#EID100 Final: Online Privacy and Security

Privacy and Security

OCKTO:

The online world is full of information, questions and answers, and has become apart

of out social lives. Because of all the ongoing activity the online world has to offer,

there are some dangers and risks when becoming part of the digital world.

Whether you have an online account or not, pictures and information of you are

automatically shared on the Internet. Either you or someone you know has uploaded

information about you.

Being aware of what you put online is essential. If you are not careful of what you put

online, there is a chance that problems can arise, such as identity theft.

Also knowing how you put information online is important, as people often forget

how to use privacy settings wisely. Remember, social media accounts have privacy

settings on which you can fix under your standards.

Whether you are a student, a teacher, a parent, or a worker—anyone can be affected

by online threats due to using the online world irresponsibly.

This can potentially hurt your education, career and status on both the online world

and real world.

Students in high school are affected the most, as they have been growing in the digital

age. There has been no other generation so technology immersed, and therefore, high

school students should understand how to be responsible online.

AMANDA:

Here are four ways to keep yourself safe online:

First of all, do not post confidential information

In every social media website, it is important not to expose yourself too much. Putting

your phone number, bank information and address, for example, can higher your

chances in having identity theft. Even photos can be a way to steal your identity, so

keeping your photos private or sharing them to people you trust is acceptable. Other

confidential information that should not be shared online is student information, such

as your university login or bank loan information. High school students should be

prepared for college and university, as they are entering a whole new online world, on

which laptops are often used, along with an online learning system.

Second, Do not be specific with location check-Ins

Protecting where you are is also protecting where you online identity is. When you go

out to places and need wifi, they often ask you to check in. If possible, skip this step,

or go somewhere else where you don’t need to check in. When you check into a

location, this can lead to letting social media platforms know—which can lead to

other people knowing. This is another way on which online identity can be stolen, so

be careful.

Social media analyst Brad Hines advice, “It is usually wise to do little sharing of

where you are if you are by yourself, or have left your home by itself.”

Third, Never Rely on Privacy Settings 100% and Use strong passwords

Although privacy settings are great, and are often improving, do not feel vulnerable

and trust them 100%. Sometimes these privacy settings can be complicated and

information may be misinterpreted.

Social media analyst of SnapApp Andrew Moravick advice, “Student should never

rely on privacy settings over good judgment.” “If you don’t want something to be seen,

don’t post it on the Internet.”

Having a strong password is important. When creating social media accounts, there is

a meter to show how strong your password is. The stronger the password, the higher

the meter will get.

One of the ways hackers get into your account is just by guessing the password.

Therefore, having a strong password is essential.

Lastly, avoid online viruses

Viruses are extremely dangerous and can harm your computer. This can also harm

your online identity. The reason viruses happen could also be due to hackers trying to

steal your accounts. Updating your hardware devices can clean out your viruses, or

buying anti-virus software can also help keep your devices healthy.

Students in high school often disregard this last step, however, this is one of the most

important ways to keep yourself safe online.

Social media can be safe and fun if you remind yourself these rules. The online world

can be an extraordinary place, however, safely comes first regardless.

Module 5: Tweetdeck

Screen Shot 2014-10-03 at 12.36.54 PM

Current Information
Tweetdeck is an app and a  search engine that is blended with Twitter. Tweetdeck provides up to date information on the latest trends, Twitter accounts and more.
I searched up box cloud storage and #cloudstorage, and a lot of current information popped up. As you can through my screen shot, the most recent tweets are 50 minutes and 33 minutes. There is about an hour time break between tweets. Box cloud storage is based on Module 3.
What I found interesting in my research is that Toronto Concerts did not have as much up to date info as I expected to–I thought it would have more than box cloud storage. Instead, it had about 10 hours difference. #torontomusic, however, has about an hour per tweet.

Search Engines
Tweetdeck is also a search engine to find the latest trends and up to date news. Just by clicking on the little magnifying glass, you can search endlessly, and different accounts will pop up, as well as hashtags. Tweetdeck also saves your search history, because when I tried to search something difference, the information has been saved.
So searched up the box cloud storage, and references to the actual business came up.
Screen Shot 2014-10-03 at 12.36.54 PM
So along with the actual company, other tweets came up that had the words box, cloud and storage in it.
The hashtag I chose was #cloudstorage, and I did not intend to find information about the company Box. However, other relevant information popped up.
With my other searches, such as Toronto Concerts and #torontomusic, relevant information came up. Furthermore, there seems to be hashtags that popped up within Toronto Concerts and #torontomusic, probably due to the popularity.

Module 4: Lightbeam

screen-shot-2014-10-01-at-3-17-26-pm

This is what my Lightbeam graph looked like after I did some browsing.
Relating to lecture 4, the topic of privacy relates to my findings. It almost seems like this is an invasion of privacy, as Lightbeam knows what websites I have been browsing, such as WordPress and Facebook.
Security is also a topic that relates to my findings. The following areas are presented in Lightbeam:
Visited Sites
Third Party Sites
Connections
Watched Sites
Blocked Sites
Cookies
Lightbeam also allows you to filter out the sites, from a daily tracking to a weekly tracking.
It seems that Lightbeam is a lot like a “stalker” in my opinion. Not only did it track down the sites I was searching, narrowing down my search using the toggle tools.
However, Lightbeam is an excellent tool for me if I want to check out my search history and what led to which websites I went on…(there are arrows that lead from one site to another).
Lightbeam is also reminding me to protect myself online, because I can check what I have been searching. Part of what we learned in class is to use Chrome and Firefox for online protection. Lightbeam is connected to Firefox, and therefore, it is generally a safe tool to use. I have used Safari in the past, and I was not able to download Lightbeam properly. This is telling me that Safari may not be a safe browser to use, comparing it to Firefox.
The toggle tools are also up to the user to use it. I can click on whether or not I want Lightbeam to track cookies, blocked sites etc.
I have mixed opinions with using Lightbeam. Although it may be a bit “nosey” with what I am searching, it is also a great search history tool. I may not be able to search the things I wanted to search, but that means I know how to protect myself properly using Lightbeam.

Module 3- Project Proposal

By Amanda Huang and Ockto Lee

What we plan to do is explain the importance of privacy and security of social media to high school students. Our approach is to use Prezi and Youtube as a way to communicate our ideas as it is a clear way, and the high school students are familiar with Prezi and Youtube.

Module 2: Google

Using Google:

  1. How would you search for an exact word or phrase?
    Remembering just a bit of a quote or line from a song may help you find the exact words and phrases. Type in what you remember and you will most likely find it.
    “search”
  2. How would you search for something on a specific site?
    Type in the business or domain, such as .gov or .edu, along with what you want to search for.
    “site:”
  3. How would you correctly search for a definition?
    Type in words such as define or definition along with the word. Google itself has a built in dictionary, which is a trusting source.
    “define:”
  4. How would you search for a specific product available within a specific price range?
    Using two periods in between the numbers along with the product you are looking for.
    “$2..$15”
  5. How would you search for a specific filetype?
    Typing in what you are searching for alone with the filetype such as PDF or DOC.
    “word pdf”
  6. How would you include or ignore words in your search?
    Using the word “OR” to specify your options or using a dash to ignore words.
    “OR” “word-word”
  7. How would you find related pages?
    After searching what you need, scroll down the where it says “Searches related to…” and there you will find many related pages.
  8. How would you find pages containing one of several words you are interested in, though not all of them?
    Typing in the specific words you are interested in and using the dash to ignore any words. If it is from Google books, you can type in the specific words and it will be highlighted for you. 
  9. How would you find the time in another country?
    Typing in the country and then time or current time. Google will provide information on the current time, time zone and current date.
    “Country time”
  10. How would you find out how many Egyptian pounds you get for $20 Canadian dollars?
    Using the words currency conversion can lead you to sites that can help convert the money. Or simply typing in “Egyptian pounds to Canadian dollars” will automatically lead you to the Google conversion with 1 pound, and you can easily adjust the numbers.
    google-logo-874x288
  11. Resources:
    http://googleblog.blogspot.ca/
    https://support.google.com/websearch/answer/136861?hl=en

Module 1: Digital Etiquette

EID100

Part of having presentable digital etiquette is to draw a borderline between what is being posted privately and what is being posted publicly. For instance, you don’t want to post pictures of you having too much fun at a bar on Facebook, where your future employers can see…
Private/Public Information: Professional Etiquette
It is common for employers to do a quick online profile search of you these days, so by presenting yourself in a good manner will reduce the risk of problems. As users, we have the power to control our privacy settings, and it is so important to set those boundaries, because you don’t want the risk of potentially losing a job.
Private/ Public Information: Family and Friends
Even for family and friends, you may want to set the boundaries of public and private information that is being shared digitally. For example, if there are kids on your Facebook friend list, you don’t want to be cussing online…
Taking advantage of private messaging can again, reduce the risk of problems.
Cyber Bullying
Be careful of what you post and what you say online, as it can spread in an instant. This includes the rise of cyber bullying–digital etiquette is obviously not acknowledged at all, and this hurts both the bully and the victim.

These are just a few factors of how digital etiquette affects every online user. Nowadays, it seems that everyone has an online identity. Keep digital etiquette in mind when posting things online.

Man_with_laptop_blog1-200x300

Works Cited/Resources:
http://www.mixchatter.com/category/general/page/3/

https://www.dosomething.org/facts/11-facts-about-cyber-bullying