SlideShare uma empresa Scribd logo
1 de 23
Privacy 

and Your Digital
Footprint"
By Stephanie Sellan"
In order to protect ourselves from corporations
and privacy loss, we must take responsibility to
minimize the amount of personal information
(i.e., our digital footprint) that is available online.
Digital Footprint
“The record of your interactions with the digital world and
how the data that is left behind can be exploited.”
What Data Is Being Used?
Explicit Data
§ Information that is provided intentionally
with no analysis but could
yield implicit data
§  Information provided in surveys
§  Registration forms
§  Membership applications
How often do
you provide
explicit data?
Implicit Data
§  Information that is not provided intentionally but
gathered from available data streams and analyzed
§  IP address
§  Behaviour on a website:
§  Page lingering
§  Shopping cart
items
§  Purchased items
§  Clickstreams
Where Is The
Data Being
Taken From?
How much
information do
you provide
about yourself?
Teen users:
§  91% post a photo of
themselves
§  71% post their school name
§  71% post the city/town where
they live
§  53% post their email address
§  20% post their cell phone
number
Facebook Profile
Image from Stephanie Sellan’s profile
Who influences you
and who do you
influence?
“64% of teens with
Twitter accounts
say that their tweets
are public”
Twitter Profile
Image from Stephanie Sellan’s profile
Who are your
connections on your
personal profile?
How much of
your profile have
you made
public?
LinkedIn Profile
Image from Stephanie Sellan’s profile
Have you
ever
Googled
yourself?
All interactions
with content online
and with social
media is stored,
analyzed, and
valued.
How Is The Data
Being Used?
“All of those photos [taken with
your smartphone] have specific
digital fingerprints, which
reveal where they were taken,
when they were taken and how
they traveled online” - CNN
Image by Stephanie Sellan
Stores are using their Wifi network to track customers'
smartphones and create a heatmap of their movements and
how long they stayed in each section of the store. - CNN
Tracking Through Wifi
Web tracking
Cookies track your
browsing habits & store
sensitive information
that has been previously
entered.
Why Is The Data
Being Used?
Facebook is tracking users' behaviour to better
advertise to them…choosing to "like" allows researchers to
extrapolate far more intimate details about you, such as
political leanings and religion. - CNN
“Twitter is allowing [leading
advertising firm] WPP to
analyze Twitter data to set up
a way to better monitor
real-time consumer
behaviour.” - CNN
Problems
§ Loss of data
ownership and
privacy
§ Explicit and
implicit data form
a unique profile
§ Data breaches
§ Digital tracking
Solutions To Protect Your
Privacy & Reduce Your
Digital Footprint
§ Investigate privacy settings on all social media platforms
§ Remove yourself from tagged photos
§ Do not share your birthday, home address, phone number,
or location on social networking sites
§ Opt out of data-tracking settings
§ Avoid using public, unsecure wifi
§ Delete cookies often
“86% of adult internet users have taken steps to avoid
surveillance by other people or organizations when they
were using the internet…
…and 68% say current privacy protection
laws are not good enough.” - PewResearch
What happens
online,
stays online.
Quote Sources
•  http://www.linkedin.com/today/post/article/20131111183317-110300724-digital-footprints-
the-journey-from-business-intelligence-to-analytics
•  http://www.mydigitalfootprint.com/p/defining-digital-footprint.html
•  http://whatis.techtarget.com/definition/explicit-data
•  http://whatis.techtarget.com/definition/implicit-data
•  http://www.pewinternet.org/2013/05/21/teens-social-media-and-privacy/
•  http://www.cnn.com/2013/06/13/living/buzzfeed-data-mining/
•  http://en.wikipedia.org/wiki/HTTP_cookie
•  http://globalnews.ca/news/1109644/your-digital-footprint-steps-to-personal-data-privacy/
•  http://www.pewinternet.org/2013/09/05/anonymity-privacy-and-security-online-2/
Image Sources
•  Digital Footprint. https://www.flickr.com/photos/alpha_auer/5068482201/sizes/m/in/photostream/
•  World Flight Paths by James Cheshire. http://spatial.ly/2013/05/great-world-flight-paths-map/
•  Dilbert Comic. http://2.bp.blogspot.com/-qddjAhKk7aQ/U0UgKVzh0TI/AAAAAAAAApw/gzrAdxH5fpk/s1600/
image001-744639.png
•  World Wide Web. http://upload.wikimedia.org/wikipedia/commons/7/75/Internet1.jpg
•  Online Shopping. http://commons.wikimedia.org/wiki/File:Online_Shopping_with_Touchscreen_Ultrabook.jpg
•  Facebook Icon. http://commons.wikimedia.org/wiki/File:Facebook_logo_(square).png
•  Instagram Icon. https://www.flickr.com/photos/jccchou/7111260505/sizes/o/in/photostream/
•  Twitter Icon. https://www.flickr.com/photos/kooroshication/9093733888/
•  YouTube Logo. http://commons.wikimedia.org/wiki/File:YouTube-logo-seit-Dezember-2013.png
•  Amazon Logo. http://upload.wikimedia.org/wikipedia/commons/thumb/6/62/Amazon.com-Logo.svg/500px-Amazon.com-
Logo.svg.png
•  Tumblr Icon. http://commons.wikimedia.org/wiki/File:Tumblr_Logo.svg
•  Pinterest Icon. http://upload.wikimedia.org/wikipedia/commons/thumb/3/35/Pinterest_Logo.svg/500px-
Pinterest_Logo.svg.png
•  LinkedIn Icon. http://commons.wikimedia.org/wiki/File:LinkedIn_logo_initials.png
Image Sources
•  Social Connectedness. http://www.cosmosmagazine.com/news/studies-show-health-benefits-social-connectedness/
•  Interactions. http://datablog.is.ed.ac.uk/files/2013/12/bitsissue8_low_spreads-3.png
•  Fingerprint. http://commons.wikimedia.org/wiki/File:Fingerprint_picture.svg
•  Wifi Icon made by SimpleIcon from Flaticon.com
•  Heatmap (66% Colour Saturation). https://www.flickr.com/photos/stevefaeembra/3674760067/
•  Big Data. http://www.themarketingbit.com/wp-content/uploads/2012/11/big-data-image.jpg
•  Mining. http://upload.wikimedia.org/wikipedia/commons/c/c9/Coal_mining.jpg
•  Big Data. http://www.greenbookblog.org/2012/03/21/big-data-opportunity-or-threat-for-market-research/
•  Plugs. https://www.flickr.com/photos/beraldoleal/8681750288/sizes/m/in/photostream/
•  Cameras. http://upload.wikimedia.org/wikipedia/commons/9/98/
Überwachungskameras_Autohof_in_Thüringen_an_A9_03.06.2013_10-07-08.JPG Surveillance Camera
•  Privacy. https://www.flickr.com/photos/opensourceway/4638981545/sizes/m/in/photostream/ Privacy
•  Servers. https://www.flickr.com/photos/beraldoleal/8681752576/sizes/m/in/photostream/

Mais conteúdo relacionado

Mais procurados

Chapter 12: Computer Mediated Communicationcmc
Chapter 12: Computer Mediated CommunicationcmcChapter 12: Computer Mediated Communicationcmc
Chapter 12: Computer Mediated Communicationcmc
Ray Brannon
 
Information & Intent: Optimizing Content and the User Search Experience
Information & Intent: Optimizing Content and the User Search ExperienceInformation & Intent: Optimizing Content and the User Search Experience
Information & Intent: Optimizing Content and the User Search Experience
Jonathan Mendez
 
Web Search Training 2
Web Search Training 2Web Search Training 2
Web Search Training 2
gwasny
 
Raytheon-NCSA_Millennial_Survey_report_2014
Raytheon-NCSA_Millennial_Survey_report_2014Raytheon-NCSA_Millennial_Survey_report_2014
Raytheon-NCSA_Millennial_Survey_report_2014
Blair Gately
 
Jbouse EM Comms Big Data Laptop v AACRAO Webinar 150402v1 online v
Jbouse EM Comms Big Data Laptop v AACRAO Webinar 150402v1 online vJbouse EM Comms Big Data Laptop v AACRAO Webinar 150402v1 online v
Jbouse EM Comms Big Data Laptop v AACRAO Webinar 150402v1 online v
Jim Bouse
 
Roundtable: Social Media Users' Privacy Expectations & the Ethics of Using Th...
Roundtable: Social Media Users' Privacy Expectations & the Ethics of Using Th...Roundtable: Social Media Users' Privacy Expectations & the Ethics of Using Th...
Roundtable: Social Media Users' Privacy Expectations & the Ethics of Using Th...
Toronto Metropolitan University
 

Mais procurados (20)

Chapter 12: Computer Mediated Communicationcmc
Chapter 12: Computer Mediated CommunicationcmcChapter 12: Computer Mediated Communicationcmc
Chapter 12: Computer Mediated Communicationcmc
 
Information & Intent: Optimizing Content and the User Search Experience
Information & Intent: Optimizing Content and the User Search ExperienceInformation & Intent: Optimizing Content and the User Search Experience
Information & Intent: Optimizing Content and the User Search Experience
 
Facebook data breach
Facebook data breachFacebook data breach
Facebook data breach
 
Phoenix Lincoln Property Company
Phoenix Lincoln Property CompanyPhoenix Lincoln Property Company
Phoenix Lincoln Property Company
 
Web Search Training 2
Web Search Training 2Web Search Training 2
Web Search Training 2
 
Chapter 7: New and Mobile Media Technologies Innovations and Investments
Chapter 7: New and Mobile Media Technologies Innovations and InvestmentsChapter 7: New and Mobile Media Technologies Innovations and Investments
Chapter 7: New and Mobile Media Technologies Innovations and Investments
 
Case Analysis Presentation On Facebook Data Breach
Case Analysis Presentation On Facebook Data BreachCase Analysis Presentation On Facebook Data Breach
Case Analysis Presentation On Facebook Data Breach
 
MIMA Summit Social Marketing 101 presentation
MIMA Summit Social Marketing 101 presentationMIMA Summit Social Marketing 101 presentation
MIMA Summit Social Marketing 101 presentation
 
Facebook Scandal
Facebook ScandalFacebook Scandal
Facebook Scandal
 
Raytheon-NCSA_Millennial_Survey_report_2014
Raytheon-NCSA_Millennial_Survey_report_2014Raytheon-NCSA_Millennial_Survey_report_2014
Raytheon-NCSA_Millennial_Survey_report_2014
 
Bakir talk leuven dec2019 2
Bakir talk leuven dec2019 2Bakir talk leuven dec2019 2
Bakir talk leuven dec2019 2
 
Cambridge Analytica as a Prime Example of the Manipulation of Democratic Deci...
Cambridge Analytica as a Prime Example of the Manipulation of Democratic Deci...Cambridge Analytica as a Prime Example of the Manipulation of Democratic Deci...
Cambridge Analytica as a Prime Example of the Manipulation of Democratic Deci...
 
Facebook & Cambridge Data Analytica Scandal
Facebook & Cambridge Data Analytica ScandalFacebook & Cambridge Data Analytica Scandal
Facebook & Cambridge Data Analytica Scandal
 
Michael Davey
Michael DaveyMichael Davey
Michael Davey
 
DeCA Tier One Training for Senior Leadership
DeCA Tier One Training for Senior Leadership DeCA Tier One Training for Senior Leadership
DeCA Tier One Training for Senior Leadership
 
Jbouse EM Comms Big Data Laptop v AACRAO Webinar 150402v1 online v
Jbouse EM Comms Big Data Laptop v AACRAO Webinar 150402v1 online vJbouse EM Comms Big Data Laptop v AACRAO Webinar 150402v1 online v
Jbouse EM Comms Big Data Laptop v AACRAO Webinar 150402v1 online v
 
Facebook and cambridge analytica scandal
Facebook and cambridge analytica scandalFacebook and cambridge analytica scandal
Facebook and cambridge analytica scandal
 
Roundtable: Social Media Users' Privacy Expectations & the Ethics of Using Th...
Roundtable: Social Media Users' Privacy Expectations & the Ethics of Using Th...Roundtable: Social Media Users' Privacy Expectations & the Ethics of Using Th...
Roundtable: Social Media Users' Privacy Expectations & the Ethics of Using Th...
 
Why oversharing on Social Media is bad...for everyone
Why oversharing on Social Media is bad...for everyoneWhy oversharing on Social Media is bad...for everyone
Why oversharing on Social Media is bad...for everyone
 
Ryan ziemba marketing consulting deck
Ryan ziemba   marketing consulting deckRyan ziemba   marketing consulting deck
Ryan ziemba marketing consulting deck
 

Semelhante a Privacy and Your Digital Footprint

Pod camp boston 2011 locking up yourself online
Pod camp boston 2011 locking up yourself onlinePod camp boston 2011 locking up yourself online
Pod camp boston 2011 locking up yourself online
Lane Sutton
 
Grabbing Online Technology Faith Based
Grabbing Online Technology Faith BasedGrabbing Online Technology Faith Based
Grabbing Online Technology Faith Based
Pam Dechert
 
My Online Image
My Online ImageMy Online Image
My Online Image
aluthe
 
Cate's Tulsa Presentation
Cate's Tulsa PresentationCate's Tulsa Presentation
Cate's Tulsa Presentation
eTapestryCate
 
Cate's Feb 24th Internet Strategies Webinar
Cate's Feb 24th Internet Strategies WebinarCate's Feb 24th Internet Strategies Webinar
Cate's Feb 24th Internet Strategies Webinar
eTapestryCate
 

Semelhante a Privacy and Your Digital Footprint (20)

Pod camp boston 2011 locking up yourself online
Pod camp boston 2011 locking up yourself onlinePod camp boston 2011 locking up yourself online
Pod camp boston 2011 locking up yourself online
 
Cyber Awareness.pptx
Cyber Awareness.pptxCyber Awareness.pptx
Cyber Awareness.pptx
 
Free geek class on Data privacy
Free geek class on Data privacyFree geek class on Data privacy
Free geek class on Data privacy
 
None of Your Beeswax: Attitudes Towards Privacy
None of Your Beeswax: Attitudes Towards PrivacyNone of Your Beeswax: Attitudes Towards Privacy
None of Your Beeswax: Attitudes Towards Privacy
 
Privacy in the Digital Age
Privacy in the Digital AgePrivacy in the Digital Age
Privacy in the Digital Age
 
Networked Privacy in the Age of Surveillance, Sousveillance, Coveillance
Networked Privacy in the Age of Surveillance, Sousveillance, CoveillanceNetworked Privacy in the Age of Surveillance, Sousveillance, Coveillance
Networked Privacy in the Age of Surveillance, Sousveillance, Coveillance
 
Grabbing Online Technology Faith Based
Grabbing Online Technology Faith BasedGrabbing Online Technology Faith Based
Grabbing Online Technology Faith Based
 
My Online Image
My Online ImageMy Online Image
My Online Image
 
Bridgewater College Cyber Security Presentation
Bridgewater College Cyber Security PresentationBridgewater College Cyber Security Presentation
Bridgewater College Cyber Security Presentation
 
Digital Footprint
Digital Footprint  Digital Footprint
Digital Footprint
 
CSUN - Youth Driven Information Privacy Education Campaign
CSUN - Youth Driven Information Privacy Education CampaignCSUN - Youth Driven Information Privacy Education Campaign
CSUN - Youth Driven Information Privacy Education Campaign
 
Online Reputation
Online ReputationOnline Reputation
Online Reputation
 
Digital footprints& datamining
Digital footprints& dataminingDigital footprints& datamining
Digital footprints& datamining
 
How Tracking Your Personal Data Really Adds Up | SoGoSurvey
How Tracking Your Personal Data Really Adds Up | SoGoSurveyHow Tracking Your Personal Data Really Adds Up | SoGoSurvey
How Tracking Your Personal Data Really Adds Up | SoGoSurvey
 
Cate's Tulsa Presentation
Cate's Tulsa PresentationCate's Tulsa Presentation
Cate's Tulsa Presentation
 
Cate's Feb 24th Internet Strategies Webinar
Cate's Feb 24th Internet Strategies WebinarCate's Feb 24th Internet Strategies Webinar
Cate's Feb 24th Internet Strategies Webinar
 
Social Network Privacy, Security and Identity:One
Social Network Privacy, Security and Identity:OneSocial Network Privacy, Security and Identity:One
Social Network Privacy, Security and Identity:One
 
Why private search is important for everone and how you can protect your pers...
Why private search is important for everone and how you can protect your pers...Why private search is important for everone and how you can protect your pers...
Why private search is important for everone and how you can protect your pers...
 
Why private search is important for everone and how you can protect your pers...
Why private search is important for everone and how you can protect your pers...Why private search is important for everone and how you can protect your pers...
Why private search is important for everone and how you can protect your pers...
 
Privacy on the Internet
Privacy on the InternetPrivacy on the Internet
Privacy on the Internet
 

Último

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Último (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 

Privacy and Your Digital Footprint

  • 1. Privacy 
 and Your Digital Footprint" By Stephanie Sellan"
  • 2. In order to protect ourselves from corporations and privacy loss, we must take responsibility to minimize the amount of personal information (i.e., our digital footprint) that is available online.
  • 3. Digital Footprint “The record of your interactions with the digital world and how the data that is left behind can be exploited.”
  • 4. What Data Is Being Used?
  • 5. Explicit Data § Information that is provided intentionally with no analysis but could yield implicit data §  Information provided in surveys §  Registration forms §  Membership applications How often do you provide explicit data?
  • 6. Implicit Data §  Information that is not provided intentionally but gathered from available data streams and analyzed §  IP address §  Behaviour on a website: §  Page lingering §  Shopping cart items §  Purchased items §  Clickstreams
  • 7. Where Is The Data Being Taken From?
  • 8. How much information do you provide about yourself? Teen users: §  91% post a photo of themselves §  71% post their school name §  71% post the city/town where they live §  53% post their email address §  20% post their cell phone number Facebook Profile Image from Stephanie Sellan’s profile
  • 9. Who influences you and who do you influence? “64% of teens with Twitter accounts say that their tweets are public” Twitter Profile Image from Stephanie Sellan’s profile
  • 10. Who are your connections on your personal profile? How much of your profile have you made public? LinkedIn Profile Image from Stephanie Sellan’s profile
  • 12. All interactions with content online and with social media is stored, analyzed, and valued.
  • 13. How Is The Data Being Used? “All of those photos [taken with your smartphone] have specific digital fingerprints, which reveal where they were taken, when they were taken and how they traveled online” - CNN Image by Stephanie Sellan
  • 14. Stores are using their Wifi network to track customers' smartphones and create a heatmap of their movements and how long they stayed in each section of the store. - CNN Tracking Through Wifi
  • 15. Web tracking Cookies track your browsing habits & store sensitive information that has been previously entered.
  • 16. Why Is The Data Being Used? Facebook is tracking users' behaviour to better advertise to them…choosing to "like" allows researchers to extrapolate far more intimate details about you, such as political leanings and religion. - CNN “Twitter is allowing [leading advertising firm] WPP to analyze Twitter data to set up a way to better monitor real-time consumer behaviour.” - CNN
  • 17. Problems § Loss of data ownership and privacy § Explicit and implicit data form a unique profile § Data breaches § Digital tracking
  • 18. Solutions To Protect Your Privacy & Reduce Your Digital Footprint § Investigate privacy settings on all social media platforms § Remove yourself from tagged photos § Do not share your birthday, home address, phone number, or location on social networking sites § Opt out of data-tracking settings § Avoid using public, unsecure wifi § Delete cookies often
  • 19. “86% of adult internet users have taken steps to avoid surveillance by other people or organizations when they were using the internet… …and 68% say current privacy protection laws are not good enough.” - PewResearch
  • 21. Quote Sources •  http://www.linkedin.com/today/post/article/20131111183317-110300724-digital-footprints- the-journey-from-business-intelligence-to-analytics •  http://www.mydigitalfootprint.com/p/defining-digital-footprint.html •  http://whatis.techtarget.com/definition/explicit-data •  http://whatis.techtarget.com/definition/implicit-data •  http://www.pewinternet.org/2013/05/21/teens-social-media-and-privacy/ •  http://www.cnn.com/2013/06/13/living/buzzfeed-data-mining/ •  http://en.wikipedia.org/wiki/HTTP_cookie •  http://globalnews.ca/news/1109644/your-digital-footprint-steps-to-personal-data-privacy/ •  http://www.pewinternet.org/2013/09/05/anonymity-privacy-and-security-online-2/
  • 22. Image Sources •  Digital Footprint. https://www.flickr.com/photos/alpha_auer/5068482201/sizes/m/in/photostream/ •  World Flight Paths by James Cheshire. http://spatial.ly/2013/05/great-world-flight-paths-map/ •  Dilbert Comic. http://2.bp.blogspot.com/-qddjAhKk7aQ/U0UgKVzh0TI/AAAAAAAAApw/gzrAdxH5fpk/s1600/ image001-744639.png •  World Wide Web. http://upload.wikimedia.org/wikipedia/commons/7/75/Internet1.jpg •  Online Shopping. http://commons.wikimedia.org/wiki/File:Online_Shopping_with_Touchscreen_Ultrabook.jpg •  Facebook Icon. http://commons.wikimedia.org/wiki/File:Facebook_logo_(square).png •  Instagram Icon. https://www.flickr.com/photos/jccchou/7111260505/sizes/o/in/photostream/ •  Twitter Icon. https://www.flickr.com/photos/kooroshication/9093733888/ •  YouTube Logo. http://commons.wikimedia.org/wiki/File:YouTube-logo-seit-Dezember-2013.png •  Amazon Logo. http://upload.wikimedia.org/wikipedia/commons/thumb/6/62/Amazon.com-Logo.svg/500px-Amazon.com- Logo.svg.png •  Tumblr Icon. http://commons.wikimedia.org/wiki/File:Tumblr_Logo.svg •  Pinterest Icon. http://upload.wikimedia.org/wikipedia/commons/thumb/3/35/Pinterest_Logo.svg/500px- Pinterest_Logo.svg.png •  LinkedIn Icon. http://commons.wikimedia.org/wiki/File:LinkedIn_logo_initials.png
  • 23. Image Sources •  Social Connectedness. http://www.cosmosmagazine.com/news/studies-show-health-benefits-social-connectedness/ •  Interactions. http://datablog.is.ed.ac.uk/files/2013/12/bitsissue8_low_spreads-3.png •  Fingerprint. http://commons.wikimedia.org/wiki/File:Fingerprint_picture.svg •  Wifi Icon made by SimpleIcon from Flaticon.com •  Heatmap (66% Colour Saturation). https://www.flickr.com/photos/stevefaeembra/3674760067/ •  Big Data. http://www.themarketingbit.com/wp-content/uploads/2012/11/big-data-image.jpg •  Mining. http://upload.wikimedia.org/wikipedia/commons/c/c9/Coal_mining.jpg •  Big Data. http://www.greenbookblog.org/2012/03/21/big-data-opportunity-or-threat-for-market-research/ •  Plugs. https://www.flickr.com/photos/beraldoleal/8681750288/sizes/m/in/photostream/ •  Cameras. http://upload.wikimedia.org/wikipedia/commons/9/98/ Überwachungskameras_Autohof_in_Thüringen_an_A9_03.06.2013_10-07-08.JPG Surveillance Camera •  Privacy. https://www.flickr.com/photos/opensourceway/4638981545/sizes/m/in/photostream/ Privacy •  Servers. https://www.flickr.com/photos/beraldoleal/8681752576/sizes/m/in/photostream/