24
K. C. Film 260 Flip Book Assignment 2015

Privacy flip book assignment film 260 queensu kc

Embed Size (px)

Citation preview

K. C. Film 260 Flip Book Assignment 2015

“ rguing that you don’t

care about the right

to because you have nothing to hide is no different than saying you don’t care about free speech because you have nothing to say.”1

Edward Snowden, 2015

Image by Jared Rodriques, Truthout 1

The quote by Edward Snowden regarding privacy highlights the fact that people seem

to be willing to on the internet for more access and services without really

understanding the consequences and scope of the privacy they are trading away.

Image by Ann Wuyts Five Data Privacy Principles from Mozilla (Put on a museum wall) 2014 2

“Whenever you sign up for a Facebook account, Facebook asks permission to look at your e-mail contacts if you’re on a computer , or your phone contacts if you’re on a smartphone. When you grant the site permission, it searches your contacts for users already on the network, and it searches other users’ uploaded contacts for you.” (Caitlin Dewey)4

Image by P T. Privacy 3

Do you think before you

“…dismissed the suggestion that some passengers might find the practice overly intrusive, arguing that social media was by definition a public medium.”15

“Qantas had seen and “liked” the image (passengers), sharing it with the airline’s more than 26,000 Instagram followers.”

Image by KC

“As children develop greater independence, they need privacy in order to have genuine relationships with their parents.” (Kay Mathiesen 2013) 3

Image by Summer Skyes 11. OMG lkr Lol 4

“If you are using Shopkick at a store with iBeacon, it also knows where you are in a store, where you linger, and what products you are interested in. Are the perks Shopkick offers worth the privacy trade-off?” 17

Image by Fouquier The Big Yellow 5

“The combination of,

“non-personal information” that Shopkick and many other services collect—is unique for about 87 percent of U.S. residents. That means if an app has this data, it usually has that you can be 17

17

Large organizations have not done a great job the public when gathering personal data. Issues like identity theft, compromised data and government spying is a cause for concern. 18

Image by KC

“Sir John Sawers is the incoming head of MI6, essentially the British equivalent of the CIA. His wife posted sensitive personal information to her Facebook page, including the address of the couple's London apartment and the locations of their children and Sir John's parents. Her Facebook profile was left open to anyone in the London network.”7

Image by Jim Linwood. The MI6 Building, Vauxhall, London 6

Is your Internet of things vulnerable to Cyber Attacks?

“Security experts are sounding the alarm. "There is a big difference between the internet of things and other security issues," says Joshua Corman of I Am The Cavalry, a group of security specialists trying to promote greater awareness of emerging risks to public safety. "If my PC is hit by a cyber-attack, it is a nuisance; if my car is attacked, it could kill me.“16

Image by Pascal. Fridgenlight 7

“Even the most careful, conscientious sites cannot control your resume after someone has downloaded it.” 8

Image by Flazingo Photos. Resume – Glasses www.flazingo.com per these terms www.flazingo.com/creativecommons 8

“ of hiring managers will review a candidate’s social profile before making a hiring decision. 10

have reconsidered a candidate based on what they find.” 10

“The non-profit world naturally collects a great deal of private donor information and information that explicitly explains how and why you collect data and the specifics of its use are highly recommended. The effective and professional safeguarding of donor information is not only an expectation of the public but the ongoing provision of your terms of service could well be the difference between adding a new donor and having them elect not to engage with you.”10

Images by KC

“The bill’s move to broadly expand information sharing between governments and give new powers to Canada’s intel agencies will “undermine user trust, threaten the openness of the Web, and reduce the security of the Internet and its users,” Mozilla internet policy director Jochai Ben-Avie said in a statement published on the Mozilla blog.”13

Image by Stephen Boisvert. Parliament. 9

“Massive privacy breach at a Toronto hospital has led to 19 more charges, including six criminal counts against a nurse accused of selling the confidential records of new mothers as part of a scheme to peddle RESP investments.” 19

“Alberta’s Health Minister Fred Horne revealed this week that an unencrypted laptop containing the personal health information of 620,000 Albertans was stolen in September.”21

Image by U.S. Navy photo by Mass Communication Specialist 2nd Class Todd Frantom/Released)Official U.S. Navy Page. Fort Belvoir Community Hospital. 10

“More than PlayStation accounts worldwide were compromised, 21

“ Target shoppers get hacked” 21

“TJX, the U.S. parent of Winners and HomeSense stores, revealed in

2007 that data from at least credit and debit cards was stolen by hackers.” 21

“Before you post anything online, think about what a hacker, stalker, employer, or potential employer could do with that data. Could an ex, who's fighting for custody, use the data against you in court?”7

Image by Sean MacEntee. Privacy 11

“Don't give away specifics. Don't post your address, date of birth, kids' names, pets' names, phone numbers, or any account numbers or financial information of any kind.” 7

“Take advantage of privacy settings and lock down your profile, so that only those who you approve can view everything.”7

“Use a firewall.”9

“Read the Terms of Service.”9

Make clever strong passwords 9

“Beware sneaky check boxes.” 9

“This is a brand new medium, and we are just now beginning to recognize its potential consequences. Something as harmless as a picture of a baby in a tub could be traded online by pedophiles. The world is changing. Be aware of your social media use, and be smart about it.7”

Image by Smlp.co.uk. (2008, March 9). Locked in 19?? 10

Sources

1 WashingtonsBlog (2015, May 21). Arguing That You Don’t Care About The Right To Privacy Because You Have Nothing To Hide Is No Different Than Saying You Don’tCare About Free Speech Because You Have Nothing To Say. Retrieved from http://www.washingtonsblog.com/2015/05/arguing-that-you-dont-care-about-the-right-to-privacy-because-you-have-nothing-to-hide-is-no-different-than-saying-you-dont-care-about-free-speech-because-you-have-nothing-to-say.html

2 Acohido, B. ( 2013, Nov., 18) Author, A. A. (Year, Month Day). Snowden effect: Young people now care about privacy. USA Today. Retrieved from http://www.usatoday.com/story/cybertruth/2013/11/13/snowden-effect-young-people-now-care-about-privacy/3517919/

3 Mathiesen, K. (2013, July, 31). The Internet, children, and privacy: the case against parental monitoring. Springer Science+Business Media Dordrecht 2013 retrieved from http://link.springer.com/article/10.1007/s10676-013-9323-4/fulltext.html

4 Dewey, C. (April 2) How Facebook knows who all your friends are, even better than you do. Washington Post. Retrieved from http://www.washingtonpost.com/news/the-intersect/wp/2015/04/02/how-facebook-knows-who-all-your-friends-are-even-better-than-you-do/

5 Chayka, K. (2015, March, 24). The New, Improved Online Friendship. New York Magazine. Retrieved from http://nymag.com/next/2015/03/new-improved-online-friendship.html

6 Hydro One peaksaver Plus. (n.d.). Retrieved from http://www.hydroone.com/MyHome/SaveEnergy/Pages/Peaksaver.aspx

7 Siciliano, R. (2011,May,25) Social Media Privacy and Personal Security Issues. Huffington Post, The Blog. Retrieved from http://www.huffingtonpost.com/robert-siciliano/social-media-privacy-and_b_245857.html

8 Dixon, P. (2009, February). Consumer Tips: Job Seekers’ Guide to Resumes – Twelve Resume Posting Truths. Posted to https://www.worldprivacyforum.org/2009/02/consumer-tips-job-seekers-guide-to-resumes/

9 Editors Blog. (2011, Dec. 6 ). 15 tips for protecting your privacy online. CBC News. Retrieved from http://www.cbc.ca/news/canada/15-tips-for-protecting-your-privacy-online-1.1043194

10 Davidson, J. (2014, Oct. 16). The 7 Social Media Mistakes Most Likely to Cost You a Job. Money. Retrieved from http://time.com/money/3510967/jobvite-social-media-profiles-job-applicants/

Sources

11 Posted by Tim. (2014, Aug. 12) New study reveals much about online privacy concerns – important findings for non-profits. Message posted to http://www.miratelinc.com/blog/nonprofit-fundraising-news-about-privacy-concerns-for-potential-donors/

12 Anti-terrorism Act, 2015 (n.d.) Retrieved 2015, June,9. http://en.wikipedia.org/wiki/Anti-terrorism_Act,_2015

13 Tencer, D. (2015, March 27). Bill C-51 A Threat To Safety Of Internet Users, Firefox Maker Mozilla Says. Retrieved from http://www.huffingtonpost.ca/2015/03/26/mozilla-bill-c-51_n_6946602.html

14 Ingram, M. (2013, June 7). Through a PRISM darkly: Tracking the ongoing NSA surveillance story. Gigaom Research https://gigaom.com/2013/06/07/through-a-prism-darkly-tracking-the-ongoing-nsa-surveillance-story/

15 Clark, N. (2014, March 17). Airlines Use Digital Technology to Get Even More Personal. New York Times. Retrieved from http://www.nytimes.com/2014/03/18/business/airlines-use-digital-technology-to-get-even-more-personal.html?_r=0

16 No byline (2014, July 12). Home, hacked home. The Economist. Retrieved from http://www.economist.com/news/special-report/21606420-perils-connected-devices-home-hacked-home

17 Golbeck. J. (n.d.). Track Star: this app follows you while you shop—and it needs a clearer privacy policy. Slate.com. Retrieved from http://www.slate.com/articles/technology/future_tense/2014/01/ibeacon_shopkick_privacy_policies_for_location_tracking_apps_aren_t_clear.html

18 Madden, S. (2014, March 10). Tech that tracks your every move can be convenient, not creepy. Wired. Retrieved from http://www.wired.com/2014/03/designers-tracking-tradeoffs/

19 No Byline. (2015, June 2) Rouge Valley Health System privacy breaches lead to 19 chargesCBC News. https://ca.news.yahoo.com/scarborough-hospital-privacy-breaches-lead-192439254.html

20 No byline (2014, Jan 28). Personal data online: 5 of the biggest security breaches. CBC News. http://www.cbc.ca/news/world/personal-data-online-5-of-the-biggest-security-breaches-1.2514287

Images

1 Rodriguez, J. (u.d.). Edward Snowden. Truthout. Paired with the article: Noam Chomsky | Edward Snowden, the World's "Most Wanted Criminal" . Retrieved from flickr https://www.flickr.com/photos/truthout/14348649238/in/faves-59362381@N00/

2 Wuyts, Ann. (2014, Nov. 27 Five Data Privacy Principles from Mozilla (Put on a museum wall) 2014. Retrieved from Flickr https://www.flickr.com/photos/vintagedept/15704560667/in/faves-59362381@N00/

3 P T. (2010, June 16). Privacy Retrieved from flickr https://www.flickr.com/photos/propagandatimes/4707679041/in/faves-59362381@N00/

4 Summer Skyes 11 (2012,Feb. 11). OMG lkr lol … txting . Retrieved from flickrhttps://www.flickr.com/photos/summerskyephotography/6981290631/in/photolist-bCUWtR-6bRRaE-eY6HhR-6bRR8b-3Z12zo-6G1YTc-8MfBV9-euYoS-4gFmE3-5NZCNd-pW1qPw-pVZ5x9-pW8XUF-qdy6eK-qdnRqi-pgNeDa-qduHWC-pVZ5Dm-pW17Pd-d1hVRS-btbcvV-mULqL6-bvsNfb-aoUiXx-qDFBt3-dU8Sg2-4tPGZg-7LAVpL-9wExNK-5BYs7X-9wExRp-bGZ6yn-egurtP-7wfano-4zhY2v-87VPcZ-4UszxB-aJmY2-qmcFYA-dZWTcp-5spQR4-7UrzMr-7Urz3n-7UrzVD-7UuQ8q-7UuQbC-7UuQkb-7UuQoq-7UrzYF-ndvhbK

5 Fouquier (2015, April 21). The Big Yellow. Retrieved from Flickr https://www.flickr.com/photos/fouquier/17077640499/in/photolist-s26nxz-byGJAh-pMxhJ6-aWfjJB-aWeNTz-e3huhi-ba4NaZ-4jyQ7E-bByERN-oKEwYY-oU8gRz-aWeLFK-p93oJB-pQVogC-8xz2Ed-aWeKZX-k4FGqr-of2i9K-owtqgC-owvdti-8aj9xy-oxYsg6-ounKEf-outnmf-8ahZ8H-owbQ27-ocsCZL-oddzf5-ocsx9i-ow1VFq-ow1RqG-ovYjNo-ocMmGX-owf1mT-ovFcxT-oeNsPd-oeEZuj-oemFxx-oy8Cy2-owtQ7U-ow1VXN-ow6X45-owqKJG-owjBXV-ouiw5x-5HogZC-oeTzHH-oehWct-oeZ5cQ-oeJCwD/

6 Linwood, J. (2008, Feb. 19). The MI6 Building, Vauxhall, London. Retrieved from Flickr https://www.flickr.com/photos/brighton/2279813534/in/photolist-4tsD8U-4rar69-jjLgrV-7y5Hww-6MWis-kmvNDz-ppNBij-hXWMg-hCNVr-8yiX5u-bsRric-cbFSc1-nV16F2-khLw4M-bTuxmM-ryW4gS-5t1utD-e4ABM5-jnRY2N-5t1SWK-5t1LSp-5t69oL-5t68B7-5t661A-5t5TSL-5t5MXQ-5t5Jrh-5t5HYY-5t1hYK-5t5F5N-7cULj6-9TVK7j-ndEmsF-rCxQK3-4f5u44-j5c6hY-deG8DG-hVwfX-eBeMUd-eBbCVF-eBeK5w-eBbAS6-eBeHdC-eBbzi8-eBeFJW-eBeESQ-eBbwD6-eBeCWE-eBeCoU-eBeBQE/

7 Pascal. (2010, Oct. 10). Fridgenlight. Retrieved from flickr https://www.flickr.com/photos/pasukaru76/5067295473/in/photolist-a26j1E-tsBDuq-5kdmhv-79ZUM9-jhvyDo-jhvvMm-uocL6Q-8HMdpk-feiniv-iGH-iGG-iGF-iGE-oeCrEk-owr5Vs-ouQ7eL-oeYoAJ-owaKRN-jhvvcy-jhvztu-8HMa6V-rYonmx-iGJ-ow8bpc-owfae9-obTYp5-odncL3-oezoho-ovDmsJ-odmw9Q-ou62cM-otHE65-odkBGc-ow87FP-obSeRD-oenz6R-oxHezp-ovgH2G-oe6723-tCMRpG-r8dEzu-t4n6cq-oektfs-oeJHod-oeJWFK-ouJDiU-rpBd16-ovKkTW-rptYWj-sFUPZ5

Images

8 Flazingo Photos. (2014, April 27). Resume-Glasses. www.flazingo.com per these terms: www.flazingo.com/creativecommons. Retrieved from Flickr https://www.flickr.com/photos/124247024@N07/13903383190/in/photolist-nbAtrh-k8FtG-7ZuYoC-aGVn3H-axtL89-6UwsBM-7aJuB7-9o1iCk-6gMAEm-6pLznz-4kSTMx-6F2oWU-78W2Go-9y6J4c-6fzJbw-83AHaV-59LL6M-9bFTK7-4zxGN3-8ydvDs-4zxGN7-6pLA6Z-9FVEXv-5G58GN-85oPQ8-6dhcm4-dQVkWu-53WNkL-5GoACZ-86dXtu-9usg3j-5t2W32-2TUU4y-6pQHZd-7xbhG7-7Z9fs4-nLzw57-7vHmpF-7LtPew-5y1i36-dgdDKj-7vYGuo-6CxxCs-4sKWZb-pwEZZX-dVN969-4LqJyF-6j7tJi-6NyQMr-87Mfd6

9 Stephen Boisvert. (2013, Sept. 12). Parliament. Retrieved from Flicker https://www.flickr.com/photos/srboisvert/154148968/in/photolist-eC47Q-qX1RyH-bsqoDk-bsqnXv-afzyQy-5WUcnW-5WPXqa-5WPXPR-5WUcvS-5WPXEX-5WUccu-5WPXL2-afwMDk-afwMzT-5WUczU-5WUcjY-5WUcfW-5WPXSx-5WPXUa-5WPXrt-5WPXJr-5WPXtF-5WUcdW-5WPXBt-5WPXvk-5WU9KC-afzyZ1-afwMqK-afwMyK-afwMsx-afzzbu-afzz6W-afzz47-afzyP7-afzz1j-afwMHv-afwMj8-7T47XR-c2Y9s-afzz4Y-afzyXL-afzyS9-afwMGa-8aSTxU-bFY5qM-4QvFVx-7T7e4U-6kMQ8n-6dx7Qr-5WPXic

10 U.S. Navy photo by Mass Communication Specialist 2nd Class Todd Frantom/Released). (2011, June 22). Official U.S. Navy Page. Fort Belvoir Community Hospital. Retrieved from Flickr https://www.flickr.com/photos/usnavy/5913486058/in/photolist-a1yaob-4wULmG-4SQoUf-ijUKnZ-7xhBng-4oRFy4-8eweiE-hfwSgV-o9mMRT-5NTvFA-dAs6qD-e8Bmjb-e8Bm93-7Wqhei-h8oMGw-ecP4An-8bnTDJ-a4nkyu-5npEuv-a5tAA1-5H1G3c-e6g75r-71aYsm-dnbUv1-bn5ohY-4ptDiZ-r4cZb-2ywEDH-nqFX6d-4SFz6v-dAxAp7-a3VHN3-autfjD-6vBPft-pQwHww-87awi2-cWJGjL-ajPSps-cQVnbw-aaWgvM-tjaizy-7g7J4f-dnbKop-dnbPgU-e71Utc-cw2MPj-9ASSCn-dnbS4e-e71Zrc-hH7xAq

10 Smlp.co.uk. (2008, March 9). Locked in 19??. Retrieved from flickr https://www.flickr.com/photos/biscuitsmlp/2324706925/in/photolist-4xqJnT-pNfQ2V-4w9csh-dG6neS-9uKVDe-bAUx5j-e6k5Ak-fEQbRx-dFVZx5-SoX26-ak2q9v-8r2CVR-9oNPZn-mgjU2U-4jh6xz-azPbgb-oFMMB2-72xiQ7-6aRr8S-X54YR-9yZsf4-mvZV7g-8H3hcn-9MD5JS-rbCTk1-bn1aZv-bD1SrM-cEPn4G-rHGUvU-4XpCsF-dfJH2y-9TL2A2-kDM3G2-55Gdmp-892XCK-e3qsFM-9PhLeX-8xdNPk-9h1Zgc-9LKJvt-rL8wjY-9h1bLJ-3ipg6L-2vmN8u-rgm2Me-anuzJo-8pqb2e-bSXtGM-pdHFcc-2JZJSr

11 MacEntee, S. (2010, May 9) Privacy. Retrieved from Flickr https://www.flickr.com/photos/smemon/4592915995/in/photolist-7ZRTUP-dZ2y6b-82djZx-84VZAr-hQTx1c-7fNVzm-8b15Y2-azTdMo-4EvWY9-gyXnY-pDmshR-edvyKx-822bu2-8i9dVE-eARcff-aHKoc-5UYfNP-axwagd-o3MtjS-9qR8HQ-9i7ZK2-4WrJkA-pVKYKn-Em1Z9-7qxzPp-48ybNM-66r3T6-dRuMzt-ddpg14-7H1j1A-eTrqcD-pgokPc-iCz9t-6wCshe-ahk6nh-9Mcwzt-46PRKe-5V3xR3-7nzT7w-qmKn1-9t8qco-kCRTxX-raUSiK-qF6Pw5-mXs67q-7XSHP1-t1pSZ3-skYusG-t1pRGd-8hZ2Es

Note: Images by K C were taken by myself.