Privacy and Security       in Web 2.0
Our control over privacy
Losing control
Losing control
Losing control
Losing control
Losing control                 Legal?
Personal Information Sharing           Willing to share                                   Unwilling to shareGlobal innovat...
Privacy in Web 2.01 What will be collected and shared?    Explicit: Facebook message, Like friends’ status, tweets    Impl...
SecurityAverage 28.5 people are becoming victims of identity theft each minute in 2006
Security           Phishing
SecurityAverage 28.5 people are becoming victims of identity theft each minute in 2006
Password
Password
Who is responsibleGlobal innovation outlook: Web 2.0. Security, Privacy, and Web 2.0
Security in eCommerce                     Post messages                     Import personal profile                     Aut...
Security in eCommerce                   Firefox, Chrome, CMS     Plugin                     VirusUsers/Developers     Trus...
Security in eCommerce                          Web 2.0 Sites                                           HackingMobile phone...
Upcoming SlideShare
Loading in...5
×

Privacy security

171

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
171
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • Privacy security

    1. 1. Privacy and Security in Web 2.0
    2. 2. Our control over privacy
    3. 3. Losing control
    4. 4. Losing control
    5. 5. Losing control
    6. 6. Losing control
    7. 7. Losing control Legal?
    8. 8. Personal Information Sharing Willing to share Unwilling to shareGlobal innovation outlook: Web 2.0. Security, Privacy, and Web 2.0
    9. 9. Privacy in Web 2.01 What will be collected and shared? Explicit: Facebook message, Like friends’ status, tweets Implicit: Mouse click, mouse movement2 How will our private information be used? 91% Of employers use Twitter, Facebook, and LinkedIn to screen job applicants Facebook can do anything they want with your content (according to their TOS) “(For Google,) the advertisers are the users and you are the product.” -- Don Norman3 How others act?
    10. 10. SecurityAverage 28.5 people are becoming victims of identity theft each minute in 2006
    11. 11. Security Phishing
    12. 12. SecurityAverage 28.5 people are becoming victims of identity theft each minute in 2006
    13. 13. Password
    14. 14. Password
    15. 15. Who is responsibleGlobal innovation outlook: Web 2.0. Security, Privacy, and Web 2.0
    16. 16. Security in eCommerce Post messages Import personal profile AuthenticationWeb 2.0 Site API Crawling Hacking Spamming Light-weight and Service-based
    17. 17. Security in eCommerce Firefox, Chrome, CMS Plugin VirusUsers/Developers Trusting users as co-developers
    18. 18. Security in eCommerce Web 2.0 Sites HackingMobile phones Tablets Laptop/desktop Access via multiple devices

    ×