Thursday, 20 December 2012

crime and crime prevention

 

in the current day there are many crimes that are committed through the Internet. Many Internet criminals are using a number of different methods in order to take what they want from unsuspecting members of the public. There are a whole range of reasons why criminals commit crime via the Internet, however the most common crimes are the theft of money, the theft of identities or information and finally the damaging of others computers via methods such as viruses.


Out of all of the crimes committed via the internet the theft of money from others is the largest due to a number of reasons, however the main reason is that its probably the easiest to do as more and more people are buying and selling products via the internet with the use of credit or debit cards. Criminals are easily able to access these details if members of the public aren’t careful with their details, for example if a member of the public puts their details into an unsecure website there is a great risk of a criminal obtaining this information.

The theft of identity and information is also very common Internet crime in the current day. Many computer criminals will try and attack big businesses to steal data and information on a massive scale, for example in the news a while ago there was the story about the PlayStation Network, a group of cyber criminals attacked the company and stole millions of pieces of data from the PlayStation Network users. To businesses, data is one of the most important things to them, and if they are stolen by a group of criminals it can cause huge problems for the business. For example if everything was taken the business would have to recollect of the customers information which could be very time consuming and some customers may be cautious and not give the business their information again in the fear that it could be accessed by other computer criminals.

Cyber bullying is another crime that occurs frequently in the current day. With many people registering for social networking sites such as Facebook the crime is committed more frequently than ever, however this usually happens between the younger generation.

Phishing is also popular amongst Internet criminals. Criminals will spend huge amounts of time devising these schemes to make you fall for their methods, the most common type are mass emails that are sent with links within the email. Things such as “get rich quick” schemes are a sure sign of phishing and should be avoided at all costs. You can usually tell the difference between a legitimate and a fake website simply with common sense.

With crime on the up in the information age crime prevention has to come into play and be a lot more effective and it has with the newest technologies available to the police. For example a great method of crime prevention available to the police these days are databases, the Police are able to store huge amounts of data about anyone in the country, information can include previous convictions if you have any, simple personal information such as your date of birth and your fingerprints if they have taken them. The use of the databases to the Police is invaluable to them as it saves them huge amounts of time when searching through records as they can filter through results quickly.

Another method of crime prevention in the information age is the introduction of CCTV back in 1994. CCTV (Closed Circuit Television) is hugely important to police in these current times, CCTV allows the police to see exactly what’s going on without actually being at that location. The cameras capture footage and transmit it to a set of monitors wherever they may be. CCTV is enforced in areas such as stores, airports, banks, casinos, estates, nightclubs/bars and car parks.

Another method in which you yourself can protect your machine from harm is to install anti virus software, this will protect your system from all types of viruses, some can even sort out your emails for you so you can avoid phishing scams if you’re unable to tell the difference between a legitimate and a fake website.

Tuesday, 18 December 2012

crime and crime prevention

Identity theft and fraud


The impact on the UK economy from identity crime is estimated to be £2.7 billion per annum and it is believed that identity crime affects 1.8 million people every year.

Identity theft is when somebody steals your name and other personal information. Financial information is also often stolen and transactions and purchases are made in your name. Identity fraud is when that information is used to commit fraud.

Identity theft is not a victimless crime

Identity theft can be an upsetting experience for the victim. It can be months before the fraudster's actions are discovered and it can take several months more to sort out the problems created as a result.

Identity thieves are often linked to organised criminal networks and money fraudulently obtained by them is used to finance larger scams. Identity fraud has also been closely linked with human trafficking, illegal immigration, drug running, terrorism and money-laundering.

Your information can be used to open bank accounts, obtain credit cards, loans, state benefits, order goods in your name, take over existing accounts and/or obtain genuine documents like passports and driving licences.

How to stay safe


Always think before you give away your personal details. Ask yourself the following questions:

  • Who exactly is asking for my details?
  • What details are they asking for?
  • Why do they need to know these details?
  • Dispose of documents with any personal information on them securely. A shredder is one of the most effective methods. Even envelopes with your name and address on can be useful to an identity thief.
  • Be aware of 'shoulder surfing' when you're filling out an application form in a shop, entering your PIN number at an ATM machine and when having phone conversations discussing personal information in a public place.
  • Shred all debit and credit card receipts. Many receipts show all or part of a card or account number and may even show your signature.

Wednesday, 12 December 2012

communication: the history of mobile phones

for what purpose do you use your mobile phone?

there are many reasons why i use a mobile phone. communication is the main reason i use my phone. i do most of my communicating by text form and i also soetimes call people if i really need to. another reason i use my phone is for things like apps, apps have become a big thing in many peoples lives, they can range from educational apps to game apps. most of the apps i use on my phone are educational because they are better for me and tend to use less battery then some of the game apps. another thing i use my phone for is searching the internet, things like social networking and online shopping have now become accessable on phones and it means that there has become many more reasone why people now use phones. with internet on the go it means that you do not have wait and connect to certain wifi signals or things like that, with 3g and 4g it is right there at your fingertips and there is no need for you to even need to carry a laptop around with you anymore because most phones nowadays do everything that a laptop does but they are just much smaller.

how and where do you use your mobile phone?

there are many places that i use a mobile phone, infact pretty muh everywhere i go i use my mobile phone. its good because you can literally be anywhere and you will still be able to be in touch with people at the end of your fingers. other places i use the mobile phone, are places like schhol or college, this is because that when i am on frees and things like that and i am bored i like to keep in touch with people and see where they are, also when i am bored i sometimes play games on my phone so that i can pass the time by doing something a little more fun then just sitting around.other places i use my phone are generally when i am at home and  when i out with mates or on a night, again then is for the reason of keeping in touch with people and making sure people are alright.

what are the major benefits for you in using your mobile phone?

there are many benefits for me when i use my phone. a good benefit is keeping in touch with people and making sure that there is always a way to contact people through the use of my phone. another benefit for me is having the internet on my phone. like most young adults certain social networking sites have become a big part of our lives, so being able to stay in touch with that is a must have on most phones nowadays. another benefit of a phone is having the internet this means that if there is anything that desperately needs to be shown to someone or to be used then i can always access it. also probably the main benefit of having a phone is the fact that it is a boredom killer and if there is ever a time when boredom does infact need to be killed then i have my phone right there and ready to do it for me. also there are things like an MP3 playerbuilt into the phone so this means i can put all the tracks that i want to put on the phone and means i dont always need to carry my MP3 around with me a lot of the time. also the camera sometimes comes in handy when there is a moment that just needs to be remembered.

what problems or disadvantages do you have in using your mobile phone?

the biggest problem that occurs with mobile phones is the battery, because of all the apps and how mch the phone is used it is very difficult to make the battery last, sometimes the battery doesnt even last a full die and can die on me in the times when i need it most. another problem that can sometimes occur is that the phone can sometimes lose signal, this problem can prevent me from keeping in contact with people and then i can also not use the internet so the phone pretty much becomes useless.

does your mobile phone fulfil its intended purpose?

in my opinion my phone defonately fulfils its intended purpose it is pretty much everything i need right at the end of my fingertips, and its always ready to use when i need it, the only thing that it does not fulfil is its battery life and i sometimes wish that the battery would last longer but in every other case the phone is fine.

iphone: rotten to the core

life in the information age: education

Criminal phishing for personal information online is a booming business today. There are thousands of fake websites up and running right now, which are good for nothing more than collecting your private information for criminal purposes. In fact, most legitimate companies who typically collect personal information from customers have at least one fake site out there impersonating them.

URL
Many phishing sites take advantage of common misspellings of a company name, fooling many people into putting in personal information without realizing they are at the wrong site. Often, the website will look exactly like the real site.

LINKS ON A PAGE
Some phishing sites will have links in the exact places links are placed on the real company’s website, but if you mouse over them you will find they are not links at all. Or, the links may open but lead to blank pages. Many phishing sites are not complete replicas. They only have enough information to fool you from the first page so you input your password.

DOES THE PAGE LOOK FAKE
some websites are so easy to spot, this is for the main fact that the websites just look fake. this can be from having a logo that looks abit shoddy, to there being a load of ads on the screen, these are all things to look out for when looking for fake websites. another thing to look for is if the websites look really plain and like the website has been designed by someone that doesnt seem to have the time to make a good website. If a company have a lot of money and are a legit company then their website will look great as they have probably paid a lot of money for their company to go on the internet and they want their website looking its best when people want to go onto it.

SECURE
a way to check whether a website is secure is by looking in the top left corner of your screen at the search box. if a website has 'HTTP' this means that the website is not totally secure and if people want to see what you are doing they probably could. 'HTTPS' means that the website is totally secure and that noone can possible see what you are looking at.

how has SMS changed

there have been many ways in which teting has changed and influenced on peoples lives. first of all there is a whole new language that has derived from SMS that pretty means acronyms are a big thing to say and text. things like 'LOL' and 'G2G' are used a vast amount nowadays. 'lol' is used as laugh out loud and this people have just come to erms with actually saying 'lol' out loud when they see something funny. these acronyms are used because they are just easy ways of saying certain things when you can not be asked to type the whole sentence out.
  some say that SMS is dieing out, this is because there has been a drastic fall in the amount of texts sent per year. i believe that the reason that this is happening is because there are other apps that provide the same thing, like sending a message, but it is completely free. these are things like BBM mesenger and whatsapp.
   the way people communicate has changed a lot over the years because when people never used to use the sms service there were a lot more people meeting up face to face. people have got so use to texting that it is now the number one thing when communicating. people use it as a way to get a short but definitive message to someone without actually having to meet up with them.

Tuesday, 11 December 2012

mobile phone pros and cons of use in public

pros

  • having 999 available at the touch of a button is critical to maintaining personal security.A mobilephone ban could impede drivers' ability to report an accident, road rage incident, medical emergency or crime. Drivers assert the importance of calling for directions if lost or receive help if their car breaks down.
  • Genuine emergencies do occur, and some calls truly cannot wait. People who have sick or elderly family members, parents expecting an important call from their child, and those in the midst of a crisis believe it's acceptable to leave their phones on in public.
  • Some people believe they have a right to talk on their phones under the law, and that cell phone bans intrude on their personal freedom. As they pay a high monthly price for this communication option, they believe they can use the devices wherever and whenever they choose.
cons

  • In airplanes and hospitals, mobile phones can interfere with the functioning of delicate instruments, a serious consideration. Many places have banned mobile phone use while driving, citing a relationship between phones and traffic accidents. A 1997 "New England Journal of Medicine" study found that talking on a phone while driving quadrupled the risk of an accident, nearly equal to the danger from driving drunk.
  • Many people go to places such as libraries specifically to focus and do work. Others attend church or religious services for time to worship and reflect. People who use their mobile phone voice could distract others. When they have paid for a nice (or even a not-so-nice) restaurant meal, restaurant-goers feel entitled to soft conversation and a relaxed atmosphere in which to unwind. Some mobile phone chatter remains inappropriate for anyone to overhear, especially young children.
  • Often mobile phone users will multitask, attempting to carry on a conversation while using an ATM, driving or completing a store transaction. Their divided attention becomes an obstruction to the cashier and an inconvenience to those behind them, who must wait longer.



Friday, 30 November 2012

ict project

Health & Safety at work act 1974

Secretary of State for Employment and Productivity Barbara Castle introduced an Employed Persons (Health and Safety) Bill in 1970 but the debate around the Bill soon generated a belief that it did not address fundamental issues of workplace safety. In the same year, the Occupational Safety and Health Act was passed into United States federal law. As a result, a committee of inquiry chaired by Lord Robens was established towards the end of Harold Wilson's first government, October 1964 - June 1970. When the Conservative Party came to power following the United Kingdom general election, 1970, they gave Castle's Bill no parliamentary time, preferring to wait for the Robens Report which was published in 1972. Conservative Secretary of State for Employment William Whitelaw introduced a new Bill on 28 January 1974 but Labour were returned to power in the United Kingdom general election, February 1974 and the Bill again lost. The new Labour administration finally secured the passage of a Bill that year.

the health and safety at work act is an act that was made by the british government. this act defines the fundamental structure and authority for the encouragement, regulation and enforcement of workplace Health, safety and welfare within the United Kingdom.

The Act defines general duties on employers, employees, contractors, suppliers of goods and substances for use at work, persons in control of work premises, those who manage and maintain them, and persons in general. This Act provides a critical interface with the law of the European Union on workplace health and safety, and if this act is used badly in any way then there can be penalties of unlimited fines or even prison sentences.

Data Protection act 1984

The Data Protection Act 1984 has now been replaced by the Data Protection Act 1998,
which is based on the European Data Protection Directive. The 1998 Act applies to both
manual and computerised personal files and requires transparency in the use of
information and emphasises the need for privacy and access by individuals. Information
on how to make a request for access to personal data under the Act may be obtained
from the Human Resources Officer.

The primary purpose of current data protection legislation is to protect individuals
against possible misuse of information about them held by others. in our colleges state It is the policy of the College to ensure that all members of the College and its staff are aware of the
requirements of data protection legislation.

There are eight principles put in place by the Data Protection Act 1998 to make sure
that individual’s information is handled properly. These principles require that personal
data shall:


be fairly and lawfully processed;be processed for limited purposes
 
be adequate, relevant and not excessive
 
be accurate and kept up-to-date
 
not be kept for longer than is necessary
 
be processed in accordance with data subject's rights
 
be kept secure
 not be transferred to countries without adequate protection.

Copyright, Designs and Patents 1988

Copyright gives the creators of some types of media rights to control how they're used and distributed. Music, books, video and software can all be covered by copyright law.
When you buy software, for example, copyright law forbids you from:

giving a copy to a friend
making a copy and then selling it
using the software on a network (unless the licence allows it)
renting the software without the permission of the copyright holder

Software companies take many steps to stop software piracy

An agreement between the company that developed the software and the user must be agreed before the software is installed. This is called the license agreement and covers copyright.
Certain pieces of software require a unique licence key to be entered before the installation will continue.
Some applications or programs will only run if the media (CD / DVD) is in the drive.
Some applications or programs will only run if a special piece of hardware called a dongle is plugged into the back of the computer.

FAST was founded in 1984 by the software industry and is now supported by over 1,200 companies. It is a not-for-profit organisation with an aim to prevent software piracy and has a policy of prosecuting anyone found to be breaching copyright law.
FAST also works to educate the public about good software practice and legal requirements.

Thursday, 8 November 2012

e government

E-Government (short for electronic government, also known as e-gov, digital government, online government, or connected government) is digital interactions between a government and citizens (G2C), government and businesses/Commerce (G2B), government and employees (G2E), and also between government and governments /agencies (G2G). Essentially, the e-Government delivery models can be briefly summed up as (Jeong, 2007).

E-government describes the use of technologies to facilitate the operation of government and the dispersement of government information and services. E-government, short for electronic government, deals heavily with Internet and non-internet applications to aid in governments. E-government includes the use of electronics in government as large-scale as the use of telephones and fax machines, as well as surveillance systems, tracking systems such as RFID tags, and even the use of television and radios to provide government-related information and services to the citizens.

Monday, 5 November 2012

tool man


In John’s current line of work he carries around various things to make his life a little easier. He carries around a large diary, an address book, a large road atlas and numerous A –Z’s. He also carries around a bunch of coins for pay phones. Other things he carries around are things like calculators and bulky sales catalogues. He has problems sometimes with being late and getting into traffic jams. There a multiple in which John’s life could be improved with the aid of ICT. I will develop these ways below:

PDA – a ‘Personal Digital Assistant’ also known as a palmtop computer, this is basically a computer in your hand but this has vastly become obsolete with up and coming smartphones.

GPS – this stands for global positioning system. This is a type of equipment that uses satellites to find out where you are and where you want to go. This type of technology could help John out majorly in his endeavours. This piece would help him in many ways; one of these ways is that he would have to carry around a big Atlas and a bunch of A –Z’s because it will all be in the GPS. This will tell John exactly where to go with the directions; it also gives you a time of your arrival so he will never have to be late again. Also if John runs into traffic he can always change the route and go a different way around the traffic and still make it to his destination.

Internet – the internet will probably be the best thing that John will use in his travels. With the internet he will be able to find countless routes to a certain destination. One of the best things he will be able to do with the internet is he will be able to find out if there is any traffic during his route, this can also be used to find out if there are any delays on the way like road works or road accidents. Also he would be able to show client DIY tools and things of the kind without actually taking a bulky catalogue of the items. This will be achievable by going onto the website.

Mobile phone – a mobile phone is a must have in today’s business and with jobs of this job. Getting a smart phone would mean that he would no longer need to carry around all of the equipment he uses. You can get almost anything on your phone now because of the aid of things within the phone. Firstly he would no longer need to carry around maps and things like that because most phones have GPS in built to them and if they don’t you can always get an app for a GPS system. Also a diary and an address book come as a standard in phones now so he will no longer need to carry around countless books, he would just need to put everything into the phone and update details or put new details in. this will also help him in the case that he will no longer need to carry around small change for pay phones. He would be able to get a mobile phone contract and will be able to call at any time when he needs to. On phones, you can now get countless apps on your phone so that anything that John needs will be right there at his finger-tips this would be very useful if the company he works for has a website app, this would make it easy for him to access the certain things he needs to let people look at and show. Another thing that he could use his phone for is an MP3 player this, this would mean he would no longer need to carry around CD’s with him and he could fit a lot more songs onto his phone then he could with a couple of CD’s.

Laptop – on his laptop he would basically be able to do most of the same things that he does on his phone but will be able to do it on a larger scale. One thing that the laptop can be useful for that is more effective than a phone is that he will be able present things to people more effectively with the help of making a presentation or writing a detailed description of the things that he is selling. With the help of a laptop he can also use it to send emails to people and set reminders for himself in the case of appointments. Also his auditing could become a lot easier because he could just use a piece of software that means he could have all of the things that he has sold all in one place rather than in multiple places.

Software -

Monday, 17 September 2012

internet usage

use this website to study internet usage. use other websites as well just so you can get a varied perspective.

http://www.statistics.gov.uk/hub/release-calendar/index.html?newquery=*&title=Internet+Access+-+Households+and+Individuals&pagetype=calendar-entry&lday=&lmonth=&lyear=&uday=&umonth=&uyear=

Table 12: Household Internet access,

 


2007 to 2011

 



Year








Per cent















2007












61














2008












65














2009












70














2010












73














2011












77














Base: All GB households






















Table 13: Household Internet















type, GB, 2007 and 2011















Year













Broadband













Dial up














2007












84












16













2011












93












2













Base: All GB households







another link
http://www.ons.gov.uk/ons/search/index.html?newquery=internet+usage

  • 45 per cent of Internet users used a mobile phone to connect to the Internet
  • 6 million people accessed the Internet over their mobile phone for the first time in the previous 12 months
  • The use of wireless hotspots almost doubled in the last 12 months to 4.9 million users
  • 21 per cent of Internet users did not believe their skills were sufficient to protect their personal data
  • 77 per cent of households had Internet access






  •