DATA ABOUT YOU & ME Group 3 – Data About You Presentation - Casey.

Slides:



Advertisements
Similar presentations
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Advertisements

Safeguarding Data to Ensure Effective Data Use Paige Kowalski |Director| State Policy & Advocacy July 2014.
Polling Stations There are four questions posted in the classroom Indicate a “yes” response by placing a tally mark on the white board The results of the.
Objectives Overview Differentiate among laptops, tablets, and servers Describe the purpose and uses of smartphones, digital cameras, portable media players,
Objectives Overview Differentiate among laptops, tablets, and servers Describe the purpose and uses of smartphones, digital cameras, portable media players,
Hacker’s tricks for online users to reveal their sensitive information such as credit card, bank account, and social security. Phishing s are designed.
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
Facebook for RSVP’ers You can do it!. What Questions Do You Have? What are you wanting to learn at this training?
CC3.12 Lecture 12 Erdal KOSE Based of Prof. Ziegler Lectures.
Discovering Computers: Chapter 1
TC2-Computer Literacy Mr. Sencer February 4, 2010.
The Internet Facilitates Global data communications.
© 2012 Cengage Learning. All Rights Reserved. Principles of Business, 8e C H A P T E R 11 SLIDE Computer Systems Business Applications.
Parts of a Computer.
Microsoft Office 2013 ®® Appendix A Introduction to Cloud Computing.
Chapter 3: Storage Devices & Media ALYSSA BAO 1. 2 Solid State controls movements of electrons within a microchip Optical uses precision lasers to access.
The Privacy Tug of War: Advertisers vs. Consumers Presented by Group F.
© 2012 Microsoft Corporation. All rights reserved. Amazing apps. Windows 8 comes with built-in apps for the things you do most to help get your favorite.
Company/Product Overview. You have lots of files all over the place.
WHAT Exam Practice WHY All MUST Most SHOULD Some COULD Be able to understand the requirements of the exam to achieve a grade D Be able to understand the.
Introduction to Databases. Overview  What is a Database?  What is a Database Management System?  How is information organized in a database?  What.
Intro to Google Apps B3: Working in Google Drive.
Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Social.
Staying Safe Online Keep your Information Secure.
Shawn Ruch. Software Project  Fantasy games want to expand its gaming community to the world wide web. The following features will be included in the.
Chapter 11 Computers and Society, Security, Privacy, and Ethics.
C HAPTER Social Networking Using Facebook: Advanced Techniques 3 Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall.
Recordkeeping for Good Governance Toolkit Digital Recordkeeping Guidance Funafuti, Tuvalu – June 2013.
GO! All In One 2/E By: Shelley Gaskin, Nancy Graviett, Debra Geoghan Chapter 2 Getting Started with Windows 8.1 Copyright © 2015 Pearson Education, Inc.
Privacy Privacy as a personal preference Is there such a thing as too much privacy? What will be discussed  Why privacy is an issue  Dangers of lack.
Privacy & Security Online Ivy, Kris & Neil Privacy Threat - Ivy Is Big Brother Watching You? - Kris Identity Theft - Kris Medical Privacy - Neil Children’s.
Safeguarding Your Privacy Section 1.3. Safeguarding Your Privacy 1. What is Identity Theft? 2. Research a story on identity theft and be prepared to report.
The Big Picture Technology in the Classroom. intelligence is the ability to learn about, learn from, understand, and interact with one’s environment.
Dimensions of E – Commerce Security
Computer Security By Rachel Gaines. Computers are used for work, play, and everything in between. So here’s how to keep it fun and protected.
Protecting Students on the School Computer Network Enfield High School.
Digital Literacy Lesson 3. The Role of Memory A computer stores data in the memory when a task is performed. Data is stored in the form of 0s and 1s.
Secret 7 “Mastering the Internet and Web Technologies.”
Recordkeeping for Flinders Councillors Presenter : David Bloomfield.
INTRODUCTION TO THEIR USE, PURPOSE, AND CCPS GRANT E-portfolios.
Welcome to working with the cloud &. Cloud computing: The practice of using a network of remote servers hosted on the Internet to store, manage, and process.
Web Portals Web portal- a "cyber door" on the web that you can enter to customize its contents. This is a starting point for web surfers. You can customize.
1 Patron Data Management and Library Systems: A Vendor Perspective ALA Conference Summer, 2004.
Webmaster Issues HTML5 and Privacy. HTML5 Already partially in use Advantages: ◦ Easier for user to view multimedia content ◦ Check mail offline ◦ Find.
D-Link Cloud Revolutions
E a s y S h a r e Jung Son Ky Le. Operational Concepts Recent years, huge number of growth in Internet users and broadband usage File-sharing become extremely.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Privacy & Confidentiality in Internet Research Jeffrey M. Cohen, Ph.D. Associate Dean, Responsible Conduct of Research Weill Medical College of Cornell.
Legal Holds Department of State Division of Records Management Kevin Callaghan, Director.
Online Services. An online service is a service delivered from the internet.
MICROSOFT ONENOTE ADVANCED MODULE 1 EXPLORE ONENOTE 2010  Navigate in the OneNote program window  Work in the OneNote program window  Explore.
Society & Computers PowerPoint
Part 1.  To answer the question “what is a database?”  To understand the basic components of a database and start to plan/create our own.
Network Services. Domain Controllers: – Used for Account management (e.g. user accounts, group accounts Register Hardware like Printers and PC Authentication.
Podcasting for CPE’s Messina, Morgan & Peracchi, LLP.
Introduction to Technology. Objectives Overview Differentiate among laptops, tablets, and servers Describe the purpose and uses of smartphones, digital.
WEB1.0 versus WEB2.0 – social media Interactive web solutions Collective intelligence refers to the phenomena of internet users getting together, sharing.
Why Does The Site Need an SSL Certification?. Security should always be a high concern for your website, but do you need an SSL certificate? A secure.
Digital Citizenship Grades 4-6
3.1 Types of Servers.
Peer 2 Peer & Client Server
3.1 Types of Servers.
BASIC INFORMATION ABOUT DATABASE MANAGEMENT SOFTWARE
Online applications.
Lesson 1 Mrs. Batichon Boiling Springs Middle School
Computers and Data Collection
DIGITAL LIBRARY.
CS101 Bigger Networks.
INTRODUCING DATABASES
Student Driven Digital Portfolios Introduction for Parents
Presentation transcript:

DATA ABOUT YOU & ME Group 3 – Data About You Presentation - Casey

CONTENTS o WHAT IS A DATABASE o LIST OF DATABASE o HOW DATA IS CAPTURED o UPDATE OF DATABASE o REQUEST OF PRINT-OUT o PRIVACY CONCERNS Group 3 – Data About You Presentation - Casey

WHAT IS A DATABASE ? In The Past 2000 BC Stonehenge is an example of data storage Its design stores info about astronomical phenomena Progress Knowledge Humans learn how to read and write Keep records and filing Organizing of Data Library Group 3 – Data About You Presentation - Casey

WHAT IS A DATABASE ? (Cont) SUMMARY OF DATABASE Collection of information Organized Electronic / Physical Filing System For Fast Retrieval of information Any format (electronic, printed, audio, combination) Now Server Internet High Capacity Hard Drive Forms a network of storage Technology Group 3 – Data About You Presentation - Casey

LIST OF DATABASE FaceBook Hospital Bank Accounts Government Agencies School Office BANK GOVERNMENT Group 3 – Data About You Presentation - Casey

HOW DATA’S ARE CAPTURED Lets take Facebook for an example: Sign up – By signing up, data’s of you will be captured Web Database Server Cookies Group 3 – Data About You Presentation - Casey

HOW DATA’S ARE CAPTURED (Cont) Account Details Also by keying in your account information Reason why Hackers want to invade databases Group 3 – Data About You Presentation - Casey

UPDATE OF DATABASE We are actually doing self-updating Changing account settings Playing the third-party games in FB Even chatting and commenting on you friends Another way is by web cookies Created by the source provider Facebook Cookies collect information Cookies provide Facebook information for faster service Group 3 – Data About You Presentation - Casey

REQUEST OF PRINT OUT In Facebook we can use application Group 3 – Data About You Presentation - Casey

PRIVACY CONCERN Up to individuals to trust another party before giving out information Thief is hired, Data is GONE ! Depends on the organization you are dealing with Group 3 – Data About You Presentation - Casey

References Facebook App Brings Back Data - NYTimes.com Facebook App Brings Back Data - NYTimes.com. [ONLINE] Available at: brings-back-data/. [Accessed 04 June 2011]. brings-back-data/ Places of Peace and Power - Stonehenge Facts Places of Peace and Power - Stonehenge Facts. [ONLINE] Available at: cts.html. [Accessed 04 June 2011]. cts.html What is a Database? What is a Database?. [ONLINE] Available at: htm. [Accessed 04 June 2011]. htm Group 3 – Data About You Presentation - Casey