Topics |
Focus 1: Personal Computer Security
Focus 2: Organizations Involved in Security
Focus 3: Hacking
Focus 4: Security Survey |
Introduction |
| The Internet is a
pervasive force which is working its way into all aspects of our civilization - of this
fact there is no doubt. One could spend countless hours, days, and months debating and
studying the implications and connotations of this fact and its influence on education,
business, etc. However, in studying this medium, it is important to remain cautious and
realize the security issues surrounding the Internet. Being overly cautious and
conservative in this exploration is detrimental and foolish - the resources left
undiscovered by frightened people will be expanded by others, leaving the paranoid in the
dust. However, it is ultimately more careless to assume that all is legitimate and nothing
will harm you. It's that old principle of "that'll never happen to me" that can
make one vulnerable. Educated medium should be achieved between these extremes. We plan to
take a look at the current work of hackers threatening e-commerce, politics, and
individuals with a range of viruses. Also what is the difference between personal
computers, e-commerce, and computer networks on college campuses when it comes to
security? Most importantly, how secure do you feel? How do age and gender affect
people's reactions on this matter? What general precautions can be affected to make the
common computer user better educated and more confident with their security? We propose to
research security policies and their effectiveness with an emphasis on current events and
the boom of buying and trading online. Then taking this information and correlating with
data compiled from extensive surveying of college students and the public with a focus on
age as a determining factor in the matter of personal security on the Internet. Back to Psybersite
. |
| |
|
Presented By: |
Gina Cristofani
Lee Dessecker
Rich Olsen
Jonathan Schilling
. |
External Links |
CSI
Anti-Online
Anonymizer
ISS |
Resources |
To complete this project, we used various
resources including books, journals and websites. Our list of
references is located here. |
Copyright 2000 |
page
last updated
June 11, 2008 |
Legal Information |
This
project was produced for PSY 380, Social
Psychology of Cyberspace, Spring 2000, at Miami
University. All graphics in these pages are used with permission or under fair
use guidelines, are in the public domain, or were created by the authors. Last
revised: Tuesday, March 11, 2014 at 17:34: %3 This document has been accessed 1 times since 15
April,2002. Comments and Questions to R. Sherman.
. |
|