INF-101 11/30/2023 (Social Media)
It is the digital presence created online by an individual or organization.
Some of the digital attributes are:
Username and password
Browsing history
Online accounts/activity
Purchasing behavior
Personal data
Privacy - The right to control what happens with your personal information.
Internet privacy - The right of personal privacy concerning the storing, distributing, and displaying of information concerning oneself on the Internet. Some considerations include:
Data collection
Data privacy
Data security
Data protection
Surveillance
Consent and control
The European Commission Data Protection Directive states that personal data can only be gathered legally under strict conditions.
The General Data Protection Regulation (GDPR) protects individual in the EU from unlawful data collection and processing.
It also covers consent requirements and privacy policies that enhance an individual’s rights.
The Personal Information Protection and Electronic Data Act (PIPEDA) governs how organizations can collect, store, and use information generated from online activity.
The Federal Law for the Protection of Personal Data Possessed by Private Persons includes rules that state personal data can only be collected for reasons stated in an organization’s privacy policy and that consent must be obtained for collecting and processing personal data that is not publicly available.
U.S. privacy laws/rules include:
The Red Flags Rule
The Gramm-Leach-Bliley Act
The Children’s Online Privacy Protection (COPPA)
Federal Trade Commission (FTC) - Agency mainly responsible for Internet privacy protection.
It includes human knowledge and ideas that the law protects against unauthorized use by others. There are 4 categories:
Patents
Trademarks
Copyrights
Trade secrets
A form of protection provided for original works of authorship.
It doesn’t extend to any idea or process, only the way it’s expressed.
The length of the copyright protection depends on when a work was created. Under the current law:
Works created on or after Jan 1, 1978, have protection for as long as the author is alive. After its death, it will expire after 70 years.
If two or more people are the authors, the 70 years start after the last author dies.
Works made for hire, anonymously, or under a fake name, protection is 95 years from publication or 120 years from creation, whichever’s shorter.
These are free openly licensed learning resources available online.
Creative commons - A global nonprofit organization where people can create shareable materials.
It deals with and protects digital copyright related issues.
Protects ISPs from liability for copyright infringement of users.
It is selling products and services via Internet
There are three e-commerce categories:
B2C (Business to Consumer)
C2C (Consumer to Consumer)
B2B (Business to Business)
The consumer market is divided into:
Electronics
Fashion
Toys
Furniture
Beauty, Health, Personal & Household
Food
Beverages
Media
It is online banking.
Governed by the federal EFT Act.
Communication standards for business transactions include:
Allows for exchange of data for making purchase orders and invoices.
Nearly all businesses in e-commerce use EDI.
Free service that allows you to pay, send money, and accept payments online without revealing your financial details.
It is an intermediary between your financial institution and the seller.
Uses radio transmissions or electrostatic coupling to locate and identify objects.
RFIDs don’t require line of sight scanning.
It consists of three components:
Antenna - Transmits the signal via radio waves.
Transceiver - Both sends and receives information.
Transponder - An RFID tag (chip)
Tag – Attached to an object that carries and transmits information.
Reader – Communicates with an RFID tag using an antenna. Readers can be either fixed or portable and are used to receive information loaded on the tag, including location and associated information.
Database – Stores information and allows for evaluation of the information contained on an RFID tag.
Application – Completes actions based on information contained on the tag and database. Surfaces information to the end-user.
Transferring a file from the Internet to your digital device.
Tips when downloading content from the Internet:
Research the website
Check the SSL certificate of the website
Use publisher-provided content sites
Use anti-virus software
Check for PUPs
Check website reviews
A popular protocol for sharing movies, TV shows, music and software via the Internet.
It has no central servers and uses a peer-to-peer structure.
Each downloading user becomes a source for another user who wants the same file.
It breaks large files into smaller fragments called torrents.
Occurs when a person engages in one of the following:
Stealing software programs
Illegally copying a program (piracy)
Intentionally erasing a program not belonging to you
Illegally activating/registering a program
The Software Alliance (Business Software Alliance) is a leading advocate against software piracy for the global software industry.
Internet-based apps designed to allow individuals, businesses, and other entities to interact with one another.
Online data services attempt to use the Internet to develop personal relationships.
Pros
Online dating allows for access to a wide variety of people.
It can be great for shy people.
You can initiate contact without having to meet in person.
Cons
Profiles/photos can be faked or enhanced.
Are they really who they say they are?
Sites put an emphasis on physical attractiveness.
A code of respectful behavior governing the use of electronic communications software and hardware.
It’s known as netiquette.
It is the digital presence created online by an individual or organization.
Some of the digital attributes are:
Username and password
Browsing history
Online accounts/activity
Purchasing behavior
Personal data
Privacy - The right to control what happens with your personal information.
Internet privacy - The right of personal privacy concerning the storing, distributing, and displaying of information concerning oneself on the Internet. Some considerations include:
Data collection
Data privacy
Data security
Data protection
Surveillance
Consent and control
The European Commission Data Protection Directive states that personal data can only be gathered legally under strict conditions.
The General Data Protection Regulation (GDPR) protects individual in the EU from unlawful data collection and processing.
It also covers consent requirements and privacy policies that enhance an individual’s rights.
The Personal Information Protection and Electronic Data Act (PIPEDA) governs how organizations can collect, store, and use information generated from online activity.
The Federal Law for the Protection of Personal Data Possessed by Private Persons includes rules that state personal data can only be collected for reasons stated in an organization’s privacy policy and that consent must be obtained for collecting and processing personal data that is not publicly available.
U.S. privacy laws/rules include:
The Red Flags Rule
The Gramm-Leach-Bliley Act
The Children’s Online Privacy Protection (COPPA)
Federal Trade Commission (FTC) - Agency mainly responsible for Internet privacy protection.
It includes human knowledge and ideas that the law protects against unauthorized use by others. There are 4 categories:
Patents
Trademarks
Copyrights
Trade secrets
A form of protection provided for original works of authorship.
It doesn’t extend to any idea or process, only the way it’s expressed.
The length of the copyright protection depends on when a work was created. Under the current law:
Works created on or after Jan 1, 1978, have protection for as long as the author is alive. After its death, it will expire after 70 years.
If two or more people are the authors, the 70 years start after the last author dies.
Works made for hire, anonymously, or under a fake name, protection is 95 years from publication or 120 years from creation, whichever’s shorter.
These are free openly licensed learning resources available online.
Creative commons - A global nonprofit organization where people can create shareable materials.
It deals with and protects digital copyright related issues.
Protects ISPs from liability for copyright infringement of users.
It is selling products and services via Internet
There are three e-commerce categories:
B2C (Business to Consumer)
C2C (Consumer to Consumer)
B2B (Business to Business)
The consumer market is divided into:
Electronics
Fashion
Toys
Furniture
Beauty, Health, Personal & Household
Food
Beverages
Media
It is online banking.
Governed by the federal EFT Act.
Communication standards for business transactions include:
Allows for exchange of data for making purchase orders and invoices.
Nearly all businesses in e-commerce use EDI.
Free service that allows you to pay, send money, and accept payments online without revealing your financial details.
It is an intermediary between your financial institution and the seller.
Uses radio transmissions or electrostatic coupling to locate and identify objects.
RFIDs don’t require line of sight scanning.
It consists of three components:
Antenna - Transmits the signal via radio waves.
Transceiver - Both sends and receives information.
Transponder - An RFID tag (chip)
Tag – Attached to an object that carries and transmits information.
Reader – Communicates with an RFID tag using an antenna. Readers can be either fixed or portable and are used to receive information loaded on the tag, including location and associated information.
Database – Stores information and allows for evaluation of the information contained on an RFID tag.
Application – Completes actions based on information contained on the tag and database. Surfaces information to the end-user.
Transferring a file from the Internet to your digital device.
Tips when downloading content from the Internet:
Research the website
Check the SSL certificate of the website
Use publisher-provided content sites
Use anti-virus software
Check for PUPs
Check website reviews
A popular protocol for sharing movies, TV shows, music and software via the Internet.
It has no central servers and uses a peer-to-peer structure.
Each downloading user becomes a source for another user who wants the same file.
It breaks large files into smaller fragments called torrents.
Occurs when a person engages in one of the following:
Stealing software programs
Illegally copying a program (piracy)
Intentionally erasing a program not belonging to you
Illegally activating/registering a program
The Software Alliance (Business Software Alliance) is a leading advocate against software piracy for the global software industry.
Internet-based apps designed to allow individuals, businesses, and other entities to interact with one another.
Online data services attempt to use the Internet to develop personal relationships.
Pros
Online dating allows for access to a wide variety of people.
It can be great for shy people.
You can initiate contact without having to meet in person.
Cons
Profiles/photos can be faked or enhanced.
Are they really who they say they are?
Sites put an emphasis on physical attractiveness.
A code of respectful behavior governing the use of electronic communications software and hardware.
It’s known as netiquette.