Privacy and the Internet
John R Nicholson
Updated 8/17
What is Privacy
Definition
Ability of individual to seclude information about themselves
and express it selectively
Something that is inherently special or sensitive
Amendment IV
“The right of the people to be secure in their persons, houses,
papers, and effects, against unreasonable searches and
seizures…”
Pizza video: http://bit.ly/1ep4ODT
Note: last set of characters is case sensitive
Why is Privacy Important?
Credit Reports (CBS says 4/5 contain errors)
Precursor to identity theft
Incorrect information
Incorrect interpretation
The Internet is forever
Streisand Effect (6 downloads turned into
420,000 views)
Defining Big Data
Big Data is a term for data sets that are so
large or complex that traditional data
processing application software is inadequate
to deal with them.
Refers to the use of predictive analytics, user
behavior analytics, or certain other advanced
data analytics methods that extract value from
data
What is Big Data
SciTech Now: http://bit.ly/2xHHxgU (6 min)
Note: last set of characters is case sensitive
60 Minutes: http://bit.ly/2xHtaJm (15 min)
PBS: http://bit.ly/2mUXqeS (4 min)
TED: http://bit.ly/2wNUf1k (17 minutes)
iTunes privacy agreement: 7 Days, 7 attorneys, 27
pages
Personally Identifiable Information (PII) only
valuable information
http://Google.com/maps/timeline
Big Data Pros
Allows businesses to quickly detect frauds and
errors
Develop strategies towards competitors in less
time offering deep insight into consumer
trends and sales
Used to provide cutting-edge healthcare.
Medical records and wearables provide information about
patients analyzed in real time
Big Data Cons
Companies wanting to use Big Data must
redefine their data collection methods and
upgrade computers
Cost of developing algorithms
Lack of privacy
Only .5% of all information has been analyzed
Net Neutrality
Move from Title I to Title II by FCC
ISPs can throttle speeds to specific sites
If an ISP were to develop a movie site, they could have
speedy access to it, throttling Netflix
If Pizza Hut pays a fee, and ISP could drop calls or add
interference to Domino’s customers
If repealed, ISP has access to all information
you send across the Internet and can sell it.
How Can I Protect Myself
Duckduckgo.com search engine
TOR browser (never open PDFs online)
VPN
Vyper (goldenfrog.com) $5 mo/billed annually
Password
7x@CTd!A
Mypasswrdiseasytoremember1
Don’t provide personal information (especially
surveys)
Summary
Use a safe search engine
Use a safe browser
Use a pass phrase rather than a password
Don’t fill out surveys
The Internet is forever

Privacy: Protecting Personal Information

  • 1.
    Privacy and theInternet John R Nicholson Updated 8/17
  • 2.
    What is Privacy Definition Abilityof individual to seclude information about themselves and express it selectively Something that is inherently special or sensitive Amendment IV “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures…” Pizza video: http://bit.ly/1ep4ODT Note: last set of characters is case sensitive
  • 3.
    Why is PrivacyImportant? Credit Reports (CBS says 4/5 contain errors) Precursor to identity theft Incorrect information Incorrect interpretation The Internet is forever Streisand Effect (6 downloads turned into 420,000 views)
  • 4.
    Defining Big Data BigData is a term for data sets that are so large or complex that traditional data processing application software is inadequate to deal with them. Refers to the use of predictive analytics, user behavior analytics, or certain other advanced data analytics methods that extract value from data
  • 5.
    What is BigData SciTech Now: http://bit.ly/2xHHxgU (6 min) Note: last set of characters is case sensitive 60 Minutes: http://bit.ly/2xHtaJm (15 min) PBS: http://bit.ly/2mUXqeS (4 min) TED: http://bit.ly/2wNUf1k (17 minutes) iTunes privacy agreement: 7 Days, 7 attorneys, 27 pages Personally Identifiable Information (PII) only valuable information http://Google.com/maps/timeline
  • 6.
    Big Data Pros Allowsbusinesses to quickly detect frauds and errors Develop strategies towards competitors in less time offering deep insight into consumer trends and sales Used to provide cutting-edge healthcare. Medical records and wearables provide information about patients analyzed in real time
  • 7.
    Big Data Cons Companieswanting to use Big Data must redefine their data collection methods and upgrade computers Cost of developing algorithms Lack of privacy Only .5% of all information has been analyzed
  • 8.
    Net Neutrality Move fromTitle I to Title II by FCC ISPs can throttle speeds to specific sites If an ISP were to develop a movie site, they could have speedy access to it, throttling Netflix If Pizza Hut pays a fee, and ISP could drop calls or add interference to Domino’s customers If repealed, ISP has access to all information you send across the Internet and can sell it.
  • 9.
    How Can IProtect Myself Duckduckgo.com search engine TOR browser (never open PDFs online) VPN Vyper (goldenfrog.com) $5 mo/billed annually Password 7x@CTd!A Mypasswrdiseasytoremember1 Don’t provide personal information (especially surveys)
  • 10.
    Summary Use a safesearch engine Use a safe browser Use a pass phrase rather than a password Don’t fill out surveys The Internet is forever