SlideShare une entreprise Scribd logo
1  sur  31
Télécharger pour lire hors ligne
11 MAY 2021 #DATASCIENCEWEEK
Leigh-Chantelle
HOW YOUR DATA CAN BE


USED AGAINST YOU
The Internet continuously changes and evolves - it’s different that what it once was when you joined


Anonymity is important and essential for a free and open internet


Our online footprints are more visible and more permanent


COVID-19 has turbocharged digital adoption for contract tracing and movement control apps and using
Arti
f
icial Intelligence (AI) for decision making


New technologies are yet to show the full extend of their risks, limitations, and consequences of tracking
citizens, students, and workers; and having shortsighted data privacy policies


Australia is the only developed country without a digital rights bill
TECHNOLOGY
Always-on cultured tethered to digital devices


With work from home and online learning the norm, more scrutiny is needed for our practices and the
technology we rely on


COVID encouraged technology companies, businesses, and governments to roll out technology
without understanding or anticipating risks for privacy and safety


Tech companies have been designed to collect information about you to sell it to advertisers - your
data is bundled together to create your digital pro
f
ile and sold to the highest bidder


The more data collected on you, the more risk to your privacy
TECHNOLOGY USE
People in power come up with bad technology and have the resources to roll these out and market to
consumers


Techno-solutionism: The way we accept technology solutions as easy and quick ways to solve real-
world and complex issues - it is NOT magic


Complex issues need deep understanding and true debate to come up with complex and real
solutions


Technology solutions often harm the vulnerable people they are meant to protect


e.g., app to verify consent before adults engage in sex; Robodebt
TECHNO-SOLUTIONISM
Trust in technology fell all around the world in 2020 (70 out of 100)


Popularity in technology has helped protect the industry from critics and regulators, but this
is declining


Social media companies trust score is 46 - below other business categories


The increasing dif
f
icult relationship between technology and the public is blamed for the fall
of trust e.g., misinformation, bias in AI, and privacy issues


CEOs are encouraged to “act
f
irst, talk later”
TRUST IN TECHNOLOGY
Axios, 2021
Dropbox: Almost 70M customers a
ff
ected in 2012, emails and passwords


Facebook: 500M+ breached accounts (20% of FB subscribers) in April 2021. Associating phone numbers to
identities. Also names and genders, with a lot of data including DOB, location, relationship status, and employer.


Kickstarter: Almost 5.2M members February 2013, email, usernames, and passwords


LinkedIn: 500M pro
f
iles April 2021 including full names, email, phone number, workplace information and more


NurseryCam: 10+ thousand accounts February 2021 exposed with email addresses


Oxfam Australia: 11.8 million accounts in March 2021, names, phone numbers, addresses, gender and DOB.
Small number of people had partial credit card data exposed, some had bank name, account number, and BSB
exposed.


Patreon: 2.3M+ records October 2015, emails, payment history, addresses, private messages, and website
activity


ProctorU: 400+ thousand user June 2020, email, names, passwords, phone numbers, addresses, usernames


Snapchat: 4.6M in January 2014 (one week after vulnerabilities were detailed) including usernames and phone
numbers, and locations exposed
DATA HACKED & SHARED
haveibeenpwned.com
Apps and websites can access:


Phone and email contacts


Call logs


Passwords


Internet and Calendar data


Device location data and frequented locations


Unique device ID


Data on how you use an app


Age, interests, purchasing habits, health, social


This information is collected and most likely shared with other companies - usually disclosed in a privacy policy
YOUR DIGITAL PROFILE
Social media platforms are being called out for their bad practices such as
f
lawed content moderation, rampant tracking,
algorithmic bias, harmful recommendations, limited political ad transparency, tax evasion, sexual harassment charges and more
with disinformation and hate speech accelerated by algorithmic recommendations (Mozilla, 2020).


Pro
f
iting off vulnerabilities of users is not a glitch in the social media system, it’s central to how their business model works


By interacting on any social media platform, the information gathered about you is used to target you with advertisements you
will click on - for adults, young people, those susceptible to advertising


The longer you are engaging with content on a social media platform, the more highly-personalised advertising can be sold,
based on detailed pro
f
iles on all users, including highly-sensitive information


Social media is not regulated (unlike radio and television) and dif
f
icult to track


We are the product when our data is bought and sold without out knowledge or agreement
SOCIAL MEDIA
As global dependency on big tech grew with the
pandemic and lockdowns, the big 7 technology
companies (Apple, Microsoft, Amazon, Alphabet/Google,
Facebook, along with China’s Tencent/WeChat and
Alibaba) increased their power and pro
f
its (PwC, 2020)


Companies are racing to collect as much personal data
as possible, thinking in terms of money, ease of use, and
immediacy instead of the consequences of exposure and
targets for attack


More privacy by design is required than
f
ixing up privacy
issues after the event
TECHNOLOGY USE & POWER
OUR IPHONES
Orange (microphone) and Green (camera) dots provide a
visual indication on iPhone or iPads when apps are using
(iOS 14 update in Sept 2020)


Camera includes BOTH camera and microphone access -
both colours will not show at once


Go to Control Centre to check what app is using your
camera or microphone


Update your access in the Privacy section of your
Settings


Facebook is NOT listening to your conversations - you
are predictable due to your online digital trail
HowToGeek.com
AppTrackingTransparency/Apple’s Cross-Track opt-out


Stop apps from tracking your activity for advertising using a prompt


Settings > Privacy > Tracking > Allow Apps to Request to Track OFF
(manually only used by 3% of American iOS users in the past)


55% of people say they would not allow Facebook to track them on other
apps if prompted (TapResearch, 2021)


98% of Facebook’s revenue comes from advertising - ATT could result in a
7% loss to revenue (Mobile Dev Memo, 2021)


Only 13% worldwide & 4% of Americans are opting-in (Flurry, May 8 2021)
OUR PHONES: IOS 14.5 UPDATE
Normalising surveillance technologies (e.g., spyware for partners and tools for
monitoring children, students, and workers) increases abuse for vulnerable people and
encourages control (Citizen Lab, 2019)


Smart devices and IOT devices collect and share a LOT of data


Our desire for so-called security is its own security threat - Andrew G Ferguson, law
professor
SECURITY
Mozilla.org have created a *Privacy Not Included guide for apps and products that do not meet their
minimum security standards (encryption, automatic security updates, strong passwords, vulnerability
management, and privacy practices), shares and sells data, does not allow deletion of data,
readability of privacy information, and a poor track record of data protection


Smart home, home of
f
ice, toys and games, pets, entertainment, wearables, dating apps, and sex toys


Some of the worst: Amazon Ring products, most dating apps - especially Facebook Dating and Match
Group (Tinder, Grindr, Hinge etc), Roku, Schlage, Xiaomi


Some of the best: Apple, Eufy, Garmin, iRobot, and Lex dating app
*PRIVACY NOT INCLUDED
foundation.mozilla.org/privacynotincluded
Dating apps are not immune to security and privacy issues


Aspects shared include location, sexual orientation, HIV data, political leanings, date of birth, religion


The worst: Facebook Dating and Match Group (45 dating apps including Tinder, Grindr, Hinge, OKCupid, Match)


Match Group privacy policy states that you allow them to share your personal information with other Match Group
sites for non-commercial purposes


When you connect social media accounts (Instagram or Facebook) both the original app and the linked app collect
more information TOGETHER - do not link your dating apps


Researchers point out that algorithms (particularly for Tinder) have prejudice designed into it based on race,
gender, ethnicity, or age


The better ones: eHarmony, Happn, Lex
OUR RELATIONSHIPS ONLINE
Technology can be misused, especially for family violence, with double the risk for Indigenous women


Technology-facilitated abuse is gendered: 96% male perpetrators, 93% female victims


Tracking apps on phones are increasingly used for abusive partners to keep track of women and children keeping them
constantly fearful and anxious


Ex-partners can also constantly text or use social media to send threats - especially anonymous accounts


GPS tracking increased by 244.8%, camera use increased by 183.2%, and children used as a monitor for their mother
increased by 346.6% since 2015 (WESNET, 2020)


Check for door locks, tracing and monitoring devices, smart device assess, and stalking tools on phones and other digital
devices, kill switches on cars


See techsafety.org.au/resources/resources-women
OUR PAST RELATIONSHIPS
ABC.net.au
More data collected from the government without consent for sharing leads to more errors, which will only
worsen with the volume and speed of sharing this data.


The people most at risk are the people who access government services more than the average Australia,
marginalised groups (e.g., First Nations, disabled, elderly, and young people).


New laws could encourage the government to share any and all personal data without the public knowing or
consenting.


Concerns include weak consent requirements, lack of privacy safeguards, and bypass of existing privacy
laws (including the current Privacy Act),
f
inding a discrepancy between public statements from the
government and the legislation, and a scheme reliant on “good intent” rather than safeguards and real
protections (InnovationAus, 2021).
OUR GOVERNMENT
Robotdebt compared private data held by Centrelink against ATO averaged income data and generated fake
debt notices for vulnerable people even after
f
inding out it was illegal.


This cost $2 billion (was meant to raise $3B),


300 000 people were effected causing homelessness, immense trauma, stress, anxiety, mental illness, debt,
and deaths


“The government is once again getting away with being shysters, while making the little people feel like it is
they that did wrong,” quote by Fiona Forsyth from one of the victims she is representing


Centrelink disclosed a woman’s new address to her former partner who had a DVO out against him


The government demands to be trusted without
f
irst demonstrating to be trustworthy, and in fact
demonstrating the opposite. - Justin Warren, Electronic Frontiers Australia
OUR GOVERNMENT FAILS
The Online Safety Bill: “to keep Australians safe online”. Would increase the eSafety commissioner’s power by removing online
abuse, force app stores and services to remove app/website access, enforce veri
f
ication systems (e.g., face scan before looking
at age-restricted material)


The Data Availability and Transparency Bill: Making it easier for the government to share data with others to improve
government services. More data than necessary is being collected and could be used for more than its stated aims (e.g., NDIS
enforcement)


Privacy Act review: Review of a 30-year-old act. Focusing on reviewing personal information de
f
inition, exceptions, legal
rami
f
ications of serious invasions of privacy, noti
f
ication of people who have had their data breached. Europe’s General Data
Protection Regulation (GDPR) privacy reform is a great aim. This needs to come before the Data Availability and Transparency Bill


Surveillance Legislation Amendment (Identify and Disrupt) Bill: Amplify police powers by creating intrusive warrants without
judge signatures. The federal police and Australian Criminal Intelligence Commission (ACIC) will gain three types warrants to be
able to modify, add, delete, or copy data; access networks and devices; and take over online accounts to investigate


Digital Identity Legislation: Centralising how Australians prove their identity online. Using one login on various sites (e.g.,
Facebook and Google) including facial recognition software.
OUR GOVERNMENT: DIGITAL REFORMS
crikey.com.au
South Australian government redirected web users looking at press releases or for COVID information to a data-
harvesting platform, NationBuilder


Claimed that the redirections were accidental, no one knew about it, and no data was collected - privacy watchdog
concluded it was probable the government did not know this was happening


NationBuilder is a data harvesting company and campaign tool used for collecting data for political campaigns
including Trump, both sides of Brexit, and Labour NZ


Data collected includes name, job, employer, social media accounts, computer details, and internet connection - all
this information is added to an individual pro
f
ile


Political companies are exempt from the Privacy Act therefore are free to collect your personal information and data
OUR GOVERNMENT & DATA HARVESTING
ABC.net.au
The pandemic has provided excuses for companies and
governments to use more surveillance tactics under the guise of
public health and safety.


Responses to the pandemic allowed for more surveillance and
censorship, including how and when people are tracked, and
restrictions of online speech in more than 20 countries (Freedom
House, 2020)


Intensi
f
ication and expansion of police power during COVID
emergencies resulted in expansion of laws, reduction of scrutiny,
an authoritarianism risk, with some policing practices supersede
or undermine public health goals.


COVID policing allows intensi
f
ication of selective criminalisation
processes, with a disproportionate focus on First Nations peoples
in street policing (45% stops in NSW), and policing of radicalised
and socio-economically disadvantaged communities in public
housing.
GOVERNMENT SURVEILLANCE
Boon-Kuo, et al., 2020
Substandard technology from the federal government with data privacy
issues, technical
f
laws, security issues, human rights implications,
normalisation of surveillance, and a waste of taxpayer money (Digital
Rights Watch, 2021)


Tens of millions of dollars spent ($3.8M on development, $6M on other
works including the app, and an additional $64M on advertising), going
to companies involved with the Liberal party


Not ONE person from the app found that contract tracing has not
already detected


There are many issues with the COVIDSafe app including effectiveness,
privacy, and accessibility, and a major issue that people need to be close
to each other for 15 minutes to register as a close contact (9News, 2021)
AUSTRALIA’S COVIDSAFE APP
Can vaccinations be ethically and legally tracked to encourage travel and event attendance?


Principles necessary for using sensitive health data include transparency, limiting the
purpose and amount of data gathered, collecting only for the reason speci
f
ied, and secure
storage


Companies also need to ensure people are not discriminated against or treated unfairly
based on health status and that data is stopped from use after the pandemic ceases.


Even though regulations are unfolding when needed "The general rule from a privacy
perspective is that the extent you can do something with less information, that's usually
better" - Jennifer Geetter, partner of law (Law 360, 2021)
VACCINE PASSPORTS
Workplace surveillance is on the rise especially with more remote working


Technical innovations and ef
f
icacy encourage the gathering, processing, and storage of more data


Emerging issues include power dynamics of surveillance at work, use and ownership of data, pressure from the
workplace, and human resource practices


Software is used for facial recognition technology, mouse-tracking, keystrokes, websites visited, and hours worked,
and even recognising if you are concentrating or not


What once was used for security or regulation monitoring has now moved to monitoring productivity


Surveillance cannot solve the problem of employees being more productive, only strong and effective leadership can
IN THE WORKPLACE
Silicon Republic, 2021
Schools and universities are uncritically relying more on teaching and learning online, with
some universities using compulsory, privately-owned companies that do not have to be
transparent about the data and information they are gathering from their users


Students using these systems often have their gathered data used to develop and improve
ed tech, without negotiations from students, parents, or the faculty


Monitoring is not bene
f
icial for a learning environment; stresses students out when taking
exams; disproportionally effects women, people of colour, non-binary and trans people;
and encourages surveillance technology in education.
STUDENTS
The Nation, 2021
70% of Australian teenagers use Facebook and 75% use Instagram (also owned by Facebook)


Facebook misuses personal data collected from young users targeting or creating mental health and
advertising vulnerabilities


Reset (2021) found pro
f
iles can be created for young people who have harmful or risky interests at a low
cost to advertisers e.g., reaching 1000 13-17 year olds interested in gambling (at a cost of $11.24), smoking
cigarettes ($138.50) and vaping ($210.97), alcohol ($3.03), extreme weight loss ($38.46), 18+ publications
($102.88), and online dating ($55.56)


Facebook restricts advertising alcohol, but allows targeting of people who are interested in alcohol


77.8% of 16 and 17 year olds were concerned about how much data Facebook collects about them with
65.2% disapproving of commercial advertising pro
f
iling


Sixty-
f
ive percent of parents are also uncomfortable with targeting children and tracking online
OUR CHILDREN
Au.Reset.Tech
Exploitative technologies have proliferated due to lack of collective understanding about
how platforms work and how they impact us. Unintended consequences take the form of
mental health, democracy, and discrimination issues.


Those of us who rely on these platforms are unknowingly complicit in a devil’s bargain,
where we trade our freedom for followers, our social cohesion for instant connection, and the
truth for what we want to hear (Exposure Labs)


Pause, Consider, Decide to ensure lifelong, healthy digital habits are created and
maintained
DIGITAL LITERACY
Understanding


Data Security


Privacy


Persuasive Design


Mis/Disinformation
DIGITAL LITERACY
The Digital Equilibrium
Approach:


Aims to identify, manage,
and improve imbalance,
stressors, reactive, addictive,
or unconscious behaviours.


Improving balance with
intention.


DigitalEquilibrium.com
Principles to restore Big Tech trust include CEOs acting
f
irst and talking later


Responsible AI, automation, and up-skilling


Shared prosperity - new jobs and skills


Codifying trust - fair and explainable aspects


Increased diversity, equity, and inclusion


humanetech.com (US)


humanetechnology.com.au (AU)
HUMANE TECH
Axios, 2021
Understand and Learn more about your Technology


Check your Settings (regularly)


Do you need the App? - Can you use it on your computer instead?


Use Brave, DuckDuckGo, Vivaldi, or other search engines


Use Signal over WhatsApp and Messenger


Use a VPN (get 30 days free with my referral: tinyurl.com/4r226z7w)
TIPS
Control what you can


Be aware and informed


Technology is not evil - or the solution to all our
problems - it is a tool


Understand and be more aware of your behaviours


Is convenience worth trading in our privacy?
SUMMARY
The New Yorker
Video will be on YouTube


Slides will be on SlideShare




@leighchantelle
THANK YOU
epicentreequilibrium.com // digitalequilibrium.com // leigh-chantelle.com // vivalavegan.net

Contenu connexe

Tendances

Socialmedia 13037247110121-phpapp01
Socialmedia 13037247110121-phpapp01Socialmedia 13037247110121-phpapp01
Socialmedia 13037247110121-phpapp01
Peter Smirnov
 
Lasa cyp social media
Lasa cyp social mediaLasa cyp social media
Lasa cyp social media
Miles Maier
 
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITYPresentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY
gailmowal
 
Technology creates social isolation and neurosis
Technology creates social isolation and neurosisTechnology creates social isolation and neurosis
Technology creates social isolation and neurosis
200162894
 
2011 social media adolhxreport
2011 social media adolhxreport2011 social media adolhxreport
2011 social media adolhxreport
Dustianne North
 

Tendances (20)

Socialmedia 13037247110121-phpapp01
Socialmedia 13037247110121-phpapp01Socialmedia 13037247110121-phpapp01
Socialmedia 13037247110121-phpapp01
 
Dwe m1 digital wellbeing - introduction
Dwe m1   digital wellbeing - introduction  Dwe m1   digital wellbeing - introduction
Dwe m1 digital wellbeing - introduction
 
Social media and young people's mental health and wellbeing
Social media and young people's mental health and wellbeingSocial media and young people's mental health and wellbeing
Social media and young people's mental health and wellbeing
 
Lasa cyp social media
Lasa cyp social mediaLasa cyp social media
Lasa cyp social media
 
Social media
Social mediaSocial media
Social media
 
Social Media: Kids & Teens
Social Media: Kids & TeensSocial Media: Kids & Teens
Social Media: Kids & Teens
 
Pillars of the Digital Age [v4] #AXASocial
Pillars of the Digital Age [v4] #AXASocialPillars of the Digital Age [v4] #AXASocial
Pillars of the Digital Age [v4] #AXASocial
 
EFFECT OF SOCIAL MEDIA ON US
EFFECT OF SOCIAL MEDIA ON USEFFECT OF SOCIAL MEDIA ON US
EFFECT OF SOCIAL MEDIA ON US
 
ICT Trends WorldWide
ICT Trends WorldWide ICT Trends WorldWide
ICT Trends WorldWide
 
Research proposal :-“THE IMPACT OF WHATSAPP ON YOUTH IN BHAVNAGAR CITY”
Research proposal :-“THE IMPACT OF WHATSAPP ON YOUTH IN BHAVNAGAR CITY” Research proposal :-“THE IMPACT OF WHATSAPP ON YOUTH IN BHAVNAGAR CITY”
Research proposal :-“THE IMPACT OF WHATSAPP ON YOUTH IN BHAVNAGAR CITY”
 
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITYPresentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY
 
Connect To Survive - The Digital Divide
Connect To Survive  - The Digital DivideConnect To Survive  - The Digital Divide
Connect To Survive - The Digital Divide
 
IMPACT OF COMPUTING ON HUMANITY (IN EVERY ASPECT: DOMESTIC, SOCIAL AND PROFES...
IMPACT OF COMPUTING ON HUMANITY (IN EVERY ASPECT: DOMESTIC, SOCIAL AND PROFES...IMPACT OF COMPUTING ON HUMANITY (IN EVERY ASPECT: DOMESTIC, SOCIAL AND PROFES...
IMPACT OF COMPUTING ON HUMANITY (IN EVERY ASPECT: DOMESTIC, SOCIAL AND PROFES...
 
Yizhi Wang-social media effect final
Yizhi Wang-social media effect finalYizhi Wang-social media effect final
Yizhi Wang-social media effect final
 
Technology creates social isolation and neurosis
Technology creates social isolation and neurosisTechnology creates social isolation and neurosis
Technology creates social isolation and neurosis
 
James Katz en MoRe
James Katz en MoReJames Katz en MoRe
James Katz en MoRe
 
2011 social media adolhxreport
2011 social media adolhxreport2011 social media adolhxreport
2011 social media adolhxreport
 
Teens and Social Media: An Overview
Teens and Social Media: An OverviewTeens and Social Media: An Overview
Teens and Social Media: An Overview
 
Raising Kids in a Digital World 2016
Raising Kids in a Digital World 2016Raising Kids in a Digital World 2016
Raising Kids in a Digital World 2016
 
Children and future internet
Children and future internetChildren and future internet
Children and future internet
 

Similaire à How your data can be used against you #DataScienceWeek presentation by Leigh-Chantelle

It consumerisation presentation
It  consumerisation presentationIt  consumerisation presentation
It consumerisation presentation
revaathey
 
It consumerisation presentation
It  consumerisation presentationIt  consumerisation presentation
It consumerisation presentation
revaathey
 
A BRIEF SURVEY OF MOBILE FORENSICS ANALYSIS ON SOCIAL NETWORKING APPLICATION
A BRIEF SURVEY OF MOBILE FORENSICS ANALYSIS ON SOCIAL NETWORKING APPLICATIONA BRIEF SURVEY OF MOBILE FORENSICS ANALYSIS ON SOCIAL NETWORKING APPLICATION
A BRIEF SURVEY OF MOBILE FORENSICS ANALYSIS ON SOCIAL NETWORKING APPLICATION
Nana Kwame(Emeritus) Gyamfi
 
Smartphones
SmartphonesSmartphones
Smartphones
D DADa
 
Article on Mobile Security
Article on Mobile SecurityArticle on Mobile Security
Article on Mobile Security
Tharaka Mahadewa
 
ConsumerPrivacy-BEAR-2015-Final (1)
ConsumerPrivacy-BEAR-2015-Final (1)ConsumerPrivacy-BEAR-2015-Final (1)
ConsumerPrivacy-BEAR-2015-Final (1)
Zohra Razaq
 
Mobile today-tomorrow-201006-aberla
Mobile today-tomorrow-201006-aberlaMobile today-tomorrow-201006-aberla
Mobile today-tomorrow-201006-aberla
Netcetera
 
Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014
Joseph White MPA CPM
 

Similaire à How your data can be used against you #DataScienceWeek presentation by Leigh-Chantelle (20)

Getting a clue: uncovering the truth about your data with mobile forensics
Getting a clue: uncovering the truth about your data with mobile forensicsGetting a clue: uncovering the truth about your data with mobile forensics
Getting a clue: uncovering the truth about your data with mobile forensics
 
It consumerisation presentation
It  consumerisation presentationIt  consumerisation presentation
It consumerisation presentation
 
It consumerisation presentation
It  consumerisation presentationIt  consumerisation presentation
It consumerisation presentation
 
Getting users to trust your Mobile Apps and Mobile Web sites
Getting users to trust your Mobile Apps and Mobile Web sitesGetting users to trust your Mobile Apps and Mobile Web sites
Getting users to trust your Mobile Apps and Mobile Web sites
 
Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy  Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy
 
Future of privacy - An initial perspective - Stephen Deadman, Vodafone
Future of privacy - An initial perspective - Stephen Deadman, VodafoneFuture of privacy - An initial perspective - Stephen Deadman, Vodafone
Future of privacy - An initial perspective - Stephen Deadman, Vodafone
 
Article 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking technoArticle 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking techno
 
Fife College, French Toast Mafia, Apps for Good Presentation
Fife College, French Toast Mafia, Apps for Good PresentationFife College, French Toast Mafia, Apps for Good Presentation
Fife College, French Toast Mafia, Apps for Good Presentation
 
A BRIEF SURVEY OF MOBILE FORENSICS ANALYSIS ON SOCIAL NETWORKING APPLICATION
A BRIEF SURVEY OF MOBILE FORENSICS ANALYSIS ON SOCIAL NETWORKING APPLICATIONA BRIEF SURVEY OF MOBILE FORENSICS ANALYSIS ON SOCIAL NETWORKING APPLICATION
A BRIEF SURVEY OF MOBILE FORENSICS ANALYSIS ON SOCIAL NETWORKING APPLICATION
 
Digital Footprint in our world
Digital Footprint in our worldDigital Footprint in our world
Digital Footprint in our world
 
Digital footprint@wse march13
Digital footprint@wse march13Digital footprint@wse march13
Digital footprint@wse march13
 
Smartphones
SmartphonesSmartphones
Smartphones
 
Article on Mobile Security
Article on Mobile SecurityArticle on Mobile Security
Article on Mobile Security
 
ConsumerPrivacy-BEAR-2015-Final (1)
ConsumerPrivacy-BEAR-2015-Final (1)ConsumerPrivacy-BEAR-2015-Final (1)
ConsumerPrivacy-BEAR-2015-Final (1)
 
The Big Learn - Mobile Basics
The Big Learn - Mobile BasicsThe Big Learn - Mobile Basics
The Big Learn - Mobile Basics
 
Mobile today-tomorrow-201006-aberla
Mobile today-tomorrow-201006-aberlaMobile today-tomorrow-201006-aberla
Mobile today-tomorrow-201006-aberla
 
Mega-trends
Mega-trendsMega-trends
Mega-trends
 
Megatrends
MegatrendsMegatrends
Megatrends
 
Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014
 
Mobile security article
Mobile security articleMobile security article
Mobile security article
 

Plus de Leigh-Chantelle

Plus de Leigh-Chantelle (6)

Leigh-Chantelle's Modelling Digital Wellness class for the Shine From Within...
 Leigh-Chantelle's Modelling Digital Wellness class for the Shine From Within... Leigh-Chantelle's Modelling Digital Wellness class for the Shine From Within...
Leigh-Chantelle's Modelling Digital Wellness class for the Shine From Within...
 
An Overview of Being Vegan in 2021 by Leigh-Chantelle
An Overview of Being Vegan in 2021 by Leigh-ChantelleAn Overview of Being Vegan in 2021 by Leigh-Chantelle
An Overview of Being Vegan in 2021 by Leigh-Chantelle
 
Leigh-Chantelle's OCURA2020 Presentation on Preschoolers and their Engagement...
Leigh-Chantelle's OCURA2020 Presentation on Preschoolers and their Engagement...Leigh-Chantelle's OCURA2020 Presentation on Preschoolers and their Engagement...
Leigh-Chantelle's OCURA2020 Presentation on Preschoolers and their Engagement...
 
Tips for Social Media, Online Etiquette & Taking Time Out
Tips for Social Media, Online Etiquette & Taking Time OutTips for Social Media, Online Etiquette & Taking Time Out
Tips for Social Media, Online Etiquette & Taking Time Out
 
Marketing Yourself and Veganism Online by Leigh-Chantelle at Animal Activists...
Marketing Yourself and Veganism Online by Leigh-Chantelle at Animal Activists...Marketing Yourself and Veganism Online by Leigh-Chantelle at Animal Activists...
Marketing Yourself and Veganism Online by Leigh-Chantelle at Animal Activists...
 
Ethics Beyond the Plate presentation by Leigh-Chantelle at Bali Vegan Festival
Ethics Beyond the Plate presentation by Leigh-Chantelle at Bali Vegan FestivalEthics Beyond the Plate presentation by Leigh-Chantelle at Bali Vegan Festival
Ethics Beyond the Plate presentation by Leigh-Chantelle at Bali Vegan Festival
 

Dernier

Dernier (20)

MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 

How your data can be used against you #DataScienceWeek presentation by Leigh-Chantelle

  • 1. 11 MAY 2021 #DATASCIENCEWEEK Leigh-Chantelle HOW YOUR DATA CAN BE USED AGAINST YOU
  • 2. The Internet continuously changes and evolves - it’s different that what it once was when you joined Anonymity is important and essential for a free and open internet Our online footprints are more visible and more permanent COVID-19 has turbocharged digital adoption for contract tracing and movement control apps and using Arti f icial Intelligence (AI) for decision making New technologies are yet to show the full extend of their risks, limitations, and consequences of tracking citizens, students, and workers; and having shortsighted data privacy policies Australia is the only developed country without a digital rights bill TECHNOLOGY
  • 3. Always-on cultured tethered to digital devices With work from home and online learning the norm, more scrutiny is needed for our practices and the technology we rely on COVID encouraged technology companies, businesses, and governments to roll out technology without understanding or anticipating risks for privacy and safety Tech companies have been designed to collect information about you to sell it to advertisers - your data is bundled together to create your digital pro f ile and sold to the highest bidder The more data collected on you, the more risk to your privacy TECHNOLOGY USE
  • 4. People in power come up with bad technology and have the resources to roll these out and market to consumers Techno-solutionism: The way we accept technology solutions as easy and quick ways to solve real- world and complex issues - it is NOT magic Complex issues need deep understanding and true debate to come up with complex and real solutions Technology solutions often harm the vulnerable people they are meant to protect e.g., app to verify consent before adults engage in sex; Robodebt TECHNO-SOLUTIONISM
  • 5. Trust in technology fell all around the world in 2020 (70 out of 100) Popularity in technology has helped protect the industry from critics and regulators, but this is declining Social media companies trust score is 46 - below other business categories The increasing dif f icult relationship between technology and the public is blamed for the fall of trust e.g., misinformation, bias in AI, and privacy issues CEOs are encouraged to “act f irst, talk later” TRUST IN TECHNOLOGY Axios, 2021
  • 6. Dropbox: Almost 70M customers a ff ected in 2012, emails and passwords Facebook: 500M+ breached accounts (20% of FB subscribers) in April 2021. Associating phone numbers to identities. Also names and genders, with a lot of data including DOB, location, relationship status, and employer. Kickstarter: Almost 5.2M members February 2013, email, usernames, and passwords LinkedIn: 500M pro f iles April 2021 including full names, email, phone number, workplace information and more NurseryCam: 10+ thousand accounts February 2021 exposed with email addresses Oxfam Australia: 11.8 million accounts in March 2021, names, phone numbers, addresses, gender and DOB. Small number of people had partial credit card data exposed, some had bank name, account number, and BSB exposed. Patreon: 2.3M+ records October 2015, emails, payment history, addresses, private messages, and website activity ProctorU: 400+ thousand user June 2020, email, names, passwords, phone numbers, addresses, usernames Snapchat: 4.6M in January 2014 (one week after vulnerabilities were detailed) including usernames and phone numbers, and locations exposed DATA HACKED & SHARED haveibeenpwned.com
  • 7. Apps and websites can access: Phone and email contacts Call logs Passwords Internet and Calendar data Device location data and frequented locations Unique device ID Data on how you use an app Age, interests, purchasing habits, health, social This information is collected and most likely shared with other companies - usually disclosed in a privacy policy YOUR DIGITAL PROFILE
  • 8. Social media platforms are being called out for their bad practices such as f lawed content moderation, rampant tracking, algorithmic bias, harmful recommendations, limited political ad transparency, tax evasion, sexual harassment charges and more with disinformation and hate speech accelerated by algorithmic recommendations (Mozilla, 2020). Pro f iting off vulnerabilities of users is not a glitch in the social media system, it’s central to how their business model works By interacting on any social media platform, the information gathered about you is used to target you with advertisements you will click on - for adults, young people, those susceptible to advertising The longer you are engaging with content on a social media platform, the more highly-personalised advertising can be sold, based on detailed pro f iles on all users, including highly-sensitive information Social media is not regulated (unlike radio and television) and dif f icult to track We are the product when our data is bought and sold without out knowledge or agreement SOCIAL MEDIA
  • 9. As global dependency on big tech grew with the pandemic and lockdowns, the big 7 technology companies (Apple, Microsoft, Amazon, Alphabet/Google, Facebook, along with China’s Tencent/WeChat and Alibaba) increased their power and pro f its (PwC, 2020) Companies are racing to collect as much personal data as possible, thinking in terms of money, ease of use, and immediacy instead of the consequences of exposure and targets for attack More privacy by design is required than f ixing up privacy issues after the event TECHNOLOGY USE & POWER
  • 10. OUR IPHONES Orange (microphone) and Green (camera) dots provide a visual indication on iPhone or iPads when apps are using (iOS 14 update in Sept 2020) Camera includes BOTH camera and microphone access - both colours will not show at once Go to Control Centre to check what app is using your camera or microphone Update your access in the Privacy section of your Settings Facebook is NOT listening to your conversations - you are predictable due to your online digital trail HowToGeek.com
  • 11. AppTrackingTransparency/Apple’s Cross-Track opt-out Stop apps from tracking your activity for advertising using a prompt Settings > Privacy > Tracking > Allow Apps to Request to Track OFF (manually only used by 3% of American iOS users in the past) 55% of people say they would not allow Facebook to track them on other apps if prompted (TapResearch, 2021) 98% of Facebook’s revenue comes from advertising - ATT could result in a 7% loss to revenue (Mobile Dev Memo, 2021) Only 13% worldwide & 4% of Americans are opting-in (Flurry, May 8 2021) OUR PHONES: IOS 14.5 UPDATE
  • 12. Normalising surveillance technologies (e.g., spyware for partners and tools for monitoring children, students, and workers) increases abuse for vulnerable people and encourages control (Citizen Lab, 2019) Smart devices and IOT devices collect and share a LOT of data Our desire for so-called security is its own security threat - Andrew G Ferguson, law professor SECURITY
  • 13. Mozilla.org have created a *Privacy Not Included guide for apps and products that do not meet their minimum security standards (encryption, automatic security updates, strong passwords, vulnerability management, and privacy practices), shares and sells data, does not allow deletion of data, readability of privacy information, and a poor track record of data protection Smart home, home of f ice, toys and games, pets, entertainment, wearables, dating apps, and sex toys Some of the worst: Amazon Ring products, most dating apps - especially Facebook Dating and Match Group (Tinder, Grindr, Hinge etc), Roku, Schlage, Xiaomi Some of the best: Apple, Eufy, Garmin, iRobot, and Lex dating app *PRIVACY NOT INCLUDED foundation.mozilla.org/privacynotincluded
  • 14. Dating apps are not immune to security and privacy issues Aspects shared include location, sexual orientation, HIV data, political leanings, date of birth, religion The worst: Facebook Dating and Match Group (45 dating apps including Tinder, Grindr, Hinge, OKCupid, Match) Match Group privacy policy states that you allow them to share your personal information with other Match Group sites for non-commercial purposes When you connect social media accounts (Instagram or Facebook) both the original app and the linked app collect more information TOGETHER - do not link your dating apps Researchers point out that algorithms (particularly for Tinder) have prejudice designed into it based on race, gender, ethnicity, or age The better ones: eHarmony, Happn, Lex OUR RELATIONSHIPS ONLINE
  • 15. Technology can be misused, especially for family violence, with double the risk for Indigenous women Technology-facilitated abuse is gendered: 96% male perpetrators, 93% female victims Tracking apps on phones are increasingly used for abusive partners to keep track of women and children keeping them constantly fearful and anxious Ex-partners can also constantly text or use social media to send threats - especially anonymous accounts GPS tracking increased by 244.8%, camera use increased by 183.2%, and children used as a monitor for their mother increased by 346.6% since 2015 (WESNET, 2020) Check for door locks, tracing and monitoring devices, smart device assess, and stalking tools on phones and other digital devices, kill switches on cars See techsafety.org.au/resources/resources-women OUR PAST RELATIONSHIPS ABC.net.au
  • 16. More data collected from the government without consent for sharing leads to more errors, which will only worsen with the volume and speed of sharing this data. The people most at risk are the people who access government services more than the average Australia, marginalised groups (e.g., First Nations, disabled, elderly, and young people). New laws could encourage the government to share any and all personal data without the public knowing or consenting. Concerns include weak consent requirements, lack of privacy safeguards, and bypass of existing privacy laws (including the current Privacy Act), f inding a discrepancy between public statements from the government and the legislation, and a scheme reliant on “good intent” rather than safeguards and real protections (InnovationAus, 2021). OUR GOVERNMENT
  • 17. Robotdebt compared private data held by Centrelink against ATO averaged income data and generated fake debt notices for vulnerable people even after f inding out it was illegal. This cost $2 billion (was meant to raise $3B), 300 000 people were effected causing homelessness, immense trauma, stress, anxiety, mental illness, debt, and deaths “The government is once again getting away with being shysters, while making the little people feel like it is they that did wrong,” quote by Fiona Forsyth from one of the victims she is representing Centrelink disclosed a woman’s new address to her former partner who had a DVO out against him The government demands to be trusted without f irst demonstrating to be trustworthy, and in fact demonstrating the opposite. - Justin Warren, Electronic Frontiers Australia OUR GOVERNMENT FAILS
  • 18. The Online Safety Bill: “to keep Australians safe online”. Would increase the eSafety commissioner’s power by removing online abuse, force app stores and services to remove app/website access, enforce veri f ication systems (e.g., face scan before looking at age-restricted material) The Data Availability and Transparency Bill: Making it easier for the government to share data with others to improve government services. More data than necessary is being collected and could be used for more than its stated aims (e.g., NDIS enforcement) Privacy Act review: Review of a 30-year-old act. Focusing on reviewing personal information de f inition, exceptions, legal rami f ications of serious invasions of privacy, noti f ication of people who have had their data breached. Europe’s General Data Protection Regulation (GDPR) privacy reform is a great aim. This needs to come before the Data Availability and Transparency Bill Surveillance Legislation Amendment (Identify and Disrupt) Bill: Amplify police powers by creating intrusive warrants without judge signatures. The federal police and Australian Criminal Intelligence Commission (ACIC) will gain three types warrants to be able to modify, add, delete, or copy data; access networks and devices; and take over online accounts to investigate Digital Identity Legislation: Centralising how Australians prove their identity online. Using one login on various sites (e.g., Facebook and Google) including facial recognition software. OUR GOVERNMENT: DIGITAL REFORMS crikey.com.au
  • 19. South Australian government redirected web users looking at press releases or for COVID information to a data- harvesting platform, NationBuilder Claimed that the redirections were accidental, no one knew about it, and no data was collected - privacy watchdog concluded it was probable the government did not know this was happening NationBuilder is a data harvesting company and campaign tool used for collecting data for political campaigns including Trump, both sides of Brexit, and Labour NZ Data collected includes name, job, employer, social media accounts, computer details, and internet connection - all this information is added to an individual pro f ile Political companies are exempt from the Privacy Act therefore are free to collect your personal information and data OUR GOVERNMENT & DATA HARVESTING ABC.net.au
  • 20. The pandemic has provided excuses for companies and governments to use more surveillance tactics under the guise of public health and safety. Responses to the pandemic allowed for more surveillance and censorship, including how and when people are tracked, and restrictions of online speech in more than 20 countries (Freedom House, 2020) Intensi f ication and expansion of police power during COVID emergencies resulted in expansion of laws, reduction of scrutiny, an authoritarianism risk, with some policing practices supersede or undermine public health goals. COVID policing allows intensi f ication of selective criminalisation processes, with a disproportionate focus on First Nations peoples in street policing (45% stops in NSW), and policing of radicalised and socio-economically disadvantaged communities in public housing. GOVERNMENT SURVEILLANCE Boon-Kuo, et al., 2020
  • 21. Substandard technology from the federal government with data privacy issues, technical f laws, security issues, human rights implications, normalisation of surveillance, and a waste of taxpayer money (Digital Rights Watch, 2021) Tens of millions of dollars spent ($3.8M on development, $6M on other works including the app, and an additional $64M on advertising), going to companies involved with the Liberal party Not ONE person from the app found that contract tracing has not already detected There are many issues with the COVIDSafe app including effectiveness, privacy, and accessibility, and a major issue that people need to be close to each other for 15 minutes to register as a close contact (9News, 2021) AUSTRALIA’S COVIDSAFE APP
  • 22. Can vaccinations be ethically and legally tracked to encourage travel and event attendance? Principles necessary for using sensitive health data include transparency, limiting the purpose and amount of data gathered, collecting only for the reason speci f ied, and secure storage Companies also need to ensure people are not discriminated against or treated unfairly based on health status and that data is stopped from use after the pandemic ceases. Even though regulations are unfolding when needed "The general rule from a privacy perspective is that the extent you can do something with less information, that's usually better" - Jennifer Geetter, partner of law (Law 360, 2021) VACCINE PASSPORTS
  • 23. Workplace surveillance is on the rise especially with more remote working Technical innovations and ef f icacy encourage the gathering, processing, and storage of more data Emerging issues include power dynamics of surveillance at work, use and ownership of data, pressure from the workplace, and human resource practices Software is used for facial recognition technology, mouse-tracking, keystrokes, websites visited, and hours worked, and even recognising if you are concentrating or not What once was used for security or regulation monitoring has now moved to monitoring productivity Surveillance cannot solve the problem of employees being more productive, only strong and effective leadership can IN THE WORKPLACE Silicon Republic, 2021
  • 24. Schools and universities are uncritically relying more on teaching and learning online, with some universities using compulsory, privately-owned companies that do not have to be transparent about the data and information they are gathering from their users Students using these systems often have their gathered data used to develop and improve ed tech, without negotiations from students, parents, or the faculty Monitoring is not bene f icial for a learning environment; stresses students out when taking exams; disproportionally effects women, people of colour, non-binary and trans people; and encourages surveillance technology in education. STUDENTS The Nation, 2021
  • 25. 70% of Australian teenagers use Facebook and 75% use Instagram (also owned by Facebook) Facebook misuses personal data collected from young users targeting or creating mental health and advertising vulnerabilities Reset (2021) found pro f iles can be created for young people who have harmful or risky interests at a low cost to advertisers e.g., reaching 1000 13-17 year olds interested in gambling (at a cost of $11.24), smoking cigarettes ($138.50) and vaping ($210.97), alcohol ($3.03), extreme weight loss ($38.46), 18+ publications ($102.88), and online dating ($55.56) Facebook restricts advertising alcohol, but allows targeting of people who are interested in alcohol 77.8% of 16 and 17 year olds were concerned about how much data Facebook collects about them with 65.2% disapproving of commercial advertising pro f iling Sixty- f ive percent of parents are also uncomfortable with targeting children and tracking online OUR CHILDREN Au.Reset.Tech
  • 26. Exploitative technologies have proliferated due to lack of collective understanding about how platforms work and how they impact us. Unintended consequences take the form of mental health, democracy, and discrimination issues. Those of us who rely on these platforms are unknowingly complicit in a devil’s bargain, where we trade our freedom for followers, our social cohesion for instant connection, and the truth for what we want to hear (Exposure Labs) Pause, Consider, Decide to ensure lifelong, healthy digital habits are created and maintained DIGITAL LITERACY
  • 27. Understanding Data Security Privacy Persuasive Design Mis/Disinformation DIGITAL LITERACY The Digital Equilibrium Approach: Aims to identify, manage, and improve imbalance, stressors, reactive, addictive, or unconscious behaviours. Improving balance with intention. DigitalEquilibrium.com
  • 28. Principles to restore Big Tech trust include CEOs acting f irst and talking later Responsible AI, automation, and up-skilling Shared prosperity - new jobs and skills Codifying trust - fair and explainable aspects Increased diversity, equity, and inclusion humanetech.com (US) humanetechnology.com.au (AU) HUMANE TECH Axios, 2021
  • 29. Understand and Learn more about your Technology Check your Settings (regularly) Do you need the App? - Can you use it on your computer instead? Use Brave, DuckDuckGo, Vivaldi, or other search engines Use Signal over WhatsApp and Messenger Use a VPN (get 30 days free with my referral: tinyurl.com/4r226z7w) TIPS
  • 30. Control what you can Be aware and informed Technology is not evil - or the solution to all our problems - it is a tool Understand and be more aware of your behaviours Is convenience worth trading in our privacy? SUMMARY The New Yorker
  • 31. Video will be on YouTube Slides will be on SlideShare @leighchantelle THANK YOU epicentreequilibrium.com // digitalequilibrium.com // leigh-chantelle.com // vivalavegan.net