The risks behind Location-Based Service Julie Wang.

Slides:



Advertisements
Similar presentations
A NEW LOOK AT FACEBOOK!. What you can do with facebook: What you can do with facebook: o o You can see where old friends have gone o o Students can make.
Advertisements

Highfields School Miss Laming - Assistant Head Miss Hughes – Head of Year.
Big Data Privacy Issues in Public Social Media Reporter : Ximeng Liu Supervisor: Rongxing Lu School of EEE, NTU
Internet Safety James Fuller Internet Rules To Remember When asked by friends or strangers, online or offline, never share Account IDs and Passwords.
Mobile Applications: Changes in social networking and mobile phones By Elias Chesy.
Facebook Presented by: Keystone Computer Concepts.
How to keep your kids safe online
Cyber Safety What Every Parent Needs to Know If your child is surfing the Web, you need to be paddling right alongside him/her.
Myspace.com. My Space.comMy Space.com: A web site designed for people to… * Chat online * Post profiles * Meet people * Business networking * Matchmaking.
PewInternet.org The new landscape for civics and politics (especially in mobile) Voting Information Technology Summit - GeekNetNYC December 1, 2011 Lee.
1 “Technology and Social Networking”. 2 Objectives 1.Describe technology that youth are using for social networking. 2.Recognize benefits and dangers.
Tracking, Privacy, You & The 21 st Century When you talk online the internet listens.
Are you being a safe and successful digital citizen?
Company LOGO Internet Safety A Community Approach.
Taking the Headache out of. Reach your sphere of influence on a daily basis – AT NO COST? Reconnect with friends and stay in touch with family – AT NO.
MANAGING YOUR ONLINE PROFILE WHAT DOES THIS MEAN AND WHY SHOULD YOU CARE? Sarah Morris UT Libraries.
Chapter 3 Introduction to Computing Chapter 3 Structures in Computing William Johnson Julia Benson-Slaughter
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Social Networking Positives of Social Networking
PRIVACY BOOTCAMP YpJU.
Anti- bullying week Year 4.
Headquarters Air Mobility Command UNCLASSIFIED Unrivaled Global Reach for America … ALWAYS! HQ AMC/A6OS Cyber Surety Location-Based Services.
Parenting in the Internet Age Tips for Keeping Kids Safe and you Connected to your Teen.
 Facebook  Twitter  MySpace  Windows LiveSpace.
Chloe Miles IMPROVING PRODUCTIVITY USING IT. Menu Using Word Advantages Disadvantages Conclusion E-Safety Social Media Dangers of Social Media Sites Staying.
 Privacy in Social Networks. Facebook Background  Biggest social network with 1 billion users  Most information defaults to public.
 What are the risks?  Technologies your children use  Tips for protection  Advice and help  Questions? Topics.
Safe Use of Social Media Cadets – Air Force’s Future.
DANGER OF TWITTER. BEWARE OF TWITTER PHISHING Phishing always happen and sometimes you will receive a direct Tweet from your Twitter buddies They will.
Do they perceive the risks? TEENS AND SOCIAL NETWORKING.
Have Fun – Stay Safe ‘E Safety’ – ‘Cyber Safe’. What is ‘Cyber Space’? The invisible space that we use to link ourselves to the internet or other people.
Task 1 Research on any 2 of the following: Online shopping Online banking Web broadcasting Social networking sites Discuss the disadvantages and advantages.
Feminist Cyborgs: Activism, Fundraising and Security Online Jan Moolman, Association for Progressive Communications, Women’s Rights Programme: 3 December.
“A teacher is fired because there’s a picture of this teacher holding alcohol drinks on her MySpace page” Skylar, Will Y., Steven.
Build Relationships and Build Business on Powered by Customer WOW Project.
WHY DO MOST UNIVERSITIES USE SOCIAL MEDIA? Social media is used among universities because they want to reach their audience which are young students.
Teenagers today are hooked on social networks. Is it always safe to share your ideas and personal information with other users? Essays giving opinions.
One feature of social media networks that continues to puzzle me is the option to add your location. Using this feature will tell the whole wide world.
LPM – Unit 1 L 4 Socialising on the internet. How do you keep in contact with your friends and family? List all of the different types of technology.
AARP Social Communication: Seven (or so) Secrets Karin Miller Communications Director AARP Tennessee 1.
Protecting Yourself on Social Media – Friend Requests And Messages.
Internet Safety. Sexual Predators Sexual Predators Harmful images – disturbing, overly graphic, explicit Harmful images – disturbing, overly graphic,
Activity 4 Protecting Ourselves. Keeping Safe There are lots of different ways we can be at risk on the Internet. How can we protect ourselves and keep.
You’re Leaving Footprints TROPE: Teachers’ Resources for Online Privacy Education 1.
Internet Safety and Productivity Tips Presented by ITS Kerri Sorenson and Sean Hernandez December 11, 8:30-9:00 am.
PRIVACY BOOTCAMP Jack Vale - Social Media Experiement.
INTRODUCTION & QUESTIONS.
20 pt 30 pt 40 pt 50 pt 10 pt 20 pt 30 pt 40 pt 50 pt 10 pt 20 pt 30 pt 40 pt 50 pt 10 pt 20 pt 30 pt 40 pt 50 pt 10 pt 20 pt 30 pt 40 pt 50 pt 10 pt BlogsTaggingQR.
Healthy Media Boundaries
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
“How do I keep my child safe online?” Miss Johnstone Computing Co-ordinator “Parents / Carers are the one important factor in the home environment to keep.
1. Guard your privacy. What people know about you is up to you. 2. Protect your reputation. Self-reflect before you self-reveal. What’s funny or edgy.
YOUR TEEN AND SOCIAL MEDIA INFORMATION FOR PARENTS ON SOCIAL MEDIA, INCLUDING SAFETY TIPS AND HOW TO HELP YOUR YOUNG TEEN NAVIGATE THE ONLINE WORLD. A.
Tech Tuesday: Facebook 101 People’s Resource Center January 26, 2016.
Aristotle, a great thinker, once said: “We are what we repeatedly do.”
>>0 >>1 >> 2 >> 3 >> 4 >> Privacy and SNS in China Comundus-European Master of Arts in Media, Communication and Cultural Study Jin PENG the case of xiaonei.com.
Data Privacy Request Janet Rash Intel Corporation Oregon Community Relations Manager October 3, 2008.
St. Anne’s Baslow Online Safety Before we start… O Throughout this meeting I hope to provide information that you will find useful in keep your.
Questions ? ? ? ? ? ? ? Do you use the internet to talk to your friends?
Social Network and Media Sites Think about your Safety  Security settings need to be set to “Friends only”, that includes - comments, posts and photos.
Facebook. You need a facebook account before you set up a facebook page.
How to stay safe using the internet & App’s
Creating your online identity
How to stay safe using the internet and app’s?
Discussion – what kind of bullying is taking place in the images
Dos and Don’ts of Social Media
Social Media Safety Freshman Seminar.
Social Network Dilemmas – What should you do?
Online Safety; Privacy and Sharing
Presentation transcript:

The risks behind Location-Based Service Julie Wang

Bio 19 years old. Born in China, live in Thailand. Going to major in Communication Art. Like to share my life with my friends on social network. Usually post status with geotag, until a tragedy happened in my hometown.

Real case Yutong Lai 16 years old High school student In 2013, she was missing for 3 days and at the 4 th day, her body was found in a abandon building near her home. She liked to post photos with geotag. The top three tags are her home, her school, and a milk tea shop close to her house. The police claimed that the location tag caused her death.

What is Location Based Service (LBS) Location-based services (LBS) use real-time geo-data from a mobile device or smartphone to provide information Many of today’s social networking sites, such as Facebook, Twitter, Foursquare, are now incorporating location-based services that allow users to broadcast their locations via smartphone.

Claim While Location Based Service (LBS) opens a new way for people to communicate, it also brings problems of safety and privacy.

Why people like it? Travel information Social Reward

What are the risks? Privacy Companies can record users’ locations via LBS. Apple regularly recorded the location information in a hidden file. (Yun, Han, and Lee 2) Personal information can be totally transparent with LBS. Safety Geotagging pictures and uploading them can help a criminal determine your routine. Provides targets for criminals

GPS dating It is designed to connect singles with other local singles. Users post photos and personal information on their profile. Really need to be careful to go out at night with someone you just find online. It causes sexual assault, rape, and rob.

Solution Turn off the GPS on you phone. Consider who is the audience and tag locations that will not threat your safety.

Conclusion Location-based service associates with a lots of potential problems while it opens a new way of communication among people. People should use LBS wisely Don’t ASK to be the victim!

Work Cited Siciliano Robert. Don’t Let Location-Based Services Put You in Danger. McAfee, Web. 18 Nov Komando Kim. Location services pose huge security risks. USAToday, Web. 18 Nov Yun Haejung, Han Dongho, Lee. C Choong. Understanding The Use of Location-Based Service Applications: Do Pricacy Concerns Matters? Journal. 18 Nov 2014.

Acknowledgement of assistance Thanks my friend Annia for discussing the issue and practicing the presentation with me.

Thank you!