This flip book is about privacy and the internet. It brings to light some of the areas we need to be aware of and things we can do to protect ourselves online. I was inspired by a quote by Edward Snowden.
Social media, surveillance and censorshiplilianedwards
Talk delivered at European University Florence, March 2012. Did the Aran spring really prove that social media enables the flowering of democracy or are social media in fact easy venues for blanket state surveillance? Can they be arenas for free speech when platforms likeTwitter are refining their censorship policies to avoid legal risk?
Government 2.0: architecting for collaborationTara Hunt
Unfortunately, the video won't embed this way. :( And it makes it soooo awesome. So, here is where to find them:
1. The Day of the Longtail By Michael Markman, Peter Hirshberg, Bob Kalsey; Produced for The Computer History Museum
http://www.youtube.com/watch?v=7xAA71Ssids
2. What the Heck is BarCamp? by Ryanne Hodson & Jay Dedman
http://ryanedit.blogspot.com/2006/06/barcampsf.html
3. Transit Camp on CityTV
http://www.youtube.com/watch?v=PDkEPvIwarI
In my opinion, this is what is wrong with Internet today. Anonymity seemed like a great idea when the Internet was first created, but quickly, this privilege was abused. Many people and groups use the Internet to mislead consumers, lure children into joining terrorist groups, or scam your parents and friends out of money with enticing email campaigns.
Ryerson’s Privacy and Big Data Institute's inaugural seminar on Privacy by Design (PbD), the revolutionary privacy framework created by Dr. Ann Cavoukian which was unanimously passed as an international privacy standard in 2010 (translated into 37 languages). Dr. Cavoukian is now the Executive Director of the Privacy and Big Data Institute at Ryerson, and formerly served as the Information and Privacy Commissioner of Ontario for three terms. Dr. Cavoukian gave a presentation on Privacy by Design and its application to big data analytics, followed by a Q&A session.
How to become the best datascientist in EuropeDigitYser
How to become the best datascientist in Europe.
How to boost your datascience skills.
Ho to recruit the most promissing young graduates.
How a company can boost its digital transformation effort.
How to become data driven.
Join the data science bootcamp starting mid September 2016 - prepare during the summer camp for coders.
Social media, surveillance and censorshiplilianedwards
Talk delivered at European University Florence, March 2012. Did the Aran spring really prove that social media enables the flowering of democracy or are social media in fact easy venues for blanket state surveillance? Can they be arenas for free speech when platforms likeTwitter are refining their censorship policies to avoid legal risk?
Government 2.0: architecting for collaborationTara Hunt
Unfortunately, the video won't embed this way. :( And it makes it soooo awesome. So, here is where to find them:
1. The Day of the Longtail By Michael Markman, Peter Hirshberg, Bob Kalsey; Produced for The Computer History Museum
http://www.youtube.com/watch?v=7xAA71Ssids
2. What the Heck is BarCamp? by Ryanne Hodson & Jay Dedman
http://ryanedit.blogspot.com/2006/06/barcampsf.html
3. Transit Camp on CityTV
http://www.youtube.com/watch?v=PDkEPvIwarI
In my opinion, this is what is wrong with Internet today. Anonymity seemed like a great idea when the Internet was first created, but quickly, this privilege was abused. Many people and groups use the Internet to mislead consumers, lure children into joining terrorist groups, or scam your parents and friends out of money with enticing email campaigns.
Ryerson’s Privacy and Big Data Institute's inaugural seminar on Privacy by Design (PbD), the revolutionary privacy framework created by Dr. Ann Cavoukian which was unanimously passed as an international privacy standard in 2010 (translated into 37 languages). Dr. Cavoukian is now the Executive Director of the Privacy and Big Data Institute at Ryerson, and formerly served as the Information and Privacy Commissioner of Ontario for three terms. Dr. Cavoukian gave a presentation on Privacy by Design and its application to big data analytics, followed by a Q&A session.
How to become the best datascientist in EuropeDigitYser
How to become the best datascientist in Europe.
How to boost your datascience skills.
Ho to recruit the most promissing young graduates.
How a company can boost its digital transformation effort.
How to become data driven.
Join the data science bootcamp starting mid September 2016 - prepare during the summer camp for coders.
Privacy Intro voor SETUP Utrecht's "16.8 miljoen Nederlanders in één verjaard...Ann Wuyts
Korte privacy introductie gegeven op Medialab SETUP's '16.8 miljoen cadeausuggesties' hackathon/sprint:
"Hoe moeilijk is het om een database van alle Nederlanders te bouwen? Medialab SETUP onderzoekt de kansen en risico's van big data en bouwt De Nationale Verjaardagskalender; een database met de verjaardagen van alle 16.8 miljoen Nederlanders. Inclusief cadeausuggesties voor iedereen, op basis van ieders persoonlijke interesses. Zodat jouw cadeau altijd in de smaak valt!"
Meer info hierover op http://setup.nl/content/168-miljoen-cadeausuggesties-sprint
For Apps for Antwerp, we've decided we'd look into the littering problem, and how we could use the garbage bin dataset to make keeping the city clean as effortless and fun as possible. In short, our app is marketing for rubbish bins.
Little did we know that a team that formed spontaneously on the spot, would manage to sweep away a 'Concept' price. Yeey for us! ;)
Team members:
Farah Okka - okkafarah@hotmail.com
Ann Wuyts - @vintfalken
Stijn Willems - @doozmen
Claes Buckwalter - @claesbuckwalter
Severi Ally Steven - allyseveri@gmail.com
Thomas Leterme - @jixop
Dear Marketers, How Badly Do You Know Me!Ann Wuyts
Marketers do not understand consumers' concerns regarding consent. As it comes to data privacy and opt in to receiving marketing communications, marketers underestimate by up to 100% all our areas of concern. However, they also underestimate our willingness to (re)opt-in to some of their lists - if there's value in return, of course.
(tldr summary of 'Marketers underestimate our trust issues' at http://www.keek.be/2014/marketers-underestimate-our-trust-issues/ )
Social Media as targeting marketing tool in a Privacy-sensitive digital ageLuisella Giani
Presentation held in New York City at the Business of Privacy Summit in January 2015. How to use social media to offer an engaging and personalised content without invading users privacy? How millenials consider privacy? and baby boomers? Gen Z? How to target the different groups? Campaigns best practises.
IAPP Data Protection Intensive London - Transparency in Marketing (AP part III)Aurélie Pols
https://privacyassociation.org/conference/iapp-europe-data-protection-intensive-2015/
Just how transparent should organisations be with their customers in communicating the personal data use behind their sophisticated marketing plans? Before making tough decisions, companies must be transparent with themselves.
Webit Global Congress - Leaders of the Future Summit - Privacy and Data Prote...Aurélie Pols
Data is a risk because it exists, whether you hold it internally or upload it to the Cloud through a SaaS access.
Between Privacy, Compliance and Security, what do you need to know?
Natuurlijk kan je nooit genoeg over privacy weten, maar als ik - momenteel - 9 dingen moet uitkiezen:
1. Aangifteplicht
2. Vrijstelling klantencommunicatie
3. Verantwoordelijkheden verantwoordelijke van de verwerking
4. Wat een digitale handtekening is
5. Een icon set voor de gestandaardiseerde privacy mededeling?
6. Je werkgever mag niet (zomaar) in je mail snuffelen
7. Bewaartermijnen hou je best zo kort mogelijk
8. Beveilig ook alle persoonlijke 'devices'
9. Verplichting tot informeren & sensibiliseren personeel
Designing dashboards for a Sense of ControlAnn Wuyts
What makes dashboards so appealing to the human mind? We love dashboards because they help us establish a sense of control.
Good dashboard design offers this sense of control in three ways: it gives us a clear understanding of the current situation, the resources to predict and plan for the future, and it helps us complete critical tasks in time.
These, and the 'context' and work routine in which a dashboard will get used, are things not to loose sight of when working on dashboard functionality, UI and UX.
( This slideshow is a summary from the article on Dashboards & creating a Sense of Control at http://www.keek.be/2014/designing-dashboards-for-a-sense-of-control/ )
2015 06 18 datascienc meetup privacy - update - philippe van impeDigitYser
Our mission is to educate, inspire and empower scholars and professionals to apply data sciences to address humanity’s grand challenges.
We are the fastest growing community of data scientists in Europe.
We love doing Data4Good.
We promote the value of analytics and organise events, hands-on sessions and trainings to close the gap between academics and business.
Join us if you want to share, learn and have fun with analytical & technological innovation & positive social change.
Privacy by Designer* is a talk about the importance of Privacy for UX, and what practical things we as designers can do that benefit user privacy and UX. From using metaphors to make PETs more understandable, to clearly summarising that too-long-to-read policy legal is urging you to throw at the users.
Presented at php.ghent (<->, which is an approach to embedding pro-active privacy protection into business and technical specifications.)
Update on Data Science in Belgium @datasciencebe by Philippe Van Impe DigitYser
Our mission is to educate, inspire and empower scholars and professionals to apply data sciences to address humanity’s grand challenges.
We are the fastest growing community of data scientists in Europe.
We love doing Data4Good.
We promote the value of analytics and organise events, hands-on sessions and trainings to close the gap between academics and business.
Join us if you want to share, learn and have fun with analytical & technological innovation & positive social change.
Our members all want to contribute with their professional skills to make a positive impact on our local community or in the world, they are all aware that data based decision making is key to boost the performances of our organisations. We are an open community and everybody with an interest in data and business is welcome. Our members are University professors, managers in public or private organisations, leaders of NGO’s, Phd students, analytic consultants, technical bigdata experts …
A discussion of FIDO’s approach to privacy. Explore the history of "privacy by design" and what this means in terms of secure authentication.
The FIDO Alliance invites you to learn how simplify strong authentication for web services. FIDO specifications can help all organizations, especially service providers who want to scale these features for consumer services over the web. Essentially, FIDO offers a simple, low-cost way to improve security and the online experience.
From FIDO Alliance Seminar in Washington, D.C., October, 2015.
presentation given at the ISACA EuroCACS 2015 conference in Copenhagen on why organisations should apply Privacy by Design in their Internet of Everything solutions.
A Framework of Purpose and Consent for Data Security and Consumer PrivacyAurélie Pols
Introducing a basic Privacy framework of purpose and consent, this presentation continues with exploring data minimization opportunities and related internal procedures to assure this framework is respected and aligned with global regulation.
Arguing that in light of increased data collection, the very notion of PII or personal information is more than a blurry concept and that de-identification of data is not as easy as it is suggested to be, the conversation should evolve towards the particular context within which data is being used.
The question to ask then becomes “what risk does an individual face if her data is used in a particular way?”
Borrowing from Spanish information security best practices and in the light of increasing data breach regulations, the presentation examines how data flows should ideally be defined and secured in order to assure accountability through an entire data lifecycle.
Such a lifecycles must also include evolving legislative minimal and maximum data retention periods after which action needs to be taken, either through anonymization of collected and used data or through its thorough deletion.
Last but not least, data transits through multiple systems, hosted within multiple environments, ranging from internal and national to international cloud based solutions. Each actor of this data chain has a role to play and responsibility to abide by in order to assure compliance and mitigate risk.
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...Trivadis
In Big Data we focus on the 4 V's: Volume, Velocity, Varity and Veracity. But another important topic is often not in the focus: Privacy and Security. Yet as important and if not considered from the beginning it might put your Big Data project at risk. Learn about most important Privacy and Security fundamentals in Big Data, you should take into account in your next Big Data project.
Internet Privacy Essay
Internet Privacy Essays
Internet Privacy
Essay On Internet Privacy
Internet and Personal Privacy Essay
Essay on Internet Privacy
Internet Privacy Essay
Internet Privacy.
Internet Privacy Essay
Internet Privacy Analysis
With thousands of sessions, a packed exhibit hall floor, hundreds of party and networking opportunities, and dozens of ancillary activities, this year’s SXSW Interactive, which took place March 7-11 in Austin, Texas, was a place ripe for curiosity and exploration. To paraphrase one panelist: SXSW is a living, breathing manifestation of the Internet and culture.
This report highlights 10 overriding themes from the 21st annual festival, based on on-the-ground reporting, input from JWT and Digitaria colleagues in attendance and secondary research.
CSUN - Youth Driven Information Privacy Education CampaignKimberly Gonzalez
The goal of this project was to develop an educational social media marketing campaigns designed to educate middle school youth on the complex issue of digital literacy and responsible online behavior.
1Running head CYBERPHOBIA3CYBERPHOBIA.docxRAJU852744
1
Running head: CYBERPHOBIA
3
CYBERPHOBIA
Cyberphobia
Cyberphobia by Edward Lucas is one of the books that perfectly suits readers of the 21st century. The 21st century can be considered as an era of technology. The information found these sources helps individuals to make informed choices. It is common to see people browsing the internet while sharing personal information on various websites. However, this habit exposes them to cyber terrorists that may dangerously use the data. In his book, Edward Lucas sheds light on essential issues such as identity theft, security, trust and the way they related to the internet. Even though none of the information in the book is new, most of the people tend to ignore it, and it has hard drastic effects in this era of the internet.
In the contemporary world, almost everyone especially students are compelled to use the internet as their primary source for research. This is because the internet has made it easier by providing any information we need at our fingertips. But people fail to ask how the internet is managing to do this. However, Edward Lucas suggests that if some thought is put into why and how the internet exists, it might dawn onto us that the internet may not be the best tool for us. It is only after putting in much thought we would understand the threat that comes with the internet. With the internet comes issues of security, trust, and identity theft, however, human beings of the 21st century have become very lazy to notice such matters.
Security over the internet has been an issue from the onset of technology. Even though the internet might seem to be safe because of the use of security checks as well as passwords, the information shared over it is not as private as we may believe since it can be accessed by anyone who knows the right buttons to press. As long as an individual understands to work his or her way around the internet, he or she can access our so-called private information without leaving a trace. The lack of privacy over the internet is a threat that not only affects individuals but also affects nations. Spies from other countries can easily access information from our nation through the use of the internet. Once the sensitive information is in the hands of wrong people things might turn from bad to worse. The primary reason as to why security, as well as the confidentiality of people and state information, has not been kept secret is because the internet was only made to serve people and not their security.
Lucas explains in detail that the inventor of the internet did not make it clear that the information found or shared on the internet is not entirely private. However, we got it wrong that information on the internet is not secure because of predators and cyber terrorists. The internet was not meant to be secure but only as a source of information. Therefore, keeping the information on the internet as secure as we wish is very hard. However, Lu.
The digital divide in the post-Snowden eraIan Clark
This presentation seeks to explore the digital divide in the light of the revelations by Edward Snowden in 2013. It looks at state and corporate surveillance, the impact of these upon individual citizens with respect to the democratic process, the tools with which individuals can protect themselves, the impact of the digital divide upon the ability of the individual to ensure their intellectual privacy and what libraries and librarians are doing to bridge this particular aspect of the digital divide.
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docxtodd521
Running Head: SOCIAL NETWORKS DATA PRIVACY POLICIES 1
Social networking data privacy policies
Information Governance
Summer 2020
Ali, S., Islam, N., Rauf, A., Din, I. U., Guizani, M., & Rodriguez, J. P. (2018). Privacy and Security Issues in Online Social Networks
Social media are networks used for communication between data owners and viewers in virtual communities. The world has hence become a small global village; as a result, accordingly, information is shared seamlessly regardless of the geographical distance between people. There are, therefore, numerous social networks such as Facebook, LinkedIn, and Twitter, just to name a few, and with the help of the internet, people can link and communicate in real-time. When connecting with people from mobile devices, there is data that could be retrieved, indicating the location information and metadata embedded in the machines. Malicious users can hence retrieve this information and leverage it against other users.
The author makes it clear that with the new technology, presently, there is a lot more information available with the growth of online virtual communication platforms. Virtual networking platforms have changed the way people interact. People are always on their mobile devices browsing through social media sites, which is progressively attracting hackers and other cybercriminals. Due to this high usage, there are serious data security and privacy threats are facing social media users. The author is affirmative that the majority of the users are always sharing a lot of their personal information online, putting them at significant risks of the numerous methods of attacks.
This article is rather informative as the author is rather vocal about the reasons why people are continually being targeted by cybercriminals and made victims of attacks. It, therefore, clear on specific policies and strategies which one may implement to prevent them from falling victim to cyberattacks. One should refrain from sharing too much information on social networks, using real names when creating online profiles, and accepting friend requests from suspiciously looking accounts. Social network users must be keen and take the time to read the privacy statement before agreeing to the network's terms and conditions when creating reports.
Sarikakis, K., & Winter, L. (2017). Social Media Users’ Legal Consciousness About Privacy. Social Media + Society
Social network sites are on the upward trajectory, and they are still continuously growing with every mobile user in the world having been connected to an average of more that one social network. Social networks are mainly common among young adults aged between 18 years and 29 years. Users are becoming more comfortable sharing most of their personal details, which significantly challenges the social norm of privacy. The social model has hence become somewhat obsolete. According to the Electronic Frontier Foundation (EFF), which is a non-profit or.
Gen Z and the marketplaces - let's translate their needsLaura Szabó
The product workshop focused on exploring the requirements of Generation Z in relation to marketplace dynamics. We delved into their specific needs, examined the specifics in their shopping preferences, and analyzed their preferred methods for accessing information and making purchases within a marketplace. Through the study of real-life cases , we tried to gain valuable insights into enhancing the marketplace experience for Generation Z.
The workshop was held on the DMA Conference in Vienna June 2024.
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBrad Spiegel Macon GA
Brad Spiegel Macon GA’s journey exemplifies the profound impact that one individual can have on their community. Through his unwavering dedication to digital inclusion, he’s not only bridging the gap in Macon but also setting an example for others to follow.
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfFlorence Consulting
Quattordicesimo Meetup di Milano, tenutosi a Milano il 23 Maggio 2024 dalle ore 17:00 alle ore 18:30 in presenza e da remoto.
Abbiamo parlato di come Axpo Italia S.p.A. ha ridotto il technical debt migrando le proprie APIs da Mule 3.9 a Mule 4.4 passando anche da on-premises a CloudHub 1.0.
Instagram has become one of the most popular social media platforms, allowing people to share photos, videos, and stories with their followers. Sometimes, though, you might want to view someone's story without them knowing.
Understanding User Behavior with Google Analytics.pdfSEO Article Boost
Unlocking the full potential of Google Analytics is crucial for understanding and optimizing your website’s performance. This guide dives deep into the essential aspects of Google Analytics, from analyzing traffic sources to understanding user demographics and tracking user engagement.
Traffic Sources Analysis:
Discover where your website traffic originates. By examining the Acquisition section, you can identify whether visitors come from organic search, paid campaigns, direct visits, social media, or referral links. This knowledge helps in refining marketing strategies and optimizing resource allocation.
User Demographics Insights:
Gain a comprehensive view of your audience by exploring demographic data in the Audience section. Understand age, gender, and interests to tailor your marketing strategies effectively. Leverage this information to create personalized content and improve user engagement and conversion rates.
Tracking User Engagement:
Learn how to measure user interaction with your site through key metrics like bounce rate, average session duration, and pages per session. Enhance user experience by analyzing engagement metrics and implementing strategies to keep visitors engaged.
Conversion Rate Optimization:
Understand the importance of conversion rates and how to track them using Google Analytics. Set up Goals, analyze conversion funnels, segment your audience, and employ A/B testing to optimize your website for higher conversions. Utilize ecommerce tracking and multi-channel funnels for a detailed view of your sales performance and marketing channel contributions.
Custom Reports and Dashboards:
Create custom reports and dashboards to visualize and interpret data relevant to your business goals. Use advanced filters, segments, and visualization options to gain deeper insights. Incorporate custom dimensions and metrics for tailored data analysis. Integrate external data sources to enrich your analytics and make well-informed decisions.
This guide is designed to help you harness the power of Google Analytics for making data-driven decisions that enhance website performance and achieve your digital marketing objectives. Whether you are looking to improve SEO, refine your social media strategy, or boost conversion rates, understanding and utilizing Google Analytics is essential for your success.
2. “ rguing that you don’t
care about the right
to because
you have nothing to hide is
no different than saying
you don’t care about free
speech because you have
nothing to say.”1
Edward Snowden, 2015
Image by Jared Rodriques, Truthout 1
3. The quote by Edward Snowden regarding
privacy highlights the fact that people seem
to be willing to on the internet
for more access and services without really
understanding the consequences and scope
of the privacy they are trading away.
4. Image by Ann Wuyts Five Data Privacy Principles from Mozilla (Put on a museum wall) 2014 2
5.
6. “Whenever you sign up for a
Facebook account, Facebook
asks permission to look at your
e-mail contacts if you’re on a
computer , or your phone
contacts if you’re on a
smartphone. When you grant
the site permission, it searches
your contacts for users already
on the network, and it searches
other users’ uploaded contacts
for you.” (Caitlin Dewey)4
Image by P T. Privacy 3
7. Do you think before
you
“…dismissed the
suggestion that
some passengers
might find the
practice overly
intrusive,
arguing that
social media was
by definition a
public
medium.”15
“Qantas had seen
and “liked” the
image
(passengers),
sharing it with
the airline’s more
than 26,000
Instagram
followers.”
Image by KC
8. “As children develop greater
independence, they need privacy in
order to have genuine relationships
with their parents.”
(Kay Mathiesen 2013) 3
Image by Summer Skyes 11. OMG lkr Lol 4
9. “If you are using Shopkick at
a store with iBeacon, it also
knows where you are in a
store, where you linger, and
what products you are
interested in. Are the perks
Shopkick offers worth the
privacy trade-off?” 17
Image by Fouquier The Big Yellow 5
10. “The combination of,
“non-personal information” that Shopkick and many
other services collect—is unique for about 87 percent
of U.S. residents. That means if an app has this data, it
usually has that you can be 17
”
17
11. Large
organizations
have not done a
great job
the public
when gathering
personal data.
Issues like identity
theft,
compromised
data and
government
spying is a cause
for concern. 18
Image by KC
12. “Sir John Sawers is the incoming head
of MI6, essentially the British
equivalent of the CIA. His wife posted
sensitive personal information to her
Facebook page, including the address
of the couple's London apartment
and the locations of their children and
Sir John's parents. Her Facebook
profile was left open to anyone in the
London network.”7
Image by Jim Linwood. The MI6 Building,
Vauxhall, London 6
13. Is your Internet of things vulnerable to Cyber
Attacks?
“Security experts are sounding the alarm. "There is a big
difference between the internet of things and other security
issues," says Joshua Corman of I Am The Cavalry, a group of
security specialists trying to promote greater awareness of
emerging risks to public safety. "If my PC is hit by a cyber-
attack, it is a nuisance; if my car is attacked, it could kill me.“16
Image by Pascal. Fridgenlight 7
14. “Even the most careful, conscientious sites cannot control
your resume after someone has downloaded it.” 8
Image by Flazingo Photos. Resume – Glasses www.flazingo.com per these terms www.flazingo.com/creativecommons 8
“ of hiring managers will
review a candidate’s social profile
before making a hiring decision. 10
have reconsidered a candidate
based on what they find.” 10
15. “The non-profit world naturally collects
a great deal of private donor
information and information that
explicitly explains how and why you
collect data and the specifics of its use
are highly recommended. The effective
and professional safeguarding of donor
information is not only an expectation of
the public but the ongoing provision of
your terms of service could well be the
difference between adding a new donor
and having them elect not to engage
with you.”10
Images by KC
16. “The bill’s move to broadly expand information sharing
between governments and give new powers to Canada’s intel
agencies will “undermine user trust, threaten the openness
of the Web, and reduce the security of the Internet and its
users,” Mozilla internet policy director Jochai Ben-Avie said in
a statement published on the Mozilla blog.”13
Image by Stephen Boisvert. Parliament. 9
17. “Massive privacy breach at a Toronto hospital has led to
19 more charges, including six criminal counts against a nurse accused
of selling the confidential records of new mothers as part of a scheme
to peddle RESP investments.” 19
“Alberta’s Health Minister Fred Horne revealed this week
that an unencrypted laptop containing the personal health information
of 620,000 Albertans was stolen in September.”21
Image by U.S. Navy photo by Mass Communication Specialist 2nd Class Todd Frantom/Released)Official U.S. Navy Page. Fort Belvoir Community Hospital. 10
18. “More than PlayStation accounts worldwide were
compromised, 21
“ Target shoppers get hacked” 21
“TJX, the U.S. parent of Winners and HomeSense stores, revealed in
2007 that data from at least credit and debit
cards was stolen by hackers.” 21
19. “Before you post
anything online, think
about what a hacker,
stalker, employer, or
potential employer could
do with that data. Could
an ex, who's fighting for
custody, use the data
against you in court?”7
Image by Sean MacEntee. Privacy 11
“Don't give away specifics. Don't post
your address, date of birth, kids'
names, pets' names, phone numbers,
or any account numbers or financial
information of any kind.” 7
“Take advantage of
privacy settings and
lock down your
profile, so that only
those who you
approve can view
everything.”7
“Use a firewall.”9
“Read the Terms of Service.”9
Make clever strong passwords 9
“Beware sneaky check boxes.” 9
20. “This is a brand new medium, and we are just
now beginning to recognize its potential
consequences. Something as harmless as a
picture of a baby in a tub could be traded
online by pedophiles. The world is changing.
Be aware of your social media use, and be
smart about it.7”
Image by Smlp.co.uk. (2008, March 9). Locked in 19?? 10
21. Sources
1 WashingtonsBlog (2015, May 21). Arguing That You Don’t Care About The Right To Privacy Because You Have Nothing To Hide Is No Different Than Saying You Don’t
Care About Free Speech Because You Have Nothing To Say. Retrieved from http://www.washingtonsblog.com/2015/05/arguing-that-you-dont-care-about-the-right-to-
privacy-because-you-have-nothing-to-hide-is-no-different-than-saying-you-dont-care-about-free-speech-because-you-have-nothing-to-say.html
2 Acohido, B. ( 2013, Nov., 18) Author, A. A. (Year, Month Day). Snowden effect: Young people now care about privacy. USA Today. Retrieved from
http://www.usatoday.com/story/cybertruth/2013/11/13/snowden-effect-young-people-now-care-about-privacy/3517919/
3 Mathiesen, K. (2013, July, 31). The Internet, children, and privacy: the case against parental monitoring. Springer Science+Business Media Dordrecht 2013 retrieved
from http://link.springer.com/article/10.1007/s10676-013-9323-4/fulltext.html
4 Dewey, C. (April 2) How Facebook knows who all your friends are, even better than you do. Washington Post. Retrieved from
http://www.washingtonpost.com/news/the-intersect/wp/2015/04/02/how-facebook-knows-who-all-your-friends-are-even-better-than-you-do/
5 Chayka, K. (2015, March, 24). The New, Improved Online Friendship. New York Magazine. Retrieved from http://nymag.com/next/2015/03/new-improved-online-
friendship.html
6 Hydro One peaksaver Plus. (n.d.). Retrieved from http://www.hydroone.com/MyHome/SaveEnergy/Pages/Peaksaver.aspx
7 Siciliano, R. (2011,May,25) Social Media Privacy and Personal Security Issues. Huffington Post, The Blog. Retrieved from http://www.huffingtonpost.com/robert-
siciliano/social-media-privacy-and_b_245857.html
8 Dixon, P. (2009, February). Consumer Tips: Job Seekers’ Guide to Resumes – Twelve Resume Posting Truths. Posted to
https://www.worldprivacyforum.org/2009/02/consumer-tips-job-seekers-guide-to-resumes/
9 Editors Blog. (2011, Dec. 6 ). 15 tips for protecting your privacy online. CBC News. Retrieved from http://www.cbc.ca/news/canada/15-tips-for-protecting-your-
privacy-online-1.1043194
10 Davidson, J. (2014, Oct. 16). The 7 Social Media Mistakes Most Likely to Cost You a Job. Money. Retrieved from http://time.com/money/3510967/jobvite-social-
media-profiles-job-applicants/
22. Sources
11 Posted by Tim. (2014, Aug. 12) New study reveals much about online privacy concerns – important findings for non-profits. Message posted to
http://www.miratelinc.com/blog/nonprofit-fundraising-news-about-privacy-concerns-for-potential-donors/
12 Anti-terrorism Act, 2015 (n.d.) Retrieved 2015, June,9. http://en.wikipedia.org/wiki/Anti-terrorism_Act,_2015
13 Tencer, D. (2015, March 27). Bill C-51 A Threat To Safety Of Internet Users, Firefox Maker Mozilla Says. Retrieved from
http://www.huffingtonpost.ca/2015/03/26/mozilla-bill-c-51_n_6946602.html
14 Ingram, M. (2013, June 7). Through a PRISM darkly: Tracking the ongoing NSA surveillance story. Gigaom Research
https://gigaom.com/2013/06/07/through-a-prism-darkly-tracking-the-ongoing-nsa-surveillance-story/
15 Clark, N. (2014, March 17). Airlines Use Digital Technology to Get Even More Personal. New York Times. Retrieved from
http://www.nytimes.com/2014/03/18/business/airlines-use-digital-technology-to-get-even-more-personal.html?_r=0
16 No byline (2014, July 12). Home, hacked home. The Economist. Retrieved from http://www.economist.com/news/special-report/21606420-perils-
connected-devices-home-hacked-home
17 Golbeck. J. (n.d.). Track Star: this app follows you while you shop—and it needs a clearer privacy policy. Slate.com. Retrieved from
http://www.slate.com/articles/technology/future_tense/2014/01/ibeacon_shopkick_privacy_policies_for_location_tracking_apps_aren_t_clear.html
18 Madden, S. (2014, March 10). Tech that tracks your every move can be convenient, not creepy. Wired. Retrieved from
http://www.wired.com/2014/03/designers-tracking-tradeoffs/
19 No Byline. (2015, June 2) Rouge Valley Health System privacy breaches lead to 19 chargesCBC News. https://ca.news.yahoo.com/scarborough-
hospital-privacy-breaches-lead-192439254.html
20 No byline (2014, Jan 28). Personal data online: 5 of the biggest security breaches. CBC News. http://www.cbc.ca/news/world/personal-data-online-
5-of-the-biggest-security-breaches-1.2514287
23. Images
1 Rodriguez, J. (u.d.). Edward Snowden. Truthout. Paired with the article: Noam Chomsky | Edward Snowden, the World's "Most Wanted Criminal" .
Retrieved from flickr https://www.flickr.com/photos/truthout/14348649238/in/faves-59362381@N00/
2 Wuyts, Ann. (2014, Nov. 27 Five Data Privacy Principles from Mozilla (Put on a museum wall) 2014. Retrieved from Flickr
https://www.flickr.com/photos/vintagedept/15704560667/in/faves-59362381@N00/
3 P T. (2010, June 16). Privacy Retrieved from flickr https://www.flickr.com/photos/propagandatimes/4707679041/in/faves-59362381@N00/
4 Summer Skyes 11 (2012,Feb. 11). OMG lkr lol … txting . Retrieved from flickr
https://www.flickr.com/photos/summerskyephotography/6981290631/in/photolist-bCUWtR-6bRRaE-eY6HhR-6bRR8b-3Z12zo-6G1YTc-8MfBV9-euYoS-
4gFmE3-5NZCNd-pW1qPw-pVZ5x9-pW8XUF-qdy6eK-qdnRqi-pgNeDa-qduHWC-pVZ5Dm-pW17Pd-d1hVRS-btbcvV-mULqL6-bvsNfb-aoUiXx-qDFBt3-
dU8Sg2-4tPGZg-7LAVpL-9wExNK-5BYs7X-9wExRp-bGZ6yn-egurtP-7wfano-4zhY2v-87VPcZ-4UszxB-aJmY2-qmcFYA-dZWTcp-5spQR4-7UrzMr-7Urz3n-
7UrzVD-7UuQ8q-7UuQbC-7UuQkb-7UuQoq-7UrzYF-ndvhbK
5 Fouquier (2015, April 21). The Big Yellow. Retrieved from Flickr https://www.flickr.com/photos/fouquier/17077640499/in/photolist-s26nxz-byGJAh-
pMxhJ6-aWfjJB-aWeNTz-e3huhi-ba4NaZ-4jyQ7E-bByERN-oKEwYY-oU8gRz-aWeLFK-p93oJB-pQVogC-8xz2Ed-aWeKZX-k4FGqr-of2i9K-owtqgC-owvdti-
8aj9xy-oxYsg6-ounKEf-outnmf-8ahZ8H-owbQ27-ocsCZL-oddzf5-ocsx9i-ow1VFq-ow1RqG-ovYjNo-ocMmGX-owf1mT-ovFcxT-oeNsPd-oeEZuj-oemFxx-
oy8Cy2-owtQ7U-ow1VXN-ow6X45-owqKJG-owjBXV-ouiw5x-5HogZC-oeTzHH-oehWct-oeZ5cQ-oeJCwD/
6 Linwood, J. (2008, Feb. 19). The MI6 Building, Vauxhall, London. Retrieved from Flickr
https://www.flickr.com/photos/brighton/2279813534/in/photolist-4tsD8U-4rar69-jjLgrV-7y5Hww-6MWis-kmvNDz-ppNBij-hXWMg-hCNVr-8yiX5u-
bsRric-cbFSc1-nV16F2-khLw4M-bTuxmM-ryW4gS-5t1utD-e4ABM5-jnRY2N-5t1SWK-5t1LSp-5t69oL-5t68B7-5t661A-5t5TSL-5t5MXQ-5t5Jrh-5t5HYY-
5t1hYK-5t5F5N-7cULj6-9TVK7j-ndEmsF-rCxQK3-4f5u44-j5c6hY-deG8DG-hVwfX-eBeMUd-eBbCVF-eBeK5w-eBbAS6-eBeHdC-eBbzi8-eBeFJW-eBeESQ-
eBbwD6-eBeCWE-eBeCoU-eBeBQE/
7 Pascal. (2010, Oct. 10). Fridgenlight. Retrieved from flickr https://www.flickr.com/photos/pasukaru76/5067295473/in/photolist-a26j1E-
tsBDuq-5kdmhv-79ZUM9-jhvyDo-jhvvMm-uocL6Q-8HMdpk-feiniv-iGH-iGG-iGF-iGE-oeCrEk-owr5Vs-ouQ7eL-oeYoAJ-owaKRN-jhvvcy-jhvztu-
8HMa6V-rYonmx-iGJ-ow8bpc-owfae9-obTYp5-odncL3-oezoho-ovDmsJ-odmw9Q-ou62cM-otHE65-odkBGc-ow87FP-obSeRD-oenz6R-oxHezp-
ovgH2G-oe6723-tCMRpG-r8dEzu-t4n6cq-oektfs-oeJHod-oeJWFK-ouJDiU-rpBd16-ovKkTW-rptYWj-sFUPZ5
24. Images
8 Flazingo Photos. (2014, April 27). Resume-Glasses. www.flazingo.com per these terms: www.flazingo.com/creativecommons. Retrieved from Flickr
https://www.flickr.com/photos/124247024@N07/13903383190/in/photolist-nbAtrh-k8FtG-7ZuYoC-aGVn3H-axtL89-6UwsBM-7aJuB7-9o1iCk-6gMAEm-
6pLznz-4kSTMx-6F2oWU-78W2Go-9y6J4c-6fzJbw-83AHaV-59LL6M-9bFTK7-4zxGN3-8ydvDs-4zxGN7-6pLA6Z-9FVEXv-5G58GN-85oPQ8-6dhcm4-
dQVkWu-53WNkL-5GoACZ-86dXtu-9usg3j-5t2W32-2TUU4y-6pQHZd-7xbhG7-7Z9fs4-nLzw57-7vHmpF-7LtPew-5y1i36-dgdDKj-7vYGuo-6CxxCs-4sKWZb-
pwEZZX-dVN969-4LqJyF-6j7tJi-6NyQMr-87Mfd6
9 Stephen Boisvert. (2013, Sept. 12). Parliament. Retrieved from Flicker https://www.flickr.com/photos/srboisvert/154148968/in/photolist-eC47Q-
qX1RyH-bsqoDk-bsqnXv-afzyQy-5WUcnW-5WPXqa-5WPXPR-5WUcvS-5WPXEX-5WUccu-5WPXL2-afwMDk-afwMzT-5WUczU-5WUcjY-5WUcfW-5WPXSx-
5WPXUa-5WPXrt-5WPXJr-5WPXtF-5WUcdW-5WPXBt-5WPXvk-5WU9KC-afzyZ1-afwMqK-afwMyK-afwMsx-afzzbu-afzz6W-afzz47-afzyP7-afzz1j-afwMHv-
afwMj8-7T47XR-c2Y9s-afzz4Y-afzyXL-afzyS9-afwMGa-8aSTxU-bFY5qM-4QvFVx-7T7e4U-6kMQ8n-6dx7Qr-5WPXic
10 U.S. Navy photo by Mass Communication Specialist 2nd Class Todd Frantom/Released). (2011, June 22). Official U.S. Navy Page. Fort Belvoir
Community Hospital. Retrieved from Flickr https://www.flickr.com/photos/usnavy/5913486058/in/photolist-a1yaob-4wULmG-4SQoUf-ijUKnZ-7xhBng-
4oRFy4-8eweiE-hfwSgV-o9mMRT-5NTvFA-dAs6qD-e8Bmjb-e8Bm93-7Wqhei-h8oMGw-ecP4An-8bnTDJ-a4nkyu-5npEuv-a5tAA1-5H1G3c-e6g75r-
71aYsm-dnbUv1-bn5ohY-4ptDiZ-r4cZb-2ywEDH-nqFX6d-4SFz6v-dAxAp7-a3VHN3-autfjD-6vBPft-pQwHww-87awi2-cWJGjL-ajPSps-cQVnbw-aaWgvM-
tjaizy-7g7J4f-dnbKop-dnbPgU-e71Utc-cw2MPj-9ASSCn-dnbS4e-e71Zrc-hH7xAq
10 Smlp.co.uk. (2008, March 9). Locked in 19??. Retrieved from flickr https://www.flickr.com/photos/biscuitsmlp/2324706925/in/photolist-4xqJnT-
pNfQ2V-4w9csh-dG6neS-9uKVDe-bAUx5j-e6k5Ak-fEQbRx-dFVZx5-SoX26-ak2q9v-8r2CVR-9oNPZn-mgjU2U-4jh6xz-azPbgb-oFMMB2-72xiQ7-6aRr8S-
X54YR-9yZsf4-mvZV7g-8H3hcn-9MD5JS-rbCTk1-bn1aZv-bD1SrM-cEPn4G-rHGUvU-4XpCsF-dfJH2y-9TL2A2-kDM3G2-55Gdmp-892XCK-e3qsFM-9PhLeX-
8xdNPk-9h1Zgc-9LKJvt-rL8wjY-9h1bLJ-3ipg6L-2vmN8u-rgm2Me-anuzJo-8pqb2e-bSXtGM-pdHFcc-2JZJSr
11 MacEntee, S. (2010, May 9) Privacy. Retrieved from Flickr https://www.flickr.com/photos/smemon/4592915995/in/photolist-7ZRTUP-dZ2y6b-82djZx-
84VZAr-hQTx1c-7fNVzm-8b15Y2-azTdMo-4EvWY9-gyXnY-pDmshR-edvyKx-822bu2-8i9dVE-eARcff-aHKoc-5UYfNP-axwagd-o3MtjS-9qR8HQ-9i7ZK2-
4WrJkA-pVKYKn-Em1Z9-7qxzPp-48ybNM-66r3T6-dRuMzt-ddpg14-7H1j1A-eTrqcD-pgokPc-iCz9t-6wCshe-ahk6nh-9Mcwzt-46PRKe-5V3xR3-7nzT7w-
qmKn1-9t8qco-kCRTxX-raUSiK-qF6Pw5-mXs67q-7XSHP1-t1pSZ3-skYusG-t1pRGd-8hZ2Es
Note: Images by K C were taken by myself.