Download presentation
Presentation is loading. Please wait.
Published byDina Logan Modified over 9 years ago
1
Cable companies are experimenting with tracking and target individual households cable boxes;
2
Mary Lou does everything on her computer— banking, shopping, social networking
4
Your bank could be robbed without a stick-up. Your account does not have to be on- line. Your ATM card could be copied while in your possession.
6
The new Timeline format exposes your old mistakes People search back through your old posts. Perhaps there is an embarrassing photo You can hold the cursor over the post, click the pencil icon, then click Hide from Timeline or delete it
7
Things you thought were private can be accessed through third-party software apps created by others, eg. Words with Friends, Skype, Trip Advisor, Yelp Read user agreements Click on the lock icon and see your privacy options Use www.Facebook.com /privacy score. www.Facebook.com /privacy
8
Click on “LIKE” not only to friends, but to Facebook and its advertising partners. Visit a Web page with a “LIKE” button and Facebook will record your visit even if you don’t click Set web browser to block all cookies. Use a free plug-in to stop Facebook from tracking you. www.Webhgrah.co m/resoures/facebo ok blocker. www.Webhgrah.co m/resoures/facebo ok
9
Some sites as The Washington Post offer “Social reader” Facebook tools. It will tell your friends what articles you read on the site. They tell everything you read not just the “LIKE” ones. If you signed up, delete the app.
10
These tags could let others see you in unflattering situations. Pictures others post of you can be harmful. Tags make it easy to identify people they post Untag yourself from unflattering photos. Enable review of all future photos you’re tagged in before they appear on your Timeline.
11
Details about you can be exposed by friends’ postings. Look at friends’ positing and ask if you wish to have that info linked to you. You may unfriend them. Click you name, select friends, edit and select “Only Me” from drop- down menu.
12
Be aware of your friends. Remember the ND football player Manti Te’o who thought he had a girl friend—big fraud!
13
Big brother is not the government. Big brother is Big Business. No rules for commercial companies as there are for government, military and law enforcement.
14
Even if you are restrictive with your privacy settings, social services such as Facebook, Google+ and Twitter follow you beyond their own websites— everywhere there is a Like, Tweet or other recommendation button, the sites can track you
15
Don’t provide any details on Facebook that could be used to answer security questions about passwords
16
Be cautious of messages from social networks as someone could have hacked into a friends account. These are messages that contains links.
17
Little is safe in cyber land Even big Facebook’s information can and has been compromised
18
Items on your pages may be seen by others— employers, schools etc. Your image posted on another’s page. Help or Hinder is up to you.
19
Nothing is free and so web sites are funded by advertising as much as by your payments for services. All those search engines are paid to float things across your screen.
21
Advertising is tallied and delivered through wireless mobile devices. Mobile viewing web sites display advertising—billion dollar a year business
22
Privacy advocates have been working to enact laws to protect privacy. Hackers and trackers are busy and more sophisticated
23
With all the texting, web searches, the various methods of connecting are becoming crowded. Concern is that all data will be encoded and given a priority. This means that the cloud will be reading all of our data and making decisions about priority. OR we may be coding based on a cost scale just like old post office—over night, priority, first class.
24
Keep your browser update Install malware-protection software On mobile devices stick to apps you know Look for address-pad padlock symbol Buy from reputable dealers Give out as little detail as possible Never send credit card # over email. Use online payment services Know your rights Use Common sense
25
Game systems that require online accounts can potentially expose a player’s personal information to hackers
26
18 – 34 age group does not hesitate to share on line How do we communicate and share?
28
Postings give cause to other issues such as envy, retaliation, and cyber bulling Could become a rumor mill which harms others Cause for depression
31
Postings especially with the socially vulnerable can have undesirable results. Postings go viral faster than the old gossip method. In print leaves little wiggle room.
32
Google has glasses that appear as regular glasses but connect to the internet and can record audio and video of all that you see and hear.
34
Need to provide for password usage Access to documents stored in the cloud Closing out all accounts
36
STALKERS ARE EVERY WHERE. CAN YOU FIND THEM?
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.