Upload
erica-carnevale
View
73
Download
2
Embed Size (px)
Citation preview
Digital security How secure is it really?
Digital Security
Photo: cc: Bart Carrade -‐ www.flickr.com/photos/79011202@N04/7072609283/in/photolist-‐bLYYkn-‐9FWHcc-‐bwC1f2-‐2BTPCo-‐2RDkiu-‐f7Fkhn-‐km1tFH-‐8sjp3y-‐7w4VE1-‐28Ds22-‐sUXQ6-‐kH7Q3X-‐6hZux7-‐nCStzM-‐5iYBjz-‐7PwA1X-‐fE13e3-‐LZ3Dp-‐qHY6Mw-‐gU3peV-‐ah3YXB-‐5GiNip-‐9579Au-‐e2rYY8-‐5iPrPD-‐7jjxwU-‐48cAWc-‐pBKSWU-‐7JSrFD-‐bqEriT-‐qwWeeF-‐eW3S9h-‐83CqCS-‐9djz7q-‐q41Zkh-‐8dHWy4-‐3T3Se-‐8vhN34-‐eABbhZ-‐55EBwp-‐dWuBMW-‐5vXTLG-‐oMYHKD-‐aANE2-‐r1bohc-‐fFPc7w-‐5wq1Jx-‐p6DXEN-‐8qZekG-‐dwHZKK
Compromising our information and our health.
By: Erica Carnevale
The lack of digital security has compromised our personal and company
information, as well as our medical devices.
Photo: Cc: abdullah.khan2012 -‐ www.flickr.com/photos/75862793@N06/6812695893/in/photolist-‐bo1R92-‐5uJAoe-‐tdcqNN-‐5iJeQd-‐8tXVig-‐bo1RWk-‐dAVeCJ-‐9NZ3iX-‐dAQBfD-‐5BuyeX-‐dzkUGb-‐5iHjaA-‐ehT2jv-‐8Awb6L-‐e4SthJ-‐8J1khi-‐qvNpmr-‐bhHvwx-‐6cwx2o-‐acjC7c-‐vxi-‐9gWgTb-‐6Evq3k-‐9QmUyn-‐mG6WrQ-‐9YD6Vw-‐mG3mdX-‐haWTXU-‐mG4n4v-‐b67Ej-‐mG4a74-‐mG4i6F-‐mG2XAH-‐LSutf-‐mG5xbJ-‐mG583J-‐7mdYcf-‐eQBHN1-‐mG4wnc-‐mG5t4L-‐mG4Een-‐jESE12-‐2ia9Rc-‐pyD8we-‐mG58KX-‐9QpJ33-‐cdxYCs-‐tvksmy-‐ex2J3H-‐dYdmN
2/3 of the Canadian population owns a smartphone.6
Photo: Cc: Gonzalo Baeza -‐ www.flickr.com/photos/gonzalobaeza/8292958010/in/photolist-‐dCPzuE-‐fhEmim-‐jpBnkE-‐i52con-‐5A3Kon-‐9Li1n1-‐oZN6c9-‐i5L2an-‐hu8x36-‐7gEWV7-‐peadiC-‐jpBnC3-‐7w8xG1-‐jFzBKX-‐7LAtpL-‐i5bSmz-‐g93SZD-‐jAcpuE-‐p6hnj5-‐ptBVF7-‐eM5aF6-‐job32H-‐pdWJe5-‐rmZJES-‐eM5wxX-‐kWvShV-‐9qmJp4-‐AXKxcb-‐deLgpu-‐peab6w-‐8jvm3s-‐ptBQc1-‐pvnKai-‐oeDrpa-‐pwNUsN-‐9qpLks-‐i5bgT9-‐eM54Mp-‐eMgGbE-‐jpBnx3-‐8TQyba-‐pvE51B-‐4QoDw9-‐9qpKtA-‐9qmHyv-‐pea9Py-‐i4WK4B-‐9qmGPK-‐21PJaA-‐eyaiBQ
54% of smartphone users are worriedabout the security level on their mobile
devices7…
Photo: Cc: Jimmy Álvarez -‐ www.flickr.com/photos/jimmyflickr/2892191058/in/faves-‐143778368@N06/
…… demonstrating that with advancing technology people still do not trust the
level of security that their devices possess.
Photo: Cc: Marcie Casas -‐ www.flickr.com/photos/marciecasas/5347580266/in/photolist-‐99xKiL-‐9vw3rV-‐rmB6z8-‐abhKDz-‐oiFHFy-‐g8KAp9-‐5Xnd1G-‐5oYETZ-‐k4zbd4-‐4jxdZH-‐oa6eaC-‐2pcoBB-‐4vareY-‐bjLFXK-‐5Wtibx-‐r5a29j-‐8NYgsR-‐4ZJEm2-‐3kTLzq-‐frLeXm-‐eYKV7c-‐8ySvFB-‐6Yoiq8-‐Bq9iBh-‐2kHCE-‐avMNa5-‐5pwiva-‐4UUSFp-‐bsmmzd-‐ekFX5v-‐a2v9fG-‐8NHKks-‐56mn88-‐nx25o-‐7fAPZc-‐2oQHhp-‐5wqAR3-‐nd8skd-‐nXCEn-‐6Caj8v-‐urX3T-‐bQZTzZ-‐5QxKEK-‐gDM8Y-‐7N6FpZ-‐czJw43-‐bqJNEK-‐9u3UiC-‐4MkQyw-‐4yUpNz
And they should not trust it!
Photo: Cc: Kay Yin -‐ https://www.flickr.com/photos/imkiwiyournot/8296251942/in/photolist-‐dD7sEA-‐dAAKXV-‐bAZc9u-‐ksvkir-‐7x7SxV-‐Nx6Az-‐bx4Gyu-‐4qyv6H-‐foF2B2-‐9PWn8R-‐531zHS-‐nSQ13j-‐amLMGg-‐8GM6M5-‐cEXuSy-‐LhSVM-‐9meLzG-‐4AZH4B-‐rdUG6q-‐9JbnDJ-‐8rVGqY-‐tZteF-‐4HxqZj-‐dQPXEa-‐a293rk-‐9B5zsH-‐7976Ex-‐8Y24Kb-‐7vaeng-‐8phKha-‐apdFZp-‐6FX74T-‐4LLTEL-‐rFJCWH-‐9mL9eW-‐ak8osE-‐7Au7dM-‐5AxoVu-‐6DDQHr-‐8gav3x-‐5Uq3ZA-‐3eBt5x-‐9YVcQS-‐F2hV5-‐N9tfi-‐9yteV-‐4qiQDe-‐oJygow-‐bbijFa-‐tCJ8Y
Smartphone data that is gathered can be used to pinpoint your location, identify you and monitor your phone,
regardless of app privacy policies or phone settings.12Photo: Cc: Yasunobu Ikeda -‐ www.flickr.com/photos/clockmaker-‐jp/2662752901/in/faves-‐143778368@N06/
Shopkick is an app that collects personal information about the user but does not outline what the information is being used for and who
it is being sold to in its privacy policy.4
Photo: Cc: NATS Press Office -‐ www.flickr.com/photos/natspressoffice/13085089605/in/photolist-‐9m8RsH-‐4z7rwb-‐fxQpM-‐2b61H9-‐eZxVuK-‐ak7hXk-‐8UxCTj-‐8QEcXb-‐9mco4f-‐btTti5-‐9pxgGB-‐arF84-‐7zSsL1-‐9r3HWm-‐vFmTy3-‐5eVeXR-‐nJeZWZ-‐9Uz7bc-‐CqaqGY-‐bJDnpB-‐gegezb-‐g9FDWk-‐gbbC6J-‐HPWZNT-‐kisKDH-‐eVCzWz-‐y7Yp6f-‐jHwscd-‐brsQrH-‐geHAXk-‐g8dbjY-‐gbaGAr-‐g9FHdk-‐g8kxgn-‐khg-‐gGqspG-‐gGqCej-‐gGgAkE-‐gGh9CW-‐gRaFve-‐f6XbVk-‐g8cQip-‐gJcj59-‐7wbp3W-‐gR96JZ-‐gGt9VN-‐gR827h-‐kWhvgc-‐kWhvig-‐kWhvN4
Preventing apps from using your location or restricting them to only use it when you are using the app, is not enough to prevent the app from tracking your device.3
Photo: Cc: JOSE SANTANA -‐ https://www.flickr.com/photos/34340561@N07/16123207190/in/photolist-‐qyKDLS-‐oqmKnf-‐ec2tJF-‐bw63y7-‐nTKzmB-‐gXndWK-‐e6rn8f-‐fK5siK-‐s7KcVS-‐pdRxzH-‐awRP6g-‐dWCHKe-‐omfAVB-‐anqVsJ-‐
6WvtLg-‐dC3nrM-‐8CL57e-‐qHpuZE-‐gYJrBr-‐qyw3HK-‐rgUkph-‐4zV17D-‐aTsuUp-‐xwosGd-‐dT6A2Z-‐a328ww-‐ota6wU-‐EZqp4V-‐nJvSKe-‐re2v5r-‐bvLtQX-‐pWTskF-‐9wVGUq-‐pNGYiT-‐n6S7Gn-‐9YKf4D-‐qFmQxs-‐rs7xgU-‐fDEjr1-‐rbTTy9-‐zNS6gc-‐
ePHVJF-‐phop4p-‐6z6hK2-‐rpSdFY-‐ejdpXm-‐dvdHYr-‐mb5LEg-‐codzeC-‐8Kk9pB
Photo: cc: Mikhail_108 -‐ www.flickr.com/photos/m108/14900693136/in/photolist-‐oGHWWm-‐9KDR4w-‐rTh92w-‐pWYTSK-‐qde4VK-‐e3uEtT-‐9mtKbm-‐9kfFfA-‐sssbZt-‐fAJW9n-‐azmh7G-‐9mfja2-‐58vzRG-‐7EhY6G-‐9mhrdz-‐49S34-‐5CWLE3-‐dNdWaA-‐6DV6Xy-‐aF85tD-‐bcLUgM-‐dVdg6J-‐fYyP78-‐nw1gHG-‐5ZPxra-‐79huAo-‐eJvJ8F-‐5JB2YS-‐aF8518-‐8y3pTW-‐o7M1X-‐peU6Q-‐aFbTWw-‐9uZD9Q-‐oskZ1R-‐aFbTTm-‐5koG7C-‐a1swjG-‐a1svXm-‐4KFAiH-‐7zveJu-‐7ysCdk-‐7p313i-‐eZNDiE-‐qB4Tof-‐aF84Sx-‐n47gZR-‐fzbHvT-‐fEvBaf-‐8VKTrB
The Weather Channel accesses your location on average every 10 minutes even when the
application is not being used.11
Photo: Cc: Carlos Enciso -‐ www.flickr.com/photos/krynowekeine/2703085724/in/photolist-‐57S2dh-‐anugYV-‐8JDpUk-‐4DUj7t-‐6ZwD6a-‐aHDBzc-‐nQjXBf-‐irF6Zz-‐bYk9XS-‐pVCNxd-‐pXatNz-‐5SKg4s-‐nPo7W-‐8NY6pe-‐6HtZeY-‐53DM8u-‐4mBqT8-‐cLf2FJ-‐9GzL8R-‐zvoKWP-‐9vgDsi-‐mDEbwD-‐mNiVnX-‐dc7tQL-‐pSAumv-‐6g49Hd-‐hVm9YF-‐kEzNo-‐aDbWzk-‐6XEPZo-‐rh1MX1-‐2bFBUn-‐dkfD63-‐oPbxPL-‐bVPS5R-‐4T5Dmr-‐bjBLk4-‐eXiQZJ-‐67S2qB-‐dkXsZw-‐7qWay5-‐aXCjbc-‐4QsgZ3-‐81kkEj-‐4tXTwW-‐B3VXk-‐5cfVvW-‐diojeE-‐atNu8-‐kaQQ8r
Sensors in your devices and apps
that collect data and track your location, could
cause you to be more vulnerable to
cyber attacks.3
Personal information is now being compromised because of poor digital security and now company information is also under attack.
Photo: Cc: Sivaserver -‐ www.flickr.com/photos/91707070@N03/8331732961/in/photolist-‐dGfiWi-‐aMbw5H-‐2Yxv9A-‐ap5Je6-‐aeKut7-‐8CpFau-‐6rf4Xg-‐8G68F2-‐hQf1N4-‐bfmZ4v-‐bxFnW-‐8G68zt-‐dQEPCC-‐9XaVP2-‐8t6B4C-‐uiDMM-‐6UDnWP-‐2b5yP9-‐8G9iDJ-‐rEAH-‐8G68JX-‐nmZnrf-‐8G9j7q-‐8G68VZ-‐dvdWi-‐8G68jZ-‐8G691g-‐cZUPK-‐8G9iL3-‐6jQj7m-‐9uQG7p-‐9wJLwq-‐61yf68-‐9bWVHV-‐7uXPBA-‐4mAf35-‐3A1j1z-‐5c5WBr-‐o2diQp-‐9JwUna-‐c8pb39-‐hfXPnN-‐pZKRuh-‐uqdE6-‐7Wxvgo-‐6JgTHw-‐uq4zV-‐6jTJBA-‐3A1nek-‐633hUd
Wearable technology makes it easy for employees to gain secret information about their employer because of
the discrete size of the device.2
Photo: Cc:Kentaro -‐ www.flickr.com/photos/kaleidalabs/17288411245/in/photolist-‐skHCkX-‐rDfcBu-‐s1neMt-‐s2oh7i-‐skF39F-‐shEAaf-‐tsUEqj-‐tKBETt-‐oZKSSM-‐tsUEs3-‐skHdVv-‐sNEFuK-‐rxCLNV-‐tsVfW5-‐s4ggoP-‐s4geaa-‐tKBFJM-‐rg4of3-‐skHB6c-‐sfwwx7-‐BmpvT1-‐s7BFJU-‐sgAVBJ-‐p9qyGp-‐sg8pQ7-‐Cv7uK6-‐s49eDm-‐oSur3d-‐s47UyN-‐s49kuE-‐s47VVL-‐roH5RJ-‐skyekJ-‐s2oegi-‐siqudm-‐roHh7j-‐s4g5vB-‐s2o3Xc-‐s4g3FV-‐roHcfA-‐roH52h-‐s47Xyf-‐sky5a9-‐oZKRft-‐skEMHX-‐saNZmz-‐rsjqaq-‐FLBgAQ-‐FEJ4Cu-‐rdNUQQ
Employees are open to wearable technology such as smartwatches while in the workplace.8
70% of Millennials8
51% of Generation X8
Photo: Cc: Randy Caldwell -‐ www.flickr.com/photos/misterperturbed/6321178442/in/photolist-‐aCzG8d-‐dfKUvh-‐9BSptf-‐dNzL7V-‐adDCVX-‐7mUtiX-‐e183o8-‐9N8BXZ-‐5A4XGt-‐b5HsBV-‐4so2Pm-‐77xo3J-‐6vFYag-‐6uJGPD-‐apQzvX-‐6RsH6B-‐bN45xp-‐oBjgjh-‐63RtEc-‐5co28q-‐4T4JwP-‐6StU3G-‐bGZZTB-‐7RYdss-‐4mcyyB-‐ifaPZK-‐5cP725-‐6e7Cca-‐5dXg6g-‐5HKn6o-‐8GUmVW-‐4eaGRU-‐ae8Nnr-‐8XRZ69-‐2XgkS7-‐8adZUK-‐ctA8WU-‐ddg4wH-‐6PwAQ1-‐7vNsCg-‐9kVn5C-‐4Ru2mz-‐gSE3xd-‐aheuj5-‐2X8wAS-‐8xjChz-‐2Shzpt-‐6exmYs-‐3SeL8J-‐4xDem6
These individuals are the future and with their acceptance towards wearable technology in the workplace, company security will become a serious issue.
Photo. Cc: Geoff R -‐ www.flickr.com/photos/sockrotation/4301185320/in/photolist-‐7y5GxA-‐6epSQ1-‐edYmW-‐JXcQk-‐boGFEr-‐r2TAmZ-‐6amA3a-‐7BKMW6-‐78dU6H-‐9dK1A-‐czomPS-‐aYzc7r-‐8dD3c5-‐ahyKd7-‐crmFc-‐bgwVWn-‐bdLjtr-‐9wGnZd-‐bcGyWv-‐7tRLqF-‐6JEup6-‐89N7vC-‐jU28M-‐21DDxg-‐8HXjbs-‐4EG8cS-‐5g8Gk5-‐7n71SR-‐4GMyDi-‐emN9f-‐5yeAn2-‐qQQuYJ-‐91NFdN-‐8tcm9d-‐Kb56V-‐2z8mCe-‐udZKv-‐269VsE-‐78Hnyv-‐r2vFSN-‐pA82SF-‐3pQaVB-‐5NqtWW-‐YQSig-‐uGQFk-‐o9QhbW-‐4SiijR-‐7xCknd-‐b4Vg5F-‐52rGjR
Not only is personal information affected but our health is now under attack with the ability of hackers to access medical technology.
Photo. Cc: Cat2398 -‐ www.flickr.com/photos/9501510@N02/9667098575/in/photolist-‐fJfpBn-‐eKoVxK-‐2FGkT2-‐779t3E-‐6aduTP-‐pj5dav-‐pj5cHi-‐andndG-‐nAHYxa-‐pj6e5A-‐2ywEDH-‐pJcnBs-‐4hHLyc-‐jKVFj7-‐8mh8fz-‐pyxBAh-‐andqXh-‐4kSm6G-‐pj6UrD-‐aiSUf5-‐4RWiNA-‐4ZNbyu-‐5m6n1Z-‐6yjsMr-‐5R9wJX-‐oYWwus-‐pj5bBF-‐pj5dFv-‐andyFm-‐mgRpqV-‐pj5bRD-‐ckGuhU-‐2Eippg-‐97rLC4-‐aCGMHM-‐97rNyK-‐pAj2CX-‐5m6m5D-‐pLi7Vd-‐2BnH5p-‐nrwbFK-‐eYT1f3-‐anaANF-‐4pQVek-‐8pNoiH-‐anaDpK-‐c2PXME-‐5SUY5F-‐3JNaFR-‐5QsHYK
Thousands of medical devices, such as x-ray machines, MRI scanners and drug infusion
pumps, are exposed to hacking,
resulting in significant health risks for researchers and patients. 10
Photo: Cc: Trey Menefee -‐ www.flickr.com/photos/trey333/4058372679/in/photolist-‐7bCdNK-‐72TnnS-‐gd4JNa-‐h4a4Tm-‐3qVzq5-‐sgnUc5-‐hk4EvK-‐8puvSw-‐3npcCN-‐6QGcKa-‐5CRA9X-‐8xw2No-‐bA6VdM-‐ak13bw-‐a8dZfJ-‐EW5aY-‐kjMaCR-‐fUCdzX-‐epMjcs-‐fbYcD9-‐ptP4G-‐8JZ2LF-‐74oyvD-‐74st6q-‐9pF7R-‐app5M6-‐5EpcsE-‐bsmFkz-‐eehzuc-‐8p8S2M-‐ryH1i7-‐app5dv-‐5kausR-‐djZY4h-‐4ahH3B-‐hsmzL-‐74staJ-‐9p1MH4-‐65G3d1-‐6QKgmh-‐qt8RmK-‐fRwD2-‐9AmUKX-‐8HN5i6-‐fRwxu-‐fXEUPf-‐bt4u2a-‐dwVXmf-‐7z2GJh-‐EGpUEy
Something as simple as a
computerized insulin pump could
be hacked and administer a
dangerous amount of insulin.5
Photo: cc: Alan Levine -‐ www.flickr.com/photos/cogdog/24410761961/in/photolist-‐Dc6x5e-‐25AL36-‐8PvAQr-‐7aJgBW-‐6dEHDv-‐4DCV4d-‐o8vonH-‐dAgLdo-‐dAgsmo-‐dAbhtP-‐6dEMht-‐bVFEVj-‐dAgM93-‐dAaZQD-‐dAbiXx-‐dAbeVt-‐6dJSLf-‐dAaYPv-‐dAgLX3-‐dAgGXf-‐8Ef6GH-‐8b5Acz-‐dAgJsS-‐6DEik8-‐8rBGq8-‐dAbi8M-‐dAgJVu-‐dAgNas-‐dAbjhV-‐dAgGM5-‐5W6aek-‐dAfpq3-‐48Jz9U-‐dAbeMr-‐6dEMun-‐dAaYw4-‐dAbf9M-‐rmP4d-‐dAgs6j-‐bN8iev-‐aRCCAn-‐dAaZsc-‐9iwUHU-‐dAbj6B-‐d4CYHj-‐98EJYb-‐q5NaTu-‐4nDv6r-‐qnbVAF-‐7WzWop
Photo: Cc: Lars Nielsen -‐ www.flickr.com/photos/31291514@N04/13953040668/in/photolist-‐nfYYSG-‐dYgNVD-‐5mFXbD-‐hd5wU-‐8qUkFB-‐5P4zDk-‐5n2PY-‐dvcZad-‐5WtXJy-‐7KR6CW-‐ev26jp-‐5c5cEh-‐66Z1vu-‐81yxjx-‐5MPfm7-‐9uaeyi-‐83s9nT-‐4dj37C-‐57Tsyg-‐5R1oy8-‐pzWojf-‐bphqKF-‐oLAYoe-‐8CeQ3z-‐bud7JS-‐ashm5t-‐7XKRzd-‐ag2gvL-‐apbYU5-‐3AhiCv-‐76Xyr8-‐4M4Paz-‐64HxYR-‐6D8Cgk-‐64QfAW-‐9uLTxi-‐baQN5R-‐7gXPn6-‐egss9F-‐6uUeTe-‐9gHyTk-‐5xXrq-‐r7BEFo-‐53vgLG-‐54LpAh-‐9fZazU-‐7kmxkJ-‐jfmvRv-‐3GzgeA-‐gXmb7t
How can we preventthis from occurring and remain
safe in the digital world?
To increase digital security for personal information, company information and
medical machines you should…
Photo: Cc: Defence Images -‐ www.flickr.com/photos/defenceimages/6938469933/in/photolist-‐bz8tnX-‐4c9jPm-‐7wtiuh-‐8VafEh-‐6PRxhq-‐iqdv6-‐3gFv8o-‐qFazgy-‐b4HXag-‐bnx3rn-‐7QsvVh-‐6PMpza-‐dWVK4Y-‐7R35TL-‐91oJMR-‐dx8dRU-‐q4WwbM-‐ezmdir-‐hoMMAK-‐e4tEhy-‐9nKs6F-‐6PMpDR-‐6PMpni-‐6X1r5J-‐arBLng-‐gZ9cos-‐a39gFk-‐qjMtJz-‐oZNyv-‐nm9pLx-‐9aQxiw-‐jAvJse-‐chPnS1-‐pS6reA-‐bMfPP-‐pQ4ozQ-‐bz8tuK-‐srbKe-‐bz8tBR-‐93bWr3-‐dWLwrz-‐bmdAKd-‐d9gMVb-‐7oLnmk-‐PGkKh-‐4Qu5XV-‐a6pFHb-‐6Xjqcm-‐qSbTyo-‐4GQUJB
Photo: Cc: Karol Franks -‐ www.flickr.com/photos/karolfranks/15136260663/in/photolist-‐p4xhXr-‐4VCEHf-‐7rGXLn-‐8w2AKt-‐eefodz-‐oTEycq-‐j1P9wV-‐eacbDC-‐sjZXzH-‐5Vnb1t-‐5kDUvW-‐4FUpDx-‐CedUUw-‐9rwG83-‐9DeeWv-‐62VnQ2-‐azLjAh-‐8yMA6C-‐567p-‐2goVK7-‐f2f61a-‐jabPo5-‐6Ztnz6-‐61zdbE-‐VgjKe-‐8o6Um3-‐4yZyv2-‐bPiVCc-‐7XjZ5S-‐aeMzr3-‐ncoXC5-‐aqeq7S-‐QuQNR-‐nSaTsQ-‐oio1gn-‐r29bk5-‐4cq6Ht-‐83LQef-‐ogHLLH-‐bpcRvq-‐eHbRcJ-‐cBykzs-‐bpb3NV-‐6FFXTq-‐8AUv2E-‐p3zfGw-‐5fVAoS-‐9mDA1w-‐9QGeWv-‐nzjQWL
• Avoid giving personal information to apps.9
• Establish security policies for wearable devices in the workplace.2
• Hospitals should develop strict network policies to avoid hackers.1
Works cited
1. Arsene, L. (2015, October 4). Hacking Vulnerable Medical Equipment Puts Millions at Risk -‐ InformationWeek. Retrieved June 05, 2016, from http://www.informationweek.com/partner-‐perspectives/bitdefender/hacking-‐vulnerable-‐medical-‐equipment-‐puts-‐millions-‐at-‐risk/a/d-‐id/1319873
2. Cole, S. (n.d.). How The Apple Watch Will Change Office Life. Retrieved June 05, 2016, from http://www.fastcompany.com/3043533/the-‐future-‐of-‐work/how-‐the-‐apple-‐watch-‐will-‐change-‐office-‐life
3. Feltman, R. (2014). Phones are giving away your location, regardless of your privacy settings. Retrieved June 05, 2016, from http://qz.com/203778/phones-‐are-‐giving-‐away-‐your-‐location-‐regardless-‐of-‐your-‐privacy-‐settings/
4. Golbeck, J. (2014). This App Tracks You While You Shop. Retrieved June 05, 2016, from http://www.slate.com/articles/technology/future_tense/2014/01/ibeacon_shopkick_privacy_policies_for_location_tracking_apps_aren_t_clear.single.html
5. Home, hacked home. (2014, July 12). Retrieved June 05, 2016, from http://www.economist.com/news/special-‐report/21606420-‐perils-‐connected-‐devices-‐home-‐hacked-‐home
6. Matrix, Sydneyeve. “Module 3: Mobilities”. 2016. Presentation.
7. People don't trust smartphone security – and that's choking the mobile economy. (n.d.). Retrieved June 05, 2016, from http://www.techradar.com/us/news/phone-‐and-‐communications/mobile-‐phones/people-‐don-‐t-‐trust-‐smartphone-‐security-‐and-‐that-‐s-‐choking-‐the-‐mobile-‐economy-‐1285887
8. PwC: Half of people willing to use workplace smartwatch. (n.d.). Retrieved June 05, 2016, from http://www.consultancy.uk/news/1828/pwc-‐half-‐of-‐people-‐willing-‐to-‐use-‐workplace-‐smartwatch
9. Smartphone Privacy Settings You Need To Activate Today. (n.d.). Retrieved June 05, 2016, from http://www.makeuseof.com/tag/smartphone-‐privacy-‐settings-‐need-‐activate-‐today/
10. Thousands of medical devices are vulnerable to hacking, security researchers say. (n.d.). Retrieved June 05, 2016, from http://www.pcworld.com/article/2987813/thousands-‐of-‐medical-‐devices-‐are-‐vulnerable-‐to-‐hacking-‐security-‐researchers-‐say.html
11. Where Were You 3 Minutes Ago? Your Apps Know. (n.d.). Retrieved June 05, 2016, from http://blogs.wsj.com/digits/2015/03/23/where-‐were-‐you-‐3-‐minutes-‐ago-‐your-‐apps-‐know/?mod=LS1
12. Williams, R. (n.d.). How your phone is revealing your location, regardless of privacy settings. Retrieved June 05, 2016, from http://www.telegraph.co.uk/technology/mobile-‐phones/10795009/How-‐your-‐phone-‐is-‐revealing-‐your-‐location-‐regardless-‐of-‐privacy-‐settings.html