SlideShare une entreprise Scribd logo
1  sur  27
Télécharger pour lire hors ligne
Internet Privacy:
Does it Truly Exist?
By: Kristen Toso
Image: rosipaw
Today, there are over 2.5 billion Internet users worldwide.
With over 7 billion people in the world, that means that
approximately 36% are using the Internet.
Source: Internet World Stats
Image: johnlemon
That’s a lot of people with, consequently,
a lot of personal data.
Image: Leo Reynolds
Image: Simon (via Pixabay)
...always under the
assumption that their
privacy rights are being
respected.
Image: Nina Strelov (via Fotopedia)
However, throughout the Internet’s history, there have
been a number of privacy scandals that have shaken
users’trust.
Image: Wikimedia Commons
Violations of Internet privacy can happen to
anyone at any time, regardless of age, level of
digital literacy, wealth, or any other factor...
Image: Wikimedia Commons
...which begs the following questions:
Can information be kept truly personal on the Internet?
Or, is Internet privacy simply an oxymoron?
Image:jamingray
Image: esthervargasc
Today’s social media
platforms, online
shopping websites,
financial services, and
other such sites provide
users with privacy
settings in an attempt to
protect their personal
information.
Image:chiarashine
Even with these privacy settings, information can easily
be acquired and used without user permission by
different groups, including:
The more transparent users are in their online
profiles, the better that advertisers and corporations
can target them with products and services.
Source: Film 260 Lecture 02: i-Friends
Image: Wikimedia Commons
“...Google Glass opens an entirely new front in the digital war
against privacy. These spectacles [...] represent a developmental
leap in the history of data that is comparable to moving from
the bicycle to the automobile...
...It is the sort of radical transformation that may actually end up
completely destroying our individual privacy in the digital 21st century.”
- Andrew Keen, CNN
Image: Wikimedia Commons
“People say very personal
information to Siri [...] They are
encouraged to think of Siri as
their confidante and their
assistant...
...But Siri is not just working for
you. Siri is collecting a lot of data
for Apple and for its business...
...And people should be very
mindful and aware of what’s
happening to their personal
information...
- Nicole Ozer, Lawyer (ACLU)
Image: MattsMacintosh
Scams, phishing and fraud are examples of ways that
criminals can steal information from Internet users,
which can have detrimental consequences.
Image: pallotron
Top continents from
which online fraud
originated from (2012):
1. Africa
2. Asia
3. South Amerca
4. Europe
5. North America
The most commonly targeted online services:
Retail, online dating, financial, gambling and travel.
Source: Iovation
Image: Simon Tong (via smugmug.com)
IP addresses, emails and social media activity can
potentially be obtained by the government under
court rulings to closely monitor civilians.
Image: neeravbhatt
“Twitter, Facebook and other social media outlets have a great deal of
information about all of us — and the government wants to be able to
see it...
[...] the government scored a major win — and Internet privacy lost big —
when a judge ruled against Twitter in a fight over a trove of information
about [Malcolm Harris,] a political activist.”
- Adam Cohen, TIME
Image: Wikimedia Commons
Image: araenae (via Deviantart)
In 2012, 849 requests were
made by governments all
over the world to obtain
Twitter user information, with
80% of them being from the
United States alone.
Source: Twitter Transparency Report
Image: Wikimedia Commons
Users cannot assume
that privacy settings
are protecting their
precious information.
Evidently, despite the belief that privacy exists, there is a real risk
involved with sharing personal information on the Internet.
Image: wallpapers-mobilewallpapers.blogspot.ca
Given this, there are preventive measures that
you can take in order to protect yourself and
your personal information on the Internet:
in order to become more digitally-savvy.
Share Internet privacy tips with friends and family.
Image: Wikimedia Commons
Image: Zomerstorm
Think critically about what you are sharing, where you are
sharing it, and who could potentially have access to it.
Image: Lip Kee
“A long-overdue bill in the
California legislature,
“The Right to Know Act,”
would force companies such
as Google and Facebook
to reveal what personal
information they have collected
and how it’s being used.”
- Adam Cohen, TIME
Know, and fight for, your rights.
Even with these pre-emptive measures, it is difficult to
think that information can ever be private on the
Internet; as the saying goes...
Image: Chrisser
Image: Horia Varlan
What does the future hold
for Internet privacy?
Credits
All images are licensed under the Creative
Commons Non-Commercial Share-Alike 3.0
agreement and, unless otherwise specified,
are sourced from Flickr.
References

Contenu connexe

Tendances

Big Data and Privacy
Big Data and PrivacyBig Data and Privacy
Big Data and Privacymjsale781
 
Aral Balkan - The Universal Declaration of Cyborg Rights
Aral Balkan - The Universal Declaration of Cyborg RightsAral Balkan - The Universal Declaration of Cyborg Rights
Aral Balkan - The Universal Declaration of Cyborg RightsUX Lausanne
 
Ethical, Social And Political Issues Raised By E Commerce
Ethical, Social And Political Issues Raised By E CommerceEthical, Social And Political Issues Raised By E Commerce
Ethical, Social And Political Issues Raised By E CommerceNicholas Davis
 
Great Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLIGreat Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLIJames Bollen
 
The Future of Moral Persuasion in Games, AR, AI Bots, and Self Trackers by Sh...
The Future of Moral Persuasion in Games, AR, AI Bots, and Self Trackers by Sh...The Future of Moral Persuasion in Games, AR, AI Bots, and Self Trackers by Sh...
The Future of Moral Persuasion in Games, AR, AI Bots, and Self Trackers by Sh...Sherry Jones
 
08 Ethics, Law and E-commerce
08 Ethics, Law and E-commerce08 Ethics, Law and E-commerce
08 Ethics, Law and E-commercemonchai sopitka
 
Digital citizin reem
Digital citizin reemDigital citizin reem
Digital citizin reemguest762e907
 
Digital citizin reem
Digital citizin reemDigital citizin reem
Digital citizin reemguest5cb43a
 
Should Government Control Internet and Its Content.
Should Government Control Internet and Its Content.Should Government Control Internet and Its Content.
Should Government Control Internet and Its Content.Joel D'souza
 
Malcolm Crompton I I S Frocomm Web 2 O In Govt 24 June 2009
Malcolm  Crompton  I I S  Frocomm  Web 2 O In  Govt  24  June 2009Malcolm  Crompton  I I S  Frocomm  Web 2 O In  Govt  24  June 2009
Malcolm Crompton I I S Frocomm Web 2 O In Govt 24 June 2009Frocomm Australia
 
The WikiLeaks Conundrum
The WikiLeaks ConundrumThe WikiLeaks Conundrum
The WikiLeaks ConundrumMsifry
 
Special topics
Special topicsSpecial topics
Special topicsaivarose
 
NILAKSHI ppt on should government control internet and its content
NILAKSHI ppt on should government control internet and its contentNILAKSHI ppt on should government control internet and its content
NILAKSHI ppt on should government control internet and its contentnilakshisharma9
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenshiptakahe2
 

Tendances (20)

Big Data and Privacy
Big Data and PrivacyBig Data and Privacy
Big Data and Privacy
 
Aral Balkan - The Universal Declaration of Cyborg Rights
Aral Balkan - The Universal Declaration of Cyborg RightsAral Balkan - The Universal Declaration of Cyborg Rights
Aral Balkan - The Universal Declaration of Cyborg Rights
 
Wisekey kamp
Wisekey kampWisekey kamp
Wisekey kamp
 
Ethical, Social And Political Issues Raised By E Commerce
Ethical, Social And Political Issues Raised By E CommerceEthical, Social And Political Issues Raised By E Commerce
Ethical, Social And Political Issues Raised By E Commerce
 
Lawek mui
Lawek muiLawek mui
Lawek mui
 
Cyber law1
Cyber law1Cyber law1
Cyber law1
 
Great Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLIGreat Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLI
 
The Future of Moral Persuasion in Games, AR, AI Bots, and Self Trackers by Sh...
The Future of Moral Persuasion in Games, AR, AI Bots, and Self Trackers by Sh...The Future of Moral Persuasion in Games, AR, AI Bots, and Self Trackers by Sh...
The Future of Moral Persuasion in Games, AR, AI Bots, and Self Trackers by Sh...
 
08 Ethics, Law and E-commerce
08 Ethics, Law and E-commerce08 Ethics, Law and E-commerce
08 Ethics, Law and E-commerce
 
Digital citizin reem
Digital citizin reemDigital citizin reem
Digital citizin reem
 
Digital citizin reem
Digital citizin reemDigital citizin reem
Digital citizin reem
 
Ethics, Law, and E-commerce
Ethics, Law, and E-commerceEthics, Law, and E-commerce
Ethics, Law, and E-commerce
 
Should Government Control Internet and Its Content.
Should Government Control Internet and Its Content.Should Government Control Internet and Its Content.
Should Government Control Internet and Its Content.
 
Malcolm Crompton I I S Frocomm Web 2 O In Govt 24 June 2009
Malcolm  Crompton  I I S  Frocomm  Web 2 O In  Govt  24  June 2009Malcolm  Crompton  I I S  Frocomm  Web 2 O In  Govt  24  June 2009
Malcolm Crompton I I S Frocomm Web 2 O In Govt 24 June 2009
 
Software Piracy
Software PiracySoftware Piracy
Software Piracy
 
The WikiLeaks Conundrum
The WikiLeaks ConundrumThe WikiLeaks Conundrum
The WikiLeaks Conundrum
 
Special topics
Special topicsSpecial topics
Special topics
 
Cybertort Imp Slides For Pub. Internet
Cybertort Imp Slides For Pub. InternetCybertort Imp Slides For Pub. Internet
Cybertort Imp Slides For Pub. Internet
 
NILAKSHI ppt on should government control internet and its content
NILAKSHI ppt on should government control internet and its contentNILAKSHI ppt on should government control internet and its content
NILAKSHI ppt on should government control internet and its content
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 

En vedette

TEDx Rhein-Main Michael Altendorf February 2011 - Virtual Identity and the en...
TEDx Rhein-Main Michael Altendorf February 2011 - Virtual Identity and the en...TEDx Rhein-Main Michael Altendorf February 2011 - Virtual Identity and the en...
TEDx Rhein-Main Michael Altendorf February 2011 - Virtual Identity and the en...Michael Altendorf
 
All Up In Your Face (Book):   Virtual Identity Management For Teens And You...
All Up In Your Face (Book): Virtual Identity Management For Teens And You...All Up In Your Face (Book): Virtual Identity Management For Teens And You...
All Up In Your Face (Book):   Virtual Identity Management For Teens And You...Erin Dorney
 
Privacy On The Internet
Privacy On The InternetPrivacy On The Internet
Privacy On The Internetapemberton1
 
Internet Privacy: Time to Rethink?
Internet Privacy: Time to Rethink?Internet Privacy: Time to Rethink?
Internet Privacy: Time to Rethink?Jonathan Reichental
 
Internet Privacy Presentation (In Service)
Internet Privacy Presentation (In Service)Internet Privacy Presentation (In Service)
Internet Privacy Presentation (In Service)Bonnie Brzozowski
 
Privacy with Internet
Privacy with InternetPrivacy with Internet
Privacy with InternetMathias Klang
 

En vedette (7)

INTERNET PRIVACY
INTERNET PRIVACYINTERNET PRIVACY
INTERNET PRIVACY
 
TEDx Rhein-Main Michael Altendorf February 2011 - Virtual Identity and the en...
TEDx Rhein-Main Michael Altendorf February 2011 - Virtual Identity and the en...TEDx Rhein-Main Michael Altendorf February 2011 - Virtual Identity and the en...
TEDx Rhein-Main Michael Altendorf February 2011 - Virtual Identity and the en...
 
All Up In Your Face (Book):   Virtual Identity Management For Teens And You...
All Up In Your Face (Book): Virtual Identity Management For Teens And You...All Up In Your Face (Book): Virtual Identity Management For Teens And You...
All Up In Your Face (Book):   Virtual Identity Management For Teens And You...
 
Privacy On The Internet
Privacy On The InternetPrivacy On The Internet
Privacy On The Internet
 
Internet Privacy: Time to Rethink?
Internet Privacy: Time to Rethink?Internet Privacy: Time to Rethink?
Internet Privacy: Time to Rethink?
 
Internet Privacy Presentation (In Service)
Internet Privacy Presentation (In Service)Internet Privacy Presentation (In Service)
Internet Privacy Presentation (In Service)
 
Privacy with Internet
Privacy with InternetPrivacy with Internet
Privacy with Internet
 

Similaire à Does Internet Privacy Truly Exist

Similaire à Does Internet Privacy Truly Exist (14)

WCCC Faculty Presentation
WCCC Faculty PresentationWCCC Faculty Presentation
WCCC Faculty Presentation
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacy
 
Cyber Crime Essay
Cyber Crime EssayCyber Crime Essay
Cyber Crime Essay
 
Democracy2 IPMA Jan 12 2010
Democracy2 IPMA Jan 12 2010Democracy2 IPMA Jan 12 2010
Democracy2 IPMA Jan 12 2010
 
Internet Privacy Essay
Internet Privacy EssayInternet Privacy Essay
Internet Privacy Essay
 
The Role of Social Media in Da'awah
The Role of Social Media in Da'awahThe Role of Social Media in Da'awah
The Role of Social Media in Da'awah
 
Privacy reconsidered
Privacy reconsideredPrivacy reconsidered
Privacy reconsidered
 
Moldova Open Data Journalism Workshop
Moldova Open Data Journalism WorkshopMoldova Open Data Journalism Workshop
Moldova Open Data Journalism Workshop
 
Essays On Cyber Crime
Essays On Cyber CrimeEssays On Cyber Crime
Essays On Cyber Crime
 
Towards a More Open World
Towards a More Open WorldTowards a More Open World
Towards a More Open World
 
Data:The Fine Balance.We Trade Privacy for Convenience and Security.
Data:The Fine Balance.We Trade Privacy for Convenience and Security.Data:The Fine Balance.We Trade Privacy for Convenience and Security.
Data:The Fine Balance.We Trade Privacy for Convenience and Security.
 
Big data, a city of things and civic innovation
Big data, a city of things and civic innovationBig data, a city of things and civic innovation
Big data, a city of things and civic innovation
 
Cybercrime an international-crisis
Cybercrime an international-crisisCybercrime an international-crisis
Cybercrime an international-crisis
 
Cybercrime an international-crisis
Cybercrime an international-crisisCybercrime an international-crisis
Cybercrime an international-crisis
 

Dernier

Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 

Dernier (20)

Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 

Does Internet Privacy Truly Exist

  • 1. Internet Privacy: Does it Truly Exist? By: Kristen Toso Image: rosipaw
  • 2. Today, there are over 2.5 billion Internet users worldwide. With over 7 billion people in the world, that means that approximately 36% are using the Internet. Source: Internet World Stats Image: johnlemon
  • 3. That’s a lot of people with, consequently, a lot of personal data. Image: Leo Reynolds
  • 4. Image: Simon (via Pixabay)
  • 5. ...always under the assumption that their privacy rights are being respected. Image: Nina Strelov (via Fotopedia)
  • 6. However, throughout the Internet’s history, there have been a number of privacy scandals that have shaken users’trust. Image: Wikimedia Commons
  • 7. Violations of Internet privacy can happen to anyone at any time, regardless of age, level of digital literacy, wealth, or any other factor... Image: Wikimedia Commons
  • 8. ...which begs the following questions: Can information be kept truly personal on the Internet? Or, is Internet privacy simply an oxymoron? Image:jamingray
  • 9. Image: esthervargasc Today’s social media platforms, online shopping websites, financial services, and other such sites provide users with privacy settings in an attempt to protect their personal information.
  • 10. Image:chiarashine Even with these privacy settings, information can easily be acquired and used without user permission by different groups, including:
  • 11. The more transparent users are in their online profiles, the better that advertisers and corporations can target them with products and services. Source: Film 260 Lecture 02: i-Friends Image: Wikimedia Commons
  • 12. “...Google Glass opens an entirely new front in the digital war against privacy. These spectacles [...] represent a developmental leap in the history of data that is comparable to moving from the bicycle to the automobile... ...It is the sort of radical transformation that may actually end up completely destroying our individual privacy in the digital 21st century.” - Andrew Keen, CNN Image: Wikimedia Commons
  • 13. “People say very personal information to Siri [...] They are encouraged to think of Siri as their confidante and their assistant... ...But Siri is not just working for you. Siri is collecting a lot of data for Apple and for its business... ...And people should be very mindful and aware of what’s happening to their personal information... - Nicole Ozer, Lawyer (ACLU) Image: MattsMacintosh
  • 14. Scams, phishing and fraud are examples of ways that criminals can steal information from Internet users, which can have detrimental consequences. Image: pallotron
  • 15. Top continents from which online fraud originated from (2012): 1. Africa 2. Asia 3. South Amerca 4. Europe 5. North America The most commonly targeted online services: Retail, online dating, financial, gambling and travel. Source: Iovation Image: Simon Tong (via smugmug.com)
  • 16. IP addresses, emails and social media activity can potentially be obtained by the government under court rulings to closely monitor civilians. Image: neeravbhatt
  • 17. “Twitter, Facebook and other social media outlets have a great deal of information about all of us — and the government wants to be able to see it... [...] the government scored a major win — and Internet privacy lost big — when a judge ruled against Twitter in a fight over a trove of information about [Malcolm Harris,] a political activist.” - Adam Cohen, TIME Image: Wikimedia Commons
  • 18. Image: araenae (via Deviantart) In 2012, 849 requests were made by governments all over the world to obtain Twitter user information, with 80% of them being from the United States alone. Source: Twitter Transparency Report
  • 19. Image: Wikimedia Commons Users cannot assume that privacy settings are protecting their precious information. Evidently, despite the belief that privacy exists, there is a real risk involved with sharing personal information on the Internet.
  • 20. Image: wallpapers-mobilewallpapers.blogspot.ca Given this, there are preventive measures that you can take in order to protect yourself and your personal information on the Internet:
  • 21. in order to become more digitally-savvy. Share Internet privacy tips with friends and family. Image: Wikimedia Commons
  • 22. Image: Zomerstorm Think critically about what you are sharing, where you are sharing it, and who could potentially have access to it.
  • 23. Image: Lip Kee “A long-overdue bill in the California legislature, “The Right to Know Act,” would force companies such as Google and Facebook to reveal what personal information they have collected and how it’s being used.” - Adam Cohen, TIME Know, and fight for, your rights.
  • 24. Even with these pre-emptive measures, it is difficult to think that information can ever be private on the Internet; as the saying goes... Image: Chrisser
  • 25. Image: Horia Varlan What does the future hold for Internet privacy?
  • 26. Credits All images are licensed under the Creative Commons Non-Commercial Share-Alike 3.0 agreement and, unless otherwise specified, are sourced from Flickr.