SlideShare a Scribd company logo
Protect your privacy:
         Mobile & Digital Privacy and Awareness
                                                                                August 2012



                                                                A short study by the team of
                                                        MobiDigger, Inc. – Mountain View, CA



                                                                                    Authors:

                                                  Hubert A.-M. Moik, 44, CEO MobiDigger, Inc.
   14 years in the telecom/mobile industry, former CEO/Managing Director of Inside M2M, Data
Storm Systems, Planetlive et. al. entrepreneur since 1993, member of SVASE, SDForum et. al.,
                                                           Founder & Partner GO Silicon Valley
                                     Juan C. Ramírez, 28, Market Research. MobiDigger, Inc.
                                               1 year in hi-tech, 3.5 years in capital markets
                                                              Economist and MS in Business

                                                                             Nick Vecchio, 22
                                                   3 years in mobile industry, College Student
                                                    Website developer, Web marketing, Sales
Overview

In a world where Google, Facebook, Twitter and other top web sites share and save user
information, it is increasingly hard to protect individual privacy in new media—on the Internet and
mobile phones. At the same time, information about privacy protection is very hard to find.
Further, the majority of people who use the Internet are generally not properly informed about
new media privacy issues. To help users protect themselves, this presentation explores Internet
and mobile privacy problems and solutions through reviews of case studies. It is designed to
educate users of new media in both key issues and solutions.



Problem

Contrary to conventional wisdom, privacy concerns are not limited to the Internet. It also
encloses mobile phones, which penetration in America reached 104.6% in 2011 (totaling 331.6
million subscribers) therefore exceeding the US population1. Even one-third of American
households now have wireless device only2. Users are largely unaware that cell phone
messages -even simple text messages- ultimately can end up in the hands of strangers and
even on the Internet. Worse, for example, new “smart phones” send information about the
phone’s location to databases. Though such databases usually are not public, they also are not
private; this information, then can pose a danger to the person who uses their phone to
communicate with strangers or other acquaintances, to whom they normally would not reveal
their locations. Private cell-phone information can also be revealed through a “reverse search,”
in which anyone can search a cell phone number to find the owner’s name and address.

In terms of the Internet, private information actually flows quite freely. Today, the most visited
websites share information, save information, and facilitate visitors’ buying and selling of
personal data. But many visitors to such sites do not realize that these pages’ hosts share
information they obtain from visitors. For instance, agencies of the government obtain Facebook
and Twitter users’ info and routinely request cell phone carriers for their customers’ phone
records as well3.

With the existence of so many social media sites such as Google+, Facebook, Foursquare,
Twitter and so forth, more concerns raise upon privacy issues. In a recent poll 59%4 of the
respondents said they had little or no trust in Facebook, to keep their information private. A study
released in 2011 showed that 45% of the top 185 US web sites transmitted identity details to at
least four other websites. It was discovered that one online dating website transmitted
information regarding gender, zip code and age to websites which auction personal data5.
Google is known to compile private consumer information by using tracking cookies on 712 of
the top 1,000 websites6.

Often many people ignore how vulnerable they are by posting on their ‘walls’, because they don’t
know default privacy settings allow everyone to follow what you are doing. A simple update in

1
  http://www.ctia.org/advocacy/index.cfm/AID/10323
2
  Blumberg, S., Luke, J. (2012) Wireless substitution: Early release of estimates from NHIS july-Dec 2011. CDC.06/12
3
  http://blogs.cio.com/mobilewireless/17266/your-smartphone-spy-government
4
  http://socialbarrel.com/facebook-vs-twitter/41152/
5
  http://blogs.wsj.com/digits/2011/10/11/privacy-study-top-u-s-websites-share-visitor-personal-data/
6
  http://www.bizjournals.com/sanfrancisco/news/2012/06/28/web-privacy-study-google-tracking.html
the Facebook profile such “I just drove 50 miles for the best ice cream” gives criminals a head
start to break into your home. And even worse, track you on your way back. In certain
applications such as Google’s Latitude, people publicly share their location to the world if they
don’t setup privacy settings correctly. It has been reported by a blogger that he was able to
follow people he didn’t even know, using information he gathered from the internet from unaware
people. Hence, these sorts of things make it very easy for crime perpetrators to track their
victims.

Scams and spam are also major problems on the Internet today. One of America’s most popular
websites, Craigslist is plagued with scammers who have devious ways of stealing users’
information and money. Craigslist is not unique. In addition to websites, email spam is an all-too-
common way for con artists to try to communicate with strangers, posing as friends in order to
acquire information and steal money.

Fake proxy websites are also a problem. While some proxies have a legitimate use (as when
students go to a proxy server in order to log-in to Facebook), ample cases have shown that
some proxies present fake versions of Facebook, for example, in order to obtain log-in user
names and their corresponding passwords. The fake proxy website automatically sends this
information to a database, which then logs into the account and records all of the user’s account
information.

Many websites offer a “free” gift or service, but by accepting such offers, users are often
agreeing to lengthy contracts with monthly fees. For example, “free” credit-report websites often
request credit card information, tricking the user into a monthly fee. Which is automatically
charged to the credit card, thus the credit report is not free at all. This is a common strategy;
many websites charge users for single visits, subscriptions, or for a monthly service. Often, other
websites say they are “free” and, yet, they request credit card information. This can indicate that
the site is a fraud; often such sites will enroll the user into a monthly fee arrangement or, often,
sell the subscriber’s credit card information to a third party.

In response to the upwardly demand for the need to certify the identity of online daters. Many
websites similar to the credit card score described above emerged. These sites offer online
daters to check their date’s ID to make sure they are who they claim to be. Most of the online
dating verifications sites are also known to be scams that trick customers to give away their
credit card info and get them into costly fees or lengthy contracts without satisfactory results.



Status Quo

Many users, particularly children, are unaware of many privacy issues that exist, and some of
these can be dangerous.

People who “blind” date or participate in internet dating, often provide personal information as
well as their cell phone numbers. But, with just a cell phone number, criminals can find a
person’s name, address, and other information. Location information is also available via
Facebook “Places,” Twitter, FourSquare, and Google+ to name just a few, and these sites are
catalysts for publicly sharing this information.

For example, if an address is listed with Google via Gmail, Google+ will provide the location
(and, possibly, the address) of such users. So, anonymously, other users can obtain the
addresses of users who wish to retain their privacy. Further, Google can reveal a person’s
location when they simply perform a search on a smart phone or computer.

The Internet often facilitates meetings between people who have never met before and,
sometimes, these encounters result in crime and victimization. A few news stories emerged of
violent crimes being perpetrated by predators who found and contacted their victims using
Craigslist. Teens, too, using their cell phones to send raunchy text messages and/or sexual
pictures, can be victimized by their own activities. Sometimes, such messages end up in the
wrong hands or, worse, under many eyes, and this exposure can cause consequences that are
much more serious than embarrassment.

If someone subscribes to a service or product, often scammers will sell the subscriber’s phone
number and any other available data to solicitors. While users can subscribe to a “Do Not Send”
list, this is a general “opt-out” of all text messaging, - senders of messages have to obey the
rules - but one could ask: which spammer will do that?



The Facts of Today

As of the Pew Research Center’s Internet & American Life Project report 4% of cell-owning
teens ages 12-17 say they have sent sexually suggestive nude or nearly nude images or videos
of themselves to someone else via text messaging, a practice also known as ‘sexting’; 15% say
they have received such images of someone they know via text message.

50 million new classified ads7 are posted each month on Craigslist, and most involve a face-to-
face meeting. Since 2005, several shocking murders, robbery and slaying crimes8 linked to
contact originated through Craigslist, had a notable attention of the US media, creating
awareness on a new modality of crime generated through online advertising. In 2011 only, 330
crimes9 were linked to Craigslist ad postings.

Dating is another alarming issue which has increased dramatically with the booming of the online
dating services. This industry is bigger than porn, has been worth $1,3 billion in 2011, and is
expected to reach $1.7 billion by 2013. The mobile dating market ($550 million in 2010) has also
experienced a rapid 90% growth since 2010 as the activity of online daters is shifting to a 3 to 1
ratio from mobile to web users10.
In the US are 45M+ active online dating users, the second biggest market only after China, and
ahead of India. Nowadays 49% of US households are led by a single adult and one in five
relationships start on the Internet. But an astonishingly number of 1 out of 10 subscribers are
fake profiles, created by scammers, that primarily victimize people over 40 years - however all
demographics are at risk. Last year 5,663 romance scams were reported, totaling economic
losses of $50.4M. Craigslist has been a main vehicle for this type of scams and its owner took
initiative to shut down one of their personal services, partly out of concern for the safety of the
users.



7
  http://www.craigslist.org/about/factsheet
8
  http://www.newsnet5.com/dpp/news/national/notable-craigslist-related-crimes
9
  http://blog.sfgate.com/techchron/category/craigslist/
10
   http://oxfordtechnologyventures.com/mobile-and-online-dating-sites/
11
                                   Source: FBI – 2011 Annual Internet Crime Report




Previous Case Studies

In the last few years, many different issues have surfaced with regard to the growing number of
cases involving Internet and mobile phone security and privacy. As more and more people
become increasingly dependent on technology in both their professional and personal lives, it is
vital that they become aware of the dangers, as well.
It is important, that users of technology pay attention to developments and learn from the
resources available to aid in safety and security.


 In Alabama authorities arrested four middle-school students for exchanging nude photos of
themselves.

 A 20 year old man who met a 15 year old girl on the Xbox game ‘Halo’ and drives 40 hours to
stalk and text incriminating messages12.

 In Washington a man along with his accomplices were arrested after murdering a man who
posted a Craigslist ad to sell a ring. The group stormed the house and killed the seller while
trying to defend his family.

 A Boston medical student was charged with murder, armed robbery, and kidnapping after
targeting women of erotic services of Craigslist. At 22, he tried to rob a woman found through the
internet and when she struggled, he shot her.

 A blog on "bodybuilding.com" was the host for a series of events that lead to the death of a 19
year old on a webcam. He died from an overdose of opiates and benzodiazepine that apparently
was encouraged by some watching the webcam. A South Florida college student was on a live
webcam for 12 hours telling people he was going to commit suicide. Some watching and some
helping, the website became aware of the act about 4 hours before he was found dead.

General statistics say 50% of children are either bullied or involved in bullying. When two high
school students recently killed themselves after being bullied, Fox News correspondent Dr. Keith
Ablow said, “The advent of new technologies makes it more apparent and more able for kids to
bully.”
11
     http://www.ic3.gov/media/annualreport/2011_IC3Report.pdf
12
     http://www.switched.com/2008/01/04/man-drives-40-hours-to-stalk-15-year-old-girl-he-met-online-in-h/
By the end of 2010, the “The National Intimate Partner and Sexual Violence Survey” released a
report for the National Center for Victims of Crime13. The study found that in the U.S. there had
been approximately 6.6 million adult stalking victims during 2010. Of these victims:

 11% of victims were stalked for 5 years or more
 66.2% of stalking victims experienced unwanted phone calls or messages
 46% of victims encountered weekly an unwanted interaction with a stalker
 Stalkers’ most common tactic
  was telephone calls, voice or
  text messages
 10% of the victims were
  monitored using a GPS system
  (like the one embedded in
  smartphones)
 33% were stalked by people
  they didn’t know at all
 Approximately 25%
  experienced some form of
  cyberstalking such as email or
  instant messaging
 During any point of their
  lifetime 1 in 6 women and 1 in
  19 men had experience
  stalking
                                                         Source: http://www.thewell.vcu.edu/docs/stalking_statistics.pdf




Solutions

This part includes more information on how those who date can increase their safety when they
are using the Internet to socialize and the cell phone to make and/or stay in contact with their
blind date.

It’s important that Internet and mobile users obtain good, overall knowledge of what’s going on
today in terms of privacy and safety. The following resources are good examples of information
sources that will help users protect themselves. The links, blogs, services and articles listed
below pertain to various lifestyles and a range of user styles, from kids to parents and from
smartphone texters to Craigslist sellers.

In 2010, a website called “PleaseRobMe” was setup to reveal as much personal information as
possible to show unaware users, what they actually publish. The site ran a program that
scanned Facebook and Twitter profiles that had no privacy settings, and then it recorded when
people said they were out doing something i.e. “getting food in San Francisco!” The program
then found their address and posted on the site where people were, their home address, and
approximately how long until they were going to return home. The site demonstrated, how easy it

13
     http://www.victimsofcrime.org/our-programs/stalking-resource-center/stalking-information
is to learn too much information about people online. This extreme case clearly indicates that
people need to pay close attention and be mindful of the information that they provide to the
public via their “private” networking. As the site’s creators explained “The danger is publicly
telling people where you are. This is because it leaves one place you're definitely not... home“14

Similarly, by the middle of 2011 a Facebook app called “Take This Lollipop” circulated in the
Internet scaring users and raising the alarms yet again on how your private information can be
easily compile by third parties. As with all Facebook apps, users are requested to grant access
to Take This Lollipop to the user’s profile info. Once the user grants the access, the screen goes
black and appears a video of an unkempt looking man in front of a computer typing a password
to the user’s Facebook login ID. Then he browses through the user’s Facebook profile and
humps into his car with a picture of the user in his dashboard, heading to track him/her.
On the one hand, the emergence of this app also serves as a reminder to people that they have
to be careful with the information they share online and that most users ignore how to set privacy
settings to avoid sharing sensitive information. On the other hand, that apps for Facebook and
also smartphones are a way for third parties to access users’ information and track their
consumer behavior for the purpose of developing better ads.

It might be argued that the best way to protect yourself is not to use the Internet at all—no
Facebook, no Twitter, no smartphones, no downloading, no social networking, no “googling”, no
texting. The problem with this solution is that it’s not reasonable, since it is not realistic to
suggest that people should not use the Internet or mobile phones! The Internet is part of our
daily life. It can present dangers, but it can also make our lives much more interesting,
productive, profitable, and personally rewarding. So, avoiding the Internet is not the answer. The
answer is to seek out safe and practical solutions.

To address the problem of credit card fraud, for example, there are a few solutions. The best, of
course, is never to use your credit card online and never provide it to any “free” websites. When
you are buying a product online, a good option is to go to a store and purchase a temporary card
with cash on it. This is secure and the only amount at risk is what you put on the card. While this
can be stolen, no personal or financial information goes with it. Google has a service that does
something similar, where customers put money into an online account.

The following website is a resource: www.annualcreditreport.com. As mandated by the FTC, this
site offers each person one free credit check each year, and it does not require a credit card
number.

For online daters who want to make a background check on their blind dates, this web site can
come in handy: www.wegolook.com has a group of inspectors in the field, across the US, that
verifies in person the identity of the date of an end user. It requires a one-time payment per
report requested.

Mobile is a new playing field for spammers, scammers and stalkers. For users who do not want
to receive commercial messages (as text ads or robocalls) the easiest way to “opt out” of these
is to list their number on the “donotcall”- and the donotsend” lists”15, provided by the FCC under
the CAN-SPAM act of 200716.


14
     www.pleaserobme.com
15
     http://www.fcc.gov/cgb/consumerfacts/canspam.html
16
     https://www.donotcall.gov
The problem with these lists is, that they exclude a user basically from receiving any marketing
messages and an opt in into a wanted messaging service becomes actually a legal balance act
for the sender of these messages.

The new service MobiDigger (learn more on page 11) offers a solution for users and
advertisers, keeping users safe with a nickname accompanied to their mobile phone and
establishes a basis for dating, advertising and classified services within a safe mobile
environment.
References:
General Information:
- http://www.pewinternet.org/Reports/2009/Teens-and-Sexting.aspx
- http://blogs.computerworld.com/15559/google_buzz_and_you_thought_firefox_had_privacy_issues
Who Can Help?
- Privacy Rights Clearinghouse: http://www.privacyrights.org/links.htm
- EPIC (Electronic Privacy Information Center) http://epic.org/privacy/privacy_resources_faq.html
- http://phonesmrt.blogspot.com
- http://scaryviral.blogspot.com

4 Kids:
- http://www.pbs.org/wgbh/pages/frontline/kidsonline/
- http://www.youtube.com/watch?v=kUyQI0USNSY&feature=dir
- http://www.ikeepsafe.org
- http://www.isafe.org
- http://www.wiredsafety.org
- http://www.childnet-int.org
- http://www.netsmartz.org/index.aspx

4 Parents:
- http://www.fbi.gov/publications/pguide/pguidee.htm
- http://www.onguardonline.gov
- http://www.getnetwise.org
- http://resources.kaboose.com/safe-surf/parents-intro.html

4 Dating Users:
- http://internetsecuritytips.wordpress.com
- http://www.brighthub.com/internet/security-privacy/articles/11438.aspx
- http://www.articlesbase.com/security-articles/top-5-internet-security-tips-3109845.html
- http://www.saferonlinedating.org/tips

4 Sales / Classified Users:
- http://www.craigslist.org/about/scams
- http://techblog.homeservicesne.com/?p=236

Resources:
- http://voices.washingtonpost.com/posttech/2010/06/congress_looks_at_mobile_locat.html
- http://life.familyeducation.com/teen-relationships/sexting/63750.html
- http://www.privacyrights.org/fs/fs2b-cellprivacy.htm
-http://www.fastcompany.com/1658963/smartphone-security-personal-data-lock-crime-thieves-gadgets-
information- pin
- http://www.cnn.com/2010/LIVING/10/26/teens.digital.dating.abuse/index.html?iref=allsearch
-http://www.washingtonpost.com/national/illinois-employers-barred-from-asking-job-applicants-to-hand-
over-social-networking-passwords/2012/08/01/gJQA3VxrPX_story.html
- http://socialbarrel.com/facebook-vs-twitter/41152/
- http://www.reuters.com/article/2012/07/23/google-lobbying-idUSL2E8INHFA20120723
- http://media.cbronline.com/news/google-to-pay-22m-for-privacy-settlement-over-safari-browser-010812
- http://www.theverge.com/2012/7/11/3151478/microsoft-bing-google-privacy-marketshare-relevance
-http://www.out-law.com/en/articles/2012/july/google-admits-not-all-unlawfully-collected-street-view-data-
has-been-deleted/
- http://www.statisticbrain.com/online-dating-statistics/
- http://www.onlinedatingdvd.com/blog/2011/08/online-dating-statistics/
- http://www.victimsofcrime.org/our-programs/stalking-resource-center/stalking-information
- http://blogs.cio.com/mobilewireless/17266/your-smartphone-spy-government
-http://www.thenewamerican.com/usnews/constitution/item/12329-govt-may-now-collect-catalog-and-
store-all-private-information

Note: This document references to registered trade marks such as Facebook®, Google®,
FourSquare® , Twitter®, Craigslist®, MobiDigger®, WeGoLook®, Latitude®

MobiDigger:

User portal: http://www.mobidigger.com
Service portal: http://www.mobidigger-inc.com
Facebook page: http://www.facebook.com/MobiDiggerInc
About MobiDigger®




As cell phones and email are an essential item in our life, MobiDigger has become the tool to
protect us from every day’s threats accompanied by the daily usage of our mobile phones.

While numbers of texted ads will increase significantly over the next few years, this service is
available to help mobile phone users to maintain their privacy.

Some new services help increase mobile phone users’ security. MobiDigger assigns nicknames
to phone numbers and also offers other perks to increase phone user safety. This text
messaging service provides “alias and domain service,” an excellent option for mobile privacy as
they do not share any of users’ personal information.

By choosing a nickname to your mobile number, users can pick a basic, professional, or dating
plan based on their lifestyle. Simply protecting their identity, meet work contacts or make friends
using a profile they create.

MobiDigger is naming mobile phone numbers via
a mobile messaging system, using a short code
(96527), which brings a nickname/address to
conventional, existing mobile phones.

Users are able to block people from sending
unwanted text messages and emails to a phone
with a simple text message.

Users can receive advertising, offers and
coupons without revealing their phone # or email
address.

The service has grown to over 11,500,000 users and is now partnering with local and US wide
sponsors to expand the possibilities of safe networking!


Contact:
MobiDigger, Inc.                                  www.mobidigger.com

465 Fairchild Ave., Suite 223                     hubert.moik@mobidigger-inc.com
Mountain View, CA 94043                           juan.ramirez@mobidigger-inc.com

More Related Content

What's hot

Courtland brooks-whitepaper---mobile-dating
 Courtland brooks-whitepaper---mobile-dating Courtland brooks-whitepaper---mobile-dating
Courtland brooks-whitepaper---mobile-datingBrian Challberg
 
[Pps] branding unbound
[Pps] branding unbound[Pps] branding unbound
[Pps] branding unbound
Richard Go
 
Reinventing Marketing For The Small Business
Reinventing Marketing For The Small BusinessReinventing Marketing For The Small Business
Reinventing Marketing For The Small Business
Rob Koch
 
Mobile Marketing to Youth - Mobile Monday
Mobile Marketing to Youth - Mobile MondayMobile Marketing to Youth - Mobile Monday
Mobile Marketing to Youth - Mobile Monday
MobileAnthem
 
Social media mobile computing
Social media mobile computingSocial media mobile computing
Social media mobile computing
Alyssa Galvez
 
Mobile social synergy 2012
Mobile social synergy 2012 Mobile social synergy 2012
Mobile social synergy 2012 Sharyl Dobos
 
The Intersection Of Email, Mobile & Social Media
The Intersection Of Email, Mobile & Social MediaThe Intersection Of Email, Mobile & Social Media
The Intersection Of Email, Mobile & Social Media
Greg Cangialosi
 
Guide to Convergent Out-of-Home
Guide to Convergent Out-of-HomeGuide to Convergent Out-of-Home
Guide to Convergent Out-of-HomePosterscope
 
The coming era of on demand marketing
The coming era of on demand marketingThe coming era of on demand marketing
The coming era of on demand marketingbrandsynapse
 
Digital marketing trends 2014
Digital marketing trends 2014Digital marketing trends 2014
Digital marketing trends 2014
Paul Gilbert
 
How digital markets grow up
How digital markets grow upHow digital markets grow up
How digital markets grow up
TNS
 
Marketing Trends To Watch
Marketing Trends To WatchMarketing Trends To Watch
Marketing Trends To Watch
Scott Brandon
 
Social media essentials for 2021
Social media essentials for 2021Social media essentials for 2021
Social media essentials for 2021
Ioana Barbu
 
C3 for Washington Newspaper Publishers Association
C3 for Washington Newspaper Publishers AssociationC3 for Washington Newspaper Publishers Association
C3 for Washington Newspaper Publishers Association
Steve Buttry
 
The 2023 tech landscape
The 2023 tech landscapeThe 2023 tech landscape
The 2023 tech landscapeWerner_V
 
2011 Advanced Global Mobile Trends
2011 Advanced Global Mobile Trends2011 Advanced Global Mobile Trends
2011 Advanced Global Mobile TrendsZeb Dropkin
 

What's hot (18)

Mobile Matters
Mobile MattersMobile Matters
Mobile Matters
 
Courtland brooks-whitepaper---mobile-dating
 Courtland brooks-whitepaper---mobile-dating Courtland brooks-whitepaper---mobile-dating
Courtland brooks-whitepaper---mobile-dating
 
[Pps] branding unbound
[Pps] branding unbound[Pps] branding unbound
[Pps] branding unbound
 
Reinventing Marketing For The Small Business
Reinventing Marketing For The Small BusinessReinventing Marketing For The Small Business
Reinventing Marketing For The Small Business
 
Mobile Marketing to Youth - Mobile Monday
Mobile Marketing to Youth - Mobile MondayMobile Marketing to Youth - Mobile Monday
Mobile Marketing to Youth - Mobile Monday
 
Social media mobile computing
Social media mobile computingSocial media mobile computing
Social media mobile computing
 
The 2012 Channel Preference Survey Web
The 2012 Channel Preference Survey WebThe 2012 Channel Preference Survey Web
The 2012 Channel Preference Survey Web
 
Mobile social synergy 2012
Mobile social synergy 2012 Mobile social synergy 2012
Mobile social synergy 2012
 
The Intersection Of Email, Mobile & Social Media
The Intersection Of Email, Mobile & Social MediaThe Intersection Of Email, Mobile & Social Media
The Intersection Of Email, Mobile & Social Media
 
Guide to Convergent Out-of-Home
Guide to Convergent Out-of-HomeGuide to Convergent Out-of-Home
Guide to Convergent Out-of-Home
 
The coming era of on demand marketing
The coming era of on demand marketingThe coming era of on demand marketing
The coming era of on demand marketing
 
Digital marketing trends 2014
Digital marketing trends 2014Digital marketing trends 2014
Digital marketing trends 2014
 
How digital markets grow up
How digital markets grow upHow digital markets grow up
How digital markets grow up
 
Marketing Trends To Watch
Marketing Trends To WatchMarketing Trends To Watch
Marketing Trends To Watch
 
Social media essentials for 2021
Social media essentials for 2021Social media essentials for 2021
Social media essentials for 2021
 
C3 for Washington Newspaper Publishers Association
C3 for Washington Newspaper Publishers AssociationC3 for Washington Newspaper Publishers Association
C3 for Washington Newspaper Publishers Association
 
The 2023 tech landscape
The 2023 tech landscapeThe 2023 tech landscape
The 2023 tech landscape
 
2011 Advanced Global Mobile Trends
2011 Advanced Global Mobile Trends2011 Advanced Global Mobile Trends
2011 Advanced Global Mobile Trends
 

Viewers also liked

Facebook, Twitter und Co. - Infrastruktur für E-Collaboration?
Facebook, Twitter und Co. - Infrastruktur für E-Collaboration?Facebook, Twitter und Co. - Infrastruktur für E-Collaboration?
Facebook, Twitter und Co. - Infrastruktur für E-Collaboration?
Martin Koser
 
Курс «Брокеридж 2.0»
Курс «Брокеридж 2.0» Курс «Брокеридж 2.0»
Курс «Брокеридж 2.0»
BDA
 
"FELICIDADES MI AMOR"
"FELICIDADES MI AMOR""FELICIDADES MI AMOR"
"FELICIDADES MI AMOR"
marioly
 
Tag, You're It introduction
Tag, You're It introductionTag, You're It introduction
Tag, You're It introduction
h3athrow
 
OPP04
OPP04OPP04
my life cump bus
my life cump busmy life cump bus
my life cump busraku31
 
OPP01
OPP01OPP01
Social Networks in the Enterprise
Social Networks in the EnterpriseSocial Networks in the Enterprise
Social Networks in the Enterprise
Martin Koser
 
PHILIPPE POLO RESUME
PHILIPPE POLO RESUMEPHILIPPE POLO RESUME
PHILIPPE POLO RESUMEPhilippe Polo
 
Ondernemingsplan
OndernemingsplanOndernemingsplan
OndernemingsplanReinier
 
CTIA 2009 - The Mobile Space and Transmedia: A Critical Content Platform for...
CTIA 2009 - The Mobile Space and Transmedia:  A Critical Content Platform for...CTIA 2009 - The Mobile Space and Transmedia:  A Critical Content Platform for...
CTIA 2009 - The Mobile Space and Transmedia: A Critical Content Platform for...
John D. Heinsen
 
Pre-Cal 40S Slides April 12, 2007
Pre-Cal 40S Slides April 12, 2007Pre-Cal 40S Slides April 12, 2007
Pre-Cal 40S Slides April 12, 2007
Darren Kuropatwa
 
For Liz and Nolan
For Liz and NolanFor Liz and Nolan
For Liz and Nolanwinwinhomes
 

Viewers also liked (20)

Presenting
PresentingPresenting
Presenting
 
Facebook, Twitter und Co. - Infrastruktur für E-Collaboration?
Facebook, Twitter und Co. - Infrastruktur für E-Collaboration?Facebook, Twitter und Co. - Infrastruktur für E-Collaboration?
Facebook, Twitter und Co. - Infrastruktur für E-Collaboration?
 
Курс «Брокеридж 2.0»
Курс «Брокеридж 2.0» Курс «Брокеридж 2.0»
Курс «Брокеридж 2.0»
 
CertificateMagic_05-42-26
CertificateMagic_05-42-26CertificateMagic_05-42-26
CertificateMagic_05-42-26
 
"FELICIDADES MI AMOR"
"FELICIDADES MI AMOR""FELICIDADES MI AMOR"
"FELICIDADES MI AMOR"
 
Tag, You're It introduction
Tag, You're It introductionTag, You're It introduction
Tag, You're It introduction
 
my life
my lifemy life
my life
 
OPP04
OPP04OPP04
OPP04
 
Final PR resume
Final PR resumeFinal PR resume
Final PR resume
 
my life cump bus
my life cump busmy life cump bus
my life cump bus
 
OPP01
OPP01OPP01
OPP01
 
Social Networks in the Enterprise
Social Networks in the EnterpriseSocial Networks in the Enterprise
Social Networks in the Enterprise
 
PHILIPPE POLO RESUME
PHILIPPE POLO RESUMEPHILIPPE POLO RESUME
PHILIPPE POLO RESUME
 
prueba
pruebaprueba
prueba
 
Ondernemingsplan
OndernemingsplanOndernemingsplan
Ondernemingsplan
 
miedo
miedomiedo
miedo
 
CTIA 2009 - The Mobile Space and Transmedia: A Critical Content Platform for...
CTIA 2009 - The Mobile Space and Transmedia:  A Critical Content Platform for...CTIA 2009 - The Mobile Space and Transmedia:  A Critical Content Platform for...
CTIA 2009 - The Mobile Space and Transmedia: A Critical Content Platform for...
 
문제점
문제점문제점
문제점
 
Pre-Cal 40S Slides April 12, 2007
Pre-Cal 40S Slides April 12, 2007Pre-Cal 40S Slides April 12, 2007
Pre-Cal 40S Slides April 12, 2007
 
For Liz and Nolan
For Liz and NolanFor Liz and Nolan
For Liz and Nolan
 

Similar to Privacy study Mobile and online Dating

Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docxRunning Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
todd521
 
ConsumerPrivacy-BEAR-2015-Final (1)
ConsumerPrivacy-BEAR-2015-Final (1)ConsumerPrivacy-BEAR-2015-Final (1)
ConsumerPrivacy-BEAR-2015-Final (1)Zohra Razaq
 
Doc handout
Doc handoutDoc handout
Doc handout
Nhật Anh Nguyễn
 
Bullying, Online Predatory Action And Identity Theft
Bullying, Online Predatory Action And Identity TheftBullying, Online Predatory Action And Identity Theft
Bullying, Online Predatory Action And Identity Theft
Heather Dionne
 
LIBRA: IS IT REALLY ABOUT MONEY? Valerie Khan
LIBRA: IS IT REALLY ABOUT MONEY? Valerie KhanLIBRA: IS IT REALLY ABOUT MONEY? Valerie Khan
LIBRA: IS IT REALLY ABOUT MONEY? Valerie Khan
eraser Juan José Calderón
 
Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy  Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy
Carolina Rossini
 
Designing for Privacy NY Studio—10/04/21
Designing for Privacy NY Studio—10/04/21Designing for Privacy NY Studio—10/04/21
Designing for Privacy NY Studio—10/04/21
Robert Stribley
 
Raytheon-NCSA_Millennial_Survey_report_2014
Raytheon-NCSA_Millennial_Survey_report_2014Raytheon-NCSA_Millennial_Survey_report_2014
Raytheon-NCSA_Millennial_Survey_report_2014Blair Gately
 
A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...
A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...
A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...
ijsptm
 
eMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, Feds
eMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, FedseMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, Feds
eMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, Feds
eMarketer
 
Privacy vs personalization: advisory for brand and comms practitioners into 2...
Privacy vs personalization: advisory for brand and comms practitioners into 2...Privacy vs personalization: advisory for brand and comms practitioners into 2...
Privacy vs personalization: advisory for brand and comms practitioners into 2...
Dave Holland
 
Blue Coat 2013 Systems Mobile Malware Report
Blue Coat 2013 Systems Mobile Malware ReportBlue Coat 2013 Systems Mobile Malware Report
Blue Coat 2013 Systems Mobile Malware ReportContent Rules, Inc.
 
Designing for Privacy in an Increasingly Public World — Speed Talk
Designing for Privacy in an Increasingly Public World — Speed TalkDesigning for Privacy in an Increasingly Public World — Speed Talk
Designing for Privacy in an Increasingly Public World — Speed Talk
Robert Stribley
 
Data Mining: Privacy and Concerns
Data Mining: Privacy and ConcernsData Mining: Privacy and Concerns
Data Mining: Privacy and ConcernsBradley Buchanan
 
Role of CAs in cyber world
Role of CAs in cyber worldRole of CAs in cyber world
Role of CAs in cyber world
CA. (Dr.) Rajkumar Adukia
 
LifeLock Javelin Presentation
LifeLock Javelin PresentationLifeLock Javelin Presentation
LifeLock Javelin Presentation
LifeLockBusinessSolutions
 
A Call to Action: Protecting the Right to Consumer Privacy Online
A Call to Action: Protecting the Right to Consumer Privacy OnlineA Call to Action: Protecting the Right to Consumer Privacy Online
A Call to Action: Protecting the Right to Consumer Privacy Online
Brenden Brown
 
Social networking boon or a bane
Social networking boon or a baneSocial networking boon or a bane
Social networking boon or a bane
Abhishek Sharma
 

Similar to Privacy study Mobile and online Dating (20)

Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docxRunning Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
 
ConsumerPrivacy-BEAR-2015-Final (1)
ConsumerPrivacy-BEAR-2015-Final (1)ConsumerPrivacy-BEAR-2015-Final (1)
ConsumerPrivacy-BEAR-2015-Final (1)
 
Doc handout
Doc handoutDoc handout
Doc handout
 
Social Network Crime on Rise
Social Network Crime on RiseSocial Network Crime on Rise
Social Network Crime on Rise
 
Bullying, Online Predatory Action And Identity Theft
Bullying, Online Predatory Action And Identity TheftBullying, Online Predatory Action And Identity Theft
Bullying, Online Predatory Action And Identity Theft
 
LIBRA: IS IT REALLY ABOUT MONEY? Valerie Khan
LIBRA: IS IT REALLY ABOUT MONEY? Valerie KhanLIBRA: IS IT REALLY ABOUT MONEY? Valerie Khan
LIBRA: IS IT REALLY ABOUT MONEY? Valerie Khan
 
Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy  Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy
 
Designing for Privacy NY Studio—10/04/21
Designing for Privacy NY Studio—10/04/21Designing for Privacy NY Studio—10/04/21
Designing for Privacy NY Studio—10/04/21
 
Raytheon-NCSA_Millennial_Survey_report_2014
Raytheon-NCSA_Millennial_Survey_report_2014Raytheon-NCSA_Millennial_Survey_report_2014
Raytheon-NCSA_Millennial_Survey_report_2014
 
A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...
A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...
A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...
 
eMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, Feds
eMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, FedseMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, Feds
eMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, Feds
 
Privacy vs personalization: advisory for brand and comms practitioners into 2...
Privacy vs personalization: advisory for brand and comms practitioners into 2...Privacy vs personalization: advisory for brand and comms practitioners into 2...
Privacy vs personalization: advisory for brand and comms practitioners into 2...
 
Blue Coat 2013 Systems Mobile Malware Report
Blue Coat 2013 Systems Mobile Malware ReportBlue Coat 2013 Systems Mobile Malware Report
Blue Coat 2013 Systems Mobile Malware Report
 
Designing for Privacy in an Increasingly Public World — Speed Talk
Designing for Privacy in an Increasingly Public World — Speed TalkDesigning for Privacy in an Increasingly Public World — Speed Talk
Designing for Privacy in an Increasingly Public World — Speed Talk
 
Data Mining: Privacy and Concerns
Data Mining: Privacy and ConcernsData Mining: Privacy and Concerns
Data Mining: Privacy and Concerns
 
Role of CAs in cyber world
Role of CAs in cyber worldRole of CAs in cyber world
Role of CAs in cyber world
 
LifeLock Javelin Presentation
LifeLock Javelin PresentationLifeLock Javelin Presentation
LifeLock Javelin Presentation
 
A Call to Action: Protecting the Right to Consumer Privacy Online
A Call to Action: Protecting the Right to Consumer Privacy OnlineA Call to Action: Protecting the Right to Consumer Privacy Online
A Call to Action: Protecting the Right to Consumer Privacy Online
 
Social networking boon or a bane
Social networking boon or a baneSocial networking boon or a bane
Social networking boon or a bane
 
Facebook
FacebookFacebook
Facebook
 

Recently uploaded

Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 

Recently uploaded (20)

Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 

Privacy study Mobile and online Dating

  • 1. Protect your privacy: Mobile & Digital Privacy and Awareness August 2012 A short study by the team of MobiDigger, Inc. – Mountain View, CA Authors: Hubert A.-M. Moik, 44, CEO MobiDigger, Inc. 14 years in the telecom/mobile industry, former CEO/Managing Director of Inside M2M, Data Storm Systems, Planetlive et. al. entrepreneur since 1993, member of SVASE, SDForum et. al., Founder & Partner GO Silicon Valley Juan C. Ramírez, 28, Market Research. MobiDigger, Inc. 1 year in hi-tech, 3.5 years in capital markets Economist and MS in Business Nick Vecchio, 22 3 years in mobile industry, College Student Website developer, Web marketing, Sales
  • 2. Overview In a world where Google, Facebook, Twitter and other top web sites share and save user information, it is increasingly hard to protect individual privacy in new media—on the Internet and mobile phones. At the same time, information about privacy protection is very hard to find. Further, the majority of people who use the Internet are generally not properly informed about new media privacy issues. To help users protect themselves, this presentation explores Internet and mobile privacy problems and solutions through reviews of case studies. It is designed to educate users of new media in both key issues and solutions. Problem Contrary to conventional wisdom, privacy concerns are not limited to the Internet. It also encloses mobile phones, which penetration in America reached 104.6% in 2011 (totaling 331.6 million subscribers) therefore exceeding the US population1. Even one-third of American households now have wireless device only2. Users are largely unaware that cell phone messages -even simple text messages- ultimately can end up in the hands of strangers and even on the Internet. Worse, for example, new “smart phones” send information about the phone’s location to databases. Though such databases usually are not public, they also are not private; this information, then can pose a danger to the person who uses their phone to communicate with strangers or other acquaintances, to whom they normally would not reveal their locations. Private cell-phone information can also be revealed through a “reverse search,” in which anyone can search a cell phone number to find the owner’s name and address. In terms of the Internet, private information actually flows quite freely. Today, the most visited websites share information, save information, and facilitate visitors’ buying and selling of personal data. But many visitors to such sites do not realize that these pages’ hosts share information they obtain from visitors. For instance, agencies of the government obtain Facebook and Twitter users’ info and routinely request cell phone carriers for their customers’ phone records as well3. With the existence of so many social media sites such as Google+, Facebook, Foursquare, Twitter and so forth, more concerns raise upon privacy issues. In a recent poll 59%4 of the respondents said they had little or no trust in Facebook, to keep their information private. A study released in 2011 showed that 45% of the top 185 US web sites transmitted identity details to at least four other websites. It was discovered that one online dating website transmitted information regarding gender, zip code and age to websites which auction personal data5. Google is known to compile private consumer information by using tracking cookies on 712 of the top 1,000 websites6. Often many people ignore how vulnerable they are by posting on their ‘walls’, because they don’t know default privacy settings allow everyone to follow what you are doing. A simple update in 1 http://www.ctia.org/advocacy/index.cfm/AID/10323 2 Blumberg, S., Luke, J. (2012) Wireless substitution: Early release of estimates from NHIS july-Dec 2011. CDC.06/12 3 http://blogs.cio.com/mobilewireless/17266/your-smartphone-spy-government 4 http://socialbarrel.com/facebook-vs-twitter/41152/ 5 http://blogs.wsj.com/digits/2011/10/11/privacy-study-top-u-s-websites-share-visitor-personal-data/ 6 http://www.bizjournals.com/sanfrancisco/news/2012/06/28/web-privacy-study-google-tracking.html
  • 3. the Facebook profile such “I just drove 50 miles for the best ice cream” gives criminals a head start to break into your home. And even worse, track you on your way back. In certain applications such as Google’s Latitude, people publicly share their location to the world if they don’t setup privacy settings correctly. It has been reported by a blogger that he was able to follow people he didn’t even know, using information he gathered from the internet from unaware people. Hence, these sorts of things make it very easy for crime perpetrators to track their victims. Scams and spam are also major problems on the Internet today. One of America’s most popular websites, Craigslist is plagued with scammers who have devious ways of stealing users’ information and money. Craigslist is not unique. In addition to websites, email spam is an all-too- common way for con artists to try to communicate with strangers, posing as friends in order to acquire information and steal money. Fake proxy websites are also a problem. While some proxies have a legitimate use (as when students go to a proxy server in order to log-in to Facebook), ample cases have shown that some proxies present fake versions of Facebook, for example, in order to obtain log-in user names and their corresponding passwords. The fake proxy website automatically sends this information to a database, which then logs into the account and records all of the user’s account information. Many websites offer a “free” gift or service, but by accepting such offers, users are often agreeing to lengthy contracts with monthly fees. For example, “free” credit-report websites often request credit card information, tricking the user into a monthly fee. Which is automatically charged to the credit card, thus the credit report is not free at all. This is a common strategy; many websites charge users for single visits, subscriptions, or for a monthly service. Often, other websites say they are “free” and, yet, they request credit card information. This can indicate that the site is a fraud; often such sites will enroll the user into a monthly fee arrangement or, often, sell the subscriber’s credit card information to a third party. In response to the upwardly demand for the need to certify the identity of online daters. Many websites similar to the credit card score described above emerged. These sites offer online daters to check their date’s ID to make sure they are who they claim to be. Most of the online dating verifications sites are also known to be scams that trick customers to give away their credit card info and get them into costly fees or lengthy contracts without satisfactory results. Status Quo Many users, particularly children, are unaware of many privacy issues that exist, and some of these can be dangerous. People who “blind” date or participate in internet dating, often provide personal information as well as their cell phone numbers. But, with just a cell phone number, criminals can find a person’s name, address, and other information. Location information is also available via Facebook “Places,” Twitter, FourSquare, and Google+ to name just a few, and these sites are catalysts for publicly sharing this information. For example, if an address is listed with Google via Gmail, Google+ will provide the location (and, possibly, the address) of such users. So, anonymously, other users can obtain the
  • 4. addresses of users who wish to retain their privacy. Further, Google can reveal a person’s location when they simply perform a search on a smart phone or computer. The Internet often facilitates meetings between people who have never met before and, sometimes, these encounters result in crime and victimization. A few news stories emerged of violent crimes being perpetrated by predators who found and contacted their victims using Craigslist. Teens, too, using their cell phones to send raunchy text messages and/or sexual pictures, can be victimized by their own activities. Sometimes, such messages end up in the wrong hands or, worse, under many eyes, and this exposure can cause consequences that are much more serious than embarrassment. If someone subscribes to a service or product, often scammers will sell the subscriber’s phone number and any other available data to solicitors. While users can subscribe to a “Do Not Send” list, this is a general “opt-out” of all text messaging, - senders of messages have to obey the rules - but one could ask: which spammer will do that? The Facts of Today As of the Pew Research Center’s Internet & American Life Project report 4% of cell-owning teens ages 12-17 say they have sent sexually suggestive nude or nearly nude images or videos of themselves to someone else via text messaging, a practice also known as ‘sexting’; 15% say they have received such images of someone they know via text message. 50 million new classified ads7 are posted each month on Craigslist, and most involve a face-to- face meeting. Since 2005, several shocking murders, robbery and slaying crimes8 linked to contact originated through Craigslist, had a notable attention of the US media, creating awareness on a new modality of crime generated through online advertising. In 2011 only, 330 crimes9 were linked to Craigslist ad postings. Dating is another alarming issue which has increased dramatically with the booming of the online dating services. This industry is bigger than porn, has been worth $1,3 billion in 2011, and is expected to reach $1.7 billion by 2013. The mobile dating market ($550 million in 2010) has also experienced a rapid 90% growth since 2010 as the activity of online daters is shifting to a 3 to 1 ratio from mobile to web users10. In the US are 45M+ active online dating users, the second biggest market only after China, and ahead of India. Nowadays 49% of US households are led by a single adult and one in five relationships start on the Internet. But an astonishingly number of 1 out of 10 subscribers are fake profiles, created by scammers, that primarily victimize people over 40 years - however all demographics are at risk. Last year 5,663 romance scams were reported, totaling economic losses of $50.4M. Craigslist has been a main vehicle for this type of scams and its owner took initiative to shut down one of their personal services, partly out of concern for the safety of the users. 7 http://www.craigslist.org/about/factsheet 8 http://www.newsnet5.com/dpp/news/national/notable-craigslist-related-crimes 9 http://blog.sfgate.com/techchron/category/craigslist/ 10 http://oxfordtechnologyventures.com/mobile-and-online-dating-sites/
  • 5. 11 Source: FBI – 2011 Annual Internet Crime Report Previous Case Studies In the last few years, many different issues have surfaced with regard to the growing number of cases involving Internet and mobile phone security and privacy. As more and more people become increasingly dependent on technology in both their professional and personal lives, it is vital that they become aware of the dangers, as well. It is important, that users of technology pay attention to developments and learn from the resources available to aid in safety and security.  In Alabama authorities arrested four middle-school students for exchanging nude photos of themselves.  A 20 year old man who met a 15 year old girl on the Xbox game ‘Halo’ and drives 40 hours to stalk and text incriminating messages12.  In Washington a man along with his accomplices were arrested after murdering a man who posted a Craigslist ad to sell a ring. The group stormed the house and killed the seller while trying to defend his family.  A Boston medical student was charged with murder, armed robbery, and kidnapping after targeting women of erotic services of Craigslist. At 22, he tried to rob a woman found through the internet and when she struggled, he shot her.  A blog on "bodybuilding.com" was the host for a series of events that lead to the death of a 19 year old on a webcam. He died from an overdose of opiates and benzodiazepine that apparently was encouraged by some watching the webcam. A South Florida college student was on a live webcam for 12 hours telling people he was going to commit suicide. Some watching and some helping, the website became aware of the act about 4 hours before he was found dead. General statistics say 50% of children are either bullied or involved in bullying. When two high school students recently killed themselves after being bullied, Fox News correspondent Dr. Keith Ablow said, “The advent of new technologies makes it more apparent and more able for kids to bully.” 11 http://www.ic3.gov/media/annualreport/2011_IC3Report.pdf 12 http://www.switched.com/2008/01/04/man-drives-40-hours-to-stalk-15-year-old-girl-he-met-online-in-h/
  • 6. By the end of 2010, the “The National Intimate Partner and Sexual Violence Survey” released a report for the National Center for Victims of Crime13. The study found that in the U.S. there had been approximately 6.6 million adult stalking victims during 2010. Of these victims:  11% of victims were stalked for 5 years or more  66.2% of stalking victims experienced unwanted phone calls or messages  46% of victims encountered weekly an unwanted interaction with a stalker  Stalkers’ most common tactic was telephone calls, voice or text messages  10% of the victims were monitored using a GPS system (like the one embedded in smartphones)  33% were stalked by people they didn’t know at all  Approximately 25% experienced some form of cyberstalking such as email or instant messaging  During any point of their lifetime 1 in 6 women and 1 in 19 men had experience stalking Source: http://www.thewell.vcu.edu/docs/stalking_statistics.pdf Solutions This part includes more information on how those who date can increase their safety when they are using the Internet to socialize and the cell phone to make and/or stay in contact with their blind date. It’s important that Internet and mobile users obtain good, overall knowledge of what’s going on today in terms of privacy and safety. The following resources are good examples of information sources that will help users protect themselves. The links, blogs, services and articles listed below pertain to various lifestyles and a range of user styles, from kids to parents and from smartphone texters to Craigslist sellers. In 2010, a website called “PleaseRobMe” was setup to reveal as much personal information as possible to show unaware users, what they actually publish. The site ran a program that scanned Facebook and Twitter profiles that had no privacy settings, and then it recorded when people said they were out doing something i.e. “getting food in San Francisco!” The program then found their address and posted on the site where people were, their home address, and approximately how long until they were going to return home. The site demonstrated, how easy it 13 http://www.victimsofcrime.org/our-programs/stalking-resource-center/stalking-information
  • 7. is to learn too much information about people online. This extreme case clearly indicates that people need to pay close attention and be mindful of the information that they provide to the public via their “private” networking. As the site’s creators explained “The danger is publicly telling people where you are. This is because it leaves one place you're definitely not... home“14 Similarly, by the middle of 2011 a Facebook app called “Take This Lollipop” circulated in the Internet scaring users and raising the alarms yet again on how your private information can be easily compile by third parties. As with all Facebook apps, users are requested to grant access to Take This Lollipop to the user’s profile info. Once the user grants the access, the screen goes black and appears a video of an unkempt looking man in front of a computer typing a password to the user’s Facebook login ID. Then he browses through the user’s Facebook profile and humps into his car with a picture of the user in his dashboard, heading to track him/her. On the one hand, the emergence of this app also serves as a reminder to people that they have to be careful with the information they share online and that most users ignore how to set privacy settings to avoid sharing sensitive information. On the other hand, that apps for Facebook and also smartphones are a way for third parties to access users’ information and track their consumer behavior for the purpose of developing better ads. It might be argued that the best way to protect yourself is not to use the Internet at all—no Facebook, no Twitter, no smartphones, no downloading, no social networking, no “googling”, no texting. The problem with this solution is that it’s not reasonable, since it is not realistic to suggest that people should not use the Internet or mobile phones! The Internet is part of our daily life. It can present dangers, but it can also make our lives much more interesting, productive, profitable, and personally rewarding. So, avoiding the Internet is not the answer. The answer is to seek out safe and practical solutions. To address the problem of credit card fraud, for example, there are a few solutions. The best, of course, is never to use your credit card online and never provide it to any “free” websites. When you are buying a product online, a good option is to go to a store and purchase a temporary card with cash on it. This is secure and the only amount at risk is what you put on the card. While this can be stolen, no personal or financial information goes with it. Google has a service that does something similar, where customers put money into an online account. The following website is a resource: www.annualcreditreport.com. As mandated by the FTC, this site offers each person one free credit check each year, and it does not require a credit card number. For online daters who want to make a background check on their blind dates, this web site can come in handy: www.wegolook.com has a group of inspectors in the field, across the US, that verifies in person the identity of the date of an end user. It requires a one-time payment per report requested. Mobile is a new playing field for spammers, scammers and stalkers. For users who do not want to receive commercial messages (as text ads or robocalls) the easiest way to “opt out” of these is to list their number on the “donotcall”- and the donotsend” lists”15, provided by the FCC under the CAN-SPAM act of 200716. 14 www.pleaserobme.com 15 http://www.fcc.gov/cgb/consumerfacts/canspam.html 16 https://www.donotcall.gov
  • 8. The problem with these lists is, that they exclude a user basically from receiving any marketing messages and an opt in into a wanted messaging service becomes actually a legal balance act for the sender of these messages. The new service MobiDigger (learn more on page 11) offers a solution for users and advertisers, keeping users safe with a nickname accompanied to their mobile phone and establishes a basis for dating, advertising and classified services within a safe mobile environment.
  • 9. References: General Information: - http://www.pewinternet.org/Reports/2009/Teens-and-Sexting.aspx - http://blogs.computerworld.com/15559/google_buzz_and_you_thought_firefox_had_privacy_issues Who Can Help? - Privacy Rights Clearinghouse: http://www.privacyrights.org/links.htm - EPIC (Electronic Privacy Information Center) http://epic.org/privacy/privacy_resources_faq.html - http://phonesmrt.blogspot.com - http://scaryviral.blogspot.com 4 Kids: - http://www.pbs.org/wgbh/pages/frontline/kidsonline/ - http://www.youtube.com/watch?v=kUyQI0USNSY&feature=dir - http://www.ikeepsafe.org - http://www.isafe.org - http://www.wiredsafety.org - http://www.childnet-int.org - http://www.netsmartz.org/index.aspx 4 Parents: - http://www.fbi.gov/publications/pguide/pguidee.htm - http://www.onguardonline.gov - http://www.getnetwise.org - http://resources.kaboose.com/safe-surf/parents-intro.html 4 Dating Users: - http://internetsecuritytips.wordpress.com - http://www.brighthub.com/internet/security-privacy/articles/11438.aspx - http://www.articlesbase.com/security-articles/top-5-internet-security-tips-3109845.html - http://www.saferonlinedating.org/tips 4 Sales / Classified Users: - http://www.craigslist.org/about/scams - http://techblog.homeservicesne.com/?p=236 Resources: - http://voices.washingtonpost.com/posttech/2010/06/congress_looks_at_mobile_locat.html - http://life.familyeducation.com/teen-relationships/sexting/63750.html - http://www.privacyrights.org/fs/fs2b-cellprivacy.htm -http://www.fastcompany.com/1658963/smartphone-security-personal-data-lock-crime-thieves-gadgets- information- pin - http://www.cnn.com/2010/LIVING/10/26/teens.digital.dating.abuse/index.html?iref=allsearch -http://www.washingtonpost.com/national/illinois-employers-barred-from-asking-job-applicants-to-hand- over-social-networking-passwords/2012/08/01/gJQA3VxrPX_story.html - http://socialbarrel.com/facebook-vs-twitter/41152/ - http://www.reuters.com/article/2012/07/23/google-lobbying-idUSL2E8INHFA20120723 - http://media.cbronline.com/news/google-to-pay-22m-for-privacy-settlement-over-safari-browser-010812 - http://www.theverge.com/2012/7/11/3151478/microsoft-bing-google-privacy-marketshare-relevance -http://www.out-law.com/en/articles/2012/july/google-admits-not-all-unlawfully-collected-street-view-data- has-been-deleted/
  • 10. - http://www.statisticbrain.com/online-dating-statistics/ - http://www.onlinedatingdvd.com/blog/2011/08/online-dating-statistics/ - http://www.victimsofcrime.org/our-programs/stalking-resource-center/stalking-information - http://blogs.cio.com/mobilewireless/17266/your-smartphone-spy-government -http://www.thenewamerican.com/usnews/constitution/item/12329-govt-may-now-collect-catalog-and- store-all-private-information Note: This document references to registered trade marks such as Facebook®, Google®, FourSquare® , Twitter®, Craigslist®, MobiDigger®, WeGoLook®, Latitude® MobiDigger: User portal: http://www.mobidigger.com Service portal: http://www.mobidigger-inc.com Facebook page: http://www.facebook.com/MobiDiggerInc
  • 11. About MobiDigger® As cell phones and email are an essential item in our life, MobiDigger has become the tool to protect us from every day’s threats accompanied by the daily usage of our mobile phones. While numbers of texted ads will increase significantly over the next few years, this service is available to help mobile phone users to maintain their privacy. Some new services help increase mobile phone users’ security. MobiDigger assigns nicknames to phone numbers and also offers other perks to increase phone user safety. This text messaging service provides “alias and domain service,” an excellent option for mobile privacy as they do not share any of users’ personal information. By choosing a nickname to your mobile number, users can pick a basic, professional, or dating plan based on their lifestyle. Simply protecting their identity, meet work contacts or make friends using a profile they create. MobiDigger is naming mobile phone numbers via a mobile messaging system, using a short code (96527), which brings a nickname/address to conventional, existing mobile phones. Users are able to block people from sending unwanted text messages and emails to a phone with a simple text message. Users can receive advertising, offers and coupons without revealing their phone # or email address. The service has grown to over 11,500,000 users and is now partnering with local and US wide sponsors to expand the possibilities of safe networking! Contact: MobiDigger, Inc. www.mobidigger.com 465 Fairchild Ave., Suite 223 hubert.moik@mobidigger-inc.com Mountain View, CA 94043 juan.ramirez@mobidigger-inc.com