SlideShare une entreprise Scribd logo
1  sur  21
Télécharger pour lire hors ligne
The Deception of Privacy
The Truth About a Plugged in Life
By Cynthia Beneteau
Photo Source: Kristin Flour “Secret” Unsplash https://unsplash.com/collections/327093/privacy-kit?photo=BcjdbyKWquw
Prior to the digital age photos were typically just
shared with a handful of people, like friends and
family. Now, people take more photos in 2
minutes than the entire amount of all the photos
that existed 150 years ago. [2]
The top three places photos are uploaded to are:
Snapchat: 8796 photos per second
What's App : 8102 photos per second
Facebook :4501 photos per second [3]
Photo Source : Gratisography http://colorlisa.com/pictures/105_1.jpg
Today’s youth think of privacy
differently than adults do. They
care more about controlling who
is tracking them digitally, who is
seeing what they post and what
people think when seeing them.
The online experience for young
people is a social one. If
something is posted they do not
like, they are more likely to worry
about hiding the content from
their friends or family, than to
worry about teachers or potential
employers seeing it. They care
more about their reputation than
the actual information they are
posting[4]
Photo Source: http://www.gratisography.com/pictures/303_1.jpg
Parents need to consider the
long term reach of the digital
information they are sharing
about their children. A “cute”
video of a child doing something
silly, can come back to haunt that
same child when they become a
teenager or adult.
Even innocent stories shared by
a parent may be a potential
source of embarrassment to a
child later on. Children, youth and
teens should be able to control
their digital identities. There is a
balance that can be reached, a
parent can share information, but
limit identifying characteristics so
that it protects their children,
but they can still share [6]
Photo source: https://pixabay.com/en/desperate-sad-depressed-feet-hands-2293377/
72% of Parents are worried about their children’s online interactions with strangers or predators
that could harm them. Two major concerns are sexting and cyberbullying. Kids can be horrible to
each other and some are even using the internet to create fake identities of other children. They then
pose as the child and fabricate information about them. Parents are more than willing to potentially
embarrass their child if it will help to keep them safe. [7]
Photo Source https://pixabay.com/en/privacy-policy-spy-espionage-nsa-1624400
A Study done by “Young Canadians in
a Wired World” has indicated more
privacy education in schools and
homes is needed. According to the
study, students have limited
comprehension of password
sharing, privacy policies, policies
around data collection and geo-
location services
68% of Students incorrectly believe,
that a website will not share their
personal information if they have a
privacy policy [5]
Photo Source : https://www.pexels.com/photo/finger-print-on-enter-key-of-keyboard-163017/
“ We make big trade-offs as we become digitally
connected everywhere and anytime” causing increased
concerns with security and privacy [1]
John Palfrey and Urs Gasser, Authors of Interop. The Promise and Perils of Highly Interconnected Systems
Photo Source : https://static.pexels.com/photos/160709/raccoon-animal-animal-world-wildlife-photography-160709.jpeg
Over a two week period, Carnegie Mellon University Computer
Scientist’s ,did a study which determined that quite a few popular
Android apps collect GPS coordinates within 50 metres of where the
user is. This happens about 6200 times, which is equivalent to about
every three minutes [8]
Photo Source : https://www.pexels.com/photo/text-on-information-sign-258490/
The Carnegie Mellon study also uncovered that the Weather Channel app accesses location
information from it’s users every 10 minutes, or 2000 times in a two week period.[8]
Photo Source: https://www.pexels.com/photo/reflection-of-building-on-body-of-water-at-daytime-166360
When users in the Carnegie study found out how much personal data apps were
collecting they tried to restrict the apps from collecting it. Researchers tried to help by
sending daily “privacy nudges” to participants letting them know how many times
apps were collecting their data [8]
Operating updates ,since the study was conducted ,have now removed the software
that researchers used to see requests for personal information and the ability to send
“privacy nudges “ has also been disabled [8]
Photo Source: https://www.pexels.com/photo/london-new-york-tokyo-and-moscow-clocks-48770/
Facebook is able to know who your friends and acquaintances are
even if you lie about all of your personal information when signing
up [9]
Photo Source : https://www.pexels.com/photo/photo-of-2-children-walking-23971/
Facebook uses Network Science a complex
academic field, which uses mapping
algorithms, that takes information you provide
or give permission for them to access when
you sign up. It then uses it to determine the
structure of your social network. This data is
analyzed and allows them to accurately predict
people you are likely to know and even people
you will likely know in the future. [9]
Photo Source : https://www.pexels.com/photo/hand-thumbs-up-thumb-black-and-white-8252/
Samsung Smart TV
owners are susceptible
to spying. According to
“WikiLeaks” documents
a program named
“Weeping Angel” can
make Samsung’s Smart
TVs appear to be turned
off ,when they really are
not. This enables the TV
in essence, to work like a
bug and record
conversations in the
room. These are then
sent to a hidden CIA
server. Michael Hayden,
ex CIA director, thinks
this is a wonderful
capability because there
are “ bad people in the
world that have
Samsung TVs “ [ 10]
Photo Source: https://www.pexels.com/photo/full-frame-shot-of-eye-251287/
Samsung’s Smart TV Privacy Policy States "Please be aware that if your spoken words include
personal or other sensitive information, that information will be among the data captured and
transmitted to a third party."
A lot of Samsung TVs need users to actually click a microphone button before the voice
commands work, but on models such as PN60F8500 the microphone is always listening. [10]
Photo source : https://www.pexels.com/photo/night-music-band-microphone-9137
Web cams can introduce a number
of possible privacy breaches in our
homes, nurseries, on our laptops,
computers, tablets or anywhere we
have online cameras [11]
Photo source: https://www.pexels.com/photo/silver-imac-near-white-ceramic-kettle-205316/
The frightening idea of someone watching every movement your baby makes
is a very real possibility. The lack of the most basic security features are
making popular internet connected baby monitors vulnerable to hackers [11]
Photo Source: https://www.pexels.com/photo/newborn-child-feed-89695
Once a hacker has breached
one connected device, anything
connected to that Wi-Fi network
can potentially be accessed. [11]
Photo Source: https://www.pexels.com/photo/low-angle-photo-of-building-under-sky-69080/
The use of cameras in public spaces is
becoming more common place. Cameras
are also now on buses, subways, in ATM
machines, and outside gas stations or
grocery stores. [12]
Photo Source : https://www.pexels.com/photo/black-and-white-streets-bridge-jacket-70402
/
Photo Source: https://www.pexels.com/photo/5th-avenue-america-apple-store-architecture-279166
With the advent of
Google Street view it is
now possible to view
someone’s home,
business or even their
vehicle from the comfort
of your living room
The expectation of
privacy in the digital
age may no longer be
an option. Perhaps we
need to redefine what
privacy means and the
repercussions of this
new interpretation.
Photo Source: https://www.pexels.com/photo/butterflies-black-and-white-9159/
Sources:
1. Matrix, Sidneyeve “ John Palfrey and Urs Gasser Quote” Module 3 Slides Film 260 Queens University May 2017.
2. Eveleth, Rose. "How Many Photographs Of You Are Out There In The World?". The Atlantic. N.p., 2017. Web. 2 June 2017.
https://www.theatlantic.com/technology/archive/2015/11/how-many-photographs-of-you-are-out-there-in-the-world/413389/
3. Morrison, Kimberlee, and Kimberlee Morrison. "How Many Photos Are Uploaded To Snapchat Every Second?". Adweek.com. N.p., 2017. Web. 2
June 2017.http://www.adweek.com/digital/how-many-photos-are-uploaded-to-snapchat-every-second/
4. "Online Privacy, Online Publicity: Youth Do More To Protect Their Reputation Than Their Information | Mediasmarts". Mediasmarts.ca. N.p.,
2017. Web. 2 June 2017. http://mediasmarts.ca/blog/online-privacy-online-publicity-youth-do-more-protect-their-reputation-their-information
5. Bogart, Nicole. "Young Canadians Lack Understanding Of Online Privacy: Study". Global News. N.p., 2017. Web. 2 June 2017.
http://globalnews.ca/news/1159724/young-canadians-lack-understanding-of-online-privacy-study/
6. Dell’Antonia,Kj “ Don’t post about me on Social Media, Children say” The New York Times March 2017
https://well.blogs.nytimes.com/2016/03/08/dont-post-about-me-on-social-media-children-say/?_r=0
7. Paul, P. (2013, May 5). Cyberparenting and the Risk of T.M.I. New York Times, p. 8(L). Retrieved from
http://go.galegroup.com.proxy.queensu.ca/ps/i.do?p=AONE&sw=w&u=queensulaw&v=2.1&it=r&id=GALE%7CA328694536&asid=ed444bf722dd5
54a00a728a96a4737f2
8. Dwoskin, E. “WSJ.D technology: Apps track users -- once every 3 minute”s. Wall Street Journal Mar 24 2015 . Retrieved from https://search-
proquest-com.proxy.queensu.ca/docview/1665403896?accountid=6180
9. Dewey, Caitlin “How Facebook knows who all your friends are, even better than you do”. Washingtonpost.com. April2 2015 Retrieved from
http://go.galegroup.com.proxy.queensu.ca/ps/i.do?p=AONE&sw=w&u=queensulaw&v=2.1&it=r&id=GALE%7CA408035312&asid=97bdc5e16299b
f6c66dcb7543481dace
10. "If You Have A Smart TV, Take A Closer Look At Your Privacy Settings". BuzzFeed. N.p., 2017. Web. 2 June 2017.
https://www.buzzfeed.com/nicolenguyen/here-are-the-privacy-settings-you-should-look-at-if-you-have?utm_term=.nqkg6Z0A7N#.cidNjp56Ov
11. "Is Your Baby Monitor Safe? Cybersecurity Firms Says Many Can Be Hacked". CBC News. N.p., 2017. Web. 2 June 2017.
http://www.cbc.ca/news/business/several-baby-monitors-vulnerable-to-hacking-cybersecurity-firm-warns-1.3213046
12. Alcoba, Natalie. "Growing Number Of CCTV Surveillance Cameras Outside City Core Dismays Privacy Advocates". National Post. N.p., 2017.
Web. 2 June 2017.
http://news.nationalpost.com/toronto/growing-number-of-cctv-surveillance-cameras-dismays-privacy-advocates
Photo Source : https://www.pexels.com/photo/full-frame-shot-of-metal-332834

Contenu connexe

Tendances

Social Media Career Assignment
Social Media Career AssignmentSocial Media Career Assignment
Social Media Career AssignmentRaechel Mills
 
IS SLACKTIVISM REALLY AS BAD AS THEY SAY IT IS? | Karen Clement
IS SLACKTIVISM REALLY AS BAD AS THEY SAY IT IS? | Karen ClementIS SLACKTIVISM REALLY AS BAD AS THEY SAY IT IS? | Karen Clement
IS SLACKTIVISM REALLY AS BAD AS THEY SAY IT IS? | Karen ClementKaren Clement
 
Film260 digitalflipbookshannongrist
Film260 digitalflipbookshannongristFilm260 digitalflipbookshannongrist
Film260 digitalflipbookshannongristShannon Grist
 
Social Media and Depression
Social Media and DepressionSocial Media and Depression
Social Media and DepressionDamon Auguste
 
Film 260 flipbook
Film 260 flipbookFilm 260 flipbook
Film 260 flipbookChuyun Xu
 
Social media, friend or foe?
Social media, friend or foe?Social media, friend or foe?
Social media, friend or foe?tharshni
 
Social Media Is Not Social
Social Media Is Not SocialSocial Media Is Not Social
Social Media Is Not SocialBrett Sykes
 
Your posts are not private
Your posts are not privateYour posts are not private
Your posts are not privateShawnee Liu
 
FILM260 Flipbook Assignment
FILM260 Flipbook AssignmentFILM260 Flipbook Assignment
FILM260 Flipbook AssignmentJordan Pernari
 
Cheng jessica flipbook_film260
Cheng jessica flipbook_film260Cheng jessica flipbook_film260
Cheng jessica flipbook_film260Jessica Cheng
 
Helicopter Parent - Flipbook
Helicopter Parent - FlipbookHelicopter Parent - Flipbook
Helicopter Parent - FlipbookJulia Holland
 
Desensitization
Desensitization Desensitization
Desensitization 14jc5
 
Food for Thought, and Instagram
Food for Thought, and InstagramFood for Thought, and Instagram
Food for Thought, and InstagramMarie-Claire Zhang
 

Tendances (20)

Social Media Career Assignment
Social Media Career AssignmentSocial Media Career Assignment
Social Media Career Assignment
 
IS SLACKTIVISM REALLY AS BAD AS THEY SAY IT IS? | Karen Clement
IS SLACKTIVISM REALLY AS BAD AS THEY SAY IT IS? | Karen ClementIS SLACKTIVISM REALLY AS BAD AS THEY SAY IT IS? | Karen Clement
IS SLACKTIVISM REALLY AS BAD AS THEY SAY IT IS? | Karen Clement
 
Film260 Flipbook
Film260 FlipbookFilm260 Flipbook
Film260 Flipbook
 
Film260 digitalflipbookshannongrist
Film260 digitalflipbookshannongristFilm260 digitalflipbookshannongrist
Film260 digitalflipbookshannongrist
 
Social Media and Depression
Social Media and DepressionSocial Media and Depression
Social Media and Depression
 
Film 260 flipbook
Film 260 flipbookFilm 260 flipbook
Film 260 flipbook
 
Privacy hazard
Privacy hazardPrivacy hazard
Privacy hazard
 
Why choose m commerce
Why choose m commerceWhy choose m commerce
Why choose m commerce
 
Social media, friend or foe?
Social media, friend or foe?Social media, friend or foe?
Social media, friend or foe?
 
Social Media Is Not Social
Social Media Is Not SocialSocial Media Is Not Social
Social Media Is Not Social
 
260 flipbook
260 flipbook260 flipbook
260 flipbook
 
Your posts are not private
Your posts are not privateYour posts are not private
Your posts are not private
 
FILM260 Flipbook Assignment
FILM260 Flipbook AssignmentFILM260 Flipbook Assignment
FILM260 Flipbook Assignment
 
Digital selfie
Digital selfieDigital selfie
Digital selfie
 
Cheng jessica flipbook_film260
Cheng jessica flipbook_film260Cheng jessica flipbook_film260
Cheng jessica flipbook_film260
 
Helicopter Parent - Flipbook
Helicopter Parent - FlipbookHelicopter Parent - Flipbook
Helicopter Parent - Flipbook
 
Oversharing as Modern Art
Oversharing as Modern ArtOversharing as Modern Art
Oversharing as Modern Art
 
Desensitization
Desensitization Desensitization
Desensitization
 
Food for Thought, and Instagram
Food for Thought, and InstagramFood for Thought, and Instagram
Food for Thought, and Instagram
 
Not so social
Not so social Not so social
Not so social
 

Similaire à The Deception of Privacy, The Truth About a Plugged in Life

Is Online Privacy a Thing of the Past?
Is Online Privacy a Thing of the Past?Is Online Privacy a Thing of the Past?
Is Online Privacy a Thing of the Past?Aleque Juneau
 
Film 260 flipbook
Film 260 flipbookFilm 260 flipbook
Film 260 flipbookJulie Coles
 
Smartphones with Smarter Apps
Smartphones with Smarter AppsSmartphones with Smarter Apps
Smartphones with Smarter AppsSara Dow
 
Technology & Internet Use by Baby Boomers & Beyond
Technology & Internet Use by Baby Boomers & Beyond Technology & Internet Use by Baby Boomers & Beyond
Technology & Internet Use by Baby Boomers & Beyond genevabloemen
 
Error: Your Life Has Been Hacked
Error: Your Life Has Been HackedError: Your Life Has Been Hacked
Error: Your Life Has Been HackedAdelle Leonard
 
Should Kids Use Digital Technology?
Should Kids Use Digital Technology?Should Kids Use Digital Technology?
Should Kids Use Digital Technology?Lucy Peters
 
Snapchats Linger for Longer than 10 Seconds
Snapchats Linger for Longer than 10 SecondsSnapchats Linger for Longer than 10 Seconds
Snapchats Linger for Longer than 10 SecondsStephanie Sheridan
 
2012bruneluniversity 120615094336-phpapp01
2012bruneluniversity 120615094336-phpapp012012bruneluniversity 120615094336-phpapp01
2012bruneluniversity 120615094336-phpapp01Maria Palaska
 
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...IOSR Journals
 
The Evolution of Technology & Etiquette
The Evolution of Technology & EtiquetteThe Evolution of Technology & Etiquette
The Evolution of Technology & EtiquetteChristie Stelling
 
It's a Public World, After All
It's a Public World, After AllIt's a Public World, After All
It's a Public World, After AllJulia Partington
 
Tree incident shows value of remote working
Tree incident shows value of remote workingTree incident shows value of remote working
Tree incident shows value of remote workingJohn Davis
 
The New Digital You
The New Digital YouThe New Digital You
The New Digital Yourichbrilli
 
Bread Crumbs: How We are Building an Online Map to Ourselves
Bread Crumbs: How We are Building an Online Map to OurselvesBread Crumbs: How We are Building an Online Map to Ourselves
Bread Crumbs: How We are Building an Online Map to OurselvesJonah Chin
 
Private Is The New Public: How Society Is Ending Privacy
Private Is The New Public: How Society Is Ending PrivacyPrivate Is The New Public: How Society Is Ending Privacy
Private Is The New Public: How Society Is Ending PrivacyLin Ke
 
Private Is The New Public: How Society Is Ending Privacy
Private Is The New Public: How Society Is Ending PrivacyPrivate Is The New Public: How Society Is Ending Privacy
Private Is The New Public: How Society Is Ending PrivacyLin Ke
 
Privacy flip book assignment film 260 queensu kc
Privacy flip book assignment  film 260  queensu kcPrivacy flip book assignment  film 260  queensu kc
Privacy flip book assignment film 260 queensu kcCatherine Cowperthwaite
 
The Evolution of Technology & Etiquette
The Evolution of Technology & EtiquetteThe Evolution of Technology & Etiquette
The Evolution of Technology & EtiquetteChristie Stelling
 

Similaire à The Deception of Privacy, The Truth About a Plugged in Life (20)

Is Online Privacy a Thing of the Past?
Is Online Privacy a Thing of the Past?Is Online Privacy a Thing of the Past?
Is Online Privacy a Thing of the Past?
 
Film 260 flipbook
Film 260 flipbookFilm 260 flipbook
Film 260 flipbook
 
Smartphones with Smarter Apps
Smartphones with Smarter AppsSmartphones with Smarter Apps
Smartphones with Smarter Apps
 
Flipbook.pdf
Flipbook.pdf Flipbook.pdf
Flipbook.pdf
 
Technology & Internet Use by Baby Boomers & Beyond
Technology & Internet Use by Baby Boomers & Beyond Technology & Internet Use by Baby Boomers & Beyond
Technology & Internet Use by Baby Boomers & Beyond
 
Error: Your Life Has Been Hacked
Error: Your Life Has Been HackedError: Your Life Has Been Hacked
Error: Your Life Has Been Hacked
 
Should Kids Use Digital Technology?
Should Kids Use Digital Technology?Should Kids Use Digital Technology?
Should Kids Use Digital Technology?
 
Snapchats Linger for Longer than 10 Seconds
Snapchats Linger for Longer than 10 SecondsSnapchats Linger for Longer than 10 Seconds
Snapchats Linger for Longer than 10 Seconds
 
2012bruneluniversity 120615094336-phpapp01
2012bruneluniversity 120615094336-phpapp012012bruneluniversity 120615094336-phpapp01
2012bruneluniversity 120615094336-phpapp01
 
L017146571
L017146571L017146571
L017146571
 
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
 
The Evolution of Technology & Etiquette
The Evolution of Technology & EtiquetteThe Evolution of Technology & Etiquette
The Evolution of Technology & Etiquette
 
It's a Public World, After All
It's a Public World, After AllIt's a Public World, After All
It's a Public World, After All
 
Tree incident shows value of remote working
Tree incident shows value of remote workingTree incident shows value of remote working
Tree incident shows value of remote working
 
The New Digital You
The New Digital YouThe New Digital You
The New Digital You
 
Bread Crumbs: How We are Building an Online Map to Ourselves
Bread Crumbs: How We are Building an Online Map to OurselvesBread Crumbs: How We are Building an Online Map to Ourselves
Bread Crumbs: How We are Building an Online Map to Ourselves
 
Private Is The New Public: How Society Is Ending Privacy
Private Is The New Public: How Society Is Ending PrivacyPrivate Is The New Public: How Society Is Ending Privacy
Private Is The New Public: How Society Is Ending Privacy
 
Private Is The New Public: How Society Is Ending Privacy
Private Is The New Public: How Society Is Ending PrivacyPrivate Is The New Public: How Society Is Ending Privacy
Private Is The New Public: How Society Is Ending Privacy
 
Privacy flip book assignment film 260 queensu kc
Privacy flip book assignment  film 260  queensu kcPrivacy flip book assignment  film 260  queensu kc
Privacy flip book assignment film 260 queensu kc
 
The Evolution of Technology & Etiquette
The Evolution of Technology & EtiquetteThe Evolution of Technology & Etiquette
The Evolution of Technology & Etiquette
 

Dernier

Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 

Dernier (20)

Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 

The Deception of Privacy, The Truth About a Plugged in Life

  • 1. The Deception of Privacy The Truth About a Plugged in Life By Cynthia Beneteau Photo Source: Kristin Flour “Secret” Unsplash https://unsplash.com/collections/327093/privacy-kit?photo=BcjdbyKWquw
  • 2. Prior to the digital age photos were typically just shared with a handful of people, like friends and family. Now, people take more photos in 2 minutes than the entire amount of all the photos that existed 150 years ago. [2] The top three places photos are uploaded to are: Snapchat: 8796 photos per second What's App : 8102 photos per second Facebook :4501 photos per second [3] Photo Source : Gratisography http://colorlisa.com/pictures/105_1.jpg
  • 3. Today’s youth think of privacy differently than adults do. They care more about controlling who is tracking them digitally, who is seeing what they post and what people think when seeing them. The online experience for young people is a social one. If something is posted they do not like, they are more likely to worry about hiding the content from their friends or family, than to worry about teachers or potential employers seeing it. They care more about their reputation than the actual information they are posting[4] Photo Source: http://www.gratisography.com/pictures/303_1.jpg
  • 4. Parents need to consider the long term reach of the digital information they are sharing about their children. A “cute” video of a child doing something silly, can come back to haunt that same child when they become a teenager or adult. Even innocent stories shared by a parent may be a potential source of embarrassment to a child later on. Children, youth and teens should be able to control their digital identities. There is a balance that can be reached, a parent can share information, but limit identifying characteristics so that it protects their children, but they can still share [6] Photo source: https://pixabay.com/en/desperate-sad-depressed-feet-hands-2293377/
  • 5. 72% of Parents are worried about their children’s online interactions with strangers or predators that could harm them. Two major concerns are sexting and cyberbullying. Kids can be horrible to each other and some are even using the internet to create fake identities of other children. They then pose as the child and fabricate information about them. Parents are more than willing to potentially embarrass their child if it will help to keep them safe. [7] Photo Source https://pixabay.com/en/privacy-policy-spy-espionage-nsa-1624400
  • 6. A Study done by “Young Canadians in a Wired World” has indicated more privacy education in schools and homes is needed. According to the study, students have limited comprehension of password sharing, privacy policies, policies around data collection and geo- location services 68% of Students incorrectly believe, that a website will not share their personal information if they have a privacy policy [5] Photo Source : https://www.pexels.com/photo/finger-print-on-enter-key-of-keyboard-163017/
  • 7. “ We make big trade-offs as we become digitally connected everywhere and anytime” causing increased concerns with security and privacy [1] John Palfrey and Urs Gasser, Authors of Interop. The Promise and Perils of Highly Interconnected Systems Photo Source : https://static.pexels.com/photos/160709/raccoon-animal-animal-world-wildlife-photography-160709.jpeg
  • 8. Over a two week period, Carnegie Mellon University Computer Scientist’s ,did a study which determined that quite a few popular Android apps collect GPS coordinates within 50 metres of where the user is. This happens about 6200 times, which is equivalent to about every three minutes [8] Photo Source : https://www.pexels.com/photo/text-on-information-sign-258490/
  • 9. The Carnegie Mellon study also uncovered that the Weather Channel app accesses location information from it’s users every 10 minutes, or 2000 times in a two week period.[8] Photo Source: https://www.pexels.com/photo/reflection-of-building-on-body-of-water-at-daytime-166360
  • 10. When users in the Carnegie study found out how much personal data apps were collecting they tried to restrict the apps from collecting it. Researchers tried to help by sending daily “privacy nudges” to participants letting them know how many times apps were collecting their data [8] Operating updates ,since the study was conducted ,have now removed the software that researchers used to see requests for personal information and the ability to send “privacy nudges “ has also been disabled [8] Photo Source: https://www.pexels.com/photo/london-new-york-tokyo-and-moscow-clocks-48770/
  • 11. Facebook is able to know who your friends and acquaintances are even if you lie about all of your personal information when signing up [9] Photo Source : https://www.pexels.com/photo/photo-of-2-children-walking-23971/
  • 12. Facebook uses Network Science a complex academic field, which uses mapping algorithms, that takes information you provide or give permission for them to access when you sign up. It then uses it to determine the structure of your social network. This data is analyzed and allows them to accurately predict people you are likely to know and even people you will likely know in the future. [9] Photo Source : https://www.pexels.com/photo/hand-thumbs-up-thumb-black-and-white-8252/
  • 13. Samsung Smart TV owners are susceptible to spying. According to “WikiLeaks” documents a program named “Weeping Angel” can make Samsung’s Smart TVs appear to be turned off ,when they really are not. This enables the TV in essence, to work like a bug and record conversations in the room. These are then sent to a hidden CIA server. Michael Hayden, ex CIA director, thinks this is a wonderful capability because there are “ bad people in the world that have Samsung TVs “ [ 10] Photo Source: https://www.pexels.com/photo/full-frame-shot-of-eye-251287/
  • 14. Samsung’s Smart TV Privacy Policy States "Please be aware that if your spoken words include personal or other sensitive information, that information will be among the data captured and transmitted to a third party." A lot of Samsung TVs need users to actually click a microphone button before the voice commands work, but on models such as PN60F8500 the microphone is always listening. [10] Photo source : https://www.pexels.com/photo/night-music-band-microphone-9137
  • 15. Web cams can introduce a number of possible privacy breaches in our homes, nurseries, on our laptops, computers, tablets or anywhere we have online cameras [11] Photo source: https://www.pexels.com/photo/silver-imac-near-white-ceramic-kettle-205316/
  • 16. The frightening idea of someone watching every movement your baby makes is a very real possibility. The lack of the most basic security features are making popular internet connected baby monitors vulnerable to hackers [11] Photo Source: https://www.pexels.com/photo/newborn-child-feed-89695
  • 17. Once a hacker has breached one connected device, anything connected to that Wi-Fi network can potentially be accessed. [11] Photo Source: https://www.pexels.com/photo/low-angle-photo-of-building-under-sky-69080/
  • 18. The use of cameras in public spaces is becoming more common place. Cameras are also now on buses, subways, in ATM machines, and outside gas stations or grocery stores. [12] Photo Source : https://www.pexels.com/photo/black-and-white-streets-bridge-jacket-70402 /
  • 19. Photo Source: https://www.pexels.com/photo/5th-avenue-america-apple-store-architecture-279166 With the advent of Google Street view it is now possible to view someone’s home, business or even their vehicle from the comfort of your living room
  • 20. The expectation of privacy in the digital age may no longer be an option. Perhaps we need to redefine what privacy means and the repercussions of this new interpretation. Photo Source: https://www.pexels.com/photo/butterflies-black-and-white-9159/
  • 21. Sources: 1. Matrix, Sidneyeve “ John Palfrey and Urs Gasser Quote” Module 3 Slides Film 260 Queens University May 2017. 2. Eveleth, Rose. "How Many Photographs Of You Are Out There In The World?". The Atlantic. N.p., 2017. Web. 2 June 2017. https://www.theatlantic.com/technology/archive/2015/11/how-many-photographs-of-you-are-out-there-in-the-world/413389/ 3. Morrison, Kimberlee, and Kimberlee Morrison. "How Many Photos Are Uploaded To Snapchat Every Second?". Adweek.com. N.p., 2017. Web. 2 June 2017.http://www.adweek.com/digital/how-many-photos-are-uploaded-to-snapchat-every-second/ 4. "Online Privacy, Online Publicity: Youth Do More To Protect Their Reputation Than Their Information | Mediasmarts". Mediasmarts.ca. N.p., 2017. Web. 2 June 2017. http://mediasmarts.ca/blog/online-privacy-online-publicity-youth-do-more-protect-their-reputation-their-information 5. Bogart, Nicole. "Young Canadians Lack Understanding Of Online Privacy: Study". Global News. N.p., 2017. Web. 2 June 2017. http://globalnews.ca/news/1159724/young-canadians-lack-understanding-of-online-privacy-study/ 6. Dell’Antonia,Kj “ Don’t post about me on Social Media, Children say” The New York Times March 2017 https://well.blogs.nytimes.com/2016/03/08/dont-post-about-me-on-social-media-children-say/?_r=0 7. Paul, P. (2013, May 5). Cyberparenting and the Risk of T.M.I. New York Times, p. 8(L). Retrieved from http://go.galegroup.com.proxy.queensu.ca/ps/i.do?p=AONE&sw=w&u=queensulaw&v=2.1&it=r&id=GALE%7CA328694536&asid=ed444bf722dd5 54a00a728a96a4737f2 8. Dwoskin, E. “WSJ.D technology: Apps track users -- once every 3 minute”s. Wall Street Journal Mar 24 2015 . Retrieved from https://search- proquest-com.proxy.queensu.ca/docview/1665403896?accountid=6180 9. Dewey, Caitlin “How Facebook knows who all your friends are, even better than you do”. Washingtonpost.com. April2 2015 Retrieved from http://go.galegroup.com.proxy.queensu.ca/ps/i.do?p=AONE&sw=w&u=queensulaw&v=2.1&it=r&id=GALE%7CA408035312&asid=97bdc5e16299b f6c66dcb7543481dace 10. "If You Have A Smart TV, Take A Closer Look At Your Privacy Settings". BuzzFeed. N.p., 2017. Web. 2 June 2017. https://www.buzzfeed.com/nicolenguyen/here-are-the-privacy-settings-you-should-look-at-if-you-have?utm_term=.nqkg6Z0A7N#.cidNjp56Ov 11. "Is Your Baby Monitor Safe? Cybersecurity Firms Says Many Can Be Hacked". CBC News. N.p., 2017. Web. 2 June 2017. http://www.cbc.ca/news/business/several-baby-monitors-vulnerable-to-hacking-cybersecurity-firm-warns-1.3213046 12. Alcoba, Natalie. "Growing Number Of CCTV Surveillance Cameras Outside City Core Dismays Privacy Advocates". National Post. N.p., 2017. Web. 2 June 2017. http://news.nationalpost.com/toronto/growing-number-of-cctv-surveillance-cameras-dismays-privacy-advocates Photo Source : https://www.pexels.com/photo/full-frame-shot-of-metal-332834