knowt logo

INF-101 11/30/2023 (Social Media)

Digital Identity

  • It is the digital presence created online by an individual or organization.

  • Some of the digital attributes are:

    • Username and password

    • Browsing history

    • Online accounts/activity

    • Purchasing behavior

    • Personal data

Internet Privacy

  • Privacy - The right to control what happens with your personal information.

  • Internet privacy - The right of personal privacy concerning the storing, distributing, and displaying of information concerning oneself on the Internet. Some considerations include:

    • Data collection

    • Data privacy

    • Data security

    • Data protection

    • Surveillance

    • Consent and control

Internet Privacy in Foreign Countries

European Union (EU)

  • The European Commission Data Protection Directive states that personal data can only be gathered legally under strict conditions.

  • The General Data Protection Regulation (GDPR) protects individual in the EU from unlawful data collection and processing.

    • It also covers consent requirements and privacy policies that enhance an individual’s rights.

Canada

  • The Personal Information Protection and Electronic Data Act (PIPEDA) governs how organizations can collect, store, and use information generated from online activity.

Mexico

  • The Federal Law for the Protection of Personal Data Possessed by Private Persons includes rules that state personal data can only be collected for reasons stated in an organization’s privacy policy and that consent must be obtained for collecting and processing personal data that is not publicly available.

U.S. Privacy Laws

  • U.S. privacy laws/rules include:

    • The Red Flags Rule

    • The Gramm-Leach-Bliley Act

    • The Children’s Online Privacy Protection (COPPA)

  • Federal Trade Commission (FTC) - Agency mainly responsible for Internet privacy protection.

Intellectual Property

  • It includes human knowledge and ideas that the law protects against unauthorized use by others. There are 4 categories:

    • Patents

    • Trademarks

    • Copyrights

    • Trade secrets

Copyright

  • A form of protection provided for original works of authorship.

  • It doesn’t extend to any idea or process, only the way it’s expressed.

  • The length of the copyright protection depends on when a work was created. Under the current law:

    • Works created on or after Jan 1, 1978, have protection for as long as the author is alive. After its death, it will expire after 70 years.

    • If two or more people are the authors, the 70 years start after the last author dies.

    • Works made for hire, anonymously, or under a fake name, protection is 95 years from publication or 120 years from creation, whichever’s shorter.

Open Educational Resources (OER)

  • These are free openly licensed learning resources available online.

  • Creative commons - A global nonprofit organization where people can create shareable materials.

Digital Millennium Copyright Act (DMCA)

  • It deals with and protects digital copyright related issues.

    • Protects ISPs from liability for copyright infringement of users.

E-commerce

  • It is selling products and services via Internet

  • There are three e-commerce categories:

    • B2C (Business to Consumer)

    • C2C (Consumer to Consumer)

    • B2B (Business to Business)

  • The consumer market is divided into:

    • Electronics

    • Fashion

    • Toys

    • Furniture

    • Beauty, Health, Personal & Household

    • Food

    • Beverages

    • Media

Electronic Funds Transfer (EFT)

  • It is online banking.

  • Governed by the federal EFT Act.

Electronic Data Interchange (EDI)

  • Communication standards for business transactions include:

    • Allows for exchange of data for making purchase orders and invoices.

    • Nearly all businesses in e-commerce use EDI.

PayPal

  • Free service that allows you to pay, send money, and accept payments online without revealing your financial details.

  • It is an intermediary between your financial institution and the seller.

Radio Frequency Identification (RFID)

  • Uses radio transmissions or electrostatic coupling to locate and identify objects.

  • RFIDs don’t require line of sight scanning.

  • It consists of three components:

    • Antenna - Transmits the signal via radio waves.

    • Transceiver - Both sends and receives information.

    • Transponder - An RFID tag (chip)

RFID Components

  • Tag – Attached to an object that carries and transmits information.

  • Reader – Communicates with an RFID tag using an antenna. Readers can be either fixed or portable and are used to receive information loaded on the tag, including location and associated information.

  • Database – Stores information and allows for evaluation of the information contained on an RFID tag.

  • Application – Completes actions based on information contained on the tag and database. Surfaces information to the end-user.

Downloading

  • Transferring a file from the Internet to your digital device.

  • Tips when downloading content from the Internet:

    • Research the website

    • Check the SSL certificate of the website

    • Use publisher-provided content sites

    • Use anti-virus software

    • Check for PUPs

    • Check website reviews

BitTorrent

  • A popular protocol for sharing movies, TV shows, music and software via the Internet.

  • It has no central servers and uses a peer-to-peer structure.

  • Each downloading user becomes a source for another user who wants the same file.

  • It breaks large files into smaller fragments called torrents.

Software Piracy

  • Occurs when a person engages in one of the following:

    • Stealing software programs

    • Illegally copying a program (piracy)

    • Intentionally erasing a program not belonging to you

    • Illegally activating/registering a program

BSA

  • The Software Alliance (Business Software Alliance) is a leading advocate against software piracy for the global software industry.

Social Media

  • Internet-based apps designed to allow individuals, businesses, and other entities to interact with one another.

Online Dating Services

  • Online data services attempt to use the Internet to develop personal relationships.

  • Pros

    • Online dating allows for access to a wide variety of people.

    • It can be great for shy people.

    • You can initiate contact without having to meet in person.

  • Cons

    • Profiles/photos can be faked or enhanced.

    • Are they really who they say they are?

    • Sites put an emphasis on physical attractiveness.

Electronic Etiquette

  • A code of respectful behavior governing the use of electronic communications software and hardware.

  • It’s known as netiquette.

HC

INF-101 11/30/2023 (Social Media)

Digital Identity

  • It is the digital presence created online by an individual or organization.

  • Some of the digital attributes are:

    • Username and password

    • Browsing history

    • Online accounts/activity

    • Purchasing behavior

    • Personal data

Internet Privacy

  • Privacy - The right to control what happens with your personal information.

  • Internet privacy - The right of personal privacy concerning the storing, distributing, and displaying of information concerning oneself on the Internet. Some considerations include:

    • Data collection

    • Data privacy

    • Data security

    • Data protection

    • Surveillance

    • Consent and control

Internet Privacy in Foreign Countries

European Union (EU)

  • The European Commission Data Protection Directive states that personal data can only be gathered legally under strict conditions.

  • The General Data Protection Regulation (GDPR) protects individual in the EU from unlawful data collection and processing.

    • It also covers consent requirements and privacy policies that enhance an individual’s rights.

Canada

  • The Personal Information Protection and Electronic Data Act (PIPEDA) governs how organizations can collect, store, and use information generated from online activity.

Mexico

  • The Federal Law for the Protection of Personal Data Possessed by Private Persons includes rules that state personal data can only be collected for reasons stated in an organization’s privacy policy and that consent must be obtained for collecting and processing personal data that is not publicly available.

U.S. Privacy Laws

  • U.S. privacy laws/rules include:

    • The Red Flags Rule

    • The Gramm-Leach-Bliley Act

    • The Children’s Online Privacy Protection (COPPA)

  • Federal Trade Commission (FTC) - Agency mainly responsible for Internet privacy protection.

Intellectual Property

  • It includes human knowledge and ideas that the law protects against unauthorized use by others. There are 4 categories:

    • Patents

    • Trademarks

    • Copyrights

    • Trade secrets

Copyright

  • A form of protection provided for original works of authorship.

  • It doesn’t extend to any idea or process, only the way it’s expressed.

  • The length of the copyright protection depends on when a work was created. Under the current law:

    • Works created on or after Jan 1, 1978, have protection for as long as the author is alive. After its death, it will expire after 70 years.

    • If two or more people are the authors, the 70 years start after the last author dies.

    • Works made for hire, anonymously, or under a fake name, protection is 95 years from publication or 120 years from creation, whichever’s shorter.

Open Educational Resources (OER)

  • These are free openly licensed learning resources available online.

  • Creative commons - A global nonprofit organization where people can create shareable materials.

Digital Millennium Copyright Act (DMCA)

  • It deals with and protects digital copyright related issues.

    • Protects ISPs from liability for copyright infringement of users.

E-commerce

  • It is selling products and services via Internet

  • There are three e-commerce categories:

    • B2C (Business to Consumer)

    • C2C (Consumer to Consumer)

    • B2B (Business to Business)

  • The consumer market is divided into:

    • Electronics

    • Fashion

    • Toys

    • Furniture

    • Beauty, Health, Personal & Household

    • Food

    • Beverages

    • Media

Electronic Funds Transfer (EFT)

  • It is online banking.

  • Governed by the federal EFT Act.

Electronic Data Interchange (EDI)

  • Communication standards for business transactions include:

    • Allows for exchange of data for making purchase orders and invoices.

    • Nearly all businesses in e-commerce use EDI.

PayPal

  • Free service that allows you to pay, send money, and accept payments online without revealing your financial details.

  • It is an intermediary between your financial institution and the seller.

Radio Frequency Identification (RFID)

  • Uses radio transmissions or electrostatic coupling to locate and identify objects.

  • RFIDs don’t require line of sight scanning.

  • It consists of three components:

    • Antenna - Transmits the signal via radio waves.

    • Transceiver - Both sends and receives information.

    • Transponder - An RFID tag (chip)

RFID Components

  • Tag – Attached to an object that carries and transmits information.

  • Reader – Communicates with an RFID tag using an antenna. Readers can be either fixed or portable and are used to receive information loaded on the tag, including location and associated information.

  • Database – Stores information and allows for evaluation of the information contained on an RFID tag.

  • Application – Completes actions based on information contained on the tag and database. Surfaces information to the end-user.

Downloading

  • Transferring a file from the Internet to your digital device.

  • Tips when downloading content from the Internet:

    • Research the website

    • Check the SSL certificate of the website

    • Use publisher-provided content sites

    • Use anti-virus software

    • Check for PUPs

    • Check website reviews

BitTorrent

  • A popular protocol for sharing movies, TV shows, music and software via the Internet.

  • It has no central servers and uses a peer-to-peer structure.

  • Each downloading user becomes a source for another user who wants the same file.

  • It breaks large files into smaller fragments called torrents.

Software Piracy

  • Occurs when a person engages in one of the following:

    • Stealing software programs

    • Illegally copying a program (piracy)

    • Intentionally erasing a program not belonging to you

    • Illegally activating/registering a program

BSA

  • The Software Alliance (Business Software Alliance) is a leading advocate against software piracy for the global software industry.

Social Media

  • Internet-based apps designed to allow individuals, businesses, and other entities to interact with one another.

Online Dating Services

  • Online data services attempt to use the Internet to develop personal relationships.

  • Pros

    • Online dating allows for access to a wide variety of people.

    • It can be great for shy people.

    • You can initiate contact without having to meet in person.

  • Cons

    • Profiles/photos can be faked or enhanced.

    • Are they really who they say they are?

    • Sites put an emphasis on physical attractiveness.

Electronic Etiquette

  • A code of respectful behavior governing the use of electronic communications software and hardware.

  • It’s known as netiquette.