25
A NECESSARY EVIL OF TECHNOLOGICAL CONNECTEDNESS Photo: cc: jepoirrier - https://www.flickr.com/photos/57519914@N00 SACRIFICED PRIVACY : By: Laura Kong

Sacrificed Privacy

Embed Size (px)

Citation preview

Page 1: Sacrificed Privacy

A NECESSARYEVIL OF TECHNOLOGICAL CONNECTEDNESS

Photo:cc: jepoirrier - https://www.flickr.com/photos/57519914@N00

SACRIFICED PRIVACY:

By:LauraKong

Page 2: Sacrificed Privacy

Photo:cc: JasonA.Howie - https://www.flickr.com/photos/40493340@N00

There are currently 1.96 billion social media users. This number is growing by about

10 million each year [1]

Page 3: Sacrificed Privacy

“Teens share a wide range ofinformation about themselves

on social media sites”[2]

Photo:cc:altemark - https://www.flickr.com/photos/24844537@N00

Page 4: Sacrificed Privacy

WHATARE THEY SHARING?

Photo:cc:apdk - https://www.flickr.com/photos/62337512@N00

71%Post wherethey live [2]

53%Post their

email address [2]

91%Postposttheirschoolname[2]

71%Post their

school name [2]

Page 5: Sacrificed Privacy

Photo:cc: Yu.Samoilov - https://www.flickr.com/photos/110751683@N02

“While social mediapreferences are emerging,so are legal and privacy

concerns”.[3]

Page 6: Sacrificed Privacy

WHAT PEOPLE DON'T KNOW IS THAT:

EVERYONE IS WATCHINGPhoto:cc: mederndepe - https://www.flickr.com/photos/36540413@N08

Page 7: Sacrificed Privacy

SO... WHO EXACTLY IS WATCHING US?

Photo:cc: rdy4ever- https://www.flickr.com/photos/9745277@N07

Page 8: Sacrificed Privacy

"

Photo:cc: ashkyd - https://www.flickr.com/photos/21482825@N03

“Weather channel requested device location an averageof 2,000 times, or every 10minutes, during a study

period”[4]

APPS

Page 9: Sacrificed Privacy

RETAILERS

Photo:cc: GiuseppeMilo(www.pixael.com) - https://www.flickr.com/photos/87690240@N03

“GROUPONREQUESTEDONE PARTICIPANT’SCOORDINATES

1,062TIMES IN TWOWEEKS”[4]

Page 10: Sacrificed Privacy

SOCIALMEDIA

Photo:cc: RobertS.Donovan- https://www.flickr.com/photos/10687935@N04

“FACEBOOK GIVES A VERY PRIMITIVE OUTLINE OF YOUR SOCIALCIRCLES: WHO YOU KNOW, BUT NOT HOW YOU KNOW THEM OR

HOWWELL” [5]

Page 11: Sacrificed Privacy

EMPLOYERS

Photo:cc: JonoMueller - https://www.flickr.com/photos/45939540@N05

“80%OF HR PROFESSIONALS USE ONLINE REPUTATIONINFORMATIONAS PART OF THE HIRING PROCESS”[6]

Page 12: Sacrificed Privacy

CYBERPARENTS"ACCORDING TO A STUDY OF 802 PARENTS BY THE PEW

INTERNET PROJECT 42% HAVE SEARCHEDFOR THEIR CHILD'SNAME ONLINE TO SEEWHAT INFORMATION IS OUT THERE”[7]

Photo:cc: GSCSNJ StockPhotos https://www.flickr.com/photos/gscsnj/7882614208/in/photolist

Page 13: Sacrificed Privacy

COLLEGE ADMISSIONS

Photo:cc: flazingo_photos - https://www.flickr.com/photos/124247024@N07

“30%OF THE ADMISSIONSOFFICERS SAID THEYHADDISCOVERED INFORMATIONONLINE THAT HADNEGATIVELYAFFECTEDAN APPLICANT 'S PROSPECTS” [8]

Page 14: Sacrificed Privacy

Photo:cc: StockMonkeys.com - https://www.flickr.com/photos/86530412@N02

Millennials know theymust give up some

privacy

Page 15: Sacrificed Privacy

“However, despite widespread worries aboutinformation leaks, few users take actions thatwould unplug them, such as downloadingprivacy software or adjusting their device’s

settings” [5]

Photo:cc: Thomas Claveirole - https://www.flickr.com/photos/80318369@N00

Page 16: Sacrificed Privacy

THEREFORE, PRIVACYBREACHINGSTILL INEVITABLE

Photo:cc: RyanMcGuire-http://pixabay.com/en/worried-girl-woman-waiting-sitting-413690/

“A 2014 PEW SURVEY FOUND THATMORE THAN 90%OF AMERICANS FEEL THEY’VE LOST CONTROL OVER

PERSONAL DATA”[5]

Page 17: Sacrificed Privacy

SOWHY COULD THIS BE?

Photo:cc: KAPOOKABABY- https://www.flickr.com/photos/53171524@N00

64%of teenswith

Twitter accountssay that their

tweets are public [9]

15%of of Americans havenever checked socialnetwork privacy andsecurity settings [9]

47%Have a public

profile viewable byanyone [9]

Page 18: Sacrificed Privacy

WENEED TO TRY ANDMONITOROUR ACTIONS TO PRESERVE

SOME PRIVACY

Photo:cc: lyudagreen - https://www.flickr.com/photos/48598045@N07

Page 19: Sacrificed Privacy

HOWCANWE DO THIS?Disable GPS services until you need it [10]

Guard your date of birth and phone number[10]

Keep work and personal presences separate [10]

Use passwordmanager [10]

Photo:cc: spoony mushroom - https://www.flickr.com/photos/42875348@N00

1234

Page 20: Sacrificed Privacy

Photo:cc: Yu.Samoilov - https://www.flickr.com/photos/110751683@N02

However, new wearabletechnology continues tocomplicate the battle againstprivacy…

“And we makebig trade-offsas we become digitally connected

everywhere and anytime” [11]

Page 21: Sacrificed Privacy

Photo:cc: FancyCrave1https://pixabay.com/en/smart-watch-apple-technology-style-821557/

“By the end of 2018, there will be 780million wearable devices on the market” [12]

“Alongside personal privacy, company data could beat risk when it’s bared for the world on a watch” [13]

Page 22: Sacrificed Privacy

“Untilregulations arein place, therewill beinherentsecurity andprivacy risksinvolved withwearabledevices”.[12]

Photo:cc: Karlis Dambrans :https://www.flickr.com/photos/janitors/14810360010/in/photolist

Page 23: Sacrificed Privacy

As more consumers purchasewearables, they exposethemselves to both potentialsecurity breaches and ways thattheir datamay be legally used bycompanies without theconsumer knowing. [12]

Photo:cc: dullhunk - https://www.flickr.com/photos/14829735@N00

In the end, in this age of technology andsocial media, it remains up to the

individual to decide if these losses ofprivacy areworth the gains of

connectedness

Page 24: Sacrificed Privacy

“We are forced to operateentirely on TRUST”[14]

Photo:cc: DavidVespoli: https://www.flickr.com/photos/39150660@N04/8709514984/in/photolist

Without knowledge on how data iscollected...

Page 25: Sacrificed Privacy

Wo rk s C ited

Works Cited[1]Number ofWorldwide SocialNetworkUsers2010-2018 Statistic.“Statista.N.p.,n.d. Web31May2015.

[2]Madden, Mary,AmandaLenhart, SandraCortesi,Urs Gasser,MaeveDuggan,AaronSmith, andMeredithBeaton."Teens,Social

Media, andPrivacy."PewResearchCenterInternetScience TechRSS.21May2013.Web. 29May2016.

[3]Bowes, Suzanne."FiveWaystoBeaSmartSocialMediaUserinYourJobHunt."TheGlobeandMail.10Jan.2013.Web. 03June

2016.

[4]Dwoskin, Elizabeth."WhereWereYou3MinutesAgo? YourAppsKnow." WSJ. 23Mar.2015.Web. 01June 2016

[5]Dewey,Caitlin. "HowFacebook KnowsWhoAllYourFriends Are,EvenBetterthanYouDo." WashingtonPost.TheWashington

Post, 2Apr.2015.Web.01June 2016.

[6]Schawbel, Dan.“TheReputationEconomy IsComing-Are YouPrepared?” Forbes. ForbesMagazine,n.d. Web. 1June 2016.

[7]Paul, Pamela."Cyberparenting and theRiskofT.M.I." TheNewYorkTimes.TheNewYorkTimes, 04May2013.Web.01June

2016.

[8]Singer,Natasha."Theyloved yourG.P.A.thentheysawyourtweets."NewYorkTimes 10Nov.2013:3(L).AcademicOneFile.

Web. 3June 2016.

[9]"InternetSafety101.org:Statistics." InternetSafety101.org:Statistics.2013.Web. 01June2016.

[10]Lawrence, Jon, andSeanRintel."EightWaystoProtectYourPrivacyOnline |JonLawrenceandSeanRintel."TheGuardian.

GuardianNews andMedia,2013.Web.03June 2016.

[11]Matrix,Sydneyeve. “Module 3:Mobilities”.2016. Presentation.

[12]Maddox, Teena."TheDarkSide ofWearables:HowThey'reSecretlyJeopardizing YourSecurity andPrivacy- TechRepublic."

TechRepublic.Web.03June 2016.

[13]Cole, Samantha."HowTheAppleWatchWillChangeOfficeLife." FastCompany. 12Mar.2015.Web.01June2016.

[14]Golbeck, Jennifer."Trackstar:ThisApp TracksYouWhile YouShop." SlateMagazine.28Jan.2014.Web. 03June 2016.