20
Information Security and Cyberethics Week 1 Digital Citizenship Netizen = Digital Citizen Citizens (of the physical space) using the Internet as a tool in order to engage in society, politics, and government participation. Oxford: A user of the Internet, especially a habitual or keen one. The nine elements of digital citizenship1 1. Digital access: This is perhaps one of the most fundamental blocks to being a digital citizen. However, due to socioeconomic status, location, and other disabilities- some individuals may not have digital access. Recently, schools have been becoming more connected with the internet, often offering computers, and other forms of access. This can be offered through kiosks, community centers, and open labs. This most often is associated with the digital divide and factors associated with such. Digital access is available in many remote countries via cyber cafés and small coffee shops. 2. Digital commerce: This is the ability for users to recognize that much of the economy is regulated online. It also deals with the understanding of the dangers and benefits of online buying, using credit cards online, and so forth. As with the advantages and legal activities- there is also dangerous activities such as illegal downloads, gambling, drug deals, pornography, plagiarism, and so forth. 3. Digital communication: This element deals with understanding the variety of online communication mediums such as email, instant messaging, Facebook messenger, the variety of apps, and so forth. There is a standard of etiquette associated with each medium. 4. Digital literacy: This deals with the understanding of how to use various digital devices. For example, how to properly search for something on a search engine versus a database. How to use various online logs. Oftentimes many educational institutions will help form an individual's digital literacy. 5. Digital etiquette: As discussed in the third element, digital communication, this is the expectation that various mediums require a variety of etiquette. Certain mediums demand more appropriate behavior and language than others. 1 http://www.digitalcitizenship.net/nine-elements.html

Information Security and Cyberethics Week 1

  • Upload
    others

  • View
    3

  • Download
    0

Embed Size (px)

Citation preview

Information Security and Cyberethics

Week 1

Digital Citizenship

Netizen = Digital Citizen

Citizens (of the physical space) using the Internet as a tool in order to engage

in society, politics, and government participation.

Oxford: A user of the Internet, especially a habitual or keen one.

The nine elements of digital citizenship1

1. Digital access: This is perhaps one of the most fundamental blocks to being a digital citizen. However,

due to socioeconomic status, location, and other disabilities- some individuals may not have digital

access. Recently, schools have been becoming more connected with the internet, often offering

computers, and other forms of access. This can be offered through kiosks, community centers, and open

labs. This most often is associated with the digital divide and factors associated with such. Digital access

is available in many remote countries via cyber cafés and small coffee shops.

2. Digital commerce: This is the ability for users to recognize that much of the economy is regulated online.

It also deals with the understanding of the dangers and benefits of online buying, using credit cards

online, and so forth. As with the advantages and legal activities- there is also dangerous activities such as

illegal downloads, gambling, drug deals, pornography, plagiarism, and so forth.

3. Digital communication: This element deals with understanding the variety of online communication

mediums such as email, instant messaging, Facebook messenger, the variety of apps, and so forth. There

is a standard of etiquette associated with each medium.

4. Digital literacy: This deals with the understanding of how to use various digital devices. For example,

how to properly search for something on a search engine versus a database. How to use various online

logs. Oftentimes many educational institutions will help form an individual's digital literacy.

5. Digital etiquette: As discussed in the third element, digital communication, this is the expectation that

various mediums require a variety of etiquette. Certain mediums demand more appropriate behavior and

language than others.

1 http://www.digitalcitizenship.net/nine-elements.html

6. Digital law: This is where enforcement occurs for illegal downloads, plagiarizing, hacking, creating

viruses, sending spams, identity theft, cyberbullying, and so forth.

7. Digital rights and responsibilities: This is the set of rights digital citizens have such as privacy, speech,

and so forth.

8. Digital health: Digital citizens must be aware of the physical stress placed on their bodies by internet

usage. They must be aware to not become overly dependent on the internet causing eye strain, headaches,

stress problems, and so on.

9. Digital security: This simply means that citizens must take measures to be safe by practicing using

difficult passwords, virus protection, backing up data, and so forth.

Netiquette

Cyber-Ethics

Encyclopedia of Sciences and Religions: Cyberethics is a branch of applied

ethics that examines moral, legal, and social issues at the intersection of

computer/information and communication technologies.

C3 Framework Definition2: Cyber-ethics is the discipline of using appropriate

and ethical behaviors and acknowledging moral duties and obligations pertaining to

online environments and digital media it refers to choices about what is right and

wrong in spite of the ability to do something. It includes but not limited to

plagiarism, bullying, and hacking to name a few.

Core Rules of Netiquette

Rule 1 Remember the Human

Rule 2 Adhere to the same standards of behavior online that you follow in real life

Rule 3 Know where you are in cyberspace

Rule 4 Respect other people's time and bandwidth

Rule 5 Make yourself look good online

Rule 6 Share expert knowledge

Rule 7 Help keep flame wars under control

Rule 8 Respect other people's privacy

Rule 9 Don't abuse your power

Rule 10 Be forgiving of other people's mistakes

2 Pruitt-Mentle, D. (2000). C3 Framework Cyberethics, Cybersafety and Cybersecurity Promoting Responsible Use. Educational Technology

Policy, Research and Outreach http://www.edtechpolicy.org/cyberk12/Documents/C3Awareness/C3_framework_full_final.pdf

Digital Footprint

Oxford: The information about a particular person that exists on the Internet

as a result of their online activity.

Internet Society: Your digital footprint is all the stuff you leave behind as you

use the Internet such as comments on social media, Skype calls, mobile application

use and email records.

It is a part of your online history and can potentially be seen by other people,

or tracked in a database, and can never be deleted.

5651 Internet Law

Enacted on May 4th, 2007, this law regulates the use of the Internet Sources for all citizens in Turkey. All

legal attempts on the web sites, such as access ban, following the logs are based on the law 5651.

http://www.resmigazete.gov.tr/eskiler/2007/05/20070523-1.htm

The “Article 4” in the Law 5651 defines the responsibilities of “content providers”.

“Content Provider” is defined as “any real or legal individual that produces, modifies and provides any

information or data presented to the user over the Internet”. All YouTube, FaceBook, Blog and/or other web authors

are considered as “Content Provider” in the law 5651.

Responsibilities of the content provider

ARTICLE 4 -

(1) The content provider is responsible for any content that is used on the

internet.

(2) The content provider is not responsible for the content of the other party to

whom it is linked. However, if it is clear from the format of the presentation that the

content it links to is embraced and intended by the user to reach the content in

question, it is responsible according to the general provisions.

Acceptable IT Use Policy

Acceptable Use Policy (AUP) can be defined as “strategies that allow

organizations to notify technology users of expected behavior and set forth the

consequences of misuse”3.

Many organizations that provide technology services to a group of constituents or the public require

agreement to an acceptable use policy (AUP) before those services can be accessed. This policy outlines what is

allowed and what is not allowed while someone is using the organization’s services. An everyday example of this

is the terms of service that must be agreed to before using the public Wi-Fi at Starbucks, McDonald’s, or even a

university.

Violations of these policies have various consequences. In most cases, such as with Wi-Fi, violating the

acceptable use policy will mean that you will lose your access to the resource. While losing access to Wi-Fi at

Starbucks may not have a lasting impact, a university student getting banned from the university’s Wi-Fi (or

possibly all network resources) could have a large impact.

Intellectual Property

Intellectual property: A property (as an idea, invention, or process) that

derives from the work of the mind or intellect.4

Digital technologies have driven a rise in new intellectual property claims and made it much more difficult to

defend intellectual property. Practically speaking, it is very difficult to protect an idea. Instead, intellectual property

laws are written to protect the tangible results of an idea. In other words, just coming up with a song in your head is

not protected, but if you write it down it can be protected. While protecting intellectual property is important

because of the incentives it provides, it is also necessary to limit the amount of benefit that can be received and

allow the results of ideas to become part of the public domain.

Copyright

Copyright is the protection given to songs, computer programs, books, and

other creative works.

3 Conn, K. (2002). The internet and the law: What educators need to know: ASCD.p:91.

4 http://www.merriam-webster.com/dictionary/intellectual%20property

Copyright - History

The first copyright act in the world was “The Statute of Anne”, enacted on April 10th, 1710, by British

Parliament5. It was limited to printed books. The duration of the protection 14 years. If the author of the book was

alive, copyright protection would extend 14 more years.

In the United States, the law was adopted in 1790, it was limited to books, maps, and charts and lasts 14

years and a 14 years renew similar to British law. Over the time, protection was expanded to include photography

and motion pictures and lasts 42 years. Today; the protection lasts for 95 years from the original creation date.

Digital Millennium Copyright Act (DMCA)

As digital technologies have changed what it means to create, copy, and distribute media, a policy vacuum

has been created. In 1998, the US Congress passed the Digital Millennium Copyright Act (DMCA), which extended

copyright law to take into consideration digital technologies.

Two of the best-known provisions from the DMCA are the anti-circumvention provision and the “safe harbor”

provision.

The anti-circumvention provision makes it illegal to create technology to circumvent technology that has

been put in place to protect a copyrighted work. This provision includes not just the creation of the

technology but also the publishing of information that describes how to do it.

5 You can refer to http://www.copyrighthistory.com/anne.html if you interest in the first copyright act in the world, the

British Statute of Anne, from 1710.

The “safe harbor” provision limits the liability of online service providers when someone using their

services commits copyright infringement. This is the provision that allows YouTube, for example, not to be

held liable when someone posts a clip from a copyrighted movie. The provision does require the online

service provider to take action when they are notified of the violation (a “takedown” notice).

Patent

A government authority or license conferring a right or title for a set period,

especially the sole right to exclude others from making, using, or selling an

invention.

A patent creates protection for someone who invents a new product or process. The definition of invention is quite

broad and covers many different fields.

Unlike copyright, a patent is not automatically granted when someone has an interesting idea and writes it down. In

most countries, a patent application must be submitted to a government patent office. A patent will only be granted

if the invention or process being submitted meets certain conditions:

It must be original. The invention being submitted must not have been submitted before.

It must be non-obvious. You cannot patent something that anyone could think of. For example, you could

not put a pencil on a chair and try to get a patent for a pencil-holding chair.

It must be useful. The invention being submitted must serve some purpose or have some use that would be

desired.

Trademark

A trademark is a word, phrase, logo, shape or sound that identifies a source of goods or services. For example, the

Nike “Swoosh,” the Facebook “f”, and Apple’s apple (with a bite taken out of it) are all trademarked. The concept

behind trademarks is to protect the consumer.

There are two types of trademarks.

A common-law trademark is designated by placing “TM” next to the trademark.™(Use Alt+0153 on

keyboard to type)

A registered trademark is one that has been examined, approved, and registered with the trademark office ®

(Use Alt+0174 on keyboard to type)

Trademark Examples

An iconic shape of a bottle, a special shape of an oil pastel, or a car…

Trademark Violations

Creative Commons

Creative Commons is a nonprofit organization that provides legal tools for artists and authors. The tools

offered make it simple to license artistic or literary work for others to use or distribute in a manner

consistent with the author’s intentions.

CC0 : No restriction

CC-BY : This is the least restrictive license. It lets others distribute and build upon the work,

even commercially, as long as they give the author credit for the original work.

CC-BY-SA : This license restricts the distribution of the work via the “Share-Alike” clause. This

means that others can freely distribute and build upon the work, but they must give credit to the original

author and they must share using the same Creative Commons license.

CC-BY-NC : This license is the same as CC-BY but adds the restriction that no one can make

money with this work. NC stands for “Non-Commercial.”

CC-BY-NC-ND : This license is the same as CC-BY-NC but also adds the ND restriction, which

means that No Derivative works may be made from the original.

Appendix

http://bid.ankara.edu.tr/mevzuat/

http://bid.ankara.edu.tr/wp-content/uploads/sites/139/2019/04/bhk.pdf

Please read the AUP of IT resources of Ankara University. For the students, IT users, the general

provisions and rights and responsibilities are presented below. Note: These are particularly important.

Bilgisayar Ağı, İnternet ve Elektronik Posta (E-Posta) Kullanımı Esasları:

Madde 5- Bilişim kaynaklarını kullanıma sunan ve faydalanan tüm birimlerin ve kullanıcıların, Üniversite bilgisayar ağı ve

İnternet alt yapısının da üzerinde yer aldığı ULAKNET ve diğer ulusal ve uluslararası ağların kullanım politikaları ile ilgili

mevzuata uyma ve bu bağlamda gerekli önlemleri alma zorunluluğu vardır.

Madde 6- Bilişim kaynaklarının, Üniversitenin bilimsel araştırma, akademik, eğitim etkinlikleri ile hizmet sunumu ve yönetsel

fonksiyonları için temel önemi olan, bilginin üretimi, işlenmesi, depolanması, korunması ve iletimi için kullanılması esastır.

Madde 7- Bilişim kaynaklarının kullanımında altyapıyı, donanımı ve yazılımı zarara uğratan, tahrip edici, zedeleyici ve

çalışmasını engelleyici hiçbir girişimde bulunulmaması ve kaynakların verimli kullanılması zorunluluktur.

Madde 8- Bilişim kaynaklarının birincil kullanım kapsamında hizmete sunulması esastır. İkincil kullanıma ancak birincil

kullanım gereksinimleri karşılandıktan sonra kısıtlı olarak izin verilebilir.

Madde 9- Kullanıcılar, gereksiz trafik yarattığı ve bilişim kaynaklarının sağlıklı çalışmasını engellediği için P2P-PeerToPeer (E-

mule, E-donkey, Kazaa, µtorrent, I-mesh vb.) dosya paylaşım programlarını kullanamaz. Söz konusu yazılımlar bilimsel amaç ile

kullanılacak ise BİDB’ndan kısıtlı ve/veya geçici kullanım izni talep edilir.

Madde 10- Bilişim kaynaklarının kullanımında kullanıcılar arasında adil paylaşımının sağlanması, başkalarına kullanım olanağı

vermeyecek biçimde trafik yaratılmasına karşı önlemler alınması, bilişim kaynaklarına zarar verebilecek tehlikelere karşı risk ve

güvenlik önlemleri alınması, kullanıcıların şahsi bilgilerinin ve gizliliğin korunması ile veri, bilgi ve kaynak yedeklemesi

yapılması esastır. Bu işlemler yetkili birimler tarafından gerçekleştirilir.

Madde 11- Bilişim kaynakları kapsamındaki tüm yazılım, donanım, veri ve bilgiler bu kaynakları kullanıma sunan birimlerin

yöneticilerinden yetki ve olur alınmadan değiştirilemez, yetkisiz hiç kimse ile paylaşılamaz ve amaçları dışında kullanılamaz.

Madde 12- Üniversite bilişim kaynakları, sistem ya da ağ üzerindeki veri/bilgi ve/veya trafiğin izlenmesi, saklanması, transferi

ve dağıtımı, başkalarına hat kullanım olanağı vermeyecek oranda aşırı bant genişliği kullanımı, başarılı olsun veya olmasın karşı

tarafın izni olmadan bir başka bilgisayara, ağa veya kullanıcının bilgilerine/verilerine ulaşılmaya çalışılması, bu bilgilerin

izlenmesi, araştırılması ve tahrip edilmesi, kullanıcılara ait giriş kodlarının elde edilmeye veya yayılmasına çalışılması,

Üniversite ağı dahilindeki ya da haricindeki bir sisteme, ağ kaynağına veya servise saldırı yapılması amacıyla kullanılamaz.

Madde 13- Üniversite bilişim kaynakları hukuki açıdan suç teşkil eden; yazılım ve materyal üretimi/barındırılması/dağıtımı,

istem dışında ileti (zincir e-posta, spam vb.) gönderimi, siyasi/dini/etnik propaganda, reklam ve kişisel kazanç amacıyla

kullanılamaz.

Madde 14- Üniversite bünyesindeki birim, bölüm, kulüp, topluluk veya grup niteliğindeki kurumsal ve kişisel web sayfaları ile

e-posta adreslerinin sorumluluğu resmi yazı ya da talep formu ile BİDB’ndan talep eden kişiye aittir.

Madde 15- Kurumsal e-posta adresleri tüm akademik ve idari personel ile öğrencilere talep durumunda BİDB tarafından verilir.

İletinin ekinde gönderilecek dosya boyutu, bir seferde ve bir günde gönderilebilecek ileti sayısı, kota miktarı günün koşullarına

göre BİDB tarafından belirlenir ve ilan edilir. E-posta adresleri BİDB tarafından belirlenen standartlarda verilir.

Üniversite ile hukuki ilişkisi kesilen kullanıcıların e-posta hesapları kapatılır. Bu kullanıcıların hesapları tercih ettikleri yeni e-

posta adresine bir kereye mahsus olmak üzere 12 ay süre ile yönlendirilir ve bu süre sonunda hesapları kapatılır. Ancak, emekli

olan akademik ve idari personelin talebi halinde, yasal bir engel bulunmadığı takdirde e-posta hesapları açık tutulur.

Madde 16- Kullanıcıların e-posta başlığında veya mesaj içeriğinde sahtecilik yapması, gönderenin kimliğini gizleyici

faaliyetlerde bulunması, Üniversite ile ilgili gizlilik içeren bilgileri e-posta, dosya paylaşım siteleri veya paylaşım yazılımları ile

göndermesi yasaktır.

Madde 17- Talep halinde Üniversite genelinde üyeliğe açık ya da birimlere, topluluklara, gruplara vb. kurumsal oluşumlara özel

amaçlı e-posta haberleşme listeleri açılabilir. Listenin kullanım amacı birincil kullanıma uygun olmalıdır. Altı ay boyunca hiçbir

ileti gönderilmeyen listeler kapatılır. Listeye gönderilen iletinin boyutu günün koşullarına göre BİDB tarafından belirlenir ve ilan

edilir ya da liste sorumlusuna konu ile ilgili bilgi verilir.

Madde 18- Güvenli ve kimlik doğrulama yapılması şartıyla Üniversite içindeki bilişim kaynaklarına uzaktan erişime izin

verilebilir. Kullanıcılar ve hizmet sunan firmalar, Üniversitenin politikalarına uygun olmak ve yapılan işlemlerin adli bilişim

tarafından delil kabul edilecek şekilde kayıt edilmesi şartıyla, ilgili sunucuya uzaktan erişebilir.

İKİNCİ BÖLÜM

Bilişim Hizmet ve Kaynaklarına İlişkin Hak, Yetki ve Sorumluluklar

Kullanıcıların Hak ve Sorumlulukları:

Madde 19- Kullanıcılar, bu Yönergede belirtilen esaslara uymak kaydıyla Üniversite bilişim kaynaklarından “Esas Kullanıcı”

veya “Diğer Kullanıcı” tanımları ve yetkileri çerçevesinde yararlanma hakkına sahiptir.

Madde 20- Kullanıcılar, Üniversite bilişim kaynakları üzerinde, kendilerine verilen kullanıcı yetkisi ile bu kaynaklar üzerinde

gerçekleştirdikleri faaliyetler ile ürettikleri, barındırdıkları veya dağıttıkları veri, ileti, bilgi, belge, yazılım gibi her türlü kaynağın

içeriğinden, kullandıkları kaynakların kullanım kurallarına uygunluğundan sorumludur. Kullanıcılar bilişim kaynaklarının

kullanımı ile ilgili olarak, sorunların belirlenmesi, çözülmesi veya usulsüz kullanımın tespit edilmesi amacıyla, yetkili

makamlarca kendilerinden talep edilen bilgileri vermek zorundadır.

Madde 21- Kullanıcılar, kullandığı bilişim kaynaklarının güvenliğini sağlamaktan, kritik bilgileri yedeklemekten, Üniversitenin

ilgili birimleri tarafından sağlanan lisanslı yazılımları kullanmaktan, Üniversiteye ait yazılımları kullanılırken ilgili mevzuata

uymaktan sorumludur. Aksi ifade edilmediği müddetçe, kullanıcılar bütün yazılımların telif hakkının korunduğunu bilirler ve

kabul ederler.

Madde 22- Kullanıcılar, hizmet alma hakkının sadece kendilerine ait olduğunu, bu hakkın kullanımına ilişkin özel ve gizli şifresi

ile kullanıcı adını veya kodunu başkasına kullandıramayacağını ve devredemeyeceğini, başkası tarafından öğrenilme şüphesi

durumunda derhal değiştireceğini, usulsüz kullanımda sorumluluğun kendisine ait olduğunu kabul ederler.

Madde 23- Kullanıcılar, “Eduroam” katılımcısı kurumların ağ ve bilişim kaynaklarını kullanırken “Eduroam Türkiye Katılım

Sözleşmesi” ne uymayı kabul ederler.

Madde 24- Kullanıcılar, Üniversite bilişim hizmetlerinden yararlanmaya başladığı andan itibaren bu yönergede belirtilen

esaslara, etik kurallarına, ilgili yönetmeliklere ve kanunlara uyacağını taahhüt ederler. Uymadıkları takdirde bütün hukuki ve

idari yaptırımlara tabi olduklarını ve bu durum karşısında almış oldukları sorumluğu kabul ederler.

Week 2

Freedom of Speech

Speech

The expression of or the ability to express thoughts and feelings by articulate sounds. 6

A formal address or discourse delivered to an audience.

Freedom of Speech

The power or right to express one's opinions without censorship, restraint, or legal penalty.7

The right to express information, ideas, and opinions free of government restrictions based on

content and subject only to reasonable limitations.8

Freedom of speech is protected by law in many countries. The first statement regarding freedom of

expression goes through Ancient Greek civilization. The ancient Greeks pioneered free speech as a

democratic principle. The ancient Greek word “parrhesia” means “free speech,” or “to speak candidly.”

The term first appeared in Greek literature around the end of the fifth century B.C.9

During the classical period, parrhesia became a fundamental part of the democracy of Athens. Leaders,

philosophers, playwrights and everyday Athenians were free to openly discuss politics and religion and to

criticize the government in some settings.

Briefly, parrhesia can be explained as to be able to say “The king is naked”. Many people knows this

sentence as a part of a tale10, but today; it generally symbolizes the concept of free speech.

6 https://en.oxforddictionaries.com/definition/speech 7 https://en.oxforddictionaries.com/definition/freedom_of_speech 8 https://www.britannica.com/topic/freedom-of-speech 9 https://www.history.com/topics/freedom-of-speech 10 http://www.andersen.sdu.dk/vaerk/hersholt/TheEmperorsNewClothes_e.html

Symbolic speech

Freedom of speech pertains mostly to the spoken or written word, it also protects some forms of symbolic

speech. Symbolic speech uses an action to expresses an idea instead of words.

Caricatures, logos, special costumes, individual or group based behaviors may be considered as examples

of freedom symbolic speech11.

Constitutional elements including freedom of opinion

US - The First Amendment of US Constitution

The First Amendment of the United States Constitution, adopted on December 15, 1791, protects the right

to freedom of religion and freedom of expression from government interference. The first ten

amendments to the United States Constitution is Bill of Rights.

11 Pictures are from http://www.nydailynews.com/news/world/polar-bear-activist-protests-kremlin-arctic-drilling-article-1.1304786

and https://en.wikipedia.org/wiki/1968_Olympics_Black_Power_salute

“Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise

thereof; or abridging the freedom of speech, or of the press; or the right of the people peaceably to

assemble, and to petition the government for a redress of grievances.”12

The First Amendment guarantees the right to express ideas and information. On a basic level, it means

that people can express an opinion (even an unpopular or unsavory one) without fear of government

censorship. It protects all forms of communication, from speeches to art and other media including

symbolic speech.

Constitution of the Republic of Turkey Article 26

Article 26: Freedom of Expression and Dissemination of Thought13

“Everyone has the right to express and disseminate his thoughts and opinion by speech, in writing or in

pictures or through other media, individually or collectively. This right includes the freedom to receive

and impart information and ideas without interference from official authorities. This provision shall not

preclude subjecting transmission by radio, television, cinema, and similar means to a system of

licensing.14”

Please refer to the articles 22, 24, 25, 27, 28 and 40 also. These articles refer not only to the freedom of

expression, the topic of this week, but also cover the rights and responsibilities regarding your presence in

cyber world. https://www.tbmm.gov.tr/anayasa/anayasa82.htm

European Convention on Human Rights Article 10

Article 10 – Freedom of expression15

1. Everyone has the right to freedom of expression. This right shall include freedom to hold opinions and

to receive and impart information and ideas without interference by public authority and regardless of

frontiers. This article shall not prevent States from requiring the licensing of broadcasting, television or

cinema enterprises.

2. The exercise of these freedoms, since it carries with it duties and responsibilities, may be subject to

such formalities, conditions, restrictions or penalties as are prescribed by law and are necessary in a

12 https://constitutioncenter.org/interactive-constitution/amendments/amendment-i 13 VIII. Düşünceyi Açıklama ve Yayma Hürriyeti

MADDE 26. – Herkes, düşünce ve kanaatlerini söz, yazı, resim veya başka yollarla tek başına veya toplu olarak açıklama ve yayma hakkına sahiptir. Bu hürriyet resmî makamların müdahalesi olmaksızın haber veya fikir almak ya da vermek serbestliğini de kapsar. Bu fıkra hükmü, radyo, televizyon, sinema veya benzeri yollarla yapılan yayımların izin sistemine bağlanmasına engel değildir. 14 https://en.wikisource.org/wiki/Constitution_of_the_Republic_of_Turkey#Chapter_Two:_Rights_and_Duties_of_the_Individual 15 https://www.equalityhumanrights.com/en/human-rights-act/article-10-freedom-expression

democratic society, in the interests of national security, territorial integrity or public safety, for the

prevention of disorder or crime, for the protection of health or morals, for the protection of the reputation

or rights of others, for preventing the disclosure of information received in confidence, or for maintaining

the authority and impartiality of the judiciary.

Limits of Freedom of Speech

The limits on free speech come from the basic principle that you're not allowed to harm others to get what

you want16.

Hate Speech; speech to threaten to hurt someone, either verbally or nonverbally.

To deceive people to get what you want - that's called fraud.

Violations of Intellectual Property Rights

Child pornography

Hate Speech

Hate Speech

Encyclopedia of Social Problems17: Any form of expression that any racial, religious, ethnic, or

national group found offensive. This definition broadened in the 1980s to include groups based or age,

gender, sexual preference, marital status, and physical ability.

Legal Dictionary18: Speech that is intended to offend, insult, intimidate, or threaten an

individual or group based on a trait or attribute, such as sexual orientation, religion, color, gender, or

disability.

Although no widely recognized definition of the term hate speech yet exists, its traditional interpretation

included any form of expression that any racial, religious, ethnic, or national group found offensive. This

definition broadened in the 1980s to include groups based or age, gender, sexual preference, marital

status, and physical ability19.

Unfortunately, defending freedom of speech means defending any and all speech equally, even that which

may be regarded as unbearably offensive. Examples of hate speech include name-calling and racial slurs,

though occasionally symbols like the swastika and burning crosses are called into question as to whether

or not they are truly examples of hate speech, or if they are nothing more than symbols that are given a

negative connotation from the situation in which they are used.

16 https://www.policyed.org/intellections/limitsoffreespeech 17 Levin, J. & McDevitt, J. (2008). Hate speech. In V. N. Parrillo (Ed.), Encyclopedia of social problems (Vol. 1, pp. 430-430). Thousand

Oaks, CA: SAGE Publications Ltd. doi: 10.4135/9781412963930.n248 Retrieved March 30, 2018 from http://sk.sagepub.com/reference/download/socialproblems/n254.pdf 18 https://legaldictionary.net/hate-speech/ 19 http://sk.sagepub.com/reference/download/socialproblems/n254.pdf

Hate speech has three essential features.20

1) It is directed against a specified or easily identifiable individual or a group of

individuals based on an arbitrary and normatively irrelevant feature.

2) Hate speech stigmatizes the target group by implicitly or explicitly ascribing to it

qualities widely regarded as highly undesirable.

3) The target group is viewed as an undesirable presence and a legitimate object of

hostility.

Hate Crime Hoaxes are important part of cyber hate speech. For more examples please refer to

https://www.nohatespeechmovement.org

Privacy Issues

Privacy

Merriam-Webster21: (i) the quality or state of being apart from company or observation (ii)

freedom from unauthorized intrusion one's right to privacy

Bourgeois Definition22: the ability to control information about oneself. Our ability to maintain

our privacy has eroded substantially in the past decades, due to information systems.

Personally Identifiable Information

Information about a person that can be used to uniquely establish that person’s identify is called

personally identifiable information, or PII23.

Organizations that collect PII are responsible to protect it. For this reason, in the US, many

organizations minimize the collected PII to what is strictly necessary to accomplish their business purpose

and mission. Organizations that do not protect PII can face penalties, lawsuits, and loss of business. In the

US, most states now have laws in place requiring organizations that have had security breaches related to

PII to notify potential victims, as does the European Union.

Just because companies are required to protect your information does not mean they are restricted

from sharing it. In the US, companies can share your information without your explicit consent though

not all do so. While the privacy laws in the US seek to balance consumer protection with promoting

commerce, in the European Union privacy is considered a fundamental right that outweighs the interests

20 Parekh, B. (2006). Hate speech. IPPR Progressive Review, 12(4), 213-223. doi: https://doi.org/10.1111/j.1070-3535.2005.00405.x

Cited in Gelber, K., & McNamara, L. (2016). Evidencing the harms of hate speech. Social Identities, 22(3), 324-341. doi: 10.1080/13504630.2015.1128810 https://www.tandfonline.com/doi/full/10.1080/13504630.2015.1128810 Both articles are provided in this week’s Recommended reading materials. 21 https://www.merriam-webster.com/dictionary/privacy 22 Bourgeois, D. (2014). The Ethical and Legal Implications of Information Systems in D. T. Bourgeois (Ed.), Information Systems for

business and beyond The Saylor Foundation. Retrieved from https://bus206.pressbooks.com/chapter/chapter-12-the-ethical-and-legal-implications-of-information-systems/.

23 I.d.

of commerce. This has led to much stricter privacy protection in the EU, but also makes commerce more

difficult between the US and the EU.

If you want to get detailed information, you can refer to “Guide to Protecting the Confidentiality

of Personally Identifiable Information (PII)” http://csrc.nist.gov/publications/nistpubs/800-122/sp800-

122.pdf.

For the regulations in EU, you can read “General Data Protection Regulation” https://gdpr-

info.eu/ enacted in 2016. It was first proposed in 2012.

For the related law in Turkey please refer to “Kişisel Verilerin Korunma Kanunu”:

http://www.resmigazete.gov.tr/eskiler/2016/04/20160407-8.pdf enacted in March 24, 2016. You can also

refer to http://www.kvkk.gov.tr/yayinlar.html for further information.

Unique Identifiers

TC Id Number

Student number or employee number;

Commercial ID number (Bank account no)

Biometric records (fingerprint, face, etc.);

Other Identifiers

Medical or educational records;

Financial information

Date or Place of birth;

Mother‘s maiden name;

Employment information

Name

Non-Obvious Relationship Awareness

In some settings, NORA can bring many benefits, such as in law enforcement. By being able to identify

potential criminals more quickly, crimes can be solved more quickly or even prevented before they

happen. But these advantages come at a price: our privacy. In some settings, NORA can bring many

benefits, such as in law enforcement. By being able to identify potential criminals more quickly, crimes

can be solved more quickly or even prevented before they happen. But these advantages come at a price:

our privacy.

The process of collecting large quantities of a variety of information and then combining it to

create profiles of individuals is known as Non-Obvious Relationship Awareness, or NORA.

Privacy Threats of Social Media

Over-sharing and Sharenting

Fake Profiles

Clickbait and Hoax

Cyber-bullying, Hate Speech

Addiction

Social Media

Social Media:

TechTarget24:Social media is the collective of online communications channels dedicated

to community-based input, interaction, content-sharing and collaboration.

Websites and applications dedicated to forums, microblogging, social networking, social

bookmarking, social curation, and wikis are among the different types of social media.

24 http://whatis.techtarget.com/definition/social-media

Over-sharing

Over-sharing

Techtarget25: To reveal an inappropriate amount of detail about one's personal life.

Macmillan26: the activity of providing too much information (e.g. personal information, credit

card details) on the Internet, particularly through social networking sites such as Facebook

Online Safety Warning from Microsoft: https://www.youtube.com/watch?v=D1NQPUk1CHo

Think before you click: https://www.youtube.com/watch?v=xlJ7_7_wJjM

Sharenting

Sharenting

Collins27: A specific type of over-sharing, which represents the habitual use of

social media to share news, images, etc. of one’s children.

If the privacy settings are not secure enough, the pictures and videos can be used for

inappropriate purposes. Check your privacy settings. But keep in mind that these settings may not be the

same as of the people whom you prefer to share your children’s information28.

Ask yourself what the purpose for your share is? Are you keeping your child in contact with

family and friends – that’s useful? If not, if it is just something to post with no value to your child then

it’s time for a re-think. Ask yourself if you would be comfortable having the same information or image

shared about yourself online before posting on behalf of your child.

Is the share about your child’s behavior? About their emotional development? About their social

successes or otherwise? Yes? Then don’t share it. Remember those big techno-documentation stockpiles

that are a reality. Well, they’re capturing all that information about your child.

What does the image of your child convey? Are they fully clothed, in bathers…? Think about

who might be viewing your child. Even fully clothed children’s images are transferred illegally in

pedophilic rings – their intention for viewing is not the same as yours is for sharing.

The image or information you’re sharing – how is your child going to view that information when

they’re an adult? Is it going to dent or harm their relationships or career in the future? Remember, this

information is being actively gathered and stock-piled and it will be there in 2 decades from now.

Keep in mind that digital footprints NEVER erased…

25 http://whatis.techtarget.com/definition/oversharing 26 https://www.macmillandictionary.com/us/dictionary/american/oversharing 27 https://www.collinsdictionary.com/us/dictionary/english/sharenting 28 https://bestprograms4kids.com/warned-dangers-sharenting/

Fake profiles

Fake

Not genuine; imitation or counterfeit

Fake Profile:

A profile that seems to belong to someone else, acts either as a reliable non-exist

individual or purposively acts as a specific person.

Fake profiles need legitimate connections to look real, so be very wary of accepting any

connection request if you do not know them.

While many fake profiles are based on fake identities, there is also the risk of identity theft.

Someone can pose as your friend and create a new account in their name. Double check any unexpected

friend requests—especially if you thought you were already friends29.

How to protect from fake accounts?

1. Take the time to read and understand the social network site's terms and conditions and privacy

policy.

2. Familiarize yourself with the site’s privacy and security settings—make sure you’re only

sharing your information with the people you want to share it with.

3. Protect your social media accounts with strong passwords and two factor authentication.

4. Only approve legitimate connection requests—have you met them in person? Are you confident

this is NOT a fraudulent account?

5. Use the same caution with clicking on advertisements and online shopping on social media

platforms that you do elsewhere. Just because a post appears in your feed and has been

'suggested for you' doesn't mean the retailer is legitimate. Learn how to shop safely online.

6. Be particularly careful with information that could compromise the security of you and others,

including dates of birth, addresses, information about your daily routine, holiday plans, your

child's school.

How to recognize fake accounts?

1) Profile Picture

The profile photos usually are selected from, image stock sites or someone else. To search by

image can give information. Check about/info section of the account by the way.

2) Posts and shared photos

If the “fake profile” newly established, s/he probably does not have enough post. In general,

whatever the social media platform is, a real profile has some amount of digital footprints

such as like/comment/post/view etc. Check if the posts are user written posts or

shared/copied posts. Check the people who commented/liked these posts. Spam accounts

will usually have a few posts or none at all.

3) Comments

29 https://www.staysmartonline.gov.au/news/fake-social-media-profiles-rise

Check whether the profile sent any comment to any post. What are the commented posts are

about. If the comments are limited to a certain commercial purpose, then it is probably a

fake profile.

4) Friends: followers/followings in common

A fake profile has generally has not much friend/followers, and if so they may also be fabricated

or fake.

5) Google the name

You can check the name of the account for other possible online presence.

https://www.youtube.com/watch?v=k-lwYWnE4MQ (Facebook)

https://www.youtube.com/watch?v=tLe8Ga766rM (Twitter)

Clickbait

Clickbait

Merriam-Webster30: something (such as a headline) designed to make readers want to

click on a hyperlink especially when the link leads to content of dubious value or interest

Oxford: (on the Internet) content whose main purpose is to attract attention and encourage

visitors to click on a link to a particular web page.

A type of content whose main purpose is to attract attention and encourage visitors to click on a link to a

particular web page. Clickbait is generally strategy to increase click count. Media companies, social

media channels, and other internet based organizations use clickbait to increase their visit counts. But;

It causes loss of time and source such as bandwidth, or internet quota.

Since the content is usually lie or not as critical as it pretends to be, it raises ignorance on

really important news and events.

Hoax

Hoax

Merriam-Webster31: something accepted or established by fraud or fabrication

It is a trick in which someone tells people a lie, for example that there is a bomb somewhere when there is

not, or that a picture is genuine when it is not.

It causes spread of misinformation.

If it also includes discriminating purpose, raises discrimination.

Gives a sensitive information for «big data» collectors that, who easily believes or not…

HOAX and Myths

Dihydrogen Monoxide Social Experiment:

https://en.wikipedia.org/wiki/Dihydrogen_monoxide_hoax

30 https://www.merriam-webster.com/dictionary/clickbait 31 https://www.merriam-webster.com/dictionary/hoax

March 8th, 1857 New-York Fire

The Mars Hoax: The fake news circulates on social media every year in August.

Facebook disclaimers posts

Each like/post donates money

Loch-ness Lake Monster (or Van Gölü Canavarı for Turkey)

How Can We Recognize HOAX

The source of information is unclear.

Includes extraordinary dramatic/dangerous content

Unnecessary scientific representations

Expects you to «Spread EVERYONE!!!!!!!!!»

You can verify a doubtful information from these web sites:

https://teyit.org/ or http://www.hoax-slayer.net/.