ways in which information can be misused by:nastassja grant tajea taylor abigail white
TRANSCRIPT
Ways in which Information can be
misused
By:Nastassja Grant
Tajea TaylorAbigail White
Agenda
• Violation of Privacy
• Identity Theft
• Storage of Inaccurate Information
• Propaganda
• Credit Card Fraud
Violation of Privacy
Definition
• Privacy in Information Technology refers to the right of individuals to determine what information is stored about them and how
that information should be used.• Violation of Privacy is to breach the
boundaries and content of information that is considered private to an individual or
group.
Breach of Information
Organizations such as businesses and government bodies, hold private information on individuals, which are given to them for specific purposes. Information given is often times personal &/ sensitive, such as a person’s religion,
political affiliation or personal activities. Breach of such information can cause:
• Defamation of character
• Identity theft• Discrimination
• Personal embarrassment• Damage to one’s professional reputation
Identity theft
It is a crime used to refer to fraud that involves someone pretending to be someone else in order to steal money or get other benefits.
The person whose identity is used can suffer various consequences when he or she is held responsible for the perpetrator's actions.
Identity theft can happen : when a criminal uses stolen or fake
documents to open an account in someone else's name.
when a criminal tries to take over another person's bank or credit card account, first by gathering information about the intended victim, then contacting their card issuer masquerading as the genuine cardholder
Storage of Inaccurate
Information
• Due to the increase of computers, expansion of the internet and World
Wide Web applications it is extremely important that information be stored
accurately. • Data Integrity concerns the accuracy of
data.• Data is said to be accurate when it enters a system and does not become
inaccurate after processing.
Corruption of Data
Stored Data becomes corrupted when it is changed, deleted or substituted without
authorization. Data becomes inaccurate when it is compromised in the following ways:
1. Through human error2. Natural Disasters
3. Worms and Viruses 4. Hardware malfunctions
5. Fraud6. Malicious deletion or changing of data
PROPAGANDA
Propaganda
Propaganda is the dissemination of information aimed at influencing the opinions or behaviors of people. As
opposed to impartially providing information, propaganda in its most basic
sense, often presents information primarily in order to influence its audience.
Types of Propaganda
Assertion Bandwagon Card Stacking Glittering Generalities Lesser of Two Evils Pinpointing the
enemy
Plain Folks Simplification
(Stereotyping) Testimonials Transfer Name Calling
Credit Card Fraud
Credit card fraud
It is a wide-ranging term for theft and fraud committed using a credit card or any similar payment mechanism as a fraudulent source of funds in a transaction.
The purpose may be to obtain goods without paying.
It is only after the billing cycle of the relevant credit card is completed, that the legitimate cardholder may become aware of the unauthorised transaction.
There are various means by which these numbers can be obtained:
From a credit card generator site on the Internet From an unscrupulous retail merchant who
retains credit card numbers processed through a retail outlet and uses them unlawfully
From offenders who utilise skimming machines to record multiple credit card numbers via retail outlets
From sourcing discarded copies of credit card vouchers via waste receptacles
From hacking into computes where credit card numbers are stored