With our project, we aim to ensure that young people use technology in a responsible, respectful, critical and creative manner, and to create a safe and better internet use. Also, in order to encourage everyone to do their part in creating a better internet; We aim to reach young people, parents and teachers. With our project; To help young people build a better internet by treating other people with kindness and respect, protecting their own and others' reputations, seeking positive opportunity
Wednesday, March 31, 2021
And our video is complete. Our students read the information they prepared about identity theft. We congratulate the team students who are working on identity theft.
Identity theft essay
*(1) Although by no means a new phenomenon, identity related crimes have
been greatly facilitated with the advent of information and communications
technologies. (2)These have enabled a rich source of personal information to
be stolen or documentary evidence of identity to be fabricated.(3) These
problems has posed a challenge for businesses, governments and individuals.
(4)An identity-related crime is a compound concept referring to a range of
methods used to commit specific forms of deception and fraud. ( ) The digital
revolution brings with it the risk of suffering identity theft, or having personal
data, bank codes and photos stolen from people who want to use them to
commit other crimes or simply to spy on someone on social networks without
being discovered. (5)The crimes involved invariable entail fraud or obtaining a
financial advantage by deception – rather than crimes that proscribe the
misuse of personal information itself. (6)Traditionally, identity thieves were
usually charged with counterfeiting, obtaining unauthorized access to a
computer or opening a bank account in a false name, rather than making use of
another person’s name or other personal information without their permission.
(7)However, this has began to change in recent years as new and specific
offences of identity related crimes are being enacted in a range of countries.
(8)These include: identity crimes, identity theft, identity frauds, identity
fabrication, identity manipulation, lent identities and various other identity
related concepts.(9) Identity crime is used as a generic term to describe
activities/offences in which a perpetrator uses a fabricated identity; a
manipulated identity; or a stolen identity to facilitate the commission of a
crime.
*(10)Manipulation is used to describe the alteration of one’s own identity.
(11)Identity theft is used to describe the theft or assumption of a pre-existing
identity, with or without consent, and, whether, in the case of an individual,
the person is living or deceased. ( 12) Identity fabrication is used to the creation
of fictitious identity. (13) Identity fraud is used to describe gain of money,
goods, services, other benefits or the avoidance of obligations through the use
of a fabricated identity, a manipulated identity, or a stolen/assumed identity. (14) The vast majority of such crimes seek to extract money from victims
through acts of dishonesty, making them fall within the definition of fraud.
*(15) Many reforms have been devised to improve identification. (16)First of
all, cross-validation enables inconsistencies to be ascertained so that identity
related fraud could be minimised. (17 ) There are also other solutions to the
problem such as looking over the identity documents for authenticity to be
able to detect counterfeits or verifying the information on documents with the
issuing source. (18)Moreover, interviews, or biometrics could also be
considered alternative means of identification.
*(19) Identity theft and fraudidentifiers today include the use of fingerprints,
voice patterns, typing patterns, retinal images, facial or hand geometry, and
even the identification of a person’s subcutaneous vein structures or body
odours. (20)Although such systems achieve much higher levels of security than
those which rely upon passwords, they are expensive to introduce and raise
potential problems in terms of privacy and confidentiality of the personal data
stored on computer networks.(21) All in all, in any case, each of us should pay
close attention to how to protect ourselves individually from any attempt of
identity theft.
Tuesday, March 30, 2021
Monday, March 29, 2021
Esra Durmuş -Piraziz Vocational and Technical Anatolian High School 1
Telling our verses for the acrostic poem.
https://www.youtube.com/watch?v=qJ5DEhyR3Xc
Esra Durmuş -Piraziz Vocational and Technical Anatolian High School 1
Creating an e-book with all the logos and posters of the project
https://read.bookcreator.com/f9Btxwxg9HMnCClOc4zzeSGILj32/3vKikvbrTK-l1EsaIPHmsw
Saturday, March 27, 2021
brochure about identity theft
Emine prepared a brochure about identity theft and how to take precautions. You can distribute brochures to inform them.
Nurseli Tamer, an expert trainer about Digital Citizenship, was the guest of our project this week. Tamer shared very good information about the subject to teachers and students.
"EVERYONE SHOULD LEARN DIGITAL CITIZENSHIP"
"THE INTERNET DOES NOT KEEP A SECRET"WE MEET WITH DAYEN NURSELİ TAMER THIS EVENING AT 18:00 (CET).
Friday, March 26, 2021
Thursday, March 25, 2021
Wednesday, March 24, 2021
Monday, March 22, 2021
Friday, March 19, 2021
-
Our Partner from Serbia, Informatıon Technologhy High School Teachers and Students gave us an enjoyable and informative webinar about Intern...