SlideShare a Scribd company logo
The Deception of Privacy
The Truth About a Plugged in Life
By Cynthia Beneteau
Photo Source: Kristin Flour “Secret” Unsplash https://unsplash.com/collections/327093/privacy-kit?photo=BcjdbyKWquw
Prior to the digital age photos were typically just
shared with a handful of people, like friends and
family. Now, people take more photos in 2
minutes than the entire amount of all the photos
that existed 150 years ago. [2]
The top three places photos are uploaded to are:
Snapchat: 8796 photos per second
What's App : 8102 photos per second
Facebook :4501 photos per second [3]
Photo Source : Gratisography http://colorlisa.com/pictures/105_1.jpg
Today’s youth think of privacy
differently than adults do. They
care more about controlling who
is tracking them digitally, who is
seeing what they post and what
people think when seeing them.
The online experience for young
people is a social one. If
something is posted they do not
like, they are more likely to worry
about hiding the content from
their friends or family, than to
worry about teachers or potential
employers seeing it. They care
more about their reputation than
the actual information they are
posting[4]
Photo Source: http://www.gratisography.com/pictures/303_1.jpg
Parents need to consider the
long term reach of the digital
information they are sharing
about their children. A “cute”
video of a child doing something
silly, can come back to haunt that
same child when they become a
teenager or adult.
Even innocent stories shared by
a parent may be a potential
source of embarrassment to a
child later on. Children, youth and
teens should be able to control
their digital identities. There is a
balance that can be reached, a
parent can share information, but
limit identifying characteristics so
that it protects their children,
but they can still share [6]
Photo source: https://pixabay.com/en/desperate-sad-depressed-feet-hands-2293377/
72% of Parents are worried about their children’s online interactions with strangers or predators
that could harm them. Two major concerns are sexting and cyberbullying. Kids can be horrible to
each other and some are even using the internet to create fake identities of other children. They then
pose as the child and fabricate information about them. Parents are more than willing to potentially
embarrass their child if it will help to keep them safe. [7]
Photo Source https://pixabay.com/en/privacy-policy-spy-espionage-nsa-1624400
A Study done by “Young Canadians in
a Wired World” has indicated more
privacy education in schools and
homes is needed. According to the
study, students have limited
comprehension of password
sharing, privacy policies, policies
around data collection and geo-
location services
68% of Students incorrectly believe,
that a website will not share their
personal information if they have a
privacy policy [5]
Photo Source : https://www.pexels.com/photo/finger-print-on-enter-key-of-keyboard-163017/
“ We make big trade-offs as we become digitally
connected everywhere and anytime” causing increased
concerns with security and privacy [1]
John Palfrey and Urs Gasser, Authors of Interop. The Promise and Perils of Highly Interconnected Systems
Photo Source : https://static.pexels.com/photos/160709/raccoon-animal-animal-world-wildlife-photography-160709.jpeg
Over a two week period, Carnegie Mellon University Computer
Scientist’s ,did a study which determined that quite a few popular
Android apps collect GPS coordinates within 50 metres of where the
user is. This happens about 6200 times, which is equivalent to about
every three minutes [8]
Photo Source : https://www.pexels.com/photo/text-on-information-sign-258490/
The Carnegie Mellon study also uncovered that the Weather Channel app accesses location
information from it’s users every 10 minutes, or 2000 times in a two week period.[8]
Photo Source: https://www.pexels.com/photo/reflection-of-building-on-body-of-water-at-daytime-166360
When users in the Carnegie study found out how much personal data apps were
collecting they tried to restrict the apps from collecting it. Researchers tried to help by
sending daily “privacy nudges” to participants letting them know how many times
apps were collecting their data [8]
Operating updates ,since the study was conducted ,have now removed the software
that researchers used to see requests for personal information and the ability to send
“privacy nudges “ has also been disabled [8]
Photo Source: https://www.pexels.com/photo/london-new-york-tokyo-and-moscow-clocks-48770/
Facebook is able to know who your friends and acquaintances are
even if you lie about all of your personal information when signing
up [9]
Photo Source : https://www.pexels.com/photo/photo-of-2-children-walking-23971/
Facebook uses Network Science a complex
academic field, which uses mapping
algorithms, that takes information you provide
or give permission for them to access when
you sign up. It then uses it to determine the
structure of your social network. This data is
analyzed and allows them to accurately predict
people you are likely to know and even people
you will likely know in the future. [9]
Photo Source : https://www.pexels.com/photo/hand-thumbs-up-thumb-black-and-white-8252/
Samsung Smart TV
owners are susceptible
to spying. According to
“WikiLeaks” documents
a program named
“Weeping Angel” can
make Samsung’s Smart
TVs appear to be turned
off ,when they really are
not. This enables the TV
in essence, to work like a
bug and record
conversations in the
room. These are then
sent to a hidden CIA
server. Michael Hayden,
ex CIA director, thinks
this is a wonderful
capability because there
are “ bad people in the
world that have
Samsung TVs “ [ 10]
Photo Source: https://www.pexels.com/photo/full-frame-shot-of-eye-251287/
Samsung’s Smart TV Privacy Policy States "Please be aware that if your spoken words include
personal or other sensitive information, that information will be among the data captured and
transmitted to a third party."
A lot of Samsung TVs need users to actually click a microphone button before the voice
commands work, but on models such as PN60F8500 the microphone is always listening. [10]
Photo source : https://www.pexels.com/photo/night-music-band-microphone-9137
Web cams can introduce a number
of possible privacy breaches in our
homes, nurseries, on our laptops,
computers, tablets or anywhere we
have online cameras [11]
Photo source: https://www.pexels.com/photo/silver-imac-near-white-ceramic-kettle-205316/
The frightening idea of someone watching every movement your baby makes
is a very real possibility. The lack of the most basic security features are
making popular internet connected baby monitors vulnerable to hackers [11]
Photo Source: https://www.pexels.com/photo/newborn-child-feed-89695
Once a hacker has breached
one connected device, anything
connected to that Wi-Fi network
can potentially be accessed. [11]
Photo Source: https://www.pexels.com/photo/low-angle-photo-of-building-under-sky-69080/
The use of cameras in public spaces is
becoming more common place. Cameras
are also now on buses, subways, in ATM
machines, and outside gas stations or
grocery stores. [12]
Photo Source : https://www.pexels.com/photo/black-and-white-streets-bridge-jacket-70402
/
Photo Source: https://www.pexels.com/photo/5th-avenue-america-apple-store-architecture-279166
With the advent of
Google Street view it is
now possible to view
someone’s home,
business or even their
vehicle from the comfort
of your living room
The expectation of
privacy in the digital
age may no longer be
an option. Perhaps we
need to redefine what
privacy means and the
repercussions of this
new interpretation.
Photo Source: https://www.pexels.com/photo/butterflies-black-and-white-9159/
Sources:
1. Matrix, Sidneyeve “ John Palfrey and Urs Gasser Quote” Module 3 Slides Film 260 Queens University May 2017.
2. Eveleth, Rose. "How Many Photographs Of You Are Out There In The World?". The Atlantic. N.p., 2017. Web. 2 June 2017.
https://www.theatlantic.com/technology/archive/2015/11/how-many-photographs-of-you-are-out-there-in-the-world/413389/
3. Morrison, Kimberlee, and Kimberlee Morrison. "How Many Photos Are Uploaded To Snapchat Every Second?". Adweek.com. N.p., 2017. Web. 2
June 2017.http://www.adweek.com/digital/how-many-photos-are-uploaded-to-snapchat-every-second/
4. "Online Privacy, Online Publicity: Youth Do More To Protect Their Reputation Than Their Information | Mediasmarts". Mediasmarts.ca. N.p.,
2017. Web. 2 June 2017. http://mediasmarts.ca/blog/online-privacy-online-publicity-youth-do-more-protect-their-reputation-their-information
5. Bogart, Nicole. "Young Canadians Lack Understanding Of Online Privacy: Study". Global News. N.p., 2017. Web. 2 June 2017.
http://globalnews.ca/news/1159724/young-canadians-lack-understanding-of-online-privacy-study/
6. Dell’Antonia,Kj “ Don’t post about me on Social Media, Children say” The New York Times March 2017
https://well.blogs.nytimes.com/2016/03/08/dont-post-about-me-on-social-media-children-say/?_r=0
7. Paul, P. (2013, May 5). Cyberparenting and the Risk of T.M.I. New York Times, p. 8(L). Retrieved from
http://go.galegroup.com.proxy.queensu.ca/ps/i.do?p=AONE&sw=w&u=queensulaw&v=2.1&it=r&id=GALE%7CA328694536&asid=ed444bf722dd5
54a00a728a96a4737f2
8. Dwoskin, E. “WSJ.D technology: Apps track users -- once every 3 minute”s. Wall Street Journal Mar 24 2015 . Retrieved from https://search-
proquest-com.proxy.queensu.ca/docview/1665403896?accountid=6180
9. Dewey, Caitlin “How Facebook knows who all your friends are, even better than you do”. Washingtonpost.com. April2 2015 Retrieved from
http://go.galegroup.com.proxy.queensu.ca/ps/i.do?p=AONE&sw=w&u=queensulaw&v=2.1&it=r&id=GALE%7CA408035312&asid=97bdc5e16299b
f6c66dcb7543481dace
10. "If You Have A Smart TV, Take A Closer Look At Your Privacy Settings". BuzzFeed. N.p., 2017. Web. 2 June 2017.
https://www.buzzfeed.com/nicolenguyen/here-are-the-privacy-settings-you-should-look-at-if-you-have?utm_term=.nqkg6Z0A7N#.cidNjp56Ov
11. "Is Your Baby Monitor Safe? Cybersecurity Firms Says Many Can Be Hacked". CBC News. N.p., 2017. Web. 2 June 2017.
http://www.cbc.ca/news/business/several-baby-monitors-vulnerable-to-hacking-cybersecurity-firm-warns-1.3213046
12. Alcoba, Natalie. "Growing Number Of CCTV Surveillance Cameras Outside City Core Dismays Privacy Advocates". National Post. N.p., 2017.
Web. 2 June 2017.
http://news.nationalpost.com/toronto/growing-number-of-cctv-surveillance-cameras-dismays-privacy-advocates
Photo Source : https://www.pexels.com/photo/full-frame-shot-of-metal-332834

More Related Content

What's hot

Social Media Career Assignment
Social Media Career AssignmentSocial Media Career Assignment
Social Media Career Assignment
Raechel Mills
 
IS SLACKTIVISM REALLY AS BAD AS THEY SAY IT IS? | Karen Clement
IS SLACKTIVISM REALLY AS BAD AS THEY SAY IT IS? | Karen ClementIS SLACKTIVISM REALLY AS BAD AS THEY SAY IT IS? | Karen Clement
IS SLACKTIVISM REALLY AS BAD AS THEY SAY IT IS? | Karen Clement
Karen Clement
 
Film260 Flipbook
Film260 FlipbookFilm260 Flipbook
Film260 Flipbook
Katherine Tang
 
Film260 digitalflipbookshannongrist
Film260 digitalflipbookshannongristFilm260 digitalflipbookshannongrist
Film260 digitalflipbookshannongrist
Shannon Grist
 
Social Media and Depression
Social Media and DepressionSocial Media and Depression
Social Media and Depression
Damon Auguste
 
Film 260 flipbook
Film 260 flipbookFilm 260 flipbook
Film 260 flipbook
Chuyun Xu
 
Privacy hazard
Privacy hazardPrivacy hazard
Privacy hazard
Cecilia Liang
 
Why choose m commerce
Why choose m commerceWhy choose m commerce
Why choose m commerce
Julie JiEun Jung
 
Social media, friend or foe?
Social media, friend or foe?Social media, friend or foe?
Social media, friend or foe?
tharshni
 
Social Media Is Not Social
Social Media Is Not SocialSocial Media Is Not Social
Social Media Is Not Social
Brett Sykes
 
260 flipbook
260 flipbook260 flipbook
260 flipbook
SylllviaLi
 
Your posts are not private
Your posts are not privateYour posts are not private
Your posts are not private
Shawnee Liu
 
FILM260 Flipbook Assignment
FILM260 Flipbook AssignmentFILM260 Flipbook Assignment
FILM260 Flipbook Assignment
Jordan Pernari
 
Digital selfie
Digital selfieDigital selfie
Digital selfie
Jennifer Bouman
 
Cheng jessica flipbook_film260
Cheng jessica flipbook_film260Cheng jessica flipbook_film260
Cheng jessica flipbook_film260
Jessica Cheng
 
Helicopter Parent - Flipbook
Helicopter Parent - FlipbookHelicopter Parent - Flipbook
Helicopter Parent - Flipbook
Julia Holland
 
Oversharing as Modern Art
Oversharing as Modern ArtOversharing as Modern Art
Oversharing as Modern Art
Anastasia Szymanski
 
Desensitization
Desensitization Desensitization
Desensitization
14jc5
 
Food for Thought, and Instagram
Food for Thought, and InstagramFood for Thought, and Instagram
Food for Thought, and Instagram
Marie-Claire Zhang
 
Not so social
Not so social Not so social
Not so social
Hannah Kirstein
 

What's hot (20)

Social Media Career Assignment
Social Media Career AssignmentSocial Media Career Assignment
Social Media Career Assignment
 
IS SLACKTIVISM REALLY AS BAD AS THEY SAY IT IS? | Karen Clement
IS SLACKTIVISM REALLY AS BAD AS THEY SAY IT IS? | Karen ClementIS SLACKTIVISM REALLY AS BAD AS THEY SAY IT IS? | Karen Clement
IS SLACKTIVISM REALLY AS BAD AS THEY SAY IT IS? | Karen Clement
 
Film260 Flipbook
Film260 FlipbookFilm260 Flipbook
Film260 Flipbook
 
Film260 digitalflipbookshannongrist
Film260 digitalflipbookshannongristFilm260 digitalflipbookshannongrist
Film260 digitalflipbookshannongrist
 
Social Media and Depression
Social Media and DepressionSocial Media and Depression
Social Media and Depression
 
Film 260 flipbook
Film 260 flipbookFilm 260 flipbook
Film 260 flipbook
 
Privacy hazard
Privacy hazardPrivacy hazard
Privacy hazard
 
Why choose m commerce
Why choose m commerceWhy choose m commerce
Why choose m commerce
 
Social media, friend or foe?
Social media, friend or foe?Social media, friend or foe?
Social media, friend or foe?
 
Social Media Is Not Social
Social Media Is Not SocialSocial Media Is Not Social
Social Media Is Not Social
 
260 flipbook
260 flipbook260 flipbook
260 flipbook
 
Your posts are not private
Your posts are not privateYour posts are not private
Your posts are not private
 
FILM260 Flipbook Assignment
FILM260 Flipbook AssignmentFILM260 Flipbook Assignment
FILM260 Flipbook Assignment
 
Digital selfie
Digital selfieDigital selfie
Digital selfie
 
Cheng jessica flipbook_film260
Cheng jessica flipbook_film260Cheng jessica flipbook_film260
Cheng jessica flipbook_film260
 
Helicopter Parent - Flipbook
Helicopter Parent - FlipbookHelicopter Parent - Flipbook
Helicopter Parent - Flipbook
 
Oversharing as Modern Art
Oversharing as Modern ArtOversharing as Modern Art
Oversharing as Modern Art
 
Desensitization
Desensitization Desensitization
Desensitization
 
Food for Thought, and Instagram
Food for Thought, and InstagramFood for Thought, and Instagram
Food for Thought, and Instagram
 
Not so social
Not so social Not so social
Not so social
 

Similar to The Deception of Privacy, The Truth About a Plugged in Life

Is Online Privacy a Thing of the Past?
Is Online Privacy a Thing of the Past?Is Online Privacy a Thing of the Past?
Is Online Privacy a Thing of the Past?
Aleque Juneau
 
Film 260 flipbook
Film 260 flipbookFilm 260 flipbook
Film 260 flipbook
Julie Coles
 
Smartphones with Smarter Apps
Smartphones with Smarter AppsSmartphones with Smarter Apps
Smartphones with Smarter Apps
Sara Dow
 
Flipbook.pdf
Flipbook.pdf Flipbook.pdf
Flipbook.pdf
Katherine Kopiak
 
Technology & Internet Use by Baby Boomers & Beyond
Technology & Internet Use by Baby Boomers & Beyond Technology & Internet Use by Baby Boomers & Beyond
Technology & Internet Use by Baby Boomers & Beyond
genevabloemen
 
Error: Your Life Has Been Hacked
Error: Your Life Has Been HackedError: Your Life Has Been Hacked
Error: Your Life Has Been Hacked
Adelle Leonard
 
Should Kids Use Digital Technology?
Should Kids Use Digital Technology?Should Kids Use Digital Technology?
Should Kids Use Digital Technology?
Lucy Peters
 
Snapchats Linger for Longer than 10 Seconds
Snapchats Linger for Longer than 10 SecondsSnapchats Linger for Longer than 10 Seconds
Snapchats Linger for Longer than 10 Seconds
Stephanie Sheridan
 
2012bruneluniversity 120615094336-phpapp01
2012bruneluniversity 120615094336-phpapp012012bruneluniversity 120615094336-phpapp01
2012bruneluniversity 120615094336-phpapp01
Maria Palaska
 
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
IOSR Journals
 
L017146571
L017146571L017146571
L017146571
IOSR Journals
 
The Evolution of Technology & Etiquette
The Evolution of Technology & EtiquetteThe Evolution of Technology & Etiquette
The Evolution of Technology & Etiquette
Christie Stelling
 
It's a Public World, After All
It's a Public World, After AllIt's a Public World, After All
It's a Public World, After All
Julia Partington
 
Tree incident shows value of remote working
Tree incident shows value of remote workingTree incident shows value of remote working
Tree incident shows value of remote working
John Davis
 
The New Digital You
The New Digital YouThe New Digital You
The New Digital You
richbrilli
 
Bread Crumbs: How We are Building an Online Map to Ourselves
Bread Crumbs: How We are Building an Online Map to OurselvesBread Crumbs: How We are Building an Online Map to Ourselves
Bread Crumbs: How We are Building an Online Map to Ourselves
Jonah Chin
 
Private Is The New Public: How Society Is Ending Privacy
Private Is The New Public: How Society Is Ending PrivacyPrivate Is The New Public: How Society Is Ending Privacy
Private Is The New Public: How Society Is Ending Privacy
Lin Ke
 
Private Is The New Public: How Society Is Ending Privacy
Private Is The New Public: How Society Is Ending PrivacyPrivate Is The New Public: How Society Is Ending Privacy
Private Is The New Public: How Society Is Ending Privacy
Lin Ke
 
Privacy flip book assignment film 260 queensu kc
Privacy flip book assignment  film 260  queensu kcPrivacy flip book assignment  film 260  queensu kc
Privacy flip book assignment film 260 queensu kc
Catherine Cowperthwaite
 
The Evolution of Technology & Etiquette
The Evolution of Technology & EtiquetteThe Evolution of Technology & Etiquette
The Evolution of Technology & Etiquette
Christie Stelling
 

Similar to The Deception of Privacy, The Truth About a Plugged in Life (20)

Is Online Privacy a Thing of the Past?
Is Online Privacy a Thing of the Past?Is Online Privacy a Thing of the Past?
Is Online Privacy a Thing of the Past?
 
Film 260 flipbook
Film 260 flipbookFilm 260 flipbook
Film 260 flipbook
 
Smartphones with Smarter Apps
Smartphones with Smarter AppsSmartphones with Smarter Apps
Smartphones with Smarter Apps
 
Flipbook.pdf
Flipbook.pdf Flipbook.pdf
Flipbook.pdf
 
Technology & Internet Use by Baby Boomers & Beyond
Technology & Internet Use by Baby Boomers & Beyond Technology & Internet Use by Baby Boomers & Beyond
Technology & Internet Use by Baby Boomers & Beyond
 
Error: Your Life Has Been Hacked
Error: Your Life Has Been HackedError: Your Life Has Been Hacked
Error: Your Life Has Been Hacked
 
Should Kids Use Digital Technology?
Should Kids Use Digital Technology?Should Kids Use Digital Technology?
Should Kids Use Digital Technology?
 
Snapchats Linger for Longer than 10 Seconds
Snapchats Linger for Longer than 10 SecondsSnapchats Linger for Longer than 10 Seconds
Snapchats Linger for Longer than 10 Seconds
 
2012bruneluniversity 120615094336-phpapp01
2012bruneluniversity 120615094336-phpapp012012bruneluniversity 120615094336-phpapp01
2012bruneluniversity 120615094336-phpapp01
 
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
 
L017146571
L017146571L017146571
L017146571
 
The Evolution of Technology & Etiquette
The Evolution of Technology & EtiquetteThe Evolution of Technology & Etiquette
The Evolution of Technology & Etiquette
 
It's a Public World, After All
It's a Public World, After AllIt's a Public World, After All
It's a Public World, After All
 
Tree incident shows value of remote working
Tree incident shows value of remote workingTree incident shows value of remote working
Tree incident shows value of remote working
 
The New Digital You
The New Digital YouThe New Digital You
The New Digital You
 
Bread Crumbs: How We are Building an Online Map to Ourselves
Bread Crumbs: How We are Building an Online Map to OurselvesBread Crumbs: How We are Building an Online Map to Ourselves
Bread Crumbs: How We are Building an Online Map to Ourselves
 
Private Is The New Public: How Society Is Ending Privacy
Private Is The New Public: How Society Is Ending PrivacyPrivate Is The New Public: How Society Is Ending Privacy
Private Is The New Public: How Society Is Ending Privacy
 
Private Is The New Public: How Society Is Ending Privacy
Private Is The New Public: How Society Is Ending PrivacyPrivate Is The New Public: How Society Is Ending Privacy
Private Is The New Public: How Society Is Ending Privacy
 
Privacy flip book assignment film 260 queensu kc
Privacy flip book assignment  film 260  queensu kcPrivacy flip book assignment  film 260  queensu kc
Privacy flip book assignment film 260 queensu kc
 
The Evolution of Technology & Etiquette
The Evolution of Technology & EtiquetteThe Evolution of Technology & Etiquette
The Evolution of Technology & Etiquette
 

Recently uploaded

9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
saastr
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
Pablo Gómez Abajo
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
Neo4j
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
Ajin Abraham
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
ScyllaDB
 
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
Edge AI and Vision Alliance
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
Neo4j
 
Principle of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptxPrinciple of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptx
BibashShahi
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Neo4j
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Pitangent Analytics & Technology Solutions Pvt. Ltd
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
DianaGray10
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Neo4j
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
Alex Pruden
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
Ivo Velitchkov
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 

Recently uploaded (20)

9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
 
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
 
Principle of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptxPrinciple of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptx
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 

The Deception of Privacy, The Truth About a Plugged in Life

  • 1. The Deception of Privacy The Truth About a Plugged in Life By Cynthia Beneteau Photo Source: Kristin Flour “Secret” Unsplash https://unsplash.com/collections/327093/privacy-kit?photo=BcjdbyKWquw
  • 2. Prior to the digital age photos were typically just shared with a handful of people, like friends and family. Now, people take more photos in 2 minutes than the entire amount of all the photos that existed 150 years ago. [2] The top three places photos are uploaded to are: Snapchat: 8796 photos per second What's App : 8102 photos per second Facebook :4501 photos per second [3] Photo Source : Gratisography http://colorlisa.com/pictures/105_1.jpg
  • 3. Today’s youth think of privacy differently than adults do. They care more about controlling who is tracking them digitally, who is seeing what they post and what people think when seeing them. The online experience for young people is a social one. If something is posted they do not like, they are more likely to worry about hiding the content from their friends or family, than to worry about teachers or potential employers seeing it. They care more about their reputation than the actual information they are posting[4] Photo Source: http://www.gratisography.com/pictures/303_1.jpg
  • 4. Parents need to consider the long term reach of the digital information they are sharing about their children. A “cute” video of a child doing something silly, can come back to haunt that same child when they become a teenager or adult. Even innocent stories shared by a parent may be a potential source of embarrassment to a child later on. Children, youth and teens should be able to control their digital identities. There is a balance that can be reached, a parent can share information, but limit identifying characteristics so that it protects their children, but they can still share [6] Photo source: https://pixabay.com/en/desperate-sad-depressed-feet-hands-2293377/
  • 5. 72% of Parents are worried about their children’s online interactions with strangers or predators that could harm them. Two major concerns are sexting and cyberbullying. Kids can be horrible to each other and some are even using the internet to create fake identities of other children. They then pose as the child and fabricate information about them. Parents are more than willing to potentially embarrass their child if it will help to keep them safe. [7] Photo Source https://pixabay.com/en/privacy-policy-spy-espionage-nsa-1624400
  • 6. A Study done by “Young Canadians in a Wired World” has indicated more privacy education in schools and homes is needed. According to the study, students have limited comprehension of password sharing, privacy policies, policies around data collection and geo- location services 68% of Students incorrectly believe, that a website will not share their personal information if they have a privacy policy [5] Photo Source : https://www.pexels.com/photo/finger-print-on-enter-key-of-keyboard-163017/
  • 7. “ We make big trade-offs as we become digitally connected everywhere and anytime” causing increased concerns with security and privacy [1] John Palfrey and Urs Gasser, Authors of Interop. The Promise and Perils of Highly Interconnected Systems Photo Source : https://static.pexels.com/photos/160709/raccoon-animal-animal-world-wildlife-photography-160709.jpeg
  • 8. Over a two week period, Carnegie Mellon University Computer Scientist’s ,did a study which determined that quite a few popular Android apps collect GPS coordinates within 50 metres of where the user is. This happens about 6200 times, which is equivalent to about every three minutes [8] Photo Source : https://www.pexels.com/photo/text-on-information-sign-258490/
  • 9. The Carnegie Mellon study also uncovered that the Weather Channel app accesses location information from it’s users every 10 minutes, or 2000 times in a two week period.[8] Photo Source: https://www.pexels.com/photo/reflection-of-building-on-body-of-water-at-daytime-166360
  • 10. When users in the Carnegie study found out how much personal data apps were collecting they tried to restrict the apps from collecting it. Researchers tried to help by sending daily “privacy nudges” to participants letting them know how many times apps were collecting their data [8] Operating updates ,since the study was conducted ,have now removed the software that researchers used to see requests for personal information and the ability to send “privacy nudges “ has also been disabled [8] Photo Source: https://www.pexels.com/photo/london-new-york-tokyo-and-moscow-clocks-48770/
  • 11. Facebook is able to know who your friends and acquaintances are even if you lie about all of your personal information when signing up [9] Photo Source : https://www.pexels.com/photo/photo-of-2-children-walking-23971/
  • 12. Facebook uses Network Science a complex academic field, which uses mapping algorithms, that takes information you provide or give permission for them to access when you sign up. It then uses it to determine the structure of your social network. This data is analyzed and allows them to accurately predict people you are likely to know and even people you will likely know in the future. [9] Photo Source : https://www.pexels.com/photo/hand-thumbs-up-thumb-black-and-white-8252/
  • 13. Samsung Smart TV owners are susceptible to spying. According to “WikiLeaks” documents a program named “Weeping Angel” can make Samsung’s Smart TVs appear to be turned off ,when they really are not. This enables the TV in essence, to work like a bug and record conversations in the room. These are then sent to a hidden CIA server. Michael Hayden, ex CIA director, thinks this is a wonderful capability because there are “ bad people in the world that have Samsung TVs “ [ 10] Photo Source: https://www.pexels.com/photo/full-frame-shot-of-eye-251287/
  • 14. Samsung’s Smart TV Privacy Policy States "Please be aware that if your spoken words include personal or other sensitive information, that information will be among the data captured and transmitted to a third party." A lot of Samsung TVs need users to actually click a microphone button before the voice commands work, but on models such as PN60F8500 the microphone is always listening. [10] Photo source : https://www.pexels.com/photo/night-music-band-microphone-9137
  • 15. Web cams can introduce a number of possible privacy breaches in our homes, nurseries, on our laptops, computers, tablets or anywhere we have online cameras [11] Photo source: https://www.pexels.com/photo/silver-imac-near-white-ceramic-kettle-205316/
  • 16. The frightening idea of someone watching every movement your baby makes is a very real possibility. The lack of the most basic security features are making popular internet connected baby monitors vulnerable to hackers [11] Photo Source: https://www.pexels.com/photo/newborn-child-feed-89695
  • 17. Once a hacker has breached one connected device, anything connected to that Wi-Fi network can potentially be accessed. [11] Photo Source: https://www.pexels.com/photo/low-angle-photo-of-building-under-sky-69080/
  • 18. The use of cameras in public spaces is becoming more common place. Cameras are also now on buses, subways, in ATM machines, and outside gas stations or grocery stores. [12] Photo Source : https://www.pexels.com/photo/black-and-white-streets-bridge-jacket-70402 /
  • 19. Photo Source: https://www.pexels.com/photo/5th-avenue-america-apple-store-architecture-279166 With the advent of Google Street view it is now possible to view someone’s home, business or even their vehicle from the comfort of your living room
  • 20. The expectation of privacy in the digital age may no longer be an option. Perhaps we need to redefine what privacy means and the repercussions of this new interpretation. Photo Source: https://www.pexels.com/photo/butterflies-black-and-white-9159/
  • 21. Sources: 1. Matrix, Sidneyeve “ John Palfrey and Urs Gasser Quote” Module 3 Slides Film 260 Queens University May 2017. 2. Eveleth, Rose. "How Many Photographs Of You Are Out There In The World?". The Atlantic. N.p., 2017. Web. 2 June 2017. https://www.theatlantic.com/technology/archive/2015/11/how-many-photographs-of-you-are-out-there-in-the-world/413389/ 3. Morrison, Kimberlee, and Kimberlee Morrison. "How Many Photos Are Uploaded To Snapchat Every Second?". Adweek.com. N.p., 2017. Web. 2 June 2017.http://www.adweek.com/digital/how-many-photos-are-uploaded-to-snapchat-every-second/ 4. "Online Privacy, Online Publicity: Youth Do More To Protect Their Reputation Than Their Information | Mediasmarts". Mediasmarts.ca. N.p., 2017. Web. 2 June 2017. http://mediasmarts.ca/blog/online-privacy-online-publicity-youth-do-more-protect-their-reputation-their-information 5. Bogart, Nicole. "Young Canadians Lack Understanding Of Online Privacy: Study". Global News. N.p., 2017. Web. 2 June 2017. http://globalnews.ca/news/1159724/young-canadians-lack-understanding-of-online-privacy-study/ 6. Dell’Antonia,Kj “ Don’t post about me on Social Media, Children say” The New York Times March 2017 https://well.blogs.nytimes.com/2016/03/08/dont-post-about-me-on-social-media-children-say/?_r=0 7. Paul, P. (2013, May 5). Cyberparenting and the Risk of T.M.I. New York Times, p. 8(L). Retrieved from http://go.galegroup.com.proxy.queensu.ca/ps/i.do?p=AONE&sw=w&u=queensulaw&v=2.1&it=r&id=GALE%7CA328694536&asid=ed444bf722dd5 54a00a728a96a4737f2 8. Dwoskin, E. “WSJ.D technology: Apps track users -- once every 3 minute”s. Wall Street Journal Mar 24 2015 . Retrieved from https://search- proquest-com.proxy.queensu.ca/docview/1665403896?accountid=6180 9. Dewey, Caitlin “How Facebook knows who all your friends are, even better than you do”. Washingtonpost.com. April2 2015 Retrieved from http://go.galegroup.com.proxy.queensu.ca/ps/i.do?p=AONE&sw=w&u=queensulaw&v=2.1&it=r&id=GALE%7CA408035312&asid=97bdc5e16299b f6c66dcb7543481dace 10. "If You Have A Smart TV, Take A Closer Look At Your Privacy Settings". BuzzFeed. N.p., 2017. Web. 2 June 2017. https://www.buzzfeed.com/nicolenguyen/here-are-the-privacy-settings-you-should-look-at-if-you-have?utm_term=.nqkg6Z0A7N#.cidNjp56Ov 11. "Is Your Baby Monitor Safe? Cybersecurity Firms Says Many Can Be Hacked". CBC News. N.p., 2017. Web. 2 June 2017. http://www.cbc.ca/news/business/several-baby-monitors-vulnerable-to-hacking-cybersecurity-firm-warns-1.3213046 12. Alcoba, Natalie. "Growing Number Of CCTV Surveillance Cameras Outside City Core Dismays Privacy Advocates". National Post. N.p., 2017. Web. 2 June 2017. http://news.nationalpost.com/toronto/growing-number-of-cctv-surveillance-cameras-dismays-privacy-advocates Photo Source : https://www.pexels.com/photo/full-frame-shot-of-metal-332834