SlideShare a Scribd company logo
The Deception of Privacy
The Truth About a Plugged in Life
By Cynthia Beneteau
Photo Source: Kristin Flour “Secret” Unsplash https://unsplash.com/collections/327093/privacy-kit?photo=BcjdbyKWquw
Prior to the digital age photos were typically just
shared with a handful of people, like friends and
family. Now, people take more photos in 2
minutes than the entire amount of all the photos
that existed 150 years ago. [2]
The top three places photos are uploaded to are:
Snapchat: 8796 photos per second
What's App : 8102 photos per second
Facebook :4501 photos per second [3]
Photo Source : Gratisography http://colorlisa.com/pictures/105_1.jpg
Today’s youth think of privacy
differently than adults do. They
care more about controlling who
is tracking them digitally, who is
seeing what they post and what
people think when seeing them.
The online experience for young
people is a social one. If
something is posted they do not
like, they are more likely to worry
about hiding the content from
their friends or family, than to
worry about teachers or potential
employers seeing it. They care
more about their reputation than
the actual information they are
posting[4]
Photo Source: http://www.gratisography.com/pictures/303_1.jpg
Parents need to consider the
long term reach of the digital
information they are sharing
about their children. A “cute”
video of a child doing something
silly, can come back to haunt that
same child when they become a
teenager or adult.
Even innocent stories shared by
a parent may be a potential
source of embarrassment to a
child later on. Children, youth and
teens should be able to control
their digital identities. There is a
balance that can be reached, a
parent can share information, but
limit identifying characteristics so
that it protects their children,
but they can still share [6]
Photo source: https://pixabay.com/en/desperate-sad-depressed-feet-hands-2293377/
72% of Parents are worried about their children’s online interactions with strangers or predators
that could harm them. Two major concerns are sexting and cyberbullying. Kids can be horrible to
each other and some are even using the internet to create fake identities of other children. They then
pose as the child and fabricate information about them. Parents are more than willing to potentially
embarrass their child if it will help to keep them safe. [7]
Photo Source https://pixabay.com/en/privacy-policy-spy-espionage-nsa-1624400
A Study done by “Young Canadians in
a Wired World” has indicated more
privacy education in schools and
homes is needed. According to the
study, students have limited
comprehension of password
sharing, privacy policies, policies
around data collection and geo-
location services
68% of Students incorrectly believe,
that a website will not share their
personal information if they have a
privacy policy [5]
Photo Source : https://www.pexels.com/photo/finger-print-on-enter-key-of-keyboard-163017/
“ We make big trade-offs as we become digitally
connected everywhere and anytime” causing increased
concerns with security and privacy [1]
John Palfrey and Urs Gasser, Authors of Interop. The Promise and Perils of Highly Interconnected Systems
Photo Source : https://static.pexels.com/photos/160709/raccoon-animal-animal-world-wildlife-photography-160709.jpeg
Over a two week period, Carnegie Mellon University Computer
Scientist’s ,did a study which determined that quite a few popular
Android apps collect GPS coordinates within 50 metres of where the
user is. This happens about 6200 times, which is equivalent to about
every three minutes [8]
Photo Source : https://www.pexels.com/photo/text-on-information-sign-258490/
The Carnegie Mellon study also uncovered that the Weather Channel app accesses location
information from it’s users every 10 minutes, or 2000 times in a two week period.[8]
Photo Source: https://www.pexels.com/photo/reflection-of-building-on-body-of-water-at-daytime-166360
When users in the Carnegie study found out how much personal data apps were
collecting they tried to restrict the apps from collecting it. Researchers tried to help by
sending daily “privacy nudges” to participants letting them know how many times
apps were collecting their data [8]
Operating updates ,since the study was conducted ,have now removed the software
that researchers used to see requests for personal information and the ability to send
“privacy nudges “ has also been disabled [8]
Photo Source: https://www.pexels.com/photo/london-new-york-tokyo-and-moscow-clocks-48770/
Facebook is able to know who your friends and acquaintances are
even if you lie about all of your personal information when signing
up [9]
Photo Source : https://www.pexels.com/photo/photo-of-2-children-walking-23971/
Facebook uses Network Science a complex
academic field, which uses mapping
algorithms, that takes information you provide
or give permission for them to access when
you sign up. It then uses it to determine the
structure of your social network. This data is
analyzed and allows them to accurately predict
people you are likely to know and even people
you will likely know in the future. [9]
Photo Source : https://www.pexels.com/photo/hand-thumbs-up-thumb-black-and-white-8252/
Samsung Smart TV
owners are susceptible
to spying. According to
“WikiLeaks” documents
a program named
“Weeping Angel” can
make Samsung’s Smart
TVs appear to be turned
off ,when they really are
not. This enables the TV
in essence, to work like a
bug and record
conversations in the
room. These are then
sent to a hidden CIA
server. Michael Hayden,
ex CIA director, thinks
this is a wonderful
capability because there
are “ bad people in the
world that have
Samsung TVs “ [ 10]
Photo Source: https://www.pexels.com/photo/full-frame-shot-of-eye-251287/
Samsung’s Smart TV Privacy Policy States "Please be aware that if your spoken words include
personal or other sensitive information, that information will be among the data captured and
transmitted to a third party."
A lot of Samsung TVs need users to actually click a microphone button before the voice
commands work, but on models such as PN60F8500 the microphone is always listening. [10]
Photo source : https://www.pexels.com/photo/night-music-band-microphone-9137
Web cams can introduce a number
of possible privacy breaches in our
homes, nurseries, on our laptops,
computers, tablets or anywhere we
have online cameras [11]
Photo source: https://www.pexels.com/photo/silver-imac-near-white-ceramic-kettle-205316/
The frightening idea of someone watching every movement your baby makes
is a very real possibility. The lack of the most basic security features are
making popular internet connected baby monitors vulnerable to hackers [11]
Photo Source: https://www.pexels.com/photo/newborn-child-feed-89695
Once a hacker has breached
one connected device, anything
connected to that Wi-Fi network
can potentially be accessed. [11]
Photo Source: https://www.pexels.com/photo/low-angle-photo-of-building-under-sky-69080/
The use of cameras in public spaces is
becoming more common place. Cameras
are also now on buses, subways, in ATM
machines, and outside gas stations or
grocery stores. [12]
Photo Source : https://www.pexels.com/photo/black-and-white-streets-bridge-jacket-70402
/
Photo Source: https://www.pexels.com/photo/5th-avenue-america-apple-store-architecture-279166
With the advent of
Google Street view it is
now possible to view
someone’s home,
business or even their
vehicle from the comfort
of your living room
The expectation of
privacy in the digital
age may no longer be
an option. Perhaps we
need to redefine what
privacy means and the
repercussions of this
new interpretation.
Photo Source: https://www.pexels.com/photo/butterflies-black-and-white-9159/
Sources:
1. Matrix, Sidneyeve “ John Palfrey and Urs Gasser Quote” Module 3 Slides Film 260 Queens University May 2017.
2. Eveleth, Rose. "How Many Photographs Of You Are Out There In The World?". The Atlantic. N.p., 2017. Web. 2 June 2017.
https://www.theatlantic.com/technology/archive/2015/11/how-many-photographs-of-you-are-out-there-in-the-world/413389/
3. Morrison, Kimberlee, and Kimberlee Morrison. "How Many Photos Are Uploaded To Snapchat Every Second?". Adweek.com. N.p., 2017. Web. 2
June 2017.http://www.adweek.com/digital/how-many-photos-are-uploaded-to-snapchat-every-second/
4. "Online Privacy, Online Publicity: Youth Do More To Protect Their Reputation Than Their Information | Mediasmarts". Mediasmarts.ca. N.p.,
2017. Web. 2 June 2017. http://mediasmarts.ca/blog/online-privacy-online-publicity-youth-do-more-protect-their-reputation-their-information
5. Bogart, Nicole. "Young Canadians Lack Understanding Of Online Privacy: Study". Global News. N.p., 2017. Web. 2 June 2017.
http://globalnews.ca/news/1159724/young-canadians-lack-understanding-of-online-privacy-study/
6. Dell’Antonia,Kj “ Don’t post about me on Social Media, Children say” The New York Times March 2017
https://well.blogs.nytimes.com/2016/03/08/dont-post-about-me-on-social-media-children-say/?_r=0
7. Paul, P. (2013, May 5). Cyberparenting and the Risk of T.M.I. New York Times, p. 8(L). Retrieved from
http://go.galegroup.com.proxy.queensu.ca/ps/i.do?p=AONE&sw=w&u=queensulaw&v=2.1&it=r&id=GALE%7CA328694536&asid=ed444bf722dd5
54a00a728a96a4737f2
8. Dwoskin, E. “WSJ.D technology: Apps track users -- once every 3 minute”s. Wall Street Journal Mar 24 2015 . Retrieved from https://search-
proquest-com.proxy.queensu.ca/docview/1665403896?accountid=6180
9. Dewey, Caitlin “How Facebook knows who all your friends are, even better than you do”. Washingtonpost.com. April2 2015 Retrieved from
http://go.galegroup.com.proxy.queensu.ca/ps/i.do?p=AONE&sw=w&u=queensulaw&v=2.1&it=r&id=GALE%7CA408035312&asid=97bdc5e16299b
f6c66dcb7543481dace
10. "If You Have A Smart TV, Take A Closer Look At Your Privacy Settings". BuzzFeed. N.p., 2017. Web. 2 June 2017.
https://www.buzzfeed.com/nicolenguyen/here-are-the-privacy-settings-you-should-look-at-if-you-have?utm_term=.nqkg6Z0A7N#.cidNjp56Ov
11. "Is Your Baby Monitor Safe? Cybersecurity Firms Says Many Can Be Hacked". CBC News. N.p., 2017. Web. 2 June 2017.
http://www.cbc.ca/news/business/several-baby-monitors-vulnerable-to-hacking-cybersecurity-firm-warns-1.3213046
12. Alcoba, Natalie. "Growing Number Of CCTV Surveillance Cameras Outside City Core Dismays Privacy Advocates". National Post. N.p., 2017.
Web. 2 June 2017.
http://news.nationalpost.com/toronto/growing-number-of-cctv-surveillance-cameras-dismays-privacy-advocates
Photo Source : https://www.pexels.com/photo/full-frame-shot-of-metal-332834

More Related Content

PDF
Overcoming Distraction in the Digital Age
PDF
Vacationing For Likes
PDF
Digitally Distracted
PDF
Clicktivism: Action Past A Click
PDF
Flipbook parenting and internet
PDF
Social media trend the rise of visual social media-2
PDF
Social Media: The Power to Make an Impact
PDF
Social Conscience
Overcoming Distraction in the Digital Age
Vacationing For Likes
Digitally Distracted
Clicktivism: Action Past A Click
Flipbook parenting and internet
Social media trend the rise of visual social media-2
Social Media: The Power to Make an Impact
Social Conscience

What's hot (20)

PDF
Social Media Career Assignment
PDF
IS SLACKTIVISM REALLY AS BAD AS THEY SAY IT IS? | Karen Clement
PDF
Film260 Flipbook
PDF
Film260 digitalflipbookshannongrist
PDF
Social Media and Depression
PDF
Film 260 flipbook
PDF
Privacy hazard
PDF
Why choose m commerce
PDF
Social media, friend or foe?
PDF
Social Media Is Not Social
PDF
260 flipbook
PDF
Your posts are not private
PDF
FILM260 Flipbook Assignment
PDF
Digital selfie
PDF
Cheng jessica flipbook_film260
PDF
Helicopter Parent - Flipbook
PDF
Oversharing as Modern Art
PDF
Desensitization
PDF
Food for Thought, and Instagram
PDF
Not so social
Social Media Career Assignment
IS SLACKTIVISM REALLY AS BAD AS THEY SAY IT IS? | Karen Clement
Film260 Flipbook
Film260 digitalflipbookshannongrist
Social Media and Depression
Film 260 flipbook
Privacy hazard
Why choose m commerce
Social media, friend or foe?
Social Media Is Not Social
260 flipbook
Your posts are not private
FILM260 Flipbook Assignment
Digital selfie
Cheng jessica flipbook_film260
Helicopter Parent - Flipbook
Oversharing as Modern Art
Desensitization
Food for Thought, and Instagram
Not so social
Ad

Similar to The Deception of Privacy, The Truth About a Plugged in Life (20)

PDF
Is Online Privacy a Thing of the Past?
PDF
Film 260 flipbook
PDF
Smartphones with Smarter Apps
PDF
Flipbook.pdf
PPTX
Technology & Internet Use by Baby Boomers & Beyond
PDF
Error: Your Life Has Been Hacked
PPTX
Should Kids Use Digital Technology?
PDF
Snapchats Linger for Longer than 10 Seconds
PPTX
2012bruneluniversity 120615094336-phpapp01
PDF
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
PDF
L017146571
PDF
The Evolution of Technology & Etiquette
PDF
It's a Public World, After All
PPT
Tree incident shows value of remote working
PDF
The New Digital You
PDF
Bread Crumbs: How We are Building an Online Map to Ourselves
PPTX
Private Is The New Public: How Society Is Ending Privacy
PPTX
Private Is The New Public: How Society Is Ending Privacy
PDF
Privacy flip book assignment film 260 queensu kc
PDF
The Evolution of Technology & Etiquette
Is Online Privacy a Thing of the Past?
Film 260 flipbook
Smartphones with Smarter Apps
Flipbook.pdf
Technology & Internet Use by Baby Boomers & Beyond
Error: Your Life Has Been Hacked
Should Kids Use Digital Technology?
Snapchats Linger for Longer than 10 Seconds
2012bruneluniversity 120615094336-phpapp01
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
L017146571
The Evolution of Technology & Etiquette
It's a Public World, After All
Tree incident shows value of remote working
The New Digital You
Bread Crumbs: How We are Building an Online Map to Ourselves
Private Is The New Public: How Society Is Ending Privacy
Private Is The New Public: How Society Is Ending Privacy
Privacy flip book assignment film 260 queensu kc
The Evolution of Technology & Etiquette
Ad

Recently uploaded (20)

PDF
Assigned Numbers - 2025 - Bluetooth® Document
PPTX
A Presentation on Artificial Intelligence
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
DP Operators-handbook-extract for the Mautical Institute
PDF
Web App vs Mobile App What Should You Build First.pdf
PDF
August Patch Tuesday
PPTX
1. Introduction to Computer Programming.pptx
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PDF
Approach and Philosophy of On baking technology
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
Assigned Numbers - 2025 - Bluetooth® Document
A Presentation on Artificial Intelligence
gpt5_lecture_notes_comprehensive_20250812015547.pdf
DP Operators-handbook-extract for the Mautical Institute
Web App vs Mobile App What Should You Build First.pdf
August Patch Tuesday
1. Introduction to Computer Programming.pptx
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
NewMind AI Weekly Chronicles - August'25-Week II
Zenith AI: Advanced Artificial Intelligence
MIND Revenue Release Quarter 2 2025 Press Release
1 - Historical Antecedents, Social Consideration.pdf
Accuracy of neural networks in brain wave diagnosis of schizophrenia
Approach and Philosophy of On baking technology
A comparative study of natural language inference in Swahili using monolingua...
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
Univ-Connecticut-ChatGPT-Presentaion.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf

The Deception of Privacy, The Truth About a Plugged in Life

  • 1. The Deception of Privacy The Truth About a Plugged in Life By Cynthia Beneteau Photo Source: Kristin Flour “Secret” Unsplash https://unsplash.com/collections/327093/privacy-kit?photo=BcjdbyKWquw
  • 2. Prior to the digital age photos were typically just shared with a handful of people, like friends and family. Now, people take more photos in 2 minutes than the entire amount of all the photos that existed 150 years ago. [2] The top three places photos are uploaded to are: Snapchat: 8796 photos per second What's App : 8102 photos per second Facebook :4501 photos per second [3] Photo Source : Gratisography http://colorlisa.com/pictures/105_1.jpg
  • 3. Today’s youth think of privacy differently than adults do. They care more about controlling who is tracking them digitally, who is seeing what they post and what people think when seeing them. The online experience for young people is a social one. If something is posted they do not like, they are more likely to worry about hiding the content from their friends or family, than to worry about teachers or potential employers seeing it. They care more about their reputation than the actual information they are posting[4] Photo Source: http://www.gratisography.com/pictures/303_1.jpg
  • 4. Parents need to consider the long term reach of the digital information they are sharing about their children. A “cute” video of a child doing something silly, can come back to haunt that same child when they become a teenager or adult. Even innocent stories shared by a parent may be a potential source of embarrassment to a child later on. Children, youth and teens should be able to control their digital identities. There is a balance that can be reached, a parent can share information, but limit identifying characteristics so that it protects their children, but they can still share [6] Photo source: https://pixabay.com/en/desperate-sad-depressed-feet-hands-2293377/
  • 5. 72% of Parents are worried about their children’s online interactions with strangers or predators that could harm them. Two major concerns are sexting and cyberbullying. Kids can be horrible to each other and some are even using the internet to create fake identities of other children. They then pose as the child and fabricate information about them. Parents are more than willing to potentially embarrass their child if it will help to keep them safe. [7] Photo Source https://pixabay.com/en/privacy-policy-spy-espionage-nsa-1624400
  • 6. A Study done by “Young Canadians in a Wired World” has indicated more privacy education in schools and homes is needed. According to the study, students have limited comprehension of password sharing, privacy policies, policies around data collection and geo- location services 68% of Students incorrectly believe, that a website will not share their personal information if they have a privacy policy [5] Photo Source : https://www.pexels.com/photo/finger-print-on-enter-key-of-keyboard-163017/
  • 7. “ We make big trade-offs as we become digitally connected everywhere and anytime” causing increased concerns with security and privacy [1] John Palfrey and Urs Gasser, Authors of Interop. The Promise and Perils of Highly Interconnected Systems Photo Source : https://static.pexels.com/photos/160709/raccoon-animal-animal-world-wildlife-photography-160709.jpeg
  • 8. Over a two week period, Carnegie Mellon University Computer Scientist’s ,did a study which determined that quite a few popular Android apps collect GPS coordinates within 50 metres of where the user is. This happens about 6200 times, which is equivalent to about every three minutes [8] Photo Source : https://www.pexels.com/photo/text-on-information-sign-258490/
  • 9. The Carnegie Mellon study also uncovered that the Weather Channel app accesses location information from it’s users every 10 minutes, or 2000 times in a two week period.[8] Photo Source: https://www.pexels.com/photo/reflection-of-building-on-body-of-water-at-daytime-166360
  • 10. When users in the Carnegie study found out how much personal data apps were collecting they tried to restrict the apps from collecting it. Researchers tried to help by sending daily “privacy nudges” to participants letting them know how many times apps were collecting their data [8] Operating updates ,since the study was conducted ,have now removed the software that researchers used to see requests for personal information and the ability to send “privacy nudges “ has also been disabled [8] Photo Source: https://www.pexels.com/photo/london-new-york-tokyo-and-moscow-clocks-48770/
  • 11. Facebook is able to know who your friends and acquaintances are even if you lie about all of your personal information when signing up [9] Photo Source : https://www.pexels.com/photo/photo-of-2-children-walking-23971/
  • 12. Facebook uses Network Science a complex academic field, which uses mapping algorithms, that takes information you provide or give permission for them to access when you sign up. It then uses it to determine the structure of your social network. This data is analyzed and allows them to accurately predict people you are likely to know and even people you will likely know in the future. [9] Photo Source : https://www.pexels.com/photo/hand-thumbs-up-thumb-black-and-white-8252/
  • 13. Samsung Smart TV owners are susceptible to spying. According to “WikiLeaks” documents a program named “Weeping Angel” can make Samsung’s Smart TVs appear to be turned off ,when they really are not. This enables the TV in essence, to work like a bug and record conversations in the room. These are then sent to a hidden CIA server. Michael Hayden, ex CIA director, thinks this is a wonderful capability because there are “ bad people in the world that have Samsung TVs “ [ 10] Photo Source: https://www.pexels.com/photo/full-frame-shot-of-eye-251287/
  • 14. Samsung’s Smart TV Privacy Policy States "Please be aware that if your spoken words include personal or other sensitive information, that information will be among the data captured and transmitted to a third party." A lot of Samsung TVs need users to actually click a microphone button before the voice commands work, but on models such as PN60F8500 the microphone is always listening. [10] Photo source : https://www.pexels.com/photo/night-music-band-microphone-9137
  • 15. Web cams can introduce a number of possible privacy breaches in our homes, nurseries, on our laptops, computers, tablets or anywhere we have online cameras [11] Photo source: https://www.pexels.com/photo/silver-imac-near-white-ceramic-kettle-205316/
  • 16. The frightening idea of someone watching every movement your baby makes is a very real possibility. The lack of the most basic security features are making popular internet connected baby monitors vulnerable to hackers [11] Photo Source: https://www.pexels.com/photo/newborn-child-feed-89695
  • 17. Once a hacker has breached one connected device, anything connected to that Wi-Fi network can potentially be accessed. [11] Photo Source: https://www.pexels.com/photo/low-angle-photo-of-building-under-sky-69080/
  • 18. The use of cameras in public spaces is becoming more common place. Cameras are also now on buses, subways, in ATM machines, and outside gas stations or grocery stores. [12] Photo Source : https://www.pexels.com/photo/black-and-white-streets-bridge-jacket-70402 /
  • 19. Photo Source: https://www.pexels.com/photo/5th-avenue-america-apple-store-architecture-279166 With the advent of Google Street view it is now possible to view someone’s home, business or even their vehicle from the comfort of your living room
  • 20. The expectation of privacy in the digital age may no longer be an option. Perhaps we need to redefine what privacy means and the repercussions of this new interpretation. Photo Source: https://www.pexels.com/photo/butterflies-black-and-white-9159/
  • 21. Sources: 1. Matrix, Sidneyeve “ John Palfrey and Urs Gasser Quote” Module 3 Slides Film 260 Queens University May 2017. 2. Eveleth, Rose. "How Many Photographs Of You Are Out There In The World?". The Atlantic. N.p., 2017. Web. 2 June 2017. https://www.theatlantic.com/technology/archive/2015/11/how-many-photographs-of-you-are-out-there-in-the-world/413389/ 3. Morrison, Kimberlee, and Kimberlee Morrison. "How Many Photos Are Uploaded To Snapchat Every Second?". Adweek.com. N.p., 2017. Web. 2 June 2017.http://www.adweek.com/digital/how-many-photos-are-uploaded-to-snapchat-every-second/ 4. "Online Privacy, Online Publicity: Youth Do More To Protect Their Reputation Than Their Information | Mediasmarts". Mediasmarts.ca. N.p., 2017. Web. 2 June 2017. http://mediasmarts.ca/blog/online-privacy-online-publicity-youth-do-more-protect-their-reputation-their-information 5. Bogart, Nicole. "Young Canadians Lack Understanding Of Online Privacy: Study". Global News. N.p., 2017. Web. 2 June 2017. http://globalnews.ca/news/1159724/young-canadians-lack-understanding-of-online-privacy-study/ 6. Dell’Antonia,Kj “ Don’t post about me on Social Media, Children say” The New York Times March 2017 https://well.blogs.nytimes.com/2016/03/08/dont-post-about-me-on-social-media-children-say/?_r=0 7. Paul, P. (2013, May 5). Cyberparenting and the Risk of T.M.I. New York Times, p. 8(L). Retrieved from http://go.galegroup.com.proxy.queensu.ca/ps/i.do?p=AONE&sw=w&u=queensulaw&v=2.1&it=r&id=GALE%7CA328694536&asid=ed444bf722dd5 54a00a728a96a4737f2 8. Dwoskin, E. “WSJ.D technology: Apps track users -- once every 3 minute”s. Wall Street Journal Mar 24 2015 . Retrieved from https://search- proquest-com.proxy.queensu.ca/docview/1665403896?accountid=6180 9. Dewey, Caitlin “How Facebook knows who all your friends are, even better than you do”. Washingtonpost.com. April2 2015 Retrieved from http://go.galegroup.com.proxy.queensu.ca/ps/i.do?p=AONE&sw=w&u=queensulaw&v=2.1&it=r&id=GALE%7CA408035312&asid=97bdc5e16299b f6c66dcb7543481dace 10. "If You Have A Smart TV, Take A Closer Look At Your Privacy Settings". BuzzFeed. N.p., 2017. Web. 2 June 2017. https://www.buzzfeed.com/nicolenguyen/here-are-the-privacy-settings-you-should-look-at-if-you-have?utm_term=.nqkg6Z0A7N#.cidNjp56Ov 11. "Is Your Baby Monitor Safe? Cybersecurity Firms Says Many Can Be Hacked". CBC News. N.p., 2017. Web. 2 June 2017. http://www.cbc.ca/news/business/several-baby-monitors-vulnerable-to-hacking-cybersecurity-firm-warns-1.3213046 12. Alcoba, Natalie. "Growing Number Of CCTV Surveillance Cameras Outside City Core Dismays Privacy Advocates". National Post. N.p., 2017. Web. 2 June 2017. http://news.nationalpost.com/toronto/growing-number-of-cctv-surveillance-cameras-dismays-privacy-advocates Photo Source : https://www.pexels.com/photo/full-frame-shot-of-metal-332834