Presentation is loading. Please wait.

Presentation is loading. Please wait.

 Cable companies are experimenting with tracking and target individual households cable boxes;

Similar presentations


Presentation on theme: " Cable companies are experimenting with tracking and target individual households cable boxes;"— Presentation transcript:

1  Cable companies are experimenting with tracking and target individual households cable boxes;

2  Mary Lou does everything on her computer— banking, shopping, social networking

3

4  Your bank could be robbed without a stick-up.  Your account does not have to be on- line.  Your ATM card could be copied while in your possession.

5

6  The new Timeline format exposes your old mistakes  People search back through your old posts. Perhaps there is an embarrassing photo  You can hold the cursor over the post, click the pencil icon, then click Hide from Timeline or delete it

7  Things you thought were private can be accessed through third-party software apps created by others, eg. Words with Friends, Skype, Trip Advisor, Yelp  Read user agreements  Click on the lock icon and see your privacy options  Use www.Facebook.com /privacy score. www.Facebook.com /privacy

8  Click on “LIKE” not only to friends, but to Facebook and its advertising partners.  Visit a Web page with a “LIKE” button and Facebook will record your visit even if you don’t click  Set web browser to block all cookies.  Use a free plug-in to stop Facebook from tracking you.  www.Webhgrah.co m/resoures/facebo ok blocker. www.Webhgrah.co m/resoures/facebo ok

9  Some sites as The Washington Post offer “Social reader” Facebook tools. It will tell your friends what articles you read on the site. They tell everything you read not just the “LIKE” ones.  If you signed up, delete the app.

10  These tags could let others see you in unflattering situations.  Pictures others post of you can be harmful.  Tags make it easy to identify people they post  Untag yourself from unflattering photos.  Enable review of all future photos you’re tagged in before they appear on your Timeline.

11  Details about you can be exposed by friends’ postings.  Look at friends’ positing and ask if you wish to have that info linked to you.  You may unfriend them.  Click you name, select friends, edit and select “Only Me” from drop- down menu.

12  Be aware of your friends.  Remember the ND football player Manti Te’o who thought he had a girl friend—big fraud!

13  Big brother is not the government. Big brother is Big Business.  No rules for commercial companies as there are for government, military and law enforcement.

14  Even if you are restrictive with your privacy settings, social services such as Facebook, Google+ and Twitter follow you beyond their own websites— everywhere there is a Like, Tweet or other recommendation button, the sites can track you

15  Don’t provide any details on Facebook that could be used to answer security questions about passwords

16  Be cautious of messages from social networks as someone could have hacked into a friends account. These are messages that contains links.

17  Little is safe in cyber land  Even big Facebook’s information can and has been compromised

18  Items on your pages may be seen by others— employers, schools etc.  Your image posted on another’s page.  Help or Hinder is up to you.

19  Nothing is free and so web sites are funded by advertising as much as by your payments for services. All those search engines are paid to float things across your screen.

20

21  Advertising is tallied and delivered through wireless mobile devices. Mobile viewing web sites display advertising—billion dollar a year business

22  Privacy advocates have been working to enact laws to protect privacy.  Hackers and trackers are busy and more sophisticated

23  With all the texting, web searches, the various methods of connecting are becoming crowded. Concern is that all data will be encoded and given a priority. This means that the cloud will be reading all of our data and making decisions about priority. OR we may be coding based on a cost scale just like old post office—over night, priority, first class.

24  Keep your browser update  Install malware-protection software  On mobile devices stick to apps you know  Look for address-pad padlock symbol  Buy from reputable dealers  Give out as little detail as possible  Never send credit card # over email.  Use online payment services  Know your rights  Use Common sense

25  Game systems that require online accounts can potentially expose a player’s personal information to hackers

26  18 – 34 age group does not hesitate to share on line  How do we communicate and share?

27

28  Postings give cause to other issues such as envy, retaliation, and cyber bulling  Could become a rumor mill which harms others  Cause for depression

29

30

31  Postings especially with the socially vulnerable can have undesirable results.  Postings go viral faster than the old gossip method.  In print leaves little wiggle room.

32  Google has glasses that appear as regular glasses but connect to the internet and can record audio and video of all that you see and hear.

33

34  Need to provide for password usage  Access to documents stored in the cloud  Closing out all accounts

35

36 STALKERS ARE EVERY WHERE. CAN YOU FIND THEM?

37

38

39

40

41

42

43

44


Download ppt " Cable companies are experimenting with tracking and target individual households cable boxes;"

Similar presentations


Ads by Google