Group 3 Presentation Final

Embed Size (px)

Citation preview

  • 8/10/2019 Group 3 Presentation Final

    1/17

  • 8/10/2019 Group 3 Presentation Final

    2/17

  • 8/10/2019 Group 3 Presentation Final

    3/17

  • 8/10/2019 Group 3 Presentation Final

    4/17

  • 8/10/2019 Group 3 Presentation Final

    5/17

  • 8/10/2019 Group 3 Presentation Final

    6/17

  • 8/10/2019 Group 3 Presentation Final

    7/17

  • 8/10/2019 Group 3 Presentation Final

    8/17

  • 8/10/2019 Group 3 Presentation Final

    9/17

    http://www.legislation.gov.uk/ukpga/1990/18http://www.legislation.gov.uk/ukpga/1990/18
  • 8/10/2019 Group 3 Presentation Final

    10/17

  • 8/10/2019 Group 3 Presentation Final

    11/17

  • 8/10/2019 Group 3 Presentation Final

    12/17

  • 8/10/2019 Group 3 Presentation Final

    13/17

    http://www.colossalsecurity.co.uk/services/close-protection/http://www.colossalsecurity.co.uk/services/close-protection/http://www.colossalsecurity.co.uk/services/close-protection/http://www.bcs.org/content/conWebDoc/53391http://www.bcs.org/upload/pdf/conduct.pdfhttp://www.bcs.org/content/conWebDoc/20220http://www.slideshare.net/bhanjakishorsamudra/ethics-for-it-professionals-and-it-users-16436414http://www.slideshare.net/bhanjakishorsamudra/ethics-for-it-professionals-and-it-users-16436414http://www.slideshare.net/bhanjakishorsamudra/ethics-for-it-professionals-and-it-users-16436414http://www.slideshare.net/bhanjakishorsamudra/ethics-for-it-professionals-and-it-users-16436414http://www.slideshare.net/bhanjakishorsamudra/ethics-for-it-professionals-and-it-users-16436414http://www.slideshare.net/bhanjakishorsamudra/ethics-for-it-professionals-and-it-users-16436414http://www.slideshare.net/bhanjakishorsamudra/ethics-for-it-professionals-and-it-users-16436414http://www.slideshare.net/bhanjakishorsamudra/ethics-for-it-professionals-and-it-users-16436414http://www.slideshare.net/bhanjakishorsamudra/ethics-for-it-professionals-and-it-users-16436414http://www.slideshare.net/bhanjakishorsamudra/ethics-for-it-professionals-and-it-users-16436414http://www.slideshare.net/bhanjakishorsamudra/ethics-for-it-professionals-and-it-users-16436414http://www.slideshare.net/bhanjakishorsamudra/ethics-for-it-professionals-and-it-users-16436414http://www.slideshare.net/bhanjakishorsamudra/ethics-for-it-professionals-and-it-users-16436414http://www.slideshare.net/bhanjakishorsamudra/ethics-for-it-professionals-and-it-users-16436414http://www.slideshare.net/bhanjakishorsamudra/ethics-for-it-professionals-and-it-users-16436414http://www.slideshare.net/bhanjakishorsamudra/ethics-for-it-professionals-and-it-users-16436414http://www.acfe.com/uploadedImages/ACFE_Website/Content/images/topic-landing/ethics-and-compliance.jpghttp://www.acfe.com/uploadedImages/ACFE_Website/Content/images/topic-landing/ethics-and-compliance.jpghttp://www.acfe.com/uploadedImages/ACFE_Website/Content/images/topic-landing/ethics-and-compliance.jpghttp://www.acfe.com/uploadedImages/ACFE_Website/Content/images/topic-landing/ethics-and-compliance.jpghttp://www.acfe.com/uploadedImages/ACFE_Website/Content/images/topic-landing/ethics-and-compliance.jpghttp://www.acfe.com/uploadedImages/ACFE_Website/Content/images/topic-landing/ethics-and-compliance.jpghttp://www.acfe.com/uploadedImages/ACFE_Website/Content/images/topic-landing/ethics-and-compliance.jpg
  • 8/10/2019 Group 3 Presentation Final

    14/17

    https://www.youtube.com/watch?v=5yB3n9fu-rMhttps://www.youtube.com/watch?v=5yB3n9fu-rMhttps://www.youtube.com/watch?v=5yB3n9fu-rMhttp://www.fluidunion.com/ax2012/GotQuestions.pnghttp://news.cnet.com/2100-1030_3-6103098.htmlhttp://news.cnet.com/2100-1030_3-6103098.htmlhttp://news.cnet.com/2100-1030_3-6103098.htmlhttp://news.cnet.com/2100-1030_3-6103098.htmlhttp://news.cnet.com/2100-1030_3-6103098.htmlhttp://en.wikipedia.org/wiki/IBM_v._Papermasterhttp://www.ifp.nsw.edu.au/__data/assets/image/0004/82543/professional-development-courses.jpghttp://www.ifp.nsw.edu.au/__data/assets/image/0004/82543/professional-development-courses.jpghttp://www.ifp.nsw.edu.au/__data/assets/image/0004/82543/professional-development-courses.jpghttp://www.ifp.nsw.edu.au/__data/assets/image/0004/82543/professional-development-courses.jpghttp://www.ifp.nsw.edu.au/__data/assets/image/0004/82543/professional-development-courses.jpghttp://www.buzzfeed.com/tomgara/sony-hackhttp://www.buzzfeed.com/tomgara/sony-hackhttp://www.buzzfeed.com/tomgara/sony-hack
  • 8/10/2019 Group 3 Presentation Final

    15/17

    http://bloggless.com/it/software-engineering/the-real-truth-behind-it-ethics-blow-the-whistle-or-look-the-other-way/http://bloggless.com/it/software-engineering/the-real-truth-behind-it-ethics-blow-the-whistle-or-look-the-other-way/http://bloggless.com/it/software-engineering/the-real-truth-behind-it-ethics-blow-the-whistle-or-look-the-other-way/http://bloggless.com/it/software-engineering/the-real-truth-behind-it-ethics-blow-the-whistle-or-look-the-other-way/http://bloggless.com/it/software-engineering/the-real-truth-behind-it-ethics-blow-the-whistle-or-look-the-other-way/http://bloggless.com/it/software-engineering/the-real-truth-behind-it-ethics-blow-the-whistle-or-look-the-other-way/http://bloggless.com/it/software-engineering/the-real-truth-behind-it-ethics-blow-the-whistle-or-look-the-other-way/http://bloggless.com/it/software-engineering/the-real-truth-behind-it-ethics-blow-the-whistle-or-look-the-other-way/http://bloggless.com/it/software-engineering/the-real-truth-behind-it-ethics-blow-the-whistle-or-look-the-other-way/http://bloggless.com/it/software-engineering/the-real-truth-behind-it-ethics-blow-the-whistle-or-look-the-other-way/http://bloggless.com/it/software-engineering/the-real-truth-behind-it-ethics-blow-the-whistle-or-look-the-other-way/http://bloggless.com/it/software-engineering/the-real-truth-behind-it-ethics-blow-the-whistle-or-look-the-other-way/http://bloggless.com/it/software-engineering/the-real-truth-behind-it-ethics-blow-the-whistle-or-look-the-other-way/http://bloggless.com/it/software-engineering/the-real-truth-behind-it-ethics-blow-the-whistle-or-look-the-other-way/http://bloggless.com/it/software-engineering/the-real-truth-behind-it-ethics-blow-the-whistle-or-look-the-other-way/http://bloggless.com/it/software-engineering/the-real-truth-behind-it-ethics-blow-the-whistle-or-look-the-other-way/http://bloggless.com/it/software-engineering/the-real-truth-behind-it-ethics-blow-the-whistle-or-look-the-other-way/http://bloggless.com/it/software-engineering/the-real-truth-behind-it-ethics-blow-the-whistle-or-look-the-other-way/http://bloggless.com/it/software-engineering/the-real-truth-behind-it-ethics-blow-the-whistle-or-look-the-other-way/http://bloggless.com/it/software-engineering/the-real-truth-behind-it-ethics-blow-the-whistle-or-look-the-other-way/http://bloggless.com/it/software-engineering/the-real-truth-behind-it-ethics-blow-the-whistle-or-look-the-other-way/http://bloggless.com/it/software-engineering/the-real-truth-behind-it-ethics-blow-the-whistle-or-look-the-other-way/http://bloggless.com/it/software-engineering/the-real-truth-behind-it-ethics-blow-the-whistle-or-look-the-other-way/http://bloggless.com/it/software-engineering/the-real-truth-behind-it-ethics-blow-the-whistle-or-look-the-other-way/http://bloggless.com/it/software-engineering/the-real-truth-behind-it-ethics-blow-the-whistle-or-look-the-other-way/http://bloggless.com/it/software-engineering/the-real-truth-behind-it-ethics-blow-the-whistle-or-look-the-other-way/http://bloggless.com/it/software-engineering/the-real-truth-behind-it-ethics-blow-the-whistle-or-look-the-other-way/http://bloggless.com/it/software-engineering/the-real-truth-behind-it-ethics-blow-the-whistle-or-look-the-other-way/http://bloggless.com/it/software-engineering/the-real-truth-behind-it-ethics-blow-the-whistle-or-look-the-other-way/http://nnedv.org/downloads/SafetyNet/OVW/NNEDV_VideoCameras_2011.pdfhttp://uk.businessinsider.com/russia-hacked-webcam-scandal-2014-11http://uk.businessinsider.com/russia-hacked-webcam-scandal-2014-11http://uk.businessinsider.com/russia-hacked-webcam-scandal-2014-11http://uk.businessinsider.com/russia-hacked-webcam-scandal-2014-11http://uk.businessinsider.com/russia-hacked-webcam-scandal-2014-11http://uk.businessinsider.com/russia-hacked-webcam-scandal-2014-11http://uk.businessinsider.com/russia-hacked-webcam-scandal-2014-11http://uk.businessinsider.com/russia-hacked-webcam-scandal-2014-11http://uk.businessinsider.com/russia-hacked-webcam-scandal-2014-11http://uk.businessinsider.com/russia-hacked-webcam-scandal-2014-11http://uk.businessinsider.com/russia-hacked-webcam-scandal-2014-11http://nnedv.org/downloads/SafetyNet/OVW/NNEDV_SocialNetworkingTips.pdfhttp://thedreadnought.co.uk/history/http://www.hbs.edu/entrepreneurship/pdf/Sample_NDA.pdf
  • 8/10/2019 Group 3 Presentation Final

    16/17

    http://www.cyberpesten.be/info/cyber-bullying-statisticshttp://www.cyberpesten.be/info/cyber-bullying-statisticshttp://www.cyberpesten.be/info/cyber-bullying-statisticshttp://www.cyberpesten.be/info/cyber-bullying-statisticshttp://www.cyberpesten.be/info/cyber-bullying-statisticshttp://quaysnews.net/Captain_Manchester_Visits_schools_to_raise_awareness_of_antibullying-13044.htmlhttp://quaysnews.net/Captain_Manchester_Visits_schools_to_raise_awareness_of_antibullying-13044.htmlhttp://quaysnews.net/Captain_Manchester_Visits_schools_to_raise_awareness_of_antibullying-13044.htmlhttp://www.solonsecurity.co.uk/product_info.php?product_id=170&cat=43https://www.pinterest.com/pin/148055906475646661/http://thedreadnought.co.uk/history/http://www.businessinsider.com.au/chart-of-the-day-the-worst-organizational-data-breaches-ever-2014-8http://www.businessinsider.com.au/chart-of-the-day-the-worst-organizational-data-breaches-ever-2014-8http://www.businessinsider.com.au/chart-of-the-day-the-worst-organizational-data-breaches-ever-2014-8http://www.businessinsider.com.au/chart-of-the-day-the-worst-organizational-data-breaches-ever-2014-8http://www.businessinsider.com.au/chart-of-the-day-the-worst-organizational-data-breaches-ever-2014-8http://www.businessinsider.com.au/chart-of-the-day-the-worst-organizational-data-breaches-ever-2014-8http://www.businessinsider.com.au/chart-of-the-day-the-worst-organizational-data-breaches-ever-2014-8http://www.businessinsider.com.au/chart-of-the-day-the-worst-organizational-data-breaches-ever-2014-8http://www.businessinsider.com.au/chart-of-the-day-the-worst-organizational-data-breaches-ever-2014-8http://www.businessinsider.com.au/chart-of-the-day-the-worst-organizational-data-breaches-ever-2014-8http://www.businessinsider.com.au/chart-of-the-day-the-worst-organizational-data-breaches-ever-2014-8http://www.businessinsider.com.au/chart-of-the-day-the-worst-organizational-data-breaches-ever-2014-8http://www.businessinsider.com.au/chart-of-the-day-the-worst-organizational-data-breaches-ever-2014-8http://www.businessinsider.com.au/chart-of-the-day-the-worst-organizational-data-breaches-ever-2014-8http://www.businessinsider.com.au/chart-of-the-day-the-worst-organizational-data-breaches-ever-2014-8http://www.businessinsider.com.au/chart-of-the-day-the-worst-organizational-data-breaches-ever-2014-8http://www.businessinsider.com.au/chart-of-the-day-the-worst-organizational-data-breaches-ever-2014-8http://www.businessinsider.com.au/chart-of-the-day-the-worst-organizational-data-breaches-ever-2014-8http://www.businessinsider.com.au/chart-of-the-day-the-worst-organizational-data-breaches-ever-2014-8http://www.businessinsider.com.au/chart-of-the-day-the-worst-organizational-data-breaches-ever-2014-8http://www.businessinsider.com.au/chart-of-the-day-the-worst-organizational-data-breaches-ever-2014-8http://www.businessinsider.com.au/chart-of-the-day-the-worst-organizational-data-breaches-ever-2014-8http://www.businessinsider.com.au/chart-of-the-day-the-worst-organizational-data-breaches-ever-2014-8http://www.securityelectronicsandnetworks.com/articles/2013/10/31/it-security-ip-securityhttp://www.securityelectronicsandnetworks.com/articles/2013/10/31/it-security-ip-securityhttp://www.securityelectronicsandnetworks.com/articles/2013/10/31/it-security-ip-securityhttp://www.securityelectronicsandnetworks.com/articles/2013/10/31/it-security-ip-securityhttp://www.securityelectronicsandnetworks.com/articles/2013/10/31/it-security-ip-securityhttp://www.securityelectronicsandnetworks.com/articles/2013/10/31/it-security-ip-securityhttp://www.securityelectronicsandnetworks.com/articles/2013/10/31/it-security-ip-securityhttp://localhost/var/www/apps/conversion/tmp/scratch_8/google.com/mapshttp://localhost/var/www/apps/conversion/tmp/scratch_8/google.comhttps://www.javelinstrategy.com/news/1467/92/A-New-Identity-Fraud-Victim-Every-Two-Seconds-in-2013-According-to-Latest-Javelin-Strategy-Research-Study/d,pressRoomDetailhttps://www.javelinstrategy.com/news/1467/92/A-New-Identity-Fraud-Victim-Every-Two-Seconds-in-2013-According-to-Latest-Javelin-Strategy-Research-Study/d,pressRoomDetailhttps://www.javelinstrategy.com/news/1467/92/A-New-Identity-Fraud-Victim-Every-Two-Seconds-in-2013-According-to-Latest-Javelin-Strategy-Research-Study/d,pressRoomDetailhttps://www.javelinstrategy.com/news/1467/92/A-New-Identity-Fraud-Victim-Every-Two-Seconds-in-2013-According-to-Latest-Javelin-Strategy-Research-Study/d,pressRoomDetailhttps://www.javelinstrategy.com/news/1467/92/A-New-Identity-Fraud-Victim-Every-Two-Seconds-in-2013-According-to-Latest-Javelin-Strategy-Research-Study/d,pressRoomDetailhttps://www.javelinstrategy.com/news/1467/92/A-New-Identity-Fraud-Victim-Every-Two-Seconds-in-2013-According-to-Latest-Javelin-Strategy-Research-Study/d,pressRoomDetailhttps://www.javelinstrategy.com/news/1467/92/A-New-Identity-Fraud-Victim-Every-Two-Seconds-in-2013-According-to-Latest-Javelin-Strategy-Research-Study/d,pressRoomDetailhttps://www.javelinstrategy.com/news/1467/92/A-New-Identity-Fraud-Victim-Every-Two-Seconds-in-2013-According-to-Latest-Javelin-Strategy-Research-Study/d,pressRoomDetailhttps://www.javelinstrategy.com/news/1467/92/A-New-Identity-Fraud-Victim-Every-Two-Seconds-in-2013-According-to-Latest-Javelin-Strategy-Research-Study/d,pressRoomDetailhttps://www.javelinstrategy.com/news/1467/92/A-New-Identity-Fraud-Victim-Every-Two-Seconds-in-2013-According-to-Latest-Javelin-Strategy-Research-Study/d,pressRoomDetailhttps://www.javelinstrategy.com/news/1467/92/A-New-Identity-Fraud-Victim-Every-Two-Seconds-in-2013-According-to-Latest-Javelin-Strategy-Research-Study/d,pressRoomDetailhttps://www.javelinstrategy.com/news/1467/92/A-New-Identity-Fraud-Victim-Every-Two-Seconds-in-2013-According-to-Latest-Javelin-Strategy-Research-Study/d,pressRoomDetailhttps://www.javelinstrategy.com/news/1467/92/A-New-Identity-Fraud-Victim-Every-Two-Seconds-in-2013-According-to-Latest-Javelin-Strategy-Research-Study/d,pressRoomDetailhttps://www.javelinstrategy.com/news/1467/92/A-New-Identity-Fraud-Victim-Every-Two-Seconds-in-2013-According-to-Latest-Javelin-Strategy-Research-Study/d,pressRoomDetailhttps://www.javelinstrategy.com/news/1467/92/A-New-Identity-Fraud-Victim-Every-Two-Seconds-in-2013-According-to-Latest-Javelin-Strategy-Research-Study/d,pressRoomDetailhttps://www.javelinstrategy.com/news/1467/92/A-New-Identity-Fraud-Victim-Every-Two-Seconds-in-2013-According-to-Latest-Javelin-Strategy-Research-Study/d,pressRoomDetailhttps://www.javelinstrategy.com/news/1467/92/A-New-Identity-Fraud-Victim-Every-Two-Seconds-in-2013-According-to-Latest-Javelin-Strategy-Research-Study/d,pressRoomDetailhttps://www.javelinstrategy.com/news/1467/92/A-New-Identity-Fraud-Victim-Every-Two-Seconds-in-2013-According-to-Latest-Javelin-Strategy-Research-Study/d,pressRoomDetailhttps://www.javelinstrategy.com/news/1467/92/A-New-Identity-Fraud-Victim-Every-Two-Seconds-in-2013-According-to-Latest-Javelin-Strategy-Research-Study/d,pressRoomDetailhttps://www.javelinstrategy.com/news/1467/92/A-New-Identity-Fraud-Victim-Every-Two-Seconds-in-2013-According-to-Latest-Javelin-Strategy-Research-Study/d,pressRoomDetailhttps://www.javelinstrategy.com/news/1467/92/A-New-Identity-Fraud-Victim-Every-Two-Seconds-in-2013-According-to-Latest-Javelin-Strategy-Research-Study/d,pressRoomDetailhttps://www.javelinstrategy.com/news/1467/92/A-New-Identity-Fraud-Victim-Every-Two-Seconds-in-2013-According-to-Latest-Javelin-Strategy-Research-Study/d,pressRoomDetailhttps://www.javelinstrategy.com/news/1467/92/A-New-Identity-Fraud-Victim-Every-Two-Seconds-in-2013-According-to-Latest-Javelin-Strategy-Research-Study/d,pressRoomDetailhttps://www.javelinstrategy.com/news/1467/92/A-New-Identity-Fraud-Victim-Every-Two-Seconds-in-2013-According-to-Latest-Javelin-Strategy-Research-Study/d,pressRoomDetailhttps://www.javelinstrategy.com/news/1467/92/A-New-Identity-Fraud-Victim-Every-Two-Seconds-in-2013-According-to-Latest-Javelin-Strategy-Research-Study/d,pressRoomDetailhttps://www.javelinstrategy.com/news/1467/92/A-New-Identity-Fraud-Victim-Every-Two-Seconds-in-2013-According-to-Latest-Javelin-Strategy-Research-Study/d,pressRoomDetailhttps://www.javelinstrategy.com/news/1467/92/A-New-Identity-Fraud-Victim-Every-Two-Seconds-in-2013-According-to-Latest-Javelin-Strategy-Research-Study/d,pressRoomDetailhttps://www.javelinstrategy.com/news/1467/92/A-New-Identity-Fraud-Victim-Every-Two-Seconds-in-2013-According-to-Latest-Javelin-Strategy-Research-Study/d,pressRoomDetailhttps://www.javelinstrategy.com/news/1467/92/A-New-Identity-Fraud-Victim-Every-Two-Seconds-in-2013-According-to-Latest-Javelin-Strategy-Research-Study/d,pressRoomDetailhttps://www.javelinstrategy.com/news/1467/92/A-New-Identity-Fraud-Victim-Every-Two-Seconds-in-2013-According-to-Latest-Javelin-Strategy-Research-Study/d,pressRoomDetailhttps://www.javelinstrategy.com/news/1467/92/A-New-Identity-Fraud-Victim-Every-Two-Seconds-in-2013-According-to-Latest-Javelin-Strategy-Research-Study/d,pressRoomDetailhttps://www.javelinstrategy.com/news/1467/92/A-New-Identity-Fraud-Victim-Every-Two-Seconds-in-2013-According-to-Latest-Javelin-Strategy-Research-Study/d,pressRoomDetailhttps://www.javelinstrategy.com/news/1467/92/A-New-Identity-Fraud-Victim-Every-Two-Seconds-in-2013-According-to-Latest-Javelin-Strategy-Research-Study/d,pressRoomDetailhttps://www.javelinstrategy.com/news/1467/92/A-New-Identity-Fraud-Victim-Every-Two-Seconds-in-2013-According-to-Latest-Javelin-Strategy-Research-Study/d,pressRoomDetailhttp://toolkit.itsm.tv/http://toolkit.itsm.tv/http://toolkit.itsm.tv/http://www.ifp.nsw.edu.au/__data/assets/image/0004/82543/professional-development-courses.jpghttp://www.ifp.nsw.edu.au/__data/assets/image/0004/82543/professional-development-courses.jpghttp://www.ifp.nsw.edu.au/__data/assets/image/0004/82543/professional-development-courses.jpghttp://www.ifp.nsw.edu.au/__data/assets/image/0004/82543/professional-development-courses.jpghttp://www.ifp.nsw.edu.au/__data/assets/image/0004/82543/professional-development-courses.jpghttp://www.colossalsecurity.co.uk/services/close-protection/http://www.colossalsecurity.co.uk/services/close-protection/http://www.colossalsecurity.co.uk/services/close-protection/http://localhost/var/www/apps/conversion/tmp/scratch_8/Clker.comhttp://www.acfe.com/uploadedImages/ACFE_Website/Content/images/topic-landing/ethics-and-compliance.jpghttp://www.acfe.com/uploadedImages/ACFE_Website/Content/images/topic-landing/ethics-and-compliance.jpghttp://www.acfe.com/uploadedImages/ACFE_Website/Content/images/topic-landing/ethics-and-compliance.jpghttp://www.acfe.com/uploadedImages/ACFE_Website/Content/images/topic-landing/ethics-and-compliance.jpghttp://www.acfe.com/uploadedImages/ACFE_Website/Content/images/topic-landing/ethics-and-compliance.jpghttp://www.acfe.com/uploadedImages/ACFE_Website/Content/images/topic-landing/ethics-and-compliance.jpghttp://www.acfe.com/uploadedImages/ACFE_Website/Content/images/topic-landing/ethics-and-compliance.jpg
  • 8/10/2019 Group 3 Presentation Final

    17/17