SlideShare ist ein Scribd-Unternehmen logo
1 von 13
The Dark Side of the Web By Mark Shin
In the Darkness… Computer Viruses Spyware/malware Online Pornography Social Networking  Wasting Time – Productivity Plagiarism
Computer Virus Signs of Virus Infection Unusual message/image appears Unusual sound/music plays Decreased available memory Program/file is suddenly missing A file becomes corrupted Program/file does not work properly http://www.seecureit.com/pages/images/computer-virus.jpg More Virus Symptoms
Computer Virus What can be done to prevent virus infection? Antivirus software (set auto scan) Scan all removable media Scan all attached and downloaded files Install Firewall program http://65.55.21.250/security/antivirus/prevent.aspx http://arvast.com/images/antivirus_software/antivirus_software_250x251.jpg
Spyware / Malware Top 10 Facts about Spyware Average home PC contains 30 pieces of spyware Your identity is clicks away for criminals Spyware slows down your computer Spyware can slow down your internet connection Spyware can turn you into a “spammer”. Spyware can be installed on your computer without your knowledge. It allows hackers to control your PC. Some spyware removal programs install Spyware. The best Anti-Spyware programs only finds 90% of Spyware. Many resort to wiping their PC and re-installing everything. http://ezinearticles.com/?Top-Ten-Facts-About-Spyware&id=676633
Online Pornography Teens spend average of 87 hours a year looking at porn online Daily Mail - UK Worldwide pornography revenue in 2006 was $97.06 billion. http://www.enough.org/inside.php?id=2uxkjwry8 Every second, $3,075.64 is being spent on pornography, 28,258 Internet viewers are viewing pornography, 372 Internet users are typing adult search terms into search engines, and every 39 minutes, a new pornographic video is made in the United States. http://www.enough.org/inside.php?id=2uxkjwry8 Sexting by minors is quickly leading to child porn arrests in the US http://technology.timesonline.co.uk/tol/news/tech_and_web/article5516511.ece
Social Networking - Benefits Online interaction provides way for students to: Learn and refine self-control Relate with tolerance Engage in critical thinking and decision making Express views in a healthy and appropriate manner Social support structure Promotes self discover and identify formation without popularity, cultural, and peer dynamics
Social Networking - Risks Media attention on predators and pedophiles Greater likelihood of experiencing Cyberbullying Increased opportunities for publishing personal information http://www.mediabistro.com/fishbowlLA/original/grasgf.jpg
Social Networking - Examples Facebook  -  350 million global users (12/2/09) YouTube – 552 million global users My Space  -  212 million Twitter  -  32.1 million (5/09) up from 1.6 million in one year LinkedIn  -  50 million LiveJournal – 35 million Bebo  -  40 million  Friendster  -  50 million Xanga  - 40 million Orkut  -  67 million
Social Networking – Safe Strategies Assume everyone has access to your profile Assume the information and content of profile could be used to cause harm Assume that there are predators using profile information to determine location Remember  you are responsible for any inappropriate or illegal content Use “privacy” settings Do not include age, school or city on profile
Social Networking – Safe Strategies Use discretion when putting pictures or other media in your profile Content could be used for future educational and professional screening Don’t accept Friend requests from people you don’t know Content is never really deleted Think before you post!
Wasting Time Decreased Productivity An online survey of 2,057 employees …found about 6  in every 10 workers admit to wasting time at work with the average employee wasting 1.7 hours of a typical 8.5 hour working day                ( Reuters ) Top 5 Time Wasters that Drown Productivity Online Games Facebook Blogging Instant Messaging Wikipedia http://jobs.aol.com/articles/2010/05/07/work-productivity/
Plagiarism 54% of students admitted to plagiarizing from the internet. 36% of undergraduates have admitted to plagiarizing written material. 47% of students believe their teachers sometimes choose to ignore students who are cheating. Ways to prevent/discourage plagiarism: ,[object Object]

Weitere ähnliche Inhalte

Was ist angesagt?

Dangers to social media
Dangers to social mediaDangers to social media
Dangers to social media
Ryan Ward
 
Cybersafeelementary
CybersafeelementaryCybersafeelementary
Cybersafeelementary
Rick Ohren
 
Internet and youth in albania today
Internet and youth in albania todayInternet and youth in albania today
Internet and youth in albania today
Boni Tufa
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
drogt1mm
 
Social & mobile security
Social & mobile securitySocial & mobile security
Social & mobile security
Ernest Staats
 
Finding things out on the Web
Finding things out on the WebFinding things out on the Web
Finding things out on the Web
Miles Berry
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
rowenick
 

Was ist angesagt? (18)

Dangers to social media
Dangers to social mediaDangers to social media
Dangers to social media
 
Cybersafeelementary
CybersafeelementaryCybersafeelementary
Cybersafeelementary
 
Internet safety for kids
Internet safety for kidsInternet safety for kids
Internet safety for kids
 
LIFARS - Social Media Dangers to Children
LIFARS - Social Media Dangers to ChildrenLIFARS - Social Media Dangers to Children
LIFARS - Social Media Dangers to Children
 
Internet and youth in albania today
Internet and youth in albania todayInternet and youth in albania today
Internet and youth in albania today
 
HELE 4 Lesson 2: Safe and Responsible Use of ICT
HELE 4 Lesson 2: Safe and Responsible Use of ICTHELE 4 Lesson 2: Safe and Responsible Use of ICT
HELE 4 Lesson 2: Safe and Responsible Use of ICT
 
Social media-threats
Social media-threatsSocial media-threats
Social media-threats
 
Technology Training - Security, Passwords & More
Technology Training - Security, Passwords & MoreTechnology Training - Security, Passwords & More
Technology Training - Security, Passwords & More
 
Social media-threats
Social media-threatsSocial media-threats
Social media-threats
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Empowerment Technology Lesson 2
Empowerment Technology Lesson 2Empowerment Technology Lesson 2
Empowerment Technology Lesson 2
 
Social & mobile security
Social & mobile securitySocial & mobile security
Social & mobile security
 
Finding things out on the Web
Finding things out on the WebFinding things out on the Web
Finding things out on the Web
 
Protect
ProtectProtect
Protect
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
 
Social media & cyber crime
Social media & cyber crimeSocial media & cyber crime
Social media & cyber crime
 
Safe and Responsible Use of ICT
Safe and Responsible Use of ICTSafe and Responsible Use of ICT
Safe and Responsible Use of ICT
 
Disadvantages of Social Media
Disadvantages of Social MediaDisadvantages of Social Media
Disadvantages of Social Media
 

Ähnlich wie The Dark Side Of The Web

Issues with computers
Issues with computersIssues with computers
Issues with computers
ayerssaa
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet Security
Ashley Zimmerman
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet Security
JFashant
 
Social mobile safety
Social mobile safetySocial mobile safety
Social mobile safety
Ernest Staats
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety
Sadaf Walliyani
 

Ähnlich wie The Dark Side Of The Web (20)

Issues with computers
Issues with computersIssues with computers
Issues with computers
 
Social Networks And Phishing
Social Networks And PhishingSocial Networks And Phishing
Social Networks And Phishing
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet Security
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet Security
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Online Safety
Online Safety Online Safety
Online Safety
 
Social mobile safety
Social mobile safetySocial mobile safety
Social mobile safety
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Security Basics Webinar
Security Basics WebinarSecurity Basics Webinar
Security Basics Webinar
 
100812 internet security2.0
100812 internet security2.0100812 internet security2.0
100812 internet security2.0
 
E safety training
E safety trainingE safety training
E safety training
 
Internet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & TeachersInternet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & Teachers
 
Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07
 
EFFECTS OF SOCIAL MEDIA ON YOUTH
EFFECTS OF SOCIAL MEDIA ON YOUTHEFFECTS OF SOCIAL MEDIA ON YOUTH
EFFECTS OF SOCIAL MEDIA ON YOUTH
 
Social Networking and Cyberbullying
Social Networking and CyberbullyingSocial Networking and Cyberbullying
Social Networking and Cyberbullying
 
Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08
 
CyberSafety
CyberSafetyCyberSafety
CyberSafety
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threats
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awareness
 

Kürzlich hochgeladen

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 

Kürzlich hochgeladen (20)

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 

The Dark Side Of The Web

  • 1. The Dark Side of the Web By Mark Shin
  • 2. In the Darkness… Computer Viruses Spyware/malware Online Pornography Social Networking Wasting Time – Productivity Plagiarism
  • 3. Computer Virus Signs of Virus Infection Unusual message/image appears Unusual sound/music plays Decreased available memory Program/file is suddenly missing A file becomes corrupted Program/file does not work properly http://www.seecureit.com/pages/images/computer-virus.jpg More Virus Symptoms
  • 4. Computer Virus What can be done to prevent virus infection? Antivirus software (set auto scan) Scan all removable media Scan all attached and downloaded files Install Firewall program http://65.55.21.250/security/antivirus/prevent.aspx http://arvast.com/images/antivirus_software/antivirus_software_250x251.jpg
  • 5. Spyware / Malware Top 10 Facts about Spyware Average home PC contains 30 pieces of spyware Your identity is clicks away for criminals Spyware slows down your computer Spyware can slow down your internet connection Spyware can turn you into a “spammer”. Spyware can be installed on your computer without your knowledge. It allows hackers to control your PC. Some spyware removal programs install Spyware. The best Anti-Spyware programs only finds 90% of Spyware. Many resort to wiping their PC and re-installing everything. http://ezinearticles.com/?Top-Ten-Facts-About-Spyware&id=676633
  • 6. Online Pornography Teens spend average of 87 hours a year looking at porn online Daily Mail - UK Worldwide pornography revenue in 2006 was $97.06 billion. http://www.enough.org/inside.php?id=2uxkjwry8 Every second, $3,075.64 is being spent on pornography, 28,258 Internet viewers are viewing pornography, 372 Internet users are typing adult search terms into search engines, and every 39 minutes, a new pornographic video is made in the United States. http://www.enough.org/inside.php?id=2uxkjwry8 Sexting by minors is quickly leading to child porn arrests in the US http://technology.timesonline.co.uk/tol/news/tech_and_web/article5516511.ece
  • 7. Social Networking - Benefits Online interaction provides way for students to: Learn and refine self-control Relate with tolerance Engage in critical thinking and decision making Express views in a healthy and appropriate manner Social support structure Promotes self discover and identify formation without popularity, cultural, and peer dynamics
  • 8. Social Networking - Risks Media attention on predators and pedophiles Greater likelihood of experiencing Cyberbullying Increased opportunities for publishing personal information http://www.mediabistro.com/fishbowlLA/original/grasgf.jpg
  • 9. Social Networking - Examples Facebook - 350 million global users (12/2/09) YouTube – 552 million global users My Space - 212 million Twitter - 32.1 million (5/09) up from 1.6 million in one year LinkedIn - 50 million LiveJournal – 35 million Bebo - 40 million Friendster - 50 million Xanga - 40 million Orkut - 67 million
  • 10. Social Networking – Safe Strategies Assume everyone has access to your profile Assume the information and content of profile could be used to cause harm Assume that there are predators using profile information to determine location Remember you are responsible for any inappropriate or illegal content Use “privacy” settings Do not include age, school or city on profile
  • 11. Social Networking – Safe Strategies Use discretion when putting pictures or other media in your profile Content could be used for future educational and professional screening Don’t accept Friend requests from people you don’t know Content is never really deleted Think before you post!
  • 12. Wasting Time Decreased Productivity An online survey of 2,057 employees …found about 6 in every 10 workers admit to wasting time at work with the average employee wasting 1.7 hours of a typical 8.5 hour working day ( Reuters ) Top 5 Time Wasters that Drown Productivity Online Games Facebook Blogging Instant Messaging Wikipedia http://jobs.aol.com/articles/2010/05/07/work-productivity/
  • 13.
  • 15. Be aware of reasons for plagiarism