SlideShare uma empresa Scribd logo
1 de 45
Future of online privacy & security Megan Correia,  ArbellaSermez & Megan Wright Issues in Social Media: CULT10102G  Instructor: JoAnnBrodey
Introduction The future of online privacy and security is unknown. Here is where we will examine how privacy and security has changed and how it is going to change within the next decade in the year 2020.With technology constantly advancing at a rapid pace, we plan to determine if online privacy still exists.    We will discuss the themes of privacy, security and  identity as well as the power online social media has on today’s generation.
Future of PrivacyMegan Correia According to Wikipedia’s definition of Internet privacy, online privacy consists of what people have the ability to control when it comes to what information they reveal about themselves and who can access that information.
Protecting privacy Private Investigator, Steve Rambinson believes that security doesn’t exist online, saying “privacy is dead-get over it.” Where as security expert, Bruce Schneier says “privacy protects us from abuses by those in power, even if we are doing nothing wrong at the time of surveillance.” Take Facebook for example, people may have co-workers and/or superiors as friends online that could be viewing their profile. They may come across something that may seem “inappropriate” for the workplace or may read a disgruntled status update about a bad work day. These things may be people’s right to freedom and freedom of speech,but when people in “power” or of a certain high social “status’ are viewing these things, people’s so-called freedom may cost them their job or position at the end of the day.
For this reason, many privacy options are available on social networking sites. If there wasn’t a demand or need for online privacy, social networking sites would not have privacy options. Facebook allows users to block certain individuals from seeing their profiles at all, the ability to choose your “friends” and add them to certain groups that can limit them to the information and content they can view; as well as pictures and videos. However, it is up to users to apply these settings when providing any personal information on the internet. We are told from an early age of internet use to never give out passwords or credit card numbers online or through instant messaging applications like MSN; but what about the other stuff we “expose” on social networking sites. Things like where we work or where we went to high school. Given that Facebook allows you to pick and choose your friends so you are able to know who is viewing your profile, how many of those people do you really know? Dunbar refers to 150 maximum as the number of people we can interact with, yet most people have hundreds of friends online. So if 150 people is all you can interact with, the other some odd hundred “friends” don’t know much about you and where else to find out more about you than your Facebook profile.
In an online article by Wired Magazine, digital immigrants (less frequent users) think as online privacy as a way to conceal information from others, where as digital natives (frequent users) instead share information within certain contexts and with certain privacy controls on that information. As these services evolve, like technology and online social media, the privacy protections also evolve. According to the Pew study, a study created about online privacy, 66% of teens use these privacy controls to limit access to their profile. Users are given the opportunity to choose what content is public and who has access to it. Digital natives expect this level of control over their personal information. In the Pew study, many teens and young adults make decisions about what information to share and in which context.
The Pew study shows that both teens and adults manage their information online. 60% of adults and 66% of teens restrict access to information in their profile. Only 6% of teens make their first and last name publicly accessible on social networks. According to Wired Magazine, “we want our cake and we want to eat it too-we want to share our content online and we want to control who we share it with.” Social networking site users want to be able to choose their levels of privacy online and these options are made available by sites like Facebook. Wired Magazine believes “most teens restrict access to their online profiles and do not think that sharing their information with a specific set of people means that the information is in the public domain. This allows them to both gain the benefits of sharing and communicating online, but also protecting their privacy and remain empowered in their own choices about their own information.”
Social Networking Sites: Facebook In January, Facebook founder Mark Zuckerberg told a public audience that the world has become more public and less private.
An article on Read Write Web questions whether society has become less private of if Facebook is pushing people in that direction. In the beginning stages of Facebook and most of its existence , Facebook users information was only visible to other users that were added as “friends.” In December, users were unable to hide their Facebook profile pictures, list of friends and their fan pages that they’re following. If users were not aware of Facebook’s new privacy default and did not re-adjust their privacy settings than Facebook switched it to making most things publicly visible to everyone.
People in today’s society are becoming more comfortable about what they publish online about their lives. However as Read Write Web’s article says, “privacy is a fundamental human right and while that may seem less true when we’re operating on corporate turf like Facebook, Facebook used to be based on privacy.” Legal studies student, Chris Peterson at the University of Massachusettes-Amherst wrote a thesis titled Saving Face: The privacy Architecture of Facebook. In his thesis, Peterson argued that the understanding of privacy is based more on context rather than hiding. Take for example the case of Rachel, a college student in Peterson’s thesis. Rachel’s grandmother had tried to accept Rachel as a friend on Facebook and even though Rachel and her grandmother are close, who wants their grandmother on Facebook?
Rachel told Peterson: “Facebook started off as basically an online directory of college students. I couldn’t wait until I had my college email so that I could set up an account of my own, since no other emails would give you access to the site. Now, that was great. One could [meet] classmates online or stay in touch with high school mates [but it] has become a place, no longer for college students, but for anyone. [About] five days ago, the worst possible Facebook scenario occurred , so bizarre that it hadn’t even crossed my mind as possible. My grandmother? How did she get onto Facebook? As my mouse hovered between the accept and decline button, images flashed through my mind of sweet grandma, seeing me drinking from an ice luge, tossing ping pong balls into solo cups full of beer, and countless pictures of drunken laughter, eyes half closed. Disgraceful, I know, but these are good memories to me. To her, the picture of my perfectly angelic self, studying hard away at school, would be shattered forever.” Now there are options for Rachel to privatize her photo’s and photo albums as well as her profile from her grandmother if she did choose to add her as a friend. However, Peterson is trying to argue that is the context in which these things are seen that makes Facebook a privacy issue.
Peterson argues that privacy controls are good but are only half of the problem with privacy. He writes if Facebook were designed to behave more like real life- if the informational properties of Facebook  were more similar to the informational properties of the physical world-then users would find it easier to keep their contexts intact, their worlds apart and their privacy protected. Danah Boyd, a social networking site researcher, says that Facebook users aren’t worried about government or advertisers using their information for surveillance or marketing purposes. However, users are trying to shield themselves from the eyes of parents, professors or police officers, those who hold direct control over and who operate in different social contexts than the users. In 2006, Facebook opened registration to anyone with an email address. Adults suddenly started joining Facebook. Peterson writes that the more Facebook opened up to the outside world, the more users began to feel exposed and self-conscious. As parents, teachers and bosses began to join Facebook, students began to evaluate their presence online. Peterson remakrs that what had once been a safe place to hang out with one’s friends now endangered one’s reputation and career prospects.
Peterson writes about privacy situations on Facebook that left users feeling uneasy : “In 2009 many students found themselves in the uneasy position of having to decide whether to Friend their parents or others outside the college context. ‘Alright I’m just gonna put this out there... It is really weird that Adults are on Facebook!!” wrote Jess, a college senior. When asked why it was ‘weird,’ she elaborated ‘because my moms friends are on Facebook...its just weird. and they also do it to watch every moment of there kids life and not give them privacy.” Another student reported that “the whole system feels wrong. I can't ignore a ‘friend request’ from the mother of my girlfriend, sure she's great in real life, but I want to keep that part of my life separate from my life I shared with folks in college... It's odd, but it's like I'm too connected.” These descriptions echo the experience of Rachel who trusted her grandmother but nevertheless felt uncomfortable exposing every aspect of her college life to someone outside the college context.
Peterson says that a more appropriate understanding of privacy today is based on context and that we expect our communication to go on in an appropriate context as well as our expectation to understand how our communication will be distributed. “By pushing your personal information and conversation through activity updates fully into the public, Facebook is eliminating any integrity of context that these conversations would naturally have. Posted updates can be directed only to limited lists of Facebook contacts, like college buddies or work friends, but that option is buried under more public default options and much of a user's activity on the site is not subject to that kind of option.”
Mark Zuckerberg used to say, according to Read Write Web’s article, that people would share more information if they felt comfortable knowing that it would only be visible to people they trusted. In an interview with Read Write Web, Zuckerberg said that users who wanted to do so couldn’t take their data off of the site because privacy control “is the vector around which Facebook operates.” Read Write Web’s article states that plenty of people have reasons to limit their visibility of personal information from the web but still want to be able to share that information with trusted contacts. “Facebook became famous on the premise and ought to be able to continue to thrive without doing 180 degree turn on privacy.” As Google CEO, Eric Schmidt put it: “If you have something that you don’t want anyone to know, maybe you shouldn’t be doing it in the first place.”
Privacy Case Privacy is a human right but once you jeopardize your privacy online your life in the real world is now open to the public as well. Take the case of Jason Fortuny and Craigslist found on Wikipedia: Jason Fortuny in September 2006 posed as a woman on Craigslist Seattle, posting an advertisement looking for casual sexual encounters with men in the Seattle area. On September 4, Fortuny posted all 178 responses with photographs and contact information of the men on the wiki website Encyclopedia Dramatica, labeling it as the Craigslist Experiment. Fortuny encouraged others to further identify the respondents. An extreme public display of shaming.
Law professor, Jonathan Zittrain said “ The men who replied to Fortuny’s posting did not appear to be doing anything illegal, so the outing has no social value other than to prove that someone could ruin people’s lives online.” Supposedly Fortuny said that two people lost their jobs as a result of the Craigslist Experiment and another had filed for “ an invasion of privacy lawsuit” against Fortuny. Fortuny was ordered to pay $74, 252.56 for the violation of the Copyright Act, compensation for public disclosure of private facts, intrusion upon seclusion as well as attorney fees and costs.
Privacy in the year 2020 The evolution of social networking sites had allowed us to share parts of our lives we would normally not share on a daily basis with friends, co-workers and so many other individuals. In the year 2020 people will be even more open to sharing personal information.
According to a 2008 survey onImagining the Internet: A history and Forecast, the public’s notion of privacy has changed. “People are generally comfortable exchanging the benefits of anonymity for the benefits they perceive in the data being shared by other people and organizations. As people’s lives have become more transparent, they have become more responsible for their own actions and more forgiving of the sometimes-unethical pasts of others. Being “outed” for some past indiscretion in a YouTube video or other pervasive-media form no longer does as much damage as it did back in the first decade of the 21st Century. Carefully investigated reputation corrections and clarifications are a popular daily feature of major media outlets’ online sites .” Many things are widely accepted online that are not accepted in the real world and in 2020 a wider variety of these things and circumstances will be even more accepted and possibly finally accepted in the real world’s society.
CBC news reported that digital ID cards will be the future for internet privacy. In 2006 Microsoft unveiled ideas they hoped Internet companies will use to help personal privacy and lower online crime. Privacy commissioner, Ann Cavoukian said “The identity structure of the internet is no longer sustainable.” Ann Cavoukian announced her support for the so-called Seven Laws of Identity, which outline ways in which online retailers, banks, and other organizations can enhance privacy by developing a next generation layer for the internet. If people lose confidence in the privacy and security of the internet it will no longer be viable as a medium for commerce, said Cavoukian. These ID Cards will keep important, confidental information separate from verification information. "People don't want an uber identity that rules their lives,” said Kim Cameron, Microsoft’s chief identity architect.
Social Networking Sites in 2020 Wireless social networking will be the new revolution in 2020. With people constantly on their cell phones and accessing the web through their phones, communication in every possible form is at their fingertips. In an article in Information Week, Derek Lidow, president and CEO at iSuppli said “Over the next 10 years, as mobile devices like smartphones become the primary channel for viewing content or accessing the Internet, social networking will move largely into the wireless realm, providing the type of ubiquitous connection that consumers are demanding. This event will accompany the creation of a new generation of applications that will greatly expand the appeal and utility of social networking, and will finally generate profits for the social networking industry."
Everything is turning wireless, from computers to cell phones to everyday devices, making our generation and future generations more widely accessible to communication. "New intuitive applications enabled by innovative technologies introduced in the timeframe from 2009 to 2015 will spur the adoption of social networking and lead to major revenue growth in this area,” said Lidow. iSuppli analyzed social networking and found three levels of interaction for users: immediate family and close friends, extended friends, and shared interest groups. Users interact sporadically -- but intensely -- with extended friends through games, avatars, and general updates and information. Users with common interests communicate in ways that extend into business. The popularity of social networking in business -- for trading, online collaboration, and virtual meetings -- is likely to spur advancement of mobile devices equipped for content viewing and sharing.” Because wireless devices are such a hot commodity in today’s society, one can only predict that the development of these devices along with that of technology will be rapidly advancing as well reaching the fingertips of every single person in the world. iSuppli predicted that Wireless devices are likely to become the primary means of communicating, accessing content, and using applications by 2018. According to iSuppli display technologies, like touch screens, flexible displays, and motion sensors, will become increasingly important, while demand rises for highly integrated processors that combine numerous high-performance, multi-threaded special purpose cores, iSuppli said. Companies that supply core silicon for wireless social networking devices will need more software engineers than hardware engineers in order to succeed -- but they will need plenty of both.
Future of SecurityMegan Wright
Security & Privacy of your identity on the Web Definitions  Identity theft  Horror stories Precautions you can take Privacy issues on the web  The future of privacy in 2020 Internet Two
Privacy & Security Definitions Privacy :  The state of being private; retirement or seclusion.  The state of being free from intrusion or disturbance in one's private life or affairs: the right to privacy.  Security: Freedom from danger, risk, etc.; safety. Freedom from care, anxiety, or doubt; well-founded confidence. Something that secures or makes safe; protection; defence. Freedom from financial cares or from want: The insurance policy gave the family security
Identity Theft The fraudulent appropriation and use of someone's identifying or personal data or documents, as a credit card. (Dictionary.com)
Facebook Identity Theft In Britain a 23 year old woman, called Kerry Harvey discovered to her horror that scam artists had stolen her online details-including her date of birth and mobile phone number- and reconstructed her identity on Facebook as a prostitute soliciting clients online. She was baffled when she started getting calls from “punters” looking for sex.  Then she learned that she had a parallel life on Facebook, where malicious fraudsters had stolen her photo from another website and, combining it with accurate details like her phone number, transformed her into a Facebook hooker -Throwing Sheep in the Board room
Security on MySpace A pretty 13 year old American girl named Megan Meier killed herself in October 2006 after becoming emotionally attached to a cute 16 year old boy.  Megan, still not fourteen, was legally too young to have a Myspace account. But her parents made a fatal mistake by allowing her to join Myspace.  Soon after she joined she met a boy named Josh and she begged he parents to let her add him as a friend, their second fatal mistake.  As soon as Megan infatuated with Josh, he turned angrily on her. He began insulting her by calling her a slut and fat he also sent her a note saying she is a shitty person and the world would be a better place without you in it.  Fifteen minutes later Megan Hung herself with a belt in her room. It was later found that Josh did not exist, he was a false persona maliciously concocted by 47 year old Lori Drew, the mother of one of Megan’s former classmates. She had been harassing Megan because Megan dropped her daughter as a friend not online but in real life  This is an example of security on the web, people assume that their families and themselves are safe and secure while on the web. In this case Megan did not have the freedom from danger and risk on the web.
Precautions to take Keep your private information private  Be smart about what you put online  Have your privacy setting set  Never give out your social insurance number  Shred your bank statements  Only use your credit card on trusted servers Don’t add strangers on your Myspace or facebook
Privacy and Security issues on the web  Two decades ago a 23-year-old Cornell Universitygraduate student brought the Internet to its knees with a simple software program that skipped from computer to computer at blinding speed, thoroughly clogging the then-tiny network in the space of a few hours.	 The program was intended to be a digital “Kilroy Was Here.” Just a bit of cybernetic fungus that would unobtrusively wander the net. However, a programming error turned it into a harbinger heralding the arrival of a darker cyberspace, more of a mirror for all of the chaos and conflict of the physical world than a utopian refuge from it. Since then things have gotten much, much worse. Bad enough that there is a growing belief among engineers and security experts that Internet security and privacy have become so maddeningly elusive that the only way to fix the problem is to start over. http://www.nytimes.com/2009/02/15/weekinreview/15markoff.html?_r=1  According to Markoff, the internet is so flawed and clogged with viruses, the only solution is to scrap it and start over. He suggests a “gated community” where users give up their anonymity and freedom in return for safety. Sounds like the same version of the internet our rulers have in mind. http://www.infowars.com/new-york-times-calls-for-internet-2/
The Future of Privacy on the Web Internet 2 The internet now is the only media outlet that the government doesn’t have complete control over, the internet provides people with the opportunity to post information that the government may not approve of regarding news, politics ect. In the year 2020 there is a great possibility of the government completely taking control over the internet. Not allowing citizens to post controversial information  that may make them look bad or leak info that they don’t want the people to know  for example all the 911 footage that citizens recorded ending up on conspiracy theories movies
Internet Two The videos on this site discus the internet two act and the details about it. In the video Alex Jones Death of the Internet, he clarifies that the government created the internet and they plan to take it back. By controlling the content and accessibility of certain websites, also they plan to charge citizens for internet access and the amount of gigabits they use.  http://www.infowars.com/censoring-the-internet-a-collection-of-essential-links
Privacy on Internet Two What a new Internet might look like is still widely debated, but one alternative would, in effect, create a “gated community” where users would give up their anonymity and certain freedoms in return for safety. http://www.nytimes.com/2009/02/15/weekinreview/15markoff.html?_r= 	 Thumb prints scans  When internet two happens people will be required by law to sign on to their computers with a thumbprint scan on their key boards. Having this in place the government will be able to see what sites you have visited and what you are doing on the web. Everyone will have a profile attached to this providing the government with all your personal information
Future of Power Over PrivacyArbellaSermez Power is the ability to do or act. It is the capability of doing or accomplishing something. It is the possession of control or command over others; authority; ascendancy.  Nobody wants to put control of their privacy in anyone’s hands but their own.
Power vs. Privacy In today's day and age it isn’t uncommon to feel like you have no control over your personal information and who it is shared with. When you sign up for a new account on various social networking sites like Facebook and Myspace, you are handing over all rights to your privacy.  Of course there are things like privacy settings setup on these sites to help ward off “creepers”, but sometimes these privacy settings aren’t enough. Power is sometimes put into the wrong hands. As shown in our text Throwing Sheep in the Boardroom, 15 year old Megan Meier was a victim of cyber harassment. One of Megan’s friends mothers was given the power to access Megan’s information and drive her to kill herself.
Cyberstalking Cyberstalking can be defined as threatening behavior or unwanted advances directed at another using the Internet and other forms of online and computer communications. (NCVC) A U.S. Department of Justice report estimates that there may be tens or even hundreds of thousands of cyberstalking victims in the United States (Report on Cyberstalking, 1999). A 1997 nationwide survey conducted by the University of Cincinnati found that almost 25% of stalking incidents among college age women involved cyberstalking (Report on Cyberstalking, 1999). Cyberstalking has become common on websites like Facebook, Myspace and Twitter. New terms like Facebook stalking help to describe the new phenomenon.
Facebook Stalking
Facebook Cyberstalking – CNN News
Cyberstalking Case In May of 2000 CNN reported on a case of cyberstalking. The president at the Lexington Herald Leader newspaper started getting strange phone calls from men who said they had met her in chat rooms and wanted to meet her in person shortly after she had fired a freelance photographer for downloading pornography. The phone calls were followed by subscriptions to inappropriate magazines in which she had never subscribed to. The case has yet to be resolved.
Facecrooks Although there are many negative issues associated with privacy on the internet, some good has come of it. There’s a website called Facecrooks that anybody can access and share any bad experiences they have encountered on social networking sites. The stories can be about anything ranging from exposing liar and cheaters to stopping hackers and scammers. Facecrooks also has its on Facebook page that can be accessed by Facebook users to share stories and get the latest news on ‘facecrooks’. Facecrooks mission: “Our mission is to monitor and chronicle the seedy, unsavory and sometimes silly side of social media. We also provide relevant and current information on how to safely use social networking sites.”
Future of Internet Privacy
Power over privacy Many social networking sites have made it possible for the wrong people to get access to your personal information. Your personal information in the hands of the wrong person can end on a sour note.  It may not always get you in a life threatening situation but that doesn’t mean it isn’t bad. Take for example Alison Chang of Bedford Texas. Alison’s photo was taken off flickr and used in a Virgin Mobile ad advertised in Australia without her permission. Privacy on the internet has given people all over the world access to anything and everything. A simple website used to share photos can result in a situation like Alison Chang’s.
Sources – Megan C Wired Magazine Wikipedia-Internet Privacy Read Write Web Chris Peterson: Saving Face-The privacy architecture of Facebook Thesis CBC News Information Week Imagining the Internet
Sources – Megan W Throwing sheep in the Boardroom http://www.dictonary.com http://www.nytimes.com/2009/02/15/weekinreview/15markoff.html?_r=1 http://www.infowars.com/censoring-the-internet-a-collection-of-essential-links/ http://www.nytimes.com/2009/02/15/weekinreview/15markoff.html?_r=1 http://www.infowars.com/new-york-times-calls-for-internet-2/)
Sources - Arbella The National Centre For Victims of Crime ere. Net CNN News YouTube-Internet Privacy Urban Dictionary YouTube-Internet Safety Facecrooks

Mais conteúdo relacionado

Último

Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 

Último (20)

Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 

Destaque

Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTExpeed Software
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 

Destaque (20)

Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 

Future of Privacy & Security

  • 1. Future of online privacy & security Megan Correia, ArbellaSermez & Megan Wright Issues in Social Media: CULT10102G Instructor: JoAnnBrodey
  • 2. Introduction The future of online privacy and security is unknown. Here is where we will examine how privacy and security has changed and how it is going to change within the next decade in the year 2020.With technology constantly advancing at a rapid pace, we plan to determine if online privacy still exists. We will discuss the themes of privacy, security and identity as well as the power online social media has on today’s generation.
  • 3. Future of PrivacyMegan Correia According to Wikipedia’s definition of Internet privacy, online privacy consists of what people have the ability to control when it comes to what information they reveal about themselves and who can access that information.
  • 4. Protecting privacy Private Investigator, Steve Rambinson believes that security doesn’t exist online, saying “privacy is dead-get over it.” Where as security expert, Bruce Schneier says “privacy protects us from abuses by those in power, even if we are doing nothing wrong at the time of surveillance.” Take Facebook for example, people may have co-workers and/or superiors as friends online that could be viewing their profile. They may come across something that may seem “inappropriate” for the workplace or may read a disgruntled status update about a bad work day. These things may be people’s right to freedom and freedom of speech,but when people in “power” or of a certain high social “status’ are viewing these things, people’s so-called freedom may cost them their job or position at the end of the day.
  • 5. For this reason, many privacy options are available on social networking sites. If there wasn’t a demand or need for online privacy, social networking sites would not have privacy options. Facebook allows users to block certain individuals from seeing their profiles at all, the ability to choose your “friends” and add them to certain groups that can limit them to the information and content they can view; as well as pictures and videos. However, it is up to users to apply these settings when providing any personal information on the internet. We are told from an early age of internet use to never give out passwords or credit card numbers online or through instant messaging applications like MSN; but what about the other stuff we “expose” on social networking sites. Things like where we work or where we went to high school. Given that Facebook allows you to pick and choose your friends so you are able to know who is viewing your profile, how many of those people do you really know? Dunbar refers to 150 maximum as the number of people we can interact with, yet most people have hundreds of friends online. So if 150 people is all you can interact with, the other some odd hundred “friends” don’t know much about you and where else to find out more about you than your Facebook profile.
  • 6. In an online article by Wired Magazine, digital immigrants (less frequent users) think as online privacy as a way to conceal information from others, where as digital natives (frequent users) instead share information within certain contexts and with certain privacy controls on that information. As these services evolve, like technology and online social media, the privacy protections also evolve. According to the Pew study, a study created about online privacy, 66% of teens use these privacy controls to limit access to their profile. Users are given the opportunity to choose what content is public and who has access to it. Digital natives expect this level of control over their personal information. In the Pew study, many teens and young adults make decisions about what information to share and in which context.
  • 7. The Pew study shows that both teens and adults manage their information online. 60% of adults and 66% of teens restrict access to information in their profile. Only 6% of teens make their first and last name publicly accessible on social networks. According to Wired Magazine, “we want our cake and we want to eat it too-we want to share our content online and we want to control who we share it with.” Social networking site users want to be able to choose their levels of privacy online and these options are made available by sites like Facebook. Wired Magazine believes “most teens restrict access to their online profiles and do not think that sharing their information with a specific set of people means that the information is in the public domain. This allows them to both gain the benefits of sharing and communicating online, but also protecting their privacy and remain empowered in their own choices about their own information.”
  • 8. Social Networking Sites: Facebook In January, Facebook founder Mark Zuckerberg told a public audience that the world has become more public and less private.
  • 9. An article on Read Write Web questions whether society has become less private of if Facebook is pushing people in that direction. In the beginning stages of Facebook and most of its existence , Facebook users information was only visible to other users that were added as “friends.” In December, users were unable to hide their Facebook profile pictures, list of friends and their fan pages that they’re following. If users were not aware of Facebook’s new privacy default and did not re-adjust their privacy settings than Facebook switched it to making most things publicly visible to everyone.
  • 10. People in today’s society are becoming more comfortable about what they publish online about their lives. However as Read Write Web’s article says, “privacy is a fundamental human right and while that may seem less true when we’re operating on corporate turf like Facebook, Facebook used to be based on privacy.” Legal studies student, Chris Peterson at the University of Massachusettes-Amherst wrote a thesis titled Saving Face: The privacy Architecture of Facebook. In his thesis, Peterson argued that the understanding of privacy is based more on context rather than hiding. Take for example the case of Rachel, a college student in Peterson’s thesis. Rachel’s grandmother had tried to accept Rachel as a friend on Facebook and even though Rachel and her grandmother are close, who wants their grandmother on Facebook?
  • 11. Rachel told Peterson: “Facebook started off as basically an online directory of college students. I couldn’t wait until I had my college email so that I could set up an account of my own, since no other emails would give you access to the site. Now, that was great. One could [meet] classmates online or stay in touch with high school mates [but it] has become a place, no longer for college students, but for anyone. [About] five days ago, the worst possible Facebook scenario occurred , so bizarre that it hadn’t even crossed my mind as possible. My grandmother? How did she get onto Facebook? As my mouse hovered between the accept and decline button, images flashed through my mind of sweet grandma, seeing me drinking from an ice luge, tossing ping pong balls into solo cups full of beer, and countless pictures of drunken laughter, eyes half closed. Disgraceful, I know, but these are good memories to me. To her, the picture of my perfectly angelic self, studying hard away at school, would be shattered forever.” Now there are options for Rachel to privatize her photo’s and photo albums as well as her profile from her grandmother if she did choose to add her as a friend. However, Peterson is trying to argue that is the context in which these things are seen that makes Facebook a privacy issue.
  • 12. Peterson argues that privacy controls are good but are only half of the problem with privacy. He writes if Facebook were designed to behave more like real life- if the informational properties of Facebook were more similar to the informational properties of the physical world-then users would find it easier to keep their contexts intact, their worlds apart and their privacy protected. Danah Boyd, a social networking site researcher, says that Facebook users aren’t worried about government or advertisers using their information for surveillance or marketing purposes. However, users are trying to shield themselves from the eyes of parents, professors or police officers, those who hold direct control over and who operate in different social contexts than the users. In 2006, Facebook opened registration to anyone with an email address. Adults suddenly started joining Facebook. Peterson writes that the more Facebook opened up to the outside world, the more users began to feel exposed and self-conscious. As parents, teachers and bosses began to join Facebook, students began to evaluate their presence online. Peterson remakrs that what had once been a safe place to hang out with one’s friends now endangered one’s reputation and career prospects.
  • 13. Peterson writes about privacy situations on Facebook that left users feeling uneasy : “In 2009 many students found themselves in the uneasy position of having to decide whether to Friend their parents or others outside the college context. ‘Alright I’m just gonna put this out there... It is really weird that Adults are on Facebook!!” wrote Jess, a college senior. When asked why it was ‘weird,’ she elaborated ‘because my moms friends are on Facebook...its just weird. and they also do it to watch every moment of there kids life and not give them privacy.” Another student reported that “the whole system feels wrong. I can't ignore a ‘friend request’ from the mother of my girlfriend, sure she's great in real life, but I want to keep that part of my life separate from my life I shared with folks in college... It's odd, but it's like I'm too connected.” These descriptions echo the experience of Rachel who trusted her grandmother but nevertheless felt uncomfortable exposing every aspect of her college life to someone outside the college context.
  • 14. Peterson says that a more appropriate understanding of privacy today is based on context and that we expect our communication to go on in an appropriate context as well as our expectation to understand how our communication will be distributed. “By pushing your personal information and conversation through activity updates fully into the public, Facebook is eliminating any integrity of context that these conversations would naturally have. Posted updates can be directed only to limited lists of Facebook contacts, like college buddies or work friends, but that option is buried under more public default options and much of a user's activity on the site is not subject to that kind of option.”
  • 15. Mark Zuckerberg used to say, according to Read Write Web’s article, that people would share more information if they felt comfortable knowing that it would only be visible to people they trusted. In an interview with Read Write Web, Zuckerberg said that users who wanted to do so couldn’t take their data off of the site because privacy control “is the vector around which Facebook operates.” Read Write Web’s article states that plenty of people have reasons to limit their visibility of personal information from the web but still want to be able to share that information with trusted contacts. “Facebook became famous on the premise and ought to be able to continue to thrive without doing 180 degree turn on privacy.” As Google CEO, Eric Schmidt put it: “If you have something that you don’t want anyone to know, maybe you shouldn’t be doing it in the first place.”
  • 16. Privacy Case Privacy is a human right but once you jeopardize your privacy online your life in the real world is now open to the public as well. Take the case of Jason Fortuny and Craigslist found on Wikipedia: Jason Fortuny in September 2006 posed as a woman on Craigslist Seattle, posting an advertisement looking for casual sexual encounters with men in the Seattle area. On September 4, Fortuny posted all 178 responses with photographs and contact information of the men on the wiki website Encyclopedia Dramatica, labeling it as the Craigslist Experiment. Fortuny encouraged others to further identify the respondents. An extreme public display of shaming.
  • 17. Law professor, Jonathan Zittrain said “ The men who replied to Fortuny’s posting did not appear to be doing anything illegal, so the outing has no social value other than to prove that someone could ruin people’s lives online.” Supposedly Fortuny said that two people lost their jobs as a result of the Craigslist Experiment and another had filed for “ an invasion of privacy lawsuit” against Fortuny. Fortuny was ordered to pay $74, 252.56 for the violation of the Copyright Act, compensation for public disclosure of private facts, intrusion upon seclusion as well as attorney fees and costs.
  • 18. Privacy in the year 2020 The evolution of social networking sites had allowed us to share parts of our lives we would normally not share on a daily basis with friends, co-workers and so many other individuals. In the year 2020 people will be even more open to sharing personal information.
  • 19. According to a 2008 survey onImagining the Internet: A history and Forecast, the public’s notion of privacy has changed. “People are generally comfortable exchanging the benefits of anonymity for the benefits they perceive in the data being shared by other people and organizations. As people’s lives have become more transparent, they have become more responsible for their own actions and more forgiving of the sometimes-unethical pasts of others. Being “outed” for some past indiscretion in a YouTube video or other pervasive-media form no longer does as much damage as it did back in the first decade of the 21st Century. Carefully investigated reputation corrections and clarifications are a popular daily feature of major media outlets’ online sites .” Many things are widely accepted online that are not accepted in the real world and in 2020 a wider variety of these things and circumstances will be even more accepted and possibly finally accepted in the real world’s society.
  • 20. CBC news reported that digital ID cards will be the future for internet privacy. In 2006 Microsoft unveiled ideas they hoped Internet companies will use to help personal privacy and lower online crime. Privacy commissioner, Ann Cavoukian said “The identity structure of the internet is no longer sustainable.” Ann Cavoukian announced her support for the so-called Seven Laws of Identity, which outline ways in which online retailers, banks, and other organizations can enhance privacy by developing a next generation layer for the internet. If people lose confidence in the privacy and security of the internet it will no longer be viable as a medium for commerce, said Cavoukian. These ID Cards will keep important, confidental information separate from verification information. "People don't want an uber identity that rules their lives,” said Kim Cameron, Microsoft’s chief identity architect.
  • 21. Social Networking Sites in 2020 Wireless social networking will be the new revolution in 2020. With people constantly on their cell phones and accessing the web through their phones, communication in every possible form is at their fingertips. In an article in Information Week, Derek Lidow, president and CEO at iSuppli said “Over the next 10 years, as mobile devices like smartphones become the primary channel for viewing content or accessing the Internet, social networking will move largely into the wireless realm, providing the type of ubiquitous connection that consumers are demanding. This event will accompany the creation of a new generation of applications that will greatly expand the appeal and utility of social networking, and will finally generate profits for the social networking industry."
  • 22. Everything is turning wireless, from computers to cell phones to everyday devices, making our generation and future generations more widely accessible to communication. "New intuitive applications enabled by innovative technologies introduced in the timeframe from 2009 to 2015 will spur the adoption of social networking and lead to major revenue growth in this area,” said Lidow. iSuppli analyzed social networking and found three levels of interaction for users: immediate family and close friends, extended friends, and shared interest groups. Users interact sporadically -- but intensely -- with extended friends through games, avatars, and general updates and information. Users with common interests communicate in ways that extend into business. The popularity of social networking in business -- for trading, online collaboration, and virtual meetings -- is likely to spur advancement of mobile devices equipped for content viewing and sharing.” Because wireless devices are such a hot commodity in today’s society, one can only predict that the development of these devices along with that of technology will be rapidly advancing as well reaching the fingertips of every single person in the world. iSuppli predicted that Wireless devices are likely to become the primary means of communicating, accessing content, and using applications by 2018. According to iSuppli display technologies, like touch screens, flexible displays, and motion sensors, will become increasingly important, while demand rises for highly integrated processors that combine numerous high-performance, multi-threaded special purpose cores, iSuppli said. Companies that supply core silicon for wireless social networking devices will need more software engineers than hardware engineers in order to succeed -- but they will need plenty of both.
  • 24. Security & Privacy of your identity on the Web Definitions Identity theft Horror stories Precautions you can take Privacy issues on the web The future of privacy in 2020 Internet Two
  • 25. Privacy & Security Definitions Privacy : The state of being private; retirement or seclusion. The state of being free from intrusion or disturbance in one's private life or affairs: the right to privacy. Security: Freedom from danger, risk, etc.; safety. Freedom from care, anxiety, or doubt; well-founded confidence. Something that secures or makes safe; protection; defence. Freedom from financial cares or from want: The insurance policy gave the family security
  • 26. Identity Theft The fraudulent appropriation and use of someone's identifying or personal data or documents, as a credit card. (Dictionary.com)
  • 27. Facebook Identity Theft In Britain a 23 year old woman, called Kerry Harvey discovered to her horror that scam artists had stolen her online details-including her date of birth and mobile phone number- and reconstructed her identity on Facebook as a prostitute soliciting clients online. She was baffled when she started getting calls from “punters” looking for sex. Then she learned that she had a parallel life on Facebook, where malicious fraudsters had stolen her photo from another website and, combining it with accurate details like her phone number, transformed her into a Facebook hooker -Throwing Sheep in the Board room
  • 28. Security on MySpace A pretty 13 year old American girl named Megan Meier killed herself in October 2006 after becoming emotionally attached to a cute 16 year old boy. Megan, still not fourteen, was legally too young to have a Myspace account. But her parents made a fatal mistake by allowing her to join Myspace. Soon after she joined she met a boy named Josh and she begged he parents to let her add him as a friend, their second fatal mistake. As soon as Megan infatuated with Josh, he turned angrily on her. He began insulting her by calling her a slut and fat he also sent her a note saying she is a shitty person and the world would be a better place without you in it. Fifteen minutes later Megan Hung herself with a belt in her room. It was later found that Josh did not exist, he was a false persona maliciously concocted by 47 year old Lori Drew, the mother of one of Megan’s former classmates. She had been harassing Megan because Megan dropped her daughter as a friend not online but in real life This is an example of security on the web, people assume that their families and themselves are safe and secure while on the web. In this case Megan did not have the freedom from danger and risk on the web.
  • 29. Precautions to take Keep your private information private Be smart about what you put online Have your privacy setting set Never give out your social insurance number Shred your bank statements Only use your credit card on trusted servers Don’t add strangers on your Myspace or facebook
  • 30. Privacy and Security issues on the web Two decades ago a 23-year-old Cornell Universitygraduate student brought the Internet to its knees with a simple software program that skipped from computer to computer at blinding speed, thoroughly clogging the then-tiny network in the space of a few hours. The program was intended to be a digital “Kilroy Was Here.” Just a bit of cybernetic fungus that would unobtrusively wander the net. However, a programming error turned it into a harbinger heralding the arrival of a darker cyberspace, more of a mirror for all of the chaos and conflict of the physical world than a utopian refuge from it. Since then things have gotten much, much worse. Bad enough that there is a growing belief among engineers and security experts that Internet security and privacy have become so maddeningly elusive that the only way to fix the problem is to start over. http://www.nytimes.com/2009/02/15/weekinreview/15markoff.html?_r=1 According to Markoff, the internet is so flawed and clogged with viruses, the only solution is to scrap it and start over. He suggests a “gated community” where users give up their anonymity and freedom in return for safety. Sounds like the same version of the internet our rulers have in mind. http://www.infowars.com/new-york-times-calls-for-internet-2/
  • 31. The Future of Privacy on the Web Internet 2 The internet now is the only media outlet that the government doesn’t have complete control over, the internet provides people with the opportunity to post information that the government may not approve of regarding news, politics ect. In the year 2020 there is a great possibility of the government completely taking control over the internet. Not allowing citizens to post controversial information that may make them look bad or leak info that they don’t want the people to know for example all the 911 footage that citizens recorded ending up on conspiracy theories movies
  • 32. Internet Two The videos on this site discus the internet two act and the details about it. In the video Alex Jones Death of the Internet, he clarifies that the government created the internet and they plan to take it back. By controlling the content and accessibility of certain websites, also they plan to charge citizens for internet access and the amount of gigabits they use. http://www.infowars.com/censoring-the-internet-a-collection-of-essential-links
  • 33. Privacy on Internet Two What a new Internet might look like is still widely debated, but one alternative would, in effect, create a “gated community” where users would give up their anonymity and certain freedoms in return for safety. http://www.nytimes.com/2009/02/15/weekinreview/15markoff.html?_r= Thumb prints scans When internet two happens people will be required by law to sign on to their computers with a thumbprint scan on their key boards. Having this in place the government will be able to see what sites you have visited and what you are doing on the web. Everyone will have a profile attached to this providing the government with all your personal information
  • 34. Future of Power Over PrivacyArbellaSermez Power is the ability to do or act. It is the capability of doing or accomplishing something. It is the possession of control or command over others; authority; ascendancy. Nobody wants to put control of their privacy in anyone’s hands but their own.
  • 35. Power vs. Privacy In today's day and age it isn’t uncommon to feel like you have no control over your personal information and who it is shared with. When you sign up for a new account on various social networking sites like Facebook and Myspace, you are handing over all rights to your privacy. Of course there are things like privacy settings setup on these sites to help ward off “creepers”, but sometimes these privacy settings aren’t enough. Power is sometimes put into the wrong hands. As shown in our text Throwing Sheep in the Boardroom, 15 year old Megan Meier was a victim of cyber harassment. One of Megan’s friends mothers was given the power to access Megan’s information and drive her to kill herself.
  • 36. Cyberstalking Cyberstalking can be defined as threatening behavior or unwanted advances directed at another using the Internet and other forms of online and computer communications. (NCVC) A U.S. Department of Justice report estimates that there may be tens or even hundreds of thousands of cyberstalking victims in the United States (Report on Cyberstalking, 1999). A 1997 nationwide survey conducted by the University of Cincinnati found that almost 25% of stalking incidents among college age women involved cyberstalking (Report on Cyberstalking, 1999). Cyberstalking has become common on websites like Facebook, Myspace and Twitter. New terms like Facebook stalking help to describe the new phenomenon.
  • 39. Cyberstalking Case In May of 2000 CNN reported on a case of cyberstalking. The president at the Lexington Herald Leader newspaper started getting strange phone calls from men who said they had met her in chat rooms and wanted to meet her in person shortly after she had fired a freelance photographer for downloading pornography. The phone calls were followed by subscriptions to inappropriate magazines in which she had never subscribed to. The case has yet to be resolved.
  • 40. Facecrooks Although there are many negative issues associated with privacy on the internet, some good has come of it. There’s a website called Facecrooks that anybody can access and share any bad experiences they have encountered on social networking sites. The stories can be about anything ranging from exposing liar and cheaters to stopping hackers and scammers. Facecrooks also has its on Facebook page that can be accessed by Facebook users to share stories and get the latest news on ‘facecrooks’. Facecrooks mission: “Our mission is to monitor and chronicle the seedy, unsavory and sometimes silly side of social media. We also provide relevant and current information on how to safely use social networking sites.”
  • 42. Power over privacy Many social networking sites have made it possible for the wrong people to get access to your personal information. Your personal information in the hands of the wrong person can end on a sour note. It may not always get you in a life threatening situation but that doesn’t mean it isn’t bad. Take for example Alison Chang of Bedford Texas. Alison’s photo was taken off flickr and used in a Virgin Mobile ad advertised in Australia without her permission. Privacy on the internet has given people all over the world access to anything and everything. A simple website used to share photos can result in a situation like Alison Chang’s.
  • 43. Sources – Megan C Wired Magazine Wikipedia-Internet Privacy Read Write Web Chris Peterson: Saving Face-The privacy architecture of Facebook Thesis CBC News Information Week Imagining the Internet
  • 44. Sources – Megan W Throwing sheep in the Boardroom http://www.dictonary.com http://www.nytimes.com/2009/02/15/weekinreview/15markoff.html?_r=1 http://www.infowars.com/censoring-the-internet-a-collection-of-essential-links/ http://www.nytimes.com/2009/02/15/weekinreview/15markoff.html?_r=1 http://www.infowars.com/new-york-times-calls-for-internet-2/)
  • 45. Sources - Arbella The National Centre For Victims of Crime ere. Net CNN News YouTube-Internet Privacy Urban Dictionary YouTube-Internet Safety Facecrooks