SlideShare a Scribd company logo
1 of 25
Download to read offline
Error: Your Life Has Been Hacked
How thick is the curtain protecting your privacy on mobile devices?
By: Adelle Leonard
Image: Pexels (Unsplash)
“more than 90% of
Americans feel that
they have lost
control over
personal data”[1]
Image: Pexels (Unsplash)
Yet this is mainly due to our purchase of mobile
devices…
Image: Pexels (Gabriel Freytez)
95% of Americans now own a
cellphone of some kind…[2]
Image: Pexels (Pixabay)
The gateway to our private lives range from our
social media interactions to the types of devices
we own.
Image: Pexels (Stokpic)
“ One of the largest &
most active Flickr groups,
called ‘I Ate This’, includes
more than 300,000
photos…contributed by
more than 19,000
members”[3]
Image: Canberra Centre, 2015 [4]
Simply from what you eat
people can get a sense of
who you areas a person
and where you have
been… ”Tell me what you
eat, I’ll tell you who
you are.”– Jean Anthelme Brillat-Savain [5]
Image: Pexels (freestocks.org)
Computer scientists have concluded that 12 or so
popular Android apps collected device location
coordinates accurate to within 50 meters…[6][7]
One of which is Flickr
Image: Pexels (Ingo Joseph)
This
information
then can get
shared with
others…
Image: Pexels (Pixabay)
“In previous research…[it was] found that when an
app requests location, 73% of the time it shares
the information with an advertising network.”[1]
Image: Pexels (Unsplash)
”More than 80 percent of U.S.
companies have been
successfully hacked…”[8]
Which…
Image: Pexels (Unsplash)
Not only can strangers get a hold of your
coordinates…they can also see what you are up to
in your daily life
Image: Pexels (Tookapic)
Definition of Smartphone:
“a mobile telephone that
can be used to send and
receive e-mail, connect to
the Internet, take
photographs, etc.” [9]
Image: Pexels (Pixabay)
And “The share of
Americans that own
smartphones is now
77%...”meaning most of
us have cameras on us at
any moment in the day [2]
Image: Pexels (Pixabay)
With over 80% of US
companies that have been
successfully hacked, what's
not to say Apple in the case
of IPhone or Google in the
case of Android phone is not
the next? [8]
Image: Pexels (Markus Spiske
raumrot.com)
Access to your camera can easily be
achieved by an experienced hacker…letting
them see through your camera lens
Although… "There is a big difference between the internet
of things and other security issues…
…If my PC is hit by a cyber-attack, it is a nuisance; if my car is
attacked, it could kill me.“-Joshua Corman of I Am The Cavalry [10]
Image: Motor Trend,
2013 [11]
“Modern cars are
essentially a collection of
computers on wheels,
packed with many
microcontrollers that
govern their engines,
brakes and so forth.” [10]
“at an event in Singapore earlier
this year two researchers showed
off a car-hacking tool the size of a
smartphone that cost less than
$25 to build.” [10]
Image: Pexels (Tookapic)
Lastly, the
applications we
use every day are
getting to know us
better than we
know ourselves…Image: Pexels (Unsplash)
As of the beginning of 2017, there are at least 1.94
billion monthly active users of the Facebook
application… [12]
Image: Pexels (Pixabay)
Of these users… each have their respective
recommended friends…completed with the help
of network science
Image: Pexels (Unsplash)
“Once Facebook knows the structure of your social
network, it can analyze it to predict not only the
people you're most likely to know now, but…
the people you're most likely to know in the
future.” [13]
Image: Career Builder, 2017 [14]
Goes to show…our
technologies and
strangers around the
world may know more
about ourselves than we
think…
Image: Pexels (Unsplash)
The wall between our private lives and the outside world
seems to be growing increasingly thin as we increase our
mobile technological use…
one would only hope that our understanding on how to protect
ourselves in this digital world also increase in future years
Image: Pexels (Unsplash)
Image SourcesLinks to Images (In the order they appear)
[1] https://www.pexels.com/photo/white-window-curtain-on-top-of-brown-wooden-floor-119717/
[2] https://www.pexels.com/photo/people-walking-on-gray-pavement-42384/
[3] https://www.pexels.com/photo/apple-devices-cellphone-close-up-electronics-341523/
[4] https://www.pexels.com/photo/smartphone-ipad-tablet-white-40739/
[5] https://www.pexels.com/photo/nature-laptop-outside-macbook-6508/
[6] http://blog.canberracentre.com.au/food-dining/dining/instagram-food-photography-tips/ (See ‘Content Sources’ for full citation)
[7] https://www.pexels.com/photo/woman-in-brown-classic-trench-coat-eating-mcdo-fries-during-daytime-139681/
[8] https://www.pexels.com/photo/smartphone-outside-hiking-technology-35969/
[9] https://www.pexels.com/photo/business-communication-computer-connection-261706/
[10] https://www.pexels.com/photo/man-in-gray-dress-shirt-using-silver-ipad-29532/
[11] https://www.pexels.com/photo/conference-meeting-room-chairs-table-28756/
[12] https://www.pexels.com/photo/night-television-tv-video-8158/
[13] https://www.pexels.com/photo/gray-smartphone-37864/
[14] https://www.pexels.com/photo/man-in-black-and-white-polo-shirt-beside-writing-board-159844/
[15] https://www.pexels.com/photo/technology-computer-desktop-source-code-113850/
[16] http://www.motortrend.com/news/volvo-xc60-iihs-small-overlap-crash-test/#crash-testing-side-view-after-impact1 (See ‘Content Sources’ for full citation)
[17] https://static.pexels.com/photos/79290/black-and-white-code-programming-tech-79290.jpeg
[18] https://www.pexels.com/photo/space-gray-iphone-6-showing-facebook-app-199497/
[19] https://www.pexels.com/photo/access-app-application-apps-267399/
[20] https://www.pexels.com/photo/people-community-party-beach-26135/
[21] http://www.careerbuilder.ca/blog/category/networking/ (See ‘Content Sources’ for full citation)
[22] https://www.pexels.com/photo/couple-standing-in-the-street-beside-the-building-while-looking-up-90837/
[23] https://www.pexels.com/photo/iphone-checklist-hands-human-29765/
Content SourcesCited Informatic Sources
[1] Dwoskin, E. (2015, Mar 24). WSJ.D technology: Apps track users -- once every 3 minutes. Wall Street Journal Retrieved from https://search-proquest-
com.proxy.queensu.ca/docview/1665403896?accountid=6180
[2] Pew Research Center (2017, Jan 12). Mobile Fact Sheet. Retrieved from http://www.pewinternet.org/fact-sheet/mobile/
[3] Murphy, K. (2010, Apr 07). First the camera, then the fork. New York Times (1923-Current File) Retrieved from https://search-proquest-
com.proxy.queensu.ca/docview/1461109920?accountid=6180
[4] Canberra Centre (2015). FOOD PHOTOGRAPHY TIPS FOR INSTAGRAM. Retrieved from http://blog.canberracentre.com.au/food-dining/dining/instagram-food-
photography-tips/
[5] Matrix, Sidneyeve (2017, May 1). Module 2 Slides FILM 260 Digital Media Trends Summer. Retrieved from
https://onq.queensu.ca/d2l/le/content/117252/viewContent/936359/View
[6] Dwoskin, E. (2015, Mar 24). WSJ.D technology: Apps track users -- once every 3 minutes. Wall Street Journal Retrieved from https://search-proquest-
com.proxy.queensu.ca/docview/1665403896?accountid=6180
[7] Flickr (2017, May 28). Flickr Geotag Map. Retrieved from https://www.flickr.com/map
[8] Lipka, Mitch (2015, Jun 5). Percentage of companies that report systems hacked. CBS News Retrieved from http://www.cbsnews.com/news/percentage-of-
companies-that-report-systems-hacked/
[9] Smartphone. (n.d.). Retrieved June 1, 2017, from https://www.merriam-webster.com/dictionary/smartphone
[10] Home, hacked home; The internet of things. (2014, July 12). The Economist, 412(8895), 14(US). Retrieved from
http://go.galegroup.com.proxy.queensu.ca/ps/i.do?p=AONE&sw=w&u=queensulaw&v=2.1&it=r&id=GALE%7CA374524912&asid=3f62b19a238f2dbcba05701695a2d62f
[11] Brian Vance (2013, Mar 12). CRASH! A VOLVO XC60 TAKES THE IIHS’ SMALL OVERLAP TEST. Motor Trend Article Retrieved from
http://www.motortrend.com/news/volvo-xc60-iihs-small-overlap-crash-test/
[12] Statista (2017). Number of monthly active Facebook users worldwide as of 1st quarter 2017 (in millions). Retrieved from
https://www.statista.com/statistics/264810/number-of-monthly-active-facebook-users-worldwide/
[13] How Facebook knows who all your friends are, even better than you do. (2015, April 2). Washingtonpost.com. Retrieved from
http://go.galegroup.com.proxy.queensu.ca/ps/i.do?p=AONE&sw=w&u=queensulaw&v=2.1&it=r&id=GALE%7CA408035312&asid=97bdc5e16299bf6c66dcb7543481dace
[14] Career Builder (2017, Apr 11). Creative ways to get noticed by employers on social media. Retrieved from http://www.careerbuilder.ca/blog/category/networking/

More Related Content

What's hot

Networked Individualism
Networked IndividualismNetworked Individualism
Networked Individualismkels33
 
Converging Communications: The Perfect Storm
Converging Communications: The Perfect StormConverging Communications: The Perfect Storm
Converging Communications: The Perfect StormJoanne Jacobs
 
Technology Changing What We Do & Who We Are
Technology Changing What We Do & Who We AreTechnology Changing What We Do & Who We Are
Technology Changing What We Do & Who We Arekyun8
 
NITLE IT Leaders 2009: Emerging Technologies in a Submerging Economy
NITLE IT Leaders 2009: Emerging Technologies in a Submerging EconomyNITLE IT Leaders 2009: Emerging Technologies in a Submerging Economy
NITLE IT Leaders 2009: Emerging Technologies in a Submerging EconomyBryan Alexander
 
Diminishing Privacy Hasn't Stopped Us From Being Increasingly Digital
Diminishing Privacy Hasn't Stopped Us From Being Increasingly DigitalDiminishing Privacy Hasn't Stopped Us From Being Increasingly Digital
Diminishing Privacy Hasn't Stopped Us From Being Increasingly DigitalWensen Li
 
Zeynep ausace 2011 tahrir presentation
Zeynep ausace 2011 tahrir presentationZeynep ausace 2011 tahrir presentation
Zeynep ausace 2011 tahrir presentationZeynep Tufekci
 

What's hot (11)

Networked Individualism
Networked IndividualismNetworked Individualism
Networked Individualism
 
Converging Communications: The Perfect Storm
Converging Communications: The Perfect StormConverging Communications: The Perfect Storm
Converging Communications: The Perfect Storm
 
Untitled1
Untitled1Untitled1
Untitled1
 
Essay 3
Essay 3Essay 3
Essay 3
 
Film 260 Flipbook
Film 260 FlipbookFilm 260 Flipbook
Film 260 Flipbook
 
Technology Changing What We Do & Who We Are
Technology Changing What We Do & Who We AreTechnology Changing What We Do & Who We Are
Technology Changing What We Do & Who We Are
 
NITLE IT Leaders 2009: Emerging Technologies in a Submerging Economy
NITLE IT Leaders 2009: Emerging Technologies in a Submerging EconomyNITLE IT Leaders 2009: Emerging Technologies in a Submerging Economy
NITLE IT Leaders 2009: Emerging Technologies in a Submerging Economy
 
Diminishing Privacy Hasn't Stopped Us From Being Increasingly Digital
Diminishing Privacy Hasn't Stopped Us From Being Increasingly DigitalDiminishing Privacy Hasn't Stopped Us From Being Increasingly Digital
Diminishing Privacy Hasn't Stopped Us From Being Increasingly Digital
 
Zeynep ausace 2011 tahrir presentation
Zeynep ausace 2011 tahrir presentationZeynep ausace 2011 tahrir presentation
Zeynep ausace 2011 tahrir presentation
 
Social Technologies for Informaticians and Researchers
Social Technologies for Informaticians and ResearchersSocial Technologies for Informaticians and Researchers
Social Technologies for Informaticians and Researchers
 
Segmenting the Health Consumer Population
Segmenting the Health Consumer PopulationSegmenting the Health Consumer Population
Segmenting the Health Consumer Population
 

Similar to Error: Your Life Has Been Hacked

Smartphones with Smarter Apps
Smartphones with Smarter AppsSmartphones with Smarter Apps
Smartphones with Smarter AppsSara Dow
 
Film 260 flipbook
Film 260 flipbookFilm 260 flipbook
Film 260 flipbookJulie Coles
 
The Deception of Privacy, The Truth About a Plugged in Life
The Deception of Privacy, The Truth About a Plugged in LifeThe Deception of Privacy, The Truth About a Plugged in Life
The Deception of Privacy, The Truth About a Plugged in LifeCindy Beneteau
 
The Rise of Wearable Technology
The Rise of Wearable TechnologyThe Rise of Wearable Technology
The Rise of Wearable TechnologyEmily McKeown
 
Overcoming Distraction in the Digital Age
Overcoming Distraction in the Digital AgeOvercoming Distraction in the Digital Age
Overcoming Distraction in the Digital AgeJulia Warrender
 
The Evolution of Technology & Etiquette
The Evolution of Technology & EtiquetteThe Evolution of Technology & Etiquette
The Evolution of Technology & EtiquetteChristie Stelling
 
Natural Disasters: How Social Media is Changing Response Time
Natural Disasters: How Social Media is Changing Response Time Natural Disasters: How Social Media is Changing Response Time
Natural Disasters: How Social Media is Changing Response Time Jenna Dawson
 
Film260 digitalflipbookshannongrist
Film260 digitalflipbookshannongristFilm260 digitalflipbookshannongrist
Film260 digitalflipbookshannongristShannon Grist
 
The Internet of Things
The Internet of ThingsThe Internet of Things
The Internet of ThingsEmily Cehic
 
Growing Up in a Technological Time
Growing Up in a Technological TimeGrowing Up in a Technological Time
Growing Up in a Technological TimeMidge Loiselle
 
The Evolution of Technology & Etiquette
The Evolution of Technology & EtiquetteThe Evolution of Technology & Etiquette
The Evolution of Technology & EtiquetteChristie Stelling
 
Clicktivsm Campaign
Clicktivsm CampaignClicktivsm Campaign
Clicktivsm CampaignKristin Tom
 
Film 260 flipbook brad byron
Film 260 flipbook brad byron Film 260 flipbook brad byron
Film 260 flipbook brad byron Brad Byron
 
The Role of Social Media in Cybercrime
The Role of Social Media in CybercrimeThe Role of Social Media in Cybercrime
The Role of Social Media in CybercrimeKrista Dunn
 
And We Shall Call it Freedom: How We Chose to End Privacy
And We Shall Call it Freedom: How We Chose to End PrivacyAnd We Shall Call it Freedom: How We Chose to End Privacy
And We Shall Call it Freedom: How We Chose to End PrivacyRobbie Venis
 

Similar to Error: Your Life Has Been Hacked (20)

Smartphones with Smarter Apps
Smartphones with Smarter AppsSmartphones with Smarter Apps
Smartphones with Smarter Apps
 
Film 260 flipbook
Film 260 flipbookFilm 260 flipbook
Film 260 flipbook
 
The Deception of Privacy, The Truth About a Plugged in Life
The Deception of Privacy, The Truth About a Plugged in LifeThe Deception of Privacy, The Truth About a Plugged in Life
The Deception of Privacy, The Truth About a Plugged in Life
 
Flipbook
Flipbook Flipbook
Flipbook
 
The Rise of Wearable Technology
The Rise of Wearable TechnologyThe Rise of Wearable Technology
The Rise of Wearable Technology
 
Overcoming Distraction in the Digital Age
Overcoming Distraction in the Digital AgeOvercoming Distraction in the Digital Age
Overcoming Distraction in the Digital Age
 
The Evolution of Technology & Etiquette
The Evolution of Technology & EtiquetteThe Evolution of Technology & Etiquette
The Evolution of Technology & Etiquette
 
Natural Disasters: How Social Media is Changing Response Time
Natural Disasters: How Social Media is Changing Response Time Natural Disasters: How Social Media is Changing Response Time
Natural Disasters: How Social Media is Changing Response Time
 
Film260 digitalflipbookshannongrist
Film260 digitalflipbookshannongristFilm260 digitalflipbookshannongrist
Film260 digitalflipbookshannongrist
 
The Internet of Things
The Internet of ThingsThe Internet of Things
The Internet of Things
 
Growing Up in a Technological Time
Growing Up in a Technological TimeGrowing Up in a Technological Time
Growing Up in a Technological Time
 
The Evolution of Technology & Etiquette
The Evolution of Technology & EtiquetteThe Evolution of Technology & Etiquette
The Evolution of Technology & Etiquette
 
Flipbook
FlipbookFlipbook
Flipbook
 
Clicktivsm Campaign
Clicktivsm CampaignClicktivsm Campaign
Clicktivsm Campaign
 
Flipbook (3) (1)
Flipbook (3) (1)Flipbook (3) (1)
Flipbook (3) (1)
 
Privacy hazard
Privacy hazardPrivacy hazard
Privacy hazard
 
Film 260 flipbook brad byron
Film 260 flipbook brad byron Film 260 flipbook brad byron
Film 260 flipbook brad byron
 
Out-Smarted!
Out-Smarted!Out-Smarted!
Out-Smarted!
 
The Role of Social Media in Cybercrime
The Role of Social Media in CybercrimeThe Role of Social Media in Cybercrime
The Role of Social Media in Cybercrime
 
And We Shall Call it Freedom: How We Chose to End Privacy
And We Shall Call it Freedom: How We Chose to End PrivacyAnd We Shall Call it Freedom: How We Chose to End Privacy
And We Shall Call it Freedom: How We Chose to End Privacy
 

Recently uploaded

VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Roomgirls4nights
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663Call Girls Mumbai
 
Complet Documnetation for Smart Assistant Application for Disabled Person
Complet Documnetation   for Smart Assistant Application for Disabled PersonComplet Documnetation   for Smart Assistant Application for Disabled Person
Complet Documnetation for Smart Assistant Application for Disabled Personfurqan222004
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Deliverybabeytanya
 
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一3sw2qly1
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 
Denver Web Design brochure for public viewing
Denver Web Design brochure for public viewingDenver Web Design brochure for public viewing
Denver Web Design brochure for public viewingbigorange77
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...aditipandeya
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)Damian Radcliffe
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxellan12
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一Fs
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 

Recently uploaded (20)

VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
 
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Complet Documnetation for Smart Assistant Application for Disabled Person
Complet Documnetation   for Smart Assistant Application for Disabled PersonComplet Documnetation   for Smart Assistant Application for Disabled Person
Complet Documnetation for Smart Assistant Application for Disabled Person
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
 
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
 
Vip Call Girls Aerocity ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Aerocity ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Aerocity ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Aerocity ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICECall Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 
Denver Web Design brochure for public viewing
Denver Web Design brochure for public viewingDenver Web Design brochure for public viewing
Denver Web Design brochure for public viewing
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girls
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 

Error: Your Life Has Been Hacked

  • 1. Error: Your Life Has Been Hacked How thick is the curtain protecting your privacy on mobile devices? By: Adelle Leonard Image: Pexels (Unsplash)
  • 2. “more than 90% of Americans feel that they have lost control over personal data”[1] Image: Pexels (Unsplash)
  • 3. Yet this is mainly due to our purchase of mobile devices… Image: Pexels (Gabriel Freytez)
  • 4. 95% of Americans now own a cellphone of some kind…[2] Image: Pexels (Pixabay)
  • 5. The gateway to our private lives range from our social media interactions to the types of devices we own. Image: Pexels (Stokpic)
  • 6. “ One of the largest & most active Flickr groups, called ‘I Ate This’, includes more than 300,000 photos…contributed by more than 19,000 members”[3] Image: Canberra Centre, 2015 [4]
  • 7. Simply from what you eat people can get a sense of who you areas a person and where you have been… ”Tell me what you eat, I’ll tell you who you are.”– Jean Anthelme Brillat-Savain [5] Image: Pexels (freestocks.org)
  • 8. Computer scientists have concluded that 12 or so popular Android apps collected device location coordinates accurate to within 50 meters…[6][7] One of which is Flickr Image: Pexels (Ingo Joseph)
  • 9. This information then can get shared with others… Image: Pexels (Pixabay)
  • 10. “In previous research…[it was] found that when an app requests location, 73% of the time it shares the information with an advertising network.”[1] Image: Pexels (Unsplash)
  • 11. ”More than 80 percent of U.S. companies have been successfully hacked…”[8] Which… Image: Pexels (Unsplash)
  • 12. Not only can strangers get a hold of your coordinates…they can also see what you are up to in your daily life Image: Pexels (Tookapic)
  • 13. Definition of Smartphone: “a mobile telephone that can be used to send and receive e-mail, connect to the Internet, take photographs, etc.” [9] Image: Pexels (Pixabay)
  • 14. And “The share of Americans that own smartphones is now 77%...”meaning most of us have cameras on us at any moment in the day [2] Image: Pexels (Pixabay)
  • 15. With over 80% of US companies that have been successfully hacked, what's not to say Apple in the case of IPhone or Google in the case of Android phone is not the next? [8] Image: Pexels (Markus Spiske raumrot.com) Access to your camera can easily be achieved by an experienced hacker…letting them see through your camera lens
  • 16. Although… "There is a big difference between the internet of things and other security issues… …If my PC is hit by a cyber-attack, it is a nuisance; if my car is attacked, it could kill me.“-Joshua Corman of I Am The Cavalry [10] Image: Motor Trend, 2013 [11]
  • 17. “Modern cars are essentially a collection of computers on wheels, packed with many microcontrollers that govern their engines, brakes and so forth.” [10] “at an event in Singapore earlier this year two researchers showed off a car-hacking tool the size of a smartphone that cost less than $25 to build.” [10] Image: Pexels (Tookapic)
  • 18. Lastly, the applications we use every day are getting to know us better than we know ourselves…Image: Pexels (Unsplash)
  • 19. As of the beginning of 2017, there are at least 1.94 billion monthly active users of the Facebook application… [12] Image: Pexels (Pixabay)
  • 20. Of these users… each have their respective recommended friends…completed with the help of network science Image: Pexels (Unsplash)
  • 21. “Once Facebook knows the structure of your social network, it can analyze it to predict not only the people you're most likely to know now, but… the people you're most likely to know in the future.” [13] Image: Career Builder, 2017 [14]
  • 22. Goes to show…our technologies and strangers around the world may know more about ourselves than we think… Image: Pexels (Unsplash)
  • 23. The wall between our private lives and the outside world seems to be growing increasingly thin as we increase our mobile technological use… one would only hope that our understanding on how to protect ourselves in this digital world also increase in future years Image: Pexels (Unsplash)
  • 24. Image SourcesLinks to Images (In the order they appear) [1] https://www.pexels.com/photo/white-window-curtain-on-top-of-brown-wooden-floor-119717/ [2] https://www.pexels.com/photo/people-walking-on-gray-pavement-42384/ [3] https://www.pexels.com/photo/apple-devices-cellphone-close-up-electronics-341523/ [4] https://www.pexels.com/photo/smartphone-ipad-tablet-white-40739/ [5] https://www.pexels.com/photo/nature-laptop-outside-macbook-6508/ [6] http://blog.canberracentre.com.au/food-dining/dining/instagram-food-photography-tips/ (See ‘Content Sources’ for full citation) [7] https://www.pexels.com/photo/woman-in-brown-classic-trench-coat-eating-mcdo-fries-during-daytime-139681/ [8] https://www.pexels.com/photo/smartphone-outside-hiking-technology-35969/ [9] https://www.pexels.com/photo/business-communication-computer-connection-261706/ [10] https://www.pexels.com/photo/man-in-gray-dress-shirt-using-silver-ipad-29532/ [11] https://www.pexels.com/photo/conference-meeting-room-chairs-table-28756/ [12] https://www.pexels.com/photo/night-television-tv-video-8158/ [13] https://www.pexels.com/photo/gray-smartphone-37864/ [14] https://www.pexels.com/photo/man-in-black-and-white-polo-shirt-beside-writing-board-159844/ [15] https://www.pexels.com/photo/technology-computer-desktop-source-code-113850/ [16] http://www.motortrend.com/news/volvo-xc60-iihs-small-overlap-crash-test/#crash-testing-side-view-after-impact1 (See ‘Content Sources’ for full citation) [17] https://static.pexels.com/photos/79290/black-and-white-code-programming-tech-79290.jpeg [18] https://www.pexels.com/photo/space-gray-iphone-6-showing-facebook-app-199497/ [19] https://www.pexels.com/photo/access-app-application-apps-267399/ [20] https://www.pexels.com/photo/people-community-party-beach-26135/ [21] http://www.careerbuilder.ca/blog/category/networking/ (See ‘Content Sources’ for full citation) [22] https://www.pexels.com/photo/couple-standing-in-the-street-beside-the-building-while-looking-up-90837/ [23] https://www.pexels.com/photo/iphone-checklist-hands-human-29765/
  • 25. Content SourcesCited Informatic Sources [1] Dwoskin, E. (2015, Mar 24). WSJ.D technology: Apps track users -- once every 3 minutes. Wall Street Journal Retrieved from https://search-proquest- com.proxy.queensu.ca/docview/1665403896?accountid=6180 [2] Pew Research Center (2017, Jan 12). Mobile Fact Sheet. Retrieved from http://www.pewinternet.org/fact-sheet/mobile/ [3] Murphy, K. (2010, Apr 07). First the camera, then the fork. New York Times (1923-Current File) Retrieved from https://search-proquest- com.proxy.queensu.ca/docview/1461109920?accountid=6180 [4] Canberra Centre (2015). FOOD PHOTOGRAPHY TIPS FOR INSTAGRAM. Retrieved from http://blog.canberracentre.com.au/food-dining/dining/instagram-food- photography-tips/ [5] Matrix, Sidneyeve (2017, May 1). Module 2 Slides FILM 260 Digital Media Trends Summer. Retrieved from https://onq.queensu.ca/d2l/le/content/117252/viewContent/936359/View [6] Dwoskin, E. (2015, Mar 24). WSJ.D technology: Apps track users -- once every 3 minutes. Wall Street Journal Retrieved from https://search-proquest- com.proxy.queensu.ca/docview/1665403896?accountid=6180 [7] Flickr (2017, May 28). Flickr Geotag Map. Retrieved from https://www.flickr.com/map [8] Lipka, Mitch (2015, Jun 5). Percentage of companies that report systems hacked. CBS News Retrieved from http://www.cbsnews.com/news/percentage-of- companies-that-report-systems-hacked/ [9] Smartphone. (n.d.). Retrieved June 1, 2017, from https://www.merriam-webster.com/dictionary/smartphone [10] Home, hacked home; The internet of things. (2014, July 12). The Economist, 412(8895), 14(US). Retrieved from http://go.galegroup.com.proxy.queensu.ca/ps/i.do?p=AONE&sw=w&u=queensulaw&v=2.1&it=r&id=GALE%7CA374524912&asid=3f62b19a238f2dbcba05701695a2d62f [11] Brian Vance (2013, Mar 12). CRASH! A VOLVO XC60 TAKES THE IIHS’ SMALL OVERLAP TEST. Motor Trend Article Retrieved from http://www.motortrend.com/news/volvo-xc60-iihs-small-overlap-crash-test/ [12] Statista (2017). Number of monthly active Facebook users worldwide as of 1st quarter 2017 (in millions). Retrieved from https://www.statista.com/statistics/264810/number-of-monthly-active-facebook-users-worldwide/ [13] How Facebook knows who all your friends are, even better than you do. (2015, April 2). Washingtonpost.com. Retrieved from http://go.galegroup.com.proxy.queensu.ca/ps/i.do?p=AONE&sw=w&u=queensulaw&v=2.1&it=r&id=GALE%7CA408035312&asid=97bdc5e16299bf6c66dcb7543481dace [14] Career Builder (2017, Apr 11). Creative ways to get noticed by employers on social media. Retrieved from http://www.careerbuilder.ca/blog/category/networking/