Privacy security

274 views

Published on

  • Be the first to comment

  • Be the first to like this

Privacy security

  1. 1. Privacy and Security in Web 2.0
  2. 2. Our control over privacy
  3. 3. Losing control
  4. 4. Losing control
  5. 5. Losing control
  6. 6. Losing control
  7. 7. Losing control Legal?
  8. 8. Personal Information Sharing Willing to share Unwilling to shareGlobal innovation outlook: Web 2.0. Security, Privacy, and Web 2.0
  9. 9. Privacy in Web 2.01 What will be collected and shared? Explicit: Facebook message, Like friends’ status, tweets Implicit: Mouse click, mouse movement2 How will our private information be used? 91% Of employers use Twitter, Facebook, and LinkedIn to screen job applicants Facebook can do anything they want with your content (according to their TOS) “(For Google,) the advertisers are the users and you are the product.” -- Don Norman3 How others act?
  10. 10. SecurityAverage 28.5 people are becoming victims of identity theft each minute in 2006
  11. 11. Security Phishing
  12. 12. SecurityAverage 28.5 people are becoming victims of identity theft each minute in 2006
  13. 13. Password
  14. 14. Password
  15. 15. Who is responsibleGlobal innovation outlook: Web 2.0. Security, Privacy, and Web 2.0
  16. 16. Security in eCommerce Post messages Import personal profile AuthenticationWeb 2.0 Site API Crawling Hacking Spamming Light-weight and Service-based
  17. 17. Security in eCommerce Firefox, Chrome, CMS Plugin VirusUsers/Developers Trusting users as co-developers
  18. 18. Security in eCommerce Web 2.0 Sites HackingMobile phones Tablets Laptop/desktop Access via multiple devices

×