SlideShare a Scribd company logo
Privacy On The Internet
By
Chiranjeevi Mondi
6204399
Agenda
1. What is ‘Internet’?
2. Privacy on the Internet
3. Privacy concerns as a buyer in e-Bay.
4. Privacy concerns as a seller in e-Bay.
5. Privacy concerns in Social Media.
6. Other Privacy Concerns
What is “Internet”?
 A means of connecting a computer to any other computer
anywhere in the world via dedicated routers and servers.
 As of April 2019, 56.1% of the world's population
has internet access, and 81% of the developed world. In 2015,
the International Telecommunication Union estimated about
3.2 billion people, or almost half of the world's population,
would be online by the end of the year.
Uses of The Internet
 Electronic mail
 Downloading files.
 Discussion groups.
 Interactive games.
 Education and self-improvement.
 Friendship
 Electronic newspapers and magazines.
 Job-hunting.
 Shopping.
Is Privacy required on the Internet?
Yes, Indeed!
 Internet privacy is the privacy and security level of personal data published via the
Internet. It is a broad term that refers to a variety of factors, techniques and
technologies used to protect sensitive and private data, communications, and
preferences.
What privacy concerns do you have as a buyer
in e-Bay?
 Consumer’s identity might reveal for the purchase they made.
 Hacks performed on the online transaction for these sites.
 Getting spam mail.
 Second Chances, Phishing emails pretending to be eBay,
requests to pay by wire.
What privacy concerns do you have as a seller in
e-Bay?
 eBay Feedback System has some serious privacy flaws.
Despite the privacy measures provided by eBay, it is possible
to recover a user’s purchase history. There are several attacks
compromising the privacy of eBay users.
 Buyers being a hacker to fraud seller.
 Buyer providing negative comment to a seller.
What privacy concerns do you have as a member of
social networks such as Facebook?
What privacy concerns do you have as a member of
social networks such as Facebook?
 CLICK ME !!!!!
 (Steel, 2010) Claims that Facebook Inc. has been sharing
information like the user’s name and their friend's name to
advertisers and internet tracking company.
 Fake Requests from Spam Profiles
 Risks in Social Sharing
 Profile Hacking
 Fake Apps and Malicious Links.
Other privacy concerns public have related to
Internet and Web
 Movie Piracy before the release date leads to the data privacy
breach for the film industries (Urbonavicius, 2018).
 Data breaches happening on sectors as if banking is highly
likely to happen because of monetary purpose.
 On 18 April 2017, 1000 of Intercontinental hotels encountered
by a security breach, leading to sensitive customer data being
compromised (Talebi, 2018).
Conclusion
 If one feels that they are safe on the internet then they are
fooling themselves
Reference List
 Steel, E. and Fowler, G., 2010. Facebook in privacy breach. The Wall Street Journal,
18(1).
 Talebi, N., 2018. The Effect of Perceived Warning Message Characteristics on
Coping Responses in Data Breach Scenarios (Doctoral dissertation, The University
of Texas at San Antonio).
 Urbonavicius, S., Dikcius, V., Adomaviciute, K. and Urbonavicius, I., 2018. Movie
piracy: how novelty-seeking relates to illegal downloading. EuroMed Journal of
Business.
Available at…

More Related Content

What's hot

Web tech evol
Web tech evolWeb tech evol
Web tech evol
Shiv Krishnan
 
Social media and Security: How to Ensure Safe Social Networking
Social media and Security: How to Ensure Safe Social NetworkingSocial media and Security: How to Ensure Safe Social Networking
Social media and Security: How to Ensure Safe Social Networking
Ishfaq Majid
 
Cybersafeelementary
CybersafeelementaryCybersafeelementary
Cybersafeelementary
Rick Ohren
 
Digital dilemma (Social Media & Cyber Crime)
Digital dilemma (Social Media & Cyber Crime)Digital dilemma (Social Media & Cyber Crime)
Digital dilemma (Social Media & Cyber Crime)
Suraj Rawat
 
Health Information Privacy and Security (October 21, 2020)
Health Information Privacy and Security (October 21, 2020)Health Information Privacy and Security (October 21, 2020)
Health Information Privacy and Security (October 21, 2020)
Nawanan Theera-Ampornpunt
 
Disadvantages of-i ct-woww
Disadvantages of-i ct-wowwDisadvantages of-i ct-woww
Disadvantages of-i ct-woww
FloroRaphaell
 
Ti facebook security 150314
Ti   facebook security 150314Ti   facebook security 150314
Ti facebook security 150314
Moses Ngeth
 
Cybercrime
CybercrimeCybercrime
Cybercrime
Komal003
 
Social Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social MediaSocial Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social Media
Tyler Shields
 
Disadvantages of-i ct-woww
Disadvantages of-i ct-wowwDisadvantages of-i ct-woww
Disadvantages of-i ct-woww
FloroRaphaell
 
Coming up next in technology...
Coming up next in technology...Coming up next in technology...
Coming up next in technology...
Shiv Krishnan
 
What's next
What's nextWhat's next
What's next
ICSCSocialMedia
 
Social media and security essentials.pptx
Social media and security essentials.pptxSocial media and security essentials.pptx
Social media and security essentials.pptx
Pink Elephant
 
Social Media Security 2011
Social Media Security 2011Social Media Security 2011
Social Media Security 2011
Donald E. Hester
 
Tablet PC’s: 3 Legal Questions
Tablet PC’s: 3 Legal Questions    Tablet PC’s: 3 Legal Questions
Tablet PC’s: 3 Legal Questions
Mobile Monday Brussels
 
Social Media Security Risk Slide Share Version
Social Media Security Risk Slide Share VersionSocial Media Security Risk Slide Share Version
Social Media Security Risk Slide Share Version
famudal
 
At The Brink of Digital Authoritarian
At The Brink of Digital AuthoritarianAt The Brink of Digital Authoritarian
At The Brink of Digital Authoritarian
Damar Juniarto
 
Service Design Days 2017 - Keynote Jon Rogers (University of Dundee)
Service Design Days 2017 - Keynote Jon Rogers (University of Dundee)Service Design Days 2017 - Keynote Jon Rogers (University of Dundee)
Service Design Days 2017 - Keynote Jon Rogers (University of Dundee)
SERVICE DESIGN DAYS
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
Yanis Mendez
 
parent_teacher_tutorial
parent_teacher_tutorialparent_teacher_tutorial
parent_teacher_tutorial
tutorialsruby
 

What's hot (20)

Web tech evol
Web tech evolWeb tech evol
Web tech evol
 
Social media and Security: How to Ensure Safe Social Networking
Social media and Security: How to Ensure Safe Social NetworkingSocial media and Security: How to Ensure Safe Social Networking
Social media and Security: How to Ensure Safe Social Networking
 
Cybersafeelementary
CybersafeelementaryCybersafeelementary
Cybersafeelementary
 
Digital dilemma (Social Media & Cyber Crime)
Digital dilemma (Social Media & Cyber Crime)Digital dilemma (Social Media & Cyber Crime)
Digital dilemma (Social Media & Cyber Crime)
 
Health Information Privacy and Security (October 21, 2020)
Health Information Privacy and Security (October 21, 2020)Health Information Privacy and Security (October 21, 2020)
Health Information Privacy and Security (October 21, 2020)
 
Disadvantages of-i ct-woww
Disadvantages of-i ct-wowwDisadvantages of-i ct-woww
Disadvantages of-i ct-woww
 
Ti facebook security 150314
Ti   facebook security 150314Ti   facebook security 150314
Ti facebook security 150314
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Social Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social MediaSocial Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social Media
 
Disadvantages of-i ct-woww
Disadvantages of-i ct-wowwDisadvantages of-i ct-woww
Disadvantages of-i ct-woww
 
Coming up next in technology...
Coming up next in technology...Coming up next in technology...
Coming up next in technology...
 
What's next
What's nextWhat's next
What's next
 
Social media and security essentials.pptx
Social media and security essentials.pptxSocial media and security essentials.pptx
Social media and security essentials.pptx
 
Social Media Security 2011
Social Media Security 2011Social Media Security 2011
Social Media Security 2011
 
Tablet PC’s: 3 Legal Questions
Tablet PC’s: 3 Legal Questions    Tablet PC’s: 3 Legal Questions
Tablet PC’s: 3 Legal Questions
 
Social Media Security Risk Slide Share Version
Social Media Security Risk Slide Share VersionSocial Media Security Risk Slide Share Version
Social Media Security Risk Slide Share Version
 
At The Brink of Digital Authoritarian
At The Brink of Digital AuthoritarianAt The Brink of Digital Authoritarian
At The Brink of Digital Authoritarian
 
Service Design Days 2017 - Keynote Jon Rogers (University of Dundee)
Service Design Days 2017 - Keynote Jon Rogers (University of Dundee)Service Design Days 2017 - Keynote Jon Rogers (University of Dundee)
Service Design Days 2017 - Keynote Jon Rogers (University of Dundee)
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
parent_teacher_tutorial
parent_teacher_tutorialparent_teacher_tutorial
parent_teacher_tutorial
 

Similar to 6204399 privacy on the internet

Internet Privacy
Internet PrivacyInternet Privacy
Electronic Communication Privacy Act 1986
Electronic Communication Privacy Act 1986Electronic Communication Privacy Act 1986
Electronic Communication Privacy Act 1986
Chelsea Porter
 
Internet Privacy Essay
Internet Privacy EssayInternet Privacy Essay
Internet Privacy Essay
College Papers Writing Service
 
Cyber Landscape in the Philippines.pptx
Cyber Landscape in the Philippines.pptxCyber Landscape in the Philippines.pptx
Cyber Landscape in the Philippines.pptx
ACAD1ITG
 
Presentation on INTERNET
Presentation on INTERNETPresentation on INTERNET
Presentation on INTERNET
Saleh Ibne Omar
 
Should the internet be completely Consider two.docx
Should the internet be completely Consider two.docxShould the internet be completely Consider two.docx
Should the internet be completely Consider two.docx
write12
 
3.-Ethical-and-Social-Issues-In-ICT.pptx
3.-Ethical-and-Social-Issues-In-ICT.pptx3.-Ethical-and-Social-Issues-In-ICT.pptx
3.-Ethical-and-Social-Issues-In-ICT.pptx
PurnaBahadurRana1
 
2003
20032003
Digital Tattoo: for MOSAIC
Digital Tattoo: for MOSAICDigital Tattoo: for MOSAIC
Digital Tattoo: for MOSAIC
University of British Columbia
 
THE IMPACT OF THE INTERNET AND TECHNOLOGY ON CONSUMERS
THE IMPACT OF THE INTERNET AND TECHNOLOGY ON CONSUMERSTHE IMPACT OF THE INTERNET AND TECHNOLOGY ON CONSUMERS
THE IMPACT OF THE INTERNET AND TECHNOLOGY ON CONSUMERS
eflo3
 
Databreach forecast
Databreach forecastDatabreach forecast
Databreach forecast
Suresh Kesavan
 
LifeLock Javelin Presentation
LifeLock Javelin PresentationLifeLock Javelin Presentation
LifeLock Javelin Presentation
LifeLockBusinessSolutions
 
Internet Presentation - Muhammad Tahir Habib
Internet Presentation - Muhammad Tahir HabibInternet Presentation - Muhammad Tahir Habib
Internet Presentation - Muhammad Tahir Habib
Muhammad Tahir Habib
 
Internet Presentation - Muhammad Tahir Habib
Internet Presentation - Muhammad Tahir HabibInternet Presentation - Muhammad Tahir Habib
Internet Presentation - Muhammad Tahir Habib
Ilm Gah Foundation
 
Anonymous Communication And Its Importance In Social Networking
Anonymous Communication And Its Importance In Social NetworkingAnonymous Communication And Its Importance In Social Networking
Anonymous Communication And Its Importance In Social Networking
Lisa Garcia
 
Bullying, Online Predatory Action And Identity Theft
Bullying, Online Predatory Action And Identity TheftBullying, Online Predatory Action And Identity Theft
Bullying, Online Predatory Action And Identity Theft
Heather Dionne
 
WCCC Faculty Presentation
WCCC Faculty PresentationWCCC Faculty Presentation
WCCC Faculty Presentation
Ray Brannon
 
1Running head CYBERPHOBIA3CYBERPHOBIA.docx
1Running head CYBERPHOBIA3CYBERPHOBIA.docx1Running head CYBERPHOBIA3CYBERPHOBIA.docx
1Running head CYBERPHOBIA3CYBERPHOBIA.docx
RAJU852744
 
A Call to Action: Protecting the Right to Consumer Privacy Online
A Call to Action: Protecting the Right to Consumer Privacy OnlineA Call to Action: Protecting the Right to Consumer Privacy Online
A Call to Action: Protecting the Right to Consumer Privacy Online
Brenden Brown
 
Opportunities, Challenges, and Threats in Media and Information
Opportunities, Challenges, and Threats in Media and InformationOpportunities, Challenges, and Threats in Media and Information
Opportunities, Challenges, and Threats in Media and Information
Katherine Villaluna
 

Similar to 6204399 privacy on the internet (20)

Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacy
 
Electronic Communication Privacy Act 1986
Electronic Communication Privacy Act 1986Electronic Communication Privacy Act 1986
Electronic Communication Privacy Act 1986
 
Internet Privacy Essay
Internet Privacy EssayInternet Privacy Essay
Internet Privacy Essay
 
Cyber Landscape in the Philippines.pptx
Cyber Landscape in the Philippines.pptxCyber Landscape in the Philippines.pptx
Cyber Landscape in the Philippines.pptx
 
Presentation on INTERNET
Presentation on INTERNETPresentation on INTERNET
Presentation on INTERNET
 
Should the internet be completely Consider two.docx
Should the internet be completely Consider two.docxShould the internet be completely Consider two.docx
Should the internet be completely Consider two.docx
 
3.-Ethical-and-Social-Issues-In-ICT.pptx
3.-Ethical-and-Social-Issues-In-ICT.pptx3.-Ethical-and-Social-Issues-In-ICT.pptx
3.-Ethical-and-Social-Issues-In-ICT.pptx
 
2003
20032003
2003
 
Digital Tattoo: for MOSAIC
Digital Tattoo: for MOSAICDigital Tattoo: for MOSAIC
Digital Tattoo: for MOSAIC
 
THE IMPACT OF THE INTERNET AND TECHNOLOGY ON CONSUMERS
THE IMPACT OF THE INTERNET AND TECHNOLOGY ON CONSUMERSTHE IMPACT OF THE INTERNET AND TECHNOLOGY ON CONSUMERS
THE IMPACT OF THE INTERNET AND TECHNOLOGY ON CONSUMERS
 
Databreach forecast
Databreach forecastDatabreach forecast
Databreach forecast
 
LifeLock Javelin Presentation
LifeLock Javelin PresentationLifeLock Javelin Presentation
LifeLock Javelin Presentation
 
Internet Presentation - Muhammad Tahir Habib
Internet Presentation - Muhammad Tahir HabibInternet Presentation - Muhammad Tahir Habib
Internet Presentation - Muhammad Tahir Habib
 
Internet Presentation - Muhammad Tahir Habib
Internet Presentation - Muhammad Tahir HabibInternet Presentation - Muhammad Tahir Habib
Internet Presentation - Muhammad Tahir Habib
 
Anonymous Communication And Its Importance In Social Networking
Anonymous Communication And Its Importance In Social NetworkingAnonymous Communication And Its Importance In Social Networking
Anonymous Communication And Its Importance In Social Networking
 
Bullying, Online Predatory Action And Identity Theft
Bullying, Online Predatory Action And Identity TheftBullying, Online Predatory Action And Identity Theft
Bullying, Online Predatory Action And Identity Theft
 
WCCC Faculty Presentation
WCCC Faculty PresentationWCCC Faculty Presentation
WCCC Faculty Presentation
 
1Running head CYBERPHOBIA3CYBERPHOBIA.docx
1Running head CYBERPHOBIA3CYBERPHOBIA.docx1Running head CYBERPHOBIA3CYBERPHOBIA.docx
1Running head CYBERPHOBIA3CYBERPHOBIA.docx
 
A Call to Action: Protecting the Right to Consumer Privacy Online
A Call to Action: Protecting the Right to Consumer Privacy OnlineA Call to Action: Protecting the Right to Consumer Privacy Online
A Call to Action: Protecting the Right to Consumer Privacy Online
 
Opportunities, Challenges, and Threats in Media and Information
Opportunities, Challenges, and Threats in Media and InformationOpportunities, Challenges, and Threats in Media and Information
Opportunities, Challenges, and Threats in Media and Information
 

Recently uploaded

制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
ukwwuq
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
Paul Walk
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
davidjhones387
 
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
uehowe
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
cuobya
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
ysasp1
 
Azure EA Sponsorship - Customer Guide.pdf
Azure EA Sponsorship - Customer Guide.pdfAzure EA Sponsorship - Customer Guide.pdf
Azure EA Sponsorship - Customer Guide.pdf
AanSulistiyo
 
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
cuobya
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
vmemo1
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
Laura Szabó
 
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
bseovas
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Florence Consulting
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
SEO Article Boost
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
cuobya
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
hackersuli
 
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
bseovas
 
Explore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories SecretlyExplore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories Secretly
Trending Blogers
 
Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
Trish Parr
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
uehowe
 
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
uehowe
 

Recently uploaded (20)

制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
 
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
 
Azure EA Sponsorship - Customer Guide.pdf
Azure EA Sponsorship - Customer Guide.pdfAzure EA Sponsorship - Customer Guide.pdf
Azure EA Sponsorship - Customer Guide.pdf
 
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
 
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
 
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
 
Explore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories SecretlyExplore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories Secretly
 
Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
 
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
 

6204399 privacy on the internet

  • 1. Privacy On The Internet By Chiranjeevi Mondi 6204399
  • 2. Agenda 1. What is ‘Internet’? 2. Privacy on the Internet 3. Privacy concerns as a buyer in e-Bay. 4. Privacy concerns as a seller in e-Bay. 5. Privacy concerns in Social Media. 6. Other Privacy Concerns
  • 3. What is “Internet”?  A means of connecting a computer to any other computer anywhere in the world via dedicated routers and servers.  As of April 2019, 56.1% of the world's population has internet access, and 81% of the developed world. In 2015, the International Telecommunication Union estimated about 3.2 billion people, or almost half of the world's population, would be online by the end of the year.
  • 4. Uses of The Internet  Electronic mail  Downloading files.  Discussion groups.  Interactive games.  Education and self-improvement.  Friendship  Electronic newspapers and magazines.  Job-hunting.  Shopping.
  • 5. Is Privacy required on the Internet?
  • 6. Yes, Indeed!  Internet privacy is the privacy and security level of personal data published via the Internet. It is a broad term that refers to a variety of factors, techniques and technologies used to protect sensitive and private data, communications, and preferences.
  • 7. What privacy concerns do you have as a buyer in e-Bay?  Consumer’s identity might reveal for the purchase they made.  Hacks performed on the online transaction for these sites.  Getting spam mail.  Second Chances, Phishing emails pretending to be eBay, requests to pay by wire.
  • 8. What privacy concerns do you have as a seller in e-Bay?  eBay Feedback System has some serious privacy flaws. Despite the privacy measures provided by eBay, it is possible to recover a user’s purchase history. There are several attacks compromising the privacy of eBay users.  Buyers being a hacker to fraud seller.  Buyer providing negative comment to a seller.
  • 9. What privacy concerns do you have as a member of social networks such as Facebook?
  • 10. What privacy concerns do you have as a member of social networks such as Facebook?  CLICK ME !!!!!  (Steel, 2010) Claims that Facebook Inc. has been sharing information like the user’s name and their friend's name to advertisers and internet tracking company.  Fake Requests from Spam Profiles  Risks in Social Sharing  Profile Hacking  Fake Apps and Malicious Links.
  • 11. Other privacy concerns public have related to Internet and Web  Movie Piracy before the release date leads to the data privacy breach for the film industries (Urbonavicius, 2018).  Data breaches happening on sectors as if banking is highly likely to happen because of monetary purpose.  On 18 April 2017, 1000 of Intercontinental hotels encountered by a security breach, leading to sensitive customer data being compromised (Talebi, 2018).
  • 12. Conclusion  If one feels that they are safe on the internet then they are fooling themselves
  • 13. Reference List  Steel, E. and Fowler, G., 2010. Facebook in privacy breach. The Wall Street Journal, 18(1).  Talebi, N., 2018. The Effect of Perceived Warning Message Characteristics on Coping Responses in Data Breach Scenarios (Doctoral dissertation, The University of Texas at San Antonio).  Urbonavicius, S., Dikcius, V., Adomaviciute, K. and Urbonavicius, I., 2018. Movie piracy: how novelty-seeking relates to illegal downloading. EuroMed Journal of Business.