Chapter 9 DV - Chapter 9 Computers, Privacy, and Security...

Info iconThis preview shows pages 1–14. Sign up to view the full content.

View Full Document Right Arrow Icon
Chapter 9 Computers, Privacy, and Security
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
2 Introduction With the rise of the Internet, personal data is often made available online Security concerns include system failure and securing online transactions and e- mail Privacy concerns include the collection of customer data, spam, and online activity tracking Laws and software tools can protect an individual’s security and privacy
Background image of page 2
3 Security Concerns: System Failure Prolonged malfunction of a computer A head crash occurs when the read/write head of a hard disk touches the platter that stores the data An undervoltage occurs when the electrical supply drops below 120 volts (in the U.S.) An overvoltage occurs when the incoming electrical voltage increases significantly above 120 volts A spike occurs when the increase in power lasts for more than one millisecond
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
4 Security Concerns, 2 There is no central administrator present on the Internet Information transmitted over networks has a greater security risk than internal data On an e-commerce site , intercepted data might include contact and credit card information An unprotected e-mail might contain personal or confidential information
Background image of page 4
5 Privacy Concerns Personal information and online activity may be shared Personal information is stored in numerous databases, ex. Health insurance and medical systems Travel sites Government Some personal information may not be considered private by a user, such as grocery store purchases Other information should be protected, such as medical history or Web surfing activity
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
6 Collecting Customer Data Electronic profiling Companies can sell your personal data to national marketing firms and Internet advertising firms These firms create profiles of you to identify your preferences, as well as buying trends in general Electronic profiles can be sold to other companies
Background image of page 6
7 Collecting Customer Data, 2 Privacy policies sometimes change without the customer’s knowledge Opt out policies should be clear and easy to find Privacy policies should be easy to understand
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
8 Spam Any unsolicited junk e-mail message or newsgroup posting sent to many recipients or newsgroups at once Often a result of companies sharing personal information Used to sell products, promote opportunities, or advertise offensive material
Background image of page 8
Spam, 2 Can contain viruses or spyware Accounts for almost half of all U.S. e-mail traffic May degrade the usefulness of e-mail 9
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
10 Online Activity Tracking Cookie : Small text file that a Web server stores on your computer Contains user data, such as username and preferences Used for several purposes Customizes Web pages Stores username and password so that you do not have to log in each time Tracks which Web pages or ads you have visited Keeps track of items in your online shopping cart Web sites may sell cookie data, or use third- party cookies to record click stream data from any Web page or link
Background image of page 10
11 Yahoo uses a cookie to store information about your customized MyYahoo page
Background image of page 11

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
12 How cookies work
Background image of page 12
13 Types of cookies
Background image of page 13

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 14
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 03/09/2011 for the course BCIS 2610 taught by Professor Sidorova during the Fall '08 term at North Texas.

Page1 / 41

Chapter 9 DV - Chapter 9 Computers, Privacy, and Security...

This preview shows document pages 1 - 14. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online