Privacy Lost: How Technology is Endangering Your Privacy CS408-01 Final Paper Presentation By: Christina Sulfaro.

Slides:



Advertisements
Similar presentations
Don’t be bullied, or be a bully.
Advertisements

ON LINE and doing FINE Using your head When surfing the web. Family Campers and RVers 2011.
Final Presentation CS By: Brittany Roy. My Book  Title:  Privacy Lost: How Technology Is Endangering Your Privacy  Author:  David H. Holtzman.
KDE Employee Training. What IS a Data Breach? Unauthorized release (loss or theft) of Sensitive or Confidential Data, such as PII, PHI, etc. On site or.
Section 6.3 Protecting Your Credit. Billing Errors and Disputes Notify your creditor in writing Notify your creditor in writing Pay the portion of the.
Beyond “I Fought The Law” Educating Law Enforcement about Privacy Services Adam Shostack.
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
How to safe online E-Safety Presentation How to stay safe when online Tip 1Tip 2Tip 3Tip 4 Tip 5.
Privacy Lost: How Technology is Endangering Your Privacy David H. Holtzman POWERPOINT BY: PETER OLSON.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
CSC101 FINAL PROJECT by Sally Fletcher & Nicole Seguin December 11 th, 2003.
Click to change slide. Did you ever want to do something unique or different? Why not invent something? First of all, you should know that there is a.
Being Safe on the Internet By: Hope Blackwell. What we will talk about today: Internet Safety Netiquette Rules for the internet Copy Right Laws.
Yes No Yes No Yes No Yes No Yes No Yes No Yes No.
Laura Swearingen Bellville Independent School District 2011.
Stop the Creepers and Cyberbullies! 5 Easy Ways to keep yourself safer online!
DELETE: THE VIRTUE OF FORGETTING IN THE DIGITAL AGE By Viktor Mayor-Schonberger.
(Edited) WORKPLACE PRIVACY.
CS 3043 Social Implications Of Computing 9/7/2015© 2004 Keith A. Pray 1 Class 7 Crime And Privacy Keith A. Pray Instructor socialimps.keithpray.net.
Lecture 18 Page 1 CS 111 Online Design Principles for Secure Systems Economy Complete mediation Open design Separation of privileges Least privilege Least.
Warrior Wednesday DIGITAL CITIZENSHIP.
~Jacob. - Robert Maclean was a Air marshal for the TSA, when all of the air marshals were alerted of a potential high jacking - At a time where the potential.
Matthew Neufeld Period 7 Technology 9 October 1, 2013.
“It is like, totally anonymous, so no one worries about getting in trouble. Lots of kids would never do this stuff in the ‘real world.’” —13 year old boy.
Digital Citizen Project Katie Goodall Educational Technology 505.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Miriam’s Vision: A Response to the 2005 London Bombings Citizenship Different Needs, Common Ground Human Rights & Surveillance.
1. ONLINE. Bullying behaviour is no longer restricted to the school yard. It is often online, out of sight and earshot of teachers and parents.... ONLINE.
INTERNET SAFTEY AND CYBER BULLYING By your internet protection go to guys… Lukas Richters and Raymond Weaver.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
CSCD 330 Network Programming Fall/Winter/Spring 2014 Lecture 1 - Course Details.
Lecture 17 Page 1 CS 236 Online Network Privacy Mostly issues of preserving privacy of data flowing through network Start with encryption –With good encryption,
Computers, Cell Phones & the Internet JOSE CANO AND SAMIE GIDDENS.
MMTK Access control. Session overview Introduction to access control Passwords –Computers –Files –Online spaces and networks Firewalls.
DIGITAL CITIZENSHIP What you do online… stays online… forever idea by Craig Badura, PowerPoint by David Binnion.
Intellectual Property Basics
Intellectual Property A brief explanation. Intellectual Property is a name used for material, or something that is intangible. You may not be able to.
1 Activity 5.3 – Statement 2, page 135 Lise Auffray Ray Reid and Lee Purves.
By: Clive Thompson Published: Divided into nine chapters that focused on the positives and negatives technology has on our lives Used examples,
{ Final Project Julie Silk. { By Nick Bilton, 2010 I live in the future and here’s how it works: why your world, work & brain are being creatively disrupted.
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. Cyber.
Law, IT and personal data protection - legislative framework lags behind the IT development Nataša Pirc Musar Information Commissioner, Republic of Slovenia.
Computer Safety Online and Offline By Michelle Noel.
PowerPoint created by Harvie, Brandon, and David STOP CYBERBULYING.
Have fun on the internet while being safe!!  Do you know what cyber safety means?.. YesNo.
It’s Complicated: The Social Lives of Networked Teens  Author: Danah Boyd  Year Published: 2014.
ThinkB4uClick A Smart Guide to Internet Safety. Dumb Ideas Stay off the Internet Don’t have a Facebook page Never use Twitter Don’t Never post.
Digital Citizen Project By: Frances Murphey Technology and Education.
Top tips for our students: 1.Protect your online reputation: use the services provided to manage your digital footprints and ‘think before you.
DIGITAL CITIZENSHIP. Digital Citizenship covers 9 areas according to Mike Ribble, an expert in the field.  Etiquette  Communication  Literacy  Access.
Plot. Exposition  This part of the essay will contain 1. Characters 2. Point of View (PoV) 3. Setting  This is also know as the beginning in a narrative.
What affects did crime have on the society of Richmond in the 1900’s?
HACKERS: HEROES OF THE COMPUTER REVOLUTION 25 TH ANNIVERSARY By: Brett Delaney Living in a Networked World: The Good, the Bad, and the Ugly CS 408 Section.
DIGITAL CITIZENSHIP.  Privacy - Protect Personal Information  Respect - Plagiarism, Downloading Music Appropriately.  Self Expression - Create your.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Social impacts of IT By Lewis dancocks. Social impacts Due to IT people around the world can commutate with each other anywhere at any time, this is due.
Cyber Bullying. Cyber Bullying is very serious it has resulted in death and suicide.
DISSECTING A RESEARCH PAPER. WHAT IS A PERIODICAL? Period: amount of time –Magazines (every week or month) –Newspapers (every day) –Journals (every month.
Unit 6: The American Legal System BY: Yaira Peaks.
By: Delaney Syme and Megan Eglin.. When there is a very intense argument going on in a chat room or over texts it is called flaming. The bullies that.
Let’s Talk about Intellectual Property Copyright Plagiarism Fair Use.
PRIVACY Carl Hoppe Ted Worthington. OUTLINE What is privacy? What is privacy? 4 TH Amendment Rights 4 TH Amendment Rights Technology Growth and Privacy.
Don’t talk to people that you don’t know online. What would you do if someone that you don’t know threatens you? Call the police or tell a parent!! Be.
Samantha Sabater A3. The Amendments We currently have 27 amendments. In order to pass an amendments they have to go though a certain process. First a.
The Art of Deception: Controlling the Human Element of Security
By Dr. Larry Rosen Published March 27, 2012
Online Safety! By: Michelle Deng.
How to build a good reputation online
Warrior Wednesday DIGITAL CITIZENSHIP.
Presentation transcript:

Privacy Lost: How Technology is Endangering Your Privacy CS Final Paper Presentation By: Christina Sulfaro

Privacy Lost  Privacy Lost: How Technology is Endangering Your Privacy  The author is David H. Holtzman  Published in 2006

Book Overview  Provides information on how every individual’s privacy is diminishing because of the advancing of technology  Effects of technology on our society  It describes new threats to privacy because of how much technology is growing and how the government cannot protect our individual privacy rights.

Main focuses in the book  Seven sins of privacy  How technology affects our privacy  Privacy and the law  Surveillance and stalking  Government security invasions  How to fight back in order to get our privacy back.

continued  He organizes his thoughts into the seven sins of privacy Includes  Sin of Intrusion  Sin of Latency  Sin of Deception  Sin of Profiling  Sin of Identity Theft  Sin of Outing  Sin of Lost Dignity Each sin states a different way our privacy is being affected

Technology Affecting Privacy  As technology progressed our privacy has decreased  “Here’s a secret, there is really only one computer in the world.”  Once something is on the internet, it will never be deleted  Many more privacy intrusions are occurring because of the internet Privacy and the law  Privacy is not a right in the constitution  Legal protection of privacy doesn’t work well

Surveillance and stalking  Mini cameras making it easy to stalk someone  Surveillance becoming more advanced to spy on people  Every phone has a GPS and can be tracked Government security invasions  It’s the job of the government to want to know things about its citizens that they don’t want to reveal and here is where invasion of privacy comes in.  Transportation Security Administration (TSA) and Patriot Act both effect privacy

How to fight back  Privacy is under the individual’s control  Don’t give out personal information, especially over the internet  Privacy invasions can’t be prevented once the information is out  Keep your privacy offline and off the internet

How the book relates to class  This book relates to class very well  We have talked about privacy a majority of the classes  This is part of the “Bad and Ugly” parts of the internet  Most of the topics Holtzman discuss directly relate to the class

Book recommendations  I would recommend this book to pretty much anyone that uses technology  It helps to acknowledge people on what it can really do to people  Holtzman portrays the book in a way anyone can understand  If you want to learn a lot more about how technology can hurt your privacy and what you can do to stop it, I highly recommend this book