SlideShare uma empresa Scribd logo
1 de 27
Baixar para ler offline
Internet Privacy:
Does it Truly Exist?
By: Kristen Toso
Image: rosipaw
Today, there are over 2.5 billion Internet users worldwide.
With over 7 billion people in the world, that means that
approximately 36% are using the Internet.
Source: Internet World Stats
Image: johnlemon
That’s a lot of people with, consequently,
a lot of personal data.
Image: Leo Reynolds
Image: Simon (via Pixabay)
...always under the
assumption that their
privacy rights are being
respected.
Image: Nina Strelov (via Fotopedia)
However, throughout the Internet’s history, there have
been a number of privacy scandals that have shaken
users’trust.
Image: Wikimedia Commons
Violations of Internet privacy can happen to
anyone at any time, regardless of age, level of
digital literacy, wealth, or any other factor...
Image: Wikimedia Commons
...which begs the following questions:
Can information be kept truly personal on the Internet?
Or, is Internet privacy simply an oxymoron?
Image:jamingray
Image: esthervargasc
Today’s social media
platforms, online
shopping websites,
financial services, and
other such sites provide
users with privacy
settings in an attempt to
protect their personal
information.
Image:chiarashine
Even with these privacy settings, information can easily
be acquired and used without user permission by
different groups, including:
The more transparent users are in their online
profiles, the better that advertisers and corporations
can target them with products and services.
Source: Film 260 Lecture 02: i-Friends
Image: Wikimedia Commons
“...Google Glass opens an entirely new front in the digital war
against privacy. These spectacles [...] represent a developmental
leap in the history of data that is comparable to moving from
the bicycle to the automobile...
...It is the sort of radical transformation that may actually end up
completely destroying our individual privacy in the digital 21st century.”
- Andrew Keen, CNN
Image: Wikimedia Commons
“People say very personal
information to Siri [...] They are
encouraged to think of Siri as
their confidante and their
assistant...
...But Siri is not just working for
you. Siri is collecting a lot of data
for Apple and for its business...
...And people should be very
mindful and aware of what’s
happening to their personal
information...
- Nicole Ozer, Lawyer (ACLU)
Image: MattsMacintosh
Scams, phishing and fraud are examples of ways that
criminals can steal information from Internet users,
which can have detrimental consequences.
Image: pallotron
Top continents from
which online fraud
originated from (2012):
1. Africa
2. Asia
3. South Amerca
4. Europe
5. North America
The most commonly targeted online services:
Retail, online dating, financial, gambling and travel.
Source: Iovation
Image: Simon Tong (via smugmug.com)
IP addresses, emails and social media activity can
potentially be obtained by the government under
court rulings to closely monitor civilians.
Image: neeravbhatt
“Twitter, Facebook and other social media outlets have a great deal of
information about all of us — and the government wants to be able to
see it...
[...] the government scored a major win — and Internet privacy lost big —
when a judge ruled against Twitter in a fight over a trove of information
about [Malcolm Harris,] a political activist.”
- Adam Cohen, TIME
Image: Wikimedia Commons
Image: araenae (via Deviantart)
In 2012, 849 requests were
made by governments all
over the world to obtain
Twitter user information, with
80% of them being from the
United States alone.
Source: Twitter Transparency Report
Image: Wikimedia Commons
Users cannot assume
that privacy settings
are protecting their
precious information.
Evidently, despite the belief that privacy exists, there is a real risk
involved with sharing personal information on the Internet.
Image: wallpapers-mobilewallpapers.blogspot.ca
Given this, there are preventive measures that
you can take in order to protect yourself and
your personal information on the Internet:
in order to become more digitally-savvy.
Share Internet privacy tips with friends and family.
Image: Wikimedia Commons
Image: Zomerstorm
Think critically about what you are sharing, where you are
sharing it, and who could potentially have access to it.
Image: Lip Kee
“A long-overdue bill in the
California legislature,
“The Right to Know Act,”
would force companies such
as Google and Facebook
to reveal what personal
information they have collected
and how it’s being used.”
- Adam Cohen, TIME
Know, and fight for, your rights.
Even with these pre-emptive measures, it is difficult to
think that information can ever be private on the
Internet; as the saying goes...
Image: Chrisser
Image: Horia Varlan
What does the future hold
for Internet privacy?
Credits
All images are licensed under the Creative
Commons Non-Commercial Share-Alike 3.0
agreement and, unless otherwise specified,
are sourced from Flickr.
References

Mais conteúdo relacionado

Mais procurados

Big Data and Privacy
Big Data and PrivacyBig Data and Privacy
Big Data and Privacymjsale781
 
Aral Balkan - The Universal Declaration of Cyborg Rights
Aral Balkan - The Universal Declaration of Cyborg RightsAral Balkan - The Universal Declaration of Cyborg Rights
Aral Balkan - The Universal Declaration of Cyborg RightsUX Lausanne
 
Ethical, Social And Political Issues Raised By E Commerce
Ethical, Social And Political Issues Raised By E CommerceEthical, Social And Political Issues Raised By E Commerce
Ethical, Social And Political Issues Raised By E CommerceNicholas Davis
 
Great Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLIGreat Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLIJames Bollen
 
The Future of Moral Persuasion in Games, AR, AI Bots, and Self Trackers by Sh...
The Future of Moral Persuasion in Games, AR, AI Bots, and Self Trackers by Sh...The Future of Moral Persuasion in Games, AR, AI Bots, and Self Trackers by Sh...
The Future of Moral Persuasion in Games, AR, AI Bots, and Self Trackers by Sh...Sherry Jones
 
08 Ethics, Law and E-commerce
08 Ethics, Law and E-commerce08 Ethics, Law and E-commerce
08 Ethics, Law and E-commercemonchai sopitka
 
Digital citizin reem
Digital citizin reemDigital citizin reem
Digital citizin reemguest762e907
 
Digital citizin reem
Digital citizin reemDigital citizin reem
Digital citizin reemguest5cb43a
 
Should Government Control Internet and Its Content.
Should Government Control Internet and Its Content.Should Government Control Internet and Its Content.
Should Government Control Internet and Its Content.Joel D'souza
 
Malcolm Crompton I I S Frocomm Web 2 O In Govt 24 June 2009
Malcolm  Crompton  I I S  Frocomm  Web 2 O In  Govt  24  June 2009Malcolm  Crompton  I I S  Frocomm  Web 2 O In  Govt  24  June 2009
Malcolm Crompton I I S Frocomm Web 2 O In Govt 24 June 2009Frocomm Australia
 
The WikiLeaks Conundrum
The WikiLeaks ConundrumThe WikiLeaks Conundrum
The WikiLeaks ConundrumMsifry
 
Special topics
Special topicsSpecial topics
Special topicsaivarose
 
NILAKSHI ppt on should government control internet and its content
NILAKSHI ppt on should government control internet and its contentNILAKSHI ppt on should government control internet and its content
NILAKSHI ppt on should government control internet and its contentnilakshisharma9
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenshiptakahe2
 

Mais procurados (20)

Big Data and Privacy
Big Data and PrivacyBig Data and Privacy
Big Data and Privacy
 
Aral Balkan - The Universal Declaration of Cyborg Rights
Aral Balkan - The Universal Declaration of Cyborg RightsAral Balkan - The Universal Declaration of Cyborg Rights
Aral Balkan - The Universal Declaration of Cyborg Rights
 
Wisekey kamp
Wisekey kampWisekey kamp
Wisekey kamp
 
Ethical, Social And Political Issues Raised By E Commerce
Ethical, Social And Political Issues Raised By E CommerceEthical, Social And Political Issues Raised By E Commerce
Ethical, Social And Political Issues Raised By E Commerce
 
Lawek mui
Lawek muiLawek mui
Lawek mui
 
Cyber law1
Cyber law1Cyber law1
Cyber law1
 
Great Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLIGreat Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLI
 
The Future of Moral Persuasion in Games, AR, AI Bots, and Self Trackers by Sh...
The Future of Moral Persuasion in Games, AR, AI Bots, and Self Trackers by Sh...The Future of Moral Persuasion in Games, AR, AI Bots, and Self Trackers by Sh...
The Future of Moral Persuasion in Games, AR, AI Bots, and Self Trackers by Sh...
 
08 Ethics, Law and E-commerce
08 Ethics, Law and E-commerce08 Ethics, Law and E-commerce
08 Ethics, Law and E-commerce
 
Digital citizin reem
Digital citizin reemDigital citizin reem
Digital citizin reem
 
Digital citizin reem
Digital citizin reemDigital citizin reem
Digital citizin reem
 
Ethics, Law, and E-commerce
Ethics, Law, and E-commerceEthics, Law, and E-commerce
Ethics, Law, and E-commerce
 
Should Government Control Internet and Its Content.
Should Government Control Internet and Its Content.Should Government Control Internet and Its Content.
Should Government Control Internet and Its Content.
 
Malcolm Crompton I I S Frocomm Web 2 O In Govt 24 June 2009
Malcolm  Crompton  I I S  Frocomm  Web 2 O In  Govt  24  June 2009Malcolm  Crompton  I I S  Frocomm  Web 2 O In  Govt  24  June 2009
Malcolm Crompton I I S Frocomm Web 2 O In Govt 24 June 2009
 
Software Piracy
Software PiracySoftware Piracy
Software Piracy
 
The WikiLeaks Conundrum
The WikiLeaks ConundrumThe WikiLeaks Conundrum
The WikiLeaks Conundrum
 
Special topics
Special topicsSpecial topics
Special topics
 
Cybertort Imp Slides For Pub. Internet
Cybertort Imp Slides For Pub. InternetCybertort Imp Slides For Pub. Internet
Cybertort Imp Slides For Pub. Internet
 
NILAKSHI ppt on should government control internet and its content
NILAKSHI ppt on should government control internet and its contentNILAKSHI ppt on should government control internet and its content
NILAKSHI ppt on should government control internet and its content
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 

Destaque

TEDx Rhein-Main Michael Altendorf February 2011 - Virtual Identity and the en...
TEDx Rhein-Main Michael Altendorf February 2011 - Virtual Identity and the en...TEDx Rhein-Main Michael Altendorf February 2011 - Virtual Identity and the en...
TEDx Rhein-Main Michael Altendorf February 2011 - Virtual Identity and the en...Michael Altendorf
 
All Up In Your Face (Book):   Virtual Identity Management For Teens And You...
All Up In Your Face (Book): Virtual Identity Management For Teens And You...All Up In Your Face (Book): Virtual Identity Management For Teens And You...
All Up In Your Face (Book):   Virtual Identity Management For Teens And You...Erin Dorney
 
Privacy On The Internet
Privacy On The InternetPrivacy On The Internet
Privacy On The Internetapemberton1
 
Internet Privacy: Time to Rethink?
Internet Privacy: Time to Rethink?Internet Privacy: Time to Rethink?
Internet Privacy: Time to Rethink?Jonathan Reichental
 
Internet Privacy Presentation (In Service)
Internet Privacy Presentation (In Service)Internet Privacy Presentation (In Service)
Internet Privacy Presentation (In Service)Bonnie Brzozowski
 
Privacy with Internet
Privacy with InternetPrivacy with Internet
Privacy with InternetMathias Klang
 

Destaque (7)

INTERNET PRIVACY
INTERNET PRIVACYINTERNET PRIVACY
INTERNET PRIVACY
 
TEDx Rhein-Main Michael Altendorf February 2011 - Virtual Identity and the en...
TEDx Rhein-Main Michael Altendorf February 2011 - Virtual Identity and the en...TEDx Rhein-Main Michael Altendorf February 2011 - Virtual Identity and the en...
TEDx Rhein-Main Michael Altendorf February 2011 - Virtual Identity and the en...
 
All Up In Your Face (Book):   Virtual Identity Management For Teens And You...
All Up In Your Face (Book): Virtual Identity Management For Teens And You...All Up In Your Face (Book): Virtual Identity Management For Teens And You...
All Up In Your Face (Book):   Virtual Identity Management For Teens And You...
 
Privacy On The Internet
Privacy On The InternetPrivacy On The Internet
Privacy On The Internet
 
Internet Privacy: Time to Rethink?
Internet Privacy: Time to Rethink?Internet Privacy: Time to Rethink?
Internet Privacy: Time to Rethink?
 
Internet Privacy Presentation (In Service)
Internet Privacy Presentation (In Service)Internet Privacy Presentation (In Service)
Internet Privacy Presentation (In Service)
 
Privacy with Internet
Privacy with InternetPrivacy with Internet
Privacy with Internet
 

Semelhante a Does Internet Privacy Truly Exist

Semelhante a Does Internet Privacy Truly Exist (14)

WCCC Faculty Presentation
WCCC Faculty PresentationWCCC Faculty Presentation
WCCC Faculty Presentation
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacy
 
Cyber Crime Essay
Cyber Crime EssayCyber Crime Essay
Cyber Crime Essay
 
Democracy2 IPMA Jan 12 2010
Democracy2 IPMA Jan 12 2010Democracy2 IPMA Jan 12 2010
Democracy2 IPMA Jan 12 2010
 
Internet Privacy Essay
Internet Privacy EssayInternet Privacy Essay
Internet Privacy Essay
 
The Role of Social Media in Da'awah
The Role of Social Media in Da'awahThe Role of Social Media in Da'awah
The Role of Social Media in Da'awah
 
Privacy reconsidered
Privacy reconsideredPrivacy reconsidered
Privacy reconsidered
 
Moldova Open Data Journalism Workshop
Moldova Open Data Journalism WorkshopMoldova Open Data Journalism Workshop
Moldova Open Data Journalism Workshop
 
Essays On Cyber Crime
Essays On Cyber CrimeEssays On Cyber Crime
Essays On Cyber Crime
 
Towards a More Open World
Towards a More Open WorldTowards a More Open World
Towards a More Open World
 
Data:The Fine Balance.We Trade Privacy for Convenience and Security.
Data:The Fine Balance.We Trade Privacy for Convenience and Security.Data:The Fine Balance.We Trade Privacy for Convenience and Security.
Data:The Fine Balance.We Trade Privacy for Convenience and Security.
 
Big data, a city of things and civic innovation
Big data, a city of things and civic innovationBig data, a city of things and civic innovation
Big data, a city of things and civic innovation
 
Cybercrime an international-crisis
Cybercrime an international-crisisCybercrime an international-crisis
Cybercrime an international-crisis
 
Cybercrime an international-crisis
Cybercrime an international-crisisCybercrime an international-crisis
Cybercrime an international-crisis
 

Último

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 

Último (20)

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 

Does Internet Privacy Truly Exist

  • 1. Internet Privacy: Does it Truly Exist? By: Kristen Toso Image: rosipaw
  • 2. Today, there are over 2.5 billion Internet users worldwide. With over 7 billion people in the world, that means that approximately 36% are using the Internet. Source: Internet World Stats Image: johnlemon
  • 3. That’s a lot of people with, consequently, a lot of personal data. Image: Leo Reynolds
  • 4. Image: Simon (via Pixabay)
  • 5. ...always under the assumption that their privacy rights are being respected. Image: Nina Strelov (via Fotopedia)
  • 6. However, throughout the Internet’s history, there have been a number of privacy scandals that have shaken users’trust. Image: Wikimedia Commons
  • 7. Violations of Internet privacy can happen to anyone at any time, regardless of age, level of digital literacy, wealth, or any other factor... Image: Wikimedia Commons
  • 8. ...which begs the following questions: Can information be kept truly personal on the Internet? Or, is Internet privacy simply an oxymoron? Image:jamingray
  • 9. Image: esthervargasc Today’s social media platforms, online shopping websites, financial services, and other such sites provide users with privacy settings in an attempt to protect their personal information.
  • 10. Image:chiarashine Even with these privacy settings, information can easily be acquired and used without user permission by different groups, including:
  • 11. The more transparent users are in their online profiles, the better that advertisers and corporations can target them with products and services. Source: Film 260 Lecture 02: i-Friends Image: Wikimedia Commons
  • 12. “...Google Glass opens an entirely new front in the digital war against privacy. These spectacles [...] represent a developmental leap in the history of data that is comparable to moving from the bicycle to the automobile... ...It is the sort of radical transformation that may actually end up completely destroying our individual privacy in the digital 21st century.” - Andrew Keen, CNN Image: Wikimedia Commons
  • 13. “People say very personal information to Siri [...] They are encouraged to think of Siri as their confidante and their assistant... ...But Siri is not just working for you. Siri is collecting a lot of data for Apple and for its business... ...And people should be very mindful and aware of what’s happening to their personal information... - Nicole Ozer, Lawyer (ACLU) Image: MattsMacintosh
  • 14. Scams, phishing and fraud are examples of ways that criminals can steal information from Internet users, which can have detrimental consequences. Image: pallotron
  • 15. Top continents from which online fraud originated from (2012): 1. Africa 2. Asia 3. South Amerca 4. Europe 5. North America The most commonly targeted online services: Retail, online dating, financial, gambling and travel. Source: Iovation Image: Simon Tong (via smugmug.com)
  • 16. IP addresses, emails and social media activity can potentially be obtained by the government under court rulings to closely monitor civilians. Image: neeravbhatt
  • 17. “Twitter, Facebook and other social media outlets have a great deal of information about all of us — and the government wants to be able to see it... [...] the government scored a major win — and Internet privacy lost big — when a judge ruled against Twitter in a fight over a trove of information about [Malcolm Harris,] a political activist.” - Adam Cohen, TIME Image: Wikimedia Commons
  • 18. Image: araenae (via Deviantart) In 2012, 849 requests were made by governments all over the world to obtain Twitter user information, with 80% of them being from the United States alone. Source: Twitter Transparency Report
  • 19. Image: Wikimedia Commons Users cannot assume that privacy settings are protecting their precious information. Evidently, despite the belief that privacy exists, there is a real risk involved with sharing personal information on the Internet.
  • 20. Image: wallpapers-mobilewallpapers.blogspot.ca Given this, there are preventive measures that you can take in order to protect yourself and your personal information on the Internet:
  • 21. in order to become more digitally-savvy. Share Internet privacy tips with friends and family. Image: Wikimedia Commons
  • 22. Image: Zomerstorm Think critically about what you are sharing, where you are sharing it, and who could potentially have access to it.
  • 23. Image: Lip Kee “A long-overdue bill in the California legislature, “The Right to Know Act,” would force companies such as Google and Facebook to reveal what personal information they have collected and how it’s being used.” - Adam Cohen, TIME Know, and fight for, your rights.
  • 24. Even with these pre-emptive measures, it is difficult to think that information can ever be private on the Internet; as the saying goes... Image: Chrisser
  • 25. Image: Horia Varlan What does the future hold for Internet privacy?
  • 26. Credits All images are licensed under the Creative Commons Non-Commercial Share-Alike 3.0 agreement and, unless otherwise specified, are sourced from Flickr.