1 / 49

The Digital Age

The Digital Age. Social Networking, Social Bookmarking, Validating Websites. Presentation Content. Social Networking Twitter Blogs Skype Facebook, MySpace, Bebo, LinkedIn… Social Bookmarking Delicious.com Validating Websites www.archive.com www.easywhois.com Internet Safety

ayita
Télécharger la présentation

The Digital Age

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. The Digital Age Social Networking, Social Bookmarking, Validating Websites...

  2. Presentation Content • Social Networking • Twitter • Blogs • Skype • Facebook, MySpace, Bebo, LinkedIn… • Social Bookmarking • Delicious.com • Validating Websites • www.archive.com • www.easywhois.com • Internet Safety • Cyberbullying

  3. Social networking

  4. Social Networking Facts • In 2010, Gen Y will outnumber Baby Boomers • 96% of Gen Y are members of social networks • Social Networking is now the #1 activity on the Web. • One out of eight couples married in the U.S. last year met via social media • If Facebook were a country, it would be the 4th largest between the U.S. and Indonesia. • About 80% of companies use LinkedIn as a primary tool to find future employees.

  5. Social Networking Facts • The fastest growing segment on Facebook is women between the ages 55 and 65. • Both Gen Y and Gen Z consider e-mail passé. • The 2nd largest search engine in the world is YouTube. • There are more than 200 billion blogs and more than half of bloggers post content or tweet daily. • More than 3.5 million pieces of content (including Web links, new stories, blog posts, notes, and photos) are shared on Facebook every day.

  6. Facts About Twitter • Helps people communicate and stay connected through the exchange of quick, frequent messages. • Choose whose messages you want to receive and how you want to receive them. • Search all Twitter updates to see what people are talking about. • The biggest Twitter users are adults. • Anyone can Twitter -- there's no age restriction --- and, those who do, have to set up a personal profile. • Profile can be public or private. • Twitter was founded in San Francisco, CA in 2006.

  7. Facts About Twitter • Only have 140 characters to say something -- and you have to say it to someone who has already asked to “follow” you (this isn’t as creepy as it sounds!) • Following someone on Twitter means getting their updates in your personal timeline. • When you post an update to your Twitter account, your followers will get it on their home page and/or phone. • You don't have to follow everyone who follows you, and unless an account is private, you can follow and un-follow whoever you want without them following back. • Mutual followers can send each other private messages • Protecting you profile-- which means that everyone who wants to follow you must submit a request for your approval • To Stop Following - Click the "following" button to expose the drop-down box, and click "remove." Twitter doesn't notify you when someone has stopped following you.

  8. Facts About Twitter • When all else fails, you can block someone. Look for the block link at the bottom of the profile page under the friends icons • www.twitter.com

  9. Remember… If you don’t want the WORLD to see it, you better not post it or send it!

  10. Blogging • A blog (a contraction of the term "web log“)is a type of website, usually maintained by an individual with regular entries of commentary, descriptions of events, or other material such as graphics or video. • Many blogs provide commentary or news on a particular subject; others function as more personal online diaries. • The ability of readers to leave comments in an interactive format is an important part of many blogs. • Blog usage spread during 1999 and continues to grow.

  11. Types of Blogs • Personal Blogs • Ongoing Diary • Commentary • Corporate & Organizational Blogs • Enhance Communication • Marketing • Public Relations • By Genre • Political • Travel • Fashion • Education

  12. Types of Blogs • By Media Type • Video (vlog) • Links (linklog) • Sketches (sketchblog) • Photo (photoblog) • Mix and match (tumblelog) • By Device • Mobile (moblog) • Computer (blog)

  13. Legal/Social Consequences • Defamation or Liability • Employment • Political Dangers • Personal Safety

  14. Blogging Sites • Blog.com • Blogger.com • Blogr.com • Blogster.com • Netcipia.com • Open Diary.com • Squarespace.com • Tumblr.com • Xanga.com • Zoomshare.com • And the list goes on and on…

  15. Remember… If you don’t want the WORLD to see it, you better not post it or send it!

  16. Skype • Initial release was August 2003. • What is Skype? • Skype is a software application that allows users to make voice/video calls over the Internet. • Calls to other users within the Skype service are free, while calls to both traditional phones and mobile phones can be made for a fee. • Skype has also become popular for their additional features which include instant messaging, file transfer, and video conferencing.

  17. Is Skype Secure? "We provide a safe communication option. I will not tell you whether we can listen or not.“ • Kurt Sauer, Chief Security Officer Skype (Things that make you go hmmm?)

  18. Skype You will need headphones with microphone for the best quality. (Webcams, if planning on using video.) www.skype.com

  19. Remember… If you don’t want the WORLD to see it, you better not post it or send it!

  20. Facebook, MySpace, Bebo, LinkedIn… • Sites like Facebook and MySpace have privacy controls • Some sites require kids to be older than 13 to have a profile, but younger kids set up accounts anyway • Social networks keep kids connected to friends, provide a space for self-expression • There are no guarantees of privacy (even with settings) since anything can be cut, pasted, and sent • Inappropriate pictures, posts, or messages can result in damage to kids' reputations • Kids can "tag" (or identify) their friends which can violate their privacy

  21. Facebook, MySpace, Bebo, LinkedIn… • They range from Club Penguin and Webkinz(for young kids) to MySpace and Facebook • Social networks are major communication hubs providing ways for kids to use instant messaging, “friend” one another, and write on walls to share public and private thoughts and comments.  • Unless your child uses privacy controls, everything he says about himself in pictures or words will be available for all the world to see • People do see these pages – strangers, college admissions officers, even potential employers.

  22. Facebook, MySpace, Bebo, LinkedIn… • Remind them that everything can be seen by a vast, invisible audience (otherwise known as friends of friends of friends). • Make sure they set their privacy settings. They aren’t foolproof, but they’re important. • Posts with drug taking, drinking, sexual posing or activity will come back to haunt them. • Kindness counts. Lots of sites have anonymous applications like "bathroom wall" or "honesty boxes" that allow users to tell their friends what they think of them. Rule of thumb: If your child wouldn't say it to someone's face, they shouldn't post it. 

  23. Facebook, MySpace, Bebo, LinkedIn… • Anyone can see what’s on your pages—even if you think no one will. Potential employers and college admissions people can easily surface these sites. • Anything you create or communicate can be cut, altered, pasted, and sent around. Once you put something on your page, it’s out of your control and can be taken out of context and used to hurt you or someone else.  • Online stuff can last forever. If you wouldn't put something on the hallway in school, you shouldn’t post it on your pages.

  24. Facebook, MySpace, Bebo, LinkedIn… • Remember the golden rule: If you wouldn’t want someone saying it you, you shouldn’t say it to anyone else. • If you meet someone, it better be in a public place, preferably with a friend. We would all like to think that kids wouldn’t meet strangers – but sometimes they do--THIS IS NOT A SAFE OR SMART IDEA! • Watch the clock--Social network sites can be real time suckers. Hours and hours can go by – Balance your life!

  25. Remember… If you don’t want the WORLD to see it, you better not post it or send it!

  26. Social bookmarking

  27. What is social bookmarking? • Social bookmarking is a method for Internet users to share, organize, search, and manage bookmarks of web resources. • Unlike file sharing, the resources themselves aren't shared, merely bookmarks that reference them.

  28. Social Bookmarking • Users save links to web pages that they want to remember and/or share. • These bookmarks are usually public, and can be saved privately, shared only with specified people or groups, shared only inside certain networks, or another combination of public and private domains. • The allowed people can usually view these bookmarks chronologically, by category or tags, or via a search engine. • Many social bookmarking services provide web feeds that allow subscribers to become aware of new bookmarks as they are saved, shared, and tagged by other users.

  29. Social Bookmarking • They have added extra features such as • ratings and comments on bookmarks • the ability to import and export bookmarks from browsers • emailing of bookmarks • Web annotation • groups or other social network features • The concept of shared online bookmarks dates back to April 1996 with the launch of itList,the features of which included public and private bookmarks.

  30. Social Bookmarking Sites • AddThis • BookmarkSync • Delicious • Digg • Diigo • Faves • My Web • Mixx • Reddit • ShareThis • SiteBar • TechNet • Twine • Yattle

  31. Social Bookmarking • delicious.com

  32. Validating websites

  33. Top Level Domains • Currently 20 and more are added regularly • Examples • .com (Commercial/Business) • .edu (Education) • .gov (Government) • .org (Nonprofit Organizations) • .mil (Military) • .net (Expansion of Business)

  34. Country Domains • Currently 248 host country domains • Most Prevalent Country Domains • .au (Australia) • .hk (Hong Kong) • .jp (Japan) • .uk (United Kingdom) • .us (United States)

  35. Risks of Dangerous Domains • Viruses that disable your computeror use your computer’s resources maliciously. • Spyware that captures you personal information for identity theft purposes. • Adware that inappropriately delivers ads to your computer • E-mail address capture that leads to significant increases in spam • Exposure to vulgar websites

  36. Watch What You Type “Typosquatting has emerged as a significant threat to Internet users. Malicious websites are developed with addresses that are very common to real websites. The malicious site addresses are based on common typing errors like .cm instead of .com. The .cm domain has recently been identified as the riskiest domain in the world because of this practice.” -Website Compass, Spring 2010

  37. Watch What You Type • Other examples of typosquatting: • Plural words • Possible Authentic site – creditcard.com • Possible Malicious site – creditcards.com • Common misspellings • Possible Authentic site – Firstbank.net • Possible Malicious site - 1stbank.net • To Protect Against Typosquatting • Double-check addresses for errors • Verify addresses • Use bookmarks for regularly visited sites, instead of typing

  38. Riskiest Domains to Visit • cm • Cameroon, Africa – 36.7% with this domain and are found to conduct risky activity • .com • Commercial domain – 32.2% with this domain were found with malicious intent • .cn • People’s Republic of China—23.4% of the sites with this domain are unsafe

  39. Riskiest Domains to Visit • .ws • Samoa – 17.8% of this domain identified as risky sites • .info • Information domain – 15.8% were identified as risky • .ph • Republic of the Philippines – 13.1% with this domain are unsafe

  40. Top Five Safest Domains • The following are the safest domains with malicious site percentages of less than .001%: • .gov – Government • .jp – Japan • .edu – Education • .ie – Ireland • .hr - Croatia

  41. What Can You Do? • Use protection tools in Web browsers • Use Internet Security software (Norton, McAfee, etc) • Use common sense • Don’t download files from unfamiliar sites • Don’t leave information at unfamiliar sites

  42. What Can You Do? • Use sites like the following to verify and see the history of the site • www.easywhois.com • www.archive.org

  43. Internet safety

  44. Facts About Cyberbullying • The facts: 43% of teens have been victims • Cyberbullying begins as early as the 2nd grade for some children • 53% of teens admit sending a hurtful message • Most victims know the person bothering them • Only 10% of bullying victims tell their parents

  45. Facts About Cyberbullying • Repeatedly sending hurtful text messages and images, or posting cruel comments on the Internet. • Spread widely through instant messaging (IM) or phone texting, and by posts on social networking sites. • It can happen anytime -- at school or home --and can involve large groups of kids. • Being “anonymous” and the desire to be seen as “cool” can cause a kid who normally wouldn’t say anything mean face-to-face to show off for other kids.

  46. What Can YOU Do! • If you wouldn’t say something to someone’s face, you shouldn’t text it, IM it, or post it. • Do you know someone who has been cyberbullied? Think about how it affects them. • Shouldn’t respond or retaliate • Should block bullies immediately • Should tell an adult they trust • Do not delete the messages because in persistent cases, the content should be reported to a cell or Internet Service Provider.

  47. What Can YOU Do! • Think before you reveal. • Anything you post can be misused by someone else. • Remember you aren’t too old to ask for help. • Going to a trusted adult isn’t baby-ish, it’s safe! • Remind them that all private information can be made public. • Posts on friends’ walls, private IMs, intimate photos, little in-jokes can all be cut, pasted, and sent around.

  48. What Can YOU Do! If you don’t want the WORLD to see it, you better not post it or send it!

  49. Thanks to…. • Common Sense Media • www.commonsensemedia.org • Wikipedia • www.wikipedia.org • Website Compass Magazine • Spring 2010 • Avoiding Dangerous Domains

More Related