SlideShare uma empresa Scribd logo
1 de 20
Baixar para ler offline
Privacy in a digital age
Félix García Lainez - Curso 2014-15
2º Nivel Avanzado Inglés - EOI Huesca
1
Executive Summary
1. Introduction
2. Key Facts
3. Privacy Issues
4. Cloud Storage
5. Tips
6. Q & A
2
1. Introduction
• Web 2.0 - Participatory information sharing and
collaboration on the Internet
• The rise of social networking in the past decade
has been impressive
• Mobile devices are changing the world
• We are moving to a connected world (IoT)
3
2. Key Facts
• There has been more content created in the last seven
years than the previous four billion
• Perhaps more importantly, information has never been so
accessible
• 3 billion Internet users worldwide in 2015 (40% of the
world population)
• 1.91 billion smartphone users across the globe (25% of
the world population)
• And it is only the beginning…
4
2. Key Facts
5
2. Key Facts
6
3. Privacy issues
• Cyberstalking and location disclosure (e.g.
An application named "Creepy" can track a
person's location on a map using photos
uploaded to Twitter or Flickr)
• Social profiling and 3rd party disclosure (e.g.
Private information inadvertently being sent to
3rd party advertising sites via Referrer strings or
Cookies)
7
3. Privacy issues
• Invasive privacy agreements (e.g. The privacy
agreement states that the social network owns all of the
content that users upload)
• Law enforcement prowling the networks (e.g. A criminal
charged with bank fraud, and having escaped to Mexico,
was nowhere to be found until he started posting on
Facebook. Although his profile was private, his list of
friends was not…)
• Preteens and early teenagers (i.e. The most vulnerable
victims of private-information-sharing behavior are
preteens and early teenagers)
8
Real-life examples
While surfing the Internet, I was searching for a
pair of new trainers. After that, Facebook
advertised me exactly what I was looking for…
9
3. Privacy issues
Real-life examples
Facebook acquired WhatsApp… Are they going to
read our messages?
10
3. Privacy issues
Real-life examples
Google Now read my brother’s email and notified
him that my flight was delayed
11
3. Privacy issues
4. Cloud Storage
What is “the Cloud” - and where is it?
12
13
4. Cloud Storage
14
4. Cloud Storage
15
4. Cloud Storage
• "Cloud" is a buzzword that vaguely suggests the
promise and convenience of being able to access
files from anywhere
• Easily share data between all your devices
• The truth about “the Cloud” - If your data lives "in
the cloud," it actually lives on a company's server
• How safe is your data in “the Cloud”? A Goldmine
for hackers?
16
4. Cloud Storage
How safe is your data?
• Privacy - Is your data mined for advertising and marketing
purposes?
• Reliability - Will the service always be available?
• Security - Is your data encrypted?
• Continuity - Can the provider suspend your account?
• Performance - Is your Internet connection fast enough?
• Copyright - Who owns the content you upload?
17
4. Cloud Storage
5. Tips
• Don’t do anything you don’t understand
• Read the privacy policies of the online services
that you use
• Think before you post
• Be a good digital citizen (people can’t hide
behind a username anymore)
18
5. Tips
“If you’ve got nothing to hide, you have
nothing to worry about”
19
Q & A
20

Mais conteúdo relacionado

Mais procurados

Advantages and disadvantages of technology
Advantages and disadvantages of technologyAdvantages and disadvantages of technology
Advantages and disadvantages of technology
regine isabedra
 
Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber laws
mulikaa
 
*Cyber bullying presentation*
*Cyber bullying presentation**Cyber bullying presentation*
*Cyber bullying presentation*
Amber Dee
 
Full report smart phone impact on social relationship management
Full report smart phone impact on social relationship managementFull report smart phone impact on social relationship management
Full report smart phone impact on social relationship management
varsha nihanth lade
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
Hem Pokhrel
 
Need And Importance Of Cyber Law
Need And Importance Of Cyber LawNeed And Importance Of Cyber Law
Need And Importance Of Cyber Law
Poonam Bhasin
 

Mais procurados (20)

Misuse of Internet
Misuse of InternetMisuse of Internet
Misuse of Internet
 
Advantages and disadvantages of technology
Advantages and disadvantages of technologyAdvantages and disadvantages of technology
Advantages and disadvantages of technology
 
Cyber fraud in banks
Cyber fraud in banksCyber fraud in banks
Cyber fraud in banks
 
Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber laws
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
*Cyber bullying presentation*
*Cyber bullying presentation**Cyber bullying presentation*
*Cyber bullying presentation*
 
Cyber crime ppt new
Cyber crime ppt newCyber crime ppt new
Cyber crime ppt new
 
Cyber safety tips
Cyber safety tipsCyber safety tips
Cyber safety tips
 
Exploring machine learning techniques for fake profile detection in online so...
Exploring machine learning techniques for fake profile detection in online so...Exploring machine learning techniques for fake profile detection in online so...
Exploring machine learning techniques for fake profile detection in online so...
 
Cyber Governemace In Pakistan
Cyber Governemace In PakistanCyber Governemace In Pakistan
Cyber Governemace In Pakistan
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
 
Full report smart phone impact on social relationship management
Full report smart phone impact on social relationship managementFull report smart phone impact on social relationship management
Full report smart phone impact on social relationship management
 
Cybercrimes (Against Children)
Cybercrimes (Against Children)Cybercrimes (Against Children)
Cybercrimes (Against Children)
 
Privacy In The Digital Age
Privacy In The Digital AgePrivacy In The Digital Age
Privacy In The Digital Age
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
 
Cyber crime and cyber laws
Cyber crime and cyber lawsCyber crime and cyber laws
Cyber crime and cyber laws
 
CYBER CRIME ppt
CYBER CRIME pptCYBER CRIME ppt
CYBER CRIME ppt
 
Need And Importance Of Cyber Law
Need And Importance Of Cyber LawNeed And Importance Of Cyber Law
Need And Importance Of Cyber Law
 
Navegar por internet de forma segura
Navegar por internet de forma seguraNavegar por internet de forma segura
Navegar por internet de forma segura
 
Negative Effects of Social Media
Negative Effects of Social MediaNegative Effects of Social Media
Negative Effects of Social Media
 

Destaque (6)

Mobile Privacy in the Digital Age
Mobile Privacy in the Digital AgeMobile Privacy in the Digital Age
Mobile Privacy in the Digital Age
 
If The World Were A Village
If The World Were A VillageIf The World Were A Village
If The World Were A Village
 
Operating system security
Operating system securityOperating system security
Operating system security
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
 

Semelhante a Privacy in a Digital age

Argumentative Essay On Internet Privacy
Argumentative Essay On Internet PrivacyArgumentative Essay On Internet Privacy
Argumentative Essay On Internet Privacy
Scientific Paper Writing Services Albuquerque
 
Social media and challenges ahead by Petter Warnsberg
Social media and challenges ahead by Petter WarnsbergSocial media and challenges ahead by Petter Warnsberg
Social media and challenges ahead by Petter Warnsberg
Dina El-sofy
 
Lesson-1-Introduction-and Current-Situation-of-ICT.pptx
Lesson-1-Introduction-and Current-Situation-of-ICT.pptxLesson-1-Introduction-and Current-Situation-of-ICT.pptx
Lesson-1-Introduction-and Current-Situation-of-ICT.pptx
jjjaca
 
Your e image presentation
Your e image presentationYour e image presentation
Your e image presentation
lahill16
 

Semelhante a Privacy in a Digital age (20)

Internet Security is an Oxymoron
Internet Security is an OxymoronInternet Security is an Oxymoron
Internet Security is an Oxymoron
 
Argumentative Essay On Internet Privacy
Argumentative Essay On Internet PrivacyArgumentative Essay On Internet Privacy
Argumentative Essay On Internet Privacy
 
ICT 7 Q2 Chapter 1 PPT.pptx
ICT 7 Q2 Chapter 1 PPT.pptxICT 7 Q2 Chapter 1 PPT.pptx
ICT 7 Q2 Chapter 1 PPT.pptx
 
Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...
Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...
Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...
 
Risks and Security of Internet and System
Risks and Security of Internet and SystemRisks and Security of Internet and System
Risks and Security of Internet and System
 
Reining in the Data ITAG tech360 Penn State Great Valley 2015
Reining in the Data   ITAG tech360 Penn State Great Valley 2015 Reining in the Data   ITAG tech360 Penn State Great Valley 2015
Reining in the Data ITAG tech360 Penn State Great Valley 2015
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Social media and challenges ahead by Petter Warnsberg
Social media and challenges ahead by Petter WarnsbergSocial media and challenges ahead by Petter Warnsberg
Social media and challenges ahead by Petter Warnsberg
 
Multimedia Privacy
Multimedia PrivacyMultimedia Privacy
Multimedia Privacy
 
Power point assignment
Power point assignmentPower point assignment
Power point assignment
 
Empowerment Technologies 1.pptx
Empowerment Technologies 1.pptxEmpowerment Technologies 1.pptx
Empowerment Technologies 1.pptx
 
Lesson-1-Introduction-and Current-Situation-of-ICT.pptx
Lesson-1-Introduction-and Current-Situation-of-ICT.pptxLesson-1-Introduction-and Current-Situation-of-ICT.pptx
Lesson-1-Introduction-and Current-Situation-of-ICT.pptx
 
How children's fingerprints on the web could mean the end of PII Authenticati...
How children's fingerprints on the web could mean the end of PII Authenticati...How children's fingerprints on the web could mean the end of PII Authenticati...
How children's fingerprints on the web could mean the end of PII Authenticati...
 
Social networking privacy issues & exposure
Social networking privacy issues & exposureSocial networking privacy issues & exposure
Social networking privacy issues & exposure
 
Your e image presentation
Your e image presentationYour e image presentation
Your e image presentation
 
Web 3.0
Web 3.0Web 3.0
Web 3.0
 
Are you ready to raise, educate and protect "Digital Natives"
Are you ready to raise, educate and protect "Digital Natives"Are you ready to raise, educate and protect "Digital Natives"
Are you ready to raise, educate and protect "Digital Natives"
 
CYP E-Safety
CYP E-SafetyCYP E-Safety
CYP E-Safety
 
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
 
Student Privacy - Teaching's New Moral Dilema
Student Privacy - Teaching's New Moral DilemaStudent Privacy - Teaching's New Moral Dilema
Student Privacy - Teaching's New Moral Dilema
 

Último

Production 2024 sunderland culture final - Copy.pptx
Production 2024 sunderland culture final - Copy.pptxProduction 2024 sunderland culture final - Copy.pptx
Production 2024 sunderland culture final - Copy.pptx
ChloeMeadows1
 
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkkaudience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
lolsDocherty
 

Último (17)

Production 2024 sunderland culture final - Copy.pptx
Production 2024 sunderland culture final - Copy.pptxProduction 2024 sunderland culture final - Copy.pptx
Production 2024 sunderland culture final - Copy.pptx
 
Thank You Luv I’ll Never Walk Alone Again T shirts
Thank You Luv I’ll Never Walk Alone Again T shirtsThank You Luv I’ll Never Walk Alone Again T shirts
Thank You Luv I’ll Never Walk Alone Again T shirts
 
GOOGLE Io 2024 At takes center stage.pdf
GOOGLE Io 2024 At takes center stage.pdfGOOGLE Io 2024 At takes center stage.pdf
GOOGLE Io 2024 At takes center stage.pdf
 
Development Lifecycle.pptx for the secure development of apps
Development Lifecycle.pptx for the secure development of appsDevelopment Lifecycle.pptx for the secure development of apps
Development Lifecycle.pptx for the secure development of apps
 
iThome_CYBERSEC2024_Drive_Into_the_DarkWeb
iThome_CYBERSEC2024_Drive_Into_the_DarkWebiThome_CYBERSEC2024_Drive_Into_the_DarkWeb
iThome_CYBERSEC2024_Drive_Into_the_DarkWeb
 
Bug Bounty Blueprint : A Beginner's Guide
Bug Bounty Blueprint : A Beginner's GuideBug Bounty Blueprint : A Beginner's Guide
Bug Bounty Blueprint : A Beginner's Guide
 
TORTOGEL TELAH MENJADI SALAH SATU PLATFORM PERMAINAN PALING FAVORIT.
TORTOGEL TELAH MENJADI SALAH SATU PLATFORM PERMAINAN PALING FAVORIT.TORTOGEL TELAH MENJADI SALAH SATU PLATFORM PERMAINAN PALING FAVORIT.
TORTOGEL TELAH MENJADI SALAH SATU PLATFORM PERMAINAN PALING FAVORIT.
 
The Use of AI in Indonesia Election 2024: A Case Study
The Use of AI in Indonesia Election 2024: A Case StudyThe Use of AI in Indonesia Election 2024: A Case Study
The Use of AI in Indonesia Election 2024: A Case Study
 
Cyber Security Services Unveiled: Strategies to Secure Your Digital Presence
Cyber Security Services Unveiled: Strategies to Secure Your Digital PresenceCyber Security Services Unveiled: Strategies to Secure Your Digital Presence
Cyber Security Services Unveiled: Strategies to Secure Your Digital Presence
 
Free scottie t shirts Free scottie t shirts
Free scottie t shirts Free scottie t shirtsFree scottie t shirts Free scottie t shirts
Free scottie t shirts Free scottie t shirts
 
Pvtaan Social media marketing proposal.pdf
Pvtaan Social media marketing proposal.pdfPvtaan Social media marketing proposal.pdf
Pvtaan Social media marketing proposal.pdf
 
Statistical Analysis of DNS Latencies.pdf
Statistical Analysis of DNS Latencies.pdfStatistical Analysis of DNS Latencies.pdf
Statistical Analysis of DNS Latencies.pdf
 
Premier Mobile App Development Agency in USA.pdf
Premier Mobile App Development Agency in USA.pdfPremier Mobile App Development Agency in USA.pdf
Premier Mobile App Development Agency in USA.pdf
 
How Do I Begin the Linksys Velop Setup Process?
How Do I Begin the Linksys Velop Setup Process?How Do I Begin the Linksys Velop Setup Process?
How Do I Begin the Linksys Velop Setup Process?
 
I’ll See Y’All Motherfuckers In Game 7 Shirt
I’ll See Y’All Motherfuckers In Game 7 ShirtI’ll See Y’All Motherfuckers In Game 7 Shirt
I’ll See Y’All Motherfuckers In Game 7 Shirt
 
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkkaudience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
 
Reggie miller choke t shirtsReggie miller choke t shirts
Reggie miller choke t shirtsReggie miller choke t shirtsReggie miller choke t shirtsReggie miller choke t shirts
Reggie miller choke t shirtsReggie miller choke t shirts
 

Privacy in a Digital age

  • 1. Privacy in a digital age Félix García Lainez - Curso 2014-15 2º Nivel Avanzado Inglés - EOI Huesca 1
  • 2. Executive Summary 1. Introduction 2. Key Facts 3. Privacy Issues 4. Cloud Storage 5. Tips 6. Q & A 2
  • 3. 1. Introduction • Web 2.0 - Participatory information sharing and collaboration on the Internet • The rise of social networking in the past decade has been impressive • Mobile devices are changing the world • We are moving to a connected world (IoT) 3
  • 4. 2. Key Facts • There has been more content created in the last seven years than the previous four billion • Perhaps more importantly, information has never been so accessible • 3 billion Internet users worldwide in 2015 (40% of the world population) • 1.91 billion smartphone users across the globe (25% of the world population) • And it is only the beginning… 4
  • 7. 3. Privacy issues • Cyberstalking and location disclosure (e.g. An application named "Creepy" can track a person's location on a map using photos uploaded to Twitter or Flickr) • Social profiling and 3rd party disclosure (e.g. Private information inadvertently being sent to 3rd party advertising sites via Referrer strings or Cookies) 7
  • 8. 3. Privacy issues • Invasive privacy agreements (e.g. The privacy agreement states that the social network owns all of the content that users upload) • Law enforcement prowling the networks (e.g. A criminal charged with bank fraud, and having escaped to Mexico, was nowhere to be found until he started posting on Facebook. Although his profile was private, his list of friends was not…) • Preteens and early teenagers (i.e. The most vulnerable victims of private-information-sharing behavior are preteens and early teenagers) 8
  • 9. Real-life examples While surfing the Internet, I was searching for a pair of new trainers. After that, Facebook advertised me exactly what I was looking for… 9 3. Privacy issues
  • 10. Real-life examples Facebook acquired WhatsApp… Are they going to read our messages? 10 3. Privacy issues
  • 11. Real-life examples Google Now read my brother’s email and notified him that my flight was delayed 11 3. Privacy issues
  • 12. 4. Cloud Storage What is “the Cloud” - and where is it? 12
  • 16. • "Cloud" is a buzzword that vaguely suggests the promise and convenience of being able to access files from anywhere • Easily share data between all your devices • The truth about “the Cloud” - If your data lives "in the cloud," it actually lives on a company's server • How safe is your data in “the Cloud”? A Goldmine for hackers? 16 4. Cloud Storage
  • 17. How safe is your data? • Privacy - Is your data mined for advertising and marketing purposes? • Reliability - Will the service always be available? • Security - Is your data encrypted? • Continuity - Can the provider suspend your account? • Performance - Is your Internet connection fast enough? • Copyright - Who owns the content you upload? 17 4. Cloud Storage
  • 18. 5. Tips • Don’t do anything you don’t understand • Read the privacy policies of the online services that you use • Think before you post • Be a good digital citizen (people can’t hide behind a username anymore) 18
  • 19. 5. Tips “If you’ve got nothing to hide, you have nothing to worry about” 19