Upload
edchantler
View
228
Download
0
Embed Size (px)
Citation preview
8/10/2019 Group 3 Presentation Final
1/17
8/10/2019 Group 3 Presentation Final
2/17
8/10/2019 Group 3 Presentation Final
3/17
8/10/2019 Group 3 Presentation Final
4/17
8/10/2019 Group 3 Presentation Final
5/17
8/10/2019 Group 3 Presentation Final
6/17
8/10/2019 Group 3 Presentation Final
7/17
8/10/2019 Group 3 Presentation Final
8/17
8/10/2019 Group 3 Presentation Final
9/17
http://www.legislation.gov.uk/ukpga/1990/18http://www.legislation.gov.uk/ukpga/1990/188/10/2019 Group 3 Presentation Final
10/17
8/10/2019 Group 3 Presentation Final
11/17
8/10/2019 Group 3 Presentation Final
12/17
8/10/2019 Group 3 Presentation Final
13/17
http://www.colossalsecurity.co.uk/services/close-protection/http://www.colossalsecurity.co.uk/services/close-protection/http://www.colossalsecurity.co.uk/services/close-protection/http://www.bcs.org/content/conWebDoc/53391http://www.bcs.org/upload/pdf/conduct.pdfhttp://www.bcs.org/content/conWebDoc/20220http://www.slideshare.net/bhanjakishorsamudra/ethics-for-it-professionals-and-it-users-16436414http://www.slideshare.net/bhanjakishorsamudra/ethics-for-it-professionals-and-it-users-16436414http://www.slideshare.net/bhanjakishorsamudra/ethics-for-it-professionals-and-it-users-16436414http://www.slideshare.net/bhanjakishorsamudra/ethics-for-it-professionals-and-it-users-16436414http://www.slideshare.net/bhanjakishorsamudra/ethics-for-it-professionals-and-it-users-16436414http://www.slideshare.net/bhanjakishorsamudra/ethics-for-it-professionals-and-it-users-16436414http://www.slideshare.net/bhanjakishorsamudra/ethics-for-it-professionals-and-it-users-16436414http://www.slideshare.net/bhanjakishorsamudra/ethics-for-it-professionals-and-it-users-16436414http://www.slideshare.net/bhanjakishorsamudra/ethics-for-it-professionals-and-it-users-16436414http://www.slideshare.net/bhanjakishorsamudra/ethics-for-it-professionals-and-it-users-16436414http://www.slideshare.net/bhanjakishorsamudra/ethics-for-it-professionals-and-it-users-16436414http://www.slideshare.net/bhanjakishorsamudra/ethics-for-it-professionals-and-it-users-16436414http://www.slideshare.net/bhanjakishorsamudra/ethics-for-it-professionals-and-it-users-16436414http://www.slideshare.net/bhanjakishorsamudra/ethics-for-it-professionals-and-it-users-16436414http://www.slideshare.net/bhanjakishorsamudra/ethics-for-it-professionals-and-it-users-16436414http://www.slideshare.net/bhanjakishorsamudra/ethics-for-it-professionals-and-it-users-16436414http://www.acfe.com/uploadedImages/ACFE_Website/Content/images/topic-landing/ethics-and-compliance.jpghttp://www.acfe.com/uploadedImages/ACFE_Website/Content/images/topic-landing/ethics-and-compliance.jpghttp://www.acfe.com/uploadedImages/ACFE_Website/Content/images/topic-landing/ethics-and-compliance.jpghttp://www.acfe.com/uploadedImages/ACFE_Website/Content/images/topic-landing/ethics-and-compliance.jpghttp://www.acfe.com/uploadedImages/ACFE_Website/Content/images/topic-landing/ethics-and-compliance.jpghttp://www.acfe.com/uploadedImages/ACFE_Website/Content/images/topic-landing/ethics-and-compliance.jpghttp://www.acfe.com/uploadedImages/ACFE_Website/Content/images/topic-landing/ethics-and-compliance.jpg8/10/2019 Group 3 Presentation Final
14/17
https://www.youtube.com/watch?v=5yB3n9fu-rMhttps://www.youtube.com/watch?v=5yB3n9fu-rMhttps://www.youtube.com/watch?v=5yB3n9fu-rMhttp://www.fluidunion.com/ax2012/GotQuestions.pnghttp://news.cnet.com/2100-1030_3-6103098.htmlhttp://news.cnet.com/2100-1030_3-6103098.htmlhttp://news.cnet.com/2100-1030_3-6103098.htmlhttp://news.cnet.com/2100-1030_3-6103098.htmlhttp://news.cnet.com/2100-1030_3-6103098.htmlhttp://en.wikipedia.org/wiki/IBM_v._Papermasterhttp://www.ifp.nsw.edu.au/__data/assets/image/0004/82543/professional-development-courses.jpghttp://www.ifp.nsw.edu.au/__data/assets/image/0004/82543/professional-development-courses.jpghttp://www.ifp.nsw.edu.au/__data/assets/image/0004/82543/professional-development-courses.jpghttp://www.ifp.nsw.edu.au/__data/assets/image/0004/82543/professional-development-courses.jpghttp://www.ifp.nsw.edu.au/__data/assets/image/0004/82543/professional-development-courses.jpghttp://www.buzzfeed.com/tomgara/sony-hackhttp://www.buzzfeed.com/tomgara/sony-hackhttp://www.buzzfeed.com/tomgara/sony-hack8/10/2019 Group 3 Presentation Final
15/17
http://bloggless.com/it/software-engineering/the-real-truth-behind-it-ethics-blow-the-whistle-or-look-the-other-way/http://bloggless.com/it/software-engineering/the-real-truth-behind-it-ethics-blow-the-whistle-or-look-the-other-way/http://bloggless.com/it/software-engineering/the-real-truth-behind-it-ethics-blow-the-whistle-or-look-the-other-way/http://bloggless.com/it/software-engineering/the-real-truth-behind-it-ethics-blow-the-whistle-or-look-the-other-way/http://bloggless.com/it/software-engineering/the-real-truth-behind-it-ethics-blow-the-whistle-or-look-the-other-way/http://bloggless.com/it/software-engineering/the-real-truth-behind-it-ethics-blow-the-whistle-or-look-the-other-way/http://bloggless.com/it/software-engineering/the-real-truth-behind-it-ethics-blow-the-whistle-or-look-the-other-way/http://bloggless.com/it/software-engineering/the-real-truth-behind-it-ethics-blow-the-whistle-or-look-the-other-way/http://bloggless.com/it/software-engineering/the-real-truth-behind-it-ethics-blow-the-whistle-or-look-the-other-way/http://bloggless.com/it/software-engineering/the-real-truth-behind-it-ethics-blow-the-whistle-or-look-the-other-way/http://bloggless.com/it/software-engineering/the-real-truth-behind-it-ethics-blow-the-whistle-or-look-the-other-way/http://bloggless.com/it/software-engineering/the-real-truth-behind-it-ethics-blow-the-whistle-or-look-the-other-way/http://bloggless.com/it/software-engineering/the-real-truth-behind-it-ethics-blow-the-whistle-or-look-the-other-way/http://bloggless.com/it/software-engineering/the-real-truth-behind-it-ethics-blow-the-whistle-or-look-the-other-way/http://bloggless.com/it/software-engineering/the-real-truth-behind-it-ethics-blow-the-whistle-or-look-the-other-way/http://bloggless.com/it/software-engineering/the-real-truth-behind-it-ethics-blow-the-whistle-or-look-the-other-way/http://bloggless.com/it/software-engineering/the-real-truth-behind-it-ethics-blow-the-whistle-or-look-the-other-way/http://bloggless.com/it/software-engineering/the-real-truth-behind-it-ethics-blow-the-whistle-or-look-the-other-way/http://bloggless.com/it/software-engineering/the-real-truth-behind-it-ethics-blow-the-whistle-or-look-the-other-way/http://bloggless.com/it/software-engineering/the-real-truth-behind-it-ethics-blow-the-whistle-or-look-the-other-way/http://bloggless.com/it/software-engineering/the-real-truth-behind-it-ethics-blow-the-whistle-or-look-the-other-way/http://bloggless.com/it/software-engineering/the-real-truth-behind-it-ethics-blow-the-whistle-or-look-the-other-way/http://bloggless.com/it/software-engineering/the-real-truth-behind-it-ethics-blow-the-whistle-or-look-the-other-way/http://bloggless.com/it/software-engineering/the-real-truth-behind-it-ethics-blow-the-whistle-or-look-the-other-way/http://bloggless.com/it/software-engineering/the-real-truth-behind-it-ethics-blow-the-whistle-or-look-the-other-way/http://bloggless.com/it/software-engineering/the-real-truth-behind-it-ethics-blow-the-whistle-or-look-the-other-way/http://bloggless.com/it/software-engineering/the-real-truth-behind-it-ethics-blow-the-whistle-or-look-the-other-way/http://bloggless.com/it/software-engineering/the-real-truth-behind-it-ethics-blow-the-whistle-or-look-the-other-way/http://bloggless.com/it/software-engineering/the-real-truth-behind-it-ethics-blow-the-whistle-or-look-the-other-way/http://nnedv.org/downloads/SafetyNet/OVW/NNEDV_VideoCameras_2011.pdfhttp://uk.businessinsider.com/russia-hacked-webcam-scandal-2014-11http://uk.businessinsider.com/russia-hacked-webcam-scandal-2014-11http://uk.businessinsider.com/russia-hacked-webcam-scandal-2014-11http://uk.businessinsider.com/russia-hacked-webcam-scandal-2014-11http://uk.businessinsider.com/russia-hacked-webcam-scandal-2014-11http://uk.businessinsider.com/russia-hacked-webcam-scandal-2014-11http://uk.businessinsider.com/russia-hacked-webcam-scandal-2014-11http://uk.businessinsider.com/russia-hacked-webcam-scandal-2014-11http://uk.businessinsider.com/russia-hacked-webcam-scandal-2014-11http://uk.businessinsider.com/russia-hacked-webcam-scandal-2014-11http://uk.businessinsider.com/russia-hacked-webcam-scandal-2014-11http://nnedv.org/downloads/SafetyNet/OVW/NNEDV_SocialNetworkingTips.pdfhttp://thedreadnought.co.uk/history/http://www.hbs.edu/entrepreneurship/pdf/Sample_NDA.pdf8/10/2019 Group 3 Presentation Final
16/17
http://www.cyberpesten.be/info/cyber-bullying-statisticshttp://www.cyberpesten.be/info/cyber-bullying-statisticshttp://www.cyberpesten.be/info/cyber-bullying-statisticshttp://www.cyberpesten.be/info/cyber-bullying-statisticshttp://www.cyberpesten.be/info/cyber-bullying-statisticshttp://quaysnews.net/Captain_Manchester_Visits_schools_to_raise_awareness_of_antibullying-13044.htmlhttp://quaysnews.net/Captain_Manchester_Visits_schools_to_raise_awareness_of_antibullying-13044.htmlhttp://quaysnews.net/Captain_Manchester_Visits_schools_to_raise_awareness_of_antibullying-13044.htmlhttp://www.solonsecurity.co.uk/product_info.php?product_id=170&cat=43https://www.pinterest.com/pin/148055906475646661/http://thedreadnought.co.uk/history/http://www.businessinsider.com.au/chart-of-the-day-the-worst-organizational-data-breaches-ever-2014-8http://www.businessinsider.com.au/chart-of-the-day-the-worst-organizational-data-breaches-ever-2014-8http://www.businessinsider.com.au/chart-of-the-day-the-worst-organizational-data-breaches-ever-2014-8http://www.businessinsider.com.au/chart-of-the-day-the-worst-organizational-data-breaches-ever-2014-8http://www.businessinsider.com.au/chart-of-the-day-the-worst-organizational-data-breaches-ever-2014-8http://www.businessinsider.com.au/chart-of-the-day-the-worst-organizational-data-breaches-ever-2014-8http://www.businessinsider.com.au/chart-of-the-day-the-worst-organizational-data-breaches-ever-2014-8http://www.businessinsider.com.au/chart-of-the-day-the-worst-organizational-data-breaches-ever-2014-8http://www.businessinsider.com.au/chart-of-the-day-the-worst-organizational-data-breaches-ever-2014-8http://www.businessinsider.com.au/chart-of-the-day-the-worst-organizational-data-breaches-ever-2014-8http://www.businessinsider.com.au/chart-of-the-day-the-worst-organizational-data-breaches-ever-2014-8http://www.businessinsider.com.au/chart-of-the-day-the-worst-organizational-data-breaches-ever-2014-8http://www.businessinsider.com.au/chart-of-the-day-the-worst-organizational-data-breaches-ever-2014-8http://www.businessinsider.com.au/chart-of-the-day-the-worst-organizational-data-breaches-ever-2014-8http://www.businessinsider.com.au/chart-of-the-day-the-worst-organizational-data-breaches-ever-2014-8http://www.businessinsider.com.au/chart-of-the-day-the-worst-organizational-data-breaches-ever-2014-8http://www.businessinsider.com.au/chart-of-the-day-the-worst-organizational-data-breaches-ever-2014-8http://www.businessinsider.com.au/chart-of-the-day-the-worst-organizational-data-breaches-ever-2014-8http://www.businessinsider.com.au/chart-of-the-day-the-worst-organizational-data-breaches-ever-2014-8http://www.businessinsider.com.au/chart-of-the-day-the-worst-organizational-data-breaches-ever-2014-8http://www.businessinsider.com.au/chart-of-the-day-the-worst-organizational-data-breaches-ever-2014-8http://www.businessinsider.com.au/chart-of-the-day-the-worst-organizational-data-breaches-ever-2014-8http://www.businessinsider.com.au/chart-of-the-day-the-worst-organizational-data-breaches-ever-2014-8http://www.securityelectronicsandnetworks.com/articles/2013/10/31/it-security-ip-securityhttp://www.securityelectronicsandnetworks.com/articles/2013/10/31/it-security-ip-securityhttp://www.securityelectronicsandnetworks.com/articles/2013/10/31/it-security-ip-securityhttp://www.securityelectronicsandnetworks.com/articles/2013/10/31/it-security-ip-securityhttp://www.securityelectronicsandnetworks.com/articles/2013/10/31/it-security-ip-securityhttp://www.securityelectronicsandnetworks.com/articles/2013/10/31/it-security-ip-securityhttp://www.securityelectronicsandnetworks.com/articles/2013/10/31/it-security-ip-securityhttp://localhost/var/www/apps/conversion/tmp/scratch_8/google.com/mapshttp://localhost/var/www/apps/conversion/tmp/scratch_8/google.comhttps://www.javelinstrategy.com/news/1467/92/A-New-Identity-Fraud-Victim-Every-Two-Seconds-in-2013-According-to-Latest-Javelin-Strategy-Research-Study/d,pressRoomDetailhttps://www.javelinstrategy.com/news/1467/92/A-New-Identity-Fraud-Victim-Every-Two-Seconds-in-2013-According-to-Latest-Javelin-Strategy-Research-Study/d,pressRoomDetailhttps://www.javelinstrategy.com/news/1467/92/A-New-Identity-Fraud-Victim-Every-Two-Seconds-in-2013-According-to-Latest-Javelin-Strategy-Research-Study/d,pressRoomDetailhttps://www.javelinstrategy.com/news/1467/92/A-New-Identity-Fraud-Victim-Every-Two-Seconds-in-2013-According-to-Latest-Javelin-Strategy-Research-Study/d,pressRoomDetailhttps://www.javelinstrategy.com/news/1467/92/A-New-Identity-Fraud-Victim-Every-Two-Seconds-in-2013-According-to-Latest-Javelin-Strategy-Research-Study/d,pressRoomDetailhttps://www.javelinstrategy.com/news/1467/92/A-New-Identity-Fraud-Victim-Every-Two-Seconds-in-2013-According-to-Latest-Javelin-Strategy-Research-Study/d,pressRoomDetailhttps://www.javelinstrategy.com/news/1467/92/A-New-Identity-Fraud-Victim-Every-Two-Seconds-in-2013-According-to-Latest-Javelin-Strategy-Research-Study/d,pressRoomDetailhttps://www.javelinstrategy.com/news/1467/92/A-New-Identity-Fraud-Victim-Every-Two-Seconds-in-2013-According-to-Latest-Javelin-Strategy-Research-Study/d,pressRoomDetailhttps://www.javelinstrategy.com/news/1467/92/A-New-Identity-Fraud-Victim-Every-Two-Seconds-in-2013-According-to-Latest-Javelin-Strategy-Research-Study/d,pressRoomDetailhttps://www.javelinstrategy.com/news/1467/92/A-New-Identity-Fraud-Victim-Every-Two-Seconds-in-2013-According-to-Latest-Javelin-Strategy-Research-Study/d,pressRoomDetailhttps://www.javelinstrategy.com/news/1467/92/A-New-Identity-Fraud-Victim-Every-Two-Seconds-in-2013-According-to-Latest-Javelin-Strategy-Research-Study/d,pressRoomDetailhttps://www.javelinstrategy.com/news/1467/92/A-New-Identity-Fraud-Victim-Every-Two-Seconds-in-2013-According-to-Latest-Javelin-Strategy-Research-Study/d,pressRoomDetailhttps://www.javelinstrategy.com/news/1467/92/A-New-Identity-Fraud-Victim-Every-Two-Seconds-in-2013-According-to-Latest-Javelin-Strategy-Research-Study/d,pressRoomDetailhttps://www.javelinstrategy.com/news/1467/92/A-New-Identity-Fraud-Victim-Every-Two-Seconds-in-2013-According-to-Latest-Javelin-Strategy-Research-Study/d,pressRoomDetailhttps://www.javelinstrategy.com/news/1467/92/A-New-Identity-Fraud-Victim-Every-Two-Seconds-in-2013-According-to-Latest-Javelin-Strategy-Research-Study/d,pressRoomDetailhttps://www.javelinstrategy.com/news/1467/92/A-New-Identity-Fraud-Victim-Every-Two-Seconds-in-2013-According-to-Latest-Javelin-Strategy-Research-Study/d,pressRoomDetailhttps://www.javelinstrategy.com/news/1467/92/A-New-Identity-Fraud-Victim-Every-Two-Seconds-in-2013-According-to-Latest-Javelin-Strategy-Research-Study/d,pressRoomDetailhttps://www.javelinstrategy.com/news/1467/92/A-New-Identity-Fraud-Victim-Every-Two-Seconds-in-2013-According-to-Latest-Javelin-Strategy-Research-Study/d,pressRoomDetailhttps://www.javelinstrategy.com/news/1467/92/A-New-Identity-Fraud-Victim-Every-Two-Seconds-in-2013-According-to-Latest-Javelin-Strategy-Research-Study/d,pressRoomDetailhttps://www.javelinstrategy.com/news/1467/92/A-New-Identity-Fraud-Victim-Every-Two-Seconds-in-2013-According-to-Latest-Javelin-Strategy-Research-Study/d,pressRoomDetailhttps://www.javelinstrategy.com/news/1467/92/A-New-Identity-Fraud-Victim-Every-Two-Seconds-in-2013-According-to-Latest-Javelin-Strategy-Research-Study/d,pressRoomDetailhttps://www.javelinstrategy.com/news/1467/92/A-New-Identity-Fraud-Victim-Every-Two-Seconds-in-2013-According-to-Latest-Javelin-Strategy-Research-Study/d,pressRoomDetailhttps://www.javelinstrategy.com/news/1467/92/A-New-Identity-Fraud-Victim-Every-Two-Seconds-in-2013-According-to-Latest-Javelin-Strategy-Research-Study/d,pressRoomDetailhttps://www.javelinstrategy.com/news/1467/92/A-New-Identity-Fraud-Victim-Every-Two-Seconds-in-2013-According-to-Latest-Javelin-Strategy-Research-Study/d,pressRoomDetailhttps://www.javelinstrategy.com/news/1467/92/A-New-Identity-Fraud-Victim-Every-Two-Seconds-in-2013-According-to-Latest-Javelin-Strategy-Research-Study/d,pressRoomDetailhttps://www.javelinstrategy.com/news/1467/92/A-New-Identity-Fraud-Victim-Every-Two-Seconds-in-2013-According-to-Latest-Javelin-Strategy-Research-Study/d,pressRoomDetailhttps://www.javelinstrategy.com/news/1467/92/A-New-Identity-Fraud-Victim-Every-Two-Seconds-in-2013-According-to-Latest-Javelin-Strategy-Research-Study/d,pressRoomDetailhttps://www.javelinstrategy.com/news/1467/92/A-New-Identity-Fraud-Victim-Every-Two-Seconds-in-2013-According-to-Latest-Javelin-Strategy-Research-Study/d,pressRoomDetailhttps://www.javelinstrategy.com/news/1467/92/A-New-Identity-Fraud-Victim-Every-Two-Seconds-in-2013-According-to-Latest-Javelin-Strategy-Research-Study/d,pressRoomDetailhttps://www.javelinstrategy.com/news/1467/92/A-New-Identity-Fraud-Victim-Every-Two-Seconds-in-2013-According-to-Latest-Javelin-Strategy-Research-Study/d,pressRoomDetailhttps://www.javelinstrategy.com/news/1467/92/A-New-Identity-Fraud-Victim-Every-Two-Seconds-in-2013-According-to-Latest-Javelin-Strategy-Research-Study/d,pressRoomDetailhttps://www.javelinstrategy.com/news/1467/92/A-New-Identity-Fraud-Victim-Every-Two-Seconds-in-2013-According-to-Latest-Javelin-Strategy-Research-Study/d,pressRoomDetailhttps://www.javelinstrategy.com/news/1467/92/A-New-Identity-Fraud-Victim-Every-Two-Seconds-in-2013-According-to-Latest-Javelin-Strategy-Research-Study/d,pressRoomDetailhttps://www.javelinstrategy.com/news/1467/92/A-New-Identity-Fraud-Victim-Every-Two-Seconds-in-2013-According-to-Latest-Javelin-Strategy-Research-Study/d,pressRoomDetailhttp://toolkit.itsm.tv/http://toolkit.itsm.tv/http://toolkit.itsm.tv/http://www.ifp.nsw.edu.au/__data/assets/image/0004/82543/professional-development-courses.jpghttp://www.ifp.nsw.edu.au/__data/assets/image/0004/82543/professional-development-courses.jpghttp://www.ifp.nsw.edu.au/__data/assets/image/0004/82543/professional-development-courses.jpghttp://www.ifp.nsw.edu.au/__data/assets/image/0004/82543/professional-development-courses.jpghttp://www.ifp.nsw.edu.au/__data/assets/image/0004/82543/professional-development-courses.jpghttp://www.colossalsecurity.co.uk/services/close-protection/http://www.colossalsecurity.co.uk/services/close-protection/http://www.colossalsecurity.co.uk/services/close-protection/http://localhost/var/www/apps/conversion/tmp/scratch_8/Clker.comhttp://www.acfe.com/uploadedImages/ACFE_Website/Content/images/topic-landing/ethics-and-compliance.jpghttp://www.acfe.com/uploadedImages/ACFE_Website/Content/images/topic-landing/ethics-and-compliance.jpghttp://www.acfe.com/uploadedImages/ACFE_Website/Content/images/topic-landing/ethics-and-compliance.jpghttp://www.acfe.com/uploadedImages/ACFE_Website/Content/images/topic-landing/ethics-and-compliance.jpghttp://www.acfe.com/uploadedImages/ACFE_Website/Content/images/topic-landing/ethics-and-compliance.jpghttp://www.acfe.com/uploadedImages/ACFE_Website/Content/images/topic-landing/ethics-and-compliance.jpghttp://www.acfe.com/uploadedImages/ACFE_Website/Content/images/topic-landing/ethics-and-compliance.jpg8/10/2019 Group 3 Presentation Final
17/17