Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

Make your likes visible on Facebook?

Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.

No, thanks

INTERNET PRIVACY

No description
by

Rebeca Funes

on 5 December 2016

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of INTERNET PRIVACY

Internet Privacy
What is it ?
Freedom from damaging publicity, public scrutiny, secret surveillance, or unauthorized disclosure of one’s personal data or information, as by a government, corporation, or individual


PRIVACY

We recognize the idea that with the less private places that people have, the government can have a better security system
Everyone judges you
The lack of privacy and increase of security takes away the private places we have to share ideas without scrutiny.

Social Media Sites are a place with ever growing semi-public space.


Limits Our Freedoms of Speech
Research tells us that security creates vulnerability; that the more we try to surround ourselves with barriers the more we make breaches in them.
Conclusion
Providing the key to our privacy.
Give Power To Others
Providing personal information is a way of giving power to individuals, companies and the government.
The way individuals use our information is really important.
Many professionals steer away from social media because they’re concerned that sharing socially means giving up privacy.


INTERNET PRIVACY
By Leonel De La Cruz, Rebeca Funes, Nathan Soules & Suk Magar
They're keeping track
Social network sites are an example of how private information can become public information.
It becomes easier for hackers, and almost anybody, to steal information off of social media sites.
Vulnerability
Affects Our Values
What are you doing?!
"privacy." Dictionary.com Unabridged. Random House, Inc. 23 Apr. 2015. <Dictionary.com http://dictionary.reference.com/browse/privacy>.
"3 Scary Facts about the Internet." <i>HighTalk</i>. 29 May 2012. Web. 26 Apr. 2015. &lt;http://hightalk.net/2012/05/29/3-scary-facts-about-the-internet/&gt;.
Guillaume, Duval. "Amazing Mind Reader Reveals His 'gift'" <i>YouTube</i>. YouTube, 24 Sept. 2012. Web. 24 Apr. 2015. &lt;"Credit Cardholders, Banks and Privacy." Privacy & American Business. March/April 1996: 1+. SIRS Issues Researcher. Web. 14 Apr. 2015.
Hollings, Ernest. “Stronger Internet Privacy Laws Are Necessary.” The Internet. Ed. James D. Torr. San Diego: Greenhaven Press, 2005. Opposing Viewpoints. Opposing Viewpoints in context. Web. 2 Mar. 2015.
Laas-Mikko, Katrin, and Margit Sutrop. "How Do Violations Of Privacy And Moral Autonomy Threaten The Basis Of Our Democracy?." TRAMES: A Journal Of The Humanities & Social Sciences 16.4 (2012): 369-381. Academic Search Premier. Web. 14 Apr. 2015.
Shaw, Jonathan. "Internet Privacy Is Imperiled." Privacy. Ed. Roman Espejo. Detroit: Greenhaven Press, 2010. Opposing Viewpoints. Rpt. from "Exposed: The Erosion of Privacy in the Internet Era." Harvard Magazine (Sept.-Oct. 2009). Opposing Viewpoints in Context. Web. 26 Feb. 2015.
SMITH, ANNE KATES. "They Are Watching You." Kiplinger's Personal Finance 68.5 (2014): 46-51. Academic Search Premier. Web. 14 Apr. 2015.
Strauß, Stefan, and Michael Nentwich. "Social Network Sites, Privacy And The Blurring Boundary Between Public And Private Spaces." Science & Public Policy (SPP) 40.6 (2013): 724-732. Academic Search Premier. Web. 7 Mar. 2015.
WORKS CITED
How is it true?
Taking a Position
Even though accessing personal information can increase national security, it can cost us the violation of our rights and values or privacy.




It is clear that if the government has no way of observing what citizens do on the Internet, the network would become the perfect place to design crimes in total impunity.
On the other hand...
Can we balance Security and Privacy?
All the information given online can be used in a way most information providers do not realize.
Facts
Look from both perspectives
Everything you do has been saved and archived.
On Facebook. On Twitter. Every place online where you create an account. All that data is saved, archived and later used against you (mostly to serve more targeted advertising – but who knows what they’ll do with that data in the future).
Take one of the biggest offenders: Google. Google tracks your every search and, in fact, has a record of every search you’ve ever made (if you were signed in to the service).


Applications on our phones that hold information are usefull, so... is it good or bad?
It is handy and easy
but
, is a door that leads hackers to you information.
Example
Internet users seem unaware of the dangers of exposing to much information online (some employees have been dismissed because of Facebook posts).
Anything you post only becomes public domain

The facebook Terms of Service
DO
allow facebook a "non-exclusive, transferable, sub-licensable, royalty-free, worldwide license" to use the photos you upload.
Keep in mind SNS have their advantages and disadvantages.
Recent surveys show that though most credit cardholders want the information they provide when applying for credit to remain private, banks that issue credit cards routinely ignore consumers' expectations of privacy.
Let's increase national security.
Prevention of all kind of threat to the public:
From something minor from a thief to a terrorist attack.
Our society deserves the sence of security.
Increases national security.
What happens if we give up privacy?
Consider trust can get erraditaced, leading to many different outcomes
What would happen when doing this?
April 15, 2013 - Twin bomb blasts explode near the finish line of the Boston Marathon
Killing three and wounding at least 264. Suspect Dzhokhar Tsarnaev was charged by the U.S. government with one count of using and conspiring to use a weapon of mass destruction resulting in death and one count of malicious destruction of property by means of an explosive device resulting in death.
September 11, 2001 - Nineteen al Qaeda members hijack four U.S. passenger airliners.
Two are flown into the Twin Towers in New York, one crashes into the Pentagon and another crashes into the Pennsylvania countryside after passengers attempt to wrest control of the aircraft to prevent an attack on the U.S. Capitol. 2,753 people are killed at the World Trade Center site; 184 at the Pentagon; and 40 in Shanksville, Pennsylvania. A total of 2,977 people are killed.
November 5, 2009 - Major Nidal Hassan goes on a shooting rampage at a military processing center at Fort Hood, Texas, killing 13 and wounding 32
Hassan is convicted of 13 counts of murders and 32 counts of attempted murder. He has been given the death penalty. Hassan was not charged with terrorism, but the rampage is considered by many to be a terror incident.
Provide as much informtaion as possible.
If not, dont worry the government already has it.
We can avoid all this, but what's the price?
Religious and political beliefs in a social network can become a problem, considering that anyone can find this information.
Information can be turned against us if an ill-intentioned person uses it. (Blackmailing)
World based on suspicion and trust is no longer honored. Our society doesn't deserve to be treated like criminals.
In our modern societies, information is a weapon.
The decitions we make today will affect tomorrow's generations.
Our actions and behavios will be tracked all day. Stereotyping and categoraizing are problems we are dealing with already.
National security is important but our rights and values are equally important.
A problem involving the stealing of more than 45 million credit-card numbers.
Everybody knows eachother.
Full transcript