You’re Leaving Footprints TROPE: Teachers’ Resources for Online Privacy Education www.teachingprivacy.org 1.

Slides:



Advertisements
Similar presentations
Twitter at ECOMM 2011 ECOMM 2011 is starting to adopt social media: Twitter you can interact with ECOMM you can give your opinion about the presentations,
Advertisements

OAuth Phil Wilson, University of Bath, what the? "OAuth provides a way to grant access to your data on some website to a third website, without.
By: Rachel Hall and Amy Austin.  Grade: All levels  Price  Host App: $24.99  Student App: free (allows up to 32 students)  Location: App Store 
Privacy: Facebook, Twitter
HISD Becoming #GreatAllOver. How many hours per day does the average child between the ages of 8 and 18 spend with media and technology? (this includes.
Townsville, Saturday, 19 March 2011 Presented by Gerard Byrne Volunteering North Queensland Townsville City Council.
Facebook Presented by: Keystone Computer Concepts.
PewInternet.org The new landscape for civics and politics (especially in mobile) Voting Information Technology Summit - GeekNetNYC December 1, 2011 Lee.
WHO WE ARE ●Website Development & Design ●Web Marketing Strategy, Training, and Analysis ●Web Applications, iOS apps, Android apps.
Tracking, Privacy, You & The 21 st Century When you talk online the internet listens.
Using Evernote for Anecdotal Records Sarah Valter Lindbergh Un-conference September 30, 2011.
Security Warnings TROPE: Teachers’ Resources for Online Privacy Education 1.
Taking the Headache out of. Reach your sphere of influence on a daily basis – AT NO COST? Reconnect with friends and stay in touch with family – AT NO.
A Social Help Engine for Online Social Network Mobile Users Tam Vu, Akash Baid WINLAB, Rutgers University May 21,
Social Networking – The Ways and Means Rosey Broderick May 2011.
Towards Appraising Online Stores SEPI Research Group, Department of Computer Science and AI University of Malta 1 CSAW 2004 Towards Appraising Online Stores.
Manjit kaur Manjit Kaur1. Why do we need to protect our computer from a virus? A reason why we need to protect our computer from a virus is because it.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
FlipFlop PD June 12, 2012 Stephanie Dixon, EBRPSS What’s in Your Digital Dossier?
Social Networking Vocabulary Cycle 2. Blog Vocabulary  blog – a personal or professional website which is updated on a regular basis with an individual’s.
Welcome to E.L. Wright iPad Safety Night I. Using Technology and Protecting Your Child E.L. Wright Technology Department and Richland County Sheriff's.
App Rights or wrongs ? A look at smartphone apps or: why RTFM* is not just important for geeks and “computer types” * = Read The F+*#ing (or “Fine”) Manual.
A centre of expertise in digital information managementwww.ukoln.ac.uk Getting it Right with Web 2.0 Ann Chapman UKOLN University of Bath Bath, UK UKOLN.
FACEBOOK IS THE BEST THING THAT EVER HAPPENED TO FRIENDSHIP WHY I LIKE FACEBOOK! By Mike Matthews.
Chloe Miles IMPROVING PRODUCTIVITY USING IT. Menu Using Word Advantages Disadvantages Conclusion E-Safety Social Media Dangers of Social Media Sites Staying.
 Privacy in Social Networks. Facebook Background  Biggest social network with 1 billion users  Most information defaults to public.
Integrating Technology for Instruction and Learning Jennifer Verschoor & Evelyn Izquierdo April 3, 2009.
Manjit kaur Manjit Kaur1. Why do we need to protect our computer from a virus? A reason why we need to protect our computer from a virus is because it.
Introduction for Families. Seesaw gives your child a place to document their learning, be creative and learn how to use technology. Seesaw is a new way.
Amanda Lenhart, Senior Researcher, Director of Teens & Technology Mary Madden, Senior Researcher Pew Research Center Family Online Safety Institute November.
The risks behind Location-Based Service Julie Wang.
 Social Media Workshop Batya Maman Social Connect, LLC Social Connect.
What’s the Big Deal about Internet Privacy Marrs Computer Club.
What’s the Big Deal About Internet Privacy?. Today’s Objective I can explain to Mr. Bates why companies collect information about visitors on their websites.
SOCIAL MEDIA’S IMPACT ON PERSONAL BRANDING WHY YOUR DIGITAL FOOTPRINT MATTERS Image retrieved from socialmediatoday.com Created by Nicole Gennarelli.
HETUS Pilot Group 8 Privacy procedures and ethical issues Kimberly Fisher, Centre for Time Use Research – co-ordinator External consultant Kai Ludwigs.
Building a Social Media Presence Participants will look at the BCPS social media outlets (Twitter, Facebook, Flickr, Vimeo, Instagram, blogs) and relevant.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
WELCOME TO SITIATA. Time Card Calculator If you want to best calculating software then visit in sitiata. We are providing a best Time Card Calculator.
By Samantha Kozar.  What are social networks?  What is Facebook?  What is Gowalla?  What are the capabilities of these sites?  Privacy Settings 
AN INTRODUCTION TO FACEBOOK. Learning Objectives A brief introduction to the social networking site Facebook. Instructions to create an account. How to.
Affordable Web Development & Custom Design Company in Toronto
Profile & Privacy Management Dashboard
Facebook privacy policy
4 Ways to Set Up Parental Controls On Your Home Network
Introduction for Families
Welcome to Parenting in the DigitalAge.
Information Security.
Using Apps to Get and Share Information
Increasing Participation Through Marketing Magic
Shavonne Henry, Nikia Clarke, David Heymann, Brandon Knight
Latest Updates on BlackHawk Mines Music : Privacy Policy
Discussion and Conclusion
Importance of Privacy Internet Safety
DigiDay 2016 Darren Trofimczuk
Introduction for Parents
Mrs. Amy Wright Introduction to Computer Science Mrs. Amy Wright
Social Media Account Management Services
Mrs. Amy Wright Web Page Design Mrs. Amy Wright
Google Privacy Policy Karen Tao.
Title of session For Event Plus Presenters 12/5/2018.
Introduction for Families
MENA-HPF HTA Online Platform
Privacy Issues part 4 Information/data privacy
What’s the Big Deal About Internet Privacy?
This material is based upon work supported by the National Science Foundation under Grant #XXXXXX. Any opinions, findings, and conclusions or recommendations.
You assume all responsibility for use and potential liability associated with any use of the material. Material contains copyrighted content, used in accordance.
Session Evaluations There are two ways to access the session and presenter evaluations: 1 2 In the online agenda, click on the “Evaluate.
Security Issues within Social Media
Presentation transcript:

You’re Leaving Footprints TROPE: Teachers’ Resources for Online Privacy Education 1

Overview Principle: Your information footprint is larger than you think. Your information footprint consists of much more than just the information you intentionally share online. What else can contribute to your information footprint? 2

Sharing Information Daily 3

Recording Your Tracks Every time you visit a website or app, you leave a trace! Many websites, apps, and other services store the data they collect about users. What kind of data can websites, apps, and other services collect from your activities and posts? 4

Hidden Information Metadata: “Data about data” – additional information that apps and devices exchange along with content, often without the user’s knowledge. What are some places you find metadata? What kind of information is in it? 5

It’s Not Just You (and It’s Not Just Your Devices) Can other people contribute to your information footprint? 6 Posts and photo tags; Incidental recordings; Business records; Public records; Any kind of records!

Making Inferences All of this data – the information you intentionally share, the information shared by others, and the metadata attached to these – can be combined to infer even more information about you! Who would want such a portrait of you? What could they infer from your data? 7

Inferences: What Could Go Wrong? What could happen if a criminal discovered… 8  A tweet saying you’re on vacation?  Your name in your Twitter profile?  A public record that has your name linked with your home address?  All of the above?

Check the privacy settings on your mobile apps, computer software, and online accounts regularly. Turn off settings that share information, such as your location or contacts, that is unnecessary for the service. “Opt out” of companies and services sharing your information with third parties. That’s a Lot of Data! What Can I Do? 9

For More Information... Visit Us on the Web! Thanks to... TROPE: Teachers’ Resources for Online Privacy Education is supported by a grant from the National Science Foundation (DGE ). Any opinions, findings, and conclusions or recommendations are those of the originators and do not necessarily reflect the views of the National Science Foundation. Licensed by the International Computer Science Institute under a Creative Commons Attribution 4.0 License (CC-BY)Creative Commons Attribution 4.0 License 10