Topics

Focus 1:  Personal Computer Security
Focus 2:  Organizations Involved in Security
Focus 3:  Hacking
Focus 4:  Security Survey

Introduction

The Internet is a pervasive force which is working its way into all aspects of our civilization - of this fact there is no doubt. One could spend countless hours, days, and months debating and studying the implications and connotations of this fact and its influence on education, business, etc. However, in studying this medium, it is important to remain cautious and realize the security issues surrounding the Internet. Being overly cautious and conservative in this exploration is detrimental and foolish - the resources left undiscovered by frightened people will be expanded by others, leaving the paranoid in the dust. However, it is ultimately more careless to assume that all is legitimate and nothing will harm you. It's that old principle of "that'll never happen to me" that can make one vulnerable. Educated medium should be achieved between these extremes. We plan to take a look at the current work of hackers threatening e-commerce, politics, and individuals with a range of viruses. Also what is the difference between personal computers, e-commerce, and computer networks on college campuses when it comes to security? Most importantly, how secure do you feel? How do age and gender affect people's reactions on this matter? What general precautions can be affected to make the common computer user better educated and more confident with their security? We propose to research security policies and their effectiveness with an emphasis on current events and the boom of buying and trading online. Then taking this information and correlating with data compiled from extensive surveying of college students and the public with a focus on age as a determining factor in the matter of personal security on the Internet.

Back to Psybersite
.

 

Presented By:

Gina Cristofani
Lee Dessecker
Rich Olsen
Jonathan Schilling
.

External Links

CSI
Anti-Online
Anonymizer
ISS

Resources

To complete this project, we used various resources including books, journals and websites.  Our list of references is located here.

Copyright 2000

page last updated
June 11, 2008

Legal Information

This project was produced for PSY 380, Social Psychology of Cyberspace, Spring 2000, at Miami University.  All graphics in these pages are used with permission or under fair use guidelines, are in the public domain, or were created by the authors. Last revised: Tuesday, March 11, 2014 at 17:34: %3  This document has been accessed 1  times since 15 April,2002.  Comments and Questions to R. Sherman.
.