SlideShare a Scribd company logo
1 of 20
Download to read offline
Privacy in a digital age
Félix García Lainez - Curso 2014-15
2º Nivel Avanzado Inglés - EOI Huesca
1
Executive Summary
1. Introduction
2. Key Facts
3. Privacy Issues
4. Cloud Storage
5. Tips
6. Q & A
2
1. Introduction
• Web 2.0 - Participatory information sharing and
collaboration on the Internet
• The rise of social networking in the past decade
has been impressive
• Mobile devices are changing the world
• We are moving to a connected world (IoT)
3
2. Key Facts
• There has been more content created in the last seven
years than the previous four billion
• Perhaps more importantly, information has never been so
accessible
• 3 billion Internet users worldwide in 2015 (40% of the
world population)
• 1.91 billion smartphone users across the globe (25% of
the world population)
• And it is only the beginning…
4
2. Key Facts
5
2. Key Facts
6
3. Privacy issues
• Cyberstalking and location disclosure (e.g.
An application named "Creepy" can track a
person's location on a map using photos
uploaded to Twitter or Flickr)
• Social profiling and 3rd party disclosure (e.g.
Private information inadvertently being sent to
3rd party advertising sites via Referrer strings or
Cookies)
7
3. Privacy issues
• Invasive privacy agreements (e.g. The privacy
agreement states that the social network owns all of the
content that users upload)
• Law enforcement prowling the networks (e.g. A criminal
charged with bank fraud, and having escaped to Mexico,
was nowhere to be found until he started posting on
Facebook. Although his profile was private, his list of
friends was not…)
• Preteens and early teenagers (i.e. The most vulnerable
victims of private-information-sharing behavior are
preteens and early teenagers)
8
Real-life examples
While surfing the Internet, I was searching for a
pair of new trainers. After that, Facebook
advertised me exactly what I was looking for…
9
3. Privacy issues
Real-life examples
Facebook acquired WhatsApp… Are they going to
read our messages?
10
3. Privacy issues
Real-life examples
Google Now read my brother’s email and notified
him that my flight was delayed
11
3. Privacy issues
4. Cloud Storage
What is “the Cloud” - and where is it?
12
13
4. Cloud Storage
14
4. Cloud Storage
15
4. Cloud Storage
• "Cloud" is a buzzword that vaguely suggests the
promise and convenience of being able to access
files from anywhere
• Easily share data between all your devices
• The truth about “the Cloud” - If your data lives "in
the cloud," it actually lives on a company's server
• How safe is your data in “the Cloud”? A Goldmine
for hackers?
16
4. Cloud Storage
How safe is your data?
• Privacy - Is your data mined for advertising and marketing
purposes?
• Reliability - Will the service always be available?
• Security - Is your data encrypted?
• Continuity - Can the provider suspend your account?
• Performance - Is your Internet connection fast enough?
• Copyright - Who owns the content you upload?
17
4. Cloud Storage
5. Tips
• Don’t do anything you don’t understand
• Read the privacy policies of the online services
that you use
• Think before you post
• Be a good digital citizen (people can’t hide
behind a username anymore)
18
5. Tips
“If you’ve got nothing to hide, you have
nothing to worry about”
19
Q & A
20

More Related Content

What's hot

3G vs WIFI - Sai Kiran Kasireddy
3G vs WIFI - Sai Kiran Kasireddy3G vs WIFI - Sai Kiran Kasireddy
3G vs WIFI - Sai Kiran KasireddySai Kiran Kasireddy
 
Industry 4.0 and Smart City - The "Energy Pill" for IoT in Malaysia
Industry 4.0 and Smart City - The "Energy Pill" for IoT in MalaysiaIndustry 4.0 and Smart City - The "Energy Pill" for IoT in Malaysia
Industry 4.0 and Smart City - The "Energy Pill" for IoT in MalaysiaDr. Mazlan Abbas
 
Data Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsData Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsAT Internet
 
Sosiaalinen media tietosuojan näkökulmasta
Sosiaalinen media tietosuojan näkökulmastaSosiaalinen media tietosuojan näkökulmasta
Sosiaalinen media tietosuojan näkökulmastaHarto Pönkä
 
4 g technology
4 g  technology4 g  technology
4 g technologyRitu Bafna
 
التجارة الالكترونية.pptx
التجارة الالكترونية.pptxالتجارة الالكترونية.pptx
التجارة الالكترونية.pptxssuser3bbeb5
 
Internet of things (IOT) | Future Trends
Internet of things (IOT) | Future TrendsInternet of things (IOT) | Future Trends
Internet of things (IOT) | Future TrendsDevanand Hariperumal
 
3 g vs wi fi presentation
3 g vs wi fi presentation3 g vs wi fi presentation
3 g vs wi fi presentationNeelam Chhipa
 
Mobile generation presentation
Mobile generation presentationMobile generation presentation
Mobile generation presentation8neutron8
 
Internet of things Seminar Reprt
Internet of things Seminar ReprtInternet of things Seminar Reprt
Internet of things Seminar ReprtVikrant Negi
 
Some- ja pikaviestisovellusten tietosuoja
Some- ja pikaviestisovellusten tietosuojaSome- ja pikaviestisovellusten tietosuoja
Some- ja pikaviestisovellusten tietosuojaHarto Pönkä
 
5G + AI Applications in Healthcare and Medical Sciences
5G + AI Applications in Healthcare and Medical Sciences5G + AI Applications in Healthcare and Medical Sciences
5G + AI Applications in Healthcare and Medical SciencesHamidreza Bolhasani
 
FAIR Computational Workflows
FAIR Computational WorkflowsFAIR Computational Workflows
FAIR Computational WorkflowsCarole Goble
 
Privacy by Design and by Default + General Data Protection Regulation with Si...
Privacy by Design and by Default + General Data Protection Regulation with Si...Privacy by Design and by Default + General Data Protection Regulation with Si...
Privacy by Design and by Default + General Data Protection Regulation with Si...Peter Procházka
 
Service provided by internet
Service provided by internetService provided by internet
Service provided by internetHardik Patel
 
Concept Of VOIP in deatils
Concept Of VOIP in deatilsConcept Of VOIP in deatils
Concept Of VOIP in deatilsMostain Billah
 

What's hot (20)

3G vs WIFI - Sai Kiran Kasireddy
3G vs WIFI - Sai Kiran Kasireddy3G vs WIFI - Sai Kiran Kasireddy
3G vs WIFI - Sai Kiran Kasireddy
 
Internet Of Things
 Internet Of Things Internet Of Things
Internet Of Things
 
Industry 4.0 and Smart City - The "Energy Pill" for IoT in Malaysia
Industry 4.0 and Smart City - The "Energy Pill" for IoT in MalaysiaIndustry 4.0 and Smart City - The "Energy Pill" for IoT in Malaysia
Industry 4.0 and Smart City - The "Energy Pill" for IoT in Malaysia
 
Data Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsData Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethics
 
Sosiaalinen media tietosuojan näkökulmasta
Sosiaalinen media tietosuojan näkökulmastaSosiaalinen media tietosuojan näkökulmasta
Sosiaalinen media tietosuojan näkökulmasta
 
4 g technology
4 g  technology4 g  technology
4 g technology
 
التجارة الالكترونية.pptx
التجارة الالكترونية.pptxالتجارة الالكترونية.pptx
التجارة الالكترونية.pptx
 
4G wireless Network
4G wireless Network4G wireless Network
4G wireless Network
 
Mobile computing
Mobile computing Mobile computing
Mobile computing
 
Internet of things (IOT) | Future Trends
Internet of things (IOT) | Future TrendsInternet of things (IOT) | Future Trends
Internet of things (IOT) | Future Trends
 
3 g vs wi fi presentation
3 g vs wi fi presentation3 g vs wi fi presentation
3 g vs wi fi presentation
 
Introduction to WAN
Introduction to WANIntroduction to WAN
Introduction to WAN
 
Mobile generation presentation
Mobile generation presentationMobile generation presentation
Mobile generation presentation
 
Internet of things Seminar Reprt
Internet of things Seminar ReprtInternet of things Seminar Reprt
Internet of things Seminar Reprt
 
Some- ja pikaviestisovellusten tietosuoja
Some- ja pikaviestisovellusten tietosuojaSome- ja pikaviestisovellusten tietosuoja
Some- ja pikaviestisovellusten tietosuoja
 
5G + AI Applications in Healthcare and Medical Sciences
5G + AI Applications in Healthcare and Medical Sciences5G + AI Applications in Healthcare and Medical Sciences
5G + AI Applications in Healthcare and Medical Sciences
 
FAIR Computational Workflows
FAIR Computational WorkflowsFAIR Computational Workflows
FAIR Computational Workflows
 
Privacy by Design and by Default + General Data Protection Regulation with Si...
Privacy by Design and by Default + General Data Protection Regulation with Si...Privacy by Design and by Default + General Data Protection Regulation with Si...
Privacy by Design and by Default + General Data Protection Regulation with Si...
 
Service provided by internet
Service provided by internetService provided by internet
Service provided by internet
 
Concept Of VOIP in deatils
Concept Of VOIP in deatilsConcept Of VOIP in deatils
Concept Of VOIP in deatils
 

Viewers also liked

Mobile Privacy in the Digital Age
Mobile Privacy in the Digital AgeMobile Privacy in the Digital Age
Mobile Privacy in the Digital Agehelena_wade
 
Privacy In The Digital Age
Privacy In The Digital AgePrivacy In The Digital Age
Privacy In The Digital AgeJane Prusakova
 
If The World Were A Village
If The World Were A VillageIf The World Were A Village
If The World Were A Villagegeepatty
 
Operating system security
Operating system securityOperating system security
Operating system securityRamesh Ogania
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information SecurityDr. Loganathan R
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Securitybelsis
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITYAhmed Moussa
 

Viewers also liked (8)

Mobile Privacy in the Digital Age
Mobile Privacy in the Digital AgeMobile Privacy in the Digital Age
Mobile Privacy in the Digital Age
 
Privacy In The Digital Age
Privacy In The Digital AgePrivacy In The Digital Age
Privacy In The Digital Age
 
If The World Were A Village
If The World Were A VillageIf The World Were A Village
If The World Were A Village
 
Privacy in the Digital Age
Privacy in the Digital AgePrivacy in the Digital Age
Privacy in the Digital Age
 
Operating system security
Operating system securityOperating system security
Operating system security
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
 

Similar to Privacy and security in a digital world

Internet Security is an Oxymoron
Internet Security is an OxymoronInternet Security is an Oxymoron
Internet Security is an OxymoronMax Nokhrin
 
ICT 7 Q2 Chapter 1 PPT.pptx
ICT 7 Q2 Chapter 1 PPT.pptxICT 7 Q2 Chapter 1 PPT.pptx
ICT 7 Q2 Chapter 1 PPT.pptxRaymondPuno1
 
Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...
Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...
Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...Andrew Schwabe
 
Risks and Security of Internet and System
Risks and Security of Internet and SystemRisks and Security of Internet and System
Risks and Security of Internet and SystemParam Nanavati
 
Reining in the Data ITAG tech360 Penn State Great Valley 2015
Reining in the Data   ITAG tech360 Penn State Great Valley 2015 Reining in the Data   ITAG tech360 Penn State Great Valley 2015
Reining in the Data ITAG tech360 Penn State Great Valley 2015 Andrew Schwabe
 
Social media and challenges ahead by Petter Warnsberg
Social media and challenges ahead by Petter WarnsbergSocial media and challenges ahead by Petter Warnsberg
Social media and challenges ahead by Petter WarnsbergDina El-sofy
 
Power point assignment
Power point assignmentPower point assignment
Power point assignmentKonrad Warford
 
Empowerment Technologies 1.pptx
Empowerment Technologies 1.pptxEmpowerment Technologies 1.pptx
Empowerment Technologies 1.pptxJerryHalibas
 
Lesson-1-Introduction-and Current-Situation-of-ICT.pptx
Lesson-1-Introduction-and Current-Situation-of-ICT.pptxLesson-1-Introduction-and Current-Situation-of-ICT.pptx
Lesson-1-Introduction-and Current-Situation-of-ICT.pptxjjjaca
 
How children's fingerprints on the web could mean the end of PII Authenticati...
How children's fingerprints on the web could mean the end of PII Authenticati...How children's fingerprints on the web could mean the end of PII Authenticati...
How children's fingerprints on the web could mean the end of PII Authenticati...Jisc
 
Social networking privacy issues & exposure
Social networking privacy issues & exposureSocial networking privacy issues & exposure
Social networking privacy issues & exposureLDdsng
 
Your e image presentation
Your e image presentationYour e image presentation
Your e image presentationlahill16
 
Are you ready to raise, educate and protect "Digital Natives"
Are you ready to raise, educate and protect "Digital Natives"Are you ready to raise, educate and protect "Digital Natives"
Are you ready to raise, educate and protect "Digital Natives"r71navy
 
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013Cain Ransbottyn
 
Student Privacy - Teaching's New Moral Dilema
Student Privacy - Teaching's New Moral DilemaStudent Privacy - Teaching's New Moral Dilema
Student Privacy - Teaching's New Moral DilemaDavid Kinane
 

Similar to Privacy and security in a digital world (20)

Internet Security is an Oxymoron
Internet Security is an OxymoronInternet Security is an Oxymoron
Internet Security is an Oxymoron
 
Argumentative Essay On Internet Privacy
Argumentative Essay On Internet PrivacyArgumentative Essay On Internet Privacy
Argumentative Essay On Internet Privacy
 
ICT 7 Q2 Chapter 1 PPT.pptx
ICT 7 Q2 Chapter 1 PPT.pptxICT 7 Q2 Chapter 1 PPT.pptx
ICT 7 Q2 Chapter 1 PPT.pptx
 
Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...
Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...
Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...
 
Risks and Security of Internet and System
Risks and Security of Internet and SystemRisks and Security of Internet and System
Risks and Security of Internet and System
 
Reining in the Data ITAG tech360 Penn State Great Valley 2015
Reining in the Data   ITAG tech360 Penn State Great Valley 2015 Reining in the Data   ITAG tech360 Penn State Great Valley 2015
Reining in the Data ITAG tech360 Penn State Great Valley 2015
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Social media and challenges ahead by Petter Warnsberg
Social media and challenges ahead by Petter WarnsbergSocial media and challenges ahead by Petter Warnsberg
Social media and challenges ahead by Petter Warnsberg
 
Multimedia Privacy
Multimedia PrivacyMultimedia Privacy
Multimedia Privacy
 
Power point assignment
Power point assignmentPower point assignment
Power point assignment
 
Empowerment Technologies 1.pptx
Empowerment Technologies 1.pptxEmpowerment Technologies 1.pptx
Empowerment Technologies 1.pptx
 
Lesson-1-Introduction-and Current-Situation-of-ICT.pptx
Lesson-1-Introduction-and Current-Situation-of-ICT.pptxLesson-1-Introduction-and Current-Situation-of-ICT.pptx
Lesson-1-Introduction-and Current-Situation-of-ICT.pptx
 
How children's fingerprints on the web could mean the end of PII Authenticati...
How children's fingerprints on the web could mean the end of PII Authenticati...How children's fingerprints on the web could mean the end of PII Authenticati...
How children's fingerprints on the web could mean the end of PII Authenticati...
 
Social networking privacy issues & exposure
Social networking privacy issues & exposureSocial networking privacy issues & exposure
Social networking privacy issues & exposure
 
Your e image presentation
Your e image presentationYour e image presentation
Your e image presentation
 
Web 3.0
Web 3.0Web 3.0
Web 3.0
 
Are you ready to raise, educate and protect "Digital Natives"
Are you ready to raise, educate and protect "Digital Natives"Are you ready to raise, educate and protect "Digital Natives"
Are you ready to raise, educate and protect "Digital Natives"
 
CYP E-Safety
CYP E-SafetyCYP E-Safety
CYP E-Safety
 
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
 
Student Privacy - Teaching's New Moral Dilema
Student Privacy - Teaching's New Moral DilemaStudent Privacy - Teaching's New Moral Dilema
Student Privacy - Teaching's New Moral Dilema
 

Recently uploaded

Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Paul Calvano
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predieusebiomeyer
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Sonam Pathan
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一z xss
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作ys8omjxb
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxDyna Gilbert
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书rnrncn29
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一Fs
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa494f574xmv
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMartaLoveguard
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Excelmac1
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一Fs
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Sonam Pathan
 
Elevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New OrleansElevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New Orleanscorenetworkseo
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 

Recently uploaded (20)

Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predi
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
 
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptx
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptx
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170
 
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
 
Elevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New OrleansElevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New Orleans
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 

Privacy and security in a digital world

  • 1. Privacy in a digital age Félix García Lainez - Curso 2014-15 2º Nivel Avanzado Inglés - EOI Huesca 1
  • 2. Executive Summary 1. Introduction 2. Key Facts 3. Privacy Issues 4. Cloud Storage 5. Tips 6. Q & A 2
  • 3. 1. Introduction • Web 2.0 - Participatory information sharing and collaboration on the Internet • The rise of social networking in the past decade has been impressive • Mobile devices are changing the world • We are moving to a connected world (IoT) 3
  • 4. 2. Key Facts • There has been more content created in the last seven years than the previous four billion • Perhaps more importantly, information has never been so accessible • 3 billion Internet users worldwide in 2015 (40% of the world population) • 1.91 billion smartphone users across the globe (25% of the world population) • And it is only the beginning… 4
  • 7. 3. Privacy issues • Cyberstalking and location disclosure (e.g. An application named "Creepy" can track a person's location on a map using photos uploaded to Twitter or Flickr) • Social profiling and 3rd party disclosure (e.g. Private information inadvertently being sent to 3rd party advertising sites via Referrer strings or Cookies) 7
  • 8. 3. Privacy issues • Invasive privacy agreements (e.g. The privacy agreement states that the social network owns all of the content that users upload) • Law enforcement prowling the networks (e.g. A criminal charged with bank fraud, and having escaped to Mexico, was nowhere to be found until he started posting on Facebook. Although his profile was private, his list of friends was not…) • Preteens and early teenagers (i.e. The most vulnerable victims of private-information-sharing behavior are preteens and early teenagers) 8
  • 9. Real-life examples While surfing the Internet, I was searching for a pair of new trainers. After that, Facebook advertised me exactly what I was looking for… 9 3. Privacy issues
  • 10. Real-life examples Facebook acquired WhatsApp… Are they going to read our messages? 10 3. Privacy issues
  • 11. Real-life examples Google Now read my brother’s email and notified him that my flight was delayed 11 3. Privacy issues
  • 12. 4. Cloud Storage What is “the Cloud” - and where is it? 12
  • 16. • "Cloud" is a buzzword that vaguely suggests the promise and convenience of being able to access files from anywhere • Easily share data between all your devices • The truth about “the Cloud” - If your data lives "in the cloud," it actually lives on a company's server • How safe is your data in “the Cloud”? A Goldmine for hackers? 16 4. Cloud Storage
  • 17. How safe is your data? • Privacy - Is your data mined for advertising and marketing purposes? • Reliability - Will the service always be available? • Security - Is your data encrypted? • Continuity - Can the provider suspend your account? • Performance - Is your Internet connection fast enough? • Copyright - Who owns the content you upload? 17 4. Cloud Storage
  • 18. 5. Tips • Don’t do anything you don’t understand • Read the privacy policies of the online services that you use • Think before you post • Be a good digital citizen (people can’t hide behind a username anymore) 18
  • 19. 5. Tips “If you’ve got nothing to hide, you have nothing to worry about” 19