• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
 

Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY

on

  • 193 views

CLASS GROUP PROJECT

CLASS GROUP PROJECT

Statistics

Views

Total Views
193
Views on SlideShare
193
Embed Views
0

Actions

Likes
0
Downloads
3
Comments
0

0 Embeds 0

No embeds

Accessibility

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY Presentation Transcript

    • By: Monika Dari-Suru, Patience Akota Images by: Billard D. Social Media and the Future of Privacy/security.
    • WHAT IS PRIVACY AND SECURITY? Image by: Dawson Jacob
    • Privacy and security • Privacy is the state or condition of being free from being observed or disturbed by other people or from public attention. • Security is freedom from danger, risk, when somebody is safe Image by: memeburn
    • Privacy and safety wasn’t an issue until now, when internet is growing and affecting every people on a daily basis. Image by: memeburn
    • Will you have privacy and security online in the future? Image by: kersten Denise
    • David Rowan (CNN, 2013), editor of technology magazine “Wired” said that “our concept our privacy is very much a 20th century idea. All that personal data you are giving to these private companies, they are making money on and they decide how it is going to be used.
    • He continues “you lose control of that data.” He also added that “anybody who is using any kind of electronic device is giving up the practical ability to be untraceable.”
    • http://youtu.be/uZ8d2P53N1w The following link shows us a video about how the future online privacy will be.
    • Challenges and fear • Eye-tracking technology has been in the news lately, thanks to rumors indicating that it would be included in the new Samsung Galaxy S4. • Researchers note that its potential future impact on our privacy is huge. Images by: Eye tracking Inc
    • • Did our eyes linger for a few seconds on an advertisement that, in the end, we decided not to click on? • How do our eyes move as they take in the contents of a page? • Are there certain words, phrases, or topics that we appear to prefer or avoid? • In the future, will we be served online ads based not only on what we’ve shopped for, but also on the thoughts reflected in our eye movements?“ Image by: Posel Susanne
    • Richard Tso journalist in the following article talks about how eye-tracking technology will change the advertising game in the future. http://www.huffingtonpost.co m/richard-tso/eye-tracking- technologies_b_3457397.html
    • Challenges and fear cont’ Once the technology for eye-tracking is in place, it will glean information conveying not only what we read online, but also how we read it," writes UCLA electrical engineering professor John Villasenor. Image by: Eye tracking Inc.
    • Challenges and fear cont’ In the future, will we be served online ads based not only on what we’ve shopped for, but also on the thoughts reflected in our eye movements?"
    • Consequences Tracking and collecting data on our eye movements could reveal a lot about us, such as whether a person has an alcohol abuse problem or cognitive disorder, and even information on our intelligence and sexual orientation.
    • Hackers & Cyber bullying Images by: I’m Every Woman
    • Unfortunately criminals have found the way to exploit the beneficial aspects of the internet. • Child predators use the anonymity of the internet to prey on children • Terrorist can use the internet to communicate other team members
    • •Hackers use the internet to get information about other people • Cyber bullying nowadays can ruin people’s life as the torment, threat, harassment, humiliation does not stop but keep going at night and on the weekends too. Images by: Kirschenbaum Daniel
    • Hackers & Cyber bullying cont’ As per as Andrew Keen, who is a privacy advocate said “the future will be characterized by reputation wars where will be increasingly defined by our digital reputations” (Vox Media, 2013). Hackers are a huge threat against personal privacy , and in the future, no one but the wealthy and powerful will be able to afford anonymity (Vox Media, 2013).
    • Bullying caused so many young person to commit suicide. This video by Denzel Washington shows how bullying can lead to suicide. http://www.youtube.com/watch?v=tWKsMagy4Ls
    • Connections to people The Internet is not only a place to be connected with people, It's also a place for people or companies to pick up even more information about you. That includes your address, gender, date of birth and, with a little sleuthing, your Social Security number and credit history. Image by: Lara Gallaway
    • . Then there's all the data you pour into social media sites such as Facebook, Twitter, Tumblr, Instagram, Foursquare and others. Now employers can fire workers for expressing opinions they don’t like, strangers can stalk you with mobile apps and college administrators can judge the quality of applicants by the number of drinking photos posted to their account.
    • Openness data sharing: medical information
    • Health care system must have the capacity to learn and adapt to keep information in the future safe but accessible. Under the 1996 Health Insurance Portability and Accountability Act (HIPAA), the Department of Health and Human Services developed a set of federal standards to protect privacy of individuals health record (IMRVSHC, 2010). Openness data sharing: medical information cont’
    • Openness data sharing: medical information cont’ But would that work in the future? Do we create data or evidence? Although this subject still facing numerous challenges, the fundamental tension must be navigated between adoption and interoperability.
    • Public relation and privacy When real estate search site Zillow (http://www.zillow.com/) first came out, many people were shocked at the amount of information on it including their physical address, aerial house photos and the price paid for their homes. All the information comes from public records.
    • Public relations and privacy cont’ Other sites, such as Arrests.org, list mug shots by state. And some local police departments are now posting photos of recent arrests on Facebook. Now with the Internet and databases, public records are easy to distribute and see.
    • Be aware There’s nothing you can do in the electronic world that your boss can’t find and you can’t be fired for”, said Lewis Maltby, president of National Workrights Institute. “
    • Your future in peril! People’s futures are in peril every time their boss or college admissions office looks on the Internet. That means users shouldn’t post photos of themselves with an alcoholic drink in their hand or espouse political views, because it can lead to a value judgment.
    • Quote “You can still go online and say what you want, but you’re crazy if you do.” Maltby Lewis. Image by: Lara Gallaway
    • Loosing privacy Another problem today is that social networks becoming a larger part of one’s life. To comment on articles, people log into a Facebook or twitter account first. Others are finding that their Google+ social account is being attached to their Gmail account and will be needed to comment on apps or games on Google Play. Google+ accounts are also used to sign into YouTube and other Google sites. Many social networks are trying to end anonymous posting.
    • Quote “To preserve privacy, a person would have to walk away from Google or Facebook. “It’s a trade- off to some extent.” Adi Kamdar
    • Whatever you place online stays online Users can save themselves some headaches by understanding that whatever they place online will stay online. Nothing online is temporary; instead, it's more like an Internet tattoo. Martinson’s online (and likely late- night) outburst will follow her throughout college and possibly the workforce, according to CNN.
    • Your posting is not private Remember that what you post can be seen by others. Be careful of what you say and which photos are posted because it could potentially be seen by millions of people. • Image by Stephens Lisa
    • Don’t Let Social Media Stand in the Way of Getting Your Dream Job
    • As a new grad, You’ve already worked hard during your college career and accomplished a lot, but you may also be facing bleak employment prospects. In a tough economy, employers can afford to be more selective about hiring new talent than ever. That means it’s not just your educational success, your experience, or even your confidence and charisma under scrutiny. When reviewing your resume and references, don’t be surprised if prospective employers take a virtual stroll through your Facebook profile too.
    • Take Control of Your Online Reputation • Find out what is on the Internet about you • Evaluate your online reputation • Protect your online reputation • Polish your professional reputation • Restore your online reputation More information on Microsoft safety and security http://www.microsoft.com/security/online- privacy/reputation.aspx
    • Conclusion Privacy concerns regarding the internet are very important in our fast growing society. Secrecy and privacy are often conflated. All the data on people are being collected is gradually building a permanent profile on that person. Neutrality deals with access to the internet, but identity deals with the nature how the internet itself works.
    • ReferencesBillard David (2012). Convenience vs. security. Cyberhood watch. Retrieved from: http://thecyberhoodwatch.com/cyber-security/convenience-security-security-privacy- cispa-copa-pipa-internet/ Source for the image used in this project. http://memeburn.com/2011/05/tech-titans-grilled-by-us-lawmakers-on-online-privacy/ CNN. (2013). Will we care about online privacy in 20 years? Retrieved from http://www.cnn.com/2013/04/09/tech/privacy-outdated-digital-age This article talks about the debate over online privacy in the future that the launch of Facebook brought into light. Dawson Jacob (2012). How to keep your online privacy safe. ComputerHowToGuide.com retrieved from: http://www.computerhowtoguide.com/2012/06/how-to-keep-your- online-privacy- Source for the image used in this project Emspak Jesse (2013). How Facebook Home Undermines Your Security. Tech News Daily. Retrieved from: http://www.technewsdaily.com/17794-facebook-home-security- privacy.html This article talks about how the “Facebook Home app”, can undermine the security o your privacy by allowing the home screen of an Android phone change from the usual lockscreen or picture to a stream of updates from your Facebook friends called Cover Feed. Thus, it disables the lockscreen on the HTC, even if a PIN passcode is enabled. Eye Tracking Inc. (2011).What is eye tracking? Retrieved from: http://www.eyetracking.com/About-
    • References cont’ • Franceschi-Bicchierai Lorenzo (2013). Is eye tracking a privacy-invading technology? Mashable. Retrieved from: http://mashable.com/2013/05/8/eye-tracking-technology-privacy/ T This article talks about the new eye tracking technology and how this technology would have a great impact on our privacy because of its ability to glean information conveying not only what we read online, but also how we read it. • Frierson William (2013). Don’t let social media stand in the way of getting your dream job. Retrieved from: http://www.collegerecruiter.com/blog/2013/07/24/dont-let-social-media-stand-in-the-way of-getting-your- dream-job/ This article talks about the significant of building and maintaining a good online reputation for a new grad and how the new grads can successfully do this especially for the purpose of landing their dream job. • Hernandez E. Barbara (2013). What Does the Internet Know About You? TechNewsDaily. Retrieved from: http://mashable.com/2013/04/30/what-internet-knows-about-you/ This article talks about how other people can track, search and use the information you put with examples of situation where it has occurred. • I’m Every Woman (2012). What I’ve Learned About: Hacking and Bullies on Facebook http://i2ameverywoman.wordpress.com/2010/04/22/what-ive-learned-about-spamming-bullies-on-facebook/ Source for the image used in this project • Kersten Denise (2009). Feel Like Someone's Watching? You're Probably Right. HRPeople. Retrieved from: http://hrpeople.monster.com/news/articles/2322-feel-like-someones-watching-youre-probably-right Source for the image used in this project • Kirschenbaum Daniel (2013). Computer-hacker. Flash Routers. Retrieved from: http://www.flashrouters.com/blog/2013/04/24/your-router-is-not-secure-how-flashrouters-can-help/computer- hacker/ Source for the image used in this project
    • References cont’ • Institute of Medicine (US) Roundtable on Value & Science-Driven Health Care. (IMRVSHC). (2010). Clinical Data as the Basic Staple of the Learning Health System. Retrieved from http://www.ncbi.nlm.nih.gov /books/NBK54306/ This article talks about the importance of having health care information accessible for health care workers, but at the same time there is a privacy issue. The health care system has shifted from paper based to web based, but we have to see how this is protecting the individual’s privacy. There are different laws that protect privacy and confidentiality, but it is not fully implemented and we don’t know that if it will be working in the future. • Lara Galloway (2012). Tips for social media success. Mom Biz Coach. Retrieved from: http://mombizcoach.com/social-media-success#.UfhqZY3D_IW Source for the image used in this project • Lisa Stephens (2011). Survey: IT professionals fear social media use at work may pose threat. Technorati. Retrieved from: http://technorati.com/business/advertising/article/survey-it-professionals-fear-social- media/ Source for the image used in this project • Microsoft (2013). Take charge of your online reputation. Safety and Security Center. Retrieved from: http://www.microsoft.com/security/online- privacy/reputation.aspx This came from Microsoft safety and security center, advising people on how to maintain their privacy and secure their information online.
    • References cont’ • Posel Susanne (2012).Blue eyes originated 10,000 years ago in the black sea region. Occupy Corporatism. Retrieved from: http://www.occupycorporatism.com/blue-eyes- originated-10000-years-ago-in-the-black-sea-region/ Source for the image used in this project • Tso Richard. ( ). How Eye-tracking Technologies Will Change the Advertising Game. Retrieved from http://www.huffingtonpost.com/richard-tso/eye-tracking- technologies_b_3457397.html • Vox Media. (2013). Hacking the future: Cole Stryker on why identity is the web’s next battleground. Retrieved from http://www.theverge.com/2012/9/14/3329752/ hacking-the-future-cole-stryker-interview In this article Cole Stryker talks about his new book, Hacking the Future: Privacy, Identity, and Anonymity on the Web, and talks about how identity is perspective, but also is a huge concern when it comes to the internet. • YouTube. (2013). When bullying leads to suicide: RIP Cade Parker this tribute is for you  Retrieved from http://www.youtube.com/watch?v=tWKsMagy4Ls Source for the image used in this project