Digital Citizenship Lesson 3. Does it Matter who has your Data What kinds of information about yourself do you share online? What else do you do online.

Slides:



Advertisements
Similar presentations
Back to Table of Contents
Advertisements

How to avoid Viruses and Malware on your Computer Use a firewall Using a firewall is like locking the front door to your house—it helps keep intruders.
Starter for 10 Unit 11: Facebook Transform IT SFT11_Facebook.
What are cookies? Cookies are text files stored on one’s computer after visiting a website Used for: -Storing information such as a unique visitor ID -Allowing.
What is spyware? Supervisor dr. lo’ay tawalbeh Search By Mahmoud al-ashram Soufyan al-qblawe.
Internet Cookies: Changing Internet Use and Privacy Lindsay Maidment & Katherine Hollander November 8, 2006.
WHO WE ARE ●Website Development & Design ●Web Marketing Strategy, Training, and Analysis ●Web Applications, iOS apps, Android apps.
Tracking, Privacy, You & The 21 st Century When you talk online the internet listens.
Basics: Getting Started Uploading and Sharing Videos on YouTube. Basics: Getting Started Uploading and Sharing Videos on YouTube. 1.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
What is E-Commerce? This lesson we look at what E-commerce is. Open up Microsoft Word as we will be doing some research during the presentation. Also,
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
The Privacy Tug of War: Advertisers vs. Consumers Presented by Group F.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
How It Applies In A Virtual World
Analysis of websites Austin Lesak. Amazon and Ally Bank.
Internet safety By Lydia Snowden.
Melissa Harrigan. Podcasts Podcasts are mini-broadcasts that can be viewed on the internet or downloaded to MP3 players It’s the new way to watch TV or.
Skills: none Concepts: information we give up voluntarily, information we reveal as a by-product of using the Internet, use of information “signals,” data.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Social networks and communities Suitable for: Improver.
Staying Safe. Files can be added to a computer by:- when users are copying files from a USB stick or CD/DVD - downloading files from the Internet - opening.
Hazleton Area High School/ Career Center/ Academy of Sciences.
The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.
Staying Safe Online Keep your Information Secure.
HAZLETON AREA HIGH SCHOOL Internet Safety 9 th -12 th Grade.
INTERNET PRIVACY Marketing companies The cookie leak security hole in the HTML messages The Web Bug Can we trust the privacy.
Impacts of the use of IT -Social network sites This is a site that lets you post messages, upload pictures and stories on your own personal page. You can.
PRIVACY BOOTCAMP YpJU.
Computer Ethics.
The Internet for Beginners Section Four of Four From the Richard Sugden Library Spencer, MA Jillian M. Parsons.
®® Microsoft Windows 7 Windows Tutorial 5 Protecting Your Computer.
The Internet Industry Week Four. RISE OF THE INTERNET THE INTERNET – a global system of interconnected private, public, academic, business, and government.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Staying safe online Suitable for: Beginner.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Chapter 18 Technology in the Workplace Section 18.2 Internet Basics.
Protecting Students on the School Computer Network Enfield High School.
BEHAVIORAL TARGETING IN ADVERTISING By Rita Aliperti.
Facebook Ad’s Reloaded Keep it Organized. To use Facebook Ad’s effectively in today’s market you must have Funnel Over the last week we have covered the.
Privacy Issues on The Internet. Login if you want everyone to see your private life * * * * *
MY DIGITAL FOOTPRINT. WHAT IS A DIGITAL FOOTPRINT? Each time you log onto social media, you leave a trail behind you, mostly based on what you search.
How to Select and Use Privacy Settings EL Civics Assessment Task 3.
Society & Computers PowerPoint
DATA ACCURACY- one of the issues of computer ethics. Providing inaccurate data input results in erroneous information & decision making. Information on.
Does It Matter Who Has Your Data? 1.Intro 2.Teach 1: Travel Safety Rules 3.Teach 2: How to Protect Your Data 4.Wrap-Up 5.Assessment 6.Extension Activity.
PRIVACY BOOTCAMP Jack Vale - Social Media Experiement.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
1 Targets and Waste Social Profiling and Your Role as the Consumer.
Introduction Web analysis includes the study of users’ behavior on the web Traffic analysis – Usage analysis Behavior at particular website or across.
STOP. THINK. CONNECT. Online Safety Quiz. Round 1: Safety and Security.
What are the Pros and Cons of Advertising Via Newsletters?
E-Safety Parent Talk Helping to keep your children safe online.
Presented By: Buybulkwebtraffic Presented By: Buybulkwebtraffic
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
5.04 Demonstrate the use of technology in promotion.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
Digital devices and Impact on organisations. Computers What do they use it for  Storing data  Design tasks  Products tasks (controlling machine) 
Facebook privacy policy
Edward De Valle Exciting Internet Marketing Ideas That Anyone Can Use
"Our vision is to be earth's most customer-centric company; to build a place where people can come to find and discover anything they might want to buy.
The Internet Industry Week Two.
Latest Updates on BlackHawk Mines Music : Privacy Policy
STOP. THINK. CONNECT. Online Safety Quiz.
Internet Safety Vocabulary
Google Privacy Policy Karen Tao.
Ethical and Social Issues in Information Systems
Being Aware of What You Share
eHarmony for Recruiters
Does It Matter Who Has Your Data?
Presentation transcript:

Digital Citizenship Lesson 3

Does it Matter who has your Data What kinds of information about yourself do you share online? What else do you do online that reflects who you are?

Vocabulary Terms TRACK - when companies collect information about you based on your online behavior TARGET - when companies tailor content to you based on the information they have collected about you When you input information into a website – such as profile information or search terms you are telling that site something about yourself. The companies that run the sites track this data. They then use it to target users with specific content, especially advertising related to their interests.

Objective: Today we are going to discuss the kinds of data companies collect about users, and the benefits and risks of companies having this information. Video clip: Husband Sees Wife on Facebook Dating AdHusband Sees Wife on Facebook Dating Ad

Discuss How did the video relate to the idea of tracking and targeting?

Tracking and Targeting One of the first companies to track and target users online was Amazon.com. It created technology that could match people’s preferences with other users whose buying habits were like their own, and make recommendations on that basis. This kind of targeting worked, and Amazon’s sales grew rapidly. More recently, Amazon began to sell e- books (electronic books). With e-books, the company can track information about what you read, what pages you skip, and what you highlight. Amazon then uses this information to figure out what books to recommend to you (Pariser, The Filter Bubble, 2011, p. 29).

Tracking and Targeting Other companies, such as Netflix (which offers movies that you can order by DVD or stream online) and Pandora (which allows you to rate music in real time), have a similar model: Based on your choices, they try to determine your tastes. Then they recommend products that reflect those tastes.

Question? What do you think are companies’ goals in tracking your information? What do you think of tracking and targeting? Do you think it is okay for companies to collect information about you?

What can I do There are things you can do to help protect your personal information. Here are some strategies that can help them limit the data that companies collect.

Cookies Not the kind you eat. These are data files that are stored on your computer when you visit certain sites, which are often used by companies to identify repeat customers and personalize visitors’ experiences

Tips for protecting yourself from tracking and targeting Do not provide addresses to mailing lists unless you need to do so… or create an account just for collecting junk mail use that address. Unsubscribe from listserves or websites that you do not regularly use. Limit the number of times you click on ads, no matter what they are for. Avoid “too good to be true” products, deals, and opportunities. Once you have confirmed your address, they are likely to sell your address to other companies.

Tips for protecting yourself from tracking and targeting Make sure you have antivirus software, and that it also protects against spyware, programs that secretly collect your data. Disable Internet “cookies,” so that companies cannot put tracking devices on your computer. (Sites will not be able to remember your preferences as well this way, which is something to consider.) Investigate computer applications that block pop-up ads. Examine sites’ privacy policies before you reveal any information on the site; avoid using sites that will share your data with others.

Final questions What information about your demographic group and online behavior might websites collect about you? What are the pros and cons of online tracking and targeting? What are three ways you might help prevent companies from collecting information about you online that you may not want them to have?

Video