Privacy and Data Mining What Do “They” Know About You?

Slides:



Advertisements
Similar presentations
Performance Indicator 4.08
Advertisements

Ji Yeon Chu, Lindsey Fong, Jonathan Bender, Yi Low, and Umang Patel.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Working group discussion 1 Cyber Risk Security, Privacy ?
Lab 3 Cookie Stealing using XSS Kara James, Chelsea Collins, Trevor Norwood, David Johnson.
The Privacy Tug of War: Advertisers vs. Consumers Presented by Group F.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
Behavior Tracking Dhaval Patel.
Internet safety By Lydia Snowden.
Final Exam Part 1. Internet Regulation Internet regulation according to internet society states that it is about restricting or controlling certain pieces.
Slide 1 Tomorrow’s Technology and You Chapter 7 Databases and Privacy © 2006 Prentice-Hall, Inc.
The Internet Present By Tianyi Xiao ID : C  The Internet is a global system of interconnected computer networks that use the standard Internet.
Privacy Aziz Doumith Michael Kot Luis Pacheco Emory Petermann Wyatt Pierson Henry Stigler.
Alexander Consulting Enterprise 9/7/2015 Marketing Research in Global Markets Why Bother?
INTERNET SAFETY Sergeant Karl Youngblood Barbara Burchard Information adapted from the
Exchanging information. Communication services Voice phones SMS (short messaging service) – more commonly known as texting Fax Instant messaging – real.
Digital Literacy Tour Google/iKeepSafe/YouTube Presenter Introduction Davina Pruitt-Mentle, Ph.D. Ed Tech Policy, Research and Outreach.
INTERNET PRIVACY Marketing companies The cookie leak security hole in the HTML messages The Web Bug Can we trust the privacy.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Class 6 Internet Privacy Law Social Media Privacy.
CSE/ISE 312 Privacy (Part 2). The Business and Social Sectors Marketing and personalization What we do ourselves Location tracking A right to be forgotten.
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web 1 Component 4/Unit 2Health IT Workforce Curriculum.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Personal Privacy and Security Zenia C. Bahorski Ph.D. Department of Computer Science Eastern Michigan University Personal Privacy & Security - Z. Bahorski,
Privacy & Security Online Ivy, Kris & Neil Privacy Threat - Ivy Is Big Brother Watching You? - Kris Identity Theft - Kris Medical Privacy - Neil Children’s.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
By William Cook.  How the internet works  How companies pay their bills  How to privately browse the internet.
 Cable companies are experimenting with tracking and target individual households cable boxes;
Describe the use of technology in the marketing-information management function.
Effects of Computing How have computers affected society?
Consumer Protection Shop Safely and Guard Your Financial Information.
Minding your business on the internet Kelly Trevino Regional Director October 6,2015.
Are you a Digital Native?
Internet Services Web browsing Chat/Messaging Newsgroups Social networking Shopping Information –Text –Pictures –Movies –Music And more! 3.
Digital Communication and Networks. Go to this website 10 minutes looking Pick an article Prepare a 5 slide pp Take into account.
4.08 Use of technology in marketing-information management
Chapter6: E-Commerce Web Sites HNDIT11062 – Web Development 1.
Restoring Privacy, Cleaning Your Computer's Cookies and Beacons.
ONLINE SAFETY AND SECURITY Computer Basics 1.5. INFAMOUS CYBER ATTACKS IN 2014 Sony Pictures: Attackers stole just about everything in the corporate network,
About Us AVG is a global security software maker protecting 98 million active users in 170 countries from the ever-growing incidence of Web threats, viruses,
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Digital Communication and Networks. When people visit web sites their ◦IP address, ◦browser software, ◦operating system ◦viewing.
 Information privacy involves the protection of an individual’s personally identifiable information. Such information can include health records, criminal.
Internet Privacy Define PRIVACY? How important is internet privacy to you? What privacy settings do you utilize for your social media sites?
By Samantha Kozar.  What are social networks?  What is Facebook?  What is Gowalla?  What are the capabilities of these sites?  Privacy Settings 
Protecting your search privacy A lesson plan created & presented by Maria Bernhey (MLS) Adjunct Information Literacy Instructor
Make your Library a Privacy and Security Resource M Ryan Hess Senior Librarian for Information Technology Palo Alto City Library.
Phillip Schneider Information Services Librarian Gail Borden Public Library District Cybersecurity: Keeping Your Computers & Devices Safe.
Online Instant Messaging Chat Rooms Social Networks Internet Surfing Mobile Phones Gaming Sharing Files Uploading Videos.
Chapter 4 E-Business: Managing the Customer Experience.
Cloud-Computing Cloud Web-Blog Software Application Download Software.
Managing Windows Security
Social and environmental impact
Hotspot Shield Protect Your Online Identity
IT Security  .
Personal spaces.
E-commerce Business uses of internet, e-commerce & e-business, e-marketing, e-payments etc.
Tutor: Wendy Mcloughlin Swansea University
Internet and security.
Latest Updates on BlackHawk Mines Music : Privacy Policy
Social Media Data Mining
Computers and Data Collection
Exploring Computer Science
Digital $$ Quiz Test your knowledge.
E-Business: Managing the Customer Experience
Health Care: Privacy in a Digital Age
21st Century Learning Spaces
HOW DO I KEEP MY COMPUTER SAFE?
Privacy and Data Mining
Privacy and Data Mining
Presentation transcript:

Privacy and Data Mining What Do “They” Know About You?

Intro  Privacy  Data Mining  Info Uses  Policies

Privacy  Definition  Levels  Cross-site scripting  Social Networking  Internet Service Providers  HTMLs

Privacy  Cookies  Standard  First Party  Third Party  Flash cookies

Privacy  Risks  Mobile Apps  Browsing  Searches  Instant Messaging  Personal Website  Blogging  Online Banking  “Cloud”  “Street View”

Data Mining  What Is It?  Mining Classes  Anomaly Detection  Association Rule Learning  Clustering  Classification  Regression  Summarization

Data Mining  Internet Services  Browsing Hazards  Info Sources  Marketing  Direct  Behaviorial/Targeting  Web Bugs  Location Tracking  Employee Monitoring

Data Mining  Government Surveillance  Court Records  Online Shopping  Scams  Auctions  Postal Fraud  Malicious Links

Data Mining  The Good  Science and Engineering  Human Rights  Medical  Laws  Stronger in Europe

Data Mining  Software  Free  20+ Packages  Commercial  Another 20+  Surveys  Face-to-Face  Computer Driven

“Safe”? Sites  Search Engines  Startpage  DuckDuckGo  Personal Protection  Don’t use search and mail from same source  i.e., Google and Gmail

Policies  Global Policies  Individual Country adaptations