Sunteți pe pagina 1din 22

Dr.

Imran Ali Jokhio 6/4/2011

Internet
If I have been able to see farther than others, it was because I stood on the shoulders of giants. Sir Issac Newton.

Dr. Imran Ali Jokhio 6/4/2011

Internet
Network of networks Information sharing (Textual) Content processing/sharing (Text, audio, video and live streaming) Internet messengers, Email, Blogs, Blogs, Social networking websites Live feeds RSS and ATOM. Online Communities Search Engines

Dr. Imran Ali Jokhio 6/4/2011

Internet
Access to Giant Information Repository Uncensored and unregulated. Internet an enhanced channel. More audiences Faster propagation

Dr. Imran Ali Jokhio 6/4/2011

Intellectual Property Rights (IPR)


Creators are entitled for their work:
inventions, writing and works of art.

Patents Redistribution of a work without prior knowledge of owner is violation of IPR.

Dr. Imran Ali Jokhio 6/4/2011

Copy rights
Copyrights are the exclusive rights of authors to duplicate, publish and sell their materials. This holds for Internet too! Uploading and downloading any material (book, software, music, video etc) without prior knowledge of owner is illegal.

Dr. Imran Ali Jokhio 6/4/2011

Software license
Single user license Multiple user license Trial license Shareware Open Source Community software

Dr. Imran Ali Jokhio 6/4/2011

Data privacy
Confidentiality Personal data
Name, phone number, email address, home address, medical record, date of birth, mothers name etc.

NoneNone-personal data
Randomized data

Dr. Imran Ali Jokhio 6/4/2011

Authorized access
Identity verification

Policy definition

Authorized access

Dr. Imran Ali Jokhio 6/4/2011

10

Unauthorized Access
Sometimes also known as hacking Breaking into computer networks Bypassing passwords Defacing and/or damaging Internet Web sites Launching a denial of service attack on the a Web site or network (denial of Service attack may be defined for layman) Stealing valuable information, such as passwords and credit card data

Dr. Imran Ali Jokhio 6/4/2011

11

Cracking
Breaking software keys Getting unauthorized access And using it for criminal activities

Dr. Imran Ali Jokhio 6/4/2011

12

Protecting from unauthorized access


Use an anti-virus software with antiregular download and installation of the ani-virus updates aniUse a firewall and test it regularly Check for spy-ware on your spysystem Learn how to use password and encryption correctly Choosing sensible passwords and changing on regularly

Dr. Imran Ali Jokhio 6/4/2011

13

Internet indecent material


Children and young people can access indecent material easily over the Internet.
Nudity, Fundamentalism and extremism, Religious and ethnic hatred Misguiding sources of information

Filter software, firewall must be used to block indecent material. Logs may be checked to ensure the blockage. Computer may be placed in a prominent area of your house.

Dr. Imran Ali Jokhio 6/4/2011

14

Internet indecent material


Parental control and guidance are the best ways. ways. Cyber patrol Cyber Snoop http://www.cyberport.com http://www.pearlsw.com

Family connect http://www.familyconnect.com Internet Filter X-stop and many more http://www.turnercom.com/if/press1.html http://www.xstop.com

Dr. Imran Ali Jokhio 6/4/2011

15

Spam
Junk emails Lucrative and tempting emails Lottery emails Fake work, study and degree offers Dodgy websites Dodgy applications

Dr. Imran Ali Jokhio 6/4/2011

16

Plagiarism

Dr. Imran Ali Jokhio 6/4/2011

17

Plagiarism
Unauthorized use or close imitation of the language Thoughts of another author and the representation of them as one's own original work You could be punished, suspended, or even expelled.

Dr. Imran Ali Jokhio 6/4/2011

18

Accidental plagiarism
When an author may miss some of citations unintentionally

Proper note taking, careful writing and proof reading can avoid accidental plagiarism.

Dr. Imran Ali Jokhio 6/4/2011

19

Avoiding Plagiarism
When directly quoting another author, the writer must:
Accurately quote the original author's words. Enclose the quotation within quotation marks. Follow quotation using an in-text citation [e.g., p. 276] inIntroduce the quotation with phrase that includes the author's name Provide a list of references with full citation information at the end of the write-up. write-

Dr. Imran Ali Jokhio 6/4/2011

20

Avoiding Plagiarism
When paraphrasing another author, the writer must:
Paraphrasing or summarizing doesn't mean just changing a couple of words from the original work. Use words or have a sentence structure different from the original work, while maintaining the gist of the original author's idea. Acknowledge the source through in-text citations inimmediately following the paraphrase.

Dr. Imran Ali Jokhio 6/4/2011

21

Avoiding Plagiarism
Common knowledge Citation style and acronyms:
journal articles, books, newspaper articles, and government documents. MUET Journal or UETL Journal.

Dr. Imran Ali Jokhio 6/4/2011

22

Hands on Practice

S-ar putea să vă placă și