SlideShare ist ein Scribd-Unternehmen logo
1 von 21
Downloaden Sie, um offline zu lesen
The Deception of Privacy
The Truth About a Plugged in Life
By Cynthia Beneteau
Photo Source: Kristin Flour “Secret” Unsplash https://unsplash.com/collections/327093/privacy-kit?photo=BcjdbyKWquw
Prior to the digital age photos were typically just
shared with a handful of people, like friends and
family. Now, people take more photos in 2
minutes than the entire amount of all the photos
that existed 150 years ago. [2]
The top three places photos are uploaded to are:
Snapchat: 8796 photos per second
What's App : 8102 photos per second
Facebook :4501 photos per second [3]
Photo Source : Gratisography http://colorlisa.com/pictures/105_1.jpg
Today’s youth think of privacy
differently than adults do. They
care more about controlling who
is tracking them digitally, who is
seeing what they post and what
people think when seeing them.
The online experience for young
people is a social one. If
something is posted they do not
like, they are more likely to worry
about hiding the content from
their friends or family, than to
worry about teachers or potential
employers seeing it. They care
more about their reputation than
the actual information they are
posting[4]
Photo Source: http://www.gratisography.com/pictures/303_1.jpg
Parents need to consider the
long term reach of the digital
information they are sharing
about their children. A “cute”
video of a child doing something
silly, can come back to haunt that
same child when they become a
teenager or adult.
Even innocent stories shared by
a parent may be a potential
source of embarrassment to a
child later on. Children, youth and
teens should be able to control
their digital identities. There is a
balance that can be reached, a
parent can share information, but
limit identifying characteristics so
that it protects their children,
but they can still share [6]
Photo source: https://pixabay.com/en/desperate-sad-depressed-feet-hands-2293377/
72% of Parents are worried about their children’s online interactions with strangers or predators
that could harm them. Two major concerns are sexting and cyberbullying. Kids can be horrible to
each other and some are even using the internet to create fake identities of other children. They then
pose as the child and fabricate information about them. Parents are more than willing to potentially
embarrass their child if it will help to keep them safe. [7]
Photo Source https://pixabay.com/en/privacy-policy-spy-espionage-nsa-1624400
A Study done by “Young Canadians in
a Wired World” has indicated more
privacy education in schools and
homes is needed. According to the
study, students have limited
comprehension of password
sharing, privacy policies, policies
around data collection and geo-
location services
68% of Students incorrectly believe,
that a website will not share their
personal information if they have a
privacy policy [5]
Photo Source : https://www.pexels.com/photo/finger-print-on-enter-key-of-keyboard-163017/
“ We make big trade-offs as we become digitally
connected everywhere and anytime” causing increased
concerns with security and privacy [1]
John Palfrey and Urs Gasser, Authors of Interop. The Promise and Perils of Highly Interconnected Systems
Photo Source : https://static.pexels.com/photos/160709/raccoon-animal-animal-world-wildlife-photography-160709.jpeg
Over a two week period, Carnegie Mellon University Computer
Scientist’s ,did a study which determined that quite a few popular
Android apps collect GPS coordinates within 50 metres of where the
user is. This happens about 6200 times, which is equivalent to about
every three minutes [8]
Photo Source : https://www.pexels.com/photo/text-on-information-sign-258490/
The Carnegie Mellon study also uncovered that the Weather Channel app accesses location
information from it’s users every 10 minutes, or 2000 times in a two week period.[8]
Photo Source: https://www.pexels.com/photo/reflection-of-building-on-body-of-water-at-daytime-166360
When users in the Carnegie study found out how much personal data apps were
collecting they tried to restrict the apps from collecting it. Researchers tried to help by
sending daily “privacy nudges” to participants letting them know how many times
apps were collecting their data [8]
Operating updates ,since the study was conducted ,have now removed the software
that researchers used to see requests for personal information and the ability to send
“privacy nudges “ has also been disabled [8]
Photo Source: https://www.pexels.com/photo/london-new-york-tokyo-and-moscow-clocks-48770/
Facebook is able to know who your friends and acquaintances are
even if you lie about all of your personal information when signing
up [9]
Photo Source : https://www.pexels.com/photo/photo-of-2-children-walking-23971/
Facebook uses Network Science a complex
academic field, which uses mapping
algorithms, that takes information you provide
or give permission for them to access when
you sign up. It then uses it to determine the
structure of your social network. This data is
analyzed and allows them to accurately predict
people you are likely to know and even people
you will likely know in the future. [9]
Photo Source : https://www.pexels.com/photo/hand-thumbs-up-thumb-black-and-white-8252/
Samsung Smart TV
owners are susceptible
to spying. According to
“WikiLeaks” documents
a program named
“Weeping Angel” can
make Samsung’s Smart
TVs appear to be turned
off ,when they really are
not. This enables the TV
in essence, to work like a
bug and record
conversations in the
room. These are then
sent to a hidden CIA
server. Michael Hayden,
ex CIA director, thinks
this is a wonderful
capability because there
are “ bad people in the
world that have
Samsung TVs “ [ 10]
Photo Source: https://www.pexels.com/photo/full-frame-shot-of-eye-251287/
Samsung’s Smart TV Privacy Policy States "Please be aware that if your spoken words include
personal or other sensitive information, that information will be among the data captured and
transmitted to a third party."
A lot of Samsung TVs need users to actually click a microphone button before the voice
commands work, but on models such as PN60F8500 the microphone is always listening. [10]
Photo source : https://www.pexels.com/photo/night-music-band-microphone-9137
Web cams can introduce a number
of possible privacy breaches in our
homes, nurseries, on our laptops,
computers, tablets or anywhere we
have online cameras [11]
Photo source: https://www.pexels.com/photo/silver-imac-near-white-ceramic-kettle-205316/
The frightening idea of someone watching every movement your baby makes
is a very real possibility. The lack of the most basic security features are
making popular internet connected baby monitors vulnerable to hackers [11]
Photo Source: https://www.pexels.com/photo/newborn-child-feed-89695
Once a hacker has breached
one connected device, anything
connected to that Wi-Fi network
can potentially be accessed. [11]
Photo Source: https://www.pexels.com/photo/low-angle-photo-of-building-under-sky-69080/
The use of cameras in public spaces is
becoming more common place. Cameras
are also now on buses, subways, in ATM
machines, and outside gas stations or
grocery stores. [12]
Photo Source : https://www.pexels.com/photo/black-and-white-streets-bridge-jacket-70402
/
Photo Source: https://www.pexels.com/photo/5th-avenue-america-apple-store-architecture-279166
With the advent of
Google Street view it is
now possible to view
someone’s home,
business or even their
vehicle from the comfort
of your living room
The expectation of
privacy in the digital
age may no longer be
an option. Perhaps we
need to redefine what
privacy means and the
repercussions of this
new interpretation.
Photo Source: https://www.pexels.com/photo/butterflies-black-and-white-9159/
Sources:
1. Matrix, Sidneyeve “ John Palfrey and Urs Gasser Quote” Module 3 Slides Film 260 Queens University May 2017.
2. Eveleth, Rose. "How Many Photographs Of You Are Out There In The World?". The Atlantic. N.p., 2017. Web. 2 June 2017.
https://www.theatlantic.com/technology/archive/2015/11/how-many-photographs-of-you-are-out-there-in-the-world/413389/
3. Morrison, Kimberlee, and Kimberlee Morrison. "How Many Photos Are Uploaded To Snapchat Every Second?". Adweek.com. N.p., 2017. Web. 2
June 2017.http://www.adweek.com/digital/how-many-photos-are-uploaded-to-snapchat-every-second/
4. "Online Privacy, Online Publicity: Youth Do More To Protect Their Reputation Than Their Information | Mediasmarts". Mediasmarts.ca. N.p.,
2017. Web. 2 June 2017. http://mediasmarts.ca/blog/online-privacy-online-publicity-youth-do-more-protect-their-reputation-their-information
5. Bogart, Nicole. "Young Canadians Lack Understanding Of Online Privacy: Study". Global News. N.p., 2017. Web. 2 June 2017.
http://globalnews.ca/news/1159724/young-canadians-lack-understanding-of-online-privacy-study/
6. Dell’Antonia,Kj “ Don’t post about me on Social Media, Children say” The New York Times March 2017
https://well.blogs.nytimes.com/2016/03/08/dont-post-about-me-on-social-media-children-say/?_r=0
7. Paul, P. (2013, May 5). Cyberparenting and the Risk of T.M.I. New York Times, p. 8(L). Retrieved from
http://go.galegroup.com.proxy.queensu.ca/ps/i.do?p=AONE&sw=w&u=queensulaw&v=2.1&it=r&id=GALE%7CA328694536&asid=ed444bf722dd5
54a00a728a96a4737f2
8. Dwoskin, E. “WSJ.D technology: Apps track users -- once every 3 minute”s. Wall Street Journal Mar 24 2015 . Retrieved from https://search-
proquest-com.proxy.queensu.ca/docview/1665403896?accountid=6180
9. Dewey, Caitlin “How Facebook knows who all your friends are, even better than you do”. Washingtonpost.com. April2 2015 Retrieved from
http://go.galegroup.com.proxy.queensu.ca/ps/i.do?p=AONE&sw=w&u=queensulaw&v=2.1&it=r&id=GALE%7CA408035312&asid=97bdc5e16299b
f6c66dcb7543481dace
10. "If You Have A Smart TV, Take A Closer Look At Your Privacy Settings". BuzzFeed. N.p., 2017. Web. 2 June 2017.
https://www.buzzfeed.com/nicolenguyen/here-are-the-privacy-settings-you-should-look-at-if-you-have?utm_term=.nqkg6Z0A7N#.cidNjp56Ov
11. "Is Your Baby Monitor Safe? Cybersecurity Firms Says Many Can Be Hacked". CBC News. N.p., 2017. Web. 2 June 2017.
http://www.cbc.ca/news/business/several-baby-monitors-vulnerable-to-hacking-cybersecurity-firm-warns-1.3213046
12. Alcoba, Natalie. "Growing Number Of CCTV Surveillance Cameras Outside City Core Dismays Privacy Advocates". National Post. N.p., 2017.
Web. 2 June 2017.
http://news.nationalpost.com/toronto/growing-number-of-cctv-surveillance-cameras-dismays-privacy-advocates
Photo Source : https://www.pexels.com/photo/full-frame-shot-of-metal-332834

Weitere ähnliche Inhalte

Was ist angesagt?

Social Media Career Assignment
Social Media Career AssignmentSocial Media Career Assignment
Social Media Career AssignmentRaechel Mills
 
IS SLACKTIVISM REALLY AS BAD AS THEY SAY IT IS? | Karen Clement
IS SLACKTIVISM REALLY AS BAD AS THEY SAY IT IS? | Karen ClementIS SLACKTIVISM REALLY AS BAD AS THEY SAY IT IS? | Karen Clement
IS SLACKTIVISM REALLY AS BAD AS THEY SAY IT IS? | Karen ClementKaren Clement
 
Film260 digitalflipbookshannongrist
Film260 digitalflipbookshannongristFilm260 digitalflipbookshannongrist
Film260 digitalflipbookshannongristShannon Grist
 
Social Media and Depression
Social Media and DepressionSocial Media and Depression
Social Media and DepressionDamon Auguste
 
Film 260 flipbook
Film 260 flipbookFilm 260 flipbook
Film 260 flipbookChuyun Xu
 
Social media, friend or foe?
Social media, friend or foe?Social media, friend or foe?
Social media, friend or foe?tharshni
 
Social Media Is Not Social
Social Media Is Not SocialSocial Media Is Not Social
Social Media Is Not SocialBrett Sykes
 
Your posts are not private
Your posts are not privateYour posts are not private
Your posts are not privateShawnee Liu
 
FILM260 Flipbook Assignment
FILM260 Flipbook AssignmentFILM260 Flipbook Assignment
FILM260 Flipbook AssignmentJordan Pernari
 
Cheng jessica flipbook_film260
Cheng jessica flipbook_film260Cheng jessica flipbook_film260
Cheng jessica flipbook_film260Jessica Cheng
 
Helicopter Parent - Flipbook
Helicopter Parent - FlipbookHelicopter Parent - Flipbook
Helicopter Parent - FlipbookJulia Holland
 
Desensitization
Desensitization Desensitization
Desensitization 14jc5
 
Food for Thought, and Instagram
Food for Thought, and InstagramFood for Thought, and Instagram
Food for Thought, and InstagramMarie-Claire Zhang
 

Was ist angesagt? (20)

Social Media Career Assignment
Social Media Career AssignmentSocial Media Career Assignment
Social Media Career Assignment
 
IS SLACKTIVISM REALLY AS BAD AS THEY SAY IT IS? | Karen Clement
IS SLACKTIVISM REALLY AS BAD AS THEY SAY IT IS? | Karen ClementIS SLACKTIVISM REALLY AS BAD AS THEY SAY IT IS? | Karen Clement
IS SLACKTIVISM REALLY AS BAD AS THEY SAY IT IS? | Karen Clement
 
Film260 Flipbook
Film260 FlipbookFilm260 Flipbook
Film260 Flipbook
 
Film260 digitalflipbookshannongrist
Film260 digitalflipbookshannongristFilm260 digitalflipbookshannongrist
Film260 digitalflipbookshannongrist
 
Social Media and Depression
Social Media and DepressionSocial Media and Depression
Social Media and Depression
 
Film 260 flipbook
Film 260 flipbookFilm 260 flipbook
Film 260 flipbook
 
Privacy hazard
Privacy hazardPrivacy hazard
Privacy hazard
 
Why choose m commerce
Why choose m commerceWhy choose m commerce
Why choose m commerce
 
Social media, friend or foe?
Social media, friend or foe?Social media, friend or foe?
Social media, friend or foe?
 
Social Media Is Not Social
Social Media Is Not SocialSocial Media Is Not Social
Social Media Is Not Social
 
260 flipbook
260 flipbook260 flipbook
260 flipbook
 
Your posts are not private
Your posts are not privateYour posts are not private
Your posts are not private
 
FILM260 Flipbook Assignment
FILM260 Flipbook AssignmentFILM260 Flipbook Assignment
FILM260 Flipbook Assignment
 
Digital selfie
Digital selfieDigital selfie
Digital selfie
 
Cheng jessica flipbook_film260
Cheng jessica flipbook_film260Cheng jessica flipbook_film260
Cheng jessica flipbook_film260
 
Helicopter Parent - Flipbook
Helicopter Parent - FlipbookHelicopter Parent - Flipbook
Helicopter Parent - Flipbook
 
Oversharing as Modern Art
Oversharing as Modern ArtOversharing as Modern Art
Oversharing as Modern Art
 
Desensitization
Desensitization Desensitization
Desensitization
 
Food for Thought, and Instagram
Food for Thought, and InstagramFood for Thought, and Instagram
Food for Thought, and Instagram
 
Not so social
Not so social Not so social
Not so social
 

Ähnlich wie The Deception of Privacy, The Truth About a Plugged in Life

Is Online Privacy a Thing of the Past?
Is Online Privacy a Thing of the Past?Is Online Privacy a Thing of the Past?
Is Online Privacy a Thing of the Past?Aleque Juneau
 
Film 260 flipbook
Film 260 flipbookFilm 260 flipbook
Film 260 flipbookJulie Coles
 
Smartphones with Smarter Apps
Smartphones with Smarter AppsSmartphones with Smarter Apps
Smartphones with Smarter AppsSara Dow
 
Technology & Internet Use by Baby Boomers & Beyond
Technology & Internet Use by Baby Boomers & Beyond Technology & Internet Use by Baby Boomers & Beyond
Technology & Internet Use by Baby Boomers & Beyond genevabloemen
 
Error: Your Life Has Been Hacked
Error: Your Life Has Been HackedError: Your Life Has Been Hacked
Error: Your Life Has Been HackedAdelle Leonard
 
Should Kids Use Digital Technology?
Should Kids Use Digital Technology?Should Kids Use Digital Technology?
Should Kids Use Digital Technology?Lucy Peters
 
Snapchats Linger for Longer than 10 Seconds
Snapchats Linger for Longer than 10 SecondsSnapchats Linger for Longer than 10 Seconds
Snapchats Linger for Longer than 10 SecondsStephanie Sheridan
 
2012bruneluniversity 120615094336-phpapp01
2012bruneluniversity 120615094336-phpapp012012bruneluniversity 120615094336-phpapp01
2012bruneluniversity 120615094336-phpapp01Maria Palaska
 
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...IOSR Journals
 
The Evolution of Technology & Etiquette
The Evolution of Technology & EtiquetteThe Evolution of Technology & Etiquette
The Evolution of Technology & EtiquetteChristie Stelling
 
It's a Public World, After All
It's a Public World, After AllIt's a Public World, After All
It's a Public World, After AllJulia Partington
 
Tree incident shows value of remote working
Tree incident shows value of remote workingTree incident shows value of remote working
Tree incident shows value of remote workingJohn Davis
 
The New Digital You
The New Digital YouThe New Digital You
The New Digital Yourichbrilli
 
Bread Crumbs: How We are Building an Online Map to Ourselves
Bread Crumbs: How We are Building an Online Map to OurselvesBread Crumbs: How We are Building an Online Map to Ourselves
Bread Crumbs: How We are Building an Online Map to OurselvesJonah Chin
 
Private Is The New Public: How Society Is Ending Privacy
Private Is The New Public: How Society Is Ending PrivacyPrivate Is The New Public: How Society Is Ending Privacy
Private Is The New Public: How Society Is Ending PrivacyLin Ke
 
Private Is The New Public: How Society Is Ending Privacy
Private Is The New Public: How Society Is Ending PrivacyPrivate Is The New Public: How Society Is Ending Privacy
Private Is The New Public: How Society Is Ending PrivacyLin Ke
 
Privacy flip book assignment film 260 queensu kc
Privacy flip book assignment  film 260  queensu kcPrivacy flip book assignment  film 260  queensu kc
Privacy flip book assignment film 260 queensu kcCatherine Cowperthwaite
 
The Evolution of Technology & Etiquette
The Evolution of Technology & EtiquetteThe Evolution of Technology & Etiquette
The Evolution of Technology & EtiquetteChristie Stelling
 

Ähnlich wie The Deception of Privacy, The Truth About a Plugged in Life (20)

Is Online Privacy a Thing of the Past?
Is Online Privacy a Thing of the Past?Is Online Privacy a Thing of the Past?
Is Online Privacy a Thing of the Past?
 
Film 260 flipbook
Film 260 flipbookFilm 260 flipbook
Film 260 flipbook
 
Smartphones with Smarter Apps
Smartphones with Smarter AppsSmartphones with Smarter Apps
Smartphones with Smarter Apps
 
Flipbook.pdf
Flipbook.pdf Flipbook.pdf
Flipbook.pdf
 
Technology & Internet Use by Baby Boomers & Beyond
Technology & Internet Use by Baby Boomers & Beyond Technology & Internet Use by Baby Boomers & Beyond
Technology & Internet Use by Baby Boomers & Beyond
 
Error: Your Life Has Been Hacked
Error: Your Life Has Been HackedError: Your Life Has Been Hacked
Error: Your Life Has Been Hacked
 
Should Kids Use Digital Technology?
Should Kids Use Digital Technology?Should Kids Use Digital Technology?
Should Kids Use Digital Technology?
 
Snapchats Linger for Longer than 10 Seconds
Snapchats Linger for Longer than 10 SecondsSnapchats Linger for Longer than 10 Seconds
Snapchats Linger for Longer than 10 Seconds
 
2012bruneluniversity 120615094336-phpapp01
2012bruneluniversity 120615094336-phpapp012012bruneluniversity 120615094336-phpapp01
2012bruneluniversity 120615094336-phpapp01
 
L017146571
L017146571L017146571
L017146571
 
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
 
The Evolution of Technology & Etiquette
The Evolution of Technology & EtiquetteThe Evolution of Technology & Etiquette
The Evolution of Technology & Etiquette
 
It's a Public World, After All
It's a Public World, After AllIt's a Public World, After All
It's a Public World, After All
 
Tree incident shows value of remote working
Tree incident shows value of remote workingTree incident shows value of remote working
Tree incident shows value of remote working
 
The New Digital You
The New Digital YouThe New Digital You
The New Digital You
 
Bread Crumbs: How We are Building an Online Map to Ourselves
Bread Crumbs: How We are Building an Online Map to OurselvesBread Crumbs: How We are Building an Online Map to Ourselves
Bread Crumbs: How We are Building an Online Map to Ourselves
 
Private Is The New Public: How Society Is Ending Privacy
Private Is The New Public: How Society Is Ending PrivacyPrivate Is The New Public: How Society Is Ending Privacy
Private Is The New Public: How Society Is Ending Privacy
 
Private Is The New Public: How Society Is Ending Privacy
Private Is The New Public: How Society Is Ending PrivacyPrivate Is The New Public: How Society Is Ending Privacy
Private Is The New Public: How Society Is Ending Privacy
 
Privacy flip book assignment film 260 queensu kc
Privacy flip book assignment  film 260  queensu kcPrivacy flip book assignment  film 260  queensu kc
Privacy flip book assignment film 260 queensu kc
 
The Evolution of Technology & Etiquette
The Evolution of Technology & EtiquetteThe Evolution of Technology & Etiquette
The Evolution of Technology & Etiquette
 

Kürzlich hochgeladen

Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 

Kürzlich hochgeladen (20)

Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 

The Deception of Privacy, The Truth About a Plugged in Life

  • 1. The Deception of Privacy The Truth About a Plugged in Life By Cynthia Beneteau Photo Source: Kristin Flour “Secret” Unsplash https://unsplash.com/collections/327093/privacy-kit?photo=BcjdbyKWquw
  • 2. Prior to the digital age photos were typically just shared with a handful of people, like friends and family. Now, people take more photos in 2 minutes than the entire amount of all the photos that existed 150 years ago. [2] The top three places photos are uploaded to are: Snapchat: 8796 photos per second What's App : 8102 photos per second Facebook :4501 photos per second [3] Photo Source : Gratisography http://colorlisa.com/pictures/105_1.jpg
  • 3. Today’s youth think of privacy differently than adults do. They care more about controlling who is tracking them digitally, who is seeing what they post and what people think when seeing them. The online experience for young people is a social one. If something is posted they do not like, they are more likely to worry about hiding the content from their friends or family, than to worry about teachers or potential employers seeing it. They care more about their reputation than the actual information they are posting[4] Photo Source: http://www.gratisography.com/pictures/303_1.jpg
  • 4. Parents need to consider the long term reach of the digital information they are sharing about their children. A “cute” video of a child doing something silly, can come back to haunt that same child when they become a teenager or adult. Even innocent stories shared by a parent may be a potential source of embarrassment to a child later on. Children, youth and teens should be able to control their digital identities. There is a balance that can be reached, a parent can share information, but limit identifying characteristics so that it protects their children, but they can still share [6] Photo source: https://pixabay.com/en/desperate-sad-depressed-feet-hands-2293377/
  • 5. 72% of Parents are worried about their children’s online interactions with strangers or predators that could harm them. Two major concerns are sexting and cyberbullying. Kids can be horrible to each other and some are even using the internet to create fake identities of other children. They then pose as the child and fabricate information about them. Parents are more than willing to potentially embarrass their child if it will help to keep them safe. [7] Photo Source https://pixabay.com/en/privacy-policy-spy-espionage-nsa-1624400
  • 6. A Study done by “Young Canadians in a Wired World” has indicated more privacy education in schools and homes is needed. According to the study, students have limited comprehension of password sharing, privacy policies, policies around data collection and geo- location services 68% of Students incorrectly believe, that a website will not share their personal information if they have a privacy policy [5] Photo Source : https://www.pexels.com/photo/finger-print-on-enter-key-of-keyboard-163017/
  • 7. “ We make big trade-offs as we become digitally connected everywhere and anytime” causing increased concerns with security and privacy [1] John Palfrey and Urs Gasser, Authors of Interop. The Promise and Perils of Highly Interconnected Systems Photo Source : https://static.pexels.com/photos/160709/raccoon-animal-animal-world-wildlife-photography-160709.jpeg
  • 8. Over a two week period, Carnegie Mellon University Computer Scientist’s ,did a study which determined that quite a few popular Android apps collect GPS coordinates within 50 metres of where the user is. This happens about 6200 times, which is equivalent to about every three minutes [8] Photo Source : https://www.pexels.com/photo/text-on-information-sign-258490/
  • 9. The Carnegie Mellon study also uncovered that the Weather Channel app accesses location information from it’s users every 10 minutes, or 2000 times in a two week period.[8] Photo Source: https://www.pexels.com/photo/reflection-of-building-on-body-of-water-at-daytime-166360
  • 10. When users in the Carnegie study found out how much personal data apps were collecting they tried to restrict the apps from collecting it. Researchers tried to help by sending daily “privacy nudges” to participants letting them know how many times apps were collecting their data [8] Operating updates ,since the study was conducted ,have now removed the software that researchers used to see requests for personal information and the ability to send “privacy nudges “ has also been disabled [8] Photo Source: https://www.pexels.com/photo/london-new-york-tokyo-and-moscow-clocks-48770/
  • 11. Facebook is able to know who your friends and acquaintances are even if you lie about all of your personal information when signing up [9] Photo Source : https://www.pexels.com/photo/photo-of-2-children-walking-23971/
  • 12. Facebook uses Network Science a complex academic field, which uses mapping algorithms, that takes information you provide or give permission for them to access when you sign up. It then uses it to determine the structure of your social network. This data is analyzed and allows them to accurately predict people you are likely to know and even people you will likely know in the future. [9] Photo Source : https://www.pexels.com/photo/hand-thumbs-up-thumb-black-and-white-8252/
  • 13. Samsung Smart TV owners are susceptible to spying. According to “WikiLeaks” documents a program named “Weeping Angel” can make Samsung’s Smart TVs appear to be turned off ,when they really are not. This enables the TV in essence, to work like a bug and record conversations in the room. These are then sent to a hidden CIA server. Michael Hayden, ex CIA director, thinks this is a wonderful capability because there are “ bad people in the world that have Samsung TVs “ [ 10] Photo Source: https://www.pexels.com/photo/full-frame-shot-of-eye-251287/
  • 14. Samsung’s Smart TV Privacy Policy States "Please be aware that if your spoken words include personal or other sensitive information, that information will be among the data captured and transmitted to a third party." A lot of Samsung TVs need users to actually click a microphone button before the voice commands work, but on models such as PN60F8500 the microphone is always listening. [10] Photo source : https://www.pexels.com/photo/night-music-band-microphone-9137
  • 15. Web cams can introduce a number of possible privacy breaches in our homes, nurseries, on our laptops, computers, tablets or anywhere we have online cameras [11] Photo source: https://www.pexels.com/photo/silver-imac-near-white-ceramic-kettle-205316/
  • 16. The frightening idea of someone watching every movement your baby makes is a very real possibility. The lack of the most basic security features are making popular internet connected baby monitors vulnerable to hackers [11] Photo Source: https://www.pexels.com/photo/newborn-child-feed-89695
  • 17. Once a hacker has breached one connected device, anything connected to that Wi-Fi network can potentially be accessed. [11] Photo Source: https://www.pexels.com/photo/low-angle-photo-of-building-under-sky-69080/
  • 18. The use of cameras in public spaces is becoming more common place. Cameras are also now on buses, subways, in ATM machines, and outside gas stations or grocery stores. [12] Photo Source : https://www.pexels.com/photo/black-and-white-streets-bridge-jacket-70402 /
  • 19. Photo Source: https://www.pexels.com/photo/5th-avenue-america-apple-store-architecture-279166 With the advent of Google Street view it is now possible to view someone’s home, business or even their vehicle from the comfort of your living room
  • 20. The expectation of privacy in the digital age may no longer be an option. Perhaps we need to redefine what privacy means and the repercussions of this new interpretation. Photo Source: https://www.pexels.com/photo/butterflies-black-and-white-9159/
  • 21. Sources: 1. Matrix, Sidneyeve “ John Palfrey and Urs Gasser Quote” Module 3 Slides Film 260 Queens University May 2017. 2. Eveleth, Rose. "How Many Photographs Of You Are Out There In The World?". The Atlantic. N.p., 2017. Web. 2 June 2017. https://www.theatlantic.com/technology/archive/2015/11/how-many-photographs-of-you-are-out-there-in-the-world/413389/ 3. Morrison, Kimberlee, and Kimberlee Morrison. "How Many Photos Are Uploaded To Snapchat Every Second?". Adweek.com. N.p., 2017. Web. 2 June 2017.http://www.adweek.com/digital/how-many-photos-are-uploaded-to-snapchat-every-second/ 4. "Online Privacy, Online Publicity: Youth Do More To Protect Their Reputation Than Their Information | Mediasmarts". Mediasmarts.ca. N.p., 2017. Web. 2 June 2017. http://mediasmarts.ca/blog/online-privacy-online-publicity-youth-do-more-protect-their-reputation-their-information 5. Bogart, Nicole. "Young Canadians Lack Understanding Of Online Privacy: Study". Global News. N.p., 2017. Web. 2 June 2017. http://globalnews.ca/news/1159724/young-canadians-lack-understanding-of-online-privacy-study/ 6. Dell’Antonia,Kj “ Don’t post about me on Social Media, Children say” The New York Times March 2017 https://well.blogs.nytimes.com/2016/03/08/dont-post-about-me-on-social-media-children-say/?_r=0 7. Paul, P. (2013, May 5). Cyberparenting and the Risk of T.M.I. New York Times, p. 8(L). Retrieved from http://go.galegroup.com.proxy.queensu.ca/ps/i.do?p=AONE&sw=w&u=queensulaw&v=2.1&it=r&id=GALE%7CA328694536&asid=ed444bf722dd5 54a00a728a96a4737f2 8. Dwoskin, E. “WSJ.D technology: Apps track users -- once every 3 minute”s. Wall Street Journal Mar 24 2015 . Retrieved from https://search- proquest-com.proxy.queensu.ca/docview/1665403896?accountid=6180 9. Dewey, Caitlin “How Facebook knows who all your friends are, even better than you do”. Washingtonpost.com. April2 2015 Retrieved from http://go.galegroup.com.proxy.queensu.ca/ps/i.do?p=AONE&sw=w&u=queensulaw&v=2.1&it=r&id=GALE%7CA408035312&asid=97bdc5e16299b f6c66dcb7543481dace 10. "If You Have A Smart TV, Take A Closer Look At Your Privacy Settings". BuzzFeed. N.p., 2017. Web. 2 June 2017. https://www.buzzfeed.com/nicolenguyen/here-are-the-privacy-settings-you-should-look-at-if-you-have?utm_term=.nqkg6Z0A7N#.cidNjp56Ov 11. "Is Your Baby Monitor Safe? Cybersecurity Firms Says Many Can Be Hacked". CBC News. N.p., 2017. Web. 2 June 2017. http://www.cbc.ca/news/business/several-baby-monitors-vulnerable-to-hacking-cybersecurity-firm-warns-1.3213046 12. Alcoba, Natalie. "Growing Number Of CCTV Surveillance Cameras Outside City Core Dismays Privacy Advocates". National Post. N.p., 2017. Web. 2 June 2017. http://news.nationalpost.com/toronto/growing-number-of-cctv-surveillance-cameras-dismays-privacy-advocates Photo Source : https://www.pexels.com/photo/full-frame-shot-of-metal-332834