SlideShare a Scribd company logo
1 of 34
Download to read offline
Justino Lourenço
March,.2014
ISPGaya, V.N.Gaia, Portugal
Challenge
Please do help me, interact, make
your questions….
2
Index of the presentation
Digital Footprint
Scenarios
Technologies
Solutions
What comes next?
3
Digital footprint …
4
Definitions
 A digital footprint is a trail left by interactions in a digital
environment; including the usage of TV, mobile phone,
internet and world wide web, mobile web and other devices
and sensors.
 Digital footprints provide data on what has been performed in
the digital environment; and are used in behavioral targeting,
personalization, targeted marketing, digital reputation, and
other social media or social graphing services.
 In social media, a digital footprint is the size of a person's
"online presence" measured by the number of individuals
with whom they interact. [Wikipedia, 25 Jan 2013]
5
A shorter definition
A person's “digital footprint” reflects how he
or she actively participates in the digital
universe, including use of the Internet and
social networks, e-mail, cell phones, digital
cameras and credit cards.
(Source: http://securitysolutions.com/mag/digital_footprint_idc/)
6
Is this fresh new concern?
 A big amount of personal data is distributed among several
heterogeneous Databases … many people think about it!
1994: George Orwell publishes the book “1984”;
1997: Wim Wenders directs the movie “The End of Violence”;
2007: Mary Madden, Susannah Fox, Aaron Smith and Jessica
Vitak publishes the book “Digital Footprints”;
2009: Tony Fish publishes the book “My Digital Footprint”;
2013: NSA monitors people all over the world?
2014: Every month we find new vulnerabilities in mobile
phones…!
7
Conspiracy Theory ???
No ! Minimum knowledge will help me to
build the digital footprint that fits me ….
8
Our concerns
 In a daily bases, our life is full of interactions with the digital
world….
 How long do you use social networks in a normal day?
 When you do a simple post, how many people can spread it /
read it ?
 Our digital interactions are not only based in Internet…..
 Do you own a mobile device?
 Do you have a Via Verde ID?
 Do you have a credit card?
 Do you have cable TV?
 In how many data bases own information about you?
9
Applications
CRM - Customer Relationship Management
 Help companies to fit there offer to each client profile
Facebook
 Adjusts the best adds in your FB profile
Youtube
 Suggest the videos that you “perhaps” like more
10
Scenario: Mobile Phone
11
How is the association of a single
phone and its user?
Mobile ID – IMEI;
SIM.
12
Where is my phone?
Is for sure near to a Communication
Tower (outdoor/indoor antenna);
Is my GPS on?
I am using any Location Based
Application ?
13
Surfing the WEB
ISP controls the Internet Access:
Adjusts the traffic speed;
Allocates an IP address:
IP address can be traced to:
Find geographic position of the user…!
How? Check: http://www.iplocation.net/
14
Surfing in Wireless LAN
15
Ordinary daily scenario
After waking up, i start zapping on my cable TV;
While eating my breakfast - I surf on my tablet;
I am going to work, while my car (in the
background) is syncing some maintenance data
threw a 4G network;
During the trip I get caught by several traffic and
surveillance cameras;
I stop @ an ATM – I need cash;
I arrive at work, I use my NFC phone to check in;
I start the working day by checking email and
Facebook
16
Any of you have “googled” your
own name? Try it ….
47 % of American users have at leas once
searched on the Internet their own name.
Five years ago the number was only 22%.
17
Who profits with that?
 The collected data can be used by the several players, in order
to redirect marketing attacks in a one-to-one approach ….
18
How do we handle our personal
problem?
 Personal data spread in a non homogeneous form;
 Worldwide replication;
 Complex to be quantified;
 Dynamically changing.
Some companies already earn money in Googlewashing…!
19
Other Digital Footprint Scenarios
How the different technologies
that we use, collect our digital
footprint ?
20
ATM
21
Cable TV interaction
22
Traffic Control System
23
Via Verde
24
More Internet tracks
 Cookies approach;
 Other surfing tracks;
 Malicious software
 Virus
 Trojan
 Social network activities.
 Spontaneous data spreading
25
Solutions
Digital behavior concerns;
PC / Smart Phone / Tablet always updated;
Virus scanner updated;
Strong Passwords;
Renew your password;
Don’t use always the same password…
26
Do you want more security?
27
Minimizing risks .
28
Minimizing risks (II)
 Use of https:// .
 Avoid untrusted sites.
29
Evolution perspectives ?
30
Internet is always changing ..
31
What to expect?
 More technologies in our lives:
 M-Health;
 M-Learning;
 M- Social interactions;
 Smaller Hardware with more features (nanotechnology);
 Green technologies;
 Cloud storage;
 Voice and movements recognition;
 Smart Advice systems;
 Decisions based in dedicated software / hardware;
 Electronic money;
32
Time to hide?
Can I run away from tech
development?
The technologies changes our daily
routines for better?
33
Questions ?
Thank you for your time and
patience ..
Justino Lourenço – ISPGaya
http://www.linkedin.com/in/justinolourenco
jml@ispgaya.pt
34

More Related Content

What's hot

16 Social Media Trends for 2010 by Agent Wildfire
16 Social Media Trends for 2010 by Agent Wildfire16 Social Media Trends for 2010 by Agent Wildfire
16 Social Media Trends for 2010 by Agent WildfireSean Moffitt
 
IE International Application Presentation J
IE International Application Presentation JIE International Application Presentation J
IE International Application Presentation JGeorge Konyashchenkov
 
Top 15 security predictions for 2017
Top 15 security predictions for 2017Top 15 security predictions for 2017
Top 15 security predictions for 2017Accelerate Tech
 
Qrator Labs annual report 2017
Qrator Labs annual report 2017Qrator Labs annual report 2017
Qrator Labs annual report 2017Qrator Labs
 
RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...
RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...
RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...Symantec
 
The Current State of Cybercrime 2014
The Current State of Cybercrime 2014The Current State of Cybercrime 2014
The Current State of Cybercrime 2014EMC
 
As telcos go digital, cybersecurity risks intensify by pwc
As telcos go digital, cybersecurity risks intensify by pwcAs telcos go digital, cybersecurity risks intensify by pwc
As telcos go digital, cybersecurity risks intensify by pwcMert Akın
 
Digital 2020 Global Digital Overview (January 2020) v01
Digital 2020 Global Digital Overview (January 2020) v01Digital 2020 Global Digital Overview (January 2020) v01
Digital 2020 Global Digital Overview (January 2020) v01DataReportal
 
Convergence of Mobile and Social Media 2010
Convergence of Mobile and Social Media 2010Convergence of Mobile and Social Media 2010
Convergence of Mobile and Social Media 2010Grant Fleming
 
Detecting Frauds and Identifying Security Challenge | by Money2Conf
Detecting Frauds and Identifying Security Challenge | by Money2ConfDetecting Frauds and Identifying Security Challenge | by Money2Conf
Detecting Frauds and Identifying Security Challenge | by Money2ConfMoney 2Conf
 
Social Media Balancing Security & Authenticity without Controlling the Message
Social Media Balancing Security & Authenticity without Controlling the MessageSocial Media Balancing Security & Authenticity without Controlling the Message
Social Media Balancing Security & Authenticity without Controlling the MessageCindy Kim
 
The Social Takeover
The Social TakeoverThe Social Takeover
The Social TakeoverZeroFOX
 
The Current State of Cybercrime 2013
The Current State of Cybercrime 2013The Current State of Cybercrime 2013
The Current State of Cybercrime 2013EMC
 
ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019- Mark - Fullbright
 
Tackling the maze ransomware attack with security testing
Tackling the maze ransomware attack with security testingTackling the maze ransomware attack with security testing
Tackling the maze ransomware attack with security testingCigniti Technologies Ltd
 
Cybercrimes. Looking for Safer Spaces? Freedom from Fear Issue 7
Cybercrimes. Looking for Safer Spaces? Freedom from Fear  Issue 7Cybercrimes. Looking for Safer Spaces? Freedom from Fear  Issue 7
Cybercrimes. Looking for Safer Spaces? Freedom from Fear Issue 7Daniel Dufourt
 
Final cyber risk report 24 feb
Final cyber risk report 24 febFinal cyber risk report 24 feb
Final cyber risk report 24 febmharbpavia
 
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...Symantec
 

What's hot (20)

16 Social Media Trends for 2010 by Agent Wildfire
16 Social Media Trends for 2010 by Agent Wildfire16 Social Media Trends for 2010 by Agent Wildfire
16 Social Media Trends for 2010 by Agent Wildfire
 
IE International Application Presentation J
IE International Application Presentation JIE International Application Presentation J
IE International Application Presentation J
 
Top 15 security predictions for 2017
Top 15 security predictions for 2017Top 15 security predictions for 2017
Top 15 security predictions for 2017
 
Qrator Labs annual report 2017
Qrator Labs annual report 2017Qrator Labs annual report 2017
Qrator Labs annual report 2017
 
RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...
RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...
RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...
 
The Current State of Cybercrime 2014
The Current State of Cybercrime 2014The Current State of Cybercrime 2014
The Current State of Cybercrime 2014
 
As telcos go digital, cybersecurity risks intensify by pwc
As telcos go digital, cybersecurity risks intensify by pwcAs telcos go digital, cybersecurity risks intensify by pwc
As telcos go digital, cybersecurity risks intensify by pwc
 
Digital 2020 Global Digital Overview (January 2020) v01
Digital 2020 Global Digital Overview (January 2020) v01Digital 2020 Global Digital Overview (January 2020) v01
Digital 2020 Global Digital Overview (January 2020) v01
 
Convergence of Mobile and Social Media 2010
Convergence of Mobile and Social Media 2010Convergence of Mobile and Social Media 2010
Convergence of Mobile and Social Media 2010
 
Detecting Frauds and Identifying Security Challenge | by Money2Conf
Detecting Frauds and Identifying Security Challenge | by Money2ConfDetecting Frauds and Identifying Security Challenge | by Money2Conf
Detecting Frauds and Identifying Security Challenge | by Money2Conf
 
Social Media Balancing Security & Authenticity without Controlling the Message
Social Media Balancing Security & Authenticity without Controlling the MessageSocial Media Balancing Security & Authenticity without Controlling the Message
Social Media Balancing Security & Authenticity without Controlling the Message
 
The Social Takeover
The Social TakeoverThe Social Takeover
The Social Takeover
 
The Current State of Cybercrime 2013
The Current State of Cybercrime 2013The Current State of Cybercrime 2013
The Current State of Cybercrime 2013
 
ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019
 
Tackling the maze ransomware attack with security testing
Tackling the maze ransomware attack with security testingTackling the maze ransomware attack with security testing
Tackling the maze ransomware attack with security testing
 
Mobile threat report_q3_2013
Mobile threat report_q3_2013Mobile threat report_q3_2013
Mobile threat report_q3_2013
 
Digital Threat Landscape
Digital Threat LandscapeDigital Threat Landscape
Digital Threat Landscape
 
Cybercrimes. Looking for Safer Spaces? Freedom from Fear Issue 7
Cybercrimes. Looking for Safer Spaces? Freedom from Fear  Issue 7Cybercrimes. Looking for Safer Spaces? Freedom from Fear  Issue 7
Cybercrimes. Looking for Safer Spaces? Freedom from Fear Issue 7
 
Final cyber risk report 24 feb
Final cyber risk report 24 febFinal cyber risk report 24 feb
Final cyber risk report 24 feb
 
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
 

Similar to Digital Footprint in our world

Mobile Marketing: Why smartphones are upending traditional print and web base...
Mobile Marketing: Why smartphones are upending traditional print and web base...Mobile Marketing: Why smartphones are upending traditional print and web base...
Mobile Marketing: Why smartphones are upending traditional print and web base...Kenko Health, Inc.
 
4 Trends Shaping the Future of Social Media
4 Trends Shaping the Future of Social Media4 Trends Shaping the Future of Social Media
4 Trends Shaping the Future of Social Mediaplusaziz
 
A Manifesto for Cyber Resilience
A Manifesto for Cyber ResilienceA Manifesto for Cyber Resilience
A Manifesto for Cyber ResilienceSymantec
 
How your data can be used against you #DataScienceWeek presentation by Leigh-...
How your data can be used against you #DataScienceWeek presentation by Leigh-...How your data can be used against you #DataScienceWeek presentation by Leigh-...
How your data can be used against you #DataScienceWeek presentation by Leigh-...Leigh-Chantelle
 
Blue Coat 2013 Systems Mobile Malware Report
Blue Coat 2013 Systems Mobile Malware ReportBlue Coat 2013 Systems Mobile Malware Report
Blue Coat 2013 Systems Mobile Malware ReportContent Rules, Inc.
 
Sample set exam eb bus 5-6-7-9-12
Sample set exam  eb bus 5-6-7-9-12Sample set exam  eb bus 5-6-7-9-12
Sample set exam eb bus 5-6-7-9-12BookStoreLib
 
Ethical, Legal and Social issues IoT
Ethical, Legal and Social issues IoTEthical, Legal and Social issues IoT
Ethical, Legal and Social issues IoTLuckeylama
 
Myeventapps mobile 101 self guided july 2015
Myeventapps mobile 101 self guided july 2015Myeventapps mobile 101 self guided july 2015
Myeventapps mobile 101 self guided july 2015Allan Isfan
 
Mobile Processing: The Perfect Storm for Data Compromise
Mobile Processing: The Perfect Storm for Data CompromiseMobile Processing: The Perfect Storm for Data Compromise
Mobile Processing: The Perfect Storm for Data CompromiseSecurityMetrics
 
Cyber Impact of Fake Instagram Business Account Identify Based on Sentiment A...
Cyber Impact of Fake Instagram Business Account Identify Based on Sentiment A...Cyber Impact of Fake Instagram Business Account Identify Based on Sentiment A...
Cyber Impact of Fake Instagram Business Account Identify Based on Sentiment A...IRJET Journal
 
Cyber Security in UAE - Trends That You Should Never Forget
Cyber Security in UAE - Trends That You Should Never ForgetCyber Security in UAE - Trends That You Should Never Forget
Cyber Security in UAE - Trends That You Should Never ForgetTechugo
 
Raise The Cybersecurity Curtain. Predictions 2021
Raise The Cybersecurity Curtain. Predictions 2021Raise The Cybersecurity Curtain. Predictions 2021
Raise The Cybersecurity Curtain. Predictions 2021Ludmila Morozova-Buss
 
Fife College, French Toast Mafia, Apps for Good Presentation
Fife College, French Toast Mafia, Apps for Good PresentationFife College, French Toast Mafia, Apps for Good Presentation
Fife College, French Toast Mafia, Apps for Good PresentationFifeCollege
 
File156453 (1)
File156453 (1)File156453 (1)
File156453 (1)Sumit Roy
 
proofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paperproofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paperKen Spencer Brown
 
Mobile Trends
Mobile TrendsMobile Trends
Mobile TrendsTexas.gov
 

Similar to Digital Footprint in our world (20)

Mobile Marketing: Why smartphones are upending traditional print and web base...
Mobile Marketing: Why smartphones are upending traditional print and web base...Mobile Marketing: Why smartphones are upending traditional print and web base...
Mobile Marketing: Why smartphones are upending traditional print and web base...
 
4 Trends Shaping the Future of Social Media
4 Trends Shaping the Future of Social Media4 Trends Shaping the Future of Social Media
4 Trends Shaping the Future of Social Media
 
A Manifesto for Cyber Resilience
A Manifesto for Cyber ResilienceA Manifesto for Cyber Resilience
A Manifesto for Cyber Resilience
 
How your data can be used against you #DataScienceWeek presentation by Leigh-...
How your data can be used against you #DataScienceWeek presentation by Leigh-...How your data can be used against you #DataScienceWeek presentation by Leigh-...
How your data can be used against you #DataScienceWeek presentation by Leigh-...
 
Blue Coat 2013 Systems Mobile Malware Report
Blue Coat 2013 Systems Mobile Malware ReportBlue Coat 2013 Systems Mobile Malware Report
Blue Coat 2013 Systems Mobile Malware Report
 
Mobile App Vs Mobile Web
Mobile App Vs Mobile WebMobile App Vs Mobile Web
Mobile App Vs Mobile Web
 
Sample set exam eb bus 5-6-7-9-12
Sample set exam  eb bus 5-6-7-9-12Sample set exam  eb bus 5-6-7-9-12
Sample set exam eb bus 5-6-7-9-12
 
Ethical, Legal and Social issues IoT
Ethical, Legal and Social issues IoTEthical, Legal and Social issues IoT
Ethical, Legal and Social issues IoT
 
Myeventapps mobile 101 self guided july 2015
Myeventapps mobile 101 self guided july 2015Myeventapps mobile 101 self guided july 2015
Myeventapps mobile 101 self guided july 2015
 
Mobile Processing: The Perfect Storm for Data Compromise
Mobile Processing: The Perfect Storm for Data CompromiseMobile Processing: The Perfect Storm for Data Compromise
Mobile Processing: The Perfect Storm for Data Compromise
 
Cyber Impact of Fake Instagram Business Account Identify Based on Sentiment A...
Cyber Impact of Fake Instagram Business Account Identify Based on Sentiment A...Cyber Impact of Fake Instagram Business Account Identify Based on Sentiment A...
Cyber Impact of Fake Instagram Business Account Identify Based on Sentiment A...
 
Cyber Security in UAE - Trends That You Should Never Forget
Cyber Security in UAE - Trends That You Should Never ForgetCyber Security in UAE - Trends That You Should Never Forget
Cyber Security in UAE - Trends That You Should Never Forget
 
Role of CAs in cyber world
Role of CAs in cyber worldRole of CAs in cyber world
Role of CAs in cyber world
 
Raise The Cybersecurity Curtain. Predictions 2021
Raise The Cybersecurity Curtain. Predictions 2021Raise The Cybersecurity Curtain. Predictions 2021
Raise The Cybersecurity Curtain. Predictions 2021
 
Fife College, French Toast Mafia, Apps for Good Presentation
Fife College, French Toast Mafia, Apps for Good PresentationFife College, French Toast Mafia, Apps for Good Presentation
Fife College, French Toast Mafia, Apps for Good Presentation
 
File156453 (1)
File156453 (1)File156453 (1)
File156453 (1)
 
File156453
File156453File156453
File156453
 
file156453
file156453file156453
file156453
 
proofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paperproofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paper
 
Mobile Trends
Mobile TrendsMobile Trends
Mobile Trends
 

More from Justino Lourenço (19)

Future of logistics
Future of logisticsFuture of logistics
Future of logistics
 
Artigo Publico
Artigo PublicoArtigo Publico
Artigo Publico
 
Cabelte
CabelteCabelte
Cabelte
 
Internet: risks and challenges
Internet: risks and challengesInternet: risks and challenges
Internet: risks and challenges
 
Mobilidade no seculo x xi
Mobilidade no seculo x xiMobilidade no seculo x xi
Mobilidade no seculo x xi
 
Telecommunications in the logistic sector lodz
Telecommunications in the logistic sector lodzTelecommunications in the logistic sector lodz
Telecommunications in the logistic sector lodz
 
Telecommunications in the logistic sector
Telecommunications in the logistic sector Telecommunications in the logistic sector
Telecommunications in the logistic sector
 
Apresentação do Projeto WalkAbout IP @ FNAC GaiaShop. 13Jun2013
Apresentação do Projeto WalkAbout IP @ FNAC GaiaShop. 13Jun2013Apresentação do Projeto WalkAbout IP @ FNAC GaiaShop. 13Jun2013
Apresentação do Projeto WalkAbout IP @ FNAC GaiaShop. 13Jun2013
 
Ecologia e telecomunicações
Ecologia e telecomunicaçõesEcologia e telecomunicações
Ecologia e telecomunicações
 
A evolução esperada das telecomunicações
A evolução esperada das telecomunicaçõesA evolução esperada das telecomunicações
A evolução esperada das telecomunicações
 
Digital footprint@artesis vf
Digital footprint@artesis vfDigital footprint@artesis vf
Digital footprint@artesis vf
 
Gsm curso
Gsm cursoGsm curso
Gsm curso
 
NFC
NFCNFC
NFC
 
HTML5
HTML5HTML5
HTML5
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
QR-Codes
QR-CodesQR-Codes
QR-Codes
 
ITUR
ITURITUR
ITUR
 
EJML Conference Presentation
EJML Conference PresentationEJML Conference Presentation
EJML Conference Presentation
 
Digital Footpront
Digital FootprontDigital Footpront
Digital Footpront
 

Recently uploaded

Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 

Recently uploaded (20)

Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 

Digital Footprint in our world

  • 2. Challenge Please do help me, interact, make your questions…. 2
  • 3. Index of the presentation Digital Footprint Scenarios Technologies Solutions What comes next? 3
  • 5. Definitions  A digital footprint is a trail left by interactions in a digital environment; including the usage of TV, mobile phone, internet and world wide web, mobile web and other devices and sensors.  Digital footprints provide data on what has been performed in the digital environment; and are used in behavioral targeting, personalization, targeted marketing, digital reputation, and other social media or social graphing services.  In social media, a digital footprint is the size of a person's "online presence" measured by the number of individuals with whom they interact. [Wikipedia, 25 Jan 2013] 5
  • 6. A shorter definition A person's “digital footprint” reflects how he or she actively participates in the digital universe, including use of the Internet and social networks, e-mail, cell phones, digital cameras and credit cards. (Source: http://securitysolutions.com/mag/digital_footprint_idc/) 6
  • 7. Is this fresh new concern?  A big amount of personal data is distributed among several heterogeneous Databases … many people think about it! 1994: George Orwell publishes the book “1984”; 1997: Wim Wenders directs the movie “The End of Violence”; 2007: Mary Madden, Susannah Fox, Aaron Smith and Jessica Vitak publishes the book “Digital Footprints”; 2009: Tony Fish publishes the book “My Digital Footprint”; 2013: NSA monitors people all over the world? 2014: Every month we find new vulnerabilities in mobile phones…! 7
  • 8. Conspiracy Theory ??? No ! Minimum knowledge will help me to build the digital footprint that fits me …. 8
  • 9. Our concerns  In a daily bases, our life is full of interactions with the digital world….  How long do you use social networks in a normal day?  When you do a simple post, how many people can spread it / read it ?  Our digital interactions are not only based in Internet…..  Do you own a mobile device?  Do you have a Via Verde ID?  Do you have a credit card?  Do you have cable TV?  In how many data bases own information about you? 9
  • 10. Applications CRM - Customer Relationship Management  Help companies to fit there offer to each client profile Facebook  Adjusts the best adds in your FB profile Youtube  Suggest the videos that you “perhaps” like more 10
  • 12. How is the association of a single phone and its user? Mobile ID – IMEI; SIM. 12
  • 13. Where is my phone? Is for sure near to a Communication Tower (outdoor/indoor antenna); Is my GPS on? I am using any Location Based Application ? 13
  • 14. Surfing the WEB ISP controls the Internet Access: Adjusts the traffic speed; Allocates an IP address: IP address can be traced to: Find geographic position of the user…! How? Check: http://www.iplocation.net/ 14
  • 16. Ordinary daily scenario After waking up, i start zapping on my cable TV; While eating my breakfast - I surf on my tablet; I am going to work, while my car (in the background) is syncing some maintenance data threw a 4G network; During the trip I get caught by several traffic and surveillance cameras; I stop @ an ATM – I need cash; I arrive at work, I use my NFC phone to check in; I start the working day by checking email and Facebook 16
  • 17. Any of you have “googled” your own name? Try it …. 47 % of American users have at leas once searched on the Internet their own name. Five years ago the number was only 22%. 17
  • 18. Who profits with that?  The collected data can be used by the several players, in order to redirect marketing attacks in a one-to-one approach …. 18
  • 19. How do we handle our personal problem?  Personal data spread in a non homogeneous form;  Worldwide replication;  Complex to be quantified;  Dynamically changing. Some companies already earn money in Googlewashing…! 19
  • 20. Other Digital Footprint Scenarios How the different technologies that we use, collect our digital footprint ? 20
  • 25. More Internet tracks  Cookies approach;  Other surfing tracks;  Malicious software  Virus  Trojan  Social network activities.  Spontaneous data spreading 25
  • 26. Solutions Digital behavior concerns; PC / Smart Phone / Tablet always updated; Virus scanner updated; Strong Passwords; Renew your password; Don’t use always the same password… 26
  • 27. Do you want more security? 27
  • 29. Minimizing risks (II)  Use of https:// .  Avoid untrusted sites. 29
  • 31. Internet is always changing .. 31
  • 32. What to expect?  More technologies in our lives:  M-Health;  M-Learning;  M- Social interactions;  Smaller Hardware with more features (nanotechnology);  Green technologies;  Cloud storage;  Voice and movements recognition;  Smart Advice systems;  Decisions based in dedicated software / hardware;  Electronic money; 32
  • 33. Time to hide? Can I run away from tech development? The technologies changes our daily routines for better? 33
  • 34. Questions ? Thank you for your time and patience .. Justino Lourenço – ISPGaya http://www.linkedin.com/in/justinolourenco jml@ispgaya.pt 34