The Internet
What is the Internet?
Computers connected together are called a network; networks allow computers to share information. The internet is a global network of computers with the ability to connect to any other computers for the exchange of information. Millions of people worldwide have access to the internet and all the services it provides.
The internet was developed in the United States of America by the US Military, even though developed by the US Military the internet is not controlled or owned by any one group. Everyone who uses the internet is responsible for their own actions and safety. The internet is author-driven, meaning information on the internet is created by those groups who that information is of interest to. |
http://www.remotecommunications.com/
|
What do we use it for?
|
|
How does it work?
The internet is known as a client-server system. Your computer is the client; the remote computer that stores electronic files is the server.
Internet ServicesThe World Wide Web (WWW) Most users confuse the Internet with the World Wide Web (WWW). Even though the Internet was developed in the 1970s, the World Wide Web did not exist until the early 1990s, when Hypertext Mark-up Language (HTML) and the Hypertext Transfer Protocol (HTTP) were developed, allowing HTML or “web pages" to be displayed by any type of computer with a web browser program installed and the HTTP protocol enabled.
The Internet relies on a number of protocols in order to function properly. A protocol is simply a standard for enabling the connection, communication, and data transfer between two places on a network. The Internet is a collection of interconnected computer networks. The World Wide Web is the set of protocols (HTTP, HTML, etc) that allow anyone with a computer, an Internet connection and web browser software to view web sites presenting text, graphics, audio and video. This linking of HTML documents on computers all over the internet, each containing pointers (hyperlinks) to other HTML documents on other computers is where the term "web" came from. A hypertext link or hyperlink can be text or a picture on a Web page. When a link is a piece of text, it's usually underlined and shown in a different colour. Intranet ServicesAn intranet is an internal network often used in a secured business environment, which uses protocols like the Internet, but operates on a LAN (local area network). If the LAN provides access to the Internet, the intranet resides behind a firewall, with no gateway to, or from the Internet.
An intranet can be as basic or comprehensive as need dictates. Following are some general examples of information or processes that might be available on an intranet to serve various departments. Examples of Intranet uses: Large Organisation: Will use an intranet for storing company policies, staff information, staff contact details, staff resources and any other documents or information that is important to the operation of the organisation. |
http://ipt2009.wikidot.com/the-client-server-model
|
How does WWW work?
|
Exercise
Download and print the file below and complete the exercise.
internet_exercise_1.pdf | |
File Size: | 164 kb |
File Type: |
Internet Protocols
TCP/IP (Transmission Control Protocol/Internet Protocol) is the dominant language or protocol for computers to 'speak' to one another.
This information is packaged into small pieces of data called 'packets' and is then sent to the client computer or user.
This information is packaged into small pieces of data called 'packets' and is then sent to the client computer or user.
IP and DNS Addresses
The IP Address is a number which identifies the location of a web surfer on the Internet. In theory this is a unique number which can be used to identify separate visitors.
The DNS Address is a Domain Name System for computers, services, or any resource connected to the internet or a private network . An often-used analogy to explain the Domain Name System is that it serves as the 'phonebook' for the Internet by translating human-friendly computer host names into IP addresses.
The DNS Address is a Domain Name System for computers, services, or any resource connected to the internet or a private network . An often-used analogy to explain the Domain Name System is that it serves as the 'phonebook' for the Internet by translating human-friendly computer host names into IP addresses.
The URL (web address)
Every web site has its own “address” on the Internet. The address is known as a Uniform Resource Locator or URL. If you don’t know the URL (or web address) of the web site you want to visit, or you don’t even know what web sites might contain the information you are looking for, you need to use a search engine instead e.g. Google or Yahoo.
Search engines index millions of pages on the World Wide Web and search the indexes to find pages that match the keywords you type into the search box. (Search engines explained further down page)
Websites with https:// usually represents a website that is secure.
Search engines index millions of pages on the World Wide Web and search the indexes to find pages that match the keywords you type into the search box. (Search engines explained further down page)
Websites with https:// usually represents a website that is secure.
Just some of the categories of domains:
|
|
Exercise
Download and print the file below and complete the exercise.
internet_exercise_2.pdf | |
File Size: | 167 kb |
File Type: |
Plug-ins
Plug-ins are software modules that add to the functionality of an application. Many applications use plug-ins, including Photoshop, and web browsers such as Firefox and Internet Explorer.
Plug-ins can have many different functions. Web browsers typically use plug-ins to expand the range of formats they can display (e.g., Acrobat documents, QuickTime or Adobe Flash content). When the web browser encounters a format it doesn't support, it looks for a plug-in that does. A plug-in can launch its own viewer, appear within a browser window, appear in an embedded frame (within a window that may also contain HTML), or run in the background. Plug-ins work in similar ways with other kinds of programs.
How you install a plug-in depends on both the parent application and the plug-in itself. In many cases the Plug in will install automatically.
The advantages of installing plug-ins is to allow other applications to run in conjunction with your web browse. Letting you view files, videos or other animations.
Plug-ins can have many different functions. Web browsers typically use plug-ins to expand the range of formats they can display (e.g., Acrobat documents, QuickTime or Adobe Flash content). When the web browser encounters a format it doesn't support, it looks for a plug-in that does. A plug-in can launch its own viewer, appear within a browser window, appear in an embedded frame (within a window that may also contain HTML), or run in the background. Plug-ins work in similar ways with other kinds of programs.
How you install a plug-in depends on both the parent application and the plug-in itself. In many cases the Plug in will install automatically.
The advantages of installing plug-ins is to allow other applications to run in conjunction with your web browse. Letting you view files, videos or other animations.
What is Broadband?
Broadband is often called "high-speed" access to the Internet. Any connection to the customer of 256 kbit/s (0.25 Mbit/s) or greater is concisely considered broadband Internet access. A broadband connection is continuous. It can only be affected if you have multiple adapters on your phone line or if your modem becomes disconnected.
Connecting with Broadband To connect to the Internet with a dialup service you need:
|
Diagramhttp://webs.calumet.purdue.edu/wireless/about/
|
Exercise
Download and print the file below and complete the exercise.
internet_exercise_3.pdf | |
File Size: | 182 kb |
File Type: |
Threats on the internet
Threats on the internet is one of the largest growing issues when dealing with the internet. Due to the ability of computers to link to one another via the internet this allows for users to develop intrusive and damaging programs known as viruses, worms, Trojans, spyware and malware.
Viruses
A virus is a piece of code that attaches itself to a program or file so it can spread from computer to computer. They can also try to damage your software, your hardware, and your files.
Just as human viruses range in severity from Ebola to the 24-hour flu, computer viruses range from the mildly bothersome to the downright destructive. The good news is that someone has to share the file or send an e-mail in order to continue the infection.
Just as human viruses range in severity from Ebola to the 24-hour flu, computer viruses range from the mildly bothersome to the downright destructive. The good news is that someone has to share the file or send an e-mail in order to continue the infection.
Worms
Worms replicate themselves but don't attach to other programs as viruses do. The most common form is called a mass mailing worm, which uses email attachments to spread from one computer to another. When the user opens an attachment it scans your computer for email addresses and then emails itself to the addresses. This is one of the reasons why you only open emails and attachments from known sources.
Trojans
Trojans inherit their name from the Trojan horse of Greek mythology in which the Greek army left a wooden horse as a gift to the Trojans, hiding troops inside the horse as it was taken to Troy. The Greeks jumped out and captured the city, ending the long siege. Like the namesake, a Trojan horse program often appears to do something useful, or entertaining, but when the program is run it may destroy files or create a "back door" entry point that enables the intruder to access your system.
View the video below for a visual animation of what virus, worms and Trojans can do.
|
Note: There is no sound for this video
|
Adware, spyware and key loggers
There are many sites advertising free software all over the Internet. A large number of these "free" programs are known as "adware". They contain hidden software that transmits user information via the Internet to advertisers in exchange for the free use of the software.
Most Ad bots or spyware programs DON'T collect specific information about you, but only report general demographics, and therefore are NOT stealing your name, credit card, or other personal information.
In its most dangerous form, spyware may install a "key logger" onto your computer. The key logger is hidden on your system and records everything you type on the keyboard. With a key logger active on your system, your security and privacy are severely compromised because it is recording your user name and passwords.
Getting rid of Adware and Spyware from your computer:
Adware and spyware can be found and removed by installing and running software such as Adware, SpyBot S&D (search & destroy), Spy on This, Pest Patrol, Microsoft Defender and Spy Sweeper. The Microsoft software is free to Windows 2000 and XP users (it won't install on Windows 98 or ME)) and the Adware SE, Spybot S& D and Spy have free versions. The paid versions are better, but the free versions will find most pests. To find anti adware and spyware software simply Google search Adware & Spyware removal.
Most Ad bots or spyware programs DON'T collect specific information about you, but only report general demographics, and therefore are NOT stealing your name, credit card, or other personal information.
In its most dangerous form, spyware may install a "key logger" onto your computer. The key logger is hidden on your system and records everything you type on the keyboard. With a key logger active on your system, your security and privacy are severely compromised because it is recording your user name and passwords.
Getting rid of Adware and Spyware from your computer:
Adware and spyware can be found and removed by installing and running software such as Adware, SpyBot S&D (search & destroy), Spy on This, Pest Patrol, Microsoft Defender and Spy Sweeper. The Microsoft software is free to Windows 2000 and XP users (it won't install on Windows 98 or ME)) and the Adware SE, Spybot S& D and Spy have free versions. The paid versions are better, but the free versions will find most pests. To find anti adware and spyware software simply Google search Adware & Spyware removal.
Spam
Many spam emails contain Web bugs; these are invisible graphics containing tracking code designed for the same purposes as spyware. Additionally the amount of spam and the frustration of having to deal with it may lead users to behave with less than usual suspicion, and for that reason it can be used to deliver a virus, spyware or phishing scams.
To manage spam: Don't open spam email, or email from people you do not know.
Get a free web-based email address from sites like Mail.com, Yahoo or Lycos mail, Gmail, and use it when you sign up for Web sites or fill in forms online. Make sure when you sign up for free email, that you don’t agree to have your address shared with other parties.
To manage spam: Don't open spam email, or email from people you do not know.
Get a free web-based email address from sites like Mail.com, Yahoo or Lycos mail, Gmail, and use it when you sign up for Web sites or fill in forms online. Make sure when you sign up for free email, that you don’t agree to have your address shared with other parties.
Phishing
Phishers attempt to steal bank account and credit card numbers, PINs and site passwords by asking you to click a link in an email. The email looks genuine with official looking logos and content. The message is something like "we have a security problem", or "we are upgrading our software" and asks you to go to the site and “enter your account details for checking, otherwise you may lose the ability to log-in to your Internet banking service”.
The site a phishing email link will take you to is not the real thing, even though it will look real enough. Any details you provide may be used to access your bank or credit card account.
Your bank will never ask you to enter details such as passwords or PIN numbers in an email or on a web page, over the Internet, or over the phone. If they have a problem they will contact you and ask you to come to the bank in person.
To avoid phishing scams:
The site a phishing email link will take you to is not the real thing, even though it will look real enough. Any details you provide may be used to access your bank or credit card account.
Your bank will never ask you to enter details such as passwords or PIN numbers in an email or on a web page, over the Internet, or over the phone. If they have a problem they will contact you and ask you to come to the bank in person.
To avoid phishing scams:
- Never click on links in email you receive from an unknown source.
- Never click on links from a known source seeking financial or sensitive information.
- Never use the telephone number that might be included in the email message – this could be a scam too! If you have any doubt whatsoever about an email apparently from your bank or other financial institution, phone someone at the bank to check.
Exercise
Download and print the file below and complete the exercise.
internet_exercise_4.pdf | |
File Size: | 165 kb |
File Type: |
Security on the internet
Preventing the Nasties
Although they are all different, viruses, worms and Trojans are often grouped together under the name virus. An antivirus program scans for all of these.
The main thing to insure is that your computer is protected. If you choose a free anti-virus program this is better then none at all, however paid anti-virus software is more effective. Anti-virus is usually purchased on a yearly basis, this means you need to pay to re-new your anti virus subscriptions yearly. Many paid anti virus software companies offer a free version also, some examples are:
Avira Anti Virus
Avarst Anti Virus
AVG Anti Virus
Kaspersky Internet Security
There are several steps you can take to protect your computer:
Set your antivirus program to "auto update", then it will check for updates when you go online. There are usually updates available every day.
Schedule your antivirus program to scan your system at least weekly.
Use a non Microsoft email program. Many viruses and worms are written specifically to exploit loopholes in Outlook Express and Microsoft Outlook. Alternatives include Thunderbird (www.mozilla.org) and Eudora (www.eudora.com).
Switch off the preview pane that allows you to view email beneath or beside the list of received email. Some malicious scripts can run when you preview the email and infect your system before you can do anything. To switch off the Preview Pane in Outlook Express, click View Menu > Layout, remove the tick beside Preview Pane and click OK.
Treat attachments with caution; never open an email attachment from someone you don't know, and even if you do know the sender, if you weren’t expecting it, contact the sender to verify that they sent it.
Don't open attachments directly from your email program; save it to your desktop or a specific folder where you can right click on the attachment file and select "scan for viruses" before opening it.
Scan floppy disks, CDS, memory cards and USB keys if you are transferring files from one computer to another. Even CDs can contain viruses.
The main thing to insure is that your computer is protected. If you choose a free anti-virus program this is better then none at all, however paid anti-virus software is more effective. Anti-virus is usually purchased on a yearly basis, this means you need to pay to re-new your anti virus subscriptions yearly. Many paid anti virus software companies offer a free version also, some examples are:
Avira Anti Virus
Avarst Anti Virus
AVG Anti Virus
Kaspersky Internet Security
There are several steps you can take to protect your computer:
Set your antivirus program to "auto update", then it will check for updates when you go online. There are usually updates available every day.
Schedule your antivirus program to scan your system at least weekly.
Use a non Microsoft email program. Many viruses and worms are written specifically to exploit loopholes in Outlook Express and Microsoft Outlook. Alternatives include Thunderbird (www.mozilla.org) and Eudora (www.eudora.com).
Switch off the preview pane that allows you to view email beneath or beside the list of received email. Some malicious scripts can run when you preview the email and infect your system before you can do anything. To switch off the Preview Pane in Outlook Express, click View Menu > Layout, remove the tick beside Preview Pane and click OK.
Treat attachments with caution; never open an email attachment from someone you don't know, and even if you do know the sender, if you weren’t expecting it, contact the sender to verify that they sent it.
Don't open attachments directly from your email program; save it to your desktop or a specific folder where you can right click on the attachment file and select "scan for viruses" before opening it.
Scan floppy disks, CDS, memory cards and USB keys if you are transferring files from one computer to another. Even CDs can contain viruses.
AntiVirus
Antivirus software is a computer program that detects, prevents, and takes action to disarm or remove malicious software programs, such as viruses and worms. You can help protect your computer against viruses by using antivirus software, such as: Nortons, McAfee, Sophos, Avarst and many more.
View the below video of how an antivirus program works
View the below video of how an antivirus program works
Firewalls
A firewall is an essential computer program to protect you whenever you’re connected to the Internet. It checks incoming and outgoing communications between your computer and the Internet and prevents any unauthorised activity by spyware and key loggers.
© Cisco's Jimmy Ray Purser
Firewall software/hardware does not replace the need for good computer security. Security is about prevention and detection of a variety of threats, something that will not be achieved by one product.
Exercise
Download and print the file below and complete the exercise.
internet_exercise_5.pdf | |
File Size: | 169 kb |
File Type: |
The Impact of The Internet Use In Organisations
Using the internet within organisations provides many benefits to the organisation itself, its employees and its customers. However there are also pitfalls and limitations that must be considered when using the internet in an organisation.
Advantages of using the Internet
- Through the use of the internet businesses and organisations are able to quickly access information that in the past would have required written letters or phone calls, that would take a greater period of time to gain the information.
- Many businesses have high speed broadband connections, this allows for fast download and upload of data e.g. video, audio, graphic and text. The ability to download and upload data for transferring information greatly reduces the costs of postage and printing.
- The Internet is also becoming a marketplace for both selling goods and keeping in touch with customers or potential customers.
Company Websites
Many businesses use a website to promote their services or products. Websites have transformed into an interactive online marketplace. Some businesses allow their users to view online catalogues, purchase goods online (E-commerce), contact the company, download information and more.
E-Commerce
E-commerce in is online shopping. A company's website is to allow customers to purchase and order products and services online to be delivered to their house to business. This addition to a physical store can increase a companies customer base substantially . Some businesses operate solely on the internet for example:
www.fishpond.co.nz - Online Bookstore
www.thenappystore.co.nz - Online seller of discounted baby goods
With the reliability, reputation and security of online shopping increasing, numbers of individuals and organisations are enjoying the benefits of shopping online. These benefits include the ability to buy products without venturing out of the house; access to products in other locations - nationally and internationally; the ability to compare brands and prices without driving between shops; and convenience of having products delivered straight to your door.
www.fishpond.co.nz - Online Bookstore
www.thenappystore.co.nz - Online seller of discounted baby goods
With the reliability, reputation and security of online shopping increasing, numbers of individuals and organisations are enjoying the benefits of shopping online. These benefits include the ability to buy products without venturing out of the house; access to products in other locations - nationally and internationally; the ability to compare brands and prices without driving between shops; and convenience of having products delivered straight to your door.
24-hour Access
A key advantage of the internet is the ability to access information 24 hours of the day, 7 days a week. This is beneficial to both customers and organisations, allowing customers to shop and seek advice or service and allowing organisations to gain information at any point in time regardless of working hours.
Use of Multimedia
The use of multimedia via the internet combines the advantages of previous types of communication (written, phone calls, fax, television, radio etc). Multimedia allows organisations to target multiple senses through the use of text, graphics, animation sound and video.
Advantages of multimedia via the internet
Advantages of multimedia via the internet
- Potential audience: The potential audience consists of every user on the internet, through their computer or mobile device.
- Access: It is accessible 24 hours a day, 7 days a week.
- Cost: The actual cost is low compared to other forms of marketing and advertising.
Working offsiteEmployees are able to work from home and in certain industries in areas that were originally impossible to communicate with. For example a Department of Conservation (DOC) researcher is able to take samples in the field and send the results back to the main office via the internet. Previously there would have been delays due to travelling back to the office for the data to be analysed .
|
John Gollan © Australian Museum
|
Collaborative workIn the past the only way to work collaboratively would be to meet in a group setting. Email means that documents, spreadsheets and other information can be quickly and easily shared. Video conferencing, instant messaging and other internet tools allows people to communicate with other people anywhere in the world, at any time, and with very low cost. Businesses are able to use video conferencing or web based alternatives like Skype to communicate with clients and video conferencing is also becoming widely used for job interviews.
|
http://www.treehugger.com
|
Exercise
Download and print the file below and complete the exercise.
internet_exercise_6.pdf | |
File Size: | 166 kb |
File Type: |
Limitations of the Internet
Security
Because the internet is an international public domain, the businesses major concern is around the security of their information. When organisations choose to send information via the internet there is always a risk that the information will be intercepted and used by someone other than the internet user. The term 'hackers' and 'crackers' refers to people who attempt to intercept or break into others information or computer systems over the internet.
Modern security measures are available to reduce the risk of security breaches. Encryption is a way to code information so that it cannot be understood if it mistakenly or purposely enters the possession of anyone who it is not intended for. Sensitive information such as customer details, financial information, credit card details etc can be encoded for electronic transfer.
Modern security measures are available to reduce the risk of security breaches. Encryption is a way to code information so that it cannot be understood if it mistakenly or purposely enters the possession of anyone who it is not intended for. Sensitive information such as customer details, financial information, credit card details etc can be encoded for electronic transfer.
Reliability and validity of information on the Internet
With the Internet being an open ground for any individual or organisation to publish information, this can lead to questions of validity, accuracy, reliability of the information. It is very easy for anyone to publish information that is one sided, or incorrect.
Identifying authoritative sources
One of the difficulties facing anyone using the internet is can the information be counted on to be valid, accurate and reliable.
Remember that the internet is author driven, this means that anyone with enough computer knowledge can access the internet and upload information onto it.
Ways to determine Reliability and Validity
Check the url, if it contains GOVT or EDU in the domain then it is more likely to be reliable and valid
Check the website for the date it was last update usually at the bottom on the webpage
Check the contact us page more reliable pages will allow communication with the author
Identifying authoritative sources
One of the difficulties facing anyone using the internet is can the information be counted on to be valid, accurate and reliable.
Remember that the internet is author driven, this means that anyone with enough computer knowledge can access the internet and upload information onto it.
Ways to determine Reliability and Validity
Check the url, if it contains GOVT or EDU in the domain then it is more likely to be reliable and valid
Check the website for the date it was last update usually at the bottom on the webpage
Check the contact us page more reliable pages will allow communication with the author
Staff time spent on the Internet
The internet can be a great time saver for organisations, but can also be an enticing time waster for employees. Due to the huge range of services available on the internet, this can quickly reduce the productivity of the employees. Organisations have an internet policy that will either limit websites that can be viewed or limit the time that employees can surf the web. Sites like Facebook, TradeMe, Amazon and many more are popular sites that draw employees attention away from their work. All employees should be made aware of the internet policy of the organisation.
Many medium and large organisations use software programs that monitor their employees' use of the internet, including how much time is spent, how much information is downloaded and what sites are visited. Another option for organisations are safety filters that screen incoming and outgoing traffic, preventing access to sites that are potentially harmful or irrelevant to the organisations needs.
With email becoming an essential communication tool, the issues of employees receiving hundreds of emails a day arise. This overload of communication can influence the productivity of an employee.
Many medium and large organisations use software programs that monitor their employees' use of the internet, including how much time is spent, how much information is downloaded and what sites are visited. Another option for organisations are safety filters that screen incoming and outgoing traffic, preventing access to sites that are potentially harmful or irrelevant to the organisations needs.
With email becoming an essential communication tool, the issues of employees receiving hundreds of emails a day arise. This overload of communication can influence the productivity of an employee.
Personal Use
When an organisation offers the internet as a resource to employees, then the issue of personal use arises. It is estimated that 30% to 40% of all employees use the internet for non work related tasks. The implication of this for the organisation is a major downfall in productivity. Personal use on the internet can lead to serious implications for an organisation. The use of non work related applications can have a detrimental effect on an organisation, to access data, corrupt data & systems. Organisations should have securities in place to reduce the amount of personal internet usage occurring within an organisation.
Personal Safety
Personal safety is another important issue with the use of internet in an organisation. This can be the case with peer-to-peer networking; this system allows colleagues to share information from multiple computers. This can however result in unintentional sharing of personal files, for example financial records, sensitive documents or personal data. This can lead to fraud and even identity theft. Organisations can reduce this possibility by restricting access to P2P systems and other file sharing applications. Providing internet safety education to staff members would also be an effective way to reduce the negative effects of the internet.
Personal Safety
Personal safety is another important issue with the use of internet in an organisation. This can be the case with peer-to-peer networking; this system allows colleagues to share information from multiple computers. This can however result in unintentional sharing of personal files, for example financial records, sensitive documents or personal data. This can lead to fraud and even identity theft. Organisations can reduce this possibility by restricting access to P2P systems and other file sharing applications. Providing internet safety education to staff members would also be an effective way to reduce the negative effects of the internet.
Exercise
Download and print the file below and complete the exercise.
internet_exercise_7.pdf | |
File Size: | 167 kb |
File Type: |
Legal, Ethical and Organisational Issues
Organisations should make sure that the information of employees and customers is handled with care and integrity. All organisations are subject to a number of New Zealand laws that govern what they can and cannot do with the information they hold.
Most organisations will have procedures in place around the usage of the internet and it is essential that all staff are aware of the policies and the rationale behind the policies.
Most organisations will have procedures in place around the usage of the internet and it is essential that all staff are aware of the policies and the rationale behind the policies.
Legal Issues
Any information that is published or sent online carries the same laws as printed information. It is this reason organisations must carefully consider the implications of making information available over the internet. The five laws below are the most relevant laws to organisations publishing any information on the internet.
- Unsolicited Electronic Messages Act 2007
- Copyright Act 1994
- Official Information Act 1982
- Privacy Act 1993
- Protected Disclosure Act 2000
Unsolicited Electronic Message Act 2007
The Unsolicited Electronic Message Act is to prohibit organisations sending spam from or within New Zealand.
What is spam?
In legal terms spam is 'unsolicited commercial electronic messages'. The following criteria defines a message is spam.
|
http://www.aplus.net/blog/online
_business_report_email_spam_down_70_percent.html |
Steps for ensuring compliance with the Unsolicited Electronic Messages Act
Make sure you have consent to send the messages
Consent can be explicitly given, for example this could come in the form of a tick box on a website that gives permission to receiving information about products and services.
Consent can be inferred, for example is purchasing software, it is reasonable to infer that you would want to hear about updates or issues with the software.
Consent can be deemed to be given, for example if you publish contact details it is deemed that you are willing to accept information.
Clearly Identify Yourself
Organisations need to ensure that they clearly identify themselves, this can be with your official logo and organisation name.
Consent can be explicitly given, for example this could come in the form of a tick box on a website that gives permission to receiving information about products and services.
Consent can be inferred, for example is purchasing software, it is reasonable to infer that you would want to hear about updates or issues with the software.
Consent can be deemed to be given, for example if you publish contact details it is deemed that you are willing to accept information.
Clearly Identify Yourself
Organisations need to ensure that they clearly identify themselves, this can be with your official logo and organisation name.
Include an unsubscribe facility
The potential message recipient must be given the option to unsubscribe to the electronic messages. This means that they can cancel the messages from being sent to them. For further information on the Unsolicited Messages Act 2007, visit this website: Unsolicited Messages Act 2007 |
Copyright Act 1994
The Copyright Act 1994 set out the rights and restrictions around the copying of information in New Zealand. Copyright literally means 'the right to copy', any original work which is created, published or performed is subject to copyright. The creator, be it an organisation or an individual, has exclusive rights to reproduce, scan, record, download and or store, publish, distribute, perform and adapt their work. In most cases the creator of the work is the owner and copyright holder, the exceptions to this are:
In the example of computer software, producers often apply Copyright Notices or Licences that limits the use of the software to one computer and prevents the copy of the software. For example Microsoft Office 2010 has end user licences limiting the number of computers it can be installed on. The consequences of breaking Copyright law can be severe - up to 5 years in jail or a fine of $150,000. In the event of breach of Copyright, managing directors or business owners can be held responsible. More information can be found on this website: Copyright Act 1994 |
Official Information Act 1982
The Official Information Act governs the disclosure of official information to the public, including individuals and organisations. This does not include the disclosure of information between governmental agencies or departments.
Official information refers to information held by:
More information can be found on this website: Official Information Act 1982
Official information refers to information held by:
- Ministers of the Crown
- Central government departments/organisations and state owned enterprises
- The Police
- City, district or regional councils
- School board of trusties, universities or polytechnics
- Public health authorities
- Certain official information
- The reasons for decisions affecting them
- The internal rules of an organisation (eg policies, principles, rules, or guidelines) which affect decisions made by them
More information can be found on this website: Official Information Act 1982
Privacy Act 1993
The Privacy Act identifies the framework that establishes when and why information about businesses and individuals can be collected and released.
The Act consists of privacy principles that deal with the following:
Further information can be found on this website: Information Privacy Principles
The Act consists of privacy principles that deal with the following:
- How to collect the information.
- What the information may be used for.
- When you are allowed to disclose (ie let others have access to) the information.
- How you store information and the procedures you need to have it secured.
- How long you can keep the information.
- The need to keep the information complete, up-to-date and accurate before you use it.
- Correcting the information if it is wrong.
- Allowing the person whose information you have to access the information.
Further information can be found on this website: Information Privacy Principles
Protected Disclosures Act 2000
The Protected Disclosure Act was created to promote trust and protection within organisations. This prevents an employee from being dismissed or punished for disclosing serious wrongdoing within or by the organisation. Issues that arise in an organisation must first be dealt with in the organisation. If matters cannot be resolved then external mediators will be called in to help.
More information can be found at this website: Protected Disclosure Act 2000
More information can be found at this website: Protected Disclosure Act 2000
Exercise
Download and print the file below and complete the exercise.
internet_exercise_8.pdf | |
File Size: | 168 kb |
File Type: |
Using the Internet to Access Information
Search Engines
If you don't know a web address or unable to guess it you can use a search engine to find a webpage. A search engine can be used to search for a topic or keywords. A search engine is a website that is designed to search for other web pages. By entering in the right keywords to search for, you can find information on just about everything.
Search engines can be country specific or international. They way to identify these is simple.
National Search Engines, will often have the company type and country its hosted as shown to the right: .co.nz
International Search Engines, will often appear with .com at the end of the URL
There are many different search engine websites available. Here are some examples:
Search engines can be country specific or international. They way to identify these is simple.
National Search Engines, will often have the company type and country its hosted as shown to the right: .co.nz
International Search Engines, will often appear with .com at the end of the URL
There are many different search engine websites available. Here are some examples:
Search Engine
Yahoo Bing Search New Zealand |
Click on the Web address's above to go to the search engine website.
Google is one of the most popular search engines in New Zealand and around the world. The term google has become so widely used it is now recognised in everyday language to mean "search the internet". The image below left is a screenshot of what Google's homepage looks like. The search returns a list of links to web pages that relate to your search topic, ordered from most relevant to least relevant. The main page also includes links that allow the user to search for images, group discussions, and news stories or to perform an advanced search. Click on the Play button to watch the video on search tricks and tips. |
Google Image Search
The google image search tool is the fastest way to search for images of any sort, you can then save them to your computer, use as a computer desktop background and more. Watch the video on how to use google image search.
|
casttv
|
Advanced Google Search
Advanced searching allows you to get the most relevant results from your search, by adding in more criteria to your search this removes web page results that do not contain all variables you are wanting. Watch the video on advanced searches.
|
mrploughodyssey
|
Meta Search Engines
A meta-search engine is a search tool that sends user requests to several other search engines and/or databases and aggregates the results into a single list or displays them according to their source. Metasearch engines enable users to enter search criteria once and access several search engines simultaneously. Metasearch engines operate on the premise that the Web is too large for any one search engine to index it all and that more comprehensive search results can be obtained by combining the results from several search engines. This also may save the user from having to use multiple search engines separately.
Collating and presenting information from a search
Collation of information is the way you put information you have gained from a search together. This can be essential when it comes time to present the information. Collation means to sort information in a logical and legible format. When it is time to present your information there are a wide variety of different formats in which you can present information from the internet:
- Printed in hard copy
- Hyperlinked into an Email
Saving a Webpage
Saving webpages is the same as saving documents and photos.
- Open your webpage in Internet Explorer
- Click on File
- Click Save As
- Select where you wish to save the webpage
- Click Save
Print preview and printing pages
Click on File on your menu bar
Click on Print Preview (you will be given a preview of the web page)
If there is information that is missing in the preview view you will need to adjust the margins of the page.
Click on Page Setup and adjust the margins.
Click on Print Preview (you will be given a preview of the web page)
If there is information that is missing in the preview view you will need to adjust the margins of the page.
Click on Page Setup and adjust the margins.
Exercise
Download and print the file below and complete the exercise.
internet_exercise_9.pdf | |
File Size: | 167 kb |
File Type: |