25
A NECESSARY EVIL OF TECHNOLOGICAL CONNECTEDNESS Photo: cc: jepoirrier - https://www.flickr.com/photos/57519914@N00 SACRIFICED PRIVACY : By: Laura Kong

Sacrificed Privacy

Embed Size (px)

Citation preview

A NECESSARYEVIL OF TECHNOLOGICAL CONNECTEDNESS

Photo:cc: jepoirrier - https://www.flickr.com/photos/57519914@N00

SACRIFICED PRIVACY:

By:LauraKong

Photo:cc: JasonA.Howie - https://www.flickr.com/photos/40493340@N00

“Thereare currently 1.96 billion social mediausers. This number is growing by about

10 million each year” [1]

Photo:cc:altemark - https://www.flickr.com/photos/24844537@N00

“Teens share a wide range ofinformation about themselves

on social media sites”[2]

WHATARE THEY SHARING?

Photo:cc:apdk - https://www.flickr.com/photos/62337512@N00

71%Post wherethey live[2]

53%Post their

email address[2]

91%Postphotosofthemselves[2]

71%Post their

school name [2]

Photo:cc: Yu.Samoilov - https://www.flickr.com/photos/110751683@N02

“While social mediapreferences are emerging,so are legal and privacy

concerns”.[3]

WHAT PEOPLE DON'T KNOW IS THAT:

EVERYONE IS WATCHINGPhoto:cc: mederndepe - https://www.flickr.com/photos/36540413@N08

Photo:cc: rdy4ever- https://www.flickr.com/photos/9745277@N07

WHO EXACTLY ISWATCHING US?

SO...

"

Photo:cc: ashkyd - https://www.flickr.com/photos/21482825@N03

“Weather channel requested device location an averageof 2,000 times, or every 10minutes, during a study

period”[4]

APPS

RETAILERS

Photo:cc: GiuseppeMilo(www.pixael.com) - https://www.flickr.com/photos/87690240@N03

“GROUPONREQUESTEDONE PARTICIPANT’SCOORDINATES

1,062TIMES IN TWOWEEKS”[4]

SOCIALMEDIA

Photo:cc: RobertS.Donovan- https://www.flickr.com/photos/10687935@N04

“FACEBOOK GIVES A VERY PRIMITIVE OUTLINE OF YOUR SOCIALCIRCLES: WHO YOU KNOW, BUT NOT HOW YOU KNOW THEM OR

HOWWELL” [5]

EMPLOYERS

Photo:cc: JonoMueller - https://www.flickr.com/photos/45939540@N05

“80%OF HR PROFESSIONALS USE ONLINE REPUTATIONINFORMATIONAS PART OF THE HIRING PROCESS”[6]

CYBERPARENTS"ACCORDING TO A STUDY OF 802 PARENTS BY THE PEW

INTERNET PROJECT 42% HAVE SEARCHEDFOR THEIR CHILD'SNAME ONLINE TO SEEWHAT INFORMATION IS OUT THERE”[7]

Photo:cc: GSCSNJ StockPhotos https://www.flickr.com/photos/gscsnj/7882614208/in/photolist

COLLEGE ADMISSIONS

Photo:cc: flazingo_photos - https://www.flickr.com/photos/124247024@N07

“30%OF THE ADMISSIONSOFFICERS SAID THEYHADDISCOVERED INFORMATIONONLINE THAT HADNEGATIVELYAFFECTEDAN APPLICANT 'S PROSPECTS” [8]

Photo:cc: StockMonkeys.com - https://www.flickr.com/photos/86530412@N02

Millennials know theymust give up some

privacy

“However, despite widespread worries aboutinformation leaks, few users take actions thatwould unplug them, such as downloadingprivacy software or adjusting their device’s

settings” [5]

Photo:cc: Thomas Claveirole - https://www.flickr.com/photos/80318369@N00

THEREFORE, PRIVACYBREACHINGSTILL INEVITABLE

Photo:cc: RyanMcGuire-http://pixabay.com/en/worried-girl-woman-waiting-sitting-413690/

“A 2014 PEW SURVEY FOUND THATMORE THAN 90%OF AMERICANS FEEL THEY’VE LOST CONTROL OVER

PERSONAL DATA”[5]

SOWHY COULD THIS BE?

Photo:cc: KAPOOKABABY- https://www.flickr.com/photos/53171524@N00

64%of teenswith

Twitter accountssay that their

tweets are public [9]

15%of of Americans havenever checked socialnetwork privacy andsecurity settings [9]

47%Have a public

profile viewable byanyone [9]

WENEED TO TRY ANDMONITOROUR ACTIONS TO PRESERVE

SOME PRIVACY

Photo:cc: lyudagreen - https://www.flickr.com/photos/48598045@N07

HOWCANWE DO THIS?Disable GPS services until you need it [10]

Guard your date of birth and phone number[10]

Keep work and personal presences separate [10]

Use passwordmanager [10]

Photo:cc: spoony mushroom - https://www.flickr.com/photos/42875348@N00

1234

Photo:cc: Yu.Samoilov - https://www.flickr.com/photos/110751683@N02

However, new wearabletechnology continues tocomplicate the battle againstprivacy…

“And we makebig trade-offsas we become digitally connected

everywhere and anytime” [11]

Photo:cc: FancyCrave1https://pixabay.com/en/smart-watch-apple-technology-style-821557/

“By the end of 2018, there will be 780million wearable devices on the market” [12]

“Alongside personal privacy, company data could beat risk when it’s bared for the world on a watch” [13]

“Untilregulations arein place, therewill beinherentsecurity andprivacy risksinvolved withwearabledevices”.[12]

Photo:cc: Karlis Dambrans :https://www.flickr.com/photos/janitors/14810360010/in/photolist

As more consumers purchasewearables, they exposethemselves to both potentialsecurity breaches and ways thattheir datamay be legally used bycompanies without theconsumer knowing. [12]

Photo:cc: dullhunk - https://www.flickr.com/photos/14829735@N00

In the end, in this age of technology andsocial media, it remains up to the

individual to decide if these losses ofprivacy areworth the gains of

connectedness

“We are forced to operateentirely on TRUST”[14]

Photo:cc: DavidVespoli: https://www.flickr.com/photos/39150660@N04/8709514984/in/photolist

Without having knowledge about how datais being collected and used...

Wo rk s C ited

Works Cited[1]Number ofWorldwide SocialNetworkUsers2010-2018 Statistic.“Statista.N.p.,n.d. Web31May2015.

[2]Madden, Mary,AmandaLenhart, SandraCortesi,Urs Gasser,MaeveDuggan,AaronSmith, andMeredithBeaton."Teens,Social

Media, andPrivacy."PewResearchCenterInternetScience TechRSS.21May2013.Web. 29May2016.

[3]Bowes, Suzanne."FiveWaystoBeaSmartSocialMediaUserinYourJobHunt."TheGlobeandMail.10Jan.2013.Web. 03June

2016.

[4]Dwoskin, Elizabeth."WhereWereYou3MinutesAgo? YourAppsKnow." WSJ. 23Mar.2015.Web. 01June 2016

[5]Dewey,Caitlin. "HowFacebook KnowsWhoAllYourFriends Are,EvenBetterthanYouDo." WashingtonPost.TheWashington

Post, 2Apr.2015.Web.01June 2016.

[6]Schawbel, Dan.“TheReputationEconomy IsComing-Are YouPrepared?” Forbes. ForbesMagazine,n.d. Web. 1June 2016.

[7]Paul, Pamela."Cyberparenting and theRiskofT.M.I." TheNewYorkTimes.TheNewYorkTimes, 04May2013.Web.01June

2016.

[8]Singer,Natasha."Theyloved yourG.P.A.thentheysawyourtweets."NewYorkTimes 10Nov.2013:3(L).AcademicOneFile.

Web. 3June 2016.

[9]"InternetSafety101.org:Statistics." InternetSafety101.org:Statistics.2013.Web. 01June2016.

[10]Lawrence, Jon, andSeanRintel."EightWaystoProtectYourPrivacyOnline |JonLawrenceandSeanRintel."TheGuardian.

GuardianNews andMedia,2013.Web.03June 2016.

[11]Matrix,Sydneyeve. “Module 3:Mobilities”.2016. Presentation.

[12]Maddox, Teena."TheDarkSide ofWearables:HowThey'reSecretlyJeopardizing YourSecurity andPrivacy- TechRepublic."

TechRepublic.Web.03June 2016.

[13]Cole, Samantha."HowTheAppleWatchWillChangeOfficeLife." FastCompany. 12Mar.2015.Web.01June2016.

[14]Golbeck, Jennifer."Trackstar:ThisApp TracksYouWhile YouShop." SlateMagazine.28Jan.2014.Web. 03June 2016.