Digital security is compromised as personal and company information and medical devices can be accessed without consent. Over half of smartphone users are worried about security on their devices, rightly so, as apps can track location and identities even when privacy settings restrict this. Data collection policies often lack transparency around how data is used and shared. Mobile apps may access sensitive information like location frequently without the user actively using the app. Comprehensive digital security remains an unsolved challenge.
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Flipbook assignment digital security compromising our information and our health
1. Digital
security
How
secure
is
it
really?
Digital Security
Photo:
cc:
Bart
Carrade -‐ www.flickr.com/photos/79011202@N04/7072609283/in/photolist-‐bLYYkn-‐9FWHcc-‐bwC1f2-‐2BTPCo-‐2RDkiu-‐f7Fkhn-‐km1tFH-‐8sjp3y-‐7w4VE1-‐28Ds22-‐sUXQ6-‐kH7Q3X-‐
6hZux7-‐nCStzM-‐5iYBjz-‐7PwA1X-‐fE13e3-‐LZ3Dp-‐qHY6Mw-‐gU3peV-‐ah3YXB-‐5GiNip-‐9579Au-‐e2rYY8-‐5iPrPD-‐7jjxwU-‐48cAWc-‐pBKSWU-‐7JSrFD-‐bqEriT-‐qwWeeF-‐eW3S9h-‐83CqCS-‐9djz7q-‐q41Zkh-‐
8dHWy4-‐3T3Se-‐8vhN34-‐eABbhZ-‐55EBwp-‐dWuBMW-‐5vXTLG-‐oMYHKD-‐aANE2-‐r1bohc-‐fFPc7w-‐5wq1Jx-‐p6DXEN-‐8qZekG-‐dwHZKK
Compromising our information
and our health. By:
Erica
Carnevale
2. The lack of digital security has
compromised our personal and company
information, as well as our medical
devices.
Photo:
Cc:
abdullah.khan2012
-‐ www.flickr.com/photos/75862793@N06/6812695893/in/photolist-‐bo1R92-‐5uJAoe-‐tdcqNN-‐5iJeQd-‐8tXVig-‐bo1RWk-‐dAVeCJ-‐9NZ3iX-‐dAQBfD-‐5BuyeX-‐dzkUGb-‐5iHjaA
ehT2jv-‐8Awb6L-‐e4SthJ-‐8J1khi-‐qvNpmr-‐bhHvwx-‐6cwx2o-‐acjC7c-‐vxi-‐9gWgTb-‐6Evq3k-‐9QmUyn-‐mG6WrQ-‐9YD6Vw-‐mG3mdX-‐haWTXU-‐mG4n4v-‐b67Ej-‐mG4a74-‐mG4i6F-‐mG2XAH-‐LSutf-‐mG5xbJ-‐
mG583J-‐7mdYcf-‐eQBHN1-‐mG4wnc-‐mG5t4L-‐mG4Een-‐jESE12-‐2ia9Rc-‐pyD8we-‐mG58KX-‐9QpJ33-‐cdxYCs-‐tvksmy-‐ex2J3H-‐dYdmN
3. 2/3 of the Canadian population owns a
smartphone.6
Photo:
Cc:
Gonzalo
Baeza -‐ www.flickr.com/photos/gonzalobaeza/8292958010/in/photolist-‐dCPzuE-‐fhEmim-‐jpBnkE-‐i52con-‐5A3Kon-‐9Li1n1-‐oZN6c9-‐i5L2an-‐hu8x36-‐7gEWV7-‐peadiC-‐jpBnC3-‐
7w8xG1-‐jFzBKX-‐7LAtpL-‐i5bSmz-‐g93SZD-‐jAcpuE-‐p6hnj5-‐ptBVF7-‐eM5aF6-‐job32H-‐pdWJe5-‐rmZJES-‐eM5wxX-‐kWvShV-‐9qmJp4-‐AXKxcb-‐deLgpu-‐peab6w-‐8jvm3s-‐ptBQc1-‐pvnKai-‐oeDrpa-‐pwNUsN-‐
9qpLks-‐i5bgT9-‐eM54Mp-‐eMgGbE-‐jpBnx3-‐8TQyba-‐pvE51B-‐4QoDw9-‐9qpKtA-‐9qmHyv-‐pea9Py-‐i4WK4B-‐9qmGPK-‐21PJaA-‐eyaiBQ
4. 54% of smartphone users are worried
about the security level on their mobile
devices7…
Photo:
Cc:
Jimmy
Álvarez -‐ www.flickr.com/photos/jimmyflickr/2892191058/in/faves-‐143778368@N06/
5. …… demonstrating that with advancing
technology people still do not trust the
level of security that their devices
possess.
Photo:
Cc:
Marcie
Casas
-‐ www.flickr.com/photos/marciecasas/5347580266/in/photolist-‐99xKiL-‐9vw3rV-‐rmB6z8-‐abhKDz-‐oiFHFy-‐g8KAp9-‐5Xnd1G-‐5oYETZ-‐k4zbd4-‐4jxdZH-‐oa6eaC-‐2pcoBB-‐4vareY-‐
bjLFXK-‐5Wtibx-‐r5a29j-‐8NYgsR-‐4ZJEm2-‐3kTLzq-‐frLeXm-‐eYKV7c-‐8ySvFB-‐6Yoiq8-‐Bq9iBh-‐2kHCE-‐avMNa5-‐5pwiva-‐4UUSFp-‐bsmmzd-‐ekFX5v-‐a2v9fG-‐8NHKks-‐56mn88-‐nx25o-‐7fAPZc-‐2oQHhp-‐5wqAR3-‐
nd8skd-‐nXCEn-‐6Caj8v-‐urX3T-‐bQZTzZ-‐5QxKEK-‐gDM8Y-‐7N6FpZ-‐czJw43-‐bqJNEK-‐9u3UiC-‐4MkQyw-‐4yUpNz
6. And they should not trust it!
Photo:
Cc:
Kay
Yin
-‐ https://www.flickr.com/photos/imkiwiyournot/8296251942/in/photolist-‐dD7sEA-‐dAAKXV-‐bAZc9u-‐ksvkir-‐7x7SxV-‐Nx6Az-‐bx4Gyu-‐4qyv6H-‐foF2B2-‐9PWn8R-‐531zHS-‐nSQ13j-‐
amLMGg-‐8GM6M5-‐cEXuSy-‐LhSVM-‐9meLzG-‐4AZH4B-‐rdUG6q-‐9JbnDJ-‐8rVGqY-‐tZteF-‐4HxqZj-‐dQPXEa-‐a293rk-‐9B5zsH-‐7976Ex-‐8Y24Kb-‐7vaeng-‐8phKha-‐apdFZp-‐6FX74T-‐4LLTEL-‐rFJCWH-‐9mL9eW-‐
ak8osE-‐7Au7dM-‐5AxoVu-‐6DDQHr-‐8gav3x-‐5Uq3ZA-‐3eBt5x-‐9YVcQS-‐F2hV5-‐N9tfi-‐9yteV-‐4qiQDe-‐oJygow-‐bbijFa-‐tCJ8Y
7. Smartphone data that is gathered can be used to pinpoint
your location, identify you and monitor your phone,
regardless of app privacy policies or phone settings.12
Photo:
Cc:
Yasunobu Ikeda
-‐ www.flickr.com/photos/clockmaker-‐jp/2662752901/in/faves-‐143778368@N06/
8. Shopkick is an app that collects personal
information about the user but does not outline
what the information is being used for and who
it is being sold to in its privacy policy.4
Photo:
Cc:
NATS
Press
Office
-‐ www.flickr.com/photos/natspressoffice/13085089605/in/photolist-‐9m8RsH-‐4z7rwb-‐fxQpM-‐2b61H9-‐eZxVuK-‐ak7hXk-‐8UxCTj-‐8QEcXb-‐9mco4f-‐btTti5-‐9pxgGB-‐arF84-‐
7zSsL1-‐9r3HWm-‐vFmTy3-‐5eVeXR-‐nJeZWZ-‐9Uz7bc-‐CqaqGY-‐bJDnpB-‐gegezb-‐g9FDWk-‐gbbC6J-‐HPWZNT-‐kisKDH-‐eVCzWz-‐y7Yp6f-‐jHwscd-‐brsQrH-‐geHAXk-‐g8dbjY-‐gbaGAr-‐g9FHdk-‐g8kxgn-‐khg-‐gGqspG-‐
gGqCej-‐gGgAkE-‐gGh9CW-‐gRaFve-‐f6XbVk-‐g8cQip-‐gJcj59-‐7wbp3W-‐gR96JZ-‐gGt9VN-‐gR827h-‐kWhvgc-‐kWhvig-‐kWhvN4
9. Preventing apps
from using your
location or
restricting them to
only use it when
you are using the
app, is not enough
to prevent the app
from tracking your
device.3
Photo:
Cc:
JOSE
SANTANA
-‐ https://www.flickr.com/photos/34340561@N07/16123207190/in/photolist-‐qyKDLS-‐
oqmKnf-‐ec2tJF-‐bw63y7-‐nTKzmB-‐gXndWK-‐e6rn8f-‐fK5siK-‐s7KcVS-‐pdRxzH-‐awRP6g-‐dWCHKe-‐omfAVB-‐anqVsJ-‐
6WvtLg-‐dC3nrM-‐8CL57e-‐qHpuZE-‐gYJrBr-‐qyw3HK-‐rgUkph-‐4zV17D-‐aTsuUp-‐xwosGd-‐dT6A2Z-‐a328ww-‐ota6wU-‐
EZqp4V-‐nJvSKe-‐re2v5r-‐bvLtQX-‐pWTskF-‐9wVGUq-‐pNGYiT-‐n6S7Gn-‐9YKf4D-‐qFmQxs-‐rs7xgU-‐fDEjr1-‐rbTTy9-‐zNS6gc-‐
ePHVJF-‐phop4p-‐6z6hK2-‐rpSdFY-‐ejdpXm-‐dvdHYr-‐mb5LEg-‐codzeC-‐8Kk9pB
10. Photo:
cc:
Mikhail_108
-‐ www.flickr.com/photos/m108/14900693136/in/photolist-‐oGHWWm-‐9KDR4w-‐rTh92w-‐pWYTSK-‐qde4VK-‐e3uEtT-‐9mtKbm-‐9kfFfA-‐sssbZt-‐fAJW9n-‐azmh7G-‐9mfja2-‐58vzRG-‐
7EhY6G-‐9mhrdz-‐49S34-‐5CWLE3-‐dNdWaA-‐6DV6Xy-‐aF85tD-‐bcLUgM-‐dVdg6J-‐fYyP78-‐nw1gHG-‐5ZPxra-‐79huAo-‐eJvJ8F-‐5JB2YS-‐aF8518-‐8y3pTW-‐o7M1X-‐peU6Q-‐aFbTWw-‐9uZD9Q-‐oskZ1R-‐aFbTTm-‐
5koG7C-‐a1swjG-‐a1svXm-‐4KFAiH-‐7zveJu-‐7ysCdk-‐7p313i-‐eZNDiE-‐qB4Tof-‐aF84Sx-‐n47gZR-‐fzbHvT-‐fEvBaf-‐8VKTrB
The Weather Channel accesses your location on
average every 10 minutes even when the
application is not being used.11
11. Photo:
Cc:
Carlos
Enciso-‐ www.flickr.com/photos/krynowekeine/2703085724/in/photolist-‐57S2dh-‐
anugYV-‐8JDpUk-‐4DUj7t-‐6ZwD6a-‐aHDBzc-‐nQjXBf-‐irF6Zz-‐bYk9XS-‐pVCNxd-‐pXatNz-‐5SKg4s-‐nPo7W-‐
8NY6pe-‐6HtZeY-‐53DM8u-‐4mBqT8-‐cLf2FJ-‐9GzL8R-‐zvoKWP-‐9vgDsi-‐mDEbwD-‐mNiVnX-‐dc7tQL-‐pSAumv-‐
6g49Hd-‐hVm9YF-‐kEzNo-‐aDbWzk-‐6XEPZo-‐rh1MX1-‐2bFBUn-‐dkfD63-‐oPbxPL-‐bVPS5R-‐4T5Dmr-‐bjBLk4-‐
eXiQZJ-‐67S2qB-‐dkXsZw-‐7qWay5-‐aXCjbc-‐4QsgZ3-‐81kkEj-‐4tXTwW-‐B3VXk-‐5cfVvW-‐diojeE-‐atNu8-‐kaQQ8r
Sensors in your
devices and apps
that collect data
and track your
location, could
cause you to be
more vulnerable to
cyber attacks.3
12. Personal
information is
now being
compromised
because of poor
digital security
and now company
information is
also under attack.
Photo:
Cc:
Sivaserver -‐ www.flickr.com/photos/91707070@N03/8331732961/in/photolist-‐dGfiWi-‐
aMbw5H-‐2Yxv9A-‐ap5Je6-‐aeKut7-‐8CpFau-‐6rf4Xg-‐8G68F2-‐hQf1N4-‐bfmZ4v-‐bxFnW-‐8G68zt-‐dQEPCC-‐
9XaVP2-‐8t6B4C-‐uiDMM-‐6UDnWP-‐2b5yP9-‐8G9iDJ-‐rEAH-‐8G68JX-‐nmZnrf-‐8G9j7q-‐8G68VZ-‐dvdWi-‐8G68jZ-‐
8G691g-‐cZUPK-‐8G9iL3-‐6jQj7m-‐9uQG7p-‐9wJLwq-‐61yf68-‐9bWVHV-‐7uXPBA-‐4mAf35-‐3A1j1z-‐5c5WBr-‐
o2diQp-‐9JwUna-‐c8pb39-‐hfXPnN-‐pZKRuh-‐uqdE6-‐7Wxvgo-‐6JgTHw-‐uq4zV-‐6jTJBA-‐3A1nek-‐633hUd
13. Wearable technology makes it easy for employees to
gain secret information about their employer because of
the discrete size of the device.2
Photo:
Cc:Kentaro -‐ www.flickr.com/photos/kaleidalabs/17288411245/in/photolist-‐skHCkX-‐rDfcBu-‐s1neMt-‐s2oh7i-‐skF39F-‐shEAaf-‐tsUEqj-‐tKBETt-‐oZKSSM-‐tsUEs3-‐skHdVv-‐sNEFuK-‐rxCLNV-‐tsVfW5-‐
s4ggoP-‐s4geaa-‐tKBFJM-‐rg4of3-‐skHB6c-‐sfwwx7-‐BmpvT1-‐s7BFJU-‐sgAVBJ-‐p9qyGp-‐sg8pQ7-‐Cv7uK6-‐s49eDm-‐oSur3d-‐s47UyN-‐s49kuE-‐s47VVL-‐roH5RJ-‐skyekJ-‐s2oegi-‐siqudm-‐roHh7j-‐s4g5vB-‐s2o3Xc-‐
s4g3FV-‐roHcfA-‐roH52h-‐s47Xyf-‐sky5a9-‐oZKRft-‐skEMHX-‐saNZmz-‐rsjqaq-‐FLBgAQ-‐FEJ4Cu-‐rdNUQQ
14. Employees are open to wearable
technology such as smartwatches while
in the workplace.8
70% of Millennials8
51% of Generation X8
Photo:
Cc:
Randy
Caldwell
-‐ www.flickr.com/photos/misterperturbed/6321178442/in/photolist-‐aCzG8d-‐dfKUvh-‐9BSptf-‐dNzL7V-‐adDCVX-‐7mUtiX-‐e183o8-‐9N8BXZ-‐5A4XGt-‐b5HsBV-‐4so2Pm-‐77xo3J-‐
6vFYag-‐6uJGPD-‐apQzvX-‐6RsH6B-‐bN45xp-‐oBjgjh-‐63RtEc-‐5co28q-‐4T4JwP-‐6StU3G-‐bGZZTB-‐7RYdss-‐4mcyyB-‐ifaPZK-‐5cP725-‐6e7Cca-‐5dXg6g-‐5HKn6o-‐8GUmVW-‐4eaGRU-‐ae8Nnr-‐8XRZ69-‐2XgkS7-‐
8adZUK-‐ctA8WU-‐ddg4wH-‐6PwAQ1-‐7vNsCg-‐9kVn5C-‐4Ru2mz-‐gSE3xd-‐aheuj5-‐2X8wAS-‐8xjChz-‐2Shzpt-‐6exmYs-‐3SeL8J-‐4xDem6
15. These individuals are the future and with their
acceptance towards wearable technology
in the workplace, company security will become a
serious issue.
Photo.
Cc:
Geoff
R
-‐ www.flickr.com/photos/sockrotation/4301185320/in/photolist-‐7y5GxA-‐6epSQ1-‐edYmW-‐JXcQk-‐boGFEr-‐r2TAmZ-‐6amA3a-‐7BKMW6-‐78dU6H-‐9dK1A-‐czomPS-‐aYzc7r-‐8dD3c5-‐
ahyKd7-‐crmFc-‐bgwVWn-‐bdLjtr-‐9wGnZd-‐bcGyWv-‐7tRLqF-‐6JEup6-‐89N7vC-‐jU28M-‐21DDxg-‐8HXjbs-‐4EG8cS-‐5g8Gk5-‐7n71SR-‐4GMyDi-‐emN9f-‐5yeAn2-‐qQQuYJ-‐91NFdN-‐8tcm9d-‐Kb56V-‐2z8mCe-‐udZKv-‐
269VsE-‐78Hnyv-‐r2vFSN-‐pA82SF-‐3pQaVB-‐5NqtWW-‐YQSig-‐uGQFk-‐o9QhbW-‐4SiijR-‐7xCknd-‐b4Vg5F-‐52rGjR
16. Not only is personal
information affected but our
health is now under attack
with the ability of hackers to
access medical technology.
Photo.
Cc:
Cat2398
-‐ www.flickr.com/photos/9501510@N02/9667098575/in/photolist-‐fJfpBn-‐eKoVxK-‐2FGkT2-‐779t3E-‐6aduTP-‐pj5dav-‐pj5cHi-‐andndG-‐nAHYxa-‐pj6e5A-‐2ywEDH-‐pJcnBs-‐4hHLyc-‐
jKVFj7-‐8mh8fz-‐pyxBAh-‐andqXh-‐4kSm6G-‐pj6UrD-‐aiSUf5-‐4RWiNA-‐4ZNbyu-‐5m6n1Z-‐6yjsMr-‐5R9wJX-‐oYWwus-‐pj5bBF-‐pj5dFv-‐andyFm-‐mgRpqV-‐pj5bRD-‐ckGuhU-‐2Eippg-‐97rLC4-‐aCGMHM-‐97rNyK-‐
pAj2CX-‐5m6m5D-‐pLi7Vd-‐2BnH5p-‐nrwbFK-‐eYT1f3-‐anaANF-‐4pQVek-‐8pNoiH-‐anaDpK-‐c2PXME-‐5SUY5F-‐3JNaFR-‐5QsHYK
17. Thousands of medical devices, such as x-ray
machines, MRI scanners and drug infusion
pumps, are exposed to hacking,
resulting in significant health risks for
researchers and patients. 10
Photo:
Cc:
Trey
Menefee -‐ www.flickr.com/photos/trey333/4058372679/in/photolist-‐7bCdNK-‐72TnnS-‐gd4JNa-‐h4a4Tm-‐3qVzq5-‐sgnUc5-‐hk4EvK-‐8puvSw-‐3npcCN-‐6QGcKa-‐5CRA9X-‐8xw2No-‐
bA6VdM-‐ak13bw-‐a8dZfJ-‐EW5aY-‐kjMaCR-‐fUCdzX-‐epMjcs-‐fbYcD9-‐ptP4G-‐8JZ2LF-‐74oyvD-‐74st6q-‐9pF7R-‐app5M6-‐5EpcsE-‐bsmFkz-‐eehzuc-‐8p8S2M-‐ryH1i7-‐app5dv-‐5kausR-‐djZY4h-‐4ahH3B-‐hsmzL-‐
74staJ-‐9p1MH4-‐65G3d1-‐6QKgmh-‐qt8RmK-‐fRwD2-‐9AmUKX-‐8HN5i6-‐fRwxu-‐fXEUPf-‐bt4u2a-‐dwVXmf-‐7z2GJh-‐EGpUEy
18. Something
as
simple
as
a
computerized
insulin
pump
could
be
hacked and
administer
a
dangerous
amount
of
insulin.5
Photo:
cc:
Alan
Levine
-‐ www.flickr.com/photos/cogdog/24410761961/in/photolist-‐Dc6x5e-‐25AL36-‐8PvAQr-‐7aJgBW-‐6dEHDv-‐4DCV4d-‐o8vonH-‐dAgLdo-‐dAgsmo-‐dAbhtP-‐6dEMht-‐bVFEVj-‐dAgM93-‐
dAaZQD-‐dAbiXx-‐dAbeVt-‐6dJSLf-‐dAaYPv-‐dAgLX3-‐dAgGXf-‐8Ef6GH-‐8b5Acz-‐dAgJsS-‐6DEik8-‐8rBGq8-‐dAbi8M-‐dAgJVu-‐dAgNas-‐dAbjhV-‐dAgGM5-‐5W6aek-‐dAfpq3-‐48Jz9U-‐dAbeMr-‐6dEMun-‐dAaYw4-‐
dAbf9M-‐rmP4d-‐dAgs6j-‐bN8iev-‐aRCCAn-‐dAaZsc-‐9iwUHU-‐dAbj6B-‐d4CYHj-‐98EJYb-‐q5NaTu-‐4nDv6r-‐qnbVAF-‐7WzWop
19. Photo:
Cc:
Lars
Nielsen
-‐ www.flickr.com/photos/31291514@N04/13953040668/in/photolist-‐nfYYSG-‐dYgNVD-‐5mFXbD-‐hd5wU-‐8qUkFB-‐5P4zDk-‐5n2PY-‐dvcZad-‐5WtXJy-‐7KR6CW-‐ev26jp-‐5c5cEh-‐
66Z1vu-‐81yxjx-‐5MPfm7-‐9uaeyi-‐83s9nT-‐4dj37C-‐57Tsyg-‐5R1oy8-‐pzWojf-‐bphqKF-‐oLAYoe-‐8CeQ3z-‐bud7JS-‐ashm5t-‐7XKRzd-‐ag2gvL-‐apbYU5-‐3AhiCv-‐76Xyr8-‐4M4Paz-‐64HxYR-‐6D8Cgk-‐64QfAW-‐9uLTxi-‐
baQN5R-‐7gXPn6-‐egss9F-‐6uUeTe-‐9gHyTk-‐5xXrq-‐r7BEFo-‐53vgLG-‐54LpAh-‐9fZazU-‐7kmxkJ-‐jfmvRv-‐3GzgeA-‐gXmb7t
How can we prevent
this from occurring and remain
safe in the digital world?
20. To increase digital security
for personal information,
company information and
medical machines you
should…
Photo:
Cc:
Defence Images
-‐ www.flickr.com/photos/defenceimages/6938469933/in/photolist-‐bz8tnX-‐4c9jPm-‐7wtiuh-‐8VafEh-‐6PRxhq-‐iqdv6-‐3gFv8o-‐qFazgy-‐b4HXag-‐bnx3rn-‐7QsvVh-‐6PMpza-‐
dWVK4Y-‐7R35TL-‐91oJMR-‐dx8dRU-‐q4WwbM-‐ezmdir-‐hoMMAK-‐e4tEhy-‐9nKs6F-‐6PMpDR-‐6PMpni-‐6X1r5J-‐arBLng-‐gZ9cos-‐a39gFk-‐qjMtJz-‐oZNyv-‐nm9pLx-‐9aQxiw-‐jAvJse-‐chPnS1-‐pS6reA-‐bMfPP-‐
pQ4ozQ-‐bz8tuK-‐srbKe-‐bz8tBR-‐93bWr3-‐dWLwrz-‐bmdAKd-‐d9gMVb-‐7oLnmk-‐PGkKh-‐4Qu5XV-‐a6pFHb-‐6Xjqcm-‐qSbTyo-‐4GQUJB
21. Photo:
Cc:
Karol
Franks
-‐ www.flickr.com/photos/karolfranks/15136260663/in/photolist-‐p4xhXr-‐4VCEHf-‐7rGXLn-‐8w2AKt-‐eefodz-‐oTEycq-‐j1P9wV-‐eacbDC-‐sjZXzH-‐5Vnb1t-‐5kDUvW-‐4FUpDx-‐
CedUUw-‐9rwG83-‐9DeeWv-‐62VnQ2-‐azLjAh-‐8yMA6C-‐567p-‐2goVK7-‐f2f61a-‐jabPo5-‐6Ztnz6-‐61zdbE-‐VgjKe-‐8o6Um3-‐4yZyv2-‐bPiVCc-‐7XjZ5S-‐aeMzr3-‐ncoXC5-‐aqeq7S-‐QuQNR-‐nSaTsQ-‐oio1gn-‐r29bk5-‐
4cq6Ht-‐83LQef-‐ogHLLH-‐bpcRvq-‐eHbRcJ-‐cBykzs-‐bpb3NV-‐6FFXTq-‐8AUv2E-‐p3zfGw-‐5fVAoS-‐9mDA1w-‐9QGeWv-‐nzjQWL
• Avoid giving personal information to
apps.9
• Establish security policies for
wearable devices in the workplace.2
• Hospitals should develop strict
network policies to avoid hackers.1
22. Works cited
1. Arsene,
L.
(2015,
October
4).
Hacking
Vulnerable
Medical
Equipment
Puts
Millions
at
Risk
-‐InformationWeek.
Retrieved
June
05,
2016,
from
http://www.informationweek.com/partner-‐
perspectives/bitdefender/hacking-‐vulnerable-‐medical-‐equipment-‐puts-‐millions-‐at-‐risk/a/d-‐id/1319873
2.
Cole,
S.
(n.d.).
How
The
Apple
Watch
Will
Change
Office
Life.
Retrieved
June
05,
2016,
from
http://www.fastcompany.com/3043533/the-‐future-‐of-‐work/how-‐the-‐apple-‐watch-‐will-‐change-‐office-‐life
3.
Feltman,
R.
(2014).
Phones
are
giving
away
your
location,
regardless
of
your
privacy
settings.
Retrieved
June
05,
2016,
from
http://qz.com/203778/phones-‐are-‐giving-‐away-‐your-‐location-‐regardless-‐of-‐your-‐
privacy-‐settings/
4.
Golbeck,
J.
(2014).
This
App
Tracks
You
While
You
Shop.
Retrieved
June
05,
2016,
from
http://www.slate.com/articles/technology/future_tense/2014/01/ibeacon_shopkick_privacy_policies_for_location_tracking_apps_aren_t_clear.single.html
5.
Home,
hacked
home.
(2014,
July
12).
Retrieved
June
05,
2016,
from
http://www.economist.com/news/special-‐report/21606420-‐perils-‐connected-‐devices-‐home-‐hacked-‐home
6.
Matrix,
Sydneyeve.
“Module
3:
Mobilities”.
2016.
Presentation.
7.
People
don't
trust
smartphone
security
–and
that's
choking
the
mobile
economy.
(n.d.).
Retrieved
June
05,
2016,
from
http://www.techradar.com/us/news/phone-‐and-‐communications/mobile-‐
phones/people-‐don-‐t-‐trust-‐smartphone-‐security-‐and-‐that-‐s-‐choking-‐the-‐mobile-‐economy-‐1285887
8.
PwC:
Half
of
people
willing
to
use
workplace
smartwatch.
(n.d.).
Retrieved
June
05,
2016,
from
http://www.consultancy.uk/news/1828/pwc-‐half-‐of-‐people-‐willing-‐to-‐use-‐workplace-‐smartwatch
9.
Smartphone
Privacy
Settings
You
Need
To
Activate
Today.
(n.d.).
Retrieved
June
05,
2016,
from
http://www.makeuseof.com/tag/smartphone-‐privacy-‐settings-‐need-‐activate-‐today/
10.
Thousands
of
medical
devices
are
vulnerable
to
hacking,
security
researchers
say.
(n.d.).
Retrieved
June
05,
2016,
from
http://www.pcworld.com/article/2987813/thousands-‐of-‐medical-‐devices-‐are-‐
vulnerable-‐to-‐hacking-‐security-‐researchers-‐say.html
11.
Where
Were
You
3
Minutes
Ago?
Your
Apps
Know.
(n.d.).
Retrieved
June
05,
2016,
from
http://blogs.wsj.com/digits/2015/03/23/where-‐were-‐you-‐3-‐minutes-‐ago-‐your-‐apps-‐know/?mod=LS1
12.
Williams,
R.
(n.d.).
How
your
phone
is
revealing
your
location,
regardless
of
privacy
settings.
Retrieved
June
05,
2016,
from
http://www.telegraph.co.uk/technology/mobile-‐phones/10795009/How-‐your-‐
phone-‐is-‐revealing-‐your-‐location-‐regardless-‐of-‐privacy-‐settings.html