SlideShare une entreprise Scribd logo
1  sur  27
Télécharger pour lire hors ligne
Internet Privacy:
Does it Truly Exist?
By: Kristen Toso
Image: rosipaw
Today, there are over 2.5 billion Internet users worldwide.
With over 7 billion people in the world, that means that
approximately 36% are using the Internet.
Source: Internet World Stats
Image: johnlemon
That’s a lot of people with, consequently,
a lot of personal data.
Image: Leo Reynolds
Image: Simon (via Pixabay)
...always under the
assumption that their
privacy rights are being
respected.
Image: Nina Strelov (via Fotopedia)
However, throughout the Internet’s history, there have
been a number of privacy scandals that have shaken
users’trust.
Image: Wikimedia Commons
Violations of Internet privacy can happen to
anyone at any time, regardless of age, level of
digital literacy, wealth, or any other factor...
Image: Wikimedia Commons
...which begs the following questions:
Can information be kept truly personal on the Internet?
Or, is Internet privacy simply an oxymoron?
Image:jamingray
Image: esthervargasc
Today’s social media
platforms, online
shopping websites,
financial services, and
other such sites provide
users with privacy
settings in an attempt to
protect their personal
information.
Image:chiarashine
Even with these privacy settings, information can easily
be acquired and used without user permission by
different groups, including:
The more transparent users are in their online
profiles, the better that advertisers and corporations
can target them with products and services.
Source: Film 260 Lecture 02: i-Friends
Image: Wikimedia Commons
“...Google Glass opens an entirely new front in the digital war
against privacy. These spectacles [...] represent a developmental
leap in the history of data that is comparable to moving from
the bicycle to the automobile...
...It is the sort of radical transformation that may actually end up
completely destroying our individual privacy in the digital 21st century.”
- Andrew Keen, CNN
Image: Wikimedia Commons
“People say very personal
information to Siri [...] They are
encouraged to think of Siri as
their confidante and their
assistant...
...But Siri is not just working for
you. Siri is collecting a lot of data
for Apple and for its business...
...And people should be very
mindful and aware of what’s
happening to their personal
information...
- Nicole Ozer, Lawyer (ACLU)
Image: MattsMacintosh
Scams, phishing and fraud are examples of ways that
criminals can steal information from Internet users,
which can have detrimental consequences.
Image: pallotron
Top continents from
which online fraud
originated from (2012):
1. Africa
2. Asia
3. South Amerca
4. Europe
5. North America
The most commonly targeted online services:
Retail, online dating, financial, gambling and travel.
Source: Iovation
Image: Simon Tong (via smugmug.com)
IP addresses, emails and social media activity can
potentially be obtained by the government under
court rulings to closely monitor civilians.
Image: neeravbhatt
“Twitter, Facebook and other social media outlets have a great deal of
information about all of us — and the government wants to be able to
see it...
[...] the government scored a major win — and Internet privacy lost big —
when a judge ruled against Twitter in a fight over a trove of information
about [Malcolm Harris,] a political activist.”
- Adam Cohen, TIME
Image: Wikimedia Commons
Image: araenae (via Deviantart)
In 2012, 849 requests were
made by governments all
over the world to obtain
Twitter user information, with
80% of them being from the
United States alone.
Source: Twitter Transparency Report
Image: Wikimedia Commons
Users cannot assume
that privacy settings
are protecting their
precious information.
Evidently, despite the belief that privacy exists, there is a real risk
involved with sharing personal information on the Internet.
Image: wallpapers-mobilewallpapers.blogspot.ca
Given this, there are preventive measures that
you can take in order to protect yourself and
your personal information on the Internet:
in order to become more digitally-savvy.
Share Internet privacy tips with friends and family.
Image: Wikimedia Commons
Image: Zomerstorm
Think critically about what you are sharing, where you are
sharing it, and who could potentially have access to it.
Image: Lip Kee
“A long-overdue bill in the
California legislature,
“The Right to Know Act,”
would force companies such
as Google and Facebook
to reveal what personal
information they have collected
and how it’s being used.”
- Adam Cohen, TIME
Know, and fight for, your rights.
Even with these pre-emptive measures, it is difficult to
think that information can ever be private on the
Internet; as the saying goes...
Image: Chrisser
Image: Horia Varlan
What does the future hold
for Internet privacy?
Credits
All images are licensed under the Creative
Commons Non-Commercial Share-Alike 3.0
agreement and, unless otherwise specified,
are sourced from Flickr.
References

Contenu connexe

Tendances

Big Data and Privacy
Big Data and PrivacyBig Data and Privacy
Big Data and Privacymjsale781
 
Aral Balkan - The Universal Declaration of Cyborg Rights
Aral Balkan - The Universal Declaration of Cyborg RightsAral Balkan - The Universal Declaration of Cyborg Rights
Aral Balkan - The Universal Declaration of Cyborg RightsUX Lausanne
 
Ethical, Social And Political Issues Raised By E Commerce
Ethical, Social And Political Issues Raised By E CommerceEthical, Social And Political Issues Raised By E Commerce
Ethical, Social And Political Issues Raised By E CommerceNicholas Davis
 
Great Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLIGreat Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLIJames Bollen
 
The Future of Moral Persuasion in Games, AR, AI Bots, and Self Trackers by Sh...
The Future of Moral Persuasion in Games, AR, AI Bots, and Self Trackers by Sh...The Future of Moral Persuasion in Games, AR, AI Bots, and Self Trackers by Sh...
The Future of Moral Persuasion in Games, AR, AI Bots, and Self Trackers by Sh...Sherry Jones
 
08 Ethics, Law and E-commerce
08 Ethics, Law and E-commerce08 Ethics, Law and E-commerce
08 Ethics, Law and E-commercemonchai sopitka
 
Digital citizin reem
Digital citizin reemDigital citizin reem
Digital citizin reemguest762e907
 
Digital citizin reem
Digital citizin reemDigital citizin reem
Digital citizin reemguest5cb43a
 
Should Government Control Internet and Its Content.
Should Government Control Internet and Its Content.Should Government Control Internet and Its Content.
Should Government Control Internet and Its Content.Joel D'souza
 
Malcolm Crompton I I S Frocomm Web 2 O In Govt 24 June 2009
Malcolm  Crompton  I I S  Frocomm  Web 2 O In  Govt  24  June 2009Malcolm  Crompton  I I S  Frocomm  Web 2 O In  Govt  24  June 2009
Malcolm Crompton I I S Frocomm Web 2 O In Govt 24 June 2009Frocomm Australia
 
The WikiLeaks Conundrum
The WikiLeaks ConundrumThe WikiLeaks Conundrum
The WikiLeaks ConundrumMsifry
 
Special topics
Special topicsSpecial topics
Special topicsaivarose
 
NILAKSHI ppt on should government control internet and its content
NILAKSHI ppt on should government control internet and its contentNILAKSHI ppt on should government control internet and its content
NILAKSHI ppt on should government control internet and its contentnilakshisharma9
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenshiptakahe2
 

Tendances (20)

Big Data and Privacy
Big Data and PrivacyBig Data and Privacy
Big Data and Privacy
 
Aral Balkan - The Universal Declaration of Cyborg Rights
Aral Balkan - The Universal Declaration of Cyborg RightsAral Balkan - The Universal Declaration of Cyborg Rights
Aral Balkan - The Universal Declaration of Cyborg Rights
 
Wisekey kamp
Wisekey kampWisekey kamp
Wisekey kamp
 
Ethical, Social And Political Issues Raised By E Commerce
Ethical, Social And Political Issues Raised By E CommerceEthical, Social And Political Issues Raised By E Commerce
Ethical, Social And Political Issues Raised By E Commerce
 
Lawek mui
Lawek muiLawek mui
Lawek mui
 
Cyber law1
Cyber law1Cyber law1
Cyber law1
 
Great Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLIGreat Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLI
 
The Future of Moral Persuasion in Games, AR, AI Bots, and Self Trackers by Sh...
The Future of Moral Persuasion in Games, AR, AI Bots, and Self Trackers by Sh...The Future of Moral Persuasion in Games, AR, AI Bots, and Self Trackers by Sh...
The Future of Moral Persuasion in Games, AR, AI Bots, and Self Trackers by Sh...
 
08 Ethics, Law and E-commerce
08 Ethics, Law and E-commerce08 Ethics, Law and E-commerce
08 Ethics, Law and E-commerce
 
Digital citizin reem
Digital citizin reemDigital citizin reem
Digital citizin reem
 
Digital citizin reem
Digital citizin reemDigital citizin reem
Digital citizin reem
 
Ethics, Law, and E-commerce
Ethics, Law, and E-commerceEthics, Law, and E-commerce
Ethics, Law, and E-commerce
 
Should Government Control Internet and Its Content.
Should Government Control Internet and Its Content.Should Government Control Internet and Its Content.
Should Government Control Internet and Its Content.
 
Malcolm Crompton I I S Frocomm Web 2 O In Govt 24 June 2009
Malcolm  Crompton  I I S  Frocomm  Web 2 O In  Govt  24  June 2009Malcolm  Crompton  I I S  Frocomm  Web 2 O In  Govt  24  June 2009
Malcolm Crompton I I S Frocomm Web 2 O In Govt 24 June 2009
 
Software Piracy
Software PiracySoftware Piracy
Software Piracy
 
The WikiLeaks Conundrum
The WikiLeaks ConundrumThe WikiLeaks Conundrum
The WikiLeaks Conundrum
 
Special topics
Special topicsSpecial topics
Special topics
 
Cybertort Imp Slides For Pub. Internet
Cybertort Imp Slides For Pub. InternetCybertort Imp Slides For Pub. Internet
Cybertort Imp Slides For Pub. Internet
 
NILAKSHI ppt on should government control internet and its content
NILAKSHI ppt on should government control internet and its contentNILAKSHI ppt on should government control internet and its content
NILAKSHI ppt on should government control internet and its content
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 

En vedette

TEDx Rhein-Main Michael Altendorf February 2011 - Virtual Identity and the en...
TEDx Rhein-Main Michael Altendorf February 2011 - Virtual Identity and the en...TEDx Rhein-Main Michael Altendorf February 2011 - Virtual Identity and the en...
TEDx Rhein-Main Michael Altendorf February 2011 - Virtual Identity and the en...Michael Altendorf
 
All Up In Your Face (Book):   Virtual Identity Management For Teens And You...
All Up In Your Face (Book): Virtual Identity Management For Teens And You...All Up In Your Face (Book): Virtual Identity Management For Teens And You...
All Up In Your Face (Book):   Virtual Identity Management For Teens And You...Erin Dorney
 
Privacy On The Internet
Privacy On The InternetPrivacy On The Internet
Privacy On The Internetapemberton1
 
Internet Privacy: Time to Rethink?
Internet Privacy: Time to Rethink?Internet Privacy: Time to Rethink?
Internet Privacy: Time to Rethink?Jonathan Reichental
 
Internet Privacy Presentation (In Service)
Internet Privacy Presentation (In Service)Internet Privacy Presentation (In Service)
Internet Privacy Presentation (In Service)Bonnie Brzozowski
 
Privacy with Internet
Privacy with InternetPrivacy with Internet
Privacy with InternetMathias Klang
 

En vedette (7)

INTERNET PRIVACY
INTERNET PRIVACYINTERNET PRIVACY
INTERNET PRIVACY
 
TEDx Rhein-Main Michael Altendorf February 2011 - Virtual Identity and the en...
TEDx Rhein-Main Michael Altendorf February 2011 - Virtual Identity and the en...TEDx Rhein-Main Michael Altendorf February 2011 - Virtual Identity and the en...
TEDx Rhein-Main Michael Altendorf February 2011 - Virtual Identity and the en...
 
All Up In Your Face (Book):   Virtual Identity Management For Teens And You...
All Up In Your Face (Book): Virtual Identity Management For Teens And You...All Up In Your Face (Book): Virtual Identity Management For Teens And You...
All Up In Your Face (Book):   Virtual Identity Management For Teens And You...
 
Privacy On The Internet
Privacy On The InternetPrivacy On The Internet
Privacy On The Internet
 
Internet Privacy: Time to Rethink?
Internet Privacy: Time to Rethink?Internet Privacy: Time to Rethink?
Internet Privacy: Time to Rethink?
 
Internet Privacy Presentation (In Service)
Internet Privacy Presentation (In Service)Internet Privacy Presentation (In Service)
Internet Privacy Presentation (In Service)
 
Privacy with Internet
Privacy with InternetPrivacy with Internet
Privacy with Internet
 

Similaire à Does Internet Privacy Truly Exist

Similaire à Does Internet Privacy Truly Exist (14)

WCCC Faculty Presentation
WCCC Faculty PresentationWCCC Faculty Presentation
WCCC Faculty Presentation
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacy
 
Cyber Crime Essay
Cyber Crime EssayCyber Crime Essay
Cyber Crime Essay
 
Democracy2 IPMA Jan 12 2010
Democracy2 IPMA Jan 12 2010Democracy2 IPMA Jan 12 2010
Democracy2 IPMA Jan 12 2010
 
Internet Privacy Essay
Internet Privacy EssayInternet Privacy Essay
Internet Privacy Essay
 
The Role of Social Media in Da'awah
The Role of Social Media in Da'awahThe Role of Social Media in Da'awah
The Role of Social Media in Da'awah
 
Privacy reconsidered
Privacy reconsideredPrivacy reconsidered
Privacy reconsidered
 
Moldova Open Data Journalism Workshop
Moldova Open Data Journalism WorkshopMoldova Open Data Journalism Workshop
Moldova Open Data Journalism Workshop
 
Essays On Cyber Crime
Essays On Cyber CrimeEssays On Cyber Crime
Essays On Cyber Crime
 
Towards a More Open World
Towards a More Open WorldTowards a More Open World
Towards a More Open World
 
Data:The Fine Balance.We Trade Privacy for Convenience and Security.
Data:The Fine Balance.We Trade Privacy for Convenience and Security.Data:The Fine Balance.We Trade Privacy for Convenience and Security.
Data:The Fine Balance.We Trade Privacy for Convenience and Security.
 
Big data, a city of things and civic innovation
Big data, a city of things and civic innovationBig data, a city of things and civic innovation
Big data, a city of things and civic innovation
 
Cybercrime an international-crisis
Cybercrime an international-crisisCybercrime an international-crisis
Cybercrime an international-crisis
 
Cybercrime an international-crisis
Cybercrime an international-crisisCybercrime an international-crisis
Cybercrime an international-crisis
 

Dernier

Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 

Dernier (20)

Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 

Does Internet Privacy Truly Exist

  • 1. Internet Privacy: Does it Truly Exist? By: Kristen Toso Image: rosipaw
  • 2. Today, there are over 2.5 billion Internet users worldwide. With over 7 billion people in the world, that means that approximately 36% are using the Internet. Source: Internet World Stats Image: johnlemon
  • 3. That’s a lot of people with, consequently, a lot of personal data. Image: Leo Reynolds
  • 4. Image: Simon (via Pixabay)
  • 5. ...always under the assumption that their privacy rights are being respected. Image: Nina Strelov (via Fotopedia)
  • 6. However, throughout the Internet’s history, there have been a number of privacy scandals that have shaken users’trust. Image: Wikimedia Commons
  • 7. Violations of Internet privacy can happen to anyone at any time, regardless of age, level of digital literacy, wealth, or any other factor... Image: Wikimedia Commons
  • 8. ...which begs the following questions: Can information be kept truly personal on the Internet? Or, is Internet privacy simply an oxymoron? Image:jamingray
  • 9. Image: esthervargasc Today’s social media platforms, online shopping websites, financial services, and other such sites provide users with privacy settings in an attempt to protect their personal information.
  • 10. Image:chiarashine Even with these privacy settings, information can easily be acquired and used without user permission by different groups, including:
  • 11. The more transparent users are in their online profiles, the better that advertisers and corporations can target them with products and services. Source: Film 260 Lecture 02: i-Friends Image: Wikimedia Commons
  • 12. “...Google Glass opens an entirely new front in the digital war against privacy. These spectacles [...] represent a developmental leap in the history of data that is comparable to moving from the bicycle to the automobile... ...It is the sort of radical transformation that may actually end up completely destroying our individual privacy in the digital 21st century.” - Andrew Keen, CNN Image: Wikimedia Commons
  • 13. “People say very personal information to Siri [...] They are encouraged to think of Siri as their confidante and their assistant... ...But Siri is not just working for you. Siri is collecting a lot of data for Apple and for its business... ...And people should be very mindful and aware of what’s happening to their personal information... - Nicole Ozer, Lawyer (ACLU) Image: MattsMacintosh
  • 14. Scams, phishing and fraud are examples of ways that criminals can steal information from Internet users, which can have detrimental consequences. Image: pallotron
  • 15. Top continents from which online fraud originated from (2012): 1. Africa 2. Asia 3. South Amerca 4. Europe 5. North America The most commonly targeted online services: Retail, online dating, financial, gambling and travel. Source: Iovation Image: Simon Tong (via smugmug.com)
  • 16. IP addresses, emails and social media activity can potentially be obtained by the government under court rulings to closely monitor civilians. Image: neeravbhatt
  • 17. “Twitter, Facebook and other social media outlets have a great deal of information about all of us — and the government wants to be able to see it... [...] the government scored a major win — and Internet privacy lost big — when a judge ruled against Twitter in a fight over a trove of information about [Malcolm Harris,] a political activist.” - Adam Cohen, TIME Image: Wikimedia Commons
  • 18. Image: araenae (via Deviantart) In 2012, 849 requests were made by governments all over the world to obtain Twitter user information, with 80% of them being from the United States alone. Source: Twitter Transparency Report
  • 19. Image: Wikimedia Commons Users cannot assume that privacy settings are protecting their precious information. Evidently, despite the belief that privacy exists, there is a real risk involved with sharing personal information on the Internet.
  • 20. Image: wallpapers-mobilewallpapers.blogspot.ca Given this, there are preventive measures that you can take in order to protect yourself and your personal information on the Internet:
  • 21. in order to become more digitally-savvy. Share Internet privacy tips with friends and family. Image: Wikimedia Commons
  • 22. Image: Zomerstorm Think critically about what you are sharing, where you are sharing it, and who could potentially have access to it.
  • 23. Image: Lip Kee “A long-overdue bill in the California legislature, “The Right to Know Act,” would force companies such as Google and Facebook to reveal what personal information they have collected and how it’s being used.” - Adam Cohen, TIME Know, and fight for, your rights.
  • 24. Even with these pre-emptive measures, it is difficult to think that information can ever be private on the Internet; as the saying goes... Image: Chrisser
  • 25. Image: Horia Varlan What does the future hold for Internet privacy?
  • 26. Credits All images are licensed under the Creative Commons Non-Commercial Share-Alike 3.0 agreement and, unless otherwise specified, are sourced from Flickr.