Internet Privacy Tamarcus Garcia, Doug Stokes

Slides:



Advertisements
Similar presentations
Purpose - Goals - Approach - Team. The NJDOE Family and Community Relations Office engages New Jersey families concerning their educational rights and.
Advertisements

Privacy: Facebook, Twitter
Polling Stations There are four questions posted in the classroom Indicate a “yes” response by placing a tally mark on the white board The results of the.
Netiquette Rules.
Information Security and Assurance Center 1 Address: 615 McCallie Avenue Phone: Chattanooga TN 37403
Katrina Lopes. Every time you log onto a website, you leave a mark saying “I was here”
Anonymity on the Internet Jess Wilson. Anonymizing Proxy What is a proxy? – An intermediary between you and the internet How does it make you anonymous?
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
1 Enterprise Security Your Information Security and Privacy Responsibilities © 2008 Providence Health & Services This information may be replicated for.
Working group discussion 1 Cyber Risk Security, Privacy ?
Privacy and Networks CPS 96 Eduardo Cuervo Amre Shakimov.
Privacy – what do they know about you? This work is licensed under a Creative Commons Attribution-Noncommercial- Share Alike 3.0 License. Skills: none.
Internet Guidelines. Cyberspace Cyberspace is like a big city. libraries, universities, museums, places to have fun, Places to meet people. But, like.
By Hope Gallaway Social Networks. What is a Social Network? A social network is a social structure made up of individuals called “nodes”, which are tied.
The Privacy Tug of War: Advertisers vs. Consumers Presented by Group F.
Digital Literacy Tour Google/iKeepSafe/YouTube Presenter Introduction Davina Pruitt-Mentle, Ph.D. Ed Tech Policy, Research and Outreach.
HOW ACCESS TO WWW Student Name : Hussein Alkhaldi.
Computer Ethics.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
 Facebook  Twitter  MySpace  Windows LiveSpace.
Chapter 8 Safeguarding the Internet. Firewalls Firewalls: hardware & software that are built using routers, servers and other software A point between.
Business Research Methods Using the Internet- to aid your studies.
Aware the Effect of Social Network For 1 Malaysia’s Safety Towards A Healthy Virtual Socialization.
Joseph Eckstrom. The issue  A Dr. Xuxian Jiang at NCSU studied 100,000 apps and the ad libraries that they used. He made some unsettling discoveries.
 Why is this important to you?  How do digital footprints connect with digital citizenship?  Does everyone have a digital footprint?
Cyber habits of school children Rossouw von Solms Institute for ICT Advancement.
Olof Nilsson.  Ex: Facebook, MySpace, LinkedIn ◦ Allows users to create web pages or profiles that provide information about themselves and are available.
SURVEILLANCE The Fears of the Digital Age. Privacy –Identity –Anonymity Logging –Tracking Hacking Censorship State Security/Anti Terror Online The Discussion.
Bethany Webber. Facebook Facebook is a free worldwide social network service which started in February 2004 Founded by Mark Zuckerberg and his college.
Computer Networking - Ethical aspects of the Internet Dr Sandra I. Woolley.
Internet Services Web browsing Chat/Messaging Newsgroups Social networking Shopping Information –Text –Pictures –Movies –Music And more! 3.
Activity 4 Protecting Ourselves. Keeping Safe There are lots of different ways we can be at risk on the Internet. How can we protect ourselves and keep.
Facebook By: Justine Tedesco.
Cyber Safety. Protect Your Identity Choose screen names/logins that do not give you away Choose password that cannot be easily guessed Do not give away.
Internet Dangers Technology Communication Tools E-Literate.
Internet Guidelines. Cyberspace Cyberspace is like a big city. libraries, universities, museums, places to have fun, Places to meet people. But, like.
PRIVACY, LAW & ETHICS MBA 563. Source: eMarketing eXcellence Chaffey et al. BH Overview: Establishing trust and confidence in the online world.
AUGMENTED REALITY Arthur Lockman, Ethan Prihar, Phil Baumann, Robert McKenna.
Astaro Security Gateway V7.5 Screenshots. Astaro Overview – Page 2 © Astaro 2009 Dashboard.
By Reid and Matthew  One’s ability to control what information one reveals about his or herself over the Internet.  To control who can access.
Bay Ridge Security Consulting (BRSC). Importance in Securing System  If don’t keep up with security issues or fixes Exploitation of root access Installation.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
Ads On The Internet Invade People’s Privacy
Top Ten Ways to Protect Privacy Online -Abdul M. Look for privacy policies on Web Sites  Web sites can collect a lot of information about your visit.
WHEN SHARING IS NOT CARING: INTERNET ETHICS By Baikgopodi “Bai” Ditiso Presented at CLTD– 09 May 2016.
Avoiding Frauds and Scams Barbara Martin-Worley Director, Consumer Fraud Protection 18 th Judicial District Attorney’s Office Serving Arapahoe, Douglas,
Facebook. You need a facebook account before you set up a facebook page.
Web 2.0: Making the Web Work for You, Illustrated Unit D: Perfecting Your Online Persona.
Practical and Theoretical Limits In Computing Aleksander Ratzloff and Zachary Andrews.
Earth’s Magnetic Field James Johnson Jacob Harris "NASA - National Aeronautics and Space Administration." NASA. N.p., 5 Dec Web. 29 July
Safety.
Facebook privacy policy
What does your digital footprint say about you?
Hotspot Shield Protect Your Online Identity
Dylan McLarty & Tristan Gaddis August 3rd, 2012
Internet Censorship Hazards & Benefits
McDonald’s Used Oil to McDiesel
Internet and security.
Importance of Privacy Internet Safety
Tracing Your Steps Understanding Your Digital Footprint Presented by:
Your Digital Footprint
E-Commerce and Social Networks
Web Privacy Chapter 6 – pp 125 – /12/9 Y K Choi.
Networks and the Internet
ICT Communications Lesson 3: Internet Life and Privacy
Privacy and Data Mining
Mr Douglass Subject Leader ICT & Computing
Elijah Hursey & Austin Keener Academy of Science Summer Bridge 2013
How does the deep web work?
Presentation transcript:

Internet Privacy Tamarcus Garcia, Doug Stokes garciata@appstate.edu stokesdb@appstate.edu Summer Bridge 2013, Appalachian State University

What is Internet Privacy? What is considered an internet privacy violation? Groups that invade privacy

How the Average Person can Find Information About You White Pages Zoominfo Google Glass

Large Corporations Google Street View Targeted Advertising Wikipedia

Government : Invading Privacy for Safety Email Flagging IP Tracking

Protection : Low Level Web-based Redirectors/proxies E-mail encryption programs http://www.aviksengupta.com/2011/02/why-use-anonymous-proxy-servers.html

Protection : High Level Virtual Private Networks Proxies Vpnresource.com/what-is-a-vpn/vpn-diagram/

Protection : Things You Can Do Now Following up on security patches Purchasing items with cash when possible Private Browsing Deleting Extensions and Toolbars

Conclusion It is difficult to be truly private on the internet Many corporations value your personal info Small changes can help one’s internet safety

Acknowledgements Dr. Tashakkori Mr. Sitar Dr. Burris Dr. Schwab Dr. Norris Zach Andrews Fellow Peers Family and Friends National Science Foundation Summer Bridge Program Appalachian State University

Resources 1. Computer Network Security and Cyber Ethics Kizza, Joseph M. Computer Network Security and Cyber Ethics. Jefferson, N.C: McFarland, 2006. Print. 2.       Hacking the Future: Privacy, Identity, and Anonymity on the Web Stryker, Cole. Hacking the Future: Privacy, Identity, and Anonymity on the Web. New York: Overlook Duckworth, 2012. Print. 3.       Facebook Nation: Total Information Awareness Lee, Newton. Facebook Nation: Total Information Awareness. New York, N.Y: Springer, 2013. Print. 4.       The Offensive Internet: Speech, Privacy, and Reputation Levmore, Saul, and Martha C. Nussbaum. The Offensive Internet: Speech, Privacy, and Reputation. Cambridge, Mass: Harvard University Press, 2010. Print. 5.       Internet privacy concerns: an integrated conceptualization and four empirical studies Hong, Weiyin, and James Y. L. Thong. "Internet privacy concerns: an integrated conceptualization and four empirical studies." MIS Quarterly 37.1 (2013): 275+. Academic OneFile. Web. 27 July 2013. Document URL http://go.galegroup.com/ps/i.do?id=GALE%7CA321935486&v=2.1&u=boon41269&it=r&p=AONE&sw=w   6.    Social Profile: What Does ZoomInfo Say About You? Walsh, Des. "Social Profile: What Does ZoomInfo Say About You?." www.deswalsh.com. Wordpress, 30 Jul 2010. Web. 30 Jul 2013. <http://deswalsh.com/2010/07/30/social-profile- what-does-zoominfo-say-about-you/>. 7.         Is WhitePages.Com Violating Your Privacy? Shamontiel, . "Is WhitePages.Com Violating Your Privacy?." Yahoo! Voices. N.p., 17 Oct 2010. Web. 30 Jul 2013. <http://voices.yahoo.com/is-whitepagescom-violating-privacy- 6988524.html?cat=25>. 8.         Privacy Concerns Raised About Google Glass Lee, Elizabeth. "Privacy Concerns Raised About Google Glass." Voice of America. N.p., 25 Jul 2013. Web. 30 Jul 2013. <http://www.voanews.com/content/privacy-concerns-raised- about-google-glass/1710061.html>.