The cybercafe first came into existence in July 1991 in San Francisco, when
Wayne Gregori started up the SFnet Coffeehouse Network. He built and set
up 25 coin operated computer stations in multiple coffeehouses in San
Francisco. The Binary Cafe was the first cybercafe in Canada, started up in
June 1994. Today, there are thousands of cybercafes all over the world,
providing the computer and Internet access that people need to go about
their daily lives.
An Internet caf, also known as a cybercaf, is a place which provides Internet access to the
public, usually for a fee. These businesses usually provide snacks and drinks, hence the caf in the
name. The fee for using a computer is usually charged as a time-based rate.
History[edit]
The first online caf in South Korea called Electronic Caf opened in front of Hongik University in
March 1988 by Ahn Sang-Su and Keum Nuri in Seoul. It had two 16bit computers connected
to Online service networks through telephone lines. Online service users offline meetings were held
in the Electronic Caf, which served as a place that connected online and offline activities. The
opening of the online caf in Korea was 23 years ahead of other countries. [1]
The online caf phenomenon in the United States was started in July 1991 by Wayne Gregori in San
Francisco when he began SFnet Coffeehouse Network. Gregori designed, built and installed 25
coin-operated computer terminals in coffeehouses throughout the San Francisco Bay Area. The caf
terminals dialed into a 32 line Bulletin Board System that offered an array of electronic services
including FIDOnet mail and, in 1992, Internet mail.[2]
The concept of a caf with full Internet access (and the name Cybercaf) was invented in early 1994
by Ivan Pope. Commissioned to develop an Internet event for an arts weekend at the Institute of
Contemporary Arts (ICA) in London, and inspired by the SFnet terminal based cafes, Pope wrote a
proposal outlining the concept of a caf with Internet access.
After an initial run in late 1993 as a caf showcasing computers, a bar called CompuCaf was
established in Helsinki, Finland in the spring of 1994 featuring both Internet access and a robotic
beer seller.[3]
Around June 1994, The Binary Cafe, Canada's first Internet caf, opened in Toronto, Ontario.
Inspired partly by the ICA event, a commercial establishment of this type, called Cyberia, opened on
September 1, 1994 in London, England. In January 1995, CB1 Caf in Cambridge, installed an
Internet connection and is the longest running Internet Caf in the UK, still operating today.[4]
The first public, commercial American Internet caf was conceived and opened by Jeff Anderson and
Alan Weinkrantz in August 1994, at Infomart in Dallas, Texas and was called The High Tech Cafe.[5]
Three Internet cafs subsequently opened in the East Village neighborhood of New York City:
Internet Cafetm, opened by Arthur Perley, the @Cafe, and the Heroic Sandwich.[6] In 1996, the Internet
caf Surf City opened in downtown Anchorage, Alaska.
A variation of Internet caf called PC bang (similar to LAN gaming centers) became extremely
popular in South Korea when StarCraft was released in 1997. Although computer
and broadband penetration per capita were very high, young people went to PC bangs to play
multiplayer games.
Characteristics[edit]
Internet cafs are located worldwide, and many people use them when traveling to
access webmail and instant messaging services to keep in touch with family and friends. Apart from
travelers, in many developing countries Internet cafs are the primary form of Internet access for
citizens as a shared-access model is more affordable than personal ownership of equipment and/or
software. A variation on the Internet caf business model is the LAN gaming center, used
for multiplayer gaming. These cafs have several computer stations connected to a LAN. The
connected computers are custom-assembled for gameplay, supporting popular multiplayer games.
This is reducing the need for video arcades and arcade games, many of which are being closed
down or merged into Internet cafs. The use of Internet cafs for multiplayer gaming is particularly
popular in certain areas of Asia like India, China, Taiwan, Hong Kong, South Korea and
the Philippines. In some countries, since practically all LAN gaming centers also offer Internet
access, the terms net cafe and LAN gaming center have become interchangeable. Again, this
shared-access model is more affordable than personal ownership of equipment and/or software,
especially since games often require high end and expensive PCs.
There are also Internet kiosks, Internet access points in public places like public
libraries, airport halls, sometimes just for brief use while standing.
Many hotels, resorts, and cruise ships offer Internet access for the convenience of their guests; this
can take various forms, such as in-room wireless access, or a web browser that uses the in-room
television set for its display (usually in this case the hotel provides a wireless keyboard on the
assumption that the guest will use it from the bed), or computer(s) that guests can use, either in the
lobby or in a business center. As with telephone service, in the US most mid-price hotels offer
Internet access from a computer in the lobby to registered guests without charging an additional fee,
while fancier hotels are more likely to charge for the use of a computer in their "business center."
For those traveling by road in North America, many truck stops have Internet kiosks, for which a
typical charge is around 20 cents per minute.[7]
Internet cafs come in a wide range of styles, reflecting their location, main clientele, and
sometimes, the social agenda of the proprietors. In the early days they were important in projecting
the image of the Internet as a 'cool' phenomenon.
Evolution[edit]
Internet cafs are a natural evolution of the traditional caf. Cafs started as places for information
exchange, and have always been used as places to read the paper, send postcards home, play
traditional or electronic games, chat to friends, find out local information.
As Internet access is in increasing demand, many pubs, bars and cafs have terminals, so the
distinction between the Internet caf and normal caf is eroded. In some,
particularly European countries, the number of pure Internet cafs is decreasing since more and
more normal cafs offer the same services. However, there are European countries where the total
number of publicly accessible terminals is also decreasing. An example of such a country
is Germany. The cause of this development is a combination of complicated regulation, relatively
high Internet penetration rates, the widespread use of notebooks, tablets and smartphones and the
relatively high number of wireless internet hotspots. Many pubs, bars and cafs in Germany offer
wireless internet, but no terminals since the Internet caf regulations do not apply if no terminal is
offered. Additionally, the use of Internet cafs for multiplayer gaming is very difficult in Germany
since the Internet caf regulations and a second type of regulations which was originally established
for video arcade centres applies to this kind of Internet cafs. It is, for example, forbidden for people
under the age of 18 to enter such an Internet caf, although particularly people under 18 are an
important group of customers for this type of Internet caf.
While most Internet cafs are private businesses many have been set up to help bridge the 'digital
divide', providing computer access and training to those without home access. For example, the UK
government has supported the setting up of 6000 telecentres.
In Asia, gaming is very popular at the Internet cafs. This popularity has helped create a strong
demand and a sustainable revenue model for most Internet cafs. With growing popularity, there
also comes with this a responsibility as well. In fighting for competitive market share, the Internet
cafs have started charging less and hence are adopting alternate means to maximize revenue. This
includes selling food, beverages, game and telephone cards to its patrons.
By 2010, a variation of the internet caf known as a "sweepstakes parlor" had become widespread
in certain regions of the United States. These facilities offer entries in a contest to customers who
purchase internet usage. The result of the customers' entries are revealed using software installed
on the computer terminals, which may simulate the appearance and operation of casino games such
as a slot machine. Although meant to resemble it, these sweepstakes and software are designed in
such a way that they could legally be considered sweepstakes rather than gambling. Sweepstakes
parlors have faced scrutiny by local governments, who have argued that despite arguments claiming
otherwise, sweepstakes parlors are a form of illegal gambling, and their patrons are more interested
in playing the sweepstakes than actually using their purchased internet time. A large number of
these locations have faced raids by officials, while a number of states have enacted laws meant to
ban them.[8][9][10]
Legal issues[edit]
A notice about anti-terrorism related ID requirements on the door of an Italian Internet caf. (Florence, May
2006)
In 2003 the EasyInternetcaf chain was found liable for copyright infringement occurring when
customers used its CD-burning service to burn illegally downloaded music to their own CDs.[11]
In 2005 Italy began requiring entities such as Internet cafs to collect photocopies of the passports
of Internet, phone, or fax-using customers as a result of anti-terrorism legislation passed in July of
that year.[12]
Venues[edit]
Australia[edit]
Netcafe opened in St Kilda at the Deluxe Caf on April 4, 1995, inspired by the internet caf
phenomenon that was going on in Seattle. As Australias First Internet Caf, founders included Gavin
Murray, Rita Arrigo and Christopher Beaumont. Direct from Londons Cyberia we were joined by
Kathryn Phelps and partnerships with Adam Goudie of Standard Computers for hardware and
Michael Bethune from Australia Online, Australias First ISP for of course our Internet Access. In
1995 it was delivered via a standard analogue phone line using a 9600 Baud US Robotics Modem.
Brazil[edit]
In Brazil, the initial concept brought by Monkey Paulista was based on the business model used by
Internet cafs in South Korea, since this was the first house LAN to exist in Brazil, inaugurated in
So Paulo, starting its activities in 1998. The company closed in 2010. However, just a week later for
reasons of bureaucracy, the company Lan Game @ The House[13] was opened and today is the first
LAN house of Brazil in activity. Today it is seen as the country as a way to test new technologies and
demonstration of games and products.
Mainland China[edit]
This section does not cite any sources. Please help improve this section by adding
citations to reliable sources. Unsourced material may be challenged
and removed. (December 2010) (Learn how and when to remove this template message)
According to the "Survey of China Internet Caf Industry" by the People's Republic of China Ministry
of Culture in 2005, Mainland China has 110,000 Internet cafs, with more than 1,000,000 employees
contributing 18,500,000,000 yuan to P.R. China's GDP. More than 70% of Internet caf visitors are
from 18 to 30 years old. 90% are male, 65% are unmarried, and 54% hold a university degree. More
than 70% of visitors play computer games. 20% of China's Internet users go to Internet cafs.
Internet cafes allow individuals to go about the Internet anonymous, faster, and cheaper than at
home. Large Internet cafes of major cities in China are expensive and heavily regulated by
Government officials. Large Internet cafes are used by wealthy elite for business transactions and
social gatherings. The majority of Internet cafes are small privately owned cafes comprising 90% of
the market. (China Tightening Control, 2003) The majority of Internet cafes are unregistered
because they do not meet the requirements of government standards or they do not want to go
through the lengthy process of registering. According to Hong and Huang only 200 out of 2,400
cafes are registered in Beijing. The Chinese government is cracking down on the number of
unregistered Internet cafes because some users spread propaganda, slander, allow pornography,
and allow underage users. Crack downs by Chinese Government Officials banned 17,488 Internet
Cafes in 2002 and another 27,000 were banned in 2003. (J. Hong, L. Huang) Internet cafes that are
getting closed are being replaced with government approved businesses. These pre-approved
businesses monitor patrons activities and help the government crackdown on offending users.
(Xiao, 2003; Qiu 2003)
Milestones:
Before 1995 An Internet caf called 3C+T appeared in Shanghai, probably the first in
China. The price was 20 yuan per hour ($2.50 per hour)
19951998 China's Internet cafs proliferate. Playing unconnected games is the main
purpose of caf users. The average price was 15~20 yuan per hour.
After 2002 Heavy censorships were imposed, including real-name registration. At the end
of 2004, more than 70,000 Internet cafs were closed in a nationwide campaign.
2008 Microsoft attempts to make Internet cafs profitable in Asia and other emerging
markets. After discussions with the governments of these countries, it helps to establish safe
Internet cafs.
Indonesia[edit]
According to APWKomitel[14] (Association of Community Internet Center), there are 5,000 Internet
cafs in urban Indonesian cities in 2006 providing computer/printer/scanner rentals, training, PC
gaming and Internet access/rental to people without computer or internet access. The website [15] also
contains a directory listing some of these warnet/telecenter/gamecenter in Indonesia. In urban areas,
the generic name is warnet (or warung internet) and in rural areas the generic name is telecenter.
Warnets/netcafes are usually privately owned as bottom-up initiatives, while telecenters in rural
villages are typically government or donor-funded as top-down financing. Information on
netcafe/warnet in Indonesia can also be found in a book titled: Connected for Development:
Indonesian Case study.[16]
Currently, no special license is required to operate an Internet caf or warnet in Indonesia, except for
the ordinary business license applicable to cafes or small shops. Because of hype and poor
business planning, many net cafes have closed down. Although the number of Internet cafes are
growing, associations such as APWKomitel[17] urge new Internet caf owners to do a feasibility study
before planning to open an Internet caf, and provide a business model called multipurpose
community Internet center or "MCI Center"[18] to make the business more sustainable and
competitive. Hourly usage rate varies between Rp 2500-15000 ($0,27 - 1,60)
Japan[edit]
Japan has a strong Internet cafe culture, with most serving a dual purpose as joint Internet-manga
cafes. Most chains (like Media Cafe Popeye and Jiy Kkan) allow offer customers a variety of
seating options, including normal chair, massage chair, couch, and flat mat. Customers are then
typically given unlimited access to soft drinks, manga, magazines, Internet, online video games, and
online pornography. Most offer food and shower services for an additional fee. In fact, many
purchase "night packs" and shower/sleep in the cafes, giving rise to a phenomenon known as "net
cafe refugee" or "net cafe homeless".[19]
Malaysia[edit]
In Malaysia, Internet cafs are popular among teenagers who enjoy gaming. An Internet caf is also
known as a cybercafe. Some Internet cafs in Malaysia combine the characteristics of a F&B caf
and an Internet caf.[citation needed]
Philippines[edit]
In the Philippines, Internet cafs or better known as computer shops are found on every street in
major cities and there is at least one in most municipalities or towns. There are also Internet cafs in
coffee shops and malls. High-end restaurants and fast food chains also provide free broadband to
diners. Rates range from P10 ($0.20) on streets, up to P100 ($2) in malls.
In some major cities with existing ordinances regulating Internet cafs (e.g. Valenzuela, Marikina,
Davao, Lapu-lapu and Zamboanga), students who are below 18 years old are prohibited from
playing computer games during regular class hours. Depending on the city, regulations varies on
their exact details and implementation.[20] Such city ordinances usually also requires Internet caf
owners to:
1. Install filtering software to block adult oriented sites
2. Prohibit the sales of intoxicating drinks and cigarettes inside their establishment
4. Front wall panel is 50% transparent to allow a clear view of the interior of the establishment
5. Adequate lighting both inside and outside of the establishment to allow a clear view of the
interior at all times
South Korea[edit]
Main article: PC bang
In South Korea, Internet cafs are called PC bangs.[21] They are ubiquitous in South Korean cities,
numbering over 20,000.[22] PC bangs mostly cater to online game playing for the younger generation.
On average and mode, use of a PC bang computer is priced at around 1,000 won per hour (about
$0.88 USD).
Taiwan[edit]
Internet cafs are omnipresent in Taiwan, and especially concentrated in major cities,
namely Taipei and Kaohsiung. The Internet caf is called a "" (Wng k) in traditional Chinese.
The first character literally means "net" and the second character is the first syllable of "caf."The
rate is consistent at about NT$10~20 in the most part, but prominent districts, such as the Eastern
District of Taipei, can charge users up to NT$35 per hour. With the growth of smartphone ownership
and free Wi-Fi networks in all major public attractions, the Internet cafs now primarily cater to
gamers, and some even provide food and drinks.
United States[edit]
Reputedly, the first kosher cybercafe was the IDT Cafe in New York Citys diamond district, opened
in the spring of 1997.[23][24][25][26][27]
India[edit]
In India, Internet cafs are used by traveling people and business is declining since the arrival of
widespread mobile Internet usage. A set of other services are also offered, such as printing of
documents or webpages. Operators also help computer illiterates through some government
processes (as a part of e-governance in India ). Low speed of mobile Internet and these services
offered by Internet cafs help its survival. In India a positive government ID is compulsory for every
cafe users in most states.
Kenya[edit]
See also: Video gaming in Kenya
Cybercafes are prevalent in the city of Mombasa, as poverty and unreliable infrastructure do not
make personal Internet a viable option for many citizens. The cafes are often combined with a
variety of other businesses, such as chemists, manicurists, repair shops, and convenience stores.
Video gaming has become particularly profitable in cybercafes in Kenya in recent years.
Cybercaf
If you travel and need access to the Internet, a cybercafe might be one
solution. Call ahead and find out location and hours. If possible, reserve a
computer at a certain time.
Comments:
around 4 to 5 yrs back it was a reall good business, but as the broadband services started to focus
personal use internet connections for the most economical cost with unlimited offers, this business slowed
down. and out of every hundred u find max people owning a PC from their very early age and also
internet on mobiles is one more feature for simple and short access.
If u want to start one internet cafe sure opt for a nearby place to colleges, and prefer to even have Xerox,
scanner etc, it will benifit u well during their projects.
If you are living in educated as well as populated city then it will be of economic one. More over cafe must
be students and public approachable distance, otherwise they will seek the nearest place only from bus
stand or junction, something like that. Before starting the cafe check speed of the net and available net
provider at cost benifit manner. Calculate the number of system and the labour going to be employed and
other monthly expense, initial investment and esteemate the probable income then go on proceed. One
thing I want to remaind you that once after establishment you cannot resale the system because half the
rate only you can sale it. Take care. I ran the same but after a while I changed it as a education center
because of the maintanence expense. Better calculate all the ways.
INTRODUCTION
An Internet caf or cybercaf is a place which provides
internet access to the public, usually for a fee. These
businesses usually provide snacks and drinks, hence the caf
in the name. The fee for using a computer is usually charged
as a time-based rate. Internet cafs are a natural evolution of
the traditional cafe. Cafs started as places for information
exchange, and have always been used as places to read the
paper, send postcards home, play traditional or electronic
games, chat to friends, find out local information. Cafs have
also been in the forefront of promoting new technologies.
Internet cafs are located worldwide, and many people use
them when traveling to access webmail and instant
messaging services to keep in touch with family and friends.
Apart from travelers, in many developing countries Internet
cafs are the primary form of Internet access for citizens as a
shared-access model is more affordable than personal
ownership of equipment and/or software. A variation on the
Internet caf business model is the LAN gaming center, used
for multiplayer gaming. These cafs have several computer
stations connected to a LAN. The connected computers are
custom-assembled for gameplay, supporting popular
multiplayer games. This is reducing the need for video
arcades and arcade games, many of which are being closed
down or merged into Internet cafs. The use of Internet cafs
for multiplayer gaming is particularly popular in certain areas
of Asia like China, Taiwan, Hong Kong, South Korea and The
Philippines. In some countries, since practically all LAN
gaming centers also offer Internet access, the terms net cafe
and LAN gaming center have become interchangeable. Again,
this shared-access model is more affordable than personal
ownership of equipment and/or software, specially since
games often require high end and expensive PC's. There are
also Internet kiosks, Internet access points in public places
like public libraries, airport halls, sometimes just for brief use
while standing. Many hotels, resorts, and cruise ships offer
Internet access for the convenience of their guests; this can
take various forms, such as in-room wireless access, or a web
browser that uses the in-room television set for its display
(usually in this case the hotel provides a wireless keyboard on
the assumption that the guest will use it from the bed), or
computer(s) that guests can use, either in the lobby or in a
business center. As with telephone service, in the US most
mid-price hotels offer Internet access from a computer in the
lobby to registered guests without charging an additional fee,
while fancier hotels are more likely to charge for the use of a
computer in their "business center." For those traveling by
road in North America, many truck stops have Internet kiosks,
for which a typical charge is around 20 cents per minute.
Internet cafs come in a wide range of styles, reflecting their
location, main clientele, and sometimes, the social agenda of
the proprietors. In the early days they were important in
projecting the image of the Internet as a 'cool' phenomena.
Building up an internet cafe seems so easy from outside. It
feels as if one just needs to pull some chairs and tables, few
computers and an internet networking system, and here goes
the flourishing business. One has to take many steps and
decisions to make his business successful. It needs a lot of
patience, administrative quality and leadership skills to
maintain an internet cafe. Running an internet caf is quite
challenging job as you have to deal with the employs,
customers, the safety on internet, environment of the cafe
and the quality of internet. One has to satisfy everyone, has
to keep an eye on because there is lot of competition in this
field too. It might difficult at the beginning, because there
were not many resources. But nowadays, with the invention
of high...
[pic]
Cyberia: one of the world's first Internet cafs, London, 1994
The internet cafe phenomenon was started in July 1991 by
Wayne Gregori in San Francisco when he began SFnet
Coffeehouse Network. Gregori designed, built and installed 25
coin operated computer terminals in coffeehouses throughout
the San Francisco Bay Area. The cafe terminals dialed into a
32 line Bulletin Board System that offered an array of
electronic services including FIDOnet mail and, in 1992,
Internet mail. See SFnet Press Archive The concept and
name, Cybercaf, was invented in early 1994 by Ivan Pope.
Commissioned to develop an Internet event for an arts
weekend at the Institute of Contemporary Arts (ICA) in
London, and inspired by the SFnet terminal based cafes, Pope
wrote a proposal outlining the concept of a caf with Internet
access from the tables. The event was run over the weekend
of 12-13 March 1994 during the 'Towards the Aesthetics of
the Future' event. In June 1994, The Binary Cafe, Canada's
first Internet caf, opened in Toronto, Ontario. After an initial
appearance at the conference site of the 5th International
Symposium on Electronic Art, ISEA, in August 1994, an
establishment called CompuCafe was established in Helsinki,
Finland, featuring both Internet access and a robotic beer
seller. Inspired partly by the ICA event, a commercial
establishment of this type, called Cyberia,[1] opened on
September 1, 1994 in London, England. The first public,
commercial American Internet cafe was conceived and
opened by Jeff Anderson in August 1994, at Infomart in
Dallas, Texas and was called The High Tech Cafe.[1] Next, in
the USA, three Internet cafs opened in the East Village
neighborhood of New York City: Internet Cafetm, opened by
Arthur Perley, the @ Cafe, and the Heroic Sandwich.[2] A
variation of Internet caf called PC bang (similar to LAN
gaming center) became extremely popular in South Korea
when StarCraft came out in 1997. Although computer and
broadband penetration per capita were very high, young
people went to PC bangs to play multiplayer games. [pic]
Internet caf or simply cyber caf is the place where people hang out
to use high speed internet and other computer services including
games. You sell your services per minute or per hour. Internet caf is
becoming popular among teenagers and also tourists. Food and
drinks can also be served to the customers.
1. Client computers
2. Internet connection high speed
3. A server computer to control all the client computers
4. Other hardware components related to networking
5. A stall for selling drinks and snacks
The hardware components would not add much to your budget. The total
cost of setup depends on the type of network you are planning to use. If
you are planning to opt for wired networking, the hardware components
would increase and make the space congested.
Return on investment
Let us consider a tier 3 location where the rent for the spacing would be
around 4000 rupees. The internet lease line would be approximately 3000
rupees per month. A second hand computer with all required elements
would come around 30,000 rupees. If you are taking up a loan for buying
7 computers (6 client computers plus one server), the EMI would be
approximately 7,000 rupees per month (for three years)! The total fixed
cost for your set up would come around 14,000 per month.
The electricity used can be assumed as one rupee per hour. You would
need 1500 hours to breakeven your fixed cost alone with a browsing rate of
10 rupees per hour. If you open the cafe for six days a week and for twelve
hours, it would account for 1800 hours (25 * 12* 6 computers). Thus, only
if your cafe is 83% full, you would be at least able to break even.
The only way to make profit in this industry is to provide other services
like scanning (5 rupees per page), printing (3 rupees per page), booking
railway tickets, paying electricity bills and so on.
Support staffing
Managing an internet cafe is one mans job. But, it is always better to have
a semi-skilled person for helping you to collect ID, note the time, take
print outs and other processes. You can also hire a network skilled person
who can take care of the performance of the computer and also help you in
the additional services.
Important tips:
In India many people go to Internet caf to carryout their day to day online activities.
Most of the people are aware of how to use Internet for meeting their needs. We usually
go to Internet caf for checking our mails, chat with friends online, play online games,
book travel tickets, etc. The same Internet caf used by a common man is also used by
Anti-social elements, Criminals and terrorists to perform their illegal activities over the
Internet. Hackers sometimes install malicious software on the public computers in
Internet Caf in order to get sensitive information from the users who are visiting that
particular Caf.
The Internet caf owners have to follow the guidelines to prove their innocence in case
of any incident. Let us see a case with cyber crime cell of pune. A mail was sent to pune
police commissionerate threatening disruptive activities during Ganesh Puja. Police were
trying to trace the person who sent the email, they arrested owners of the Internet caf
from where the email was sent on August 25,2012. Police arrested the owner of
Internet cafe for not verifying the credentials of the customer who sent the threat mail
and for not keeping any record of the customers. In this case if the owners have
followed the rules they might have proved their innocence. This incident have made it
clear that Internet caf owners should follow the guidelines strictly.
Not only should the owners of Internet caf, users visiting the Internet caf also take
certain precautions to surf the web safely in order to avoid hackers. Let us see some of
the guidelines issued by Government of India for Internet caf owners; and also some
useful tips/guidelines for users visiting Internet caf.
Sharing about Internet activity with family members is the first step to being safe in Internet. Our
parents always love us and look about our safety so that they would be with us in all difficult
periods. So let we share each and every thing what we do and face in Internet.
Step 2 : Do you use family Computer?
If yes, we need to follow guidelines and rules of family for accessing Internet as our family
members may use for different purposes like banking, shopping etc. and sharing such sensitive
information with online friends may cause for huge losses in financial terms. So before using
family computer, follow family rules.
Since most online games or videos may required credit card requirement to play or see to access
and some times family members may left this information in common computer. Without their
permission, we do not use the same.
Watching videos in Internet always fun and enjoyable. But the same time there are risks like
malicious links that could take you to inappropriate or illegal content. If you encounter any such
activity, intimate to your family member.
We need to be extra care of fan sites that turn up in search results but aren?t actually run by the
celebrities and the people who cover them. It?s not always easy to tell, but at least they?re
usually lower down in the search results
It's common for students to think, Everything is on the Internet is true. But it is collection of
lot of member?s views as they can write and post without any guidance and control. The Internet
contains a wealth of valuable information, but it often is difficult to accessibility, low cost and
wide distribution, the Internet is great medium for disseminating falsehoods and inaccuracies.
It is very valuable, of course, but you should realize there are still biased views and information
to market their products and agenda. We need to be careful and confirm the same by going in to
various sources of Internet.
Yes, Children love to play games. We always love to play online games and extend our arms to
further with unknown members Internet is great opportunity for all of us to extend our friend
circles. Some web sites are needed credit card details to play even though they are free. But we
always play free games in Internet
At the same time, we also should know that there are risks that if we share credit cards of family
and the same time automated charges are also burden to family. The details and identification
passed to the web site may open to others so that the identification theft may occur.
Step 7 :Do you love to be Social?
Yes, Children are social. We always in touch with friends and extend our arms to new members.
Internet is great opportunity for all of us to extend our friend circles.
At the same time, we also should know that there are social reasons why kids are hacked. The
bullying is common as some of kids or hackers tries to post embarrassing messages by using
shared password or post links to malicious sites.
We should not to share passwords, even with their closest buddies, and always to close out of
accounts when they?re finished using computers shared with other people ? especially those used
in public, such as at school or public libraries.
For Hackers or Attackers, Children Identification is much valuable. The criminal gets as
much as information about children such as name, address, class, school name to target them.
The collected information may be useful for guessing passwords of children and their parents as
in general passwords of family members and related with family names. Also further they may
use the same information for making friendship through online with you to get know about your
family and consequently they may apply credit cards on your family member names. It is
suggested to children for not to share any information related to sensitive and financial aspects in
social networks and maintain privacy with known and unknown members.
Information Security Awareness for
Student
Internet safety is every ones responsibility. Its all about being able to have fun online
to be able to chat with your friends, to post a video that youve made or a song that
youve written, to be free to find out more about information youre interested in and
check out the latest trends - without being bullied, annoyed or scammed, or having your
ideas stolen including identity theft.
Internet safety is a lot more than just about ensuring that your computer has the latest
anti-virus and firewall software installed. Its about being smart about how you handle
yourself online and savvy about how you deal with other people (especially strangers
who you meet online), and not falling prey to an online scam artist who takes advantage
of your ignorance
Most of us are connected via our laptops, mobile phones, tablets or personal computer.
The potential for the internet to be a valuable and a fun resource for entertainment,
making friends, keeping in touch and learning is huge. But if you use the internet without
safety awareness, you could be at risk of illegal activity or abuse - be it bullying, fraud or
something more serious. Unlike seeing someone face to face, on the net, people aren't
always what they first seen.
In the same way you learn about safety when you leave the house, it is important to
learn how to stay safe online. These are skills that will stay with you for life time.
Don't give out personal information such as your address or phone number.
If anything you see or read online worries you, tell someone/inform your parents
about it.
ISEA-Awareness Program will always gives you tips and suggestions for the
teenagers/students for online safety. Do follow these guidelines/ steps before using the
internet.
The internet is a way to stay connected with friends and family. For many Students, its
also a way to stay current on news, research information or shop online and
downloading books, online applications etc.,. The Internet has also become a popular
method for banking, paying bills and completing and submitting applications and forms.
Using the Web browser is easy, to do things online, but there can be some hidden
dangers to you and your computer. These risks can include exposure of sensitive
personal information and infection by malware, which includes viruses, spyware, and
adware. Safe browsing means being aware of these online threats and taking the
necessary precautions to avoid them.
It only takes a little bit of effort, a few tools, and some basic information to be safe as
you browse the Internet. Follow these guidelines to protect your personal information
and your computer online.
We all know it's not healthy to spend hours and hours in front of a computer screen. But
another problem with social networking is the pressure you can feel to make sure you
have lots of friends. But here are some things to remember:
Friendships made online are made by clicking a button rather than talking to
people and sharing experiences.
Being online friends with someone is much less meaningful than face to face
friendship.
You can easily fall out with an online friend because of a misunderstood
comment.
It is far easier, and healthier, to sort out arguments and problems when you can
talk to someone face to face
So although you might know someone who likes to boast about how many friends
they've got on their social networking site, remember that real friendships aren't made
by computers.
Maybe use an email address that does not include your name.
Use the strongest privacy setting when you set up your profile. This means that
only your friends will be able to view your information.
Pictures and Videos can be shared very careful when uploading-even if you only
share it with friends,it can easily be spread much further
Be very careful about sharing content online - especially if it isn't yours to share
.Illegal downloads definitely should be avoided.
Device loss or theft. Losing a device to mishap or theft can cause lost
productivity, data loss, and potential liability under data-protection laws.
Loss of sensitive data. Many mobile devices may contain sensitive or confidential
information, for example, personal photographs and videos, email messages, text
messages and files.
Malicious software. Viruses, Trojan Horses, and Worms are familiar threats to
mobile devices it has become a significant target.
When choosing a mobile device, consider its security features and ensure they
are enabled.
Disable interfaces that are not in use, such as Bluetooth, infrared, or Wi-Fi.
How to make sure you and your family's experience on the Internet is safe, educational, and fun
Both online shopping and the downloading of software or files need to be discussed with all
members or supervised by adults to make sure your personal and financial information remains
safe and secure.
The very nature of the Internet helps to connect to people and resources which have some risk of
people intruding into your system. There are also other types of threats, such as companies that
track what you do on the Internet. While there is no guarantee that you will be safe on internet,
but there are many things you can do to protect yourself and family members while using the
Internet. The Internet can be a helpful source of information and advice, but you and your family
members can't trust everything you read. Anyone can put any information on the Internet, and
not all of it is reliable. Some people and organizations may take the necessary steps and take care
about the accuracy of the information what they post. In parallel, some may give false
information intentionally.
When you and your family surf the Web it's important to keep the
following in mind:
Online information is usually not private.
People online are not always who they say they are.
You and your family may unexpectedly and unintentionally find material on the Web that
is offensive, pornographic (including child pornography), obscene, violent, or racist.
So ISEA-Awareness Program always provides tips and suggestions for the whole family
members. Please follow the steps before chatting, participating in social networks, shopping
online or downloading files, games or other software to be safe online.
Your home may be connected with Wi-Fi now and it allows your family to access the Internet
from all over your house, which makes it harder for you to control the Internet activity and
sharing information. If it's not secured properly, intruders might use your bandwidth, or
compromise your Internet security by infecting your devices with malware. Further they may use
your devices or systems, as bots for sending the attacks from your systems to other's systems or
infrastructure.
Enable wireless encryption to prevent strangers from "seeing" your network and restrict
access to it.
Allow only specific devices to access your wireless network. Every device that is able to
communicate with a network is assigned a unique Media Access Control (MAC) address,
so use them.
Use filtering options to avoid unnecessary websites with inappropriate content.
Placing the family computer at common room where family members gather is one of most
important thing in a home for children and aged. You can help, monitor them so that they always
safe on Internet. It also helps you to control the no. of hours of usage of computer by your
children and useful for aged to continued learning with latest technologies through Internet.
One way to help family members is to frame Dos and Donts rules for accessing Internet. It is to
set clear rules, standards for using computers and other electronic devices like smart phones and
tablet computers. You may consider:
Telling your family members like children to ask for your permission before they access
the Internet.
Setting time limits for computers and other devices, per day or per week, and what time
of day is OK.
Limiting your child to social networking sites that you approve, if you decide to allow
them to use these kinds of sites.
Joining social networking sites that your child uses, so you can monitor what they share.
It is easy to lie and pretend you are someone else when you are online. Children especially need
to know that a new "friend" may really be a 40-year-old man rather than someone their own age.
So please remind your family members that people met online may be strangers
Step 4 : Understand the need and set boundaries for online safety
As different family members may require different things to access Computer and Internet,
together, agree Upon Family Rules in accessing Computer and Internet, Decide exactly what is
okay and what is not okay with regards to
Create Strong, Unique and Easy to remember Passwords for online account
Pledge to not to share or post any sensitive information like phone numbers, names of
family members that reveals family members identity
Promise your family members not to post inappropriate photos or ones that may reveal
your identity (for example: city or school names on shirts)
Without informing family, never meet face to face meetings with strangers who met
online
Any irritated activity such as cyber stalking, bullying etc and strange behavior computer
and applications, promise to inform and discuss with family members
Prepare an agreement for online behavior so that that there is a clear understanding among all
family members on appropriate usage of computer, Internet usage. This helps all family
members safety in Internet access.
It is also recommended that the members of family to pledge for computer and Internet safety as
said below
PLEDGE
As the Computer and Internet is a privilege for acquiring knowledge, surfing the things to know
how, work, play, chat, and connect which I do not want to lose and for my safety and my family
safety, we have agreed on online safety and behavior
I will follow all of the safety and security rules of my computer and Internet access
I will never meet in person with people I met online. In case if required I only meet along
with my family members
I commit to this pledge and help in my safety, my family safety and also to my country
safety to enable cyber safe India.
As your parent/guardian/teacher, I promise to make myself available to you when you
ask for assistance and will help you resolve any problems that may arise in any way that I
can
Crackers, hackers, and identity thieves are looking to steal your personal information ? and your
money. But there are steps you can take to protect yourself, like keeping your computer software
up-to-date right from operating System to applications The attackers constantly develop new
ways to attack your computer, so your operating system, security software must be up-to-date to
protect against the latest threats.
Today's operating systems are more sophisticated and feature-rich than ever before, which makes
them substantially more useful to the enterprise but also adds to security vulnerabilities. The first
important step is to check if you have the latest security updates and patches available for your
Windows, Linux, MAC and any other operating system, which you are using.
After you have installed your security updates for your operating system, make sure you have
created a Restore Point for your installation. You can create the Restore Point as soon as your
Operating System installation is ready and name it clean installation and then you can continue
installing drivers and applications. In case one of the drivers causes issues on the system, you can
always go back to the clean installation restore point.
It is important to have not only your operating system up to date, but also the software you are
using, therefore make sure you have the latest updates and security patches for your main
programs and applications. Since it is a well-known fact that hackers try to exploit popular
software , such as Java, Adobe Flash, Adobe Shock wave, Adobe Acrobat Reader, Quick time or
popular web browsers like Chrome, Mozilla Firefox or Internet Explorer, always make sure you
have the latest available patches. Since these pieces of software are always under threat from
criminal minds, don't just rely on your memory to manually update every program or application
you have installed.
Make sure you have security software that protects your computer against viruses,
hackers, and spyware.
The software should be updated frequently, as new threats are emerging daily. Ideally,
security that updates automatically
Install Antivirus, Desktop Firewall solutions against malware and unauthorized access popular
vendor as it is very important to have a reliable security solution on your computer system,
which should include real-time scanning, automatic update and also firewall functionality, which
can control unauthorized activity
You may use some security software to protect your computer and your data and assure that the
security software having minimum three components anti-virus, anti-spyware, and a firewall.
Most of vendor based tools provides Parental Control based tools and use and enable Parental
Controls to filter and block inappropriate material and protect children from online attacks,
exposing to risks, strangers, inappropriate content and other threats. These tools may not
sufficient to secure all threats so that you have to monitor and observe the members behavior
while they accessing Internet
Step 9 : Back up your system
You updated the operating system and your system applications and you have installed additional
security products for your system safety. The steps above are meant to keep you safe from
malicious software and online threats, but you may still encounter hardware issues that could
endanger your private information. To make sure your data stays safe, you should be using a
twofold strategy, which should include combining an external hard drive usage with an online
backup service.
We need to emphasize the importance of having a back-up solution, which provides stability so
that you won't have any problems and allows you to synchronize your files with the online
backup servers and provides some sort of security, such as encryption capabilities.
Modern Operating Systems grants a certain level of rights and privileges depending on what kind
of user account you have. You may have a standard user account or an administrator user
account.
It is recommended to use standard accounts for your family members to access computer to
prevent users from making changes that affect everyone who uses the computer, such as deleting
important files necessary for the system.
In case you want to install an application or make security changes, Operating System will ask
you to provide the credentials for an administrator or root account
Using a standard account you make sure that a piece of malware which infects a limited-user
account won't do much damage as one infecting a root or an administrator account. It also helps
you to monitor the activity of users and control the software access to family members.
Any hacker who wants to breach your online accounts and steal precious information or your
identity can easily crack with a weak password of you. A basic internet security rule is to create a
strong, unique and easy to remember password for each online account and change it regularly:
make it long (at least eight characters), mix letters, numbers and symbols, and opt for security
questions (whenever the possibility is provided) to which only you know the answer. Teach your
family members to do the same
Use a combination of letters, numbers, and symbols (all variety of keys in a key board
including Capital and Small letters).
Change small letters to Capital letters of even position letters - ILmCwAiMwHgS (key
becoming stronger password)
Now change wherever i=!, g=9, s=$, (personal keys you have to remembers for all your
password) so that your password becomes more stronger than before. ?IlmCwA!MwH9$
For making unique passwords, create as many as pass phrases and words for different
passwords to different accounts. For example
o Windows -w!nD0W$9
o GNULinux - 9NuL!NuX
Do not share your personal keys and type of passphrases to any body
Also remember that do not share usernames too with strangers as even they knowing
passwords without user IDs are useless.
The main interface in computer between you and your access to Internet is Internet Browser and
it is very important to secure it before accessing Internet.
Even though, you secured your operating system, applications except your browser, it may like
open invitation to the attackers as the browsers helps them to take your private information from
your computer. To stay safe while accessing Internet through browsers, make sure you follow
and respect the following
Choose a private browsing session about a web site, which you are not sure about.
To make sure that clicking on dangerous links won't affect you and your family, as you hover the
mouse over the link to see if you are directed to a legitimate location or not. If you were
supposed to reach your favorite news website, such as "www.india.com", but the link
indicates "2wffer21.net", then you should resist the urge of clicking the link.
Most of us use shortening services for their links, such as goo.gl or tinyurl. But in some cases an
unknown link may send you to a malicious site that can install malware on the system.
Web browsing is probably the one thing everybody's good at in the online world. But remember
that cyber crooks know and use this fact to their advantage. They can push up fake web
addresses in your search results to make you visit their malicious websites and trick you into
giving up personal details or downloading spyware and malware. This is why you need to install
an effective Safe Browsing tool
Step 15 : Download and install software from trusted sources
only.
Free games, music, movies etc. are available for download all over the Internet. They
are also very tempting and may attracting for children and other family members. But
some of them contain spyware and other types of malware that can compromise your
whole family's Internet security
Make a list of trusted downloading sources and have your whole family stick to it. Also,
read carefully the license agreement before installing a new piece of software and make
sure your kids ask for your permission before they download or install something.
Though this is current situation in this modern world, women are still found to be victim
in many cases and are bearing pain and loss in both personal and official lives.
An age old practice is still continuing today in the form of harassment, blackmailing etc.,
Todays cyber world or virtual world have open up new ways to reach out women attack
them. The use of cyber space and its attendant anonymity continue to influence
negatively the social and cultural aspects of society.
While there are many security tools and spaces available where women can enjoy the
benefits of the cyber world, lack of awareness on how to use things safely and securely
is making women more vulnerable to cyber-attacks than men.
In cyber world women are subjected to harassment via email, morphing, cyber
defamation, Social Networking, hacking, cyber-stalking, cyber pornography, cyber flirting
and cyber bullying.
Some awareness best practices and Tips can help women to be safe from these cyber-
attacks and protect them and their families.
As part of this project, Information Security Education and Awareness, we are trying to
spread this awareness to women and help them to follow the best practices in using
Internet, Smart phones and various other new cyber technologies through which attacks
are most likely to happen.
If answer to any of the above questions is yes from you, then please proceed reading
the following articles. They are just for you.
The following are few simple and quick tips for Women in the cyber world
Do not get motivated for likes on your pics and upload more
If the System Administrators are more cautious and follow good practices during routine
administrative tasks. It would be easy to maintain and secure IT systems and networks
in the organization. The system admin should have their own policy as per the
organization policy:
Every organization must have an overall policy that establishes the direction of
the organization and its security mission as well as roles and responsibilities.
There can also be system specific rules to address the policies for individual
systems, network and application security.
Before keeping the system and network devices in the work place or in the existing
network, it is very important to follow some of the best system/network practices
Harden the network by using the vulnerability Assessment process for any open
ports and any vulnerable applications
System Administrator and Network Admin need to educate users and help-desk
personnel about basic security issues and practices to follow
Police Personnel should have a Good Understanding of the Technology, the working of
the devises, how internet works, how the citizens are targeted for online fraud and tools
and techniques to investigate and bring the culprits to Justice by understanding the
different IT laws.
Awareness for the police is very much important to understand the various issues
related to cyber world and safety guidelines which help them to save themselves and
promote/share them with general public to participate securely while using internet.
Information Security Awareness for
Teacher
Teachers are very important in any society. Creating good citizens is the great role of
teachers in the society.The teacher is a good source of inspiration to students. Teachers
are encouraged to foster a love for learning in their students. Teachers act as the
advisers to parents as well. The teachers serve as guardians of the child's interests. A
teacher should consider it his duty to educate and train his students and should feel
responsible for it. He should feel that his students have been entrusted to him and he
should avoid any breach of the trust the society has reposed in him. He should be a
sociable person with his roots in the society. A teacher should be aware of the internet
and its advantages and disadvantages. Creating cyber security Awareness is very much
required for a teacher to impart the knowledge about pros and cons of internet usage
and safety tips for online presence. In turn the Teacher should be aware of the cyber
threats and how to safe guard himself and disseminate the knowledge to all students
and parents. Cyber Awareness on this page are aimed at assisting teachers to
understand and teach some of the issues about information security, cyber safety, cyber
bullying and the Guidelines to be safe online.
Government Staff must ensure that Confidentiality, Privacy and Commercial Sensitivity
Standards, Practices and Requirements are followed to the use the organization
equipment and the storage, retrieval, access and while giving out of system and
networks information.
4. Do you have any policy guidelines for accessing /using the organization
resources?
Now go through the Guidelines provided to safeguard yourself and organized resources.
Always follow the Internet Ethics while using internet and the moral principles that
govern the usage of computers. One of the common issues of computer ethics is
violation of copyright issues like illegal downloads from torrents etc. Downloading the
document/paper from the internet and distributing to others without proper permission
from the author etc. for more..
You should be always honest, respect the rights and property of others on the internet.
One has to accept that Internet is not a value free-zone .It means World Wide Web is a
place where values are considered in the broadest sense so we must take care while
shaping content and services and we should recognize that internet is not apart from
universal society but it is a primary component of it. For more..
Always use strong login password for the systems/Laptops and need to change once in
a 30 days. Do not share the work related information to the peoples outside of your
organization. There are social engineering approach like phishing, vishing, baiting,
dumpster diving etc to gain access to personal information through misrepresentation. It
is the conscious manipulation of people to obtain information without realizing that a
security breach is occurring. It may take the form of impersonation via telephone or in
person and through email. Some emails lure the receiver into opening an attachment
that activates a virus or malicious program in to your computer. You should follow some
paper/e-mail methods to give the information to the outside peoples and also the
reception/front desk should be aware with such kinds of social engineering attacks. For
more..
When surfing the Internet, you always should check about the browser security to avoid
risks of exposing personal information such as disabling the option Remember my ID
on this computer. User ID or Username also should be secured along with password to
avoid track passwords by next user. It is good to use Private Browsing in Mozilla
Firefox Web Browser and Incognito Window option in Google Chrome Web Browsers
to avoid such type of attacks.
Keep your computer operating system up-to date which is very important to run your
computer fast and safe. The security of the operating system running on various PCs
plays an important role in the security of the network as a whole. Not updating one
system in the network may affect the security of the other systems in the network. Today
we have a highly sophisticated operating system with lots of features, but it may be
vulnerable if they are not administered, configured and monitored properly. Sometimes
updating the operating system with latest patches may lead to interoperability issues
with other operating systems. Hence proper care should be taken while updating the
operating system in a separate System/PC.
If government employees are using the mobile phones, you have to ensure that serial
number/Model number and IMIE Number are maintained in an assets register offline or
online. If they are using the personal mobiles/portable devices accessing the
organization network must take written approval from their IT Managers/Director to
connect the same. Always see the devices which you are using must be meeting the IT
Security policies. Use secure passwords to the devices and lock when not in use.
The organization does not accept liability for any loss or damage suffered to personally
owned devices as a result of using the department's ICT facilities, systems, network or
services and is not responsible for any repairs or maintenance. The department further
does not provide any technical or software support to an employee's personally owned
device. Information and system backup procedures and archiving must be in place to
ensure that in the event of a loss restoration can take place within acceptable
parameters to ensure business continuity.
Objectives:
The formation of an environment that will bring people with diverse interests and
backgrounds together in a common forum.
Affordable access to the resources of the Internet and other online services
Mission
As the popularity of the Internet continues to grow at an exponential rate, easy and affordable
access is quickly becoming a necessity of life. Atis Internet Cafe provides communities with
the ability to access the Internet, enjoy a cup of coffee, and share Internet experiences in a
comfortable environment. People of all ages and backgrounds will come to enjoy the unique,
upscale, educational, and innovative environment that Atis Internet Cafe provides.