mao p.cs.102.01

Post on 30-Nov-2014

94 Views

Category:

Devices & Hardware

1 Downloads

Preview:

Click to see full reader

DESCRIPTION

Networked Communication

TRANSCRIPT

Your Interactive Guide to the Digital World

Discovering Computers 2012

Zaman UniversityCourse: CS Application 102.01

Instructor: Mr. Mustafa DurDate: 04th June, 2014

Presenters :Phanara Mao

Ibrohim Aripov

ContentsCommunications and networksEmail (spam/phishing)Net neutralityBreaking trust Internet censorship Freedom of expressionChildren and inappropriate contentInternet addiction

Discovering Computers 2012: Chapter 9

CommunicationsComputer communications describes a process in which two or more computers or devices transfer data, instructions, and information one to another; and it consists of

1. Sending devices

2. Communications channels

3. Receiving devices

3Page 460

Discovering Computers 2012: Chapter 9

Networks

• A network is a collection of computers and devices connected together via communications devices and transmission media.

4

Email (Spam/Phishing)

Spam-is the abuse of electronic messaging system to send unsolicited bulk messaging indiscriminately

Types of spam :• Emil spam• IM Spam• USENET Newsgroup Spam • Web Searching Engine Spam• Blog Spam• Wiki Spam• Mobile Phone Messaging Spam

Email (Spam/Phishing)What can I do? Use Multiple email address Personal Business Spam Gmail Never just delete Report as Spam Never open an email that you think is spam Learn spam versus good

Phishing

Phishing-is a type of deception designed to steal your Valuable personal data, such as Credit card numbers, passwords, account data, or other information History of Phishing Phreaking + Fishing = phishing -Phreaking = making phone calls for free -fishing = use bait to lure the target

PhishingWhat to do?1) Detect and block the phishing Web sites in time2) Enhance the security of the web sites 3) Block the phishing e-mails by Various spam filters 4) Install online anti-phishing software in users computers

Net Neutrality• Net neutrality-is the principle that ISP and

governments should treat all data on the Internet equally.

• Net neutrality- is an important component of an open internet.

• Without N.N hard to communicate online, but easier for companies to censor our speech.

Net Neutrality• Without Net Neutrality, ISPs like AT&T, Comcast,

Time Warner Cable and Verizon will be able to block content and speech they don’t like.

Net Neutrality

• The open Internet rules, adopted in 2010, were designed to prevent ISP.

Breaking Trust

• Identity Theft• Definition: when someone uses your personal

information without your permission to commit fraud or other crime.

This can be done in various ways like using someone’s Name. Social security number.Credit card number.Bank account number.Etc.

Breaking Trust

Chat Room Predators• Chat room : supports real-time discussions

among many people connected to network

Breaking TrustCyber bullying

• What Is Cyber bullying?• Cyber bullying is the use of technology to burn,

scare, confuse, or target another person. • By definition, it occurs among young people.

When an adult is involved, it may meet the definition of cyber-harassment or cyber-stalking, a crime that can have legal consequences and involve jail time.

15

Internet CensorshipInternet censorship is the control or suppression

 of what can be accessed,

published, or viewed on the Internet.

Discovering Computers 2012: Chapter 9

16

Internet CensorshipNorth Korea. All websites are under government control.

About 4% of the population has Internet access.

Today, U. (2014, February 5). Top 10 Internet-censored countries. USA Today. Retrieved June 2, 2014, from http://www.usatoday.com/story/news/world/2014/02/05/top-ten-internet-censors/5222385/

17

Internet Censorship3. China. China has the most rigid censorship program in the world. The government filters searches, block sites and erases "inconvenient" content, rerouting search terms on Taiwan independence or the Tiananmen Square massacre to items favorable to the Communist Party.

Today, U. (2014, February 5). Top 10 Internet-censored countries. USA Today. Retrieved June 2, 2014, from http://www.usatoday.com/story/news/world/2014/02/05/top-ten-internet-censors/5222385/

18

Internet Censorship

Discovering Computers 2012: Chapter 9

Government

Dislike governmental criticisms: social media

Keep information secretly

19

Internet Censorship

Discovering Computers 2012: Chapter 9

Individuals and organizations may engage in self-censorship for

moral,

religious, or

business reasons,

To conform to societal norms, due to

intimidation, or

out of fear of legal, or

other consequences.

20

Freedom of ExpressionUser choice and control, which allow individuals to decide • What to say,• Publish and• Access online;

are essential parts of protecting free expression rights.

Discovering Computers 2012: Chapter 9

Discovering Computers 2012: Chapter 9 21

22

Children and Inappropriate Contents

Discovering Computers 2012: Chapter 9

Websites that promote self-harm, e.g., sites that encourage suicide, drug use and other anti-social behavior

Discovering Computers 2012: Chapter 9 23

24

Internet addiction

Young Internet addicts on the rise. (n.d.). Young Internet addicts on the rise. Retrieved June 3, 2014, from http://www.chinadaily.com.cn/china/2010-02/03/content_9417660.htm

25

Internet addiction

Young Internet addicts on the rise. (n.d.). Young Internet addicts on the rise. Retrieved June 3, 2014, from http://www.chinadaily.com.cn/china/2010-02/03/content_9417660.htm

Discovering Computers 2012: Chapter 9 27

28

Internet addiction

Center for Democracy & Technology | Keeping the Internet Open, Innovative and Free. (n.d.). Free Expression. Retrieved

June 3, 2014, from https://cdt.org/issue/free-expression/

ReferencesCenter for Democracy & Technology | Keeping the Internet Open, Innovative

and Free. (n.d.). Free Expression. Retrieved June 3, 2014, from https://cdt.org/issue/free-expression/

Dur, M. (Director) (2014, March 5). Networked Communication . General Lectures. Lecture conducted from Zaman University, Phnom

Penh.

Shelly, G. B., & Vermaat, M. (2010). Networked Communication . Discovering computers (pp. 458-511). Boston: Nicole Pinard.

Today, U. (2014, February 5). Top 10 Internet-censored countries. USA Today. Retrieved June 2, 2014, from http://www.usatoday.com/story/news/world

/2014/02/05/top-ten-internet-censors/5222385/

Young Internet addicts on the rise. (n.d.). Young Internet addicts on the rise. Retrieved June 3, 2014, from

http://www.chinadaily.com.cn/china/2010-02/03/content_9417660.htm

Thank for listening!

It’s about time to have Q & A!

top related