information security and cyberethics week 1
TRANSCRIPT
Information Security and Cyberethics
Week 1
Digital Citizenship
Netizen = Digital Citizen
Citizens (of the physical space) using the Internet as a tool in order to engage
in society, politics, and government participation.
Oxford: A user of the Internet, especially a habitual or keen one.
The nine elements of digital citizenship1
1. Digital access: This is perhaps one of the most fundamental blocks to being a digital citizen. However,
due to socioeconomic status, location, and other disabilities- some individuals may not have digital
access. Recently, schools have been becoming more connected with the internet, often offering
computers, and other forms of access. This can be offered through kiosks, community centers, and open
labs. This most often is associated with the digital divide and factors associated with such. Digital access
is available in many remote countries via cyber cafés and small coffee shops.
2. Digital commerce: This is the ability for users to recognize that much of the economy is regulated online.
It also deals with the understanding of the dangers and benefits of online buying, using credit cards
online, and so forth. As with the advantages and legal activities- there is also dangerous activities such as
illegal downloads, gambling, drug deals, pornography, plagiarism, and so forth.
3. Digital communication: This element deals with understanding the variety of online communication
mediums such as email, instant messaging, Facebook messenger, the variety of apps, and so forth. There
is a standard of etiquette associated with each medium.
4. Digital literacy: This deals with the understanding of how to use various digital devices. For example,
how to properly search for something on a search engine versus a database. How to use various online
logs. Oftentimes many educational institutions will help form an individual's digital literacy.
5. Digital etiquette: As discussed in the third element, digital communication, this is the expectation that
various mediums require a variety of etiquette. Certain mediums demand more appropriate behavior and
language than others.
1 http://www.digitalcitizenship.net/nine-elements.html
6. Digital law: This is where enforcement occurs for illegal downloads, plagiarizing, hacking, creating
viruses, sending spams, identity theft, cyberbullying, and so forth.
7. Digital rights and responsibilities: This is the set of rights digital citizens have such as privacy, speech,
and so forth.
8. Digital health: Digital citizens must be aware of the physical stress placed on their bodies by internet
usage. They must be aware to not become overly dependent on the internet causing eye strain, headaches,
stress problems, and so on.
9. Digital security: This simply means that citizens must take measures to be safe by practicing using
difficult passwords, virus protection, backing up data, and so forth.
Netiquette
Cyber-Ethics
Encyclopedia of Sciences and Religions: Cyberethics is a branch of applied
ethics that examines moral, legal, and social issues at the intersection of
computer/information and communication technologies.
C3 Framework Definition2: Cyber-ethics is the discipline of using appropriate
and ethical behaviors and acknowledging moral duties and obligations pertaining to
online environments and digital media it refers to choices about what is right and
wrong in spite of the ability to do something. It includes but not limited to
plagiarism, bullying, and hacking to name a few.
Core Rules of Netiquette
Rule 1 Remember the Human
Rule 2 Adhere to the same standards of behavior online that you follow in real life
Rule 3 Know where you are in cyberspace
Rule 4 Respect other people's time and bandwidth
Rule 5 Make yourself look good online
Rule 6 Share expert knowledge
Rule 7 Help keep flame wars under control
Rule 8 Respect other people's privacy
Rule 9 Don't abuse your power
Rule 10 Be forgiving of other people's mistakes
2 Pruitt-Mentle, D. (2000). C3 Framework Cyberethics, Cybersafety and Cybersecurity Promoting Responsible Use. Educational Technology
Policy, Research and Outreach http://www.edtechpolicy.org/cyberk12/Documents/C3Awareness/C3_framework_full_final.pdf
Digital Footprint
Oxford: The information about a particular person that exists on the Internet
as a result of their online activity.
Internet Society: Your digital footprint is all the stuff you leave behind as you
use the Internet such as comments on social media, Skype calls, mobile application
use and email records.
It is a part of your online history and can potentially be seen by other people,
or tracked in a database, and can never be deleted.
5651 Internet Law
Enacted on May 4th, 2007, this law regulates the use of the Internet Sources for all citizens in Turkey. All
legal attempts on the web sites, such as access ban, following the logs are based on the law 5651.
http://www.resmigazete.gov.tr/eskiler/2007/05/20070523-1.htm
The “Article 4” in the Law 5651 defines the responsibilities of “content providers”.
“Content Provider” is defined as “any real or legal individual that produces, modifies and provides any
information or data presented to the user over the Internet”. All YouTube, FaceBook, Blog and/or other web authors
are considered as “Content Provider” in the law 5651.
Responsibilities of the content provider
ARTICLE 4 -
(1) The content provider is responsible for any content that is used on the
internet.
(2) The content provider is not responsible for the content of the other party to
whom it is linked. However, if it is clear from the format of the presentation that the
content it links to is embraced and intended by the user to reach the content in
question, it is responsible according to the general provisions.
Acceptable IT Use Policy
Acceptable Use Policy (AUP) can be defined as “strategies that allow
organizations to notify technology users of expected behavior and set forth the
consequences of misuse”3.
Many organizations that provide technology services to a group of constituents or the public require
agreement to an acceptable use policy (AUP) before those services can be accessed. This policy outlines what is
allowed and what is not allowed while someone is using the organization’s services. An everyday example of this
is the terms of service that must be agreed to before using the public Wi-Fi at Starbucks, McDonald’s, or even a
university.
Violations of these policies have various consequences. In most cases, such as with Wi-Fi, violating the
acceptable use policy will mean that you will lose your access to the resource. While losing access to Wi-Fi at
Starbucks may not have a lasting impact, a university student getting banned from the university’s Wi-Fi (or
possibly all network resources) could have a large impact.
Intellectual Property
Intellectual property: A property (as an idea, invention, or process) that
derives from the work of the mind or intellect.4
Digital technologies have driven a rise in new intellectual property claims and made it much more difficult to
defend intellectual property. Practically speaking, it is very difficult to protect an idea. Instead, intellectual property
laws are written to protect the tangible results of an idea. In other words, just coming up with a song in your head is
not protected, but if you write it down it can be protected. While protecting intellectual property is important
because of the incentives it provides, it is also necessary to limit the amount of benefit that can be received and
allow the results of ideas to become part of the public domain.
Copyright
Copyright is the protection given to songs, computer programs, books, and
other creative works.
3 Conn, K. (2002). The internet and the law: What educators need to know: ASCD.p:91.
4 http://www.merriam-webster.com/dictionary/intellectual%20property
Copyright - History
The first copyright act in the world was “The Statute of Anne”, enacted on April 10th, 1710, by British
Parliament5. It was limited to printed books. The duration of the protection 14 years. If the author of the book was
alive, copyright protection would extend 14 more years.
In the United States, the law was adopted in 1790, it was limited to books, maps, and charts and lasts 14
years and a 14 years renew similar to British law. Over the time, protection was expanded to include photography
and motion pictures and lasts 42 years. Today; the protection lasts for 95 years from the original creation date.
Digital Millennium Copyright Act (DMCA)
As digital technologies have changed what it means to create, copy, and distribute media, a policy vacuum
has been created. In 1998, the US Congress passed the Digital Millennium Copyright Act (DMCA), which extended
copyright law to take into consideration digital technologies.
Two of the best-known provisions from the DMCA are the anti-circumvention provision and the “safe harbor”
provision.
The anti-circumvention provision makes it illegal to create technology to circumvent technology that has
been put in place to protect a copyrighted work. This provision includes not just the creation of the
technology but also the publishing of information that describes how to do it.
5 You can refer to http://www.copyrighthistory.com/anne.html if you interest in the first copyright act in the world, the
British Statute of Anne, from 1710.
The “safe harbor” provision limits the liability of online service providers when someone using their
services commits copyright infringement. This is the provision that allows YouTube, for example, not to be
held liable when someone posts a clip from a copyrighted movie. The provision does require the online
service provider to take action when they are notified of the violation (a “takedown” notice).
Patent
A government authority or license conferring a right or title for a set period,
especially the sole right to exclude others from making, using, or selling an
invention.
A patent creates protection for someone who invents a new product or process. The definition of invention is quite
broad and covers many different fields.
Unlike copyright, a patent is not automatically granted when someone has an interesting idea and writes it down. In
most countries, a patent application must be submitted to a government patent office. A patent will only be granted
if the invention or process being submitted meets certain conditions:
It must be original. The invention being submitted must not have been submitted before.
It must be non-obvious. You cannot patent something that anyone could think of. For example, you could
not put a pencil on a chair and try to get a patent for a pencil-holding chair.
It must be useful. The invention being submitted must serve some purpose or have some use that would be
desired.
Trademark
A trademark is a word, phrase, logo, shape or sound that identifies a source of goods or services. For example, the
Nike “Swoosh,” the Facebook “f”, and Apple’s apple (with a bite taken out of it) are all trademarked. The concept
behind trademarks is to protect the consumer.
There are two types of trademarks.
A common-law trademark is designated by placing “TM” next to the trademark.™(Use Alt+0153 on
keyboard to type)
A registered trademark is one that has been examined, approved, and registered with the trademark office ®
(Use Alt+0174 on keyboard to type)
Trademark Examples
An iconic shape of a bottle, a special shape of an oil pastel, or a car…
Trademark Violations
Creative Commons
Creative Commons is a nonprofit organization that provides legal tools for artists and authors. The tools
offered make it simple to license artistic or literary work for others to use or distribute in a manner
consistent with the author’s intentions.
CC0 : No restriction
CC-BY : This is the least restrictive license. It lets others distribute and build upon the work,
even commercially, as long as they give the author credit for the original work.
CC-BY-SA : This license restricts the distribution of the work via the “Share-Alike” clause. This
means that others can freely distribute and build upon the work, but they must give credit to the original
author and they must share using the same Creative Commons license.
CC-BY-NC : This license is the same as CC-BY but adds the restriction that no one can make
money with this work. NC stands for “Non-Commercial.”
CC-BY-NC-ND : This license is the same as CC-BY-NC but also adds the ND restriction, which
means that No Derivative works may be made from the original.
Appendix
http://bid.ankara.edu.tr/mevzuat/
http://bid.ankara.edu.tr/wp-content/uploads/sites/139/2019/04/bhk.pdf
Please read the AUP of IT resources of Ankara University. For the students, IT users, the general
provisions and rights and responsibilities are presented below. Note: These are particularly important.
Bilgisayar Ağı, İnternet ve Elektronik Posta (E-Posta) Kullanımı Esasları:
Madde 5- Bilişim kaynaklarını kullanıma sunan ve faydalanan tüm birimlerin ve kullanıcıların, Üniversite bilgisayar ağı ve
İnternet alt yapısının da üzerinde yer aldığı ULAKNET ve diğer ulusal ve uluslararası ağların kullanım politikaları ile ilgili
mevzuata uyma ve bu bağlamda gerekli önlemleri alma zorunluluğu vardır.
Madde 6- Bilişim kaynaklarının, Üniversitenin bilimsel araştırma, akademik, eğitim etkinlikleri ile hizmet sunumu ve yönetsel
fonksiyonları için temel önemi olan, bilginin üretimi, işlenmesi, depolanması, korunması ve iletimi için kullanılması esastır.
Madde 7- Bilişim kaynaklarının kullanımında altyapıyı, donanımı ve yazılımı zarara uğratan, tahrip edici, zedeleyici ve
çalışmasını engelleyici hiçbir girişimde bulunulmaması ve kaynakların verimli kullanılması zorunluluktur.
Madde 8- Bilişim kaynaklarının birincil kullanım kapsamında hizmete sunulması esastır. İkincil kullanıma ancak birincil
kullanım gereksinimleri karşılandıktan sonra kısıtlı olarak izin verilebilir.
Madde 9- Kullanıcılar, gereksiz trafik yarattığı ve bilişim kaynaklarının sağlıklı çalışmasını engellediği için P2P-PeerToPeer (E-
mule, E-donkey, Kazaa, µtorrent, I-mesh vb.) dosya paylaşım programlarını kullanamaz. Söz konusu yazılımlar bilimsel amaç ile
kullanılacak ise BİDB’ndan kısıtlı ve/veya geçici kullanım izni talep edilir.
Madde 10- Bilişim kaynaklarının kullanımında kullanıcılar arasında adil paylaşımının sağlanması, başkalarına kullanım olanağı
vermeyecek biçimde trafik yaratılmasına karşı önlemler alınması, bilişim kaynaklarına zarar verebilecek tehlikelere karşı risk ve
güvenlik önlemleri alınması, kullanıcıların şahsi bilgilerinin ve gizliliğin korunması ile veri, bilgi ve kaynak yedeklemesi
yapılması esastır. Bu işlemler yetkili birimler tarafından gerçekleştirilir.
Madde 11- Bilişim kaynakları kapsamındaki tüm yazılım, donanım, veri ve bilgiler bu kaynakları kullanıma sunan birimlerin
yöneticilerinden yetki ve olur alınmadan değiştirilemez, yetkisiz hiç kimse ile paylaşılamaz ve amaçları dışında kullanılamaz.
Madde 12- Üniversite bilişim kaynakları, sistem ya da ağ üzerindeki veri/bilgi ve/veya trafiğin izlenmesi, saklanması, transferi
ve dağıtımı, başkalarına hat kullanım olanağı vermeyecek oranda aşırı bant genişliği kullanımı, başarılı olsun veya olmasın karşı
tarafın izni olmadan bir başka bilgisayara, ağa veya kullanıcının bilgilerine/verilerine ulaşılmaya çalışılması, bu bilgilerin
izlenmesi, araştırılması ve tahrip edilmesi, kullanıcılara ait giriş kodlarının elde edilmeye veya yayılmasına çalışılması,
Üniversite ağı dahilindeki ya da haricindeki bir sisteme, ağ kaynağına veya servise saldırı yapılması amacıyla kullanılamaz.
Madde 13- Üniversite bilişim kaynakları hukuki açıdan suç teşkil eden; yazılım ve materyal üretimi/barındırılması/dağıtımı,
istem dışında ileti (zincir e-posta, spam vb.) gönderimi, siyasi/dini/etnik propaganda, reklam ve kişisel kazanç amacıyla
kullanılamaz.
Madde 14- Üniversite bünyesindeki birim, bölüm, kulüp, topluluk veya grup niteliğindeki kurumsal ve kişisel web sayfaları ile
e-posta adreslerinin sorumluluğu resmi yazı ya da talep formu ile BİDB’ndan talep eden kişiye aittir.
Madde 15- Kurumsal e-posta adresleri tüm akademik ve idari personel ile öğrencilere talep durumunda BİDB tarafından verilir.
İletinin ekinde gönderilecek dosya boyutu, bir seferde ve bir günde gönderilebilecek ileti sayısı, kota miktarı günün koşullarına
göre BİDB tarafından belirlenir ve ilan edilir. E-posta adresleri BİDB tarafından belirlenen standartlarda verilir.
Üniversite ile hukuki ilişkisi kesilen kullanıcıların e-posta hesapları kapatılır. Bu kullanıcıların hesapları tercih ettikleri yeni e-
posta adresine bir kereye mahsus olmak üzere 12 ay süre ile yönlendirilir ve bu süre sonunda hesapları kapatılır. Ancak, emekli
olan akademik ve idari personelin talebi halinde, yasal bir engel bulunmadığı takdirde e-posta hesapları açık tutulur.
Madde 16- Kullanıcıların e-posta başlığında veya mesaj içeriğinde sahtecilik yapması, gönderenin kimliğini gizleyici
faaliyetlerde bulunması, Üniversite ile ilgili gizlilik içeren bilgileri e-posta, dosya paylaşım siteleri veya paylaşım yazılımları ile
göndermesi yasaktır.
Madde 17- Talep halinde Üniversite genelinde üyeliğe açık ya da birimlere, topluluklara, gruplara vb. kurumsal oluşumlara özel
amaçlı e-posta haberleşme listeleri açılabilir. Listenin kullanım amacı birincil kullanıma uygun olmalıdır. Altı ay boyunca hiçbir
ileti gönderilmeyen listeler kapatılır. Listeye gönderilen iletinin boyutu günün koşullarına göre BİDB tarafından belirlenir ve ilan
edilir ya da liste sorumlusuna konu ile ilgili bilgi verilir.
Madde 18- Güvenli ve kimlik doğrulama yapılması şartıyla Üniversite içindeki bilişim kaynaklarına uzaktan erişime izin
verilebilir. Kullanıcılar ve hizmet sunan firmalar, Üniversitenin politikalarına uygun olmak ve yapılan işlemlerin adli bilişim
tarafından delil kabul edilecek şekilde kayıt edilmesi şartıyla, ilgili sunucuya uzaktan erişebilir.
İKİNCİ BÖLÜM
Bilişim Hizmet ve Kaynaklarına İlişkin Hak, Yetki ve Sorumluluklar
Kullanıcıların Hak ve Sorumlulukları:
Madde 19- Kullanıcılar, bu Yönergede belirtilen esaslara uymak kaydıyla Üniversite bilişim kaynaklarından “Esas Kullanıcı”
veya “Diğer Kullanıcı” tanımları ve yetkileri çerçevesinde yararlanma hakkına sahiptir.
Madde 20- Kullanıcılar, Üniversite bilişim kaynakları üzerinde, kendilerine verilen kullanıcı yetkisi ile bu kaynaklar üzerinde
gerçekleştirdikleri faaliyetler ile ürettikleri, barındırdıkları veya dağıttıkları veri, ileti, bilgi, belge, yazılım gibi her türlü kaynağın
içeriğinden, kullandıkları kaynakların kullanım kurallarına uygunluğundan sorumludur. Kullanıcılar bilişim kaynaklarının
kullanımı ile ilgili olarak, sorunların belirlenmesi, çözülmesi veya usulsüz kullanımın tespit edilmesi amacıyla, yetkili
makamlarca kendilerinden talep edilen bilgileri vermek zorundadır.
Madde 21- Kullanıcılar, kullandığı bilişim kaynaklarının güvenliğini sağlamaktan, kritik bilgileri yedeklemekten, Üniversitenin
ilgili birimleri tarafından sağlanan lisanslı yazılımları kullanmaktan, Üniversiteye ait yazılımları kullanılırken ilgili mevzuata
uymaktan sorumludur. Aksi ifade edilmediği müddetçe, kullanıcılar bütün yazılımların telif hakkının korunduğunu bilirler ve
kabul ederler.
Madde 22- Kullanıcılar, hizmet alma hakkının sadece kendilerine ait olduğunu, bu hakkın kullanımına ilişkin özel ve gizli şifresi
ile kullanıcı adını veya kodunu başkasına kullandıramayacağını ve devredemeyeceğini, başkası tarafından öğrenilme şüphesi
durumunda derhal değiştireceğini, usulsüz kullanımda sorumluluğun kendisine ait olduğunu kabul ederler.
Madde 23- Kullanıcılar, “Eduroam” katılımcısı kurumların ağ ve bilişim kaynaklarını kullanırken “Eduroam Türkiye Katılım
Sözleşmesi” ne uymayı kabul ederler.
Madde 24- Kullanıcılar, Üniversite bilişim hizmetlerinden yararlanmaya başladığı andan itibaren bu yönergede belirtilen
esaslara, etik kurallarına, ilgili yönetmeliklere ve kanunlara uyacağını taahhüt ederler. Uymadıkları takdirde bütün hukuki ve
idari yaptırımlara tabi olduklarını ve bu durum karşısında almış oldukları sorumluğu kabul ederler.
Week 2
Freedom of Speech
Speech
The expression of or the ability to express thoughts and feelings by articulate sounds. 6
A formal address or discourse delivered to an audience.
Freedom of Speech
The power or right to express one's opinions without censorship, restraint, or legal penalty.7
The right to express information, ideas, and opinions free of government restrictions based on
content and subject only to reasonable limitations.8
Freedom of speech is protected by law in many countries. The first statement regarding freedom of
expression goes through Ancient Greek civilization. The ancient Greeks pioneered free speech as a
democratic principle. The ancient Greek word “parrhesia” means “free speech,” or “to speak candidly.”
The term first appeared in Greek literature around the end of the fifth century B.C.9
During the classical period, parrhesia became a fundamental part of the democracy of Athens. Leaders,
philosophers, playwrights and everyday Athenians were free to openly discuss politics and religion and to
criticize the government in some settings.
Briefly, parrhesia can be explained as to be able to say “The king is naked”. Many people knows this
sentence as a part of a tale10, but today; it generally symbolizes the concept of free speech.
6 https://en.oxforddictionaries.com/definition/speech 7 https://en.oxforddictionaries.com/definition/freedom_of_speech 8 https://www.britannica.com/topic/freedom-of-speech 9 https://www.history.com/topics/freedom-of-speech 10 http://www.andersen.sdu.dk/vaerk/hersholt/TheEmperorsNewClothes_e.html
Symbolic speech
Freedom of speech pertains mostly to the spoken or written word, it also protects some forms of symbolic
speech. Symbolic speech uses an action to expresses an idea instead of words.
Caricatures, logos, special costumes, individual or group based behaviors may be considered as examples
of freedom symbolic speech11.
Constitutional elements including freedom of opinion
US - The First Amendment of US Constitution
The First Amendment of the United States Constitution, adopted on December 15, 1791, protects the right
to freedom of religion and freedom of expression from government interference. The first ten
amendments to the United States Constitution is Bill of Rights.
11 Pictures are from http://www.nydailynews.com/news/world/polar-bear-activist-protests-kremlin-arctic-drilling-article-1.1304786
and https://en.wikipedia.org/wiki/1968_Olympics_Black_Power_salute
“Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise
thereof; or abridging the freedom of speech, or of the press; or the right of the people peaceably to
assemble, and to petition the government for a redress of grievances.”12
The First Amendment guarantees the right to express ideas and information. On a basic level, it means
that people can express an opinion (even an unpopular or unsavory one) without fear of government
censorship. It protects all forms of communication, from speeches to art and other media including
symbolic speech.
Constitution of the Republic of Turkey Article 26
Article 26: Freedom of Expression and Dissemination of Thought13
“Everyone has the right to express and disseminate his thoughts and opinion by speech, in writing or in
pictures or through other media, individually or collectively. This right includes the freedom to receive
and impart information and ideas without interference from official authorities. This provision shall not
preclude subjecting transmission by radio, television, cinema, and similar means to a system of
licensing.14”
Please refer to the articles 22, 24, 25, 27, 28 and 40 also. These articles refer not only to the freedom of
expression, the topic of this week, but also cover the rights and responsibilities regarding your presence in
cyber world. https://www.tbmm.gov.tr/anayasa/anayasa82.htm
European Convention on Human Rights Article 10
Article 10 – Freedom of expression15
1. Everyone has the right to freedom of expression. This right shall include freedom to hold opinions and
to receive and impart information and ideas without interference by public authority and regardless of
frontiers. This article shall not prevent States from requiring the licensing of broadcasting, television or
cinema enterprises.
2. The exercise of these freedoms, since it carries with it duties and responsibilities, may be subject to
such formalities, conditions, restrictions or penalties as are prescribed by law and are necessary in a
12 https://constitutioncenter.org/interactive-constitution/amendments/amendment-i 13 VIII. Düşünceyi Açıklama ve Yayma Hürriyeti
MADDE 26. – Herkes, düşünce ve kanaatlerini söz, yazı, resim veya başka yollarla tek başına veya toplu olarak açıklama ve yayma hakkına sahiptir. Bu hürriyet resmî makamların müdahalesi olmaksızın haber veya fikir almak ya da vermek serbestliğini de kapsar. Bu fıkra hükmü, radyo, televizyon, sinema veya benzeri yollarla yapılan yayımların izin sistemine bağlanmasına engel değildir. 14 https://en.wikisource.org/wiki/Constitution_of_the_Republic_of_Turkey#Chapter_Two:_Rights_and_Duties_of_the_Individual 15 https://www.equalityhumanrights.com/en/human-rights-act/article-10-freedom-expression
democratic society, in the interests of national security, territorial integrity or public safety, for the
prevention of disorder or crime, for the protection of health or morals, for the protection of the reputation
or rights of others, for preventing the disclosure of information received in confidence, or for maintaining
the authority and impartiality of the judiciary.
Limits of Freedom of Speech
The limits on free speech come from the basic principle that you're not allowed to harm others to get what
you want16.
Hate Speech; speech to threaten to hurt someone, either verbally or nonverbally.
To deceive people to get what you want - that's called fraud.
Violations of Intellectual Property Rights
Child pornography
Hate Speech
Hate Speech
Encyclopedia of Social Problems17: Any form of expression that any racial, religious, ethnic, or
national group found offensive. This definition broadened in the 1980s to include groups based or age,
gender, sexual preference, marital status, and physical ability.
Legal Dictionary18: Speech that is intended to offend, insult, intimidate, or threaten an
individual or group based on a trait or attribute, such as sexual orientation, religion, color, gender, or
disability.
Although no widely recognized definition of the term hate speech yet exists, its traditional interpretation
included any form of expression that any racial, religious, ethnic, or national group found offensive. This
definition broadened in the 1980s to include groups based or age, gender, sexual preference, marital
status, and physical ability19.
Unfortunately, defending freedom of speech means defending any and all speech equally, even that which
may be regarded as unbearably offensive. Examples of hate speech include name-calling and racial slurs,
though occasionally symbols like the swastika and burning crosses are called into question as to whether
or not they are truly examples of hate speech, or if they are nothing more than symbols that are given a
negative connotation from the situation in which they are used.
16 https://www.policyed.org/intellections/limitsoffreespeech 17 Levin, J. & McDevitt, J. (2008). Hate speech. In V. N. Parrillo (Ed.), Encyclopedia of social problems (Vol. 1, pp. 430-430). Thousand
Oaks, CA: SAGE Publications Ltd. doi: 10.4135/9781412963930.n248 Retrieved March 30, 2018 from http://sk.sagepub.com/reference/download/socialproblems/n254.pdf 18 https://legaldictionary.net/hate-speech/ 19 http://sk.sagepub.com/reference/download/socialproblems/n254.pdf
Hate speech has three essential features.20
1) It is directed against a specified or easily identifiable individual or a group of
individuals based on an arbitrary and normatively irrelevant feature.
2) Hate speech stigmatizes the target group by implicitly or explicitly ascribing to it
qualities widely regarded as highly undesirable.
3) The target group is viewed as an undesirable presence and a legitimate object of
hostility.
Hate Crime Hoaxes are important part of cyber hate speech. For more examples please refer to
https://www.nohatespeechmovement.org
Privacy Issues
Privacy
Merriam-Webster21: (i) the quality or state of being apart from company or observation (ii)
freedom from unauthorized intrusion one's right to privacy
Bourgeois Definition22: the ability to control information about oneself. Our ability to maintain
our privacy has eroded substantially in the past decades, due to information systems.
Personally Identifiable Information
Information about a person that can be used to uniquely establish that person’s identify is called
personally identifiable information, or PII23.
Organizations that collect PII are responsible to protect it. For this reason, in the US, many
organizations minimize the collected PII to what is strictly necessary to accomplish their business purpose
and mission. Organizations that do not protect PII can face penalties, lawsuits, and loss of business. In the
US, most states now have laws in place requiring organizations that have had security breaches related to
PII to notify potential victims, as does the European Union.
Just because companies are required to protect your information does not mean they are restricted
from sharing it. In the US, companies can share your information without your explicit consent though
not all do so. While the privacy laws in the US seek to balance consumer protection with promoting
commerce, in the European Union privacy is considered a fundamental right that outweighs the interests
20 Parekh, B. (2006). Hate speech. IPPR Progressive Review, 12(4), 213-223. doi: https://doi.org/10.1111/j.1070-3535.2005.00405.x
Cited in Gelber, K., & McNamara, L. (2016). Evidencing the harms of hate speech. Social Identities, 22(3), 324-341. doi: 10.1080/13504630.2015.1128810 https://www.tandfonline.com/doi/full/10.1080/13504630.2015.1128810 Both articles are provided in this week’s Recommended reading materials. 21 https://www.merriam-webster.com/dictionary/privacy 22 Bourgeois, D. (2014). The Ethical and Legal Implications of Information Systems in D. T. Bourgeois (Ed.), Information Systems for
business and beyond The Saylor Foundation. Retrieved from https://bus206.pressbooks.com/chapter/chapter-12-the-ethical-and-legal-implications-of-information-systems/.
23 I.d.
of commerce. This has led to much stricter privacy protection in the EU, but also makes commerce more
difficult between the US and the EU.
If you want to get detailed information, you can refer to “Guide to Protecting the Confidentiality
of Personally Identifiable Information (PII)” http://csrc.nist.gov/publications/nistpubs/800-122/sp800-
122.pdf.
For the regulations in EU, you can read “General Data Protection Regulation” https://gdpr-
info.eu/ enacted in 2016. It was first proposed in 2012.
For the related law in Turkey please refer to “Kişisel Verilerin Korunma Kanunu”:
http://www.resmigazete.gov.tr/eskiler/2016/04/20160407-8.pdf enacted in March 24, 2016. You can also
refer to http://www.kvkk.gov.tr/yayinlar.html for further information.
Unique Identifiers
TC Id Number
Student number or employee number;
Commercial ID number (Bank account no)
Biometric records (fingerprint, face, etc.);
Other Identifiers
Medical or educational records;
Financial information
Date or Place of birth;
Mother‘s maiden name;
Employment information
Name
Non-Obvious Relationship Awareness
In some settings, NORA can bring many benefits, such as in law enforcement. By being able to identify
potential criminals more quickly, crimes can be solved more quickly or even prevented before they
happen. But these advantages come at a price: our privacy. In some settings, NORA can bring many
benefits, such as in law enforcement. By being able to identify potential criminals more quickly, crimes
can be solved more quickly or even prevented before they happen. But these advantages come at a price:
our privacy.
The process of collecting large quantities of a variety of information and then combining it to
create profiles of individuals is known as Non-Obvious Relationship Awareness, or NORA.
Privacy Threats of Social Media
Over-sharing and Sharenting
Fake Profiles
Clickbait and Hoax
Cyber-bullying, Hate Speech
Addiction
Social Media
Social Media:
TechTarget24:Social media is the collective of online communications channels dedicated
to community-based input, interaction, content-sharing and collaboration.
Websites and applications dedicated to forums, microblogging, social networking, social
bookmarking, social curation, and wikis are among the different types of social media.
24 http://whatis.techtarget.com/definition/social-media
Over-sharing
Over-sharing
Techtarget25: To reveal an inappropriate amount of detail about one's personal life.
Macmillan26: the activity of providing too much information (e.g. personal information, credit
card details) on the Internet, particularly through social networking sites such as Facebook
Online Safety Warning from Microsoft: https://www.youtube.com/watch?v=D1NQPUk1CHo
Think before you click: https://www.youtube.com/watch?v=xlJ7_7_wJjM
Sharenting
Sharenting
Collins27: A specific type of over-sharing, which represents the habitual use of
social media to share news, images, etc. of one’s children.
If the privacy settings are not secure enough, the pictures and videos can be used for
inappropriate purposes. Check your privacy settings. But keep in mind that these settings may not be the
same as of the people whom you prefer to share your children’s information28.
Ask yourself what the purpose for your share is? Are you keeping your child in contact with
family and friends – that’s useful? If not, if it is just something to post with no value to your child then
it’s time for a re-think. Ask yourself if you would be comfortable having the same information or image
shared about yourself online before posting on behalf of your child.
Is the share about your child’s behavior? About their emotional development? About their social
successes or otherwise? Yes? Then don’t share it. Remember those big techno-documentation stockpiles
that are a reality. Well, they’re capturing all that information about your child.
What does the image of your child convey? Are they fully clothed, in bathers…? Think about
who might be viewing your child. Even fully clothed children’s images are transferred illegally in
pedophilic rings – their intention for viewing is not the same as yours is for sharing.
The image or information you’re sharing – how is your child going to view that information when
they’re an adult? Is it going to dent or harm their relationships or career in the future? Remember, this
information is being actively gathered and stock-piled and it will be there in 2 decades from now.
Keep in mind that digital footprints NEVER erased…
25 http://whatis.techtarget.com/definition/oversharing 26 https://www.macmillandictionary.com/us/dictionary/american/oversharing 27 https://www.collinsdictionary.com/us/dictionary/english/sharenting 28 https://bestprograms4kids.com/warned-dangers-sharenting/
Fake profiles
Fake
Not genuine; imitation or counterfeit
Fake Profile:
A profile that seems to belong to someone else, acts either as a reliable non-exist
individual or purposively acts as a specific person.
Fake profiles need legitimate connections to look real, so be very wary of accepting any
connection request if you do not know them.
While many fake profiles are based on fake identities, there is also the risk of identity theft.
Someone can pose as your friend and create a new account in their name. Double check any unexpected
friend requests—especially if you thought you were already friends29.
How to protect from fake accounts?
1. Take the time to read and understand the social network site's terms and conditions and privacy
policy.
2. Familiarize yourself with the site’s privacy and security settings—make sure you’re only
sharing your information with the people you want to share it with.
3. Protect your social media accounts with strong passwords and two factor authentication.
4. Only approve legitimate connection requests—have you met them in person? Are you confident
this is NOT a fraudulent account?
5. Use the same caution with clicking on advertisements and online shopping on social media
platforms that you do elsewhere. Just because a post appears in your feed and has been
'suggested for you' doesn't mean the retailer is legitimate. Learn how to shop safely online.
6. Be particularly careful with information that could compromise the security of you and others,
including dates of birth, addresses, information about your daily routine, holiday plans, your
child's school.
How to recognize fake accounts?
1) Profile Picture
The profile photos usually are selected from, image stock sites or someone else. To search by
image can give information. Check about/info section of the account by the way.
2) Posts and shared photos
If the “fake profile” newly established, s/he probably does not have enough post. In general,
whatever the social media platform is, a real profile has some amount of digital footprints
such as like/comment/post/view etc. Check if the posts are user written posts or
shared/copied posts. Check the people who commented/liked these posts. Spam accounts
will usually have a few posts or none at all.
3) Comments
29 https://www.staysmartonline.gov.au/news/fake-social-media-profiles-rise
Check whether the profile sent any comment to any post. What are the commented posts are
about. If the comments are limited to a certain commercial purpose, then it is probably a
fake profile.
4) Friends: followers/followings in common
A fake profile has generally has not much friend/followers, and if so they may also be fabricated
or fake.
5) Google the name
You can check the name of the account for other possible online presence.
https://www.youtube.com/watch?v=k-lwYWnE4MQ (Facebook)
https://www.youtube.com/watch?v=tLe8Ga766rM (Twitter)
Clickbait
Clickbait
Merriam-Webster30: something (such as a headline) designed to make readers want to
click on a hyperlink especially when the link leads to content of dubious value or interest
Oxford: (on the Internet) content whose main purpose is to attract attention and encourage
visitors to click on a link to a particular web page.
A type of content whose main purpose is to attract attention and encourage visitors to click on a link to a
particular web page. Clickbait is generally strategy to increase click count. Media companies, social
media channels, and other internet based organizations use clickbait to increase their visit counts. But;
It causes loss of time and source such as bandwidth, or internet quota.
Since the content is usually lie or not as critical as it pretends to be, it raises ignorance on
really important news and events.
Hoax
Hoax
Merriam-Webster31: something accepted or established by fraud or fabrication
It is a trick in which someone tells people a lie, for example that there is a bomb somewhere when there is
not, or that a picture is genuine when it is not.
It causes spread of misinformation.
If it also includes discriminating purpose, raises discrimination.
Gives a sensitive information for «big data» collectors that, who easily believes or not…
HOAX and Myths
Dihydrogen Monoxide Social Experiment:
https://en.wikipedia.org/wiki/Dihydrogen_monoxide_hoax
30 https://www.merriam-webster.com/dictionary/clickbait 31 https://www.merriam-webster.com/dictionary/hoax
March 8th, 1857 New-York Fire
The Mars Hoax: The fake news circulates on social media every year in August.
Facebook disclaimers posts
Each like/post donates money
Loch-ness Lake Monster (or Van Gölü Canavarı for Turkey)
How Can We Recognize HOAX
The source of information is unclear.
Includes extraordinary dramatic/dangerous content
Unnecessary scientific representations
Expects you to «Spread EVERYONE!!!!!!!!!»
You can verify a doubtful information from these web sites:
https://teyit.org/ or http://www.hoax-slayer.net/.