SlideShare una empresa de Scribd logo
1 de 18
Descargar para leer sin conexión
Misuse of Computer
• Computers are a central part of everyday life.
• People use them to keep records, purchase items, balance checkbooks, and find
entertainment.
• Computers make lives easier with their ability to find information quickly.
• Communications for personal and business uses are faster and more efficient than ever
before, and with all the positive aspects of computer use come the negatives.
• Misuse of computer technology is a deviant activity with possible legal ramifications for the
perpetrators.
IMPORTANCE OF
COMPUTER
• Businesses, government and academic institutions are increasingly reliant on the Internet for
their day-to-day business, while consumers are using e-commerce more and more for
purchasing goods and services.
• This implies ever-increasing opportunities for hackers and virus writers to disrupt the
activities of their fellow citizens.
• Hacking first became a prominent issue in the 1980's, with the publicity achieved by exploits
such as the Internet Worm, but at that time it was not clear how law enforcement agencies
could best tackle this new threat.
• Hackers were not causing physical damage to anyone's property; if they refrained from
modifying files but simply logged on to a system without permission, it was hard to see what
crime they could be committing under existing law apart from the theft of a negligible amount
of electricity.
COMPUTER MISUSE
• An incident that many people might not think of as computer abuse is creating a fake social
media account.
• If the social media service’s terms and conditions require users to provide accurate
information about their identities when creating an account, they could be prosecuted under
the CFAA (Computer Fraud and Abuse Act).
• Another example of the unintended consequences of expanding the Computer Fraud and
Abuse Act was the threat of a 35-year prison sentence for internet activist Aaron Swartz for
allegedly downloading millions of academic articles to which access was restricted through a
subscription service, probably with the intent to freely distribute them.
EXAMPLES OF MISUSE
1. Career and Social Networking :
Career networking websites allow professionals to post profiles describing their work
experience and current position. Using career networking sites encourages communication
between professionals within the same and related industries. Human resource departments
use these sites to recruit new employees. Social networking sites are geared toward a person's
social life. These sites make it easy to stay in touch with friends and family that move away.
Users can post pictures, videos and some sites even allow blogging. Many people use popular
social networking sites like Facebook to promote their own business.
WAYS IN WHICH COMPUTER CAN
CAUSE HARM
2. Entertainment :
Computers are vehicles for many forms of entertainment. The Internet features movies, video
games and music and all are available for downloading. In the absence of the Internet, games
can be purchased at retail stores and installed on the computer. Movies can be viewed from a
computer that has the proper software and online gaming sites allow users to play with other
members globally. Some websites allow members to upload videos of funny situations and
events.
WAYS IN WHICH COMPUTER CAN
CAUSE HARM
3. Cybercrime
White-collar crimes can involve the misuse of computers. Economic white-collar crimes include
embezzlement, fraud, racketeering, and money laundering. White-collar crime has risen with the
ease of conducting fraudulent business transactions at the great distances computers provide.
Other computer misusers, called hackers, create and spread viruses via the Internet that crash
systems and steal personal information. Bank account and credit histories are then
compromised with the use of this information.
WAYS IN WHICH COMPUTER CAN
CAUSE HARM
4. Cyberbullying
Cyberbullying is the act by a minor of directing verbal assaults and/or death threats towards
another minor. Cyberbullying-by-proxy is the act of a minor aiding another with the bullying of a
target. Cyberbullying has legal ramifications, and depending on the child's age, they will be
charged with a misdemeanor or an act of juvenile delinquency. More serious state and federal
charges will result if their actions include hacking or stealing personal information. Schools have
recently implemented programs to teach students of the effects and dangers of cyberbullying
WAYS IN WHICH COMPUTER CAN
CAUSE HARM
Misuse of computers and communications systems comes in several forms:
Hacking
Hacking is where an unauthorised person uses a network, Internet or modemconnection to gain
access past security passwords or other security to see data stored on another computer.
Hackers sometimes use software hacking tools and often target, for example, particular sites on
the Internet.
Viruses
Viruses are relatively simple programs written by people and designed to cause nuisance or
damage to computers or their files.
TYPES OF COMPUTER MISUSE
Data misuse and unauthorised transfer or copying
Copying and illegal transfer of data is very quick and easy using online computers and large
storage devices such as hard disks, memory sticks and DVDs. Personal data, company
research and written work, such as novels and textbooks, cannot be copied without the
copyright holder's permission.
TYPES OF COMPUTER MISUSE
Copying and distributing copyrighted software, music and film
This includes copying music and movies with computer equipment and distributing it on the
Internet without the copyright holder's permission. This is a widespread misuse of both
computers and the Internet that breaks copyright regulations.
TYPES OF COMPUTER MISUSE
Email and chat room abuses
Internet services such as chat rooms and email have been the subject of many well-publicised
cases of impersonation and deception where people who are online pretend to have a different
identity. Chat rooms have been used to spread rumours about well known personalities. A
growing area of abuse of the Internet is email spam, where millions of emails are sent to
advertise both legal and illegal products and services.
TYPES OF COMPUTER MISUSE
Identity and financial abuses
This topic includes misuse of stolen or fictional credit card numbers to obtain goods or services
on the Internet, and use of computers in financial frauds. These can range from complex well
thought out deceptions to simple uses such as printing counterfeit money with colour printers.
TYPES OF COMPUTER MISUSE
The Computer Misuse Act (1990)
This was passed by Parliament and made three new offences:
• Accessing computer material without permission, e.g. looking at someone else's files.
• Accessing computer material without permission with intent to commit further criminal
offences, e.g. hacking into the bank's computer and wanting to increase the amount in your
account.
• Altering computer data without permission, e.g. writing a virus to destroy someone else's
data, or actually changing the money in an account.
STEPS TAKEN AGAINST THIS ABUSE
The Data Protection Act
This was introduced to regulate personal data. This helps to provide protection against the
abuse of personal information. Find out more about the Data Protection Act.
Copyright law
This provides protection to the owners of the copyright and covers the copying of written,
musical, or film works using computers. FAST is the industry body which is against software
theft. You can find out more about it in the Copyright section.
There have been cases where laws such as Copyright have been used to crack down on file
sharing websites or individuals who store and illegally distribute copyrighted material, eg music.
There is a massive problem with many people around the world obtaining copyrighted material
illegally.
STEPS TAKEN AGAINST THIS ABUSE
STEPS TAKEN AGAINST THIS ABUSE
Close down chat rooms
• Some chat rooms have been closed down due to abuses, especially where
children are vulnerable.
• Some have moderators who help to prevent abuses. Advice about sensible use is
important; especially to never give personal contact details or arrange meetings
without extreme caution.
Reduce email spamming
This may be reduced by:
• Never replying to anonymous emails.
• Setting filters on email accounts.
• Reporting spammers to ISPs, who are beginning to get together to blacklist email abusers.
• Governments passing laws to punish persistent spammers with heavy fines.
STEPS TAKEN AGAINST THIS ABUSE
The End

Más contenido relacionado

La actualidad más candente

Cybercrime
CybercrimeCybercrime
CybercrimeKomal003
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber securitySelf-employed
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security PresentationPraphullaShrestha1
 
Computer And The Law
Computer And The LawComputer And The Law
Computer And The LawSaimaRafiq
 
3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security riskshazirma
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security AwarenessInnocent Korie
 
Cyber threats
Cyber threatsCyber threats
Cyber threatskelsports
 
Zero-Day Vulnerability and Heuristic Analysis
Zero-Day Vulnerability and Heuristic AnalysisZero-Day Vulnerability and Heuristic Analysis
Zero-Day Vulnerability and Heuristic AnalysisAhmed Banafa
 
Presentation on Software Piracy
Presentation on Software PiracyPresentation on Software Piracy
Presentation on Software PiracyPallavi Agarwal
 
Basic Security Chapter 1
Basic Security Chapter 1Basic Security Chapter 1
Basic Security Chapter 1AfiqEfendy Zaen
 
Security vulnerability
Security vulnerabilitySecurity vulnerability
Security vulnerabilityA. Shamel
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!Asma Hossain
 
Threats to information security
Threats to information securityThreats to information security
Threats to information securityswapneel07
 

La actualidad más candente (20)

Cybercrime
CybercrimeCybercrime
Cybercrime
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Computer And The Law
Computer And The LawComputer And The Law
Computer And The Law
 
3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security risks
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
cyber security
cyber securitycyber security
cyber security
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Cyber threats
Cyber threatsCyber threats
Cyber threats
 
Zero-Day Vulnerability and Heuristic Analysis
Zero-Day Vulnerability and Heuristic AnalysisZero-Day Vulnerability and Heuristic Analysis
Zero-Day Vulnerability and Heuristic Analysis
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Presentation on Software Piracy
Presentation on Software PiracyPresentation on Software Piracy
Presentation on Software Piracy
 
Basic Security Chapter 1
Basic Security Chapter 1Basic Security Chapter 1
Basic Security Chapter 1
 
Security vulnerability
Security vulnerabilitySecurity vulnerability
Security vulnerability
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!
 
Phishing and hacking
Phishing and hackingPhishing and hacking
Phishing and hacking
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
 
Threats to information security
Threats to information securityThreats to information security
Threats to information security
 
Cyber security
Cyber securityCyber security
Cyber security
 

Similar a Misuse of computer

Computer Miss-use and Criminal Law
Computer Miss-use and Criminal Law Computer Miss-use and Criminal Law
Computer Miss-use and Criminal Law sohaildanish
 
Legal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptxLegal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptxfatimagull32
 
Computer misuse and criminal law
Computer misuse and criminal lawComputer misuse and criminal law
Computer misuse and criminal lawZaheer Irshad
 
2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptxSSPTRGCELL
 
PPT-GEL Cyber Libel and Cyber Crime Protection.pptx
PPT-GEL Cyber Libel and Cyber Crime Protection.pptxPPT-GEL Cyber Libel and Cyber Crime Protection.pptx
PPT-GEL Cyber Libel and Cyber Crime Protection.pptxzyleflorence
 
Cybercrime
CybercrimeCybercrime
CybercrimeSERCOD
 
Information Technology and IT act
Information Technology and IT actInformation Technology and IT act
Information Technology and IT actDivesh Mewara
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Anshuman Tripathi
 
Identity Theft: Evolving with Technology
Identity Theft: Evolving with TechnologyIdentity Theft: Evolving with Technology
Identity Theft: Evolving with Technology- Mark - Fullbright
 
GEL 221 - Group 1 PPT (Cyber Libel & Security).pptx
GEL 221 - Group 1 PPT (Cyber Libel & Security).pptxGEL 221 - Group 1 PPT (Cyber Libel & Security).pptx
GEL 221 - Group 1 PPT (Cyber Libel & Security).pptxzyleflorence
 
What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?FarjanaMitu3
 
Cyber Crime, Cyber Space and Effects .pptx
Cyber Crime, Cyber Space and Effects .pptxCyber Crime, Cyber Space and Effects .pptx
Cyber Crime, Cyber Space and Effects .pptxSahilMishra81
 
Cyber Crime Cyber Space and Effects .pptx
Cyber Crime Cyber Space and Effects .pptxCyber Crime Cyber Space and Effects .pptx
Cyber Crime Cyber Space and Effects .pptxSahilMishra81
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 

Similar a Misuse of computer (20)

Computer Miss-use and Criminal Law
Computer Miss-use and Criminal Law Computer Miss-use and Criminal Law
Computer Miss-use and Criminal Law
 
Legal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptxLegal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptx
 
cyber crime
cyber crimecyber crime
cyber crime
 
Computer misuse and criminal law
Computer misuse and criminal lawComputer misuse and criminal law
Computer misuse and criminal law
 
Misuse of Internet
Misuse of InternetMisuse of Internet
Misuse of Internet
 
2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
PPT-GEL Cyber Libel and Cyber Crime Protection.pptx
PPT-GEL Cyber Libel and Cyber Crime Protection.pptxPPT-GEL Cyber Libel and Cyber Crime Protection.pptx
PPT-GEL Cyber Libel and Cyber Crime Protection.pptx
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
Information Technology and IT act
Information Technology and IT actInformation Technology and IT act
Information Technology and IT act
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
Identity Theft: Evolving with Technology
Identity Theft: Evolving with TechnologyIdentity Theft: Evolving with Technology
Identity Theft: Evolving with Technology
 
GEL 221 - Group 1 PPT (Cyber Libel & Security).pptx
GEL 221 - Group 1 PPT (Cyber Libel & Security).pptxGEL 221 - Group 1 PPT (Cyber Libel & Security).pptx
GEL 221 - Group 1 PPT (Cyber Libel & Security).pptx
 
CYBER SAFETY.pptx
CYBER SAFETY.pptxCYBER SAFETY.pptx
CYBER SAFETY.pptx
 
What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?
 
Cyber Crime, Cyber Space and Effects .pptx
Cyber Crime, Cyber Space and Effects .pptxCyber Crime, Cyber Space and Effects .pptx
Cyber Crime, Cyber Space and Effects .pptx
 
Cyber Crime Cyber Space and Effects .pptx
Cyber Crime Cyber Space and Effects .pptxCyber Crime Cyber Space and Effects .pptx
Cyber Crime Cyber Space and Effects .pptx
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 

Más de Muhammad Haroon

Basic blocks and flow graph in Compiler Construction
Basic blocks and flow graph in Compiler ConstructionBasic blocks and flow graph in Compiler Construction
Basic blocks and flow graph in Compiler ConstructionMuhammad Haroon
 
Address in the target code in Compiler Construction
Address in the target code in Compiler ConstructionAddress in the target code in Compiler Construction
Address in the target code in Compiler ConstructionMuhammad Haroon
 
Code generator in Compiler Construction
Code generator in Compiler ConstructionCode generator in Compiler Construction
Code generator in Compiler ConstructionMuhammad Haroon
 
Target language in compiler design
Target language in compiler designTarget language in compiler design
Target language in compiler designMuhammad Haroon
 
Heap management in Compiler Construction
Heap management in Compiler ConstructionHeap management in Compiler Construction
Heap management in Compiler ConstructionMuhammad Haroon
 
Storage organization and stack allocation of space
Storage organization and stack allocation of spaceStorage organization and stack allocation of space
Storage organization and stack allocation of spaceMuhammad Haroon
 
Backpatching in Compiler Construction
Backpatching in Compiler ConstructionBackpatching in Compiler Construction
Backpatching in Compiler ConstructionMuhammad Haroon
 
Type checking in Compiler Construction
Type checking in Compiler ConstructionType checking in Compiler Construction
Type checking in Compiler ConstructionMuhammad Haroon
 
Type conversion in Compiler Construction
Type conversion in Compiler ConstructionType conversion in Compiler Construction
Type conversion in Compiler ConstructionMuhammad Haroon
 
Semantic analysis in Compiler Construction
Semantic analysis in Compiler ConstructionSemantic analysis in Compiler Construction
Semantic analysis in Compiler ConstructionMuhammad Haroon
 
Intermediate code and three address instructions
Intermediate code and three address instructionsIntermediate code and three address instructions
Intermediate code and three address instructionsMuhammad Haroon
 
LR(0) parser in Compiler Consturction
LR(0) parser in Compiler ConsturctionLR(0) parser in Compiler Consturction
LR(0) parser in Compiler ConsturctionMuhammad Haroon
 
LR(1) CLR(1) Parser with Example
LR(1) CLR(1) Parser with ExampleLR(1) CLR(1) Parser with Example
LR(1) CLR(1) Parser with ExampleMuhammad Haroon
 
Powerful presentation components and skills
Powerful presentation components and skillsPowerful presentation components and skills
Powerful presentation components and skillsMuhammad Haroon
 
Terms of reference in Professional Practices
Terms of reference in Professional PracticesTerms of reference in Professional Practices
Terms of reference in Professional PracticesMuhammad Haroon
 
7 habits of highly effective people
7 habits of highly effective people7 habits of highly effective people
7 habits of highly effective peopleMuhammad Haroon
 
Soft skills in Profession
Soft skills in ProfessionSoft skills in Profession
Soft skills in ProfessionMuhammad Haroon
 

Más de Muhammad Haroon (20)

Basic blocks and flow graph in Compiler Construction
Basic blocks and flow graph in Compiler ConstructionBasic blocks and flow graph in Compiler Construction
Basic blocks and flow graph in Compiler Construction
 
Address in the target code in Compiler Construction
Address in the target code in Compiler ConstructionAddress in the target code in Compiler Construction
Address in the target code in Compiler Construction
 
Code generator in Compiler Construction
Code generator in Compiler ConstructionCode generator in Compiler Construction
Code generator in Compiler Construction
 
Target language in compiler design
Target language in compiler designTarget language in compiler design
Target language in compiler design
 
Heap management in Compiler Construction
Heap management in Compiler ConstructionHeap management in Compiler Construction
Heap management in Compiler Construction
 
Storage organization and stack allocation of space
Storage organization and stack allocation of spaceStorage organization and stack allocation of space
Storage organization and stack allocation of space
 
Backpatching in Compiler Construction
Backpatching in Compiler ConstructionBackpatching in Compiler Construction
Backpatching in Compiler Construction
 
Type checking in Compiler Construction
Type checking in Compiler ConstructionType checking in Compiler Construction
Type checking in Compiler Construction
 
Type conversion in Compiler Construction
Type conversion in Compiler ConstructionType conversion in Compiler Construction
Type conversion in Compiler Construction
 
Semantic analysis in Compiler Construction
Semantic analysis in Compiler ConstructionSemantic analysis in Compiler Construction
Semantic analysis in Compiler Construction
 
Intermediate code and three address instructions
Intermediate code and three address instructionsIntermediate code and three address instructions
Intermediate code and three address instructions
 
LALR(1) parser
LALR(1) parserLALR(1) parser
LALR(1) parser
 
LR(0) parser in Compiler Consturction
LR(0) parser in Compiler ConsturctionLR(0) parser in Compiler Consturction
LR(0) parser in Compiler Consturction
 
SLR(1) parser
SLR(1) parserSLR(1) parser
SLR(1) parser
 
LR(1) CLR(1) Parser with Example
LR(1) CLR(1) Parser with ExampleLR(1) CLR(1) Parser with Example
LR(1) CLR(1) Parser with Example
 
Powerful presentation components and skills
Powerful presentation components and skillsPowerful presentation components and skills
Powerful presentation components and skills
 
Terms of reference in Professional Practices
Terms of reference in Professional PracticesTerms of reference in Professional Practices
Terms of reference in Professional Practices
 
Code of conduct .
Code of conduct .Code of conduct .
Code of conduct .
 
7 habits of highly effective people
7 habits of highly effective people7 habits of highly effective people
7 habits of highly effective people
 
Soft skills in Profession
Soft skills in ProfessionSoft skills in Profession
Soft skills in Profession
 

Último

IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 

Último (20)

IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 

Misuse of computer

  • 2. • Computers are a central part of everyday life. • People use them to keep records, purchase items, balance checkbooks, and find entertainment. • Computers make lives easier with their ability to find information quickly. • Communications for personal and business uses are faster and more efficient than ever before, and with all the positive aspects of computer use come the negatives. • Misuse of computer technology is a deviant activity with possible legal ramifications for the perpetrators. IMPORTANCE OF COMPUTER
  • 3. • Businesses, government and academic institutions are increasingly reliant on the Internet for their day-to-day business, while consumers are using e-commerce more and more for purchasing goods and services. • This implies ever-increasing opportunities for hackers and virus writers to disrupt the activities of their fellow citizens. • Hacking first became a prominent issue in the 1980's, with the publicity achieved by exploits such as the Internet Worm, but at that time it was not clear how law enforcement agencies could best tackle this new threat. • Hackers were not causing physical damage to anyone's property; if they refrained from modifying files but simply logged on to a system without permission, it was hard to see what crime they could be committing under existing law apart from the theft of a negligible amount of electricity. COMPUTER MISUSE
  • 4. • An incident that many people might not think of as computer abuse is creating a fake social media account. • If the social media service’s terms and conditions require users to provide accurate information about their identities when creating an account, they could be prosecuted under the CFAA (Computer Fraud and Abuse Act). • Another example of the unintended consequences of expanding the Computer Fraud and Abuse Act was the threat of a 35-year prison sentence for internet activist Aaron Swartz for allegedly downloading millions of academic articles to which access was restricted through a subscription service, probably with the intent to freely distribute them. EXAMPLES OF MISUSE
  • 5. 1. Career and Social Networking : Career networking websites allow professionals to post profiles describing their work experience and current position. Using career networking sites encourages communication between professionals within the same and related industries. Human resource departments use these sites to recruit new employees. Social networking sites are geared toward a person's social life. These sites make it easy to stay in touch with friends and family that move away. Users can post pictures, videos and some sites even allow blogging. Many people use popular social networking sites like Facebook to promote their own business. WAYS IN WHICH COMPUTER CAN CAUSE HARM
  • 6. 2. Entertainment : Computers are vehicles for many forms of entertainment. The Internet features movies, video games and music and all are available for downloading. In the absence of the Internet, games can be purchased at retail stores and installed on the computer. Movies can be viewed from a computer that has the proper software and online gaming sites allow users to play with other members globally. Some websites allow members to upload videos of funny situations and events. WAYS IN WHICH COMPUTER CAN CAUSE HARM
  • 7. 3. Cybercrime White-collar crimes can involve the misuse of computers. Economic white-collar crimes include embezzlement, fraud, racketeering, and money laundering. White-collar crime has risen with the ease of conducting fraudulent business transactions at the great distances computers provide. Other computer misusers, called hackers, create and spread viruses via the Internet that crash systems and steal personal information. Bank account and credit histories are then compromised with the use of this information. WAYS IN WHICH COMPUTER CAN CAUSE HARM
  • 8. 4. Cyberbullying Cyberbullying is the act by a minor of directing verbal assaults and/or death threats towards another minor. Cyberbullying-by-proxy is the act of a minor aiding another with the bullying of a target. Cyberbullying has legal ramifications, and depending on the child's age, they will be charged with a misdemeanor or an act of juvenile delinquency. More serious state and federal charges will result if their actions include hacking or stealing personal information. Schools have recently implemented programs to teach students of the effects and dangers of cyberbullying WAYS IN WHICH COMPUTER CAN CAUSE HARM
  • 9. Misuse of computers and communications systems comes in several forms: Hacking Hacking is where an unauthorised person uses a network, Internet or modemconnection to gain access past security passwords or other security to see data stored on another computer. Hackers sometimes use software hacking tools and often target, for example, particular sites on the Internet. Viruses Viruses are relatively simple programs written by people and designed to cause nuisance or damage to computers or their files. TYPES OF COMPUTER MISUSE
  • 10. Data misuse and unauthorised transfer or copying Copying and illegal transfer of data is very quick and easy using online computers and large storage devices such as hard disks, memory sticks and DVDs. Personal data, company research and written work, such as novels and textbooks, cannot be copied without the copyright holder's permission. TYPES OF COMPUTER MISUSE
  • 11. Copying and distributing copyrighted software, music and film This includes copying music and movies with computer equipment and distributing it on the Internet without the copyright holder's permission. This is a widespread misuse of both computers and the Internet that breaks copyright regulations. TYPES OF COMPUTER MISUSE
  • 12. Email and chat room abuses Internet services such as chat rooms and email have been the subject of many well-publicised cases of impersonation and deception where people who are online pretend to have a different identity. Chat rooms have been used to spread rumours about well known personalities. A growing area of abuse of the Internet is email spam, where millions of emails are sent to advertise both legal and illegal products and services. TYPES OF COMPUTER MISUSE
  • 13. Identity and financial abuses This topic includes misuse of stolen or fictional credit card numbers to obtain goods or services on the Internet, and use of computers in financial frauds. These can range from complex well thought out deceptions to simple uses such as printing counterfeit money with colour printers. TYPES OF COMPUTER MISUSE
  • 14. The Computer Misuse Act (1990) This was passed by Parliament and made three new offences: • Accessing computer material without permission, e.g. looking at someone else's files. • Accessing computer material without permission with intent to commit further criminal offences, e.g. hacking into the bank's computer and wanting to increase the amount in your account. • Altering computer data without permission, e.g. writing a virus to destroy someone else's data, or actually changing the money in an account. STEPS TAKEN AGAINST THIS ABUSE
  • 15. The Data Protection Act This was introduced to regulate personal data. This helps to provide protection against the abuse of personal information. Find out more about the Data Protection Act. Copyright law This provides protection to the owners of the copyright and covers the copying of written, musical, or film works using computers. FAST is the industry body which is against software theft. You can find out more about it in the Copyright section. There have been cases where laws such as Copyright have been used to crack down on file sharing websites or individuals who store and illegally distribute copyrighted material, eg music. There is a massive problem with many people around the world obtaining copyrighted material illegally. STEPS TAKEN AGAINST THIS ABUSE
  • 16. STEPS TAKEN AGAINST THIS ABUSE Close down chat rooms • Some chat rooms have been closed down due to abuses, especially where children are vulnerable. • Some have moderators who help to prevent abuses. Advice about sensible use is important; especially to never give personal contact details or arrange meetings without extreme caution.
  • 17. Reduce email spamming This may be reduced by: • Never replying to anonymous emails. • Setting filters on email accounts. • Reporting spammers to ISPs, who are beginning to get together to blacklist email abusers. • Governments passing laws to punish persistent spammers with heavy fines. STEPS TAKEN AGAINST THIS ABUSE