1 / 30

Internet Security and Monitoring: Protecting Privacy and Preventing Fraud

Learn about internet fraud, types of fraud, employee monitoring, and the role of technology in border control and surveillance.

makan
Download Presentation

Internet Security and Monitoring: Protecting Privacy and Preventing Fraud

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. In the sky…. Monitoring & Privacy Watching…. By Jeff Haas Katie Sandy Ryan Beebe Gil Herskovitz YOU….

  2. -Table of Contents- Jeff – Internet privacy Katie – Employee Monitoring Ryan – Government Security Gil - Government Security

  3. Last year, close to 14 billion dollars were lost as a result of internet fraud. This is a 9 billion dollar increase from the 5 billion reported in 2004. This fraud took shape in a variety of tools; online auctions, fake checks, Nigerian member clubs, phishing, and basic merchandise purchases, for people all over the US. Internet Security

  4. Internet Security

  5. Types of Fraud • Phishing- When companies ask individuals from personal account information, while pretending to be a credit card service, broker, or an e-retailer like Ebay.

  6. Nigerian Lottery Scam- Emails were sent out to people about entering a lottery. After a few exchanges they were told they won and asked to send fees and taxes. Then received no winnings. Ramping- Millions of people are sent emails about a new innovative feature of a particular company to increase the value of the stock. The people sending the info. Already own many shares and then sell them off. Types of Fraud

  7. Types of Fraud • Cookies- used to track where users click and navigate to on sites • Click Fraud- when a company puts a link to another site on their own. They are paid per click on their site, but have found unethical ways to employ this marketing tactic.

  8. Internet Security and Us • As discussed in class, employers today are utilizing items like Facebook and MySpace in their hiring practices. • Employers are even having their interns access their own accounts so HR personnel can research applicants. • Newscast on Facebook: http://www.collegerecruiter.com/weblog/archives/2006/05/nbc_interview.php

  9. Employee Monitoring

  10. Employer arguments: Increase customer satisfaction Improve employee performance Enhance productivity Employee arguments: Increased stress Privacy issues Trust between employee/employer The Employee vs. Employer Issue

  11. Types of Employee Monitoring • Call Monitoring • Video Surveillance • Computer Monitoring

  12. Call Monitoring: Observer’s Role Evaluation and feedback purposes Costs: $150/seat-$120,000 The Stress Factor Video Surveillance: Employee awareness Videos must be reviewed by management Uses: misconduct, monitor performace, safety Cost: $150-$1000/camera Objectivity Types of Monitoring (cont.)

  13. Computers are used to monitor employees’: Keystrokes Errors Internet access Email accounts Costs: $900-$10,000 Quantitative vs. Qualitative Focus Types of Monitoring (Cont.):Computer Monitoring

  14. Employee Monitoring and the Law • Public vs. private sector employees • State laws (California) • Electronic Communications Privacy Act of 1986 • “prohibits the intentional or willful interception, accession, disclosure, or use of one’s electronic communication.”

  15. Electronic Communications Privacy Act of 1986: The Exceptions • Provider exception • United Airlines case • Ordinary cause of business exception • Content vs. context approach • Consent exception • “applies when one party to the communication has given prior consent, actual or implied, to the interception or accession of the communication.”

  16. Case Law • Smith vs. Pillsbury • Inappropriate messages to co-workers • Private email usage at Pillsbury • Court decision: upheld employee’s termination • Shoars vs. Epson • Manager reviewed employees emails • Court Decision: systematic reviews of email do not violate the Electronic Comm. Privacy Act • Bourke vs. Nissan Motors • Use of email for excessive personal use • Court decision: no reasonable expectation of privacy

  17. -The best group ever

  18. No Fly List -Database of passengers deemed to be an aviation threat -Composed from FBI, Secret Service, INS, NSA databases -Problems -Solutions

  19. E-Passports • Issued to public beginning August 14, 2006 • “Smart Passports” • Microchip stores basic data • Features • Benefits from E-passports

  20. RFID in Humans • RFID in Humans • Nanotechnology • Size of a grain of Rice • Stores unique serial number • Benefits

  21. Border Security • U.S. Customs and Border Protection • Secure Fence Act of 2006 • Use of Seismic and Thermal Technology • $64 million for Border Patrol Surveillance and Sensor Technology • $10 million for Unmanned Aerial Vehicles

  22. Border Control Technologies • Omni Eye • Thermal Imaging • Seismic Activity

  23. Patriot Act -Title II: Enhanced Surveillance Procedures -Title IX: Improved Intelligence -A federal agency whose primary mission is to help prevent, protect against, and respond to acts of terrorism on United States soil.

  24. -Google Earth -Is a free-of-charge, downloadable virtual globe program. It maps the earth by superimposing images obtained from satellite imagery, aerial photography and GIS over a 3D globe.

  25. Satellite Technology some things we may not know -U.S. satellites won’t be watching alone -More sex offenders tracked by satellites

  26. - A government doing a good job

  27. - What is really going on? ON -LIVE 24/7: More than 4 million cameras are trained on Britons, posted from downtown to roadways, residential areas to churches.

  28. -Biometric Technology

  29. Who’s baby is that…???? How Cute!!!! -TOYS….. - Expensive toys that do a lot more!

  30. THE END

More Related