SlideShare a Scribd company logo
1 of 41
By:
Monika Dari-Suru,
Patience Akota
Images by: Billard D.
Social Media and the Future
of Privacy/security.
WHAT IS PRIVACY AND
SECURITY?
Image by: Dawson Jacob
Privacy and security
• Privacy is the state or condition of
being free from being observed or disturbed by
other people or from public attention.
• Security is freedom from danger, risk, when
somebody is safe
Image by: memeburn
Privacy and safety wasn’t
an issue until now, when
internet is growing and
affecting every people on a
daily basis. Image by: memeburn
Will you have privacy and security online
in the future?
Image by: kersten Denise
David Rowan (CNN, 2013), editor of technology
magazine “Wired” said that “our concept our
privacy is very much a 20th century idea.
All that personal data you are giving
to these private companies, they are making
money on and they decide how it
is going to be used.
He continues “you lose control
of that data.” He also added that
“anybody who is using any kind
of electronic device is giving up
the practical ability to be
untraceable.”
http://youtu.be/uZ8d2P53N1w
The following link shows us a video
about how the future online privacy
will be.
Challenges and fear
• Eye-tracking technology has been in the news
lately, thanks to rumors indicating that it
would be included in the new Samsung Galaxy S4.
• Researchers note that its potential future impact
on our privacy is huge. Images by: Eye tracking Inc
• Did our eyes linger for a few seconds on an
advertisement that, in the end, we decided
not to click on?
• How do our eyes move as they take in the
contents of a page?
• Are there certain words, phrases, or topics
that we appear to prefer or avoid?
• In the future, will we be served online ads
based not only on what we’ve shopped for,
but also on the thoughts reflected in our eye
movements?“
Image by: Posel Susanne
Richard Tso journalist in the following
article talks about how eye-tracking
technology will change the advertising
game in the future.
http://www.huffingtonpost.co
m/richard-tso/eye-tracking-
technologies_b_3457397.html
Challenges
and fear cont’
Once the technology
for eye-tracking is in
place, it will glean
information conveying
not only what we read
online, but also how
we read it," writes
UCLA electrical
engineering professor
John Villasenor.
Image by: Eye tracking
Inc.
Challenges
and fear cont’
In the future,
will we be
served online
ads based not
only on what
we’ve shopped
for, but also on
the thoughts
reflected in our
eye
movements?"
Consequences
Tracking and
collecting data
on our eye
movements
could reveal a
lot about us,
such as whether
a person has an
alcohol abuse
problem or
cognitive
disorder, and
even
information on
our intelligence
and sexual
orientation.
Hackers & Cyber bullying
Images by: I’m Every Woman
Unfortunately
criminals have found
the way to exploit the
beneficial aspects of
the internet.
• Child predators use
the anonymity of the
internet to prey on
children
• Terrorist can use the
internet to
communicate other
team members
•Hackers use the internet to get information about other
people
• Cyber bullying nowadays can ruin people’s life as the
torment, threat, harassment, humiliation does not stop but keep
going at night and on the weekends too.
Images by: Kirschenbaum Daniel
Hackers & Cyber bullying cont’
As per as Andrew Keen,
who is a privacy advocate
said “the future will be
characterized by reputation
wars where will be
increasingly defined by our
digital reputations” (Vox
Media, 2013).
Hackers are a huge
threat against
personal privacy ,
and in the future, no
one but the wealthy
and powerful will be
able to afford
anonymity (Vox
Media, 2013).
Bullying caused so many young person to
commit suicide. This video by Denzel
Washington shows how bullying can lead to
suicide.
http://www.youtube.com/watch?v=tWKsMagy4Ls
Connections to people
The Internet is not only a place to
be connected with people, It's also
a place for people or companies to
pick up even more information
about you. That includes your
address, gender, date of birth and,
with a little sleuthing, your Social
Security number and credit
history.
Image by:
Lara Gallaway
.
Then there's all the data you pour into social media
sites such as Facebook, Twitter, Tumblr, Instagram,
Foursquare and others. Now employers can fire
workers for expressing opinions they don’t like,
strangers can stalk you with mobile apps and college
administrators can judge the quality of applicants by
the number of drinking photos posted to their
account.
Openness data sharing: medical information
Health care system must have the capacity to learn and
adapt to keep information in the future safe but accessible.
Under the 1996 Health Insurance
Portability and Accountability
Act (HIPAA), the Department of
Health and Human Services
developed a set of federal
standards to protect privacy of
individuals health record
(IMRVSHC, 2010).
Openness data sharing: medical information cont’
Openness data sharing: medical information
cont’
But would that work in the future? Do we create
data or evidence?
Although this subject
still facing numerous
challenges, the
fundamental tension
must be navigated
between adoption and
interoperability.
Public relation and privacy
When real estate search site Zillow
(http://www.zillow.com/) first came out,
many people were shocked at the
amount of information on it including
their physical address, aerial house
photos and the price paid for their
homes. All the information comes from
public records.
Public relations and privacy cont’
Other sites, such as Arrests.org, list mug shots
by state. And some local police departments
are now posting photos of recent arrests on
Facebook. Now with the Internet and
databases, public records are easy to distribute
and see.
Be aware
There’s nothing you can
do in the electronic world
that your boss can’t find
and you can’t be fired
for”, said Lewis Maltby,
president of National
Workrights Institute. “
Your future in peril!
People’s futures are in peril every time their
boss or college admissions office looks on the
Internet. That means users shouldn’t post
photos of themselves with an alcoholic drink
in their hand or espouse political views,
because it can lead to a value judgment.
Quote
“You can
still go
online and
say what
you want,
but you’re
crazy if
you do.”
Maltby
Lewis.
Image by:
Lara Gallaway
Loosing privacy
Another problem today is that social networks
becoming a larger part of one’s life. To comment on
articles, people log into a Facebook or twitter
account first. Others are finding that their Google+
social account is being attached to their Gmail
account and will be needed to comment on apps or
games on Google Play. Google+ accounts are also
used to sign into YouTube and other Google sites.
Many social networks are trying to end anonymous
posting.
Quote
“To preserve
privacy, a
person
would have
to walk
away from
Google or
Facebook.
“It’s a trade-
off to some
extent.”
Adi Kamdar
Whatever you place online stays
online
Users can save themselves some headaches
by understanding that whatever they place
online will stay online. Nothing online is
temporary; instead, it's more like an Internet
tattoo. Martinson’s online (and likely late-
night) outburst will follow her throughout
college and possibly the workforce, according
to CNN.
Your posting is not private
Remember that what
you post can be seen
by others. Be careful
of what you say and
which photos are
posted because it
could potentially be
seen by millions of
people.
• Image by Stephens Lisa
Don’t
Let
Social
Media
Stand
in the
Way of
Getting
Your
Dream
Job
As a new grad, You’ve already worked hard
during your college career and accomplished a
lot, but you may also be facing bleak
employment prospects. In a tough economy,
employers can afford to be more selective
about hiring new talent than ever. That means
it’s not just your educational success, your
experience, or even your confidence and
charisma under scrutiny. When reviewing your
resume and references, don’t be surprised if
prospective employers take a virtual stroll
through your Facebook profile too.
Take Control of Your Online Reputation
• Find out what is on the Internet about you
• Evaluate your online reputation
• Protect your online reputation
• Polish your professional reputation
• Restore your online reputation
More information on Microsoft safety and security
http://www.microsoft.com/security/online-
privacy/reputation.aspx
Conclusion
Privacy concerns regarding the internet are very
important in our fast growing society. Secrecy and
privacy are often conflated. All the data on people
are being collected is gradually building a
permanent profile on that person. Neutrality deals
with access to the internet, but identity deals with
the nature how the internet itself works.
References
Billard David (2012). Convenience vs. security. Cyberhood watch. Retrieved from:
http://thecyberhoodwatch.com/cyber-security/convenience-security-security-privacy-
cispa-copa-pipa-internet/
Source for the image used in this project.
http://memeburn.com/2011/05/tech-titans-grilled-by-us-lawmakers-on-online-privacy/
CNN. (2013). Will we care about online privacy in 20 years? Retrieved from
http://www.cnn.com/2013/04/09/tech/privacy-outdated-digital-age
This article talks about the debate over online privacy in the future that the launch of
Facebook brought into light.
Dawson Jacob (2012). How to keep your online privacy safe. ComputerHowToGuide.com
retrieved from: http://www.computerhowtoguide.com/2012/06/how-to-keep-your-
online-privacy-
Source for the image used in this project
Emspak Jesse (2013). How Facebook Home Undermines Your Security. Tech News Daily.
Retrieved from: http://www.technewsdaily.com/17794-facebook-home-security-
privacy.html
This article talks about how the “Facebook Home app”, can undermine the security o
your privacy by allowing the home screen of an Android phone change from the
usual lockscreen or picture to a stream of updates from your Facebook friends
called Cover Feed. Thus, it disables the lockscreen on the HTC, even if a PIN
passcode is enabled.
Eye Tracking Inc. (2011).What is eye tracking? Retrieved from:
http://www.eyetracking.com/About-
References cont’
• Franceschi-Bicchierai Lorenzo (2013). Is eye tracking a privacy-invading technology? Mashable. Retrieved from:
http://mashable.com/2013/05/8/eye-tracking-technology-privacy/ T
This article talks about the new eye tracking technology and how this technology would have a great impact on
our privacy because of its ability to glean information conveying not only what we read online, but also how we
read it.
• Frierson William (2013). Don’t let social media stand in the way of getting your dream job. Retrieved from:
http://www.collegerecruiter.com/blog/2013/07/24/dont-let-social-media-stand-in-the-way of-getting-your-
dream-job/
This article talks about the significant of building and maintaining a good online reputation for a new grad
and how the new grads can successfully do this especially for the purpose of landing their dream job.
• Hernandez E. Barbara (2013). What Does the Internet Know About You? TechNewsDaily. Retrieved from:
http://mashable.com/2013/04/30/what-internet-knows-about-you/
This article talks about how other people can track, search and use the information you put with examples of
situation where it has occurred.
• I’m Every Woman (2012). What I’ve Learned About: Hacking and Bullies on Facebook
http://i2ameverywoman.wordpress.com/2010/04/22/what-ive-learned-about-spamming-bullies-on-facebook/
Source for the image used in this project
• Kersten Denise (2009). Feel Like Someone's Watching? You're Probably Right. HRPeople. Retrieved from:
http://hrpeople.monster.com/news/articles/2322-feel-like-someones-watching-youre-probably-right
Source for the image used in this project
• Kirschenbaum Daniel (2013). Computer-hacker. Flash Routers. Retrieved from:
http://www.flashrouters.com/blog/2013/04/24/your-router-is-not-secure-how-flashrouters-can-help/computer-
hacker/
Source for the image used in this project
References cont’
• Institute of Medicine (US) Roundtable on Value & Science-Driven Health Care.
(IMRVSHC). (2010). Clinical Data as the Basic Staple of the Learning Health System.
Retrieved from http://www.ncbi.nlm.nih.gov /books/NBK54306/
This article talks about the importance of having health care information
accessible for health care workers, but at the same time there is a privacy issue. The
health care system has shifted from paper based to web based, but we have to see
how this is protecting the individual’s privacy. There are different laws that protect
privacy and confidentiality, but it is not fully implemented and we don’t know that if it
will be working in the future.
• Lara Galloway (2012). Tips for social media success. Mom Biz Coach. Retrieved from:
http://mombizcoach.com/social-media-success#.UfhqZY3D_IW
Source for the image used in this project
• Lisa Stephens (2011). Survey: IT professionals fear social media use at work may pose threat.
Technorati. Retrieved from:
http://technorati.com/business/advertising/article/survey-it-professionals-fear-social-
media/
Source for the image used in this project
• Microsoft (2013). Take charge of your online reputation. Safety and Security Center.
Retrieved from: http://www.microsoft.com/security/online- privacy/reputation.aspx
This came from Microsoft safety and security center, advising people on how to
maintain their privacy and secure their information online.
References cont’
• Posel Susanne (2012).Blue eyes originated 10,000 years ago in the black sea region. Occupy
Corporatism. Retrieved from: http://www.occupycorporatism.com/blue-eyes-
originated-10000-years-ago-in-the-black-sea-region/
Source for the image used in this project
• Tso Richard. ( ). How Eye-tracking Technologies Will Change the Advertising Game.
Retrieved from http://www.huffingtonpost.com/richard-tso/eye-tracking-
technologies_b_3457397.html
• Vox Media. (2013). Hacking the future: Cole Stryker on why identity is the web’s next
battleground. Retrieved from http://www.theverge.com/2012/9/14/3329752/
hacking-the-future-cole-stryker-interview
In this article Cole Stryker talks about his new book, Hacking the Future: Privacy,
Identity, and Anonymity on the Web, and talks about how identity is perspective, but
also is a huge concern when it comes to the internet.
• YouTube. (2013). When bullying leads to suicide: RIP Cade Parker this tribute is for you 
Retrieved from http://www.youtube.com/watch?v=tWKsMagy4Ls
Source for the image used in this project

More Related Content

What's hot

Social media Risk Management Presentation Sample (Animations don't work in sl...
Social media Risk Management Presentation Sample (Animations don't work in sl...Social media Risk Management Presentation Sample (Animations don't work in sl...
Social media Risk Management Presentation Sample (Animations don't work in sl...Alexander Larsen
 
Benefits and Risks of Social Technologies
Benefits and Risks of Social TechnologiesBenefits and Risks of Social Technologies
Benefits and Risks of Social TechnologiesAtle Skjekkeland
 
E safety training for southwark staff - stephen carrick-davies january 2013
E  safety training for southwark staff - stephen carrick-davies january 2013E  safety training for southwark staff - stephen carrick-davies january 2013
E safety training for southwark staff - stephen carrick-davies january 2013Stephen Carrick-Davies
 
Social Networking Project[1]
Social Networking Project[1]Social Networking Project[1]
Social Networking Project[1]lely22
 
Online Identity- Part 1
Online Identity- Part 1Online Identity- Part 1
Online Identity- Part 1KR_Barker
 
Digital Footprint
Digital FootprintDigital Footprint
Digital Footprintdarpankambo
 
The Dark Side of Social Media: Legal Issues
The Dark Side of Social Media: Legal IssuesThe Dark Side of Social Media: Legal Issues
The Dark Side of Social Media: Legal IssuesM. Prabu Wibowo
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentationdh24gold
 
eMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, Feds
eMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, FedseMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, Feds
eMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, FedseMarketer
 
Notes 21st century child navigating the digital world with your child 2015 -...
Notes 21st century child  navigating the digital world with your child 2015 -...Notes 21st century child  navigating the digital world with your child 2015 -...
Notes 21st century child navigating the digital world with your child 2015 -...Samuel Landete Benavente
 
Updated Online Safety 3.0 Talk for Mediterranean Association of International...
Updated Online Safety 3.0 Talk for Mediterranean Association of International...Updated Online Safety 3.0 Talk for Mediterranean Association of International...
Updated Online Safety 3.0 Talk for Mediterranean Association of International...Larry Magid
 
Healing our online sickness by cyber path
Healing our online sickness by cyber pathHealing our online sickness by cyber path
Healing our online sickness by cyber pathProfsdetchana Murthy
 

What's hot (19)

Digital Footprint
Digital Footprint  Digital Footprint
Digital Footprint
 
Social media Risk Management Presentation Sample (Animations don't work in sl...
Social media Risk Management Presentation Sample (Animations don't work in sl...Social media Risk Management Presentation Sample (Animations don't work in sl...
Social media Risk Management Presentation Sample (Animations don't work in sl...
 
Digital Tattoo Workshop for VPL
Digital Tattoo Workshop for VPLDigital Tattoo Workshop for VPL
Digital Tattoo Workshop for VPL
 
Benefits and Risks of Social Technologies
Benefits and Risks of Social TechnologiesBenefits and Risks of Social Technologies
Benefits and Risks of Social Technologies
 
E safety training for southwark staff - stephen carrick-davies january 2013
E  safety training for southwark staff - stephen carrick-davies january 2013E  safety training for southwark staff - stephen carrick-davies january 2013
E safety training for southwark staff - stephen carrick-davies january 2013
 
Social Networking Project (2)
Social Networking Project (2)Social Networking Project (2)
Social Networking Project (2)
 
Social Networking Project[1]
Social Networking Project[1]Social Networking Project[1]
Social Networking Project[1]
 
Online Identity- Part 1
Online Identity- Part 1Online Identity- Part 1
Online Identity- Part 1
 
Social Media for Families
Social Media for FamiliesSocial Media for Families
Social Media for Families
 
Digital Footprint
Digital FootprintDigital Footprint
Digital Footprint
 
The Dark Side of Social Media: Legal Issues
The Dark Side of Social Media: Legal IssuesThe Dark Side of Social Media: Legal Issues
The Dark Side of Social Media: Legal Issues
 
Digital Tattoo for Teacher Candidates at UBC
Digital Tattoo for Teacher Candidates at UBC Digital Tattoo for Teacher Candidates at UBC
Digital Tattoo for Teacher Candidates at UBC
 
ISACA UW Handbook 2016
ISACA UW Handbook 2016ISACA UW Handbook 2016
ISACA UW Handbook 2016
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentation
 
Digital Self
Digital SelfDigital Self
Digital Self
 
eMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, Feds
eMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, FedseMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, Feds
eMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, Feds
 
Notes 21st century child navigating the digital world with your child 2015 -...
Notes 21st century child  navigating the digital world with your child 2015 -...Notes 21st century child  navigating the digital world with your child 2015 -...
Notes 21st century child navigating the digital world with your child 2015 -...
 
Updated Online Safety 3.0 Talk for Mediterranean Association of International...
Updated Online Safety 3.0 Talk for Mediterranean Association of International...Updated Online Safety 3.0 Talk for Mediterranean Association of International...
Updated Online Safety 3.0 Talk for Mediterranean Association of International...
 
Healing our online sickness by cyber path
Healing our online sickness by cyber pathHealing our online sickness by cyber path
Healing our online sickness by cyber path
 

Viewers also liked

Social media security
Social media securitySocial media security
Social media securitySbs DB
 
Chapter 19: Unexpected Pregnancy
Chapter 19: Unexpected PregnancyChapter 19: Unexpected Pregnancy
Chapter 19: Unexpected PregnancyAlyssa Reid
 
Facebook Privacy and Security
Facebook Privacy and SecurityFacebook Privacy and Security
Facebook Privacy and SecurityAmanda McLellan
 
Privacy and Security in Multi-modal User Interface Modeling for Social Media
Privacy and Security in Multi-modal User Interface Modeling for Social MediaPrivacy and Security in Multi-modal User Interface Modeling for Social Media
Privacy and Security in Multi-modal User Interface Modeling for Social Mediamsm2011socialcom
 
Gary Miner's presentation at eComm 2008
Gary Miner's presentation at eComm 2008Gary Miner's presentation at eComm 2008
Gary Miner's presentation at eComm 2008eComm2008
 

Viewers also liked (6)

Social media security
Social media securitySocial media security
Social media security
 
Inredis And Machine Learning Nips
Inredis And Machine Learning NipsInredis And Machine Learning Nips
Inredis And Machine Learning Nips
 
Chapter 19: Unexpected Pregnancy
Chapter 19: Unexpected PregnancyChapter 19: Unexpected Pregnancy
Chapter 19: Unexpected Pregnancy
 
Facebook Privacy and Security
Facebook Privacy and SecurityFacebook Privacy and Security
Facebook Privacy and Security
 
Privacy and Security in Multi-modal User Interface Modeling for Social Media
Privacy and Security in Multi-modal User Interface Modeling for Social MediaPrivacy and Security in Multi-modal User Interface Modeling for Social Media
Privacy and Security in Multi-modal User Interface Modeling for Social Media
 
Gary Miner's presentation at eComm 2008
Gary Miner's presentation at eComm 2008Gary Miner's presentation at eComm 2008
Gary Miner's presentation at eComm 2008
 

Similar to Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY

Social networking boon or a bane
Social networking boon or a baneSocial networking boon or a bane
Social networking boon or a baneAbhishek Sharma
 
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docxRunning Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docxtodd521
 
Social Computing – The Promise And The Perils Final
Social Computing – The Promise And The Perils FinalSocial Computing – The Promise And The Perils Final
Social Computing – The Promise And The Perils FinalKannan Subbiah
 
Designing for Privacy NY Studio—10/04/21
Designing for Privacy NY Studio—10/04/21Designing for Privacy NY Studio—10/04/21
Designing for Privacy NY Studio—10/04/21Robert Stribley
 
ImageQuest_Newsletter_July_Milton copy
ImageQuest_Newsletter_July_Milton copyImageQuest_Newsletter_July_Milton copy
ImageQuest_Newsletter_July_Milton copyAlisa Alvich
 
Hum 140: Social Media: Privacy
Hum 140: Social Media: PrivacyHum 140: Social Media: Privacy
Hum 140: Social Media: PrivacyRay Brannon
 
Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy  Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy Carolina Rossini
 
1Running head CYBERPHOBIA3CYBERPHOBIA.docx
1Running head CYBERPHOBIA3CYBERPHOBIA.docx1Running head CYBERPHOBIA3CYBERPHOBIA.docx
1Running head CYBERPHOBIA3CYBERPHOBIA.docxRAJU852744
 
Ethics & Technology :Facebook
Ethics & Technology :FacebookEthics & Technology :Facebook
Ethics & Technology :Facebookrahul8793
 
Raytheon-NCSA_Millennial_Survey_report_2014
Raytheon-NCSA_Millennial_Survey_report_2014Raytheon-NCSA_Millennial_Survey_report_2014
Raytheon-NCSA_Millennial_Survey_report_2014Blair Gately
 
Cyber Awareness.pptx
Cyber Awareness.pptxCyber Awareness.pptx
Cyber Awareness.pptxadblue2017
 
Social Media Privacy
Social Media PrivacySocial Media Privacy
Social Media PrivacyLisa Turner
 
Is your data secure? privacy and trust in the social web
Is your data secure?  privacy and trust in the social webIs your data secure?  privacy and trust in the social web
Is your data secure? privacy and trust in the social webPhil Cryer
 
cybercriminals are weaponizing social media and jeopardizing privacy
cybercriminals are weaponizing social media and jeopardizing privacycybercriminals are weaponizing social media and jeopardizing privacy
cybercriminals are weaponizing social media and jeopardizing privacyRohitBisht345647
 
Social & mobile security
Social & mobile securitySocial & mobile security
Social & mobile securityErnest Staats
 

Similar to Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY (20)

Social networking boon or a bane
Social networking boon or a baneSocial networking boon or a bane
Social networking boon or a bane
 
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docxRunning Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
 
Social Computing – The Promise And The Perils Final
Social Computing – The Promise And The Perils FinalSocial Computing – The Promise And The Perils Final
Social Computing – The Promise And The Perils Final
 
Designing for Privacy NY Studio—10/04/21
Designing for Privacy NY Studio—10/04/21Designing for Privacy NY Studio—10/04/21
Designing for Privacy NY Studio—10/04/21
 
LifeLock Javelin Presentation
LifeLock Javelin PresentationLifeLock Javelin Presentation
LifeLock Javelin Presentation
 
ImageQuest_Newsletter_July_Milton copy
ImageQuest_Newsletter_July_Milton copyImageQuest_Newsletter_July_Milton copy
ImageQuest_Newsletter_July_Milton copy
 
Hum 140: Social Media: Privacy
Hum 140: Social Media: PrivacyHum 140: Social Media: Privacy
Hum 140: Social Media: Privacy
 
Facebook
FacebookFacebook
Facebook
 
Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy  Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy
 
1Running head CYBERPHOBIA3CYBERPHOBIA.docx
1Running head CYBERPHOBIA3CYBERPHOBIA.docx1Running head CYBERPHOBIA3CYBERPHOBIA.docx
1Running head CYBERPHOBIA3CYBERPHOBIA.docx
 
Ethics & Technology :Facebook
Ethics & Technology :FacebookEthics & Technology :Facebook
Ethics & Technology :Facebook
 
Raytheon-NCSA_Millennial_Survey_report_2014
Raytheon-NCSA_Millennial_Survey_report_2014Raytheon-NCSA_Millennial_Survey_report_2014
Raytheon-NCSA_Millennial_Survey_report_2014
 
Cyber Awareness.pptx
Cyber Awareness.pptxCyber Awareness.pptx
Cyber Awareness.pptx
 
Social Media Privacy
Social Media PrivacySocial Media Privacy
Social Media Privacy
 
Is your data secure? privacy and trust in the social web
Is your data secure?  privacy and trust in the social webIs your data secure?  privacy and trust in the social web
Is your data secure? privacy and trust in the social web
 
LIBRA: IS IT REALLY ABOUT MONEY? Valerie Khan
LIBRA: IS IT REALLY ABOUT MONEY? Valerie KhanLIBRA: IS IT REALLY ABOUT MONEY? Valerie Khan
LIBRA: IS IT REALLY ABOUT MONEY? Valerie Khan
 
cybercriminals are weaponizing social media and jeopardizing privacy
cybercriminals are weaponizing social media and jeopardizing privacycybercriminals are weaponizing social media and jeopardizing privacy
cybercriminals are weaponizing social media and jeopardizing privacy
 
Tot edu eng.
Tot edu eng.Tot edu eng.
Tot edu eng.
 
Digital Tattoo: for MOSAIC
Digital Tattoo: for MOSAICDigital Tattoo: for MOSAIC
Digital Tattoo: for MOSAIC
 
Social & mobile security
Social & mobile securitySocial & mobile security
Social & mobile security
 

Recently uploaded

Play hard learn harder: The Serious Business of Play
Play hard learn harder:  The Serious Business of PlayPlay hard learn harder:  The Serious Business of Play
Play hard learn harder: The Serious Business of PlayPooky Knightsmith
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17Celine George
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17Celine George
 
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lessonQUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lessonhttgc7rh9c
 
Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17Celine George
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsNbelano25
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxPooja Bhuva
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
Simple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdfSimple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdfstareducators107
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 

Recently uploaded (20)

Play hard learn harder: The Serious Business of Play
Play hard learn harder:  The Serious Business of PlayPlay hard learn harder:  The Serious Business of Play
Play hard learn harder: The Serious Business of Play
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17
 
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lessonQUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
 
VAMOS CUIDAR DO NOSSO PLANETA! .
VAMOS CUIDAR DO NOSSO PLANETA!                    .VAMOS CUIDAR DO NOSSO PLANETA!                    .
VAMOS CUIDAR DO NOSSO PLANETA! .
 
Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf arts
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Simple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdfSimple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdf
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 

Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY

  • 1. By: Monika Dari-Suru, Patience Akota Images by: Billard D. Social Media and the Future of Privacy/security.
  • 2. WHAT IS PRIVACY AND SECURITY? Image by: Dawson Jacob
  • 3. Privacy and security • Privacy is the state or condition of being free from being observed or disturbed by other people or from public attention. • Security is freedom from danger, risk, when somebody is safe Image by: memeburn
  • 4. Privacy and safety wasn’t an issue until now, when internet is growing and affecting every people on a daily basis. Image by: memeburn
  • 5. Will you have privacy and security online in the future? Image by: kersten Denise
  • 6. David Rowan (CNN, 2013), editor of technology magazine “Wired” said that “our concept our privacy is very much a 20th century idea. All that personal data you are giving to these private companies, they are making money on and they decide how it is going to be used.
  • 7. He continues “you lose control of that data.” He also added that “anybody who is using any kind of electronic device is giving up the practical ability to be untraceable.”
  • 8. http://youtu.be/uZ8d2P53N1w The following link shows us a video about how the future online privacy will be.
  • 9. Challenges and fear • Eye-tracking technology has been in the news lately, thanks to rumors indicating that it would be included in the new Samsung Galaxy S4. • Researchers note that its potential future impact on our privacy is huge. Images by: Eye tracking Inc
  • 10. • Did our eyes linger for a few seconds on an advertisement that, in the end, we decided not to click on? • How do our eyes move as they take in the contents of a page? • Are there certain words, phrases, or topics that we appear to prefer or avoid? • In the future, will we be served online ads based not only on what we’ve shopped for, but also on the thoughts reflected in our eye movements?“ Image by: Posel Susanne
  • 11. Richard Tso journalist in the following article talks about how eye-tracking technology will change the advertising game in the future. http://www.huffingtonpost.co m/richard-tso/eye-tracking- technologies_b_3457397.html
  • 12. Challenges and fear cont’ Once the technology for eye-tracking is in place, it will glean information conveying not only what we read online, but also how we read it," writes UCLA electrical engineering professor John Villasenor. Image by: Eye tracking Inc.
  • 13. Challenges and fear cont’ In the future, will we be served online ads based not only on what we’ve shopped for, but also on the thoughts reflected in our eye movements?"
  • 14. Consequences Tracking and collecting data on our eye movements could reveal a lot about us, such as whether a person has an alcohol abuse problem or cognitive disorder, and even information on our intelligence and sexual orientation.
  • 15. Hackers & Cyber bullying Images by: I’m Every Woman
  • 16. Unfortunately criminals have found the way to exploit the beneficial aspects of the internet. • Child predators use the anonymity of the internet to prey on children • Terrorist can use the internet to communicate other team members
  • 17. •Hackers use the internet to get information about other people • Cyber bullying nowadays can ruin people’s life as the torment, threat, harassment, humiliation does not stop but keep going at night and on the weekends too. Images by: Kirschenbaum Daniel
  • 18. Hackers & Cyber bullying cont’ As per as Andrew Keen, who is a privacy advocate said “the future will be characterized by reputation wars where will be increasingly defined by our digital reputations” (Vox Media, 2013). Hackers are a huge threat against personal privacy , and in the future, no one but the wealthy and powerful will be able to afford anonymity (Vox Media, 2013).
  • 19. Bullying caused so many young person to commit suicide. This video by Denzel Washington shows how bullying can lead to suicide. http://www.youtube.com/watch?v=tWKsMagy4Ls
  • 20. Connections to people The Internet is not only a place to be connected with people, It's also a place for people or companies to pick up even more information about you. That includes your address, gender, date of birth and, with a little sleuthing, your Social Security number and credit history. Image by: Lara Gallaway
  • 21. . Then there's all the data you pour into social media sites such as Facebook, Twitter, Tumblr, Instagram, Foursquare and others. Now employers can fire workers for expressing opinions they don’t like, strangers can stalk you with mobile apps and college administrators can judge the quality of applicants by the number of drinking photos posted to their account.
  • 22. Openness data sharing: medical information
  • 23. Health care system must have the capacity to learn and adapt to keep information in the future safe but accessible. Under the 1996 Health Insurance Portability and Accountability Act (HIPAA), the Department of Health and Human Services developed a set of federal standards to protect privacy of individuals health record (IMRVSHC, 2010). Openness data sharing: medical information cont’
  • 24. Openness data sharing: medical information cont’ But would that work in the future? Do we create data or evidence? Although this subject still facing numerous challenges, the fundamental tension must be navigated between adoption and interoperability.
  • 25. Public relation and privacy When real estate search site Zillow (http://www.zillow.com/) first came out, many people were shocked at the amount of information on it including their physical address, aerial house photos and the price paid for their homes. All the information comes from public records.
  • 26. Public relations and privacy cont’ Other sites, such as Arrests.org, list mug shots by state. And some local police departments are now posting photos of recent arrests on Facebook. Now with the Internet and databases, public records are easy to distribute and see.
  • 27. Be aware There’s nothing you can do in the electronic world that your boss can’t find and you can’t be fired for”, said Lewis Maltby, president of National Workrights Institute. “
  • 28. Your future in peril! People’s futures are in peril every time their boss or college admissions office looks on the Internet. That means users shouldn’t post photos of themselves with an alcoholic drink in their hand or espouse political views, because it can lead to a value judgment.
  • 29. Quote “You can still go online and say what you want, but you’re crazy if you do.” Maltby Lewis. Image by: Lara Gallaway
  • 30. Loosing privacy Another problem today is that social networks becoming a larger part of one’s life. To comment on articles, people log into a Facebook or twitter account first. Others are finding that their Google+ social account is being attached to their Gmail account and will be needed to comment on apps or games on Google Play. Google+ accounts are also used to sign into YouTube and other Google sites. Many social networks are trying to end anonymous posting.
  • 31. Quote “To preserve privacy, a person would have to walk away from Google or Facebook. “It’s a trade- off to some extent.” Adi Kamdar
  • 32. Whatever you place online stays online Users can save themselves some headaches by understanding that whatever they place online will stay online. Nothing online is temporary; instead, it's more like an Internet tattoo. Martinson’s online (and likely late- night) outburst will follow her throughout college and possibly the workforce, according to CNN.
  • 33. Your posting is not private Remember that what you post can be seen by others. Be careful of what you say and which photos are posted because it could potentially be seen by millions of people. • Image by Stephens Lisa
  • 35. As a new grad, You’ve already worked hard during your college career and accomplished a lot, but you may also be facing bleak employment prospects. In a tough economy, employers can afford to be more selective about hiring new talent than ever. That means it’s not just your educational success, your experience, or even your confidence and charisma under scrutiny. When reviewing your resume and references, don’t be surprised if prospective employers take a virtual stroll through your Facebook profile too.
  • 36. Take Control of Your Online Reputation • Find out what is on the Internet about you • Evaluate your online reputation • Protect your online reputation • Polish your professional reputation • Restore your online reputation More information on Microsoft safety and security http://www.microsoft.com/security/online- privacy/reputation.aspx
  • 37. Conclusion Privacy concerns regarding the internet are very important in our fast growing society. Secrecy and privacy are often conflated. All the data on people are being collected is gradually building a permanent profile on that person. Neutrality deals with access to the internet, but identity deals with the nature how the internet itself works.
  • 38. References Billard David (2012). Convenience vs. security. Cyberhood watch. Retrieved from: http://thecyberhoodwatch.com/cyber-security/convenience-security-security-privacy- cispa-copa-pipa-internet/ Source for the image used in this project. http://memeburn.com/2011/05/tech-titans-grilled-by-us-lawmakers-on-online-privacy/ CNN. (2013). Will we care about online privacy in 20 years? Retrieved from http://www.cnn.com/2013/04/09/tech/privacy-outdated-digital-age This article talks about the debate over online privacy in the future that the launch of Facebook brought into light. Dawson Jacob (2012). How to keep your online privacy safe. ComputerHowToGuide.com retrieved from: http://www.computerhowtoguide.com/2012/06/how-to-keep-your- online-privacy- Source for the image used in this project Emspak Jesse (2013). How Facebook Home Undermines Your Security. Tech News Daily. Retrieved from: http://www.technewsdaily.com/17794-facebook-home-security- privacy.html This article talks about how the “Facebook Home app”, can undermine the security o your privacy by allowing the home screen of an Android phone change from the usual lockscreen or picture to a stream of updates from your Facebook friends called Cover Feed. Thus, it disables the lockscreen on the HTC, even if a PIN passcode is enabled. Eye Tracking Inc. (2011).What is eye tracking? Retrieved from: http://www.eyetracking.com/About-
  • 39. References cont’ • Franceschi-Bicchierai Lorenzo (2013). Is eye tracking a privacy-invading technology? Mashable. Retrieved from: http://mashable.com/2013/05/8/eye-tracking-technology-privacy/ T This article talks about the new eye tracking technology and how this technology would have a great impact on our privacy because of its ability to glean information conveying not only what we read online, but also how we read it. • Frierson William (2013). Don’t let social media stand in the way of getting your dream job. Retrieved from: http://www.collegerecruiter.com/blog/2013/07/24/dont-let-social-media-stand-in-the-way of-getting-your- dream-job/ This article talks about the significant of building and maintaining a good online reputation for a new grad and how the new grads can successfully do this especially for the purpose of landing their dream job. • Hernandez E. Barbara (2013). What Does the Internet Know About You? TechNewsDaily. Retrieved from: http://mashable.com/2013/04/30/what-internet-knows-about-you/ This article talks about how other people can track, search and use the information you put with examples of situation where it has occurred. • I’m Every Woman (2012). What I’ve Learned About: Hacking and Bullies on Facebook http://i2ameverywoman.wordpress.com/2010/04/22/what-ive-learned-about-spamming-bullies-on-facebook/ Source for the image used in this project • Kersten Denise (2009). Feel Like Someone's Watching? You're Probably Right. HRPeople. Retrieved from: http://hrpeople.monster.com/news/articles/2322-feel-like-someones-watching-youre-probably-right Source for the image used in this project • Kirschenbaum Daniel (2013). Computer-hacker. Flash Routers. Retrieved from: http://www.flashrouters.com/blog/2013/04/24/your-router-is-not-secure-how-flashrouters-can-help/computer- hacker/ Source for the image used in this project
  • 40. References cont’ • Institute of Medicine (US) Roundtable on Value & Science-Driven Health Care. (IMRVSHC). (2010). Clinical Data as the Basic Staple of the Learning Health System. Retrieved from http://www.ncbi.nlm.nih.gov /books/NBK54306/ This article talks about the importance of having health care information accessible for health care workers, but at the same time there is a privacy issue. The health care system has shifted from paper based to web based, but we have to see how this is protecting the individual’s privacy. There are different laws that protect privacy and confidentiality, but it is not fully implemented and we don’t know that if it will be working in the future. • Lara Galloway (2012). Tips for social media success. Mom Biz Coach. Retrieved from: http://mombizcoach.com/social-media-success#.UfhqZY3D_IW Source for the image used in this project • Lisa Stephens (2011). Survey: IT professionals fear social media use at work may pose threat. Technorati. Retrieved from: http://technorati.com/business/advertising/article/survey-it-professionals-fear-social- media/ Source for the image used in this project • Microsoft (2013). Take charge of your online reputation. Safety and Security Center. Retrieved from: http://www.microsoft.com/security/online- privacy/reputation.aspx This came from Microsoft safety and security center, advising people on how to maintain their privacy and secure their information online.
  • 41. References cont’ • Posel Susanne (2012).Blue eyes originated 10,000 years ago in the black sea region. Occupy Corporatism. Retrieved from: http://www.occupycorporatism.com/blue-eyes- originated-10000-years-ago-in-the-black-sea-region/ Source for the image used in this project • Tso Richard. ( ). How Eye-tracking Technologies Will Change the Advertising Game. Retrieved from http://www.huffingtonpost.com/richard-tso/eye-tracking- technologies_b_3457397.html • Vox Media. (2013). Hacking the future: Cole Stryker on why identity is the web’s next battleground. Retrieved from http://www.theverge.com/2012/9/14/3329752/ hacking-the-future-cole-stryker-interview In this article Cole Stryker talks about his new book, Hacking the Future: Privacy, Identity, and Anonymity on the Web, and talks about how identity is perspective, but also is a huge concern when it comes to the internet. • YouTube. (2013). When bullying leads to suicide: RIP Cade Parker this tribute is for you  Retrieved from http://www.youtube.com/watch?v=tWKsMagy4Ls Source for the image used in this project