710 likes | 836 Views
QUESTIONING YOUR PRIVACY. Privacy. Celebrities & the Internet. Leaking Personal Information…OH MY!. Protecting Privacy. Privacy & the Law. TRUE or FALSE. Privacy. Celebrities & the Internet. Leaking Personal Information…OH MY!. Protecting Privacy. Privacy & the Law.
E N D
Celebrities & the Internet
Leaking Personal Information…OH MY!
Protecting Privacy
Privacy & the Law
TRUE or FALSE
Privacy Celebrities & the Internet Leaking Personal Information…OH MY! Protecting Privacy Privacy & the Law True or False $100 $100 $100 $100 $100 $100 $200 $200 $200 $200 $200 $200 $300 $300 $300 $300 $300 $300 $400 $400 $400 $400 $400 $400 $500 $500 $500 $500 $500 $500
The right to be left alone and the right to control information about ourselves are all definitions of..
What is Privacy?
According to Ruth Gavison there are three terms that define different aspects of privacy.
What are secrecy, solitude and anonymity?
This term is a composite of not merely what others see, but rather of what we think, what we believe, the values we hold and how we define ourselves.
What is Identity?
A method of protecting one’s identity and privacy by restricting personal information from public view.
What is Anonymity?
Limiting information known about an individual.
What is secrecy?
According to Boorstin, these people are “known for their wellknowness” According to Boorstin, these people are “known for their wellknowness”
What are Celebrities?
These help us to know which parts of ourselves we should disclose to others and which parts we should keep private
What are Boundaries?
According to James Houran, “ (blank) may be the gasoline fueling America's celebrity obsession.”
What is Technology?
Someone who others want to emulate.
What is a Role Model?
Maintaining anonymity through the creation of a “nym” or alternate identity.
What is pseudonymity?
This can enable an Internet website to record comings and goings without the knowledge or consent of a person.
What is a Cookie?
The theft of information from a wireless device through a Bluetooth connection.
What is BlueSnarfing?
The greatest form of wireless privacy invasion.
What is E-mail Spam?
The act of recreating a clone of a commercial website-- typically a banking, investment firm or retail website.
What is a Phishing Scam?
A software program which imitates the behavior of a human.
What is a Bot?
Software that can sort out advertisements, and notify users if web- bugs, scumware or cookies are sent to their computers.
What are Filters?
An electronic security barrier that prevents outsiders from getting into a computer or network.
What is Firewall?
The transfer of electronic information into a secret code.
What is Encryption?
Stops Spyware from monitoring your PC activities and disrupting your online experience.
What is Spy Sweeper?
Acting like a mini computer, this can hold information such as a key to a building, money in electronic format, personal identification, and other personal information.
What is a Smart Card?
Article 12 of "_____" protects the right to privacy.
What is the Universal Declaration of Human Rights?