SlideShare una empresa de Scribd logo
1 de 27
Privacy and Me in a Web 2.0 World Colin Fitz-Maurice Jessica McDade Lee Reynolds Lamar Middleton
What is Internet Security? Internet security is a branch of computer security specifically related to the Internet. Its objective is to establish rules and measures to use against attacks over the Internet. Preston (2007)
Internet Privacy Law Internet Security Suits and Programs follow Internet Privacy Laws to protect you. Since no formal law exists within cyberspace, Internet users can find recourse only through the applicable laws of their own government. Walton Privacy is a GUARANTEED right      in the Bill of Rights
5 Dimensions of privacy… Search & Seizure Unsolicited E-mail Defamation Secrecy Illegal Database Formation
Liability For Internet Usage Anonymity should NEVER be assumed on the internet. Users can be held liable for everything they provide to the internet Everything has a digital signature and can be traced
Data Security on the Internet Three Main Concepts Privacy Confidentiality  Consent
Privacy The right of an individual to: Determine what information is collected about them and how it is used Access information held about them and know that it is accurate and secure Anonymity (not having your Web browsing habits tracked) The sending  and receiving of     e-mail messages or other data
Confidentiality The principle of keeping data secure and secret from others Protection of information given by or about an individual in the course of a professional relationship
Consent The means by which we are authorized by an individual to process information about them based on their informed understanding of what we intend.
A Good Quote.. As more and more people are realizing, we often reveal a lot of information about ourselves when we go online, information we may not realize we’re disclosing, but which advertisers and commercial websites can use to sell us goods and services. Voice of America
Six Tips on Protecting Your Internet Privacy
1. Use of Proxy Servers A proxy server is a physical server between your computer and the destination website to service The destination server receives information on the proxy server not you! Reinforces the idea of anonymity
2. Use of Independent Search Engines AVOID using you ISP’s (Internet Service Provider) search engine. search.comcast.net search.aol.com Since you pay for their internet service they track everything you do USE: Google.com Yahoo.com
3. Deny Usage of Cookies A “cookie” is a packet of information that is received from the referencing website and saved by your computer The cookie tracks browsing habits and reports them back to the server from which it came Can be easily intercepted
4. Caution to Adware and Spyware Adware and Spyware are application ( or viruses ) that can be installed on your computer through a “dirty” download These products track how you use your computer and report it back to the appropriate service that can then “spam” your email or advertise pop-ups
5. Disable Auto Complete Auto complete can be very useful, but very dangerous Any internet browser that you use tracks how you use it Any information that it saves is sent back to the creating company so that they can improve     their software
6. Avoid Lots of Website Registrations Simply, the more sites you sign up for the more databases your information is in The more sites you sign up for the greater the risk that it’s services may not be trusted All sites have the right to share user information with whom they wish, you never know which site may choose to do this
Social Networking Sites Social networking sites propose the largest risk for personal information to be available to the public!! “The current self regulatory regime of contracts between the social networking sites and its users via privacy policy is insufficient to protect the interests of the users.”  Connie Powell
Examples Internationally people are more concerned with internet privacy then secret government surveillance  Very confidential 16% Not confidential                    32% Perceptions of Facebook’s security Confidential 28% Less confidential                         24%
Exerts from the Testimony of Gordon M. Snow,Assistant Director,Federal Bureau of Investigation United States Department of Justice “a ‘Getting To Know You’ quiz sent to a large list of social networking site users, while not appearing malicious, may mimic the same questions that are asked by financial institutions or e-mail account providers when the individual has forgotten their password. An e-mail address in the answer to the quiz questions can provide the cyber-criminal with the tools to enter your bank account, your e-mail account or credit card in order to transfer money or siphon off your savings and investments.” Criminals are high-jacking into e-mail and social networking accounts and sending a financial distress message.  Friends willing to help are given the criminals account number where they can wire money. Criminals have targeted houses when they know that       no one is home based on their Facebook status or       information they shared on other social       networking sites.
How-To Stay Safe on Facebook  Contextual privacy control- allows users to control who is able to see their posts on a post by post basis.  They can share a photo with only a few close friends, or share something non-personal with everyone using this control. Be aware of what you post on     friends walls, you don’t know      what their security settings are     and who can see their page!!
Facebook Privacy Checklist Suggested by Carlton Collins Use “Lists” to organize your friends Hide your friends list from non-friends Click the pencil icon in the Friends box on your profile page, making sure the Show Friend List to Everyone box is unchecked. Thereafter, non-friends who view your profile will be unable to see your list of friends.  Protect yourself from Facebook advertisers Facebook’s advertisers deposit tracking cookies on your computer. To protect yourself consider opting out of the placement of these cookies by member companies of the .Network Advertising Initiative at tinyurl.com/2wh5sj. Source, and more tips:  http://ehis.ebscohost.com/eds/detail?sid=5dffd04c-c8f7-4de7-8847- 5b623e8b0696%40sessionmgr104&vid=36&hid=116&bdata=JnNpdGU9ZWRzLWxpdmUmc2NvcGU9c2l0ZQ%3d%3d#db=lgh&AN=51200997
General Tips Watch what you say on the internet, you never know who is reading!! Avoid “sketchy” websites or services Always adjust a website’s privacy settings Always read the terms of agreement before signing up for a website!!
Thank You For Listening  - Colin, Jessica, Lee & Lamar
Sources: Asiimwe, Edgar Napoleon.  Opinions of  Social Web Users on Privacy and Online DAM.  Journal of Digital Asset Management, Dec2010, Vol. 6 Issue 6, p312-318, 7p; DOI: 10.1057/dam.2010.37 Collins, J. (2010). Fortify Your Facebook Privacy Settings. Journal of Accountancy, 209(6), 42-45. Retrieved from EBSCOhost. Goldsborough, R. (2010). Are You Protecting Your Privacy Online?. Teacher Librarian, 37(5), 72. Retrieved from EBSCOhost. Powell, C. (2011). "You already have zero privacy. Get over it!" Would Warren and Brandeis Argue for Privacy for Social Networking?. Pace Law Review, 31(1), 146-181. Retrieved from EBSCOhost. Privacy online [electronic resource] : fair information practices in the electronic marketplace : a report to Congress / U.S. Federal Trade Commission. (2000). [Washington, DC : The Commission, 2000]. Retrieved from JAMES MADISON UNIV's Catalog database. Semitsu, Junichi P. From Facebook to Mug Shot: How the Dearth of Social Networking Privacy Rights Revolutionized Online Government Surveillance. Pace Law Review, Jan2011, Vol. 31 Issue 1, preceding p291-381; , 92p Sipior, Janice C.; Ward, Burke T.; Mendoza, Ruben A. Online Privacy Concerns Associated with Cookies, Flash Cookies, and Web Beacons. Journal of Internet Commerce (J INTERNET COMMERCE), 2011; 10(1): 1-16 (37 ref) SUN SUN, L., HICHANG, C., & SANCHEZ, M. (2009). Online Privacy, Government Surveillance and National ID Cards. Communications of the ACM, 52(12), 116-120. Retrieved from EBSCOhost. Walton, Timothy J.  Internet Privacy Law, Online publication of Internet Privacy Laws. Internet Attorney, 2000. Source Retrieved 6/22/11 http://www.bcs.org/content/conWebDoc/15574 http://www.voanews.com/english/news/science-technology/a-13-2008-04-29-voa44.html  (Voice of America) Secturity, Privacy, and confidentiality issues on the Internet, Grant Kelly and Bruce Mckenzie J Med Interent Research. 2002 Oct-Dec 4(2): e12   Gralla, Preston (2007). How the Internet Works. Que Pub, Indianapolis.

Más contenido relacionado

La actualidad más candente

The Dark Side of Social Media: Privacy Concerns
The Dark Side of Social Media: Privacy ConcernsThe Dark Side of Social Media: Privacy Concerns
The Dark Side of Social Media: Privacy ConcernsCorinne Weisgerber
 
Misuse of social media
Misuse of social mediaMisuse of social media
Misuse of social mediaAM Oh
 
The Interwoven Complexities of Social Media, Privacy and Data Security
The Interwoven Complexities of Social Media, Privacy and Data SecurityThe Interwoven Complexities of Social Media, Privacy and Data Security
The Interwoven Complexities of Social Media, Privacy and Data SecurityArmstrong Teasdale
 
Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235brendaylo
 
Misuse of personal information
Misuse of personal informationMisuse of personal information
Misuse of personal informationZev Aidikoff
 
Is your data secure? privacy and trust in the social web
Is your data secure?  privacy and trust in the social webIs your data secure?  privacy and trust in the social web
Is your data secure? privacy and trust in the social webPhil Cryer
 
Managing Social Media in the Workplace
Managing Social Media in the WorkplaceManaging Social Media in the Workplace
Managing Social Media in the WorkplaceEric Swenson
 
Social Media and Online Investigation Of Claims
Social Media and Online Investigation Of ClaimsSocial Media and Online Investigation Of Claims
Social Media and Online Investigation Of ClaimsDano0403
 
parent_teacher_tutorial
parent_teacher_tutorialparent_teacher_tutorial
parent_teacher_tutorialtutorialsruby
 
Email And Social Networking
Email And Social NetworkingEmail And Social Networking
Email And Social NetworkingHeather Grimes
 
Opt out-3 jul2014
Opt out-3 jul2014Opt out-3 jul2014
Opt out-3 jul2014Naval OPSEC
 
Online Privacy in the Year of the Dragon
Online Privacy in the Year of the DragonOnline Privacy in the Year of the Dragon
Online Privacy in the Year of the DragonPhil Cryer
 
Draft for prezi and poster
Draft for prezi and posterDraft for prezi and poster
Draft for prezi and postervictoriahoo
 

La actualidad más candente (20)

The Dark Side of Social Media: Privacy Concerns
The Dark Side of Social Media: Privacy ConcernsThe Dark Side of Social Media: Privacy Concerns
The Dark Side of Social Media: Privacy Concerns
 
Social Media Security
Social Media SecuritySocial Media Security
Social Media Security
 
Misuse of social media
Misuse of social mediaMisuse of social media
Misuse of social media
 
Social media-threats
Social media-threatsSocial media-threats
Social media-threats
 
The Interwoven Complexities of Social Media, Privacy and Data Security
The Interwoven Complexities of Social Media, Privacy and Data SecurityThe Interwoven Complexities of Social Media, Privacy and Data Security
The Interwoven Complexities of Social Media, Privacy and Data Security
 
Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235
 
Misuse of personal information
Misuse of personal informationMisuse of personal information
Misuse of personal information
 
Is your data secure? privacy and trust in the social web
Is your data secure?  privacy and trust in the social webIs your data secure?  privacy and trust in the social web
Is your data secure? privacy and trust in the social web
 
Managing Social Media in the Workplace
Managing Social Media in the WorkplaceManaging Social Media in the Workplace
Managing Social Media in the Workplace
 
Social media for attorneys 2.0
Social media for attorneys 2.0Social media for attorneys 2.0
Social media for attorneys 2.0
 
Social media-threats
Social media-threatsSocial media-threats
Social media-threats
 
Social Media and Online Investigation Of Claims
Social Media and Online Investigation Of ClaimsSocial Media and Online Investigation Of Claims
Social Media and Online Investigation Of Claims
 
Facebook
FacebookFacebook
Facebook
 
MY_SNS
MY_SNSMY_SNS
MY_SNS
 
parent_teacher_tutorial
parent_teacher_tutorialparent_teacher_tutorial
parent_teacher_tutorial
 
Email And Social Networking
Email And Social NetworkingEmail And Social Networking
Email And Social Networking
 
Opt out-3 jul2014
Opt out-3 jul2014Opt out-3 jul2014
Opt out-3 jul2014
 
Online Privacy in the Year of the Dragon
Online Privacy in the Year of the DragonOnline Privacy in the Year of the Dragon
Online Privacy in the Year of the Dragon
 
Social Networking and E-discovery
Social Networking and E-discoverySocial Networking and E-discovery
Social Networking and E-discovery
 
Draft for prezi and poster
Draft for prezi and posterDraft for prezi and poster
Draft for prezi and poster
 

Destacado (10)

Nanjing Roadside Memorial Presentation
Nanjing Roadside Memorial PresentationNanjing Roadside Memorial Presentation
Nanjing Roadside Memorial Presentation
 
Criminology powerpoint one
Criminology powerpoint oneCriminology powerpoint one
Criminology powerpoint one
 
Twitter tweet presentation_2011
Twitter tweet presentation_2011Twitter tweet presentation_2011
Twitter tweet presentation_2011
 
Nust presentation
Nust presentationNust presentation
Nust presentation
 
Roadside memorial powerpointv6
Roadside memorial powerpointv6Roadside memorial powerpointv6
Roadside memorial powerpointv6
 
Criminology Powerpoint One 2008
Criminology Powerpoint One 2008Criminology Powerpoint One 2008
Criminology Powerpoint One 2008
 
Crim methods2
Crim methods2Crim methods2
Crim methods2
 
Social problems of_alcohol_drugs_mental_health
Social problems of_alcohol_drugs_mental_healthSocial problems of_alcohol_drugs_mental_health
Social problems of_alcohol_drugs_mental_health
 
Community Presentation
Community PresentationCommunity Presentation
Community Presentation
 
Communication Strategies
Communication StrategiesCommunication Strategies
Communication Strategies
 

Similar a Group 2 privacy and me in a web 2.0 world final

Privacy and Social Networks
Privacy and Social NetworksPrivacy and Social Networks
Privacy and Social Networksblogzilla
 
Mark Rogers' Social Network Presentation
Mark Rogers' Social Network PresentationMark Rogers' Social Network Presentation
Mark Rogers' Social Network PresentationMark Rogers
 
Lis 768 Privacy Presentation
Lis 768 Privacy PresentationLis 768 Privacy Presentation
Lis 768 Privacy PresentationJulia Bryan-Diehl
 
Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Kirsten Thompson
 
Chapter 8 Big Data and Privacy
Chapter 8 Big Data and PrivacyChapter 8 Big Data and Privacy
Chapter 8 Big Data and PrivacySolomben
 
Team Lecture Presentation 2
Team Lecture Presentation 2Team Lecture Presentation 2
Team Lecture Presentation 2Nick Buonvicino
 
Chapter 8 big data and privacy - social media 3533
Chapter 8  big data and privacy - social media 3533Chapter 8  big data and privacy - social media 3533
Chapter 8 big data and privacy - social media 3533Hubbamar
 
Lecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxLecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxDominicCaling
 
Data privacy over internet
Data privacy over internetData privacy over internet
Data privacy over internetdevashishicai
 
CSUN - Youth Driven Information Privacy Education Campaign
CSUN - Youth Driven Information Privacy Education CampaignCSUN - Youth Driven Information Privacy Education Campaign
CSUN - Youth Driven Information Privacy Education CampaignKimberly Gonzalez
 
Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptxAchu69
 
An Attorney’S Guide To Managing Social Media Based Evidence 03142011
An Attorney’S Guide To Managing Social Media Based Evidence 03142011An Attorney’S Guide To Managing Social Media Based Evidence 03142011
An Attorney’S Guide To Managing Social Media Based Evidence 03142011larrylieb
 
2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptxSSPTRGCELL
 
Privacy and personal information presention of professional practice.pptx
Privacy and personal information presention of professional practice.pptxPrivacy and personal information presention of professional practice.pptx
Privacy and personal information presention of professional practice.pptxsadia456189
 
Iot privacy vs convenience
Iot privacy vs  convenienceIot privacy vs  convenience
Iot privacy vs convenienceDon Lovett
 
19012021039_Assignment-FCL.dcx
19012021039_Assignment-FCL.dcx19012021039_Assignment-FCL.dcx
19012021039_Assignment-FCL.dcxPateljignesh40
 
Social Media Privacy
Social Media PrivacySocial Media Privacy
Social Media PrivacyLisa Turner
 

Similar a Group 2 privacy and me in a web 2.0 world final (20)

Privacy and Social Networks
Privacy and Social NetworksPrivacy and Social Networks
Privacy and Social Networks
 
Mark Rogers' Social Network Presentation
Mark Rogers' Social Network PresentationMark Rogers' Social Network Presentation
Mark Rogers' Social Network Presentation
 
Lis 768 Privacy Presentation
Lis 768 Privacy PresentationLis 768 Privacy Presentation
Lis 768 Privacy Presentation
 
Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?
 
Chapter 8 Big Data and Privacy
Chapter 8 Big Data and PrivacyChapter 8 Big Data and Privacy
Chapter 8 Big Data and Privacy
 
Team Lecture Presentation 2
Team Lecture Presentation 2Team Lecture Presentation 2
Team Lecture Presentation 2
 
Chapter 8 big data and privacy - social media 3533
Chapter 8  big data and privacy - social media 3533Chapter 8  big data and privacy - social media 3533
Chapter 8 big data and privacy - social media 3533
 
Lecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxLecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptx
 
Data privacy over internet
Data privacy over internetData privacy over internet
Data privacy over internet
 
CSUN - Youth Driven Information Privacy Education Campaign
CSUN - Youth Driven Information Privacy Education CampaignCSUN - Youth Driven Information Privacy Education Campaign
CSUN - Youth Driven Information Privacy Education Campaign
 
Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptx
 
Internet Privacy Essay
Internet Privacy EssayInternet Privacy Essay
Internet Privacy Essay
 
Social Media and the Law
Social Media and the LawSocial Media and the Law
Social Media and the Law
 
An Attorney’S Guide To Managing Social Media Based Evidence 03142011
An Attorney’S Guide To Managing Social Media Based Evidence 03142011An Attorney’S Guide To Managing Social Media Based Evidence 03142011
An Attorney’S Guide To Managing Social Media Based Evidence 03142011
 
2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx
 
Privacy and personal information presention of professional practice.pptx
Privacy and personal information presention of professional practice.pptxPrivacy and personal information presention of professional practice.pptx
Privacy and personal information presention of professional practice.pptx
 
Social Networking
Social NetworkingSocial Networking
Social Networking
 
Iot privacy vs convenience
Iot privacy vs  convenienceIot privacy vs  convenience
Iot privacy vs convenience
 
19012021039_Assignment-FCL.dcx
19012021039_Assignment-FCL.dcx19012021039_Assignment-FCL.dcx
19012021039_Assignment-FCL.dcx
 
Social Media Privacy
Social Media PrivacySocial Media Privacy
Social Media Privacy
 

Último

PSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptxPSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptxMarlene Maheu
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽中 央社
 
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxAnalyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxLimon Prince
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...EADTU
 
How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17Celine George
 
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjStl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjMohammed Sikander
 
diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....Ritu480198
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...Nguyen Thanh Tu Collection
 
UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024Borja Sotomayor
 
The Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDFThe Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDFVivekanand Anglo Vedic Academy
 
male presentation...pdf.................
male presentation...pdf.................male presentation...pdf.................
male presentation...pdf.................MirzaAbrarBaig5
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxannathomasp01
 
Rich Dad Poor Dad ( PDFDrive.com )--.pdf
Rich Dad Poor Dad ( PDFDrive.com )--.pdfRich Dad Poor Dad ( PDFDrive.com )--.pdf
Rich Dad Poor Dad ( PDFDrive.com )--.pdfJerry Chew
 
Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...EduSkills OECD
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsSandeep D Chaudhary
 
e-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopale-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi RajagopalEADTU
 
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMDEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMELOISARIVERA8
 

Último (20)

PSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptxPSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptx
 
Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
 
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxAnalyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
 
How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17
 
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjStl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
 
Including Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdfIncluding Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdf
 
diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 
UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024
 
The Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDFThe Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDF
 
male presentation...pdf.................
male presentation...pdf.................male presentation...pdf.................
male presentation...pdf.................
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
Rich Dad Poor Dad ( PDFDrive.com )--.pdf
Rich Dad Poor Dad ( PDFDrive.com )--.pdfRich Dad Poor Dad ( PDFDrive.com )--.pdf
Rich Dad Poor Dad ( PDFDrive.com )--.pdf
 
Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...
 
VAMOS CUIDAR DO NOSSO PLANETA! .
VAMOS CUIDAR DO NOSSO PLANETA!                    .VAMOS CUIDAR DO NOSSO PLANETA!                    .
VAMOS CUIDAR DO NOSSO PLANETA! .
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
e-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopale-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopal
 
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMDEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
 

Group 2 privacy and me in a web 2.0 world final

  • 1. Privacy and Me in a Web 2.0 World Colin Fitz-Maurice Jessica McDade Lee Reynolds Lamar Middleton
  • 2. What is Internet Security? Internet security is a branch of computer security specifically related to the Internet. Its objective is to establish rules and measures to use against attacks over the Internet. Preston (2007)
  • 3. Internet Privacy Law Internet Security Suits and Programs follow Internet Privacy Laws to protect you. Since no formal law exists within cyberspace, Internet users can find recourse only through the applicable laws of their own government. Walton Privacy is a GUARANTEED right in the Bill of Rights
  • 4. 5 Dimensions of privacy… Search & Seizure Unsolicited E-mail Defamation Secrecy Illegal Database Formation
  • 5. Liability For Internet Usage Anonymity should NEVER be assumed on the internet. Users can be held liable for everything they provide to the internet Everything has a digital signature and can be traced
  • 6. Data Security on the Internet Three Main Concepts Privacy Confidentiality Consent
  • 7. Privacy The right of an individual to: Determine what information is collected about them and how it is used Access information held about them and know that it is accurate and secure Anonymity (not having your Web browsing habits tracked) The sending and receiving of e-mail messages or other data
  • 8. Confidentiality The principle of keeping data secure and secret from others Protection of information given by or about an individual in the course of a professional relationship
  • 9. Consent The means by which we are authorized by an individual to process information about them based on their informed understanding of what we intend.
  • 10.
  • 11. A Good Quote.. As more and more people are realizing, we often reveal a lot of information about ourselves when we go online, information we may not realize we’re disclosing, but which advertisers and commercial websites can use to sell us goods and services. Voice of America
  • 12. Six Tips on Protecting Your Internet Privacy
  • 13. 1. Use of Proxy Servers A proxy server is a physical server between your computer and the destination website to service The destination server receives information on the proxy server not you! Reinforces the idea of anonymity
  • 14. 2. Use of Independent Search Engines AVOID using you ISP’s (Internet Service Provider) search engine. search.comcast.net search.aol.com Since you pay for their internet service they track everything you do USE: Google.com Yahoo.com
  • 15. 3. Deny Usage of Cookies A “cookie” is a packet of information that is received from the referencing website and saved by your computer The cookie tracks browsing habits and reports them back to the server from which it came Can be easily intercepted
  • 16. 4. Caution to Adware and Spyware Adware and Spyware are application ( or viruses ) that can be installed on your computer through a “dirty” download These products track how you use your computer and report it back to the appropriate service that can then “spam” your email or advertise pop-ups
  • 17. 5. Disable Auto Complete Auto complete can be very useful, but very dangerous Any internet browser that you use tracks how you use it Any information that it saves is sent back to the creating company so that they can improve their software
  • 18. 6. Avoid Lots of Website Registrations Simply, the more sites you sign up for the more databases your information is in The more sites you sign up for the greater the risk that it’s services may not be trusted All sites have the right to share user information with whom they wish, you never know which site may choose to do this
  • 19. Social Networking Sites Social networking sites propose the largest risk for personal information to be available to the public!! “The current self regulatory regime of contracts between the social networking sites and its users via privacy policy is insufficient to protect the interests of the users.” Connie Powell
  • 20. Examples Internationally people are more concerned with internet privacy then secret government surveillance Very confidential 16% Not confidential 32% Perceptions of Facebook’s security Confidential 28% Less confidential 24%
  • 21.
  • 22. Exerts from the Testimony of Gordon M. Snow,Assistant Director,Federal Bureau of Investigation United States Department of Justice “a ‘Getting To Know You’ quiz sent to a large list of social networking site users, while not appearing malicious, may mimic the same questions that are asked by financial institutions or e-mail account providers when the individual has forgotten their password. An e-mail address in the answer to the quiz questions can provide the cyber-criminal with the tools to enter your bank account, your e-mail account or credit card in order to transfer money or siphon off your savings and investments.” Criminals are high-jacking into e-mail and social networking accounts and sending a financial distress message. Friends willing to help are given the criminals account number where they can wire money. Criminals have targeted houses when they know that no one is home based on their Facebook status or information they shared on other social networking sites.
  • 23. How-To Stay Safe on Facebook Contextual privacy control- allows users to control who is able to see their posts on a post by post basis. They can share a photo with only a few close friends, or share something non-personal with everyone using this control. Be aware of what you post on friends walls, you don’t know what their security settings are and who can see their page!!
  • 24. Facebook Privacy Checklist Suggested by Carlton Collins Use “Lists” to organize your friends Hide your friends list from non-friends Click the pencil icon in the Friends box on your profile page, making sure the Show Friend List to Everyone box is unchecked. Thereafter, non-friends who view your profile will be unable to see your list of friends. Protect yourself from Facebook advertisers Facebook’s advertisers deposit tracking cookies on your computer. To protect yourself consider opting out of the placement of these cookies by member companies of the .Network Advertising Initiative at tinyurl.com/2wh5sj. Source, and more tips: http://ehis.ebscohost.com/eds/detail?sid=5dffd04c-c8f7-4de7-8847- 5b623e8b0696%40sessionmgr104&vid=36&hid=116&bdata=JnNpdGU9ZWRzLWxpdmUmc2NvcGU9c2l0ZQ%3d%3d#db=lgh&AN=51200997
  • 25. General Tips Watch what you say on the internet, you never know who is reading!! Avoid “sketchy” websites or services Always adjust a website’s privacy settings Always read the terms of agreement before signing up for a website!!
  • 26. Thank You For Listening - Colin, Jessica, Lee & Lamar
  • 27. Sources: Asiimwe, Edgar Napoleon. Opinions of Social Web Users on Privacy and Online DAM. Journal of Digital Asset Management, Dec2010, Vol. 6 Issue 6, p312-318, 7p; DOI: 10.1057/dam.2010.37 Collins, J. (2010). Fortify Your Facebook Privacy Settings. Journal of Accountancy, 209(6), 42-45. Retrieved from EBSCOhost. Goldsborough, R. (2010). Are You Protecting Your Privacy Online?. Teacher Librarian, 37(5), 72. Retrieved from EBSCOhost. Powell, C. (2011). "You already have zero privacy. Get over it!" Would Warren and Brandeis Argue for Privacy for Social Networking?. Pace Law Review, 31(1), 146-181. Retrieved from EBSCOhost. Privacy online [electronic resource] : fair information practices in the electronic marketplace : a report to Congress / U.S. Federal Trade Commission. (2000). [Washington, DC : The Commission, 2000]. Retrieved from JAMES MADISON UNIV's Catalog database. Semitsu, Junichi P. From Facebook to Mug Shot: How the Dearth of Social Networking Privacy Rights Revolutionized Online Government Surveillance. Pace Law Review, Jan2011, Vol. 31 Issue 1, preceding p291-381; , 92p Sipior, Janice C.; Ward, Burke T.; Mendoza, Ruben A. Online Privacy Concerns Associated with Cookies, Flash Cookies, and Web Beacons. Journal of Internet Commerce (J INTERNET COMMERCE), 2011; 10(1): 1-16 (37 ref) SUN SUN, L., HICHANG, C., & SANCHEZ, M. (2009). Online Privacy, Government Surveillance and National ID Cards. Communications of the ACM, 52(12), 116-120. Retrieved from EBSCOhost. Walton, Timothy J. Internet Privacy Law, Online publication of Internet Privacy Laws. Internet Attorney, 2000. Source Retrieved 6/22/11 http://www.bcs.org/content/conWebDoc/15574 http://www.voanews.com/english/news/science-technology/a-13-2008-04-29-voa44.html (Voice of America) Secturity, Privacy, and confidentiality issues on the Internet, Grant Kelly and Bruce Mckenzie J Med Interent Research. 2002 Oct-Dec 4(2): e12 Gralla, Preston (2007). How the Internet Works. Que Pub, Indianapolis.