SlideShare a Scribd company logo
1 of 25
privacy  concerns  
in  the  digital  world
CYBERSECURITY
image  retrieved  from  https://pixabay.com/en/security-­  secure-­technology-­safety-­2168234/
A  lack  of  cybersecurity  has  become  one  of  the  
most  pressing  threats  to  our  personal  privacy,  with  
particular  concern  for  three  issues:  (1)  
1 Increased  Digital  Surveillance
Loss  of  Control  Over  Personal  Data
The  Threat  of  Hackers
2
3
Image  retrieved  from  https://pixabay.com/en/fear-­anxiety-­emotion-­worry-­scared-­2019930/
“It  is  too  difficult  to  give  exact  statistics  on  the  amount  of  data  
people  leave,  but    every  time  we  perform  an  online  action,  we  are  
contributing  to  our  digital  footprint.  Our  digital  footprint  are  more
public  than  we  would  ever  imagine.”  (2)
Image  retrieved  from      https://pixabay.com/en/building-­cctv-­door-­female-­ladies-­1839464/
Apps  providing  
location-based
services  request
location  more
frequently  than
necessary  (3)
We  give  certain  apps  permission  
to  monitor  our  location,  but  these  
apps  often  
      
                of  this  permission
TAKE ADVANTAGE
Image  retrieved  from  https://pixabay.com/en/smartphone-­location-­lg-­navigation-­2198559/
"Weather  Channel  app,  which  provides  local  
weather  reports,  requested  device  location  an  
average  2,000  times,  or  every  10  minutes"  (3)
iBeacon  Mannequins  gather  information  such  as  age  and    
location  about  shoppers  with  smartphones.  This  data  is  aggregated  to  
create  business  information  for  retails.  This  information  sharing  raises  
PRIVACY  CONCERNS  (4)
Image  retrieved  from    https://pixabay.com/en/mannequins-­fashion-­doll-­decoration-­1061650/
Find My Friends,
An  app  operated  by  facebook,  
uses  geolocation  technology  
to  track  contacts'  locations
Facebook  admits  it  eventually  plans  to  
use  this  collected  data  for  ads  (4)
Image  retrieved  from  https://pixabay.com/en/smartphone-­app-­facebook-­2271722/
     Marketers  pay  10%  to  20%  
more  for  online  ads  that  include  
location  information-when  an  app  
requests  location,  73%  of  the
Most  users  
are  not  
aware  of  
this  
information  
sharing
Why do apps do this?
  time  it  shares  the  information  
with  an  advertising  
network.  (3)
Image  retrieved  from  https://www.pexels.com/photo/black-­iphone-­5-­beside-­paper-­147408/
CONTEXTUAL PRIVACY
these  mobile  services  raise  the  issue  of
"Whereby  senders  and  receivers  of  
messages  exchange  info  with  
expectations  of  how  it  will  be  used.    
The  problem  arises  when  the  receiver  
uses  the  information  for  a  different  
purpose  than  what  was  intended"  (4)
Image  retrieved  from  https://pixabay.com/en/texting-­mobile-­phones-­hands-­two-­1490691/
When  it  comes  to  spying  on  our  phones,  
government  authorities  can  now  get  access  to  
data  on  everyone  within  a  specific  geographic  
area  around  a  cell  tower  through  bulk  access  to  
data  held  by  mobile  phone  companies  (5)
"THE CELL TOWER DUMP"
Government  digital  surveillance  also  infringes  our  privacy
Image  retrieved  from    https://pixabay.com/en/canada-­ottawa-­  parliament-­monument-­1184243
 
privacy  experts  say  
  
Canada  must  
  
Experts  agree  this  privacy  invasion  must  be  adressed
Image  retrieved  from  https://pixabay.com/en/protest-­protest-­action-­464616/
constrain  the  government'sl              
acknowledge,  and  then
use  of  portable  surveillance
devices  that  can  
indiscriminately  dredge  data
from  people’s  smartphones  
without  them  knowing,
(6)
"more  than  90%  of  
Americans  feel  they  
have  lost  control  
over  personal  data"  
(4)
Image  retrieved  from  https://pixabay.com/en/work-­stressed-­accounts-­2005640/
Hackers  have  become  one  of  the  most  dangerous  threats    
on  the  internet
in  2012,  400  000  Yahoo  email  addresses  were  hacked  (7)
in  2011,  hackers  stole  77  million  Sony  
Playstation  Network  passwords  (8)
in  2015,  5  million  Gmail  passwords  were  
hacked  and  released  online  (9)
Image  retrieved  from  https://pixabay.com/en/ninja-­data-­security-­pc-­computer-­1507457/
Smart  Homes  are  particularly  vulnerable  to  hackers
"The  stakes  are  mounting  as  "smart  home"  devices  -  connected  by  
increasingly  ubiquitous  Internet  of  Things  technology  and  designed  to  
help  consumers  run  their  homes  with  ease  -  now  come  with  a  distinct  
risk.  They  are  being  transformed  into  drones  for  security  breaches."  (10)
Image  retrieved  from  https://www.pexels.com/photo/3d-­architectural-­design-­architectural-­          
        rendering-­architecture-­261146/
"Health  Hackers"  are  the  new  cybersecurity  threat
"emerging  medical  technology  is  often  ill-equipped  to  deal  
with  threats  arising  in  an  interconnected  world."
there  are  simple  flaws  in  medical  devices  that  allow  
hackers  to  penetrate  them  (4)
Insulin  Pumps
have  been  hacked  in  demonstrations
Image  retrieved  from  https://www.pexels.com/photo/health-­medical-­medicine-­diet-­46173/
There are STEPS we
can take to improve 
our CYBERSECURITY
Image  retrieved  from  https://www.pexels.com/photo/stairs-­man-­person-­walking-­2031/
90%  of  passwords  generated  by  users  are  vulnerable  to  hacking  
                              but  there  is  a                                                                      (11)                                  
                                                  
SIMPLE SOLUTION
Users  can  protect  themselves  by  
regularly  changing  their  passwords  and  
using  different  passwords  for  multiple  
accounts  (11)
Adding  uppercase  letters,  numbers  and  
symbols  to  your  password  can  
significantly  reduce  the  vulnerability  of  a  
password  to  hacking  (11)
Image  retrieved  from    https://pixabay.com/en/login-­password-­log-­sign-­on-­turn-­on-­1203603/
Interoperability,  in  which  one  The  Smart  home  requires  
operating  system  network  controls  the  entire  home
Experts  recommend  installing  multiple  networks  to  separate  computers  and  
phones  from  alarm  and  entertainment  systems,  to  eliminate  a  single  point  of  
failure  and  hacking  risk  (4)
Image  retrieved  from    https://pixabay.com/en/smart-­home-­home-­technology-­2005993/
Why  should  we  be  concerned  about  our  lack  of  
privacy  and  our  public  digital  footprint?
Image  retrieved  from  https://www.pexels.com/photo/man-­in-­white-­shirt-­using-­macbook-­pro-­52608/
We  live  in  a  world  where  the  Internet
records  everything  and  forgets  nothing  
"  every  online  photo,  status  update,  Twitter  post  and  blog  entry  by  
and  about  us  can  be  stored  forever.  Ill-advised  photos  and  online  
chatter  are  coming  back  to  haunt  people  months  or  years  after  the  
fact."  (12)
Image  retrieved  from  https://pixabay.com/en/files-­ddr-­archive-­1633406/
 31%  of  college  admissions  offices  admitted  to  
visiting  an  applicant's  Facebook  or  other  
personal  social  media  page  to  learn  more  about  
them.  30%  admitted  they  had  discovered  
information  online  that  had  negatively  affected  
an  applicant's  prospects.  (13)  
Image  retrieved  from    https://pixabay.com/en/graduation-­graduation-­day-­2038866/
It  is  not  uncommon  for  employees  to  be  fired  
as  a  result  of  inappropriate  posts  they've  
made  on  social  media  platforms
According  to  a  study  by  Proofpoint,    of  companies  with  
1,000  or  more  employees,    8%  of  those  companies  have  
  dismissed  someone  for  their  behavior  on  sites  like  Facebook  
and  LinkedIn  (14)
Image  retrieved  from    https://pixabay.com/en/graduation-­graduation-­day-­2038866/
Image  retrieved  from  https://pixabay.com/en/police-­security-­safety-­protection-­869216/
The  internet  can  be  a  dangerous  place  and  cybersecurity  
should  not  be  taken  lightly
As  long  as  users  use  the  internet  responsibly  and  take  the  appropriate  
steps  to  protect  their  digital  privacy,  there  are  many  benefits  of  the  
internet  that  can  be  enjoyed  
SURF    
RESPONSIBLY
Literature  References
/
1.  MacKinnon,  Rebecca.  "  We're  Losing  Control  over  our  Digital  Privacy.  CNN  2012.  Web.  31  May  
        2017.  Retrieved  from  http://www.cnn.com/2012/01/26/opinion/mackinnon-­sopa-­government-­  
        surveillance/  
2.  Livingstone,  Rob.  "Digital  Footprints  And  Privacy  Concerns".  Infosec  Institute  2015.  Web.  31  
        May  2017.  Retrieved  from  http://resources.infosecinstitute.com/digital-­footprints-­privacy  
        concerns/  
3.  Dwoskin,  Elizabeth.  "Apps  Track  Users—Once  Every  3  Minutes".  The  Wall  Street  Journal  2017.  
        Web.31  May  2017.  Retrieved  from  https://www.wsj.com/articles/apps-­track-­usersonce-­every-­3-­  
        minutes-­1427166955  
4.  Matrix,  Sydneyeve.  "Film  260  Module  3".  2017.  Lecture.  
5.  "Mass  Surveillance  |  Privacy  International".  Privacyinternational.org.  N.p.,  2017.  Web.  31  May  
        2017.  Retrieved  from  https://www.privacyinternational.org/node/52?PageSpeed=noscript  
6.  Freeze,  Colin.  "Government  Use  Of  Surveillance  Devices  Must  Be  Restricted:  Privacy  Experts".  
        The  Globe  and  Mail  2016.  Web.  31  May  2017.  Retrieved  from    
        https://www.theglobeandmail.com/news/national/government-­use-­of-­surveillance-­devices-­  
        should-­be-­publicly-­debated-­privacy-­experts/article31844872/  
7.  Fox-­Brewster,  Thomas.  "Yahoo  Admits  500  Million  Hit  In  2014  Breach".  Forbes  2016.  Web.  31      
        May  2017.  Retrieved  from  https://www.forbes.com/sites/thomasbrewster/2016/09/22/yahoo-­500-­
        million-­  
        hacked-­by-­nation-­state/#6697adec6dcb  
8.  Quin,  Ben,  and  Charles  Arthur.  "Playstation  Network  Hackers  Access  Data  Of  77  Million  Users".  
        The  Guardian  2011.  Web.  31  May  2017.  Retrieved  from    
        https://www.theguardian.com/technology/2011/apr/26/playstation-­network-­hackers-­data  
   9.  Siluk,  Shirley.  "5  Million  Gmail  Usernames,  Passwords  Stolen".  Sci-­Tech  Today  2014.  Web.  31  
            May  2017.  Retrieved  from  http://www.newsfactor.com/story.xhtml?story_id=023000SKB48J  
10.  David,  Javier  E.  "Alarm  Grows  As  Smart  Home  Technology  And  Hacking  Risks  Proliferate".  
            CNBC  2016.  Web.  31  May  2017.  Retrieved  from  http://www.cnbc.com/2016/11/04/alarm-­grows-­  
            as-­smart-­home-­technology-­and-­hacking-­risks-­proliferate.html  
11.  Warner,  Matt.  "90  Percent  Of  Passwords  ‘Vulnerable  To  Hacking".  Business  Insider  2013.  Web.  
            31  May  2017.  Retrieved  from  http://www.businessinsider.com/90-­percent-­of-­passwords-­  
            vulnerable-­to-­hacking-­2013-­1  
12.  Rosen,  Jeffrey.  "The  Web  Means  The  End  Of  Forgetting".  The  New  York  Times  2010.  Web.  31  
            May  2017.  Retrieved  from  http://www.nytimes.com/2010/07/25/magazine/25privacy-­t2.html?  
            pagewanted=all&_r=0  
13.  Singer,  Natasha.  "They  Loved  Your  G.P.A.  Then  They  Saw  Your  Tweets".  The  New  York  Times  
            2013.  Web.  31  May  2017.  Retrieved  from  http://www.nytimes.com/2013/11/10/business/they-­  
            loved-­your-­gpa-­then-­they-­saw-­your-­tweets.html  
14.  Ostrow,  Adam.  "FACEBOOK  FIRED:  8%  Of  US  Companies  Have  Sacked  Social  Media  
            Miscreants".  Mashable  2009.  Web.  31  May  2017.  Retrieved  
            from  http://mashable.com/2009/08/10/social-­media-­misuse/

More Related Content

What's hot

Cheng jessica flipbook_film260
Cheng jessica flipbook_film260Cheng jessica flipbook_film260
Cheng jessica flipbook_film260Jessica Cheng
 
Privacy Flipbook Risha Raythatha
Privacy Flipbook Risha RaythathaPrivacy Flipbook Risha Raythatha
Privacy Flipbook Risha RaythathaRisha Raythatha
 
The Deception of Privacy, The Truth About a Plugged in Life
The Deception of Privacy, The Truth About a Plugged in LifeThe Deception of Privacy, The Truth About a Plugged in Life
The Deception of Privacy, The Truth About a Plugged in LifeCindy Beneteau
 
Overcoming Distraction in the Digital Age
Overcoming Distraction in the Digital AgeOvercoming Distraction in the Digital Age
Overcoming Distraction in the Digital AgeJulia Warrender
 
Helicopter Parent - Flipbook
Helicopter Parent - FlipbookHelicopter Parent - Flipbook
Helicopter Parent - FlipbookJulia Holland
 
The Internet of Things
The Internet of ThingsThe Internet of Things
The Internet of ThingsEmily Cehic
 
Wearable Technology - FILM 260
Wearable Technology - FILM 260Wearable Technology - FILM 260
Wearable Technology - FILM 260venuschung
 
Quantity over Quality: The World Of Personal Data
Quantity over Quality: The World Of Personal DataQuantity over Quality: The World Of Personal Data
Quantity over Quality: The World Of Personal DataCaroline Witzel
 
Mobile apps—solution or distraction
Mobile apps—solution or distractionMobile apps—solution or distraction
Mobile apps—solution or distractionAmena Mohammed
 
Think Twice Before You Post
Think Twice Before You Post Think Twice Before You Post
Think Twice Before You Post Melissa Perruzza
 
Flipbook presentation
Flipbook presentationFlipbook presentation
Flipbook presentationNicola Ros
 
The Gap Between Elderly People and Technology
The Gap Between Elderly People and TechnologyThe Gap Between Elderly People and Technology
The Gap Between Elderly People and Technologymegsleon
 
Technology & Human Behaviour
Technology & Human BehaviourTechnology & Human Behaviour
Technology & Human Behaviourvallier17
 

What's hot (20)

Cheng jessica flipbook_film260
Cheng jessica flipbook_film260Cheng jessica flipbook_film260
Cheng jessica flipbook_film260
 
Digitally Distracted
Digitally DistractedDigitally Distracted
Digitally Distracted
 
Privacy Flipbook Risha Raythatha
Privacy Flipbook Risha RaythathaPrivacy Flipbook Risha Raythatha
Privacy Flipbook Risha Raythatha
 
The Deception of Privacy, The Truth About a Plugged in Life
The Deception of Privacy, The Truth About a Plugged in LifeThe Deception of Privacy, The Truth About a Plugged in Life
The Deception of Privacy, The Truth About a Plugged in Life
 
Overcoming Distraction in the Digital Age
Overcoming Distraction in the Digital AgeOvercoming Distraction in the Digital Age
Overcoming Distraction in the Digital Age
 
Helicopter Parent - Flipbook
Helicopter Parent - FlipbookHelicopter Parent - Flipbook
Helicopter Parent - Flipbook
 
The Internet of Things
The Internet of ThingsThe Internet of Things
The Internet of Things
 
Out-Smarted!
Out-Smarted!Out-Smarted!
Out-Smarted!
 
Wearable Technology - FILM 260
Wearable Technology - FILM 260Wearable Technology - FILM 260
Wearable Technology - FILM 260
 
Digital Divide
Digital Divide Digital Divide
Digital Divide
 
260 flipbook
260 flipbook260 flipbook
260 flipbook
 
Quantity over Quality: The World Of Personal Data
Quantity over Quality: The World Of Personal DataQuantity over Quality: The World Of Personal Data
Quantity over Quality: The World Of Personal Data
 
Privacy hazard
Privacy hazardPrivacy hazard
Privacy hazard
 
Mobile apps—solution or distraction
Mobile apps—solution or distractionMobile apps—solution or distraction
Mobile apps—solution or distraction
 
Virtual reality
Virtual realityVirtual reality
Virtual reality
 
Smartphones Flipbook
Smartphones FlipbookSmartphones Flipbook
Smartphones Flipbook
 
Think Twice Before You Post
Think Twice Before You Post Think Twice Before You Post
Think Twice Before You Post
 
Flipbook presentation
Flipbook presentationFlipbook presentation
Flipbook presentation
 
The Gap Between Elderly People and Technology
The Gap Between Elderly People and TechnologyThe Gap Between Elderly People and Technology
The Gap Between Elderly People and Technology
 
Technology & Human Behaviour
Technology & Human BehaviourTechnology & Human Behaviour
Technology & Human Behaviour
 

Similar to Film 260 flipbook

Error: Your Life Has Been Hacked
Error: Your Life Has Been HackedError: Your Life Has Been Hacked
Error: Your Life Has Been HackedAdelle Leonard
 
Digital security update: 10 cybersecurity and privacy threats
Digital security update: 10 cybersecurity and privacy threatsDigital security update: 10 cybersecurity and privacy threats
Digital security update: 10 cybersecurity and privacy threatsEntefy
 
Smartphones with Smarter Apps
Smartphones with Smarter AppsSmartphones with Smarter Apps
Smartphones with Smarter AppsSara Dow
 
11272019 SafeAssign Originality Reporthttpsucumberlan.docx
11272019 SafeAssign Originality Reporthttpsucumberlan.docx11272019 SafeAssign Originality Reporthttpsucumberlan.docx
11272019 SafeAssign Originality Reporthttpsucumberlan.docxaulasnilda
 
Converging Communications: The Perfect Storm
Converging Communications: The Perfect StormConverging Communications: The Perfect Storm
Converging Communications: The Perfect StormJoanne Jacobs
 
ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3
ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3
ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3Asad Zaman
 
Not re-decentralizing the Web is not only a missed opportunity, it is irrespo...
Not re-decentralizing the Web is not only a missed opportunity, it is irrespo...Not re-decentralizing the Web is not only a missed opportunity, it is irrespo...
Not re-decentralizing the Web is not only a missed opportunity, it is irrespo...Markus Luczak-Rösch
 
MainPaper_4.0
MainPaper_4.0MainPaper_4.0
MainPaper_4.0varun4110
 
T. tighe privacy vs safety flipbook v2
T. tighe privacy vs safety flipbook v2T. tighe privacy vs safety flipbook v2
T. tighe privacy vs safety flipbook v2Tanya Tighe, CRSP
 
Location Services and Geosocial Networking in Smartphones
Location Services and Geosocial Networking in SmartphonesLocation Services and Geosocial Networking in Smartphones
Location Services and Geosocial Networking in SmartphonesSam Harris
 
Running head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docxRunning head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docxtodd581
 
Running head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docxRunning head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docxglendar3
 
Team 3_Final Project.docx
Team 3_Final Project.docxTeam 3_Final Project.docx
Team 3_Final Project.docxMarcusBrown87
 
Application Security framework for Mobile App Development in Enterprise Setup
Application Security framework for Mobile App Development in Enterprise SetupApplication Security framework for Mobile App Development in Enterprise Setup
Application Security framework for Mobile App Development in Enterprise SetupEswar Publications
 
Is Online Privacy a Thing of the Past?
Is Online Privacy a Thing of the Past?Is Online Privacy a Thing of the Past?
Is Online Privacy a Thing of the Past?Aleque Juneau
 

Similar to Film 260 flipbook (20)

Error: Your Life Has Been Hacked
Error: Your Life Has Been HackedError: Your Life Has Been Hacked
Error: Your Life Has Been Hacked
 
Digital security update: 10 cybersecurity and privacy threats
Digital security update: 10 cybersecurity and privacy threatsDigital security update: 10 cybersecurity and privacy threats
Digital security update: 10 cybersecurity and privacy threats
 
Smartphones with Smarter Apps
Smartphones with Smarter AppsSmartphones with Smarter Apps
Smartphones with Smarter Apps
 
11272019 SafeAssign Originality Reporthttpsucumberlan.docx
11272019 SafeAssign Originality Reporthttpsucumberlan.docx11272019 SafeAssign Originality Reporthttpsucumberlan.docx
11272019 SafeAssign Originality Reporthttpsucumberlan.docx
 
need for NS.ppt
need for NS.pptneed for NS.ppt
need for NS.ppt
 
CS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptxCS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptx
 
Converging Communications: The Perfect Storm
Converging Communications: The Perfect StormConverging Communications: The Perfect Storm
Converging Communications: The Perfect Storm
 
ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3
ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3
ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3
 
Not re-decentralizing the Web is not only a missed opportunity, it is irrespo...
Not re-decentralizing the Web is not only a missed opportunity, it is irrespo...Not re-decentralizing the Web is not only a missed opportunity, it is irrespo...
Not re-decentralizing the Web is not only a missed opportunity, it is irrespo...
 
MainPaper_4.0
MainPaper_4.0MainPaper_4.0
MainPaper_4.0
 
T. tighe privacy vs safety flipbook v2
T. tighe privacy vs safety flipbook v2T. tighe privacy vs safety flipbook v2
T. tighe privacy vs safety flipbook v2
 
Learning Futures
Learning FuturesLearning Futures
Learning Futures
 
Location Services and Geosocial Networking in Smartphones
Location Services and Geosocial Networking in SmartphonesLocation Services and Geosocial Networking in Smartphones
Location Services and Geosocial Networking in Smartphones
 
Running head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docxRunning head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docx
 
Running head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docxRunning head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docx
 
Recent trends in cloud computing articles
Recent trends in cloud computing articlesRecent trends in cloud computing articles
Recent trends in cloud computing articles
 
Team 3_Final Project.docx
Team 3_Final Project.docxTeam 3_Final Project.docx
Team 3_Final Project.docx
 
Application Security framework for Mobile App Development in Enterprise Setup
Application Security framework for Mobile App Development in Enterprise SetupApplication Security framework for Mobile App Development in Enterprise Setup
Application Security framework for Mobile App Development in Enterprise Setup
 
Network security
Network securityNetwork security
Network security
 
Is Online Privacy a Thing of the Past?
Is Online Privacy a Thing of the Past?Is Online Privacy a Thing of the Past?
Is Online Privacy a Thing of the Past?
 

Recently uploaded

AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........LeaCamillePacle
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 

Recently uploaded (20)

AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 

Film 260 flipbook

  • 1. privacy  concerns   in  the  digital  world CYBERSECURITY image  retrieved  from  https://pixabay.com/en/security-­  secure-­technology-­safety-­2168234/
  • 2. A  lack  of  cybersecurity  has  become  one  of  the   most  pressing  threats  to  our  personal  privacy,  with   particular  concern  for  three  issues:  (1)   1 Increased  Digital  Surveillance Loss  of  Control  Over  Personal  Data The  Threat  of  Hackers 2 3 Image  retrieved  from  https://pixabay.com/en/fear-­anxiety-­emotion-­worry-­scared-­2019930/
  • 3. “It  is  too  difficult  to  give  exact  statistics  on  the  amount  of  data   people  leave,  but    every  time  we  perform  an  online  action,  we  are   contributing  to  our  digital  footprint.  Our  digital  footprint  are  more public  than  we  would  ever  imagine.”  (2) Image  retrieved  from      https://pixabay.com/en/building-­cctv-­door-­female-­ladies-­1839464/
  • 4. Apps  providing   location-based services  request location  more frequently  than necessary  (3) We  give  certain  apps  permission   to  monitor  our  location,  but  these   apps  often                        of  this  permission TAKE ADVANTAGE Image  retrieved  from  https://pixabay.com/en/smartphone-­location-­lg-­navigation-­2198559/
  • 5. "Weather  Channel  app,  which  provides  local   weather  reports,  requested  device  location  an   average  2,000  times,  or  every  10  minutes"  (3)
  • 6. iBeacon  Mannequins  gather  information  such  as  age  and     location  about  shoppers  with  smartphones.  This  data  is  aggregated  to   create  business  information  for  retails.  This  information  sharing  raises   PRIVACY  CONCERNS  (4) Image  retrieved  from    https://pixabay.com/en/mannequins-­fashion-­doll-­decoration-­1061650/
  • 7. Find My Friends, An  app  operated  by  facebook,   uses  geolocation  technology   to  track  contacts'  locations Facebook  admits  it  eventually  plans  to   use  this  collected  data  for  ads  (4) Image  retrieved  from  https://pixabay.com/en/smartphone-­app-­facebook-­2271722/
  • 8.      Marketers  pay  10%  to  20%   more  for  online  ads  that  include   location  information-when  an  app   requests  location,  73%  of  the Most  users   are  not   aware  of   this   information   sharing Why do apps do this?  time  it  shares  the  information   with  an  advertising   network.  (3) Image  retrieved  from  https://www.pexels.com/photo/black-­iphone-­5-­beside-­paper-­147408/
  • 9. CONTEXTUAL PRIVACY these  mobile  services  raise  the  issue  of "Whereby  senders  and  receivers  of   messages  exchange  info  with   expectations  of  how  it  will  be  used.     The  problem  arises  when  the  receiver   uses  the  information  for  a  different   purpose  than  what  was  intended"  (4) Image  retrieved  from  https://pixabay.com/en/texting-­mobile-­phones-­hands-­two-­1490691/
  • 10. When  it  comes  to  spying  on  our  phones,   government  authorities  can  now  get  access  to   data  on  everyone  within  a  specific  geographic   area  around  a  cell  tower  through  bulk  access  to   data  held  by  mobile  phone  companies  (5) "THE CELL TOWER DUMP" Government  digital  surveillance  also  infringes  our  privacy Image  retrieved  from    https://pixabay.com/en/canada-­ottawa-­  parliament-­monument-­1184243
  • 11.   privacy  experts  say     Canada  must     Experts  agree  this  privacy  invasion  must  be  adressed Image  retrieved  from  https://pixabay.com/en/protest-­protest-­action-­464616/ constrain  the  government'sl               acknowledge,  and  then use  of  portable  surveillance devices  that  can   indiscriminately  dredge  data from  people’s  smartphones   without  them  knowing, (6)
  • 12. "more  than  90%  of   Americans  feel  they   have  lost  control   over  personal  data"   (4) Image  retrieved  from  https://pixabay.com/en/work-­stressed-­accounts-­2005640/
  • 13. Hackers  have  become  one  of  the  most  dangerous  threats     on  the  internet in  2012,  400  000  Yahoo  email  addresses  were  hacked  (7) in  2011,  hackers  stole  77  million  Sony   Playstation  Network  passwords  (8) in  2015,  5  million  Gmail  passwords  were   hacked  and  released  online  (9) Image  retrieved  from  https://pixabay.com/en/ninja-­data-­security-­pc-­computer-­1507457/
  • 14. Smart  Homes  are  particularly  vulnerable  to  hackers "The  stakes  are  mounting  as  "smart  home"  devices  -  connected  by   increasingly  ubiquitous  Internet  of  Things  technology  and  designed  to   help  consumers  run  their  homes  with  ease  -  now  come  with  a  distinct   risk.  They  are  being  transformed  into  drones  for  security  breaches."  (10) Image  retrieved  from  https://www.pexels.com/photo/3d-­architectural-­design-­architectural-­                  rendering-­architecture-­261146/
  • 15. "Health  Hackers"  are  the  new  cybersecurity  threat "emerging  medical  technology  is  often  ill-equipped  to  deal   with  threats  arising  in  an  interconnected  world." there  are  simple  flaws  in  medical  devices  that  allow   hackers  to  penetrate  them  (4) Insulin  Pumps have  been  hacked  in  demonstrations Image  retrieved  from  https://www.pexels.com/photo/health-­medical-­medicine-­diet-­46173/
  • 16. There are STEPS we can take to improve  our CYBERSECURITY Image  retrieved  from  https://www.pexels.com/photo/stairs-­man-­person-­walking-­2031/
  • 17. 90%  of  passwords  generated  by  users  are  vulnerable  to  hacking                                but  there  is  a                                                                      (11)                                                                                     SIMPLE SOLUTION Users  can  protect  themselves  by   regularly  changing  their  passwords  and   using  different  passwords  for  multiple   accounts  (11) Adding  uppercase  letters,  numbers  and   symbols  to  your  password  can   significantly  reduce  the  vulnerability  of  a   password  to  hacking  (11) Image  retrieved  from    https://pixabay.com/en/login-­password-­log-­sign-­on-­turn-­on-­1203603/
  • 18. Interoperability,  in  which  one  The  Smart  home  requires   operating  system  network  controls  the  entire  home Experts  recommend  installing  multiple  networks  to  separate  computers  and   phones  from  alarm  and  entertainment  systems,  to  eliminate  a  single  point  of   failure  and  hacking  risk  (4) Image  retrieved  from    https://pixabay.com/en/smart-­home-­home-­technology-­2005993/
  • 19. Why  should  we  be  concerned  about  our  lack  of   privacy  and  our  public  digital  footprint? Image  retrieved  from  https://www.pexels.com/photo/man-­in-­white-­shirt-­using-­macbook-­pro-­52608/
  • 20. We  live  in  a  world  where  the  Internet records  everything  and  forgets  nothing   "  every  online  photo,  status  update,  Twitter  post  and  blog  entry  by   and  about  us  can  be  stored  forever.  Ill-advised  photos  and  online   chatter  are  coming  back  to  haunt  people  months  or  years  after  the   fact."  (12) Image  retrieved  from  https://pixabay.com/en/files-­ddr-­archive-­1633406/
  • 21.  31%  of  college  admissions  offices  admitted  to   visiting  an  applicant's  Facebook  or  other   personal  social  media  page  to  learn  more  about   them.  30%  admitted  they  had  discovered   information  online  that  had  negatively  affected   an  applicant's  prospects.  (13)   Image  retrieved  from    https://pixabay.com/en/graduation-­graduation-­day-­2038866/
  • 22. It  is  not  uncommon  for  employees  to  be  fired   as  a  result  of  inappropriate  posts  they've   made  on  social  media  platforms According  to  a  study  by  Proofpoint,    of  companies  with   1,000  or  more  employees,    8%  of  those  companies  have    dismissed  someone  for  their  behavior  on  sites  like  Facebook   and  LinkedIn  (14) Image  retrieved  from    https://pixabay.com/en/graduation-­graduation-­day-­2038866/
  • 23. Image  retrieved  from  https://pixabay.com/en/police-­security-­safety-­protection-­869216/ The  internet  can  be  a  dangerous  place  and  cybersecurity   should  not  be  taken  lightly As  long  as  users  use  the  internet  responsibly  and  take  the  appropriate   steps  to  protect  their  digital  privacy,  there  are  many  benefits  of  the   internet  that  can  be  enjoyed   SURF     RESPONSIBLY
  • 24. Literature  References / 1.  MacKinnon,  Rebecca.  "  We're  Losing  Control  over  our  Digital  Privacy.  CNN  2012.  Web.  31  May          2017.  Retrieved  from  http://www.cnn.com/2012/01/26/opinion/mackinnon-­sopa-­government-­          surveillance/   2.  Livingstone,  Rob.  "Digital  Footprints  And  Privacy  Concerns".  Infosec  Institute  2015.  Web.  31          May  2017.  Retrieved  from  http://resources.infosecinstitute.com/digital-­footprints-­privacy          concerns/   3.  Dwoskin,  Elizabeth.  "Apps  Track  Users—Once  Every  3  Minutes".  The  Wall  Street  Journal  2017.          Web.31  May  2017.  Retrieved  from  https://www.wsj.com/articles/apps-­track-­usersonce-­every-­3-­          minutes-­1427166955   4.  Matrix,  Sydneyeve.  "Film  260  Module  3".  2017.  Lecture.   5.  "Mass  Surveillance  |  Privacy  International".  Privacyinternational.org.  N.p.,  2017.  Web.  31  May          2017.  Retrieved  from  https://www.privacyinternational.org/node/52?PageSpeed=noscript   6.  Freeze,  Colin.  "Government  Use  Of  Surveillance  Devices  Must  Be  Restricted:  Privacy  Experts".          The  Globe  and  Mail  2016.  Web.  31  May  2017.  Retrieved  from            https://www.theglobeandmail.com/news/national/government-­use-­of-­surveillance-­devices-­          should-­be-­publicly-­debated-­privacy-­experts/article31844872/   7.  Fox-­Brewster,  Thomas.  "Yahoo  Admits  500  Million  Hit  In  2014  Breach".  Forbes  2016.  Web.  31              May  2017.  Retrieved  from  https://www.forbes.com/sites/thomasbrewster/2016/09/22/yahoo-­500-­        million-­          hacked-­by-­nation-­state/#6697adec6dcb   8.  Quin,  Ben,  and  Charles  Arthur.  "Playstation  Network  Hackers  Access  Data  Of  77  Million  Users".          The  Guardian  2011.  Web.  31  May  2017.  Retrieved  from            https://www.theguardian.com/technology/2011/apr/26/playstation-­network-­hackers-­data  
  • 25.    9.  Siluk,  Shirley.  "5  Million  Gmail  Usernames,  Passwords  Stolen".  Sci-­Tech  Today  2014.  Web.  31              May  2017.  Retrieved  from  http://www.newsfactor.com/story.xhtml?story_id=023000SKB48J   10.  David,  Javier  E.  "Alarm  Grows  As  Smart  Home  Technology  And  Hacking  Risks  Proliferate".              CNBC  2016.  Web.  31  May  2017.  Retrieved  from  http://www.cnbc.com/2016/11/04/alarm-­grows-­              as-­smart-­home-­technology-­and-­hacking-­risks-­proliferate.html   11.  Warner,  Matt.  "90  Percent  Of  Passwords  ‘Vulnerable  To  Hacking".  Business  Insider  2013.  Web.              31  May  2017.  Retrieved  from  http://www.businessinsider.com/90-­percent-­of-­passwords-­              vulnerable-­to-­hacking-­2013-­1   12.  Rosen,  Jeffrey.  "The  Web  Means  The  End  Of  Forgetting".  The  New  York  Times  2010.  Web.  31              May  2017.  Retrieved  from  http://www.nytimes.com/2010/07/25/magazine/25privacy-­t2.html?              pagewanted=all&_r=0   13.  Singer,  Natasha.  "They  Loved  Your  G.P.A.  Then  They  Saw  Your  Tweets".  The  New  York  Times              2013.  Web.  31  May  2017.  Retrieved  from  http://www.nytimes.com/2013/11/10/business/they-­              loved-­your-­gpa-­then-­they-­saw-­your-­tweets.html   14.  Ostrow,  Adam.  "FACEBOOK  FIRED:  8%  Of  US  Companies  Have  Sacked  Social  Media              Miscreants".  Mashable  2009.  Web.  31  May  2017.  Retrieved              from  http://mashable.com/2009/08/10/social-­media-­misuse/