Group 2 privacy and me in a web 2.0 world final

769 views
700 views

Published on

This is the assignment

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
769
On SlideShare
0
From Embeds
0
Number of Embeds
3
Actions
Shares
0
Downloads
9
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Group 2 privacy and me in a web 2.0 world final

  1. 1. Privacy and Me in a Web 2.0 World<br />Colin Fitz-Maurice<br />Jessica McDade<br />Lee Reynolds<br />Lamar Middleton<br />
  2. 2. What is Internet Security?<br />Internet security is a branch of computer security specifically related to the Internet. Its objective is to establish rules and measures to use against attacks over the Internet.<br />Preston (2007)<br />
  3. 3. Internet Privacy Law<br />Internet Security Suits and Programs follow Internet Privacy Laws to protect you.<br />Since no formal law exists within cyberspace, Internet users can find recourse only through the applicable laws of their own government.<br />Walton<br />Privacy is a GUARANTEED right <br /> in the Bill of Rights<br />
  4. 4. 5 Dimensions of privacy…<br />Search & Seizure<br />Unsolicited E-mail<br />Defamation<br />Secrecy<br />Illegal Database Formation<br />
  5. 5. Liability For Internet Usage<br />Anonymity should NEVER be assumed on the internet.<br />Users can be held liable for everything they provide to the internet<br />Everything has a digital signature and can be traced<br />
  6. 6. Data Security on the Internet<br />Three Main Concepts<br />Privacy<br />Confidentiality <br />Consent <br />
  7. 7. Privacy<br />The right of an individual to:<br />Determine what information is collected about them and how it is used<br />Access information held about them and know that it is accurate and secure<br />Anonymity (not having your Web browsing habits tracked)<br />The sending and receiving of <br /> e-mail messages or other data<br />
  8. 8. Confidentiality<br />The principle of keeping data secure and secret from others<br />Protection of information given by or about an individual in the course of a professional relationship <br />
  9. 9. Consent<br />The means by which we are authorized by an individual to process information about them based on their informed understanding of what we intend. <br />
  10. 10.
  11. 11. A Good Quote..<br />As more and more people are realizing, we often reveal a lot of information about ourselves when we go online, information we may not realize we’re disclosing, but which advertisers and commercial websites can use to sell us goods and services.<br />Voice of America<br />
  12. 12. Six Tips on Protecting Your Internet Privacy<br />
  13. 13. 1. Use of Proxy Servers<br />A proxy server is a physical server between your computer and the destination website to service<br />The destination server receives information on the proxy server not you!<br />Reinforces the idea of anonymity<br />
  14. 14. 2. Use of Independent Search Engines<br />AVOID using you ISP’s (Internet Service Provider) search engine.<br />search.comcast.net<br />search.aol.com<br />Since you pay for their internet service they track everything you do<br />USE:<br />Google.com<br />Yahoo.com<br />
  15. 15. 3. Deny Usage of Cookies<br />A “cookie” is a packet of information that is received from the referencing website and saved by your computer<br />The cookie tracks browsing habits and reports them back to the server from which it came<br />Can be easily intercepted<br />
  16. 16. 4. Caution to Adware and Spyware<br />Adware and Spyware are application ( or viruses ) that can be installed on your computer through a “dirty” download<br />These products track how you use your computer and report it back to the appropriate service that can then “spam” your email or advertise pop-ups <br />
  17. 17. 5. Disable Auto Complete<br />Auto complete can be very useful, but very dangerous<br />Any internet browser that you use tracks how you use it<br />Any information that it saves is sent back to the creating company so that they can improve <br /> their software<br />
  18. 18. 6. Avoid Lots of Website Registrations<br />Simply, the more sites you sign up for the more databases your information is in<br />The more sites you sign up for the greater the risk that it’s services may not be trusted<br />All sites have the right to share user information with whom they wish, you never know which site may choose to do this<br />
  19. 19. Social Networking Sites<br />Social networking sites<br />propose the largest risk<br />for personal information to<br />be available to the public!!<br />“The current self regulatory regime of contracts between the social networking sites and its users via privacy policy is insufficient to protect the interests of the users.” <br />Connie Powell<br />
  20. 20. Examples<br />Internationally people are more concerned with internet privacy then secret government surveillance <br />Very confidential<br />16%<br />Not confidential<br /> 32%<br />Perceptions of Facebook’s security<br />Confidential<br />28%<br />Less confidential<br /> 24%<br />
  21. 21.
  22. 22. Exerts from the Testimony of Gordon M. Snow,Assistant Director,Federal Bureau of Investigation United States Department of Justice<br />“a ‘Getting To Know You’ quiz sent to a large list of social networking site users, while not appearing malicious, may mimic the same questions that are asked by financial institutions or e-mail account providers when the individual has forgotten their password. An e-mail address in the answer to the quiz questions can provide the cyber-criminal with the tools to enter your bank account, your e-mail account or credit card in order to transfer money or siphon off your savings and investments.”<br />Criminals are high-jacking into e-mail and social networking accounts and sending a financial distress message. Friends willing to help are given the criminals account number where they can wire money.<br />Criminals have targeted houses when they know that <br /> no one is home based on their Facebook status or <br /> information they shared on other social <br /> networking sites.<br />
  23. 23. How-To Stay Safe on Facebook<br /> Contextual privacy control- allows users to control who is able to see their posts on a post by post basis. They can share a photo with only a few close friends, or share something non-personal with everyone using this control.<br />Be aware of what you post on<br /> friends walls, you don’t know <br /> what their security settings are<br /> and who can see their page!!<br />
  24. 24. Facebook Privacy Checklist Suggested by Carlton Collins<br />Use “Lists” to organize your friends<br />Hide your friends list from non-friends<br />Click the pencil icon in the Friends box on your profile page, making sure the Show Friend List to Everyone box is unchecked. Thereafter, non-friends who view your profile will be unable to see your list of friends. <br />Protect yourself from Facebook advertisers<br />Facebook’s advertisers deposit tracking cookies on your computer. To protect yourself consider opting out of the placement of these cookies by member companies of the .Network Advertising Initiative at tinyurl.com/2wh5sj.<br />Source, and more tips: <br />http://ehis.ebscohost.com/eds/detail?sid=5dffd04c-c8f7-4de7-8847- 5b623e8b0696%40sessionmgr104&vid=36&hid=116&bdata=JnNpdGU9ZWRzLWxpdmUmc2NvcGU9c2l0ZQ%3d%3d#db=lgh&AN=51200997<br />
  25. 25. General Tips<br />Watch what you say on the internet, you never know who is reading!!<br />Avoid “sketchy” websites or services<br />Always adjust a website’s privacy settings<br />Always read the terms of agreement before signing up for a website!!<br />
  26. 26. Thank You For Listening<br /> - Colin, Jessica, Lee & Lamar <br />
  27. 27. Sources:<br />Asiimwe, Edgar Napoleon. Opinions of Social Web Users on Privacy and Online DAM. Journal of Digital Asset Management, Dec2010, Vol. 6 Issue 6, p312-318, 7p; DOI: 10.1057/dam.2010.37<br />Collins, J. (2010). Fortify Your Facebook Privacy Settings. Journal of Accountancy, 209(6), 42-45. Retrieved from EBSCOhost.<br />Goldsborough, R. (2010). Are You Protecting Your Privacy Online?. Teacher Librarian, 37(5), 72. Retrieved from EBSCOhost.<br />Powell, C. (2011). "You already have zero privacy. Get over it!" Would Warren and Brandeis Argue for Privacy for Social Networking?. Pace Law Review, 31(1), 146-181. Retrieved from EBSCOhost.<br />Privacy online [electronic resource] : fair information practices in the electronic marketplace : a report to Congress / U.S. Federal Trade Commission. (2000). [Washington, DC : The Commission, 2000]. Retrieved from JAMES MADISON UNIV's Catalog database.<br />Semitsu, Junichi P. From Facebook to Mug Shot: How the Dearth of Social Networking Privacy Rights Revolutionized Online Government Surveillance. Pace Law Review, Jan2011, Vol. 31 Issue 1, preceding p291-381; , 92p<br />Sipior, Janice C.; Ward, Burke T.; Mendoza, Ruben A. Online Privacy Concerns Associated with Cookies, Flash Cookies, and Web Beacons. Journal of Internet Commerce (J INTERNET COMMERCE), 2011; 10(1): 1-16 (37 ref)<br />SUN SUN, L., HICHANG, C., & SANCHEZ, M. (2009). Online Privacy, Government Surveillance and National ID Cards. Communications of the ACM, 52(12), 116-120. Retrieved from EBSCOhost.<br />Walton, Timothy J. Internet Privacy Law, Online publication of Internet Privacy Laws. Internet Attorney, 2000. Source Retrieved 6/22/11<br />http://www.bcs.org/content/conWebDoc/15574<br />http://www.voanews.com/english/news/science-technology/a-13-2008-04-29-voa44.html (Voice of America)<br />Secturity, Privacy, and confidentiality issues on the Internet, Grant Kelly and Bruce Mckenzie J Med Interent Research. 2002 Oct-Dec 4(2): e12 <br />Gralla, Preston (2007). How the Internet Works. Que Pub, Indianapolis.<br />

×