SlideShare a Scribd company logo
1 of 24
Download to read offline
K. C. Film 260 Flip Book Assignment 2015
“ rguing that you don’t
care about the right
to because
you have nothing to hide is
no different than saying
you don’t care about free
speech because you have
nothing to say.”1
Edward Snowden, 2015
Image by Jared Rodriques, Truthout 1
The quote by Edward Snowden regarding
privacy highlights the fact that people seem
to be willing to on the internet
for more access and services without really
understanding the consequences and scope
of the privacy they are trading away.
Image by Ann Wuyts Five Data Privacy Principles from Mozilla (Put on a museum wall) 2014 2
“Whenever you sign up for a
Facebook account, Facebook
asks permission to look at your
e-mail contacts if you’re on a
computer , or your phone
contacts if you’re on a
smartphone. When you grant
the site permission, it searches
your contacts for users already
on the network, and it searches
other users’ uploaded contacts
for you.” (Caitlin Dewey)4
Image by P T. Privacy 3
Do you think before
you
“…dismissed the
suggestion that
some passengers
might find the
practice overly
intrusive,
arguing that
social media was
by definition a
public
medium.”15
“Qantas had seen
and “liked” the
image
(passengers),
sharing it with
the airline’s more
than 26,000
Instagram
followers.”
Image by KC
“As children develop greater
independence, they need privacy in
order to have genuine relationships
with their parents.”
(Kay Mathiesen 2013) 3
Image by Summer Skyes 11. OMG lkr Lol 4
“If you are using Shopkick at
a store with iBeacon, it also
knows where you are in a
store, where you linger, and
what products you are
interested in. Are the perks
Shopkick offers worth the
privacy trade-off?” 17
Image by Fouquier The Big Yellow 5
“The combination of,
“non-personal information” that Shopkick and many
other services collect—is unique for about 87 percent
of U.S. residents. That means if an app has this data, it
usually has that you can be 17
”
17
Large
organizations
have not done a
great job
the public
when gathering
personal data.
Issues like identity
theft,
compromised
data and
government
spying is a cause
for concern. 18
Image by KC
“Sir John Sawers is the incoming head
of MI6, essentially the British
equivalent of the CIA. His wife posted
sensitive personal information to her
Facebook page, including the address
of the couple's London apartment
and the locations of their children and
Sir John's parents. Her Facebook
profile was left open to anyone in the
London network.”7
Image by Jim Linwood. The MI6 Building,
Vauxhall, London 6
Is your Internet of things vulnerable to Cyber
Attacks?
“Security experts are sounding the alarm. "There is a big
difference between the internet of things and other security
issues," says Joshua Corman of I Am The Cavalry, a group of
security specialists trying to promote greater awareness of
emerging risks to public safety. "If my PC is hit by a cyber-
attack, it is a nuisance; if my car is attacked, it could kill me.“16
Image by Pascal. Fridgenlight 7
“Even the most careful, conscientious sites cannot control
your resume after someone has downloaded it.” 8
Image by Flazingo Photos. Resume – Glasses www.flazingo.com per these terms www.flazingo.com/creativecommons 8
“ of hiring managers will
review a candidate’s social profile
before making a hiring decision. 10
have reconsidered a candidate
based on what they find.” 10
“The non-profit world naturally collects
a great deal of private donor
information and information that
explicitly explains how and why you
collect data and the specifics of its use
are highly recommended. The effective
and professional safeguarding of donor
information is not only an expectation of
the public but the ongoing provision of
your terms of service could well be the
difference between adding a new donor
and having them elect not to engage
with you.”10
Images by KC
“The bill’s move to broadly expand information sharing
between governments and give new powers to Canada’s intel
agencies will “undermine user trust, threaten the openness
of the Web, and reduce the security of the Internet and its
users,” Mozilla internet policy director Jochai Ben-Avie said in
a statement published on the Mozilla blog.”13
Image by Stephen Boisvert. Parliament. 9
“Massive privacy breach at a Toronto hospital has led to
19 more charges, including six criminal counts against a nurse accused
of selling the confidential records of new mothers as part of a scheme
to peddle RESP investments.” 19
“Alberta’s Health Minister Fred Horne revealed this week
that an unencrypted laptop containing the personal health information
of 620,000 Albertans was stolen in September.”21
Image by U.S. Navy photo by Mass Communication Specialist 2nd Class Todd Frantom/Released)Official U.S. Navy Page. Fort Belvoir Community Hospital. 10
“More than PlayStation accounts worldwide were
compromised, 21
“ Target shoppers get hacked” 21
“TJX, the U.S. parent of Winners and HomeSense stores, revealed in
2007 that data from at least credit and debit
cards was stolen by hackers.” 21
“Before you post
anything online, think
about what a hacker,
stalker, employer, or
potential employer could
do with that data. Could
an ex, who's fighting for
custody, use the data
against you in court?”7
Image by Sean MacEntee. Privacy 11
“Don't give away specifics. Don't post
your address, date of birth, kids'
names, pets' names, phone numbers,
or any account numbers or financial
information of any kind.” 7
“Take advantage of
privacy settings and
lock down your
profile, so that only
those who you
approve can view
everything.”7
“Use a firewall.”9
“Read the Terms of Service.”9
Make clever strong passwords 9
“Beware sneaky check boxes.” 9
“This is a brand new medium, and we are just
now beginning to recognize its potential
consequences. Something as harmless as a
picture of a baby in a tub could be traded
online by pedophiles. The world is changing.
Be aware of your social media use, and be
smart about it.7”
Image by Smlp.co.uk. (2008, March 9). Locked in 19?? 10
Sources
1 WashingtonsBlog (2015, May 21). Arguing That You Don’t Care About The Right To Privacy Because You Have Nothing To Hide Is No Different Than Saying You Don’t
Care About Free Speech Because You Have Nothing To Say. Retrieved from http://www.washingtonsblog.com/2015/05/arguing-that-you-dont-care-about-the-right-to-
privacy-because-you-have-nothing-to-hide-is-no-different-than-saying-you-dont-care-about-free-speech-because-you-have-nothing-to-say.html
2 Acohido, B. ( 2013, Nov., 18) Author, A. A. (Year, Month Day). Snowden effect: Young people now care about privacy. USA Today. Retrieved from
http://www.usatoday.com/story/cybertruth/2013/11/13/snowden-effect-young-people-now-care-about-privacy/3517919/
3 Mathiesen, K. (2013, July, 31). The Internet, children, and privacy: the case against parental monitoring. Springer Science+Business Media Dordrecht 2013 retrieved
from http://link.springer.com/article/10.1007/s10676-013-9323-4/fulltext.html
4 Dewey, C. (April 2) How Facebook knows who all your friends are, even better than you do. Washington Post. Retrieved from
http://www.washingtonpost.com/news/the-intersect/wp/2015/04/02/how-facebook-knows-who-all-your-friends-are-even-better-than-you-do/
5 Chayka, K. (2015, March, 24). The New, Improved Online Friendship. New York Magazine. Retrieved from http://nymag.com/next/2015/03/new-improved-online-
friendship.html
6 Hydro One peaksaver Plus. (n.d.). Retrieved from http://www.hydroone.com/MyHome/SaveEnergy/Pages/Peaksaver.aspx
7 Siciliano, R. (2011,May,25) Social Media Privacy and Personal Security Issues. Huffington Post, The Blog. Retrieved from http://www.huffingtonpost.com/robert-
siciliano/social-media-privacy-and_b_245857.html
8 Dixon, P. (2009, February). Consumer Tips: Job Seekers’ Guide to Resumes – Twelve Resume Posting Truths. Posted to
https://www.worldprivacyforum.org/2009/02/consumer-tips-job-seekers-guide-to-resumes/
9 Editors Blog. (2011, Dec. 6 ). 15 tips for protecting your privacy online. CBC News. Retrieved from http://www.cbc.ca/news/canada/15-tips-for-protecting-your-
privacy-online-1.1043194
10 Davidson, J. (2014, Oct. 16). The 7 Social Media Mistakes Most Likely to Cost You a Job. Money. Retrieved from http://time.com/money/3510967/jobvite-social-
media-profiles-job-applicants/
Sources
11 Posted by Tim. (2014, Aug. 12) New study reveals much about online privacy concerns – important findings for non-profits. Message posted to
http://www.miratelinc.com/blog/nonprofit-fundraising-news-about-privacy-concerns-for-potential-donors/
12 Anti-terrorism Act, 2015 (n.d.) Retrieved 2015, June,9. http://en.wikipedia.org/wiki/Anti-terrorism_Act,_2015
13 Tencer, D. (2015, March 27). Bill C-51 A Threat To Safety Of Internet Users, Firefox Maker Mozilla Says. Retrieved from
http://www.huffingtonpost.ca/2015/03/26/mozilla-bill-c-51_n_6946602.html
14 Ingram, M. (2013, June 7). Through a PRISM darkly: Tracking the ongoing NSA surveillance story. Gigaom Research
https://gigaom.com/2013/06/07/through-a-prism-darkly-tracking-the-ongoing-nsa-surveillance-story/
15 Clark, N. (2014, March 17). Airlines Use Digital Technology to Get Even More Personal. New York Times. Retrieved from
http://www.nytimes.com/2014/03/18/business/airlines-use-digital-technology-to-get-even-more-personal.html?_r=0
16 No byline (2014, July 12). Home, hacked home. The Economist. Retrieved from http://www.economist.com/news/special-report/21606420-perils-
connected-devices-home-hacked-home
17 Golbeck. J. (n.d.). Track Star: this app follows you while you shop—and it needs a clearer privacy policy. Slate.com. Retrieved from
http://www.slate.com/articles/technology/future_tense/2014/01/ibeacon_shopkick_privacy_policies_for_location_tracking_apps_aren_t_clear.html
18 Madden, S. (2014, March 10). Tech that tracks your every move can be convenient, not creepy. Wired. Retrieved from
http://www.wired.com/2014/03/designers-tracking-tradeoffs/
19 No Byline. (2015, June 2) Rouge Valley Health System privacy breaches lead to 19 chargesCBC News. https://ca.news.yahoo.com/scarborough-
hospital-privacy-breaches-lead-192439254.html
20 No byline (2014, Jan 28). Personal data online: 5 of the biggest security breaches. CBC News. http://www.cbc.ca/news/world/personal-data-online-
5-of-the-biggest-security-breaches-1.2514287
Images
1 Rodriguez, J. (u.d.). Edward Snowden. Truthout. Paired with the article: Noam Chomsky | Edward Snowden, the World's "Most Wanted Criminal" .
Retrieved from flickr https://www.flickr.com/photos/truthout/14348649238/in/faves-59362381@N00/
2 Wuyts, Ann. (2014, Nov. 27 Five Data Privacy Principles from Mozilla (Put on a museum wall) 2014. Retrieved from Flickr
https://www.flickr.com/photos/vintagedept/15704560667/in/faves-59362381@N00/
3 P T. (2010, June 16). Privacy Retrieved from flickr https://www.flickr.com/photos/propagandatimes/4707679041/in/faves-59362381@N00/
4 Summer Skyes 11 (2012,Feb. 11). OMG lkr lol … txting . Retrieved from flickr
https://www.flickr.com/photos/summerskyephotography/6981290631/in/photolist-bCUWtR-6bRRaE-eY6HhR-6bRR8b-3Z12zo-6G1YTc-8MfBV9-euYoS-
4gFmE3-5NZCNd-pW1qPw-pVZ5x9-pW8XUF-qdy6eK-qdnRqi-pgNeDa-qduHWC-pVZ5Dm-pW17Pd-d1hVRS-btbcvV-mULqL6-bvsNfb-aoUiXx-qDFBt3-
dU8Sg2-4tPGZg-7LAVpL-9wExNK-5BYs7X-9wExRp-bGZ6yn-egurtP-7wfano-4zhY2v-87VPcZ-4UszxB-aJmY2-qmcFYA-dZWTcp-5spQR4-7UrzMr-7Urz3n-
7UrzVD-7UuQ8q-7UuQbC-7UuQkb-7UuQoq-7UrzYF-ndvhbK
5 Fouquier (2015, April 21). The Big Yellow. Retrieved from Flickr https://www.flickr.com/photos/fouquier/17077640499/in/photolist-s26nxz-byGJAh-
pMxhJ6-aWfjJB-aWeNTz-e3huhi-ba4NaZ-4jyQ7E-bByERN-oKEwYY-oU8gRz-aWeLFK-p93oJB-pQVogC-8xz2Ed-aWeKZX-k4FGqr-of2i9K-owtqgC-owvdti-
8aj9xy-oxYsg6-ounKEf-outnmf-8ahZ8H-owbQ27-ocsCZL-oddzf5-ocsx9i-ow1VFq-ow1RqG-ovYjNo-ocMmGX-owf1mT-ovFcxT-oeNsPd-oeEZuj-oemFxx-
oy8Cy2-owtQ7U-ow1VXN-ow6X45-owqKJG-owjBXV-ouiw5x-5HogZC-oeTzHH-oehWct-oeZ5cQ-oeJCwD/
6 Linwood, J. (2008, Feb. 19). The MI6 Building, Vauxhall, London. Retrieved from Flickr
https://www.flickr.com/photos/brighton/2279813534/in/photolist-4tsD8U-4rar69-jjLgrV-7y5Hww-6MWis-kmvNDz-ppNBij-hXWMg-hCNVr-8yiX5u-
bsRric-cbFSc1-nV16F2-khLw4M-bTuxmM-ryW4gS-5t1utD-e4ABM5-jnRY2N-5t1SWK-5t1LSp-5t69oL-5t68B7-5t661A-5t5TSL-5t5MXQ-5t5Jrh-5t5HYY-
5t1hYK-5t5F5N-7cULj6-9TVK7j-ndEmsF-rCxQK3-4f5u44-j5c6hY-deG8DG-hVwfX-eBeMUd-eBbCVF-eBeK5w-eBbAS6-eBeHdC-eBbzi8-eBeFJW-eBeESQ-
eBbwD6-eBeCWE-eBeCoU-eBeBQE/
7 Pascal. (2010, Oct. 10). Fridgenlight. Retrieved from flickr https://www.flickr.com/photos/pasukaru76/5067295473/in/photolist-a26j1E-
tsBDuq-5kdmhv-79ZUM9-jhvyDo-jhvvMm-uocL6Q-8HMdpk-feiniv-iGH-iGG-iGF-iGE-oeCrEk-owr5Vs-ouQ7eL-oeYoAJ-owaKRN-jhvvcy-jhvztu-
8HMa6V-rYonmx-iGJ-ow8bpc-owfae9-obTYp5-odncL3-oezoho-ovDmsJ-odmw9Q-ou62cM-otHE65-odkBGc-ow87FP-obSeRD-oenz6R-oxHezp-
ovgH2G-oe6723-tCMRpG-r8dEzu-t4n6cq-oektfs-oeJHod-oeJWFK-ouJDiU-rpBd16-ovKkTW-rptYWj-sFUPZ5
Images
8 Flazingo Photos. (2014, April 27). Resume-Glasses. www.flazingo.com per these terms: www.flazingo.com/creativecommons. Retrieved from Flickr
https://www.flickr.com/photos/124247024@N07/13903383190/in/photolist-nbAtrh-k8FtG-7ZuYoC-aGVn3H-axtL89-6UwsBM-7aJuB7-9o1iCk-6gMAEm-
6pLznz-4kSTMx-6F2oWU-78W2Go-9y6J4c-6fzJbw-83AHaV-59LL6M-9bFTK7-4zxGN3-8ydvDs-4zxGN7-6pLA6Z-9FVEXv-5G58GN-85oPQ8-6dhcm4-
dQVkWu-53WNkL-5GoACZ-86dXtu-9usg3j-5t2W32-2TUU4y-6pQHZd-7xbhG7-7Z9fs4-nLzw57-7vHmpF-7LtPew-5y1i36-dgdDKj-7vYGuo-6CxxCs-4sKWZb-
pwEZZX-dVN969-4LqJyF-6j7tJi-6NyQMr-87Mfd6
9 Stephen Boisvert. (2013, Sept. 12). Parliament. Retrieved from Flicker https://www.flickr.com/photos/srboisvert/154148968/in/photolist-eC47Q-
qX1RyH-bsqoDk-bsqnXv-afzyQy-5WUcnW-5WPXqa-5WPXPR-5WUcvS-5WPXEX-5WUccu-5WPXL2-afwMDk-afwMzT-5WUczU-5WUcjY-5WUcfW-5WPXSx-
5WPXUa-5WPXrt-5WPXJr-5WPXtF-5WUcdW-5WPXBt-5WPXvk-5WU9KC-afzyZ1-afwMqK-afwMyK-afwMsx-afzzbu-afzz6W-afzz47-afzyP7-afzz1j-afwMHv-
afwMj8-7T47XR-c2Y9s-afzz4Y-afzyXL-afzyS9-afwMGa-8aSTxU-bFY5qM-4QvFVx-7T7e4U-6kMQ8n-6dx7Qr-5WPXic
10 U.S. Navy photo by Mass Communication Specialist 2nd Class Todd Frantom/Released). (2011, June 22). Official U.S. Navy Page. Fort Belvoir
Community Hospital. Retrieved from Flickr https://www.flickr.com/photos/usnavy/5913486058/in/photolist-a1yaob-4wULmG-4SQoUf-ijUKnZ-7xhBng-
4oRFy4-8eweiE-hfwSgV-o9mMRT-5NTvFA-dAs6qD-e8Bmjb-e8Bm93-7Wqhei-h8oMGw-ecP4An-8bnTDJ-a4nkyu-5npEuv-a5tAA1-5H1G3c-e6g75r-
71aYsm-dnbUv1-bn5ohY-4ptDiZ-r4cZb-2ywEDH-nqFX6d-4SFz6v-dAxAp7-a3VHN3-autfjD-6vBPft-pQwHww-87awi2-cWJGjL-ajPSps-cQVnbw-aaWgvM-
tjaizy-7g7J4f-dnbKop-dnbPgU-e71Utc-cw2MPj-9ASSCn-dnbS4e-e71Zrc-hH7xAq
10 Smlp.co.uk. (2008, March 9). Locked in 19??. Retrieved from flickr https://www.flickr.com/photos/biscuitsmlp/2324706925/in/photolist-4xqJnT-
pNfQ2V-4w9csh-dG6neS-9uKVDe-bAUx5j-e6k5Ak-fEQbRx-dFVZx5-SoX26-ak2q9v-8r2CVR-9oNPZn-mgjU2U-4jh6xz-azPbgb-oFMMB2-72xiQ7-6aRr8S-
X54YR-9yZsf4-mvZV7g-8H3hcn-9MD5JS-rbCTk1-bn1aZv-bD1SrM-cEPn4G-rHGUvU-4XpCsF-dfJH2y-9TL2A2-kDM3G2-55Gdmp-892XCK-e3qsFM-9PhLeX-
8xdNPk-9h1Zgc-9LKJvt-rL8wjY-9h1bLJ-3ipg6L-2vmN8u-rgm2Me-anuzJo-8pqb2e-bSXtGM-pdHFcc-2JZJSr
11 MacEntee, S. (2010, May 9) Privacy. Retrieved from Flickr https://www.flickr.com/photos/smemon/4592915995/in/photolist-7ZRTUP-dZ2y6b-82djZx-
84VZAr-hQTx1c-7fNVzm-8b15Y2-azTdMo-4EvWY9-gyXnY-pDmshR-edvyKx-822bu2-8i9dVE-eARcff-aHKoc-5UYfNP-axwagd-o3MtjS-9qR8HQ-9i7ZK2-
4WrJkA-pVKYKn-Em1Z9-7qxzPp-48ybNM-66r3T6-dRuMzt-ddpg14-7H1j1A-eTrqcD-pgokPc-iCz9t-6wCshe-ahk6nh-9Mcwzt-46PRKe-5V3xR3-7nzT7w-
qmKn1-9t8qco-kCRTxX-raUSiK-qF6Pw5-mXs67q-7XSHP1-t1pSZ3-skYusG-t1pRGd-8hZ2Es
Note: Images by K C were taken by myself.

More Related Content

What's hot

Web 4.0 and beyond
Web 4.0 and beyondWeb 4.0 and beyond
Web 4.0 and beyondJohan Koren
 
iPractice for Lawyers: Cloud and mobile computing and social media
iPractice for Lawyers: Cloud and mobile computing and social mediaiPractice for Lawyers: Cloud and mobile computing and social media
iPractice for Lawyers: Cloud and mobile computing and social mediaNicole Black
 
News & Videos about Web -- CNN.com
News & Videos about Web -- CNN.comNews & Videos about Web -- CNN.com
News & Videos about Web -- CNN.comeducatedcommuni79
 
Data:The Fine Balance.We Trade Privacy for Convenience and Security.
Data:The Fine Balance.We Trade Privacy for Convenience and Security.Data:The Fine Balance.We Trade Privacy for Convenience and Security.
Data:The Fine Balance.We Trade Privacy for Convenience and Security.Donovan Gopaul
 
Privacy, social networks and EU policy
Privacy, social networks and EU policyPrivacy, social networks and EU policy
Privacy, social networks and EU policyChris Marsden
 
Social media, surveillance and censorship
Social media, surveillance  and censorshipSocial media, surveillance  and censorship
Social media, surveillance and censorshiplilianedwards
 
Government 2.0: architecting for collaboration
Government 2.0: architecting for collaborationGovernment 2.0: architecting for collaboration
Government 2.0: architecting for collaborationTara Hunt
 
The future of__the_internet
The future of__the_internetThe future of__the_internet
The future of__the_internetAmorim Albert
 
Florida social media
Florida social mediaFlorida social media
Florida social mediaNicole Black
 
Social Computing – The Promise And The Perils Final
Social Computing – The Promise And The Perils FinalSocial Computing – The Promise And The Perils Final
Social Computing – The Promise And The Perils FinalKannan Subbiah
 
Social media marketing 2015
Social media marketing 2015Social media marketing 2015
Social media marketing 2015Nicole Black
 
Policy primer net303 study period 3, 2017
Policy primer net303  study period 3, 2017Policy primer net303  study period 3, 2017
Policy primer net303 study period 3, 2017Steve Mckee
 
Furture of the Internet
Furture of the InternetFurture of the Internet
Furture of the InternetDavidjonothan
 
Privacy as identity territoriality re-conceptualising behaviour in cyberspace
Privacy as identity territoriality  re-conceptualising behaviour in cyberspacePrivacy as identity territoriality  re-conceptualising behaviour in cyberspace
Privacy as identity territoriality re-conceptualising behaviour in cyberspaceFabrice Epelboin
 
Web 2.0 Licensed to Kill
Web 2.0 Licensed to KillWeb 2.0 Licensed to Kill
Web 2.0 Licensed to KillMike Thornburg
 
Internet safety
Internet safetyInternet safety
Internet safetyshoconnor
 

What's hot (20)

Web 4.0 and beyond
Web 4.0 and beyondWeb 4.0 and beyond
Web 4.0 and beyond
 
iPractice for Lawyers: Cloud and mobile computing and social media
iPractice for Lawyers: Cloud and mobile computing and social mediaiPractice for Lawyers: Cloud and mobile computing and social media
iPractice for Lawyers: Cloud and mobile computing and social media
 
News & Videos about Web -- CNN.com
News & Videos about Web -- CNN.comNews & Videos about Web -- CNN.com
News & Videos about Web -- CNN.com
 
Data:The Fine Balance.We Trade Privacy for Convenience and Security.
Data:The Fine Balance.We Trade Privacy for Convenience and Security.Data:The Fine Balance.We Trade Privacy for Convenience and Security.
Data:The Fine Balance.We Trade Privacy for Convenience and Security.
 
Privacy and Social Media
Privacy and Social MediaPrivacy and Social Media
Privacy and Social Media
 
Privacy, social networks and EU policy
Privacy, social networks and EU policyPrivacy, social networks and EU policy
Privacy, social networks and EU policy
 
Social media, surveillance and censorship
Social media, surveillance  and censorshipSocial media, surveillance  and censorship
Social media, surveillance and censorship
 
Government 2.0: architecting for collaboration
Government 2.0: architecting for collaborationGovernment 2.0: architecting for collaboration
Government 2.0: architecting for collaboration
 
Web 2.0
Web 2.0Web 2.0
Web 2.0
 
The future of__the_internet
The future of__the_internetThe future of__the_internet
The future of__the_internet
 
Florida social media
Florida social mediaFlorida social media
Florida social media
 
Social Computing – The Promise And The Perils Final
Social Computing – The Promise And The Perils FinalSocial Computing – The Promise And The Perils Final
Social Computing – The Promise And The Perils Final
 
Social media marketing 2015
Social media marketing 2015Social media marketing 2015
Social media marketing 2015
 
Policy primer net303 study period 3, 2017
Policy primer net303  study period 3, 2017Policy primer net303  study period 3, 2017
Policy primer net303 study period 3, 2017
 
Furture of the Internet
Furture of the InternetFurture of the Internet
Furture of the Internet
 
Privacy as identity territoriality re-conceptualising behaviour in cyberspace
Privacy as identity territoriality  re-conceptualising behaviour in cyberspacePrivacy as identity territoriality  re-conceptualising behaviour in cyberspace
Privacy as identity territoriality re-conceptualising behaviour in cyberspace
 
The new internet part i
The new internet part   iThe new internet part   i
The new internet part i
 
Web 2.0 Licensed to Kill
Web 2.0 Licensed to KillWeb 2.0 Licensed to Kill
Web 2.0 Licensed to Kill
 
Social Networking and E-discovery
Social Networking and E-discoverySocial Networking and E-discovery
Social Networking and E-discovery
 
Internet safety
Internet safetyInternet safety
Internet safety
 

Viewers also liked

Privacy by Design Seminar - Jan 22, 2015
Privacy by Design Seminar - Jan 22, 2015Privacy by Design Seminar - Jan 22, 2015
Privacy by Design Seminar - Jan 22, 2015Dr. Ann Cavoukian
 
How to become the best datascientist in Europe
How to become the best datascientist in EuropeHow to become the best datascientist in Europe
How to become the best datascientist in EuropeDigitYser
 
Privacy Intro voor SETUP Utrecht's "16.8 miljoen Nederlanders in één verjaard...
Privacy Intro voor SETUP Utrecht's "16.8 miljoen Nederlanders in één verjaard...Privacy Intro voor SETUP Utrecht's "16.8 miljoen Nederlanders in één verjaard...
Privacy Intro voor SETUP Utrecht's "16.8 miljoen Nederlanders in één verjaard...Ann Wuyts
 
Uxstrat amsterdam 2016 collected sketchnotes
Uxstrat amsterdam 2016   collected sketchnotesUxstrat amsterdam 2016   collected sketchnotes
Uxstrat amsterdam 2016 collected sketchnotesChris Spalton
 
Vuilbakkes Mobile App Concept
Vuilbakkes Mobile App ConceptVuilbakkes Mobile App Concept
Vuilbakkes Mobile App ConceptAnn Wuyts
 
Dear Marketers, How Badly Do You Know Me!
Dear Marketers, How Badly Do You Know Me!Dear Marketers, How Badly Do You Know Me!
Dear Marketers, How Badly Do You Know Me!Ann Wuyts
 
Social Media as targeting marketing tool in a Privacy-sensitive digital age
Social Media as targeting marketing tool in a Privacy-sensitive digital ageSocial Media as targeting marketing tool in a Privacy-sensitive digital age
Social Media as targeting marketing tool in a Privacy-sensitive digital ageLuisella Giani
 
IAPP Data Protection Intensive London - Transparency in Marketing (AP part III)
IAPP Data Protection Intensive London - Transparency in Marketing (AP part III)IAPP Data Protection Intensive London - Transparency in Marketing (AP part III)
IAPP Data Protection Intensive London - Transparency in Marketing (AP part III)Aurélie Pols
 
Webit Global Congress - Leaders of the Future Summit - Privacy and Data Prote...
Webit Global Congress - Leaders of the Future Summit - Privacy and Data Prote...Webit Global Congress - Leaders of the Future Summit - Privacy and Data Prote...
Webit Global Congress - Leaders of the Future Summit - Privacy and Data Prote...Aurélie Pols
 
9 Dingen Die Je Over Privacy Moet Weten
9 Dingen Die Je Over Privacy Moet Weten9 Dingen Die Je Over Privacy Moet Weten
9 Dingen Die Je Over Privacy Moet WetenAnn Wuyts
 
Designing dashboards for a Sense of Control
Designing dashboards for a Sense of ControlDesigning dashboards for a Sense of Control
Designing dashboards for a Sense of ControlAnn Wuyts
 
2015 06 18 datascienc meetup privacy - update - philippe van impe
2015 06 18   datascienc meetup privacy - update - philippe van impe2015 06 18   datascienc meetup privacy - update - philippe van impe
2015 06 18 datascienc meetup privacy - update - philippe van impeDigitYser
 
Privacy V's Personalisation - Sagittarius Travel Marketing Masterclass
Privacy V's Personalisation - Sagittarius Travel Marketing MasterclassPrivacy V's Personalisation - Sagittarius Travel Marketing Masterclass
Privacy V's Personalisation - Sagittarius Travel Marketing MasterclassSagittarius
 
Privacy By Designer (PHP.ghent)
Privacy By Designer (PHP.ghent)Privacy By Designer (PHP.ghent)
Privacy By Designer (PHP.ghent)Ann Wuyts
 
Get data without the creepiness factor, the privacy by design concept
Get data without the creepiness factor, the privacy by design conceptGet data without the creepiness factor, the privacy by design concept
Get data without the creepiness factor, the privacy by design conceptAurélie Pols
 
Update on Data Science in Belgium @datasciencebe by Philippe Van Impe
Update on Data Science in Belgium @datasciencebe  by  Philippe Van Impe Update on Data Science in Belgium @datasciencebe  by  Philippe Van Impe
Update on Data Science in Belgium @datasciencebe by Philippe Van Impe DigitYser
 
FIDO Privacy Principles and Approach
FIDO Privacy Principles and ApproachFIDO Privacy Principles and Approach
FIDO Privacy Principles and ApproachFIDO Alliance
 
Advantages of privacy by design in IoE
Advantages of privacy by design in IoEAdvantages of privacy by design in IoE
Advantages of privacy by design in IoEMarc Vael
 
A Framework of Purpose and Consent for Data Security and Consumer Privacy
A Framework of Purpose and Consent for Data Security and Consumer PrivacyA Framework of Purpose and Consent for Data Security and Consumer Privacy
A Framework of Purpose and Consent for Data Security and Consumer PrivacyAurélie Pols
 
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...Trivadis
 

Viewers also liked (20)

Privacy by Design Seminar - Jan 22, 2015
Privacy by Design Seminar - Jan 22, 2015Privacy by Design Seminar - Jan 22, 2015
Privacy by Design Seminar - Jan 22, 2015
 
How to become the best datascientist in Europe
How to become the best datascientist in EuropeHow to become the best datascientist in Europe
How to become the best datascientist in Europe
 
Privacy Intro voor SETUP Utrecht's "16.8 miljoen Nederlanders in één verjaard...
Privacy Intro voor SETUP Utrecht's "16.8 miljoen Nederlanders in één verjaard...Privacy Intro voor SETUP Utrecht's "16.8 miljoen Nederlanders in één verjaard...
Privacy Intro voor SETUP Utrecht's "16.8 miljoen Nederlanders in één verjaard...
 
Uxstrat amsterdam 2016 collected sketchnotes
Uxstrat amsterdam 2016   collected sketchnotesUxstrat amsterdam 2016   collected sketchnotes
Uxstrat amsterdam 2016 collected sketchnotes
 
Vuilbakkes Mobile App Concept
Vuilbakkes Mobile App ConceptVuilbakkes Mobile App Concept
Vuilbakkes Mobile App Concept
 
Dear Marketers, How Badly Do You Know Me!
Dear Marketers, How Badly Do You Know Me!Dear Marketers, How Badly Do You Know Me!
Dear Marketers, How Badly Do You Know Me!
 
Social Media as targeting marketing tool in a Privacy-sensitive digital age
Social Media as targeting marketing tool in a Privacy-sensitive digital ageSocial Media as targeting marketing tool in a Privacy-sensitive digital age
Social Media as targeting marketing tool in a Privacy-sensitive digital age
 
IAPP Data Protection Intensive London - Transparency in Marketing (AP part III)
IAPP Data Protection Intensive London - Transparency in Marketing (AP part III)IAPP Data Protection Intensive London - Transparency in Marketing (AP part III)
IAPP Data Protection Intensive London - Transparency in Marketing (AP part III)
 
Webit Global Congress - Leaders of the Future Summit - Privacy and Data Prote...
Webit Global Congress - Leaders of the Future Summit - Privacy and Data Prote...Webit Global Congress - Leaders of the Future Summit - Privacy and Data Prote...
Webit Global Congress - Leaders of the Future Summit - Privacy and Data Prote...
 
9 Dingen Die Je Over Privacy Moet Weten
9 Dingen Die Je Over Privacy Moet Weten9 Dingen Die Je Over Privacy Moet Weten
9 Dingen Die Je Over Privacy Moet Weten
 
Designing dashboards for a Sense of Control
Designing dashboards for a Sense of ControlDesigning dashboards for a Sense of Control
Designing dashboards for a Sense of Control
 
2015 06 18 datascienc meetup privacy - update - philippe van impe
2015 06 18   datascienc meetup privacy - update - philippe van impe2015 06 18   datascienc meetup privacy - update - philippe van impe
2015 06 18 datascienc meetup privacy - update - philippe van impe
 
Privacy V's Personalisation - Sagittarius Travel Marketing Masterclass
Privacy V's Personalisation - Sagittarius Travel Marketing MasterclassPrivacy V's Personalisation - Sagittarius Travel Marketing Masterclass
Privacy V's Personalisation - Sagittarius Travel Marketing Masterclass
 
Privacy By Designer (PHP.ghent)
Privacy By Designer (PHP.ghent)Privacy By Designer (PHP.ghent)
Privacy By Designer (PHP.ghent)
 
Get data without the creepiness factor, the privacy by design concept
Get data without the creepiness factor, the privacy by design conceptGet data without the creepiness factor, the privacy by design concept
Get data without the creepiness factor, the privacy by design concept
 
Update on Data Science in Belgium @datasciencebe by Philippe Van Impe
Update on Data Science in Belgium @datasciencebe  by  Philippe Van Impe Update on Data Science in Belgium @datasciencebe  by  Philippe Van Impe
Update on Data Science in Belgium @datasciencebe by Philippe Van Impe
 
FIDO Privacy Principles and Approach
FIDO Privacy Principles and ApproachFIDO Privacy Principles and Approach
FIDO Privacy Principles and Approach
 
Advantages of privacy by design in IoE
Advantages of privacy by design in IoEAdvantages of privacy by design in IoE
Advantages of privacy by design in IoE
 
A Framework of Purpose and Consent for Data Security and Consumer Privacy
A Framework of Purpose and Consent for Data Security and Consumer PrivacyA Framework of Purpose and Consent for Data Security and Consumer Privacy
A Framework of Purpose and Consent for Data Security and Consumer Privacy
 
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...
 

Similar to Privacy flip book assignment film 260 queensu kc

Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITYPresentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITYgailmowal
 
A Call to Action: Protecting the Right to Consumer Privacy Online
A Call to Action: Protecting the Right to Consumer Privacy OnlineA Call to Action: Protecting the Right to Consumer Privacy Online
A Call to Action: Protecting the Right to Consumer Privacy OnlineBrenden Brown
 
CSUN - Youth Driven Information Privacy Education Campaign
CSUN - Youth Driven Information Privacy Education CampaignCSUN - Youth Driven Information Privacy Education Campaign
CSUN - Youth Driven Information Privacy Education CampaignKimberly Gonzalez
 
Privacy and Social Networks
Privacy and Social NetworksPrivacy and Social Networks
Privacy and Social Networksblogzilla
 
1Running head CYBERPHOBIA3CYBERPHOBIA.docx
1Running head CYBERPHOBIA3CYBERPHOBIA.docx1Running head CYBERPHOBIA3CYBERPHOBIA.docx
1Running head CYBERPHOBIA3CYBERPHOBIA.docxRAJU852744
 
The digital divide in the post-Snowden era
The digital divide in the post-Snowden eraThe digital divide in the post-Snowden era
The digital divide in the post-Snowden eraIan Clark
 
NICAR: Open government, Gov 2.0 and open data journalism
NICAR: Open government, Gov 2.0 and open data journalismNICAR: Open government, Gov 2.0 and open data journalism
NICAR: Open government, Gov 2.0 and open data journalismAlexander Howard
 
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docxRunning Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docxtodd521
 
NSA Persuasive Essay
NSA Persuasive EssayNSA Persuasive Essay
NSA Persuasive EssayJill Lyons
 
Data Mining: Privacy and Concerns
Data Mining: Privacy and ConcernsData Mining: Privacy and Concerns
Data Mining: Privacy and ConcernsBradley Buchanan
 
comm120 week 6 discussion.docx
comm120 week 6 discussion.docxcomm120 week 6 discussion.docx
comm120 week 6 discussion.docxwrite12
 
comm120 week 6 discussion.docx
comm120 week 6 discussion.docxcomm120 week 6 discussion.docx
comm120 week 6 discussion.docxwrite31
 
Do not put too much information
Do not put too much informationDo not put too much information
Do not put too much informationShangli Jiang
 
Iot privacy vs convenience
Iot privacy vs  convenienceIot privacy vs  convenience
Iot privacy vs convenienceDon Lovett
 

Similar to Privacy flip book assignment film 260 queensu kc (19)

Internet Privacy Essay
Internet Privacy EssayInternet Privacy Essay
Internet Privacy Essay
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacy
 
10 Overriding Themes from SXSW (March 2014)
10 Overriding Themes from SXSW (March 2014)10 Overriding Themes from SXSW (March 2014)
10 Overriding Themes from SXSW (March 2014)
 
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITYPresentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY
 
A Call to Action: Protecting the Right to Consumer Privacy Online
A Call to Action: Protecting the Right to Consumer Privacy OnlineA Call to Action: Protecting the Right to Consumer Privacy Online
A Call to Action: Protecting the Right to Consumer Privacy Online
 
CSUN - Youth Driven Information Privacy Education Campaign
CSUN - Youth Driven Information Privacy Education CampaignCSUN - Youth Driven Information Privacy Education Campaign
CSUN - Youth Driven Information Privacy Education Campaign
 
Privacy and Social Networks
Privacy and Social NetworksPrivacy and Social Networks
Privacy and Social Networks
 
1Running head CYBERPHOBIA3CYBERPHOBIA.docx
1Running head CYBERPHOBIA3CYBERPHOBIA.docx1Running head CYBERPHOBIA3CYBERPHOBIA.docx
1Running head CYBERPHOBIA3CYBERPHOBIA.docx
 
The Digital Divide in the Post Snowden Era Presentation
The Digital Divide in the Post Snowden Era PresentationThe Digital Divide in the Post Snowden Era Presentation
The Digital Divide in the Post Snowden Era Presentation
 
The digital divide in the post-Snowden era
The digital divide in the post-Snowden eraThe digital divide in the post-Snowden era
The digital divide in the post-Snowden era
 
NICAR: Open government, Gov 2.0 and open data journalism
NICAR: Open government, Gov 2.0 and open data journalismNICAR: Open government, Gov 2.0 and open data journalism
NICAR: Open government, Gov 2.0 and open data journalism
 
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docxRunning Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
 
Cyber security issues part a
Cyber security issues  part a Cyber security issues  part a
Cyber security issues part a
 
NSA Persuasive Essay
NSA Persuasive EssayNSA Persuasive Essay
NSA Persuasive Essay
 
Data Mining: Privacy and Concerns
Data Mining: Privacy and ConcernsData Mining: Privacy and Concerns
Data Mining: Privacy and Concerns
 
comm120 week 6 discussion.docx
comm120 week 6 discussion.docxcomm120 week 6 discussion.docx
comm120 week 6 discussion.docx
 
comm120 week 6 discussion.docx
comm120 week 6 discussion.docxcomm120 week 6 discussion.docx
comm120 week 6 discussion.docx
 
Do not put too much information
Do not put too much informationDo not put too much information
Do not put too much information
 
Iot privacy vs convenience
Iot privacy vs  convenienceIot privacy vs  convenience
Iot privacy vs convenience
 

Recently uploaded

Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of indiaimessage0108
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirtrahman018755
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...aditipandeya
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGAPNIC
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Roomgirls4nights
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ☁
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxellan12
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607dollysharma2066
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...SofiyaSharma5
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girladitipandeya
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Servicesexy call girls service in goa
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
 

Recently uploaded (20)

Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of india
 
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICECall Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girls
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
 
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
 
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 

Privacy flip book assignment film 260 queensu kc

  • 1. K. C. Film 260 Flip Book Assignment 2015
  • 2. “ rguing that you don’t care about the right to because you have nothing to hide is no different than saying you don’t care about free speech because you have nothing to say.”1 Edward Snowden, 2015 Image by Jared Rodriques, Truthout 1
  • 3. The quote by Edward Snowden regarding privacy highlights the fact that people seem to be willing to on the internet for more access and services without really understanding the consequences and scope of the privacy they are trading away.
  • 4. Image by Ann Wuyts Five Data Privacy Principles from Mozilla (Put on a museum wall) 2014 2
  • 5.
  • 6. “Whenever you sign up for a Facebook account, Facebook asks permission to look at your e-mail contacts if you’re on a computer , or your phone contacts if you’re on a smartphone. When you grant the site permission, it searches your contacts for users already on the network, and it searches other users’ uploaded contacts for you.” (Caitlin Dewey)4 Image by P T. Privacy 3
  • 7. Do you think before you “…dismissed the suggestion that some passengers might find the practice overly intrusive, arguing that social media was by definition a public medium.”15 “Qantas had seen and “liked” the image (passengers), sharing it with the airline’s more than 26,000 Instagram followers.” Image by KC
  • 8. “As children develop greater independence, they need privacy in order to have genuine relationships with their parents.” (Kay Mathiesen 2013) 3 Image by Summer Skyes 11. OMG lkr Lol 4
  • 9. “If you are using Shopkick at a store with iBeacon, it also knows where you are in a store, where you linger, and what products you are interested in. Are the perks Shopkick offers worth the privacy trade-off?” 17 Image by Fouquier The Big Yellow 5
  • 10. “The combination of, “non-personal information” that Shopkick and many other services collect—is unique for about 87 percent of U.S. residents. That means if an app has this data, it usually has that you can be 17 ” 17
  • 11. Large organizations have not done a great job the public when gathering personal data. Issues like identity theft, compromised data and government spying is a cause for concern. 18 Image by KC
  • 12. “Sir John Sawers is the incoming head of MI6, essentially the British equivalent of the CIA. His wife posted sensitive personal information to her Facebook page, including the address of the couple's London apartment and the locations of their children and Sir John's parents. Her Facebook profile was left open to anyone in the London network.”7 Image by Jim Linwood. The MI6 Building, Vauxhall, London 6
  • 13. Is your Internet of things vulnerable to Cyber Attacks? “Security experts are sounding the alarm. "There is a big difference between the internet of things and other security issues," says Joshua Corman of I Am The Cavalry, a group of security specialists trying to promote greater awareness of emerging risks to public safety. "If my PC is hit by a cyber- attack, it is a nuisance; if my car is attacked, it could kill me.“16 Image by Pascal. Fridgenlight 7
  • 14. “Even the most careful, conscientious sites cannot control your resume after someone has downloaded it.” 8 Image by Flazingo Photos. Resume – Glasses www.flazingo.com per these terms www.flazingo.com/creativecommons 8 “ of hiring managers will review a candidate’s social profile before making a hiring decision. 10 have reconsidered a candidate based on what they find.” 10
  • 15. “The non-profit world naturally collects a great deal of private donor information and information that explicitly explains how and why you collect data and the specifics of its use are highly recommended. The effective and professional safeguarding of donor information is not only an expectation of the public but the ongoing provision of your terms of service could well be the difference between adding a new donor and having them elect not to engage with you.”10 Images by KC
  • 16. “The bill’s move to broadly expand information sharing between governments and give new powers to Canada’s intel agencies will “undermine user trust, threaten the openness of the Web, and reduce the security of the Internet and its users,” Mozilla internet policy director Jochai Ben-Avie said in a statement published on the Mozilla blog.”13 Image by Stephen Boisvert. Parliament. 9
  • 17. “Massive privacy breach at a Toronto hospital has led to 19 more charges, including six criminal counts against a nurse accused of selling the confidential records of new mothers as part of a scheme to peddle RESP investments.” 19 “Alberta’s Health Minister Fred Horne revealed this week that an unencrypted laptop containing the personal health information of 620,000 Albertans was stolen in September.”21 Image by U.S. Navy photo by Mass Communication Specialist 2nd Class Todd Frantom/Released)Official U.S. Navy Page. Fort Belvoir Community Hospital. 10
  • 18. “More than PlayStation accounts worldwide were compromised, 21 “ Target shoppers get hacked” 21 “TJX, the U.S. parent of Winners and HomeSense stores, revealed in 2007 that data from at least credit and debit cards was stolen by hackers.” 21
  • 19. “Before you post anything online, think about what a hacker, stalker, employer, or potential employer could do with that data. Could an ex, who's fighting for custody, use the data against you in court?”7 Image by Sean MacEntee. Privacy 11 “Don't give away specifics. Don't post your address, date of birth, kids' names, pets' names, phone numbers, or any account numbers or financial information of any kind.” 7 “Take advantage of privacy settings and lock down your profile, so that only those who you approve can view everything.”7 “Use a firewall.”9 “Read the Terms of Service.”9 Make clever strong passwords 9 “Beware sneaky check boxes.” 9
  • 20. “This is a brand new medium, and we are just now beginning to recognize its potential consequences. Something as harmless as a picture of a baby in a tub could be traded online by pedophiles. The world is changing. Be aware of your social media use, and be smart about it.7” Image by Smlp.co.uk. (2008, March 9). Locked in 19?? 10
  • 21. Sources 1 WashingtonsBlog (2015, May 21). Arguing That You Don’t Care About The Right To Privacy Because You Have Nothing To Hide Is No Different Than Saying You Don’t Care About Free Speech Because You Have Nothing To Say. Retrieved from http://www.washingtonsblog.com/2015/05/arguing-that-you-dont-care-about-the-right-to- privacy-because-you-have-nothing-to-hide-is-no-different-than-saying-you-dont-care-about-free-speech-because-you-have-nothing-to-say.html 2 Acohido, B. ( 2013, Nov., 18) Author, A. A. (Year, Month Day). Snowden effect: Young people now care about privacy. USA Today. Retrieved from http://www.usatoday.com/story/cybertruth/2013/11/13/snowden-effect-young-people-now-care-about-privacy/3517919/ 3 Mathiesen, K. (2013, July, 31). The Internet, children, and privacy: the case against parental monitoring. Springer Science+Business Media Dordrecht 2013 retrieved from http://link.springer.com/article/10.1007/s10676-013-9323-4/fulltext.html 4 Dewey, C. (April 2) How Facebook knows who all your friends are, even better than you do. Washington Post. Retrieved from http://www.washingtonpost.com/news/the-intersect/wp/2015/04/02/how-facebook-knows-who-all-your-friends-are-even-better-than-you-do/ 5 Chayka, K. (2015, March, 24). The New, Improved Online Friendship. New York Magazine. Retrieved from http://nymag.com/next/2015/03/new-improved-online- friendship.html 6 Hydro One peaksaver Plus. (n.d.). Retrieved from http://www.hydroone.com/MyHome/SaveEnergy/Pages/Peaksaver.aspx 7 Siciliano, R. (2011,May,25) Social Media Privacy and Personal Security Issues. Huffington Post, The Blog. Retrieved from http://www.huffingtonpost.com/robert- siciliano/social-media-privacy-and_b_245857.html 8 Dixon, P. (2009, February). Consumer Tips: Job Seekers’ Guide to Resumes – Twelve Resume Posting Truths. Posted to https://www.worldprivacyforum.org/2009/02/consumer-tips-job-seekers-guide-to-resumes/ 9 Editors Blog. (2011, Dec. 6 ). 15 tips for protecting your privacy online. CBC News. Retrieved from http://www.cbc.ca/news/canada/15-tips-for-protecting-your- privacy-online-1.1043194 10 Davidson, J. (2014, Oct. 16). The 7 Social Media Mistakes Most Likely to Cost You a Job. Money. Retrieved from http://time.com/money/3510967/jobvite-social- media-profiles-job-applicants/
  • 22. Sources 11 Posted by Tim. (2014, Aug. 12) New study reveals much about online privacy concerns – important findings for non-profits. Message posted to http://www.miratelinc.com/blog/nonprofit-fundraising-news-about-privacy-concerns-for-potential-donors/ 12 Anti-terrorism Act, 2015 (n.d.) Retrieved 2015, June,9. http://en.wikipedia.org/wiki/Anti-terrorism_Act,_2015 13 Tencer, D. (2015, March 27). Bill C-51 A Threat To Safety Of Internet Users, Firefox Maker Mozilla Says. Retrieved from http://www.huffingtonpost.ca/2015/03/26/mozilla-bill-c-51_n_6946602.html 14 Ingram, M. (2013, June 7). Through a PRISM darkly: Tracking the ongoing NSA surveillance story. Gigaom Research https://gigaom.com/2013/06/07/through-a-prism-darkly-tracking-the-ongoing-nsa-surveillance-story/ 15 Clark, N. (2014, March 17). Airlines Use Digital Technology to Get Even More Personal. New York Times. Retrieved from http://www.nytimes.com/2014/03/18/business/airlines-use-digital-technology-to-get-even-more-personal.html?_r=0 16 No byline (2014, July 12). Home, hacked home. The Economist. Retrieved from http://www.economist.com/news/special-report/21606420-perils- connected-devices-home-hacked-home 17 Golbeck. J. (n.d.). Track Star: this app follows you while you shop—and it needs a clearer privacy policy. Slate.com. Retrieved from http://www.slate.com/articles/technology/future_tense/2014/01/ibeacon_shopkick_privacy_policies_for_location_tracking_apps_aren_t_clear.html 18 Madden, S. (2014, March 10). Tech that tracks your every move can be convenient, not creepy. Wired. Retrieved from http://www.wired.com/2014/03/designers-tracking-tradeoffs/ 19 No Byline. (2015, June 2) Rouge Valley Health System privacy breaches lead to 19 chargesCBC News. https://ca.news.yahoo.com/scarborough- hospital-privacy-breaches-lead-192439254.html 20 No byline (2014, Jan 28). Personal data online: 5 of the biggest security breaches. CBC News. http://www.cbc.ca/news/world/personal-data-online- 5-of-the-biggest-security-breaches-1.2514287
  • 23. Images 1 Rodriguez, J. (u.d.). Edward Snowden. Truthout. Paired with the article: Noam Chomsky | Edward Snowden, the World's "Most Wanted Criminal" . Retrieved from flickr https://www.flickr.com/photos/truthout/14348649238/in/faves-59362381@N00/ 2 Wuyts, Ann. (2014, Nov. 27 Five Data Privacy Principles from Mozilla (Put on a museum wall) 2014. Retrieved from Flickr https://www.flickr.com/photos/vintagedept/15704560667/in/faves-59362381@N00/ 3 P T. (2010, June 16). Privacy Retrieved from flickr https://www.flickr.com/photos/propagandatimes/4707679041/in/faves-59362381@N00/ 4 Summer Skyes 11 (2012,Feb. 11). OMG lkr lol … txting . Retrieved from flickr https://www.flickr.com/photos/summerskyephotography/6981290631/in/photolist-bCUWtR-6bRRaE-eY6HhR-6bRR8b-3Z12zo-6G1YTc-8MfBV9-euYoS- 4gFmE3-5NZCNd-pW1qPw-pVZ5x9-pW8XUF-qdy6eK-qdnRqi-pgNeDa-qduHWC-pVZ5Dm-pW17Pd-d1hVRS-btbcvV-mULqL6-bvsNfb-aoUiXx-qDFBt3- dU8Sg2-4tPGZg-7LAVpL-9wExNK-5BYs7X-9wExRp-bGZ6yn-egurtP-7wfano-4zhY2v-87VPcZ-4UszxB-aJmY2-qmcFYA-dZWTcp-5spQR4-7UrzMr-7Urz3n- 7UrzVD-7UuQ8q-7UuQbC-7UuQkb-7UuQoq-7UrzYF-ndvhbK 5 Fouquier (2015, April 21). The Big Yellow. Retrieved from Flickr https://www.flickr.com/photos/fouquier/17077640499/in/photolist-s26nxz-byGJAh- pMxhJ6-aWfjJB-aWeNTz-e3huhi-ba4NaZ-4jyQ7E-bByERN-oKEwYY-oU8gRz-aWeLFK-p93oJB-pQVogC-8xz2Ed-aWeKZX-k4FGqr-of2i9K-owtqgC-owvdti- 8aj9xy-oxYsg6-ounKEf-outnmf-8ahZ8H-owbQ27-ocsCZL-oddzf5-ocsx9i-ow1VFq-ow1RqG-ovYjNo-ocMmGX-owf1mT-ovFcxT-oeNsPd-oeEZuj-oemFxx- oy8Cy2-owtQ7U-ow1VXN-ow6X45-owqKJG-owjBXV-ouiw5x-5HogZC-oeTzHH-oehWct-oeZ5cQ-oeJCwD/ 6 Linwood, J. (2008, Feb. 19). The MI6 Building, Vauxhall, London. Retrieved from Flickr https://www.flickr.com/photos/brighton/2279813534/in/photolist-4tsD8U-4rar69-jjLgrV-7y5Hww-6MWis-kmvNDz-ppNBij-hXWMg-hCNVr-8yiX5u- bsRric-cbFSc1-nV16F2-khLw4M-bTuxmM-ryW4gS-5t1utD-e4ABM5-jnRY2N-5t1SWK-5t1LSp-5t69oL-5t68B7-5t661A-5t5TSL-5t5MXQ-5t5Jrh-5t5HYY- 5t1hYK-5t5F5N-7cULj6-9TVK7j-ndEmsF-rCxQK3-4f5u44-j5c6hY-deG8DG-hVwfX-eBeMUd-eBbCVF-eBeK5w-eBbAS6-eBeHdC-eBbzi8-eBeFJW-eBeESQ- eBbwD6-eBeCWE-eBeCoU-eBeBQE/ 7 Pascal. (2010, Oct. 10). Fridgenlight. Retrieved from flickr https://www.flickr.com/photos/pasukaru76/5067295473/in/photolist-a26j1E- tsBDuq-5kdmhv-79ZUM9-jhvyDo-jhvvMm-uocL6Q-8HMdpk-feiniv-iGH-iGG-iGF-iGE-oeCrEk-owr5Vs-ouQ7eL-oeYoAJ-owaKRN-jhvvcy-jhvztu- 8HMa6V-rYonmx-iGJ-ow8bpc-owfae9-obTYp5-odncL3-oezoho-ovDmsJ-odmw9Q-ou62cM-otHE65-odkBGc-ow87FP-obSeRD-oenz6R-oxHezp- ovgH2G-oe6723-tCMRpG-r8dEzu-t4n6cq-oektfs-oeJHod-oeJWFK-ouJDiU-rpBd16-ovKkTW-rptYWj-sFUPZ5
  • 24. Images 8 Flazingo Photos. (2014, April 27). Resume-Glasses. www.flazingo.com per these terms: www.flazingo.com/creativecommons. Retrieved from Flickr https://www.flickr.com/photos/124247024@N07/13903383190/in/photolist-nbAtrh-k8FtG-7ZuYoC-aGVn3H-axtL89-6UwsBM-7aJuB7-9o1iCk-6gMAEm- 6pLznz-4kSTMx-6F2oWU-78W2Go-9y6J4c-6fzJbw-83AHaV-59LL6M-9bFTK7-4zxGN3-8ydvDs-4zxGN7-6pLA6Z-9FVEXv-5G58GN-85oPQ8-6dhcm4- dQVkWu-53WNkL-5GoACZ-86dXtu-9usg3j-5t2W32-2TUU4y-6pQHZd-7xbhG7-7Z9fs4-nLzw57-7vHmpF-7LtPew-5y1i36-dgdDKj-7vYGuo-6CxxCs-4sKWZb- pwEZZX-dVN969-4LqJyF-6j7tJi-6NyQMr-87Mfd6 9 Stephen Boisvert. (2013, Sept. 12). Parliament. Retrieved from Flicker https://www.flickr.com/photos/srboisvert/154148968/in/photolist-eC47Q- qX1RyH-bsqoDk-bsqnXv-afzyQy-5WUcnW-5WPXqa-5WPXPR-5WUcvS-5WPXEX-5WUccu-5WPXL2-afwMDk-afwMzT-5WUczU-5WUcjY-5WUcfW-5WPXSx- 5WPXUa-5WPXrt-5WPXJr-5WPXtF-5WUcdW-5WPXBt-5WPXvk-5WU9KC-afzyZ1-afwMqK-afwMyK-afwMsx-afzzbu-afzz6W-afzz47-afzyP7-afzz1j-afwMHv- afwMj8-7T47XR-c2Y9s-afzz4Y-afzyXL-afzyS9-afwMGa-8aSTxU-bFY5qM-4QvFVx-7T7e4U-6kMQ8n-6dx7Qr-5WPXic 10 U.S. Navy photo by Mass Communication Specialist 2nd Class Todd Frantom/Released). (2011, June 22). Official U.S. Navy Page. Fort Belvoir Community Hospital. Retrieved from Flickr https://www.flickr.com/photos/usnavy/5913486058/in/photolist-a1yaob-4wULmG-4SQoUf-ijUKnZ-7xhBng- 4oRFy4-8eweiE-hfwSgV-o9mMRT-5NTvFA-dAs6qD-e8Bmjb-e8Bm93-7Wqhei-h8oMGw-ecP4An-8bnTDJ-a4nkyu-5npEuv-a5tAA1-5H1G3c-e6g75r- 71aYsm-dnbUv1-bn5ohY-4ptDiZ-r4cZb-2ywEDH-nqFX6d-4SFz6v-dAxAp7-a3VHN3-autfjD-6vBPft-pQwHww-87awi2-cWJGjL-ajPSps-cQVnbw-aaWgvM- tjaizy-7g7J4f-dnbKop-dnbPgU-e71Utc-cw2MPj-9ASSCn-dnbS4e-e71Zrc-hH7xAq 10 Smlp.co.uk. (2008, March 9). Locked in 19??. Retrieved from flickr https://www.flickr.com/photos/biscuitsmlp/2324706925/in/photolist-4xqJnT- pNfQ2V-4w9csh-dG6neS-9uKVDe-bAUx5j-e6k5Ak-fEQbRx-dFVZx5-SoX26-ak2q9v-8r2CVR-9oNPZn-mgjU2U-4jh6xz-azPbgb-oFMMB2-72xiQ7-6aRr8S- X54YR-9yZsf4-mvZV7g-8H3hcn-9MD5JS-rbCTk1-bn1aZv-bD1SrM-cEPn4G-rHGUvU-4XpCsF-dfJH2y-9TL2A2-kDM3G2-55Gdmp-892XCK-e3qsFM-9PhLeX- 8xdNPk-9h1Zgc-9LKJvt-rL8wjY-9h1bLJ-3ipg6L-2vmN8u-rgm2Me-anuzJo-8pqb2e-bSXtGM-pdHFcc-2JZJSr 11 MacEntee, S. (2010, May 9) Privacy. Retrieved from Flickr https://www.flickr.com/photos/smemon/4592915995/in/photolist-7ZRTUP-dZ2y6b-82djZx- 84VZAr-hQTx1c-7fNVzm-8b15Y2-azTdMo-4EvWY9-gyXnY-pDmshR-edvyKx-822bu2-8i9dVE-eARcff-aHKoc-5UYfNP-axwagd-o3MtjS-9qR8HQ-9i7ZK2- 4WrJkA-pVKYKn-Em1Z9-7qxzPp-48ybNM-66r3T6-dRuMzt-ddpg14-7H1j1A-eTrqcD-pgokPc-iCz9t-6wCshe-ahk6nh-9Mcwzt-46PRKe-5V3xR3-7nzT7w- qmKn1-9t8qco-kCRTxX-raUSiK-qF6Pw5-mXs67q-7XSHP1-t1pSZ3-skYusG-t1pRGd-8hZ2Es Note: Images by K C were taken by myself.