SlideShare a Scribd company logo
Privacy 

and Your Digital
Footprint"
By Stephanie Sellan"
In order to protect ourselves from corporations
and privacy loss, we must take responsibility to
minimize the amount of personal information
(i.e., our digital footprint) that is available online.
Digital Footprint
“The record of your interactions with the digital world and
how the data that is left behind can be exploited.”
What Data Is Being Used?
Explicit Data
§ Information that is provided intentionally
with no analysis but could
yield implicit data
§  Information provided in surveys
§  Registration forms
§  Membership applications
How often do
you provide
explicit data?
Implicit Data
§  Information that is not provided intentionally but
gathered from available data streams and analyzed
§  IP address
§  Behaviour on a website:
§  Page lingering
§  Shopping cart
items
§  Purchased items
§  Clickstreams
Where Is The
Data Being
Taken From?
How much
information do
you provide
about yourself?
Teen users:
§  91% post a photo of
themselves
§  71% post their school name
§  71% post the city/town where
they live
§  53% post their email address
§  20% post their cell phone
number
Facebook Profile
Image from Stephanie Sellan’s profile
Who influences you
and who do you
influence?
“64% of teens with
Twitter accounts
say that their tweets
are public”
Twitter Profile
Image from Stephanie Sellan’s profile
Who are your
connections on your
personal profile?
How much of
your profile have
you made
public?
LinkedIn Profile
Image from Stephanie Sellan’s profile
Have you
ever
Googled
yourself?
All interactions
with content online
and with social
media is stored,
analyzed, and
valued.
How Is The Data
Being Used?
“All of those photos [taken with
your smartphone] have specific
digital fingerprints, which
reveal where they were taken,
when they were taken and how
they traveled online” - CNN
Image by Stephanie Sellan
Stores are using their Wifi network to track customers'
smartphones and create a heatmap of their movements and
how long they stayed in each section of the store. - CNN
Tracking Through Wifi
Web tracking
Cookies track your
browsing habits & store
sensitive information
that has been previously
entered.
Why Is The Data
Being Used?
Facebook is tracking users' behaviour to better
advertise to them…choosing to "like" allows researchers to
extrapolate far more intimate details about you, such as
political leanings and religion. - CNN
“Twitter is allowing [leading
advertising firm] WPP to
analyze Twitter data to set up
a way to better monitor
real-time consumer
behaviour.” - CNN
Problems
§ Loss of data
ownership and
privacy
§ Explicit and
implicit data form
a unique profile
§ Data breaches
§ Digital tracking
Solutions To Protect Your
Privacy & Reduce Your
Digital Footprint
§ Investigate privacy settings on all social media platforms
§ Remove yourself from tagged photos
§ Do not share your birthday, home address, phone number,
or location on social networking sites
§ Opt out of data-tracking settings
§ Avoid using public, unsecure wifi
§ Delete cookies often
“86% of adult internet users have taken steps to avoid
surveillance by other people or organizations when they
were using the internet…
…and 68% say current privacy protection
laws are not good enough.” - PewResearch
What happens
online,
stays online.
Quote Sources
•  http://www.linkedin.com/today/post/article/20131111183317-110300724-digital-footprints-
the-journey-from-business-intelligence-to-analytics
•  http://www.mydigitalfootprint.com/p/defining-digital-footprint.html
•  http://whatis.techtarget.com/definition/explicit-data
•  http://whatis.techtarget.com/definition/implicit-data
•  http://www.pewinternet.org/2013/05/21/teens-social-media-and-privacy/
•  http://www.cnn.com/2013/06/13/living/buzzfeed-data-mining/
•  http://en.wikipedia.org/wiki/HTTP_cookie
•  http://globalnews.ca/news/1109644/your-digital-footprint-steps-to-personal-data-privacy/
•  http://www.pewinternet.org/2013/09/05/anonymity-privacy-and-security-online-2/
Image Sources
•  Digital Footprint. https://www.flickr.com/photos/alpha_auer/5068482201/sizes/m/in/photostream/
•  World Flight Paths by James Cheshire. http://spatial.ly/2013/05/great-world-flight-paths-map/
•  Dilbert Comic. http://2.bp.blogspot.com/-qddjAhKk7aQ/U0UgKVzh0TI/AAAAAAAAApw/gzrAdxH5fpk/s1600/
image001-744639.png
•  World Wide Web. http://upload.wikimedia.org/wikipedia/commons/7/75/Internet1.jpg
•  Online Shopping. http://commons.wikimedia.org/wiki/File:Online_Shopping_with_Touchscreen_Ultrabook.jpg
•  Facebook Icon. http://commons.wikimedia.org/wiki/File:Facebook_logo_(square).png
•  Instagram Icon. https://www.flickr.com/photos/jccchou/7111260505/sizes/o/in/photostream/
•  Twitter Icon. https://www.flickr.com/photos/kooroshication/9093733888/
•  YouTube Logo. http://commons.wikimedia.org/wiki/File:YouTube-logo-seit-Dezember-2013.png
•  Amazon Logo. http://upload.wikimedia.org/wikipedia/commons/thumb/6/62/Amazon.com-Logo.svg/500px-Amazon.com-
Logo.svg.png
•  Tumblr Icon. http://commons.wikimedia.org/wiki/File:Tumblr_Logo.svg
•  Pinterest Icon. http://upload.wikimedia.org/wikipedia/commons/thumb/3/35/Pinterest_Logo.svg/500px-
Pinterest_Logo.svg.png
•  LinkedIn Icon. http://commons.wikimedia.org/wiki/File:LinkedIn_logo_initials.png
Image Sources
•  Social Connectedness. http://www.cosmosmagazine.com/news/studies-show-health-benefits-social-connectedness/
•  Interactions. http://datablog.is.ed.ac.uk/files/2013/12/bitsissue8_low_spreads-3.png
•  Fingerprint. http://commons.wikimedia.org/wiki/File:Fingerprint_picture.svg
•  Wifi Icon made by SimpleIcon from Flaticon.com
•  Heatmap (66% Colour Saturation). https://www.flickr.com/photos/stevefaeembra/3674760067/
•  Big Data. http://www.themarketingbit.com/wp-content/uploads/2012/11/big-data-image.jpg
•  Mining. http://upload.wikimedia.org/wikipedia/commons/c/c9/Coal_mining.jpg
•  Big Data. http://www.greenbookblog.org/2012/03/21/big-data-opportunity-or-threat-for-market-research/
•  Plugs. https://www.flickr.com/photos/beraldoleal/8681750288/sizes/m/in/photostream/
•  Cameras. http://upload.wikimedia.org/wikipedia/commons/9/98/
Überwachungskameras_Autohof_in_Thüringen_an_A9_03.06.2013_10-07-08.JPG Surveillance Camera
•  Privacy. https://www.flickr.com/photos/opensourceway/4638981545/sizes/m/in/photostream/ Privacy
•  Servers. https://www.flickr.com/photos/beraldoleal/8681752576/sizes/m/in/photostream/

More Related Content

What's hot

Chapter 12: Computer Mediated Communicationcmc
Chapter 12: Computer Mediated CommunicationcmcChapter 12: Computer Mediated Communicationcmc
Chapter 12: Computer Mediated CommunicationcmcRay Brannon
 
Information & Intent: Optimizing Content and the User Search Experience
Information & Intent: Optimizing Content and the User Search ExperienceInformation & Intent: Optimizing Content and the User Search Experience
Information & Intent: Optimizing Content and the User Search ExperienceJonathan Mendez
 
Facebook data breach
Facebook data breachFacebook data breach
Facebook data breach
Green Gyaanam
 
Web Search Training 2
Web Search Training 2Web Search Training 2
Web Search Training 2gwasny
 
Chapter 7: New and Mobile Media Technologies Innovations and Investments
Chapter 7: New and Mobile Media Technologies Innovations and InvestmentsChapter 7: New and Mobile Media Technologies Innovations and Investments
Chapter 7: New and Mobile Media Technologies Innovations and Investments
Shamiha Shaikh
 
Case Analysis Presentation On Facebook Data Breach
Case Analysis Presentation On Facebook Data BreachCase Analysis Presentation On Facebook Data Breach
Case Analysis Presentation On Facebook Data Breach
Siddhesh Shah
 
MIMA Summit Social Marketing 101 presentation
MIMA Summit Social Marketing 101 presentationMIMA Summit Social Marketing 101 presentation
MIMA Summit Social Marketing 101 presentation
Nathan Wright
 
Facebook Scandal
Facebook ScandalFacebook Scandal
Facebook Scandal
SB Solutions
 
Raytheon-NCSA_Millennial_Survey_report_2014
Raytheon-NCSA_Millennial_Survey_report_2014Raytheon-NCSA_Millennial_Survey_report_2014
Raytheon-NCSA_Millennial_Survey_report_2014Blair Gately
 
Bakir talk leuven dec2019 2
Bakir talk leuven dec2019 2Bakir talk leuven dec2019 2
Bakir talk leuven dec2019 2
Vian Bakir
 
Cambridge Analytica as a Prime Example of the Manipulation of Democratic Deci...
Cambridge Analytica as a Prime Example of the Manipulation of Democratic Deci...Cambridge Analytica as a Prime Example of the Manipulation of Democratic Deci...
Cambridge Analytica as a Prime Example of the Manipulation of Democratic Deci...
Anna Vollmer
 
Facebook & Cambridge Data Analytica Scandal
Facebook & Cambridge Data Analytica ScandalFacebook & Cambridge Data Analytica Scandal
Facebook & Cambridge Data Analytica Scandal
Mohit Mahajan
 
DeCA Tier One Training for Senior Leadership
DeCA Tier One Training for Senior Leadership DeCA Tier One Training for Senior Leadership
DeCA Tier One Training for Senior Leadership
Eric Schwartzman
 
Jbouse EM Comms Big Data Laptop v AACRAO Webinar 150402v1 online v
Jbouse EM Comms Big Data Laptop v AACRAO Webinar 150402v1 online vJbouse EM Comms Big Data Laptop v AACRAO Webinar 150402v1 online v
Jbouse EM Comms Big Data Laptop v AACRAO Webinar 150402v1 online vJim Bouse
 
Facebook and cambridge analytica scandal
Facebook and cambridge analytica scandalFacebook and cambridge analytica scandal
Facebook and cambridge analytica scandal
SajibHossain17
 
Roundtable: Social Media Users' Privacy Expectations & the Ethics of Using Th...
Roundtable: Social Media Users' Privacy Expectations & the Ethics of Using Th...Roundtable: Social Media Users' Privacy Expectations & the Ethics of Using Th...
Roundtable: Social Media Users' Privacy Expectations & the Ethics of Using Th...
Toronto Metropolitan University
 
Why oversharing on Social Media is bad...for everyone
Why oversharing on Social Media is bad...for everyoneWhy oversharing on Social Media is bad...for everyone
Why oversharing on Social Media is bad...for everyone
Prayukth K V
 
Ryan ziemba marketing consulting deck
Ryan ziemba   marketing consulting deckRyan ziemba   marketing consulting deck
Ryan ziemba marketing consulting deck
Cuttime, Inc.
 

What's hot (20)

Chapter 12: Computer Mediated Communicationcmc
Chapter 12: Computer Mediated CommunicationcmcChapter 12: Computer Mediated Communicationcmc
Chapter 12: Computer Mediated Communicationcmc
 
Information & Intent: Optimizing Content and the User Search Experience
Information & Intent: Optimizing Content and the User Search ExperienceInformation & Intent: Optimizing Content and the User Search Experience
Information & Intent: Optimizing Content and the User Search Experience
 
Facebook data breach
Facebook data breachFacebook data breach
Facebook data breach
 
Phoenix Lincoln Property Company
Phoenix Lincoln Property CompanyPhoenix Lincoln Property Company
Phoenix Lincoln Property Company
 
Web Search Training 2
Web Search Training 2Web Search Training 2
Web Search Training 2
 
Chapter 7: New and Mobile Media Technologies Innovations and Investments
Chapter 7: New and Mobile Media Technologies Innovations and InvestmentsChapter 7: New and Mobile Media Technologies Innovations and Investments
Chapter 7: New and Mobile Media Technologies Innovations and Investments
 
Case Analysis Presentation On Facebook Data Breach
Case Analysis Presentation On Facebook Data BreachCase Analysis Presentation On Facebook Data Breach
Case Analysis Presentation On Facebook Data Breach
 
MIMA Summit Social Marketing 101 presentation
MIMA Summit Social Marketing 101 presentationMIMA Summit Social Marketing 101 presentation
MIMA Summit Social Marketing 101 presentation
 
Facebook Scandal
Facebook ScandalFacebook Scandal
Facebook Scandal
 
Raytheon-NCSA_Millennial_Survey_report_2014
Raytheon-NCSA_Millennial_Survey_report_2014Raytheon-NCSA_Millennial_Survey_report_2014
Raytheon-NCSA_Millennial_Survey_report_2014
 
Bakir talk leuven dec2019 2
Bakir talk leuven dec2019 2Bakir talk leuven dec2019 2
Bakir talk leuven dec2019 2
 
Cambridge Analytica as a Prime Example of the Manipulation of Democratic Deci...
Cambridge Analytica as a Prime Example of the Manipulation of Democratic Deci...Cambridge Analytica as a Prime Example of the Manipulation of Democratic Deci...
Cambridge Analytica as a Prime Example of the Manipulation of Democratic Deci...
 
Facebook & Cambridge Data Analytica Scandal
Facebook & Cambridge Data Analytica ScandalFacebook & Cambridge Data Analytica Scandal
Facebook & Cambridge Data Analytica Scandal
 
Michael Davey
Michael DaveyMichael Davey
Michael Davey
 
DeCA Tier One Training for Senior Leadership
DeCA Tier One Training for Senior Leadership DeCA Tier One Training for Senior Leadership
DeCA Tier One Training for Senior Leadership
 
Jbouse EM Comms Big Data Laptop v AACRAO Webinar 150402v1 online v
Jbouse EM Comms Big Data Laptop v AACRAO Webinar 150402v1 online vJbouse EM Comms Big Data Laptop v AACRAO Webinar 150402v1 online v
Jbouse EM Comms Big Data Laptop v AACRAO Webinar 150402v1 online v
 
Facebook and cambridge analytica scandal
Facebook and cambridge analytica scandalFacebook and cambridge analytica scandal
Facebook and cambridge analytica scandal
 
Roundtable: Social Media Users' Privacy Expectations & the Ethics of Using Th...
Roundtable: Social Media Users' Privacy Expectations & the Ethics of Using Th...Roundtable: Social Media Users' Privacy Expectations & the Ethics of Using Th...
Roundtable: Social Media Users' Privacy Expectations & the Ethics of Using Th...
 
Why oversharing on Social Media is bad...for everyone
Why oversharing on Social Media is bad...for everyoneWhy oversharing on Social Media is bad...for everyone
Why oversharing on Social Media is bad...for everyone
 
Ryan ziemba marketing consulting deck
Ryan ziemba   marketing consulting deckRyan ziemba   marketing consulting deck
Ryan ziemba marketing consulting deck
 

Similar to Privacy and Your Digital Footprint

Pod camp boston 2011 locking up yourself online
Pod camp boston 2011 locking up yourself onlinePod camp boston 2011 locking up yourself online
Pod camp boston 2011 locking up yourself onlineLane Sutton
 
Cyber Awareness.pptx
Cyber Awareness.pptxCyber Awareness.pptx
Cyber Awareness.pptx
adblue2017
 
Free geek class on Data privacy
Free geek class on Data privacyFree geek class on Data privacy
Free geek class on Data privacy
Joshua Johnston
 
None of Your Beeswax: Attitudes Towards Privacy
None of Your Beeswax: Attitudes Towards PrivacyNone of Your Beeswax: Attitudes Towards Privacy
None of Your Beeswax: Attitudes Towards Privacy
Jenny Wanger
 
Privacy in the Digital Age
Privacy in the Digital AgePrivacy in the Digital Age
Privacy in the Digital Age
Pew Research Center
 
Networked Privacy in the Age of Surveillance, Sousveillance, Coveillance
Networked Privacy in the Age of Surveillance, Sousveillance, CoveillanceNetworked Privacy in the Age of Surveillance, Sousveillance, Coveillance
Networked Privacy in the Age of Surveillance, Sousveillance, Coveillance
Pew Research Center's Internet & American Life Project
 
Grabbing Online Technology Faith Based
Grabbing Online Technology Faith BasedGrabbing Online Technology Faith Based
Grabbing Online Technology Faith BasedPam Dechert
 
My Online Image
My Online ImageMy Online Image
My Online Imagealuthe
 
Bridgewater College Cyber Security Presentation
Bridgewater College Cyber Security PresentationBridgewater College Cyber Security Presentation
Bridgewater College Cyber Security Presentation
Tom Huskerson
 
Digital Footprint
Digital Footprint  Digital Footprint
Digital Footprint
Dr. Michael England
 
CSUN - Youth Driven Information Privacy Education Campaign
CSUN - Youth Driven Information Privacy Education CampaignCSUN - Youth Driven Information Privacy Education Campaign
CSUN - Youth Driven Information Privacy Education Campaign
Kimberly Gonzalez
 
Digital footprints& datamining
Digital footprints& dataminingDigital footprints& datamining
Digital footprints& datamining
Paige Jaeger
 
How Tracking Your Personal Data Really Adds Up | SoGoSurvey
How Tracking Your Personal Data Really Adds Up | SoGoSurveyHow Tracking Your Personal Data Really Adds Up | SoGoSurvey
How Tracking Your Personal Data Really Adds Up | SoGoSurvey
Sogolytics
 
Cate's Tulsa Presentation
Cate's Tulsa PresentationCate's Tulsa Presentation
Cate's Tulsa PresentationeTapestryCate
 
Cate's Feb 24th Internet Strategies Webinar
Cate's Feb 24th Internet Strategies WebinarCate's Feb 24th Internet Strategies Webinar
Cate's Feb 24th Internet Strategies WebinareTapestryCate
 
Social Network Privacy, Security and Identity:One
Social Network Privacy, Security and Identity:OneSocial Network Privacy, Security and Identity:One
Social Network Privacy, Security and Identity:One
Inflection Point Global
 
Why private search is important for everone and how you can protect your pers...
Why private search is important for everone and how you can protect your pers...Why private search is important for everone and how you can protect your pers...
Why private search is important for everone and how you can protect your pers...
Kelly Finnerty
 
Why private search is important for everone and how you can protect your pers...
Why private search is important for everone and how you can protect your pers...Why private search is important for everone and how you can protect your pers...
Why private search is important for everone and how you can protect your pers...
Kelly Finnerty
 
Privacy on the Internet
Privacy on the InternetPrivacy on the Internet
Privacy on the Internet
Phil Bradley
 

Similar to Privacy and Your Digital Footprint (20)

Pod camp boston 2011 locking up yourself online
Pod camp boston 2011 locking up yourself onlinePod camp boston 2011 locking up yourself online
Pod camp boston 2011 locking up yourself online
 
Cyber Awareness.pptx
Cyber Awareness.pptxCyber Awareness.pptx
Cyber Awareness.pptx
 
Free geek class on Data privacy
Free geek class on Data privacyFree geek class on Data privacy
Free geek class on Data privacy
 
None of Your Beeswax: Attitudes Towards Privacy
None of Your Beeswax: Attitudes Towards PrivacyNone of Your Beeswax: Attitudes Towards Privacy
None of Your Beeswax: Attitudes Towards Privacy
 
Privacy in the Digital Age
Privacy in the Digital AgePrivacy in the Digital Age
Privacy in the Digital Age
 
Networked Privacy in the Age of Surveillance, Sousveillance, Coveillance
Networked Privacy in the Age of Surveillance, Sousveillance, CoveillanceNetworked Privacy in the Age of Surveillance, Sousveillance, Coveillance
Networked Privacy in the Age of Surveillance, Sousveillance, Coveillance
 
Grabbing Online Technology Faith Based
Grabbing Online Technology Faith BasedGrabbing Online Technology Faith Based
Grabbing Online Technology Faith Based
 
My Online Image
My Online ImageMy Online Image
My Online Image
 
Bridgewater College Cyber Security Presentation
Bridgewater College Cyber Security PresentationBridgewater College Cyber Security Presentation
Bridgewater College Cyber Security Presentation
 
Digital Footprint
Digital Footprint  Digital Footprint
Digital Footprint
 
CSUN - Youth Driven Information Privacy Education Campaign
CSUN - Youth Driven Information Privacy Education CampaignCSUN - Youth Driven Information Privacy Education Campaign
CSUN - Youth Driven Information Privacy Education Campaign
 
Online Reputation
Online ReputationOnline Reputation
Online Reputation
 
Digital footprints& datamining
Digital footprints& dataminingDigital footprints& datamining
Digital footprints& datamining
 
How Tracking Your Personal Data Really Adds Up | SoGoSurvey
How Tracking Your Personal Data Really Adds Up | SoGoSurveyHow Tracking Your Personal Data Really Adds Up | SoGoSurvey
How Tracking Your Personal Data Really Adds Up | SoGoSurvey
 
Cate's Tulsa Presentation
Cate's Tulsa PresentationCate's Tulsa Presentation
Cate's Tulsa Presentation
 
Cate's Feb 24th Internet Strategies Webinar
Cate's Feb 24th Internet Strategies WebinarCate's Feb 24th Internet Strategies Webinar
Cate's Feb 24th Internet Strategies Webinar
 
Social Network Privacy, Security and Identity:One
Social Network Privacy, Security and Identity:OneSocial Network Privacy, Security and Identity:One
Social Network Privacy, Security and Identity:One
 
Why private search is important for everone and how you can protect your pers...
Why private search is important for everone and how you can protect your pers...Why private search is important for everone and how you can protect your pers...
Why private search is important for everone and how you can protect your pers...
 
Why private search is important for everone and how you can protect your pers...
Why private search is important for everone and how you can protect your pers...Why private search is important for everone and how you can protect your pers...
Why private search is important for everone and how you can protect your pers...
 
Privacy on the Internet
Privacy on the InternetPrivacy on the Internet
Privacy on the Internet
 

Recently uploaded

みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 

Recently uploaded (20)

みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 

Privacy and Your Digital Footprint

  • 1. Privacy 
 and Your Digital Footprint" By Stephanie Sellan"
  • 2. In order to protect ourselves from corporations and privacy loss, we must take responsibility to minimize the amount of personal information (i.e., our digital footprint) that is available online.
  • 3. Digital Footprint “The record of your interactions with the digital world and how the data that is left behind can be exploited.”
  • 4. What Data Is Being Used?
  • 5. Explicit Data § Information that is provided intentionally with no analysis but could yield implicit data §  Information provided in surveys §  Registration forms §  Membership applications How often do you provide explicit data?
  • 6. Implicit Data §  Information that is not provided intentionally but gathered from available data streams and analyzed §  IP address §  Behaviour on a website: §  Page lingering §  Shopping cart items §  Purchased items §  Clickstreams
  • 7. Where Is The Data Being Taken From?
  • 8. How much information do you provide about yourself? Teen users: §  91% post a photo of themselves §  71% post their school name §  71% post the city/town where they live §  53% post their email address §  20% post their cell phone number Facebook Profile Image from Stephanie Sellan’s profile
  • 9. Who influences you and who do you influence? “64% of teens with Twitter accounts say that their tweets are public” Twitter Profile Image from Stephanie Sellan’s profile
  • 10. Who are your connections on your personal profile? How much of your profile have you made public? LinkedIn Profile Image from Stephanie Sellan’s profile
  • 12. All interactions with content online and with social media is stored, analyzed, and valued.
  • 13. How Is The Data Being Used? “All of those photos [taken with your smartphone] have specific digital fingerprints, which reveal where they were taken, when they were taken and how they traveled online” - CNN Image by Stephanie Sellan
  • 14. Stores are using their Wifi network to track customers' smartphones and create a heatmap of their movements and how long they stayed in each section of the store. - CNN Tracking Through Wifi
  • 15. Web tracking Cookies track your browsing habits & store sensitive information that has been previously entered.
  • 16. Why Is The Data Being Used? Facebook is tracking users' behaviour to better advertise to them…choosing to "like" allows researchers to extrapolate far more intimate details about you, such as political leanings and religion. - CNN “Twitter is allowing [leading advertising firm] WPP to analyze Twitter data to set up a way to better monitor real-time consumer behaviour.” - CNN
  • 17. Problems § Loss of data ownership and privacy § Explicit and implicit data form a unique profile § Data breaches § Digital tracking
  • 18. Solutions To Protect Your Privacy & Reduce Your Digital Footprint § Investigate privacy settings on all social media platforms § Remove yourself from tagged photos § Do not share your birthday, home address, phone number, or location on social networking sites § Opt out of data-tracking settings § Avoid using public, unsecure wifi § Delete cookies often
  • 19. “86% of adult internet users have taken steps to avoid surveillance by other people or organizations when they were using the internet… …and 68% say current privacy protection laws are not good enough.” - PewResearch
  • 21. Quote Sources •  http://www.linkedin.com/today/post/article/20131111183317-110300724-digital-footprints- the-journey-from-business-intelligence-to-analytics •  http://www.mydigitalfootprint.com/p/defining-digital-footprint.html •  http://whatis.techtarget.com/definition/explicit-data •  http://whatis.techtarget.com/definition/implicit-data •  http://www.pewinternet.org/2013/05/21/teens-social-media-and-privacy/ •  http://www.cnn.com/2013/06/13/living/buzzfeed-data-mining/ •  http://en.wikipedia.org/wiki/HTTP_cookie •  http://globalnews.ca/news/1109644/your-digital-footprint-steps-to-personal-data-privacy/ •  http://www.pewinternet.org/2013/09/05/anonymity-privacy-and-security-online-2/
  • 22. Image Sources •  Digital Footprint. https://www.flickr.com/photos/alpha_auer/5068482201/sizes/m/in/photostream/ •  World Flight Paths by James Cheshire. http://spatial.ly/2013/05/great-world-flight-paths-map/ •  Dilbert Comic. http://2.bp.blogspot.com/-qddjAhKk7aQ/U0UgKVzh0TI/AAAAAAAAApw/gzrAdxH5fpk/s1600/ image001-744639.png •  World Wide Web. http://upload.wikimedia.org/wikipedia/commons/7/75/Internet1.jpg •  Online Shopping. http://commons.wikimedia.org/wiki/File:Online_Shopping_with_Touchscreen_Ultrabook.jpg •  Facebook Icon. http://commons.wikimedia.org/wiki/File:Facebook_logo_(square).png •  Instagram Icon. https://www.flickr.com/photos/jccchou/7111260505/sizes/o/in/photostream/ •  Twitter Icon. https://www.flickr.com/photos/kooroshication/9093733888/ •  YouTube Logo. http://commons.wikimedia.org/wiki/File:YouTube-logo-seit-Dezember-2013.png •  Amazon Logo. http://upload.wikimedia.org/wikipedia/commons/thumb/6/62/Amazon.com-Logo.svg/500px-Amazon.com- Logo.svg.png •  Tumblr Icon. http://commons.wikimedia.org/wiki/File:Tumblr_Logo.svg •  Pinterest Icon. http://upload.wikimedia.org/wikipedia/commons/thumb/3/35/Pinterest_Logo.svg/500px- Pinterest_Logo.svg.png •  LinkedIn Icon. http://commons.wikimedia.org/wiki/File:LinkedIn_logo_initials.png
  • 23. Image Sources •  Social Connectedness. http://www.cosmosmagazine.com/news/studies-show-health-benefits-social-connectedness/ •  Interactions. http://datablog.is.ed.ac.uk/files/2013/12/bitsissue8_low_spreads-3.png •  Fingerprint. http://commons.wikimedia.org/wiki/File:Fingerprint_picture.svg •  Wifi Icon made by SimpleIcon from Flaticon.com •  Heatmap (66% Colour Saturation). https://www.flickr.com/photos/stevefaeembra/3674760067/ •  Big Data. http://www.themarketingbit.com/wp-content/uploads/2012/11/big-data-image.jpg •  Mining. http://upload.wikimedia.org/wikipedia/commons/c/c9/Coal_mining.jpg •  Big Data. http://www.greenbookblog.org/2012/03/21/big-data-opportunity-or-threat-for-market-research/ •  Plugs. https://www.flickr.com/photos/beraldoleal/8681750288/sizes/m/in/photostream/ •  Cameras. http://upload.wikimedia.org/wikipedia/commons/9/98/ Überwachungskameras_Autohof_in_Thüringen_an_A9_03.06.2013_10-07-08.JPG Surveillance Camera •  Privacy. https://www.flickr.com/photos/opensourceway/4638981545/sizes/m/in/photostream/ Privacy •  Servers. https://www.flickr.com/photos/beraldoleal/8681752576/sizes/m/in/photostream/