Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
THREATS ADDICTION A person who is addicted to the Net displays symptoms like: Idolization of computer Mood alteration Tolerance Conflicts LEADS TO •Isolation •Body diseases •(e.g. obesity) •Ophthalmic and muscular problems •Physical exercise dereliction •Absence either from school or any other place Specifically, addicted users face serious integration problems in the fields of work, school an even in this society. In this way, The addiction/overuse of the Net deprives every person’s right of equal chances. Electronic games that include violence, assassinations etc. , may have serious impacts on the behavior and character of youth. There is much evidence which displays the connection between violent games and long term anti-social and violent attitudes. The most fatal danger that ambushes is the identification of the player with the avatar. When we say electronic gambling we mean the action where two or more people contact with each-other online and bet. An action like that can cause the loss of real money. Online misinformation is possible to happen with the presentation of a various fake/untrue information on websites that want to mislead us . Also, misinformation happens even when our information is incomplete and as a result people are led to wrong opinions. Results: People’s manipulation Fanaticism & Violence Democracy undermining Usually, by saying inappropriate, we mean a content which can cause mental disorder, shock or even promote wrong attitude. It can be caused by: Unreliable Websites Online Games E-mail Unwanted messages (spam) Are the messages that under normal circumstances users wouldn’t choose to see and are delivered to a lot of people. For example, messages that include promotion of doubtful products , and their content is related to ψευδοτυχερα παιχνιδια, ψευδονομικές υπηρεσίες, κτλ. Something really common is the reception of chainmessages. These messages are unwanted and the expeditor asks the recipient to promote the message to other people he knows. Grooming: ● Is the process at which, pedophiles, pretending to be minors, use the internet in order to attract children with a view to abuse them. ● žWeb pages with inadequate sexual content: ● -Are humiliating the human personality ● -Are infringing the right of children to innocence. Children's pornography is the representations of minors that participate in sexual action or situations that imply sexual activities. Sometimes the definition includes pictures that have been photoshoped from computer. The children's pornography is considered as crime and beings in penal sanctions. Our navigation online has many things in common with reality. Whatever we do online always leaves traces! Major infringements online are: Interception of our personal data Electronic fraud Malware Cyberbullying Interception of our personal data Cookies Cookies are bits of information such as username, registry details on a website, preferences, online shopping etc. Legal companies use Cookies to make offers to users who visit them frequently. Illegal companies use Cookies in order to collect user’s information and sell them to Marketing corporations. Electronic fraud Phishing: Pharming: It is a form of e-mail scam. As a result, the user believes that he is in a genuine website with real URL. “Phising” in the act in which someone tries to obtain information after making sure he is disguised to a trustworthy entity of electronic communication. During this tactic, experts reveal personal data to a false form online. Malware Virus: The infection happens when a user is asked to receive a file… When he tries to use it, virus spreads everywhere infecting his computer system . It destroys other files and even the hard drive. Trojan: Is a malware that fools the user and makes him believe that he carries out a useful function while it secretly installs other malwares as well. Worm: A computer worm is self-replicating malware computer program , which uses computer networks to send copies of itself to other computer networks and may happen without the user’s intervention. Spyware: A program that collects information from someone without his approval. Adware: A Software that displays or downloads commercials automatically on a computer. Cyberbullying Bullying is possible to happen via the Internet, mainly via the electronic post (email), blogs and chat rooms. It includes intentional, repeated and hostile behavior toward individual or team of individuals that want to cause sentimental and psychological damage. ● Forms of intimidation: ● Teases amining at the amusement ● Share of offensive reputation ● Sexual Abuse ● Libel in others via photographs, messages and video in the internet