Justino Lourenço
March,.2014
ISPGaya, V.N.Gaia, Portugal
http://www.slideshare.net/justinolourenco/
http://www.slideshare.net/justinolourenco/
Challenge
Please do help me, interact, make
your questions….
2
Index of the presentation
Digital Footprint
Scenarios
Technologies
Solutions
What comes next?
3
Digital footprint …
4
Definitions
 A digital footprint is a trail left by interactions in a digital
environment; including the usage of TV, mobile phone,
internet and world wide web, mobile web and other devices
and sensors.
 Digital footprints provide data on what has been performed in
the digital environment; and are used in behavioral targeting,
personalization, targeted marketing, digital reputation, and
other social media or social graphing services.
 In social media, a digital footprint is the size of a person's
"online presence" measured by the number of individuals
with whom they interact. [Wikipedia, 25 Jan 2013]
5
A shorter definition
A person's “digital footprint” reflects how he
or she actively participates in the digital
universe, including use of the Internet and
social networks, e-mail, cell phones, digital
cameras and credit cards.
(Source: http://securitysolutions.com/mag/digital_footprint_idc/)
6
Is this fresh new concern?
 A big amount of personal data is distributed among several
heterogeneous Databases … many people think about it!
1994: George Orwell publishes the book “1984”;
1997: Wim Wenders directs the movie “The End of Violence”;
2007: Mary Madden, Susannah Fox, Aaron Smith and Jessica
Vitak publishes the book “Digital Footprints”;
2009: Tony Fish publishes the book “My Digital Footprint”;
2013: NSA monitors people all over the world?
2014: Every month we find new vulnerabilities in mobile
phones…!
7
Conspiracy Theory ???
No ! Minimum knowledge will help me to
build the digital footprint that fits me ….
8
Our concerns
 In a daily bases, our life is full of interactions with the digital
world….
 How long do you use social networks in a normal day?
 When you do a simple post, how many people can spread it /
read it ?
 Our digital interactions are not only based in Internet…..
 Do you own a mobile device?
 Do you have a Via Verde ID?
 Do you have a credit card?
 Do you have cable TV?
 In how many data bases own information about you?
9
Applications
CRM - Customer Relationship Management
 Help companies to fit there offer to each client profile
Facebook
 Adjusts the best adds in your FB profile
Youtube
 Suggest the videos that you “perhaps” like more
10
Scenario: Mobile Phone
11
How is the association of a single
phone and its user?
Mobile ID – IMEI;
SIM.
12
Where is my phone?
Is for sure near to a Communication
Tower (outdoor/indoor antenna);
Is my GPS on?
I am using any Location Based
Application ?
13
Surfing the WEB
ISP controls the Internet Access:
Adjusts the traffic speed;
Allocates an IP address:
IP address can be traced to:
Find geographic position of the user…!
How? Check: http://www.iplocation.net/
14
Surfing in Wireless LAN
15
Ordinary daily scenario
After waking up, i start zapping on my cable TV;
While eating my breakfast - I surf on my tablet;
I am going to work, while my car (in the
background) is syncing some maintenance data
threw a 4G network;
During the trip I get caught by several traffic and
surveillance cameras;
I stop @ an ATM – I need cash;
I arrive at work, I use my NFC phone to check in;
I start the working day by checking email and
Facebook
16
Any of you have “googled” your
own name? Try it ….
47 % of American users have at leas once
searched on the Internet their own name.
Five years ago the number was only 22%.
17
Who profits with that?
 The collected data can be used by the several players, in order
to redirect marketing attacks in a one-to-one approach ….
18
How do we handle our personal
problem?
 Personal data spread in a non homogeneous form;
 Worldwide replication;
 Complex to be quantified;
 Dynamically changing.
Some companies already earn money in Googlewashing…!
19
Other Digital Footprint Scenarios
How the different technologies
that we use, collect our digital
footprint ?
20
ATM
21
Cable TV interaction
22
Traffic Control System
23
Via Verde
24
More Internet tracks
 Cookies approach;
 Other surfing tracks;
 Malicious software
 Virus
 Trojan
 Social network activities.
 Spontaneous data spreading
25
Solutions
Digital behavior concerns;
PC / Smart Phone / Tablet always updated;
Virus scanner updated;
Strong Passwords;
Renew your password;
Don’t use always the same password…
26
Do you want more security?
27
Minimizing risks .
28
Minimizing risks (II)
 Use of https:// .
 Avoid untrusted sites.
29
Evolution perspectives ?
30
Internet is always changing ..
31
What to expect?
 More technologies in our lives:
 M-Health;
 M-Learning;
 M- Social interactions;
 Smaller Hardware with more features (nanotechnology);
 Green technologies;
 Cloud storage;
 Voice and movements recognition;
 Smart Advice systems;
 Decisions based in dedicated software / hardware;
 Electronic money;
32
Time to hide?
Can I run away from tech
development?
The technologies changes our daily
routines for better?
33
Questions ?
Thank you for your time and
patience ..
Justino Lourenço – ISPGaya
http://www.linkedin.com/in/justinolourenco
jml@ispgaya.pt
34

Digital footprint@wse march13

  • 1.
    Justino Lourenço March,.2014 ISPGaya, V.N.Gaia,Portugal http://www.slideshare.net/justinolourenco/ http://www.slideshare.net/justinolourenco/
  • 2.
    Challenge Please do helpme, interact, make your questions…. 2
  • 3.
    Index of thepresentation Digital Footprint Scenarios Technologies Solutions What comes next? 3
  • 4.
  • 5.
    Definitions  A digitalfootprint is a trail left by interactions in a digital environment; including the usage of TV, mobile phone, internet and world wide web, mobile web and other devices and sensors.  Digital footprints provide data on what has been performed in the digital environment; and are used in behavioral targeting, personalization, targeted marketing, digital reputation, and other social media or social graphing services.  In social media, a digital footprint is the size of a person's "online presence" measured by the number of individuals with whom they interact. [Wikipedia, 25 Jan 2013] 5
  • 6.
    A shorter definition Aperson's “digital footprint” reflects how he or she actively participates in the digital universe, including use of the Internet and social networks, e-mail, cell phones, digital cameras and credit cards. (Source: http://securitysolutions.com/mag/digital_footprint_idc/) 6
  • 7.
    Is this freshnew concern?  A big amount of personal data is distributed among several heterogeneous Databases … many people think about it! 1994: George Orwell publishes the book “1984”; 1997: Wim Wenders directs the movie “The End of Violence”; 2007: Mary Madden, Susannah Fox, Aaron Smith and Jessica Vitak publishes the book “Digital Footprints”; 2009: Tony Fish publishes the book “My Digital Footprint”; 2013: NSA monitors people all over the world? 2014: Every month we find new vulnerabilities in mobile phones…! 7
  • 8.
    Conspiracy Theory ??? No! Minimum knowledge will help me to build the digital footprint that fits me …. 8
  • 9.
    Our concerns  Ina daily bases, our life is full of interactions with the digital world….  How long do you use social networks in a normal day?  When you do a simple post, how many people can spread it / read it ?  Our digital interactions are not only based in Internet…..  Do you own a mobile device?  Do you have a Via Verde ID?  Do you have a credit card?  Do you have cable TV?  In how many data bases own information about you? 9
  • 10.
    Applications CRM - CustomerRelationship Management  Help companies to fit there offer to each client profile Facebook  Adjusts the best adds in your FB profile Youtube  Suggest the videos that you “perhaps” like more 10
  • 11.
  • 12.
    How is theassociation of a single phone and its user? Mobile ID – IMEI; SIM. 12
  • 13.
    Where is myphone? Is for sure near to a Communication Tower (outdoor/indoor antenna); Is my GPS on? I am using any Location Based Application ? 13
  • 14.
    Surfing the WEB ISPcontrols the Internet Access: Adjusts the traffic speed; Allocates an IP address: IP address can be traced to: Find geographic position of the user…! How? Check: http://www.iplocation.net/ 14
  • 15.
  • 16.
    Ordinary daily scenario Afterwaking up, i start zapping on my cable TV; While eating my breakfast - I surf on my tablet; I am going to work, while my car (in the background) is syncing some maintenance data threw a 4G network; During the trip I get caught by several traffic and surveillance cameras; I stop @ an ATM – I need cash; I arrive at work, I use my NFC phone to check in; I start the working day by checking email and Facebook 16
  • 17.
    Any of youhave “googled” your own name? Try it …. 47 % of American users have at leas once searched on the Internet their own name. Five years ago the number was only 22%. 17
  • 18.
    Who profits withthat?  The collected data can be used by the several players, in order to redirect marketing attacks in a one-to-one approach …. 18
  • 19.
    How do wehandle our personal problem?  Personal data spread in a non homogeneous form;  Worldwide replication;  Complex to be quantified;  Dynamically changing. Some companies already earn money in Googlewashing…! 19
  • 20.
    Other Digital FootprintScenarios How the different technologies that we use, collect our digital footprint ? 20
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
    More Internet tracks Cookies approach;  Other surfing tracks;  Malicious software  Virus  Trojan  Social network activities.  Spontaneous data spreading 25
  • 26.
    Solutions Digital behavior concerns; PC/ Smart Phone / Tablet always updated; Virus scanner updated; Strong Passwords; Renew your password; Don’t use always the same password… 26
  • 27.
    Do you wantmore security? 27
  • 28.
  • 29.
    Minimizing risks (II) Use of https:// .  Avoid untrusted sites. 29
  • 30.
  • 31.
    Internet is alwayschanging .. 31
  • 32.
    What to expect? More technologies in our lives:  M-Health;  M-Learning;  M- Social interactions;  Smaller Hardware with more features (nanotechnology);  Green technologies;  Cloud storage;  Voice and movements recognition;  Smart Advice systems;  Decisions based in dedicated software / hardware;  Electronic money; 32
  • 33.
    Time to hide? CanI run away from tech development? The technologies changes our daily routines for better? 33
  • 34.
    Questions ? Thank youfor your time and patience .. Justino Lourenço – ISPGaya http://www.linkedin.com/in/justinolourenco jml@ispgaya.pt 34