1 / 41

Social Media (Web 2.0) and Privacy

Social Media (Web 2.0) and Privacy. Donald E. Hester 19-Mar-2010 For audio call Toll Free 1 - 888-886-3951 and use PIN/code 956172. Housekeeping. Maximize your CCC Confer window. Phone audio will be in presenter-only mode. Ask questions and make comments using the chat window.

dalia
Télécharger la présentation

Social Media (Web 2.0) and Privacy

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Social Media (Web 2.0) and Privacy Donald E. Hester 19-Mar-2010 For audio call Toll Free 1-888-886-3951 and use PIN/code 956172

  2. Housekeeping • Maximize your CCC Confer window. • Phone audio will be in presenter-only mode. • Ask questions and make comments using the chat window.

  3. Adjusting Audio • If you’re listening on your computer, adjust your volume using the speaker slider. • If you’re listening over the phone, click on phone headset. Do not listen on both computer and phone.

  4. Saving Files & Open/close Captions • Save chat window with floppy disc icon • Open/close captioning window with CC icon

  5. Emoticons and Polling • Raise hand and Emoticons • Polling options

  6. Donald E. Hester Social Media (Web 2.0) and Privacy

  7. Social Media?

  8. Types • Social Networking • Blogs • Vlogs • Podcasts • Internet forums • Wikis • Groups • Product reviews • Virtual reality • Micro blogging • Media sharing

  9. Social Media (Web 2.0) • Services are extremely popular and useful • Almost a must today, (if you are not in, you are out) • People post too much information about themselves or their kids • Be aware of your aggregate information • The key is to be aware of what you are sharing

  10. Types • Social Networking • Blogs • Vlogs • Podcasts • Internet forums • Wikis • Groups • Product reviews • Virtual reality • Micro blogging • Media sharing

  11. Everyone is getting in on it

  12. Benefits • New ways of reaching customers (students) • New ways of researching • Meet people (students) were they are • Get the message out faster to more people • Democratization of media • Relationships and conversation • Increase transparency in government and organizations • Community, sharing, and connecting (Collaboration)

  13. The Bad • Unqualified opinions • Massive amounts of content • Consistent delivery • Information overload • Work/Life balance • Mob opinion • Anonymity • Online Bullies • Cyber-stalkers

  14. Security v. Privacy • But security issues and privacy issues are entirely two different beasts. • A security issue occurs when a hacker gains unauthorized access to a website or your computer. • Hacking • Virus, worm or malicious software • Privacy issues involve the unwarranted access of private information. • Typically information you put there but did not intend for everyone to see it • Information about you posted by someone else

  15. Can someone use what you post against you?

  16. Privacy • Would you invite a stranger into your house to look at your children's photo album? • Public v. Private • Aggregate information sources could give someone more information than intended.

  17. Privacy • Do you have control of what is posted? • Not all fame is good! • People use anonymity to post stuff about others! • Embarrassing , loss of credibility

  18. Privacy • Do I have control of what is posted about me? • Look yourself up! • All but one of these is about me. • One of these I was completely unaware of. • Even if you are not on the web, you may be on the web! • Do what you can to control what is out there.

  19. Privacy

  20. Privacy • Can someone use what you post against you?

  21. Security • Scams • Applications gather information about you • You may set your self up to being charged • Fraud • Identity theft

  22. Security

  23. Settings in FaceBook

  24. Settings in FaceBook

  25. Settings in FaceBook

  26. Settings in FaceBook

  27. Settings in FaceBook

  28. Settings in FaceBook

  29. Settings in FaceBook

  30. Settings in Twitter

  31. Browser Security

  32. Browser Security

  33. General Rules • Limit the personal information you post. Your real friends should already know. • Review privacy statements of sites and applications. • Be wary of application that need access to your information or profile. • Remember aggregate information. • Keep your posts on information on a professional level • Don’t instant message, email, post, blog, podcast, share, tweet, upload or otherwise leave anything on the Internet you wouldn’t want to see on the front page of the local paper. • Protect you computer, keep it up-to-date, install Anti-virus • Use complex passwords, don’t share your passwords

  34. References • http://www.LearnSecurity.org • http://www.onguardonline.gov • http://www.ftc.gov/bcp/edu/microsites/idtheft/ • http://www.microsoft.com/protect/default.mspx

  35. Donald E. Hester CISSP, CISA, CAP, MCT, MCITP, MCTS, MCSE Security, Security+ Maze & Associates @One / San Diego City College www.LearnSecurity.org http://www.linkedin.com/in/donaldehester http://www.facebook.com/group.php?gid=245570977486 Q&A

  36. Evaluation Survey Link Help us improve our seminars by filing out a short online evaluation survey at: http://www.surveymonkey.com/s/10SpSocialMedia

  37. For upcoming events and links to recently archived seminars, check the @ONE Web site at: http://onefortraining.org/ Social Media (Web 2.0) and PrivacyThanks for attending

More Related