Download Threats – dangers on the web - Youth of Europe connect to a "Right

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts
no text concepts found
Transcript
THREATS
ADDICTION




A person who is
addicted to the Net
displays symptoms
like:
Idolization of
computer
Mood alteration
Tolerance
Conflicts
LEADS TO
•Isolation
•Body diseases
•(e.g. obesity)
•Ophthalmic and
muscular problems
•Physical exercise
dereliction
•Absence either from
school or any other
place
Specifically, addicted users face serious
integration problems in the fields of work,
school an even in this society. In this way, The
addiction/overuse of the Net deprives every
person’s right of equal chances.
Electronic games that include violence, assassinations
etc. , may have serious impacts on the behavior and
character of youth. There is much evidence which
displays the connection between violent games and long
term anti-social and violent attitudes. The most fatal
danger that ambushes is the identification of the player
with the avatar.
When we say electronic
gambling we mean the
action where two or
more people contact
with each-other online
and bet. An action like
that can cause the loss
of real money.
Online misinformation is possible to happen with the
presentation of a various fake/untrue information on
websites that want to mislead us . Also, misinformation
happens even when our information is incomplete and as a
result people are led to wrong opinions.
Results:
People’s manipulation
Fanaticism & Violence
Democracy undermining
Usually, by saying inappropriate, we mean a content which
can cause mental disorder, shock or even promote wrong
attitude.
It can be caused by:
 Unreliable Websites
 Online Games
 E-mail
Unwanted messages
(spam)
Are the messages that
under normal
circumstances users
wouldn’t choose to see and
are delivered to a lot of
people.
For example, messages that
include promotion of
doubtful products , and
their content is related to
ψευδοτυχερα παιχνιδια,
ψευδονομικές υπηρεσίες,
κτλ.
Something really common is
the reception of chainmessages. These messages
are unwanted and the
expeditor asks the recipient
to promote the message to
other people he knows.
Grooming:
●
Is the process at which, pedophiles, pretending to
be minors, use the internet in order to attract
children with a view to abuse them.
●
žWeb pages with inadequate sexual content:
●
-Are humiliating the human personality
●
-Are infringing the right of children to innocence.
 Children's pornography is the representations of minors
that participate in sexual action or situations that imply
sexual activities. Sometimes the definition includes
pictures that have been photoshoped from computer. The
children's pornography is considered as crime and beings
in penal sanctions.
Our navigation online has many things in common with
reality.
 Whatever we do online always leaves traces!
Major infringements online are:
 Interception of our personal data
 Electronic fraud
 Malware
 Cyberbullying
Interception of our personal data
Cookies
Cookies are bits of information such
as username, registry details on a
website, preferences, online shopping
etc.
Legal companies use Cookies to
make offers to users who visit them
frequently. Illegal companies use
Cookies in order to collect user’s
information and sell them to
Marketing corporations.
Electronic fraud
Phishing:
Pharming:
It is a form of e-mail scam. As a
result, the user believes that he is
in a genuine website with real
URL.
“Phising” in the act in
which someone tries to
obtain information after
making sure he is disguised
to a trustworthy entity of
electronic communication.
During this tactic, experts
reveal personal data to a
false form online.
Malware
Virus:
The infection happens when a user is asked to receive a file… When
he tries to use it, virus spreads everywhere infecting his computer
system . It destroys other files and even the hard drive.
Trojan:
Is a malware that fools the user and
makes him believe that he carries
out a useful function while it
secretly installs other malwares as
well.
Worm:
A computer worm is self-replicating malware computer
program , which uses computer networks to send copies of
itself to other computer networks and may happen without
the user’s intervention.
 Spyware: A
program that
collects
information from
someone without
his approval.
 Adware: A Software that
displays or downloads
commercials
automatically on a
computer.
Cyberbullying
Bullying is possible to happen via the Internet, mainly via
the electronic post (email), blogs and chat rooms.
It includes intentional, repeated and hostile behavior
toward individual or team of individuals that want to cause
sentimental and psychological damage.
●
Forms of intimidation:
●
Teases amining at the amusement
●
Share of offensive reputation
●
Sexual Abuse
●
Libel in others via photographs,
messages and video in the internet