Onlineprivacy
Upcoming SlideShare
Loading in...5
×
 

Onlineprivacy

on

  • 1,346 views

"Online Privacy" presentation for LIS 768, Dominican University, GSLIS.

"Online Privacy" presentation for LIS 768, Dominican University, GSLIS.

Statistics

Views

Total Views
1,346
Views on SlideShare
1,346
Embed Views
0

Actions

Likes
0
Downloads
17
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment
  • http://static.berryreview.com/wp-content/uploads/2008/03/starwars_kid.jpg
  • http://static.berryreview.com/wp-content/uploads/2008/03/starwars_kid.jpg

Onlineprivacy Onlineprivacy Presentation Transcript

  • ONLINE PRIVACY
    How and why we should teach the risks and tools associated with online privacy and social networking
    By
    • Dan Mauller
    • Leslie Westerberg
    • Mike Hominick
    • Julia Bryan-Diehl
    Fall 2009
  • Presentation
    • In this presentation, we will discuss:
    The history of privacy and online social networking
    Perceptions of privacy
    Privacy risks and consequences
    Tools for teaching privacy
  • A Brief History of Online Social Networking
  • What is Online Social Networking?
    • Construct a public or semi-public profile within a bounded system
    • Articulate a list of other users with whom they share a connection
    • View and traverse their list of connections and those made by others within the system. The nature and nomenclature of these connections may vary from site to site
  • 1945: Memex
    • First mention of personal computer
    • “Wholly new forms of encyclopedias will appear, ready-made with a mesh of associative trails running through them, ready to be dropped into the memex and there amplified.”
    • Predicted many kinds of technology invented such as the Internet the World Wide Web and Wikipedia
  • 1962: Advanced Research Project Agency
    • Resulted in the creation of commercial time-sharing systems
    • Ultimately led to the internet
    • “There has to be some way of facilitating communication among people without bringing them together in one place.”
    - Dr. J.C.R. Licklider
  • 1960’s-1970’s: Electronic Mail
    • 1965 - First email system was MAILBOX, used at MIT
    • Email could only be used to send messages to various users of the same computer.
    • With computer internetworking, electronic mail required an address just like the postal system
    • 1972 – Ray Tomlinson is credited with inventing email
  • 1980’s: Bulletin Board Systems
    • Online meeting places
    • Allowed users to communicate with a central system
    • Could download files or games (many times including pirated software) and post messages to other users.
  • BBS: FidoNet
    How to set up an account:
    • Gain a basic understanding of Fidonet and your software. Download the POLICY4.ZIP document from a nearby FidoNet BBS. Read this thoroughly.
    • Then read it again. Do the same with your software's documentation. You will also need a current copy of the FidonetNodelist.
    • Set up your BBS. Make sure it operates correctly, to the best of your knowledge.
    • Follow, to the letter, the procedure outlined in POLICY4 for joining Fidonet. The request *MUST* come in as a Netmail message. This shows the NC that your system is indeed capable of exchanging mail -- the basic requirement for membership. Do NOT request a node number in a LOCAL message on your NC's system, it will only delay the process, and may even be simply ignored.
    • Be patient. It may take up to 2 weeks for your request to be fully processed and appear in the Nodelist. Remember that your NC may not be able to contact you at all until your address becomes official.
  • 1989 through Early 1990’s: America Online
    • At it’s peak, had over 30 million members
    • Began as forum to play video games and track high scores
    • Created concept of chat rooms
  • 1997: Sixdegrees
    • Many consider this the first social networking site
    • Allowed users to create profiles
    • List their Friends
    • Surf the Friends lists
  • 2002: Friendster
    • Friends of Friends meet
    • Send invitations, messages, blog
    • “One of the biggest disappointments in Internet history”
  • 2003: MySpace
    • Began to promote independent music and the socialite scene across the globe
    • Personalized Pages
    • Significant drop in usage in United States
  • 2003: Linkedin
    • Networking
    • Make “connections”
    • Over 30 million business people are members
  • 2005: YouTube
    • Share videos
    • Censored and criticized for content
    • “Embodies and promotes democracy”
  • 2004: Facebook
    • Needed school email to join
    • Personalized profiles
    • Corporations are advertising on site
    • Controversies over personal data control
  • 2006: Twitter
    • Contacts stay in touch
    • Growing news source
    • 40% of users are retained
    • Excruciating minutia?
  • Recent Backlash
    • Privacy Concerns
    • Advertisers targeting users
    • Offensive material
    • “…may share your information with third parties, including responsible companies with which we have a relationship.”
    Do concerns outweigh appeal?
  • Addressing Privacy Concerns
    Issues must be addressed as online social networking reaches a larger audience.
  • Defining Online Privacy
  • Privacy is NOT solitude
    • Essentially meaningless in the context of Social Networks
    • Teens want to be connected 24/7
  • Is privacy anonymity?
    • Anonymity precludes the need for privacy
    but…
    • Can you be sure you’re anonymous online?
  • What about secrecy?
    • Remember – once posted, information is in the public sphere
    • Best way to keep a secret: Don’t share it!
  • Underlying Issue: Control
    • You have NO control over the information others share…even if it’s about you!
    • You CAN control the information YOU share (and access to it!)
  • Don’t I Have a Right to Privacy?
    The constitution only guarantees freedom from governmental intrusion
  • Something to Know About…
    Deleting Online Predators Act of 2006
    • Intended to Protect Children
    • Could require libraries to block access to Social Networking Sites
    • PROBLEM : Too Broadly Defined
    • Amazon.com
    • Educational Sites
    “We know that the best way to protect children is to teach them to guard their privacy and make wise choices. “ -Former ALA President Michael Gorman
  • Teens and Privacy
  • Good news!
    • According to Pew (2007):
    • 66% of teens use privacy controls to limit access to their personal information
    • Only 6% make public their first and last names (first name + photo is the norm)
  • However…
    Teens Think It’s Always OK to Share Publicly:
    • Their age
    • Their e-mail address
    • Personal Photos
    Teens Think It’s Never OK to Share Publicly:
    • Their home address
    • Their home phone number
    • Their Social Security number
  • Teens Think It’s Sometimes OK to Share Publicly:
    • Their cell phone number
    • The town they live in
    • The school they attend
    • Their Zip Code
  • Bottom Line:
    • Only you can decide what level of privacy you are comfortable with – know the risks!
    • Think about how you want to control your personal information before you share it
    • “Don’t talk to strangers” is useless advice in an online context
    • Remember: Social Sites are considered PUBLIC space
    • Learn how to use the tools that give you control
  • Social Networking and Privacy Risks
  • Why should we care about the risks?
    • “Opting out” of social networking and the Internet in general is not the solution!
    • Participation in social networking sites has become almost “automatic”
    • We should be aware of what we are posting on sites because our intent IS to share this information
    • But with who?
    • A lot is at stake!
  • What do you want to “risk” being seen?
    • On most sites, the privacy default is set to allow the maximum number of people to see your profile
    • On Facebook, by leaving your settings to the default your profile can be seen by your entire network
    • Average percentage of entire Facebook community = 0.5%
    • On MySpace – it is ENTIRE MySpace community
    • Despite these statistics, many users don’t utilize the privacy settings
  • What is it you’re sharing?
    • Full Name
    • Hometown
    • Address
    • Employer
    • Phone Number
    • Relationship Status
    • College Attending/Attended
    • E-mail
    • Lots more!
    • Full Name
    • Location
    • Employer
    • Income
    • Children?
    • Interests
    • Blog
    • Sexual Orientation
    • Lots more!
    Facebook
    MySpace
  • So, who’s paying attention anyways?
    • Prospective employers
    • Prospective colleges
    • Friends
    • Family
    • Campus community
    • Professors
    • Police Officers
    • Student Affairs Professionals
    • People who could do damaging things?
  • Are you being watched?
    • Maybe?
    • Students at George Washington U thought campus police were monitoring their Facebook activity
    • Decided to advertise that they were having a “keg party” using Facebook
    • Police DID show up to the “keg party”
    • The keg party consisted of a group of students eating cupcakes with the word “beer” written on them
    • Confirmed their belief that university and police officials WERE monitoring their activity!
  • Who are we affecting when we post other people’s information?
    • How many of you have heard of the “Star Wars Kid”?
    • Seen by millions and millions of viewers
    Not just ourselves!
    Have you seen me?
  • What happened to him?
    • People remixed the video of him with special effects and Star Wars music, “mashed” it with other movies
    • Appeared in a video game and on several TV shows
    • Since, the (then) 15-year-old kid has:
    • Dropped out of school
    • Gone to counseling
    • More or less disappeared
  • Whose reputation are you ruining?
    • What employees post during the work day and what they post about their company are things they SHOULD be aware they will be held accountable for
    • What are companies doing?
    • Social media policies
    • Companies like IBM developing extensive policies – must be signed and read each year
    • Outlines that you must be upfront about your identity and position at IBM when blogging and what constitutes “suitable behavior” on social media sites (such as Twitter and Facebook)
  • How about our own reputation being at stake?
    • We usually take pride in our reputation
    • We rely on it for a number of things
    • Whether someone wants to befriend us
    • How we are received by others
    • Whether someone wants to date us
    • Whether to hire someone
    • Whether to undertake a business deal
  • So, what can happen when OUR reputation gets damaged?
    • We can get fired!
    • Please, excuse this language:
  • “Facebook fired”
    Yes, it’s even in Urban Dictionary!
  • “Don’t let Twitter get you fired in 140 characters or less”
    • Connor Riley, a 22-year-old Masters degree student at the University of California (Berkeley) wrote on Twitter:
    • “Cisco just offered me a job! Now I have to weigh the utility of a fatty paycheck against the daily commute to San Jose and hating the work.”
    • Cisco employee Tim Levad wrote on Twitter:
    • “Who is the hiring manager? I'm sure they would love to know that you will hate the work. We here at Cisco are versed in the Web.”
    She said…
    He said…
  • So what happened?
    • This exchange now known as the “Cisco fatty” incident
    • Riley wrote an apology post on her personal blog
    • Turned down the job offer…
    • …which may have been rescinded anyways
    “Cisco Fatty”
    Don’t let your Twitter account kick you in the butt!
  • Or, people can just not take us seriously…
    Do you remember this guy?
  • Jon Favreau
    • President Obama’s speechwriter throughout his campaign for president
    • Tagged in a photo on Facebook
    • One of his friends posted photo on a website for a total of TWO hours
    • Which was TWO hours too many to be leaked across the world…
    • Still Obama’s chief speechwriter
    • He took down all photos but one on his Facebook profile
    • Apologized profusely to Clinton and her team
  • Employers Not Taking Us Seriously…
    • A substantial proportion of employers are screening social networking sites before they hire a prospective employee
    • 35% of employers have not hired someone because of something they found online
  • So…who else is paying attention?
    • We don’t even know!
    • Nearly 4 in 10 Facebook and Twitter users have posted specifics on holiday plans or statuses on holiday getaways
    • Increases risk of break-in
    • Posting even your birthday on Facebook can allow others to “predict” your SSN
    • In new study, researchers were able to predict SSN of recently born with 60% accuracy (of 1000 tries)
    • Can be used to steal identity and/or open credit cards in someone’s name
  • Tools and Methods for Protecting your Online Image
  • You CAN protect your online privacy and reputation with just a few simple steps
  • Facebook
    • Adjust your Privacy Settings
    • Read the fine print on all those applications and quizzes
    • Consider using separate Facebook profiles for your professional and social life
    • Be mindful about what you post
  • flickr
    • Adjust your Privacy and Permissions settings, your Profile privacy, and your account search options
    • Consider licensing your photos under a Creative Commons license
    • Again, be careful about what you share
  • Google
    • Google yourself and seewhatpopsup
    • Contact the site's webmaster to see if you can have unwanted information removed
    • Consider signing up for an online monitoring service such as ReputationDefender.com
  • Twitter
    • Twitter is generally considered a fairly public platform, but there are still steps that you can take to make your content more private if you prefer:
    • Protect your Tweets
    • Hide your location information
    • One more time: be mindful about what you post
  • And in general…
    • Always be sure to readthefineprint before signing up for a new online tool
    • Check regularly for new or altered online content- BE VIGILANT!
    Finally (all together now): Be mindful about what you post or share!
  • Citations
    • Barnes, Susan B. “A privacy paradox: Social networking in the United States.” First Monday 11.9 (2006). http://firstmonday.org/issues/issue11_9/barnes/index.html. 8 Dec. 2009.
    • Blakley, Bob. “What is Privacy, Really?” 12 September 2006. The Burton Group. http://podcast.burtongroup.com/ip/files/what_is_privacy_really.pdf 10 Dec 2009.
    • Brandenburg, Carly. "The Newest Way to Screen Job Applicants: A Social Networker's Nightmare." Federal Communications Law Journal 60.3 (2008): 597-626. Academic Search Premier. Web. 1 Dec. 2009.
    • Claburn, Thomas. "Social Security Number Prediction Makes Identity Theft Easy." InformationWeek (2009). Http://www.informationweek.com. 7 July 2009. Web. 1 Dec. 2009. <http://www.informationweek.com/news/security/privacy/showArticle.jhtml?articleID=218400854>.
    • Couch, C. (2009). Fix Twitter and Facebook. Time Out Chicago Retrieved December 7,2009, from http://chicago.timeout.com/articles/features/81016/fix-twitter-and-facebook
    • Ensign, E. (2009). Facebook Quitters. Time Out Chicago. Retrieved December 7, 2009 from http://chicago.timeout.com/articles/features/81051/love-your-online-life-again
    • "Forty-five Percent of Employers Use Social Networking Sites to Research Job Candidates, CareerBuilder Survey Finds". CareerBuilder.com. CareerBuilder.com, 19 Aug. 2009. Web. 5 Dec. 2009 <http://www.careerbuilder.com/share/aboutus/pressreleasesdetail.aspx?id=pr519&sd=8%2f19%2f2009&ed=12%2f31%2f2009&siteid=cbpr&sc_cmp1=cb_pr519_>
    • George, Alison. "Things You Wouldn't Tell Your Mother." New Scientist 191.2569 (2006): 50-51. Academic Search Premier. Web. 1 Dec. 2009.
    • Gonsalves, Antone. "Social Networkers Risk More than Just Privacy." Information Week (2009). Information Week. 27 Aug. 2009. Web. 1 Dec. 2009. <http://www.informationweek.com/news/internet/social_network/showArticle.jhtml?articleID=219500360http://www.informationweek.com/news/internet/social_network/showArticle.jhtml?articleID=219500360>.
  • Citations
    • Fidonet. (Full Date of publication). How to Join Fidonet. Fidonet.com. Retrieved November 20, 2009, from http://www.fidonet.org/old/genlinfo.html
    • Haythornthwaite, C. (1996). Social network analysis: An approach and set of techniques for the study of information exchange. Library and Information Science Research, 18(4), 323-342.
    • “How To Protect, Fix Your Online Reputation: Expert Explains Dangers Of Negative Web Postings, And Tells How To Avoid And Repair Them". CBS News.com: The Early Show. CBS Corporation, 10 Jan. 2009. Web. 5 Dec. 2009 http://www.cbsnews.com/stories/2009/01/10/earlyshow/main4711988.shtml
    • Huang, Phil "How You Can Protect Public Access Computers and Their Users." Computers in Libraries 27.5 (2007): 16-20. ERIC. EBSCO. Web. 8 Dec. 2009.
    • "Internet, communications and other technologies". Australian Government: Office of the Privacy Commissioner. Australian Government, n.d. Web. 5 Dec. 2009 http://www.privacy.gov.au/topics/technologies
    • Kamen, Al. "One More Question." The Washington Post. 4 Dec. 2008. Web. 1 Dec. 2009. <http://voices.washingtonpost.com/44/2008/12/04/one_more_question.html>.
    • Kaste, Martin. "Is Your Facebook Profile As Private As You Think?". NPR.org: All Things Considered. National Public Radio, 27 Oct. 2009. Web. 5 Dec. 2009 <http://www.npr.org/templates/story/story.php?storyId=114187478&sc=emaf>
    • Kluth, Andreas. "The Perils of Sharing." Economist (2008): 28. Print.
    • Kranich, Nancy "Librarians and Teen Privacy in the Age of Social Networking." Knowledge Quest 36.(2007): 34-37. ERIC. EBSCO. Web. 8 Dec. 2009.
    • Lenhart, Amanda and Mary Madden. “Teens, Privacy & Online Social Networks: How teens manage their online identities and personal information in the age of MySpace.” Pew Internet and American Life Project (18 April 2007). 11 Dec 2009. http://www.atg.was.gov/uploadedFiles/Another/Office_Initiatives/Teens,Privacy%20and%20Social%20Networks.pdf
  • Citations
    • Lorenz, Kate. "Employers are digging up your digital dirt". The Work Buzz. CareerBuilder.com, 19 Aug. 2009. Web. 5 Dec. 2009 <http://www.theworkbuzz.com/job-surveys/social-network/>
    • MacMillan, Douglas. "A Twitter Code of Conduct." BusinessWeek (2009): 26. Academic Search Premier. Web. 1 Dec. 2009.
    • Mangla, Ismat Sarah. "Fired for Facebook: Don't Let it Happen to You." CNN. 21 Apr. 2009. Web. 3 Dec. 2009. <http://www.cnn.com>.
    • McConnell, B. (2008). Social Networks from the 80’s to the 00’s. Gigaom Retrieved November 16, 2009, from http://gigaom.com/2008/01/20/social-networks-from-the-80s-to-the-00s/
    • Mitrano, Tracy "A Wider World: Youth, Privacy, and Social Networking Technologies." EDUCAUSE Review 41.(2006): 16-18,. ERIC. EBSCO. Web. 8 Dec. 2009.
    • Nyce and Kahn (n.d.) Vannevar Bush and MemexThe World Wide Web: the Beginning and Now Retrieved November 16, 2009, fromhttp://www-personal.umich.edu/~mattkaz/history/memex3.html
    • O'Neill, Nick. "10 Privacy Settings Every Facebook User Should Know". All Facebook. n.p, 2 Feb. 09. Web. 5 Dec. 2009 http://www.allfacebook.com/2009/02/facebook-privacy/
    • Perez, Sarah. "5 Easy Steps to Stay Safe (and Private!) on Facebook". ReadWriteWeb. n.p., 16 Sep. 2009. Web. 5 Dec. 2009 <http://www.readwriteweb.com/archives/5_easy_steps_to_stay_safe_and_private_on_facebook.php>
    • Peter, I. (2004). History of Email. Net History. Retrieved November 16, 2009, from http://www.nethistory.info/History%20of%20the%20Internet/email.html
    • Popkin, Helen A.S. "Twitter Gets You Fired in 140 Characters or Less." MSNBC. 23 Mar. 2009. Web. 1 Dec. 2009. <http://www.msnbc.com>.
  • Citations
    • "Rules and Tools for Protecting Personal Privacy Online". Online Privacy Alliance. Online Privacy Alliance, n.d. Web. 5 Dec. 2009 http://www.privacyalliance.org/resources/rulesntools.shtml
    • Schmidt, Cynthia Martin "The Library Media Specialist's Role in Teaching Online Safety." Library Media Connection 28.1 (2009): 10-13. ERIC. EBSCO. Web. 8 Dec. 2009.
    • Sheehan, Kim Bartel “How public opinion polls define and circumscribe online privacy.” First Monday 9.7 (2004). 8 Dec. 2009. http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/1162/1082.
    • Solove, Daniel J. "The End of Privacy?" Scientific American 299.3 (2008): 100-06. Academic Search Premier. Web. 1 Dec. 2009.
    • Sydell, Laura. "Teens Take Advantage of Online Privacy Tools". NPR.org: All Things Considered. National Public Radio, 3 April 2008. Web. 5 Dec. 2009. <http://www.npr.org/templates/story/story.php?storyId=89355786>
    • Timm, Dianne M., and Carolyn J. Duven "Privacy and Social Networking Sites." New Directions for Student Services 124 (2008): 89-102. ERIC. EBSCO. Web. 8 Dec. 2009.
    • U.S. Department of Education “Family Educational Rights and Privacy Act (FERPA).” 8 Dec. 2009. http://www.ed.gov/policy/gen/guid/fpco/ferpa/index.html.
    • West, Heather. “Is Online Privacy a Generational Issue?” Pew Internet & American Life Project, October 1, 2009. 8 Dec. 2009. http://www.pewinternet.org/Media-Mentions/2009/Is-Online-Privacy-a-Generational-Issue.aspx.
    • Wikipedia (2009). YouTube. Wikipedia. Retrieved November 16, 2009, from http://en.wikipedia.org/wiki/YouTube
    • Yadav, Sid (2006). Facebook – The Complete Biography. Mashable: The Social Media Guide Retrieved November 20, 2009, from http://mashable.com/2006/08/25/facebook-profile/
    • Young Adult Library Serivices Association. “DOPA Information Packet: A Resource for Librarians and Library Workers.: 8 August 2006. 12 Dec. 2009 <http://www.ala.org/ala/mgrps/divs/yalsa/profdev/DOPAInfoPacket.pdf>
  • Citations – Images
    • “Defining Online Privacy” - http://www.anniefox.com/parents/images/keep_out_sign.jpg
    • “Privacy is Not Solitude” -http://media.photobucket.com/image/loneliness/spectrojin/loneliness.gif
    • “Is Privacy Anonymity?” -
    • http://www.mathewingram.com/work/wp-content/uploads/anonymity.jpg
    • “What About Secrecy?” - http://www.psychologicalscience.org/observer/2006/0706/images/secrets.jpg
    • “Don’t I Have a Right to Privacy?” - http://www.wku.edu/Library/dlps/gdoc_pix/We_The_People.jpe
    • “Important Privacy Legislation” – http://upload.wikimedia.org/wikipedia/commons/archive/5/5a/20090613231808!US_Capitol_dome_Jan_2006.jpg
    • “Teens and Privacy” - http://www.reputationdefenderblog.com/wp-content/uploads/2008/12/teens-online-53.jpg
    • “Good News!” - http://www.vikingimporting.com/images/Wraps/ev_confetti.jpg
    • “However…” - http://i153.photobucket.com/albums/s214/emeraldaslgirl08/happy_face.jpg
    • http://2.bp.blogspot.com/_nWpwm6lhWUs/R7yQGWEGTKI/AAAAAAAABm4/FEDdNFFKGXc/s320/Unhappy%2Bface%2BStop.PNG
    • “Danger” - http://www.nmsu.edu/safety/images/signs/sign_danger_lg.GIFhttp://conference.heavy-horse.co.uk/face-surprise.png