FINALS Flashcards
involves any person with intent to lower down the dignity of the person by hacking his mail account and sending some mails with using vulgar languages to unknown persons mail account.
Cyber Defamation
any inaccurately or injuriously written defamation triggered via electronic means, including the Internet, social media, email and websites.
- creates instant and irrevocable reputation damage
Cyber Libel
- Repeated, unsolicited, threatening behaviour by a person or group using mobile or Internet technology with the intent to bother, terrify, intimidate, humiliate, threaten, harass or stalk someone else
-The harassment can take place in any electronic environment where communication with others is possible such as on social networking sites, on message boards, in chat rooms or through email. Just posting a general opinion on a discussion board or in a forum is not considered harassment.
- Various kinds of harassment do occur in cyberspace. Harassment can be sexual, racial, religious, etc.
Cyber Harassment
A technologically based “attack” on one person who has been targeted specifically for the reasons of anger, revenge, control, flirting or love obsession, impersonating profile.
Cyber Stalking
exists when persons, usually minors, use the internet, cell phones, or other technological devices to send or post text or images intended to hurt, embarrass, threaten, torment, humiliate, or intimidate their victim
Cyber Bullying
The insults, comments or images can be preserved by the person who has bullied or by others so that the victim may read or view them over and over again and the harm is re-inflicted with each reading or viewing.
Permanence
The size of the audience that is able to view or access the damaging material increases the victims humiliation.
Audience size
harmful messages can reach large audiences also plays a major part in making cyber bullying so damaging to the targets.
Speed
deliberately excluding someone from an online group
Exclusion
repeatedly posting or sending offensive, rude, and insulting messages or post
Harassment
posting or sending unwanted or intimidating messages which may include threats.
- Cyber stalking
tricking someone into revealing secrets or embarrassing information which is then shared online.
Trickery
remarks on the internet threatening or implying violent behavior displaying suicidal tendencies.
- Cyber Threats
creations of the mind used in commerce (inventions, literary and artistic works, designs, symbols)
Intellectual property
rights that creators have over their literary and artistic works
Copyright
a legal document that gives the inventor the right to prevent others from making, using, selling, or importing
Patent
any confidential business information which provides an enterprise a competitive edge and is kept secret
Trade Secrets
a sign capable of distinguishing the goods or services of one enterprise from those of other enterprises
Trademarks
the act of illegally using, copying or distributing software without ownership or legal rights or could also be the act of installing and using commercial software without paying for the program
Software Piracy
Main Types of Software Piracy:
- Counterfeiting
- Internet Piracy
- End User Piracy/Consumer Piracy
- Client-Server Overuse
- Hard-disk Loading
- Film Piracy
- illegal duplication, distribution and/or sale of copyrighted material with the intent of imitating the copyrighted product
Counterfeiting
- unauthorized copying, distribution, or downloading of copyrighted materials from the internet
Internet Piracy
- occurs when an individual reproduces copies of software without authorization. Using one licensed copy to install a program on multiple computers:
- act of individuals illegally obtaining and using copyrighted materials for personal use
- includes using cracked versions of software
End User Piracy/Consumer Piracy
too many users (> than allowed by the license) on a network are using a central copy of a program at the same time
Client-Server Overuse
occurs when a business sells new computers with illegal copies of software loaded onto the hard disks to make the purchase of the machines more attractive.
Hard-disk Loading
illegal copying and distribution of movies in print, videos, DVDs or electronic files
Film Piracy