3. Privacy and security
• Privacy is the state or condition of
being free from being observed or disturbed by
other people or from public attention.
• Security is freedom from danger, risk, when
somebody is safe
Image by: memeburn
4. Privacy and safety wasn’t
an issue until now, when
internet is growing and
affecting every people on a
daily basis. Image by: memeburn
5. Will you have privacy and security online
in the future?
Image by: kersten Denise
6. David Rowan (CNN, 2013), editor of technology
magazine “Wired” said that “our concept our
privacy is very much a 20th century idea.
All that personal data you are giving
to these private companies, they are making
money on and they decide how it
is going to be used.
7. He continues “you lose control
of that data.” He also added that
“anybody who is using any kind
of electronic device is giving up
the practical ability to be
untraceable.”
9. Challenges and fear
• Eye-tracking technology has been in the news
lately, thanks to rumors indicating that it
would be included in the new Samsung Galaxy S4.
• Researchers note that its potential future impact
on our privacy is huge. Images by: Eye tracking Inc
10. • Did our eyes linger for a few seconds on an
advertisement that, in the end, we decided
not to click on?
• How do our eyes move as they take in the
contents of a page?
• Are there certain words, phrases, or topics
that we appear to prefer or avoid?
• In the future, will we be served online ads
based not only on what we’ve shopped for,
but also on the thoughts reflected in our eye
movements?“
Image by: Posel Susanne
11. Richard Tso journalist in the following
article talks about how eye-tracking
technology will change the advertising
game in the future.
http://www.huffingtonpost.co
m/richard-tso/eye-tracking-
technologies_b_3457397.html
12. Challenges
and fear cont’
Once the technology
for eye-tracking is in
place, it will glean
information conveying
not only what we read
online, but also how
we read it," writes
UCLA electrical
engineering professor
John Villasenor.
Image by: Eye tracking
Inc.
13. Challenges
and fear cont’
In the future,
will we be
served online
ads based not
only on what
we’ve shopped
for, but also on
the thoughts
reflected in our
eye
movements?"
14. Consequences
Tracking and
collecting data
on our eye
movements
could reveal a
lot about us,
such as whether
a person has an
alcohol abuse
problem or
cognitive
disorder, and
even
information on
our intelligence
and sexual
orientation.
16. Unfortunately
criminals have found
the way to exploit the
beneficial aspects of
the internet.
• Child predators use
the anonymity of the
internet to prey on
children
• Terrorist can use the
internet to
communicate other
team members
17. •Hackers use the internet to get information about other
people
• Cyber bullying nowadays can ruin people’s life as the
torment, threat, harassment, humiliation does not stop but keep
going at night and on the weekends too.
Images by: Kirschenbaum Daniel
18. Hackers & Cyber bullying cont’
As per as Andrew Keen,
who is a privacy advocate
said “the future will be
characterized by reputation
wars where will be
increasingly defined by our
digital reputations” (Vox
Media, 2013).
Hackers are a huge
threat against
personal privacy ,
and in the future, no
one but the wealthy
and powerful will be
able to afford
anonymity (Vox
Media, 2013).
19. Bullying caused so many young person to
commit suicide. This video by Denzel
Washington shows how bullying can lead to
suicide.
http://www.youtube.com/watch?v=tWKsMagy4Ls
20. Connections to people
The Internet is not only a place to
be connected with people, It's also
a place for people or companies to
pick up even more information
about you. That includes your
address, gender, date of birth and,
with a little sleuthing, your Social
Security number and credit
history.
Image by:
Lara Gallaway
21. .
Then there's all the data you pour into social media
sites such as Facebook, Twitter, Tumblr, Instagram,
Foursquare and others. Now employers can fire
workers for expressing opinions they don’t like,
strangers can stalk you with mobile apps and college
administrators can judge the quality of applicants by
the number of drinking photos posted to their
account.
23. Health care system must have the capacity to learn and
adapt to keep information in the future safe but accessible.
Under the 1996 Health Insurance
Portability and Accountability
Act (HIPAA), the Department of
Health and Human Services
developed a set of federal
standards to protect privacy of
individuals health record
(IMRVSHC, 2010).
Openness data sharing: medical information cont’
24. Openness data sharing: medical information
cont’
But would that work in the future? Do we create
data or evidence?
Although this subject
still facing numerous
challenges, the
fundamental tension
must be navigated
between adoption and
interoperability.
25. Public relation and privacy
When real estate search site Zillow
(http://www.zillow.com/) first came out,
many people were shocked at the
amount of information on it including
their physical address, aerial house
photos and the price paid for their
homes. All the information comes from
public records.
26. Public relations and privacy cont’
Other sites, such as Arrests.org, list mug shots
by state. And some local police departments
are now posting photos of recent arrests on
Facebook. Now with the Internet and
databases, public records are easy to distribute
and see.
27. Be aware
There’s nothing you can
do in the electronic world
that your boss can’t find
and you can’t be fired
for”, said Lewis Maltby,
president of National
Workrights Institute. “
28. Your future in peril!
People’s futures are in peril every time their
boss or college admissions office looks on the
Internet. That means users shouldn’t post
photos of themselves with an alcoholic drink
in their hand or espouse political views,
because it can lead to a value judgment.
29. Quote
“You can
still go
online and
say what
you want,
but you’re
crazy if
you do.”
Maltby
Lewis.
Image by:
Lara Gallaway
30. Loosing privacy
Another problem today is that social networks
becoming a larger part of one’s life. To comment on
articles, people log into a Facebook or twitter
account first. Others are finding that their Google+
social account is being attached to their Gmail
account and will be needed to comment on apps or
games on Google Play. Google+ accounts are also
used to sign into YouTube and other Google sites.
Many social networks are trying to end anonymous
posting.
32. Whatever you place online stays
online
Users can save themselves some headaches
by understanding that whatever they place
online will stay online. Nothing online is
temporary; instead, it's more like an Internet
tattoo. Martinson’s online (and likely late-
night) outburst will follow her throughout
college and possibly the workforce, according
to CNN.
33. Your posting is not private
Remember that what
you post can be seen
by others. Be careful
of what you say and
which photos are
posted because it
could potentially be
seen by millions of
people.
• Image by Stephens Lisa
35. As a new grad, You’ve already worked hard
during your college career and accomplished a
lot, but you may also be facing bleak
employment prospects. In a tough economy,
employers can afford to be more selective
about hiring new talent than ever. That means
it’s not just your educational success, your
experience, or even your confidence and
charisma under scrutiny. When reviewing your
resume and references, don’t be surprised if
prospective employers take a virtual stroll
through your Facebook profile too.
36. Take Control of Your Online Reputation
• Find out what is on the Internet about you
• Evaluate your online reputation
• Protect your online reputation
• Polish your professional reputation
• Restore your online reputation
More information on Microsoft safety and security
http://www.microsoft.com/security/online-
privacy/reputation.aspx
37. Conclusion
Privacy concerns regarding the internet are very
important in our fast growing society. Secrecy and
privacy are often conflated. All the data on people
are being collected is gradually building a
permanent profile on that person. Neutrality deals
with access to the internet, but identity deals with
the nature how the internet itself works.
38. References
Billard David (2012). Convenience vs. security. Cyberhood watch. Retrieved from:
http://thecyberhoodwatch.com/cyber-security/convenience-security-security-privacy-
cispa-copa-pipa-internet/
Source for the image used in this project.
http://memeburn.com/2011/05/tech-titans-grilled-by-us-lawmakers-on-online-privacy/
CNN. (2013). Will we care about online privacy in 20 years? Retrieved from
http://www.cnn.com/2013/04/09/tech/privacy-outdated-digital-age
This article talks about the debate over online privacy in the future that the launch of
Facebook brought into light.
Dawson Jacob (2012). How to keep your online privacy safe. ComputerHowToGuide.com
retrieved from: http://www.computerhowtoguide.com/2012/06/how-to-keep-your-
online-privacy-
Source for the image used in this project
Emspak Jesse (2013). How Facebook Home Undermines Your Security. Tech News Daily.
Retrieved from: http://www.technewsdaily.com/17794-facebook-home-security-
privacy.html
This article talks about how the “Facebook Home app”, can undermine the security o
your privacy by allowing the home screen of an Android phone change from the
usual lockscreen or picture to a stream of updates from your Facebook friends
called Cover Feed. Thus, it disables the lockscreen on the HTC, even if a PIN
passcode is enabled.
Eye Tracking Inc. (2011).What is eye tracking? Retrieved from:
http://www.eyetracking.com/About-
39. References cont’
• Franceschi-Bicchierai Lorenzo (2013). Is eye tracking a privacy-invading technology? Mashable. Retrieved from:
http://mashable.com/2013/05/8/eye-tracking-technology-privacy/ T
This article talks about the new eye tracking technology and how this technology would have a great impact on
our privacy because of its ability to glean information conveying not only what we read online, but also how we
read it.
• Frierson William (2013). Don’t let social media stand in the way of getting your dream job. Retrieved from:
http://www.collegerecruiter.com/blog/2013/07/24/dont-let-social-media-stand-in-the-way of-getting-your-
dream-job/
This article talks about the significant of building and maintaining a good online reputation for a new grad
and how the new grads can successfully do this especially for the purpose of landing their dream job.
• Hernandez E. Barbara (2013). What Does the Internet Know About You? TechNewsDaily. Retrieved from:
http://mashable.com/2013/04/30/what-internet-knows-about-you/
This article talks about how other people can track, search and use the information you put with examples of
situation where it has occurred.
• I’m Every Woman (2012). What I’ve Learned About: Hacking and Bullies on Facebook
http://i2ameverywoman.wordpress.com/2010/04/22/what-ive-learned-about-spamming-bullies-on-facebook/
Source for the image used in this project
• Kersten Denise (2009). Feel Like Someone's Watching? You're Probably Right. HRPeople. Retrieved from:
http://hrpeople.monster.com/news/articles/2322-feel-like-someones-watching-youre-probably-right
Source for the image used in this project
• Kirschenbaum Daniel (2013). Computer-hacker. Flash Routers. Retrieved from:
http://www.flashrouters.com/blog/2013/04/24/your-router-is-not-secure-how-flashrouters-can-help/computer-
hacker/
Source for the image used in this project
40. References cont’
• Institute of Medicine (US) Roundtable on Value & Science-Driven Health Care.
(IMRVSHC). (2010). Clinical Data as the Basic Staple of the Learning Health System.
Retrieved from http://www.ncbi.nlm.nih.gov /books/NBK54306/
This article talks about the importance of having health care information
accessible for health care workers, but at the same time there is a privacy issue. The
health care system has shifted from paper based to web based, but we have to see
how this is protecting the individual’s privacy. There are different laws that protect
privacy and confidentiality, but it is not fully implemented and we don’t know that if it
will be working in the future.
• Lara Galloway (2012). Tips for social media success. Mom Biz Coach. Retrieved from:
http://mombizcoach.com/social-media-success#.UfhqZY3D_IW
Source for the image used in this project
• Lisa Stephens (2011). Survey: IT professionals fear social media use at work may pose threat.
Technorati. Retrieved from:
http://technorati.com/business/advertising/article/survey-it-professionals-fear-social-
media/
Source for the image used in this project
• Microsoft (2013). Take charge of your online reputation. Safety and Security Center.
Retrieved from: http://www.microsoft.com/security/online- privacy/reputation.aspx
This came from Microsoft safety and security center, advising people on how to
maintain their privacy and secure their information online.
41. References cont’
• Posel Susanne (2012).Blue eyes originated 10,000 years ago in the black sea region. Occupy
Corporatism. Retrieved from: http://www.occupycorporatism.com/blue-eyes-
originated-10000-years-ago-in-the-black-sea-region/
Source for the image used in this project
• Tso Richard. ( ). How Eye-tracking Technologies Will Change the Advertising Game.
Retrieved from http://www.huffingtonpost.com/richard-tso/eye-tracking-
technologies_b_3457397.html
• Vox Media. (2013). Hacking the future: Cole Stryker on why identity is the web’s next
battleground. Retrieved from http://www.theverge.com/2012/9/14/3329752/
hacking-the-future-cole-stryker-interview
In this article Cole Stryker talks about his new book, Hacking the Future: Privacy,
Identity, and Anonymity on the Web, and talks about how identity is perspective, but
also is a huge concern when it comes to the internet.
• YouTube. (2013). When bullying leads to suicide: RIP Cade Parker this tribute is for you
Retrieved from http://www.youtube.com/watch?v=tWKsMagy4Ls
Source for the image used in this project