0% found this document useful (0 votes)
16 views21 pages

Comp 20333 Reviewer (Highlighted)

The document discusses the global digital environment, emphasizing the role of globalization and technology in enhancing communication and economic interdependence. It covers various emerging technologies such as cloud computing, mobile computing, big data analytics, and artificial intelligence, highlighting their applications and implications for industries. Additionally, it addresses issues related to internet censorship and freedom of expression, particularly in the context of the Philippines, outlining the pros and cons of regulating online content.

Uploaded by

caspemarkvincent
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views21 pages

Comp 20333 Reviewer (Highlighted)

The document discusses the global digital environment, emphasizing the role of globalization and technology in enhancing communication and economic interdependence. It covers various emerging technologies such as cloud computing, mobile computing, big data analytics, and artificial intelligence, highlighting their applications and implications for industries. Additionally, it addresses issues related to internet censorship and freedom of expression, particularly in the context of the Philippines, outlining the pros and cons of regulating online content.

Uploaded by

caspemarkvincent
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 21

CHAPTER 1

GLOBAL DIGITAL ENVIRONMENT

Today it is just as simple to communicate with someone on the other side of the world
as it is to talk to someone next door. Basically, it means using a computer or any other
digital technology to make any information available to everyone else through the
Internet.

GLOBALIZATION is a process of interaction and integration among the people, companies, and
governments of different nations, a process driven by international trade and investment and
aided by information technology.

GLOBALIZATION describes the growing interdependence of the world's economies, cultures, and
populations, brought about by cross-border trade in goods and services, technology, and flows
of investment, people, and information.

Digital Divide is the unequal access of information and communication technology between
different groups of society, and the knowledge of the skills required to use the technology.

CLOUD COMPUTING is a network of resources a company can access, and this method of using
a digital drive increases the efficiency of organizations.

According to Forbes, 83 percent of enterprise workloads will be in the cloud by 2020, which
means 2019 will show an increasing trend closing in on this statistic.

1 Prepared by: MLCAMATA 12/1/2024


Cloud storage and sharing is a popular trend many
companies have adopted and even implemented for
employee interaction.

"The cloud" refers to servers that are accessed over the


Internet, and the software and databases that run on
those servers. Cloud servers are located in data centers
all over the world.

MOBILE COMPUTING AND APPLICATIONS

MOBILE COMPUTING is the ability to connect portable devices to wireless-enabled networks to


access data and services while on the move. It is a convenient technique to transmit and receive
voice, text, audio, and video with no temporal or special constraints.

MOBILE COMPUTING SYSTEM is a distributed system, which is connected via a wireless network
for communication. The clients or the nodes possess mobility and the ability to provide
computing at anytime, anywhere.

BIG DATA ANALYTICS

BIG DATA is a trend that allows businesses to analyze extensive sets of information to achieve
variety in increasing volumes and growth of velocity. Big data has a high return on investment
that boosts the productivity of marketing campaigns, due to its ability to enable high-functioning
processing.

DATA MINING is the process of sorting through large data sets to identify patterns and
relationships that can help solve business problems through data analysis. Data mining is a way
companies can predict growth opportunities and achieve future success.

AUTOMATION is a combination of computer, mechanical and electrical elements or processes


that operate with minimal human intervention or without human intervention and covers
digital control, systems, supervision, data management, engines, devices, communications,
production, interactions and many more.

AUTOMATION is usually used to improve the operation and improvement of an industrial plant
or company, but automation can also be used in the stadium, farm or even in the infrastructure
of cities, and even in all productive areas ready to keep pace with digital transformation.

2 Prepared by: MLCAMATA 12/1/2024


CHAPTER 2

EMERGING AND CONVERGING INFORMATION COMMUNICATION TECHNOLOGIES

While nanotechnology (and all other emerging, converging technologies) promise


radical changes in science and society, future progress in the field will require
overcoming many scientific challenges.

EMERGING SOFTWARE TECHNOLOGIES

EMERGING TECHNOLOGIES are technologies whose development, practical applications, or both


are still largely unrealized. These technologies are generally new but also include old technologies
finding new applications.

1. ARTIFICIAL INTELLIGENCE AND SMART MACHINES

Artificial intelligence harnesses algorithms and machine learning to


predict useful patterns humans normally identify. Artificial
intelligence (AI) is a set of technologies that enable computers to
perform a variety of advanced functions, including the ability to
see, understand and translate spoken and written language,
analyze data, make recommendations, and more.

2. VIRTUAL REALITY

Virtual Reality (VR) is a computer-generated environment with


scenes and objects that appear to be real, making the user feel they
are immersed in their surroundings.

The software of virtual reality is making many industries prepared


for various scenarios before entering them.

3. AUGMENTED REALITY

Augmented reality is a more versatile and practical version of


virtual reality, as it does not fully immerse individuals in an
experience. Augmented reality features interactive scenarios that
enhance the real world with images and sounds that create an
altered experience.

3 Prepared by: MLCAMATA 12/1/2024


4. BLOCKCHAIN DATA

Blockchain is a digital database or ledger that is distributed


among the modes of a peer-to-peer network.

BLOCKCHAIN DATA, like the new cryptocurrency Bitcoin, is a


secure method that will continue to grow in popularity and use
in 2019. This system allows you to input additional data
without changing, replacing, or deleting anything. In the influx of shared data systems like cloud
storage and resources, protecting original data without losing important information is crucial.

5. CYBER-PRIVACY AND SECURITY

Cyber security is a discipline that covers how to defend


devices and services from electronic attacks by hackers,
spammers, and cybercriminals. Data privacy is a consumer's
understanding of their rights to how their personal
information is collected, used, stored, and shared.

In the digital world, security generally refers to the unauthorized access of data, often involving
protection against hackers or cyber criminals. PRIVACY involves your right to manage your
personal information, and SECURITY is the protection of this information.

6. INTERNET OF THINGS

The Internet of Things (IoT) primarily refers to any


device, appliance, instrument, or machine that can
connect to the internet. They contain sensors,
software, and other technologies used to link and
exchange data between systems and devices over the
Internet.

The Internet of Things (IoT) is an emerging movement


of products with integrated Wi-Fi and network
connectivity abilities. Use of IoT allows people to turn
on music hands-free with a simple command, or lock
and unlock their doors even from a distance.

4 Prepared by: MLCAMATA 12/1/2024


MINIATURIZATION

the process of making something


very small using modern technology
he trend to manufacture ever smaller mechanical,

Examples include miniaturization of mobile phones ,


computers and vehicle engine downsizing.

A Multifunction Peripheral (MFP) refers to a device that performs a variety of tasks that are
usually carried out by separate peripheral devices. These tasks can include copying, printing,
scanning, and faxing documents.

THE RISE OF ROBOTICS

ROBOTICS is a branch of engineering that involves the conception, design, manufacture, and
operation of robots. This field overlaps with electronics, computer science, artificial intelligence,
mechatronics, nanotechnology and bioengineering.

Science-fiction author Isaac Asimov is often given credit for being the first person to use the term
robotics in a short story composed in the 1940s. In the story, Asimov suggested three principles
to guide the behavior of robots and smart machines. Asimov's Three Laws of Robotics, as they
are called, have survived to the present:

1. Robots must never harm human beings.


2. Robots must follow instructions from humans without violating rule 1.
3. Robots must protect themselves without violating the other rules.

Application of Robotics

1. Health Care. They can help doctors in performing operations more precisely, be used as
prosthetic limbs, provide therapy to patients.

5 Prepared by: MLCAMATA 12/1/2024


2. Security. Robotics is being considered as a solution to enhance security measures.
Robots can serve as security agents, protecting humans without being vulnerable to
danger like human security guards.

3. Food Preparation. Robot chefs can create food using hundreds of different recipes.
MOLEY ROBOTICS is one such robotics company that has created a robotic kitchen with
a robot that can cook like a master chef! Moley robotics captures, with an integrated 3d
camera and wired glove, the entire work of a human chef and upload it into a database.

BUSINESS3 PROCESS OUTSOURCING (BPO)


CHAPTER

ICT-ENABLED INDUSTRY

These increasingly globalized service activities not only contribute to the development
of the ICT sector but also more broadly to other business and service activities.

Business Process Outsourcing (BPO) is the contracting of a specific business task, such as payroll,
human resources (HR) or accounting, to a third-party service provider.

One of the most dynamic and fastest growing sectors in the Philippines is the Information
Technology - Business Process Outsourcing (IT-BPO) Industry. The industry is composed of eight
sub-sectors, namely, knowledge process outsourcing and back offices, animation, call centers,
software development, game development, engineering design, and medical transcription. The
IT-BPO industry plays a major role in the country's growth and development.

BPO Setups (Captive Markets and Offshoring/Third Party Outsourcing)

a) Project Based Outsourcing- primarily used for business activities with irregular
frequencies or one-off projects.
b) Dedicated Development Center - primarily used in business cases when there are
changing requirements. In this specific model it could be used for some long-term goals
for developing technology or software.
c) Captive Markets- preferred when core or crucial business activities are needed to be run
at cheaper costs. The rationale for employing such a setup is to cater to long term
strategic plans involving high managerial control.

6 Prepared by: MLCAMATA 12/1/2024


d) Captive Markets: Start From Scratch Model - The usual flow is for the company to
develop all its resources in the new designated area or country of operations.
e) Build Operate Transfer Model - the practice is to contact a 3rd party vendor in order to
develop a contract in which the vendor is the one who develops the property, sources the
employees and manages the BPO center for the first designated period or amount of time.

TRENDS IN THE INDUSTRY

• Better Information security


• Strategic balanced-shore outsourcing
• Booming Blogging and Social Media Outsourcing
• Popularity of cloud-based software

ISSUES CONCERNING THE INDUSTRY IN THE PHILIPPINES

1. Health Issues - employees experience:


• back and shoulder pains due to the workstation setups and monitor levels
• several have complained about experiencing throat irritations due to dealing with
multiple calls a day
• coupled with a high stress work environment
• concerns regarding the employees’ hearing being damaged due to most of these
workers being exposed to higher noise levels

2. Political Issues
Revision of Republic Act 7916
• exempting the companies from national and local taxes
• only having to pay 5% of their gross income as tax

Approval of RA 7916
• the establishment of the Philippine Economic Zone Authority (PEZA) which
considered IT Parks as special economic zones
• encouraged foreign investment in the industry by providing subsidies for
infrastructure development and tax exemptions

3. Economic Issues
• the BPO industry is the fastest growing sector in the country
• the growth in the BPO industry has barely trickled down to most of the Philippine
population

7 Prepared by: MLCAMATA 12/1/2024


• the BPO industry was the fastest growing sector from 2005-2012 but only took in 1% of
the labor force

MOBILE - BASED SERVICE INDUSTRY

Those companies, which together enable the provision of telecommunication, information and
entertainment services including voice, internet, SMS, text and other data services
• Mobile banking,
• economic development,
• delivery of health services,
• citizen empowerment,
• greater access to media and education

E - SERVICE/E - GOVERNMENT

E-Government in the Philippines is envisioned to create “a digitally empowered and integrated


government that provides responsive and transparent online citizen-centered services for a
globally competitive Filipino nation.”
• Efficient delivery of public services (Citizens)
• Places a premium on value-added, shared services, interoperability and the
maximization of public resources (Government)
• Provides spaces for participation and fosters synergy in governance (Civil Society
Organizations)
• Identifies policy and advocacy areas that need to be addressed in creating an
environment necessary for fostering an integrated, interoperable and harmonized
system of e-Governance (Policymakers)

8 Prepared by: MLCAMATA 12/1/2024


CHAPTER 4

INTERNET CENSORSHIP AND FREEDOM OF EXPRESSION

Government may regulate, or censor speech if it has a compelling interest, is a public


concern, or threatens national safety. On the other hand, the regulation of material on
the Internet would, in fact, violate the First Amendment right to free speech and
expression.

INTERNET CENSORSHIP

INTERNET CENSORSHIP is the control or suppression of what can be accessed, published, or


viewed on the Internet enacted by regulators, or on their own initiative.

Internet censorship also occurs in response to or in anticipation of events such as elections,


protests, and riots. An example is the increased censorship due to the events of the Arab Spring.
Other areas of censorship include copyrights, defamation, harassment, and obscene material.

Internet Censorship in Philippines

The Cybercrime Prevention Act of 2012 (Republic Act No. 10175). It aims to address legal issues
concerning online interactions and the Internet in the Philippines. Among the cybercrime
offenses included in the bill are cybersquatting, cybersex, child pornography, identity theft, illegal
access to data and libel.

INTERNET FILTERING normally refers to the technical approaches to control access to


information on the Internet

Internet censorship and content restrictions can be enacted through a number of different
strategies which we describe below.

TECHNICAL BLOCKING - These techniques are used to block access to specific Web Pages,
domains, or IP addresses.

Commonly used techniques to block access to Internet sites:

1. IP blocking,
2. DNS tampering, and

9 Prepared by: MLCAMATA 12/1/2024


3. URL blocking using a proxy

10 Prepared by: MLCAMATA 12/1/2024


KEYWORD BLOCKING, which blocks access to websites based on the words found in URLs or
blocks searches involving blacklisted terms, is a more advanced technique that a growing
number of countries are employing.

SEARCH RESULT REMOVALS - provide Internet search services cooperate with governments to
omit illegal or undesirable websites from search results.

TAKE-DOWN - the simplest strategy is to demand the removal of websites with inappropriate or
illegal content.

INDUCED SELF-CENSORSHIP - common and effective strategy to limit exposure to Internet


content both in browsing habits and in choosing content to post online.

What Are the Pros of Internet Censorship?

1. It creates the chance to set common sense limits.


A simple search right now on an unfiltered public search can provide anyone with
access to numerous videos that purport to show real murders in progress.
2. It limits access to harmful activities.
There are dark areas of the internet where anything goes right now. By restricting
content that can be accessed, it limits the opportunities that predators can create to
reach out to find new victims.
3. It could lessen the impact of identity theft.
One of the fastest growing crimes in the world today is identity theft. Restricting
content that would allow identity information to be easily shared could lessen the
impact that identity theft causes to a society.
4. It may provide a positive impact on national security.
Although hacking will occur no matter what internet censorship laws may be in place,
by creating internet censorship regulations with strict and mandatory penalties for a
violation, it could become possible to reduce the number of hacking incidents that
occur.
5. It stops fake news.
Fake news websites promote false reports for money through clicks because readers
think the news is real.

11 Prepared by: MLCAMATA 12/1/2024


What Are the Cons of Internet Censorship?

1. Who watches the watchers?


Even if internet censorship is directly supervised and ethically maintained, someone
somewhere is deciding on what is acceptable and what is not acceptable for society
to see online.
2. It stops information.
Although fake information can be restricted through internet censorship, so can real
information. According to the World Economic Forum, 27% of all internet users live in
a country where someone has been arrested for content that they have shared,
published, or simply liked on Facebook. 38 different countries made arrests based
solely on social media posts in 2016.
3. It is a costly process.
According to research from Darrell West, VP and Director of Governance Studies and
the founding director of the Center for Technology Innovation at Brookings, internet
shutdowns cost countries $2.4 billion in 2015. Censoring content is costly, and it will
come at the expense of taxpayers.

FREEDOM OF EXPRESSION

Right to express one's ideas and opinions freely through speech, writing, and other forms
of communication but without deliberately causing harm to others' character and/or
reputation by false or misleading statements.
According to the Universal Declaration of Human Rights, proclaimed in 1948, Everyone
has the right to freedom of opinion and expression.
This right includes freedom to hold opinions without interference and to seek, receive and
impart information and ideas through any media and regardless of frontiers.

FREEDOM OF EXPRESSION is recurrently limited through tactics that include censorship,


restrictive press legislation and harassment of journalists, bloggers and others who voice their
opinions, as well as crackdowns on religious minorities.

The right to freedom of expression is a fundamental human right, which is shown as a corollary
of human dignity, representing a necessary foundation for the survival of the state.

At an individual level, freedom of expression is the key to the development and fulfilment of
every person. People can gain an understanding of their surroundings and the wider world by
exchanging ideas and information freely with others.

12 Prepared by: MLCAMATA 12/1/2024


At a national level, freedom of expression is necessary for good government and therefore for
economic and social progress.

• Free debate about new legislation helps ensure that the eventual law has the support
of the population, making it more likely to be respected.

• If people can speak their minds without fear, and the media are allowed to report
what is being said, the government can become aware of any concerns and address
them.

• Free debate about and between political parties exposes their strengths and
weaknesses, as a result media scrutiny of the government and the opposition helps
expose corruption or other improprieties and prevents a culture of dishonesty.

Public authorities may restrict this right if they can show that their action is lawful, necessary and
proportionate in order to:

• protect national security, territorial integrity (the borders of the state) or public safety
• prevent disorder or crime
• protect health or morals
• protect the rights and reputations of other people
• prevent the disclosure of information received in confidence
• maintain the authority and impartiality of judges
• An authority may be allowed to restrict your freedom of expression if, for example,
you express views that encourage racial or religious hatred.

USING DIGITAL TECHNOLOGIES FOR FREEDOM OF EXPRESSION


1. SOCIAL MEDIA
- is the general term used to describe the plethora of web-based applications that
allow people to create, share and exchange information, opinions and ideas in
virtual communities. Social media use Internet and mobile technologies to create
interactive platforms where individuals and communities share, co-create, discuss
and modify user-generated content. however, it is necessary to be mindful of the
dangers of using social media as well.

2. YouTube/Soundcloud
- are online websites that enable people to upload and share videos and audio for free.
A variety of businesses, artists, experts and organizations use them to disseminate
ideas and information to a wide audience.

13 Prepared by: MLCAMATA 12/1/2024


3. Mobile Phones

- have been around for decades and new advancements in smartphones support a
variety of additional services such as business, news, social and game applications and
photography.

4. Online Website
- may not be new but the way that they are being used to reach wider demographics
and new audiences can be considered innovative. Being online gives organizations and
businesses a platform to represent their work to the world.

5. Tablet/computers
- are compact mobile computers that are interactive with touchscreens and have
capabilities such as inbuilt cameras and microphones that make them ideal for roving
reporters and journalists who are capturing stories on the go.

Advantages

• Allows individuals to express their opinions


• Less corruption
• Freedom from hunger
• A healthier society
• Respect for environment
• Respect for fundamental human rights
• Improve national security
• Make the political system more democratic
• Make the government more efficient
• Lead to better decision-making
• Help the economy become more efficient
• Individuals will receive better treatment from institutions

Conclusion:

Freedom of expression, the right to express one's ideas and opinions freely through speech,
writing, and other forms of communication, has developed towards progress over the years.
However, there is still a long path to tread to type it as universal.

14 Prepared by: MLCAMATA 12/1/2024


WEBSITE CONTENT FILTRATION

Need for filtering:

1. Safe access to the internet


2. For business
3. Protect children for unsuitable contents

CONTENT FILTERING - is the use of a program to screen and exclude from access or availability of
web pages or e-mail that is deemed objectionable.

CONTENT FILTERING usually works by specifying character strings that, if matched, indicate
undesirable content that is to be screened out.

TYPES OF FILTERING

1. BROWSER BASED FILTERS - It is the most lightweight solution to do content filtering and
is implemented via third party extensions.

2. E-MAIL FILTERS - E-mail filters set on information contained in the mail headers such as
sender, subject, and e-mail attachments to classify, accept or reject messages.

3. SEARCH-ENGINE FILTERS - Many search engines, such as Google and Bing offer users the
option of turning on a safety filter. When this safety filter is activated, it filters out the
inappropriate links from all of the search results.

4. PROBLEMS WITH FILTERING - It could be expected that allowed content would be


blocked. If all pornographic content is to be blocked, other content with a resemblance in
features will also be blocked e.g. sex education, medical information etc.

WEBSITE CONTENT FILTRATION

Television and Films

The Movie and Television Review and Classification Board (MTRCB) – is a Philippine government
agency under the Office of the President of the Philippines that is responsible for the classification
and review of television programs, movies and home videos.

15 Prepared by: MLCAMATA 12/1/2024


The government agency can classify a movie or television program an X-rating which forbids the
material from being shown to the public due to issues such as excessive obscenity.

FILMS DESCRIPTION

G (General Patronage) – Viewers of all ages are admitted.


PG (Parental Guidance) – Viewers below 13 years old must be accompanied by a parent or a
supervising adult.
R-13 – Only viewers who are 13 years old and above can be admitted.
R-16 – Only viewers who are 16 years old and above can be admitted.
R-18 – Only viewers who are 18 years old and above can be admitted. X
– “X – rated” films are not suitable for public execution.

CHAPTER 5

SEX AND TECHNOLOGY

Whilst using computer as the medium, technology crime is not that much different
from traditional crime. Various common types of technology crime are listed here.

CHILD PORNOGRAPHY

Child pornography is a form of child sexual exploitation. The law defines child pornography as any
visual depiction of sexually explicit conduct involving a minor (persons less than 18 years old).

Images of child pornography are also referred to as child sexual abuse images.

Child pornography images are readily available through virtually every Internet technology,
including social networking websites, file-sharing sites, photo-sharing sites, gaming devices, and
even mobile apps.

Child pornography offenders can also connect on Internet forums and networks to share their
interests, desires, and experiences abusing children, in addition to selling, sharing, and trading
images.

16 Prepared by: MLCAMATA 12/1/2024


Purveyors of child pornography continue to use various encryption techniques and anonymous
networks on “The Dark Internet”, attempting to hide their amassed collections of illicit child
abuse images.

VIRTUAL PROSTITUTION AND CYBER SEX


VIRTUAL SEX is sexual activity where two or more people - or one person and a virtual character
- gather together via some form of communications equipment to arouse each other, often by
the means of transmitting sexually explicit messages.

VIRTUAL PROSTITUTION is an activity in which one engages in sexual activity with another
person, whom neither have ever seen/met in real life before. Usually, the two met online.

Using the Internet to access prostitution-related information and engage in virtual prostitution
empowers men to sexually exploit women and children.

The combined experience of using high tech computer hardware and software, finding a
supportive community on the Internet, and having a sexual experience (masturbating to
pornography, live sex shows and writing about prostitution) is reinforcing and empowering.

Prostitution is not a victimless crime. Each sex act, whether online or not, is a violation of
women’s dignity and bodily integrity.

CYBERSEX can be defined as those sexual acts that are derived from surfing electronic media
sites that would titillate the sexual mind, and the act satisfies the erotic needs of an individual.

CYBER SEX
TYPES OF CYBERSEX USER Group 1: RECREATIONAL USERS – APPROPRIATE

This group of cybersex users are able to occasionally explore sex on the internet without
problems. They might use cybersex to enhance their sexual experiences. They are able to enjoy
intimate sexual relationships in the real world and have a healthy attitude to sexuality.

17 Prepared by: MLCAMATA 12/1/2024


Group 2: RECREATIONAL USERS - INAPPROPRIATE

Like appropriate recreational users, this group of cybersex users can also access internet sex
without compulsive use but may use this material inappropriately. This could include sexting or
showing sexual images to other people for amusement or shock value, causing unintentional
embarrassment.

Group 3: PROBLEMATIC USERS – DISCOVERY GROUP

This group has not had any past problems with online other sexual behavior. They may be using
the internet to explore sexuality in a way that normal life has not offered them. They may also
be using dating sites to meet multiple partners in a manipulative or dishonest way.

Group 4: PROBLEMATIC USERS – PREDISPOSED GROUP

This group includes people who may have a history of fantasizing about sexual acting out, but
who have never done it until accessing internet-based sexual material.

ONLINE RELATIONSHIPS are a relationship between people who have met online and, in many

ONLINE RELATIONSHIP
cases, know each other only via the Internet.

Even while there are true and honest connections that may be made through technology, it is still
important to be very careful when conversing online.

People who fabricate an online persona in order to deceive others are known as "catfish"
online.
ADVANTAGES DISADVANTAGES

1. can immediately focus on people with


similar interest, beliefs, age and other 1. Scammers
important criteria.
2. Meaningful dating can be done at a 2. Data Shared is Permanent
distance, even in other countries. 3. Distance is a Barrier

3. Allows you to expand your options


outside your social circle. 4. Misleading Form of Attraction

18 Prepared by: MLCAMATA 12/1/2024


ONLINE DATING APP / SITE EXAMPLES

PROFOUNDLY TINDER

NEARGROUP OMEGLE

CHAPTER 6

TECHNOLOGY AND PRIVACY

Almost all the information these devices collect can be sold to companies or used by
government and law enforcement to keep tabs or gather evidence. At the same time,
we use technology so frequently as a society because it allows us to do things faster
and with much less efforts.

IDENTITY THEFT

Also known as IDENTITY FRAUD, is a crime in which an imposter obtains key pieces of Personally
Identifiable Information (PII), such as Social Security or driver's license numbers, to impersonate
someone else.

The taken information can be used to run up debt purchasing credit, goods and services in the
name of the victim or to provide the thief with false credentials.

DIFFERENT EXAMPLES OF IDENTITY THEFT

1. Financial identity theft. This is the most common type of identity theft. Financial identity
theft seeks economic benefits by using a stolen identity.
2. Tax-related identity theft. In this type of exploit, the criminal files a false tax return with the
Internal Revenue Service (IRS). Done by using a stolen Social Security number.
3. Medical identity theft. Where, the thief steals information like health insurance member
numbers, to receive medical services.

19 Prepared by: MLCAMATA 12/1/2024


Criminal identity theft - a person under arrest gives stolen identity information to the police
ONLINE RELATIONSHIP

Child identity theft - In this exploit, a child's Social Security number is misused to apply for
government benefits, opening bank accounts and other services.

Senior identity theft. This type of exploit targets people over the age of 60. Because senior
citizens are often identified as theft targets, it is especially important for this senior to stay on top
of the evolving methods thieves use to steal information.

Identity cloning for concealment. In this type of exploit, a thief impersonates someone else in
order to hide from law enforcement or creditors. Because this type isn't explicitly financially
motivated, it's harder to track, and there often isn't a paper trail for law enforcement to follow.

Synthetic identity theft. In this type of exploit, a thief partially or completely fabricates
an identity by combining different pieces of PII from different sources.

Identity theft techniques

1. Mail theft. This is stealing credit card bills and junk mail directly from a victim's mailbox
or from public mailboxes on the street.

2. Dumpster diving. Retrieving personal paperwork and discarded mail from trash
dumpsters is an easy way for an identity thief to get information. Recipients of
preapproved credit card applications often discard them without shredding them first,
which greatly increases the risk of credit card theft.

3. Shoulder surfing. This happens when the thief gleans information as the victim fills
out personal information on a form, enter a passcode on a keypad or provide a credit
card number over the telephone.

4. Phishing. This involves using email to trick people into offering up their personal
information. Phishing emails may contain attachments bearing malware designed to
steal personal data or links to fraudulent websites where people are prompted to enter
their information.

MONITORING. Employers are justifiably concerned about threats to and in the


workplace, such as theft of property, breaches of data security, identity theft, viewing of
pornography, inappropriate and/or offensive behavior, violence, drug use, and others.

20 Prepared by: MLCAMATA 12/1/2024


Employers are justifiably concerned about threats to and in the workplace, such as theft of
property, breaches of data security, identity theft, viewing of pornography, inappropriate and/or
offensive behavior, violence, drug use, and others.

INTRUSION/INVASION OF PRIVACY
Employers might also be concerned about the productivity loss resulting from employees using
office technology for personal matters while on the job. At the same time, however, organizations
must balance the valid business interests of the company with employees’ reasonable
expectations of privacy.

INTRUSION/INVASION OF PRIVACY

It is used to describe a circumstance where an individual or organization knowingly intrudes upon


a person. The intrusion occurs when the person has a reasonable expectation of privacy, such as
in a bathroom or locker room.

DECEPTION

One type of invasion of privacy, in some states, is called deception. Deception occurs when an
employer collects information, he claims is for one reason but uses it for another reason, which
could result in the employee's termination.

VIOLATION OF CONFIDENTIALITY

A second type of invasion of privacy is violating an employee's confidentiality. This occurs when
information given in confidence is then given to a third party.

INTRUSION & MISAPPROPRIATION

A third type of invasion of privacy is intrusion. This occurs in business when an employer intrudes
in an employee's private life.

21 Prepared by: MLCAMATA 12/1/2024

You might also like