This document is an interactive guide to the digital world from a course on computer applications at Zaman University. It discusses topics like communications and networks, email and issues like spam and phishing, net neutrality, breaking trust online through identity theft and cyberbullying, internet censorship by governments, freedom of expression, inappropriate content for children, and internet addiction. The guide provides definitions and explanations of these topics with examples and advice on how to deal with certain issues. It also includes references used to compile the information in the guide.
1. Your Interactive Guide
to the Digital World
Discovering
Computers 2012
Zaman University
Course: CS Application 102.01
Instructor: Mr. Mustafa Dur
Date: 04th June, 2014
Presenters :
Phanara Mao
Ibrohim Aripov
2. Contents
Communications and networks
Email (spam/phishing)
Net neutrality
Breaking trust
Internet censorship
Freedom of expression
Children and inappropriate content
Internet addiction
3. CommunicationsComputer communications describes a
process in which two or more computers or
devices transfer data, instructions, and
information one to another; and it consists of
1. Sending devices
2. Communications channels
3. Receiving devices
Discovering Computers 2012: Chapter 9 3Page 460
4. Networks
• A network is a collection of computers and devices connected
together via communications devices and transmission media.
Discovering Computers 2012: Chapter 9 4
5. Email (Spam/Phishing)
Spam-is the abuse of electronic messaging system
to send unsolicited bulk messaging indiscriminately
Types of spam :
• Emil spam
• IM Spam
• USENET Newsgroup Spam
• Web Searching Engine Spam
• Blog Spam
• Wiki Spam
• Mobile Phone Messaging Spam
6. Email (Spam/Phishing)
What can I do?
Use Multiple email address
Personal
Business
Spam
Gmail
Never just delete
Report as Spam
Never open an email that you think is spam
Learn spam versus good
7. Phishing
Phishing-is a type of deception designed to steal your Valuable personal data,
such as Credit card numbers, passwords, account data, or other information
History of Phishing
Phreaking + Fishing = phishing
-Phreaking = making phone calls for free
-fishing = use bait to lure the target
8. Phishing
What to do?
1) Detect and block the phishing Web sites in time
2) Enhance the security of the web sites
3) Block the phishing e-mails by Various spam filters
4) Install online anti-phishing software in users computers
9. Net Neutrality
• Net neutrality-is the principle that ISP and
governments should treat all data on the Internet
equally.
• Net neutrality- is an important component of an
open internet.
• Without N.N hard to communicate online, but easier
for companies to censor our speech.
10. Net Neutrality
• Without Net Neutrality, ISPs like AT&T, Comcast,
Time Warner Cable and Verizon will be able to block
content and speech they don’t like.
11. Net Neutrality
• The open Internet rules, adopted in 2010,
were designed to prevent ISP.
12. Breaking Trust
• Identity Theft
• Definition: when someone uses your personal
information without your permission to commit
fraud or other crime.
This can be done in various ways like using someone’s
Name.
Social security number.
Credit card number.
Bank account number.
Etc.
13. Breaking Trust
Chat Room Predators
• Chat room : supports real-time discussions
among many people connected to network
14. Breaking Trust
Cyber bullying
• What Is Cyber bullying?
• Cyber bullying is the use of technology to burn,
scare, confuse, or target another person.
• By definition, it occurs among young people.
When an adult is involved, it may meet the
definition of cyber-harassment or cyber-
stalking, a crime that can have legal
consequences and involve jail time.
15. Internet Censorship
Internet censorship is the control or
suppression of what can be accessed,
published, or viewed on the Internet.
Discovering Computers 2012: Chapter 9 15
16. Internet Censorship
North Korea. All websites are under government control.
About 4% of the population has Internet access.
Today, U. (2014, February 5). Top 10 Internet-censored countries. USA Today. Retrieved June 2, 2014, from
http://www.usatoday.com/story/news/world/2014/02/05/top-ten-internet-censors/5222385/ 16
17. Internet Censorship
3. China. China has the most
rigid censorship program in
the world. The government
filters searches, block sites
and erases "inconvenient"
content, rerouting search
terms on Taiwan
independence or the
Tiananmen Square massacre
to items favorable to the
Communist Party.
Today, U. (2014, February 5). Top 10 Internet-censored countries. USA Today. Retrieved June 2, 2014, from
http://www.usatoday.com/story/news/world/2014/02/05/top-ten-internet-censors/5222385/ 17
19. Internet Censorship
Discovering Computers 2012: Chapter 9 19
Individuals and organizations may engage in self-censorship for
moral,
religious, or
business reasons,
To conform to societal norms, due to
intimidation, or
out of fear of legal, or
other consequences.
20. Freedom of Expression
User choice and control, which allow individuals
to decide
• What to say,
• Publish and
• Access online;
are essential parts of protecting free expression
rights.
Discovering Computers 2012: Chapter 9 20
22. Children and Inappropriate Contents
Discovering Computers 2012: Chapter 9 22
Websites that promote self-harm, e.g.,
sites that encourage suicide,
drug use and
other anti-social behavior
24. Internet addiction
24Young Internet addicts on the rise. (n.d.). Young Internet addicts on the rise. Retrieved June 3, 2014, from
http://www.chinadaily.com.cn/china/2010-02/03/content_9417660.htm
25. Internet addiction
Young Internet addicts on the rise. (n.d.). Young Internet addicts on the rise. Retrieved June 3, 2014, from
http://www.chinadaily.com.cn/china/2010-02/03/content_9417660.htm
25
28. Internet addiction
Center for Democracy & Technology | Keeping the Internet Open, Innovative and Free. (n.d.). Free Expression. Retrieved
June 3, 2014, from https://cdt.org/issue/free-expression/
28
29. References
Center for Democracy & Technology | Keeping the Internet Open, Innovative
and Free. (n.d.). Free Expression. Retrieved June 3, 2014, from
https://cdt.org/issue/free-expression/
Dur, M. (Director) (2014, March 5). Networked Communication . General
Lectures. Lecture conducted from Zaman University, Phnom Penh.
Shelly, G. B., & Vermaat, M. (2010). Networked Communication . Discovering
computers (pp. 458-511). Boston: Nicole Pinard.
Today, U. (2014, February 5). Top 10 Internet-censored countries. USA Today.
Retrieved June 2, 2014, from http://www.usatoday.com/story/news/world
/2014/02/05/top-ten-internet-censors/5222385/
Young Internet addicts on the rise. (n.d.). Young Internet addicts on the rise.
Retrieved June 3, 2014, from
http://www.chinadaily.com.cn/china/2010-02/03/content_9417660.htm