group 2 privacy and me in a web 2.0 world final
DESCRIPTION
This is the assignmentTRANSCRIPT
- 1.Privacy and Me in a Web 2.0 World
Colin Fitz-Maurice
Jessica McDade
Lee Reynolds
Lamar Middleton
2. What is Internet Security?
Internet securityis a branch ofcomputer securityspecifically
related to theInternet. Its objective is to establish rules and
measures to use against attacks over the Internet.
Preston (2007)
3. Internet Privacy Law
Internet Security Suits and Programs follow Internet Privacy Laws
to protect you.
Since no formal law exists within cyberspace, Internet users can
find recourse only through the applicable laws of their own
government.
Walton
Privacy is a GUARANTEED right
in the Bill of Rights
4. 5 Dimensions of privacy
Search & Seizure
Unsolicited E-mail
Defamation
Secrecy
Illegal Database Formation
5. Liability For Internet Usage
Anonymity should NEVER be assumed on the internet.
Users can be held liable for everything they provide to the
internet
Everything has a digital signature and can be traced
6. Data Security on the Internet
Three Main Concepts
Privacy
Confidentiality
Consent
7. Privacy
The right of an individual to:
Determine what information is collected about them and how it is
used
Access information held about them and know that it is accurate and
secure
Anonymity (not having your Web browsing habits tracked)
The sendingand receiving of
e-mail messages or other data
8. Confidentiality
The principle of keeping data secure and secret from others
Protection of information given by or about an individual in the
course of a professional relationship
9. Consent
The means by which we are authorized by an individual to process
information about them based on their informed understanding of
what we intend.
10. 11. A Good Quote..
As more and more people are realizing, we often reveal a lot of
information about ourselves when we go online, information we may
not realize were disclosing, but which advertisers and commercial
websites can use to sell us goods and services.
Voice of America
12. Six Tips on Protecting Your Internet Privacy
13. 1. Use of Proxy Servers
A proxy server is a physical server between your computer and the
destination website to service
The destination server receives information on the proxy server not
you!
Reinforces the idea of anonymity
14. 2. Use of Independent Search Engines
AVOID using you ISPs (Internet Service Provider) search
engine.
search.comcast.net
search.aol.com
Since you pay for their internet service they track everything you
do
USE:
Google.com
Yahoo.com
15. 3. Deny Usage of Cookies
A cookie is a packet of information that is received from the
referencing website and saved by your computer
The cookie tracks browsing habits and reports them back to the
server from which it came
Can be easily intercepted
16. 4. Caution to Adware and Spyware
Adware and Spyware are application ( or viruses ) that can be
installed on your computer through a dirty download
These products track how you use your computer and report it back
to the appropriate service that can then spam your email or
advertise pop-ups
17. 5. Disable Auto Complete
Auto complete can be very useful, but very dangerous
Any internet browser that you use tracks how you use it
Any information that it saves is sent back to the creating company
so that they can improve
their software
18. 6. Avoid Lots of Website Registrations
Simply, the more sites you sign up for the more databases your
information is in
The more sites you sign up for the greater the risk that its
services may not be trusted
All sites have the right to share user information with whom they
wish, you never know which site may choose to do this
19. Social Networking Sites
Social networking sites
propose the largest risk
for personal information to
be available to the public!!
The current self regulatory regime of contracts between the social
networking sites and its users via privacy policy is insufficient
to protect the interests of the users.
Connie Powell
20. Examples
Internationally people are more concerned with internet privacy
then secret government surveillance
Very confidential
16%
Not confidential
32%
Perceptions of Facebooks security
Confidential
28%
Less confidential
24%
21. 22. Exerts from the Testimony of Gordon M. Snow,Assistant
Director,Federal Bureau of Investigation United States Department
of Justice
a Getting To Know You quiz sent to a large list of social
networking site users, while not appearing malicious, may mimic the
same questions that are asked by financial institutions or e-mail
account providers when the individual has forgotten their password.
An e-mail address in the answer to the quiz questions can provide
the cyber-criminal with the tools to enter your bank account, your
e-mail account or credit card in order to transfer money or siphon
off your savings and investments.
Criminals are high-jacking into e-mail and social networking
accounts and sending a financial distress message.Friends willing
to help are given the criminals account number where they can wire
money.
Criminals have targeted houses when they know that
no one is home based on their Facebook status or
information they shared on other social
networking sites.
23. How-To Stay Safe on Facebook
Contextual privacy control- allows users to control who is able to
see their posts on a post by post basis.They can share a photo with
only a few close friends, or share something non-personal with
everyone using this control.
Be aware of what you post on
friends walls, you dont know
what their security settings are
and who can see their page!!
24. Facebook Privacy Checklist Suggested by Carlton Collins
Use Lists to organize your friends
Hide your friends list from non-friends
Click the pencil icon in the Friends box on your profile page,
making sure the Show Friend List to Everyone box is unchecked.
Thereafter, non-friends who view your profile will be unable to see
your list of friends.
Protect yourself from Facebook advertisers
Facebooks advertisers deposit tracking cookies on your computer. To
protect yourself consider opting out of the placement of these
cookies by member companies of the .Network Advertising Initiative
at tinyurl.com/2wh5sj.
Source, and more tips:
http://ehis.ebscohost.com/eds/detail?sid=5dffd04c-c8f7-4de7-8847-
5b623e8b0696%40sessionmgr104&vid=36&hid=116&bdata=JnNpdGU9ZWRzLWxpdmUmc2NvcGU9c2l0ZQ%3d%3d#db=lgh&AN=51200997
25. General Tips
Watch what you say on the internet, you never know who is
reading!!
Avoid sketchy websites or services
Always adjust a websites privacy settings
Always read the terms of agreement before signing up for a
website!!
26. Thank You For Listening
- Colin, Jessica, Lee & Lamar
27. Sources:
Asiimwe, Edgar Napoleon.Opinions ofSocial Web Users on Privacy and
Online DAM.Journal of Digital Asset Management, Dec2010, Vol. 6
Issue 6, p312-318, 7p; DOI: 10.1057/dam.2010.37
Collins, J. (2010). Fortify Your Facebook Privacy Settings. Journal
of Accountancy, 209(6), 42-45. Retrieved from EBSCOhost.
Goldsborough, R. (2010). Are You Protecting Your Privacy Online?.
Teacher Librarian, 37(5), 72. Retrieved from EBSCOhost.
Powell, C. (2011). "You already have zero privacy. Get over it!"
Would Warren and Brandeis Argue for Privacy for Social Networking?.
Pace Law Review, 31(1), 146-181. Retrieved from EBSCOhost.
Privacy online [electronic resource] : fair information practices
in the electronic marketplace : a report to Congress / U.S. Federal
Trade Commission. (2000). [Washington, DC : The Commission, 2000].
Retrieved from JAMES MADISON UNIV's Catalog database.
Semitsu, Junichi P. From Facebook to Mug Shot: How the Dearth of
Social Networking Privacy Rights Revolutionized Online Government
Surveillance. Pace Law Review, Jan2011, Vol. 31 Issue 1, preceding
p291-381; , 92p
Sipior, Janice C.;Ward, Burke T.;Mendoza, Ruben A. Online Privacy
Concerns Associated with Cookies, Flash Cookies, and Web Beacons.
Journal of Internet Commerce (J INTERNET COMMERCE), 2011; 10(1):
1-16 (37 ref)
SUN SUN, L., HICHANG, C., & SANCHEZ, M. (2009). Online Privacy,
Government Surveillance and National ID Cards. Communications of
the ACM, 52(12), 116-120. Retrieved from EBSCOhost.
Walton, Timothy J.Internet Privacy Law, Online publication of
Internet Privacy Laws. Internet Attorney, 2000. Source Retrieved
6/22/11
http://www.bcs.org/content/conWebDoc/15574
http://www.voanews.com/english/news/science-technology/a-13-2008-04-29-voa44.html(Voice
of America)
Secturity, Privacy, and confidentiality issues on the Internet,
Grant Kelly and Bruce Mckenzie J Med Interent Research. 2002
Oct-Dec 4(2): e12
Gralla, Preston (2007).How the Internet Works. Que Pub,
Indianapolis.