1. privacy concerns
in the digital world
CYBERSECURITY
image retrieved from https://pixabay.com/en/security- secure-technology-safety-2168234/
2. A lack of cybersecurity has become one of the
most pressing threats to our personal privacy, with
particular concern for three issues: (1)
1 Increased Digital Surveillance
Loss of Control Over Personal Data
The Threat of Hackers
2
3
Image retrieved from https://pixabay.com/en/fear-anxiety-emotion-worry-scared-2019930/
3. “It is too difficult to give exact statistics on the amount of data
people leave, but every time we perform an online action, we are
contributing to our digital footprint. Our digital footprint are more
public than we would ever imagine.” (2)
Image retrieved from https://pixabay.com/en/building-cctv-door-female-ladies-1839464/
4. Apps providing
location-based
services request
location more
frequently than
necessary (3)
We give certain apps permission
to monitor our location, but these
apps often
of this permission
TAKE ADVANTAGE
Image retrieved from https://pixabay.com/en/smartphone-location-lg-navigation-2198559/
5. "Weather Channel app, which provides local
weather reports, requested device location an
average 2,000 times, or every 10 minutes" (3)
6. iBeacon Mannequins gather information such as age and
location about shoppers with smartphones. This data is aggregated to
create business information for retails. This information sharing raises
PRIVACY CONCERNS (4)
Image retrieved from https://pixabay.com/en/mannequins-fashion-doll-decoration-1061650/
7. Find My Friends,
An app operated by facebook,
uses geolocation technology
to track contacts' locations
Facebook admits it eventually plans to
use this collected data for ads (4)
Image retrieved from https://pixabay.com/en/smartphone-app-facebook-2271722/
8. Marketers pay 10% to 20%
more for online ads that include
location information-when an app
requests location, 73% of the
Most users
are not
aware of
this
information
sharing
Why do apps do this?
time it shares the information
with an advertising
network. (3)
Image retrieved from https://www.pexels.com/photo/black-iphone-5-beside-paper-147408/
9. CONTEXTUAL PRIVACY
these mobile services raise the issue of
"Whereby senders and receivers of
messages exchange info with
expectations of how it will be used.
The problem arises when the receiver
uses the information for a different
purpose than what was intended" (4)
Image retrieved from https://pixabay.com/en/texting-mobile-phones-hands-two-1490691/
10. When it comes to spying on our phones,
government authorities can now get access to
data on everyone within a specific geographic
area around a cell tower through bulk access to
data held by mobile phone companies (5)
"THE CELL TOWER DUMP"
Government digital surveillance also infringes our privacy
Image retrieved from https://pixabay.com/en/canada-ottawa- parliament-monument-1184243
11.
privacy experts say
Canada must
Experts agree this privacy invasion must be adressed
Image retrieved from https://pixabay.com/en/protest-protest-action-464616/
constrain the government'sl
acknowledge, and then
use of portable surveillance
devices that can
indiscriminately dredge data
from people’s smartphones
without them knowing,
(6)
12. "more than 90% of
Americans feel they
have lost control
over personal data"
(4)
Image retrieved from https://pixabay.com/en/work-stressed-accounts-2005640/
13. Hackers have become one of the most dangerous threats
on the internet
in 2012, 400 000 Yahoo email addresses were hacked (7)
in 2011, hackers stole 77 million Sony
Playstation Network passwords (8)
in 2015, 5 million Gmail passwords were
hacked and released online (9)
Image retrieved from https://pixabay.com/en/ninja-data-security-pc-computer-1507457/
14. Smart Homes are particularly vulnerable to hackers
"The stakes are mounting as "smart home" devices - connected by
increasingly ubiquitous Internet of Things technology and designed to
help consumers run their homes with ease - now come with a distinct
risk. They are being transformed into drones for security breaches." (10)
Image retrieved from https://www.pexels.com/photo/3d-architectural-design-architectural-
rendering-architecture-261146/
15. "Health Hackers" are the new cybersecurity threat
"emerging medical technology is often ill-equipped to deal
with threats arising in an interconnected world."
there are simple flaws in medical devices that allow
hackers to penetrate them (4)
Insulin Pumps
have been hacked in demonstrations
Image retrieved from https://www.pexels.com/photo/health-medical-medicine-diet-46173/
16. There are STEPS we
can take to improve
our CYBERSECURITY
Image retrieved from https://www.pexels.com/photo/stairs-man-person-walking-2031/
17. 90% of passwords generated by users are vulnerable to hacking
but there is a (11)
SIMPLE SOLUTION
Users can protect themselves by
regularly changing their passwords and
using different passwords for multiple
accounts (11)
Adding uppercase letters, numbers and
symbols to your password can
significantly reduce the vulnerability of a
password to hacking (11)
Image retrieved from https://pixabay.com/en/login-password-log-sign-on-turn-on-1203603/
18. Interoperability, in which one The Smart home requires
operating system network controls the entire home
Experts recommend installing multiple networks to separate computers and
phones from alarm and entertainment systems, to eliminate a single point of
failure and hacking risk (4)
Image retrieved from https://pixabay.com/en/smart-home-home-technology-2005993/
19. Why should we be concerned about our lack of
privacy and our public digital footprint?
Image retrieved from https://www.pexels.com/photo/man-in-white-shirt-using-macbook-pro-52608/
20. We live in a world where the Internet
records everything and forgets nothing
" every online photo, status update, Twitter post and blog entry by
and about us can be stored forever. Ill-advised photos and online
chatter are coming back to haunt people months or years after the
fact." (12)
Image retrieved from https://pixabay.com/en/files-ddr-archive-1633406/
21. 31% of college admissions offices admitted to
visiting an applicant's Facebook or other
personal social media page to learn more about
them. 30% admitted they had discovered
information online that had negatively affected
an applicant's prospects. (13)
Image retrieved from https://pixabay.com/en/graduation-graduation-day-2038866/
22. It is not uncommon for employees to be fired
as a result of inappropriate posts they've
made on social media platforms
According to a study by Proofpoint, of companies with
1,000 or more employees, 8% of those companies have
dismissed someone for their behavior on sites like Facebook
and LinkedIn (14)
Image retrieved from https://pixabay.com/en/graduation-graduation-day-2038866/
23. Image retrieved from https://pixabay.com/en/police-security-safety-protection-869216/
The internet can be a dangerous place and cybersecurity
should not be taken lightly
As long as users use the internet responsibly and take the appropriate
steps to protect their digital privacy, there are many benefits of the
internet that can be enjoyed
SURF
RESPONSIBLY
24. Literature References
/
1. MacKinnon, Rebecca. " We're Losing Control over our Digital Privacy. CNN 2012. Web. 31 May
2017. Retrieved from http://www.cnn.com/2012/01/26/opinion/mackinnon-sopa-government-
surveillance/
2. Livingstone, Rob. "Digital Footprints And Privacy Concerns". Infosec Institute 2015. Web. 31
May 2017. Retrieved from http://resources.infosecinstitute.com/digital-footprints-privacy
concerns/
3. Dwoskin, Elizabeth. "Apps Track Users—Once Every 3 Minutes". The Wall Street Journal 2017.
Web.31 May 2017. Retrieved from https://www.wsj.com/articles/apps-track-usersonce-every-3-
minutes-1427166955
4. Matrix, Sydneyeve. "Film 260 Module 3". 2017. Lecture.
5. "Mass Surveillance | Privacy International". Privacyinternational.org. N.p., 2017. Web. 31 May
2017. Retrieved from https://www.privacyinternational.org/node/52?PageSpeed=noscript
6. Freeze, Colin. "Government Use Of Surveillance Devices Must Be Restricted: Privacy Experts".
The Globe and Mail 2016. Web. 31 May 2017. Retrieved from
https://www.theglobeandmail.com/news/national/government-use-of-surveillance-devices-
should-be-publicly-debated-privacy-experts/article31844872/
7. Fox-Brewster, Thomas. "Yahoo Admits 500 Million Hit In 2014 Breach". Forbes 2016. Web. 31
May 2017. Retrieved from https://www.forbes.com/sites/thomasbrewster/2016/09/22/yahoo-500-
million-
hacked-by-nation-state/#6697adec6dcb
8. Quin, Ben, and Charles Arthur. "Playstation Network Hackers Access Data Of 77 Million Users".
The Guardian 2011. Web. 31 May 2017. Retrieved from
https://www.theguardian.com/technology/2011/apr/26/playstation-network-hackers-data
25. 9. Siluk, Shirley. "5 Million Gmail Usernames, Passwords Stolen". Sci-Tech Today 2014. Web. 31
May 2017. Retrieved from http://www.newsfactor.com/story.xhtml?story_id=023000SKB48J
10. David, Javier E. "Alarm Grows As Smart Home Technology And Hacking Risks Proliferate".
CNBC 2016. Web. 31 May 2017. Retrieved from http://www.cnbc.com/2016/11/04/alarm-grows-
as-smart-home-technology-and-hacking-risks-proliferate.html
11. Warner, Matt. "90 Percent Of Passwords ‘Vulnerable To Hacking". Business Insider 2013. Web.
31 May 2017. Retrieved from http://www.businessinsider.com/90-percent-of-passwords-
vulnerable-to-hacking-2013-1
12. Rosen, Jeffrey. "The Web Means The End Of Forgetting". The New York Times 2010. Web. 31
May 2017. Retrieved from http://www.nytimes.com/2010/07/25/magazine/25privacy-t2.html?
pagewanted=all&_r=0
13. Singer, Natasha. "They Loved Your G.P.A. Then They Saw Your Tweets". The New York Times
2013. Web. 31 May 2017. Retrieved from http://www.nytimes.com/2013/11/10/business/they-
loved-your-gpa-then-they-saw-your-tweets.html
14. Ostrow, Adam. "FACEBOOK FIRED: 8% Of US Companies Have Sacked Social Media
Miscreants". Mashable 2009. Web. 31 May 2017. Retrieved
from http://mashable.com/2009/08/10/social-media-misuse/