I Can Find You No matter Where You Go - Nicole Wun

So this is the end of my infographic series. Thank you so much for reading until the end. This isn't made to dissuade you about your use of technology, it is to inform you of it's possible risks. So next time you use any sort of technology, ask yourself: do you know where your information is going to go?

Bibliography:

Association, A. B. (2012). READY RESOURCES: READY RESOURCES IN PRIVACY AND CONFIDENTIALITY. GPSolo, 29(6, PRIVACY AND CONFIDENTIALITY), 66-67. doi:http://www.jstor.org/stable/pdf/23630699.pdf

Becker, C. (2016, January 20). Technology is Destroying Our inner Lives. Retrieved July 6, 2016, from http://time.com/4186034/technology-and-our-inner-lives/

Brandom, R. (2016, July 11). Pokémon Go is automatically granting permission to read your Gmail. Retrieved August 24, 2016, from http://www.theverge.com/2016/7/11/12150468/pokemon-go-privacy-full-account-access-permission

Britz, J. J. (1996). TECHNOLOGY AS A THREAT TO PRIVACY: Ethical Challenges to the Information Profession (pp. 1-9, Tech.). 0002 Pretoria, South Africa: Department of Information Science University of Pretoria.

Chaffey, D. (2016, August 8). Global social media research summary 2016. Retrieved September 22, 2016, from http://www.smartinsights.com/social-media-marketing/social-media-strategy/new-global-social-media-research/

Craig, M. (2016, October 31). 7 Tips for Creating Successful Infographics. Retrieved July 5, 2016, from http://socialmarketingwriting.com/7-tips-for-creating-successful-infographics/

DeSilver, D. (2013, June 20). Young Americans and privacy: ’It’s complicated’. Retrieved August 24, 2016, from http://www.pewresearch.org/fact-tank/2013/06/20/young-americans-and-privacy-its-complicated/

F. (2015, January 30). Facebook. Retrieved September 22, 2016, from https://www.facebook.com/terms

This website is the official terms of service page for Facebook. Even though it is not considered credible (because there is no author), there can be no bias or citations for this site.

Hilts, A., Parsons, C., & Knockel, J. (2016). Every Step You Fake: A Comparative Analysis of Fitness Tracker Privacy and Security (1st ed., Vol. 1, pp. 12-36, Rep.). Canada: Open Effect. doi:https://openeffect.ca/reports/Every_Step_You_Fake.pdf

Hoven, J. V. (2014, November 20). Privacy and Information Technology. Retrieved July 18, 2016, from http://plato.stanford.edu/entries/it-privacy/

Iwata, R. (2015). Coffee gives me superpowers: An illustrated book about the most awesome beverage on Earth. Kansas City: Andrews McMeel Publishing.

Jordan, C. (2015, December 23). Brochure Design: 25 Tips to Create Marketing Materials That Sell – Design School. Retrieved December 6, 2016, from https://designschool.canva.com/blog/brochure-design/

Lohr, S. (2010, March 16). How Privacy Vanishes Online. Retrieved from http://www.nytimes.com/2010/03/17/technology/17privacy.html?_r=0

Murphy, K. (2014, October 4). We Want Privacy, but Can't Stop Sharing. Retrieved July 3, 2016, from http://www.nytimes.com/2014/10/05/sunday-review/we-want-privacy-but-cant-stop-sharing.html?_r=0

Myhre, J. (2013, August 20). Technology is Invading Our Privacy. Retrieved July 15, 2016, from http://www.dmnews.com/the-inside-scoop-blog/technology-is-invading-our-privacy/article/307471/

Patel, N. (2015). 12 Infographic Tips That You Wish You Knew Years Ago. Retrieved October 3, 2016, from https://blog.kissmetrics.com/12-infographic-tips/

Pick, T. (2016, January 19). 47 Superb Social Media Marketing Stats and Facts. Retrieved September 26, 2016, from http://www.business2community.com/social-media/47-superb-social-media-marketing-stats-facts-01431126#mtImPq3KqpODHdLd.97

Rainie, L., & Anderson, J. (2014, December 18). The Future of Privacy. Retrieved August 24, 2016, from http://www.pewinternet.org/2014/12/18/future-of-privacy/

Rainie, L. (2015, June 03). Privacy in the Digital Age. Retrieved August 24, 2016, from http://www.pewinternet.org/2015/06/03/privacy-in-the-digital-age/

Rainie, L., Kiesler, S., Kang, R., & Madden, M. (2013, September 05). Anonymity, Privacy, and Security Online. Retrieved August 24, 2016, from http://www.pewinternet.org/2013/09/05/anonymity-privacy-and-security-online/

Rosenblatt, S. (2014, September 23). Apple's Touch ID still vulnerable to hack, security researcher finds. Retrieved September 22, 2016, from https://www.cnet.com/news/apples-touch-id-still-vulnerable-to-hack-security-researcher-finds/

Satrapi {"isAjaxInProgress_B001IGFN9I, M. (2007, October). The Complete Persepolis Paperback – Black & White, October 30, 2007. Retrieved October 26, 2016, from https://www.amazon.com/Complete-Persepolis-Marjane-Satrapi/dp/0375714839

Smith, K. (2014, May 20). Why I'm Taking A Break From Instagram and You Should Too. Retrieved July 11, 2016, from http://elitedaily.com/life/why-you-should-take-a-break-from-instagram/598012/

Smith, K. (2016, March 7). 96 Amazing Social Media Statistics and Facts for 2016. Retrieved September 26, 2016, from https://www.brandwatch.com/2016/03/96-amazing-social-media-statistics-and-facts-for-2016/

Social Networking Fact Sheet. (2013, December 27). Retrieved September 7, 2016, from http://www.pewinternet.org/fact-sheets/social-networking-fact-sheet/

Soltero, Á J. (2012). 6 Things Everyone Should Know About Instagram. Retrieved July 10, 2016, from http://thesocialu101.com/6-things-everyone-should-know-about-instagram/

Susskind, J. (2013, October 21). 10 Statistics on Online Privacy That May Surprise You - IVN.us. Retrieved from http://ivn.us/2013/10/21/10-statistics-online-privacy-may-surprise/

T. (2016, January 27). Terms of Service - Twitter. Retrieved September 22, 2016, from https://twitter.com/tos?lang=en

This website is the official terms of service page for Twitter. Even though it is not considered credible (because there is no author), there can be no bias or citations for this site.

Y. (2010, June 9). Terms of Service - Youtube. Retrieved from https://www.youtube.com/static?template=terms

This website is the official terms of service page for Youtube. Even though it is not considered credible (because there is no author), there can be no bias or citations for this site.

Zeman, E. (2016, March 2). Fitbit, Other Fitness Trackers Leak Personal Data: Study - InformationWeek. Retrieved September 22, 2016, from http://www.informationweek.com/mobile/fitbit-other-fitness-trackers-leak-personal-data-study/a/d-id/1324165

Created By
Nicole Wun
Appreciate

Report Abuse

If you feel that this video content violates the Adobe Terms of Use, you may report this content by filling out this quick form.

To report a Copyright Violation, please follow Section 17 in the Terms of Use.