Security & Reputation protection or restriction?building or destroying? & Reputation helen goss www.wayoutmedia.com 2012.

Slides:



Advertisements
Similar presentations
The IFLA Internet Manifesto Alex Byrne Chair Committee on Free Access to Information and Freedom of Expression International Federation of Library Associations.
Advertisements

Haygrove School – E Safety Induction E Safety Update #protecting your professional identity.
U.N. Human Rights Council Report of the Special Rapporteur on the promotion and protection of the right to freedom of opinion and expression.
Being Good Digital Citizens with Today’s Technologies.
Protecting children online  How can you protect your child online?  Are you aware of the dangers?  Do you know what you can put in place to protect.
Key Stage Three Resources
Coxheath Primary School E-safety- Term Purpose To outline the use of the internet in school The use of the internet outside school What are the.
Web Filtering and Deep Packet Inspection Artyom Churilin Tallinn University of Technology 2011.
Technology in Education Issues we need to know. Social, Ethical, and Legal. By: Kara Bushey ECED 201.
Challenges to freedom of expression The right to freedom of expression is a “foundation right” in society. It protects the right to: -Express ourselves.
Boyertown Area School District Acceptable Use Policy.
Computers and Society Carnegie Mellon University Spring 2006 Cranor/Tongia/Farber 1 Regulating Online Speech.
Freedom of Speech in Cyberspace 1. The U.S. Constitution - The 1 st Amendment: The 1 st Amendment Congress shall make no law respecting an establishment.
Free speech in the United States: Expression vs. Hostility Seeking a Balance: Enhancing the First Amendment Challenges.
E-Commerce: Regulatory, Ethical, and Social Environments
FREEDOM OF EXPRESSION Salanieta Tamanikaiwaimaro (Sala T) - FIJI Controversy Conflict Who determines the balance??? Ethics.
 area of law that deals with protecting the rights of those who create original works  Also called as confidential information.  It is called “intellectual”
Social Networking in Education Presented by Justin R. Clark.
Awareness raising session for Parents and Carers.
Internet Censorship In order of appearance: Dmitriy Bespalov Ilya Braude Brian McBurney Yaroslav Volkov.
What are the limits? Freedom of Speech is NOT paramount if it impinges upon the freedoms/rights of others.
Cisco Confidential © 2011 Cisco and/or its affiliates. All rights reserved. 1 Cloud Computing and Intermediary Liability Issues Global Policy and Government.
THE POTENTIAL FOR EFFECTIVE WEB CONTENT CONTROL BASED ON CURRENT TECHNOLOGY Carolyn Watters and Michael Shepherd Web Information Filtering Lab Faculty.
Identity A legal perspective FIDIS WP2 workshop 2/3 december 2003
Copyright © Allyn & Bacon 2008 POWER PRACTICE Chapter 8 Using the Web for Teaching and Learning START This multimedia product and its contents are protected.
CS 4001Mary Jean Harrold1 Class 24 ŸFreedom of speech in cyberspace ŸAssign ŸAssignment 8—due today ŸTerm paper—due 11/20.
7-Oct-15 Threat on personal data Let the user be aware Privacy and protection.
Freedom of speech. Freedom of speech is the freedom to speak freely without censorship. The term freedom of expression is sometimes used synonymously,
Welcome to Week 3 in the Mrs. DeRita’s computer lab!
The Internet and Constitutional Rights Copyright © Texas Education Agency, All rights reserved.
E-Safety E-safety relates to the education of using new technology responsibly and safely focusing on raising awareness of the core messages of safe content,
Internet Safety & Security Tips for Parents Dorothy Grant Elementary School, April 2015.
Do you believe in this? Due to its very nature, the Internet is NOT a safe or secure environment. It is an ever-changing medium where anyone and everyone.
Digital Citizenship: Active Participants in a Digital World.
Tim Reid Malvern Parish C.E Primary School Internet Safety.
Challenges to freedom of expression The right to freedom of expression is a “foundation right” in society. Defined in Universal Declaration of Human Rights.
The Battle for the Soul of the Internet. The Future of our Internet cable, telephone companies and wireless providers Versus Internet content and application.
A (very incomplete) talk on digital security A couple of basics Your Your phone Browsing.
1 Freedom of expression and freedom of the media INFORMATION SOCIETY Federal Ministry for Foreign Affairs of Austria.
Web Browser-Parental Control Armenda Fourte’ July 27, 2007.
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 12.
內文 資料來源 FREEDOM OF SPEECH. From Wikipedia, the free encyclopedia Jump to: navigation, searchnavigationsearch For free Speech in specific jurisdictions,
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
Presentation by: Jennifer Collins Roldan Padilla.
Freedom of Speech Computers in the World.
E-Safety. A great place… Image by: Shutterstock/nasirkhan As we have discussed over the last few lessons, the Internet is a great tool for sharing information,
parents-snoop-on-their-kids-online/
The internet is an amazing resource. We can connect, communicate and be creative in a number of different ways, on a range of devices. However, the internet.
Chichester School District is providing students access to the district’s electronic network. This network includes Internet access, computer services,
Lecture2 Networking. Overview and spam World Wide Web Censorship Freedom of expression Children and inappropriate content Breaking trust on the.
Freedom of Expression. Universal Declaration of Human Rights Adopted by the United Nations General Assembly on 10 December 1948 at Paris. The Declaration.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
E-safety Helping your children stay safe on-line A presentation for Parents.
Ministry of Education & Religious Affairs, Culture & Civilisation Greek School Network nternet-safety.sch.gr.
Raising Digitally Literate Citizens Curbar Primary School March 2016.
DIGITAL FOOTPRINTS 11 TIPS FOR MONITORING YOUR DIGITAL FOOTPRINT AND 5 TIPS TO MAKE IT POSITIVE.
PUBLIC ACCESS TO E-GOVERNMENT INFORMATION RESOURCES – THE ROLE OF LIBRARY AND INFORMATION SPECIALISTS.
AFRICA FREEDOM OF EXPRESSION EXCHANGE (AFEX) Workshop
E-Safety Briefing
Digital Citizenship & Social Media.
E-Commerce: Regulatory, Ethical, and Social Environments
Why the government should monitor its citizens using technology
Child Rights & Business in a Digital World
A Gift of Fire Third edition Sara Baase
Freedom of Speech in Cyberspace
A Gift of Fire Third edition Sara Baase
Universal Declaration of Human Rights
Online Safety; Privacy and Sharing
Online Safety; Privacy and Sharing
Presentation transcript:

Security & Reputation protection or restriction?building or destroying? & Reputation helen goss

3pm Overview of Security on the Internet Your personal safety Safer access to social networking sites Practical Facebook session 4.30pm BREAK 5pm Exercise in reputation building and shaping 6pm Finish

Security “Everyone has the right to freedom of opinion and expression; this right includes freedom to hold opinions without interference and to seek, receive, and impart information and ideas through any media and regardless of frontiers.” THE BIGGER PICTURE (macro) The Universal Declaration of Human Rights, Article 19 The right to freedom of speech; 10th December 1948

Security Child Protection: Protecting children from material perceived as inappropriate, or limiting their contact with people who may harm them Spam: Reducing the barrage of unwanted commercial offers by or on the Web Data Allowance: Controlling the size of the flow of data any one user is able to access at one time Protecting intellectual property: Preventing employees from sharing information that is viewed as the property of their employer Protecting resources: Stopping people from using their work time or an employer's technical resources for personal activities. Restricting access: Control access to materials or online activities that are banned or regulated in a specific jurisdiction (for example a country or an organization like a school) such as explicit sexual or violent materials, drugs or alcohol, gambling and prostitution. Stopping access to religious, political or other groups or ideas that are deemed to be dangerous, using the excuses that ‘they’ are preserving cultural norms and religious values or protecting national security. Who is in control? Why do they control? Parents, Schools, Universities, Employers, Commerical Companies, Internet Cafes, ISP’s and Governments at different levels THE BIGGER PICTURE (macro)

Security National Governments restrict entire populations access to the Internet or whole categories of information or to share information freely See the OpenNet Initiative “Internet censorship and surveillance are growing global phenomena. ONI’s mission is to identify and document Internet filtering and surveillance, and to promote and inform wider public dialogues about such practices. “ When is it censorship? Who is blocking or Filtering in the extreme? Some people control their own experience of the Internet Others restrict how people use the Internet and what they can and cannot access Who has the ability? Whoever has control of specific parts of the technical infrastructure Many parts of the international infrastructure that supports the Internet are under control of gov or gov controlled agencies Some countries openly admit and publish about it THE BIGGER PICTURE (macro)

image: chopshopnat.blogspot.com

image: freehacktools.com

Security Who is fighting for the rights to freedom of speech on the Internet? THE BIGGER PICTURE (macro)

image: I invented the Web just because I needed it, really, because it was so frustrating that it didn't exist.... The concept of the Web is of universal readership... ” “ The dream behind the Web is of a common information space in which we communicate by sharing information. Tim Berners-Lee ” “

image: I’m trying to make the world a more open place ” “ Mark Zuckerberg

From the Internet to the iPod, technologies are transforming our society and empowering us as speakers, citizens, creators, and consumers. When our freedoms in the networked world come under attack, the Electronic Frontier Foundation (EFF) is the first line of defense. EFF broke new ground when it was founded in 1990—well before the Internet was on most people's radar—and continues to confront cutting-edge issues defending free speech, privacy, innovation, and consumer rights today. From the beginning, EFF has championed the public interest in every critical battle affecting digital rights.

We [Anonymous] just happen to be a group of people on the internet who need... just kind of an outlet to do as we wish, that we wouldn't be able to do in regular society... That's more or less the point of it. Do as you wish... ” “ Trent Peacock: The face of Anonymous

Bypassing filtering Ways of bypassing filters are called ‘circumvention methods/tools’ They all work in practically the same way, they instruct your web browser to take a detour through an intermediary computer called a ‘proxy’ that is; Located somewhere that is not subject to Internet Censorship Has not been blocked from your location Knows how to fetch and return content for users like you Security THE BIGGER PICTURE (macro)

Security What are the risks of circumvention tools? THE BIGGER PICTURE (macro) It is up to you to decide whether there are significant risks involved in accessing the information you want. This may not be because there is a law against it, there may not, but other risks may be of consequence eg harassment, losing your job or worse. Can you be traced/found out using a proxy server (circumvention tool)? If your server is detecting suspicious activity you could be reported.

image: 404systemerror.com More information on the floss manuals site ‘Bypassing internet censorship’; It describes how the Internet works Various forms of online censorship It elaborates on a number of tools and techniques that might help you circumvent these barriers to free expression The issue of digital privacy and security is considered throughout which begins by covering the basics, adds a few advanced topics before ending with some masterclasses How do I do learn more?

Your Personal Control THE SMALLER PICTURE (micro) Safer Social Networking Facebook masterclass Overview of Google+ Looking after your reputation and building a presence on the Internet

Safer access to social networking sites Edit your default privacy settings in the social networking platform Know precisely what information you are sharing with whom Make sure that you understand the default geolocation settings, and edit them if needed Only accept into your network people who you really know and trust Only accept into your network people who will be savvy enough to also protect the private information that you share with them, or train them to do so Be aware that even the most savvy people in your network might give up information if they are threatened by your adversary, so consider limiting who has access to which information Be aware that accessing your social networking platform via a circumvention tool will not automatically protect you from most of the threats to your privacy. Also accessing through smart phones discloses the locations of the user of a social networking platform at any given moment

Facebook privacy masterclass

Exercise in reputation building and shaping

Questions and Answers

Whats Google +? about circles