SlideShare une entreprise Scribd logo
1  sur  55
Télécharger pour lire hors ligne
Are players getting
screwed?
The privacy policy and terms of service of PC game platform Steam.
Most of us don’t read the privacy
policies and terms of service of
the online platforms we use for
good reason.
Image: (Aguado, 2011)
It’s estimated it would take you 244
hours to read the privacy policies
for all the websites you visit in a year
(McDonald & Cranor, 2008, p. 563).
They’re time consuming.
Image: (Wickramanayaka, 2014)
Research has found that even experts
in law struggle to interpret privacy
policies (Reidenberg et al., 2015).
And they’re confusing.
Image: (CollegeDegrees360, 2012)
Still, they’re worth our attention as these
policies often diminish the rights of
users.
To illustrate, let’s explore the policies of
the popular online service Steam.
We’ll look at how these policies
effect ownership and privacy,
and the unfairness of Steam’s
dispute resolution clauses.
Image: (Kit, 2007)
But first …
Steam?
Steam is an online PC gaming and
social network platform owned by the
software company Valve.
Image: Screenshot http://store.steampowered.com/, 2016
It has over 125 million users worldwide
(Saed, 2015).
Steam has faced its share of
controversy.
Multiple hacks have
exposed the personal
information of its users
(Good, 2011; Grill, 2015).
Image: (The Preiser Project, 2014)
And recently Valve was sued by a
consumer group alleging Steam’s
policies violated the rights of
consumers (Nutt, 2015).
Image: (Gratz, 2006)
Image: Screenshot http://steamcommunity.com/discussions/, 2016
On Steam you can:
• Access, play and review games
• Share your videos and artwork
• Create and share game content
• Join discussion boards and chat in-game

To create a Steam account you must
agree to Steam’s Subscriber Agreement 

& Privacy Policy.
Steam &
Ownership
You may think you buy games on Steam, but
that’s not entirely accurate.
What you buy are subscriptions to games
(Valve, 2016).
If you or Valve cancel your account, these
subscriptions end without refund and
you are no longer allowed to play your
games (Valve, 2016).
Valve can cancel your account if you break
the terms of the Subscriber Agreement or
Steam’s rules of conduct, which Valve can
change whenever they want (Valve, 2016).
Image: (Indruch, 2009)
While it’s likely digital content providers set
these restrictions to protect against
piracy (Wong, 2013, p. 733) …
… they effectively hold valuable content to
ransom, pressuring us to continue using their
services and accepting the terms they set.
Image: (James, 2013)
We do own some content on Steam.
The content we create and make
public on social media, such as
reviews, videos and artworks, are
our intellectual property.
Image: Screenshot http://steamcommunity.com/?subsection=images, 2016
The agreement grants Valve many of the
powers of a copyright owner over our
content, such as being free to modify it
and create derivative works that solely
belong to them (Valve, 2016).
Image: (Paz, 2010)
Tech companies and users are co-creators of
social media sites (Schumann, von Wangenheim, & Groene, 2014, p. 66) …
If users didn’t add content to Steam’s
community section, who would visit it?
Image: (Berge, 2010)
… yet we seem to come out second-best
in the relationship.
When we agree to Steam’s terms we
lose control over content we own
and Gain no property rights over the
content we spend money on.
Steam & Privacy
Valve collects from Steam users
Anonymous Data & Personally
Identifiable Information.
Anonymous data supposedly can’t
identify you. It can include your browsing
history, purchase history, gender and postal
code.
Image: (überBusy, 2006)
Valve can share this data with anyone
(Valve, 2015) because it isn’t considered a
threat to privacy …
… even though there are methods that
exist that can link this data back to
individuals (Marwick & boyd, 2014, p. 1053; Narayanan
& Shmatikov, 2010, p. 25).
It collects this data in order to study
consumer habits (Valve, 2015).
Many companies do this so they can
personalise their services and create
targeted advertising (Brown & Muchira, 2004).
Image: (Vance, 2007)
Valve does not specify or give us
options over what anonymous data
is collected from us.
Basically, we’re being profiled
in ways we can’t see or control
based on online behaviour that
may not reflect who we are
(van Wel & Royakkers, 2004, p. 133).
Image: (Lund, 2007)
Personally identifiable information
is information volunteered by users “that can
be used to uniquely identify a user such as
name, address or credit card number” (Valve, 2015).
Image: (Ivanushkin, 2009)
It’s not mentioned how long Valve
keeps this information.
Image: (Cholet, 2011)
You can ask for it to be removed
from Valve’s records …
… but the request can be denied
for vague various reasons such as if
the request is deemed “extremely
impractical” (Valve, 2015).
Image: (fdecomite, 2012)
Government surveillance requests for
customer data from tech companies is
on the rise (Schechner, 2016) …
Valve may release our information to
authorities “to comply with court orders
or laws”(Valve, 2015).
It makes no promises to resist such
requests or to notify users when they
occur.
When we’re vulnerable to
scrutiny, it changes the way
we act (Introna, 1997, p. 268).
Image: (ep_jhu, 2010)
Online surveillance concerns have seen
22% of American internet users
change their online behaviour
(Rainie & Madden, 2015).
When we use Steam, we compromise
our privacy, threatening our ability
to define our actions and ourselves.
Dispute
Resolution
The subscriber agreement
attempts to dictate what legal
measures we can take against
Valve, such as insisting we forgo
the right to a trial in court (Valve, 2016).
Image: (brainflakes., 2008)
These terms might not apply in some
countries (Valve, 2016). Their inclusion in the
agreement makes it unclear what a
user’s legal rights are …
Image: (Habel, 2007)
… potentially discouraging users
from defending themselves with
appropriate legal action (Loos & Luzak, 2016, p. 85).
Conclusion
Many of us are happy to exchange
our personal information and user
content for a great online service
(Schumann, von Wangenheim, & Groene, 2014, p. 70).
Image: (Magal, 2011)
But is it fair that we’re forced
to relinquish so much control
in these exchanges?
It’s in a company’s economic interest
to have control over our data and content
but so is maintaining the trust of their
customers (Peacock, 2014, p. 7; Dean, Payne, & Landry, 2016, p. 500).
Expressing our concerns to tech companies can
help us regain power over our information and
content …
Image: (kunkelstein, 2007)
… And so can better legislation. In Steam’s
policies you’ll notice that European Union
users are given greater consideration.
This is because the EU has stricter laws
governing privacy and consumer rights
(Bogdan, 2015; Curtis, 2016).
Image: (Allen, 2010)
Online terms of service are “exploitative,
unjust, unavoidable” and one-sided
(Peacock, 2014, p. 7).
But that can change.
Learn more about online privacy and
ownership issues: 

Online Privacy: Using the Internet Safely
Electronic Frontier Foundation
Me and My Shadow
References
Bogdan, M. (2015). The New EU Regulation on Online Resolution for Consumer Disputes. Masaryk University Journal of Law and
Technology, 9(1), 155-164. Retrieved from http://www.heinonline.org.dbgw.lis.curtin.edu.au/HOL/Page?handle=hein.journals/
mujlt9&size=2&collection=journals&id=157
Brown, M., & Muchira, R. (2004). Investigating the Relationship between Internet Privacy Concern and Online Purchase Behavior.
Journal of Electronic Commerce Research, 591, 62-70. Retrieved from http://web.csulb.edu/journals/jecr/issues/20041/
Paper6.pdf
Curtis, J. (2016, April 15). Your business must prepare today for 2018 EU data protection laws. IT Pro. Retrieved from http://
search.proquest.com.dbgw.lis.curtin.edu.au/docview/1787082377?accountid=10382
Dean, M. D., Payne D. M., & Landry, B. J. L., (2016). Data mining: an ethical baseline for online privacy policies. Journal of
Enterprise Information Management, 29(4), 482 – 504. DOI: 10.1108/JEIM-04-2014-0040
Good, O. (2011, November 11). The Steam forums are back online. Kotaku. Retrieved from http://kotaku.com/tag/steam-hack
Grill, S. (2015, December 30). Steam hack affected 34, 000 users, Valve issues statement on Christmas DOS attack. Inquisitr.
Retrieved from http://www.inquisitr.com/2669168/steam-hack-affected-34k-users-valve-issues-statement-on-christmas-dos-
attack/
Introna, L. D. (1997). Privacy and the computer: why we need privacy in the information society. Metaphilosophy, 28(3), 259-275.
DOI: 10.1111/1467-9973.00055
Loos, M., & Luzak, J. (2016). Wanted: A bigger stick. On unfair terms in consumer contracts with online service providers. Journal of
Consumer Policy, 39, 63-90. DOI 10.1007/s10603-015-9303-7
Marwick, A. E., & boyd, d. (2014). Networked privacy: How teenagers negotiate context in social media. New Media & Society, 16(7),
1051-1067. Retrieved from http://nms.sagepub.com.dbgw.lis.curtin.edu.au/content/16/7/1051
McDonald, A. M., & Cranor, L. F. (2008). The cost of reading privacy policies. I/S: A Journal of Law and Policy for the Information
Society, 4(3), 543-568. Retrieved from http://www.heinonline.org.dbgw.lis.curtin.edu.au/HOL/Index?index=journals
%2Fisjlpsoc&collection=journals
Narayanan, A., & Shmatikov, V. (2010). Myths and fallacies of "Personally Identifiable Information". Communications of the ACM,
53(6), 24-26. DOI: 10.1145/1743546.1743558
Nutt, C. (2015, December 17). French consumer group sues Valve over Steam policies. Gamasutra. Retrieved from http://
www.gamasutra.com/view/news/262203/French_consumer_group_sues_Valve_over_Steam_policies.php
Peacock, S. E. (2014). How web tracking changes user agency in the age of Big Data: The used user. Big Data & Society, 1(2), 1-11.
DOI: 10.1177/2053951714564228
Rainie, L., & Madden, M. (2015, March 16). How people are changing their own behaviour. Pew Research Center. Retrieved from
http://www.pewinternet.org/2015/03/16/how-people-are-changing-their-own-behavior/
Reidenberg, J. R., Breaux, T., Cranor, L. F., French, B., Grannis, A., Graves, J. T., Liu, F., McDonald, A., Norton, T. B., Ramanath, R.
Russell, N. C., Sadeh, N., & Schaub, F. (2015). Disagreeable privacy policies: Mismatches between meaning and users’
understanding. Berkeley Technology Law Journal, 30(1), 39-88. Retrieved from http://
search.ebscohost.com.dbgw.lis.curtin.edu.au/login.aspx?direct=true&db=bth&AN=109230960&site=ehost-live
Saed, S. (2015, February 24). Steam has over 125 million active users, 8.9M concurrent peak. VG24/7. Retrieved from http://
www.vg247.com/2015/02/24/steam-has-over-125-million-active-users-8-9m-concurrent-peak/
Schumann, J. H., von Wangenheim, F., & Groene, N. (2014, January). Targeted online advertising: Using reciprocity appeals to
increase acceptance among users of free web services. Journal of Marketing, 78, 59-75. DOI: 10.1509/jm.11.0316
Schechner, S. (2016, January 20). U.S. tech companies bring encryption battle to Davos; Some executives are pushing governments
for new system to handle cross-border data requests. Wall Street. Retrieved from http://
search.proquest.com.dbgw.lis.curtin.edu.au/docview/1758323073?accountid=10382
Valve. (2015, March 24). Privacy policy agreement. Retrieved from http://store.steampowered.com/privacy_agreement/
Valve. (2016, January 1). Steam subscriber agreement. Retrieved from http://store.steampowered.com/subscriber_agreement/
van Wel, L., & Royakkers, L. (2004). Ethical issues in web data mining. Ethics and Information Technology, 6, 129-140. DOI:
10.1023/B:ETIN.0000047476.05912.3d
Wong, C. (2013). Can Bruce Willis leave his iTunes collection to his children?: Inheritability of digital media in the face of EULAs.
Technology Law Journal, 29(4), 703-761. Retrieved from http://search.proquest.com.dbgw.lis.curtin.edu.au/docview/
1400169319?accountid=10382
Images
Aguado, A. G. (2011, November 16). New glasses [Digital image]. Retrieved from https://flic.kr/p/aFcWS8
Berge, C-H. (2010, June 5). Shaking hands [Digital image]. Retrieved from https://flic.kr/p/87KMxT
Allen, R. (2010, March 13). Themis [Digital image]. Retrieved from https://flic.kr/p/7LxCKN
brainflakes.. (2008, July 19). Arms crossed [Digital image]. Retrieved from https://flic.kr/p/5f9etL
Cholet, D. (2011, January 20). Calendar* [Digital image]. Retrieved from https://flic.kr/p/9bUbH3
CollegeDegrees360. (2012, July 12). Confused [Digital image]. Retrieved from https://flic.kr/p/cEJMpW
ep_jhu. (2010, April 18). Surveillance [Digital image]. Retrieved from https://flic.kr/p/7VibC7
fdecomite. (2012, July 27). Signs [Digital image]. Retrieved from https://flic.kr/p/cFgqPG
Gratz, J. (2006). Courtroom one gavel [Digital image]. Retrieved from https://flic.kr/p/bkUna
Habel, C. (2007, July 8). let the day begin [Digital image]. Retrieved from https://flic.kr/p/2BND3v
Indruch, L. (2009, April 4). broken screen [Digital image]. Retrieved from https://flic.kr/p/6df6Wx
Ivanushkin, E. (2009, July 12). Credit card [Digital image]. Retrieved from https://flic.kr/p/6Eh3zg
James, S. (2013, June 14). chain [Digital image]. Retrieved from https://flic.kr/p/eMHinV
Kit. (2007, August 19). The worlds greatest detective [Digital image]. Retrieved from https://flic.kr/p/2NJxPz
kunkelstein. (2007, November 28). Anger. [Digital image]. Retrieved from https://flic.kr/p/4bMzdr
Lund, G. (2007, February 11). Mirror [Digital image]. Retrieved from https://flic.kr/p/5VFkBX
Magal, A. (2011, April 22). Vintage cash register [Digital image]. Retrieved from https://flic.kr/p/9K6tTu
Paz, J. (2010, February 2). Chocolate cake [Digital image]. Retrieved from https://flic.kr/p/7AuNkn
The Preiser Project. (2014, January 23). Hacker [Digital image]. Retrieved from https://flic.kr/p/jrrmeP
überBusy. (2006, July 13). hiding [Digital image]. Retrieved from https://flic.kr/p/hGS8R
Vance, J. (2007, July 1). Target [Digital image]. Retrieved from https://flic.kr/p/27szGU
Wickramanayaka, U. (2014). time [Digital image]. Retrieved from https://flic.kr/p/rs7QVi
Licenses
The following images were used under a Creative Commons Attribution-NonCommercial
2.0 Generic license: Anger., Arms crossed, broken screen, chain, Chocolate cake, hiding,
let the day begin, Mirror, New glasses, Surveillance, The worlds greatest detective,
Themis, timeTarget, Vintage cash register.
The following images were used under a Creative Commons Attribution-ShareAlike 2.0
Generic license: Confused, Credit card.
The following images were used under a Creative Commons Attribution 2.0 Generic
license: Calendar*, Hacker, Signs.
This presentation has been created as part of an assignment for the unit NET303, provided
by Curtin University. All media cited in this presentation remains the property and copyright
of the respective rights holders. Any copyrighted content has been used legally under
Australian Fair Dealing for the purposes of criticism and review. All original content is
released under a Creative Commons Attribution-ShareAlike 4.0 International license.

Contenu connexe

Similaire à Are players getting screwed? The privacy policy and terms of service of PC game platform Steam

Steam: Policy Primer - Warwick Janetzki NET303: Internet Politics and Power C...
Steam: Policy Primer - Warwick Janetzki NET303: Internet Politics and Power C...Steam: Policy Primer - Warwick Janetzki NET303: Internet Politics and Power C...
Steam: Policy Primer - Warwick Janetzki NET303: Internet Politics and Power C...WarwickJanetzki
 
1 IT 140 A Mini History of Text-Based Games Text
1  IT 140 A Mini History of Text-Based Games  Text1  IT 140 A Mini History of Text-Based Games  Text
1 IT 140 A Mini History of Text-Based Games TextMartineMccracken314
 
1 IT 140 A Mini History of Text-Based Games Text
1  IT 140 A Mini History of Text-Based Games  Text1  IT 140 A Mini History of Text-Based Games  Text
1 IT 140 A Mini History of Text-Based Games TextSilvaGraf83
 
Paper 3 Draft 3
Paper 3 Draft 3Paper 3 Draft 3
Paper 3 Draft 3Utphala P
 
PRIVACY IN CLOUD COMPUTING: A SURVEY
PRIVACY IN CLOUD COMPUTING: A SURVEYPRIVACY IN CLOUD COMPUTING: A SURVEY
PRIVACY IN CLOUD COMPUTING: A SURVEYcscpconf
 
Personal Healthcare IOT on PCF using Spring
Personal Healthcare IOT on PCF using SpringPersonal Healthcare IOT on PCF using Spring
Personal Healthcare IOT on PCF using SpringJim Shingler
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Why it's so hard for users to control their data
Why it's so hard for users to control their dataWhy it's so hard for users to control their data
Why it's so hard for users to control their dataGiuliadeNicolellis
 
(300-400 words)1- Watch anyone of the following documentarymovi.docx
(300-400 words)1- Watch anyone of the following documentarymovi.docx(300-400 words)1- Watch anyone of the following documentarymovi.docx
(300-400 words)1- Watch anyone of the following documentarymovi.docxmayank272369
 
NET 303: Online Policy Primer
NET 303: Online Policy Primer NET 303: Online Policy Primer
NET 303: Online Policy Primer TwilightOwl
 
Digital magna carta privacy rights
Digital magna carta   privacy rightsDigital magna carta   privacy rights
Digital magna carta privacy rightsSomerco Research
 
Personal Healthcare IOT on PCF Using Spring
Personal Healthcare IOT on PCF Using SpringPersonal Healthcare IOT on PCF Using Spring
Personal Healthcare IOT on PCF Using SpringVMware Tanzu
 
Deceived by design. How tech companies use dark patterns to discourage us fro...
Deceived by design. How tech companies use dark patterns to discourage us fro...Deceived by design. How tech companies use dark patterns to discourage us fro...
Deceived by design. How tech companies use dark patterns to discourage us fro...Digital Policy and Law Consulting
 
Web 2.0: Legal Issues and Opportunities
Web 2.0: Legal Issues and OpportunitiesWeb 2.0: Legal Issues and Opportunities
Web 2.0: Legal Issues and Opportunitiesmorganjbruce
 
The Future of The Internet Culture.
The Future of The Internet Culture. The Future of The Internet Culture.
The Future of The Internet Culture. AshenafiBordea
 
Essay Statement Of Purpose Sketsa. Online assignment writing service.
Essay Statement Of Purpose Sketsa. Online assignment writing service.Essay Statement Of Purpose Sketsa. Online assignment writing service.
Essay Statement Of Purpose Sketsa. Online assignment writing service.Liz Sims
 
Moving enterprise IT to the cloud
Moving enterprise IT to the cloudMoving enterprise IT to the cloud
Moving enterprise IT to the cloudJan Wiersma
 
INFERENCE ATTACK ON BROWSING HISTORY OF TWITTER USERS USING PUBLIC CLICK ANAL...
INFERENCE ATTACK ON BROWSING HISTORY OF TWITTER USERS USING PUBLIC CLICK ANAL...INFERENCE ATTACK ON BROWSING HISTORY OF TWITTER USERS USING PUBLIC CLICK ANAL...
INFERENCE ATTACK ON BROWSING HISTORY OF TWITTER USERS USING PUBLIC CLICK ANAL...Nexgen Technology
 
Cloud computing & disadvantages of technology
Cloud computing & disadvantages of technologyCloud computing & disadvantages of technology
Cloud computing & disadvantages of technologynomibuilder
 

Similaire à Are players getting screwed? The privacy policy and terms of service of PC game platform Steam (20)

Steam: Policy Primer - Warwick Janetzki NET303: Internet Politics and Power C...
Steam: Policy Primer - Warwick Janetzki NET303: Internet Politics and Power C...Steam: Policy Primer - Warwick Janetzki NET303: Internet Politics and Power C...
Steam: Policy Primer - Warwick Janetzki NET303: Internet Politics and Power C...
 
1 IT 140 A Mini History of Text-Based Games Text
1  IT 140 A Mini History of Text-Based Games  Text1  IT 140 A Mini History of Text-Based Games  Text
1 IT 140 A Mini History of Text-Based Games Text
 
1 IT 140 A Mini History of Text-Based Games Text
1  IT 140 A Mini History of Text-Based Games  Text1  IT 140 A Mini History of Text-Based Games  Text
1 IT 140 A Mini History of Text-Based Games Text
 
Paper 3 Draft 3
Paper 3 Draft 3Paper 3 Draft 3
Paper 3 Draft 3
 
PRIVACY IN CLOUD COMPUTING: A SURVEY
PRIVACY IN CLOUD COMPUTING: A SURVEYPRIVACY IN CLOUD COMPUTING: A SURVEY
PRIVACY IN CLOUD COMPUTING: A SURVEY
 
Personal Healthcare IOT on PCF using Spring
Personal Healthcare IOT on PCF using SpringPersonal Healthcare IOT on PCF using Spring
Personal Healthcare IOT on PCF using Spring
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Why it's so hard for users to control their data
Why it's so hard for users to control their dataWhy it's so hard for users to control their data
Why it's so hard for users to control their data
 
(300-400 words)1- Watch anyone of the following documentarymovi.docx
(300-400 words)1- Watch anyone of the following documentarymovi.docx(300-400 words)1- Watch anyone of the following documentarymovi.docx
(300-400 words)1- Watch anyone of the following documentarymovi.docx
 
NET 303: Online Policy Primer
NET 303: Online Policy Primer NET 303: Online Policy Primer
NET 303: Online Policy Primer
 
Digital magna carta privacy rights
Digital magna carta   privacy rightsDigital magna carta   privacy rights
Digital magna carta privacy rights
 
Personal Healthcare IOT on PCF Using Spring
Personal Healthcare IOT on PCF Using SpringPersonal Healthcare IOT on PCF Using Spring
Personal Healthcare IOT on PCF Using Spring
 
Testing
TestingTesting
Testing
 
Deceived by design. How tech companies use dark patterns to discourage us fro...
Deceived by design. How tech companies use dark patterns to discourage us fro...Deceived by design. How tech companies use dark patterns to discourage us fro...
Deceived by design. How tech companies use dark patterns to discourage us fro...
 
Web 2.0: Legal Issues and Opportunities
Web 2.0: Legal Issues and OpportunitiesWeb 2.0: Legal Issues and Opportunities
Web 2.0: Legal Issues and Opportunities
 
The Future of The Internet Culture.
The Future of The Internet Culture. The Future of The Internet Culture.
The Future of The Internet Culture.
 
Essay Statement Of Purpose Sketsa. Online assignment writing service.
Essay Statement Of Purpose Sketsa. Online assignment writing service.Essay Statement Of Purpose Sketsa. Online assignment writing service.
Essay Statement Of Purpose Sketsa. Online assignment writing service.
 
Moving enterprise IT to the cloud
Moving enterprise IT to the cloudMoving enterprise IT to the cloud
Moving enterprise IT to the cloud
 
INFERENCE ATTACK ON BROWSING HISTORY OF TWITTER USERS USING PUBLIC CLICK ANAL...
INFERENCE ATTACK ON BROWSING HISTORY OF TWITTER USERS USING PUBLIC CLICK ANAL...INFERENCE ATTACK ON BROWSING HISTORY OF TWITTER USERS USING PUBLIC CLICK ANAL...
INFERENCE ATTACK ON BROWSING HISTORY OF TWITTER USERS USING PUBLIC CLICK ANAL...
 
Cloud computing & disadvantages of technology
Cloud computing & disadvantages of technologyCloud computing & disadvantages of technology
Cloud computing & disadvantages of technology
 

Dernier

PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationLinaWolf1
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMartaLoveguard
 
NSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentationNSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentationMarko4394
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一z xss
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxDyna Gilbert
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作ys8omjxb
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Sonam Pathan
 
Elevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New OrleansElevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New Orleanscorenetworkseo
 
Q4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxQ4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxeditsforyah
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhimiss dipika
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一Fs
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一Fs
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Excelmac1
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa494f574xmv
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书rnrncn29
 

Dernier (20)

PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 Documentation
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptx
 
NSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentationNSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentation
 
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptx
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170
 
Elevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New OrleansElevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New Orleans
 
Q4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxQ4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptx
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhi
 
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
 

Are players getting screwed? The privacy policy and terms of service of PC game platform Steam

  • 1. Are players getting screwed? The privacy policy and terms of service of PC game platform Steam.
  • 2. Most of us don’t read the privacy policies and terms of service of the online platforms we use for good reason. Image: (Aguado, 2011)
  • 3. It’s estimated it would take you 244 hours to read the privacy policies for all the websites you visit in a year (McDonald & Cranor, 2008, p. 563). They’re time consuming. Image: (Wickramanayaka, 2014)
  • 4. Research has found that even experts in law struggle to interpret privacy policies (Reidenberg et al., 2015). And they’re confusing. Image: (CollegeDegrees360, 2012)
  • 5. Still, they’re worth our attention as these policies often diminish the rights of users.
  • 6. To illustrate, let’s explore the policies of the popular online service Steam. We’ll look at how these policies effect ownership and privacy, and the unfairness of Steam’s dispute resolution clauses. Image: (Kit, 2007)
  • 9. Steam is an online PC gaming and social network platform owned by the software company Valve. Image: Screenshot http://store.steampowered.com/, 2016 It has over 125 million users worldwide (Saed, 2015).
  • 10. Steam has faced its share of controversy.
  • 11. Multiple hacks have exposed the personal information of its users (Good, 2011; Grill, 2015). Image: (The Preiser Project, 2014)
  • 12. And recently Valve was sued by a consumer group alleging Steam’s policies violated the rights of consumers (Nutt, 2015). Image: (Gratz, 2006)
  • 13. Image: Screenshot http://steamcommunity.com/discussions/, 2016 On Steam you can: • Access, play and review games • Share your videos and artwork • Create and share game content • Join discussion boards and chat in-game

  • 14. To create a Steam account you must agree to Steam’s Subscriber Agreement 
 & Privacy Policy.
  • 16. You may think you buy games on Steam, but that’s not entirely accurate. What you buy are subscriptions to games (Valve, 2016).
  • 17. If you or Valve cancel your account, these subscriptions end without refund and you are no longer allowed to play your games (Valve, 2016).
  • 18. Valve can cancel your account if you break the terms of the Subscriber Agreement or Steam’s rules of conduct, which Valve can change whenever they want (Valve, 2016). Image: (Indruch, 2009)
  • 19. While it’s likely digital content providers set these restrictions to protect against piracy (Wong, 2013, p. 733) …
  • 20. … they effectively hold valuable content to ransom, pressuring us to continue using their services and accepting the terms they set. Image: (James, 2013)
  • 21. We do own some content on Steam. The content we create and make public on social media, such as reviews, videos and artworks, are our intellectual property. Image: Screenshot http://steamcommunity.com/?subsection=images, 2016
  • 22. The agreement grants Valve many of the powers of a copyright owner over our content, such as being free to modify it and create derivative works that solely belong to them (Valve, 2016). Image: (Paz, 2010)
  • 23. Tech companies and users are co-creators of social media sites (Schumann, von Wangenheim, & Groene, 2014, p. 66) … If users didn’t add content to Steam’s community section, who would visit it? Image: (Berge, 2010)
  • 24. … yet we seem to come out second-best in the relationship.
  • 25. When we agree to Steam’s terms we lose control over content we own and Gain no property rights over the content we spend money on.
  • 27. Valve collects from Steam users Anonymous Data & Personally Identifiable Information.
  • 28. Anonymous data supposedly can’t identify you. It can include your browsing history, purchase history, gender and postal code. Image: (überBusy, 2006)
  • 29. Valve can share this data with anyone (Valve, 2015) because it isn’t considered a threat to privacy …
  • 30. … even though there are methods that exist that can link this data back to individuals (Marwick & boyd, 2014, p. 1053; Narayanan & Shmatikov, 2010, p. 25).
  • 31. It collects this data in order to study consumer habits (Valve, 2015). Many companies do this so they can personalise their services and create targeted advertising (Brown & Muchira, 2004). Image: (Vance, 2007) Valve does not specify or give us options over what anonymous data is collected from us.
  • 32. Basically, we’re being profiled in ways we can’t see or control based on online behaviour that may not reflect who we are (van Wel & Royakkers, 2004, p. 133). Image: (Lund, 2007)
  • 33. Personally identifiable information is information volunteered by users “that can be used to uniquely identify a user such as name, address or credit card number” (Valve, 2015). Image: (Ivanushkin, 2009)
  • 34. It’s not mentioned how long Valve keeps this information. Image: (Cholet, 2011) You can ask for it to be removed from Valve’s records …
  • 35. … but the request can be denied for vague various reasons such as if the request is deemed “extremely impractical” (Valve, 2015). Image: (fdecomite, 2012)
  • 36. Government surveillance requests for customer data from tech companies is on the rise (Schechner, 2016) …
  • 37. Valve may release our information to authorities “to comply with court orders or laws”(Valve, 2015). It makes no promises to resist such requests or to notify users when they occur.
  • 38. When we’re vulnerable to scrutiny, it changes the way we act (Introna, 1997, p. 268). Image: (ep_jhu, 2010)
  • 39. Online surveillance concerns have seen 22% of American internet users change their online behaviour (Rainie & Madden, 2015).
  • 40. When we use Steam, we compromise our privacy, threatening our ability to define our actions and ourselves.
  • 42. The subscriber agreement attempts to dictate what legal measures we can take against Valve, such as insisting we forgo the right to a trial in court (Valve, 2016). Image: (brainflakes., 2008)
  • 43. These terms might not apply in some countries (Valve, 2016). Their inclusion in the agreement makes it unclear what a user’s legal rights are … Image: (Habel, 2007)
  • 44. … potentially discouraging users from defending themselves with appropriate legal action (Loos & Luzak, 2016, p. 85).
  • 46. Many of us are happy to exchange our personal information and user content for a great online service (Schumann, von Wangenheim, & Groene, 2014, p. 70). Image: (Magal, 2011) But is it fair that we’re forced to relinquish so much control in these exchanges?
  • 47. It’s in a company’s economic interest to have control over our data and content but so is maintaining the trust of their customers (Peacock, 2014, p. 7; Dean, Payne, & Landry, 2016, p. 500).
  • 48. Expressing our concerns to tech companies can help us regain power over our information and content … Image: (kunkelstein, 2007)
  • 49. … And so can better legislation. In Steam’s policies you’ll notice that European Union users are given greater consideration. This is because the EU has stricter laws governing privacy and consumer rights (Bogdan, 2015; Curtis, 2016). Image: (Allen, 2010)
  • 50. Online terms of service are “exploitative, unjust, unavoidable” and one-sided (Peacock, 2014, p. 7). But that can change.
  • 51. Learn more about online privacy and ownership issues: 
 Online Privacy: Using the Internet Safely Electronic Frontier Foundation Me and My Shadow
  • 52. References Bogdan, M. (2015). The New EU Regulation on Online Resolution for Consumer Disputes. Masaryk University Journal of Law and Technology, 9(1), 155-164. Retrieved from http://www.heinonline.org.dbgw.lis.curtin.edu.au/HOL/Page?handle=hein.journals/ mujlt9&size=2&collection=journals&id=157 Brown, M., & Muchira, R. (2004). Investigating the Relationship between Internet Privacy Concern and Online Purchase Behavior. Journal of Electronic Commerce Research, 591, 62-70. Retrieved from http://web.csulb.edu/journals/jecr/issues/20041/ Paper6.pdf Curtis, J. (2016, April 15). Your business must prepare today for 2018 EU data protection laws. IT Pro. Retrieved from http:// search.proquest.com.dbgw.lis.curtin.edu.au/docview/1787082377?accountid=10382 Dean, M. D., Payne D. M., & Landry, B. J. L., (2016). Data mining: an ethical baseline for online privacy policies. Journal of Enterprise Information Management, 29(4), 482 – 504. DOI: 10.1108/JEIM-04-2014-0040 Good, O. (2011, November 11). The Steam forums are back online. Kotaku. Retrieved from http://kotaku.com/tag/steam-hack Grill, S. (2015, December 30). Steam hack affected 34, 000 users, Valve issues statement on Christmas DOS attack. Inquisitr. Retrieved from http://www.inquisitr.com/2669168/steam-hack-affected-34k-users-valve-issues-statement-on-christmas-dos- attack/ Introna, L. D. (1997). Privacy and the computer: why we need privacy in the information society. Metaphilosophy, 28(3), 259-275. DOI: 10.1111/1467-9973.00055 Loos, M., & Luzak, J. (2016). Wanted: A bigger stick. On unfair terms in consumer contracts with online service providers. Journal of Consumer Policy, 39, 63-90. DOI 10.1007/s10603-015-9303-7 Marwick, A. E., & boyd, d. (2014). Networked privacy: How teenagers negotiate context in social media. New Media & Society, 16(7), 1051-1067. Retrieved from http://nms.sagepub.com.dbgw.lis.curtin.edu.au/content/16/7/1051 McDonald, A. M., & Cranor, L. F. (2008). The cost of reading privacy policies. I/S: A Journal of Law and Policy for the Information Society, 4(3), 543-568. Retrieved from http://www.heinonline.org.dbgw.lis.curtin.edu.au/HOL/Index?index=journals %2Fisjlpsoc&collection=journals Narayanan, A., & Shmatikov, V. (2010). Myths and fallacies of "Personally Identifiable Information". Communications of the ACM, 53(6), 24-26. DOI: 10.1145/1743546.1743558
  • 53. Nutt, C. (2015, December 17). French consumer group sues Valve over Steam policies. Gamasutra. Retrieved from http:// www.gamasutra.com/view/news/262203/French_consumer_group_sues_Valve_over_Steam_policies.php Peacock, S. E. (2014). How web tracking changes user agency in the age of Big Data: The used user. Big Data & Society, 1(2), 1-11. DOI: 10.1177/2053951714564228 Rainie, L., & Madden, M. (2015, March 16). How people are changing their own behaviour. Pew Research Center. Retrieved from http://www.pewinternet.org/2015/03/16/how-people-are-changing-their-own-behavior/ Reidenberg, J. R., Breaux, T., Cranor, L. F., French, B., Grannis, A., Graves, J. T., Liu, F., McDonald, A., Norton, T. B., Ramanath, R. Russell, N. C., Sadeh, N., & Schaub, F. (2015). Disagreeable privacy policies: Mismatches between meaning and users’ understanding. Berkeley Technology Law Journal, 30(1), 39-88. Retrieved from http:// search.ebscohost.com.dbgw.lis.curtin.edu.au/login.aspx?direct=true&db=bth&AN=109230960&site=ehost-live Saed, S. (2015, February 24). Steam has over 125 million active users, 8.9M concurrent peak. VG24/7. Retrieved from http:// www.vg247.com/2015/02/24/steam-has-over-125-million-active-users-8-9m-concurrent-peak/ Schumann, J. H., von Wangenheim, F., & Groene, N. (2014, January). Targeted online advertising: Using reciprocity appeals to increase acceptance among users of free web services. Journal of Marketing, 78, 59-75. DOI: 10.1509/jm.11.0316 Schechner, S. (2016, January 20). U.S. tech companies bring encryption battle to Davos; Some executives are pushing governments for new system to handle cross-border data requests. Wall Street. Retrieved from http:// search.proquest.com.dbgw.lis.curtin.edu.au/docview/1758323073?accountid=10382 Valve. (2015, March 24). Privacy policy agreement. Retrieved from http://store.steampowered.com/privacy_agreement/ Valve. (2016, January 1). Steam subscriber agreement. Retrieved from http://store.steampowered.com/subscriber_agreement/ van Wel, L., & Royakkers, L. (2004). Ethical issues in web data mining. Ethics and Information Technology, 6, 129-140. DOI: 10.1023/B:ETIN.0000047476.05912.3d Wong, C. (2013). Can Bruce Willis leave his iTunes collection to his children?: Inheritability of digital media in the face of EULAs. Technology Law Journal, 29(4), 703-761. Retrieved from http://search.proquest.com.dbgw.lis.curtin.edu.au/docview/ 1400169319?accountid=10382
  • 54. Images Aguado, A. G. (2011, November 16). New glasses [Digital image]. Retrieved from https://flic.kr/p/aFcWS8 Berge, C-H. (2010, June 5). Shaking hands [Digital image]. Retrieved from https://flic.kr/p/87KMxT Allen, R. (2010, March 13). Themis [Digital image]. Retrieved from https://flic.kr/p/7LxCKN brainflakes.. (2008, July 19). Arms crossed [Digital image]. Retrieved from https://flic.kr/p/5f9etL Cholet, D. (2011, January 20). Calendar* [Digital image]. Retrieved from https://flic.kr/p/9bUbH3 CollegeDegrees360. (2012, July 12). Confused [Digital image]. Retrieved from https://flic.kr/p/cEJMpW ep_jhu. (2010, April 18). Surveillance [Digital image]. Retrieved from https://flic.kr/p/7VibC7 fdecomite. (2012, July 27). Signs [Digital image]. Retrieved from https://flic.kr/p/cFgqPG Gratz, J. (2006). Courtroom one gavel [Digital image]. Retrieved from https://flic.kr/p/bkUna Habel, C. (2007, July 8). let the day begin [Digital image]. Retrieved from https://flic.kr/p/2BND3v Indruch, L. (2009, April 4). broken screen [Digital image]. Retrieved from https://flic.kr/p/6df6Wx Ivanushkin, E. (2009, July 12). Credit card [Digital image]. Retrieved from https://flic.kr/p/6Eh3zg James, S. (2013, June 14). chain [Digital image]. Retrieved from https://flic.kr/p/eMHinV Kit. (2007, August 19). The worlds greatest detective [Digital image]. Retrieved from https://flic.kr/p/2NJxPz kunkelstein. (2007, November 28). Anger. [Digital image]. Retrieved from https://flic.kr/p/4bMzdr Lund, G. (2007, February 11). Mirror [Digital image]. Retrieved from https://flic.kr/p/5VFkBX Magal, A. (2011, April 22). Vintage cash register [Digital image]. Retrieved from https://flic.kr/p/9K6tTu Paz, J. (2010, February 2). Chocolate cake [Digital image]. Retrieved from https://flic.kr/p/7AuNkn
  • 55. The Preiser Project. (2014, January 23). Hacker [Digital image]. Retrieved from https://flic.kr/p/jrrmeP überBusy. (2006, July 13). hiding [Digital image]. Retrieved from https://flic.kr/p/hGS8R Vance, J. (2007, July 1). Target [Digital image]. Retrieved from https://flic.kr/p/27szGU Wickramanayaka, U. (2014). time [Digital image]. Retrieved from https://flic.kr/p/rs7QVi Licenses The following images were used under a Creative Commons Attribution-NonCommercial 2.0 Generic license: Anger., Arms crossed, broken screen, chain, Chocolate cake, hiding, let the day begin, Mirror, New glasses, Surveillance, The worlds greatest detective, Themis, timeTarget, Vintage cash register. The following images were used under a Creative Commons Attribution-ShareAlike 2.0 Generic license: Confused, Credit card. The following images were used under a Creative Commons Attribution 2.0 Generic license: Calendar*, Hacker, Signs. This presentation has been created as part of an assignment for the unit NET303, provided by Curtin University. All media cited in this presentation remains the property and copyright of the respective rights holders. Any copyrighted content has been used legally under Australian Fair Dealing for the purposes of criticism and review. All original content is released under a Creative Commons Attribution-ShareAlike 4.0 International license.