cable companies are experimenting with tracking and target individual households cable boxes;
TRANSCRIPT
Cable companies are experimenting with tracking and target individual households cable boxes;
HOME THEATER
Mary Lou does everything on her computer—banking, shopping, social networking
MARY LOU AND STALKING
THINGS PEOPLE DO ON LINE
Your bank could be robbed without a stick-up.
Your account does not have to be on-line.
Your ATM card could be copied while in your possession.
NEW WAYS TO ROB A BANK
INFORMATION AVAILABILITY
The new Timeline format exposes your old mistakes
People search back through your old posts. Perhaps there is an embarrassing photo
You can hold the cursor over the post, click the pencil icon, then click Hide from Timeline or delete it
FACEBOOK STALKING
Things you thought were private can be accessed through third-party software apps created by others, eg. Words with Friends, Skype, Trip Advisor, Yelp
Read user agreements
Click on the lock icon and see your privacy options
Use www.Facebook.com/privacy score.
FACEBOOK APPS MAY STEAL
Click on “LIKE” not only to friends, but to Facebook and its advertising partners.
Visit a Web page with a “LIKE” button and Facebook will record your visit even if you don’t click
Set web browser to block all cookies.
Use a free plug-in to stop Facebook from tracking you.
www.Webhgrah.com/resoures/facebook blocker.
“LIKE” BUTTONS SPY
Some sites as The Washington Post offer “Social reader” Facebook tools. It will tell your friends what articles you read on the site. They tell everything you read not just the “LIKE” ones.
If you signed up, delete the app.
“SOCIAL READER TOOLS”
These tags could let others see you in unflattering situations.
Pictures others post of you can be harmful.
Tags make it easy to identify people they post
Untag yourself from unflattering photos.
Enable review of all future photos you’re tagged in before they appear on your Timeline.
PHOTO AND VIDEO TAGS
Details about you can be exposed by friends’ postings.
Look at friends’ positing and ask if you wish to have that info linked to you.
You may unfriend them.
Click you name, select friends, edit and select “Only Me” from drop-down menu.
FRIENDS AND FRIENDS’ FRIENDS
Be aware of your friends.
Remember the ND football player Manti Te’o who thought he had a girl friend—big fraud!
FAKE FRIENDS
Big brother is not the government. Big brother is Big Business.
No rules for commercial companies as there are for government, military and law enforcement.
BIG BROTHER
Even if you are restrictive with your privacy settings, social services such as Facebook, Google+ and Twitter follow you beyond their own websites—everywhere there is a Like, Tweet or other recommendation button, the sites can track you
SOCIAL NETWORKS
Don’t provide any details on Facebook that could be used to answer security questions about passwords
DETAILS ON FACEBOOK
Be cautious of messages from social networks as someone could have hacked into a friends account. These are messages that contains links.
MESSAGES FROM SOCIAL NETWORKS
Little is safe in cyber land
Even big Facebook’s information can and has been compromised
MEDIA GIANTS ARE ATTACKED
Items on your pages may be seen by others—employers, schools etc.
Your image posted on another’s page.
Help or Hinder is up to you.
MEDIA ENTRIES MAY HELP OR HINDER
Nothing is free and so web sites are funded by advertising as much as by your payments for services. All those search engines are paid to float things across your screen.
WHY TRACKING?
SOCIAL GRAPHS FOR PREDICTIONS
Advertising is tallied and delivered through wireless mobile devices. Mobile viewing web sites display advertising—billion dollar a year business
MOBILE DEVICE
Privacy advocates have been working to enact laws to protect privacy.
Hackers and trackers are busy and more sophisticated
PRIVACY ADVOCATES
With all the texting, web searches, the various methods of connecting are becoming crowded. Concern is that all data will be encoded and given a priority. This means that the cloud will be reading all of our data and making decisions about priority. OR we may be coding based on a cost scale just like old post office—over night, priority, first class.
THE DATA EXPLOSION
Keep your browser update Install malware-protection software On mobile devices stick to apps you know Look for address-pad padlock symbol Buy from reputable dealers Give out as little detail as possible Never send credit card # over email. Use online payment services Know your rights Use Common sense
ONLINE SHOPPING TIPS
Game systems that require online accounts can potentially expose a player’s personal information to hackers
ON LINE GAME SYSTEMS
18 – 34 age group does not hesitate to share on line
How do we communicate and share?
SHARING ON LINE
SHARING INFO ON LINE
Postings give cause to other issues such as envy, retaliation, and cyber bulling
Could become a rumor mill which harms others
Cause for depression
SOCIAL MEDIA ISSUES
SOCIAL MEDIA AND RELSTIONSHIPS
Postings especially with the socially vulnerable can have undesirable results.
Postings go viral faster than the old gossip method.
In print leaves little wiggle room.
SOME TIMES POSTINGS LEAD TO RAGE
Google has glasses that appear as regular glasses but connect to the internet and can record audio and video of all that you see and hear.
GOOGLE GLASSES
CYBER SPACE AFFECTS MILITARY ACTIONS
Need to provide for password usage
Access to documents stored in the cloud
Closing out all accounts
IT CONTINUES
DIGITAL LEARNING
STALKERS ARE EVERY WHERE. CAN YOU FIND THEM?