Social Networking Brian Oswald

Slides:



Advertisements
Similar presentations
The Internet: Educates Us Entertains Us Connects us False information
Advertisements

Instant Messages: I am bored. Social Networks: Facebook, Myspace.
Surfing the net: Ways to protect yourself. Internet Safety Look into safeguarding programs or options your online service provider might offer. Look into.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Part I: Making Good Online Choices
TECHNICOOL A Technology Safety Program © 2011 PCAV.
Association of Registered Nurses of British Columbia Social Media Guide.
Don’t be bullied, or be a bully.
Professional Networking Michael Wirthlin Brigham Young University, CHREC Provo, Utah, USA.
Using Twitter By Nancy Hanus Michigan State University School of Journalism Sept. 13, 2010.
THAT STRANGER IS NOT YOUR FRIEND Facebook 101:. Housekeeping This presentation is not exhaustive It is just enough information to get you started; making.
Netiquette Rules.
Social Media: FACEBOOK Kristin Martin Professional Development.
What do I need to know?.   Instant Messages  Social Networking.
Basics: Getting Started Uploading and Sharing Videos on YouTube. Basics: Getting Started Uploading and Sharing Videos on YouTube. 1.
Do you know how to keep yourself safe?
How It Applies In A Virtual World
Digital citizenship BY MRS. DERITA. Digital Communication The digital exchange of information.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Social networks and communities Suitable for: Improver.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
SEARCHING FOR A JOB CCM Mission Station F.I.T. Program 2015.
PAGE 1 Company Proprietary and Confidential Internet Safety and Security Presented January 13, 2014.
Welcome to the wonderful world of……. . A Quick & Easy Guide.  What IS ?  A quick, easy and convenient way to send a letter to friends, family.
Social Media Impact on Employment October 2, 2013 Human Resource Services.
Social Media. Topics 1. Inclusion Means Everywhere 2. What is Social Media? 3. Facebook 4. Twitter 5. Youtube 6. Instagram 7. Linked In 8. Staying Safe.
FACEBOOK IS THE BEST THING THAT EVER HAPPENED TO FRIENDSHIP WHY I LIKE FACEBOOK! By Mike Matthews.
Have Fun – Stay Safe ‘E Safety’ – ‘Cyber Safe’. What is ‘Cyber Space’? The invisible space that we use to link ourselves to the internet or other people.
Agenda Last class: Internet Literacy Lab Today: Internet Safety.
Tippecanoe 4-H Computer Project Mikel BergerBret Madsen Ed Evans
Successful Interviewing. Objective Students will be able to anticipate and articulate key job skills and be prepared for a real job interview.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
XHS Students Web Tools 2.0 Class. Personal Information Passwords Make it hard for others to figure out Never give it to your friends Don’t use the same.
To Introduction cyber safety Grids for Kids – January 2008 Written by Donna Cobrin.
Advisory Lesson.  The internet can be a fun way to share information and “stay connected” with your friends, but bad things can happen.  The following.
Be More…Tech Savvy A Workshop for Elementary Students about Internet Safety.
How to be Safe Online. Online Access How many of you go online? What are your favorite things to do online? Who accesses the Internet from their smart.
1. Go to 2. Complete the requested information.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Personal Online Safety Information Security Systems Community Outreach Program McKinley Middle School April 23, 2013.
TECHNOLOGY USE AGREEMENT FOR STUDENTS GRADES 3-8 This presentation was created to help students understand the district’s Technology Use Agreement before.
My Digital Footprint.
Educational Networks What are they and why are they important?
Use Facebook to Farm Your Neighborhoods Brought to you by: YOUR NAME YOUR COMPANY Your Phone Number.
MY DIGITAL FOOTPRINT. WHAT IS A DIGITAL FOOTPRINT? Each time you log onto social media, you leave a trail behind you, mostly based on what you search.
Activity 2 What to Do?.
Facebook 101 This class contains content from Saint Paul Public Libraries, Project for Pride in Living, and GCFLearnFree.org.
Mr Arthur. 73% of children have a presence online by the time they are 2. 74% of 8 to 11 year olds have access to a tablet and 63% of children get their.
WINTER Template 01 to Introduction Cyber Safety Introduced by Donna Cobrin.
How To Use Social Media to Launch Your Career. The most important social media outlet to be active on is LinkedIn. This site provides valuable tools that.
CHAPTER 18 TECHNOLOGY ADVANCEMENTS IN THE WORKPLACE.
Netiquette and Online Safety By: H F. Netiquette Netiquette is the do’s and don’ts of the internet. Basically netiquette is the rules of online communication.
1. Guard your privacy. What people know about you is up to you. 2. Protect your reputation. Self-reflect before you self-reveal. What’s funny or edgy.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
YEAR 6’S GUIDE TO STAYING SAFE ON THE INTERNET. CHATTING When you are chatting to people online, try not to give out any personal information about yourself.
STOP. THINK. CONNECT. Online Safety Quiz. Round 1: Safety and Security.
that keeping money and personal information safe is very important That losing money or having personal information stolen can be distressing.
Career Readiness Chapter 7 1. In This Chapter You Will: Chapter 7: Career Readiness 2 Learn about how internships, mentoring, part-time work and volunteering.
PROFESSIONALISM AND SOCIAL MEDIA Created by: Bedig Galladian.
Professional Social Networking Career Advising Career Advising Southern Connecticut State University Southern Connecticut State University.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
Information Guide to Cyber Bullying. Cyber bullying is a relatively new form of bullying which has started happening a lot on social networking sites,
Online Reputation A guide for children aged 7+
Creating your online identity
PCS Technology for Staff: Acceptable Use, Privacy, and Safety
How to use the internet safely and How to protect my personal data?
STOP. THINK. CONNECT. Online Safety Quiz.
Job Search: Networking
Introduction to Computers
Internet Safety – Social Media
Presentation transcript:

Social Networking Brian Oswald

Examples of Social Network Sites

What is Social Networking? Online tools to build or maintain relationships  Old school friends  Family  Business associates  Others who share common interests

Community Focus User-Centric Interest-Centric (Communities)

User-Centric Each user has a dedicated 'Home' page.  User news, interests, activities are posted here for 'followers' to read and comment on.

Interest-Centric Groups form around specific interests Individual users might have profile pages, but those are not of major importance to the site.

Social Network Uses Informational  General-purpose knowledge, encyclopedic, current events Professional  Business research, business networking, job hunting (Continued)

Uses (Continued) Personal  Staying in contact with friends  Locating old / new friends Activity Groups  Find a group of people that want to get out and do something you enjoy

Site / Usage Facebook  Started as a way to keep track of friends in / after college.  Mainly User-Centric, but expanding to include groups.

LinkedIn Professional Networking User-Centric

Meetup.com Find groups of people participating in activities. Group-Centric

Flickr Entire community based around one activity (photography) User-Centric

Benefits (Summary) Stay in touch with people you know Find others with similar interests Share your life with your friends Share your interests with the world

Social Network Dangers There is no real security on the Internet  Internet is World-Wide, laws are not  What is secure today, can be hacked tomorrow.  People who are your friends today, might not be tomorrow.

We Endanger Ourselves US Government study showed the following;  A belief the Internet provides anonymity  Lack of physical proximity provides false sense of security  Information tailored for friends, forgetting who all might see it  Attempts to impress others

No Anonymity There are certain points that all traffic must pass through, where it can be tracked.  Your local connection  Your ISP  The remote ISP  The remote site

Transparent Internet The Internet was not designed for security Encryption is a modern addition to the Internet Most sites do not use encryption Even if your traffic is encrypted, I can still tell who you are, and who you are talking to. I just cannot see what you are saying.

FireSheep Many sites use encryption to protect your login, but then do not encrypt the traffic after that. A cookie is used like an ID card, so that you do not have to keep sending your login. That cookie can be copied, and your account hacked.

Physical Presence Talking big when the threat is away. The Internet gives the feeling of being away from everyone, but really makes them closer than ever. We feel safe in our homes, but the Internet brings the outside world into our homes.

Faith the Web Can Keep Secrets User-centric Web sites offer controls to protect our data. We select who can see it.  The bigger the site, the bigger the target for hacking.  Each one of your friends could be tricked into revealing their login, and then a hacker can know what they know.

Instant Bullhorn Never has it been so easy to say something at a moment of stress, to the whole world, that you immediately regret. Be careful what you say in an attempt to impress someone, or in response to something that upset you. It will be on record forever.

No 'Undo' Button Once something is on the Internet, there may be no taking it back. You can go back to the site and delete what you wrote, but you cannot be sure it has not already been archived somewhere, or that someone else has not saved a copy for their own records. Post nothing you would not want to see on a billboard along the Interstate.

Mistakes We Make Over-sharing Activities Mixing Personal and Professional 'Tweet' Rage Connection Competition Password Sloth Trigger Finger Endangering Others

Over-sharing Activities The more someone knows about you, the better they are at convincing you or your friends that they know you. Do you want everyone to know where you are all the time? Do you want to want everyone to know when you will be away from the house for extended periods (Vacation)?

Personal and Professional Sitting at the computer at home can lead you to being less formal. Be aware of posting to professional sites when in this mindset. Many employers will search the social networks to find out about potential employees.

Tweet Rage (Flame War) It is so easy to fire off a quick and witty response to someone who has just upset you. This generally invites a response. This process can quickly get out of hand. Use caution when your emotions are running hot.

Connection Competition It is natural to get pulled into competitions The more connections you have, the more people who can read the stuff you post. This may in many cases include not just your direct connections, but their friends as well Makes it easy for scammers to get into your network

Passwords The best password is the one you cannot remember. :-) Avoid 'dictionary' words Use a two-part password  Short random combination with a letter, number, and symbol, plus another easy pattern (song lyric, etc)

Passwords (Continued) Do not use the same password at more than one site.  Otherwise, if any site is hacked, then the hacker has the password to ALL of your sites. Change passwords regularly at sensitive sites. Secret Question / Answer is a password bypass.

A Danger to Others Be careful what you share. Not only about yourself, but also about your family and friends. Even if I am not a member of Facebook, my friends could be posting pictures of me.

Be Careful What You Share Avoid posting enough information to make you specifically identifiable  My Name - OK  My City - OK  My Name AND City - NOT OK The more I know, the easier I can scam you, your friends, or businesses (Utilities, Cable, Stores, Banks, etc..)

Summary Social Network sites can be very useful, and a lot of fun. The Internet is a dangerous, lawless place. Use it wisely.  Be careful who you invite to see your information  Be careful what you put out into the world

Thank You! Thank you for coming! Questions? Brian Oswald