Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Group 2 privacy and me in a web 2.0 world final
1. Privacy and Me in a Web 2.0 World Colin Fitz-Maurice Jessica McDade Lee Reynolds Lamar Middleton
2. What is Internet Security? Internet security is a branch of computer security specifically related to the Internet. Its objective is to establish rules and measures to use against attacks over the Internet. Preston (2007)
3. Internet Privacy Law Internet Security Suits and Programs follow Internet Privacy Laws to protect you. Since no formal law exists within cyberspace, Internet users can find recourse only through the applicable laws of their own government. Walton Privacy is a GUARANTEED right in the Bill of Rights
5. Liability For Internet Usage Anonymity should NEVER be assumed on the internet. Users can be held liable for everything they provide to the internet Everything has a digital signature and can be traced
6. Data Security on the Internet Three Main Concepts Privacy Confidentiality Consent
7. Privacy The right of an individual to: Determine what information is collected about them and how it is used Access information held about them and know that it is accurate and secure Anonymity (not having your Web browsing habits tracked) The sending and receiving of e-mail messages or other data
8. Confidentiality The principle of keeping data secure and secret from others Protection of information given by or about an individual in the course of a professional relationship
9. Consent The means by which we are authorized by an individual to process information about them based on their informed understanding of what we intend.
10.
11. A Good Quote.. As more and more people are realizing, we often reveal a lot of information about ourselves when we go online, information we may not realize we’re disclosing, but which advertisers and commercial websites can use to sell us goods and services. Voice of America
13. 1. Use of Proxy Servers A proxy server is a physical server between your computer and the destination website to service The destination server receives information on the proxy server not you! Reinforces the idea of anonymity
14. 2. Use of Independent Search Engines AVOID using you ISP’s (Internet Service Provider) search engine. search.comcast.net search.aol.com Since you pay for their internet service they track everything you do USE: Google.com Yahoo.com
15. 3. Deny Usage of Cookies A “cookie” is a packet of information that is received from the referencing website and saved by your computer The cookie tracks browsing habits and reports them back to the server from which it came Can be easily intercepted
16. 4. Caution to Adware and Spyware Adware and Spyware are application ( or viruses ) that can be installed on your computer through a “dirty” download These products track how you use your computer and report it back to the appropriate service that can then “spam” your email or advertise pop-ups
17. 5. Disable Auto Complete Auto complete can be very useful, but very dangerous Any internet browser that you use tracks how you use it Any information that it saves is sent back to the creating company so that they can improve their software
18. 6. Avoid Lots of Website Registrations Simply, the more sites you sign up for the more databases your information is in The more sites you sign up for the greater the risk that it’s services may not be trusted All sites have the right to share user information with whom they wish, you never know which site may choose to do this
19. Social Networking Sites Social networking sites propose the largest risk for personal information to be available to the public!! “The current self regulatory regime of contracts between the social networking sites and its users via privacy policy is insufficient to protect the interests of the users.” Connie Powell
20. Examples Internationally people are more concerned with internet privacy then secret government surveillance Very confidential 16% Not confidential 32% Perceptions of Facebook’s security Confidential 28% Less confidential 24%
21.
22. Exerts from the Testimony of Gordon M. Snow,Assistant Director,Federal Bureau of Investigation United States Department of Justice “a ‘Getting To Know You’ quiz sent to a large list of social networking site users, while not appearing malicious, may mimic the same questions that are asked by financial institutions or e-mail account providers when the individual has forgotten their password. An e-mail address in the answer to the quiz questions can provide the cyber-criminal with the tools to enter your bank account, your e-mail account or credit card in order to transfer money or siphon off your savings and investments.” Criminals are high-jacking into e-mail and social networking accounts and sending a financial distress message. Friends willing to help are given the criminals account number where they can wire money. Criminals have targeted houses when they know that no one is home based on their Facebook status or information they shared on other social networking sites.
23. How-To Stay Safe on Facebook Contextual privacy control- allows users to control who is able to see their posts on a post by post basis. They can share a photo with only a few close friends, or share something non-personal with everyone using this control. Be aware of what you post on friends walls, you don’t know what their security settings are and who can see their page!!
24. Facebook Privacy Checklist Suggested by Carlton Collins Use “Lists” to organize your friends Hide your friends list from non-friends Click the pencil icon in the Friends box on your profile page, making sure the Show Friend List to Everyone box is unchecked. Thereafter, non-friends who view your profile will be unable to see your list of friends. Protect yourself from Facebook advertisers Facebook’s advertisers deposit tracking cookies on your computer. To protect yourself consider opting out of the placement of these cookies by member companies of the .Network Advertising Initiative at tinyurl.com/2wh5sj. Source, and more tips: http://ehis.ebscohost.com/eds/detail?sid=5dffd04c-c8f7-4de7-8847- 5b623e8b0696%40sessionmgr104&vid=36&hid=116&bdata=JnNpdGU9ZWRzLWxpdmUmc2NvcGU9c2l0ZQ%3d%3d#db=lgh&AN=51200997
25. General Tips Watch what you say on the internet, you never know who is reading!! Avoid “sketchy” websites or services Always adjust a website’s privacy settings Always read the terms of agreement before signing up for a website!!
26. Thank You For Listening - Colin, Jessica, Lee & Lamar
27. Sources: Asiimwe, Edgar Napoleon. Opinions of Social Web Users on Privacy and Online DAM. Journal of Digital Asset Management, Dec2010, Vol. 6 Issue 6, p312-318, 7p; DOI: 10.1057/dam.2010.37 Collins, J. (2010). Fortify Your Facebook Privacy Settings. Journal of Accountancy, 209(6), 42-45. Retrieved from EBSCOhost. Goldsborough, R. (2010). Are You Protecting Your Privacy Online?. Teacher Librarian, 37(5), 72. Retrieved from EBSCOhost. Powell, C. (2011). "You already have zero privacy. Get over it!" Would Warren and Brandeis Argue for Privacy for Social Networking?. Pace Law Review, 31(1), 146-181. Retrieved from EBSCOhost. Privacy online [electronic resource] : fair information practices in the electronic marketplace : a report to Congress / U.S. Federal Trade Commission. (2000). [Washington, DC : The Commission, 2000]. Retrieved from JAMES MADISON UNIV's Catalog database. Semitsu, Junichi P. From Facebook to Mug Shot: How the Dearth of Social Networking Privacy Rights Revolutionized Online Government Surveillance. Pace Law Review, Jan2011, Vol. 31 Issue 1, preceding p291-381; , 92p Sipior, Janice C.; Ward, Burke T.; Mendoza, Ruben A. Online Privacy Concerns Associated with Cookies, Flash Cookies, and Web Beacons. Journal of Internet Commerce (J INTERNET COMMERCE), 2011; 10(1): 1-16 (37 ref) SUN SUN, L., HICHANG, C., & SANCHEZ, M. (2009). Online Privacy, Government Surveillance and National ID Cards. Communications of the ACM, 52(12), 116-120. Retrieved from EBSCOhost. Walton, Timothy J. Internet Privacy Law, Online publication of Internet Privacy Laws. Internet Attorney, 2000. Source Retrieved 6/22/11 http://www.bcs.org/content/conWebDoc/15574 http://www.voanews.com/english/news/science-technology/a-13-2008-04-29-voa44.html (Voice of America) Secturity, Privacy, and confidentiality issues on the Internet, Grant Kelly and Bruce Mckenzie J Med Interent Research. 2002 Oct-Dec 4(2): e12 Gralla, Preston (2007). How the Internet Works. Que Pub, Indianapolis.