Loading presentation...

Present Remotely

Send the link below via email or IM


Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.


Make your likes visible on Facebook?

Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.

No, thanks

EID100 2013 - Module 4: Privacy, Security & Intellectual Property

No description

Guy Hoskins

on 4 February 2015

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of EID100 2013 - Module 4: Privacy, Security & Intellectual Property

Privacy, Security & Intellectual Property
Big Data
Always had more information - now, more data.
I can haz identity
Enable the web as we know it
Authentification vs third party
Data brokers, segments & real time ad auctions
Ad block/Do Not Track/Ad Choices
Social privacy; data privacy; 'coveillance'
We sign privacy away in Terms & Conds
Canada: PIPEDA
Premature babies to failing brakes
Correlation not causation
Business vs social imperatives
Data breaches
"You have one identity… The days of you having a different image for your co-workers and for the other people you know are probably coming to an end pretty quickly… Having two identities for yourself is an example of a lack of integrity”
Erving Goffman - 'The Presentation of Self in Everyday Life'
Pseudonymity/anonymity inauthentic? Really?
Performative identity
Be authentic, just be selective too
Intellectual Property
Protecting innovators?
IP + digital = crisis
Digital copies = exact replica & $0 cost
Worms/viruses/trojan horses...
Phishing/spoofing/ID theft
Deep web/darknet/Tor
Cyber bullying/stalking
Protecting yourself online:
Surf with Chrome/Firefox
Use anti-virus
Never open email from unknowns
Use 'passphrase'
Search with DuckDuckGo
Encryption software

Full transcript