SlideShare ist ein Scribd-Unternehmen logo
1 von 47
Social Media and Privacy
洪宣 庞晓燕 文静
CONTENT
Part 1 Concept of Privacy
Part 2 Cases of Privacy Disclosure
Part 3 Privacy Protection
Concept
of
Privacy
Privacy
• In general, it refers to the right to be free from secret surveillance and
to determine whether, when, how, and to whom, one's personal or
organizational information is to be revealed.
• Specifically, privacy may be divided into four categories (1) Physical:
restriction on others to experience a person or situation through one
or more of the human senses; (2) Informational: restriction on
searching for or revealing facts that are unknown or unknowable to
others; (3) Decisional: restriction on interfering in decisions that are
exclusive to an entity; (4) Dispositional: restriction on attempts to
know an individual's state of mind.
http://www.businessdictionary.com/definition/privacy.html
• Web 2.0
• Participatory information sharing
• Social networking sites (SNSs)
• Give personal information out
• A growing attention to the issue of privacy
Questions:
1. What is social media privacy?
2. How did data breaches happen?
Social Media Privacy
Basic Information: Name, telephone number, Email address, home address…
Social Networking activity data: browsing behavior, location, what time using
which services…
Analyzed data based on existed information: occupation, hobbies, attributes,
emotional tendency…
Exploiting Social Media Information for relational user Attribute Inference
— Institute of Automation, the Chinese of Academy Science
Cases of
Privacy
Disclosure
1. Hacker Attack
—historical mega breaches
65 million
2013
167 million
2012
News on May 2016
user IDs, email addresses, password
¥$150 $2300
Black market
2. Third-party Websites
Meeting users’ need among
different platforms
Games、News、Music
Given certain permissions, they
can even see information that
our friends share with us.
In 2014, Gigya conducted a survey
which polled 4,000 respondents in the
United States and Britain on their
thoughts about data privacy
Convenience : 60% users will still log
into other websites, even though they
fear those companies aren't being
careful with their data
2. Third-party Websites
3. Cyber Manhunt
 tracking down and exploring
one’s private information via
internet media
 sometimes gained notoriety
to the target after blame
and shame
4. Users
In 2013, A survey interviewed 802 teens
that examines teens' privacy management
on social media sites
92% post their real name to the profile
they use most often.
84% post their interests, such as movies,
music, or books they like
82% post their birth date
62% post their relationship status
24% post videos of themselves
5. Social Networking Sites
Max Schrems wrote term paper on
Facebook‘s lack of awareness of
European privacy law in 2011
Under European “right to access”, he
made a request for Facebook’s records
on him and received a CD containing
over 1,200 pages of data
Sensitive personal data: friends he no
longer followed, deleted information
Max Schrems
collecting data without valid permission
6. Recommending ads, is that simple?
On Facebook or other social media apps, an advertiser can only send
ads to a user if that user has some connection to the brand in question.
A connection can include group membership or a "like" of that brand's
corporate page.
• An Arkansas lawyer and political blogger, Matt Campbell, has sued Facebook
for allegedly using data from private messages to target ads.
• The core of their complaint concerns the access advertisers have the messages.
• “Contrary to its representations, 'private' Facebook messages are
systematically intercepted by the Company in an effort to learn the contents
of the users' communications... This practice...enables Facebook to mine user
data and profit from those data by sharing them with advertisers.”
•
•
Imagining that your conversations
with your friends actually have
other unknown “audience”, kind of
scary?
Hacker News revealed back in Oct. 2012 that a shared link within
a private message between Facebook users also counts toward
the total.
Facebook admitted this to the Wall Street Journal in that
publication's follow-up story.
7. They are tracking your locations?
• “people around you” in Wechat(附近的人)
• Three - point positioning method(三点定位法)
a popular saying in the social media
a panic concerning safety arises and spread
微信=危信?
• 记下自己和对方的距离,之后两次变换位置,重新测量自己和对
方的距离,最后以三次测量地点为圆心/三个距离为半径画三个
圈,三圆重合的位置就是对方所在的位置。
• It is proved that this method is
not as accurate as they say.
• 实际上“最精确也只能在100米范围
内画一个圈”
• But we still need to be cautious
about sharing our locations, it
might be used by strangers.
8. No location sharing, but you know where I live?
• A student took 40 mins to deduce actress's address from pictures
8. No location sharing, but I know where you live?
• A student from Tsinghua University said he took four simple steps to deduce
the famous actress (WANG Luodan)'s address through the pictures posted
on her Weibo.
• Step 1: Get information
• The student selected two pictures which contain some clues on her Weibo
• From the photographs, there are at least three square parterres we could
see. Then the student used GoogleEarth to intercept the bird's-eye view of
Beijing and compared it with the selected pictures of WANG's Weibo.
Step 2: Select the district
The student used other information on Weibo to narrow his selected
regions, like...
• Step 3: Search
• As excluding several possible regions, the student intercepted a
bird's-eye view in GoogleEarth and zoomed in a part of picture. He
soon found that the picture was extremely similar to WANG's picture
selected in step1.
• Step 4: Field test
The student went to the place he deduced in step 3 and finally verified his
conclusion.
So a simple picture is more than that.
Be careful about the detective
in your daily life, like you Suitors
or your Suspicious girlfriend.
9. "People You May Know", but I don't want to be known
E1: friends recommending on QQ
• QQ’s “recommending friends” feature do not simply show your QQ name.
It shows your real name .
• You can find that almost all people you knew are listed here.
“腾讯的实名
好友推荐翻一
遍后,感觉就
是自己以前在
读年级所有学
生的通讯录“
E2: Washington woman found husband's other wife on Facebook
• An American named Alan L. O'Neill married a woman in 2001, moved
out in 2009, changed his name and remarried without divorcing her.
• The first wife first noticed O'Neill had moved on to another woman
when Facebook suggested the friendship connection to wife No.2
under the "People You May Know" feature.
• Wife No.1 then called the defendant's mother.
• “An hour later the defendant arrived at [Wife No.1’s] apartment, and she
asked him several times if they were divorced”, court records show. The
defendant said, 'No, we are still married.'"
• Neither O'Neill nor his first wife had filed for divorce, according to charging
documents. The name change came in December, and later that month he
married his second wife.
From the issue mentioned above...
• Obviously, Facebook helps the woman to find out that his husband has
cheated her for several years.
• The Prosecutor Lindquist said, "Facebook is now a place where people
discover things about each other ."
• But on the other side, some people are concerned about their privacy
of social contacts, because people can easily know what kind of people
you are acquainted with.
• Athima Chansanchai, a freelance journalist who writes about social
media, said Facebook over the years has played a role in both creating
relationships and destroying them.
Privacy
Protection
Privacy Protection
•Government and legislature
•Service providers
•Social media users
Government and legislature
• Lawmakers should enact laws and regulations to protect social media
users’ privacy.
• Stipulate the responsibility of service providers.
• Specify the punishment that online information criminals will face.
• Provide some guidance for social media users to raise their awareness
of online security and privacy protection.
• Offer necessary help when users are threatened, harassed or
defamed online
USA
• 25 states of the US have enacted social media privacy laws (2012.4-
2016.7)
• Regulating the use of social media by employers and educational
institutions
USA
• United States Congress
• Introduce Social Networking Online Protection Act
Australia
• Office of the Australian Information Commissioner
Australia
• Office of the Children’s eSafety Commissioner
Australia
• ThinkUKnow
Australia
• StaySmartOnline
Service providers
• When designing social networking sites and apps, personal data protection
should be proactive and preventative in nature, and it should cover the
entire cycle of personal data flow from collection to erasure.
• Personal information Collection Statement should be declared clearly
before users confirm signing up for accounts. Users have the right to know
under what circumstances will their personal data be collected, accessed or
shared and for what purposes. The purposes must be lawful and directly
related to a function or activity of the data users.
• Service providers should remind the users to pay high attention to
information storage, privacy settings and online security. For example, when
the users turn on the geolocation function of the apps, providers should
inform users of the potential risks.
Social media users
• Read the Privacy Statement before signing up for any SNS
• Manage your privacy settings
• Protect your accounts with strong, unique passwords
• Think twice before you post any information
• Don’t reveal personal information
Social media users
• Be selective when accepting a friend
• Exercise caution when clicking on links
• Turn off the geolocation features in social networking apps
• Don’t enable auto login
• Close old accounts that you don’t use anymore
THANKS

Weitere ähnliche Inhalte

Was ist angesagt?

Fighting Fake News NAGC 2017
Fighting Fake News NAGC 2017Fighting Fake News NAGC 2017
Fighting Fake News NAGC 2017Brian Housand
 
English 2201: What's News? Satire, Hoaxes & Fake News
English 2201: What's News? Satire, Hoaxes & Fake NewsEnglish 2201: What's News? Satire, Hoaxes & Fake News
English 2201: What's News? Satire, Hoaxes & Fake NewsTrudy Morgan-Cole
 
Handling fake news and eyewitness media
Handling fake news and eyewitness mediaHandling fake news and eyewitness media
Handling fake news and eyewitness mediaAlastair Reid
 
Re publica presentation -plug & play news-
Re publica presentation -plug & play news-Re publica presentation -plug & play news-
Re publica presentation -plug & play news-Tetyana Bohdanova
 
Social Media and Fake News, Brand Building and Start-ups
Social Media and Fake News, Brand Building and Start-upsSocial Media and Fake News, Brand Building and Start-ups
Social Media and Fake News, Brand Building and Start-upsGirish Balachandran
 
Fake news and how to combat it
Fake news and how to combat itFake news and how to combat it
Fake news and how to combat itSanjana Hattotuwa
 
Detailed Research on Fake News: Opportunities, Challenges and Methods
Detailed Research on Fake News: Opportunities, Challenges and MethodsDetailed Research on Fake News: Opportunities, Challenges and Methods
Detailed Research on Fake News: Opportunities, Challenges and MethodsMilap Bhanderi
 
The Truth about Fake News: Lecture 1
The Truth about Fake News: Lecture 1The Truth about Fake News: Lecture 1
The Truth about Fake News: Lecture 1David Lynn Painter
 
The Truth about Fake News: Lecture 2
The Truth about Fake News: Lecture 2The Truth about Fake News: Lecture 2
The Truth about Fake News: Lecture 2David Lynn Painter
 
Fake news presentation.pptx
Fake news presentation.pptxFake news presentation.pptx
Fake news presentation.pptxMilton Academy
 
Fake news presentation
Fake news presentationFake news presentation
Fake news presentationYumonomics
 
Fake news polk
Fake news polkFake news polk
Fake news polkYumonomics
 

Was ist angesagt? (20)

Tips to spot false news
Tips to spot false newsTips to spot false news
Tips to spot false news
 
Fighting Fake News NAGC 2017
Fighting Fake News NAGC 2017Fighting Fake News NAGC 2017
Fighting Fake News NAGC 2017
 
English 2201: What's News? Satire, Hoaxes & Fake News
English 2201: What's News? Satire, Hoaxes & Fake NewsEnglish 2201: What's News? Satire, Hoaxes & Fake News
English 2201: What's News? Satire, Hoaxes & Fake News
 
Fake News
Fake NewsFake News
Fake News
 
Fake News Defined
Fake News DefinedFake News Defined
Fake News Defined
 
Handling fake news and eyewitness media
Handling fake news and eyewitness mediaHandling fake news and eyewitness media
Handling fake news and eyewitness media
 
What is fake news by Dean Berry
What is fake news by Dean BerryWhat is fake news by Dean Berry
What is fake news by Dean Berry
 
Re publica presentation -plug & play news-
Re publica presentation -plug & play news-Re publica presentation -plug & play news-
Re publica presentation -plug & play news-
 
Fake news
Fake newsFake news
Fake news
 
Social Media and Fake News, Brand Building and Start-ups
Social Media and Fake News, Brand Building and Start-upsSocial Media and Fake News, Brand Building and Start-ups
Social Media and Fake News, Brand Building and Start-ups
 
Fake news and how to combat it
Fake news and how to combat itFake news and how to combat it
Fake news and how to combat it
 
Detailed Research on Fake News: Opportunities, Challenges and Methods
Detailed Research on Fake News: Opportunities, Challenges and MethodsDetailed Research on Fake News: Opportunities, Challenges and Methods
Detailed Research on Fake News: Opportunities, Challenges and Methods
 
The Truth about Fake News: Lecture 1
The Truth about Fake News: Lecture 1The Truth about Fake News: Lecture 1
The Truth about Fake News: Lecture 1
 
The Truth about Fake News: Lecture 2
The Truth about Fake News: Lecture 2The Truth about Fake News: Lecture 2
The Truth about Fake News: Lecture 2
 
Fake news presentation.pptx
Fake news presentation.pptxFake news presentation.pptx
Fake news presentation.pptx
 
Fake news
Fake news Fake news
Fake news
 
Fake news presentation
Fake news presentationFake news presentation
Fake news presentation
 
Fake news polk
Fake news polkFake news polk
Fake news polk
 
Fake News
Fake NewsFake News
Fake News
 
COM Ethics Final
COM Ethics FinalCOM Ethics Final
COM Ethics Final
 

Andere mochten auch

Chapter 8 big data and privacy - social media 3533
Chapter 8  big data and privacy - social media 3533Chapter 8  big data and privacy - social media 3533
Chapter 8 big data and privacy - social media 3533Hubbamar
 
Look before you leap - research as foundation for brand identity development
Look before you leap - research as foundation for brand identity developmentLook before you leap - research as foundation for brand identity development
Look before you leap - research as foundation for brand identity developmentRachel Reuben
 
Data protection and privacy in the social web en 17072010
Data protection and privacy in the social web en 17072010Data protection and privacy in the social web en 17072010
Data protection and privacy in the social web en 17072010Michael Altendorf
 
Data protection and social networks
Data protection and social networksData protection and social networks
Data protection and social networksblogzilla
 
Data Protection
 in the Age of Big Data
Data Protection
 in the Age of Big DataData Protection
 in the Age of Big Data
Data Protection
 in the Age of Big DataArthit Suriyawongkul
 
Personal data protection in the EU
Personal data protection in the EUPersonal data protection in the EU
Personal data protection in the EUArete-Zoe, LLC
 
Privacy & Data Protection
Privacy & Data ProtectionPrivacy & Data Protection
Privacy & Data Protectionsp_krishna
 
2017 02-05 en-eu-data-security_v2
2017 02-05 en-eu-data-security_v22017 02-05 en-eu-data-security_v2
2017 02-05 en-eu-data-security_v2Flaskdata.io
 
Sirius friday data protection en privacy is uw bedrijf klaar voor de nieuwe e...
Sirius friday data protection en privacy is uw bedrijf klaar voor de nieuwe e...Sirius friday data protection en privacy is uw bedrijf klaar voor de nieuwe e...
Sirius friday data protection en privacy is uw bedrijf klaar voor de nieuwe e...Bart Van Den Brande
 
Deep Learning - The Past, Present and Future of Artificial Intelligence
Deep Learning - The Past, Present and Future of Artificial IntelligenceDeep Learning - The Past, Present and Future of Artificial Intelligence
Deep Learning - The Past, Present and Future of Artificial IntelligenceLukas Masuch
 
Information Privacy & Social Media Issues in Healthcare
Information Privacy & Social Media Issues in HealthcareInformation Privacy & Social Media Issues in Healthcare
Information Privacy & Social Media Issues in HealthcareNawanan Theera-Ampornpunt
 

Andere mochten auch (11)

Chapter 8 big data and privacy - social media 3533
Chapter 8  big data and privacy - social media 3533Chapter 8  big data and privacy - social media 3533
Chapter 8 big data and privacy - social media 3533
 
Look before you leap - research as foundation for brand identity development
Look before you leap - research as foundation for brand identity developmentLook before you leap - research as foundation for brand identity development
Look before you leap - research as foundation for brand identity development
 
Data protection and privacy in the social web en 17072010
Data protection and privacy in the social web en 17072010Data protection and privacy in the social web en 17072010
Data protection and privacy in the social web en 17072010
 
Data protection and social networks
Data protection and social networksData protection and social networks
Data protection and social networks
 
Data Protection
 in the Age of Big Data
Data Protection
 in the Age of Big DataData Protection
 in the Age of Big Data
Data Protection
 in the Age of Big Data
 
Personal data protection in the EU
Personal data protection in the EUPersonal data protection in the EU
Personal data protection in the EU
 
Privacy & Data Protection
Privacy & Data ProtectionPrivacy & Data Protection
Privacy & Data Protection
 
2017 02-05 en-eu-data-security_v2
2017 02-05 en-eu-data-security_v22017 02-05 en-eu-data-security_v2
2017 02-05 en-eu-data-security_v2
 
Sirius friday data protection en privacy is uw bedrijf klaar voor de nieuwe e...
Sirius friday data protection en privacy is uw bedrijf klaar voor de nieuwe e...Sirius friday data protection en privacy is uw bedrijf klaar voor de nieuwe e...
Sirius friday data protection en privacy is uw bedrijf klaar voor de nieuwe e...
 
Deep Learning - The Past, Present and Future of Artificial Intelligence
Deep Learning - The Past, Present and Future of Artificial IntelligenceDeep Learning - The Past, Present and Future of Artificial Intelligence
Deep Learning - The Past, Present and Future of Artificial Intelligence
 
Information Privacy & Social Media Issues in Healthcare
Information Privacy & Social Media Issues in HealthcareInformation Privacy & Social Media Issues in Healthcare
Information Privacy & Social Media Issues in Healthcare
 

Ähnlich wie Group 4 discussion leading

fissea-conference-2012_srinivasan.pdf
fissea-conference-2012_srinivasan.pdffissea-conference-2012_srinivasan.pdf
fissea-conference-2012_srinivasan.pdfRobin540999
 
Intellectual Freedom, Privacy and Social Media
Intellectual Freedom, Privacy and Social MediaIntellectual Freedom, Privacy and Social Media
Intellectual Freedom, Privacy and Social MediaElizabeth T. "Eli" Edwards
 
Group 1 Introduction to Social Networking.pptx
Group 1 Introduction to Social Networking.pptxGroup 1 Introduction to Social Networking.pptx
Group 1 Introduction to Social Networking.pptxJenicaJDizon
 
Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Kirsten Thompson
 
Social Networking: Use & Impact
Social Networking: Use & ImpactSocial Networking: Use & Impact
Social Networking: Use & ImpactGaurav Wadhwa
 
In Class Learning Activity
In Class Learning ActivityIn Class Learning Activity
In Class Learning Activityguest09fcd1
 
Social Media and the Future of Privacy
Social Media and the Future of PrivacySocial Media and the Future of Privacy
Social Media and the Future of Privacyjulia594
 
Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235brendaylo
 
The Dark Side of Social Media: Legal Issues
The Dark Side of Social Media: Legal IssuesThe Dark Side of Social Media: Legal Issues
The Dark Side of Social Media: Legal IssuesM. Prabu Wibowo
 
Cyber Awareness.pptx
Cyber Awareness.pptxCyber Awareness.pptx
Cyber Awareness.pptxadblue2017
 
Social Media and Dating Presentation
Social Media and Dating PresentationSocial Media and Dating Presentation
Social Media and Dating PresentationShanika Robinson
 
Presentation social networking service
Presentation social networking servicePresentation social networking service
Presentation social networking serviceManish S Thingalaya
 
Social media Challenges and Advantage
Social media Challenges and AdvantageSocial media Challenges and Advantage
Social media Challenges and AdvantageTechno World 4 U
 
Claims investigation using social media
Claims investigation using social mediaClaims investigation using social media
Claims investigation using social mediaJames Palitzsch
 
Social Media Privacy
Social Media PrivacySocial Media Privacy
Social Media PrivacyLisa Turner
 
Social Media Ethics
Social Media EthicsSocial Media Ethics
Social Media Ethicsronsteven22
 
SOCIAL NETWORKING FOR INTEGRATION.pptx
SOCIAL NETWORKING FOR INTEGRATION.pptxSOCIAL NETWORKING FOR INTEGRATION.pptx
SOCIAL NETWORKING FOR INTEGRATION.pptxFrancis Dave Mabborang
 
Exploring privacy behaviours of social media users
Exploring privacy behaviours of social media usersExploring privacy behaviours of social media users
Exploring privacy behaviours of social media usersTheSRAOrg
 

Ähnlich wie Group 4 discussion leading (20)

fissea-conference-2012_srinivasan.pdf
fissea-conference-2012_srinivasan.pdffissea-conference-2012_srinivasan.pdf
fissea-conference-2012_srinivasan.pdf
 
Intellectual Freedom, Privacy and Social Media
Intellectual Freedom, Privacy and Social MediaIntellectual Freedom, Privacy and Social Media
Intellectual Freedom, Privacy and Social Media
 
New media and privacy
New media and privacyNew media and privacy
New media and privacy
 
Group 1 Introduction to Social Networking.pptx
Group 1 Introduction to Social Networking.pptxGroup 1 Introduction to Social Networking.pptx
Group 1 Introduction to Social Networking.pptx
 
Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?
 
Social Networking: Use & Impact
Social Networking: Use & ImpactSocial Networking: Use & Impact
Social Networking: Use & Impact
 
In Class Learning Activity
In Class Learning ActivityIn Class Learning Activity
In Class Learning Activity
 
Social Media and the Future of Privacy
Social Media and the Future of PrivacySocial Media and the Future of Privacy
Social Media and the Future of Privacy
 
Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235
 
The Dark Side of Social Media: Legal Issues
The Dark Side of Social Media: Legal IssuesThe Dark Side of Social Media: Legal Issues
The Dark Side of Social Media: Legal Issues
 
Cyber Awareness.pptx
Cyber Awareness.pptxCyber Awareness.pptx
Cyber Awareness.pptx
 
Social Media and Dating Presentation
Social Media and Dating PresentationSocial Media and Dating Presentation
Social Media and Dating Presentation
 
Presentation social networking service
Presentation social networking servicePresentation social networking service
Presentation social networking service
 
Social media Challenges and Advantage
Social media Challenges and AdvantageSocial media Challenges and Advantage
Social media Challenges and Advantage
 
The FACEBOOK and TWITTER Phenomenon [9-28-2010]
The FACEBOOK and TWITTER Phenomenon [9-28-2010]The FACEBOOK and TWITTER Phenomenon [9-28-2010]
The FACEBOOK and TWITTER Phenomenon [9-28-2010]
 
Claims investigation using social media
Claims investigation using social mediaClaims investigation using social media
Claims investigation using social media
 
Social Media Privacy
Social Media PrivacySocial Media Privacy
Social Media Privacy
 
Social Media Ethics
Social Media EthicsSocial Media Ethics
Social Media Ethics
 
SOCIAL NETWORKING FOR INTEGRATION.pptx
SOCIAL NETWORKING FOR INTEGRATION.pptxSOCIAL NETWORKING FOR INTEGRATION.pptx
SOCIAL NETWORKING FOR INTEGRATION.pptx
 
Exploring privacy behaviours of social media users
Exploring privacy behaviours of social media usersExploring privacy behaviours of social media users
Exploring privacy behaviours of social media users
 

Mehr von Hsuan-Ting Chen

Group 7 discussion leading
Group 7 discussion leadingGroup 7 discussion leading
Group 7 discussion leadingHsuan-Ting Chen
 
Group 6 Discussion Leading PPT
Group 6 Discussion Leading PPTGroup 6 Discussion Leading PPT
Group 6 Discussion Leading PPTHsuan-Ting Chen
 
Group 5 Discussion Leading PPT
Group 5 Discussion Leading PPTGroup 5 Discussion Leading PPT
Group 5 Discussion Leading PPTHsuan-Ting Chen
 
Group 3 Discussion Leading
Group 3 Discussion LeadingGroup 3 Discussion Leading
Group 3 Discussion LeadingHsuan-Ting Chen
 
Group 2 Discussion Leading
Group 2 Discussion LeadingGroup 2 Discussion Leading
Group 2 Discussion LeadingHsuan-Ting Chen
 
Group 1 Discussion Leading
Group 1 Discussion LeadingGroup 1 Discussion Leading
Group 1 Discussion LeadingHsuan-Ting Chen
 

Mehr von Hsuan-Ting Chen (6)

Group 7 discussion leading
Group 7 discussion leadingGroup 7 discussion leading
Group 7 discussion leading
 
Group 6 Discussion Leading PPT
Group 6 Discussion Leading PPTGroup 6 Discussion Leading PPT
Group 6 Discussion Leading PPT
 
Group 5 Discussion Leading PPT
Group 5 Discussion Leading PPTGroup 5 Discussion Leading PPT
Group 5 Discussion Leading PPT
 
Group 3 Discussion Leading
Group 3 Discussion LeadingGroup 3 Discussion Leading
Group 3 Discussion Leading
 
Group 2 Discussion Leading
Group 2 Discussion LeadingGroup 2 Discussion Leading
Group 2 Discussion Leading
 
Group 1 Discussion Leading
Group 1 Discussion LeadingGroup 1 Discussion Leading
Group 1 Discussion Leading
 

Kürzlich hochgeladen

APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 

Kürzlich hochgeladen (20)

APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 

Group 4 discussion leading

  • 1. Social Media and Privacy 洪宣 庞晓燕 文静
  • 2. CONTENT Part 1 Concept of Privacy Part 2 Cases of Privacy Disclosure Part 3 Privacy Protection
  • 4. Privacy • In general, it refers to the right to be free from secret surveillance and to determine whether, when, how, and to whom, one's personal or organizational information is to be revealed. • Specifically, privacy may be divided into four categories (1) Physical: restriction on others to experience a person or situation through one or more of the human senses; (2) Informational: restriction on searching for or revealing facts that are unknown or unknowable to others; (3) Decisional: restriction on interfering in decisions that are exclusive to an entity; (4) Dispositional: restriction on attempts to know an individual's state of mind. http://www.businessdictionary.com/definition/privacy.html
  • 5. • Web 2.0 • Participatory information sharing • Social networking sites (SNSs) • Give personal information out • A growing attention to the issue of privacy
  • 6. Questions: 1. What is social media privacy? 2. How did data breaches happen?
  • 7. Social Media Privacy Basic Information: Name, telephone number, Email address, home address… Social Networking activity data: browsing behavior, location, what time using which services… Analyzed data based on existed information: occupation, hobbies, attributes, emotional tendency…
  • 8. Exploiting Social Media Information for relational user Attribute Inference — Institute of Automation, the Chinese of Academy Science
  • 10. 1. Hacker Attack —historical mega breaches 65 million 2013 167 million 2012 News on May 2016 user IDs, email addresses, password
  • 12. 2. Third-party Websites Meeting users’ need among different platforms Games、News、Music Given certain permissions, they can even see information that our friends share with us.
  • 13. In 2014, Gigya conducted a survey which polled 4,000 respondents in the United States and Britain on their thoughts about data privacy Convenience : 60% users will still log into other websites, even though they fear those companies aren't being careful with their data 2. Third-party Websites
  • 14. 3. Cyber Manhunt  tracking down and exploring one’s private information via internet media  sometimes gained notoriety to the target after blame and shame
  • 15. 4. Users In 2013, A survey interviewed 802 teens that examines teens' privacy management on social media sites 92% post their real name to the profile they use most often. 84% post their interests, such as movies, music, or books they like 82% post their birth date 62% post their relationship status 24% post videos of themselves
  • 16. 5. Social Networking Sites Max Schrems wrote term paper on Facebook‘s lack of awareness of European privacy law in 2011 Under European “right to access”, he made a request for Facebook’s records on him and received a CD containing over 1,200 pages of data Sensitive personal data: friends he no longer followed, deleted information Max Schrems collecting data without valid permission
  • 17. 6. Recommending ads, is that simple? On Facebook or other social media apps, an advertiser can only send ads to a user if that user has some connection to the brand in question. A connection can include group membership or a "like" of that brand's corporate page.
  • 18. • An Arkansas lawyer and political blogger, Matt Campbell, has sued Facebook for allegedly using data from private messages to target ads. • The core of their complaint concerns the access advertisers have the messages. • “Contrary to its representations, 'private' Facebook messages are systematically intercepted by the Company in an effort to learn the contents of the users' communications... This practice...enables Facebook to mine user data and profit from those data by sharing them with advertisers.”
  • 19. • • Imagining that your conversations with your friends actually have other unknown “audience”, kind of scary? Hacker News revealed back in Oct. 2012 that a shared link within a private message between Facebook users also counts toward the total. Facebook admitted this to the Wall Street Journal in that publication's follow-up story.
  • 20. 7. They are tracking your locations? • “people around you” in Wechat(附近的人) • Three - point positioning method(三点定位法) a popular saying in the social media a panic concerning safety arises and spread 微信=危信?
  • 21. • 记下自己和对方的距离,之后两次变换位置,重新测量自己和对 方的距离,最后以三次测量地点为圆心/三个距离为半径画三个 圈,三圆重合的位置就是对方所在的位置。 • It is proved that this method is not as accurate as they say. • 实际上“最精确也只能在100米范围 内画一个圈” • But we still need to be cautious about sharing our locations, it might be used by strangers.
  • 22. 8. No location sharing, but you know where I live? • A student took 40 mins to deduce actress's address from pictures
  • 23. 8. No location sharing, but I know where you live? • A student from Tsinghua University said he took four simple steps to deduce the famous actress (WANG Luodan)'s address through the pictures posted on her Weibo. • Step 1: Get information • The student selected two pictures which contain some clues on her Weibo
  • 24. • From the photographs, there are at least three square parterres we could see. Then the student used GoogleEarth to intercept the bird's-eye view of Beijing and compared it with the selected pictures of WANG's Weibo.
  • 25. Step 2: Select the district The student used other information on Weibo to narrow his selected regions, like...
  • 26. • Step 3: Search • As excluding several possible regions, the student intercepted a bird's-eye view in GoogleEarth and zoomed in a part of picture. He soon found that the picture was extremely similar to WANG's picture selected in step1.
  • 27. • Step 4: Field test The student went to the place he deduced in step 3 and finally verified his conclusion. So a simple picture is more than that. Be careful about the detective in your daily life, like you Suitors or your Suspicious girlfriend.
  • 28. 9. "People You May Know", but I don't want to be known E1: friends recommending on QQ • QQ’s “recommending friends” feature do not simply show your QQ name. It shows your real name . • You can find that almost all people you knew are listed here. “腾讯的实名 好友推荐翻一 遍后,感觉就 是自己以前在 读年级所有学 生的通讯录“
  • 29. E2: Washington woman found husband's other wife on Facebook • An American named Alan L. O'Neill married a woman in 2001, moved out in 2009, changed his name and remarried without divorcing her. • The first wife first noticed O'Neill had moved on to another woman when Facebook suggested the friendship connection to wife No.2 under the "People You May Know" feature.
  • 30. • Wife No.1 then called the defendant's mother. • “An hour later the defendant arrived at [Wife No.1’s] apartment, and she asked him several times if they were divorced”, court records show. The defendant said, 'No, we are still married.'" • Neither O'Neill nor his first wife had filed for divorce, according to charging documents. The name change came in December, and later that month he married his second wife.
  • 31. From the issue mentioned above... • Obviously, Facebook helps the woman to find out that his husband has cheated her for several years. • The Prosecutor Lindquist said, "Facebook is now a place where people discover things about each other ."
  • 32. • But on the other side, some people are concerned about their privacy of social contacts, because people can easily know what kind of people you are acquainted with. • Athima Chansanchai, a freelance journalist who writes about social media, said Facebook over the years has played a role in both creating relationships and destroying them.
  • 34. Privacy Protection •Government and legislature •Service providers •Social media users
  • 35. Government and legislature • Lawmakers should enact laws and regulations to protect social media users’ privacy. • Stipulate the responsibility of service providers. • Specify the punishment that online information criminals will face. • Provide some guidance for social media users to raise their awareness of online security and privacy protection. • Offer necessary help when users are threatened, harassed or defamed online
  • 36. USA • 25 states of the US have enacted social media privacy laws (2012.4- 2016.7) • Regulating the use of social media by employers and educational institutions
  • 37.
  • 38. USA • United States Congress • Introduce Social Networking Online Protection Act
  • 39.
  • 40. Australia • Office of the Australian Information Commissioner
  • 41. Australia • Office of the Children’s eSafety Commissioner
  • 44. Service providers • When designing social networking sites and apps, personal data protection should be proactive and preventative in nature, and it should cover the entire cycle of personal data flow from collection to erasure. • Personal information Collection Statement should be declared clearly before users confirm signing up for accounts. Users have the right to know under what circumstances will their personal data be collected, accessed or shared and for what purposes. The purposes must be lawful and directly related to a function or activity of the data users. • Service providers should remind the users to pay high attention to information storage, privacy settings and online security. For example, when the users turn on the geolocation function of the apps, providers should inform users of the potential risks.
  • 45. Social media users • Read the Privacy Statement before signing up for any SNS • Manage your privacy settings • Protect your accounts with strong, unique passwords • Think twice before you post any information • Don’t reveal personal information
  • 46. Social media users • Be selective when accepting a friend • Exercise caution when clicking on links • Turn off the geolocation features in social networking apps • Don’t enable auto login • Close old accounts that you don’t use anymore