SlideShare a Scribd company logo
1 of 21
a	
  thing	
  of	
  the	
  past?	
  
	
   	
   	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  Photo	
  via	
  Advanced	
  Google	
  Image	
  search	
  
By:	
  Alèque	
  Juneau	
  
with	
  the	
  improvement	
  of	
  	
  
TECHNOLOGY
comes	
  the	
  increased	
  availability	
  of	
  	
  
INFORMATION
Photo	
  via	
  Advanced	
  Google	
  Image	
  search	
  
SO WHAT DOES THAT MEAN FOR THE
PRIVATE INFORMATION
THAT WE STORE AMONG OUR VARIOUS DEVICES?
Photo	
  by	
  Adrian	
  Clark	
  via	
  Creative	
  Commons	
  on	
  Flickr	
  
63% of cellphone owners use their phone to go online
91% of [Americans] now own a cellphone
65% of online adults use social networking sites
Photo	
  by	
  Simon	
  Cunningham	
  via	
  Creative	
  Commons	
  on	
  Flickr	
  
Photo	
  by	
  Jason	
  Howie	
  via	
  Creative	
  Commons	
  on	
  Flickr	
  
92% of teen social media users post their [REAL NAME]
82% post their [BIRTH DATE]
71% post the [CITY OR TOWN] where they live
53% post their [EMAIL ADDRESS]
20% post their [CELLPHONE NUMBER]
People are spending more
T I M E
online...
Photo	
  by	
  Rhino	
  Neal	
  via	
  Creative	
  Commons	
  on	
  Flickr	
  
…because it is becoming more convenient for users to be both
online and mobile with things like smartphones, laptops, and
tablets.
Photo	
  by	
  Cheon	
  Fong	
  Liew	
  via	
  Creative	
  Commons	
  on	
  Flickr	
  
And while online access through multiple devices seems 
like a great idea
Photo	
  via	
  Advanced	
  Google	
  Image	
  search	
  
There can be serious consequences that come
from sharing private information online
Photo	
  by	
  Marsmet	
  Tallahassee	
  via	
  Creative	
  Commons	
  on	
  Flickr	
  
the	
  NSA	
  is	
  not	
  	
  
“looking	
  into	
  content”	
  
the	
  agency	
  is	
  
“simply	
  collecting	
  metadata”	
  
Photo	
  by	
  Peter	
  Griffin	
  via	
  PublicDomainPictures.net	
  
~President	
  Barack	
  Obama	
  
METADATA is:
however, does not provide personal or

content-specific details – theguardian.com
Photo	
  via	
  Advanced	
  Google	
  Image	
  search	
  
data that describes other data, and

provides information 	
  
this is known as	
and includes:	
the date and time of a phone call	
the location from which you last accessed your email	
the phone number of every caller	
your username and location when using social media	
Photo	
  by	
  Jim	
  Bumgardner	
  via	
  Creative	
  Commons	
  on	
  Flickr	
  
A study by Stanford University claims that
metadata is
HIGHLY SENSITIVE 	
  
analyzed correctly, it can reveal INTIMATE, 
PERSONAL and shockingly SPECIFIC things about people
Photo	
  by	
  PictureWendy	
  via	
  Creative	
  Commons	
  on	
  Flickr	
  
An author of the study claimed:
“We	
  found	
  that	
  phone	
  metadata	
  is	
  
UNAMBIGUOUSLY	
  
SENSITIVE	
  
We	
  were	
  able	
  to	
  infer	
  medical	
  	
  
conditions,	
  firearm	
  ownership	
  
AND	
  MORE	
  
using	
  solely	
  phone	
  metadata.”	
  
Photo	
  by	
  JR_Paris	
  via	
  Creative	
  Commons	
  on	
  Flickr	
  
21%	
  of	
  internet	
  users	
  have	
  had	
  an	
  email	
  or	
  social	
  networking	
  account	
  
compromised	
  or	
  taken	
  over	
  	
  
32%	
  have	
  had	
  important	
  personal	
  information	
  stolen	
  (Social	
  Security	
  #,	
  	
  
credit	
  card,	
  or	
  bank	
  account	
  information)	
  
50%	
  say	
  they	
  are	
  worried	
  about	
  the	
  amount	
  of	
  personal	
  information	
  about	
  
them	
  that	
  is	
  online	
  
Photo	
  via	
  Advanced	
  Google	
  Image	
  search	
  
Meaning that it is important to 
PAY ATTENTION
To the information that you are
SHARING ONLINE
Photo	
  via	
  Advanced	
  Google	
  Image	
  search	
  
Photo	
  by	
  Clint	
  via	
  Creative	
  Commons	
  on	
  Flickr	
  
Because while the notion of 100% privacy
is an optimistic idea…
Since technology has developed so much…
…and is continuing to develop…
Photo	
  by	
  telwink	
  via	
  Creative	
  Commons	
  on	
  Flickr	
  	
  
the reality is that we store so much personal information
on	
  so	
  many	
  different	
  mobile	
  and	
  technological	
  devices	
  
Photo	
  by	
  Luke	
  Wroblewski	
  via	
  Creative	
  Commons	
  on	
  Flickr	
  
That the expectation for
security of information is proportionate
to the level of online usage
Photo	
  by	
  JoePhilipson	
  via	
  Creative	
  Commons	
  on	
  Flickr	
  
SOURCES
2013.	
  “A	
  Guardian	
  guide	
  to	
  your	
  metadata.”	
  The	
  Guardian	
  Online	
  	
  
	
  (http://www.theguardian.com/technology/interactive/2013/jun/12/what-­‐is-­‐	
  
	
  metadata-­‐nsa-­‐surveillance#meta=0101100).	
  	
  
Duggan,	
  Maeve	
  and	
  Aaron	
  Smith.	
  2013.	
  “Cell	
  Internet	
  Use	
  2013.”	
  Pew	
  Research	
  (http://	
  
	
  www.pewinternet.org/2013/09/16/cell-­‐internet-­‐use-­‐2013/).	
  	
  
Entis,	
  Lauren.	
  2014.	
  “How	
  much	
  can	
  your	
  phone’s	
  metadata	
  reveal	
  about	
  you?	
  Too	
  	
  
	
  much.”	
  Entrepreneur	
  (http://www.entrepreneur.com/article/232227).	
  	
  
Madden,	
  Mary	
  and	
  Kathryn	
  Zickuhr.	
  2011.	
  “65%	
  of	
  online	
  adults	
  use	
  social	
  networking	
  
	
  sites.”	
  Pew	
  Research	
  (http://www.pewinternet.org/2011/08/26/65-­‐of-­‐online-­‐	
  
	
  adults-­‐use-­‐social-­‐networking-­‐sites/).	
  	
  
Madden,	
  Mary,	
  Amanda	
  Lenhart,	
  Sandra	
  Cortesi,	
  Urs	
  Gasser,	
  Maeve	
  Duggan,	
  Aaron	
  	
  
	
  Smith	
  and	
  Meredith	
  Beaton.	
  2013.	
  “Part	
  2:	
  Information	
  Sharing,	
  Friending,	
  and	
  
	
  Privacy	
  Settings	
  on	
  Social	
  Media.”	
  Pew	
  Research	
  (http://www.pewinternet.org	
  
	
  /2013/05/21/part-­‐2-­‐information-­‐sharing-­‐friending-­‐and-­‐privacy-­‐settings-­‐on-­‐	
  
	
  social-­‐media/).	
  	
  
Rainie,	
  Lee,	
  Sara	
  Kiesler,	
  Ruogu	
  Kang	
  and	
  Mary	
  Madden.	
  2013.	
  “Anonymity,	
  Privacy,	
  
	
  and	
  Security	
  Online.”	
  Pew	
  Research	
  (http://www.pewinternet.org/2013/09/05	
  
	
  /anonymity-­‐privacy-­‐and-­‐security-­‐online/).	
  	
  
	
  
All photos obtained via Advanced Google Image search, Creative Commons of
Flickr and PublicDomainPictures.net
Photo	
  by	
  Chris	
  via	
  Creative	
  Commons	
  on	
  Flickr	
  

More Related Content

What's hot

Film 260 flipbook
Film 260 flipbookFilm 260 flipbook
Film 260 flipbookJulie Coles
 
The Rise of Wearable Technology
The Rise of Wearable TechnologyThe Rise of Wearable Technology
The Rise of Wearable TechnologyEmily McKeown
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentationcentrelink
 
Wearable Technology - FILM 260
Wearable Technology - FILM 260Wearable Technology - FILM 260
Wearable Technology - FILM 260venuschung
 
How Young is Too Young?
How Young is Too Young? How Young is Too Young?
How Young is Too Young? sshrimali
 
Electronics and Sleep
Electronics and Sleep Electronics and Sleep
Electronics and Sleep Allie Morris
 
LIFARS - Social Media Dangers to Children
LIFARS - Social Media Dangers to ChildrenLIFARS - Social Media Dangers to Children
LIFARS - Social Media Dangers to ChildrenLIFARS
 
The Mobile Media Addiction
The Mobile Media AddictionThe Mobile Media Addiction
The Mobile Media AddictionEvan Konarek
 
Increasing Sophistication - The Cyberpsychology of Online Fraud and Phishing
Increasing Sophistication - The Cyberpsychology of Online Fraud and PhishingIncreasing Sophistication - The Cyberpsychology of Online Fraud and Phishing
Increasing Sophistication - The Cyberpsychology of Online Fraud and PhishingCiarán Mc Mahon
 
Appreciating Contradications: The Cyberpsychology of Information Security
Appreciating Contradications: The Cyberpsychology of Information SecurityAppreciating Contradications: The Cyberpsychology of Information Security
Appreciating Contradications: The Cyberpsychology of Information SecurityCiarán Mc Mahon
 

What's hot (20)

Smartphones Flipbook
Smartphones FlipbookSmartphones Flipbook
Smartphones Flipbook
 
Film 260 flipbook
Film 260 flipbookFilm 260 flipbook
Film 260 flipbook
 
The Rise of Wearable Technology
The Rise of Wearable TechnologyThe Rise of Wearable Technology
The Rise of Wearable Technology
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentation
 
The internet’s turbulent next decade
The internet’s turbulent next decadeThe internet’s turbulent next decade
The internet’s turbulent next decade
 
Wearable Technology - FILM 260
Wearable Technology - FILM 260Wearable Technology - FILM 260
Wearable Technology - FILM 260
 
Too Young?
Too Young?Too Young?
Too Young?
 
The Next Digital Disruptions
The Next Digital DisruptionsThe Next Digital Disruptions
The Next Digital Disruptions
 
How Young is Too Young?
How Young is Too Young? How Young is Too Young?
How Young is Too Young?
 
Film 315 Presentation
Film 315 PresentationFilm 315 Presentation
Film 315 Presentation
 
Film 315 slides
Film 315 slidesFilm 315 slides
Film 315 slides
 
Connecting Online
Connecting OnlineConnecting Online
Connecting Online
 
Electronics and Sleep
Electronics and Sleep Electronics and Sleep
Electronics and Sleep
 
Internet privacy
Internet privacyInternet privacy
Internet privacy
 
Ethics and Big Data
Ethics and Big Data Ethics and Big Data
Ethics and Big Data
 
LIFARS - Social Media Dangers to Children
LIFARS - Social Media Dangers to ChildrenLIFARS - Social Media Dangers to Children
LIFARS - Social Media Dangers to Children
 
Digitally Distracted
Digitally DistractedDigitally Distracted
Digitally Distracted
 
The Mobile Media Addiction
The Mobile Media AddictionThe Mobile Media Addiction
The Mobile Media Addiction
 
Increasing Sophistication - The Cyberpsychology of Online Fraud and Phishing
Increasing Sophistication - The Cyberpsychology of Online Fraud and PhishingIncreasing Sophistication - The Cyberpsychology of Online Fraud and Phishing
Increasing Sophistication - The Cyberpsychology of Online Fraud and Phishing
 
Appreciating Contradications: The Cyberpsychology of Information Security
Appreciating Contradications: The Cyberpsychology of Information SecurityAppreciating Contradications: The Cyberpsychology of Information Security
Appreciating Contradications: The Cyberpsychology of Information Security
 

Viewers also liked

Streams Studio Support for IBM InfoSphere Streams V4.0
Streams Studio Support for IBM InfoSphere Streams V4.0Streams Studio Support for IBM InfoSphere Streams V4.0
Streams Studio Support for IBM InfoSphere Streams V4.0lisanl
 
Java/Scala Lab: Игорь Вахромеев - Parallel your process with Spring Batch
Java/Scala Lab: Игорь Вахромеев - Parallel your process with Spring BatchJava/Scala Lab: Игорь Вахромеев - Parallel your process with Spring Batch
Java/Scala Lab: Игорь Вахромеев - Parallel your process with Spring BatchGeeksLab Odessa
 
Estaciones de climatización, Herramientas y Accesorios #TerritorioHELLA
Estaciones de climatización, Herramientas y Accesorios #TerritorioHELLAEstaciones de climatización, Herramientas y Accesorios #TerritorioHELLA
Estaciones de climatización, Herramientas y Accesorios #TerritorioHELLAHELLA Spain
 
Catalog Avon - Campania 05 / 2011 - avonstore
Catalog Avon - Campania 05 / 2011 - avonstoreCatalog Avon - Campania 05 / 2011 - avonstore
Catalog Avon - Campania 05 / 2011 - avonstoreVecina_ro
 
Manual de tecnicas radiologicas de bolso
Manual de tecnicas radiologicas de bolsoManual de tecnicas radiologicas de bolso
Manual de tecnicas radiologicas de bolsoAdemar Ribeiro
 
Android Design Patterns
Android Design PatternsAndroid Design Patterns
Android Design PatternsGodfrey Nolan
 
Controlling diseases to ensure better animal health
Controlling diseases to ensure better animal healthControlling diseases to ensure better animal health
Controlling diseases to ensure better animal healthDeepa Menon
 
TEMA 19 lA ARQUITECTURA DEL S.XX
TEMA 19 lA ARQUITECTURA DEL S.XXTEMA 19 lA ARQUITECTURA DEL S.XX
TEMA 19 lA ARQUITECTURA DEL S.XX@evasociales
 
Information Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing SudanInformation Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing SudanAhmed Musaad
 
Online Privacy
Online PrivacyOnline Privacy
Online PrivacyIWMW
 
We Turn and Face the Changes - The S-10 Emerges as a Proxy for Payment
We Turn and Face the Changes - The S-10 Emerges as a Proxy for PaymentWe Turn and Face the Changes - The S-10 Emerges as a Proxy for Payment
We Turn and Face the Changes - The S-10 Emerges as a Proxy for PaymentBESLER
 

Viewers also liked (20)

AADIMATIQ
AADIMATIQAADIMATIQ
AADIMATIQ
 
Streams Studio Support for IBM InfoSphere Streams V4.0
Streams Studio Support for IBM InfoSphere Streams V4.0Streams Studio Support for IBM InfoSphere Streams V4.0
Streams Studio Support for IBM InfoSphere Streams V4.0
 
SuperSites
SuperSitesSuperSites
SuperSites
 
IP-guard Catalog
IP-guard CatalogIP-guard Catalog
IP-guard Catalog
 
Java/Scala Lab: Игорь Вахромеев - Parallel your process with Spring Batch
Java/Scala Lab: Игорь Вахромеев - Parallel your process with Spring BatchJava/Scala Lab: Игорь Вахромеев - Parallel your process with Spring Batch
Java/Scala Lab: Игорь Вахромеев - Parallel your process with Spring Batch
 
Технологии
ТехнологииТехнологии
Технологии
 
Curriculum de Juan Carlos Sánchez Illán
Curriculum de Juan Carlos Sánchez IllánCurriculum de Juan Carlos Sánchez Illán
Curriculum de Juan Carlos Sánchez Illán
 
Maria jose naranjo
Maria jose naranjoMaria jose naranjo
Maria jose naranjo
 
Bondia.cat 05/11/2013
Bondia.cat 05/11/2013Bondia.cat 05/11/2013
Bondia.cat 05/11/2013
 
LA CRÓNICA 617
LA CRÓNICA 617LA CRÓNICA 617
LA CRÓNICA 617
 
Estaciones de climatización, Herramientas y Accesorios #TerritorioHELLA
Estaciones de climatización, Herramientas y Accesorios #TerritorioHELLAEstaciones de climatización, Herramientas y Accesorios #TerritorioHELLA
Estaciones de climatización, Herramientas y Accesorios #TerritorioHELLA
 
Catalog Avon - Campania 05 / 2011 - avonstore
Catalog Avon - Campania 05 / 2011 - avonstoreCatalog Avon - Campania 05 / 2011 - avonstore
Catalog Avon - Campania 05 / 2011 - avonstore
 
Manual de tecnicas radiologicas de bolso
Manual de tecnicas radiologicas de bolsoManual de tecnicas radiologicas de bolso
Manual de tecnicas radiologicas de bolso
 
Android Design Patterns
Android Design PatternsAndroid Design Patterns
Android Design Patterns
 
Controlling diseases to ensure better animal health
Controlling diseases to ensure better animal healthControlling diseases to ensure better animal health
Controlling diseases to ensure better animal health
 
TEMA 19 lA ARQUITECTURA DEL S.XX
TEMA 19 lA ARQUITECTURA DEL S.XXTEMA 19 lA ARQUITECTURA DEL S.XX
TEMA 19 lA ARQUITECTURA DEL S.XX
 
Information Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing SudanInformation Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing Sudan
 
Online Privacy
Online PrivacyOnline Privacy
Online Privacy
 
Folha
FolhaFolha
Folha
 
We Turn and Face the Changes - The S-10 Emerges as a Proxy for Payment
We Turn and Face the Changes - The S-10 Emerges as a Proxy for PaymentWe Turn and Face the Changes - The S-10 Emerges as a Proxy for Payment
We Turn and Face the Changes - The S-10 Emerges as a Proxy for Payment
 

Similar to Is Online Privacy a Thing of the Past?

The Deception of Privacy, The Truth About a Plugged in Life
The Deception of Privacy, The Truth About a Plugged in LifeThe Deception of Privacy, The Truth About a Plugged in Life
The Deception of Privacy, The Truth About a Plugged in LifeCindy Beneteau
 
Mobilities Throughout The Ages
Mobilities Throughout The AgesMobilities Throughout The Ages
Mobilities Throughout The Agesrebeccajmckee
 
T. tighe privacy vs safety flipbook v2
T. tighe privacy vs safety flipbook v2T. tighe privacy vs safety flipbook v2
T. tighe privacy vs safety flipbook v2Tanya Tighe, CRSP
 
Diminishing Privacy Hasn't Stopped Us From Being Increasingly Digital
Diminishing Privacy Hasn't Stopped Us From Being Increasingly DigitalDiminishing Privacy Hasn't Stopped Us From Being Increasingly Digital
Diminishing Privacy Hasn't Stopped Us From Being Increasingly DigitalWensen Li
 
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITYPresentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITYgailmowal
 
Is it safe to bank on our phones?
Is it safe to bank on our phones?Is it safe to bank on our phones?
Is it safe to bank on our phones?Queen's University
 
Relationships In A Digital World
Relationships In A Digital WorldRelationships In A Digital World
Relationships In A Digital WorldMariaAlauddin
 
The New Digital You
The New Digital YouThe New Digital You
The New Digital Yourichbrilli
 
Data:The Fine Balance.We Trade Privacy for Convenience and Security.
Data:The Fine Balance.We Trade Privacy for Convenience and Security.Data:The Fine Balance.We Trade Privacy for Convenience and Security.
Data:The Fine Balance.We Trade Privacy for Convenience and Security.Donovan Gopaul
 
Strategies for Digital Natives
Strategies for Digital NativesStrategies for Digital Natives
Strategies for Digital Nativeshblowers
 
ESRC Research Methods Festival - From Flickr to Snapchat: The challenge of an...
ESRC Research Methods Festival - From Flickr to Snapchat: The challenge of an...ESRC Research Methods Festival - From Flickr to Snapchat: The challenge of an...
ESRC Research Methods Festival - From Flickr to Snapchat: The challenge of an...Farida Vis
 
Children and mobile education
Children and mobile educationChildren and mobile education
Children and mobile educationdanseanmac
 
Flipbook online privacy
Flipbook online privacyFlipbook online privacy
Flipbook online privacyTyler Shackman
 
2024 Future of Communication Technology
2024 Future of Communication Technology2024 Future of Communication Technology
2024 Future of Communication TechnologyHolly Baldwin
 
Mobile Privacy and Security - Study by Mobidigger
Mobile Privacy and Security - Study by MobidiggerMobile Privacy and Security - Study by Mobidigger
Mobile Privacy and Security - Study by MobidiggerHubert Moik
 

Similar to Is Online Privacy a Thing of the Past? (20)

The Deception of Privacy, The Truth About a Plugged in Life
The Deception of Privacy, The Truth About a Plugged in LifeThe Deception of Privacy, The Truth About a Plugged in Life
The Deception of Privacy, The Truth About a Plugged in Life
 
Mobilities Throughout The Ages
Mobilities Throughout The AgesMobilities Throughout The Ages
Mobilities Throughout The Ages
 
T. tighe privacy vs safety flipbook v2
T. tighe privacy vs safety flipbook v2T. tighe privacy vs safety flipbook v2
T. tighe privacy vs safety flipbook v2
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Film project 2
Film project 2Film project 2
Film project 2
 
Film 315 presentation
Film 315 presentationFilm 315 presentation
Film 315 presentation
 
Diminishing Privacy Hasn't Stopped Us From Being Increasingly Digital
Diminishing Privacy Hasn't Stopped Us From Being Increasingly DigitalDiminishing Privacy Hasn't Stopped Us From Being Increasingly Digital
Diminishing Privacy Hasn't Stopped Us From Being Increasingly Digital
 
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITYPresentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY
 
Is it safe to bank on our phones?
Is it safe to bank on our phones?Is it safe to bank on our phones?
Is it safe to bank on our phones?
 
Relationships In A Digital World
Relationships In A Digital WorldRelationships In A Digital World
Relationships In A Digital World
 
The New Digital You
The New Digital YouThe New Digital You
The New Digital You
 
Flipbook
FlipbookFlipbook
Flipbook
 
Data:The Fine Balance.We Trade Privacy for Convenience and Security.
Data:The Fine Balance.We Trade Privacy for Convenience and Security.Data:The Fine Balance.We Trade Privacy for Convenience and Security.
Data:The Fine Balance.We Trade Privacy for Convenience and Security.
 
Strategies for Digital Natives
Strategies for Digital NativesStrategies for Digital Natives
Strategies for Digital Natives
 
ESRC Research Methods Festival - From Flickr to Snapchat: The challenge of an...
ESRC Research Methods Festival - From Flickr to Snapchat: The challenge of an...ESRC Research Methods Festival - From Flickr to Snapchat: The challenge of an...
ESRC Research Methods Festival - From Flickr to Snapchat: The challenge of an...
 
Children and mobile education
Children and mobile educationChildren and mobile education
Children and mobile education
 
10 Overriding Themes from SXSW (March 2014)
10 Overriding Themes from SXSW (March 2014)10 Overriding Themes from SXSW (March 2014)
10 Overriding Themes from SXSW (March 2014)
 
Flipbook online privacy
Flipbook online privacyFlipbook online privacy
Flipbook online privacy
 
2024 Future of Communication Technology
2024 Future of Communication Technology2024 Future of Communication Technology
2024 Future of Communication Technology
 
Mobile Privacy and Security - Study by Mobidigger
Mobile Privacy and Security - Study by MobidiggerMobile Privacy and Security - Study by Mobidigger
Mobile Privacy and Security - Study by Mobidigger
 

Recently uploaded

Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptxPoojaSen20
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 

Recently uploaded (20)

Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 

Is Online Privacy a Thing of the Past?

  • 1. a  thing  of  the  past?                                        Photo  via  Advanced  Google  Image  search   By:  Alèque  Juneau  
  • 2. with  the  improvement  of     TECHNOLOGY comes  the  increased  availability  of     INFORMATION Photo  via  Advanced  Google  Image  search  
  • 3. SO WHAT DOES THAT MEAN FOR THE PRIVATE INFORMATION THAT WE STORE AMONG OUR VARIOUS DEVICES? Photo  by  Adrian  Clark  via  Creative  Commons  on  Flickr  
  • 4. 63% of cellphone owners use their phone to go online 91% of [Americans] now own a cellphone 65% of online adults use social networking sites Photo  by  Simon  Cunningham  via  Creative  Commons  on  Flickr  
  • 5. Photo  by  Jason  Howie  via  Creative  Commons  on  Flickr   92% of teen social media users post their [REAL NAME] 82% post their [BIRTH DATE] 71% post the [CITY OR TOWN] where they live 53% post their [EMAIL ADDRESS] 20% post their [CELLPHONE NUMBER]
  • 6. People are spending more T I M E online... Photo  by  Rhino  Neal  via  Creative  Commons  on  Flickr  
  • 7. …because it is becoming more convenient for users to be both online and mobile with things like smartphones, laptops, and tablets. Photo  by  Cheon  Fong  Liew  via  Creative  Commons  on  Flickr  
  • 8. And while online access through multiple devices seems like a great idea Photo  via  Advanced  Google  Image  search  
  • 9. There can be serious consequences that come from sharing private information online Photo  by  Marsmet  Tallahassee  via  Creative  Commons  on  Flickr  
  • 10. the  NSA  is  not     “looking  into  content”   the  agency  is   “simply  collecting  metadata”   Photo  by  Peter  Griffin  via  PublicDomainPictures.net   ~President  Barack  Obama  
  • 11. METADATA is: however, does not provide personal or content-specific details – theguardian.com Photo  via  Advanced  Google  Image  search   data that describes other data, and provides information  
  • 12. this is known as and includes: the date and time of a phone call the location from which you last accessed your email the phone number of every caller your username and location when using social media Photo  by  Jim  Bumgardner  via  Creative  Commons  on  Flickr  
  • 13. A study by Stanford University claims that metadata is HIGHLY SENSITIVE   analyzed correctly, it can reveal INTIMATE, PERSONAL and shockingly SPECIFIC things about people Photo  by  PictureWendy  via  Creative  Commons  on  Flickr  
  • 14. An author of the study claimed: “We  found  that  phone  metadata  is   UNAMBIGUOUSLY   SENSITIVE   We  were  able  to  infer  medical     conditions,  firearm  ownership   AND  MORE   using  solely  phone  metadata.”   Photo  by  JR_Paris  via  Creative  Commons  on  Flickr  
  • 15. 21%  of  internet  users  have  had  an  email  or  social  networking  account   compromised  or  taken  over     32%  have  had  important  personal  information  stolen  (Social  Security  #,     credit  card,  or  bank  account  information)   50%  say  they  are  worried  about  the  amount  of  personal  information  about   them  that  is  online   Photo  via  Advanced  Google  Image  search  
  • 16. Meaning that it is important to PAY ATTENTION To the information that you are SHARING ONLINE Photo  via  Advanced  Google  Image  search  
  • 17. Photo  by  Clint  via  Creative  Commons  on  Flickr   Because while the notion of 100% privacy is an optimistic idea…
  • 18. Since technology has developed so much… …and is continuing to develop… Photo  by  telwink  via  Creative  Commons  on  Flickr    
  • 19. the reality is that we store so much personal information on  so  many  different  mobile  and  technological  devices   Photo  by  Luke  Wroblewski  via  Creative  Commons  on  Flickr  
  • 20. That the expectation for security of information is proportionate to the level of online usage Photo  by  JoePhilipson  via  Creative  Commons  on  Flickr  
  • 21. SOURCES 2013.  “A  Guardian  guide  to  your  metadata.”  The  Guardian  Online      (http://www.theguardian.com/technology/interactive/2013/jun/12/what-­‐is-­‐    metadata-­‐nsa-­‐surveillance#meta=0101100).     Duggan,  Maeve  and  Aaron  Smith.  2013.  “Cell  Internet  Use  2013.”  Pew  Research  (http://    www.pewinternet.org/2013/09/16/cell-­‐internet-­‐use-­‐2013/).     Entis,  Lauren.  2014.  “How  much  can  your  phone’s  metadata  reveal  about  you?  Too      much.”  Entrepreneur  (http://www.entrepreneur.com/article/232227).     Madden,  Mary  and  Kathryn  Zickuhr.  2011.  “65%  of  online  adults  use  social  networking    sites.”  Pew  Research  (http://www.pewinternet.org/2011/08/26/65-­‐of-­‐online-­‐    adults-­‐use-­‐social-­‐networking-­‐sites/).     Madden,  Mary,  Amanda  Lenhart,  Sandra  Cortesi,  Urs  Gasser,  Maeve  Duggan,  Aaron      Smith  and  Meredith  Beaton.  2013.  “Part  2:  Information  Sharing,  Friending,  and    Privacy  Settings  on  Social  Media.”  Pew  Research  (http://www.pewinternet.org    /2013/05/21/part-­‐2-­‐information-­‐sharing-­‐friending-­‐and-­‐privacy-­‐settings-­‐on-­‐    social-­‐media/).     Rainie,  Lee,  Sara  Kiesler,  Ruogu  Kang  and  Mary  Madden.  2013.  “Anonymity,  Privacy,    and  Security  Online.”  Pew  Research  (http://www.pewinternet.org/2013/09/05    /anonymity-­‐privacy-­‐and-­‐security-­‐online/).       All photos obtained via Advanced Google Image search, Creative Commons of Flickr and PublicDomainPictures.net Photo  by  Chris  via  Creative  Commons  on  Flickr