0% found this document useful (0 votes)
66 views26 pages

Digital Security: Internet Risks & Data Privacy

Digital security is important for protecting valuable data online. The internet collects direct and indirect information about users in real time, which is mined into a trillion dollar industry. This data can be used for targeted advertising, manipulation of behavior, and even influence elections. Users should be aware of how their data and behavior are tracked online in order to avoid being taken advantage of or controlled without their knowledge. Government initiatives aim to increase digital literacy and awareness of online privacy and security issues.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
66 views26 pages

Digital Security: Internet Risks & Data Privacy

Digital security is important for protecting valuable data online. The internet collects direct and indirect information about users in real time, which is mined into a trillion dollar industry. This data can be used for targeted advertising, manipulation of behavior, and even influence elections. Users should be aware of how their data and behavior are tracked online in order to avoid being taken advantage of or controlled without their knowledge. Government initiatives aim to increase digital literacy and awareness of online privacy and security issues.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 26

Digital

Security
Everything that everyone should Know
THE
INTERNE
T
How much do we actually know?

Origin
‘ARPANET’ or
‘DARPANET’ a research
Application project of US Department
A distributed packet based network of Defence
that works as an Communication
System for the Virtual World
creating your Digital Presence Owner
Officially No one, But
Technically Everyone!!
Not so
Wireless!!
Landing Station
IPLC – 2, ITC -
7
OUR IIG – 29, NIX -
02 Carrier Layer

NETWO Distribution Layer


Large & Local
ISP
RK Our Devices End User Layer
Every voice, text or file we share through
this Network are some big binary
numbers (1,0) which are sliced into some
pieces called packets and re-organized
while reaching the destination. All of
these valuable Informations are basically
the Data with certain privacy limits we
DATA
mostly ignore and thus DATA IS THE
MOST VALUABLE ASSET ON THIS
PLANET.
What We Actually Share!

Relevant Things you’re interested Informations, Voice & Text


in and Leads for Digital Marketing Messages, Files, etc.

Valuable Data Private Data

Precious Things Bad Things


Money, Dignity, Credibility Lies, Fakes, Hoax, Satire,
& Personal Life Propaganda, Clickbait,
Conspiracies, Cheats, etc.
Why is it SCARY!

Every direct & indirect Digital Traces are mined


information about your into Trillion Dollar a year
Digital Presence is being Industry with Rich &
collected in Real Time. Powerful People In Control.

Taking your Data means


Taking your control even in a The power of Technology
Psychologiical Way with & Data is a deadly weapon
tracking listening & in the hands of Bad People.
monitoring.
Technology Can Control &
Manipulate Human
Things that should be discussed are not Big Data or AI.
Behavior?
They’re Psychographics, Psychometrics & In-cognitive Bias.
Psychographic
s
The Key to Data-Driven Behavior Modeling
& Manipulation Based on Private Data.

Almost Classified as a Weapon!!!


Psychometrics
standard and scientific method used to measure
individuals' mental capabilities and behavioral style

An old way of cognitive mapping.


Two Types of Biasness

Cognitive Incognitive
Biasness through Understanding, Biasness Caused through
experience, thought and sensory input Collective Impacts in Digital
Example: IKEA Effect World
Example: Unconsious Bias
Let’s Face The Reality!

1. Weaponization
They already know whom to target
because they have the 70,000+
Data Points of Individual Identity.
2. Micro-
Targeting
They throw rain of Ads based on
the Behavioral Knowledge they
have on the Persuidable Identity.
Things Already Knocked us!

The Campaign in
The project of Trump’s The real bad guys behind Trinidad to Make the
Facebook Campaign that BREXIT who targeted Indian Party win over
spend $1M/Day. persuitable people only. Blacks through
Manipulating the Youth.

Alamo Leave.EU DO SO!!


Habit Framework

1. Doing something out of HABIT means doing it


without THINKING.

2. Action needs to be easier than THINKING in


order to form a HABIT.

3. Rewards needs to be VARIABLE in order to


HOOK a consumer into a cycle in form of a
HABIT.
.
Dr. B. J. Fogg’s
Behavior
Model
HOOK MODEL

Building HABIT forming Products


that are integral part of the Pop
Culture

Codified Insights about


influencing customer behavior,
Engineered to keep users coming
back!!
HOW FACEBOOK WORKS!
Dream of Connected world Tearing us Apart!

U
Cą[d GTITI U
QUb/ : @TdVŠPTȵ TJ U
GU; dTI Ǒ6E?
1>͕ %GT[PFTI[>IU EU
FŬIT[6⠊ 5[J AITP[Ũ[Q mr 6B[/ 1=U C̀ U
B Š @dTQ[d[5|U
C̀ U
B[>
GTITŠ 1[5 mm6B|͞ U
J NEJ [5 , ŠPTȸTJ U
GU; dTdU
NȏCT4T[IIǑ6E5U
b[d+PE29T[BTQ[Ĭ |
ͦ U
mkl s PT[J FTI[>Q- dT+%29BTǑ[J TI͞ BIT Ŋ2[9[5 mkl t PT[J IET!J T[@[N Š H0T[BöT=QTU
I[d[5# [B[/ %
HOW NOT
TO BE A
PART OF IT! How you can control or even prevent it!
Check the
Check Details
01 Source
Most of times, numbers of 03 Check the Dates, Locations,
rumours, Hoax & lies are Author and other supporting
stopped through Questioning. Sources If needed.

Don’t Believe &


Read Inside
02 Catchy Titles or lines doesn’t 04 Click on Everything
tell the actual story inside. You might end up not only being
Controlled but also manipulated
WHAT’S COMING FROM THE GOVT.

Mass Awareness Digital Literacy


Targeted Awareness plans for Spreading Digital Literacy &
each and every Person from Basic Learning from roots
Children to Senior Citizens.

Cyber Expertise Finding a Solution


Law, Acts, Policies & Skill Seeking the solution in all
Development and other way even if it requires
Facilitation Supports local Replacements
Questions to Ask yourself!
1. Does Freedom of Speech means Freedom of reach to Billions
of people in a single click? And is it safe??
2. This free connectivity is magical but did we actually needed
this much connectivity? Are we worthy enough?
3. Despite of being just some boring things, were Terms &
Conditions and Privacy policies important enough to read
before downloading or visiting any platform?
4. Have we already become a CBP System with our body
working as the Hardware?
Let’s Spread some
Awareness!!

You might also like