Privacy and Data Mining

Slides:



Advertisements
Similar presentations
Privacy: Facebook, Twitter
Advertisements

Tracking, Privacy, You & The 21 st Century When you talk online the internet listens.
Lab 3 Cookie Stealing using XSS Kara James, Chelsea Collins, Trevor Norwood, David Johnson.
The Privacy Tug of War: Advertisers vs. Consumers Presented by Group F.
Internet safety By Lydia Snowden.
Slide 1 Tomorrow’s Technology and You Chapter 7 Databases and Privacy © 2006 Prentice-Hall, Inc.
Privacy Aziz Doumith Michael Kot Luis Pacheco Emory Petermann Wyatt Pierson Henry Stigler.
Exchanging information. Communication services Voice phones SMS (short messaging service) – more commonly known as texting Fax Instant messaging – real.
INTERNET PRIVACY Marketing companies The cookie leak security hole in the HTML messages The Web Bug Can we trust the privacy.
PRIVACY BOOTCAMP YpJU.
Class 6 Internet Privacy Law Social Media Privacy.
CSE/ISE 312 Privacy (Part 2). The Business and Social Sectors Marketing and personalization What we do ourselves Location tracking A right to be forgotten.
Digital Landscape Summary GhanaKenyaNigeria Population: million43.8 million million Internet Users: 4.14 (16.34 % penetration)21.2 million.
Personal Privacy and Security Zenia C. Bahorski Ph.D. Department of Computer Science Eastern Michigan University Personal Privacy & Security - Z. Bahorski,
Portfolio. Your Company´s Strategy Your Client´s Experience.
Here you are at your computer, but you don’t have internet connections. Your ISP becomes your link to the internet. In order to get access you need to.
By William Cook.  How the internet works  How companies pay their bills  How to privately browse the internet.
 Cable companies are experimenting with tracking and target individual households cable boxes;
Intro To The Internet A Guide to Getting Started.
Effects of Computing How have computers affected society?
Consumer Protection Shop Safely and Guard Your Financial Information.
Minding your business on the internet Kelly Trevino Regional Director October 6,2015.
Are you a Digital Native?
Internet Services Web browsing Chat/Messaging Newsgroups Social networking Shopping Information –Text –Pictures –Movies –Music And more! 3.
Keeping Children Safe Online. Where to report abuse? To report any abuse on social media or internet: CEOP will accept reports from parents, teachers.
Privacy and Data Mining What Do “They” Know About You?
Restoring Privacy, Cleaning Your Computer's Cookies and Beacons.
PRIVACY BOOTCAMP Jack Vale - Social Media Experiement.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
 Information privacy involves the protection of an individual’s personally identifiable information. Such information can include health records, criminal.
Internet Privacy Define PRIVACY? How important is internet privacy to you? What privacy settings do you utilize for your social media sites?
By Samantha Kozar.  What are social networks?  What is Facebook?  What is Gowalla?  What are the capabilities of these sites?  Privacy Settings 
DIGITAL SAFETY City of Edinburgh Council Digital Learning Team.
Make your Library a Privacy and Security Resource M Ryan Hess Senior Librarian for Information Technology Palo Alto City Library.
Digital & Internet Safety. Understanding your personal data Defining “Big Data” Protecting your data, computer & devices Avoiding identity theft.
Phillip Schneider Information Services Librarian Gail Borden Public Library District Cybersecurity: Keeping Your Computers & Devices Safe.
Online Instant Messaging Chat Rooms Social Networks Internet Surfing Mobile Phones Gaming Sharing Files Uploading Videos.
Best Free Key logger Download Computer & Internet Monitoring Software.
Cloud-Computing Cloud Web-Blog Software Application Download Software.
How to stay safe using the internet & App’s
Managing Windows Security
Awareness raising session for
Keeping our Children Safe on the internet
Social and environmental impact
Digital Safety City of Edinburgh Council Digital Learning Team.
Hotspot Shield Protect Your Online Identity
IT Security  .
Personal spaces.
The Internet Industry Week Two.
E-commerce Business uses of internet, e-commerce & e-business, e-marketing, e-payments etc.
Tutor: Wendy Mcloughlin Swansea University
Internet and security.
Latest Updates on BlackHawk Mines Music : Privacy Policy
Internet Safety By Ruby.
Beatrix Potter Primary School February 2018
Content Management lifecycle
Computers and Data Collection
Exploring Computer Science
Digital $$ Quiz Test your knowledge.
Tools & Tips for keeping your kids safe online
The Revolution Is Just Beginning
Health Care: Privacy in a Digital Age
HOW DO I KEEP MY COMPUTER SAFE?
E-Safety Survey Results
ICT Communications Lesson 3: Internet Life and Privacy
SOCIAL NETWORK 82% 60% 45% 26% 12% INSTAGRAM FACEBOOK TWITTER GOOGLE+
Privacy and Data Mining
Awareness raising session for
Digital Identity Digital Identity is the concept of adopting an online presence or networked identity in cyberspace by an individual or an organization.
Networks, Legal and Ethical Behaviors BSU CS4MS - 4/9/19
Presentation transcript:

Privacy and Data Mining What Do “They” Know About You?

Intro Privacy Data Mining Info Uses Policies

Privacy Definition Levels Cross-site scripting Social Networking Internet Service Providers HTMLs

Privacy Cookies Standard First Party Third Party Flash cookies

Privacy Risks Mobile Apps Browsing Searches Instant Messaging Personal Website Blogging Online Banking “Cloud” “Street View”

Data Mining What Is It? Google Facebook Instagram Snapchat

Data Mining Info Sources Marketing Direct Behavioral/Targeting Web Bugs Location Tracking Employee Monitoring

Data Mining Government Surveillance Court Records Online Shopping Scams Auctions Postal Fraud Malicious Links

Data Mining The Good Science and Engineering Human Rights Medical

Data Mining Software Free 20+ Packages Commercial Another 20+ Surveys Face-to-Face Computer Driven

“Safe”? Sites Search Engines Startpage DuckDuckGo Personal Protection Don’t use search and mail from same source i.e., Google and Gmail