SlideShare a Scribd company logo
A Survey of
Security & Privacy in
Online Social Networks (OSN) with
regards to Attitudes & Behaviors
Hello!
I’m Frances Coronel.
You can find me @fvcproductions.
1.
MOTIVATION
Why this topic?
2.
PROBLEM
Lack of awareness.
“
Nobody knows anything about privacy
policy laws or how much data is being
collected on them through the Terms &
Conditions that they agree to without
hesitation.
Hypotheses
�Does the behavior of online users
match their attitudes when it comes
to online privacy? No.
�Do people recognize the importance of
the privacy policies their applications
put in place? No.
3.
METHODOLOGY
How do I go about finding out?
The Strategy
surveyexpertsliterature
Literature
Only well-documented and open-source
papers on online privacy were cited.
Facebook Scrapping Application
�61% admit to not using any
software to protect their
personal data
�98% worried whether they
had enough control to
warrant anonymity of their
personal data using
Facebook
Experts
Cullen Hoback
Zeynep Tufekci
Ondrej Krehel
Cullen Hoback
Observed that countries around
world are increasingly exercising
territorial control over Internet
and Internet users' data, largely
due to concerns about fact that
much of Internet data is
controlled by United States
companies.
December 2011
Zeynep Tufecki
Argued that intelligence agencies have
tendency to automatically call for greater
surveillance of technology-based
communications and weakening of
encryption services. Challenge is not
collection of more data, but developing ability
to identify and track truly dangerous people
who currently get lost amid wash of
information.
November 2015
Ondrej Krehel
1. Decide if your digital presence and persona is
professional or individual.
2. Be aware of who you are sharing your data with.
3. Remove any traces of yourself from public
searches.
4. Opt out of check-ins.
5. Keep a close eye on social apps.
6. Limit the amount of personal information you post.
7. Be wary of strangers.
8. Stay updated on privacy policy changes on
websites and apps.
June 2015
Survey
25 questions.
Purpose of the Survey
The survey was done to gauge the level of
understanding of how the users are aware of the
data that they disclose in these sites. The survey,
which is based on Knowledge Networks (KN) uses
an array of questions posed to the users to get to
know their stands as far as this information is
concerned.
4.
RESULTS
What did the survey tell us?
5.
ANALYSIS OF RESULTS
Looking back at the hypotheses.
Conclusion 1.
Behavior of online users do not match
their attitudes when it comes to online
privacy. Even though many people put their
personal information online, most are
ignorant or concerned on how their personal
data is actually being used.
Conclusion 2.
Too many people fail to read the Terms
of Services for the applications they use
because they’re either too boring or too
long to read. Yet, they still recognize the
importance of having a ToS that is fair and
reasonable.
Overarching Conclusion
When provided with data and facts, most
people are willing to re-evaluate their
current state of privacy settings and
general perspective on online privacy.
6.
RECOMMENDATIONS
What can the companies do? What can we do?
Raise awareness.
Collective Action
�Unless someone and makes it no longer
practical and pressure is put upon the CEOs of
these companies, they will continue to engage it
in.
�The terms & conditions for these large tech
monopolies need to be easier to understand
and only users voicing their concerns over them
will change anything.
To date, no US legislation has
dealt with the policies that permit
government agencies &
corporations to abuse personal
data.
Petraeus Affair
�The top spy in America lost
his job… because he
himself didn’t understand
how the system can work
against anyone.
�For once it seemed privacy
was an issue on which all
political parties could agree
on.
Can you
please not?
�Can you please not record us, monitor us, and
share our information unless we ask for it first?
�We need Terms & Conditions that are
reasonable and we need privacy policies that
promote the most basic principles of our
democracy rather than taking them away.
7.
CONCLUSION
Now we part ways.
Privacy is dead? Basically.
Edward Snowden - Interview (2013)
�The greatest fear that I have
regarding the outcome for
America of these disclosures is
that nothing will change….
�[Americans] won’t be willing to
take the risks necessary to stand
up and fight to change things to
force their representatives to
actually take a stand in their
interests.
DO WE
AGREE?
Thanks!
Any questions?
You can find me at @fvcproductions.
Credits
Please refer to my paper.

More Related Content

What's hot

A (very) brief history of Internet safety
A (very) brief history of Internet safetyA (very) brief history of Internet safety
A (very) brief history of Internet safety
ConnectSafely
 
LIFARS - Financial Cybercrime
LIFARS - Financial CybercrimeLIFARS - Financial Cybercrime
LIFARS - Financial Cybercrime
LIFARS
 
Aids.gov at Web Content Mavens
Aids.gov at Web Content MavensAids.gov at Web Content Mavens
Knowledge Sharing in the Networked World of the Internet of Things
Knowledge Sharing in the Networked World of the Internet of ThingsKnowledge Sharing in the Networked World of the Internet of Things
Knowledge Sharing in the Networked World of the Internet of Things
Pew Research Center's Internet & American Life Project
 
Top 14 booklet 2019
Top 14 booklet 2019 Top 14 booklet 2019
Top 14 booklet 2019
TaylorThelander
 
Top 14 booklet 2019
Top 14 booklet 2019Top 14 booklet 2019
Top 14 booklet 2019
TaylorThelander
 
Top 14 booklet 2019
Top 14 booklet 2019Top 14 booklet 2019
Top 14 booklet 2019
TaylorThelander
 
Generations 2009 Charts
Generations 2009 ChartsGenerations 2009 Charts
Generations 2009 Charts
clroth
 
Generations 2009 Charts
Generations 2009 ChartsGenerations 2009 Charts
Generations 2009 Charts
kirklapointe
 
Tileywoodman TEEF ESN presentation
Tileywoodman TEEF ESN presentationTileywoodman TEEF ESN presentation
Tileywoodman TEEF ESN presentation
SarahJWalker
 
AIDS.gov's User-Generated Content Presentation for CDC's National Conference ...
AIDS.gov's User-Generated Content Presentation for CDC's National Conference ...AIDS.gov's User-Generated Content Presentation for CDC's National Conference ...
AIDS.gov's User-Generated Content Presentation for CDC's National Conference ...
HIV.gov, Office of HIV/AIDS and Infectious Disease Policy, HHS
 
Mobile Media Basic for Community Engagement
Mobile Media Basic for Community EngagementMobile Media Basic for Community Engagement
Mobile Media Basic for Community Engagement
KDMC
 
Presentation1 film260
Presentation1 film260Presentation1 film260
Presentation1 film260
katherinepurcell
 
Defense Against The Digital Dark Arts: Navigating Online Spaces as a Journali...
Defense Against The Digital Dark Arts: Navigating Online Spaces as a Journali...Defense Against The Digital Dark Arts: Navigating Online Spaces as a Journali...
Defense Against The Digital Dark Arts: Navigating Online Spaces as a Journali...
Michelle Ferrier
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentation
dh24gold
 
Share * Twitter * Facebook * email Embed govt-strategies-online...
Share      * Twitter     * Facebook     * email  Embed govt-strategies-online...Share      * Twitter     * Facebook     * email  Embed govt-strategies-online...
Share * Twitter * Facebook * email Embed govt-strategies-online...
HIV.gov, Office of HIV/AIDS and Infectious Disease Policy, HHS
 
Fear and media poster
Fear and media poster Fear and media poster
Fear and media poster
Tim Breitfeller
 
2012 pip teens kindness_cruelty_sns_report_nov_2011_final_110711
2012 pip teens kindness_cruelty_sns_report_nov_2011_final_1107112012 pip teens kindness_cruelty_sns_report_nov_2011_final_110711
2012 pip teens kindness_cruelty_sns_report_nov_2011_final_110711
Dustianne North
 
Technology in teen lives: A look at online bullying and sexting
Technology in teen lives: A look at online bullying and sextingTechnology in teen lives: A look at online bullying and sexting
Technology in teen lives: A look at online bullying and sexting
Center for Innovative Public Health Research
 
2012 pip teens smartphones_and_texting
2012 pip teens smartphones_and_texting2012 pip teens smartphones_and_texting
2012 pip teens smartphones_and_texting
Dustianne North
 

What's hot (20)

A (very) brief history of Internet safety
A (very) brief history of Internet safetyA (very) brief history of Internet safety
A (very) brief history of Internet safety
 
LIFARS - Financial Cybercrime
LIFARS - Financial CybercrimeLIFARS - Financial Cybercrime
LIFARS - Financial Cybercrime
 
Aids.gov at Web Content Mavens
Aids.gov at Web Content MavensAids.gov at Web Content Mavens
Aids.gov at Web Content Mavens
 
Knowledge Sharing in the Networked World of the Internet of Things
Knowledge Sharing in the Networked World of the Internet of ThingsKnowledge Sharing in the Networked World of the Internet of Things
Knowledge Sharing in the Networked World of the Internet of Things
 
Top 14 booklet 2019
Top 14 booklet 2019 Top 14 booklet 2019
Top 14 booklet 2019
 
Top 14 booklet 2019
Top 14 booklet 2019Top 14 booklet 2019
Top 14 booklet 2019
 
Top 14 booklet 2019
Top 14 booklet 2019Top 14 booklet 2019
Top 14 booklet 2019
 
Generations 2009 Charts
Generations 2009 ChartsGenerations 2009 Charts
Generations 2009 Charts
 
Generations 2009 Charts
Generations 2009 ChartsGenerations 2009 Charts
Generations 2009 Charts
 
Tileywoodman TEEF ESN presentation
Tileywoodman TEEF ESN presentationTileywoodman TEEF ESN presentation
Tileywoodman TEEF ESN presentation
 
AIDS.gov's User-Generated Content Presentation for CDC's National Conference ...
AIDS.gov's User-Generated Content Presentation for CDC's National Conference ...AIDS.gov's User-Generated Content Presentation for CDC's National Conference ...
AIDS.gov's User-Generated Content Presentation for CDC's National Conference ...
 
Mobile Media Basic for Community Engagement
Mobile Media Basic for Community EngagementMobile Media Basic for Community Engagement
Mobile Media Basic for Community Engagement
 
Presentation1 film260
Presentation1 film260Presentation1 film260
Presentation1 film260
 
Defense Against The Digital Dark Arts: Navigating Online Spaces as a Journali...
Defense Against The Digital Dark Arts: Navigating Online Spaces as a Journali...Defense Against The Digital Dark Arts: Navigating Online Spaces as a Journali...
Defense Against The Digital Dark Arts: Navigating Online Spaces as a Journali...
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentation
 
Share * Twitter * Facebook * email Embed govt-strategies-online...
Share      * Twitter     * Facebook     * email  Embed govt-strategies-online...Share      * Twitter     * Facebook     * email  Embed govt-strategies-online...
Share * Twitter * Facebook * email Embed govt-strategies-online...
 
Fear and media poster
Fear and media poster Fear and media poster
Fear and media poster
 
2012 pip teens kindness_cruelty_sns_report_nov_2011_final_110711
2012 pip teens kindness_cruelty_sns_report_nov_2011_final_1107112012 pip teens kindness_cruelty_sns_report_nov_2011_final_110711
2012 pip teens kindness_cruelty_sns_report_nov_2011_final_110711
 
Technology in teen lives: A look at online bullying and sexting
Technology in teen lives: A look at online bullying and sextingTechnology in teen lives: A look at online bullying and sexting
Technology in teen lives: A look at online bullying and sexting
 
2012 pip teens smartphones_and_texting
2012 pip teens smartphones_and_texting2012 pip teens smartphones_and_texting
2012 pip teens smartphones_and_texting
 

Viewers also liked

Auditing Multimedia Campaigns -ASI 2008 European Conference - Furlanetto
Auditing Multimedia Campaigns -ASI 2008 European Conference - FurlanettoAuditing Multimedia Campaigns -ASI 2008 European Conference - Furlanetto
Auditing Multimedia Campaigns -ASI 2008 European Conference - Furlanetto
Paola Furlanetto
 
Facebook Privacy Enhancements
Facebook Privacy EnhancementsFacebook Privacy Enhancements
Facebook Privacy Enhancements
guest5f7bf4
 
Security and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber HoxhallariSecurity and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber Hoxhallari
Arber Hoxhallari
 
lecture 3:understanding ethical issue in networking
lecture 3:understanding ethical issue in networkinglecture 3:understanding ethical issue in networking
lecture 3:understanding ethical issue in networking
Hamid Zainudin
 
On the cybercrime act
On the cybercrime actOn the cybercrime act
On the cybercrime act
CP-Union
 
osn-threats-solutions-2
osn-threats-solutions-2osn-threats-solutions-2
osn-threats-solutions-2
SMITA V MORE
 
Cybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse CasesCybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse Cases
Ashesh R
 
Computer misuse
Computer misuse Computer misuse
Computer misuse
Shatakshi Goswami
 
Cyber security and privacy
Cyber security and privacyCyber security and privacy
Cyber security and privacy
JIJO CLEETUS
 
Security & ethical challenges
Security & ethical challengesSecurity & ethical challenges
Security & ethical challenges
Louie Medinaceli
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
sommerville-videos
 
Security And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation TechnologySecurity And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation Technology
paramalways
 
Legal issues in the media industry
Legal issues in the media industry Legal issues in the media industry
Legal issues in the media industry
BenRay95
 
Anti-bribery, digital investigation and privacy
Anti-bribery, digital investigation and privacyAnti-bribery, digital investigation and privacy
Anti-bribery, digital investigation and privacy
PECB
 
Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...
Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...
Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...
Arniel Ping
 
Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...
Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...
Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...
Arniel Ping
 
Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...
Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...
Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...
Arniel Ping
 
Intellectual Property Rights
Intellectual Property RightsIntellectual Property Rights
Intellectual Property Rights
harshhanu
 

Viewers also liked (18)

Auditing Multimedia Campaigns -ASI 2008 European Conference - Furlanetto
Auditing Multimedia Campaigns -ASI 2008 European Conference - FurlanettoAuditing Multimedia Campaigns -ASI 2008 European Conference - Furlanetto
Auditing Multimedia Campaigns -ASI 2008 European Conference - Furlanetto
 
Facebook Privacy Enhancements
Facebook Privacy EnhancementsFacebook Privacy Enhancements
Facebook Privacy Enhancements
 
Security and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber HoxhallariSecurity and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber Hoxhallari
 
lecture 3:understanding ethical issue in networking
lecture 3:understanding ethical issue in networkinglecture 3:understanding ethical issue in networking
lecture 3:understanding ethical issue in networking
 
On the cybercrime act
On the cybercrime actOn the cybercrime act
On the cybercrime act
 
osn-threats-solutions-2
osn-threats-solutions-2osn-threats-solutions-2
osn-threats-solutions-2
 
Cybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse CasesCybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse Cases
 
Computer misuse
Computer misuse Computer misuse
Computer misuse
 
Cyber security and privacy
Cyber security and privacyCyber security and privacy
Cyber security and privacy
 
Security & ethical challenges
Security & ethical challengesSecurity & ethical challenges
Security & ethical challenges
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
 
Security And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation TechnologySecurity And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation Technology
 
Legal issues in the media industry
Legal issues in the media industry Legal issues in the media industry
Legal issues in the media industry
 
Anti-bribery, digital investigation and privacy
Anti-bribery, digital investigation and privacyAnti-bribery, digital investigation and privacy
Anti-bribery, digital investigation and privacy
 
Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...
Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...
Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...
 
Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...
Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...
Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...
 
Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...
Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...
Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...
 
Intellectual Property Rights
Intellectual Property RightsIntellectual Property Rights
Intellectual Property Rights
 

Similar to A Survey of Security & Privacy in Online Social Networks (OSN) with regards to Attitudes & Behaviors

Participant Consent and Withdrawal when using publicly archived data
Participant Consent and Withdrawal when using publicly archived dataParticipant Consent and Withdrawal when using publicly archived data
Participant Consent and Withdrawal when using publicly archived data
Ansgar Koene
 
eMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, Feds
eMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, FedseMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, Feds
eMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, Feds
eMarketer
 
Big Data, Transparency & Social Media Networks
Big Data, Transparency & Social Media NetworksBig Data, Transparency & Social Media Networks
Big Data, Transparency & Social Media Networks
Sylvia Ogweng
 
Policy primer net303 study period 3, 2017
Policy primer net303  study period 3, 2017Policy primer net303  study period 3, 2017
Policy primer net303 study period 3, 2017
Steve Mckee
 
A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...
A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...
A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...
ijsptm
 
Privacy and social media for Australian governments
Privacy and social media for Australian governmentsPrivacy and social media for Australian governments
Privacy and social media for Australian governments
Craig Thomler
 
Americans Rejent Tailored Advertising
Americans Rejent Tailored AdvertisingAmericans Rejent Tailored Advertising
Americans Rejent Tailored Advertising
Rafal
 
1 Explain the principle of privacy. What impact has IT made on priv.pdf
1 Explain the principle of privacy. What impact has IT made on priv.pdf1 Explain the principle of privacy. What impact has IT made on priv.pdf
1 Explain the principle of privacy. What impact has IT made on priv.pdf
AroraRajinder1
 
Ericsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety onlineEricsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety online
Ericsson
 
Running head surveillance state research1 page 2running
Running head surveillance state research1 page  2runningRunning head surveillance state research1 page  2running
Running head surveillance state research1 page 2running
SHIVA101531
 
Article 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking technoArticle 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking techno
honey690131
 
Social Media Ethics
Social Media EthicsSocial Media Ethics
Social Media Ethics
ronsteven22
 
Social Media And Privacy October 9 2009
Social Media And Privacy October 9 2009Social Media And Privacy October 9 2009
Social Media And Privacy October 9 2009
canadianlawyer
 
[AIIM18] GDPR: whose job is it now? - Paul Lanois
[AIIM18] GDPR: whose job is it now? - Paul Lanois[AIIM18] GDPR: whose job is it now? - Paul Lanois
[AIIM18] GDPR: whose job is it now? - Paul Lanois
AIIM International
 
Project Plan CreationInclude the following components in an M.docx
Project Plan CreationInclude the following components in an M.docxProject Plan CreationInclude the following components in an M.docx
Project Plan CreationInclude the following components in an M.docx
briancrawford30935
 
Privacy, Permissions and the Evolution of Big Data
Privacy, Permissions and the Evolution of Big DataPrivacy, Permissions and the Evolution of Big Data
Privacy, Permissions and the Evolution of Big Data
Vision Critical
 
Ethics in Infodemiology and Public Health 2.0
Ethics in Infodemiology and Public Health 2.0Ethics in Infodemiology and Public Health 2.0
Ethics in Infodemiology and Public Health 2.0
Gunther Eysenbach
 
Social Technology Quarterly 08
Social Technology Quarterly 08Social Technology Quarterly 08
Social Technology Quarterly 08
Kuliza Technologies
 
Mit csail-tr-2007-034
Mit csail-tr-2007-034Mit csail-tr-2007-034
Mit csail-tr-2007-034
vafopoulos
 
54 Parents Worried About Cyber Bullying ofKids Norton Re.docx
54 Parents Worried About Cyber Bullying ofKids Norton Re.docx54 Parents Worried About Cyber Bullying ofKids Norton Re.docx
54 Parents Worried About Cyber Bullying ofKids Norton Re.docx
blondellchancy
 

Similar to A Survey of Security & Privacy in Online Social Networks (OSN) with regards to Attitudes & Behaviors (20)

Participant Consent and Withdrawal when using publicly archived data
Participant Consent and Withdrawal when using publicly archived dataParticipant Consent and Withdrawal when using publicly archived data
Participant Consent and Withdrawal when using publicly archived data
 
eMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, Feds
eMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, FedseMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, Feds
eMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, Feds
 
Big Data, Transparency & Social Media Networks
Big Data, Transparency & Social Media NetworksBig Data, Transparency & Social Media Networks
Big Data, Transparency & Social Media Networks
 
Policy primer net303 study period 3, 2017
Policy primer net303  study period 3, 2017Policy primer net303  study period 3, 2017
Policy primer net303 study period 3, 2017
 
A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...
A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...
A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...
 
Privacy and social media for Australian governments
Privacy and social media for Australian governmentsPrivacy and social media for Australian governments
Privacy and social media for Australian governments
 
Americans Rejent Tailored Advertising
Americans Rejent Tailored AdvertisingAmericans Rejent Tailored Advertising
Americans Rejent Tailored Advertising
 
1 Explain the principle of privacy. What impact has IT made on priv.pdf
1 Explain the principle of privacy. What impact has IT made on priv.pdf1 Explain the principle of privacy. What impact has IT made on priv.pdf
1 Explain the principle of privacy. What impact has IT made on priv.pdf
 
Ericsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety onlineEricsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety online
 
Running head surveillance state research1 page 2running
Running head surveillance state research1 page  2runningRunning head surveillance state research1 page  2running
Running head surveillance state research1 page 2running
 
Article 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking technoArticle 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking techno
 
Social Media Ethics
Social Media EthicsSocial Media Ethics
Social Media Ethics
 
Social Media And Privacy October 9 2009
Social Media And Privacy October 9 2009Social Media And Privacy October 9 2009
Social Media And Privacy October 9 2009
 
[AIIM18] GDPR: whose job is it now? - Paul Lanois
[AIIM18] GDPR: whose job is it now? - Paul Lanois[AIIM18] GDPR: whose job is it now? - Paul Lanois
[AIIM18] GDPR: whose job is it now? - Paul Lanois
 
Project Plan CreationInclude the following components in an M.docx
Project Plan CreationInclude the following components in an M.docxProject Plan CreationInclude the following components in an M.docx
Project Plan CreationInclude the following components in an M.docx
 
Privacy, Permissions and the Evolution of Big Data
Privacy, Permissions and the Evolution of Big DataPrivacy, Permissions and the Evolution of Big Data
Privacy, Permissions and the Evolution of Big Data
 
Ethics in Infodemiology and Public Health 2.0
Ethics in Infodemiology and Public Health 2.0Ethics in Infodemiology and Public Health 2.0
Ethics in Infodemiology and Public Health 2.0
 
Social Technology Quarterly 08
Social Technology Quarterly 08Social Technology Quarterly 08
Social Technology Quarterly 08
 
Mit csail-tr-2007-034
Mit csail-tr-2007-034Mit csail-tr-2007-034
Mit csail-tr-2007-034
 
54 Parents Worried About Cyber Bullying ofKids Norton Re.docx
54 Parents Worried About Cyber Bullying ofKids Norton Re.docx54 Parents Worried About Cyber Bullying ofKids Norton Re.docx
54 Parents Worried About Cyber Bullying ofKids Norton Re.docx
 

More from Frances Coronel

Conexión y Cultura con Asana
Conexión y Cultura con AsanaConexión y Cultura con Asana
Conexión y Cultura con Asana
Frances Coronel
 
Stories from Latinas in Engineering with KeepTruckin
Stories from Latinas in Engineering with KeepTruckinStories from Latinas in Engineering with KeepTruckin
Stories from Latinas in Engineering with KeepTruckin
Frances Coronel
 
Uncharted Territories: On Being the First in Tech
Uncharted Territories: On Being the First in TechUncharted Territories: On Being the First in Tech
Uncharted Territories: On Being the First in Tech
Frances Coronel
 
Pride Month Event with Blend: Intersecting Identities in Tech
Pride Month Event with Blend: Intersecting Identities in TechPride Month Event with Blend: Intersecting Identities in Tech
Pride Month Event with Blend: Intersecting Identities in Tech
Frances Coronel
 
My State of Work | MS&E 184 - Spring 2020
My State of Work | MS&E 184 - Spring 2020My State of Work | MS&E 184 - Spring 2020
My State of Work | MS&E 184 - Spring 2020
Frances Coronel
 
Engineering Mentorship with Asana
Engineering Mentorship with AsanaEngineering Mentorship with Asana
Engineering Mentorship with Asana
Frances Coronel
 
Pluralsight LIVE 2019 | Progressive Web Apps 101
Pluralsight LIVE 2019 | Progressive Web Apps 101Pluralsight LIVE 2019 | Progressive Web Apps 101
Pluralsight LIVE 2019 | Progressive Web Apps 101
Frances Coronel
 
Welcome to Slack, Mindot!
Welcome to Slack, Mindot!Welcome to Slack, Mindot!
Welcome to Slack, Mindot!
Frances Coronel
 
RevolutionConf 2019 - Progressive Web Apps 101
RevolutionConf 2019 - Progressive Web Apps 101RevolutionConf 2019 - Progressive Web Apps 101
RevolutionConf 2019 - Progressive Web Apps 101
Frances Coronel
 
JSConf EU 2019 - Being a Unicorn Working for Another Unicorn
JSConf EU 2019 - Being a Unicorn Working for Another UnicornJSConf EU 2019 - Being a Unicorn Working for Another Unicorn
JSConf EU 2019 - Being a Unicorn Working for Another Unicorn
Frances Coronel
 
Welcome to Slack, Diablo Valley College!
Welcome to Slack, Diablo Valley College!Welcome to Slack, Diablo Valley College!
Welcome to Slack, Diablo Valley College!
Frances Coronel
 
Welcome to Slack, Coro Fellows!
Welcome to Slack, Coro Fellows!Welcome to Slack, Coro Fellows!
Welcome to Slack, Coro Fellows!
Frances Coronel
 
Telegraph Track - Progressive Web Apps 101
Telegraph Track - Progressive Web Apps 101Telegraph Track - Progressive Web Apps 101
Telegraph Track - Progressive Web Apps 101
Frances Coronel
 
JSConf Hawaiʻi 2019
JSConf Hawaiʻi 2019JSConf Hawaiʻi 2019
JSConf Hawaiʻi 2019
Frances Coronel
 
Side Hustle: Techqueria.org
Side Hustle: Techqueria.orgSide Hustle: Techqueria.org
Side Hustle: Techqueria.org
Frances Coronel
 
General Assembly - So You Want To Be A Wizard
General Assembly - So You Want To Be A WizardGeneral Assembly - So You Want To Be A Wizard
General Assembly - So You Want To Be A Wizard
Frances Coronel
 
GDG DevFest 2018 - Progressive Web Apps 101
GDG DevFest 2018 - Progressive Web Apps 101GDG DevFest 2018 - Progressive Web Apps 101
GDG DevFest 2018 - Progressive Web Apps 101
Frances Coronel
 
Scenic City Summit 2018 - Progressive Web Apps 101
Scenic City Summit 2018 - Progressive Web Apps 101Scenic City Summit 2018 - Progressive Web Apps 101
Scenic City Summit 2018 - Progressive Web Apps 101
Frances Coronel
 
Scenic City Summit 2018 - TypeScript 101
Scenic City Summit 2018 - TypeScript 101Scenic City Summit 2018 - TypeScript 101
Scenic City Summit 2018 - TypeScript 101
Frances Coronel
 
GDG SF Meetup - Progressive Web Apps 101
GDG SF Meetup - Progressive Web Apps 101GDG SF Meetup - Progressive Web Apps 101
GDG SF Meetup - Progressive Web Apps 101
Frances Coronel
 

More from Frances Coronel (20)

Conexión y Cultura con Asana
Conexión y Cultura con AsanaConexión y Cultura con Asana
Conexión y Cultura con Asana
 
Stories from Latinas in Engineering with KeepTruckin
Stories from Latinas in Engineering with KeepTruckinStories from Latinas in Engineering with KeepTruckin
Stories from Latinas in Engineering with KeepTruckin
 
Uncharted Territories: On Being the First in Tech
Uncharted Territories: On Being the First in TechUncharted Territories: On Being the First in Tech
Uncharted Territories: On Being the First in Tech
 
Pride Month Event with Blend: Intersecting Identities in Tech
Pride Month Event with Blend: Intersecting Identities in TechPride Month Event with Blend: Intersecting Identities in Tech
Pride Month Event with Blend: Intersecting Identities in Tech
 
My State of Work | MS&E 184 - Spring 2020
My State of Work | MS&E 184 - Spring 2020My State of Work | MS&E 184 - Spring 2020
My State of Work | MS&E 184 - Spring 2020
 
Engineering Mentorship with Asana
Engineering Mentorship with AsanaEngineering Mentorship with Asana
Engineering Mentorship with Asana
 
Pluralsight LIVE 2019 | Progressive Web Apps 101
Pluralsight LIVE 2019 | Progressive Web Apps 101Pluralsight LIVE 2019 | Progressive Web Apps 101
Pluralsight LIVE 2019 | Progressive Web Apps 101
 
Welcome to Slack, Mindot!
Welcome to Slack, Mindot!Welcome to Slack, Mindot!
Welcome to Slack, Mindot!
 
RevolutionConf 2019 - Progressive Web Apps 101
RevolutionConf 2019 - Progressive Web Apps 101RevolutionConf 2019 - Progressive Web Apps 101
RevolutionConf 2019 - Progressive Web Apps 101
 
JSConf EU 2019 - Being a Unicorn Working for Another Unicorn
JSConf EU 2019 - Being a Unicorn Working for Another UnicornJSConf EU 2019 - Being a Unicorn Working for Another Unicorn
JSConf EU 2019 - Being a Unicorn Working for Another Unicorn
 
Welcome to Slack, Diablo Valley College!
Welcome to Slack, Diablo Valley College!Welcome to Slack, Diablo Valley College!
Welcome to Slack, Diablo Valley College!
 
Welcome to Slack, Coro Fellows!
Welcome to Slack, Coro Fellows!Welcome to Slack, Coro Fellows!
Welcome to Slack, Coro Fellows!
 
Telegraph Track - Progressive Web Apps 101
Telegraph Track - Progressive Web Apps 101Telegraph Track - Progressive Web Apps 101
Telegraph Track - Progressive Web Apps 101
 
JSConf Hawaiʻi 2019
JSConf Hawaiʻi 2019JSConf Hawaiʻi 2019
JSConf Hawaiʻi 2019
 
Side Hustle: Techqueria.org
Side Hustle: Techqueria.orgSide Hustle: Techqueria.org
Side Hustle: Techqueria.org
 
General Assembly - So You Want To Be A Wizard
General Assembly - So You Want To Be A WizardGeneral Assembly - So You Want To Be A Wizard
General Assembly - So You Want To Be A Wizard
 
GDG DevFest 2018 - Progressive Web Apps 101
GDG DevFest 2018 - Progressive Web Apps 101GDG DevFest 2018 - Progressive Web Apps 101
GDG DevFest 2018 - Progressive Web Apps 101
 
Scenic City Summit 2018 - Progressive Web Apps 101
Scenic City Summit 2018 - Progressive Web Apps 101Scenic City Summit 2018 - Progressive Web Apps 101
Scenic City Summit 2018 - Progressive Web Apps 101
 
Scenic City Summit 2018 - TypeScript 101
Scenic City Summit 2018 - TypeScript 101Scenic City Summit 2018 - TypeScript 101
Scenic City Summit 2018 - TypeScript 101
 
GDG SF Meetup - Progressive Web Apps 101
GDG SF Meetup - Progressive Web Apps 101GDG SF Meetup - Progressive Web Apps 101
GDG SF Meetup - Progressive Web Apps 101
 

Recently uploaded

Factors affecting undergraduate students’ motivation at a university in Tra Vinh
Factors affecting undergraduate students’ motivation at a university in Tra VinhFactors affecting undergraduate students’ motivation at a university in Tra Vinh
Factors affecting undergraduate students’ motivation at a university in Tra Vinh
AJHSSR Journal
 
原版制作(Hull毕业证书)赫尔大学毕业证Offer一模一样
原版制作(Hull毕业证书)赫尔大学毕业证Offer一模一样原版制作(Hull毕业证书)赫尔大学毕业证Offer一模一样
原版制作(Hull毕业证书)赫尔大学毕业证Offer一模一样
7lkkjxt
 
SCHOOL CULTURE ADAPTATION AMONG INDIGENOUS PEOPLES COLLEGE STUDENTS AT A PRIV...
SCHOOL CULTURE ADAPTATION AMONG INDIGENOUS PEOPLES COLLEGE STUDENTS AT A PRIV...SCHOOL CULTURE ADAPTATION AMONG INDIGENOUS PEOPLES COLLEGE STUDENTS AT A PRIV...
SCHOOL CULTURE ADAPTATION AMONG INDIGENOUS PEOPLES COLLEGE STUDENTS AT A PRIV...
AJHSSR Journal
 
Iconic Logix | Best Digital Marketing Agency For Iconic Success
Iconic Logix | Best Digital Marketing Agency For Iconic SuccessIconic Logix | Best Digital Marketing Agency For Iconic Success
Iconic Logix | Best Digital Marketing Agency For Iconic Success
iconictecnologies
 
The Impact of Work Stress and Digital Literacy on Employee Performance at PT ...
The Impact of Work Stress and Digital Literacy on Employee Performance at PT ...The Impact of Work Stress and Digital Literacy on Employee Performance at PT ...
The Impact of Work Stress and Digital Literacy on Employee Performance at PT ...
AJHSSR Journal
 
Top Google Tools for SEO: Enhance Your Website's Performance
Top Google Tools for SEO: Enhance Your Website's PerformanceTop Google Tools for SEO: Enhance Your Website's Performance
Top Google Tools for SEO: Enhance Your Website's Performance
Elysian Digital Services Pvt. Ltd.
 
UR BHATTI ACADEMY AND ONLINE COURSES.pdf
UR BHATTI ACADEMY AND ONLINE COURSES.pdfUR BHATTI ACADEMY AND ONLINE COURSES.pdf
UR BHATTI ACADEMY AND ONLINE COURSES.pdf
urbhattiacademy
 
HMS Facebook Stories All V1 06092024.docx
HMS Facebook Stories All V1 06092024.docxHMS Facebook Stories All V1 06092024.docx
HMS Facebook Stories All V1 06092024.docx
Charles Bayless
 
SOCIAL MEDIA MARKETING agency and service
SOCIAL MEDIA MARKETING agency and serviceSOCIAL MEDIA MARKETING agency and service
SOCIAL MEDIA MARKETING agency and service
viralbusinessmarketi
 
一比一原版(AU毕业证)英国阿伯丁大学毕业证如何办理
一比一原版(AU毕业证)英国阿伯丁大学毕业证如何办理一比一原版(AU毕业证)英国阿伯丁大学毕业证如何办理
一比一原版(AU毕业证)英国阿伯丁大学毕业证如何办理
anubug
 
On Storytelling & Magic Realism in Rushdie’s Midnight’s Children, Shame, and ...
On Storytelling & Magic Realism in Rushdie’s Midnight’s Children, Shame, and ...On Storytelling & Magic Realism in Rushdie’s Midnight’s Children, Shame, and ...
On Storytelling & Magic Realism in Rushdie’s Midnight’s Children, Shame, and ...
AJHSSR Journal
 
快速办理(worcester毕业证书)伍斯特大学毕业证PDF成绩单一模一样
快速办理(worcester毕业证书)伍斯特大学毕业证PDF成绩单一模一样快速办理(worcester毕业证书)伍斯特大学毕业证PDF成绩单一模一样
快速办理(worcester毕业证书)伍斯特大学毕业证PDF成绩单一模一样
9u4xjk4w
 
Maximize Your Twitch Potential!..........
Maximize Your Twitch Potential!..........Maximize Your Twitch Potential!..........
Maximize Your Twitch Potential!..........
SocioCosmos
 
CYBER SECURITY ENHANCEMENT IN NIGERIA. A CASE STUDY OF SIX STATES IN THE NORT...
CYBER SECURITY ENHANCEMENT IN NIGERIA. A CASE STUDY OF SIX STATES IN THE NORT...CYBER SECURITY ENHANCEMENT IN NIGERIA. A CASE STUDY OF SIX STATES IN THE NORT...
CYBER SECURITY ENHANCEMENT IN NIGERIA. A CASE STUDY OF SIX STATES IN THE NORT...
AJHSSR Journal
 
STUDY ON THE DEVELOPMENT STRATEGY OF HUZHOU TOURISM
STUDY ON THE DEVELOPMENT STRATEGY OF HUZHOU TOURISMSTUDY ON THE DEVELOPMENT STRATEGY OF HUZHOU TOURISM
STUDY ON THE DEVELOPMENT STRATEGY OF HUZHOU TOURISM
AJHSSR Journal
 

Recently uploaded (15)

Factors affecting undergraduate students’ motivation at a university in Tra Vinh
Factors affecting undergraduate students’ motivation at a university in Tra VinhFactors affecting undergraduate students’ motivation at a university in Tra Vinh
Factors affecting undergraduate students’ motivation at a university in Tra Vinh
 
原版制作(Hull毕业证书)赫尔大学毕业证Offer一模一样
原版制作(Hull毕业证书)赫尔大学毕业证Offer一模一样原版制作(Hull毕业证书)赫尔大学毕业证Offer一模一样
原版制作(Hull毕业证书)赫尔大学毕业证Offer一模一样
 
SCHOOL CULTURE ADAPTATION AMONG INDIGENOUS PEOPLES COLLEGE STUDENTS AT A PRIV...
SCHOOL CULTURE ADAPTATION AMONG INDIGENOUS PEOPLES COLLEGE STUDENTS AT A PRIV...SCHOOL CULTURE ADAPTATION AMONG INDIGENOUS PEOPLES COLLEGE STUDENTS AT A PRIV...
SCHOOL CULTURE ADAPTATION AMONG INDIGENOUS PEOPLES COLLEGE STUDENTS AT A PRIV...
 
Iconic Logix | Best Digital Marketing Agency For Iconic Success
Iconic Logix | Best Digital Marketing Agency For Iconic SuccessIconic Logix | Best Digital Marketing Agency For Iconic Success
Iconic Logix | Best Digital Marketing Agency For Iconic Success
 
The Impact of Work Stress and Digital Literacy on Employee Performance at PT ...
The Impact of Work Stress and Digital Literacy on Employee Performance at PT ...The Impact of Work Stress and Digital Literacy on Employee Performance at PT ...
The Impact of Work Stress and Digital Literacy on Employee Performance at PT ...
 
Top Google Tools for SEO: Enhance Your Website's Performance
Top Google Tools for SEO: Enhance Your Website's PerformanceTop Google Tools for SEO: Enhance Your Website's Performance
Top Google Tools for SEO: Enhance Your Website's Performance
 
UR BHATTI ACADEMY AND ONLINE COURSES.pdf
UR BHATTI ACADEMY AND ONLINE COURSES.pdfUR BHATTI ACADEMY AND ONLINE COURSES.pdf
UR BHATTI ACADEMY AND ONLINE COURSES.pdf
 
HMS Facebook Stories All V1 06092024.docx
HMS Facebook Stories All V1 06092024.docxHMS Facebook Stories All V1 06092024.docx
HMS Facebook Stories All V1 06092024.docx
 
SOCIAL MEDIA MARKETING agency and service
SOCIAL MEDIA MARKETING agency and serviceSOCIAL MEDIA MARKETING agency and service
SOCIAL MEDIA MARKETING agency and service
 
一比一原版(AU毕业证)英国阿伯丁大学毕业证如何办理
一比一原版(AU毕业证)英国阿伯丁大学毕业证如何办理一比一原版(AU毕业证)英国阿伯丁大学毕业证如何办理
一比一原版(AU毕业证)英国阿伯丁大学毕业证如何办理
 
On Storytelling & Magic Realism in Rushdie’s Midnight’s Children, Shame, and ...
On Storytelling & Magic Realism in Rushdie’s Midnight’s Children, Shame, and ...On Storytelling & Magic Realism in Rushdie’s Midnight’s Children, Shame, and ...
On Storytelling & Magic Realism in Rushdie’s Midnight’s Children, Shame, and ...
 
快速办理(worcester毕业证书)伍斯特大学毕业证PDF成绩单一模一样
快速办理(worcester毕业证书)伍斯特大学毕业证PDF成绩单一模一样快速办理(worcester毕业证书)伍斯特大学毕业证PDF成绩单一模一样
快速办理(worcester毕业证书)伍斯特大学毕业证PDF成绩单一模一样
 
Maximize Your Twitch Potential!..........
Maximize Your Twitch Potential!..........Maximize Your Twitch Potential!..........
Maximize Your Twitch Potential!..........
 
CYBER SECURITY ENHANCEMENT IN NIGERIA. A CASE STUDY OF SIX STATES IN THE NORT...
CYBER SECURITY ENHANCEMENT IN NIGERIA. A CASE STUDY OF SIX STATES IN THE NORT...CYBER SECURITY ENHANCEMENT IN NIGERIA. A CASE STUDY OF SIX STATES IN THE NORT...
CYBER SECURITY ENHANCEMENT IN NIGERIA. A CASE STUDY OF SIX STATES IN THE NORT...
 
STUDY ON THE DEVELOPMENT STRATEGY OF HUZHOU TOURISM
STUDY ON THE DEVELOPMENT STRATEGY OF HUZHOU TOURISMSTUDY ON THE DEVELOPMENT STRATEGY OF HUZHOU TOURISM
STUDY ON THE DEVELOPMENT STRATEGY OF HUZHOU TOURISM
 

A Survey of Security & Privacy in Online Social Networks (OSN) with regards to Attitudes & Behaviors

  • 1. A Survey of Security & Privacy in Online Social Networks (OSN) with regards to Attitudes & Behaviors
  • 2. Hello! I’m Frances Coronel. You can find me @fvcproductions.
  • 4.
  • 5.
  • 7. “ Nobody knows anything about privacy policy laws or how much data is being collected on them through the Terms & Conditions that they agree to without hesitation.
  • 8. Hypotheses �Does the behavior of online users match their attitudes when it comes to online privacy? No. �Do people recognize the importance of the privacy policies their applications put in place? No.
  • 9. 3. METHODOLOGY How do I go about finding out?
  • 11. Literature Only well-documented and open-source papers on online privacy were cited.
  • 12. Facebook Scrapping Application �61% admit to not using any software to protect their personal data �98% worried whether they had enough control to warrant anonymity of their personal data using Facebook
  • 14. Cullen Hoback Observed that countries around world are increasingly exercising territorial control over Internet and Internet users' data, largely due to concerns about fact that much of Internet data is controlled by United States companies. December 2011
  • 15. Zeynep Tufecki Argued that intelligence agencies have tendency to automatically call for greater surveillance of technology-based communications and weakening of encryption services. Challenge is not collection of more data, but developing ability to identify and track truly dangerous people who currently get lost amid wash of information. November 2015
  • 16. Ondrej Krehel 1. Decide if your digital presence and persona is professional or individual. 2. Be aware of who you are sharing your data with. 3. Remove any traces of yourself from public searches. 4. Opt out of check-ins. 5. Keep a close eye on social apps. 6. Limit the amount of personal information you post. 7. Be wary of strangers. 8. Stay updated on privacy policy changes on websites and apps. June 2015
  • 18. Purpose of the Survey The survey was done to gauge the level of understanding of how the users are aware of the data that they disclose in these sites. The survey, which is based on Knowledge Networks (KN) uses an array of questions posed to the users to get to know their stands as far as this information is concerned.
  • 19.
  • 20.
  • 21. 4. RESULTS What did the survey tell us?
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45. 5. ANALYSIS OF RESULTS Looking back at the hypotheses.
  • 46. Conclusion 1. Behavior of online users do not match their attitudes when it comes to online privacy. Even though many people put their personal information online, most are ignorant or concerned on how their personal data is actually being used.
  • 47. Conclusion 2. Too many people fail to read the Terms of Services for the applications they use because they’re either too boring or too long to read. Yet, they still recognize the importance of having a ToS that is fair and reasonable.
  • 48. Overarching Conclusion When provided with data and facts, most people are willing to re-evaluate their current state of privacy settings and general perspective on online privacy.
  • 49. 6. RECOMMENDATIONS What can the companies do? What can we do?
  • 51.
  • 52.
  • 53.
  • 54.
  • 55.
  • 56.
  • 57.
  • 58.
  • 59.
  • 60.
  • 61.
  • 62.
  • 63.
  • 64.
  • 65.
  • 66.
  • 67. Collective Action �Unless someone and makes it no longer practical and pressure is put upon the CEOs of these companies, they will continue to engage it in. �The terms & conditions for these large tech monopolies need to be easier to understand and only users voicing their concerns over them will change anything.
  • 68. To date, no US legislation has dealt with the policies that permit government agencies & corporations to abuse personal data.
  • 69. Petraeus Affair �The top spy in America lost his job… because he himself didn’t understand how the system can work against anyone. �For once it seemed privacy was an issue on which all political parties could agree on.
  • 70.
  • 72. �Can you please not record us, monitor us, and share our information unless we ask for it first? �We need Terms & Conditions that are reasonable and we need privacy policies that promote the most basic principles of our democracy rather than taking them away.
  • 74. Privacy is dead? Basically.
  • 75.
  • 76.
  • 77. Edward Snowden - Interview (2013) �The greatest fear that I have regarding the outcome for America of these disclosures is that nothing will change…. �[Americans] won’t be willing to take the risks necessary to stand up and fight to change things to force their representatives to actually take a stand in their interests.
  • 79. Thanks! Any questions? You can find me at @fvcproductions.