SlideShare a Scribd company logo
1 of 24
Download to read offline
THE
DECLINE
OF ONLINE
PRIVACYPhoto: View of Airport (Boskampi, 2017)
By: Jessica Cheng
Internet privacy has been on the
decline for individuals due to a
shift away from net neutrality,
leaving users susceptible to:
•	 Excessive technological reliance
•	 Constant online archiving
•	 Pervasive monitoring
Photo: Lanyard with Media Passcard (Kaboompics, 2017)
Photo: Macbook and Ipad on Desk (Pixabay, 2016)
Netizens have never been more vulnerable to
security risks because of the transition to an
‘Internet of Things’ (The Economist, 2014).
Advances in hacking have overcome
previous conventions of protection such as
passwords. Netizens are more connected
than ever.
EXCESSIVE TECHNOLOGICAL RELIANCE
Photo: People Coffee Meeting Team (Bailey, 2014)
Wi-fi has become a mainstay
in public spaces.
When utilizing an unsecure open network, a hacker can easily
work in between the user and the hotspot, or even distribute
malware (KasperSky, 2017).
Are you taking extra precautions to protect
personal data such as banking information and
important e-mails to prevent data leaking?
Photo: White Switch Hub Turned On (Martinelle, 2016)
By the end of this
decade there could be
some 50 billion things
with web connections
- Cisco (The Economist, 2014)
Photo: Interior of Modern Kitchen (Kaboompics, 2017)
Our society has become linked
to an internet of things as
electronic devices can connect
to the internet, communicate,
share, and upload information
instantaneously (Office of the Privacy
Commissioner of Canada [OPC], 2016).
With increasing access points
of information, users are more
vulnerable to being hacked
(The Economist, 2014).
Photo: Abus Brand Close Up Closed (Pixabay, 2016)
(Alt, 2014, p.1).
of internet users have had an email or
social media account hacked or taken
over by someone else without their
permission [...]
believe that current laws are not good enough
in protecting the rights of internet users
Photo: Beach Water Steps Sand (Calvo, 2017)
Everyone on the web has a digital footprint that will
never disappear. Google searches and social media
are becoming tools of investigation used by future
recruiters to screen potential candidates.
In this day and age, does
privacy truly exist?
CONSTANT ONLINE ARCHIVING
Photo: White and Brown Archipelago Map with Colored Head Beads (Unsplash, 2016)
The crumbs of data
we leave behind as we
flit from link to link
- Nicholas Carr
(Matrix, 2017)
Users are leaving
digital footprints by
sharing and archiving
their lives. Through
constant documentation
onto the web, users
become obsessed
and conditioned to
interrupted experiences
because of technology
(Turkle, 2013).
Photo: Mirror Showing Group of People during Daytime (Unsplash, 2016)
Photo: Adult Audience Celebration Cheering (Kubassek, 2017)
Social media use can act
as a double edged sword
(Singer, 2013, p.1).
With modern technology, potential candidacy can be
jeopardized due to their online image. With a single type
search, past and present information may be revealed
regarding an individual.
Photo: Woman in Black Shirt Facing Mirror (Obolensky, 2016)
As the lack of privacy and permanency on the web
becomes more evident, users need to become more
vigilant of what they post to avoid an unwanted
personal image (Rosen, 2010).
Photo: Adult Blurr Boss Business (Energepic, 2016)
According to a study conducted
by Microsoft, 75% of US
recruiters report conducting an
online research about candidates
through search engines and
social networking sites
(Rosen, 2010, p.1).
Photo: Elegant Workspace with Macbook, iPhone, Business cards and Notebook (Kaboompics, 2017)
With this knowledge,
individuals are responding
to privacy concerns in
the employment process
by polishing their
online profiles to make
themselves more appealing
(Bowness, 2013).
Photo: White Printer Paper (Unsplash, 2016)
The ease of use and accessibility of the web obscures
its actual cost. Personal privacy is a deception created by
social media companies as every ad seen by the individual
is monitored closely (Santa Clara University, 2013).
Does social media influence
your daily lifestyle and
personal decisions?
PERVASIVE MONITORING
Photo: Women using Smartphone while Fronting a Macbook Pro and Black Ipad (Picjumbo, 2016)
Pervasive monitoring
involves keeping
track of the sites
visited, number of
clicks, and recording
of which ads worked
best for an individual
(Van Grove, 2013).
Web users are constantly
monitored with cookies. Cookies
track when a site is first visited
and continues to keep records of
a user’s patterns
(Singh & Kumar, 2016).
Photo: Building Pattern Wall Architecture (Pixabay, 2017)
Photo: Hands Apple Computer iMac (Kayda, 2016)
Information is also collected by
advertising companies through
buying an individual’s profile
and purchasing patterns from
social media sites(Manjoo, 2013).
Photo: City Marketing Lights Night (Unsplash, 2017)
Consumers lose their privacy
as their every move is
followed, and are susceptible
to external influences because
of the tailored ads(Oetting, 2016).
Privacy on the internet has an evident
gap in protection policies because
although finances are protected, browsing
information is not (Fiegerman & Larson, 2017).
With the development of the digital age,
there is increasing challenges to legislative
frameworks as personal security is at risk
when there is potential for seamless cyber
surveillance (OPC, 2016).
Photo: Couple Standing in the Street beside the Building while Looking Up (Unsplash, 2016)
Consumers are becoming more
connected to online networking
and the web which imposes a shift
away from neutrality (OPC, 2016).
Internet infrastructure is complexly
growing which raises caution for
users
(Finamore, Mellia, Meo, Munafo, & Rossi, 2011).
Photo: Staircase by a Yellow Wall (Kaboompics, 2017)
Photo: Interior of Office Building (Manuel, 2017)
In modern society,
internet privacy is declining due to the
increasing reliance on technology, the
permanency of the digital web, and
constant monitoring. Ultimately, without
adequate privacy protection policies, the
future of online confidentiality is dire.
CONCLUSION
REFERENCE LIST
Alt, K. (2014, September 04). 11 Online privacy statistics you may not know. AsecureLife. Retrieved from http://www.asecurelife.com/internet-privacy-statistics/
Bowness, S. (2013, January 11). Making the most of social media. The Globe and Mail. Retrieved from https://search-proquest-com.proxy.queensu.ca/			
	docview/1811305776?accountid=6180
Fiegerman, S. & Larson, S. (2017, April 05). The uncertain future of internet privacy. CNN Tech. Retrieved from http://money.cnn.com/2017/04/05/technology/		
	internet-privacy-future/
Finamore, A., Mellia, M., Meo, M., Munafo, M., & Rossi, D. (2011). Experiences of internet traffic monitoring with Tstat. IEEE Network, 25, 8-14. doi:10.1109/			
	 MNET.2011.5772055
KasperSky (2017, May 15). How to avoid public WiFi security risks. Kaspersky Lab. Retrieved from https://usa.kaspersky.com/resource-center/preemptive-safety/		
	 public-wifi-risks
Oetting, J. (2016, April 09). Emotional advertising: how brands use feelings to get people to buy. Retrieved from https://blog.hubspot.com/marketing/emo			
	tions-in-advertising-examples#sm.0000is7clupxdd34t5u29ybg9kz9t
Office of the Privacy Commissioner of Canada (2016, February). The internet of things an introduction to privacy issues with a focus on the retail and home envi		
	 ronments. Retrieved from https://www.priv.gc.ca/media/1808/iot_201602_e.pdf
Manjoo, F. (2013, March 20). Facebook followed you to the supermarket. Slate. Retrieved from http://www.trutv.com/shows/adam-ruins-everything/blog/ad		
	ams-sources/adam-ruins-the-internet.html
Matrix, S. (2017, May 08). Module 02 Lecture 02 Online friends Video. Retrieved from https://onq.queensu.ca/d2l/le/content/117252/viewContent/936374/View
Rosen, J. (2010, July 21). The web means the end of forgetting. The New York Times. Retrieved from http://www.nytimes.com/2010/07/25/magazine/25priva		
	cy-t2.html?pagewanted=all
Santa Clara University. (2013, February 04). Loss of online privacy: what’s the harm?. Retrieved from https://www.scu.edu/ethics/privacy/loss-of-online-privacy-		
	whats-the-harm/
Singer, N. (2013, November 11). In college admissions, social media can be a double-edged sword. The New York Times. Retrieved from https://bits.blogs.ny		
	times.com/2013/11/11/in-college-admissions-social-media-can-be-a-double-edged-sword/
Singh, R. & Kumar, S. (2016). A study of cookies and threats to cookies. International Journal of Advanced Research in Computer Science and Software Engineering, 		
	 6(3), 339-343. Retrieved from https://www.ijarcsse.com/docs/papers/Volume_6/3_March2016/V6I3-0222.pdf
The Economist. (2014, July 12). Home, hacked home; The internet of things. Retrieved from http://go.galegroup.com.proxy.queensu.ca/ps/i.do?id=GALE%			
	7CA374524912&v=2.1&u=queensulaw&it=r&p=AONE&sw=w&asid=3f62b19a238f2dbcba05701695a2d62f
Turkle, S. (2013, December 16). The documented life. The New York Times. Retrieved from http://go.galegroup.com.proxy.queensu.ca/ps/i.do?id=GALE%			
	7CA352990428&v=2.1&u=queensulaw&it=r&p=AONE&sw=w&asid=64ed7fd1666adff5f62d1e8fab1a0ca1
Van Grove, J. (2013, March 28). Facebook makes risky bet on news feed ads that track you. CNET. Retrieved from https://www.cnet.com/news/facebook-makes-		
	risky-bet-on-news-feed-ads-that-track-you/
IMAGES REFERENCE LIST
Bailey, E. (Photographer). (2014). People coffee meeting team. [Digital Image]. Retrieved from https://www.pexels.com/photo/people-coffee-meeting-team-7096/
Boskampi. (Photographer). (2017). View of airport. [Digital Image]. Retrieved from https://www.pexels.com/photo/view-of-airport-247791/
Calvo, A. (Photographer). (2017). Beach water steps sand. [Digital Image]. Retrieved from https://www.pexels.com/photo/beach-water-steps-sand-17727/
Energepic. (Photographer). (2016). Adult blurr boss business. [Digital Image]. Retrieved from https://www.pexels.com/photo/adult-blur-boss-business-288477/
Kaboompics. (Photographer). (2017). Staircase by a yellow wall. [Digital Image]. Retrieved from http://kaboompics.com/photo/2163/staircase-by-a-yellow-wall
Kaboompics. (Photographer). (2017). Lanyard with media passcard. [Digital Image]. Retrieved from http://kaboompics.com/photo/4333/lanyard-with-media-pass-card
Kaboompics. (Photographer). (2017). Interior of modern kitchen. [Digital Image]. Retrieved from http://kaboompics.com/photo/3647/interior-of-a-modern-kitchen
Kaboompics. (Photographer). (2017). Elegant workspace with macbook, iPhone, business cards and notebook. [Digital Image]. Retrieved from http://kaboompics.		
	com/photo/207/elegant-workspace-with-macbook-iphone-business-cards-and-notebooks
Kayda, H. (Photographer). (2016). Hands apple computer iMac. [Digital Image]. Retrieved from https://www.pexels.com/photo/hands-apple-computer-imac-90800/
Kubassek, T. (Photographer). (2017). Adult audience celebration cheering. [Digital Image]. Retrieved from https://www.pexels.com/photo/adult-audience-celebra		
	tion-cheering-342521/
Manuel. (Photographer). (2017). Interior of office building. [Digital Image]. Retrieved from https://www.pexels.com/photo/interior-of-office-building-325229/
Martinelle. (Photographer). (2016). White switch hub turned on. [Digital Image]. Retrieved from https://www.pexels.com/photo/white-switch-hub-turned-on-159304/
Obolensky, I. (Photographer). (2016). Woman in black shirt facing mirror. [Digital Image]. Retrieved from https://www.pexels.com/photo/woman-in-black-shirt-fac		
	ing-mirror-211024/
Picjumbo. (Photographer). (2016). Women using smartphone while fronting a macbook pro and black Ipad. [Digital Image]. Retrieved from https://www.pexels.		
	com/photo/woman-using-a-smartphone-while-fronting-a-macbook-pro-and-black-ipad-196656/
Pixabay. (Photographer). (2017). Building pattern wall architecture. [Digital Image]. Retrieved from https://www.pexels.com/photo/building-pattern-wall-architec		
	ture-33317/
Pixabay. (Photographer). (2016). Macbook and Ipad on desk. [Digital Image]. Retrieved from https://www.pexels.com/photo/macbook-and-ipad-on-desk-207589/
Pixabay. (Photographer). (2016). Abus brand close up closed. [Digital Image]. Retrieved from https://www.pexels.com/photo/abus-brand-close-up-closed-277670/
Unsplash. (Photographer). (2017). City marketing lights night. [Digital Image]. Retrieved from https://www.pexels.com/photo/city-marketing-lights-night-1300/
Unsplash. (Photographer). (2016). White and brown archipelago map with colored head beads. [Digital Image]. Retrieved from https://www.pexels.com/photo/		
	white-and-brown-archipelago-map-with-colored-head-pins-212088/
Unsplash. (Photograper). (2016). Mirror showing group of people during daytime. [Digital Image]. Retrieved from https://www.pexels.com/photo/mirror-showing-		
	group-of-people-during-daytime-199467/
Unsplash. (Photographer). (2016). Couple standing in the street beside the building while looking up. [Digital Image]. Retrieved from https://www.pexels.com/pho		
	to/couple-standing-in-the-street-beside-the-building-while-looking-up-90837/
Unsplash. (Photographer). (2016). White printer paper. [Digital Image]. Retrieved from https://www.pexels.com/photo/white-printer-paper-57761/

More Related Content

What's hot

Clicktivism: Action Past A Click
Clicktivism: Action Past A ClickClicktivism: Action Past A Click
Clicktivism: Action Past A ClickJessica Dassanayake
 
IS SLACKTIVISM REALLY AS BAD AS THEY SAY IT IS? | Karen Clement
IS SLACKTIVISM REALLY AS BAD AS THEY SAY IT IS? | Karen ClementIS SLACKTIVISM REALLY AS BAD AS THEY SAY IT IS? | Karen Clement
IS SLACKTIVISM REALLY AS BAD AS THEY SAY IT IS? | Karen ClementKaren Clement
 
Film 260 flipbook
Film 260 flipbookFilm 260 flipbook
Film 260 flipbookJulie Coles
 
The Digital Divide Seniors Face
The Digital Divide Seniors FaceThe Digital Divide Seniors Face
The Digital Divide Seniors FaceFILMKLAZ
 
The Role of Social Media in Cybercrime
The Role of Social Media in CybercrimeThe Role of Social Media in Cybercrime
The Role of Social Media in CybercrimeKrista Dunn
 
Film 260 flipbook brad byron
Film 260 flipbook brad byron Film 260 flipbook brad byron
Film 260 flipbook brad byron Brad Byron
 
Film260 digitalflipbookshannongrist
Film260 digitalflipbookshannongristFilm260 digitalflipbookshannongrist
Film260 digitalflipbookshannongristShannon Grist
 
The Internet of Things
The Internet of ThingsThe Internet of Things
The Internet of ThingsEmily Cehic
 
And We Shall Call it Freedom: How We Chose to End Privacy
And We Shall Call it Freedom: How We Chose to End PrivacyAnd We Shall Call it Freedom: How We Chose to End Privacy
And We Shall Call it Freedom: How We Chose to End PrivacyRobbie Venis
 
Krystina Correa Flipbook Assignment - FILM 240
Krystina Correa Flipbook Assignment - FILM 240Krystina Correa Flipbook Assignment - FILM 240
Krystina Correa Flipbook Assignment - FILM 240Krystina Correa
 
Does Online Activism Work?
Does Online Activism Work?Does Online Activism Work?
Does Online Activism Work?Sidney Miao
 
Food for Thought, and Instagram
Food for Thought, and InstagramFood for Thought, and Instagram
Food for Thought, and InstagramMarie-Claire Zhang
 
Quantity over Quality: The World Of Personal Data
Quantity over Quality: The World Of Personal DataQuantity over Quality: The World Of Personal Data
Quantity over Quality: The World Of Personal DataCaroline Witzel
 
WEARABLES: THE GOOD, THE BAD, & THEY'RE UGLY
WEARABLES: THE GOOD, THE BAD, & THEY'RE UGLYWEARABLES: THE GOOD, THE BAD, & THEY'RE UGLY
WEARABLES: THE GOOD, THE BAD, & THEY'RE UGLYOlivia Charlebois
 

What's hot (20)

Not so social
Not so social Not so social
Not so social
 
Clicktivism: Action Past A Click
Clicktivism: Action Past A ClickClicktivism: Action Past A Click
Clicktivism: Action Past A Click
 
Digitally Distracted
Digitally DistractedDigitally Distracted
Digitally Distracted
 
IS SLACKTIVISM REALLY AS BAD AS THEY SAY IT IS? | Karen Clement
IS SLACKTIVISM REALLY AS BAD AS THEY SAY IT IS? | Karen ClementIS SLACKTIVISM REALLY AS BAD AS THEY SAY IT IS? | Karen Clement
IS SLACKTIVISM REALLY AS BAD AS THEY SAY IT IS? | Karen Clement
 
Social for social good
Social for social goodSocial for social good
Social for social good
 
Film 260 flipbook
Film 260 flipbookFilm 260 flipbook
Film 260 flipbook
 
The Digital Divide Seniors Face
The Digital Divide Seniors FaceThe Digital Divide Seniors Face
The Digital Divide Seniors Face
 
The Role of Social Media in Cybercrime
The Role of Social Media in CybercrimeThe Role of Social Media in Cybercrime
The Role of Social Media in Cybercrime
 
Film 260 flipbook brad byron
Film 260 flipbook brad byron Film 260 flipbook brad byron
Film 260 flipbook brad byron
 
Digital Divide
Digital Divide Digital Divide
Digital Divide
 
Film260 digitalflipbookshannongrist
Film260 digitalflipbookshannongristFilm260 digitalflipbookshannongrist
Film260 digitalflipbookshannongrist
 
FILM240 Flipbook
FILM240 FlipbookFILM240 Flipbook
FILM240 Flipbook
 
The Internet of Things
The Internet of ThingsThe Internet of Things
The Internet of Things
 
And We Shall Call it Freedom: How We Chose to End Privacy
And We Shall Call it Freedom: How We Chose to End PrivacyAnd We Shall Call it Freedom: How We Chose to End Privacy
And We Shall Call it Freedom: How We Chose to End Privacy
 
Lauryns flipbook
Lauryns flipbookLauryns flipbook
Lauryns flipbook
 
Krystina Correa Flipbook Assignment - FILM 240
Krystina Correa Flipbook Assignment - FILM 240Krystina Correa Flipbook Assignment - FILM 240
Krystina Correa Flipbook Assignment - FILM 240
 
Does Online Activism Work?
Does Online Activism Work?Does Online Activism Work?
Does Online Activism Work?
 
Food for Thought, and Instagram
Food for Thought, and InstagramFood for Thought, and Instagram
Food for Thought, and Instagram
 
Quantity over Quality: The World Of Personal Data
Quantity over Quality: The World Of Personal DataQuantity over Quality: The World Of Personal Data
Quantity over Quality: The World Of Personal Data
 
WEARABLES: THE GOOD, THE BAD, & THEY'RE UGLY
WEARABLES: THE GOOD, THE BAD, & THEY'RE UGLYWEARABLES: THE GOOD, THE BAD, & THEY'RE UGLY
WEARABLES: THE GOOD, THE BAD, & THEY'RE UGLY
 

Similar to Cheng jessica flipbook_film260

INTERNET&MASS COMMUNICATIONWhat is the Internet.docx
INTERNET&MASS COMMUNICATIONWhat is the Internet.docxINTERNET&MASS COMMUNICATIONWhat is the Internet.docx
INTERNET&MASS COMMUNICATIONWhat is the Internet.docxnormanibarber20063
 
Error: Your Life Has Been Hacked
Error: Your Life Has Been HackedError: Your Life Has Been Hacked
Error: Your Life Has Been HackedAdelle Leonard
 
The Evolution of Technology & Etiquette
The Evolution of Technology & EtiquetteThe Evolution of Technology & Etiquette
The Evolution of Technology & EtiquetteChristie Stelling
 
How Audiences Use Technology and Its Impact On Their Lives
How Audiences Use Technology and Its Impact On Their LivesHow Audiences Use Technology and Its Impact On Their Lives
How Audiences Use Technology and Its Impact On Their LivesMarcTonkin
 
Gentrification Research Methods
Gentrification Research MethodsGentrification Research Methods
Gentrification Research MethodsTiffany Surratt
 
December 2022: Top 10 Read Articles in Web & Semantic Technology
December 2022: Top 10  Read Articles in Web & Semantic TechnologyDecember 2022: Top 10  Read Articles in Web & Semantic Technology
December 2022: Top 10 Read Articles in Web & Semantic Technologydannyijwest
 
The Revolution of the Internet Throughout the Years
The Revolution of the Internet Throughout the YearsThe Revolution of the Internet Throughout the Years
The Revolution of the Internet Throughout the Yearsarnykasumiga
 
The Evolution & Impact of Technology .pptx
The Evolution & Impact of Technology .pptxThe Evolution & Impact of Technology .pptx
The Evolution & Impact of Technology .pptxMorganEvans44
 
HISTORY AND HUMANITIES LENS ON MOBILE DEVICES 1 HISTORY A
HISTORY AND HUMANITIES LENS ON MOBILE DEVICES 1 HISTORY AHISTORY AND HUMANITIES LENS ON MOBILE DEVICES 1 HISTORY A
HISTORY AND HUMANITIES LENS ON MOBILE DEVICES 1 HISTORY ASusanaFurman449
 
More connected, more extended, more content, more risks Mobile device explosi...
More connected, more extended, more content, more risks Mobile device explosi...More connected, more extended, more content, more risks Mobile device explosi...
More connected, more extended, more content, more risks Mobile device explosi...victor Nduna
 
Impact of Technology on Consumer Lives
Impact of Technology on Consumer LivesImpact of Technology on Consumer Lives
Impact of Technology on Consumer LivesMadaleineBoardman
 
Improving Your Library's Mobile Services
Improving Your Library's Mobile ServicesImproving Your Library's Mobile Services
Improving Your Library's Mobile ServicesALATechSource
 
Jean claude keknyemb assignment 2 ppt [autosaved]
Jean claude keknyemb assignment 2 ppt [autosaved]Jean claude keknyemb assignment 2 ppt [autosaved]
Jean claude keknyemb assignment 2 ppt [autosaved]JeanClaudeKeknyemb
 
Impact of technology on peoples lives
Impact of technology on peoples lives Impact of technology on peoples lives
Impact of technology on peoples lives JakubKolodziejski
 
Digital Trails Dave King 1 5 10 Part 1 D3
Digital Trails   Dave King   1 5 10   Part 1 D3Digital Trails   Dave King   1 5 10   Part 1 D3
Digital Trails Dave King 1 5 10 Part 1 D3Dave King
 
The Internet of Things: A Generation of Hyper-Connected Consumers and Adverti...
The Internet of Things: A Generation of Hyper-Connected Consumers and Adverti...The Internet of Things: A Generation of Hyper-Connected Consumers and Adverti...
The Internet of Things: A Generation of Hyper-Connected Consumers and Adverti...Peggy Men
 
Internet Safety And The Internet
Internet Safety And The InternetInternet Safety And The Internet
Internet Safety And The InternetStephanie King
 
New Research Articles 2020 July Issue International Journal of Software Engin...
New Research Articles 2020 July Issue International Journal of Software Engin...New Research Articles 2020 July Issue International Journal of Software Engin...
New Research Articles 2020 July Issue International Journal of Software Engin...ijseajournal
 

Similar to Cheng jessica flipbook_film260 (20)

INTERNET&MASS COMMUNICATIONWhat is the Internet.docx
INTERNET&MASS COMMUNICATIONWhat is the Internet.docxINTERNET&MASS COMMUNICATIONWhat is the Internet.docx
INTERNET&MASS COMMUNICATIONWhat is the Internet.docx
 
Error: Your Life Has Been Hacked
Error: Your Life Has Been HackedError: Your Life Has Been Hacked
Error: Your Life Has Been Hacked
 
The Evolution of Technology & Etiquette
The Evolution of Technology & EtiquetteThe Evolution of Technology & Etiquette
The Evolution of Technology & Etiquette
 
Out-Smarted!
Out-Smarted!Out-Smarted!
Out-Smarted!
 
How Audiences Use Technology and Its Impact On Their Lives
How Audiences Use Technology and Its Impact On Their LivesHow Audiences Use Technology and Its Impact On Their Lives
How Audiences Use Technology and Its Impact On Their Lives
 
Gentrification Research Methods
Gentrification Research MethodsGentrification Research Methods
Gentrification Research Methods
 
December 2022: Top 10 Read Articles in Web & Semantic Technology
December 2022: Top 10  Read Articles in Web & Semantic TechnologyDecember 2022: Top 10  Read Articles in Web & Semantic Technology
December 2022: Top 10 Read Articles in Web & Semantic Technology
 
The Revolution of the Internet Throughout the Years
The Revolution of the Internet Throughout the YearsThe Revolution of the Internet Throughout the Years
The Revolution of the Internet Throughout the Years
 
The Evolution & Impact of Technology .pptx
The Evolution & Impact of Technology .pptxThe Evolution & Impact of Technology .pptx
The Evolution & Impact of Technology .pptx
 
HISTORY AND HUMANITIES LENS ON MOBILE DEVICES 1 HISTORY A
HISTORY AND HUMANITIES LENS ON MOBILE DEVICES 1 HISTORY AHISTORY AND HUMANITIES LENS ON MOBILE DEVICES 1 HISTORY A
HISTORY AND HUMANITIES LENS ON MOBILE DEVICES 1 HISTORY A
 
More connected, more extended, more content, more risks Mobile device explosi...
More connected, more extended, more content, more risks Mobile device explosi...More connected, more extended, more content, more risks Mobile device explosi...
More connected, more extended, more content, more risks Mobile device explosi...
 
Impact of Technology on Consumer Lives
Impact of Technology on Consumer LivesImpact of Technology on Consumer Lives
Impact of Technology on Consumer Lives
 
Improving Your Library's Mobile Services
Improving Your Library's Mobile ServicesImproving Your Library's Mobile Services
Improving Your Library's Mobile Services
 
Assingment 2
Assingment 2Assingment 2
Assingment 2
 
Jean claude keknyemb assignment 2 ppt [autosaved]
Jean claude keknyemb assignment 2 ppt [autosaved]Jean claude keknyemb assignment 2 ppt [autosaved]
Jean claude keknyemb assignment 2 ppt [autosaved]
 
Impact of technology on peoples lives
Impact of technology on peoples lives Impact of technology on peoples lives
Impact of technology on peoples lives
 
Digital Trails Dave King 1 5 10 Part 1 D3
Digital Trails   Dave King   1 5 10   Part 1 D3Digital Trails   Dave King   1 5 10   Part 1 D3
Digital Trails Dave King 1 5 10 Part 1 D3
 
The Internet of Things: A Generation of Hyper-Connected Consumers and Adverti...
The Internet of Things: A Generation of Hyper-Connected Consumers and Adverti...The Internet of Things: A Generation of Hyper-Connected Consumers and Adverti...
The Internet of Things: A Generation of Hyper-Connected Consumers and Adverti...
 
Internet Safety And The Internet
Internet Safety And The InternetInternet Safety And The Internet
Internet Safety And The Internet
 
New Research Articles 2020 July Issue International Journal of Software Engin...
New Research Articles 2020 July Issue International Journal of Software Engin...New Research Articles 2020 July Issue International Journal of Software Engin...
New Research Articles 2020 July Issue International Journal of Software Engin...
 

Recently uploaded

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 

Recently uploaded (20)

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 

Cheng jessica flipbook_film260

  • 1. THE DECLINE OF ONLINE PRIVACYPhoto: View of Airport (Boskampi, 2017) By: Jessica Cheng
  • 2. Internet privacy has been on the decline for individuals due to a shift away from net neutrality, leaving users susceptible to: • Excessive technological reliance • Constant online archiving • Pervasive monitoring Photo: Lanyard with Media Passcard (Kaboompics, 2017)
  • 3. Photo: Macbook and Ipad on Desk (Pixabay, 2016) Netizens have never been more vulnerable to security risks because of the transition to an ‘Internet of Things’ (The Economist, 2014). Advances in hacking have overcome previous conventions of protection such as passwords. Netizens are more connected than ever. EXCESSIVE TECHNOLOGICAL RELIANCE
  • 4. Photo: People Coffee Meeting Team (Bailey, 2014) Wi-fi has become a mainstay in public spaces. When utilizing an unsecure open network, a hacker can easily work in between the user and the hotspot, or even distribute malware (KasperSky, 2017). Are you taking extra precautions to protect personal data such as banking information and important e-mails to prevent data leaking?
  • 5. Photo: White Switch Hub Turned On (Martinelle, 2016) By the end of this decade there could be some 50 billion things with web connections - Cisco (The Economist, 2014)
  • 6. Photo: Interior of Modern Kitchen (Kaboompics, 2017) Our society has become linked to an internet of things as electronic devices can connect to the internet, communicate, share, and upload information instantaneously (Office of the Privacy Commissioner of Canada [OPC], 2016). With increasing access points of information, users are more vulnerable to being hacked (The Economist, 2014).
  • 7. Photo: Abus Brand Close Up Closed (Pixabay, 2016) (Alt, 2014, p.1). of internet users have had an email or social media account hacked or taken over by someone else without their permission [...] believe that current laws are not good enough in protecting the rights of internet users
  • 8. Photo: Beach Water Steps Sand (Calvo, 2017) Everyone on the web has a digital footprint that will never disappear. Google searches and social media are becoming tools of investigation used by future recruiters to screen potential candidates. In this day and age, does privacy truly exist? CONSTANT ONLINE ARCHIVING
  • 9. Photo: White and Brown Archipelago Map with Colored Head Beads (Unsplash, 2016) The crumbs of data we leave behind as we flit from link to link - Nicholas Carr (Matrix, 2017)
  • 10. Users are leaving digital footprints by sharing and archiving their lives. Through constant documentation onto the web, users become obsessed and conditioned to interrupted experiences because of technology (Turkle, 2013). Photo: Mirror Showing Group of People during Daytime (Unsplash, 2016)
  • 11. Photo: Adult Audience Celebration Cheering (Kubassek, 2017) Social media use can act as a double edged sword (Singer, 2013, p.1). With modern technology, potential candidacy can be jeopardized due to their online image. With a single type search, past and present information may be revealed regarding an individual.
  • 12. Photo: Woman in Black Shirt Facing Mirror (Obolensky, 2016) As the lack of privacy and permanency on the web becomes more evident, users need to become more vigilant of what they post to avoid an unwanted personal image (Rosen, 2010).
  • 13. Photo: Adult Blurr Boss Business (Energepic, 2016) According to a study conducted by Microsoft, 75% of US recruiters report conducting an online research about candidates through search engines and social networking sites (Rosen, 2010, p.1).
  • 14. Photo: Elegant Workspace with Macbook, iPhone, Business cards and Notebook (Kaboompics, 2017) With this knowledge, individuals are responding to privacy concerns in the employment process by polishing their online profiles to make themselves more appealing (Bowness, 2013).
  • 15. Photo: White Printer Paper (Unsplash, 2016) The ease of use and accessibility of the web obscures its actual cost. Personal privacy is a deception created by social media companies as every ad seen by the individual is monitored closely (Santa Clara University, 2013). Does social media influence your daily lifestyle and personal decisions? PERVASIVE MONITORING
  • 16. Photo: Women using Smartphone while Fronting a Macbook Pro and Black Ipad (Picjumbo, 2016) Pervasive monitoring involves keeping track of the sites visited, number of clicks, and recording of which ads worked best for an individual (Van Grove, 2013).
  • 17. Web users are constantly monitored with cookies. Cookies track when a site is first visited and continues to keep records of a user’s patterns (Singh & Kumar, 2016). Photo: Building Pattern Wall Architecture (Pixabay, 2017)
  • 18. Photo: Hands Apple Computer iMac (Kayda, 2016) Information is also collected by advertising companies through buying an individual’s profile and purchasing patterns from social media sites(Manjoo, 2013).
  • 19. Photo: City Marketing Lights Night (Unsplash, 2017) Consumers lose their privacy as their every move is followed, and are susceptible to external influences because of the tailored ads(Oetting, 2016).
  • 20. Privacy on the internet has an evident gap in protection policies because although finances are protected, browsing information is not (Fiegerman & Larson, 2017). With the development of the digital age, there is increasing challenges to legislative frameworks as personal security is at risk when there is potential for seamless cyber surveillance (OPC, 2016). Photo: Couple Standing in the Street beside the Building while Looking Up (Unsplash, 2016)
  • 21. Consumers are becoming more connected to online networking and the web which imposes a shift away from neutrality (OPC, 2016). Internet infrastructure is complexly growing which raises caution for users (Finamore, Mellia, Meo, Munafo, & Rossi, 2011). Photo: Staircase by a Yellow Wall (Kaboompics, 2017)
  • 22. Photo: Interior of Office Building (Manuel, 2017) In modern society, internet privacy is declining due to the increasing reliance on technology, the permanency of the digital web, and constant monitoring. Ultimately, without adequate privacy protection policies, the future of online confidentiality is dire. CONCLUSION
  • 23. REFERENCE LIST Alt, K. (2014, September 04). 11 Online privacy statistics you may not know. AsecureLife. Retrieved from http://www.asecurelife.com/internet-privacy-statistics/ Bowness, S. (2013, January 11). Making the most of social media. The Globe and Mail. Retrieved from https://search-proquest-com.proxy.queensu.ca/ docview/1811305776?accountid=6180 Fiegerman, S. & Larson, S. (2017, April 05). The uncertain future of internet privacy. CNN Tech. Retrieved from http://money.cnn.com/2017/04/05/technology/ internet-privacy-future/ Finamore, A., Mellia, M., Meo, M., Munafo, M., & Rossi, D. (2011). Experiences of internet traffic monitoring with Tstat. IEEE Network, 25, 8-14. doi:10.1109/ MNET.2011.5772055 KasperSky (2017, May 15). How to avoid public WiFi security risks. Kaspersky Lab. Retrieved from https://usa.kaspersky.com/resource-center/preemptive-safety/ public-wifi-risks Oetting, J. (2016, April 09). Emotional advertising: how brands use feelings to get people to buy. Retrieved from https://blog.hubspot.com/marketing/emo tions-in-advertising-examples#sm.0000is7clupxdd34t5u29ybg9kz9t Office of the Privacy Commissioner of Canada (2016, February). The internet of things an introduction to privacy issues with a focus on the retail and home envi ronments. Retrieved from https://www.priv.gc.ca/media/1808/iot_201602_e.pdf Manjoo, F. (2013, March 20). Facebook followed you to the supermarket. Slate. Retrieved from http://www.trutv.com/shows/adam-ruins-everything/blog/ad ams-sources/adam-ruins-the-internet.html Matrix, S. (2017, May 08). Module 02 Lecture 02 Online friends Video. Retrieved from https://onq.queensu.ca/d2l/le/content/117252/viewContent/936374/View Rosen, J. (2010, July 21). The web means the end of forgetting. The New York Times. Retrieved from http://www.nytimes.com/2010/07/25/magazine/25priva cy-t2.html?pagewanted=all Santa Clara University. (2013, February 04). Loss of online privacy: what’s the harm?. Retrieved from https://www.scu.edu/ethics/privacy/loss-of-online-privacy- whats-the-harm/ Singer, N. (2013, November 11). In college admissions, social media can be a double-edged sword. The New York Times. Retrieved from https://bits.blogs.ny times.com/2013/11/11/in-college-admissions-social-media-can-be-a-double-edged-sword/ Singh, R. & Kumar, S. (2016). A study of cookies and threats to cookies. International Journal of Advanced Research in Computer Science and Software Engineering, 6(3), 339-343. Retrieved from https://www.ijarcsse.com/docs/papers/Volume_6/3_March2016/V6I3-0222.pdf The Economist. (2014, July 12). Home, hacked home; The internet of things. Retrieved from http://go.galegroup.com.proxy.queensu.ca/ps/i.do?id=GALE% 7CA374524912&v=2.1&u=queensulaw&it=r&p=AONE&sw=w&asid=3f62b19a238f2dbcba05701695a2d62f Turkle, S. (2013, December 16). The documented life. The New York Times. Retrieved from http://go.galegroup.com.proxy.queensu.ca/ps/i.do?id=GALE% 7CA352990428&v=2.1&u=queensulaw&it=r&p=AONE&sw=w&asid=64ed7fd1666adff5f62d1e8fab1a0ca1 Van Grove, J. (2013, March 28). Facebook makes risky bet on news feed ads that track you. CNET. Retrieved from https://www.cnet.com/news/facebook-makes- risky-bet-on-news-feed-ads-that-track-you/
  • 24. IMAGES REFERENCE LIST Bailey, E. (Photographer). (2014). People coffee meeting team. [Digital Image]. Retrieved from https://www.pexels.com/photo/people-coffee-meeting-team-7096/ Boskampi. (Photographer). (2017). View of airport. [Digital Image]. Retrieved from https://www.pexels.com/photo/view-of-airport-247791/ Calvo, A. (Photographer). (2017). Beach water steps sand. [Digital Image]. Retrieved from https://www.pexels.com/photo/beach-water-steps-sand-17727/ Energepic. (Photographer). (2016). Adult blurr boss business. [Digital Image]. Retrieved from https://www.pexels.com/photo/adult-blur-boss-business-288477/ Kaboompics. (Photographer). (2017). Staircase by a yellow wall. [Digital Image]. Retrieved from http://kaboompics.com/photo/2163/staircase-by-a-yellow-wall Kaboompics. (Photographer). (2017). Lanyard with media passcard. [Digital Image]. Retrieved from http://kaboompics.com/photo/4333/lanyard-with-media-pass-card Kaboompics. (Photographer). (2017). Interior of modern kitchen. [Digital Image]. Retrieved from http://kaboompics.com/photo/3647/interior-of-a-modern-kitchen Kaboompics. (Photographer). (2017). Elegant workspace with macbook, iPhone, business cards and notebook. [Digital Image]. Retrieved from http://kaboompics. com/photo/207/elegant-workspace-with-macbook-iphone-business-cards-and-notebooks Kayda, H. (Photographer). (2016). Hands apple computer iMac. [Digital Image]. Retrieved from https://www.pexels.com/photo/hands-apple-computer-imac-90800/ Kubassek, T. (Photographer). (2017). Adult audience celebration cheering. [Digital Image]. Retrieved from https://www.pexels.com/photo/adult-audience-celebra tion-cheering-342521/ Manuel. (Photographer). (2017). Interior of office building. [Digital Image]. Retrieved from https://www.pexels.com/photo/interior-of-office-building-325229/ Martinelle. (Photographer). (2016). White switch hub turned on. [Digital Image]. Retrieved from https://www.pexels.com/photo/white-switch-hub-turned-on-159304/ Obolensky, I. (Photographer). (2016). Woman in black shirt facing mirror. [Digital Image]. Retrieved from https://www.pexels.com/photo/woman-in-black-shirt-fac ing-mirror-211024/ Picjumbo. (Photographer). (2016). Women using smartphone while fronting a macbook pro and black Ipad. [Digital Image]. Retrieved from https://www.pexels. com/photo/woman-using-a-smartphone-while-fronting-a-macbook-pro-and-black-ipad-196656/ Pixabay. (Photographer). (2017). Building pattern wall architecture. [Digital Image]. Retrieved from https://www.pexels.com/photo/building-pattern-wall-architec ture-33317/ Pixabay. (Photographer). (2016). Macbook and Ipad on desk. [Digital Image]. Retrieved from https://www.pexels.com/photo/macbook-and-ipad-on-desk-207589/ Pixabay. (Photographer). (2016). Abus brand close up closed. [Digital Image]. Retrieved from https://www.pexels.com/photo/abus-brand-close-up-closed-277670/ Unsplash. (Photographer). (2017). City marketing lights night. [Digital Image]. Retrieved from https://www.pexels.com/photo/city-marketing-lights-night-1300/ Unsplash. (Photographer). (2016). White and brown archipelago map with colored head beads. [Digital Image]. Retrieved from https://www.pexels.com/photo/ white-and-brown-archipelago-map-with-colored-head-pins-212088/ Unsplash. (Photograper). (2016). Mirror showing group of people during daytime. [Digital Image]. Retrieved from https://www.pexels.com/photo/mirror-showing- group-of-people-during-daytime-199467/ Unsplash. (Photographer). (2016). Couple standing in the street beside the building while looking up. [Digital Image]. Retrieved from https://www.pexels.com/pho to/couple-standing-in-the-street-beside-the-building-while-looking-up-90837/ Unsplash. (Photographer). (2016). White printer paper. [Digital Image]. Retrieved from https://www.pexels.com/photo/white-printer-paper-57761/