SlideShare uma empresa Scribd logo
1 de 21
Baixar para ler offline
The Deception of Privacy
The Truth About a Plugged in Life
By Cynthia Beneteau
Photo Source: Kristin Flour “Secret” Unsplash https://unsplash.com/collections/327093/privacy-kit?photo=BcjdbyKWquw
Prior to the digital age photos were typically just
shared with a handful of people, like friends and
family. Now, people take more photos in 2
minutes than the entire amount of all the photos
that existed 150 years ago. [2]
The top three places photos are uploaded to are:
Snapchat: 8796 photos per second
What's App : 8102 photos per second
Facebook :4501 photos per second [3]
Photo Source : Gratisography http://colorlisa.com/pictures/105_1.jpg
Today’s youth think of privacy
differently than adults do. They
care more about controlling who
is tracking them digitally, who is
seeing what they post and what
people think when seeing them.
The online experience for young
people is a social one. If
something is posted they do not
like, they are more likely to worry
about hiding the content from
their friends or family, than to
worry about teachers or potential
employers seeing it. They care
more about their reputation than
the actual information they are
posting[4]
Photo Source: http://www.gratisography.com/pictures/303_1.jpg
Parents need to consider the
long term reach of the digital
information they are sharing
about their children. A “cute”
video of a child doing something
silly, can come back to haunt that
same child when they become a
teenager or adult.
Even innocent stories shared by
a parent may be a potential
source of embarrassment to a
child later on. Children, youth and
teens should be able to control
their digital identities. There is a
balance that can be reached, a
parent can share information, but
limit identifying characteristics so
that it protects their children,
but they can still share [6]
Photo source: https://pixabay.com/en/desperate-sad-depressed-feet-hands-2293377/
72% of Parents are worried about their children’s online interactions with strangers or predators
that could harm them. Two major concerns are sexting and cyberbullying. Kids can be horrible to
each other and some are even using the internet to create fake identities of other children. They then
pose as the child and fabricate information about them. Parents are more than willing to potentially
embarrass their child if it will help to keep them safe. [7]
Photo Source https://pixabay.com/en/privacy-policy-spy-espionage-nsa-1624400
A Study done by “Young Canadians in
a Wired World” has indicated more
privacy education in schools and
homes is needed. According to the
study, students have limited
comprehension of password
sharing, privacy policies, policies
around data collection and geo-
location services
68% of Students incorrectly believe,
that a website will not share their
personal information if they have a
privacy policy [5]
Photo Source : https://www.pexels.com/photo/finger-print-on-enter-key-of-keyboard-163017/
“ We make big trade-offs as we become digitally
connected everywhere and anytime” causing increased
concerns with security and privacy [1]
John Palfrey and Urs Gasser, Authors of Interop. The Promise and Perils of Highly Interconnected Systems
Photo Source : https://static.pexels.com/photos/160709/raccoon-animal-animal-world-wildlife-photography-160709.jpeg
Over a two week period, Carnegie Mellon University Computer
Scientist’s ,did a study which determined that quite a few popular
Android apps collect GPS coordinates within 50 metres of where the
user is. This happens about 6200 times, which is equivalent to about
every three minutes [8]
Photo Source : https://www.pexels.com/photo/text-on-information-sign-258490/
The Carnegie Mellon study also uncovered that the Weather Channel app accesses location
information from it’s users every 10 minutes, or 2000 times in a two week period.[8]
Photo Source: https://www.pexels.com/photo/reflection-of-building-on-body-of-water-at-daytime-166360
When users in the Carnegie study found out how much personal data apps were
collecting they tried to restrict the apps from collecting it. Researchers tried to help by
sending daily “privacy nudges” to participants letting them know how many times
apps were collecting their data [8]
Operating updates ,since the study was conducted ,have now removed the software
that researchers used to see requests for personal information and the ability to send
“privacy nudges “ has also been disabled [8]
Photo Source: https://www.pexels.com/photo/london-new-york-tokyo-and-moscow-clocks-48770/
Facebook is able to know who your friends and acquaintances are
even if you lie about all of your personal information when signing
up [9]
Photo Source : https://www.pexels.com/photo/photo-of-2-children-walking-23971/
Facebook uses Network Science a complex
academic field, which uses mapping
algorithms, that takes information you provide
or give permission for them to access when
you sign up. It then uses it to determine the
structure of your social network. This data is
analyzed and allows them to accurately predict
people you are likely to know and even people
you will likely know in the future. [9]
Photo Source : https://www.pexels.com/photo/hand-thumbs-up-thumb-black-and-white-8252/
Samsung Smart TV
owners are susceptible
to spying. According to
“WikiLeaks” documents
a program named
“Weeping Angel” can
make Samsung’s Smart
TVs appear to be turned
off ,when they really are
not. This enables the TV
in essence, to work like a
bug and record
conversations in the
room. These are then
sent to a hidden CIA
server. Michael Hayden,
ex CIA director, thinks
this is a wonderful
capability because there
are “ bad people in the
world that have
Samsung TVs “ [ 10]
Photo Source: https://www.pexels.com/photo/full-frame-shot-of-eye-251287/
Samsung’s Smart TV Privacy Policy States "Please be aware that if your spoken words include
personal or other sensitive information, that information will be among the data captured and
transmitted to a third party."
A lot of Samsung TVs need users to actually click a microphone button before the voice
commands work, but on models such as PN60F8500 the microphone is always listening. [10]
Photo source : https://www.pexels.com/photo/night-music-band-microphone-9137
Web cams can introduce a number
of possible privacy breaches in our
homes, nurseries, on our laptops,
computers, tablets or anywhere we
have online cameras [11]
Photo source: https://www.pexels.com/photo/silver-imac-near-white-ceramic-kettle-205316/
The frightening idea of someone watching every movement your baby makes
is a very real possibility. The lack of the most basic security features are
making popular internet connected baby monitors vulnerable to hackers [11]
Photo Source: https://www.pexels.com/photo/newborn-child-feed-89695
Once a hacker has breached
one connected device, anything
connected to that Wi-Fi network
can potentially be accessed. [11]
Photo Source: https://www.pexels.com/photo/low-angle-photo-of-building-under-sky-69080/
The use of cameras in public spaces is
becoming more common place. Cameras
are also now on buses, subways, in ATM
machines, and outside gas stations or
grocery stores. [12]
Photo Source : https://www.pexels.com/photo/black-and-white-streets-bridge-jacket-70402
/
Photo Source: https://www.pexels.com/photo/5th-avenue-america-apple-store-architecture-279166
With the advent of
Google Street view it is
now possible to view
someone’s home,
business or even their
vehicle from the comfort
of your living room
The expectation of
privacy in the digital
age may no longer be
an option. Perhaps we
need to redefine what
privacy means and the
repercussions of this
new interpretation.
Photo Source: https://www.pexels.com/photo/butterflies-black-and-white-9159/
Sources:
1. Matrix, Sidneyeve “ John Palfrey and Urs Gasser Quote” Module 3 Slides Film 260 Queens University May 2017.
2. Eveleth, Rose. "How Many Photographs Of You Are Out There In The World?". The Atlantic. N.p., 2017. Web. 2 June 2017.
https://www.theatlantic.com/technology/archive/2015/11/how-many-photographs-of-you-are-out-there-in-the-world/413389/
3. Morrison, Kimberlee, and Kimberlee Morrison. "How Many Photos Are Uploaded To Snapchat Every Second?". Adweek.com. N.p., 2017. Web. 2
June 2017.http://www.adweek.com/digital/how-many-photos-are-uploaded-to-snapchat-every-second/
4. "Online Privacy, Online Publicity: Youth Do More To Protect Their Reputation Than Their Information | Mediasmarts". Mediasmarts.ca. N.p.,
2017. Web. 2 June 2017. http://mediasmarts.ca/blog/online-privacy-online-publicity-youth-do-more-protect-their-reputation-their-information
5. Bogart, Nicole. "Young Canadians Lack Understanding Of Online Privacy: Study". Global News. N.p., 2017. Web. 2 June 2017.
http://globalnews.ca/news/1159724/young-canadians-lack-understanding-of-online-privacy-study/
6. Dell’Antonia,Kj “ Don’t post about me on Social Media, Children say” The New York Times March 2017
https://well.blogs.nytimes.com/2016/03/08/dont-post-about-me-on-social-media-children-say/?_r=0
7. Paul, P. (2013, May 5). Cyberparenting and the Risk of T.M.I. New York Times, p. 8(L). Retrieved from
http://go.galegroup.com.proxy.queensu.ca/ps/i.do?p=AONE&sw=w&u=queensulaw&v=2.1&it=r&id=GALE%7CA328694536&asid=ed444bf722dd5
54a00a728a96a4737f2
8. Dwoskin, E. “WSJ.D technology: Apps track users -- once every 3 minute”s. Wall Street Journal Mar 24 2015 . Retrieved from https://search-
proquest-com.proxy.queensu.ca/docview/1665403896?accountid=6180
9. Dewey, Caitlin “How Facebook knows who all your friends are, even better than you do”. Washingtonpost.com. April2 2015 Retrieved from
http://go.galegroup.com.proxy.queensu.ca/ps/i.do?p=AONE&sw=w&u=queensulaw&v=2.1&it=r&id=GALE%7CA408035312&asid=97bdc5e16299b
f6c66dcb7543481dace
10. "If You Have A Smart TV, Take A Closer Look At Your Privacy Settings". BuzzFeed. N.p., 2017. Web. 2 June 2017.
https://www.buzzfeed.com/nicolenguyen/here-are-the-privacy-settings-you-should-look-at-if-you-have?utm_term=.nqkg6Z0A7N#.cidNjp56Ov
11. "Is Your Baby Monitor Safe? Cybersecurity Firms Says Many Can Be Hacked". CBC News. N.p., 2017. Web. 2 June 2017.
http://www.cbc.ca/news/business/several-baby-monitors-vulnerable-to-hacking-cybersecurity-firm-warns-1.3213046
12. Alcoba, Natalie. "Growing Number Of CCTV Surveillance Cameras Outside City Core Dismays Privacy Advocates". National Post. N.p., 2017.
Web. 2 June 2017.
http://news.nationalpost.com/toronto/growing-number-of-cctv-surveillance-cameras-dismays-privacy-advocates
Photo Source : https://www.pexels.com/photo/full-frame-shot-of-metal-332834

Mais conteúdo relacionado

Mais procurados

Social Media Career Assignment
Social Media Career AssignmentSocial Media Career Assignment
Social Media Career AssignmentRaechel Mills
 
IS SLACKTIVISM REALLY AS BAD AS THEY SAY IT IS? | Karen Clement
IS SLACKTIVISM REALLY AS BAD AS THEY SAY IT IS? | Karen ClementIS SLACKTIVISM REALLY AS BAD AS THEY SAY IT IS? | Karen Clement
IS SLACKTIVISM REALLY AS BAD AS THEY SAY IT IS? | Karen ClementKaren Clement
 
Film260 digitalflipbookshannongrist
Film260 digitalflipbookshannongristFilm260 digitalflipbookshannongrist
Film260 digitalflipbookshannongristShannon Grist
 
Social Media and Depression
Social Media and DepressionSocial Media and Depression
Social Media and DepressionDamon Auguste
 
Film 260 flipbook
Film 260 flipbookFilm 260 flipbook
Film 260 flipbookChuyun Xu
 
Social media, friend or foe?
Social media, friend or foe?Social media, friend or foe?
Social media, friend or foe?tharshni
 
Social Media Is Not Social
Social Media Is Not SocialSocial Media Is Not Social
Social Media Is Not SocialBrett Sykes
 
Your posts are not private
Your posts are not privateYour posts are not private
Your posts are not privateShawnee Liu
 
FILM260 Flipbook Assignment
FILM260 Flipbook AssignmentFILM260 Flipbook Assignment
FILM260 Flipbook AssignmentJordan Pernari
 
Cheng jessica flipbook_film260
Cheng jessica flipbook_film260Cheng jessica flipbook_film260
Cheng jessica flipbook_film260Jessica Cheng
 
Helicopter Parent - Flipbook
Helicopter Parent - FlipbookHelicopter Parent - Flipbook
Helicopter Parent - FlipbookJulia Holland
 
Desensitization
Desensitization Desensitization
Desensitization 14jc5
 
Food for Thought, and Instagram
Food for Thought, and InstagramFood for Thought, and Instagram
Food for Thought, and InstagramMarie-Claire Zhang
 

Mais procurados (20)

Social Media Career Assignment
Social Media Career AssignmentSocial Media Career Assignment
Social Media Career Assignment
 
IS SLACKTIVISM REALLY AS BAD AS THEY SAY IT IS? | Karen Clement
IS SLACKTIVISM REALLY AS BAD AS THEY SAY IT IS? | Karen ClementIS SLACKTIVISM REALLY AS BAD AS THEY SAY IT IS? | Karen Clement
IS SLACKTIVISM REALLY AS BAD AS THEY SAY IT IS? | Karen Clement
 
Film260 Flipbook
Film260 FlipbookFilm260 Flipbook
Film260 Flipbook
 
Film260 digitalflipbookshannongrist
Film260 digitalflipbookshannongristFilm260 digitalflipbookshannongrist
Film260 digitalflipbookshannongrist
 
Social Media and Depression
Social Media and DepressionSocial Media and Depression
Social Media and Depression
 
Film 260 flipbook
Film 260 flipbookFilm 260 flipbook
Film 260 flipbook
 
Privacy hazard
Privacy hazardPrivacy hazard
Privacy hazard
 
Why choose m commerce
Why choose m commerceWhy choose m commerce
Why choose m commerce
 
Social media, friend or foe?
Social media, friend or foe?Social media, friend or foe?
Social media, friend or foe?
 
Social Media Is Not Social
Social Media Is Not SocialSocial Media Is Not Social
Social Media Is Not Social
 
260 flipbook
260 flipbook260 flipbook
260 flipbook
 
Your posts are not private
Your posts are not privateYour posts are not private
Your posts are not private
 
FILM260 Flipbook Assignment
FILM260 Flipbook AssignmentFILM260 Flipbook Assignment
FILM260 Flipbook Assignment
 
Digital selfie
Digital selfieDigital selfie
Digital selfie
 
Cheng jessica flipbook_film260
Cheng jessica flipbook_film260Cheng jessica flipbook_film260
Cheng jessica flipbook_film260
 
Helicopter Parent - Flipbook
Helicopter Parent - FlipbookHelicopter Parent - Flipbook
Helicopter Parent - Flipbook
 
Oversharing as Modern Art
Oversharing as Modern ArtOversharing as Modern Art
Oversharing as Modern Art
 
Desensitization
Desensitization Desensitization
Desensitization
 
Food for Thought, and Instagram
Food for Thought, and InstagramFood for Thought, and Instagram
Food for Thought, and Instagram
 
Not so social
Not so social Not so social
Not so social
 

Semelhante a The Deception of Privacy, The Truth About a Plugged in Life

Is Online Privacy a Thing of the Past?
Is Online Privacy a Thing of the Past?Is Online Privacy a Thing of the Past?
Is Online Privacy a Thing of the Past?Aleque Juneau
 
Film 260 flipbook
Film 260 flipbookFilm 260 flipbook
Film 260 flipbookJulie Coles
 
Smartphones with Smarter Apps
Smartphones with Smarter AppsSmartphones with Smarter Apps
Smartphones with Smarter AppsSara Dow
 
Technology & Internet Use by Baby Boomers & Beyond
Technology & Internet Use by Baby Boomers & Beyond Technology & Internet Use by Baby Boomers & Beyond
Technology & Internet Use by Baby Boomers & Beyond genevabloemen
 
Error: Your Life Has Been Hacked
Error: Your Life Has Been HackedError: Your Life Has Been Hacked
Error: Your Life Has Been HackedAdelle Leonard
 
Should Kids Use Digital Technology?
Should Kids Use Digital Technology?Should Kids Use Digital Technology?
Should Kids Use Digital Technology?Lucy Peters
 
Snapchats Linger for Longer than 10 Seconds
Snapchats Linger for Longer than 10 SecondsSnapchats Linger for Longer than 10 Seconds
Snapchats Linger for Longer than 10 SecondsStephanie Sheridan
 
2012bruneluniversity 120615094336-phpapp01
2012bruneluniversity 120615094336-phpapp012012bruneluniversity 120615094336-phpapp01
2012bruneluniversity 120615094336-phpapp01Maria Palaska
 
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...IOSR Journals
 
The Evolution of Technology & Etiquette
The Evolution of Technology & EtiquetteThe Evolution of Technology & Etiquette
The Evolution of Technology & EtiquetteChristie Stelling
 
It's a Public World, After All
It's a Public World, After AllIt's a Public World, After All
It's a Public World, After AllJulia Partington
 
Tree incident shows value of remote working
Tree incident shows value of remote workingTree incident shows value of remote working
Tree incident shows value of remote workingJohn Davis
 
The New Digital You
The New Digital YouThe New Digital You
The New Digital Yourichbrilli
 
Bread Crumbs: How We are Building an Online Map to Ourselves
Bread Crumbs: How We are Building an Online Map to OurselvesBread Crumbs: How We are Building an Online Map to Ourselves
Bread Crumbs: How We are Building an Online Map to OurselvesJonah Chin
 
Private Is The New Public: How Society Is Ending Privacy
Private Is The New Public: How Society Is Ending PrivacyPrivate Is The New Public: How Society Is Ending Privacy
Private Is The New Public: How Society Is Ending PrivacyLin Ke
 
Private Is The New Public: How Society Is Ending Privacy
Private Is The New Public: How Society Is Ending PrivacyPrivate Is The New Public: How Society Is Ending Privacy
Private Is The New Public: How Society Is Ending PrivacyLin Ke
 
Privacy flip book assignment film 260 queensu kc
Privacy flip book assignment  film 260  queensu kcPrivacy flip book assignment  film 260  queensu kc
Privacy flip book assignment film 260 queensu kcCatherine Cowperthwaite
 
The Evolution of Technology & Etiquette
The Evolution of Technology & EtiquetteThe Evolution of Technology & Etiquette
The Evolution of Technology & EtiquetteChristie Stelling
 

Semelhante a The Deception of Privacy, The Truth About a Plugged in Life (20)

Is Online Privacy a Thing of the Past?
Is Online Privacy a Thing of the Past?Is Online Privacy a Thing of the Past?
Is Online Privacy a Thing of the Past?
 
Film 260 flipbook
Film 260 flipbookFilm 260 flipbook
Film 260 flipbook
 
Smartphones with Smarter Apps
Smartphones with Smarter AppsSmartphones with Smarter Apps
Smartphones with Smarter Apps
 
Flipbook.pdf
Flipbook.pdf Flipbook.pdf
Flipbook.pdf
 
Technology & Internet Use by Baby Boomers & Beyond
Technology & Internet Use by Baby Boomers & Beyond Technology & Internet Use by Baby Boomers & Beyond
Technology & Internet Use by Baby Boomers & Beyond
 
Error: Your Life Has Been Hacked
Error: Your Life Has Been HackedError: Your Life Has Been Hacked
Error: Your Life Has Been Hacked
 
Should Kids Use Digital Technology?
Should Kids Use Digital Technology?Should Kids Use Digital Technology?
Should Kids Use Digital Technology?
 
Snapchats Linger for Longer than 10 Seconds
Snapchats Linger for Longer than 10 SecondsSnapchats Linger for Longer than 10 Seconds
Snapchats Linger for Longer than 10 Seconds
 
2012bruneluniversity 120615094336-phpapp01
2012bruneluniversity 120615094336-phpapp012012bruneluniversity 120615094336-phpapp01
2012bruneluniversity 120615094336-phpapp01
 
L017146571
L017146571L017146571
L017146571
 
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
 
The Evolution of Technology & Etiquette
The Evolution of Technology & EtiquetteThe Evolution of Technology & Etiquette
The Evolution of Technology & Etiquette
 
It's a Public World, After All
It's a Public World, After AllIt's a Public World, After All
It's a Public World, After All
 
Tree incident shows value of remote working
Tree incident shows value of remote workingTree incident shows value of remote working
Tree incident shows value of remote working
 
The New Digital You
The New Digital YouThe New Digital You
The New Digital You
 
Bread Crumbs: How We are Building an Online Map to Ourselves
Bread Crumbs: How We are Building an Online Map to OurselvesBread Crumbs: How We are Building an Online Map to Ourselves
Bread Crumbs: How We are Building an Online Map to Ourselves
 
Private Is The New Public: How Society Is Ending Privacy
Private Is The New Public: How Society Is Ending PrivacyPrivate Is The New Public: How Society Is Ending Privacy
Private Is The New Public: How Society Is Ending Privacy
 
Private Is The New Public: How Society Is Ending Privacy
Private Is The New Public: How Society Is Ending PrivacyPrivate Is The New Public: How Society Is Ending Privacy
Private Is The New Public: How Society Is Ending Privacy
 
Privacy flip book assignment film 260 queensu kc
Privacy flip book assignment  film 260  queensu kcPrivacy flip book assignment  film 260  queensu kc
Privacy flip book assignment film 260 queensu kc
 
The Evolution of Technology & Etiquette
The Evolution of Technology & EtiquetteThe Evolution of Technology & Etiquette
The Evolution of Technology & Etiquette
 

Último

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 

Último (20)

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 

The Deception of Privacy, The Truth About a Plugged in Life

  • 1. The Deception of Privacy The Truth About a Plugged in Life By Cynthia Beneteau Photo Source: Kristin Flour “Secret” Unsplash https://unsplash.com/collections/327093/privacy-kit?photo=BcjdbyKWquw
  • 2. Prior to the digital age photos were typically just shared with a handful of people, like friends and family. Now, people take more photos in 2 minutes than the entire amount of all the photos that existed 150 years ago. [2] The top three places photos are uploaded to are: Snapchat: 8796 photos per second What's App : 8102 photos per second Facebook :4501 photos per second [3] Photo Source : Gratisography http://colorlisa.com/pictures/105_1.jpg
  • 3. Today’s youth think of privacy differently than adults do. They care more about controlling who is tracking them digitally, who is seeing what they post and what people think when seeing them. The online experience for young people is a social one. If something is posted they do not like, they are more likely to worry about hiding the content from their friends or family, than to worry about teachers or potential employers seeing it. They care more about their reputation than the actual information they are posting[4] Photo Source: http://www.gratisography.com/pictures/303_1.jpg
  • 4. Parents need to consider the long term reach of the digital information they are sharing about their children. A “cute” video of a child doing something silly, can come back to haunt that same child when they become a teenager or adult. Even innocent stories shared by a parent may be a potential source of embarrassment to a child later on. Children, youth and teens should be able to control their digital identities. There is a balance that can be reached, a parent can share information, but limit identifying characteristics so that it protects their children, but they can still share [6] Photo source: https://pixabay.com/en/desperate-sad-depressed-feet-hands-2293377/
  • 5. 72% of Parents are worried about their children’s online interactions with strangers or predators that could harm them. Two major concerns are sexting and cyberbullying. Kids can be horrible to each other and some are even using the internet to create fake identities of other children. They then pose as the child and fabricate information about them. Parents are more than willing to potentially embarrass their child if it will help to keep them safe. [7] Photo Source https://pixabay.com/en/privacy-policy-spy-espionage-nsa-1624400
  • 6. A Study done by “Young Canadians in a Wired World” has indicated more privacy education in schools and homes is needed. According to the study, students have limited comprehension of password sharing, privacy policies, policies around data collection and geo- location services 68% of Students incorrectly believe, that a website will not share their personal information if they have a privacy policy [5] Photo Source : https://www.pexels.com/photo/finger-print-on-enter-key-of-keyboard-163017/
  • 7. “ We make big trade-offs as we become digitally connected everywhere and anytime” causing increased concerns with security and privacy [1] John Palfrey and Urs Gasser, Authors of Interop. The Promise and Perils of Highly Interconnected Systems Photo Source : https://static.pexels.com/photos/160709/raccoon-animal-animal-world-wildlife-photography-160709.jpeg
  • 8. Over a two week period, Carnegie Mellon University Computer Scientist’s ,did a study which determined that quite a few popular Android apps collect GPS coordinates within 50 metres of where the user is. This happens about 6200 times, which is equivalent to about every three minutes [8] Photo Source : https://www.pexels.com/photo/text-on-information-sign-258490/
  • 9. The Carnegie Mellon study also uncovered that the Weather Channel app accesses location information from it’s users every 10 minutes, or 2000 times in a two week period.[8] Photo Source: https://www.pexels.com/photo/reflection-of-building-on-body-of-water-at-daytime-166360
  • 10. When users in the Carnegie study found out how much personal data apps were collecting they tried to restrict the apps from collecting it. Researchers tried to help by sending daily “privacy nudges” to participants letting them know how many times apps were collecting their data [8] Operating updates ,since the study was conducted ,have now removed the software that researchers used to see requests for personal information and the ability to send “privacy nudges “ has also been disabled [8] Photo Source: https://www.pexels.com/photo/london-new-york-tokyo-and-moscow-clocks-48770/
  • 11. Facebook is able to know who your friends and acquaintances are even if you lie about all of your personal information when signing up [9] Photo Source : https://www.pexels.com/photo/photo-of-2-children-walking-23971/
  • 12. Facebook uses Network Science a complex academic field, which uses mapping algorithms, that takes information you provide or give permission for them to access when you sign up. It then uses it to determine the structure of your social network. This data is analyzed and allows them to accurately predict people you are likely to know and even people you will likely know in the future. [9] Photo Source : https://www.pexels.com/photo/hand-thumbs-up-thumb-black-and-white-8252/
  • 13. Samsung Smart TV owners are susceptible to spying. According to “WikiLeaks” documents a program named “Weeping Angel” can make Samsung’s Smart TVs appear to be turned off ,when they really are not. This enables the TV in essence, to work like a bug and record conversations in the room. These are then sent to a hidden CIA server. Michael Hayden, ex CIA director, thinks this is a wonderful capability because there are “ bad people in the world that have Samsung TVs “ [ 10] Photo Source: https://www.pexels.com/photo/full-frame-shot-of-eye-251287/
  • 14. Samsung’s Smart TV Privacy Policy States "Please be aware that if your spoken words include personal or other sensitive information, that information will be among the data captured and transmitted to a third party." A lot of Samsung TVs need users to actually click a microphone button before the voice commands work, but on models such as PN60F8500 the microphone is always listening. [10] Photo source : https://www.pexels.com/photo/night-music-band-microphone-9137
  • 15. Web cams can introduce a number of possible privacy breaches in our homes, nurseries, on our laptops, computers, tablets or anywhere we have online cameras [11] Photo source: https://www.pexels.com/photo/silver-imac-near-white-ceramic-kettle-205316/
  • 16. The frightening idea of someone watching every movement your baby makes is a very real possibility. The lack of the most basic security features are making popular internet connected baby monitors vulnerable to hackers [11] Photo Source: https://www.pexels.com/photo/newborn-child-feed-89695
  • 17. Once a hacker has breached one connected device, anything connected to that Wi-Fi network can potentially be accessed. [11] Photo Source: https://www.pexels.com/photo/low-angle-photo-of-building-under-sky-69080/
  • 18. The use of cameras in public spaces is becoming more common place. Cameras are also now on buses, subways, in ATM machines, and outside gas stations or grocery stores. [12] Photo Source : https://www.pexels.com/photo/black-and-white-streets-bridge-jacket-70402 /
  • 19. Photo Source: https://www.pexels.com/photo/5th-avenue-america-apple-store-architecture-279166 With the advent of Google Street view it is now possible to view someone’s home, business or even their vehicle from the comfort of your living room
  • 20. The expectation of privacy in the digital age may no longer be an option. Perhaps we need to redefine what privacy means and the repercussions of this new interpretation. Photo Source: https://www.pexels.com/photo/butterflies-black-and-white-9159/
  • 21. Sources: 1. Matrix, Sidneyeve “ John Palfrey and Urs Gasser Quote” Module 3 Slides Film 260 Queens University May 2017. 2. Eveleth, Rose. "How Many Photographs Of You Are Out There In The World?". The Atlantic. N.p., 2017. Web. 2 June 2017. https://www.theatlantic.com/technology/archive/2015/11/how-many-photographs-of-you-are-out-there-in-the-world/413389/ 3. Morrison, Kimberlee, and Kimberlee Morrison. "How Many Photos Are Uploaded To Snapchat Every Second?". Adweek.com. N.p., 2017. Web. 2 June 2017.http://www.adweek.com/digital/how-many-photos-are-uploaded-to-snapchat-every-second/ 4. "Online Privacy, Online Publicity: Youth Do More To Protect Their Reputation Than Their Information | Mediasmarts". Mediasmarts.ca. N.p., 2017. Web. 2 June 2017. http://mediasmarts.ca/blog/online-privacy-online-publicity-youth-do-more-protect-their-reputation-their-information 5. Bogart, Nicole. "Young Canadians Lack Understanding Of Online Privacy: Study". Global News. N.p., 2017. Web. 2 June 2017. http://globalnews.ca/news/1159724/young-canadians-lack-understanding-of-online-privacy-study/ 6. Dell’Antonia,Kj “ Don’t post about me on Social Media, Children say” The New York Times March 2017 https://well.blogs.nytimes.com/2016/03/08/dont-post-about-me-on-social-media-children-say/?_r=0 7. Paul, P. (2013, May 5). Cyberparenting and the Risk of T.M.I. New York Times, p. 8(L). Retrieved from http://go.galegroup.com.proxy.queensu.ca/ps/i.do?p=AONE&sw=w&u=queensulaw&v=2.1&it=r&id=GALE%7CA328694536&asid=ed444bf722dd5 54a00a728a96a4737f2 8. Dwoskin, E. “WSJ.D technology: Apps track users -- once every 3 minute”s. Wall Street Journal Mar 24 2015 . Retrieved from https://search- proquest-com.proxy.queensu.ca/docview/1665403896?accountid=6180 9. Dewey, Caitlin “How Facebook knows who all your friends are, even better than you do”. Washingtonpost.com. April2 2015 Retrieved from http://go.galegroup.com.proxy.queensu.ca/ps/i.do?p=AONE&sw=w&u=queensulaw&v=2.1&it=r&id=GALE%7CA408035312&asid=97bdc5e16299b f6c66dcb7543481dace 10. "If You Have A Smart TV, Take A Closer Look At Your Privacy Settings". BuzzFeed. N.p., 2017. Web. 2 June 2017. https://www.buzzfeed.com/nicolenguyen/here-are-the-privacy-settings-you-should-look-at-if-you-have?utm_term=.nqkg6Z0A7N#.cidNjp56Ov 11. "Is Your Baby Monitor Safe? Cybersecurity Firms Says Many Can Be Hacked". CBC News. N.p., 2017. Web. 2 June 2017. http://www.cbc.ca/news/business/several-baby-monitors-vulnerable-to-hacking-cybersecurity-firm-warns-1.3213046 12. Alcoba, Natalie. "Growing Number Of CCTV Surveillance Cameras Outside City Core Dismays Privacy Advocates". National Post. N.p., 2017. Web. 2 June 2017. http://news.nationalpost.com/toronto/growing-number-of-cctv-surveillance-cameras-dismays-privacy-advocates Photo Source : https://www.pexels.com/photo/full-frame-shot-of-metal-332834