Can I See You Now?. What would it take to know everything? Today’s possibility - Pizza demoPizza demo Tomorrow’s - A life recorder? 200 Gb/year for audio,

Slides:



Advertisements
Similar presentations
Identity Theft and Online Identity Solutions Heidi Inman May 29, 2008.
Advertisements

The Internet and the Web
10 July 2003MIS 111 Internet Privacy Laws Jennifer Almond and Colin Zupancic Enjoying the right to privacy means having control over your own personal.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
PRESENTED BY: FATIMA ALSALEH Credit Cards Fraud - skimmers -
Are you being a safe and successful digital citizen? E-safety
PRIVACY CONSIDERATIONS Privacy for Children Under 13 1 February 2013.
Unit 11 Using the Internet & Browsing the Web.  Define the Internet and the Web  Set up & troubleshoot an Internet connection  Categorize webs sites.
Chapter 11 Privacy Policies and Behavioral Marketing.
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
Ji Yeon Chu, Lindsey Fong, Jonathan Bender, Yi Low, and Umang Patel.
Can I See You Now?. Closed Circuit TV (CCTV) Boston – 450 cameras Chicago New York City – 3000 cameras London –200,000 cameras (individuals caught.
Microsoft Passport Waldemar Swiercz.
Tracking, Privacy, You & The 21 st Century When you talk online the internet listens.
Google Account Basics: Getting Started with free Google applications.
HIPAA What’s Said Here – Stays Here…. WHAT IS HIPAA  Health Insurance Portability and Accountability Act  Purpose is to protect clients (patients)
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
Are you being a safe and successful digital citizen?
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
The Privacy Tug of War: Advertisers vs. Consumers Presented by Group F.
Big Brother is watching.  1. Would you ever consider letting a TV crew come into your life to document everything? Why or why not?  Big Brother, Kardashians,
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
11 SUPPORTING INTERNET EXPLORER IN WINDOWS XP Chapter 11.
Information technology – Tech-trix Sync your life with Information Technology
ByBrendanMalindaRachael. Electronic Monitoring Electronic monitoring can take many forms, this happens because technology is becoming cheaper and very.
With Internet Explorer 8© 2011 Pearson Education, Inc. Publishing as Prentice Hall1 Go! with Internet Explorer 8 Getting Started.
Skills: none Concepts: information we give up voluntarily, information we reveal as a by-product of using the Internet, use of information “signals,” data.
What is E-Commerce? Section 8.1. What is E-commerce? E-commerce is the exchange of goods, services, information, or other businesses through electronic.
PRIVACY. In pairs Work out a definition of the word PRIVACY that you think makes sense You’ve got about 7 minutes...
INTERNET PRIVACY Marketing companies The cookie leak security hole in the HTML messages The Web Bug Can we trust the privacy.
CSE/ISE 312 Privacy (Part 2). The Business and Social Sectors Marketing and personalization What we do ourselves Location tracking A right to be forgotten.
E-commerce Vocabulary Terms. E-commerce Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the Internet.
E-commerce Vocabulary Terms By: Laura Kinchen. Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the.
Mi-Gyeong Gwak, Christian Vargas, Jonathan Vinson
Personal Privacy and Security Zenia C. Bahorski Ph.D. Department of Computer Science Eastern Michigan University Personal Privacy & Security - Z. Bahorski,
Privacy & Security Online Ivy, Kris & Neil Privacy Threat - Ivy Is Big Brother Watching You? - Kris Identity Theft - Kris Medical Privacy - Neil Children’s.
Use of Electronic and Internet advertising options Standard 3.4.
Digital Citizenship Lesson 3. Does it Matter who has your Data What kinds of information about yourself do you share online? What else do you do online.
Regulation of Personal Information Sally Brierley & Emma Harvey.
COM 354 Week 2.1 New Media Ethics. Twitter Updates What accounts to follow? Stories of the week?
U.S. Department of Commerce Web Advisory Group Minding Your Own Business The Platform for Privacy Preferences Project.
Bethany Webber. Facebook Facebook is a free worldwide social network service which started in February 2004 Founded by Mark Zuckerberg and his college.
Systems that support electronically executed business transactions.
 Make a list of things you did today. From the time you got up until now.  Who you talked to? How you communicated?  What you did before you came to.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
DIGITAL ADVERTISING Standard 4. THE ROLE OF DIGITAL ADVERTISING IS TO INCREASE SALES OR IMPROVE BRAND AWARENESS.
. There are 2 ways in which Cable Ties can use the technicians smartphone to track their current location. 1. GPS – uses satellites to triangulate the.
WHAT IS E-COMMERCE? E-COMMERCE is a online service that helps the seller/buyer complete their transaction through a secure server. Throughout the past.
PRIVACY BOOTCAMP Jack Vale - Social Media Experiement.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Use of this service Checking location departure/arrival Checking time departure/arrival Benefits to the user or company Provides up to date information.
Chapter 1: Internet Marketing Foundations. Chapter Objectives Describe how computers and servers communicate to enable people to interact with webpages.
Protecting your search privacy A lesson plan created & presented by Maria Bernhey (MLS) Adjunct Information Literacy Instructor
Christian Citizenship in a Digital World Lesson 1: Online Privacy.
Lecture4 Information Privacy 1-1. Overview Introduction Perspectives on privacy Information disclosures Data mining 1-2.
11 SUPPORTING INTERNET EXPLORER IN WINDOWS XP Chapter 11.
Main Features of iSafe All-in-One Keylogger Universal keylogger of isafe, Inc. Suitable for home parental control,corporate employee monitoring and cheating.
Visibook is instant, simple, and dynamic appointment booking We're headquartered in San Francisco, California "Visibook is awesome. My entire studio was.
Facebook privacy policy
Information Systems for Managers Assignment FACEBOOK
"Our vision is to be earth's most customer-centric company; to build a place where people can come to find and discover anything they might want to buy.
Unit 12 Using the Internet & Browsing the Web
What is Cookie? Cookie is small information stored in text file on user’s hard drive by web server. This information is later used by web browser to retrieve.
Google Privacy Policy Karen Tao.
Use of Electronic and Internet advertising options
Social Media And What Not To Share!
HOW DO I KEEP MY COMPUTER SAFE?
Cosc 5/4765 Privacy and security.
Presentation transcript:

Can I See You Now?

What would it take to know everything? Today’s possibility - Pizza demoPizza demo Tomorrow’s - A life recorder? 200 Gb/year for audio, 700 Gb/year for video Today we produce our information by choice Tomorrow we emit our information without knowing...

Boston is Watching

Cambridge is Watching

Citizen Protest

18 CCTV public areas and parking lots

Tracking You with GPS –24 satellites, which continuously transmit microwave signals regarding their locations at a given time – Through analysis of the data coming in from various satellites, a GPS receiver can determine its own location (for instance, if it's in a car, it can determine the car's location). –And if a GPS device has a transmitter, as well as a receiver, it can also broadcast its location to third parties.

Cell Phones E911 service - Reverse directory – call routed to a Public Safety Answering Point The Missouri Department of Transportation will monitor the movements of individuals on highways via their cell phones -- without their knowledge or consent Cell phone company can track to within 100 meters.

Cell Phone Tracking Automatic Surveillance Via Cell Phone Your cell phone company knows where your phone is whenever it's on Given enough data, algorithms are able to predict what people within an organization -- especially employees -- would do next and be right up to 85 percent of the time. This is worrisome from a number of angles: government surveillance, corporate surveillance for marketing purposes, criminal surveillance.

Mologogo Get prepaid phone Download free program Sign up with server – Google Maps Works with Sprint - Nextel

Mologogo – Tracking Your Friends

EZ Pass Expanding to more and more states Used for crime fighting Traffic violations Airport Parking MacDonalds

Radio Frequency ID (RFID) Undetectable and transmits several meters or moreUndetectable Currently – no regulation Passports Clothing Pets Money? You?

Magnetic Strips Drivers license Student ID Credit Card Loyalty Cards Frequent Flyer

Real ID = National ID? Starting three years from now – used for all government transactions At a minimum: name, birth date, sex, ID number, a digital photograph, address, and a "common machine-readable technology" Technologies to prevent fraud and copying Homeland Security is permitted to add additional requirements--such as a fingerprint or retinal scan-- on top of those. With standardized technology - who might want to swipe? Bars, banks, airlines? police can demand to see ID from law-abiding U.S. citizens.

Bentley ID Meal Plan Discretionary Card Key Hand Check for access

Our Travels Online Yahoo, MSN – gave search histories to FBI for research purposes on child pornography – not a criminal investigation. AOL - In August 2006, AOL published 650,000 users' search histories on its website Amazon – Retain your search history and might sell it should Amazon get a new owner. Google Desktop - the new "Search Across Computers" feature will store copies of the user's Word documents, PDFs, spreadsheets and other text-based documents on Google's own servers, to enable searching from any one of the user's computers.

Google Search A search for “cars” inktomi1-lng.server.ntl.com - 25/Mar/ :15: MSIE 6.0; Windows NT ce2123e969 Simplified inktomi1-lng.server.ntl.com (my internet address, resolved to a domain name) 25/Mar/ :15:32 (date and time I searched) (my search request, containing the word cars in it) MSIE 6.0; Windows NT 5.1 (shows the browser I used and operating system, MS Internet Explorer 6 on Windows XP) ce2123e969 (my unique cookie ID, assigned to my browser the first time I visited

Google GMail Gmail is supported by advertisers who buy keywords, Gmail uses "content extraction" on all incoming and outgoing in order to target the advertising to the user. For example, if the user is having an conversation about applying for a job, Gmail might present the user with ads about online job search sites and resume writing services. Nonsubscriber is also searched Gmail can be profiled across Google product lines Unlimited data retention

Facebook’s New Service 2,100 Colleges 22,000 High Schools 15,000 Corporations Military News Feed - Broadcasting your updates as headlines to your friends. Protest “Calm. down. breathe. We hear you,"

Cell Phone Cameras The Video Voyeurism Prevention Act of 2004 passed through Congress virtually unopposed.. Prohibits the photographing or videotaping of a naked person without his or her permission in a gym, tanning salon, dressing room or anywhere else where one expects a "reasonable expectation of privacy." Violators can expect fines of up to $100,000 and/or up to a year in prison.

Yahoo Buy Facebook? Yahoo privacy site acons/details.html

What Can We Do? Learn the Language Personally identifying information Aggregate information Opt Out Opt In Privacy Policies Good Practices Clean machine Do not share personal information Write and post on facebook like the whole world will read it. Use anonymizers Encrypt Pray

And Finally 79% of credit reports contain errors 25% of credit reports have errors serious enough to cause life problems Choicepoint lost 145,000 records Bank of America – 1.2 m customer records Citigroup – 3.9 m And on and on and on...