410 likes | 531 Vues
Join Donald E. Hester as he explores the intersection of social media, privacy, and security in the Web 2.0 landscape. This informative session addresses key issues such as the implications of sharing personal information, the risks of data aggregation, and the differences between security and privacy concerns. Discover strategies to protect your online presence, manage your digital footprint, and navigate the complexities of modern communication platforms. Learn how to control what is shared and safeguard your personal information effectively.
E N D
Social Media (Web 2.0) and Privacy Donald E. Hester 19-Mar-2010 For audio call Toll Free 1-888-886-3951 and use PIN/code 956172
Housekeeping • Maximize your CCC Confer window. • Phone audio will be in presenter-only mode. • Ask questions and make comments using the chat window.
Adjusting Audio • If you’re listening on your computer, adjust your volume using the speaker slider. • If you’re listening over the phone, click on phone headset. Do not listen on both computer and phone.
Saving Files & Open/close Captions • Save chat window with floppy disc icon • Open/close captioning window with CC icon
Emoticons and Polling • Raise hand and Emoticons • Polling options
Donald E. Hester Social Media (Web 2.0) and Privacy
Types • Social Networking • Blogs • Vlogs • Podcasts • Internet forums • Wikis • Groups • Product reviews • Virtual reality • Micro blogging • Media sharing
Social Media (Web 2.0) • Services are extremely popular and useful • Almost a must today, (if you are not in, you are out) • People post too much information about themselves or their kids • Be aware of your aggregate information • The key is to be aware of what you are sharing
Types • Social Networking • Blogs • Vlogs • Podcasts • Internet forums • Wikis • Groups • Product reviews • Virtual reality • Micro blogging • Media sharing
Benefits • New ways of reaching customers (students) • New ways of researching • Meet people (students) were they are • Get the message out faster to more people • Democratization of media • Relationships and conversation • Increase transparency in government and organizations • Community, sharing, and connecting (Collaboration)
The Bad • Unqualified opinions • Massive amounts of content • Consistent delivery • Information overload • Work/Life balance • Mob opinion • Anonymity • Online Bullies • Cyber-stalkers
Security v. Privacy • But security issues and privacy issues are entirely two different beasts. • A security issue occurs when a hacker gains unauthorized access to a website or your computer. • Hacking • Virus, worm or malicious software • Privacy issues involve the unwarranted access of private information. • Typically information you put there but did not intend for everyone to see it • Information about you posted by someone else
Privacy • Would you invite a stranger into your house to look at your children's photo album? • Public v. Private • Aggregate information sources could give someone more information than intended.
Privacy • Do you have control of what is posted? • Not all fame is good! • People use anonymity to post stuff about others! • Embarrassing , loss of credibility
Privacy • Do I have control of what is posted about me? • Look yourself up! • All but one of these is about me. • One of these I was completely unaware of. • Even if you are not on the web, you may be on the web! • Do what you can to control what is out there.
Privacy • Can someone use what you post against you?
Security • Scams • Applications gather information about you • You may set your self up to being charged • Fraud • Identity theft
General Rules • Limit the personal information you post. Your real friends should already know. • Review privacy statements of sites and applications. • Be wary of application that need access to your information or profile. • Remember aggregate information. • Keep your posts on information on a professional level • Don’t instant message, email, post, blog, podcast, share, tweet, upload or otherwise leave anything on the Internet you wouldn’t want to see on the front page of the local paper. • Protect you computer, keep it up-to-date, install Anti-virus • Use complex passwords, don’t share your passwords
References • http://www.LearnSecurity.org • http://www.onguardonline.gov • http://www.ftc.gov/bcp/edu/microsites/idtheft/ • http://www.microsoft.com/protect/default.mspx
Donald E. Hester CISSP, CISA, CAP, MCT, MCITP, MCTS, MCSE Security, Security+ Maze & Associates @One / San Diego City College www.LearnSecurity.org http://www.linkedin.com/in/donaldehester http://www.facebook.com/group.php?gid=245570977486 Q&A
Evaluation Survey Link Help us improve our seminars by filing out a short online evaluation survey at: http://www.surveymonkey.com/s/10SpSocialMedia
For upcoming events and links to recently archived seminars, check the @ONE Web site at: http://onefortraining.org/ Social Media (Web 2.0) and PrivacyThanks for attending