unit 6: risk and avoiding risk crystal clark christopher moore lynsey saylor

20
Unit 6: Risk and Avoiding Risk Crystal Clark Christopher Moore Lynsey Saylor

Upload: georgiana-curtis

Post on 17-Dec-2015

212 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Unit 6: Risk and Avoiding Risk Crystal Clark Christopher Moore Lynsey Saylor

Unit 6: Risk and Avoiding Risk

Crystal Clark

Christopher Moore

Lynsey Saylor

Page 2: Unit 6: Risk and Avoiding Risk Crystal Clark Christopher Moore Lynsey Saylor

Article 31: False Reporting on the Internet and the Spread of Rumors

Three Case Studies

By: Paul Hitlin

Presented by: Lynsey Saylor

Page 3: Unit 6: Risk and Avoiding Risk Crystal Clark Christopher Moore Lynsey Saylor

The internet has been the chosen news medium for people’s opinions about causes of tragic events. Many people find comfort in these explanations. Steven O’Leary claims that, “these rumors fill a need for consumers of news that is very similar to the void that ‘real news’ fills.” These Internet rumors help people to make sense of their world following a tragedy.

Page 4: Unit 6: Risk and Avoiding Risk Crystal Clark Christopher Moore Lynsey Saylor

The Internet is certainly not responsible for errors in journalism. Instead it allows for anyone to have access to the production and dissemination of news.

Page 5: Unit 6: Risk and Avoiding Risk Crystal Clark Christopher Moore Lynsey Saylor

4 Reasons for Cyberjournalism Errors

1. The Need for Speed – the deadline is always “now” and many reporters do not check sources as they are competing to get the story published first

2. The Desire to Attract ‘Hits’ – financial incentives and competition to keep consumers interested; competition again for getting a story first

3. Political Gains – certain political groups spread rumors to promote their own cause

4. Attraction to Scandal – consumers can browse sites rapidly and this furthers the need for reporters to lead with scandal to grab attention

Page 6: Unit 6: Risk and Avoiding Risk Crystal Clark Christopher Moore Lynsey Saylor

Three Case Studies

1. TWA Flight 800; July 17, 1996. Three rumors were spread as to the cause.

2. Sidney Blumenthal vs. Matt Drudge and Internet Libel, 1997. Allegations of spousal abuse. Rare example of ease of correction.

3. The Suicide of White House Aide Vince Foster; July 20, 1993. Suicide was an alleged murder cover up.

Page 7: Unit 6: Risk and Avoiding Risk Crystal Clark Christopher Moore Lynsey Saylor

Correction Policy

There is no real way to correct false reporting on the Internet because the ease and quickness of the spread of information.

It usually is difficult to trace errors to a particular site or author.

“There is simply too much online content for the government to be able to enforce the same types of journalistic laws that other news mediums must follow, not to mention the potential for excessive government censorship.”

Page 8: Unit 6: Risk and Avoiding Risk Crystal Clark Christopher Moore Lynsey Saylor

Questions

The Internet can be held accountable for the rumors spread through its use?

ANSWER: FALSE Which of the following is a reason for

Cyberjournalism errors?A. Political GainB. Attraction to ScandalC. The Need for SpeedD. All of the above

Page 9: Unit 6: Risk and Avoiding Risk Crystal Clark Christopher Moore Lynsey Saylor

PRIVACY REQUIRES SECURITY, NOT ABSTINENCE: PROTECTING AN INALIENABLE RIGHT IN THE AGE OF FACEBOOK

By: Simson Garfinkel

Page 10: Unit 6: Risk and Avoiding Risk Crystal Clark Christopher Moore Lynsey Saylor

…Continue

Constitutiono Protection &

Restriction• Search and Seizure-

4th Amendment• Witness against self

-5th Amendment

o “False Light” and “Sexting”

The Computero Computerize Errorso Driver’s License o Netflix

Page 11: Unit 6: Risk and Avoiding Risk Crystal Clark Christopher Moore Lynsey Saylor

…Continue

9/11 First National Scare in Computer

Ageo Switch of

Definition of Privacy

o Security or Privacy have to choose

Facebooko People willing put

out personal information

o 1 of 5 internet users spend a average of 25 minutes per day on Facebook.

Page 12: Unit 6: Risk and Avoiding Risk Crystal Clark Christopher Moore Lynsey Saylor

The Concerns

o Problems:o Costo Developmento Identifying

o Changes:o No more passwords electronic chip

license, or government issued cardo Privacy Protection Agency

Page 13: Unit 6: Risk and Avoiding Risk Crystal Clark Christopher Moore Lynsey Saylor

Questions

1. How much time does 1 out of 5 internet users spend per day on Facebooka. 2 hoursb. 1 hourc. 30 minutesd. 25 minutes

2. True or False: The Government is thinking about getting rid of passwords, and switching to cards with electronic chips built in.

Page 14: Unit 6: Risk and Avoiding Risk Crystal Clark Christopher Moore Lynsey Saylor

The Evolution of Cyber WarfareChris Moore

By Greg Bruno

Page 15: Unit 6: Risk and Avoiding Risk Crystal Clark Christopher Moore Lynsey Saylor

Cyber Ware fare: The New Frontier Estonia: Believes that Russia staged a

denial of service attack due to the movement of a statue in a former Russian state. Russia denies any involvement.

Many believe that China is the most active in these tactics.

United States: Accused China of trying to infiltrate government networks at the Departments of State, Commerce, and Defense.

Page 16: Unit 6: Risk and Avoiding Risk Crystal Clark Christopher Moore Lynsey Saylor

U.S. Cyber Warfare On the Offensive The United States is not simply a

bystander in this new type of warfare.

Will Arkin, a defense analyst, said “our ability to penetrate into enemy computer networks, our ability to exploit communication networks, to manipulate digital information, is real.

No one outside of the government really knows what they are truly capable of.

Page 17: Unit 6: Risk and Avoiding Risk Crystal Clark Christopher Moore Lynsey Saylor

Tactics

Such things as denial of service are most likely unheard of by most people, while such things as spyware and malware are more common.

Denial of service is an approach that harnesses “botnets”—massive networks of interconnected computers—to bombard targeted networks with information requests while masking the location of the primary attacker.

Page 18: Unit 6: Risk and Avoiding Risk Crystal Clark Christopher Moore Lynsey Saylor

Patching the Holes

Director of National Intelligence Michael McConnell believes that both China and Russia both have the technical capabilities to target and disrupt the United States information.

Significant amounts of money have been put towards enhancing “civilian agency cyber security and strengthening defenses to combat terrorism.” (Roughly $144 million by the Bush administration.)

Page 19: Unit 6: Risk and Avoiding Risk Crystal Clark Christopher Moore Lynsey Saylor

Measuring the Threat

In 2007 the Department of Homeland Security logged an estimated 37,000 attempted breaches of private and government computer systems, and over 80,000 attacks on Pentagon systems.

One economists estimate that shutting down electric power to a sizable region for more than ten days would stop over 70% of the economic activities in the region.

Page 20: Unit 6: Risk and Avoiding Risk Crystal Clark Christopher Moore Lynsey Saylor

Questions

Who do many believe to be the most active in these “cyber warfare” tactics?

Answer: China How much was spent by the Bush

administration to better protect the United States against the types of attacks?

Answer: $144 million