Learning to Hide in the Digital Age Can you completely remove your online identity?

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

How to protect yourself, your computer, and others on the internet
Hows Your Privacy? Social Networks & Cellphones Lt. Michael J. Kozak, Ret. X4 Echelon.
Be CyberFIT Look after your health and well-being Communicate and share Be organised and plan ahead Be entertained.
Safety SAFETY. Protecting Privacy  Don’t broadcast your location.  You Tube settings  Read privacy policies  Real names?  Revealing your status.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertising for E-Commerce Back to Table of Contents.
Ji Yeon Chu, Lindsey Fong, Jonathan Bender, Yi Low, and Umang Patel.
Internet Privacy Jillian Brinberg, Maggie Kowalski, Sylvia Han, Isabel Smith-Bernstein, Jillian Brinberg.
Privacy Online TC 310 June 17, Weekly Review Questions Courts v. FCC in mergers Jurisdiction of FCC in mergers Why FCC can block, even with DoJ.
1 Good Security and Privacy Things Steven M. Bellovin
Tracking, Privacy, You & The 21 st Century When you talk online the internet listens.
Scams Stevie's Scam School videos
COMPUTING AT CARNEGIE MELLON SECTION I2 Privacy. Introduction Lauren Milisits.
MANAGING YOUR ONLINE PROFILE WHAT DOES THIS MEAN AND WHY SHOULD YOU CARE? Sarah Morris UT Libraries.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Privacy Aziz Doumith Michael Kot Luis Pacheco Emory Petermann Wyatt Pierson Henry Stigler.
How can you protect yourself from online identity theft?
Chapter 11 Computers and Society, Security, Privacy, and Ethics.
PRIVACY BOOTCAMP YpJU.
Computer Security By: MacKenzie Olson. To be safer and more secure online, make these seven practices part of your online routine.
Connect. Serve. Grow. With online giving. Now you can view your contributions, track them, and even give online from one location…
Personal Privacy and Security Zenia C. Bahorski Ph.D. Department of Computer Science Eastern Michigan University Personal Privacy & Security - Z. Bahorski,
Tablet Camp 2015 Resource Guide for Students at Klein ISD 1:1 Campuses.
Do you believe in this? Due to its very nature, the Internet is NOT a safe or secure environment. It is an ever-changing medium where anyone and everyone.
 Why is this important to you?  How do digital footprints connect with digital citizenship?  Does everyone have a digital footprint?
Digital Citizenship Lesson 3. Does it Matter who has your Data What kinds of information about yourself do you share online? What else do you do online.
Max Secure Software founded in Jan 2003 develops innovative privacy, security, protection and performance solutions for Internet users. The company is.
SURVEILLANCE The Fears of the Digital Age. Privacy –Identity –Anonymity Logging –Tracking Hacking Censorship State Security/Anti Terror Online The Discussion.
COM 354 Week 2.1 New Media Ethics. Twitter Updates What accounts to follow? Stories of the week?
INTERNET: The Good, The Bad and The Ugly
Minding your business on the internet Kelly Trevino Regional Director October 6,2015.
Tiffanie Donovan CSC /27/12. Societal Topics-Weeks 7 & 8 Internet Regulation Internet regulation has the operation of keeping people from viewing.
Lesson 15 : Networks And The Internet
The Legalities of using U.S.(foreign) Servers with Canadian students by Erin Gibbs and Rob Airey.
Activity 4 Protecting Ourselves. Keeping Safe There are lots of different ways we can be at risk on the Internet. How can we protect ourselves and keep.
Social Networking By: Ning Year 10 HC. Different types of networks  There’s so many ways people can be connected together. In person, s and social.
Personal Privacy and the Public Internet John E. Carter Kennesaw State University IT 3700.
PRIVACY, LAW & ETHICS MBA 563. Source: eMarketing eXcellence Chaffey et al. BH Overview: Establishing trust and confidence in the online world.
PRIVACY BOOTCAMP Jack Vale - Social Media Experiement.
SECURITY ISSUES. TYPES BLUE JACKING SENDING MESSAGES TO OPEN BLUETOOTH CONNECTION VIRUSES HARMFUL PROGRAMS THAT SPREAD WITHIN DIGITAL DEVICES COOKIES.
Digital Law -The Deep Web- Digital Law -The Deep Web- Liam Leppard Matthias Lee Russell Wong.
Cybersecurity Test Review Introduction to Digital Technology.
Privacy Lost: How Technology is Endangering Your Privacy CS Final Paper Presentation By: Christina Sulfaro.
 Information privacy involves the protection of an individual’s personally identifiable information. Such information can include health records, criminal.
Internet Privacy Define PRIVACY? How important is internet privacy to you? What privacy settings do you utilize for your social media sites?
Protecting your search privacy A lesson plan created & presented by Maria Bernhey (MLS) Adjunct Information Literacy Instructor
Computer Security Keeping you and your computer safe in the digital world.
Global One internet, worldwide Uncitral WTO Some laws: –Communications Decency Act –Child Online Protectioon Act –Children’s Internet Protection Act.
Digital Citizenship.  I can…. What is digital citizenship?  Think.Pair.Share.
Intro to Digital Technology Review for Final Introduction to Digital Technology Finals Seniors Monday, 5/16 – 2 nd Tuesday 5/17 – 1 st,3 rd Underclassmen.
START. A room full of computers Two or more computers connected together in order to communicate A computer that can communicate with every living thing.
Television Has The Greatest Influence On the Ballot Cast In a National Election Which of the following influences your final decision when voting in a.
Digital Citizenship.
Hotspot Shield Protect Your Online Identity
Virtual Private Networks
Importance of Privacy Internet Safety
Digital Citizenship.
Call AVG Antivirus Support | Fix Your PC
We design, market and manage remarkable websites
Digital Citizenship.
CYBERSAFETY & Personal information
What is E- marketing? Internet marketing is any marketing activity that is connected online through the use of Internet technologies.
Digital Citizenship.
The Rapid Loss of Privacy in the Era of the Internet
Digital Privacy Workshop 101
Does It Matter Who Has Your Data?
Personal Privacy and the Public Internet
Presentation transcript:

Learning to Hide in the Digital Age

Can you completely remove your online identity?

Online Privacy is Dead

Identity Theft Videos See how easily freaks can take over your life See how easily freaks can take over your life Amazing mind reader reveals his 'gift'

We want our online privacy 86% of Internet users have taken steps online to remove or mask their digital footprints 55% of Internet users have taken steps to avoid observation by specific people, organizations, or the government 59% of Internet users do not believe it is possible to be completely anonymous online, while 37% of them believe it is possible. 68% of internet users believe current laws are not good enough in protecting people’s privacy online 24% believe current laws provide reasonable protections.

Who is tracking us online?

Why are you being tracked online? Providing you a better user experience. Inexpensive and plentiful storage and power(Big Data) National and Security Intelligence Identity theft: 1.Identity cloning and concealment 2.Criminal identity theft 3.Synthetic identity theft 4.Medical identity theft 5.Child identity theft

Where are you being tracked Facebook and Social Networks GPS (Smartphones and tablets) Search Engines Cookies Automatic License Plate Readers Surveillance Cameras and Closed-Circuit Television

When are you being tracked online? When you turn on your computer/smartphone/tablet and until you turn it off.

What is being tracked Every click, tap, and swipe you make on the Internet is being tracked, not just by your browser but by many of the companies that connect that click, tap, and swipe to your IP address -- then to your name. And that data is sold to the highest bidder.

How your data is used Relevant Search Results - Good! Recommendations - Good! Info based on user action - Good! Excessive Ad Retargeting - Bad! Identity Theft – Ugly! Selling data – Ugly!

The Delicate Balance Between Convenience and Security Libguide

Thank You!! Questions?! Wanda Huffaker – Steve Irving - Phil Roche’ - ULA Intellectual Freedom Committee Website ULA-IFC on Facebook