SlideShare ist ein Scribd-Unternehmen logo
1 von 11
ILLEGAL
DOWNLOADING
What are participants more likely to download ?
ILLEGAL DOWNLOADING

 Majority of participants tend to
buy, install or download pirated
software, CD, movies and music
from the internet.
 They also like to keep the
pictures that they have
downloaded for their personal
collection.
ILLEGAL DOWNLOADING

 In the survey, we find out that
MALES:
- Tend to download music more.
-Like to download game.
-The least chosen answer is ‘others’, which
include document, lecture notes and files.
FEMALE:
-Tend to download more music, pictures and
movies.
-Whilst, the least chosen answer is ‘others’, which
include document, lecture notes and files.
PLAGIARISM
  Who Plagiarizes?
PLAGIARISM

      We find out using our survey
     that male participants plagiarized
     more than female.

      45% out of 100% of the
     participants plagiarized from the
     internet.
PIRACY
Why do people download the pirated?
PIRACY

    35 out of 64 male participants
   installed pirated software because they
   can’t afford to buy the original software.

    Whereas, 10 out of 16 female
   participants installed pirated software
   because they do not know where to buy it.

    However, majority of the participants
   do not have the knowledge to crack
   certain software.
IDENTITY THEFT
  Duplication of identity (fake)
IDENTITY THEFT
        Majority of the participant profile
       have not been duplicated, statistic show
       only 64 participants out of 80 answer
       ‘No’. The number of participant that
       has their profile being duplicated is 16
       out of 80.
        According to the survey only 23 out
       of 80 participants pictures have been
       used by someone else as their profile
       pictures.
HACKING
Is hacking a common thing ?
HACKING

 From the data we have analyzed,
we have come to the conclusion that
majority of the participants have not
being hacked.
 Majority of participants have
been spammed through email and
messages.
 0% has been spammed through
social network.

Weitere ähnliche Inhalte

Andere mochten auch

Internet privacy presentation
Internet privacy presentationInternet privacy presentation
Internet privacy presentation
Matthew Momney
 
Film Piracy Powerpoint
Film Piracy PowerpointFilm Piracy Powerpoint
Film Piracy Powerpoint
loisevz
 
Remote desktop connection
Remote desktop connectionRemote desktop connection
Remote desktop connection
Jasleen Kaur (Chandigarh University)
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online security
Paul Berryman
 
Privacy issues and internet privacy
Privacy issues and internet privacyPrivacy issues and internet privacy
Privacy issues and internet privacy
vinyas87
 

Andere mochten auch (13)

Internet privacy presentation
Internet privacy presentationInternet privacy presentation
Internet privacy presentation
 
Film Piracy Powerpoint
Film Piracy PowerpointFilm Piracy Powerpoint
Film Piracy Powerpoint
 
Online Privacy
Online PrivacyOnline Privacy
Online Privacy
 
Privacy on the Internet
Privacy on the InternetPrivacy on the Internet
Privacy on the Internet
 
Online Privacy and Security
Online Privacy and SecurityOnline Privacy and Security
Online Privacy and Security
 
P2p Peer To Peer Introduction
P2p Peer To Peer IntroductionP2p Peer To Peer Introduction
P2p Peer To Peer Introduction
 
Seminar 2 ppt
Seminar 2 pptSeminar 2 ppt
Seminar 2 ppt
 
Remote desktop connection
Remote desktop connectionRemote desktop connection
Remote desktop connection
 
“Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation “Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation
 
Peer to peer system
Peer to peer systemPeer to peer system
Peer to peer system
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online security
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information Privacy
 
Privacy issues and internet privacy
Privacy issues and internet privacyPrivacy issues and internet privacy
Privacy issues and internet privacy
 

Kürzlich hochgeladen

Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 

Kürzlich hochgeladen (20)

Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptx
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 

Presentation for illegal downloading

  • 1. ILLEGAL DOWNLOADING What are participants more likely to download ?
  • 2. ILLEGAL DOWNLOADING  Majority of participants tend to buy, install or download pirated software, CD, movies and music from the internet.  They also like to keep the pictures that they have downloaded for their personal collection.
  • 3. ILLEGAL DOWNLOADING  In the survey, we find out that MALES: - Tend to download music more. -Like to download game. -The least chosen answer is ‘others’, which include document, lecture notes and files. FEMALE: -Tend to download more music, pictures and movies. -Whilst, the least chosen answer is ‘others’, which include document, lecture notes and files.
  • 4. PLAGIARISM Who Plagiarizes?
  • 5. PLAGIARISM  We find out using our survey that male participants plagiarized more than female.  45% out of 100% of the participants plagiarized from the internet.
  • 6. PIRACY Why do people download the pirated?
  • 7. PIRACY  35 out of 64 male participants installed pirated software because they can’t afford to buy the original software.  Whereas, 10 out of 16 female participants installed pirated software because they do not know where to buy it.  However, majority of the participants do not have the knowledge to crack certain software.
  • 8. IDENTITY THEFT Duplication of identity (fake)
  • 9. IDENTITY THEFT  Majority of the participant profile have not been duplicated, statistic show only 64 participants out of 80 answer ‘No’. The number of participant that has their profile being duplicated is 16 out of 80.  According to the survey only 23 out of 80 participants pictures have been used by someone else as their profile pictures.
  • 10. HACKING Is hacking a common thing ?
  • 11. HACKING  From the data we have analyzed, we have come to the conclusion that majority of the participants have not being hacked.  Majority of participants have been spammed through email and messages.  0% has been spammed through social network.