SlideShare une entreprise Scribd logo
1  sur  25
Télécharger pour lire hors ligne
Meghan Wilson
Film 260 - Spring 2016
Your smart devices share
more than you think
Photo from picjumbo.com byViktor Hanacek
When was the last time
were without your phone?
you
Photo from picjumbo.com byViktor Hanacek
90% of surveyed cell-phone
owners say that their phone is
frequently with them, (Rainie & Zickuhr, 2015)
Photo from picjumbo.com byViktor Hanacek
Photo from Kaboompics.com
31% say they
never turn their phone
off
45%
say they rarely turn it
off. (Rainie & Zickuhr, 2015)
Photo from Kaboompics.com
Carrying a cell phone
with location
capabilities makes it
easy for app developers
to make a quick profit
off your personal
information
Studies show that when
an app requests location
Photo from picjumbo.com byViktor Hanacek
of the time it shares
the information with
an advertising network
(Dwoskin, 2015)
73%
Photo from picjumbo.com byViktor Hanacek
Marketers pay
10% to 20% more
for online ads that include
location information
- Greg Stuart
(Chief executive of the Mobile
Marketing Association)
(Dwoskin, 2015)
Pre-installed
apps on
smartphones
have been
shown to share
some of the
most location
data
(Dwoskin, 2015)
Photo from Flickr.com by Ryan Wick. CC Licence: http://creativecommons.org/licenses/by/2.0/
Apps ask for access to
location and microphone
to share even more information
to share with its partners
(Golbeck, 2014)
Photo from Flickr.com by Ernest Duffoo. CC Licence: http://creativecommons.org/licenses/by/2.0/
Photo from picjumbo.com byViktor Hanacek
More than 90%
of Americans feel
they’ve lost
control over their
personal data
(Dwoskin, 2015)
...yet few are
doing anything
to protect
themselves...
46% of smartphone users said that they
“couldn’t live without”
their devices (Smith, 2015)
Photo from picjumbo.com byViktor Hanacek
It is estimated that soon
45% of consumers will
wear a smartwatch (Cole, 2015)
Photo from Flickr.com by Bram Hilgersom. CC Licence: http://creativecommons.org/licenses/by/2.0/
developers are determined
to create devices that fit
seamlessly into our lives
and are easy to use for
children, adults and
seniors (Rhew, 2016)
Photo from Flickr.com by Chris Combe. CC Licence: http://creativecommons.org/licenses/by/2.0/
“Where we are with wearables
is about where we were with
the Internet in 1993”
-Amanda Parkes (chief of technology and
research at Manufacture New York)
(Postrel, 2016)
Photo from Flickr.com by Alvin Chow. CC Licence: http://creativecommons.org/licenses/by/2.0/
Photo from Flickr.com by Daniel Novta. CC Licence: http://creativecommons.org/licenses/by/2.0/
We are already
sharing more
information than
many of us want
to...
Photo from picjumbo.com byViktor Hanacek
Most wearables are
not stand-alone devices
and transmit information back-
and-forth to a nearby smartphone
Transmitting information
can leave the user open
to risks of data
interception
(Mansfield, 2016)
Photo from Flickr.com by Robert Bejil. CC Licence: http://creativecommons.org/licenses/by/2.0/
There is a need for new security
policies surrounding smart wearables to
protect sensitive personal
and company information
Photo from Flickr.com by American Tobacco. CC Licence: http://creativecommons.org/licenses/by/2.0/
Wearables can track:
step-counts
breathing
stress levels
heart rate
and can sense
chronic illnesses
Photo from Flickr.com by Alex Graves. CC Licence: http://creativecommons.org/licenses/by/2.0/
Health insurance
companies are
researching ways that
they could use this
data in the future
when creating risk-
profiles (Olson, 2014)
Photo from Flickr.com by Imanka. CC Licence: http://creativecommons.org/licenses/by/2.0/
The sharing of personal
information is approaching a
grey area
Photo from Flickr.com by Arlanta. CC Licence: http://creativecommons.org/licenses/by/2.0/
In 2011 Fitbit made
all data collected public
by default and released
scores of personal data for
anyone to see (Sparkes, 2015)
Photo from Flickr.com by Overduebook. CC Licence: http://creativecommons.org/licenses/by/2.0/
Smart technology
is entering the
home at an
exponential
rate,
which only opens
the door to more
privacy breaches
Photo from Flickr.com by James Sann. CC Licence: http://creativecommons.org/licenses/by/2.0
“If you control your garage door,
your heating and your fridge from
your smartphone, expect that
someone else could get
control of them, too”
-Scott Wright (cybersecurity expert)
(Fraser, 2016)
Photo from Flickr.com byWonderlane. CC Licence: http://creativecommons.org/licenses/by/2.0
Cole, S. (2015, March 12). How the AppleWatchWill Chnage Office Life. Retrieved from Fast Company:
http://www.fastcompany.com/3043533/the-future-of-work/how-the-apple-watch-will-change-office-life
Dwoskin, E. (2015, March 23). WhereWereYou 3 Minutes Ago?Your Apps Know. Retrieved fromThe Wall Street Journal:
http://blogs.wsj.com/digits/2015/03/23/where-were-you-3-minutes-ago-your-apps-know/?mod=LS1
Fraser, L. (2016, February 1). Connected devices quietly mine our data, privacy experts say. Retrieved from CBC News:
http://www.cbc.ca/news/technology/privacy-data-1.3426634
Golbeck, J. (2014, January 28). Track Star. Retrieved from Slate:
http://www.slate.com/articles/technology/future_tense/2014/01/ibeacon_shopkick_privacy_policies_for_location_tracking_apps_aren_t_cl
ear.single.html
Mansfield, M. (2016, February 18). CanWearableTechnologyThreaten the Cyber Seurity ofYour Business. Retrieved from Small Business Trends:
http://smallbiztrends.com/2016/02/wearable-technology-security-issues.html
Olson, P. (2014, June 19). WearableTech is Plugging Into Health Insurance. Retrieved from Forbes:
http://www.forbes.com/sites/parmyolson/2014/06/19/wearable-tech-health-insurance/#53668c105ba1
Postrel,V. (2016, March 3). Why Nobody'sWearingWearables. Retrieved from BloombergView:
http://www.bloomberg.com/view/articles/2016-03-03/why-nobody-s-wearing-wearables
Rainie, L., & Zickuhr, K. (2015,August 26). Americans'Views on Mobile Etiquette. Retrieved from Pew Research Center:
http://www.pewinternet.org/2015/08/26/americans-views-on-mobile-etiquette/
Rhew, D. D. (2016). Welcome Home:The Health Hub of the Future. Retrieved from Insights: https://insights.samsung.com/2016/03/24/welcome-
home-the-health-hub-of-the-future/
Smith,A. (2015,April 1). U.S. Smartphone Use in 2015. Retrieved from Pew Research Center: http://www.pewinternet.org/2015/04/01/us-
smartphone-use-in-2015/
Sparkes, M. (2015, February 10). Is smart technology really a threat to our privacy? Retrieved fromThe Telegraoh:
http://www.telegraph.co.uk/technology/news/11403494/Is-smart-technology-really-a-threat-to-our-privacy.html
Works Cited:
Photo from picjumbo.com byViktor Hanacek

Contenu connexe

Tendances

Quantity over Quality: The World Of Personal Data
Quantity over Quality: The World Of Personal DataQuantity over Quality: The World Of Personal Data
Quantity over Quality: The World Of Personal DataCaroline Witzel
 
Film 260 flipbook
Film 260 flipbookFilm 260 flipbook
Film 260 flipbookChuyun Xu
 
WEARABLES: THE GOOD, THE BAD, & THEY'RE UGLY
WEARABLES: THE GOOD, THE BAD, & THEY'RE UGLYWEARABLES: THE GOOD, THE BAD, & THEY'RE UGLY
WEARABLES: THE GOOD, THE BAD, & THEY'RE UGLYOlivia Charlebois
 
Should Mobile Devices be Considered the New It Drug?
Should Mobile Devices be Considered the New It Drug?Should Mobile Devices be Considered the New It Drug?
Should Mobile Devices be Considered the New It Drug?johannaazis
 
Film260 Flipbook
Film260 Flipbook Film260 Flipbook
Film260 Flipbook colbyyco
 
Mobilities Throughout The Ages
Mobilities Throughout The AgesMobilities Throughout The Ages
Mobilities Throughout The Agesrebeccajmckee
 
Film 260 flipbook brad byron
Film 260 flipbook brad byron Film 260 flipbook brad byron
Film 260 flipbook brad byron Brad Byron
 
There’s An App For That
There’s An App For ThatThere’s An App For That
There’s An App For That8anr
 
Cheng jessica flipbook_film260
Cheng jessica flipbook_film260Cheng jessica flipbook_film260
Cheng jessica flipbook_film260Jessica Cheng
 
The Digital Divide Seniors Face
The Digital Divide Seniors FaceThe Digital Divide Seniors Face
The Digital Divide Seniors FaceFILMKLAZ
 
Think Twice Before You Post
Think Twice Before You Post Think Twice Before You Post
Think Twice Before You Post Melissa Perruzza
 
Mobile Privacy in the Digital Age
Mobile Privacy in the Digital AgeMobile Privacy in the Digital Age
Mobile Privacy in the Digital Agehelena_wade
 
The web you were used to is gone. Architecture and strategy for your content.
The web you were used to is gone. Architecture and strategy for your content.The web you were used to is gone. Architecture and strategy for your content.
The web you were used to is gone. Architecture and strategy for your content.Alberta Soranzo
 
The Internet of Things
The Internet of ThingsThe Internet of Things
The Internet of ThingsEmily Cehic
 

Tendances (20)

Quantity over Quality: The World Of Personal Data
Quantity over Quality: The World Of Personal DataQuantity over Quality: The World Of Personal Data
Quantity over Quality: The World Of Personal Data
 
Film 260 flipbook
Film 260 flipbookFilm 260 flipbook
Film 260 flipbook
 
Digitally Distracted
Digitally DistractedDigitally Distracted
Digitally Distracted
 
WEARABLES: THE GOOD, THE BAD, & THEY'RE UGLY
WEARABLES: THE GOOD, THE BAD, & THEY'RE UGLYWEARABLES: THE GOOD, THE BAD, & THEY'RE UGLY
WEARABLES: THE GOOD, THE BAD, & THEY'RE UGLY
 
Should Mobile Devices be Considered the New It Drug?
Should Mobile Devices be Considered the New It Drug?Should Mobile Devices be Considered the New It Drug?
Should Mobile Devices be Considered the New It Drug?
 
Film260 Flipbook
Film260 Flipbook Film260 Flipbook
Film260 Flipbook
 
Why choose m commerce
Why choose m commerceWhy choose m commerce
Why choose m commerce
 
Mobilities Throughout The Ages
Mobilities Throughout The AgesMobilities Throughout The Ages
Mobilities Throughout The Ages
 
Film 315 Presentation
Film 315 PresentationFilm 315 Presentation
Film 315 Presentation
 
Film 315 slides
Film 315 slidesFilm 315 slides
Film 315 slides
 
Film 260 flipbook brad byron
Film 260 flipbook brad byron Film 260 flipbook brad byron
Film 260 flipbook brad byron
 
There’s An App For That
There’s An App For ThatThere’s An App For That
There’s An App For That
 
Too Young?
Too Young?Too Young?
Too Young?
 
connections
connectionsconnections
connections
 
Cheng jessica flipbook_film260
Cheng jessica flipbook_film260Cheng jessica flipbook_film260
Cheng jessica flipbook_film260
 
The Digital Divide Seniors Face
The Digital Divide Seniors FaceThe Digital Divide Seniors Face
The Digital Divide Seniors Face
 
Think Twice Before You Post
Think Twice Before You Post Think Twice Before You Post
Think Twice Before You Post
 
Mobile Privacy in the Digital Age
Mobile Privacy in the Digital AgeMobile Privacy in the Digital Age
Mobile Privacy in the Digital Age
 
The web you were used to is gone. Architecture and strategy for your content.
The web you were used to is gone. Architecture and strategy for your content.The web you were used to is gone. Architecture and strategy for your content.
The web you were used to is gone. Architecture and strategy for your content.
 
The Internet of Things
The Internet of ThingsThe Internet of Things
The Internet of Things
 

En vedette

Be careful, the cut off snake heads will bite!
Be careful, the cut off snake heads will bite!Be careful, the cut off snake heads will bite!
Be careful, the cut off snake heads will bite!Tina Luo
 
ASHIM MALLICKCURRICULUMVITAEwithphoto - Copy
ASHIM MALLICKCURRICULUMVITAEwithphoto - CopyASHIM MALLICKCURRICULUMVITAEwithphoto - Copy
ASHIM MALLICKCURRICULUMVITAEwithphoto - CopyASHIM MALLICK
 
Opera Master Prop Sheet V1.xlsx - Gianni Schicci Props List(3)
Opera Master Prop Sheet V1.xlsx - Gianni Schicci Props List(3)Opera Master Prop Sheet V1.xlsx - Gianni Schicci Props List(3)
Opera Master Prop Sheet V1.xlsx - Gianni Schicci Props List(3)Hotaru Morita
 
Freedom Communications - How to build a pipeline of industry talent
Freedom Communications - How to build a pipeline of industry talentFreedom Communications - How to build a pipeline of industry talent
Freedom Communications - How to build a pipeline of industry talentFreedom Communications
 
Ic 封裝新技術發展趨勢
Ic 封裝新技術發展趨勢Ic 封裝新技術發展趨勢
Ic 封裝新技術發展趨勢Kent Yang
 

En vedette (10)

reena 1
reena 1reena 1
reena 1
 
CV
CVCV
CV
 
Reena resume
Reena resumeReena resume
Reena resume
 
Be careful, the cut off snake heads will bite!
Be careful, the cut off snake heads will bite!Be careful, the cut off snake heads will bite!
Be careful, the cut off snake heads will bite!
 
ASHIM MALLICKCURRICULUMVITAEwithphoto - Copy
ASHIM MALLICKCURRICULUMVITAEwithphoto - CopyASHIM MALLICKCURRICULUMVITAEwithphoto - Copy
ASHIM MALLICKCURRICULUMVITAEwithphoto - Copy
 
reena resume
reena resumereena resume
reena resume
 
Opera Master Prop Sheet V1.xlsx - Gianni Schicci Props List(3)
Opera Master Prop Sheet V1.xlsx - Gianni Schicci Props List(3)Opera Master Prop Sheet V1.xlsx - Gianni Schicci Props List(3)
Opera Master Prop Sheet V1.xlsx - Gianni Schicci Props List(3)
 
Freedom Communications - How to build a pipeline of industry talent
Freedom Communications - How to build a pipeline of industry talentFreedom Communications - How to build a pipeline of industry talent
Freedom Communications - How to build a pipeline of industry talent
 
Bikic CV
Bikic CVBikic CV
Bikic CV
 
Ic 封裝新技術發展趨勢
Ic 封裝新技術發展趨勢Ic 封裝新技術發展趨勢
Ic 封裝新技術發展趨勢
 

Similaire à Out-Smarted!

Bread Crumbs: How We are Building an Online Map to Ourselves
Bread Crumbs: How We are Building an Online Map to OurselvesBread Crumbs: How We are Building an Online Map to Ourselves
Bread Crumbs: How We are Building an Online Map to OurselvesJonah Chin
 
Gov 2.0 - Trust and Transparency
Gov 2.0 - Trust and TransparencyGov 2.0 - Trust and Transparency
Gov 2.0 - Trust and TransparencyMartin Boyce
 
Is Online Privacy a Thing of the Past?
Is Online Privacy a Thing of the Past?Is Online Privacy a Thing of the Past?
Is Online Privacy a Thing of the Past?Aleque Juneau
 
Location Services and Geosocial Networking in Smartphones
Location Services and Geosocial Networking in SmartphonesLocation Services and Geosocial Networking in Smartphones
Location Services and Geosocial Networking in SmartphonesSam Harris
 
Why Mobile Matters - ASAE Technology Conference
Why Mobile Matters - ASAE Technology ConferenceWhy Mobile Matters - ASAE Technology Conference
Why Mobile Matters - ASAE Technology ConferenceVanguard Technology
 
Device Agnostic Design - UCD2014, London 25 Oct 2014
Device Agnostic Design - UCD2014, London 25 Oct 2014Device Agnostic Design - UCD2014, London 25 Oct 2014
Device Agnostic Design - UCD2014, London 25 Oct 2014Anna Dahlström
 
UCD14 Talk - Anna Dahlstrom - Device Agnostic Design: How to get your content...
UCD14 Talk - Anna Dahlstrom - Device Agnostic Design: How to get your content...UCD14 Talk - Anna Dahlstrom - Device Agnostic Design: How to get your content...
UCD14 Talk - Anna Dahlstrom - Device Agnostic Design: How to get your content...UCD UK Ltd
 
(300-400 words)1- Watch anyone of the following documentarymovi.docx
(300-400 words)1- Watch anyone of the following documentarymovi.docx(300-400 words)1- Watch anyone of the following documentarymovi.docx
(300-400 words)1- Watch anyone of the following documentarymovi.docxmayank272369
 
Digital security update: 10 cybersecurity and privacy threats
Digital security update: 10 cybersecurity and privacy threatsDigital security update: 10 cybersecurity and privacy threats
Digital security update: 10 cybersecurity and privacy threatsEntefy
 
Not re-decentralizing the Web is not only a missed opportunity, it is irrespo...
Not re-decentralizing the Web is not only a missed opportunity, it is irrespo...Not re-decentralizing the Web is not only a missed opportunity, it is irrespo...
Not re-decentralizing the Web is not only a missed opportunity, it is irrespo...Markus Luczak-Rösch
 
Converging Communications: The Perfect Storm
Converging Communications: The Perfect StormConverging Communications: The Perfect Storm
Converging Communications: The Perfect StormJoanne Jacobs
 
Flipbook Digital Media: Mobile Marketing
Flipbook Digital Media: Mobile Marketing Flipbook Digital Media: Mobile Marketing
Flipbook Digital Media: Mobile Marketing 13np
 
The Deception of Privacy, The Truth About a Plugged in Life
The Deception of Privacy, The Truth About a Plugged in LifeThe Deception of Privacy, The Truth About a Plugged in Life
The Deception of Privacy, The Truth About a Plugged in LifeCindy Beneteau
 
Are Drones our best friends?
Are Drones our best friends?Are Drones our best friends?
Are Drones our best friends?Codemotion
 
T. tighe privacy vs safety flipbook v2
T. tighe privacy vs safety flipbook v2T. tighe privacy vs safety flipbook v2
T. tighe privacy vs safety flipbook v2Tanya Tighe, CRSP
 

Similaire à Out-Smarted! (20)

Bread Crumbs: How We are Building an Online Map to Ourselves
Bread Crumbs: How We are Building an Online Map to OurselvesBread Crumbs: How We are Building an Online Map to Ourselves
Bread Crumbs: How We are Building an Online Map to Ourselves
 
Gov 2.0 - Trust and Transparency
Gov 2.0 - Trust and TransparencyGov 2.0 - Trust and Transparency
Gov 2.0 - Trust and Transparency
 
Is Online Privacy a Thing of the Past?
Is Online Privacy a Thing of the Past?Is Online Privacy a Thing of the Past?
Is Online Privacy a Thing of the Past?
 
Location Services and Geosocial Networking in Smartphones
Location Services and Geosocial Networking in SmartphonesLocation Services and Geosocial Networking in Smartphones
Location Services and Geosocial Networking in Smartphones
 
Learning Futures
Learning FuturesLearning Futures
Learning Futures
 
Why Mobile Matters - ASAE Technology Conference
Why Mobile Matters - ASAE Technology ConferenceWhy Mobile Matters - ASAE Technology Conference
Why Mobile Matters - ASAE Technology Conference
 
Internet security
Internet securityInternet security
Internet security
 
Internet security
Internet securityInternet security
Internet security
 
Device Agnostic Design - UCD2014, London 25 Oct 2014
Device Agnostic Design - UCD2014, London 25 Oct 2014Device Agnostic Design - UCD2014, London 25 Oct 2014
Device Agnostic Design - UCD2014, London 25 Oct 2014
 
UCD14 Talk - Anna Dahlstrom - Device Agnostic Design: How to get your content...
UCD14 Talk - Anna Dahlstrom - Device Agnostic Design: How to get your content...UCD14 Talk - Anna Dahlstrom - Device Agnostic Design: How to get your content...
UCD14 Talk - Anna Dahlstrom - Device Agnostic Design: How to get your content...
 
Internet in your pocket
Internet in your pocketInternet in your pocket
Internet in your pocket
 
(300-400 words)1- Watch anyone of the following documentarymovi.docx
(300-400 words)1- Watch anyone of the following documentarymovi.docx(300-400 words)1- Watch anyone of the following documentarymovi.docx
(300-400 words)1- Watch anyone of the following documentarymovi.docx
 
Digital security update: 10 cybersecurity and privacy threats
Digital security update: 10 cybersecurity and privacy threatsDigital security update: 10 cybersecurity and privacy threats
Digital security update: 10 cybersecurity and privacy threats
 
Not re-decentralizing the Web is not only a missed opportunity, it is irrespo...
Not re-decentralizing the Web is not only a missed opportunity, it is irrespo...Not re-decentralizing the Web is not only a missed opportunity, it is irrespo...
Not re-decentralizing the Web is not only a missed opportunity, it is irrespo...
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Converging Communications: The Perfect Storm
Converging Communications: The Perfect StormConverging Communications: The Perfect Storm
Converging Communications: The Perfect Storm
 
Flipbook Digital Media: Mobile Marketing
Flipbook Digital Media: Mobile Marketing Flipbook Digital Media: Mobile Marketing
Flipbook Digital Media: Mobile Marketing
 
The Deception of Privacy, The Truth About a Plugged in Life
The Deception of Privacy, The Truth About a Plugged in LifeThe Deception of Privacy, The Truth About a Plugged in Life
The Deception of Privacy, The Truth About a Plugged in Life
 
Are Drones our best friends?
Are Drones our best friends?Are Drones our best friends?
Are Drones our best friends?
 
T. tighe privacy vs safety flipbook v2
T. tighe privacy vs safety flipbook v2T. tighe privacy vs safety flipbook v2
T. tighe privacy vs safety flipbook v2
 

Dernier

Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...anjaliyadav012327
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxShobhayan Kirtania
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 

Dernier (20)

Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptx
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 

Out-Smarted!

  • 1. Meghan Wilson Film 260 - Spring 2016 Your smart devices share more than you think Photo from picjumbo.com byViktor Hanacek
  • 2. When was the last time were without your phone? you Photo from picjumbo.com byViktor Hanacek
  • 3. 90% of surveyed cell-phone owners say that their phone is frequently with them, (Rainie & Zickuhr, 2015) Photo from picjumbo.com byViktor Hanacek
  • 4. Photo from Kaboompics.com 31% say they never turn their phone off 45% say they rarely turn it off. (Rainie & Zickuhr, 2015)
  • 5. Photo from Kaboompics.com Carrying a cell phone with location capabilities makes it easy for app developers to make a quick profit off your personal information
  • 6. Studies show that when an app requests location Photo from picjumbo.com byViktor Hanacek of the time it shares the information with an advertising network (Dwoskin, 2015) 73%
  • 7. Photo from picjumbo.com byViktor Hanacek Marketers pay 10% to 20% more for online ads that include location information - Greg Stuart (Chief executive of the Mobile Marketing Association) (Dwoskin, 2015)
  • 8. Pre-installed apps on smartphones have been shown to share some of the most location data (Dwoskin, 2015) Photo from Flickr.com by Ryan Wick. CC Licence: http://creativecommons.org/licenses/by/2.0/
  • 9. Apps ask for access to location and microphone to share even more information to share with its partners (Golbeck, 2014) Photo from Flickr.com by Ernest Duffoo. CC Licence: http://creativecommons.org/licenses/by/2.0/
  • 10. Photo from picjumbo.com byViktor Hanacek More than 90% of Americans feel they’ve lost control over their personal data (Dwoskin, 2015) ...yet few are doing anything to protect themselves...
  • 11. 46% of smartphone users said that they “couldn’t live without” their devices (Smith, 2015) Photo from picjumbo.com byViktor Hanacek
  • 12. It is estimated that soon 45% of consumers will wear a smartwatch (Cole, 2015) Photo from Flickr.com by Bram Hilgersom. CC Licence: http://creativecommons.org/licenses/by/2.0/
  • 13. developers are determined to create devices that fit seamlessly into our lives and are easy to use for children, adults and seniors (Rhew, 2016) Photo from Flickr.com by Chris Combe. CC Licence: http://creativecommons.org/licenses/by/2.0/
  • 14. “Where we are with wearables is about where we were with the Internet in 1993” -Amanda Parkes (chief of technology and research at Manufacture New York) (Postrel, 2016) Photo from Flickr.com by Alvin Chow. CC Licence: http://creativecommons.org/licenses/by/2.0/
  • 15. Photo from Flickr.com by Daniel Novta. CC Licence: http://creativecommons.org/licenses/by/2.0/ We are already sharing more information than many of us want to...
  • 16. Photo from picjumbo.com byViktor Hanacek Most wearables are not stand-alone devices and transmit information back- and-forth to a nearby smartphone
  • 17. Transmitting information can leave the user open to risks of data interception (Mansfield, 2016) Photo from Flickr.com by Robert Bejil. CC Licence: http://creativecommons.org/licenses/by/2.0/
  • 18. There is a need for new security policies surrounding smart wearables to protect sensitive personal and company information Photo from Flickr.com by American Tobacco. CC Licence: http://creativecommons.org/licenses/by/2.0/
  • 19. Wearables can track: step-counts breathing stress levels heart rate and can sense chronic illnesses Photo from Flickr.com by Alex Graves. CC Licence: http://creativecommons.org/licenses/by/2.0/
  • 20. Health insurance companies are researching ways that they could use this data in the future when creating risk- profiles (Olson, 2014) Photo from Flickr.com by Imanka. CC Licence: http://creativecommons.org/licenses/by/2.0/
  • 21. The sharing of personal information is approaching a grey area Photo from Flickr.com by Arlanta. CC Licence: http://creativecommons.org/licenses/by/2.0/
  • 22. In 2011 Fitbit made all data collected public by default and released scores of personal data for anyone to see (Sparkes, 2015) Photo from Flickr.com by Overduebook. CC Licence: http://creativecommons.org/licenses/by/2.0/
  • 23. Smart technology is entering the home at an exponential rate, which only opens the door to more privacy breaches Photo from Flickr.com by James Sann. CC Licence: http://creativecommons.org/licenses/by/2.0
  • 24. “If you control your garage door, your heating and your fridge from your smartphone, expect that someone else could get control of them, too” -Scott Wright (cybersecurity expert) (Fraser, 2016) Photo from Flickr.com byWonderlane. CC Licence: http://creativecommons.org/licenses/by/2.0
  • 25. Cole, S. (2015, March 12). How the AppleWatchWill Chnage Office Life. Retrieved from Fast Company: http://www.fastcompany.com/3043533/the-future-of-work/how-the-apple-watch-will-change-office-life Dwoskin, E. (2015, March 23). WhereWereYou 3 Minutes Ago?Your Apps Know. Retrieved fromThe Wall Street Journal: http://blogs.wsj.com/digits/2015/03/23/where-were-you-3-minutes-ago-your-apps-know/?mod=LS1 Fraser, L. (2016, February 1). Connected devices quietly mine our data, privacy experts say. Retrieved from CBC News: http://www.cbc.ca/news/technology/privacy-data-1.3426634 Golbeck, J. (2014, January 28). Track Star. Retrieved from Slate: http://www.slate.com/articles/technology/future_tense/2014/01/ibeacon_shopkick_privacy_policies_for_location_tracking_apps_aren_t_cl ear.single.html Mansfield, M. (2016, February 18). CanWearableTechnologyThreaten the Cyber Seurity ofYour Business. Retrieved from Small Business Trends: http://smallbiztrends.com/2016/02/wearable-technology-security-issues.html Olson, P. (2014, June 19). WearableTech is Plugging Into Health Insurance. Retrieved from Forbes: http://www.forbes.com/sites/parmyolson/2014/06/19/wearable-tech-health-insurance/#53668c105ba1 Postrel,V. (2016, March 3). Why Nobody'sWearingWearables. Retrieved from BloombergView: http://www.bloomberg.com/view/articles/2016-03-03/why-nobody-s-wearing-wearables Rainie, L., & Zickuhr, K. (2015,August 26). Americans'Views on Mobile Etiquette. Retrieved from Pew Research Center: http://www.pewinternet.org/2015/08/26/americans-views-on-mobile-etiquette/ Rhew, D. D. (2016). Welcome Home:The Health Hub of the Future. Retrieved from Insights: https://insights.samsung.com/2016/03/24/welcome- home-the-health-hub-of-the-future/ Smith,A. (2015,April 1). U.S. Smartphone Use in 2015. Retrieved from Pew Research Center: http://www.pewinternet.org/2015/04/01/us- smartphone-use-in-2015/ Sparkes, M. (2015, February 10). Is smart technology really a threat to our privacy? Retrieved fromThe Telegraoh: http://www.telegraph.co.uk/technology/news/11403494/Is-smart-technology-really-a-threat-to-our-privacy.html Works Cited: Photo from picjumbo.com byViktor Hanacek