Download as pdf or txt
Download as pdf or txt
You are on page 1of 32

INFORMATION SOCIETY

LEVIE BAYUCAN, PINKEE DOMINGO, HAZEL LAGARE, DEXTER CABRERA


Information Society is a term for
a society in which the creation,
distribution, and manipulation of
information has become the most
significant economic and cultural
activity.

The role of information society is to


generate ideas such as were the
information society are important
because they shape views about the
way in which the world works and
References:
https://www.techtarget.com/whatis/definition/Informatio
thereby influence the decisions of
n-Society individuals, firms, and governments.
https://www.sciencedirect.com/topics/social-
sciences/information-society
INFORMATION HACKING
INFORMATION- knowledge
obtained from investigation, study, or
INTRODUCTION instruction; facts, data.
HACKING- refers to activities
that seek to compromise digital
devices, such as computers,
smartphones, tablets, and even entire
networks.
Information Hacking is the;
• Ability to steal important information
and other confidential files
• Ability to identify the weakness of a
computer system or a network
• Ability to enter data bases of
important organizations
A commonly used information hacking
DEFINITION definition is the act of compromising digital
devices and networks through unauthorized
access to an account or computer system.
Hacking is not always a malicious act, but it is
most commonly associated with illegal activity
and data theft by cyber criminals.

According to Lawrence Williams,


Information Hacking is the activity of identifying
weaknesses in a computer system or a network
to exploit the security to gain access to personal
data or business data. An example of
information hacking can be: using a password
cracking algorithm to gain access to a computer
system.
References:
https://www.fortinet.com/resources/cyberglossary/what-is-hacking
https://www.guru99.com/what-is-hacking-an-introduction.html
There are typically four key drivers that lead to bad actors hacking websites or
systems:
(1) financial gain through the theft of credit card details or by defrauding financial
services;
(2) corporate espionage;
(3) to gain notoriety or respect for their hacking talents; and
(4) state-sponsored hacking that aims to steal business information and national
intelligence.
On top of that, there are politically motivated hackers—or hacktivists—who aim to raise
public attention by leaking sensitive information, such as Anonymous, LulzSec, and
WikiLeaks.
References:
https://www.fortinet.com/resources/cyb
erglossary/what-is-hacking
DEVICES MOST VULNERABLE TO HACKING

_ Smart Devices
_ Webcams
_ Routers
_ Email
_ Jailbroken Phones
PREVENTION FROM GETTING HACKED
_ Software Update
_ Using Unique Passwords for Different Accounts
_ HTTPS Encryption
_ Avoid Clicking on Ads or Strange Links
_ Change Default Username and Password on Your
Router and Smart Devices
PROTECT YOURSELF AGAINST HACKING
_ Download from First-party Sources
_ Install Antivirus Software
_ Use a VPN
_ Do NOT Login as an Admin by Default
_ Use a Password Manager
_ Use Two-factor Authentication
_ Brush Up on Anti-phishing Techniques
INTRODUCTION/DEFINITION
Identity theft continues to be
the fastest growing crime in America
and mostly us college students are
one of the most targeted populations
by thieves.
Identity theft - is when an
unauthorized person uses your
personal confirmation to access your
financial accounts, open new
accounts or commit a crime.
HOW CAN YOUR IDENTITY BE STOLEN?
From the theft of your personal
information while your online, to a
grab of data your unattended
paperwork, to the robbery of your
credit card information and to breach
to personal information from
companies you work with.
But you can take steps to avoid
being a victim. Here are the list of
some of the most common scams and
how you can take steps to stop an
identity theft. This are Phishing,
Pharming, Vishing and Smishing.
PHISHING
is an attempt to steal
personal information through email
by pretending to be a trustworthy
source.
Example. Example an identity
thief send you an email pretending
to be your bank, your banks logo is
on the email and its look legitimate.
The best way to avoid being
caught in this scam is to never
share personal information via
email
PHARMING
is where a hacker installs
malicious code on a personal
computer or server.
To avoid pharming before
you submit any personal
information on a website look
for a padlock symbol on the
website and https in the
website address.
VISHING
attempts to get you to
provide personal information
over the phone.
You might receive a
voicemail asking for your
immediate attention, the
number provide leads to an
automated service asking you
to enter personal information.
Before you ever give
personal information over the
phone make sure you know
this is a trusted source.
SMISHING
uses cell phone text
messages to get you to provide
personal information. Often the
text will contain a URL or phone
number and again just like Vishing
that Smishing message usually ask
for your immediate attention if
something is vitally important, it’s
unlikely to be sent via text message.
Do not respond to Smishing
message.
When we say theft - we mean the old
fashioned type of physically stealing
something that is your from right under your
nose.
- This type of theft includes
stealing your mail or going through you’re
recycling or trash to look for statements or
documents with personal information.
Take for example Skimming,
- skimming occurs when a device
records your credit card information and send
it to the thief to make authorize purchases.
- It can happen at an ATM or a
retail store anytime someone just a moment
alone with your credit card.
Help prevent physical theft by
shredding any document with personal
information when they are no longer needed
and locking away personal documents.
If you’re in a dorm or share housing
with people, consider bringing these
personal documents home where they are
safer. And frequently check your credit and
debit card accounts for fraudulent charges.
Items that have your full social security
number, like your social security card, should
not be carried in your wallet or purse and
instead stored and transported safely.
It may seem like identity theft is
everywhere, but if you protect yourself
online, on your mobile device at your mailbox
and always be on guard for theft, you’ll start
fighting the battle against identity theft.
References:
https://youtu.be/WykG0QbvbbU
PRIVACY INVASION
The law protects people against many
types of harm, including harm to one's
personal space and private life, infringing on
this interest is known invasion of privacy.

Four distinct categories of Invasion of Privacy

1. Intrusion into seclusion


2. Appropriation of name or likeness
3. Public disclosure of private facts
4. Placing a person in a false light.
INTRUSION UPON SECLUSION
occurs when someone intentionally includes into
the private affairs of another person.
The legal standards requires that the intrusion be
intentional in highly offensive to a reasonable person.

Ex. If an intruder infringes on these areas by planting a


camera, peeping or otherwise violating privacy of the
area that is form of invasion of privacy.

Another area we're intrusion into seclusion has been


litigated is in the workplace, although people in a work
setting are aware that others may hear what they
discuss. There is an expectation that discussions among
colleagues at work will not be surreptitiously recorded.
Intrusion upon seclusion is not limited to cases of
physical intrusion. The principle of invasion of privacy
extends into any sphere in which an ordinary person could
reasonably expect that others should be excluded.

The other three categories All involved publicizing


private benefits about someone else for personal benefit
or to harm the other person, unlike intrusion into seclusion
publication of something private is a necessary element
for each, This also means that each of this categories is
impacted by freedom of speech because they all involve
forms of expression.
APPROPRIATION OF NAME OR LIKENESS
occurs when someone publicly uses the name or likeness of
another person for her own benefit.

Benefit is probably defined but generally refers to using people's


name or likeness for "advertising purposes" or "purposes of trade".

A person may license the right to use her name or likeness, but u
authorized usage is considered an illegitimate appropriation.

For example, the authorized use of a celebrity picture on a billboard to


advertise a commercial interest or product is misappropriation,
however appropriation actions are not limited to celebrities.

Anyone whose name or likeness is used for commercial purposes


without their consent may potentially have a cause of action for
misappropriation. The news worthiness exception applies even if the
organization is a for profit business This is how newspapers and other
media can print the names and publish images of people in the news
without asking for permission.
PUBLIC DISCLOSURE OF PRIVATE FACTS
It is the publication of the private affairs of another
person when the disclosures would be highly offensive to a
reasonable person.
For example, a creditor puts a notice in a store
owners window saying the owners owes money and hasn't
paid. This is different from the formation in that the
published material In question may be true, but is especially
private.
The publication requirement is far greater than it is
for defamation, telling a third party is not enough the private
facts must be broadcast to abroad audience if the matter is
the subject of legitimate public concern.
For example, reporting on a secret medical condition
of an actor may not be protected because the actors health
me not be of public concern beyond mere curiosity, while the
secret medical condition of a high ranking elected official
might be of legitimate public concern.
INVASION OF PRIVACY UNDER THE FALSE
LIGHT CATEGORY
FALSE LIGHT - means stating what may be
technically truthful or opinion based information,
but in a manner indicating to a reasonable person
that something negative and false is true about the
target.
For example, a newspaper published a story on a
family dealing with a murder and it's impact on the
victim’s family.
The story described the family as "poor" and
their house as "messy" and in a "state of disarray".
The family sued because of the inaccurate
description in the story which made them objects of
pity and ridicule, the court agreed that such a
portrayal could constitute invasion of privacy and
false light grounds.
While invasion of privacy
takes many forms, the
common denominator is
that private matters are
infringed on or made
public. This cause of action
served as a mechanism by
which civil court help
people maintain their
fundamental rights to
privacy.
10 RULES OF NETIQUETTE
1. When typing never write in all capital letters.
2. Don’t plagiarize.
3. Use proper quotes and always use the whole quote.
4. Don’t gossip and keep personal information personal.
5. Don’t steal those photographs off the web.
6. Watch your language.
7. Be patient with internet newbies.
8. No spamming.
9. If you are using a header (such as in an email) make sure your content really pertains to the header.
10. Avoid overuse of emoticons.
REMINDER!!!
FOLLOWING THESE SIMPLE GUIDELINES WILL KEEP YOUR
INTERNET CONNECTIONS HAPPY AND ALLOW FOR
MORES “SOCIAL” INTERACTIONS. JUST LIKE IN FACE TO
FACE DEALINGS, INTERNET USERS LOVE OTHER USERS
WITH MANNERS. MANNERS GO A LONG WAY IN SAYING
WHO YOU ARE AND WHAT YOU ARE.

References:
Kim Tranter, of ULearnSocialMedia.com
THANK YOU

You might also like