SlideShare ist ein Scribd-Unternehmen logo
1 von 34
Downloaden Sie, um offline zu lesen
Justino Lourenço
March,.2014
ISPGaya, V.N.Gaia, Portugal
http://www.slideshare.net/justinolourenco/
http://www.slideshare.net/justinolourenco/
Challenge
Please do help me, interact, make
your questions….
2
Index of the presentation
Digital Footprint
Scenarios
Technologies
Solutions
What comes next?
3
Digital footprint …
4
Definitions
 A digital footprint is a trail left by interactions in a digital
environment; including the usage of TV, mobile phone,
internet and world wide web, mobile web and other devices
and sensors.
 Digital footprints provide data on what has been performed in
the digital environment; and are used in behavioral targeting,
personalization, targeted marketing, digital reputation, and
other social media or social graphing services.
 In social media, a digital footprint is the size of a person's
"online presence" measured by the number of individuals
with whom they interact. [Wikipedia, 25 Jan 2013]
5
A shorter definition
A person's “digital footprint” reflects how he
or she actively participates in the digital
universe, including use of the Internet and
social networks, e-mail, cell phones, digital
cameras and credit cards.
(Source: http://securitysolutions.com/mag/digital_footprint_idc/)
6
Is this fresh new concern?
 A big amount of personal data is distributed among several
heterogeneous Databases … many people think about it!
1994: George Orwell publishes the book “1984”;
1997: Wim Wenders directs the movie “The End of Violence”;
2007: Mary Madden, Susannah Fox, Aaron Smith and Jessica
Vitak publishes the book “Digital Footprints”;
2009: Tony Fish publishes the book “My Digital Footprint”;
2013: NSA monitors people all over the world?
2014: Every month we find new vulnerabilities in mobile
phones…!
7
Conspiracy Theory ???
No ! Minimum knowledge will help me to
build the digital footprint that fits me ….
8
Our concerns
 In a daily bases, our life is full of interactions with the digital
world….
 How long do you use social networks in a normal day?
 When you do a simple post, how many people can spread it /
read it ?
 Our digital interactions are not only based in Internet…..
 Do you own a mobile device?
 Do you have a Via Verde ID?
 Do you have a credit card?
 Do you have cable TV?
 In how many data bases own information about you?
9
Applications
CRM - Customer Relationship Management
 Help companies to fit there offer to each client profile
Facebook
 Adjusts the best adds in your FB profile
Youtube
 Suggest the videos that you “perhaps” like more
10
Scenario: Mobile Phone
11
How is the association of a single
phone and its user?
Mobile ID – IMEI;
SIM.
12
Where is my phone?
Is for sure near to a Communication
Tower (outdoor/indoor antenna);
Is my GPS on?
I am using any Location Based
Application ?
13
Surfing the WEB
ISP controls the Internet Access:
Adjusts the traffic speed;
Allocates an IP address:
IP address can be traced to:
Find geographic position of the user…!
How? Check: http://www.iplocation.net/
14
Surfing in Wireless LAN
15
Ordinary daily scenario
After waking up, i start zapping on my cable TV;
While eating my breakfast - I surf on my tablet;
I am going to work, while my car (in the
background) is syncing some maintenance data
threw a 4G network;
During the trip I get caught by several traffic and
surveillance cameras;
I stop @ an ATM – I need cash;
I arrive at work, I use my NFC phone to check in;
I start the working day by checking email and
Facebook
16
Any of you have “googled” your
own name? Try it ….
47 % of American users have at leas once
searched on the Internet their own name.
Five years ago the number was only 22%.
17
Who profits with that?
 The collected data can be used by the several players, in order
to redirect marketing attacks in a one-to-one approach ….
18
How do we handle our personal
problem?
 Personal data spread in a non homogeneous form;
 Worldwide replication;
 Complex to be quantified;
 Dynamically changing.
Some companies already earn money in Googlewashing…!
19
Other Digital Footprint Scenarios
How the different technologies
that we use, collect our digital
footprint ?
20
ATM
21
Cable TV interaction
22
Traffic Control System
23
Via Verde
24
More Internet tracks
 Cookies approach;
 Other surfing tracks;
 Malicious software
 Virus
 Trojan
 Social network activities.
 Spontaneous data spreading
25
Solutions
Digital behavior concerns;
PC / Smart Phone / Tablet always updated;
Virus scanner updated;
Strong Passwords;
Renew your password;
Don’t use always the same password…
26
Do you want more security?
27
Minimizing risks .
28
Minimizing risks (II)
 Use of https:// .
 Avoid untrusted sites.
29
Evolution perspectives ?
30
Internet is always changing ..
31
What to expect?
 More technologies in our lives:
 M-Health;
 M-Learning;
 M- Social interactions;
 Smaller Hardware with more features (nanotechnology);
 Green technologies;
 Cloud storage;
 Voice and movements recognition;
 Smart Advice systems;
 Decisions based in dedicated software / hardware;
 Electronic money;
32
Time to hide?
Can I run away from tech
development?
The technologies changes our daily
routines for better?
33
Questions ?
Thank you for your time and
patience ..
Justino Lourenço – ISPGaya
http://www.linkedin.com/in/justinolourenco
jml@ispgaya.pt
34

Weitere ähnliche Inhalte

Was ist angesagt?

Cybercrimes. Looking for Safer Spaces? Freedom from Fear Issue 7
Cybercrimes. Looking for Safer Spaces? Freedom from Fear  Issue 7Cybercrimes. Looking for Safer Spaces? Freedom from Fear  Issue 7
Cybercrimes. Looking for Safer Spaces? Freedom from Fear Issue 7Daniel Dufourt
 
RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...
RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...
RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...Symantec
 
The Current State of Cybercrime 2014
The Current State of Cybercrime 2014The Current State of Cybercrime 2014
The Current State of Cybercrime 2014EMC
 
Infosecurity 2012 Banja Luka
Infosecurity 2012 Banja Luka Infosecurity 2012 Banja Luka
Infosecurity 2012 Banja Luka zigix
 
If At First You Don't Succeed... The Mobile Learning Journey At Qualcomm
If At First You Don't Succeed... The Mobile Learning Journey At QualcommIf At First You Don't Succeed... The Mobile Learning Journey At Qualcomm
If At First You Don't Succeed... The Mobile Learning Journey At QualcommBarbara Ludwig
 
Cyber Crime Challenges in the Middle East
Cyber Crime Challenges in the Middle EastCyber Crime Challenges in the Middle East
Cyber Crime Challenges in the Middle EastMohamed N. El-Guindy
 
As telcos go digital, cybersecurity risks intensify by pwc
As telcos go digital, cybersecurity risks intensify by pwcAs telcos go digital, cybersecurity risks intensify by pwc
As telcos go digital, cybersecurity risks intensify by pwcMert Akın
 
Top 15 security predictions for 2017
Top 15 security predictions for 2017Top 15 security predictions for 2017
Top 15 security predictions for 2017Accelerate Tech
 
Social Media Balancing Security & Authenticity without Controlling the Message
Social Media Balancing Security & Authenticity without Controlling the MessageSocial Media Balancing Security & Authenticity without Controlling the Message
Social Media Balancing Security & Authenticity without Controlling the MessageCindy Kim
 
Social Networks On Cell Phones Mobile Devices
Social Networks On Cell Phones Mobile DevicesSocial Networks On Cell Phones Mobile Devices
Social Networks On Cell Phones Mobile DevicesLaurel Papworth
 
Information Operations Course - Nato School - January 2014
Information Operations Course - Nato School - January 2014Information Operations Course - Nato School - January 2014
Information Operations Course - Nato School - January 2014Info Ops HQ
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Erik Ginalick
 
Women in Their Digital Domain
Women in Their Digital DomainWomen in Their Digital Domain
Women in Their Digital DomainOgilvy
 
Detecting Frauds and Identifying Security Challenge | by Money2Conf
Detecting Frauds and Identifying Security Challenge | by Money2ConfDetecting Frauds and Identifying Security Challenge | by Money2Conf
Detecting Frauds and Identifying Security Challenge | by Money2ConfMoney 2Conf
 
The Current State of Cybercrime 2013
The Current State of Cybercrime 2013The Current State of Cybercrime 2013
The Current State of Cybercrime 2013EMC
 
Security techniques for intelligent spam sensing and anomaly detection in onl...
Security techniques for intelligent spam sensing and anomaly detection in onl...Security techniques for intelligent spam sensing and anomaly detection in onl...
Security techniques for intelligent spam sensing and anomaly detection in onl...IJECEIAES
 

Was ist angesagt? (20)

Cybercrimes. Looking for Safer Spaces? Freedom from Fear Issue 7
Cybercrimes. Looking for Safer Spaces? Freedom from Fear  Issue 7Cybercrimes. Looking for Safer Spaces? Freedom from Fear  Issue 7
Cybercrimes. Looking for Safer Spaces? Freedom from Fear Issue 7
 
sun editorial
sun editorialsun editorial
sun editorial
 
Hong Kong - Social Media & Internet Facts
Hong Kong - Social Media & Internet FactsHong Kong - Social Media & Internet Facts
Hong Kong - Social Media & Internet Facts
 
RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...
RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...
RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...
 
The Current State of Cybercrime 2014
The Current State of Cybercrime 2014The Current State of Cybercrime 2014
The Current State of Cybercrime 2014
 
Infosecurity 2012 Banja Luka
Infosecurity 2012 Banja Luka Infosecurity 2012 Banja Luka
Infosecurity 2012 Banja Luka
 
If At First You Don't Succeed... The Mobile Learning Journey At Qualcomm
If At First You Don't Succeed... The Mobile Learning Journey At QualcommIf At First You Don't Succeed... The Mobile Learning Journey At Qualcomm
If At First You Don't Succeed... The Mobile Learning Journey At Qualcomm
 
Cyber Crime Challenges in the Middle East
Cyber Crime Challenges in the Middle EastCyber Crime Challenges in the Middle East
Cyber Crime Challenges in the Middle East
 
As telcos go digital, cybersecurity risks intensify by pwc
As telcos go digital, cybersecurity risks intensify by pwcAs telcos go digital, cybersecurity risks intensify by pwc
As telcos go digital, cybersecurity risks intensify by pwc
 
privtechsomeassemb
privtechsomeassembprivtechsomeassemb
privtechsomeassemb
 
Top 15 security predictions for 2017
Top 15 security predictions for 2017Top 15 security predictions for 2017
Top 15 security predictions for 2017
 
Social Media Balancing Security & Authenticity without Controlling the Message
Social Media Balancing Security & Authenticity without Controlling the MessageSocial Media Balancing Security & Authenticity without Controlling the Message
Social Media Balancing Security & Authenticity without Controlling the Message
 
Social Networks On Cell Phones Mobile Devices
Social Networks On Cell Phones Mobile DevicesSocial Networks On Cell Phones Mobile Devices
Social Networks On Cell Phones Mobile Devices
 
Information Operations Course - Nato School - January 2014
Information Operations Course - Nato School - January 2014Information Operations Course - Nato School - January 2014
Information Operations Course - Nato School - January 2014
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112
 
Mobile threat report_q3_2013
Mobile threat report_q3_2013Mobile threat report_q3_2013
Mobile threat report_q3_2013
 
Women in Their Digital Domain
Women in Their Digital DomainWomen in Their Digital Domain
Women in Their Digital Domain
 
Detecting Frauds and Identifying Security Challenge | by Money2Conf
Detecting Frauds and Identifying Security Challenge | by Money2ConfDetecting Frauds and Identifying Security Challenge | by Money2Conf
Detecting Frauds and Identifying Security Challenge | by Money2Conf
 
The Current State of Cybercrime 2013
The Current State of Cybercrime 2013The Current State of Cybercrime 2013
The Current State of Cybercrime 2013
 
Security techniques for intelligent spam sensing and anomaly detection in onl...
Security techniques for intelligent spam sensing and anomaly detection in onl...Security techniques for intelligent spam sensing and anomaly detection in onl...
Security techniques for intelligent spam sensing and anomaly detection in onl...
 

Andere mochten auch

McCoy - Energy Management System
McCoy - Energy Management SystemMcCoy - Energy Management System
McCoy - Energy Management SystemPraveen Sharma
 
StyleWeek Northeast - Fall/Winter 2013
StyleWeek Northeast - Fall/Winter 2013StyleWeek Northeast - Fall/Winter 2013
StyleWeek Northeast - Fall/Winter 2013Stephanie Kolanko
 
Telecommunications in the logistic sector
Telecommunications in the logistic sector Telecommunications in the logistic sector
Telecommunications in the logistic sector Justino Lourenço
 
Are you paying attention #crashcourseoncreativity
Are you paying attention  #crashcourseoncreativityAre you paying attention  #crashcourseoncreativity
Are you paying attention #crashcourseoncreativityrafaelsfarias
 
Framing and reframing
Framing and reframingFraming and reframing
Framing and reframingrafaelsfarias
 
EJML Conference Presentation
EJML Conference PresentationEJML Conference Presentation
EJML Conference PresentationJustino Lourenço
 
Digital footprint@artesis vf
Digital footprint@artesis vfDigital footprint@artesis vf
Digital footprint@artesis vfJustino Lourenço
 
Wireless Water Monitoring System
Wireless Water Monitoring SystemWireless Water Monitoring System
Wireless Water Monitoring SystemPraveen Sharma
 
IoT Security Faux Pas
IoT Security Faux PasIoT Security Faux Pas
IoT Security Faux PasRajashree Rao
 
Zeytinden, Zeytinyağı ve Pirina Üretimi
Zeytinden, Zeytinyağı ve Pirina ÜretimiZeytinden, Zeytinyağı ve Pirina Üretimi
Zeytinden, Zeytinyağı ve Pirina ÜretimiOKTAY ÖZDEMİR
 
Telecommunications in the logistic sector lodz
Telecommunications in the logistic sector lodzTelecommunications in the logistic sector lodz
Telecommunications in the logistic sector lodzJustino Lourenço
 

Andere mochten auch (14)

Solar garden lights 1
Solar garden lights 1Solar garden lights 1
Solar garden lights 1
 
McCoy - Energy Management System
McCoy - Energy Management SystemMcCoy - Energy Management System
McCoy - Energy Management System
 
StyleWeek Northeast - Fall/Winter 2013
StyleWeek Northeast - Fall/Winter 2013StyleWeek Northeast - Fall/Winter 2013
StyleWeek Northeast - Fall/Winter 2013
 
Telecommunications in the logistic sector
Telecommunications in the logistic sector Telecommunications in the logistic sector
Telecommunications in the logistic sector
 
Are you paying attention #crashcourseoncreativity
Are you paying attention  #crashcourseoncreativityAre you paying attention  #crashcourseoncreativity
Are you paying attention #crashcourseoncreativity
 
Framing and reframing
Framing and reframingFraming and reframing
Framing and reframing
 
Mobilidade no seculo x xi
Mobilidade no seculo x xiMobilidade no seculo x xi
Mobilidade no seculo x xi
 
EJML Conference Presentation
EJML Conference PresentationEJML Conference Presentation
EJML Conference Presentation
 
Digital footprint@artesis vf
Digital footprint@artesis vfDigital footprint@artesis vf
Digital footprint@artesis vf
 
Wireless Water Monitoring System
Wireless Water Monitoring SystemWireless Water Monitoring System
Wireless Water Monitoring System
 
Future of logistics
Future of logisticsFuture of logistics
Future of logistics
 
IoT Security Faux Pas
IoT Security Faux PasIoT Security Faux Pas
IoT Security Faux Pas
 
Zeytinden, Zeytinyağı ve Pirina Üretimi
Zeytinden, Zeytinyağı ve Pirina ÜretimiZeytinden, Zeytinyağı ve Pirina Üretimi
Zeytinden, Zeytinyağı ve Pirina Üretimi
 
Telecommunications in the logistic sector lodz
Telecommunications in the logistic sector lodzTelecommunications in the logistic sector lodz
Telecommunications in the logistic sector lodz
 

Ähnlich wie Digital footprint@wse march13

4 Trends Shaping the Future of Social Media
4 Trends Shaping the Future of Social Media4 Trends Shaping the Future of Social Media
4 Trends Shaping the Future of Social Mediaplusaziz
 
Mobile Marketing: Why smartphones are upending traditional print and web base...
Mobile Marketing: Why smartphones are upending traditional print and web base...Mobile Marketing: Why smartphones are upending traditional print and web base...
Mobile Marketing: Why smartphones are upending traditional print and web base...Kenko Health, Inc.
 
How your data can be used against you #DataScienceWeek presentation by Leigh-...
How your data can be used against you #DataScienceWeek presentation by Leigh-...How your data can be used against you #DataScienceWeek presentation by Leigh-...
How your data can be used against you #DataScienceWeek presentation by Leigh-...Leigh-Chantelle
 
A Manifesto for Cyber Resilience
A Manifesto for Cyber ResilienceA Manifesto for Cyber Resilience
A Manifesto for Cyber ResilienceSymantec
 
Myeventapps mobile 101 self guided july 2015
Myeventapps mobile 101 self guided july 2015Myeventapps mobile 101 self guided july 2015
Myeventapps mobile 101 self guided july 2015Allan Isfan
 
SOCIAL MEDIA BRIEF HBGARY
SOCIAL MEDIA BRIEF HBGARYSOCIAL MEDIA BRIEF HBGARY
SOCIAL MEDIA BRIEF HBGARYAnOnM4niH4cK
 
Blue Coat 2013 Systems Mobile Malware Report
Blue Coat 2013 Systems Mobile Malware ReportBlue Coat 2013 Systems Mobile Malware Report
Blue Coat 2013 Systems Mobile Malware ReportContent Rules, Inc.
 
Cyber Impact of Fake Instagram Business Account Identify Based on Sentiment A...
Cyber Impact of Fake Instagram Business Account Identify Based on Sentiment A...Cyber Impact of Fake Instagram Business Account Identify Based on Sentiment A...
Cyber Impact of Fake Instagram Business Account Identify Based on Sentiment A...IRJET Journal
 
Mobile computing application risks in Zimbabwe
Mobile computing application risks in ZimbabweMobile computing application risks in Zimbabwe
Mobile computing application risks in ZimbabweIOSR Journals
 
Ethical, Legal and Social issues IoT
Ethical, Legal and Social issues IoTEthical, Legal and Social issues IoT
Ethical, Legal and Social issues IoTLuckeylama
 
Sample set exam eb bus 5-6-7-9-12
Sample set exam  eb bus 5-6-7-9-12Sample set exam  eb bus 5-6-7-9-12
Sample set exam eb bus 5-6-7-9-12BookStoreLib
 
Apps vs. Web: Where do we go from here?
Apps vs. Web: Where do we go from here?Apps vs. Web: Where do we go from here?
Apps vs. Web: Where do we go from here?Patrick 'Mad' Mork
 
Technology Trends | How Technology Impacts Our Lives
Technology Trends | How Technology Impacts Our LivesTechnology Trends | How Technology Impacts Our Lives
Technology Trends | How Technology Impacts Our LivesHellocomputer
 
Technology in 2024 (Neal/Fantry Comm 303-50)
Technology in 2024 (Neal/Fantry Comm 303-50)Technology in 2024 (Neal/Fantry Comm 303-50)
Technology in 2024 (Neal/Fantry Comm 303-50)datgymnast94
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things The Center for Identity
 
Future of privacy - An initial perspective - Stephen Deadman, Vodafone
Future of privacy - An initial perspective - Stephen Deadman, VodafoneFuture of privacy - An initial perspective - Stephen Deadman, Vodafone
Future of privacy - An initial perspective - Stephen Deadman, VodafoneFuture Agenda
 
Fife College, French Toast Mafia, Apps for Good Presentation
Fife College, French Toast Mafia, Apps for Good PresentationFife College, French Toast Mafia, Apps for Good Presentation
Fife College, French Toast Mafia, Apps for Good PresentationFifeCollege
 
Forum Della Comunicazione May 29th 2008
Forum Della Comunicazione May 29th 2008Forum Della Comunicazione May 29th 2008
Forum Della Comunicazione May 29th 2008Luca Colombo
 
Cyber police an idea for securing cyber space with unique
Cyber police  an idea for securing cyber space with uniqueCyber police  an idea for securing cyber space with unique
Cyber police an idea for securing cyber space with uniqueBaharul Islam
 

Ähnlich wie Digital footprint@wse march13 (20)

4 Trends Shaping the Future of Social Media
4 Trends Shaping the Future of Social Media4 Trends Shaping the Future of Social Media
4 Trends Shaping the Future of Social Media
 
Mobile Marketing: Why smartphones are upending traditional print and web base...
Mobile Marketing: Why smartphones are upending traditional print and web base...Mobile Marketing: Why smartphones are upending traditional print and web base...
Mobile Marketing: Why smartphones are upending traditional print and web base...
 
How your data can be used against you #DataScienceWeek presentation by Leigh-...
How your data can be used against you #DataScienceWeek presentation by Leigh-...How your data can be used against you #DataScienceWeek presentation by Leigh-...
How your data can be used against you #DataScienceWeek presentation by Leigh-...
 
A Manifesto for Cyber Resilience
A Manifesto for Cyber ResilienceA Manifesto for Cyber Resilience
A Manifesto for Cyber Resilience
 
Myeventapps mobile 101 self guided july 2015
Myeventapps mobile 101 self guided july 2015Myeventapps mobile 101 self guided july 2015
Myeventapps mobile 101 self guided july 2015
 
SOCIAL MEDIA BRIEF HBGARY
SOCIAL MEDIA BRIEF HBGARYSOCIAL MEDIA BRIEF HBGARY
SOCIAL MEDIA BRIEF HBGARY
 
Blue Coat 2013 Systems Mobile Malware Report
Blue Coat 2013 Systems Mobile Malware ReportBlue Coat 2013 Systems Mobile Malware Report
Blue Coat 2013 Systems Mobile Malware Report
 
Mobile App Vs Mobile Web
Mobile App Vs Mobile WebMobile App Vs Mobile Web
Mobile App Vs Mobile Web
 
Cyber Impact of Fake Instagram Business Account Identify Based on Sentiment A...
Cyber Impact of Fake Instagram Business Account Identify Based on Sentiment A...Cyber Impact of Fake Instagram Business Account Identify Based on Sentiment A...
Cyber Impact of Fake Instagram Business Account Identify Based on Sentiment A...
 
Mobile computing application risks in Zimbabwe
Mobile computing application risks in ZimbabweMobile computing application risks in Zimbabwe
Mobile computing application risks in Zimbabwe
 
Ethical, Legal and Social issues IoT
Ethical, Legal and Social issues IoTEthical, Legal and Social issues IoT
Ethical, Legal and Social issues IoT
 
Sample set exam eb bus 5-6-7-9-12
Sample set exam  eb bus 5-6-7-9-12Sample set exam  eb bus 5-6-7-9-12
Sample set exam eb bus 5-6-7-9-12
 
Apps vs. Web: Where do we go from here?
Apps vs. Web: Where do we go from here?Apps vs. Web: Where do we go from here?
Apps vs. Web: Where do we go from here?
 
Technology Trends | How Technology Impacts Our Lives
Technology Trends | How Technology Impacts Our LivesTechnology Trends | How Technology Impacts Our Lives
Technology Trends | How Technology Impacts Our Lives
 
Technology in 2024 (Neal/Fantry Comm 303-50)
Technology in 2024 (Neal/Fantry Comm 303-50)Technology in 2024 (Neal/Fantry Comm 303-50)
Technology in 2024 (Neal/Fantry Comm 303-50)
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things
 
Future of privacy - An initial perspective - Stephen Deadman, Vodafone
Future of privacy - An initial perspective - Stephen Deadman, VodafoneFuture of privacy - An initial perspective - Stephen Deadman, Vodafone
Future of privacy - An initial perspective - Stephen Deadman, Vodafone
 
Fife College, French Toast Mafia, Apps for Good Presentation
Fife College, French Toast Mafia, Apps for Good PresentationFife College, French Toast Mafia, Apps for Good Presentation
Fife College, French Toast Mafia, Apps for Good Presentation
 
Forum Della Comunicazione May 29th 2008
Forum Della Comunicazione May 29th 2008Forum Della Comunicazione May 29th 2008
Forum Della Comunicazione May 29th 2008
 
Cyber police an idea for securing cyber space with unique
Cyber police  an idea for securing cyber space with uniqueCyber police  an idea for securing cyber space with unique
Cyber police an idea for securing cyber space with unique
 

Mehr von Justino Lourenço (13)

Artigo Publico
Artigo PublicoArtigo Publico
Artigo Publico
 
Cabelte
CabelteCabelte
Cabelte
 
Internet: risks and challenges
Internet: risks and challengesInternet: risks and challenges
Internet: risks and challenges
 
Apresentação do Projeto WalkAbout IP @ FNAC GaiaShop. 13Jun2013
Apresentação do Projeto WalkAbout IP @ FNAC GaiaShop. 13Jun2013Apresentação do Projeto WalkAbout IP @ FNAC GaiaShop. 13Jun2013
Apresentação do Projeto WalkAbout IP @ FNAC GaiaShop. 13Jun2013
 
Ecologia e telecomunicações
Ecologia e telecomunicaçõesEcologia e telecomunicações
Ecologia e telecomunicações
 
A evolução esperada das telecomunicações
A evolução esperada das telecomunicaçõesA evolução esperada das telecomunicações
A evolução esperada das telecomunicações
 
Gsm curso
Gsm cursoGsm curso
Gsm curso
 
NFC
NFCNFC
NFC
 
HTML5
HTML5HTML5
HTML5
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
QR-Codes
QR-CodesQR-Codes
QR-Codes
 
ITUR
ITURITUR
ITUR
 
Digital Footpront
Digital FootprontDigital Footpront
Digital Footpront
 

Digital footprint@wse march13

  • 1. Justino Lourenço March,.2014 ISPGaya, V.N.Gaia, Portugal http://www.slideshare.net/justinolourenco/ http://www.slideshare.net/justinolourenco/
  • 2. Challenge Please do help me, interact, make your questions…. 2
  • 3. Index of the presentation Digital Footprint Scenarios Technologies Solutions What comes next? 3
  • 5. Definitions  A digital footprint is a trail left by interactions in a digital environment; including the usage of TV, mobile phone, internet and world wide web, mobile web and other devices and sensors.  Digital footprints provide data on what has been performed in the digital environment; and are used in behavioral targeting, personalization, targeted marketing, digital reputation, and other social media or social graphing services.  In social media, a digital footprint is the size of a person's "online presence" measured by the number of individuals with whom they interact. [Wikipedia, 25 Jan 2013] 5
  • 6. A shorter definition A person's “digital footprint” reflects how he or she actively participates in the digital universe, including use of the Internet and social networks, e-mail, cell phones, digital cameras and credit cards. (Source: http://securitysolutions.com/mag/digital_footprint_idc/) 6
  • 7. Is this fresh new concern?  A big amount of personal data is distributed among several heterogeneous Databases … many people think about it! 1994: George Orwell publishes the book “1984”; 1997: Wim Wenders directs the movie “The End of Violence”; 2007: Mary Madden, Susannah Fox, Aaron Smith and Jessica Vitak publishes the book “Digital Footprints”; 2009: Tony Fish publishes the book “My Digital Footprint”; 2013: NSA monitors people all over the world? 2014: Every month we find new vulnerabilities in mobile phones…! 7
  • 8. Conspiracy Theory ??? No ! Minimum knowledge will help me to build the digital footprint that fits me …. 8
  • 9. Our concerns  In a daily bases, our life is full of interactions with the digital world….  How long do you use social networks in a normal day?  When you do a simple post, how many people can spread it / read it ?  Our digital interactions are not only based in Internet…..  Do you own a mobile device?  Do you have a Via Verde ID?  Do you have a credit card?  Do you have cable TV?  In how many data bases own information about you? 9
  • 10. Applications CRM - Customer Relationship Management  Help companies to fit there offer to each client profile Facebook  Adjusts the best adds in your FB profile Youtube  Suggest the videos that you “perhaps” like more 10
  • 12. How is the association of a single phone and its user? Mobile ID – IMEI; SIM. 12
  • 13. Where is my phone? Is for sure near to a Communication Tower (outdoor/indoor antenna); Is my GPS on? I am using any Location Based Application ? 13
  • 14. Surfing the WEB ISP controls the Internet Access: Adjusts the traffic speed; Allocates an IP address: IP address can be traced to: Find geographic position of the user…! How? Check: http://www.iplocation.net/ 14
  • 16. Ordinary daily scenario After waking up, i start zapping on my cable TV; While eating my breakfast - I surf on my tablet; I am going to work, while my car (in the background) is syncing some maintenance data threw a 4G network; During the trip I get caught by several traffic and surveillance cameras; I stop @ an ATM – I need cash; I arrive at work, I use my NFC phone to check in; I start the working day by checking email and Facebook 16
  • 17. Any of you have “googled” your own name? Try it …. 47 % of American users have at leas once searched on the Internet their own name. Five years ago the number was only 22%. 17
  • 18. Who profits with that?  The collected data can be used by the several players, in order to redirect marketing attacks in a one-to-one approach …. 18
  • 19. How do we handle our personal problem?  Personal data spread in a non homogeneous form;  Worldwide replication;  Complex to be quantified;  Dynamically changing. Some companies already earn money in Googlewashing…! 19
  • 20. Other Digital Footprint Scenarios How the different technologies that we use, collect our digital footprint ? 20
  • 25. More Internet tracks  Cookies approach;  Other surfing tracks;  Malicious software  Virus  Trojan  Social network activities.  Spontaneous data spreading 25
  • 26. Solutions Digital behavior concerns; PC / Smart Phone / Tablet always updated; Virus scanner updated; Strong Passwords; Renew your password; Don’t use always the same password… 26
  • 27. Do you want more security? 27
  • 29. Minimizing risks (II)  Use of https:// .  Avoid untrusted sites. 29
  • 31. Internet is always changing .. 31
  • 32. What to expect?  More technologies in our lives:  M-Health;  M-Learning;  M- Social interactions;  Smaller Hardware with more features (nanotechnology);  Green technologies;  Cloud storage;  Voice and movements recognition;  Smart Advice systems;  Decisions based in dedicated software / hardware;  Electronic money; 32
  • 33. Time to hide? Can I run away from tech development? The technologies changes our daily routines for better? 33
  • 34. Questions ? Thank you for your time and patience .. Justino Lourenço – ISPGaya http://www.linkedin.com/in/justinolourenco jml@ispgaya.pt 34