SlideShare ist ein Scribd-Unternehmen logo
1 von 30
Your Interactive Guide
to the Digital World
Discovering
Computers 2012
Zaman University
Course: CS Application 102.01
Instructor: Mr. Mustafa Dur
Date: 04th June, 2014
Presenters :
Phanara Mao
Ibrohim Aripov
Contents
Communications and networks
Email (spam/phishing)
Net neutrality
Breaking trust
Internet censorship
Freedom of expression
Children and inappropriate content
Internet addiction
CommunicationsComputer communications describes a
process in which two or more computers or
devices transfer data, instructions, and
information one to another; and it consists of
1. Sending devices
2. Communications channels
3. Receiving devices
Discovering Computers 2012: Chapter 9 3Page 460
Networks
• A network is a collection of computers and devices connected
together via communications devices and transmission media.
Discovering Computers 2012: Chapter 9 4
Email (Spam/Phishing)
Spam-is the abuse of electronic messaging system
to send unsolicited bulk messaging indiscriminately
Types of spam :
• Emil spam
• IM Spam
• USENET Newsgroup Spam
• Web Searching Engine Spam
• Blog Spam
• Wiki Spam
• Mobile Phone Messaging Spam
Email (Spam/Phishing)
What can I do?
 Use Multiple email address
 Personal
 Business
 Spam
 Gmail
 Never just delete
 Report as Spam
 Never open an email that you think is spam
 Learn spam versus good
Phishing
Phishing-is a type of deception designed to steal your Valuable personal data,
such as Credit card numbers, passwords, account data, or other information
History of Phishing
Phreaking + Fishing = phishing
-Phreaking = making phone calls for free
-fishing = use bait to lure the target
Phishing
What to do?
1) Detect and block the phishing Web sites in time
2) Enhance the security of the web sites
3) Block the phishing e-mails by Various spam filters
4) Install online anti-phishing software in users computers
Net Neutrality
• Net neutrality-is the principle that ISP and
governments should treat all data on the Internet
equally.
• Net neutrality- is an important component of an
open internet.
• Without N.N hard to communicate online, but easier
for companies to censor our speech.
Net Neutrality
• Without Net Neutrality, ISPs like AT&T, Comcast,
Time Warner Cable and Verizon will be able to block
content and speech they don’t like.
Net Neutrality
• The open Internet rules, adopted in 2010,
were designed to prevent ISP.
Breaking Trust
• Identity Theft
• Definition: when someone uses your personal
information without your permission to commit
fraud or other crime.
This can be done in various ways like using someone’s
 Name.
Social security number.
Credit card number.
Bank account number.
Etc.
Breaking Trust
Chat Room Predators
• Chat room : supports real-time discussions
among many people connected to network
Breaking Trust
Cyber bullying
• What Is Cyber bullying?
• Cyber bullying is the use of technology to burn,
scare, confuse, or target another person.
• By definition, it occurs among young people.
When an adult is involved, it may meet the
definition of cyber-harassment or cyber-
stalking, a crime that can have legal
consequences and involve jail time.
Internet Censorship
Internet censorship is the control or
suppression of what can be accessed,
published, or viewed on the Internet.
Discovering Computers 2012: Chapter 9 15
Internet Censorship
North Korea. All websites are under government control.
About 4% of the population has Internet access.
Today, U. (2014, February 5). Top 10 Internet-censored countries. USA Today. Retrieved June 2, 2014, from
http://www.usatoday.com/story/news/world/2014/02/05/top-ten-internet-censors/5222385/ 16
Internet Censorship
3. China. China has the most
rigid censorship program in
the world. The government
filters searches, block sites
and erases "inconvenient"
content, rerouting search
terms on Taiwan
independence or the
Tiananmen Square massacre
to items favorable to the
Communist Party.
Today, U. (2014, February 5). Top 10 Internet-censored countries. USA Today. Retrieved June 2, 2014, from
http://www.usatoday.com/story/news/world/2014/02/05/top-ten-internet-censors/5222385/ 17
Internet Censorship
Discovering Computers 2012: Chapter 9 18
Government
 Dislike governmental criticisms: social media
 Keep information secretly
Internet Censorship
Discovering Computers 2012: Chapter 9 19
Individuals and organizations may engage in self-censorship for
 moral,
 religious, or
 business reasons,
To conform to societal norms, due to
 intimidation, or
 out of fear of legal, or
 other consequences.
Freedom of Expression
User choice and control, which allow individuals
to decide
• What to say,
• Publish and
• Access online;
are essential parts of protecting free expression
rights.
Discovering Computers 2012: Chapter 9 20
Discovering Computers 2012: Chapter 9 21
Children and Inappropriate Contents
Discovering Computers 2012: Chapter 9 22
Websites that promote self-harm, e.g.,
 sites that encourage suicide,
 drug use and
 other anti-social behavior
Discovering Computers 2012: Chapter 9 23
Internet addiction
24Young Internet addicts on the rise. (n.d.). Young Internet addicts on the rise. Retrieved June 3, 2014, from
http://www.chinadaily.com.cn/china/2010-02/03/content_9417660.htm
Internet addiction
Young Internet addicts on the rise. (n.d.). Young Internet addicts on the rise. Retrieved June 3, 2014, from
http://www.chinadaily.com.cn/china/2010-02/03/content_9417660.htm
25
Discovering Computers 2012: Chapter 9 27
Internet addiction
Center for Democracy & Technology | Keeping the Internet Open, Innovative and Free. (n.d.). Free Expression. Retrieved
June 3, 2014, from https://cdt.org/issue/free-expression/
28
References
Center for Democracy & Technology | Keeping the Internet Open, Innovative
and Free. (n.d.). Free Expression. Retrieved June 3, 2014, from
https://cdt.org/issue/free-expression/
Dur, M. (Director) (2014, March 5). Networked Communication . General
Lectures. Lecture conducted from Zaman University, Phnom Penh.
Shelly, G. B., & Vermaat, M. (2010). Networked Communication . Discovering
computers (pp. 458-511). Boston: Nicole Pinard.
Today, U. (2014, February 5). Top 10 Internet-censored countries. USA Today.
Retrieved June 2, 2014, from http://www.usatoday.com/story/news/world
/2014/02/05/top-ten-internet-censors/5222385/
Young Internet addicts on the rise. (n.d.). Young Internet addicts on the rise.
Retrieved June 3, 2014, from
http://www.chinadaily.com.cn/china/2010-02/03/content_9417660.htm
Thank for listening!
It’s about time to have Q & A!

Weitere ähnliche Inhalte

Was ist angesagt?

Disadvantage of using internet
Disadvantage of using internetDisadvantage of using internet
Disadvantage of using internet
Muhammad Nazarith
 
Advantages and disadvantages of internet.pdf
Advantages and disadvantages of internet.pdfAdvantages and disadvantages of internet.pdf
Advantages and disadvantages of internet.pdf
night seem
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online security
Paul Berryman
 
Communication through internet.ppt
Communication through internet.pptCommunication through internet.ppt
Communication through internet.ppt
gasumova
 
Internet ethics and rules
Internet ethics and rulesInternet ethics and rules
Internet ethics and rules
Mazni Salleh
 

Was ist angesagt? (20)

The disadvantages of ict
The disadvantages of ictThe disadvantages of ict
The disadvantages of ict
 
Internet advantages and disadvantages
Internet advantages and disadvantagesInternet advantages and disadvantages
Internet advantages and disadvantages
 
Social Networking (Ethics in Information Technology)
Social Networking (Ethics in Information Technology)Social Networking (Ethics in Information Technology)
Social Networking (Ethics in Information Technology)
 
Disadvantage of using internet
Disadvantage of using internetDisadvantage of using internet
Disadvantage of using internet
 
Advantages and disadvantages of internet.pdf
Advantages and disadvantages of internet.pdfAdvantages and disadvantages of internet.pdf
Advantages and disadvantages of internet.pdf
 
Advantages and disadvantages of the internet
Advantages and disadvantages of the internetAdvantages and disadvantages of the internet
Advantages and disadvantages of the internet
 
Internet
InternetInternet
Internet
 
Online ethics
Online ethicsOnline ethics
Online ethics
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online security
 
Communication through internet.ppt
Communication through internet.pptCommunication through internet.ppt
Communication through internet.ppt
 
Ethics On The Internet
Ethics On The InternetEthics On The Internet
Ethics On The Internet
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Internet ethics and rules
Internet ethics and rulesInternet ethics and rules
Internet ethics and rules
 
Advantages and disantvantages of internet
Advantages and disantvantages of internetAdvantages and disantvantages of internet
Advantages and disantvantages of internet
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
 
Advantage and disadvantage of the internet
Advantage and disadvantage of the internetAdvantage and disadvantage of the internet
Advantage and disadvantage of the internet
 
What is internet By M.SUDIR Phil (LIS)
What is internet By M.SUDIR Phil (LIS)What is internet By M.SUDIR Phil (LIS)
What is internet By M.SUDIR Phil (LIS)
 
Cyber Ethics
Cyber EthicsCyber Ethics
Cyber Ethics
 
Internet Presentation - Muhammad Tahir Habib
Internet Presentation - Muhammad Tahir HabibInternet Presentation - Muhammad Tahir Habib
Internet Presentation - Muhammad Tahir Habib
 
Advantages n disadvantages of intenet by harkirat
Advantages n disadvantages of intenet by harkiratAdvantages n disadvantages of intenet by harkirat
Advantages n disadvantages of intenet by harkirat
 

Ähnlich wie Mao p.cs.102.01

Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptx
MdRuga
 
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
Commonwealth Telecommunications Organisation
 
Reliability_Undesirability
Reliability_UndesirabilityReliability_Undesirability
Reliability_Undesirability
Mohamed Omar
 
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsuswbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
xenhalo561
 
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdfW3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
ExtremelyDarkness2
 

Ähnlich wie Mao p.cs.102.01 (20)

Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptx
 
Cyber Awareness.pptx
Cyber Awareness.pptxCyber Awareness.pptx
Cyber Awareness.pptx
 
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
 
ethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdf
 
Reliability_Undesirability
Reliability_UndesirabilityReliability_Undesirability
Reliability_Undesirability
 
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsuswbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Online Safety, Security, Ethics and Netiquette.pptx
Online Safety, Security, Ethics  and Netiquette.pptxOnline Safety, Security, Ethics  and Netiquette.pptx
Online Safety, Security, Ethics and Netiquette.pptx
 
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdfW3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things
 
INTERNET SAFER DAY-2021.pptx
INTERNET SAFER DAY-2021.pptxINTERNET SAFER DAY-2021.pptx
INTERNET SAFER DAY-2021.pptx
 
Introduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptxIntroduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptx
 
Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptx
 
cyber safety_grade11cse_afsheen,vishal.pptx
cyber safety_grade11cse_afsheen,vishal.pptxcyber safety_grade11cse_afsheen,vishal.pptx
cyber safety_grade11cse_afsheen,vishal.pptx
 
Facebook
FacebookFacebook
Facebook
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
 
Introduction to cyber security
Introduction to cyber security Introduction to cyber security
Introduction to cyber security
 
introduction to cyber security
introduction to cyber securityintroduction to cyber security
introduction to cyber security
 
Media and Information Literacy 104
Media and Information Literacy 104Media and Information Literacy 104
Media and Information Literacy 104
 
negative implications of IT
negative implications of ITnegative implications of IT
negative implications of IT
 

Mehr von L14MaoP

Human trafficking in_cambodia_advance_writing_skills
Human trafficking in_cambodia_advance_writing_skillsHuman trafficking in_cambodia_advance_writing_skills
Human trafficking in_cambodia_advance_writing_skills
L14MaoP
 
Team members evaluation_and_participation
Team members evaluation_and_participationTeam members evaluation_and_participation
Team members evaluation_and_participation
L14MaoP
 
Accounting principlesaccountingforrecieveables
Accounting principlesaccountingforrecieveablesAccounting principlesaccountingforrecieveables
Accounting principlesaccountingforrecieveables
L14MaoP
 
2nd kingdom of cambodia
2nd kingdom of cambodia2nd kingdom of cambodia
2nd kingdom of cambodia
L14MaoP
 

Mehr von L14MaoP (17)

Human trafficking in_cambodia_advance_writing_skills
Human trafficking in_cambodia_advance_writing_skillsHuman trafficking in_cambodia_advance_writing_skills
Human trafficking in_cambodia_advance_writing_skills
 
Persuasive speech power point presentation
Persuasive speech power point presentationPersuasive speech power point presentation
Persuasive speech power point presentation
 
Beggar in cambodia_potential_group
Beggar in cambodia_potential_groupBeggar in cambodia_potential_group
Beggar in cambodia_potential_group
 
Team members evaluation_and_participation
Team members evaluation_and_participationTeam members evaluation_and_participation
Team members evaluation_and_participation
 
Phanara maoinformativespeechevaluation1
Phanara maoinformativespeechevaluation1Phanara maoinformativespeechevaluation1
Phanara maoinformativespeechevaluation1
 
A2 maop
A2 maopA2 maop
A2 maop
 
A2 maop.bus211.01
A2 maop.bus211.01A2 maop.bus211.01
A2 maop.bus211.01
 
A1 maop.bus211.01
A1 maop.bus211.01A1 maop.bus211.01
A1 maop.bus211.01
 
A1 khmerstudiesmaophanara101.01
A1 khmerstudiesmaophanara101.01A1 khmerstudiesmaophanara101.01
A1 khmerstudiesmaophanara101.01
 
A4 maop advance_writing_skills
A4 maop advance_writing_skillsA4 maop advance_writing_skills
A4 maop advance_writing_skills
 
Accounting principlesaccountingforrecieveables
Accounting principlesaccountingforrecieveablesAccounting principlesaccountingforrecieveables
Accounting principlesaccountingforrecieveables
 
Accounting principlesaccountingforrecieveables
Accounting principlesaccountingforrecieveablesAccounting principlesaccountingforrecieveables
Accounting principlesaccountingforrecieveables
 
Academic presentation slides
Academic presentation slidesAcademic presentation slides
Academic presentation slides
 
2nd kingdom of cambodia
2nd kingdom of cambodia2nd kingdom of cambodia
2nd kingdom of cambodia
 
A4 maop
A4 maopA4 maop
A4 maop
 
L15 maop
L15 maopL15 maop
L15 maop
 
How to convert PowerPoint Presentation to video
How to convert PowerPoint Presentation to videoHow to convert PowerPoint Presentation to video
How to convert PowerPoint Presentation to video
 

Kürzlich hochgeladen

怎样办理维多利亚大学毕业证(UVic毕业证书)成绩单留信认证
怎样办理维多利亚大学毕业证(UVic毕业证书)成绩单留信认证怎样办理维多利亚大学毕业证(UVic毕业证书)成绩单留信认证
怎样办理维多利亚大学毕业证(UVic毕业证书)成绩单留信认证
tufbav
 
一比一定(购)新西兰林肯大学毕业证(Lincoln毕业证)成绩单学位证
一比一定(购)新西兰林肯大学毕业证(Lincoln毕业证)成绩单学位证一比一定(购)新西兰林肯大学毕业证(Lincoln毕业证)成绩单学位证
一比一定(购)新西兰林肯大学毕业证(Lincoln毕业证)成绩单学位证
wpkuukw
 
怎样办理昆士兰大学毕业证(UQ毕业证书)成绩单留信认证
怎样办理昆士兰大学毕业证(UQ毕业证书)成绩单留信认证怎样办理昆士兰大学毕业证(UQ毕业证书)成绩单留信认证
怎样办理昆士兰大学毕业证(UQ毕业证书)成绩单留信认证
ehyxf
 
Top profile Call Girls In Ratlam [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Ratlam [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Ratlam [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Ratlam [ 7014168258 ] Call Me For Genuine Models We...
nirzagarg
 
一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理
一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理
一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理
uodye
 
一比一原版(Otago毕业证书)奥塔哥理工学院毕业证成绩单学位证靠谱定制
一比一原版(Otago毕业证书)奥塔哥理工学院毕业证成绩单学位证靠谱定制一比一原版(Otago毕业证书)奥塔哥理工学院毕业证成绩单学位证靠谱定制
一比一原版(Otago毕业证书)奥塔哥理工学院毕业证成绩单学位证靠谱定制
uodye
 
在线办理(scu毕业证)南十字星大学毕业证电子版学位证书注册证明信
在线办理(scu毕业证)南十字星大学毕业证电子版学位证书注册证明信在线办理(scu毕业证)南十字星大学毕业证电子版学位证书注册证明信
在线办理(scu毕业证)南十字星大学毕业证电子版学位证书注册证明信
oopacde
 
Jual Obat Aborsi Samarinda ( No.1 ) 088980685493 Obat Penggugur Kandungan Cy...
Jual Obat Aborsi Samarinda (  No.1 ) 088980685493 Obat Penggugur Kandungan Cy...Jual Obat Aborsi Samarinda (  No.1 ) 088980685493 Obat Penggugur Kandungan Cy...
Jual Obat Aborsi Samarinda ( No.1 ) 088980685493 Obat Penggugur Kandungan Cy...
Obat Aborsi 088980685493 Jual Obat Aborsi
 
Abortion pills in Jeddah |+966572737505 | Get Cytotec
Abortion pills in Jeddah |+966572737505 | Get CytotecAbortion pills in Jeddah |+966572737505 | Get Cytotec
Abortion pills in Jeddah |+966572737505 | Get Cytotec
Abortion pills in Riyadh +966572737505 get cytotec
 
Abort pregnancy in research centre+966_505195917 abortion pills in Kuwait cyt...
Abort pregnancy in research centre+966_505195917 abortion pills in Kuwait cyt...Abort pregnancy in research centre+966_505195917 abortion pills in Kuwait cyt...
Abort pregnancy in research centre+966_505195917 abortion pills in Kuwait cyt...
drmarathore
 
怎样办理圣芭芭拉分校毕业证(UCSB毕业证书)成绩单留信认证
怎样办理圣芭芭拉分校毕业证(UCSB毕业证书)成绩单留信认证怎样办理圣芭芭拉分校毕业证(UCSB毕业证书)成绩单留信认证
怎样办理圣芭芭拉分校毕业证(UCSB毕业证书)成绩单留信认证
ehyxf
 
In Riyadh Saudi Arabia |+966572737505 | Buy Cytotec| Get Abortion pills
In Riyadh Saudi Arabia |+966572737505 | Buy Cytotec| Get Abortion pillsIn Riyadh Saudi Arabia |+966572737505 | Buy Cytotec| Get Abortion pills
In Riyadh Saudi Arabia |+966572737505 | Buy Cytotec| Get Abortion pills
Abortion pills in Riyadh +966572737505 get cytotec
 
Top profile Call Girls In Udgir [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Udgir [ 7014168258 ] Call Me For Genuine Models We ...Top profile Call Girls In Udgir [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Udgir [ 7014168258 ] Call Me For Genuine Models We ...
gajnagarg
 
在线制作(ANU毕业证书)澳大利亚国立大学毕业证成绩单原版一比一
在线制作(ANU毕业证书)澳大利亚国立大学毕业证成绩单原版一比一在线制作(ANU毕业证书)澳大利亚国立大学毕业证成绩单原版一比一
在线制作(ANU毕业证书)澳大利亚国立大学毕业证成绩单原版一比一
ougvy
 
Top profile Call Girls In Palghar [ 7014168258 ] Call Me For Genuine Models W...
Top profile Call Girls In Palghar [ 7014168258 ] Call Me For Genuine Models W...Top profile Call Girls In Palghar [ 7014168258 ] Call Me For Genuine Models W...
Top profile Call Girls In Palghar [ 7014168258 ] Call Me For Genuine Models W...
gajnagarg
 
一比一维多利亚大学毕业证(victoria毕业证)成绩单学位证如何办理
一比一维多利亚大学毕业证(victoria毕业证)成绩单学位证如何办理一比一维多利亚大学毕业证(victoria毕业证)成绩单学位证如何办理
一比一维多利亚大学毕业证(victoria毕业证)成绩单学位证如何办理
uodye
 

Kürzlich hochgeladen (20)

怎样办理维多利亚大学毕业证(UVic毕业证书)成绩单留信认证
怎样办理维多利亚大学毕业证(UVic毕业证书)成绩单留信认证怎样办理维多利亚大学毕业证(UVic毕业证书)成绩单留信认证
怎样办理维多利亚大学毕业证(UVic毕业证书)成绩单留信认证
 
一比一定(购)新西兰林肯大学毕业证(Lincoln毕业证)成绩单学位证
一比一定(购)新西兰林肯大学毕业证(Lincoln毕业证)成绩单学位证一比一定(购)新西兰林肯大学毕业证(Lincoln毕业证)成绩单学位证
一比一定(购)新西兰林肯大学毕业证(Lincoln毕业证)成绩单学位证
 
Vashi Affordable Call Girls ,07506202331,Vasai Virar Charming Call Girl
Vashi Affordable Call Girls ,07506202331,Vasai Virar Charming Call GirlVashi Affordable Call Girls ,07506202331,Vasai Virar Charming Call Girl
Vashi Affordable Call Girls ,07506202331,Vasai Virar Charming Call Girl
 
怎样办理昆士兰大学毕业证(UQ毕业证书)成绩单留信认证
怎样办理昆士兰大学毕业证(UQ毕业证书)成绩单留信认证怎样办理昆士兰大学毕业证(UQ毕业证书)成绩单留信认证
怎样办理昆士兰大学毕业证(UQ毕业证书)成绩单留信认证
 
Top profile Call Girls In Ratlam [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Ratlam [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Ratlam [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Ratlam [ 7014168258 ] Call Me For Genuine Models We...
 
一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理
一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理
一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理
 
Point of Care Testing in clinical laboratory
Point of Care Testing in clinical laboratoryPoint of Care Testing in clinical laboratory
Point of Care Testing in clinical laboratory
 
一比一原版(Otago毕业证书)奥塔哥理工学院毕业证成绩单学位证靠谱定制
一比一原版(Otago毕业证书)奥塔哥理工学院毕业证成绩单学位证靠谱定制一比一原版(Otago毕业证书)奥塔哥理工学院毕业证成绩单学位证靠谱定制
一比一原版(Otago毕业证书)奥塔哥理工学院毕业证成绩单学位证靠谱定制
 
在线办理(scu毕业证)南十字星大学毕业证电子版学位证书注册证明信
在线办理(scu毕业证)南十字星大学毕业证电子版学位证书注册证明信在线办理(scu毕业证)南十字星大学毕业证电子版学位证书注册证明信
在线办理(scu毕业证)南十字星大学毕业证电子版学位证书注册证明信
 
Jual Obat Aborsi Samarinda ( No.1 ) 088980685493 Obat Penggugur Kandungan Cy...
Jual Obat Aborsi Samarinda (  No.1 ) 088980685493 Obat Penggugur Kandungan Cy...Jual Obat Aborsi Samarinda (  No.1 ) 088980685493 Obat Penggugur Kandungan Cy...
Jual Obat Aborsi Samarinda ( No.1 ) 088980685493 Obat Penggugur Kandungan Cy...
 
Abortion pills in Jeddah |+966572737505 | Get Cytotec
Abortion pills in Jeddah |+966572737505 | Get CytotecAbortion pills in Jeddah |+966572737505 | Get Cytotec
Abortion pills in Jeddah |+966572737505 | Get Cytotec
 
Abort pregnancy in research centre+966_505195917 abortion pills in Kuwait cyt...
Abort pregnancy in research centre+966_505195917 abortion pills in Kuwait cyt...Abort pregnancy in research centre+966_505195917 abortion pills in Kuwait cyt...
Abort pregnancy in research centre+966_505195917 abortion pills in Kuwait cyt...
 
怎样办理圣芭芭拉分校毕业证(UCSB毕业证书)成绩单留信认证
怎样办理圣芭芭拉分校毕业证(UCSB毕业证书)成绩单留信认证怎样办理圣芭芭拉分校毕业证(UCSB毕业证书)成绩单留信认证
怎样办理圣芭芭拉分校毕业证(UCSB毕业证书)成绩单留信认证
 
In Riyadh Saudi Arabia |+966572737505 | Buy Cytotec| Get Abortion pills
In Riyadh Saudi Arabia |+966572737505 | Buy Cytotec| Get Abortion pillsIn Riyadh Saudi Arabia |+966572737505 | Buy Cytotec| Get Abortion pills
In Riyadh Saudi Arabia |+966572737505 | Buy Cytotec| Get Abortion pills
 
Low Cost Patna Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top Class Call Gi...
Low Cost Patna Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top Class Call Gi...Low Cost Patna Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top Class Call Gi...
Low Cost Patna Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top Class Call Gi...
 
Top profile Call Girls In Udgir [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Udgir [ 7014168258 ] Call Me For Genuine Models We ...Top profile Call Girls In Udgir [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Udgir [ 7014168258 ] Call Me For Genuine Models We ...
 
在线制作(ANU毕业证书)澳大利亚国立大学毕业证成绩单原版一比一
在线制作(ANU毕业证书)澳大利亚国立大学毕业证成绩单原版一比一在线制作(ANU毕业证书)澳大利亚国立大学毕业证成绩单原版一比一
在线制作(ANU毕业证书)澳大利亚国立大学毕业证成绩单原版一比一
 
Top profile Call Girls In Palghar [ 7014168258 ] Call Me For Genuine Models W...
Top profile Call Girls In Palghar [ 7014168258 ] Call Me For Genuine Models W...Top profile Call Girls In Palghar [ 7014168258 ] Call Me For Genuine Models W...
Top profile Call Girls In Palghar [ 7014168258 ] Call Me For Genuine Models W...
 
Guwahati Escorts Service Girl ^ 9332606886, WhatsApp Anytime Guwahati
Guwahati Escorts Service Girl ^ 9332606886, WhatsApp Anytime GuwahatiGuwahati Escorts Service Girl ^ 9332606886, WhatsApp Anytime Guwahati
Guwahati Escorts Service Girl ^ 9332606886, WhatsApp Anytime Guwahati
 
一比一维多利亚大学毕业证(victoria毕业证)成绩单学位证如何办理
一比一维多利亚大学毕业证(victoria毕业证)成绩单学位证如何办理一比一维多利亚大学毕业证(victoria毕业证)成绩单学位证如何办理
一比一维多利亚大学毕业证(victoria毕业证)成绩单学位证如何办理
 

Mao p.cs.102.01

  • 1. Your Interactive Guide to the Digital World Discovering Computers 2012 Zaman University Course: CS Application 102.01 Instructor: Mr. Mustafa Dur Date: 04th June, 2014 Presenters : Phanara Mao Ibrohim Aripov
  • 2. Contents Communications and networks Email (spam/phishing) Net neutrality Breaking trust Internet censorship Freedom of expression Children and inappropriate content Internet addiction
  • 3. CommunicationsComputer communications describes a process in which two or more computers or devices transfer data, instructions, and information one to another; and it consists of 1. Sending devices 2. Communications channels 3. Receiving devices Discovering Computers 2012: Chapter 9 3Page 460
  • 4. Networks • A network is a collection of computers and devices connected together via communications devices and transmission media. Discovering Computers 2012: Chapter 9 4
  • 5. Email (Spam/Phishing) Spam-is the abuse of electronic messaging system to send unsolicited bulk messaging indiscriminately Types of spam : • Emil spam • IM Spam • USENET Newsgroup Spam • Web Searching Engine Spam • Blog Spam • Wiki Spam • Mobile Phone Messaging Spam
  • 6. Email (Spam/Phishing) What can I do?  Use Multiple email address  Personal  Business  Spam  Gmail  Never just delete  Report as Spam  Never open an email that you think is spam  Learn spam versus good
  • 7. Phishing Phishing-is a type of deception designed to steal your Valuable personal data, such as Credit card numbers, passwords, account data, or other information History of Phishing Phreaking + Fishing = phishing -Phreaking = making phone calls for free -fishing = use bait to lure the target
  • 8. Phishing What to do? 1) Detect and block the phishing Web sites in time 2) Enhance the security of the web sites 3) Block the phishing e-mails by Various spam filters 4) Install online anti-phishing software in users computers
  • 9. Net Neutrality • Net neutrality-is the principle that ISP and governments should treat all data on the Internet equally. • Net neutrality- is an important component of an open internet. • Without N.N hard to communicate online, but easier for companies to censor our speech.
  • 10. Net Neutrality • Without Net Neutrality, ISPs like AT&T, Comcast, Time Warner Cable and Verizon will be able to block content and speech they don’t like.
  • 11. Net Neutrality • The open Internet rules, adopted in 2010, were designed to prevent ISP.
  • 12. Breaking Trust • Identity Theft • Definition: when someone uses your personal information without your permission to commit fraud or other crime. This can be done in various ways like using someone’s  Name. Social security number. Credit card number. Bank account number. Etc.
  • 13. Breaking Trust Chat Room Predators • Chat room : supports real-time discussions among many people connected to network
  • 14. Breaking Trust Cyber bullying • What Is Cyber bullying? • Cyber bullying is the use of technology to burn, scare, confuse, or target another person. • By definition, it occurs among young people. When an adult is involved, it may meet the definition of cyber-harassment or cyber- stalking, a crime that can have legal consequences and involve jail time.
  • 15. Internet Censorship Internet censorship is the control or suppression of what can be accessed, published, or viewed on the Internet. Discovering Computers 2012: Chapter 9 15
  • 16. Internet Censorship North Korea. All websites are under government control. About 4% of the population has Internet access. Today, U. (2014, February 5). Top 10 Internet-censored countries. USA Today. Retrieved June 2, 2014, from http://www.usatoday.com/story/news/world/2014/02/05/top-ten-internet-censors/5222385/ 16
  • 17. Internet Censorship 3. China. China has the most rigid censorship program in the world. The government filters searches, block sites and erases "inconvenient" content, rerouting search terms on Taiwan independence or the Tiananmen Square massacre to items favorable to the Communist Party. Today, U. (2014, February 5). Top 10 Internet-censored countries. USA Today. Retrieved June 2, 2014, from http://www.usatoday.com/story/news/world/2014/02/05/top-ten-internet-censors/5222385/ 17
  • 18. Internet Censorship Discovering Computers 2012: Chapter 9 18 Government  Dislike governmental criticisms: social media  Keep information secretly
  • 19. Internet Censorship Discovering Computers 2012: Chapter 9 19 Individuals and organizations may engage in self-censorship for  moral,  religious, or  business reasons, To conform to societal norms, due to  intimidation, or  out of fear of legal, or  other consequences.
  • 20. Freedom of Expression User choice and control, which allow individuals to decide • What to say, • Publish and • Access online; are essential parts of protecting free expression rights. Discovering Computers 2012: Chapter 9 20
  • 22. Children and Inappropriate Contents Discovering Computers 2012: Chapter 9 22 Websites that promote self-harm, e.g.,  sites that encourage suicide,  drug use and  other anti-social behavior
  • 24. Internet addiction 24Young Internet addicts on the rise. (n.d.). Young Internet addicts on the rise. Retrieved June 3, 2014, from http://www.chinadaily.com.cn/china/2010-02/03/content_9417660.htm
  • 25. Internet addiction Young Internet addicts on the rise. (n.d.). Young Internet addicts on the rise. Retrieved June 3, 2014, from http://www.chinadaily.com.cn/china/2010-02/03/content_9417660.htm 25
  • 26.
  • 28. Internet addiction Center for Democracy & Technology | Keeping the Internet Open, Innovative and Free. (n.d.). Free Expression. Retrieved June 3, 2014, from https://cdt.org/issue/free-expression/ 28
  • 29. References Center for Democracy & Technology | Keeping the Internet Open, Innovative and Free. (n.d.). Free Expression. Retrieved June 3, 2014, from https://cdt.org/issue/free-expression/ Dur, M. (Director) (2014, March 5). Networked Communication . General Lectures. Lecture conducted from Zaman University, Phnom Penh. Shelly, G. B., & Vermaat, M. (2010). Networked Communication . Discovering computers (pp. 458-511). Boston: Nicole Pinard. Today, U. (2014, February 5). Top 10 Internet-censored countries. USA Today. Retrieved June 2, 2014, from http://www.usatoday.com/story/news/world /2014/02/05/top-ten-internet-censors/5222385/ Young Internet addicts on the rise. (n.d.). Young Internet addicts on the rise. Retrieved June 3, 2014, from http://www.chinadaily.com.cn/china/2010-02/03/content_9417660.htm
  • 30. Thank for listening! It’s about time to have Q & A!