y11out3+group3

=Group 3 - Year 11 Outcome 3 Collaborative work: Contemporaty ICT issue= toc

=[|References]=

ADAM

http://en.wikipedia.org/wiki/Identity_theft  http://en.wikipedia.org/wiki/Encryption In cryptography, **encryption** is the process of transforming information (referred to as plaintext) using an algorithm (called cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. The result of the process is **encrypted** information (in cryptography, referred to as cipher text). In many contexts, the word **encryption** also implicitly refers to the reverse process, **decryption** (e.g. “software for encryption” can typically also perform decryption), to make the encrypted information readable again (i.e. to make it unencrypted).   http://en.wikipedia.org/wiki/Anonymity More strictly, and in reference to an arbitrary element (e.g. a human, an object, a computer), within a well-defined set (called the "anonymity set"), "anonymity" of that element refers to the property of that element of not being identifiable within this set. If it is not identifiable, then the element is said to be "anonymous". An example: Suppose that only Alice, Bob, and Carol have the keys to a bank safe and that, one day, the contents of the safe are missing (without the lock being violated). Without any additional information, we do not know for sure whether it was Alice, Bob or Carol that opened the safe; the perpetrator remains anonymous. In particular, each of the elements in {Alice, Bob, Carol} has a 1/3 chance of being the perpetrator. However, as long as none of them has been identified as being the perpetrator with 100% certainty, we can say that the perpetrator remains anonymous. Anonymity is not an absolute. That is, the degree of anonymity one enjoys may vary. In the above example, if Carol has an ironclad alibi at the time of the perpetration, then we may deduce that it must have been either Alice or Bob who opened the safe. That is, the probability of the elements {Alice, Bob, Carol} of being the perpetrator is now 1/2, 1/2, and 0 respectively. This clearly amounts to a reduction of the perpetrator's anonymity (i.e. although the perpetrator still remains anonymous, it is now more likely than before that (s)he is either Alice or Bob). Sometimes it is desired that a person can establish a long-term relationship (such as a reputation) with some other entity, without his/her personal identity being disclosed to that entity. In this case, it may be useful for the person to establish a unique identifier, called a pseudonym, with the other entity. Examples of pseudonyms are nicknames, credit card numbers, student numbers, bank account numbers, IP addresses. A pseudonym enables the other entity to link different messages from the same person and, thereby, the maintenance of a long-term relationship. Although typically pseudonyms do not contain personally identifying information, communication that is based on pseudonyms is often not classified as "anonymous", but as "pseudonymous" instead. Indeed, in some contexts, anonymity and pseudonymity are separate concepts.  http://en.wikipedia.org/wiki/Email_Privacy The protection of electronic mail from unauthorized access and inspection is known as **electronic privacy**. In countries with a constitutional guarantee of the secrecy of correspondence, e-mail is equated with letters and thus legally protected from all forms of eavesdropping. In the United States, privacy of correspondence is derived from the Fourth Amendment to the United States Constitution and thus restricted by the requirement for a "reasonable expectation of privacy".  ANDREW It has been defined as the use of information and communications technology, particularly the Internet, by an individual or group of individuals, to harass another individual, group of individuals, or organization. The behavior includes false accusations, monitoring, the transmission of threats, identity theft, damage to data or equipment, the solicitation of minors for sexual purposes, and gathering information for harassment purposes. The harassment must be such that a reasonable person, in possession of the same information, would regard it as sufficient to cause another reasonable person distress.  http://en.wikipedia.org/wiki/Cyberstalking <span style="FONT-SIZE: 12pt; FONT-FAMILY: 'Times New Roman','serif'; mso-ansi-language: EN; mso-fareast-font-family: 'Times New Roman'">The restrictions are planned by the Federal Government to give greater protection to children from online pornography and violent websites. <span style="FONT-SIZE: 12pt; FONT-FAMILY: 'Times New Roman','serif'; mso-ansi-language: EN; mso-fareast-font-family: 'Times New Roman'">Under the plan, all internet service providers will be required to provide a "clean" feed to households and schools, free of pornography and other inappropriate material. <span style="FONT-SIZE: 12pt; FONT-FAMILY: 'Times New Roman','serif'; mso-ansi-language: EN; mso-fareast-font-family: 'Times New Roman'">Any internet users who want to "opt out" of the clean feed will have to contact their ISP. <span style="FONT-SIZE: 12pt; FONT-FAMILY: 'Times New Roman','serif'; mso-ansi-language: EN; mso-fareast-font-family: 'Times New Roman'">Online civil libertarians yesterday warned the freedom of the internet was at stake, while internet providers are concerned the new measures could slow the internet in Australia down to a crawl. <span style="FONT-SIZE: 12pt; FONT-FAMILY: 'Times New Roman','serif'; mso-ansi-language: EN; mso-fareast-font-family: 'Times New Roman'">But Communications Minister Stephen Conroy said everything possible had to be done to shield children from violent and pornographic online material. <span style="FONT-SIZE: 12pt; FONT-FAMILY: 'Times New Roman','serif'; mso-ansi-language: EN; mso-fareast-font-family: 'Times New Roman'">"We have always argued more needs to be done to protect children," he said. <span style="FONT-SIZE: 12pt; FONT-FAMILY: 'Times New Roman','serif'; mso-ansi-language: EN; mso-fareast-font-family: 'Times New Roman'">Senator Conroy said the clean feed, also known as mandatory ISP filtering, would prevent users accessing prohibited content. <span style="FONT-SIZE: 12pt; FONT-FAMILY: 'Times New Roman','serif'; mso-ansi-language: EN; mso-fareast-font-family: 'Times New Roman'">"We will work with the industry to get the best policy. (But) Labor is committed to introducing mandatory ISP filtering." <span style="FONT-SIZE: 12pt; FONT-FAMILY: 'Times New Roman','serif'; mso-ansi-language: EN; mso-fareast-font-family: 'Times New Roman'">Senator Conroy said the Australian Communications and Media Authority would prepare a blacklist of unsuitable sites. <span style="FONT-SIZE: 12pt; FONT-FAMILY: 'Times New Roman','serif'; mso-ansi-language: EN; mso-fareast-font-family: 'Times New Roman'">The adoption of mandatory ISP filtering comes on top of the former government's offer of free internet filtering software for home computers. <span style="FONT-SIZE: 12pt; FONT-FAMILY: 'Times New Roman','serif'; mso-ansi-language: EN; mso-fareast-font-family: 'Times New Roman'">Chair of the internet user group Electronic Frontiers Australia, Dale Clapperton, said mandatory ISP filtering eroded internet freedom and would not improve online safety for children. <span style="FONT-SIZE: 12pt; FONT-FAMILY: 'Times New Roman','serif'; mso-ansi-language: EN; mso-fareast-font-family: 'Times New Roman'">"China, Burma and Saudi Arabia and those type of oppressive countries are the only ones that have seriously looked at doing something like this," he said. <span style="FONT-SIZE: 12pt; FONT-FAMILY: 'Times New Roman','serif'; mso-ansi-language: EN; mso-fareast-font-family: 'Times New Roman'">"In Australia, which is supposedly a Liberal democracy, the government is saying that the internet is so full of this material that it must protect us from it by trying to block it." <span style="FONT-SIZE: 12pt; FONT-FAMILY: 'Times New Roman','serif'; mso-ansi-language: EN; mso-fareast-font-family: 'Times New Roman'">Mr Clapperton feared that parents would be lulled into a false sense of security. <span style="FONT-SIZE: 12pt; FONT-FAMILY: 'Times New Roman','serif'; mso-ansi-language: EN; mso-fareast-font-family: 'Times New Roman'">"Parents should not allow their children to use the internet unsupervised," he said. <span style="FONT-SIZE: 12pt; FONT-FAMILY: 'Times New Roman','serif'; mso-ansi-language: EN; mso-fareast-font-family: 'Times New Roman'">"Stuff that should be blocked will inevitably get through." <span style="FONT-SIZE: 12pt; FONT-FAMILY: 'Times New Roman','serif'; mso-ansi-language: EN; mso-fareast-font-family: 'Times New Roman'">Family First Senator Steve Fielding, who has campaigned for ISP filtering, said he would be watching the Government like a hawk on the issue. <span style="FONT-SIZE: 12pt; FONT-FAMILY: 'Times New Roman','serif'; mso-ansi-language: EN; mso-fareast-font-family: 'Times New Roman'">"Australian families want more (internet protection) and deserve more than they are currently getting, and this is a real test for the Rudd Government," he said. <span style="FONT-SIZE: 12pt; FONT-FAMILY: 'Times New Roman','serif'; mso-ansi-language: EN; mso-fareast-font-family: 'Times New Roman'">A report by the Australia Institute in 2003 showed 84 per cent of boys and 60 per cent of girls using the internet had experienced unwanted exposure to sexual material. http://www.news.com.au/heraldsun/story/0,21985,22989008-662,00.html <span style="FONT-SIZE: 12pt; FONT-FAMILY: 'Times New Roman','serif'; mso-ansi-language: EN; mso-fareast-font-family: 'Times New Roman'">I am a seventeen year old year 12 student from the south eastern suburbs of Melbourne, and I am utterly appalled at the governments move to enforce ISP level filtering. The internet is the ultimate tool to exercise ones right to freedom of speech, why do some people not realise this? Plus, why are ISPs being forced to take over the role of a parent in childrens web surfing? This move is absolutly pathetic on the governments behalf and by the look of the majority of the 144 comments posted on this site alone; NOBODY SUPPORTS IT ANYWAY! <span style="FONT-SIZE: 12pt; FONT-FAMILY: 'Times New Roman','serif'; mso-ansi-language: EN; mso-fareast-font-family: 'Times New Roman'">Posted by: Kaffean of Melbourne 7:49pm February 01, 2008 <span style="FONT-SIZE: 12pt; FONT-FAMILY: 'Times New Roman','serif'; mso-ansi-language: EN; mso-fareast-font-family: 'Times New Roman'">kadesha, you must be kidding. As soon as you stray from the mainstream sites, porn is what keeps many sites alive. Many younger internet users (I know I did at the age of around 13-15) are quite proficient at using BitTorrent and peer-to-peer file sharing applications to download movies, music and applications illegally. Many of these require 'cracking' to make them work without paying for them. Go to any good cracks or serials website, and it will be covered in port banners, popups, etc. Oh, sorry... you probably believe that this sort of thing doesn't happen... everyone only uses the internet for healthy, legal and legitimate purposes.... hmmm... <span style="FONT-SIZE: 12pt; FONT-FAMILY: 'Times New Roman','serif'; mso-ansi-language: EN; mso-fareast-font-family: 'Times New Roman'">Posted by: Anonymous Geek of Teh InterWeb 11:06am January 07, 2008 Comment 144 of 145 <span style="FONT-SIZE: 12pt; FONT-FAMILY: 'Times New Roman','serif'; mso-ansi-language: EN; mso-fareast-font-family: 'Times New Roman'">This is lunacy at its best. Parents blaming the government because they are not prepared to supervise their children. So the whole country has to become like Saudi Arabia, Iraq and Iran and Pakistan and China. This is AUSTRALIA not some religious FUNDAMENTALIST state. This is what these "religious do gooders" are doing to our country. Kevin Rudd you are Krudd. You are krudd. I voted for liberal for the first time in my life because I sensed you were one of these over-zealous religious do gooders. And I was right, despite the fact that you deliberately leaked the "strip club" story just to make yourself look less like a "do-gooder". You are Krudd. This is silly. Why impose inconvenience on the entire nation just to please over protective do-gooders? Does not make sense. <span style="FONT-SIZE: 12pt; FONT-FAMILY: 'Times New Roman','serif'; mso-ansi-language: EN; mso-fareast-font-family: 'Times New Roman'">Posted by: James Brown of Melbourne 2:35am January 03, 2008 Comment 130 of 145 <span style="FONT-SIZE: 12pt; FONT-FAMILY: 'Times New Roman','serif'; mso-ansi-language: EN; mso-fareast-font-family: 'Times New Roman'">Sounds like a lot of people are scared they wont be able to get their daily fill o'thrills. I suppose the wife may find out if you have to contact your ISP, and some who live at home may risk the parents finding out what one does in front of their PC. Why are some scared that a record may be kept of who is receiving streaming porn to their PC's? Why worry if you have nothing to hide. Internet speeds? Isn't it better for children not to be exposed to this crap( and it has become common place for people to sneakily add deceptive links), rather than have a super fast internet connection?No? Well I 'd hate to be a child living in one of your households. <span style="FONT-SIZE: 12pt; FONT-FAMILY: 'Times New Roman','serif'; mso-ansi-language: EN; mso-fareast-font-family: 'Times New Roman'">Posted by: too funny of Brighton 1:34am January 03, 2008 Comment 128 of 145 <span style="FONT-SIZE: 12pt; FONT-FAMILY: 'Times New Roman','serif'; mso-ansi-language: EN; mso-fareast-font-family: 'Times New Roman'">If Labor is committed to introducing mandatory ISP filtering, ill be aiming to filter out labor asap. Im going to be paying more for a slower service and a filtering system that isnt going to stop porn or violent content. Slowing the internet will slow the enconmy. I cant believe i voted these idots in power. So are we going to ban everything on TV next?? <span style="FONT-SIZE: 12pt; FONT-FAMILY: 'Times New Roman','serif'; mso-ansi-language: EN; mso-fareast-font-family: 'Times New Roman'">Posted by: Was a kevin fan of slownet town 3:17am http://www.news.com.au/heraldsun/comments/0,22023,22989008-662,00.html
 * <span style="COLOR: black; FONT-FAMILY: 'Arial','sans-serif'; mso-bidi-font-family: 'Times New Roman'; mso-ansi-language: EN">Identity theft **<span style="COLOR: black; FONT-FAMILY: 'Arial','sans-serif'; mso-bidi-font-family: 'Times New Roman'; mso-ansi-language: EN"> is a term used to refer to fraud that involves stealing money or getting other benefits by pretending to be someone else. The term is relatively new and is actually a misnomer, since it is not inherently possible to steal an identity, only to use it. The person whose identity is used can suffer various consequences when they are held responsible for the perpetrator's actions. In many countries specific laws make it a crime to use another person's identity for personal gain.
 * <span style="FONT-SIZE: 11pt; COLOR: black; FONT-FAMILY: 'Arial','sans-serif'; mso-ansi-language: EN">Anonymity **<span style="FONT-SIZE: 11pt; COLOR: black; FONT-FAMILY: 'Arial','sans-serif'; mso-ansi-language: EN"> is derived from the Greek word **ανωνυμία**, meaning "without a name" or "namelessness". In colloquial use, the term typically refers to a person, and often means that the personal identity, or personally identifiable information of that person is not known.
 * <span style="FONT-SIZE: 12.5pt; COLOR: black; FONT-FAMILY: 'Arial','sans-serif'; mso-ansi-language: EN">Cyberstalking **<span style="FONT-SIZE: 12.5pt; COLOR: black; FONT-FAMILY: 'Arial','sans-serif'; mso-ansi-language: EN"> is the use of the Internet or other electronic means to stalk someone.
 * Government porn filter to slow down the internet **
 * <span style="FONT-SIZE: 12pt; FONT-FAMILY: 'Times New Roman','serif'; mso-ansi-language: EN; mso-fareast-font-family: 'Times New Roman'">AUSTRALIANS will be forced to contact their internet service provider to avoid having their access to the web restricted. **<span style="FONT-SIZE: 12pt; FONT-FAMILY: 'Times New Roman','serif'; mso-ansi-language: EN; mso-fareast-font-family: 'Times New Roman'">
 * Comment #1 **
 * <span style="FONT-SIZE: 12pt; FONT-FAMILY: 'Times New Roman','serif'; mso-ansi-language: EN; mso-fareast-font-family: 'Times New Roman'">Comment #2 **
 * <span style="FONT-SIZE: 12pt; FONT-FAMILY: 'Times New Roman','serif'; mso-ansi-language: EN; mso-fareast-font-family: 'Times New Roman'">Comment #3 **
 * <span style="FONT-SIZE: 12pt; FONT-FAMILY: 'Times New Roman','serif'; mso-ansi-language: EN; mso-fareast-font-family: 'Times New Roman'">Comment #4 **
 * <span style="FONT-SIZE: 12pt; FONT-FAMILY: 'Times New Roman','serif'; mso-ansi-language: EN; mso-fareast-font-family: 'Times New Roman'">Comment #5 **

=Members of your team=

=Ongoing progress report=

they were solved?............ || and posted some forums || Andrew and Adam || the ning couldn't be accessed withought internet money so casey used her account || our subject || Andrew and Adam || Not a wide range of references could not solve it decided to finish at home || was no good beard or jacket || because i finally got ms casey to give me her user name || Adam || no internet money was a big issue but ms casey shared hers || area to search ||
 * Date.. || ......What was actually done?.. || ....Who performed the work?.. || ....Problems & how
 * 20/5 || made a user on the ning thing
 * 22/5 || Researched for references to
 * 27/5 || made my E-HERO || Adam || i tried to make indiana jones but there
 * 29/5 || i tried making my mind map
 * 30/5 || got references || Adam & Andrew || non internet money didn't give us a lot of

=Roles of each team member=

(make a list) || When? Timeline/dates when due ||
 * Roles || Who will do this || What will they actually do?
 * Roles || Who will do this || What will they actually do?
 * Project recorder ||  ||   ||   ||
 * Project administrator ||  ||   ||   ||
 * Product developer ||  ||   ||   ||

=Sources=

(all media should be stored on the [|class ning] Media Newspapers Radio TB Magazines Internet CD-Rom Reference boods Encyclopadeias Interviews
 * Each member should collect at least 4 pieces of data and information from different sources - who collected what source and from where?