Download Ways in which Information can be misused

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Surveillance wikipedia , lookup

Internet vigilantism wikipedia , lookup

Information privacy law wikipedia , lookup

Transcript
Ways in which
Information can be
misused
By:Nastassja Grant
Tajea Taylor
Abigail White
Agenda
•
•
•
•
•
Violation of Privacy
Identity Theft
Storage of Inaccurate Information
Propaganda
Credit Card Fraud
Violation of Privacy
Definition
• Privacy in Information Technology refers to
the right of individuals to determine what
information is stored about them and how
that information should be used.
• Violation of Privacy is to breach the
boundaries and content of information that
is considered private to an individual or
group.
Breach of Information
Organizations such as businesses and government bodies,
hold private information on individuals, which are given
to them for specific purposes. Information given is often
times personal &/ sensitive, such as a person’s religion,
political affiliation or personal activities.
Breach of such information can cause:
• Defamation of character
• Identity theft
• Discrimination
• Personal embarrassment
• Damage to one’s professional reputation
Identity theft
It is a crime used to refer to fraud that
involves someone pretending to be
someone else in order to steal money or
get other benefits.
The person whose identity is used can
suffer various consequences when he or
she is held responsible for the
perpetrator's actions.
Identity theft can happen :
when a criminal uses stolen or fake
documents to open an account in
someone else's name.
 when a criminal tries to take over another
person's bank or credit card account, first
by gathering information about the
intended victim, then contacting their card
issuer masquerading as the genuine
cardholder
• Due to the increase of computers,
expansion of the internet and World
Wide Web applications it is extremely
important that information be stored
accurately.
• Data Integrity concerns the accuracy of
data.
• Data is said to be accurate when it
enters a system and does not become
inaccurate after processing.
Corruption of Data
 Stored Data becomes corrupted when it is
changed, deleted or substituted without
authorization. Data becomes inaccurate when it
is compromised in the following ways:
1. Through human error
2. Natural Disasters
3. Worms and Viruses
4. Hardware malfunctions
5. Fraud
6. Malicious deletion or changing of data
PROPAGANDA
Propaganda
Propaganda is the dissemination of
information aimed at influencing the
opinions or behaviors of people. As
opposed to impartially providing
information, propaganda in its most basic
sense, often presents information primarily
in order to influence its audience.
Types of Propaganda
 Assertion
 Bandwagon
 Card Stacking
 Glittering Generalities
 Lesser of Two Evils
 Pinpointing the
enemy
 Plain Folks
 Simplification
(Stereotyping)
 Testimonials
 Transfer
 Name Calling
Credit Card Fraud
Credit card fraud
 It is a wide-ranging term for theft and fraud
committed using a credit card or any similar
payment mechanism as a fraudulent source of
funds in a transaction.
 The purpose may be to obtain goods without
paying.
 It is only after the billing cycle of the relevant
credit card is completed, that the legitimate
cardholder may become aware of the
unauthorised transaction.
 There are various means by which these
numbers can be obtained:
From a credit card generator site on the Internet
From an unscrupulous retail merchant who
retains credit card numbers processed through a
retail outlet and uses them unlawfully
From offenders who utilise skimming machines
to record multiple credit card numbers via retail
outlets
From sourcing discarded copies of credit card
vouchers via waste receptacles
From hacking into computes where credit card
numbers are stored