SlideShare a Scribd company logo
1 of 22
Download to read offline
THE BREAD CRUMB TRAIL
HOW WE ARE BUILDING AN ONLINE MAP TO OURSELVES
created by Jonah Chin
Photo “Escape” courtesy of Flickr.com by Sonny Abesamis (CC License: https://creativecommons.org/licenses/by/2.0/)
With technology
inching
into every facet of
life,
we are mapping out our
existence --
to a much
wider
audience than many expect
Photo “big brother is watching you” courtesy of Flickr.com by Silvision (CC License: https://creativecommons.org/licenses/by/2.0/)
how are we
CREATING
this map?
Photo “Note” courtesy of Flickr.com by Paul Hayday (CC License: https://creativecommons.org/licenses/by/2.0/)
It starts with the
attachment
people have to their
smart devices
Photo “Texting” courtesy of Flickr.com by Alexandra Zakharova (CC License: https://creativecommons.org/licenses/by/2.0/)
94%
of college students feel
troubled
when not carrying their
phone1
31%
of U.S. cellphone
owners say they
never
turn their phone off2
Photo “Crowd” courtesy of Flickr.com by James Cridland (CC License: https://creativecommons.org/licenses/by/2.0/)
Google Play Services,
which distributes information to a
variety of apps, computed location
2,200
times during a 2 week study3
- Carnegie Mellon University study
With phones on and with their
owners so often, it is
EASY
to track users' whereabouts
Photo “Earth’s City Lights 1994” courtesy of Flickr.com by NASA Goddard Space Flight Center (CC License: https://creativecommons.org/licenses/by/2.0/)
While this frequent use of smartphones
can create and expose location
DATA,
upcoming technologies, such as smart watches, can
create and expose other kinds of important
DATA
Photo “Captura de Ecra” courtesy of Flickr.com by android PT (CC License: https://creativecommons.org/licenses/by/2.0/)
“Theses devices will almost certainly contain
extremely
personal data, including sensitive
health information”
- Ryan Faas, Mobile Strategist
4
Photo “heartbeat” courtesy of Flickr.com by Rosemary Voegtli (CC License: https://creativecommons.org/licenses/by/2.0/)
Apple
Watch
monitors
your heart
rate
and can
help you
be more
conscious
of your
overall
health and
well-being5
- Apple
Photo “Apple Watch Sport – Activity Glance” courtesy of Flickr.com by Peter Parkes (CC License: https://creativecommons.org/licenses/by/2.0/)
Photo “Watching the Skyline” courtesy of Flickr.com by Peter (CC License: https://creativecommons.org/licenses/by/2.0/)
who can
SEE
our map?
Large corporations such as
FACEBOOK&GOOGLE
have access to an alarming amount of
their users’ personal information
Photo “Fading in the sky” courtesy of Flickr.com by Andrei Daniel Ticlean (CC License: https://creativecommons.org/licenses/by/2.0/)
”He lied about
allof his
information
…so he was rightly freaked
out when Facebook
still managed
to predict and ‘recommend’ a
huge number of his real-life
acquaintances”6
- Redditor on making first Facebook account
Photo “Facebook Beachfront” courtesy of Flickr.com by mkhmarketing (CC License: https://creativecommons.org/licenses/by/2.0/)
“[Google maps’] information is even
broken down by date,
showing an extremely
detailed record of
all your movements”8
- Robin Burks, Tech Times
After investigating
Google’s Privacy Policy in 2012,
data protection authorities reported
that Google’s Privacy Policy
did not comply
with European
data protection laws 7
Photo “Straßenkarte” courtesy of Flickr.com by Mike Haller (CC License: https://creativecommons.org/licenses/by/2.0/)
“Today’s privacy policies
are misleading and opaque”9
-- Jennifer Golbeck
Photo “Face” courtesy of Flickr.com by Andrew Parnell (CC License: https://creativecommons.org/licenses/by/2.0/)
Many companies today have unclear privacy policies.
Track Star, a shopping assistant app, states it will
share personal information
with Affiliated Partners. It
does not state
what an Affiliated Partner is9
Photo “Shadow” courtesy of Flickr.com by Kevin D (CC License: https://creativecommons.org/licenses/by/2.0/)
So how can we know who has our
information?
Thanks to
Edward Snowden,
we know of at least one party who
has been collecting our personal
data:
The United States
Government
The NSA tapped
directly into the servers of
nine internet firms, including
Facebook and Google
to track online communication in a
surveillance program
known as Prism10
Photo “Closed-circuit sense of security” courtesy of Flickr.com by Jake Setlak (CC License: https://creativecommons.org/licenses/by/2.0/)
The more people that have
access
to our personal map, the more easily it is
hacked and used with malicious intent
Photo “Open Doors and Cobwebs” courtesy of Flickr.com by Donnie Nunley (CC License: https://creativecommons.org/licenses/by/2.0/)
Half
of American adults had their
personal information
exposed
to hackers last year alone11
Photo courtesy of Flickr.com by Seniju (CC License: https://creativecommons.org/licenses/by/2.0/)
In a recent breach of government computers, hackers stole
addresses,
health & financial
history,
and other private details, from 21.5 million people12
Photo “Hacker Rene” courtesy of Flickr.com by Ivan David Gomez Arce (CC License: https://creativecommons.org/licenses/by/2.0/)
If hackers can gain access to
government computers,
imagine how easy it would be for them to obtain
information from undisclosed
“Affiliated Partners”
of the apps and sites we upload information to
Photo “wocintech (microsoft) – 47” courtesy of Flickr.com by WOCinTech Chat (CC License: https://creativecommons.org/licenses/by/2.0/)
In the rise of connected technology,
we are building a dangerous, online
MAP OF OURSELVES
& often do not know who has
ACCESS
to it, or the
RISKS
it creates
Photo “365-211” courtesy of Flickr.com by Canned Muffins (CC License: https://creativecommons.org/licenses/by/2.0/)
1. Margalit L. Why We're Addicted To Our Smartphones, But Not Our Tablets. Smashing Magazine. 2015. Available
at: https://www.smashingmagazine.com/2015/11/why-addicted-smartphones-not-tablets/. Accessed June 2, 2016.
2. Rainie LZickuhr K. Americans’ Views on Mobile Etiquette. Pew Research Center: Internet, Science & Tech. 2015.
Available at: http://www.pewinternet.org/2015/08/26/americans-views-on-mobile-etiquette/. Accessed June 2, 2016.
3. Dwoskin E. Where Were You 3 Minutes Ago? Your Apps Know. The Wall Street Journal. 2015. Available at:
http://blogs.wsj.com/digits/2015/03/23/where-were-you-3-minutes-ago-your-apps-know/. Accessed June 2, 2016.
4. Cole S. How The Apple Watch Will Change Office Life. Fast Company. 2015. Available at:
http://www.fastcompany.com/3043533/the-future-of-work/how-the-apple-watch-will-change-office-life.
Accessed June 2, 2016.
5. Apple Watch - Health - Apple (CA). Apple (CA). 2016. Available at: http://www.apple.com/ca/watch/health/.
Accessed June 2, 2016.
6. Dewey C. How Facebook knows who all your friends are, even better than you do. Washington Post. 2015.
Available at: https://www.washingtonpost.com/news/the-intersect/wp/2015/04/02/how-facebook-knows-who-all-your-
friends-are-even-better-than-you-do/. Accessed June 2, 2016.
7. Big Brother Watch. UK Public Research - Online Privacy. London: Four Millbank; 2016:8. Available at:
http://www.bigbrotherwatch.org.uk/wp-content/uploads/2015/03/Big-Brother-Watch-Polling-Results.pdf.
Accessed June 2, 2016.
8. Burks R. Google Maps knows where you're going and where you've been. Tech Times. 2014. Available at:
http://www.techtimes.com/articles/13326/20140818/google-maps-knows-where-youre-going-and-where-youve-
been.htm. Accessed June 3, 2016.
9. Golbeck J. Track Star: This app follows you while you shop - and it needs a clearer privacy policy. Slate Magazine.
2014. Available at: http://www.slate.com/articles/technology/future_tense/2014/01/
ibeacon_shopkick_privacy_policies_for_location_tracking_apps_aren_t_clear.single.html. Accessed June 3, 2016.
10. Edward Snowden: Leaks that exposed US spy programme. BBC News. 2014. Available at:
http://www.bbc.com/news/world-us-canada-23123964. Accessed June 3, 2016.
11. Keller J, Lai K, Perlroth N. How Many Times Has Your Personal Information Been Exposed to Hackers?. Nytimescom.
2015. Available at: http://www.nytimes.com/interactive/2015/07/29/technology/personaltech/what-parts-of-your-
information-have-been-exposed-to-hackers-quiz.html?_r=0. Accessed June 3, 2016.
12. Davis J. Hacking of Government Computers Exposed 21.5 Million People. Nytimescom. 2015. Available at:
http://www.nytimes.com/2015/07/10/us/office-of-personnel-management-hackers-got-data-of-millions.html.
Accessed June 3, 2016.
Photo “Test with paper silhouettes & macro ” courtesy of Flickr.com by Gabriel Garcia Marengo (CC License: https://creativecommons.org/licenses/by/2.0/)

More Related Content

What's hot

Liaison AGM powerpoint presenation on social media
Liaison AGM powerpoint presenation on social mediaLiaison AGM powerpoint presenation on social media
Liaison AGM powerpoint presenation on social media
Melissa Cheater
 
Smartphones; For Better or For Worse
Smartphones; For Better or For Worse Smartphones; For Better or For Worse
Smartphones; For Better or For Worse
Asad Amir
 
We are addicted to our smartphones
We are addicted to our smartphonesWe are addicted to our smartphones
We are addicted to our smartphones
Opale F
 
Twitter and Photography
Twitter and Photography Twitter and Photography
Twitter and Photography
Jaleh Fazelian
 
Film 260 flipbook
Film 260 flipbookFilm 260 flipbook
Film 260 flipbook
ckelp
 

What's hot (20)

Networked: The New Social Operating System in Civic Life
Networked: The New Social Operating System in Civic LifeNetworked: The New Social Operating System in Civic Life
Networked: The New Social Operating System in Civic Life
 
There’s An App For That
There’s An App For ThatThere’s An App For That
There’s An App For That
 
Personal brand maintenance
Personal brand maintenance Personal brand maintenance
Personal brand maintenance
 
Too Young?
Too Young?Too Young?
Too Young?
 
Liaison AGM powerpoint presenation on social media
Liaison AGM powerpoint presenation on social mediaLiaison AGM powerpoint presenation on social media
Liaison AGM powerpoint presenation on social media
 
The Rise of Wearable Technology
The Rise of Wearable TechnologyThe Rise of Wearable Technology
The Rise of Wearable Technology
 
Smartphones; For Better or For Worse
Smartphones; For Better or For Worse Smartphones; For Better or For Worse
Smartphones; For Better or For Worse
 
We are addicted to our smartphones
We are addicted to our smartphonesWe are addicted to our smartphones
We are addicted to our smartphones
 
And We Shall Call it Freedom: How We Chose to End Privacy
And We Shall Call it Freedom: How We Chose to End PrivacyAnd We Shall Call it Freedom: How We Chose to End Privacy
And We Shall Call it Freedom: How We Chose to End Privacy
 
WEARABLES: THE GOOD, THE BAD, & THEY'RE UGLY
WEARABLES: THE GOOD, THE BAD, & THEY'RE UGLYWEARABLES: THE GOOD, THE BAD, & THEY'RE UGLY
WEARABLES: THE GOOD, THE BAD, & THEY'RE UGLY
 
4 hstaff final
4 hstaff final4 hstaff final
4 hstaff final
 
Film 260 flipbook
Film 260 flipbookFilm 260 flipbook
Film 260 flipbook
 
Twitter and Photography
Twitter and Photography Twitter and Photography
Twitter and Photography
 
EduWeb - Building a Responsive Website for the Presidential Debate
EduWeb - Building a Responsive Website for the Presidential DebateEduWeb - Building a Responsive Website for the Presidential Debate
EduWeb - Building a Responsive Website for the Presidential Debate
 
Should Mobile Devices be Considered the New It Drug?
Should Mobile Devices be Considered the New It Drug?Should Mobile Devices be Considered the New It Drug?
Should Mobile Devices be Considered the New It Drug?
 
Social Media for Georgia FCS Extension
Social Media for Georgia FCS ExtensionSocial Media for Georgia FCS Extension
Social Media for Georgia FCS Extension
 
Film 260 flipbook
Film 260 flipbookFilm 260 flipbook
Film 260 flipbook
 
Fall 2011 tech tools
Fall 2011 tech toolsFall 2011 tech tools
Fall 2011 tech tools
 
Design From the Content Out
Design From the Content OutDesign From the Content Out
Design From the Content Out
 
Breaking down the barriers - visitors, residents and user-orientated communic...
Breaking down the barriers - visitors, residents and user-orientated communic...Breaking down the barriers - visitors, residents and user-orientated communic...
Breaking down the barriers - visitors, residents and user-orientated communic...
 

Viewers also liked

Resume - Sunilkumar T
Resume - Sunilkumar TResume - Sunilkumar T
Resume - Sunilkumar T
Sunil Kumar
 
Presentation synergie informatique 28 mars rse publication
Presentation synergie informatique  28 mars rse publicationPresentation synergie informatique  28 mars rse publication
Presentation synergie informatique 28 mars rse publication
Synergie Informatique France
 
Le recrutement à traves les réseaux sociaux
Le recrutement à traves les réseaux sociauxLe recrutement à traves les réseaux sociaux
Le recrutement à traves les réseaux sociaux
Zakaria Laroussi
 

Viewers also liked (12)

Raska1
Raska1Raska1
Raska1
 
NewDHResume6 copy 2
NewDHResume6 copy 2NewDHResume6 copy 2
NewDHResume6 copy 2
 
SAT Booklet FINAL
SAT Booklet FINALSAT Booklet FINAL
SAT Booklet FINAL
 
Resume - Sunilkumar T
Resume - Sunilkumar TResume - Sunilkumar T
Resume - Sunilkumar T
 
Enzyme biosensor final
Enzyme biosensor finalEnzyme biosensor final
Enzyme biosensor final
 
Conférence "Optimiser son référencement Internet"
Conférence "Optimiser son référencement Internet"Conférence "Optimiser son référencement Internet"
Conférence "Optimiser son référencement Internet"
 
Presentation synergie informatique 28 mars rse publication
Presentation synergie informatique  28 mars rse publicationPresentation synergie informatique  28 mars rse publication
Presentation synergie informatique 28 mars rse publication
 
Le recrutement à traves les réseaux sociaux
Le recrutement à traves les réseaux sociauxLe recrutement à traves les réseaux sociaux
Le recrutement à traves les réseaux sociaux
 
Le contenu web & multiplateformes : stratégies et bonnes pratiques
Le contenu web & multiplateformes : stratégies et bonnes pratiquesLe contenu web & multiplateformes : stratégies et bonnes pratiques
Le contenu web & multiplateformes : stratégies et bonnes pratiques
 
Le web marketing ou comment bien communiquer sur la toile
Le web marketing ou comment bien communiquer sur la toileLe web marketing ou comment bien communiquer sur la toile
Le web marketing ou comment bien communiquer sur la toile
 
Référencement, e-commerce et visibilité : formation CCI par KEEG
Référencement, e-commerce et visibilité : formation CCI par KEEGRéférencement, e-commerce et visibilité : formation CCI par KEEG
Référencement, e-commerce et visibilité : formation CCI par KEEG
 
Analyse et conception des scénarios d’apprentissage - Activité 2 séminaire ec...
Analyse et conception des scénarios d’apprentissage - Activité 2 séminaire ec...Analyse et conception des scénarios d’apprentissage - Activité 2 séminaire ec...
Analyse et conception des scénarios d’apprentissage - Activité 2 séminaire ec...
 

Similar to Bread Crumbs: How We are Building an Online Map to Ourselves

Gov 2.0 - Trust and Transparency
Gov 2.0 - Trust and TransparencyGov 2.0 - Trust and Transparency
Gov 2.0 - Trust and Transparency
Martin Boyce
 
Smartphones with Smarter Apps
Smartphones with Smarter AppsSmartphones with Smarter Apps
Smartphones with Smarter Apps
Sara Dow
 

Similar to Bread Crumbs: How We are Building an Online Map to Ourselves (20)

Untitled1
Untitled1Untitled1
Untitled1
 
The Deception of Privacy, The Truth About a Plugged in Life
The Deception of Privacy, The Truth About a Plugged in LifeThe Deception of Privacy, The Truth About a Plugged in Life
The Deception of Privacy, The Truth About a Plugged in Life
 
Gov 2.0 - Trust and Transparency
Gov 2.0 - Trust and TransparencyGov 2.0 - Trust and Transparency
Gov 2.0 - Trust and Transparency
 
Disconnected Connection
Disconnected ConnectionDisconnected Connection
Disconnected Connection
 
Is Online Privacy a Thing of the Past?
Is Online Privacy a Thing of the Past?Is Online Privacy a Thing of the Past?
Is Online Privacy a Thing of the Past?
 
The Impact of Social Media on Adolescents' Mental Health
The Impact of Social Media on Adolescents' Mental Health The Impact of Social Media on Adolescents' Mental Health
The Impact of Social Media on Adolescents' Mental Health
 
Converging Communications: The Perfect Storm
Converging Communications: The Perfect StormConverging Communications: The Perfect Storm
Converging Communications: The Perfect Storm
 
Multiplying the impact of online instruction - "The Obviousness of Open Policy"
Multiplying the impact of online instruction - "The Obviousness of Open Policy"Multiplying the impact of online instruction - "The Obviousness of Open Policy"
Multiplying the impact of online instruction - "The Obviousness of Open Policy"
 
Not re-decentralizing the Web is not only a missed opportunity, it is irrespo...
Not re-decentralizing the Web is not only a missed opportunity, it is irrespo...Not re-decentralizing the Web is not only a missed opportunity, it is irrespo...
Not re-decentralizing the Web is not only a missed opportunity, it is irrespo...
 
Smartphones with Smarter Apps
Smartphones with Smarter AppsSmartphones with Smarter Apps
Smartphones with Smarter Apps
 
Social Media Edge- Feb 2010
Social Media Edge- Feb 2010Social Media Edge- Feb 2010
Social Media Edge- Feb 2010
 
Why radical librarianship? An introduction...
Why radical librarianship? An introduction...Why radical librarianship? An introduction...
Why radical librarianship? An introduction...
 
Media Web Meet-up 1: CC "Rock'n'Rebirth"
Media Web Meet-up 1: CC "Rock'n'Rebirth"Media Web Meet-up 1: CC "Rock'n'Rebirth"
Media Web Meet-up 1: CC "Rock'n'Rebirth"
 
Why Radical Librarianship?
Why Radical Librarianship?Why Radical Librarianship?
Why Radical Librarianship?
 
The Evolution of Technology & Etiquette
The Evolution of Technology & EtiquetteThe Evolution of Technology & Etiquette
The Evolution of Technology & Etiquette
 
Teaching Visual Literacy in the Age of Fake News and Social Media
Teaching Visual Literacy in the Age of Fake News and Social MediaTeaching Visual Literacy in the Age of Fake News and Social Media
Teaching Visual Literacy in the Age of Fake News and Social Media
 
Error: Your Life Has Been Hacked
Error: Your Life Has Been HackedError: Your Life Has Been Hacked
Error: Your Life Has Been Hacked
 
There Maybe Good
There Maybe GoodThere Maybe Good
There Maybe Good
 
There Might Be Good
There Might Be GoodThere Might Be Good
There Might Be Good
 
The Evolution of Technology & Etiquette
The Evolution of Technology & EtiquetteThe Evolution of Technology & Etiquette
The Evolution of Technology & Etiquette
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 

Bread Crumbs: How We are Building an Online Map to Ourselves

  • 1. THE BREAD CRUMB TRAIL HOW WE ARE BUILDING AN ONLINE MAP TO OURSELVES created by Jonah Chin Photo “Escape” courtesy of Flickr.com by Sonny Abesamis (CC License: https://creativecommons.org/licenses/by/2.0/)
  • 2. With technology inching into every facet of life, we are mapping out our existence -- to a much wider audience than many expect Photo “big brother is watching you” courtesy of Flickr.com by Silvision (CC License: https://creativecommons.org/licenses/by/2.0/)
  • 3. how are we CREATING this map? Photo “Note” courtesy of Flickr.com by Paul Hayday (CC License: https://creativecommons.org/licenses/by/2.0/)
  • 4. It starts with the attachment people have to their smart devices Photo “Texting” courtesy of Flickr.com by Alexandra Zakharova (CC License: https://creativecommons.org/licenses/by/2.0/)
  • 5. 94% of college students feel troubled when not carrying their phone1 31% of U.S. cellphone owners say they never turn their phone off2 Photo “Crowd” courtesy of Flickr.com by James Cridland (CC License: https://creativecommons.org/licenses/by/2.0/)
  • 6. Google Play Services, which distributes information to a variety of apps, computed location 2,200 times during a 2 week study3 - Carnegie Mellon University study With phones on and with their owners so often, it is EASY to track users' whereabouts Photo “Earth’s City Lights 1994” courtesy of Flickr.com by NASA Goddard Space Flight Center (CC License: https://creativecommons.org/licenses/by/2.0/)
  • 7. While this frequent use of smartphones can create and expose location DATA, upcoming technologies, such as smart watches, can create and expose other kinds of important DATA Photo “Captura de Ecra” courtesy of Flickr.com by android PT (CC License: https://creativecommons.org/licenses/by/2.0/)
  • 8. “Theses devices will almost certainly contain extremely personal data, including sensitive health information” - Ryan Faas, Mobile Strategist 4 Photo “heartbeat” courtesy of Flickr.com by Rosemary Voegtli (CC License: https://creativecommons.org/licenses/by/2.0/)
  • 9. Apple Watch monitors your heart rate and can help you be more conscious of your overall health and well-being5 - Apple Photo “Apple Watch Sport – Activity Glance” courtesy of Flickr.com by Peter Parkes (CC License: https://creativecommons.org/licenses/by/2.0/)
  • 10. Photo “Watching the Skyline” courtesy of Flickr.com by Peter (CC License: https://creativecommons.org/licenses/by/2.0/) who can SEE our map?
  • 11. Large corporations such as FACEBOOK&GOOGLE have access to an alarming amount of their users’ personal information Photo “Fading in the sky” courtesy of Flickr.com by Andrei Daniel Ticlean (CC License: https://creativecommons.org/licenses/by/2.0/)
  • 12. ”He lied about allof his information …so he was rightly freaked out when Facebook still managed to predict and ‘recommend’ a huge number of his real-life acquaintances”6 - Redditor on making first Facebook account Photo “Facebook Beachfront” courtesy of Flickr.com by mkhmarketing (CC License: https://creativecommons.org/licenses/by/2.0/)
  • 13. “[Google maps’] information is even broken down by date, showing an extremely detailed record of all your movements”8 - Robin Burks, Tech Times After investigating Google’s Privacy Policy in 2012, data protection authorities reported that Google’s Privacy Policy did not comply with European data protection laws 7 Photo “Straßenkarte” courtesy of Flickr.com by Mike Haller (CC License: https://creativecommons.org/licenses/by/2.0/)
  • 14. “Today’s privacy policies are misleading and opaque”9 -- Jennifer Golbeck Photo “Face” courtesy of Flickr.com by Andrew Parnell (CC License: https://creativecommons.org/licenses/by/2.0/)
  • 15. Many companies today have unclear privacy policies. Track Star, a shopping assistant app, states it will share personal information with Affiliated Partners. It does not state what an Affiliated Partner is9 Photo “Shadow” courtesy of Flickr.com by Kevin D (CC License: https://creativecommons.org/licenses/by/2.0/) So how can we know who has our information?
  • 16. Thanks to Edward Snowden, we know of at least one party who has been collecting our personal data: The United States Government The NSA tapped directly into the servers of nine internet firms, including Facebook and Google to track online communication in a surveillance program known as Prism10 Photo “Closed-circuit sense of security” courtesy of Flickr.com by Jake Setlak (CC License: https://creativecommons.org/licenses/by/2.0/)
  • 17. The more people that have access to our personal map, the more easily it is hacked and used with malicious intent Photo “Open Doors and Cobwebs” courtesy of Flickr.com by Donnie Nunley (CC License: https://creativecommons.org/licenses/by/2.0/)
  • 18. Half of American adults had their personal information exposed to hackers last year alone11 Photo courtesy of Flickr.com by Seniju (CC License: https://creativecommons.org/licenses/by/2.0/)
  • 19. In a recent breach of government computers, hackers stole addresses, health & financial history, and other private details, from 21.5 million people12 Photo “Hacker Rene” courtesy of Flickr.com by Ivan David Gomez Arce (CC License: https://creativecommons.org/licenses/by/2.0/)
  • 20. If hackers can gain access to government computers, imagine how easy it would be for them to obtain information from undisclosed “Affiliated Partners” of the apps and sites we upload information to Photo “wocintech (microsoft) – 47” courtesy of Flickr.com by WOCinTech Chat (CC License: https://creativecommons.org/licenses/by/2.0/)
  • 21. In the rise of connected technology, we are building a dangerous, online MAP OF OURSELVES & often do not know who has ACCESS to it, or the RISKS it creates Photo “365-211” courtesy of Flickr.com by Canned Muffins (CC License: https://creativecommons.org/licenses/by/2.0/)
  • 22. 1. Margalit L. Why We're Addicted To Our Smartphones, But Not Our Tablets. Smashing Magazine. 2015. Available at: https://www.smashingmagazine.com/2015/11/why-addicted-smartphones-not-tablets/. Accessed June 2, 2016. 2. Rainie LZickuhr K. Americans’ Views on Mobile Etiquette. Pew Research Center: Internet, Science & Tech. 2015. Available at: http://www.pewinternet.org/2015/08/26/americans-views-on-mobile-etiquette/. Accessed June 2, 2016. 3. Dwoskin E. Where Were You 3 Minutes Ago? Your Apps Know. The Wall Street Journal. 2015. Available at: http://blogs.wsj.com/digits/2015/03/23/where-were-you-3-minutes-ago-your-apps-know/. Accessed June 2, 2016. 4. Cole S. How The Apple Watch Will Change Office Life. Fast Company. 2015. Available at: http://www.fastcompany.com/3043533/the-future-of-work/how-the-apple-watch-will-change-office-life. Accessed June 2, 2016. 5. Apple Watch - Health - Apple (CA). Apple (CA). 2016. Available at: http://www.apple.com/ca/watch/health/. Accessed June 2, 2016. 6. Dewey C. How Facebook knows who all your friends are, even better than you do. Washington Post. 2015. Available at: https://www.washingtonpost.com/news/the-intersect/wp/2015/04/02/how-facebook-knows-who-all-your- friends-are-even-better-than-you-do/. Accessed June 2, 2016. 7. Big Brother Watch. UK Public Research - Online Privacy. London: Four Millbank; 2016:8. Available at: http://www.bigbrotherwatch.org.uk/wp-content/uploads/2015/03/Big-Brother-Watch-Polling-Results.pdf. Accessed June 2, 2016. 8. Burks R. Google Maps knows where you're going and where you've been. Tech Times. 2014. Available at: http://www.techtimes.com/articles/13326/20140818/google-maps-knows-where-youre-going-and-where-youve- been.htm. Accessed June 3, 2016. 9. Golbeck J. Track Star: This app follows you while you shop - and it needs a clearer privacy policy. Slate Magazine. 2014. Available at: http://www.slate.com/articles/technology/future_tense/2014/01/ ibeacon_shopkick_privacy_policies_for_location_tracking_apps_aren_t_clear.single.html. Accessed June 3, 2016. 10. Edward Snowden: Leaks that exposed US spy programme. BBC News. 2014. Available at: http://www.bbc.com/news/world-us-canada-23123964. Accessed June 3, 2016. 11. Keller J, Lai K, Perlroth N. How Many Times Has Your Personal Information Been Exposed to Hackers?. Nytimescom. 2015. Available at: http://www.nytimes.com/interactive/2015/07/29/technology/personaltech/what-parts-of-your- information-have-been-exposed-to-hackers-quiz.html?_r=0. Accessed June 3, 2016. 12. Davis J. Hacking of Government Computers Exposed 21.5 Million People. Nytimescom. 2015. Available at: http://www.nytimes.com/2015/07/10/us/office-of-personnel-management-hackers-got-data-of-millions.html. Accessed June 3, 2016. Photo “Test with paper silhouettes & macro ” courtesy of Flickr.com by Gabriel Garcia Marengo (CC License: https://creativecommons.org/licenses/by/2.0/)