19
Ways in which Information can be misused By:Nastassja Grant Tajea Taylor Abigail White

Ways in which Information can be misused By:Nastassja Grant Tajea Taylor Abigail White

Embed Size (px)

Citation preview

Page 1: Ways in which Information can be misused By:Nastassja Grant Tajea Taylor Abigail White

Ways in which Information can be

misused

By:Nastassja Grant

Tajea TaylorAbigail White

Page 2: Ways in which Information can be misused By:Nastassja Grant Tajea Taylor Abigail White

Agenda

• Violation of Privacy

• Identity Theft

• Storage of Inaccurate Information

• Propaganda

• Credit Card Fraud

Page 3: Ways in which Information can be misused By:Nastassja Grant Tajea Taylor Abigail White

Violation of Privacy

Page 4: Ways in which Information can be misused By:Nastassja Grant Tajea Taylor Abigail White

Definition

• Privacy in Information Technology refers to the right of individuals to determine what information is stored about them and how

that information should be used.• Violation of Privacy is to breach the

boundaries and content of information that is considered private to an individual or

group.

Page 5: Ways in which Information can be misused By:Nastassja Grant Tajea Taylor Abigail White

Breach of Information

Organizations such as businesses and government bodies, hold private information on individuals, which are given to them for specific purposes. Information given is often times personal &/ sensitive, such as a person’s religion,

political affiliation or personal activities. Breach of such information can cause:

 • Defamation of character

• Identity theft• Discrimination

• Personal embarrassment• Damage to one’s professional reputation

Page 7: Ways in which Information can be misused By:Nastassja Grant Tajea Taylor Abigail White
Page 8: Ways in which Information can be misused By:Nastassja Grant Tajea Taylor Abigail White

Identity theft

It is a crime used to refer to fraud that involves someone pretending to be someone else in order to steal money or get other benefits.

The person whose identity is used can suffer various consequences when he or she is held responsible for the perpetrator's actions.

Page 9: Ways in which Information can be misused By:Nastassja Grant Tajea Taylor Abigail White

Identity theft can happen : when a criminal uses stolen or fake

documents to open an account in someone else's name.

when a criminal tries to take over another person's bank or credit card account, first by gathering information about the intended victim, then contacting their card issuer masquerading as the genuine cardholder

Page 10: Ways in which Information can be misused By:Nastassja Grant Tajea Taylor Abigail White

Storage of Inaccurate

Information

Page 11: Ways in which Information can be misused By:Nastassja Grant Tajea Taylor Abigail White

• Due to the increase of computers, expansion of the internet and World

Wide Web applications it is extremely important that information be stored

accurately. • Data Integrity concerns the accuracy of

data.• Data is said to be accurate when it enters a system and does not become

inaccurate after processing.

Page 12: Ways in which Information can be misused By:Nastassja Grant Tajea Taylor Abigail White

Corruption of Data

Stored Data becomes corrupted when it is changed, deleted or substituted without

authorization. Data becomes inaccurate when it is compromised in the following ways: 

1. Through human error2. Natural Disasters

3. Worms and Viruses 4. Hardware malfunctions

5. Fraud6. Malicious deletion or changing of data

Page 13: Ways in which Information can be misused By:Nastassja Grant Tajea Taylor Abigail White

PROPAGANDA

Page 14: Ways in which Information can be misused By:Nastassja Grant Tajea Taylor Abigail White

Propaganda

Propaganda is the dissemination of information aimed at influencing the opinions or behaviors of people. As

opposed to impartially providing information, propaganda in its most basic

sense, often presents information primarily in order to influence its audience.

Page 15: Ways in which Information can be misused By:Nastassja Grant Tajea Taylor Abigail White

Types of Propaganda

Assertion Bandwagon Card Stacking Glittering Generalities Lesser of Two Evils Pinpointing the

enemy

Plain Folks Simplification

(Stereotyping) Testimonials Transfer Name Calling

Page 16: Ways in which Information can be misused By:Nastassja Grant Tajea Taylor Abigail White

Credit Card Fraud

Page 17: Ways in which Information can be misused By:Nastassja Grant Tajea Taylor Abigail White

Credit card fraud

It is a wide-ranging term for theft and fraud committed using a credit card or any similar payment mechanism as a fraudulent source of funds in a transaction.

The purpose may be to obtain goods without paying.

It is only after the billing cycle of the relevant credit card is completed, that the legitimate cardholder may become aware of the unauthorised transaction.

Page 18: Ways in which Information can be misused By:Nastassja Grant Tajea Taylor Abigail White

There are various means by which these numbers can be obtained:

From a credit card generator site on the Internet From an unscrupulous retail merchant who

retains credit card numbers processed through a retail outlet and uses them unlawfully

From offenders who utilise skimming machines to record multiple credit card numbers via retail outlets

From sourcing discarded copies of credit card vouchers via waste receptacles

From hacking into computes where credit card numbers are stored

Page 19: Ways in which Information can be misused By:Nastassja Grant Tajea Taylor Abigail White