Discover the hard facts and real risks of identity theft from Javelin Strategy & Research. Here we share the 2012 Identity Fraud Report findings that reveal the new fraud frontier of social media and mobile—and why even the most sophisticated technology users are vulnerable. See how individuals and businesses can protect personal information from identity theft while interacting online, and learn more at http://www.LifeLockBusinessSolutions.com.
More and more frequently I need to explain to people the concept of Social Media Intelligence (SOCMINT).
This is a simple slidedeck to introduce people the new concept and its value in digital marketing and strategy and what is the power behind it.
Age Verification / “Doing the Right Thing”IDology, Inc
http://www.idology.com/about-idology/about-idology/ | The most important thing to know about us is to understand what we do. IDology, Inc provides real-time technology solutions that verify an individual’s identity and age for anyone conducting business online or in a customer-not-present environment. What makes us different is that we do this in a way that builds more confidence with your customers – byprotecting sensitive data and promoting consumer privacy.
Discover the hard facts and real risks of identity theft from Javelin Strategy & Research. Here we share the 2012 Identity Fraud Report findings that reveal the new fraud frontier of social media and mobile—and why even the most sophisticated technology users are vulnerable. See how individuals and businesses can protect personal information from identity theft while interacting online, and learn more at http://www.LifeLockBusinessSolutions.com.
More and more frequently I need to explain to people the concept of Social Media Intelligence (SOCMINT).
This is a simple slidedeck to introduce people the new concept and its value in digital marketing and strategy and what is the power behind it.
Age Verification / “Doing the Right Thing”IDology, Inc
http://www.idology.com/about-idology/about-idology/ | The most important thing to know about us is to understand what we do. IDology, Inc provides real-time technology solutions that verify an individual’s identity and age for anyone conducting business online or in a customer-not-present environment. What makes us different is that we do this in a way that builds more confidence with your customers – byprotecting sensitive data and promoting consumer privacy.
Facebook has been blamed for data breech of India users before presidential in 2016 in US. Cambridge Analytica had harvested on the stolen data to analyze the election based on user messages. Here solution on how Facebook can avoid such situations in future has been stated.
Case Analysis Presentation On Facebook Data BreachSiddhesh Shah
This case is basically all about Facebook data breach which was done through Cambridge Analytica Company, and allegation was charged on the Facebook company because this data breached was said to influence the US President Election.
MIMA Summit Social Marketing 101 presentationNathan Wright
Social Marketing 101 presentation given by Greg Swan of Weber Shandwick and Nathan T. Wright of Lava Row at the 2009 MIMA Summit in Minneapolis, Minnesota.
This presentation is about Facebook Scandal. It covers it's overview, timeline, Key names in Facebook Scandal and why it is needed to know such news and facts. To make such presentations for a reasonably cheaper price, please visit https://sbsolnlimited.wixsite.com/busnedu/bookings-checkout/hire-designer-for-powerpoint-slides
Cambridge Analytica as a Prime Example of the Manipulation of Democratic Deci...Anna Vollmer
In 2018 the now defunct big data analytics and political consulting firm Cambridge Analytica – which had been involved in the Trump presidential as well as the Brexit campaign – rose to international prominence after it was revealed that they had harvested millions of Facebook users’ data without their consent to subsequently target voters with highly personalized ads. As more and more political parties across the globe are employing big data tools to reach and influence potential or undecided voters, it is crucial that citizens are made aware of the practices of mass data collection and online political microtargeting, and how these two phenomena can render them vulnerable to manipulation. By taking a closer look at the key figures behind the Cambridge Analytica scandal and the company’s strategies, this presentation aims to illustrate how the combined misuse of big data and big money could be threatening democracy. Lastly, it proposes ideas as to how democracy can be safeguarded in the Digital Age from the governmental to the individual level.
Understand the fundamentals of the use of social media for retail sales, marketing and customer service in this briefing on the different functions, features and benefits of digital communications for business.
Attendees will learn:
• How other grocery chains are using social media
• Formulas for improving existing business processes
• Crisis prevention and risk management strategies
• Role of keyword and search engine optimization
Join us for this fast-paced session and learn why social media has become a mainstream communications channel for Millennials and Boomers.
Lots of data are used here from different perception. It may conflict with different issues. This file is used only study purposes. No claim will be accepted regarding authenticity and legal claim issue.
Roundtable at the 2018 AoIR conference.
Anatoliy Gruzd, Jenna Jacobson, Ryerson University, Canada
Jacquelyn Burkell, Western University
Joanne McNeish, Ryerson University
Anabel Quan-Haase, Western University
Abstract
The transnational flows of information across nations and borders make it difficult to introduce and implement privacy-preserving policies relating to social media data. Social media data are a rich source of behavioural data that can reveal how we connect and interact with each other online in real time. Furthermore, the materiality of new digital intermediaries (such as the Internet of Things, AI, and algorithms) raises additional anticipated and unanticipated privacy challenges that need to be addressed as we continue to speed towards an increasingly digitally-mediated future.
A by-product of the large-scale social media adoption is social media data mining; publicly available social media data is largely free and legally available to be mined, analyzed, and used (Kennedy 2016) for whatever purposes by third parties. Researchers have begun to suggest that ethics need to be considered even if the data is public (boyd & Crawford 2012).
In the wake of the EU's recent legislation of the General Data Protection Regulation and the Right to be Forgotten, as well as increasing critical attention around the world, the roundtable will discuss how to navigate the transnational and material, as well as the complex and competing, interests associated with using social media, including ethics, privacy, security, and intellectual property rights. By balancing people's individual rights to exercise autonomy over "their" data and the societal benefits of using and analyzing the data for insights, the roundtable aims to generate theoretically-rich discussion and debate with internet researchers about the ethics, privacy, and best practices of using social media data.
Facebook has been blamed for data breech of India users before presidential in 2016 in US. Cambridge Analytica had harvested on the stolen data to analyze the election based on user messages. Here solution on how Facebook can avoid such situations in future has been stated.
Case Analysis Presentation On Facebook Data BreachSiddhesh Shah
This case is basically all about Facebook data breach which was done through Cambridge Analytica Company, and allegation was charged on the Facebook company because this data breached was said to influence the US President Election.
MIMA Summit Social Marketing 101 presentationNathan Wright
Social Marketing 101 presentation given by Greg Swan of Weber Shandwick and Nathan T. Wright of Lava Row at the 2009 MIMA Summit in Minneapolis, Minnesota.
This presentation is about Facebook Scandal. It covers it's overview, timeline, Key names in Facebook Scandal and why it is needed to know such news and facts. To make such presentations for a reasonably cheaper price, please visit https://sbsolnlimited.wixsite.com/busnedu/bookings-checkout/hire-designer-for-powerpoint-slides
Cambridge Analytica as a Prime Example of the Manipulation of Democratic Deci...Anna Vollmer
In 2018 the now defunct big data analytics and political consulting firm Cambridge Analytica – which had been involved in the Trump presidential as well as the Brexit campaign – rose to international prominence after it was revealed that they had harvested millions of Facebook users’ data without their consent to subsequently target voters with highly personalized ads. As more and more political parties across the globe are employing big data tools to reach and influence potential or undecided voters, it is crucial that citizens are made aware of the practices of mass data collection and online political microtargeting, and how these two phenomena can render them vulnerable to manipulation. By taking a closer look at the key figures behind the Cambridge Analytica scandal and the company’s strategies, this presentation aims to illustrate how the combined misuse of big data and big money could be threatening democracy. Lastly, it proposes ideas as to how democracy can be safeguarded in the Digital Age from the governmental to the individual level.
Understand the fundamentals of the use of social media for retail sales, marketing and customer service in this briefing on the different functions, features and benefits of digital communications for business.
Attendees will learn:
• How other grocery chains are using social media
• Formulas for improving existing business processes
• Crisis prevention and risk management strategies
• Role of keyword and search engine optimization
Join us for this fast-paced session and learn why social media has become a mainstream communications channel for Millennials and Boomers.
Lots of data are used here from different perception. It may conflict with different issues. This file is used only study purposes. No claim will be accepted regarding authenticity and legal claim issue.
Roundtable at the 2018 AoIR conference.
Anatoliy Gruzd, Jenna Jacobson, Ryerson University, Canada
Jacquelyn Burkell, Western University
Joanne McNeish, Ryerson University
Anabel Quan-Haase, Western University
Abstract
The transnational flows of information across nations and borders make it difficult to introduce and implement privacy-preserving policies relating to social media data. Social media data are a rich source of behavioural data that can reveal how we connect and interact with each other online in real time. Furthermore, the materiality of new digital intermediaries (such as the Internet of Things, AI, and algorithms) raises additional anticipated and unanticipated privacy challenges that need to be addressed as we continue to speed towards an increasingly digitally-mediated future.
A by-product of the large-scale social media adoption is social media data mining; publicly available social media data is largely free and legally available to be mined, analyzed, and used (Kennedy 2016) for whatever purposes by third parties. Researchers have begun to suggest that ethics need to be considered even if the data is public (boyd & Crawford 2012).
In the wake of the EU's recent legislation of the General Data Protection Regulation and the Right to be Forgotten, as well as increasing critical attention around the world, the roundtable will discuss how to navigate the transnational and material, as well as the complex and competing, interests associated with using social media, including ethics, privacy, security, and intellectual property rights. By balancing people's individual rights to exercise autonomy over "their" data and the societal benefits of using and analyzing the data for insights, the roundtable aims to generate theoretically-rich discussion and debate with internet researchers about the ethics, privacy, and best practices of using social media data.
None of Your Beeswax: Attitudes Towards PrivacyJenny Wanger
Vote: bit.ly/privacy_attitudes
In a world where nobody reads privacy policies and IoT is creating a need for customers to constantly track who is monitoring them, companies need to be clear with users about the choices they’re making by sharing data. Privacy policies should be designed for trust, both in terms of content and UX.
This session covers the results of a 6-month design research project, including the key insights about how people think of their privacy and why, then delves into some prototypes that encourage greater understanding and acceptance of privacy policies. Imagine a future where everyone fully understands how their data is going to be used and agrees to share it as a result.
SXSW Panel Picker 2017
Lee Rainie, Director, Internet, Science and Technology from the Pew Research Center to delivered a keynote address at WAN-IFRA’s first World Media Policy Forum. Rainie is one of the world’s top academic researchers on the internet and the social changes triggered by information and communication technologies (ICT.) He talked about what research is showing us about privacy strategies and statistics.
Personal privacy in the networked age is limited by three dimensions of “veillance.” They shape people’s behavior and their anxieties about the future of privacy. Lee Rainie will present the latest survey findings from the Pew Research Center about how people try to navigate this new environment in their relationship with government, commercial enterprises, and each other. He will also discuss how some technologists are trying to respond.
Bridgewater College Cyber Security PresentationTom Huskerson
A presentation that informs students of the efforts being put forth by major technology companies to collect student data and why they are doing it. The presentation also provides methods and practices for students to protect and control their data and prevent identity theft.
CSUN - Youth Driven Information Privacy Education CampaignKimberly Gonzalez
The goal of this project was to develop an educational social media marketing campaigns designed to educate middle school youth on the complex issue of digital literacy and responsible online behavior.
You Can Run, But You Can't Hide! - How far should the government regulate the Internet? -Has data mining gone too far? (Great secondary research project.) Digital footprint makeover handouts available at: digitalmakeover.wikispaces.com Find ideas for classroom instruction, also, on this wikispace.
This presentation was a breakout session at WLMA14 and has been updated to reflect recent revelations on medical information mining. We did not even get to discuss the EDUCATIONAL DATA MINING that is occurring on our students and children! Caveat!
How Tracking Your Personal Data Really Adds Up | SoGoSurveySogolytics
The way your phone and computer know everything about you -- convenient or creepy? Keep track of the data you're giving away, because you can believe there are plenty of others tracking everything they can find out about you...
Social Network Privacy, Security and Reputation Management.
What are the threats on social networks?
How can you help your customers manage their online identity?
Why private search is important for everone and how you can protect your pers...Kelly Finnerty
Startpage, the world’s most private search engine, is helping educate students on data privacy and protection with our Private Search 101 university lesson plan.
Are you a student or professor interested in learning more about how to protect your privacy online? Learn more with our accessible, informative Private Search 101 university lesson plan.
Why private search is important for everone and how you can protect your pers...Kelly Finnerty
Startpage, the world’s most private search engine, is helping educate students on data privacy and protection with our Private Search 101 university lesson plan.
Are you a student or professor interested in learning more about how to protect your privacy online? Learn more with our accessible, informative Private Search 101 university lesson plan.
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
2. In order to protect ourselves from corporations
and privacy loss, we must take responsibility to
minimize the amount of personal information
(i.e., our digital footprint) that is available online.
3. Digital Footprint
“The record of your interactions with the digital world and
how the data that is left behind can be exploited.”
5. Explicit Data
§ Information that is provided intentionally
with no analysis but could
yield implicit data
§ Information provided in surveys
§ Registration forms
§ Membership applications
How often do
you provide
explicit data?
6. Implicit Data
§ Information that is not provided intentionally but
gathered from available data streams and analyzed
§ IP address
§ Behaviour on a website:
§ Page lingering
§ Shopping cart
items
§ Purchased items
§ Clickstreams
8. How much
information do
you provide
about yourself?
Teen users:
§ 91% post a photo of
themselves
§ 71% post their school name
§ 71% post the city/town where
they live
§ 53% post their email address
§ 20% post their cell phone
number
Facebook Profile
Image from Stephanie Sellan’s profile
9. Who influences you
and who do you
influence?
“64% of teens with
Twitter accounts
say that their tweets
are public”
Twitter Profile
Image from Stephanie Sellan’s profile
10. Who are your
connections on your
personal profile?
How much of
your profile have
you made
public?
LinkedIn Profile
Image from Stephanie Sellan’s profile
13. How Is The Data
Being Used?
“All of those photos [taken with
your smartphone] have specific
digital fingerprints, which
reveal where they were taken,
when they were taken and how
they traveled online” - CNN
Image by Stephanie Sellan
14. Stores are using their Wifi network to track customers'
smartphones and create a heatmap of their movements and
how long they stayed in each section of the store. - CNN
Tracking Through Wifi
15. Web tracking
Cookies track your
browsing habits & store
sensitive information
that has been previously
entered.
16. Why Is The Data
Being Used?
Facebook is tracking users' behaviour to better
advertise to them…choosing to "like" allows researchers to
extrapolate far more intimate details about you, such as
political leanings and religion. - CNN
“Twitter is allowing [leading
advertising firm] WPP to
analyze Twitter data to set up
a way to better monitor
real-time consumer
behaviour.” - CNN
18. Solutions To Protect Your
Privacy & Reduce Your
Digital Footprint
§ Investigate privacy settings on all social media platforms
§ Remove yourself from tagged photos
§ Do not share your birthday, home address, phone number,
or location on social networking sites
§ Opt out of data-tracking settings
§ Avoid using public, unsecure wifi
§ Delete cookies often
19. “86% of adult internet users have taken steps to avoid
surveillance by other people or organizations when they
were using the internet…
…and 68% say current privacy protection
laws are not good enough.” - PewResearch