Presentation is loading. Please wait.

Presentation is loading. Please wait.

THREATS. A person who is addicted to the Net displays symptoms like: Idolization of computer Mood alteration Tolerance Conflicts LEADS TO Isolation Body.

Similar presentations


Presentation on theme: "THREATS. A person who is addicted to the Net displays symptoms like: Idolization of computer Mood alteration Tolerance Conflicts LEADS TO Isolation Body."— Presentation transcript:

1 THREATS

2 A person who is addicted to the Net displays symptoms like: Idolization of computer Mood alteration Tolerance Conflicts LEADS TO Isolation Body diseases (e.g. obesity) Ophthalmic and muscular problems Physical exercise dereliction Absence either from school or any other place ADDICTION

3 Specifically, addicted users face serious integration problems in the fields of work, school an even in this society. In this way, The addiction/overuse of the Net deprives every person’s right of equal chances.

4 Electronic games that include violence, assassinations etc., may have serious impacts on the behavior and character of youth. There is much evidence which displays the connection between violent games and long term anti-social and violent attitudes. The most fatal danger that ambushes is the identification of the player with the avatar.

5 When we say electronic gambling we mean the action where two or more people contact with each-other online and bet. An action like that can cause the loss of real money.

6 Online misinformation is possible to happen with the presentation of a various fake/untrue information on websites that want to mislead us. Also, misinformation happens even when our information is incomplete and as a result people are led to wrong opinions. Results:  People’s manipulation  Fanaticism & Violence  Democracy undermining

7 Usually, by saying inappropriate, we mean a content which can cause mental disorder, shock or even promote wrong attitude. It can be caused by:  Unreliable Websites  Online Games  E-mail

8 Unwanted messages (spam) Are the messages that under normal circumstances users wouldn’t choose to see and are delivered to a lot of people. For example, messages that include promotion of doubtful products, and their content is related to ψευδοτυχερα παιχνιδια, ψευδονομικές υπηρεσίες, κτλ. Something really common is the reception of chain- messages. These messages are unwanted and the expeditor asks the recipient to promote the message to other people he knows.

9 Grooming: ● Is the process at which, pedophiles, pretending to be minors, use the internet in order to attract children with a view to abuse them. ● ž Web pages with inadequate sexual content: ● -Are humiliating the human personality ● -Are infringing the right of children to innocence.

10 Children's pornography is the representations of minors that participate in sexual action or situations that imply sexual activities. Sometimes the definition includes pictures that have been photoshoped from computer. The children's pornography is considered as crime and beings in penal sanctions.

11

12 Major infringements online are:  Interception of our personal data  Electronic fraud  Malware  Cyberbullying Our navigation online has many things in common with reality. Whatever we do online always leaves traces!

13 Cookies Cookies Cookies are bits of information such as username, registry details on a website, preferences, online shopping etc. Legal companies use Cookies to make offers to users who visit them frequently. Illegal companies use Cookies in order to collect user’s information and sell them to Marketing corporations. Interception of our personal data

14 Phishing: “Phising” in the act in which someone tries to obtain information after making sure he is disguised to a trustworthy entity of electronic communication. During this tactic, experts reveal personal data to a false form online. Electronic fraud Pharming: It is a form of e-mail scam. As a result, the user believes that he is in a genuine website with real URL.

15 Malware Virus: The infection happens when a user is asked to receive a file… When he tries to use it, virus spreads everywhere infecting his computer system. It destroys other files and even the hard drive.

16 Trojan: Trojan: Is a malware that fools the user and makes him believe that he carries out a useful function while it secretly installs other malwares as well. Worm: A computer worm is self-replicating malware computer program, which uses computer networks to send copies of itself to other computer networks and may happen without the user’s intervention.

17 Adware Adware: A Software that displays or downloads commercials automatically on a computer. Spyware Spyware: A program that collects information from someone without his approval.

18 Cyberbullying

19 Bullying is possible to happen via the Internet, mainly via the electronic post (email), blogs and chat rooms. It includes intentional, repeated and hostile behavior toward individual or team of individuals that want to cause sentimental and psychological damage.

20 ● Forms of intimidation: ● Teases amining at the amusement ● Share of offensive reputation ● Sexual Abuse ● Libel in others via photographs, messages and video in the internet


Download ppt "THREATS. A person who is addicted to the Net displays symptoms like: Idolization of computer Mood alteration Tolerance Conflicts LEADS TO Isolation Body."

Similar presentations


Ads by Google