Donald E. Hester 19-Mar-2010 For audio call Toll Free and use PIN/code
Maximize your CCC Confer window. Phone audio will be in presenter-only mode. Ask questions and make comments using the chat window. Housekeeping
Adjusting Audio 1)If you’re listening on your computer, adjust your volume using the speaker slider. 2)If you’re listening over the phone, click on phone headset. Do not listen on both computer and phone.
Saving Files & Open/close Captions 1.Save chat window with floppy disc icon 2.Open/close captioning window with CC icon
Emoticons and Polling 1)Raise hand and Emoticons 2)Polling options
Donald E. Hester
Social Networking Blogs Vlogs Podcasts Internet forums Wikis Groups Product reviews Virtual reality Micro blogging Media sharing Social Media Social Shopping Social Gaming Social Networking
Services are extremely popular and useful Almost a must today, (if you are not in, you are out) People post too much information about themselves or their kids Be aware of your aggregate information The key is to be aware of what you are sharing
Social Networking Blogs Vlogs Podcasts Internet forums Wikis Groups Product reviews Virtual reality Micro blogging Media sharing
New ways of reaching customers (students) New ways of researching Meet people (students) were they are Get the message out faster to more people Democratization of media Relationships and conversation Increase transparency in government and organizations Community, sharing, and connecting (Collaboration)
Unqualified opinions Massive amounts of content Consistent delivery Information overload Work/Life balance Mob opinion Anonymity Online Bullies Cyber-stalkers
But security issues and privacy issues are entirely two different beasts. A security issue occurs when a hacker gains unauthorized access to a website or your computer. Hacking Virus, worm or malicious software Privacy issues involve the unwarranted access of private information. Typically information you put there but did not intend for everyone to see it Information about you posted by someone else
Would you invite a stranger into your house to look at your children's photo album? Public v. Private Aggregate information sources could give someone more information than intended.
Do you have control of what is posted? Not all fame is good! People use anonymity to post stuff about others! Embarrassing, loss of credibility
Do I have control of what is posted about me? Look yourself up! All but one of these is about me. One of these I was completely unaware of. Even if you are not on the web, you may be on the web! Do what you can to control what is out there.
Can someone use what you post against you?
Scams Applications gather information about you You may set your self up to being charged Fraud Identity theft
Limit the personal information you post. Your real friends should already know. Review privacy statements of sites and applications. Be wary of application that need access to your information or profile. Remember aggregate information. Keep your posts on information on a professional level Don’t instant message, , post, blog, podcast, share, tweet, upload or otherwise leave anything on the Internet you wouldn’t want to see on the front page of the local paper. Protect you computer, keep it up-to-date, install Anti-virus Use complex passwords, don’t share your passwords
heft/ heft/ mspx mspx
Donald E. Hester CISSP, CISA, CAP, MCT, MCITP, MCTS, MCSE Security, Security+ Maze & / San Diego City College Q&A
Evaluation Survey Link Help us improve our seminars by filing out a short online evaluation survey at:
For upcoming events and links to recently archived seminars, check Web site at: Social Media (Web 2.0) and Privacy Thanks for attending