SlideShare uma empresa Scribd logo
1 de 34
Baixar para ler offline
Justino Lourenço
March,.2014
ISPGaya, V.N.Gaia, Portugal
Challenge
Please do help me, interact, make
your questions….
2
Index of the presentation
Digital Footprint
Scenarios
Technologies
Solutions
What comes next?
3
Digital footprint …
4
Definitions
 A digital footprint is a trail left by interactions in a digital
environment; including the usage of TV, mobile phone,
internet and world wide web, mobile web and other devices
and sensors.
 Digital footprints provide data on what has been performed in
the digital environment; and are used in behavioral targeting,
personalization, targeted marketing, digital reputation, and
other social media or social graphing services.
 In social media, a digital footprint is the size of a person's
"online presence" measured by the number of individuals
with whom they interact. [Wikipedia, 25 Jan 2013]
5
A shorter definition
A person's “digital footprint” reflects how he
or she actively participates in the digital
universe, including use of the Internet and
social networks, e-mail, cell phones, digital
cameras and credit cards.
(Source: http://securitysolutions.com/mag/digital_footprint_idc/)
6
Is this fresh new concern?
 A big amount of personal data is distributed among several
heterogeneous Databases … many people think about it!
1994: George Orwell publishes the book “1984”;
1997: Wim Wenders directs the movie “The End of Violence”;
2007: Mary Madden, Susannah Fox, Aaron Smith and Jessica
Vitak publishes the book “Digital Footprints”;
2009: Tony Fish publishes the book “My Digital Footprint”;
2013: NSA monitors people all over the world?
2014: Every month we find new vulnerabilities in mobile
phones…!
7
Conspiracy Theory ???
No ! Minimum knowledge will help me to
build the digital footprint that fits me ….
8
Our concerns
 In a daily bases, our life is full of interactions with the digital
world….
 How long do you use social networks in a normal day?
 When you do a simple post, how many people can spread it /
read it ?
 Our digital interactions are not only based in Internet…..
 Do you own a mobile device?
 Do you have a Via Verde ID?
 Do you have a credit card?
 Do you have cable TV?
 In how many data bases own information about you?
9
Applications
CRM - Customer Relationship Management
 Help companies to fit there offer to each client profile
Facebook
 Adjusts the best adds in your FB profile
Youtube
 Suggest the videos that you “perhaps” like more
10
Scenario: Mobile Phone
11
How is the association of a single
phone and its user?
Mobile ID – IMEI;
SIM.
12
Where is my phone?
Is for sure near to a Communication
Tower (outdoor/indoor antenna);
Is my GPS on?
I am using any Location Based
Application ?
13
Surfing the WEB
ISP controls the Internet Access:
Adjusts the traffic speed;
Allocates an IP address:
IP address can be traced to:
Find geographic position of the user…!
How? Check: http://www.iplocation.net/
14
Surfing in Wireless LAN
15
Ordinary daily scenario
After waking up, i start zapping on my cable TV;
While eating my breakfast - I surf on my tablet;
I am going to work, while my car (in the
background) is syncing some maintenance data
threw a 4G network;
During the trip I get caught by several traffic and
surveillance cameras;
I stop @ an ATM – I need cash;
I arrive at work, I use my NFC phone to check in;
I start the working day by checking email and
Facebook
16
Any of you have “googled” your
own name? Try it ….
47 % of American users have at leas once
searched on the Internet their own name.
Five years ago the number was only 22%.
17
Who profits with that?
 The collected data can be used by the several players, in order
to redirect marketing attacks in a one-to-one approach ….
18
How do we handle our personal
problem?
 Personal data spread in a non homogeneous form;
 Worldwide replication;
 Complex to be quantified;
 Dynamically changing.
Some companies already earn money in Googlewashing…!
19
Other Digital Footprint Scenarios
How the different technologies
that we use, collect our digital
footprint ?
20
ATM
21
Cable TV interaction
22
Traffic Control System
23
Via Verde
24
More Internet tracks
 Cookies approach;
 Other surfing tracks;
 Malicious software
 Virus
 Trojan
 Social network activities.
 Spontaneous data spreading
25
Solutions
Digital behavior concerns;
PC / Smart Phone / Tablet always updated;
Virus scanner updated;
Strong Passwords;
Renew your password;
Don’t use always the same password…
26
Do you want more security?
27
Minimizing risks .
28
Minimizing risks (II)
 Use of https:// .
 Avoid untrusted sites.
29
Evolution perspectives ?
30
Internet is always changing ..
31
What to expect?
 More technologies in our lives:
 M-Health;
 M-Learning;
 M- Social interactions;
 Smaller Hardware with more features (nanotechnology);
 Green technologies;
 Cloud storage;
 Voice and movements recognition;
 Smart Advice systems;
 Decisions based in dedicated software / hardware;
 Electronic money;
32
Time to hide?
Can I run away from tech
development?
The technologies changes our daily
routines for better?
33
Questions ?
Thank you for your time and
patience ..
Justino Lourenço – ISPGaya
http://www.linkedin.com/in/justinolourenco
jml@ispgaya.pt
34

Mais conteúdo relacionado

Mais procurados

16 Social Media Trends for 2010 by Agent Wildfire
16 Social Media Trends for 2010 by Agent Wildfire16 Social Media Trends for 2010 by Agent Wildfire
16 Social Media Trends for 2010 by Agent WildfireSean Moffitt
 
IE International Application Presentation J
IE International Application Presentation JIE International Application Presentation J
IE International Application Presentation JGeorge Konyashchenkov
 
Top 15 security predictions for 2017
Top 15 security predictions for 2017Top 15 security predictions for 2017
Top 15 security predictions for 2017Accelerate Tech
 
Qrator Labs annual report 2017
Qrator Labs annual report 2017Qrator Labs annual report 2017
Qrator Labs annual report 2017Qrator Labs
 
RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...
RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...
RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...Symantec
 
The Current State of Cybercrime 2014
The Current State of Cybercrime 2014The Current State of Cybercrime 2014
The Current State of Cybercrime 2014EMC
 
As telcos go digital, cybersecurity risks intensify by pwc
As telcos go digital, cybersecurity risks intensify by pwcAs telcos go digital, cybersecurity risks intensify by pwc
As telcos go digital, cybersecurity risks intensify by pwcMert Akın
 
Digital 2020 Global Digital Overview (January 2020) v01
Digital 2020 Global Digital Overview (January 2020) v01Digital 2020 Global Digital Overview (January 2020) v01
Digital 2020 Global Digital Overview (January 2020) v01DataReportal
 
Convergence of Mobile and Social Media 2010
Convergence of Mobile and Social Media 2010Convergence of Mobile and Social Media 2010
Convergence of Mobile and Social Media 2010Grant Fleming
 
Detecting Frauds and Identifying Security Challenge | by Money2Conf
Detecting Frauds and Identifying Security Challenge | by Money2ConfDetecting Frauds and Identifying Security Challenge | by Money2Conf
Detecting Frauds and Identifying Security Challenge | by Money2ConfMoney 2Conf
 
Social Media Balancing Security & Authenticity without Controlling the Message
Social Media Balancing Security & Authenticity without Controlling the MessageSocial Media Balancing Security & Authenticity without Controlling the Message
Social Media Balancing Security & Authenticity without Controlling the MessageCindy Kim
 
The Social Takeover
The Social TakeoverThe Social Takeover
The Social TakeoverZeroFOX
 
The Current State of Cybercrime 2013
The Current State of Cybercrime 2013The Current State of Cybercrime 2013
The Current State of Cybercrime 2013EMC
 
ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019- Mark - Fullbright
 
Tackling the maze ransomware attack with security testing
Tackling the maze ransomware attack with security testingTackling the maze ransomware attack with security testing
Tackling the maze ransomware attack with security testingCigniti Technologies Ltd
 
Cybercrimes. Looking for Safer Spaces? Freedom from Fear Issue 7
Cybercrimes. Looking for Safer Spaces? Freedom from Fear  Issue 7Cybercrimes. Looking for Safer Spaces? Freedom from Fear  Issue 7
Cybercrimes. Looking for Safer Spaces? Freedom from Fear Issue 7Daniel Dufourt
 
Final cyber risk report 24 feb
Final cyber risk report 24 febFinal cyber risk report 24 feb
Final cyber risk report 24 febmharbpavia
 
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...Symantec
 

Mais procurados (20)

16 Social Media Trends for 2010 by Agent Wildfire
16 Social Media Trends for 2010 by Agent Wildfire16 Social Media Trends for 2010 by Agent Wildfire
16 Social Media Trends for 2010 by Agent Wildfire
 
IE International Application Presentation J
IE International Application Presentation JIE International Application Presentation J
IE International Application Presentation J
 
Top 15 security predictions for 2017
Top 15 security predictions for 2017Top 15 security predictions for 2017
Top 15 security predictions for 2017
 
Qrator Labs annual report 2017
Qrator Labs annual report 2017Qrator Labs annual report 2017
Qrator Labs annual report 2017
 
RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...
RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...
RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...
 
The Current State of Cybercrime 2014
The Current State of Cybercrime 2014The Current State of Cybercrime 2014
The Current State of Cybercrime 2014
 
As telcos go digital, cybersecurity risks intensify by pwc
As telcos go digital, cybersecurity risks intensify by pwcAs telcos go digital, cybersecurity risks intensify by pwc
As telcos go digital, cybersecurity risks intensify by pwc
 
Digital 2020 Global Digital Overview (January 2020) v01
Digital 2020 Global Digital Overview (January 2020) v01Digital 2020 Global Digital Overview (January 2020) v01
Digital 2020 Global Digital Overview (January 2020) v01
 
Convergence of Mobile and Social Media 2010
Convergence of Mobile and Social Media 2010Convergence of Mobile and Social Media 2010
Convergence of Mobile and Social Media 2010
 
Detecting Frauds and Identifying Security Challenge | by Money2Conf
Detecting Frauds and Identifying Security Challenge | by Money2ConfDetecting Frauds and Identifying Security Challenge | by Money2Conf
Detecting Frauds and Identifying Security Challenge | by Money2Conf
 
Social Media Balancing Security & Authenticity without Controlling the Message
Social Media Balancing Security & Authenticity without Controlling the MessageSocial Media Balancing Security & Authenticity without Controlling the Message
Social Media Balancing Security & Authenticity without Controlling the Message
 
The Social Takeover
The Social TakeoverThe Social Takeover
The Social Takeover
 
The Current State of Cybercrime 2013
The Current State of Cybercrime 2013The Current State of Cybercrime 2013
The Current State of Cybercrime 2013
 
ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019
 
Tackling the maze ransomware attack with security testing
Tackling the maze ransomware attack with security testingTackling the maze ransomware attack with security testing
Tackling the maze ransomware attack with security testing
 
Mobile threat report_q3_2013
Mobile threat report_q3_2013Mobile threat report_q3_2013
Mobile threat report_q3_2013
 
Digital Threat Landscape
Digital Threat LandscapeDigital Threat Landscape
Digital Threat Landscape
 
Cybercrimes. Looking for Safer Spaces? Freedom from Fear Issue 7
Cybercrimes. Looking for Safer Spaces? Freedom from Fear  Issue 7Cybercrimes. Looking for Safer Spaces? Freedom from Fear  Issue 7
Cybercrimes. Looking for Safer Spaces? Freedom from Fear Issue 7
 
Final cyber risk report 24 feb
Final cyber risk report 24 febFinal cyber risk report 24 feb
Final cyber risk report 24 feb
 
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
 

Semelhante a Digital Footprint in our world

Mobile Marketing: Why smartphones are upending traditional print and web base...
Mobile Marketing: Why smartphones are upending traditional print and web base...Mobile Marketing: Why smartphones are upending traditional print and web base...
Mobile Marketing: Why smartphones are upending traditional print and web base...Kenko Health, Inc.
 
4 Trends Shaping the Future of Social Media
4 Trends Shaping the Future of Social Media4 Trends Shaping the Future of Social Media
4 Trends Shaping the Future of Social Mediaplusaziz
 
A Manifesto for Cyber Resilience
A Manifesto for Cyber ResilienceA Manifesto for Cyber Resilience
A Manifesto for Cyber ResilienceSymantec
 
How your data can be used against you #DataScienceWeek presentation by Leigh-...
How your data can be used against you #DataScienceWeek presentation by Leigh-...How your data can be used against you #DataScienceWeek presentation by Leigh-...
How your data can be used against you #DataScienceWeek presentation by Leigh-...Leigh-Chantelle
 
Blue Coat 2013 Systems Mobile Malware Report
Blue Coat 2013 Systems Mobile Malware ReportBlue Coat 2013 Systems Mobile Malware Report
Blue Coat 2013 Systems Mobile Malware ReportContent Rules, Inc.
 
Sample set exam eb bus 5-6-7-9-12
Sample set exam  eb bus 5-6-7-9-12Sample set exam  eb bus 5-6-7-9-12
Sample set exam eb bus 5-6-7-9-12BookStoreLib
 
Ethical, Legal and Social issues IoT
Ethical, Legal and Social issues IoTEthical, Legal and Social issues IoT
Ethical, Legal and Social issues IoTLuckeylama
 
Myeventapps mobile 101 self guided july 2015
Myeventapps mobile 101 self guided july 2015Myeventapps mobile 101 self guided july 2015
Myeventapps mobile 101 self guided july 2015Allan Isfan
 
Mobile Processing: The Perfect Storm for Data Compromise
Mobile Processing: The Perfect Storm for Data CompromiseMobile Processing: The Perfect Storm for Data Compromise
Mobile Processing: The Perfect Storm for Data CompromiseSecurityMetrics
 
Cyber Impact of Fake Instagram Business Account Identify Based on Sentiment A...
Cyber Impact of Fake Instagram Business Account Identify Based on Sentiment A...Cyber Impact of Fake Instagram Business Account Identify Based on Sentiment A...
Cyber Impact of Fake Instagram Business Account Identify Based on Sentiment A...IRJET Journal
 
Cyber Security in UAE - Trends That You Should Never Forget
Cyber Security in UAE - Trends That You Should Never ForgetCyber Security in UAE - Trends That You Should Never Forget
Cyber Security in UAE - Trends That You Should Never ForgetTechugo
 
Raise The Cybersecurity Curtain. Predictions 2021
Raise The Cybersecurity Curtain. Predictions 2021Raise The Cybersecurity Curtain. Predictions 2021
Raise The Cybersecurity Curtain. Predictions 2021Ludmila Morozova-Buss
 
Fife College, French Toast Mafia, Apps for Good Presentation
Fife College, French Toast Mafia, Apps for Good PresentationFife College, French Toast Mafia, Apps for Good Presentation
Fife College, French Toast Mafia, Apps for Good PresentationFifeCollege
 
File156453 (1)
File156453 (1)File156453 (1)
File156453 (1)Sumit Roy
 
proofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paperproofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paperKen Spencer Brown
 
Mobile Trends
Mobile TrendsMobile Trends
Mobile TrendsTexas.gov
 

Semelhante a Digital Footprint in our world (20)

Mobile Marketing: Why smartphones are upending traditional print and web base...
Mobile Marketing: Why smartphones are upending traditional print and web base...Mobile Marketing: Why smartphones are upending traditional print and web base...
Mobile Marketing: Why smartphones are upending traditional print and web base...
 
4 Trends Shaping the Future of Social Media
4 Trends Shaping the Future of Social Media4 Trends Shaping the Future of Social Media
4 Trends Shaping the Future of Social Media
 
A Manifesto for Cyber Resilience
A Manifesto for Cyber ResilienceA Manifesto for Cyber Resilience
A Manifesto for Cyber Resilience
 
How your data can be used against you #DataScienceWeek presentation by Leigh-...
How your data can be used against you #DataScienceWeek presentation by Leigh-...How your data can be used against you #DataScienceWeek presentation by Leigh-...
How your data can be used against you #DataScienceWeek presentation by Leigh-...
 
Blue Coat 2013 Systems Mobile Malware Report
Blue Coat 2013 Systems Mobile Malware ReportBlue Coat 2013 Systems Mobile Malware Report
Blue Coat 2013 Systems Mobile Malware Report
 
Mobile App Vs Mobile Web
Mobile App Vs Mobile WebMobile App Vs Mobile Web
Mobile App Vs Mobile Web
 
Sample set exam eb bus 5-6-7-9-12
Sample set exam  eb bus 5-6-7-9-12Sample set exam  eb bus 5-6-7-9-12
Sample set exam eb bus 5-6-7-9-12
 
Ethical, Legal and Social issues IoT
Ethical, Legal and Social issues IoTEthical, Legal and Social issues IoT
Ethical, Legal and Social issues IoT
 
Myeventapps mobile 101 self guided july 2015
Myeventapps mobile 101 self guided july 2015Myeventapps mobile 101 self guided july 2015
Myeventapps mobile 101 self guided july 2015
 
Mobile Processing: The Perfect Storm for Data Compromise
Mobile Processing: The Perfect Storm for Data CompromiseMobile Processing: The Perfect Storm for Data Compromise
Mobile Processing: The Perfect Storm for Data Compromise
 
Cyber Impact of Fake Instagram Business Account Identify Based on Sentiment A...
Cyber Impact of Fake Instagram Business Account Identify Based on Sentiment A...Cyber Impact of Fake Instagram Business Account Identify Based on Sentiment A...
Cyber Impact of Fake Instagram Business Account Identify Based on Sentiment A...
 
Cyber Security in UAE - Trends That You Should Never Forget
Cyber Security in UAE - Trends That You Should Never ForgetCyber Security in UAE - Trends That You Should Never Forget
Cyber Security in UAE - Trends That You Should Never Forget
 
Role of CAs in cyber world
Role of CAs in cyber worldRole of CAs in cyber world
Role of CAs in cyber world
 
Raise The Cybersecurity Curtain. Predictions 2021
Raise The Cybersecurity Curtain. Predictions 2021Raise The Cybersecurity Curtain. Predictions 2021
Raise The Cybersecurity Curtain. Predictions 2021
 
Fife College, French Toast Mafia, Apps for Good Presentation
Fife College, French Toast Mafia, Apps for Good PresentationFife College, French Toast Mafia, Apps for Good Presentation
Fife College, French Toast Mafia, Apps for Good Presentation
 
file156453
file156453file156453
file156453
 
File156453 (1)
File156453 (1)File156453 (1)
File156453 (1)
 
File156453
File156453File156453
File156453
 
proofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paperproofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paper
 
Mobile Trends
Mobile TrendsMobile Trends
Mobile Trends
 

Mais de Justino Lourenço (19)

Future of logistics
Future of logisticsFuture of logistics
Future of logistics
 
Artigo Publico
Artigo PublicoArtigo Publico
Artigo Publico
 
Cabelte
CabelteCabelte
Cabelte
 
Internet: risks and challenges
Internet: risks and challengesInternet: risks and challenges
Internet: risks and challenges
 
Mobilidade no seculo x xi
Mobilidade no seculo x xiMobilidade no seculo x xi
Mobilidade no seculo x xi
 
Telecommunications in the logistic sector lodz
Telecommunications in the logistic sector lodzTelecommunications in the logistic sector lodz
Telecommunications in the logistic sector lodz
 
Telecommunications in the logistic sector
Telecommunications in the logistic sector Telecommunications in the logistic sector
Telecommunications in the logistic sector
 
Apresentação do Projeto WalkAbout IP @ FNAC GaiaShop. 13Jun2013
Apresentação do Projeto WalkAbout IP @ FNAC GaiaShop. 13Jun2013Apresentação do Projeto WalkAbout IP @ FNAC GaiaShop. 13Jun2013
Apresentação do Projeto WalkAbout IP @ FNAC GaiaShop. 13Jun2013
 
Ecologia e telecomunicações
Ecologia e telecomunicaçõesEcologia e telecomunicações
Ecologia e telecomunicações
 
A evolução esperada das telecomunicações
A evolução esperada das telecomunicaçõesA evolução esperada das telecomunicações
A evolução esperada das telecomunicações
 
Digital footprint@artesis vf
Digital footprint@artesis vfDigital footprint@artesis vf
Digital footprint@artesis vf
 
Gsm curso
Gsm cursoGsm curso
Gsm curso
 
NFC
NFCNFC
NFC
 
HTML5
HTML5HTML5
HTML5
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
QR-Codes
QR-CodesQR-Codes
QR-Codes
 
ITUR
ITURITUR
ITUR
 
EJML Conference Presentation
EJML Conference PresentationEJML Conference Presentation
EJML Conference Presentation
 
Digital Footpront
Digital FootprontDigital Footpront
Digital Footpront
 

Último

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Principled Technologies
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024SynarionITSolutions
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 

Último (20)

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

Digital Footprint in our world

  • 2. Challenge Please do help me, interact, make your questions…. 2
  • 3. Index of the presentation Digital Footprint Scenarios Technologies Solutions What comes next? 3
  • 5. Definitions  A digital footprint is a trail left by interactions in a digital environment; including the usage of TV, mobile phone, internet and world wide web, mobile web and other devices and sensors.  Digital footprints provide data on what has been performed in the digital environment; and are used in behavioral targeting, personalization, targeted marketing, digital reputation, and other social media or social graphing services.  In social media, a digital footprint is the size of a person's "online presence" measured by the number of individuals with whom they interact. [Wikipedia, 25 Jan 2013] 5
  • 6. A shorter definition A person's “digital footprint” reflects how he or she actively participates in the digital universe, including use of the Internet and social networks, e-mail, cell phones, digital cameras and credit cards. (Source: http://securitysolutions.com/mag/digital_footprint_idc/) 6
  • 7. Is this fresh new concern?  A big amount of personal data is distributed among several heterogeneous Databases … many people think about it! 1994: George Orwell publishes the book “1984”; 1997: Wim Wenders directs the movie “The End of Violence”; 2007: Mary Madden, Susannah Fox, Aaron Smith and Jessica Vitak publishes the book “Digital Footprints”; 2009: Tony Fish publishes the book “My Digital Footprint”; 2013: NSA monitors people all over the world? 2014: Every month we find new vulnerabilities in mobile phones…! 7
  • 8. Conspiracy Theory ??? No ! Minimum knowledge will help me to build the digital footprint that fits me …. 8
  • 9. Our concerns  In a daily bases, our life is full of interactions with the digital world….  How long do you use social networks in a normal day?  When you do a simple post, how many people can spread it / read it ?  Our digital interactions are not only based in Internet…..  Do you own a mobile device?  Do you have a Via Verde ID?  Do you have a credit card?  Do you have cable TV?  In how many data bases own information about you? 9
  • 10. Applications CRM - Customer Relationship Management  Help companies to fit there offer to each client profile Facebook  Adjusts the best adds in your FB profile Youtube  Suggest the videos that you “perhaps” like more 10
  • 12. How is the association of a single phone and its user? Mobile ID – IMEI; SIM. 12
  • 13. Where is my phone? Is for sure near to a Communication Tower (outdoor/indoor antenna); Is my GPS on? I am using any Location Based Application ? 13
  • 14. Surfing the WEB ISP controls the Internet Access: Adjusts the traffic speed; Allocates an IP address: IP address can be traced to: Find geographic position of the user…! How? Check: http://www.iplocation.net/ 14
  • 16. Ordinary daily scenario After waking up, i start zapping on my cable TV; While eating my breakfast - I surf on my tablet; I am going to work, while my car (in the background) is syncing some maintenance data threw a 4G network; During the trip I get caught by several traffic and surveillance cameras; I stop @ an ATM – I need cash; I arrive at work, I use my NFC phone to check in; I start the working day by checking email and Facebook 16
  • 17. Any of you have “googled” your own name? Try it …. 47 % of American users have at leas once searched on the Internet their own name. Five years ago the number was only 22%. 17
  • 18. Who profits with that?  The collected data can be used by the several players, in order to redirect marketing attacks in a one-to-one approach …. 18
  • 19. How do we handle our personal problem?  Personal data spread in a non homogeneous form;  Worldwide replication;  Complex to be quantified;  Dynamically changing. Some companies already earn money in Googlewashing…! 19
  • 20. Other Digital Footprint Scenarios How the different technologies that we use, collect our digital footprint ? 20
  • 25. More Internet tracks  Cookies approach;  Other surfing tracks;  Malicious software  Virus  Trojan  Social network activities.  Spontaneous data spreading 25
  • 26. Solutions Digital behavior concerns; PC / Smart Phone / Tablet always updated; Virus scanner updated; Strong Passwords; Renew your password; Don’t use always the same password… 26
  • 27. Do you want more security? 27
  • 29. Minimizing risks (II)  Use of https:// .  Avoid untrusted sites. 29
  • 31. Internet is always changing .. 31
  • 32. What to expect?  More technologies in our lives:  M-Health;  M-Learning;  M- Social interactions;  Smaller Hardware with more features (nanotechnology);  Green technologies;  Cloud storage;  Voice and movements recognition;  Smart Advice systems;  Decisions based in dedicated software / hardware;  Electronic money; 32
  • 33. Time to hide? Can I run away from tech development? The technologies changes our daily routines for better? 33
  • 34. Questions ? Thank you for your time and patience .. Justino Lourenço – ISPGaya http://www.linkedin.com/in/justinolourenco jml@ispgaya.pt 34