Learning to Hide in the Digital Age

13
Learning to Hide in the Digital Age

description

Learning to Hide in the Digital Age. Can you completely remove your online identity?. Online Privacy is Dead. Identity Theft Videos. See how easily freaks can take over your life Amazing mind reader reveals his 'gift '. We want our online privacy. - PowerPoint PPT Presentation

Transcript of Learning to Hide in the Digital Age

Just Delete Me!

Learning to Hide in the Digital Age

Signs (2002)1Can you completely remove your online identity?

Online Privacy is Dead

http://money.cnn.com/2013/10/17/technology/online-privacy/ ByJose Pagliery@Jose_PaglieryOctober 17, 2013: 9:07 AM ET3Identity Theft VideosSee how easily freaks can take over your lifeAmazing mind reader reveals his 'gift'

https://www.youtube.com/watch?v=Rn4Rupla11M4We want our online privacy86% of Internet users have taken steps online to remove or mask their digital footprints55% of Internet users have taken steps to avoid observation by specific people, organizations, or the government59% of Internet users do not believe it is possible to be completely anonymous online, while 37% of them believe it is possible.68% of internet users believe current laws are not good enough in protecting peoples privacy online24% believe current laws provide reasonable protections.

Who is tracking us online?

Why are you being tracked online?Providing you a better user experience.Inexpensive and plentiful storage and power(Big Data)National and Security IntelligenceIdentity theft:Identity cloning and concealmentCriminal identity theftSynthetic identity theftMedical identity theftChild identity theftWhere are you being trackedFacebook and Social NetworksGPS (Smartphones and tablets)EmailSearch EnginesCookiesAutomatic License Plate ReadersSurveillance Cameras and Closed-Circuit TelevisionWhen are you being tracked online?When you turn on your computer/smartphone/tablet and until you turn it off.What is being trackedEvery click, tap, and swipe you make on the Internet is being tracked, not just by your browser but by many of the companies that connect that click, tap, and swipe to your IP address -- then to your name. And that data is sold to the highest bidder.How your data is usedRelevant Search Results - Good!Recommendations - Good!Info based on user action - Good!Excessive Ad Retargeting - Bad!Identity Theft Ugly!Selling data Ugly!

The Delicate Balance Between Convenience and SecurityLibguide

Thank You!!Questions?!

Wanda Huffaker [email protected] Irving - [email protected] Roche - [email protected] Intellectual Freedom Committee WebsiteULA-IFC on Facebook