1 / 71

QUESTIONING YOUR PRIVACY

QUESTIONING YOUR PRIVACY. Privacy. Celebrities & the Internet. Leaking Personal Information…OH MY!. Protecting Privacy. Privacy & the Law. TRUE or FALSE. Privacy. Celebrities & the Internet. Leaking Personal Information…OH MY!. Protecting Privacy. Privacy & the Law.

dom
Télécharger la présentation

QUESTIONING YOUR PRIVACY

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. QUESTIONING YOUR PRIVACY

  2. Privacy

  3. Celebrities & the Internet

  4. Leaking Personal Information…OH MY!

  5. Protecting Privacy

  6. Privacy & the Law

  7. TRUE or FALSE

  8. Privacy Celebrities & the Internet Leaking Personal Information…OH MY! Protecting Privacy Privacy & the Law True or False $100 $100 $100 $100 $100 $100 $200 $200 $200 $200 $200 $200 $300 $300 $300 $300 $300 $300 $400 $400 $400 $400 $400 $400 $500 $500 $500 $500 $500 $500

  9. The right to be left alone and the right to control information about ourselves are all definitions of..

  10. What is Privacy?

  11. According to Ruth Gavison there are three terms that define different aspects of privacy.

  12. What are secrecy, solitude and anonymity?

  13. This term is a composite of not merely what others see, but rather of what we think, what we believe, the values we hold and how we define ourselves.

  14. What is Identity?

  15. A method of protecting one’s identity and privacy by restricting personal information from public view.

  16. What is Anonymity?

  17. Limiting information known about an individual.

  18. What is secrecy?

  19. According to Boorstin, these people are “known for their wellknowness” According to Boorstin, these people are “known for their wellknowness”

  20. What are Celebrities?

  21. These help us to know which parts of ourselves we should disclose to others and which parts we should keep private

  22. What are Boundaries?

  23. According to James Houran, “ (blank) may be the gasoline fueling America's celebrity obsession.”

  24. What is Technology?

  25. Someone who others want to emulate.

  26. What is a Role Model?

  27. Maintaining anonymity through the creation of a “nym” or alternate identity.

  28. What is pseudonymity?

  29. This can enable an Internet website to record comings and goings without the knowledge or consent of a person.

  30. What is a Cookie?

  31. The theft of information from a wireless device through a Bluetooth connection.

  32. What is BlueSnarfing?

  33. The greatest form of wireless privacy invasion.

  34. What is E-mail Spam?

  35. The act of recreating a clone of a commercial website-- typically a banking, investment firm or retail website.

  36. What is a Phishing Scam?

  37. A software program which imitates the behavior of a human.

  38. What is a Bot?

  39. Software that can sort out advertisements, and notify users if web- bugs, scumware or cookies are sent to their computers.

  40. What are Filters?

  41. An electronic security barrier that prevents outsiders from getting into a computer or network.

  42. What is Firewall?

  43. The transfer of electronic information into a secret code.

  44. What is Encryption?

  45. Stops Spyware from monitoring your PC activities and disrupting your online experience.

  46. What is Spy Sweeper?

  47. Acting like a mini computer, this can hold information such as a key to a building, money in electronic format, personal identification, and other personal information.

  48. What is a Smart Card?

  49. Article 12 of "_____" protects the right to privacy.

  50. What is the Universal Declaration of Human Rights?

More Related