Wednesday, March 31, 2021

Our Bulletin Board is prepared by our Students


 

Parents Participation Goes On


 

CONFIDENCE SCALE SURVEY ABOUT CYBERBULLYING PREPARED BY NECATİ Ç.








 

All the Activities at the end of the March


 

A Webinar on Digital Citizenship with Nurseli Tamer


 

Last meeting with students


 

We disseminated Identity Theft brochures





 

our e-journal

http://www.flipgorilla.com/p/26675824929290906/show 





And our video is complete. Our students read the information they prepared about identity theft. We congratulate the team students who are working on identity theft.


Identity theft essay

 

Identity theft essay 

*(1) Although by no means a new phenomenon, identity related crimes have

been greatly facilitated with the advent of information and communications

technologies. (2)These have enabled a rich source of personal information to

be stolen or documentary evidence of identity to be fabricated.(3) These

problems has posed a challenge for businesses, governments and individuals.

(4)An identity-related crime is a compound concept referring to a range of

methods used to commit specific forms of deception and fraud. ( ) The digital

revolution brings with it the risk of suffering identity theft, or having personal

data, bank codes and photos stolen from people who want to use them to

commit other crimes or simply to spy on someone on social networks without

being discovered. (5)The crimes involved invariable entail fraud or obtaining a

financial advantage by deception – rather than crimes that proscribe the

misuse of personal information itself. (6)Traditionally, identity thieves were

usually charged with counterfeiting, obtaining unauthorized access to a

computer or opening a bank account in a false name, rather than making use of

another person’s name or other personal information without their permission.

(7)However, this has began to change in recent years as new and specific

offences of identity related crimes are being enacted in a range of countries.

(8)These include: identity crimes, identity theft, identity frauds, identity

fabrication, identity manipulation, lent identities and various other identity

related concepts.(9) Identity crime is used as a generic term to describe

activities/offences in which a perpetrator uses a fabricated identity; a

manipulated identity; or a stolen identity to facilitate the commission of a

crime.

*(10)Manipulation is used to describe the alteration of one’s own identity.

(11)Identity theft is used to describe the theft or assumption of a pre-existing

identity, with or without consent, and, whether, in the case of an individual,

the person is living or deceased. ( 12) Identity fabrication is used to the creation

of fictitious identity. (13) Identity fraud is used to describe gain of money,

goods, services, other benefits or the avoidance of obligations through the use

of a fabricated identity, a manipulated identity, or a stolen/assumed identity. (14) The vast majority of such crimes seek to extract money from victims

through acts of dishonesty, making them fall within the definition of fraud.

*(15) Many reforms have been devised to improve identification. (16)First of

all, cross-validation enables inconsistencies to be ascertained so that identity

related fraud could be minimised. (17 ) There are also other solutions to the

problem such as looking over the identity documents for authenticity to be

able to detect counterfeits or verifying the information on documents with the

issuing source. (18)Moreover, interviews, or biometrics could also be

considered alternative means of identification.

*(19) Identity theft and fraudidentifiers today include the use of fingerprints,

voice patterns, typing patterns, retinal images, facial or hand geometry, and

even the identification of a person’s subcutaneous vein structures or body

odours. (20)Although such systems achieve much higher levels of security than

those which rely upon passwords, they are expensive to introduce and raise

potential problems in terms of privacy and confidentiality of the personal data

stored on computer networks.(21) All in all, in any case, each of us should pay

close attention to how to protect ourselves individually from any attempt of

identity theft.

 

 

 

 

 

 

Last meeting with students







 

We distributed posters about cyberbullying at school


 

Last Meeting With Our Students 31.03


 

Esra Durmuş-Piraziz Vocational and Technical Anatolian High School 1

Our project is on our school website 

http://pirazizmtal.meb.k12.tr/meb_iys_dosyalar/28/09/767565/dosyalar/2021_03/31120453_Internet_Safety_is_as_Simple_As_ABC.pdf?CHK=d96ca0dae0baa535c5adca37ac72aa75

 Esra Durmuş-Piraziz Vocational and Technical Anatolian High School 1

Our School Board



 Esra Durmuş-Piraziz Vocational and Technical Anatolian High School 1

Our Webinar with Nurseli TAMER







  Esra Durmuş-Piraziz Vocational and Technical Anatolian High School 1

  We distributed the brochures of Cyberbullying Team






 Esra Durmuş-Piraziz Vocational and Technical Anatolian High School 1

We distributed the brochures of Identity Theft Team



Monday, March 29, 2021

       Esra Durmuş -Piraziz Vocational and Technical  Anatolian High School 1

          Telling our verses for the acrostic poem.

https://www.youtube.com/watch?v=qJ5DEhyR3Xc

    

     Esra Durmuş -Piraziz Vocational and Technical  Anatolian High School 1

         Creating an e-book with all the logos and posters of the project

https://read.bookcreator.com/f9Btxwxg9HMnCClOc4zzeSGILj32/3vKikvbrTK-l1EsaIPHmsw