440 likes | 589 Views
HOME THEATER. Cable companies are experimenting with tracking and target individual households cable boxes;. MARY LOU AND STALKING. Mary Lou does everything on her computer—banking, shopping, social networking. THINGS PEOPLE DO ON LINE. NEW WAYS TO ROB A BANK.
E N D
HOME THEATER • Cable companies are experimenting with tracking and target individual households cable boxes;
MARY LOU AND STALKING • Mary Lou does everything on her computer—banking, shopping, social networking
NEW WAYS TO ROB A BANK • Your bank could be robbed without a stick-up. • Your account does not have to be on-line. • Your ATM card could be copied while in your possession.
FACEBOOK STALKING • You can hold the cursor over the post, click the pencil icon, then click Hide from Timeline or delete it • The new Timeline format exposes your old mistakes • People search back through your old posts. Perhaps there is an embarrassing photo
FACEBOOK APPS MAY STEAL • Read user agreements • Click on the lock icon and see your privacy options • Use www.Facebook.com/privacy score. • Things you thought were private can be accessed through third-party software apps created by others, eg. Words with Friends, Skype, Trip Advisor, Yelp
“LIKE” BUTTONS SPY • Set web browser to block all cookies. • Use a free plug-in to stop Facebook from tracking you. • www.Webhgrah.com/resoures/facebook blocker. • Click on “LIKE” not only to friends, but to Facebook and its advertising partners. • Visit a Web page with a “LIKE” button and Facebook will record your visit even if you don’t click
“SOCIAL READER TOOLS” • If you signed up, delete the app. • Some sites as The Washington Post offer “Social reader” Facebook tools. It will tell your friends what articles you read on the site. They tell everything you read not just the “LIKE” ones.
PHOTO AND VIDEO TAGS • Untag yourself from unflattering photos. • Enable review of all future photos you’re tagged in before they appear on your Timeline. • These tags could let others see you in unflattering situations. • Pictures others post of you can be harmful. • Tags make it easy to identify people they post
FRIENDS AND FRIENDS’ FRIENDS • You may unfriend them. • Click you name, select friends, edit and select “Only Me” from drop-down menu. • Details about you can be exposed by friends’ postings. • Look at friends’ positing and ask if you wish to have that info linked to you.
FAKE FRIENDS • Be aware of your friends. • Remember the ND football player Manti Te’o who thought he had a girl friend—big fraud!
BIG BROTHER • Big brother is not the government. Big brother is Big Business. • No rules for commercial companies as there are for government, military and law enforcement.
SOCIAL NETWORKS • Even if you are restrictive with your privacy settings, social services such as Facebook, Google+ and Twitter follow you beyond their own websites—everywhere there is a Like, Tweet or other recommendation button, the sites can track you
DETAILS ON FACEBOOK • Don’t provide any details on Facebook that could be used to answer security questions about passwords
MESSAGES FROM SOCIAL NETWORKS • Be cautious of messages from social networks as someone could have hacked into a friends account. These are messages that contains links.
MEDIA GIANTS ARE ATTACKED • Little is safe in cyber land • Even big Facebook’s information can and has been compromised
MEDIA ENTRIES MAY HELP OR HINDER • Items on your pages may be seen by others—employers, schools etc. • Your image posted on another’s page. • Help or Hinder is up to you.
WHY TRACKING? • Nothing is free and so web sites are funded by advertising as much as by your payments for services. All those search engines are paid to float things across your screen.
MOBILE DEVICE • Advertising is tallied and delivered through wireless mobile devices. Mobile viewing web sites display advertising—billion dollar a year business
PRIVACY ADVOCATES • Privacy advocates have been working to enact laws to protect privacy. • Hackers and trackers are busy and more sophisticated
THE DATA EXPLOSION • With all the texting, web searches, the various methods of connecting are becoming crowded. Concern is that all data will be encoded and given a priority. This means that the cloud will be reading all of our data and making decisions about priority. OR we may be coding based on a cost scale just like old post office—over night, priority, first class.
ONLINE SHOPPING TIPS • Keep your browser update • Install malware-protection software • On mobile devices stick to apps you know • Look for address-pad padlock symbol • Buy from reputable dealers • Give out as little detail as possible • Never send credit card # over email. • Use online payment services • Know your rights • Use Common sense
ON LINE GAME SYSTEMS • Game systems that require online accounts can potentially expose a player’s personal information to hackers
SHARING ON LINE • 18 – 34 age group does not hesitate to share on line • How do we communicate and share?
SOCIAL MEDIA ISSUES • Postings give cause to other issues such as envy, retaliation, and cyber bulling • Could become a rumor mill which harms others • Cause for depression
SOME TIMES POSTINGS LEAD TO RAGE • Postings especially with the socially vulnerable can have undesirable results. • Postings go viral faster than the old gossip method. • In print leaves little wiggle room.
GOOGLE GLASSES • Google has glasses that appear as regular glasses but connect to the internet and can record audio and video of all that you see and hear.
IT CONTINUES • Need to provide for password usage • Access to documents stored in the cloud • Closing out all accounts