1 / 44

HOME THEATER

HOME THEATER. Cable companies are experimenting with tracking and target individual households cable boxes;. MARY LOU AND STALKING. Mary Lou does everything on her computer—banking, shopping, social networking. THINGS PEOPLE DO ON LINE. NEW WAYS TO ROB A BANK.

alaqua
Télécharger la présentation

HOME THEATER

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. HOME THEATER • Cable companies are experimenting with tracking and target individual households cable boxes;

  2. MARY LOU AND STALKING • Mary Lou does everything on her computer—banking, shopping, social networking

  3. THINGS PEOPLE DO ON LINE

  4. NEW WAYS TO ROB A BANK • Your bank could be robbed without a stick-up. • Your account does not have to be on-line. • Your ATM card could be copied while in your possession.

  5. INFORMATION AVAILABILITY

  6. FACEBOOK STALKING • You can hold the cursor over the post, click the pencil icon, then click Hide from Timeline or delete it • The new Timeline format exposes your old mistakes • People search back through your old posts. Perhaps there is an embarrassing photo

  7. FACEBOOK APPS MAY STEAL • Read user agreements • Click on the lock icon and see your privacy options • Use www.Facebook.com/privacy score. • Things you thought were private can be accessed through third-party software apps created by others, eg. Words with Friends, Skype, Trip Advisor, Yelp

  8. “LIKE” BUTTONS SPY • Set web browser to block all cookies. • Use a free plug-in to stop Facebook from tracking you. • www.Webhgrah.com/resoures/facebook blocker. • Click on “LIKE” not only to friends, but to Facebook and its advertising partners. • Visit a Web page with a “LIKE” button and Facebook will record your visit even if you don’t click

  9. “SOCIAL READER TOOLS” • If you signed up, delete the app. • Some sites as The Washington Post offer “Social reader” Facebook tools. It will tell your friends what articles you read on the site. They tell everything you read not just the “LIKE” ones.

  10. PHOTO AND VIDEO TAGS • Untag yourself from unflattering photos. • Enable review of all future photos you’re tagged in before they appear on your Timeline. • These tags could let others see you in unflattering situations. • Pictures others post of you can be harmful. • Tags make it easy to identify people they post

  11. FRIENDS AND FRIENDS’ FRIENDS • You may unfriend them. • Click you name, select friends, edit and select “Only Me” from drop-down menu. • Details about you can be exposed by friends’ postings. • Look at friends’ positing and ask if you wish to have that info linked to you.

  12. FAKE FRIENDS • Be aware of your friends. • Remember the ND football player Manti Te’o who thought he had a girl friend—big fraud!

  13. BIG BROTHER • Big brother is not the government. Big brother is Big Business. • No rules for commercial companies as there are for government, military and law enforcement.

  14. SOCIAL NETWORKS • Even if you are restrictive with your privacy settings, social services such as Facebook, Google+ and Twitter follow you beyond their own websites—everywhere there is a Like, Tweet or other recommendation button, the sites can track you

  15. DETAILS ON FACEBOOK • Don’t provide any details on Facebook that could be used to answer security questions about passwords

  16. MESSAGES FROM SOCIAL NETWORKS • Be cautious of messages from social networks as someone could have hacked into a friends account. These are messages that contains links.

  17. MEDIA GIANTS ARE ATTACKED • Little is safe in cyber land • Even big Facebook’s information can and has been compromised

  18. MEDIA ENTRIES MAY HELP OR HINDER • Items on your pages may be seen by others—employers, schools etc. • Your image posted on another’s page. • Help or Hinder is up to you.

  19. WHY TRACKING? • Nothing is free and so web sites are funded by advertising as much as by your payments for services. All those search engines are paid to float things across your screen.

  20. SOCIAL GRAPHS FOR PREDICTIONS

  21. MOBILE DEVICE • Advertising is tallied and delivered through wireless mobile devices. Mobile viewing web sites display advertising—billion dollar a year business

  22. PRIVACY ADVOCATES • Privacy advocates have been working to enact laws to protect privacy. • Hackers and trackers are busy and more sophisticated

  23. THE DATA EXPLOSION • With all the texting, web searches, the various methods of connecting are becoming crowded. Concern is that all data will be encoded and given a priority. This means that the cloud will be reading all of our data and making decisions about priority. OR we may be coding based on a cost scale just like old post office—over night, priority, first class.

  24. ONLINE SHOPPING TIPS • Keep your browser update • Install malware-protection software • On mobile devices stick to apps you know • Look for address-pad padlock symbol • Buy from reputable dealers • Give out as little detail as possible • Never send credit card # over email. • Use online payment services • Know your rights • Use Common sense

  25. ON LINE GAME SYSTEMS • Game systems that require online accounts can potentially expose a player’s personal information to hackers

  26. SHARING ON LINE • 18 – 34 age group does not hesitate to share on line • How do we communicate and share?

  27. SHARING INFO ON LINE

  28. SOCIAL MEDIA ISSUES • Postings give cause to other issues such as envy, retaliation, and cyber bulling • Could become a rumor mill which harms others • Cause for depression

  29. SOCIAL MEDIA AND RELSTIONSHIPS

  30. SOME TIMES POSTINGS LEAD TO RAGE • Postings especially with the socially vulnerable can have undesirable results. • Postings go viral faster than the old gossip method. • In print leaves little wiggle room.

  31. GOOGLE GLASSES • Google has glasses that appear as regular glasses but connect to the internet and can record audio and video of all that you see and hear.

  32. CYBER SPACE AFFECTS MILITARY ACTIONS

  33. IT CONTINUES • Need to provide for password usage • Access to documents stored in the cloud • Closing out all accounts

  34. DIGITAL LEARNING

  35. STALKERS ARE EVERY WHERE. CAN YOU FIND THEM?

More Related