1 / 17

m ind42.com

Scenarios. Prezi. MyNoteit. Wikimedia. GoogleDocs. Voki. SLIDESTAR. Web2.0. Twine. Sound. Image. eXelearning. epub. Mibbit. L earnWeb. SCORM. Notepad++. RELOAD. Zoho. networks. content. Mindmeister. social. Free. Writer. tools. Packager. editor. eXact. Power. Movie.

elisha
Download Presentation

m ind42.com

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Scenarios Prezi MyNoteit Wikimedia GoogleDocs Voki SLIDESTAR Web2.0 Twine Sound Image eXelearning epub Mibbit LearnWeb SCORM Notepad++ RELOAD Zoho networks content Mindmeister social Free Writer tools Packager editor eXact Power Movie Live adapting Mo Compliant Maker/Windows Compendoium Business JelSIN Editor practices bubbl.us Calibre communication Builder portal imoCMS GoogleTalk ShareTEC Online packaging Ping Best Google+ YouTube Bibtex4Word Tool Flashmeeting Chat SurveyMonkey im translator Goiogle Pixorial Video Sophie TypeWith.me Send2wiki HTML SWFTools Windows collaboration PDFescape mind42.com Millennials and Privacy in the Information Age: Can They Coexist? By AharonYadin IEEE Technology and Society Magazine Winter 2012 IS 376 Page 1 10/15/13

  2. Data Mining Modern information technology yields massive data sets, and computation methods have been developed to discover patterns within that data. Anomaly Detection To Explain Outliers Clustering Based On Similarities Association Rules To Model Dependencies Regression Modeling To Fit Data To A Function Classification Into General Categories Compact Summarization Into Charts And Reports IS 376 Page 2 10/15/13

  3. Metadata Recent revelations regarding the National Security Agency’s accumulation of domestic communication metadata have given rise to privacy concerns. • Sender’s name, e-mail, & IP address • Recipient’s name & e-mail address • Date, time, & timezone • Subject, status, & priority of e-mail • Name, username, URL & profile bio info • Location, date, & time of tweet • Follower, following, & favorite counts • IDs of tweets sent and tweets replied to Twitter E-Mail • Phone number & location of caller • Time and duration of call • Serial numbers of phones involved • Calling card numbers • Search queries made • Results that appeared in search • Pages visited from search Phone Google • Pages visited, including when • User data, including auto-fill logins • IP address, ISP, device hardware, OS • Cookies & cached data from websites • Photographer identification • Creation/modification date & time • Location where photo was taken • Camera make, model, & settings Browser Camera • Name, username, & profile bio info • Subscriptions, likes, & events • Activities, with dates & times • Location Facebook IS 376 Page 3 10/15/13

  4. Web Services Rather than purchasing and maintaining expensive servers to handle data storage, database management, and information security, many companies hire “web services” firms to supply those capabilities on the “cloud”. This approach has potential advantages with respect to rapid deployment of new services and dynamic adjustment to sudden shifts in capacity demands. Potential drawbacks are the overall complexity of the implementation, due to their big-vendor sources (e.g., Amazon, Google). IS 376 Page 4 10/15/13

  5. Software Customization The development of Web Services has resulted in an increase in the “software as a service” mentality, in which customers expect software developers to customize software applications to their particular needs. There are inherent problems with this approach, however: • Customizing software for a single customer is expensive, • Training materials must also be customized, • Updates will also have to be customized, • Such software is often inadequately tested, IS 376 Page 5 10/15/13

  6. Recommender Systems E-commerce sites frequently attempt to boost sales by “recommending” additional items for possible purchase. IS 376 Page 6 10/15/13

  7. Web Analytics Web analytics tools collect and report Internet data as a means of understanding, and potentially optimizing, web usage. Originally devised as a mechanism for technical personnel to improve the efficiency of their networks, web analytics is increasingly used as a tool for marketers to monitor the online behavior of website visitors. Google Analytics, used by over half of the most popular 100K websites in the world, tracks the IP addresses of every user, potentially enabling it to track users across the Internet. IS 376 Page 7 10/15/13

  8. GPS Global Positioning Systems use multiple satellites to permit people on the ground to triangulate their exact geographical positions. GPS promise safety and convenience, but potentially threaten privacy by creating a trail of what you’ve been doing and where you’ve been doing it. November 2011 Supreme Course Case: United States vs. Jones In 2005, Maryland police secretly installed a GPS device on the vehicle of D.C. nightclub owner Antoine Jones, suspected of drug trafficking. Police tracked his movements for a month, leading to his arrest, conviction, life sentence, and, ultimately, appeal on the grounds of unlawful search. • Justices Breyer, Ginsburg, Kagan, and Sotomayor: Concerned over 1984-like pervasive government surveillance. • Justices Alito, Kennedy, Roberts and Scalia: Concerned over how the device was installed without a warrant. IS 376 Page 8 10/15/13

  9. Facebook While Facebook recommends making as much personal information as possible available to as many people as possible, there are serious drawbacks to doing so. Sophos, the software security company, recommends restricting information about education, workplace, home town, current city, birthday, e-mail address, and phone numbers, since these pieces of information could easily result in unwanted contact or personal identification. IS 376 Page 9 10/15/13

  10. Google Street View Launched in 2007, Google Street View adds panoramic views of aligned photographs to Google Maps. Privacy issues include: • Identifiable faces and license plates (Google now blurs) • Photographs of private homes reducing property values • Security-sensitive images of government or military sites • Communities with private roads not consenting to photos IS 376 Page 10 10/15/13

  11. Three Pieces Of Data In 2001, MIT doctoral student Latanya Sweeney conducted a study on “differential privacy”, efforts to maintain statistical validity while minimizing the risk to the privacy of a study’s participants. Her study showed that 87% of the U.S. population can be uniquely identified based on three pieces of information: Using a free Massachusetts voter list and a $20 insurance company database for Cambridge, Sweeney found: • 5-digit zip code • gender • date of birth • Only 6 people with the governor’s DOB • Only 3 of those were men • Only 1 of those had the gov’s zip code So, for $20, she obtained the governor’s complete medical history! IS 376 Page 11 10/15/13

  12. Millennial Attitudes: Social Networking A 2010 Pew Research Center Report examined the attitudes of Millennials (people born between the years 1981 and 2000. IS 376 Page 12 10/15/13

  13. Millennial Attitudes: Posting, Tweeting. & Texting IS 376 Page 13 10/15/13

  14. Anonymity, Privacy, & Security: Strategies A 2013 Pew Research Center Report examined the attitudes of adult Internet users. IS 376 Page 14 10/15/13

  15. Anonymity, Privacy, & Security: Avoiding Others IS 376 Page 15 10/15/13

  16. Anonymity, Privacy, & Security: Online Information IS 376 Page 16 10/15/13

  17. Anonymity, Privacy, & Security: Unauthorized Access IS 376 Page 17 10/15/13

More Related