Topic B:The Internet age

external image images?q=tbn:ANd9GcTVwmxnP5YncTZAKC6VSyhC7anQHczlpZ-mwvnsisgAeRBUztjQ external image images?q=tbn:ANd9GcS8k82ZEGFa5bMsNfD_hrIx3EHwbVW1vCmcO9E9rKrW1UwQB_dH external image images?q=tbn:ANd9GcQSpre3JFka-9k6wNnC329umnI5wScxDo8k2CNy5b7tkOHmS5U1

Group Roles

Leader: WuFei
Assistant leader: YiJie
Secretary: Si Ching
Writer-editors: Huey Shan
Presenters: Lois

B2:What are the dangers of the Internet and how do we keep ourselves safe?

Introduction: Internet have change our way of living. With the Internet, it makes our life more convenient.
For example,
  • Faster communication ( email, webcam )
  • Able to find information easily ( through websites like yahoo, google )
  • Online services ( eg. book tickets for movie online, or pay utility bills online )
Despite all these advantages, there are still dangers of the internet.

Dangers of the Internet:

1) Addiction ( gaming, gambling or porn )

external image images?q=tbn:ANd9GcSzy312CJ20Z3s_CjKL9EJIqo6rZALJuIRCgqvlXpxJsKjDDR_N
2) Cyberbullying

external image images?q=tbn:ANd9GcSKqIDhkODav7vVtWPL1UGJNfx2bMbtvo-tsiv67TPZ_7mbyW5GJQ
3) Scams ( money or romance like online dating sites )

external image images?q=tbn:ANd9GcR9VAgpMwpJonKVK5-DiDVCrhY2Uohmp0M1jfUh3u2iJYfcpvaekw
4) Virus Threat

external image images?q=tbn:ANd9GcRzTeucXRP3LOU_7AUKcNv4DoCmag1FeaiACIInNnLnWfIAXbpe

  • Internet addiction disorder – the excessive usage of computer that even interferes daily life. The indicative of the disorder is not the amount of time spent on the internet, but is the spending time on internet which will affect a person negatively. People with this disorder will have symptoms of tolerance and withdrawal. They may even give up on their social live and work lives. They may get irritated and mad if they are not on the internet and may lie about the amount of time that they spent on the internet.external image hsc3608l.jpg

1. Self-control
2. Be able to realise the problem and manage their dependence on the internet
3. Spend more time outdoors with friends or family
4. Seek help and get encouragement from family members

  • Online gaming addiction excessive usage of computer and video games that will affect one’s daily life. People with this addiction avoid social contacts with others, does not care about life events and lacks of imagination. Some common games that people addict to are ‘DOTA’ and ‘Sudden Attack’.
    8030.big game addiction.jpg-610x0.jpg

1. Self-control
2. Try out new things
3. Spend more time outdoors with friends or family
4. Know the root of the problem


  • Cyber-bullying -- includes sending hateful messages or even death threats to children, spreading lies about them online, making nasty comments on their social networking profiles, or creating a website to bash their looks or reputation. Often, kids don't tell parents they're being cyber bullied; they're afraid their parents will overreact or yank Internet privileges.
1. Try to ignore the bully and block future contact.
2. Contact the police if the cyber bullying involves any physical threat.
3. Kids should talk to an adult if they become victims of bullying
4. Save the evidence.
5.Report incidents to your Internet service provider, e-mail provider, or Web site host. If the incidents begin occurring offline, report the encounters to the bully's parents or to school officials.

Common online scams and ways to prevent them

  • Phishing/Mass marketing fraud -- an act of sending an email to a victim and attempts to scam them in order to receive their personal information such as credit card information and passwords. The perpetrator will first convince the victim that they are from a legal company. Then, victims will be asked to click the fake websites and enter their personal details there. Those fake websites’ look and feel is similar to the real and legal websites so as to gain trust from the victims. The perpetrator then uses the victim’s information to steal money and may even steal the victim’s identity.
    external image phishing-sml.jpgexternal image 300px-PhishingTrustedBank.png
1. If you get an email or pop-up message that asks for personal or financial information, do not reply. And don’t click on the link in the message, either
2. Review credit card and bank account statements as soon as you receive them to check for unauthorized charges
3. Internet explorer 7 and Mozilla Firefox have anti-phishing technologies that can identify phishing websites and prevent you from entering the websites
4. Take note that no legitimate companies will send an email to you asking for your account information

  • Identity Theft – stealing someone’s identity to gain advantage in that person’s name. The perpetrator will steal and use the victim’s identity or information, such as name, without the victim’s consent to commit crimes. The victim has a possibility on holding the perpetrator’s responsibility and faces the consequences.
external image identity_theft-4.jpgtwin515l.jpg

1. If you are a victim of identity theft, file a police report immediately.
2. When disposing items that contain your personal information like old credit cards, bank statements and thumb drive, make sure you destroy or shred them before disposing.
3. Protect your computer with a password and never share the password with anyone.
4. Protect your wallet.
5. Check bank statements for unauthorised charges.

  • Rogue Security Software – making use of computer malware to deceive victim to pay for software that can remove the malware. However, the perpetrator introduces malware into the victim’s computer instead. Once victim has downloaded and activate the rogue security software, perpetrator can steal the victim’s information, slow their computer or block victim from entering legitimate security software websites. Rogue security software may appear in the results when searching for trustable antispyware software.
    external image 88303_xp-antivirus_F.jpg external image screenshot_securitycenter.jpg
    ^Rogue Security Program ^Legitimate Security Software

1. Turn on your firewall.
2. Update your software and operating system often.
3. Install trustable antivirus system.
4. Be familiar with common scams.
5. Ignore pop ups.
6. Legitimate security software will not ‘scare’ you to download something.

  • Auction & shopping scams -- buying of items online from unreliable website may cause you to be cheated. You may end up with a dud product or nothing at all for your money.

Virus Threat

  • Malware – It can cause infections to computer such as key loggers. Key loggers will record every key stroke you did and send them back to central malware server. The records used to check for websites that you visited such as PayPal and eBay where you enter your username and password. When the perpetrator obtains your username and password, your accounts will be used and identity theft may happen. There are other infections which can happen, like fake anti viruses. Popups will keep harassing you. Those popups claim that your computer is infected with virus and will ask you to download their legitimate anti-virus program by paying a large sum of money. As a result, scamming occurs.

external image malware-pic.jpg

1. Install an anti-virus program to protect your computer against viruses
2. When receive an email with attachments, be it the sender is anonymous or people you know, scan them before opening
3. Scan your hard drive for viruses frequently
4. Download files only from trustable websites

  • Remote Access Trojans (RATs)Similar to malware infection key loggers, RATs can also track what the user types and this will allow perpetrator be able to find the victim’s personal information such as bank-account and address. As a result, the perpetrator may hack the victim’s accounts and steal their identity, which can be very dangerous. If the victim’s computer has a microphone, the perpetrator will be able to record down the victim’s conversations. If the victim has a webcam, RATs can turn it on and record video without the permission of the victim, which then violate the victim’s privacy. RATs can also control the victim’s computer. They can modify documents and use the victim’s computer to attack other computers.

external image 1307374577-27.jpg

1. Install an anti-virus program to protect your computer against viruses
2. When receive an email with attachments, be it the sender is anonymous or people you know, scan them before opening
3. Scan your hard drive for viruses frequently
4. Download files only from trustable websites


  1. Never share your internet password with anyone
  2. Install internet filtering software to block the unsafe sites
  3. Use monitoring program that filters pornography keywords in several languages
  4. Never enter a card number unless you see a padlock in the web browser window's frame
  5. Adjust privacy settings on social networking sites

Adjusting privacy settings on social networking sites :
  • Never share your phone number, address, birthdate
  • In social networking sites like twitter and facebook, adjust your privacy settings to only friends can view your profile and post
  • Do not add people whom you do not know