Measures of Dispersion and Variability: Range, QD, AD and SD
OLC Presentation Jipson
1. Be Careful what You Post: The Myth of Internet Privacy Dr. Art Jipson University of Dayton Criminal Justice Studies Program Sociology, Anthropology, and Social Work
3. Internet Privacy Laws “ Enjoying the right to privacy means having control over your own personal data and the ability to grant or deny access to others.”
14. Terrorist Information Awareness USA PATRIOT ACT TIA Objective Surveillance of communications is an essential tool to pursue and stop terrorists. This new law will allow surveillance of all communications used by terrorists, including e-mails, the Internet, and cell phones. To revolutionize the ability of the United States to detect, classify and identify foreign terrorists – and decipher their plans – and thereby enable the U.S. to take timely action to successfully preempt and defeat terrorist acts. Strategy Law enforcement agencies have to get a new warrant for each new district they investigate, even when they're after the same suspect. Under this new law, warrants are valid across all districts and across all states. And, finally, the new legislation greatly enhances the penalties that will fall on terrorists or anyone who helps them. The project would scan the Internet and commercial databases for electronic evidence of terrorist preparations. Intelligence and law enforcement officials would check -- without warrants -- travel and credit card records, Internet mail and banking transactions, new driver's license records and more. Criticism The government may now spy on web surfing of innocent Americans, including terms entered into search engines, by merely telling a judge anywhere in the U.S. that the spying could lead to information that is "relevant" to an ongoing criminal investigation. The person spied on does not have to be the target of the investigation. This would create systematic surveillance of Americans on home soil. He is proposing to make government a peeper into lawful transactions among private citizens.
19. Have you been spammed? Junk mail … flooding the Internet (Usenet and/or e-mail) with many unsolicited copies of the same message, in an attempt to force the message on people who would not otherwise choose to receive it.
20.
21. Spambots are looking for you! Spambots are programs that search and automatically extract e-mail addresses, which are then used as targets for spam.
32. Advertisement Competition A browser window "plug-in" comes bundled with software that hovers pop-ups over competitors advertisement banners Free, advertising supported application for filling in forms
33. Hijackware Hidden application could turn every computer running Kazaa into a node of a private network called Altnet and controlled by Brilliant Digital. http://news.com.com/2102-1023-875274.html SETI without the ethics! Free file sharing software
34. What can Librarians Do? Educate yourself so you can inform the patrons of the library
35.
36.
37. Encrypted e-mail P retty G ood P rivacy GPG (GNU Privacy Guard) is a PGP compatible alternative replacement based on the OpenPGP standard http://www.gnupg.org/
38.
39. P3P Tool Privacy Bird automatically searches for privacy policies at every website you visit http://www.privacybird.com/ The bird icon alerts you about Web site privacy policies with a visual symbol and optional sounds.
56. Universal Web Filter Proxomitron eliminate cyber-spam like pop-up windows, alerts, banners, animated GIFs, auto-play music, sounds, dynamic HTML, Java and more http://www.spamblocked.com/proxomitron/ transforms web pages on the fly turn off some of those fancy new HTML features that web browsers support
58. Where is the source? http://www.neoworx.com/products/ntx/default.asp
59. Provide accurate personal information ONLY if appropriate for the services requested. Would you give personal information to strangers? 24% of users have supplied false information Create a Virtual User John Smith 7/7/77 blue eyes red hair