SOCIAL RESPONSIBILITY:

Slides:



Advertisements
Similar presentations
Don’t be bullied, or be a bully.
Advertisements

MANAGING YOUR ONLINE PROFILE WHAT DOES THIS MEAN AND WHY SHOULD YOU CARE? Sarah Morris UT Libraries.
Social Media A BETTER WAY TO MANAGE YOUR ONLINE PROFILE!
+ The Future of Social Media By Abigail Boghurst.
Suggested grade levels 7-12 Students will explore strategies that promote personal safety when using the texting-based social network, Twitter.
Controlling Your Social Networking Privacy Settings Stay safe online!
Chloe Miles IMPROVING PRODUCTIVITY USING IT. Menu Using Word Advantages Disadvantages Conclusion E-Safety Social Media Dangers of Social Media Sites Staying.
Unit 2 Lesson 2.05 Social Networking Ethics & Responsibility.
Social Media 101 An Overview of Social Media Basics.
DIGITAL FOOTPRINT Everything you do is online. How you can protect yourself and your info.
Protecting Yourself on Social Media – Friend Requests And Messages.
Cyberbullying What does it mean? What can we do?.
Keeping Children Safe Online. Where to report abuse? To report any abuse on social media or internet: CEOP will accept reports from parents, teachers.
Cyber Safety. Protect Your Identity Choose screen names/logins that do not give you away Choose password that cannot be easily guessed Do not give away.
Awareness raising session for Parents and Carers June Todd Awareness raising session for Parents and Carers June Todd.
Building a Social Media Presence Participants will look at the BCPS social media outlets (Twitter, Facebook, Flickr, Vimeo, Instagram, blogs) and relevant.
Social Media Whats Out? What’s In? What’s New?. Social Media- What’s Out: Ask.fm Tumblr Facebook.
Social Media Safety. Discuss O As a class discuss the different types of social media and what it is used for.
Victor PTSA Fall Forum Don’t Lose Touch With Your Teen Tuesday, October 22, 2013 – 7PM Social media is now an integral part of our every day lives. For.
St. Anne’s Baslow Online Safety Before we start… O Throughout this meeting I hope to provide information that you will find useful in keep your.
Digital Footprints By Erik Borge September 29, 2015.
Judith Davis – Community Safety Officer Northumberland County Council.
Online Reputation A guide for children aged 7+
Surf smart training.
Social Media LCBMS Guidance Staff.
Welcome.
Whats Out? What’s In? What’s New?
How to stay safe using the internet & App’s
Facebook privacy policy
Business Communications
Online safety may 2017.
Creating your online identity
How to stay safe using the internet and app’s?
Social Media Security: Understanding how to keep yourself safe.
Tips for becoming a good cyber citizen
E-Safety Briefing
Top 20 Ways To Achieve Your Purpose With LinkedIn
How to use the internet safely and How to protect my personal data?
Social Media & You Let’s take a look at your social media use.
How to use the internet safely and How to protect my personal data?
Discussion – what kind of bullying is taking place in the images
Social Media from our point of view!
Social Media.
Social Media Basics for Parents
SOCIAL MEDIA MARKETING
Overview Social media applications inform, educate, and entertain people through online (multi-)media A social networking application allows users to create.
My Digital Footprint BY:CHRISTINA SATO.
What is Twitter? An online social networking service that enables it users to send and read text-based characters, informally known as “tweets.” Created.
E-safety and what you need to know!
Social Media Safety Freshman Seminar.
SOCIAL MEDIA: ARE YOU PLAYING IT SAFE?.
SOCIAL RESPONSIBILITY
Your Online Identity 2018 College Night Jamie McConnell
ICT Communications Lesson 3: Internet Life and Privacy
Online Safety! Created by Educational Technology Network
INTERNET SAFETY.
My Name is Chrysta Let’s look at the difference in social media throughout my life and beyond.
Protecting your children from sexual abuse online
Cyberbullying PREPARED FOR STUDENTS OF SHAC ST. JOHN’S COLLEGE.
Social Media Safety.
Our internet, our choice
Online Safety: Rights and Responsibilities
Advertising, Branding, and social media
Career Services at Villa Maria
Advertising, Branding, and social media
What is Public Relations? PR vs. Advertising
Social Media Safety.
Online Safety Assembly.
Online Safety; Privacy and Sharing
Online Safety; Privacy and Sharing
Presentation transcript:

SOCIAL RESPONSIBILITY: History of Social Networking: http://content.time.com/time/video/player/0,32068,710921182001_2037224,00.html Privacy and Ethics MODULE 3 - BCOM 25

PRIVACY

PRIVACY Facebook alone has over one billion active monthly users and 13 million of them have never touched their privacy settings, according to research done by Marketo. Pew Research on sharing/posting by teens from 2006 to 2013 Posting Photos - 79% to 91% School Name - 49% to 71% Where they live - 71% Email Address - 29% to 53% Phone Numbers - 2% to 20% According to the latest Pew Internet research (May 2013) on teen online privacy, teens are sharing more personal information on social media today than they were when the first Pew privacy study was done in 2006. Either they do not value privacy or we are failing to educate them, or both.

MORE INFORMATION THAN YOU INTENDED TO SHARE? GeoData Checking in Adding Location of an image/video Phone Apps (Words With Friends) Search terms What do your hashtags say about you? User name Behavioral Preferences Likes Follows Habits Geo Data allows users to connect/coordinate with others in a network (enable social dynamics) https://www.privacyrights.org/social-networking-privacy-how-be-safe-secure-and-social#user-shares Are you looking for a job? Have you made public any of the following: Age Gender Race Disability Sexual orientation Political affiliations Other groups and contacts

PRIVACY CATEGORIES Public Friends/Followers-only Locked or Private Accounts Public: Most or all privacy settings are open to public view and are searchable either on Google (depending on the channel) or on Facebook Graph Search. Facebook pages can now be set to public (update since 2013) as well. This enables people who have had private Facebook pages to open them up to anyone (like Twitter) instead of having to approve every “friend” request. Friends/Followers-only: On Facebook and many other channels (not Twitter), this means that you have set your private information to be viewed only by those you approve as friends or followers. Twitter does not have an approval feature for followers other than a private account. Locked or Private Accounts: All privacy settings are shut down, and permission to follow or friend is managed on a case-by case basis by the user. On Twitter, this means that no one can see your tweets except approved followers, and your tweets cannot be retweeted. However, screenshots are always in the mix

PRIVACY – GUARD IT Know your privacy rights. Create your own private groups and lists. Turn off geolocation settings on apps Get rid of followers you don’t really know. Set your social profiles to non-searchable. Search yourself. Use two-factor authentication when available. CH3 (23-42) Pg.29-32 1. Know your privacy rights. The group encourages people to understand the terms of service on the social media channels they use. Privacy has different meanings on different channels. Some companies will not let you make private certain pieces of information (Facebook is one) because they want to retain the right to sell that information to marketers. Make sure you know what you can and can’t protect before you set up a profile. 2. Create your own private groups and lists. Many social media providers give you a way to set up private groups so that your conversations and sharing cannot be searched or seen by everyone. 3. Turn off geolocation settings on apps. It is especially important for younger students. Predators and bullies can find unsupervised young people easily in public places if they are constantly checking in or using public geo-apps for messaging in public spaces.4. Get rid of followers you don’t really know. Remember that high school friend or media person you friended several years ago? They are still seeing everything you post. Go through and delete old stale (or dangerous) contacts. Many people mistakenly think that this is what blocking is. But blocking only eliminates their content from your feeds. They can still see what you have posted. 5. Set your social profiles to non-searchable. Most sites give you the option to make your data unavailable to search engines. Facebook has its own search engine, and they don’t allow others to scrape their data. It’s all about the money. 6. Search yourself. I recommend that if you have a history of over sharing on social media, it would be a good idea to “Google yourself” to see what’s out there. I recommend getting a copy of Do It Yourself Online Reputation Management by Herbert Tabin and Craig Agranoff to help mediate the bad stuff you find. Most of us cannot afford to hire Reputation.com. If you do need professional help, I would recommend looking at the review sites of online reputation products. Some of them charge a lot of money for what you can do yourself. 7. Use two-factor authentication when available. I recommend using two-factor authentication on Twitter and LinkedIn. Although it takes a little more time to login by getting a text by phone, it strengthens your account against hackers.

ARE YOU AN ETHICAL CITIZEN? Entertainment Music Movies Software How is an ethical social media user defined? Identity Consumer Data Mining Digital Signature Relationships Dangers http://www.relevantmagazine. com/culture/tech/8-dangers- social-media-were-not-willing- admit As a socially responsible person, you expect others to behave in a certain way – ethically when it comes to your data. What are your expectations of social media platforms?

SOCIAL MEDIA: ETHICAL CHALLENGES OF EMPLOYERS Integrity Risk Negative commentaries Employee misuse Advertising and Marketing Practices Responsible marketing Pages must reflect they are sponsored by company No badmouthing other companies Recruitment Practices Are personal life postings fair game? Privacy and Fairness Duty of Care - Should companies be responsible for protection through use of personal accounts? Cyberbullying Discrimination Harassment Business Ethics Briefing – The Ethical Challenges of Social Media: Integrity Risk – an employee can misuse a social media account that causes the reputation of company to be degraded Duty of Care – how much responsibility does the company have before it infringes upon an individual’s right to privacy and freedom of speech?

SOCIAL MEDIA: ETHICAL CHALLENGES OF EMPLOYERS Providing Guidance / Training Policies consistent with company’s ethics policy Policy on SM use when representing company Policy on SM use on personal accounts Security settings Developing Guidance Communication between employer and employee on what is expected of both parties Monitoring Privacy Stakeholder’s expectations

Social Network Platform Ethics TERMS OF SERVICE (TOS) “If you are not paying for it, you’re not the customer; you’re the product being sold.” – as commented by user blue beetle on a blog https://www.scu.edu/ethics/focus-areas/internet-ethics/resources/clicking-through-to-the-ethics-of-social-media/ Who is being protected in the TOS agreements? Who has rights to the pictures/ videos / information you post on the platforms you are using? Some TOS include the claim that the company that drafted the TOS has the right to incorporate changes to those terms even after a user has agreed to a particular set of terms-and that the user would be bound by the revised terms. Would that practice be ethical?

Twitter Database Manager: Is Scope A Problem?

YOUR TURN TO CHIME IN Choose one social media platform Twitter Instagram Facebook SnapChat Periscope Tumbler or Pinterest Vine or YouTube Google+ WhatsApp Slack What are the Terms of Service for users in that platform? Privacy Ownership of content posted Data collection Monitoring Restriction of use Cooperation with Government Agencies Have there been any recent changes to the TOS? How were users informed of any changes? http://www.cbsnews.com/news/social-media-sites-youll-be-seeing-more-of-in-2016/ Who really owns the pictures and videos you’ve posted? Does the company reserve the right to share your data with other companies? Is the company keeping a record of your data? For what purpose? Does the company reserve the right to restrict what you see? HOW DO YOU KNOW THIS???