{"id":2826,"date":"2014-10-28T22:47:04","date_gmt":"2014-10-28T22:47:04","guid":{"rendered":"http:\/\/library.csun.edu\/blogs\/cited\/?p=2826"},"modified":"2019-03-12T19:38:33","modified_gmt":"2019-03-12T19:38:33","slug":"research-therapy-online-privacy-in-a-big-data-world","status":"publish","type":"post","link":"https:\/\/library.csun.edu\/blogs\/cited\/2014\/10\/28\/research-therapy-online-privacy-in-a-big-data-world\/","title":{"rendered":"Research Therapy: Online Privacy in a Big Data World"},"content":{"rendered":"<p>It is important to think about where your information comes from and how it is presented to you as well as knowing what you can do to protect your privacy. These days it is next to impossible to function without providing some amount of personal information online. Although it might seem futile to worry about online privacy, there are ways to protect yourself by using the tools that are available to help block organizations from collecting your information and by critically thinking about the information you are being asked to give up online. This session of Research Therapy discusses who is collecting your information, ways to monitor the information about you that ends up online, and what you can do to protect your privacy.<\/p>\n<p><a title=\"Research Therapy Online Privacy\" href=\"https:\/\/youtu.be\/IIKf_May9nU\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-2829 size-full\" src=\"http:\/\/library.csun.edu\/blogs\/cited\/files\/2014\/10\/Research-Therapy-Online-Privacy.jpg\" alt=\"Research Therapy video\" width=\"503\" height=\"283\" \/><\/a><\/p>\n<p>Of course, free websites or internet browsers such as Google Chrome have to make money somehow. You might already know about cookies and other tracking devices that are used to collect your information and search habits to sell to advertisers. But your online habits shape more than the ad space on social media sites. In the Ted Talk below, Eli Pariser describes what he calls the Filter Bubble&#8211; where most of your online activity is shaped by what you have done in the past.<\/p>\n<p><a title=\"Eli Pariser and Filter Bubbles video\" href=\"http:\/\/www.ted.com\/talks\/eli_pariser_beware_online_filter_bubbles\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-2834 size-full\" src=\"http:\/\/library.csun.edu\/blogs\/cited\/files\/2014\/10\/filter-bubbles.jpg\" alt=\"Filter Bubbles talk video\" width=\"502\" height=\"284\" \/><\/a><\/p>\n<p>Even though cookies and online tracking do give you the convenience of not having to remember all your passwords, and allowing for easier use of the websites you use most often, there are times when you might want to take advantage of your privacy options. For example, if you are on a public computer such as the ones on campus. Below are some privacy tips you can use while using certain internet browsers or websites.<\/p>\n<p><strong>How to Turn on Private Browsing in Internet Browsers<\/strong>:<\/p>\n<p><strong>Google Chrome<\/strong><\/p>\n<p><strong>Menu&gt; New Incognito Window (or Ctrl + Shift + N)<\/strong><\/p>\n<p><a href=\"http:\/\/library.csun.edu\/blogs\/cited\/files\/2014\/10\/Chrome.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-2837\" src=\"http:\/\/library.csun.edu\/blogs\/cited\/files\/2014\/10\/Chrome.jpg\" alt=\"Chrome privacy settings\" width=\"316\" height=\"575\" \/><\/a><\/p>\n<p><strong>Safari<\/strong><\/p>\n<p><strong>Apple: Safari&gt; Private Browsing<\/strong><\/p>\n<p><a href=\"http:\/\/library.csun.edu\/blogs\/cited\/files\/2014\/10\/Safari.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-2839\" src=\"http:\/\/library.csun.edu\/blogs\/cited\/files\/2014\/10\/Safari.jpg\" alt=\"Safari privacy settings\" width=\"327\" height=\"269\" \/><\/a><\/p>\n<p><strong>PC: Settings&gt;Private Browsing<\/strong><\/p>\n<p><a href=\"http:\/\/library.csun.edu\/blogs\/cited\/files\/2014\/10\/PC-settings.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-2842\" src=\"http:\/\/library.csun.edu\/blogs\/cited\/files\/2014\/10\/PC-settings.jpg\" alt=\"PC privacy settings\" width=\"334\" height=\"521\" \/><\/a><\/p>\n<p><strong>Firefox<\/strong><\/p>\n<p><strong>Menu&gt;New Private Window (or Ctrl + Shift + P)<\/strong><\/p>\n<p><a href=\"http:\/\/library.csun.edu\/blogs\/cited\/files\/2014\/10\/Firefox-settings.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-2845\" src=\"http:\/\/library.csun.edu\/blogs\/cited\/files\/2014\/10\/Firefox-settings.jpg\" alt=\"Firefox privacy settings\" width=\"346\" height=\"602\" \/><\/a><\/p>\n<p><strong>Right click on a link&gt; Open Link in New Private Window<\/strong><\/p>\n<p><a href=\"http:\/\/library.csun.edu\/blogs\/cited\/files\/2014\/10\/Right-click-on-link.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-2847\" src=\"http:\/\/library.csun.edu\/blogs\/cited\/files\/2014\/10\/Right-click-on-link.jpg\" alt=\"Right click on link\" width=\"378\" height=\"377\" \/><\/a><\/p>\n<p><strong>Internet Explorer<\/strong><\/p>\n<p><strong>Settings&gt; Safety&gt; InPrivate Browsing (or Ctrl + Shift + P)<\/strong><\/p>\n<p><a href=\"http:\/\/library.csun.edu\/blogs\/cited\/files\/2014\/10\/IE-privacy-settings1.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-2851 size-full\" src=\"http:\/\/library.csun.edu\/blogs\/cited\/files\/2014\/10\/IE-privacy-settings1.jpg\" alt=\"IE privacy settings\" width=\"656\" height=\"454\" \/><\/a><\/p>\n<p><strong>Settings&gt;Internet Options&gt; Privacy&gt;Low, Medium, High<\/strong><\/p>\n<p><a href=\"http:\/\/library.csun.edu\/blogs\/cited\/files\/2014\/10\/Internet-options.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-2853\" src=\"http:\/\/library.csun.edu\/blogs\/cited\/files\/2014\/10\/Internet-options.jpg\" alt=\"Internet options\" width=\"369\" height=\"406\" \/><\/a><\/p>\n<p><a href=\"http:\/\/library.csun.edu\/blogs\/cited\/files\/2014\/10\/IE-privacy-options.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-2855\" src=\"http:\/\/library.csun.edu\/blogs\/cited\/files\/2014\/10\/IE-privacy-options.jpg\" alt=\"IE privacy options\" width=\"538\" height=\"622\" \/><\/a><\/p>\n<p><span style=\"text-decoration: underline;\"><strong>Stop Facebook From Tracking You:<\/strong><\/span><\/p>\n<p><strong>Disable Facebook tracking with the free Facebook Disconnect App:<\/strong><\/p>\n<p>https:\/\/chrome.google.com\/webstore\/detail\/facebook-disconnect\/ejpepffjfmamnambagiibghpglaidiec<\/p>\n<p><strong>Lifehacker\u2019s Always Up To Date Guide to Managing Your Facebook Privacy:<\/strong><\/p>\n<p><a href=\"http:\/\/lifehacker.com\/5813990\/the-always-up-to-date-guide-to-managing-your-facebook-privacy\">http:\/\/lifehacker.com\/5813990\/the-always-up-to-date-guide-to-managing-your-facebook-privacy<\/a><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"text-decoration: underline;\"><strong>Check Yourself Out Online<\/strong><\/span><\/p>\n<p><em>Note: these sites may also request fees for their services.<\/em><\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"http:\/\/library.csun.edu\/blogs\/cited\/files\/2014\/10\/pipl.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-2858 size-full\" src=\"http:\/\/library.csun.edu\/blogs\/cited\/files\/2014\/10\/pipl.jpg\" alt=\"pipl\" width=\"173\" height=\"92\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/pipl.com\/\">https:\/\/pipl.com\/<\/a><\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"http:\/\/library.csun.edu\/blogs\/cited\/files\/2014\/10\/spokeo.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-2859 size-full\" src=\"http:\/\/library.csun.edu\/blogs\/cited\/files\/2014\/10\/spokeo.jpg\" alt=\"spokeo\" width=\"198\" height=\"39\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"http:\/\/www.spokeo.com\/\">http:\/\/www.spokeo.com\/<\/a><\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"http:\/\/library.csun.edu\/blogs\/cited\/files\/2014\/10\/webmii.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-2861 size-full\" src=\"http:\/\/library.csun.edu\/blogs\/cited\/files\/2014\/10\/webmii.jpg\" alt=\"webmii\" width=\"169\" height=\"53\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"http:\/\/webmii.com\/\">http:\/\/webmii.com\/<\/a><\/p>\n<p>&nbsp;<\/p>\n<p><strong>URLs from the video<\/strong>:<\/p>\n<p><strong>\u00a0Google Alerts:<\/strong><\/p>\n<p><a href=\"https:\/\/www.google.com\/alerts\">https:\/\/www.google.com\/alerts<\/a><\/p>\n<p><strong>Google\u2019s Manage Your Online Reputation:<\/strong><\/p>\n<p><a href=\"https:\/\/support.google.com\/accounts\/answer\/1228138?hl=en\">https:\/\/support.google.com\/accounts\/answer\/1228138?hl=en<\/a><\/p>\n<p><strong>\u00a0Infographic: How Employers Use Social Media to Hire and Fire (The Atlantic):<\/strong><\/p>\n<p><a href=\"http:\/\/www.theatlantic.com\/technology\/archive\/2011\/08\/infographic-how-employers-use-social-media-to-hire-and-fire\/243599\/\">http:\/\/www.theatlantic.com\/technology\/archive\/2011\/08\/infographic-how-employers-use-social-media-to-hire-and-fire\/243599\/<\/a><\/p>\n<p><strong>\u00a0Pew Research Internet Project: Reputation Management and Social Media:<\/strong><\/p>\n<p><a href=\"http:\/\/www.pewinternet.org\/2010\/05\/26\/reputation-management-and-social-media\/\">http:\/\/www.pewinternet.org\/2010\/05\/26\/reputation-management-and-social-media\/<\/a><\/p>\n<p><strong>\u00a0WikiHow\u2019s Disable Cookies Tutorial:<\/strong><\/p>\n<p><a href=\"http:\/\/www.wikihow.com\/Disable-Cookies\">http:\/\/www.wikihow.com\/Disable-Cookies<\/a><\/p>\n<p style=\"text-align: right;\">&#8211; Anna Fidgeon<\/p>\n","protected":false},"excerpt":{"rendered":"<p>It is important to think about where your information comes from and how it is presented to you as well as knowing what you can&#8230;<\/p>\n<div class=\"more-link-wrapper\"><a class=\"more-link\" href=\"https:\/\/library.csun.edu\/blogs\/cited\/2014\/10\/28\/research-therapy-online-privacy-in-a-big-data-world\/\">Read more<span class=\"screen-reader-text\">Research Therapy: Online Privacy in a Big Data World<\/span><\/a><\/div>\n","protected":false},"author":1,"featured_media":2032,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[12,15],"tags":[152,177,193,223],"class_list":["post-2826","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-research-therapy","category-video","tag-online-privacy","tag-research-therapy","tag-settings","tag-video","entry"],"_links":{"self":[{"href":"https:\/\/library.csun.edu\/blogs\/cited\/wp-json\/wp\/v2\/posts\/2826","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/library.csun.edu\/blogs\/cited\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/library.csun.edu\/blogs\/cited\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/library.csun.edu\/blogs\/cited\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/library.csun.edu\/blogs\/cited\/wp-json\/wp\/v2\/comments?post=2826"}],"version-history":[{"count":3,"href":"https:\/\/library.csun.edu\/blogs\/cited\/wp-json\/wp\/v2\/posts\/2826\/revisions"}],"predecessor-version":[{"id":4837,"href":"https:\/\/library.csun.edu\/blogs\/cited\/wp-json\/wp\/v2\/posts\/2826\/revisions\/4837"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/library.csun.edu\/blogs\/cited\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/library.csun.edu\/blogs\/cited\/wp-json\/wp\/v2\/media?parent=2826"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/library.csun.edu\/blogs\/cited\/wp-json\/wp\/v2\/categories?post=2826"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/library.csun.edu\/blogs\/cited\/wp-json\/wp\/v2\/tags?post=2826"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}