SlideShare una empresa de Scribd logo
1 de 20
Descargar para leer sin conexión
PRIVACY vs SAFETY?
Our Quest For Security
In The Mobile Age
Image by dbbent (via Flickr)By Tanya Tighe
Not long ago…
…we brought our cell phones with us in case of emergency
and ‘pay as you go’ made sense.
Image by yisris (via Flickr )
OnStar technology was a revelation,
offering the luxury of increased security
and safety…
…anywhere your car could take you.
Image by aaronparecki (via Flickr)
Most people carry a
mapping option
in their
purse or pocket
Image by Johan Larsson (via Flickr)
Today, driving without GPS technology
is rare.
One of the keys to the
success of mobile
technology is it helps
fulfil the fundamental
human need for
safety and security.
Image by dullhunk (via Flickr)
It helps keep us safe…
Image by Keoni Cabral (via Flickr)
“Amber Alert GPS lets you track your child's
whereabouts and receive emails and texts if an alert
is triggered”
“It even notifies you if your child comes within 500
feet of a registered sex offender’s residence and
gives your child the ability to use an SOS button if
they need immediate help.”
Excerpt from Mashable.com’s
8 Apps and Gadgets to Keep Track of Your Child
What is the cost of this sense of security?
Is privacy too high a price?
“
“NSA surveillance reform bill passes House by 303 votes to 121”
“Some members of Congress were worried that the bill will fail to
prevent the National Security Agency from continuing to collect large
amounts of data on ordinary US citizens.”
Image by quinn.anya (via Flickr)
Excerpts selected from The Guardian
http://www.theguardian.com/world/2014/may/22/nsa-reform-bill-usa-freedom-act-passes-house
“Your Social Insurance Number
and other data may have been
stolen as a result of a security
bug in code used by two-thirds
of "secure" websites on the
internet — including Canada
Revenue Agency — as well as
mobile apps, email and chat
servers, VPN clients and
hardware devices such as
routers.”
Excerpts selected from CBC
http://www.cbc.ca/news/technology/heartbleed-web-
security-bug-what-you-need-to-know-1.2603988
Image by snoopsmaus (via Flickr)
“US officials said more than 500,000 computers in more than
100 countries had been infected by BlackShades”
Excerpt selected from BBC
http://www.bbc.com/news/uk-27471218
“the Blackshades Remote
Access Tool (RAT)—allows
criminals to steal passwords
and banking credentials; hack
into social media accounts;
access documents, photos, and
other computer files; record all
keystrokes; activate webcams;
hold a computer for ransom;
and use the computer in
distributed denial of service
(DDoS) attacks”
“One case of BlackShades use
documented by Europol involved
an 18-year-old man from the
Netherlands who allegedly
infected roughly 2,000 computers
to take photos of women and girls
who were using the machines.”
Excerpts selected from FBI.gov
http://www.fbi.gov/news/stories/2014/may/international-blackshades-
malware-takedown
Flickr photo by Nomadic Lass
Excerpt from Global News
http://globalnews.ca/news/1345492/ebay-security-breach-might-also-affect-kijiji-paypal-users/
“eBay urged its users to change their account
passwords, after a cyber attack compromised its
database.”
Image by Intel Free Press (via Flickr)
Image by elhombredenegro (via Flickr)
Who are we trusting with our
information; are they
trustworthy?
Image By Mike Licht NotionsCapital.com (via Flicker)
Do we know who is
watching us?
Image by Jim Barter (via Flickr)
Is the perception of
increased security
misleading?
The current of technology
is moving the world
forward at a fast pace.
Are we staying afloat,
or getting swept under?
5 years ago,
did you know what a
push notification was?
Image by iwolkow.de (via Flickr)
Advancing technology
will always offer benefits and
present challenges.
Image by wwarby (via Flickr)
http://www.cnet.com/news/blackshades-
malware-takedown-ends-in-100-arrests-
worldwide/
Society must strive to understand the
hazards and implement preventive
measures to mitigate the risks associated
with utilizing mobile technology.
Image by Alan Cleaver (via Flickr)
Image by Uncaino (via Flickr)
Increased awareness
and vigilance is our
responsibility.
If we value our privacy we
MUST demand it be protected.
It is a choice to stand up for
privacy and safety.
This is not a choice between
privacy or safety.
Image by limaoscarjuiliet (via Flickr)
Image Credits
Images Under Creative Commons License 2.0: Attribution
https://creativecommons.org/licenses/by/2.0/
Slide2: Image by yisris (via Flickr)
Slide3: Image by aaronparecki (via Flickr)
Slide 4: Image by Johan Larsson (via Flickr)
Slide 5: Image by dullhunk (via Flickr)
Slide 6: Image by Keoni Cabral (via Flickr)
Slide 10: Image by Intel Free Press (via Flickr)
Slide 12: Image by Mike Licht NotionsCapital.com (via Flickr)
Slide 13: Image by Jim Barter (via Flickr)
Slide 14: Image by iwolkow.de (via Flickr)
Slide 15: Image by wwarby (via Flickr)
Slide 18: Image by Alan Cleaver (via Flickr)
Slide19: Image by Uncaino (via Flickr)
Slide18: Image by limaoscarjuliet (via Flickr)
Images Under Creative Commons License SA 2.0:
Attribution and ShareAlike
https://creativecommons.org/licenses/by-sa/2.0/
• Slide 1: Image by dbbent (via Flickr)
• Slide 7: Image by quinn.anya (via Flickr)
• Slide 8: Image by snoopsmaus (via Flickr)
• Slide 9: Image by Nomadic Lass (via Flickr)
• Slide 11: Image by elhombredenegro (via Flickr)
References
Slide 6: Selected excerpt from Mashable.com’s 8 Apps and Gadgets to Keep Track of Your Child
http://mashable.com/2013/07/15/child-tracking-apps/
Slide 7: Excerpts selected from The Guardian.com
http://www.theguardian.com/world/2014/may/22/nsa-reform-bill-usa-freedom-act-passes-house
Slide 8 & 17: Excerpts selected from CBC.ca
http://www.cbc.ca/news/technology/heartbleed-web-security-bug-what-you-need-to-know-1.2603988
Slide 9: Excerpts selected from FBI.gov
http://www.fbi.gov/news/stories/2014/may/international-blackshades-malware-takedown
Slide 10: Selected excerpt from Global News
http://globalnews.ca/news/1345492/ebay-security-breach-might-also-affect-kijiji-paypal-users/

Más contenido relacionado

La actualidad más candente

LIFARS - Financial Cybercrime
LIFARS - Financial CybercrimeLIFARS - Financial Cybercrime
LIFARS - Financial CybercrimeLIFARS
 
Surveillance Society
Surveillance SocietySurveillance Society
Surveillance SocietyKaren Moxley
 
Webinar slides sept 23 2021 mary aiken
Webinar slides sept 23 2021 mary aikenWebinar slides sept 23 2021 mary aiken
Webinar slides sept 23 2021 mary aikenCapitolTechU
 
Computer crime and internet crime privacy
Computer crime and internet crime privacyComputer crime and internet crime privacy
Computer crime and internet crime privacyGouthamXander
 
Social Media Security
Social Media SecuritySocial Media Security
Social Media SecurityDel Belcher
 
Dark side presentation lwhippedtc515
Dark side presentation lwhippedtc515Dark side presentation lwhippedtc515
Dark side presentation lwhippedtc515lisawhipp
 
Final Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayFinal Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayCallum Craigie
 
ppt on child pornography and cyber crime
ppt on child pornography and cyber crimeppt on child pornography and cyber crime
ppt on child pornography and cyber crime008_Anuj
 
document on cyber terrorism
document on cyber terrorismdocument on cyber terrorism
document on cyber terrorismKirti Temani
 
Presentation on Software Piracy
Presentation on Software PiracyPresentation on Software Piracy
Presentation on Software PiracyPallavi Agarwal
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersStephen Thomas, CISSP
 
Social Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social MediaSocial Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social MediaTyler Shields
 
E crime thesis Cyber Crime and its several types
E crime thesis  Cyber Crime and its several typesE crime thesis  Cyber Crime and its several types
E crime thesis Cyber Crime and its several typesAssignment Studio
 
Greendeana unit 8 project cj216 copy
Greendeana unit 8 project cj216 copyGreendeana unit 8 project cj216 copy
Greendeana unit 8 project cj216 copyDee Green
 

La actualidad más candente (20)

LIFARS - Financial Cybercrime
LIFARS - Financial CybercrimeLIFARS - Financial Cybercrime
LIFARS - Financial Cybercrime
 
Surveillance Society
Surveillance SocietySurveillance Society
Surveillance Society
 
Surveillance
SurveillanceSurveillance
Surveillance
 
Webinar slides sept 23 2021 mary aiken
Webinar slides sept 23 2021 mary aikenWebinar slides sept 23 2021 mary aiken
Webinar slides sept 23 2021 mary aiken
 
Smartphones Flipbook
Smartphones FlipbookSmartphones Flipbook
Smartphones Flipbook
 
Computer crime and internet crime privacy
Computer crime and internet crime privacyComputer crime and internet crime privacy
Computer crime and internet crime privacy
 
Social Media Security
Social Media SecuritySocial Media Security
Social Media Security
 
Connecting Online
Connecting OnlineConnecting Online
Connecting Online
 
Dark side presentation lwhippedtc515
Dark side presentation lwhippedtc515Dark side presentation lwhippedtc515
Dark side presentation lwhippedtc515
 
Final Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayFinal Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research Essay
 
ppt on child pornography and cyber crime
ppt on child pornography and cyber crimeppt on child pornography and cyber crime
ppt on child pornography and cyber crime
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
document on cyber terrorism
document on cyber terrorismdocument on cyber terrorism
document on cyber terrorism
 
Presentation on Software Piracy
Presentation on Software PiracyPresentation on Software Piracy
Presentation on Software Piracy
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th Graders
 
Social Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social MediaSocial Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social Media
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
E crime thesis Cyber Crime and its several types
E crime thesis  Cyber Crime and its several typesE crime thesis  Cyber Crime and its several types
E crime thesis Cyber Crime and its several types
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Greendeana unit 8 project cj216 copy
Greendeana unit 8 project cj216 copyGreendeana unit 8 project cj216 copy
Greendeana unit 8 project cj216 copy
 

Destacado

Privacy vs. Security: A False Trade-Off?
Privacy vs. Security: A False Trade-Off? Privacy vs. Security: A False Trade-Off?
Privacy vs. Security: A False Trade-Off? Kelly Shortridge
 
data mining privacy concerns ppt presentation
data mining privacy concerns ppt presentationdata mining privacy concerns ppt presentation
data mining privacy concerns ppt presentationiWriteEssays
 
GAME ON! Integrating Games and Simulations in the Classroom
GAME ON! Integrating Games and Simulations in the Classroom GAME ON! Integrating Games and Simulations in the Classroom
GAME ON! Integrating Games and Simulations in the Classroom Brian Housand
 
Study: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving CarsStudy: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving CarsLinkedIn
 

Destacado (6)

Privacy vs. Security: A False Trade-Off?
Privacy vs. Security: A False Trade-Off? Privacy vs. Security: A False Trade-Off?
Privacy vs. Security: A False Trade-Off?
 
data mining privacy concerns ppt presentation
data mining privacy concerns ppt presentationdata mining privacy concerns ppt presentation
data mining privacy concerns ppt presentation
 
Cooking Up Some Creative CLIL Recipes
Cooking Up Some Creative CLIL RecipesCooking Up Some Creative CLIL Recipes
Cooking Up Some Creative CLIL Recipes
 
GAME ON! Integrating Games and Simulations in the Classroom
GAME ON! Integrating Games and Simulations in the Classroom GAME ON! Integrating Games and Simulations in the Classroom
GAME ON! Integrating Games and Simulations in the Classroom
 
Study: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving CarsStudy: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving Cars
 
8 Tips for an Awesome Powerpoint Presentation
8 Tips for an Awesome Powerpoint Presentation8 Tips for an Awesome Powerpoint Presentation
8 Tips for an Awesome Powerpoint Presentation
 

Similar a T. tighe privacy vs safety flipbook v2

Flipbook online privacy
Flipbook online privacyFlipbook online privacy
Flipbook online privacyTyler Shackman
 
Film 260 flipbook
Film 260 flipbookFilm 260 flipbook
Film 260 flipbookJulie Coles
 
The Mobile Media Addiction
The Mobile Media AddictionThe Mobile Media Addiction
The Mobile Media AddictionEvan Konarek
 
Digital Citizenship Conversations
Digital Citizenship ConversationsDigital Citizenship Conversations
Digital Citizenship ConversationsDarren Kuropatwa
 
Digital Privacy flipbook
Digital Privacy flipbookDigital Privacy flipbook
Digital Privacy flipbookCameron Piening
 
Internet Privacy: Does it Truly Exist?
Internet Privacy: Does it Truly Exist?Internet Privacy: Does it Truly Exist?
Internet Privacy: Does it Truly Exist?Kristen_T
 
Mobilities Throughout The Ages
Mobilities Throughout The AgesMobilities Throughout The Ages
Mobilities Throughout The Agesrebeccajmckee
 
Freedom and Privacy in the Mobile World
Freedom and Privacy in the Mobile WorldFreedom and Privacy in the Mobile World
Freedom and Privacy in the Mobile WorldJessie Helfrich
 
Relationships In A Digital World
Relationships In A Digital WorldRelationships In A Digital World
Relationships In A Digital WorldMariaAlauddin
 
Hacking - how accessible is it?
Hacking - how accessible is it?Hacking - how accessible is it?
Hacking - how accessible is it?CPPGroup Plc
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar ReportArindam Sarkar
 
How Much Is Too Much?
How Much Is Too Much?How Much Is Too Much?
How Much Is Too Much?Monty Bassin
 
Smartphones with Smarter Apps
Smartphones with Smarter AppsSmartphones with Smarter Apps
Smartphones with Smarter AppsSara Dow
 
Is it safe to bank on our phones?
Is it safe to bank on our phones?Is it safe to bank on our phones?
Is it safe to bank on our phones?Queen's University
 

Similar a T. tighe privacy vs safety flipbook v2 (20)

Flipbook online privacy
Flipbook online privacyFlipbook online privacy
Flipbook online privacy
 
Film 260 flipbook
Film 260 flipbookFilm 260 flipbook
Film 260 flipbook
 
The Mobile Media Addiction
The Mobile Media AddictionThe Mobile Media Addiction
The Mobile Media Addiction
 
Digital Citizenship Conversations
Digital Citizenship ConversationsDigital Citizenship Conversations
Digital Citizenship Conversations
 
Digital Privacy flipbook
Digital Privacy flipbookDigital Privacy flipbook
Digital Privacy flipbook
 
Internet Privacy: Does it Truly Exist?
Internet Privacy: Does it Truly Exist?Internet Privacy: Does it Truly Exist?
Internet Privacy: Does it Truly Exist?
 
Film 315 Presentation
Film 315 PresentationFilm 315 Presentation
Film 315 Presentation
 
Film 315 presentation
Film 315 presentationFilm 315 presentation
Film 315 presentation
 
Mobilities Throughout The Ages
Mobilities Throughout The AgesMobilities Throughout The Ages
Mobilities Throughout The Ages
 
Freedom and Privacy in the Mobile World
Freedom and Privacy in the Mobile WorldFreedom and Privacy in the Mobile World
Freedom and Privacy in the Mobile World
 
Film 315 slides
Film 315 slidesFilm 315 slides
Film 315 slides
 
Film project 2
Film project 2Film project 2
Film project 2
 
Relationships In A Digital World
Relationships In A Digital WorldRelationships In A Digital World
Relationships In A Digital World
 
Hacking - how accessible is it?
Hacking - how accessible is it?Hacking - how accessible is it?
Hacking - how accessible is it?
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 
How Much Is Too Much?
How Much Is Too Much?How Much Is Too Much?
How Much Is Too Much?
 
Smartphones with Smarter Apps
Smartphones with Smarter AppsSmartphones with Smarter Apps
Smartphones with Smarter Apps
 
Untitled1
Untitled1Untitled1
Untitled1
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Is it safe to bank on our phones?
Is it safe to bank on our phones?Is it safe to bank on our phones?
Is it safe to bank on our phones?
 

Último

Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一Fs
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa494f574xmv
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Sonam Pathan
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Paul Calvano
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMartaLoveguard
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Excelmac1
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxDyna Gilbert
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Lucknow
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一Fs
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一z xss
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一Fs
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhimiss dipika
 

Último (20)

Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptx
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...
 
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptx
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhi
 

T. tighe privacy vs safety flipbook v2

  • 1. PRIVACY vs SAFETY? Our Quest For Security In The Mobile Age Image by dbbent (via Flickr)By Tanya Tighe
  • 2. Not long ago… …we brought our cell phones with us in case of emergency and ‘pay as you go’ made sense. Image by yisris (via Flickr )
  • 3. OnStar technology was a revelation, offering the luxury of increased security and safety… …anywhere your car could take you. Image by aaronparecki (via Flickr)
  • 4. Most people carry a mapping option in their purse or pocket Image by Johan Larsson (via Flickr) Today, driving without GPS technology is rare.
  • 5. One of the keys to the success of mobile technology is it helps fulfil the fundamental human need for safety and security. Image by dullhunk (via Flickr) It helps keep us safe…
  • 6. Image by Keoni Cabral (via Flickr) “Amber Alert GPS lets you track your child's whereabouts and receive emails and texts if an alert is triggered” “It even notifies you if your child comes within 500 feet of a registered sex offender’s residence and gives your child the ability to use an SOS button if they need immediate help.” Excerpt from Mashable.com’s 8 Apps and Gadgets to Keep Track of Your Child
  • 7. What is the cost of this sense of security? Is privacy too high a price? “ “NSA surveillance reform bill passes House by 303 votes to 121” “Some members of Congress were worried that the bill will fail to prevent the National Security Agency from continuing to collect large amounts of data on ordinary US citizens.” Image by quinn.anya (via Flickr) Excerpts selected from The Guardian http://www.theguardian.com/world/2014/may/22/nsa-reform-bill-usa-freedom-act-passes-house
  • 8. “Your Social Insurance Number and other data may have been stolen as a result of a security bug in code used by two-thirds of "secure" websites on the internet — including Canada Revenue Agency — as well as mobile apps, email and chat servers, VPN clients and hardware devices such as routers.” Excerpts selected from CBC http://www.cbc.ca/news/technology/heartbleed-web- security-bug-what-you-need-to-know-1.2603988 Image by snoopsmaus (via Flickr)
  • 9. “US officials said more than 500,000 computers in more than 100 countries had been infected by BlackShades” Excerpt selected from BBC http://www.bbc.com/news/uk-27471218 “the Blackshades Remote Access Tool (RAT)—allows criminals to steal passwords and banking credentials; hack into social media accounts; access documents, photos, and other computer files; record all keystrokes; activate webcams; hold a computer for ransom; and use the computer in distributed denial of service (DDoS) attacks” “One case of BlackShades use documented by Europol involved an 18-year-old man from the Netherlands who allegedly infected roughly 2,000 computers to take photos of women and girls who were using the machines.” Excerpts selected from FBI.gov http://www.fbi.gov/news/stories/2014/may/international-blackshades- malware-takedown Flickr photo by Nomadic Lass
  • 10. Excerpt from Global News http://globalnews.ca/news/1345492/ebay-security-breach-might-also-affect-kijiji-paypal-users/ “eBay urged its users to change their account passwords, after a cyber attack compromised its database.” Image by Intel Free Press (via Flickr)
  • 11. Image by elhombredenegro (via Flickr) Who are we trusting with our information; are they trustworthy?
  • 12. Image By Mike Licht NotionsCapital.com (via Flicker) Do we know who is watching us?
  • 13. Image by Jim Barter (via Flickr) Is the perception of increased security misleading?
  • 14. The current of technology is moving the world forward at a fast pace. Are we staying afloat, or getting swept under? 5 years ago, did you know what a push notification was? Image by iwolkow.de (via Flickr)
  • 15. Advancing technology will always offer benefits and present challenges. Image by wwarby (via Flickr)
  • 16. http://www.cnet.com/news/blackshades- malware-takedown-ends-in-100-arrests- worldwide/ Society must strive to understand the hazards and implement preventive measures to mitigate the risks associated with utilizing mobile technology. Image by Alan Cleaver (via Flickr)
  • 17. Image by Uncaino (via Flickr) Increased awareness and vigilance is our responsibility.
  • 18. If we value our privacy we MUST demand it be protected. It is a choice to stand up for privacy and safety. This is not a choice between privacy or safety. Image by limaoscarjuiliet (via Flickr)
  • 19. Image Credits Images Under Creative Commons License 2.0: Attribution https://creativecommons.org/licenses/by/2.0/ Slide2: Image by yisris (via Flickr) Slide3: Image by aaronparecki (via Flickr) Slide 4: Image by Johan Larsson (via Flickr) Slide 5: Image by dullhunk (via Flickr) Slide 6: Image by Keoni Cabral (via Flickr) Slide 10: Image by Intel Free Press (via Flickr) Slide 12: Image by Mike Licht NotionsCapital.com (via Flickr) Slide 13: Image by Jim Barter (via Flickr) Slide 14: Image by iwolkow.de (via Flickr) Slide 15: Image by wwarby (via Flickr) Slide 18: Image by Alan Cleaver (via Flickr) Slide19: Image by Uncaino (via Flickr) Slide18: Image by limaoscarjuliet (via Flickr) Images Under Creative Commons License SA 2.0: Attribution and ShareAlike https://creativecommons.org/licenses/by-sa/2.0/ • Slide 1: Image by dbbent (via Flickr) • Slide 7: Image by quinn.anya (via Flickr) • Slide 8: Image by snoopsmaus (via Flickr) • Slide 9: Image by Nomadic Lass (via Flickr) • Slide 11: Image by elhombredenegro (via Flickr)
  • 20. References Slide 6: Selected excerpt from Mashable.com’s 8 Apps and Gadgets to Keep Track of Your Child http://mashable.com/2013/07/15/child-tracking-apps/ Slide 7: Excerpts selected from The Guardian.com http://www.theguardian.com/world/2014/may/22/nsa-reform-bill-usa-freedom-act-passes-house Slide 8 & 17: Excerpts selected from CBC.ca http://www.cbc.ca/news/technology/heartbleed-web-security-bug-what-you-need-to-know-1.2603988 Slide 9: Excerpts selected from FBI.gov http://www.fbi.gov/news/stories/2014/may/international-blackshades-malware-takedown Slide 10: Selected excerpt from Global News http://globalnews.ca/news/1345492/ebay-security-breach-might-also-affect-kijiji-paypal-users/