are run by another party either with fraudulent intentions or as a means of criticism of the organization's activities.
Identity Theft
• Is a term used to refer to a fraud that involves stealing money or getting other benefits by pretending to be someone else. – The term is relatively new and actually
is a misnomer.– Since it’s not inherently possible to
steal an identity, only to use it.
– The stolen identity victim is held responsible for the perpetrator’s actions.
– In many countries, it is a crime to use another person’s identity for personal gain.
– It is estimated 40 million credit card numbers have been compromised by well coordinated attacks.
– Some of the methods include wireless surveillance technology
– And computer break-ins owned by retailers.
• Two key privacy principles are implicated by the incidents: – Securing of personal information held
by third parties– And not discarding information once
payment is received and the benefit or service is provided.
• Now you have the basic understanding of the risks and dangers on the internet today.
• The internet does, however, create new possibilities for organizations and individuals to escape the strictures of geographically-based legal jurisdictions.