mao p.cs.102.01

30
Your Interactive Guide to the Digital World Discovering Computers 2012 Zaman University Course: CS Application 102.01 Instructor: Mr. Mustafa Dur Date: 04 th June, 2014 Presenters : Phanara Mao

Upload: l14maop

Post on 30-Nov-2014

98 views

Category:

Devices & Hardware


1 download

DESCRIPTION

Networked Communication

TRANSCRIPT

Page 1: Mao p.cs.102.01

Your Interactive Guide to the Digital World

Discovering Computers 2012

Zaman UniversityCourse: CS Application 102.01

Instructor: Mr. Mustafa DurDate: 04th June, 2014

Presenters :Phanara Mao

Ibrohim Aripov

Page 2: Mao p.cs.102.01

ContentsCommunications and networksEmail (spam/phishing)Net neutralityBreaking trust Internet censorship Freedom of expressionChildren and inappropriate contentInternet addiction

Page 3: Mao p.cs.102.01

Discovering Computers 2012: Chapter 9

CommunicationsComputer communications describes a process in which two or more computers or devices transfer data, instructions, and information one to another; and it consists of

1. Sending devices

2. Communications channels

3. Receiving devices

3Page 460

Page 4: Mao p.cs.102.01

Discovering Computers 2012: Chapter 9

Networks

• A network is a collection of computers and devices connected together via communications devices and transmission media.

4

Page 5: Mao p.cs.102.01

Email (Spam/Phishing)

Spam-is the abuse of electronic messaging system to send unsolicited bulk messaging indiscriminately

Types of spam :• Emil spam• IM Spam• USENET Newsgroup Spam • Web Searching Engine Spam• Blog Spam• Wiki Spam• Mobile Phone Messaging Spam

Page 6: Mao p.cs.102.01

Email (Spam/Phishing)What can I do? Use Multiple email address Personal Business Spam Gmail Never just delete Report as Spam Never open an email that you think is spam Learn spam versus good

Page 7: Mao p.cs.102.01

Phishing

Phishing-is a type of deception designed to steal your Valuable personal data, such as Credit card numbers, passwords, account data, or other information History of Phishing Phreaking + Fishing = phishing -Phreaking = making phone calls for free -fishing = use bait to lure the target

Page 8: Mao p.cs.102.01

PhishingWhat to do?1) Detect and block the phishing Web sites in time2) Enhance the security of the web sites 3) Block the phishing e-mails by Various spam filters 4) Install online anti-phishing software in users computers

Page 9: Mao p.cs.102.01

Net Neutrality• Net neutrality-is the principle that ISP and

governments should treat all data on the Internet equally.

• Net neutrality- is an important component of an open internet.

• Without N.N hard to communicate online, but easier for companies to censor our speech.

Page 10: Mao p.cs.102.01

Net Neutrality• Without Net Neutrality, ISPs like AT&T, Comcast,

Time Warner Cable and Verizon will be able to block content and speech they don’t like.

Page 11: Mao p.cs.102.01

Net Neutrality

• The open Internet rules, adopted in 2010, were designed to prevent ISP.

Page 12: Mao p.cs.102.01

Breaking Trust

• Identity Theft• Definition: when someone uses your personal

information without your permission to commit fraud or other crime.

This can be done in various ways like using someone’s Name. Social security number.Credit card number.Bank account number.Etc.

Page 13: Mao p.cs.102.01

Breaking Trust

Chat Room Predators• Chat room : supports real-time discussions

among many people connected to network

Page 14: Mao p.cs.102.01

Breaking TrustCyber bullying

• What Is Cyber bullying?• Cyber bullying is the use of technology to burn,

scare, confuse, or target another person. • By definition, it occurs among young people.

When an adult is involved, it may meet the definition of cyber-harassment or cyber-stalking, a crime that can have legal consequences and involve jail time.

Page 15: Mao p.cs.102.01

15

Internet CensorshipInternet censorship is the control or suppression

 of what can be accessed,

published, or viewed on the Internet.

Discovering Computers 2012: Chapter 9

Page 16: Mao p.cs.102.01

16

Internet CensorshipNorth Korea. All websites are under government control.

About 4% of the population has Internet access.

Today, U. (2014, February 5). Top 10 Internet-censored countries. USA Today. Retrieved June 2, 2014, from http://www.usatoday.com/story/news/world/2014/02/05/top-ten-internet-censors/5222385/

Page 17: Mao p.cs.102.01

17

Internet Censorship3. China. China has the most rigid censorship program in the world. The government filters searches, block sites and erases "inconvenient" content, rerouting search terms on Taiwan independence or the Tiananmen Square massacre to items favorable to the Communist Party.

Today, U. (2014, February 5). Top 10 Internet-censored countries. USA Today. Retrieved June 2, 2014, from http://www.usatoday.com/story/news/world/2014/02/05/top-ten-internet-censors/5222385/

Page 18: Mao p.cs.102.01

18

Internet Censorship

Discovering Computers 2012: Chapter 9

Government

Dislike governmental criticisms: social media

Keep information secretly

Page 19: Mao p.cs.102.01

19

Internet Censorship

Discovering Computers 2012: Chapter 9

Individuals and organizations may engage in self-censorship for

moral,

religious, or

business reasons,

To conform to societal norms, due to

intimidation, or

out of fear of legal, or

other consequences.

Page 20: Mao p.cs.102.01

20

Freedom of ExpressionUser choice and control, which allow individuals to decide • What to say,• Publish and• Access online;

are essential parts of protecting free expression rights.

Discovering Computers 2012: Chapter 9

Page 21: Mao p.cs.102.01

Discovering Computers 2012: Chapter 9 21

Page 22: Mao p.cs.102.01

22

Children and Inappropriate Contents

Discovering Computers 2012: Chapter 9

Websites that promote self-harm, e.g., sites that encourage suicide, drug use and other anti-social behavior

Page 23: Mao p.cs.102.01

Discovering Computers 2012: Chapter 9 23

Page 24: Mao p.cs.102.01

24

Internet addiction

Young Internet addicts on the rise. (n.d.). Young Internet addicts on the rise. Retrieved June 3, 2014, from http://www.chinadaily.com.cn/china/2010-02/03/content_9417660.htm

Page 25: Mao p.cs.102.01

25

Internet addiction

Young Internet addicts on the rise. (n.d.). Young Internet addicts on the rise. Retrieved June 3, 2014, from http://www.chinadaily.com.cn/china/2010-02/03/content_9417660.htm

Page 26: Mao p.cs.102.01
Page 27: Mao p.cs.102.01

Discovering Computers 2012: Chapter 9 27

Page 28: Mao p.cs.102.01

28

Internet addiction

Center for Democracy & Technology | Keeping the Internet Open, Innovative and Free. (n.d.). Free Expression. Retrieved

June 3, 2014, from https://cdt.org/issue/free-expression/

Page 29: Mao p.cs.102.01

ReferencesCenter for Democracy & Technology | Keeping the Internet Open, Innovative

and Free. (n.d.). Free Expression. Retrieved June 3, 2014, from https://cdt.org/issue/free-expression/

Dur, M. (Director) (2014, March 5). Networked Communication . General Lectures. Lecture conducted from Zaman University, Phnom

Penh.

Shelly, G. B., & Vermaat, M. (2010). Networked Communication . Discovering computers (pp. 458-511). Boston: Nicole Pinard.

Today, U. (2014, February 5). Top 10 Internet-censored countries. USA Today. Retrieved June 2, 2014, from http://www.usatoday.com/story/news/world

/2014/02/05/top-ten-internet-censors/5222385/

Young Internet addicts on the rise. (n.d.). Young Internet addicts on the rise. Retrieved June 3, 2014, from

http://www.chinadaily.com.cn/china/2010-02/03/content_9417660.htm

Page 30: Mao p.cs.102.01

Thank for listening!

It’s about time to have Q & A!