1 / 99

MOBILE ABUSE

Like millions of others, you may be the victim of cell phone abuse. Cell phone abuse disrupts concentration, conversations, and peaceful moments. Learn about the different forms of cyber crime and how to protect yourself from it.

gregorycase
Download Presentation

MOBILE ABUSE

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. MOBILE ABUSE A Real Friend but ……. inconsiderate, annoying discourteous and stupid in public places

  2. Mobile Abuse • Like millions of others, you may be the victim of cell phone abuse. • What is cell phone abuse?

  3. Imagine ….. You are in a public place trying to concentrate on something or in serious discussion with your friend or enjoying a peaceful moment…… • A stranger 5 to 10 feet away starts talking on his cell phone

  4. Your concentration breaks or your conversation ends or your peaceful moment disturbs……. • Now you are a victim of cell phone abuse.

  5. Cell phone abuse results in • 1. Cyber crime • 2. Invasion of privacy • 3. Health hazards • 4. Social problems • 5.Psychological problems • 6. Financial loss

  6. Cyber crime • Includes traditional activities such as fraud,theft or forgery ,when ever a telecommunication system is involved

  7. Cyber • Cyber-, derived from the Greek word Kubernetes meaning Steersman , is used in the terms cybersex, cybernetics, cyberspace, cyberpunk, cyberhomes and cyberhate, but has been largely surpassed by e-

  8. It is used in the computer or electronic context to denote control of the thing represented by the word it precedes- CYBERCRIME

  9. The various forms of Cyber crime are 1.Internet auction fraud 2. Internet service provider fraud 3. Fraudulent web designing 4. Multilevel marketing fraud 5. Health care fraud 6. Mobile phone fraud

  10. Computer and Mobile network intrusion 1.Password Sniffer Programmes that monitors and record the name and password of network users as they log in 2. Spoofing One computer is electronically' looks like’ another computer to gain access

  11. 3. Cyber fraud Stock manipulation, fraudulent business opportunities, web auctions, credit card fraud 4. Cyber stalking Sending harassing or threatening e –mail or unwanted files and obscene messages or images

  12. Cyber stalkers usually target women and children who are inexperience in online activities. Stalkers generally lose interest if they don’t get the reactions they seek

  13. Cyber terrorism Use of computers or mobile phones or programmes in attack against others. It is a form of ‘Info war” Computer sabotage Use of internet to hinder the normal functioning of a computer through the introduction of worms, viruses logic bombs etc

  14. Mail Bombs Software that will instruct a computer to do almost anything so that it will send mails for the tracker Credit card fraud Hacking of credit card pin number to withdraw money Identity theft Theft of one’s identity for criminal use

  15. Phishing • Introduction of Malicious codes into links • Eg. Spoofed Bank web sites Pharming Programme that direct the user to another Mocked link

  16. How to escape • Stay anonymous- choose a genderless name 2. Never give name or full address to strangers 3. Don’t respond to harassing or negative messages 4. Avoid uncomfortable situation quickly

  17. 5. Watch what you say- don’t flirt online 6. Learn more about internet privacy 7. Don’t give email ID to strangers 8. Frequently change your password and answer to the ‘secret question’ 9. Don’t disclose your password to any one, not even to your friends 10. Don’t hesitate in filing a complaint with the police if there is any cyber fraud

  18. IT Act 2008 • Computer Related Offences • If any person, dishonestly, or fraudulently, does any act referred to in section 43, he shall be punishable with imprisonment for a term which may extend to two three years or with fine which may extend to five lakh rupees or with both.

  19. IT Act Section 66 A • Punishment for sending offensive messages through communication service, etc. • any electronic mail or electronic mail messagefor the purpose of causing annoyance or inconvenience or to deceive or to mislead the addressee or recipient about the origin of such messages.

  20. IT Act Section 66 E • Punishment for violation of privacy. • Whoever, intentionally or knowingly captures, publishes or transmits the image of a private area of any person without his or her consent, under circumstances violating the privacy of that person, shall be punished with  imprisonment which may extend to three years or with fine not exceeding two lakh rupees, or with both

  21. IT Act Section 67 • Punishment for publishing or transmitting obscene material in electronic form • Whoever publishes or transmits or causes to be published in the electronic form, any material which is lascivious or appeals to the prurient interest or if  its effect is such as to tend to deprave and corrupt persons.

  22. CELL PHONES • Perry Long invented First Cell phone in 1940. • The first fully automatic mobile phone system, called MTA (Mobile Telephone system A), was developed by Ericsson and commercially released in Sweden in 1956

  23. Mobile Phone The Global System for Mobile Communication (GSM) and the Code Division Multiple Access (CDMA) Systems are digital mobile phone services.

  24. The system consist of a Base station antenna which communicates with the mobile phones through Radio Frequency (RF) transmission.

  25. The mobile phone system is referred to as “cellular telephone system because the coverage area is divided into “cells “each of which has a base station antenna.

  26. Mobile phones use Electromagnetic radiation in the Microwave range around 2.5 GHz

  27. When we talk on mobile phones, the transmitter takes the sound and encodes on to a continuous “sine wave”. The sine wave radiates out from the antenna and fluctuates evenly through space.

  28. Electromagnetic spectrum

  29. Once the encoded sound has been placed on the sine wave, the transmitter sends the signal to the antenna which then sends the signal out.

  30. The encoded signals are made up of electromagnetic radiations. These waves are picked up by the receiver in the base station tower. The base station antenna emits radiations continuously to make a link with the subscribers.

  31. Mobile tower and base station

  32. Mobile Evolution

  33. GSM & CDMA Phones • GSM (Global System for Mobile communications: is the most popular standard for mobile phones in the world. • Code Division Multiple Access (CDMA) is a channel access method utilized by various radio communication technologies.

  34. CDMA –GSM Phones

  35. GPS Phone • A GPS navigation device is any device that receives Global Positioning System (GPS) signals for the purpose of determining the present location. These devices are used in military, aviation, marine and consumer product applications.

  36. GPS Phone

  37. Smart Phone • A smartphone is a mobile phone offering advanced capabilities, often with PC-like functionality. • a smartphone is simply a phone with advanced features like e-mail, Internet and e-book reader capabilities

  38. Smart Phones

  39. SIM • Subscriber Identification Module (SIM) • The SIM is a detachable smart card containing the user's subscription information and phone book.

  40. This allows the user to retain his or her information after switching handsets. • Alternatively, the user can also change operators while retaining the handset simply by changing the SIM.

  41. SIM • Securely stores the service subscriber key having 15 digits • First 3 digits – Mobile country code • Second 2 digits – Mobile network code • Third 10 digits – Mobile station identification number

  42. EV DO • EV-DO (Evolution-Data Optimized), often abbreviated as EV-DO or EV, is a telecommunications standard for the wireless transmission of data through radio signals, typically for broadband Internet access.

  43. Mobile Phone technology

  44. SIM CARD

  45. Mobile Phone Terminology • URL – Universal Resource Locator • iPod – intelligent Portable occular device • MPEG – Moving Picture Expert Group • MP3 – Moving Picture – 3( Audio layer 3) • Wi-Fi – Brand name of Wi-Fi Alliance-WLAN • Blue tooth – Open wireless protocol

  46. GPS – Global Positioning System • GPRS – General Packet Radio Service - Blackberry system VoIP Phone – Voice over Internet Protocol Most common type is Skype

  47. Symptoms of Mobile abuse • Inability to concentrate on what you are doing 2. Mild or severe irritability or annoyance 3. Sensitivity to stupid ring tones 4. Initially thinking that the cell phone user is actually talking to you

  48. 5. Wishing the user would finish the call 6. Wishing the user would leave the place 7. Wishing that the battery would die

  49. HEALTH HAZARDS Mobile phones uses electromagnetic radiation in the microwave range Part of the radio wave emitted by the mobile phone handset will be absorbed by the head The radiation from a standard GSM handset has a peak output power of 2watts

  50. Mobile Radiation

More Related