2. Internet privacy has been on the
decline for individuals due to a
shift away from net neutrality,
leaving users susceptible to:
• Excessive technological reliance
• Constant online archiving
• Pervasive monitoring
Photo: Lanyard with Media Passcard (Kaboompics, 2017)
3. Photo: Macbook and Ipad on Desk (Pixabay, 2016)
Netizens have never been more vulnerable to
security risks because of the transition to an
‘Internet of Things’ (The Economist, 2014).
Advances in hacking have overcome
previous conventions of protection such as
passwords. Netizens are more connected
than ever.
EXCESSIVE TECHNOLOGICAL RELIANCE
4. Photo: People Coffee Meeting Team (Bailey, 2014)
Wi-fi has become a mainstay
in public spaces.
When utilizing an unsecure open network, a hacker can easily
work in between the user and the hotspot, or even distribute
malware (KasperSky, 2017).
Are you taking extra precautions to protect
personal data such as banking information and
important e-mails to prevent data leaking?
5. Photo: White Switch Hub Turned On (Martinelle, 2016)
By the end of this
decade there could be
some 50 billion things
with web connections
- Cisco (The Economist, 2014)
6. Photo: Interior of Modern Kitchen (Kaboompics, 2017)
Our society has become linked
to an internet of things as
electronic devices can connect
to the internet, communicate,
share, and upload information
instantaneously (Office of the Privacy
Commissioner of Canada [OPC], 2016).
With increasing access points
of information, users are more
vulnerable to being hacked
(The Economist, 2014).
7. Photo: Abus Brand Close Up Closed (Pixabay, 2016)
(Alt, 2014, p.1).
of internet users have had an email or
social media account hacked or taken
over by someone else without their
permission [...]
believe that current laws are not good enough
in protecting the rights of internet users
8. Photo: Beach Water Steps Sand (Calvo, 2017)
Everyone on the web has a digital footprint that will
never disappear. Google searches and social media
are becoming tools of investigation used by future
recruiters to screen potential candidates.
In this day and age, does
privacy truly exist?
CONSTANT ONLINE ARCHIVING
9. Photo: White and Brown Archipelago Map with Colored Head Beads (Unsplash, 2016)
The crumbs of data
we leave behind as we
flit from link to link
- Nicholas Carr
(Matrix, 2017)
10. Users are leaving
digital footprints by
sharing and archiving
their lives. Through
constant documentation
onto the web, users
become obsessed
and conditioned to
interrupted experiences
because of technology
(Turkle, 2013).
Photo: Mirror Showing Group of People during Daytime (Unsplash, 2016)
11. Photo: Adult Audience Celebration Cheering (Kubassek, 2017)
Social media use can act
as a double edged sword
(Singer, 2013, p.1).
With modern technology, potential candidacy can be
jeopardized due to their online image. With a single type
search, past and present information may be revealed
regarding an individual.
12. Photo: Woman in Black Shirt Facing Mirror (Obolensky, 2016)
As the lack of privacy and permanency on the web
becomes more evident, users need to become more
vigilant of what they post to avoid an unwanted
personal image (Rosen, 2010).
13. Photo: Adult Blurr Boss Business (Energepic, 2016)
According to a study conducted
by Microsoft, 75% of US
recruiters report conducting an
online research about candidates
through search engines and
social networking sites
(Rosen, 2010, p.1).
14. Photo: Elegant Workspace with Macbook, iPhone, Business cards and Notebook (Kaboompics, 2017)
With this knowledge,
individuals are responding
to privacy concerns in
the employment process
by polishing their
online profiles to make
themselves more appealing
(Bowness, 2013).
15. Photo: White Printer Paper (Unsplash, 2016)
The ease of use and accessibility of the web obscures
its actual cost. Personal privacy is a deception created by
social media companies as every ad seen by the individual
is monitored closely (Santa Clara University, 2013).
Does social media influence
your daily lifestyle and
personal decisions?
PERVASIVE MONITORING
16. Photo: Women using Smartphone while Fronting a Macbook Pro and Black Ipad (Picjumbo, 2016)
Pervasive monitoring
involves keeping
track of the sites
visited, number of
clicks, and recording
of which ads worked
best for an individual
(Van Grove, 2013).
17. Web users are constantly
monitored with cookies. Cookies
track when a site is first visited
and continues to keep records of
a user’s patterns
(Singh & Kumar, 2016).
Photo: Building Pattern Wall Architecture (Pixabay, 2017)
18. Photo: Hands Apple Computer iMac (Kayda, 2016)
Information is also collected by
advertising companies through
buying an individual’s profile
and purchasing patterns from
social media sites(Manjoo, 2013).
19. Photo: City Marketing Lights Night (Unsplash, 2017)
Consumers lose their privacy
as their every move is
followed, and are susceptible
to external influences because
of the tailored ads(Oetting, 2016).
20. Privacy on the internet has an evident
gap in protection policies because
although finances are protected, browsing
information is not (Fiegerman & Larson, 2017).
With the development of the digital age,
there is increasing challenges to legislative
frameworks as personal security is at risk
when there is potential for seamless cyber
surveillance (OPC, 2016).
Photo: Couple Standing in the Street beside the Building while Looking Up (Unsplash, 2016)
21. Consumers are becoming more
connected to online networking
and the web which imposes a shift
away from neutrality (OPC, 2016).
Internet infrastructure is complexly
growing which raises caution for
users
(Finamore, Mellia, Meo, Munafo, & Rossi, 2011).
Photo: Staircase by a Yellow Wall (Kaboompics, 2017)
22. Photo: Interior of Office Building (Manuel, 2017)
In modern society,
internet privacy is declining due to the
increasing reliance on technology, the
permanency of the digital web, and
constant monitoring. Ultimately, without
adequate privacy protection policies, the
future of online confidentiality is dire.
CONCLUSION
23. REFERENCE LIST
Alt, K. (2014, September 04). 11 Online privacy statistics you may not know. AsecureLife. Retrieved from http://www.asecurelife.com/internet-privacy-statistics/
Bowness, S. (2013, January 11). Making the most of social media. The Globe and Mail. Retrieved from https://search-proquest-com.proxy.queensu.ca/
docview/1811305776?accountid=6180
Fiegerman, S. & Larson, S. (2017, April 05). The uncertain future of internet privacy. CNN Tech. Retrieved from http://money.cnn.com/2017/04/05/technology/
internet-privacy-future/
Finamore, A., Mellia, M., Meo, M., Munafo, M., & Rossi, D. (2011). Experiences of internet traffic monitoring with Tstat. IEEE Network, 25, 8-14. doi:10.1109/
MNET.2011.5772055
KasperSky (2017, May 15). How to avoid public WiFi security risks. Kaspersky Lab. Retrieved from https://usa.kaspersky.com/resource-center/preemptive-safety/
public-wifi-risks
Oetting, J. (2016, April 09). Emotional advertising: how brands use feelings to get people to buy. Retrieved from https://blog.hubspot.com/marketing/emo
tions-in-advertising-examples#sm.0000is7clupxdd34t5u29ybg9kz9t
Office of the Privacy Commissioner of Canada (2016, February). The internet of things an introduction to privacy issues with a focus on the retail and home envi
ronments. Retrieved from https://www.priv.gc.ca/media/1808/iot_201602_e.pdf
Manjoo, F. (2013, March 20). Facebook followed you to the supermarket. Slate. Retrieved from http://www.trutv.com/shows/adam-ruins-everything/blog/ad
ams-sources/adam-ruins-the-internet.html
Matrix, S. (2017, May 08). Module 02 Lecture 02 Online friends Video. Retrieved from https://onq.queensu.ca/d2l/le/content/117252/viewContent/936374/View
Rosen, J. (2010, July 21). The web means the end of forgetting. The New York Times. Retrieved from http://www.nytimes.com/2010/07/25/magazine/25priva
cy-t2.html?pagewanted=all
Santa Clara University. (2013, February 04). Loss of online privacy: what’s the harm?. Retrieved from https://www.scu.edu/ethics/privacy/loss-of-online-privacy-
whats-the-harm/
Singer, N. (2013, November 11). In college admissions, social media can be a double-edged sword. The New York Times. Retrieved from https://bits.blogs.ny
times.com/2013/11/11/in-college-admissions-social-media-can-be-a-double-edged-sword/
Singh, R. & Kumar, S. (2016). A study of cookies and threats to cookies. International Journal of Advanced Research in Computer Science and Software Engineering,
6(3), 339-343. Retrieved from https://www.ijarcsse.com/docs/papers/Volume_6/3_March2016/V6I3-0222.pdf
The Economist. (2014, July 12). Home, hacked home; The internet of things. Retrieved from http://go.galegroup.com.proxy.queensu.ca/ps/i.do?id=GALE%
7CA374524912&v=2.1&u=queensulaw&it=r&p=AONE&sw=w&asid=3f62b19a238f2dbcba05701695a2d62f
Turkle, S. (2013, December 16). The documented life. The New York Times. Retrieved from http://go.galegroup.com.proxy.queensu.ca/ps/i.do?id=GALE%
7CA352990428&v=2.1&u=queensulaw&it=r&p=AONE&sw=w&asid=64ed7fd1666adff5f62d1e8fab1a0ca1
Van Grove, J. (2013, March 28). Facebook makes risky bet on news feed ads that track you. CNET. Retrieved from https://www.cnet.com/news/facebook-makes-
risky-bet-on-news-feed-ads-that-track-you/
24. IMAGES REFERENCE LIST
Bailey, E. (Photographer). (2014). People coffee meeting team. [Digital Image]. Retrieved from https://www.pexels.com/photo/people-coffee-meeting-team-7096/
Boskampi. (Photographer). (2017). View of airport. [Digital Image]. Retrieved from https://www.pexels.com/photo/view-of-airport-247791/
Calvo, A. (Photographer). (2017). Beach water steps sand. [Digital Image]. Retrieved from https://www.pexels.com/photo/beach-water-steps-sand-17727/
Energepic. (Photographer). (2016). Adult blurr boss business. [Digital Image]. Retrieved from https://www.pexels.com/photo/adult-blur-boss-business-288477/
Kaboompics. (Photographer). (2017). Staircase by a yellow wall. [Digital Image]. Retrieved from http://kaboompics.com/photo/2163/staircase-by-a-yellow-wall
Kaboompics. (Photographer). (2017). Lanyard with media passcard. [Digital Image]. Retrieved from http://kaboompics.com/photo/4333/lanyard-with-media-pass-card
Kaboompics. (Photographer). (2017). Interior of modern kitchen. [Digital Image]. Retrieved from http://kaboompics.com/photo/3647/interior-of-a-modern-kitchen
Kaboompics. (Photographer). (2017). Elegant workspace with macbook, iPhone, business cards and notebook. [Digital Image]. Retrieved from http://kaboompics.
com/photo/207/elegant-workspace-with-macbook-iphone-business-cards-and-notebooks
Kayda, H. (Photographer). (2016). Hands apple computer iMac. [Digital Image]. Retrieved from https://www.pexels.com/photo/hands-apple-computer-imac-90800/
Kubassek, T. (Photographer). (2017). Adult audience celebration cheering. [Digital Image]. Retrieved from https://www.pexels.com/photo/adult-audience-celebra
tion-cheering-342521/
Manuel. (Photographer). (2017). Interior of office building. [Digital Image]. Retrieved from https://www.pexels.com/photo/interior-of-office-building-325229/
Martinelle. (Photographer). (2016). White switch hub turned on. [Digital Image]. Retrieved from https://www.pexels.com/photo/white-switch-hub-turned-on-159304/
Obolensky, I. (Photographer). (2016). Woman in black shirt facing mirror. [Digital Image]. Retrieved from https://www.pexels.com/photo/woman-in-black-shirt-fac
ing-mirror-211024/
Picjumbo. (Photographer). (2016). Women using smartphone while fronting a macbook pro and black Ipad. [Digital Image]. Retrieved from https://www.pexels.
com/photo/woman-using-a-smartphone-while-fronting-a-macbook-pro-and-black-ipad-196656/
Pixabay. (Photographer). (2017). Building pattern wall architecture. [Digital Image]. Retrieved from https://www.pexels.com/photo/building-pattern-wall-architec
ture-33317/
Pixabay. (Photographer). (2016). Macbook and Ipad on desk. [Digital Image]. Retrieved from https://www.pexels.com/photo/macbook-and-ipad-on-desk-207589/
Pixabay. (Photographer). (2016). Abus brand close up closed. [Digital Image]. Retrieved from https://www.pexels.com/photo/abus-brand-close-up-closed-277670/
Unsplash. (Photographer). (2017). City marketing lights night. [Digital Image]. Retrieved from https://www.pexels.com/photo/city-marketing-lights-night-1300/
Unsplash. (Photographer). (2016). White and brown archipelago map with colored head beads. [Digital Image]. Retrieved from https://www.pexels.com/photo/
white-and-brown-archipelago-map-with-colored-head-pins-212088/
Unsplash. (Photograper). (2016). Mirror showing group of people during daytime. [Digital Image]. Retrieved from https://www.pexels.com/photo/mirror-showing-
group-of-people-during-daytime-199467/
Unsplash. (Photographer). (2016). Couple standing in the street beside the building while looking up. [Digital Image]. Retrieved from https://www.pexels.com/pho
to/couple-standing-in-the-street-beside-the-building-while-looking-up-90837/
Unsplash. (Photographer). (2016). White printer paper. [Digital Image]. Retrieved from https://www.pexels.com/photo/white-printer-paper-57761/