SlideShare uma empresa Scribd logo
1 de 31
Social Media
and Privacy
Sarah Mitchell
Goal
for Tonight

 What is Social Media?

 What is Privacy?

 Changes in social norms

 How data is collected about you

 What you can do to maintain your privacy
Big Brother meet Mark Zuckerberg

Written in 1949          Launched in 2004
  Pervasive government   Facebook's mission is to give people
                                  the power to share
        surveillance           and make the world more
                                 open and connected.
What is Social Media?

Online tools designed to connect people with
common interests including:

     LinkedIn
     Facebook
     Twitter
     Blogs
     YouTube
     FourSquare
     Flickr
Australians
Online 2009



 use the   subscribe                                 subscribe
Internet       to                                        to
           Broadband                                  Internet
             service                                   service



             http://www.abs.gov.au/AUSSTATS/abs@.nsf/Lookup/4102.0Main+Features50Jun+2011
http://www.socialmedianews.com.au/social-media-statistics-australia-january-2012/
Paradigm Shift in
Social Norms




     We
     Assume:             But Online:
     Conversations are   Conversations are
     private and only    public by default and
     made public when    you have to work to
     we take action      make them private
What is Privacy?

 “Privacy
        isn’t about controlling
functional access to content as
much as knowing what to share
  when and how it will flow.”


                 Danah Boyd

                 32nd International Conference
                 of Data Protection and
                 Privacy Commissioners
The Pull
of the Social Network
The comfort
of strangers
1. Most social networks have no way to
   qualify friendships. If they do, they’re
   ineffective or rarely used.
2. We’re much more relaxed about strangers
   in an online environment than we are
   in person.
3. Social networks provide a game-like
   atmosphere where collecting friends
   and building big followings is desirable.
   Alexander Korth, http://www.readwriteweb.com/archives/on_privacy_in_social_networks_what_drives_users.php
Be aware
 Social Media is
  designed to encourage
  people to abandon
  privacy. We’re MORE
  reserved in person.
 We connect with
  people we don’t know
  and we do it often
 It’s immediate;
  everyone has devices
  and networks
                          Image courtesy of Miss Karen at Flickr.com
Your Information
is Networked

                                                 Social Media is considered
                                                  part of the public domain

                                                 Over 90% of recruiters
                                                  used social media tools to
                                                  screen candidates

                                                 Journalists scour
                                                  Facebook whenever
                                                  they need a photo
Image courtesy of fredcavazza at Flickr.com
It’s not
Big Brother
you should be
worrying about -
It’s your
family, friends
and colleagues
You’re being
exposed in new ways
In many
different forums
There is
no privacy!


“It’s highly likely that if you have
had a public profile or website that
has publicly accessible data, it’s
been indexed and identified by
someone.”    tribalytic.com
“We don’t have developed
    laws of individual
  privacy in Australia.”


             Michael Lishman,
             Partner at Clifford Chance

             24 May 2011, AICD Emerging
             Director Briefing: Risk and
             Reputation Management
What on earth is

WOEID?
WOEID
Where on Earth ID (WOEID)
describes your location in a
more friendly way than
longitude/latitude coordinates
How is WOEID
determined?

 GPS coordinates from
  your mobile phone,
  computer, car or any
  other GPS device

 Geo tags derived from
  user profiles like
  www.trendsmap.com

 Your time zone
How is WOEID
determined?

 Placemaker from Yahoo –
  Free geoparsing Web service
  for feeds, web pages, news,
  status updates

 Language identifier

 Text Mining – What you’re
  talking about in your social
  media activity                 Image courtesy of Smart Stylist on Flickr.com
How is WOEID
determined?

 FourSquare and other        Facebook’s ‘Social Graph’ API
  social media tools using
  that auto posting feature    {
                                "name": "Facebook Platform",
                               "type": "page",
 Network theory –              "website": "http://developers.facebook.com",
  You probably live where      "username": "platform", "founded": "May
                               2007", "company_overview": "Facebook
  your network is located      Platform enables anyone to build...",
                               "mission": "To make the web moe open and
                               social.", "products": "Facebook Application
 Publically available APIs    Programming Interface (API)...", "fan_count":
  for nearly every social      449921, "id": 19292868552, "category":
                               "Technology“
  media site including          }
  Facebook and Twitter
How is WOEID
determined?

 Your extended
  social network:
  –   Blog
  –   Facebook
  –   Twitter
  –   LinkedIn
  –   MySpace

 Paid services (online
  detective agencies)
Social Media is here to stay BUT:

                  Your data lives into
                   perpetuity

                  You don’t own the
                   data once it’s
                   posted onto the
                   web

                  Privacy policies
                   change all the time
How is WOEID used?
Recommendations
How to Stem
Privacy Erosion

 Behave as if the world is paying attention – it is

 Turn off GEO tracking on your electronic devices
  (don’t forget your car)
 Remove or deactivate social networking accounts
  you no longer use
 Refrain from using auto posting features

 Refrain from using cross channel integration

 Become familiar with privacy settings
My Personal
Rules

 Don’t post personal photos
  of anyone
 Never mention the names of
  my family
 Do not discuss where I’m going or
  advertise when I’m going to be away
  from home
 Don’t reveal my birthdate
Social Media is
 NOT private



 Understanding the flow of data
  and the integration between
social networking channels is key
   to protecting your privacy.
Good
Resources

∗ Privacy Commissioners website (Aus)
 www.privacy.gov.au
∗ Privacy Rights website (USA)
  www.privacyrights.org
∗ Timothy Lisko (USA), @PrivacyWonk
 www.privacywonk.net
∗ Vivenne Storey (Australia), @mysocialpolicy
 http://mysocialmedialawyer.wordpress.com/
Questions?

Mais conteúdo relacionado

Mais procurados

Social Media Presence and Policy
Social Media Presence and PolicySocial Media Presence and Policy
Social Media Presence and PolicyLaDonna Coy
 
Social Media & Networking - Boon or Bane?
Social Media & Networking - Boon or Bane?Social Media & Networking - Boon or Bane?
Social Media & Networking - Boon or Bane?Yash Mittal
 
Social Media & Prevention
Social Media & PreventionSocial Media & Prevention
Social Media & PreventionLaDonna Coy
 
CMM115 Social Networking Presentation
CMM115 Social Networking PresentationCMM115 Social Networking Presentation
CMM115 Social Networking PresentationBernie Baker ☁️
 
Choosing & Using Social Media Tools
Choosing & Using Social Media ToolsChoosing & Using Social Media Tools
Choosing & Using Social Media ToolsLaDonna Coy
 
Introduction to Social Media
Introduction to Social MediaIntroduction to Social Media
Introduction to Social MediaMichele Martin
 
Social networking ... Boon or a Bane
Social networking ... Boon or a Bane Social networking ... Boon or a Bane
Social networking ... Boon or a Bane Nivesh Yadav
 
UIUC Slide Presentation
UIUC Slide PresentationUIUC Slide Presentation
UIUC Slide PresentationJohn Fudrow
 
Uiucpresentation
UiucpresentationUiucpresentation
UiucpresentationJohn Fudrow
 
Ppt of social networking sites
Ppt of social networking sitesPpt of social networking sites
Ppt of social networking sitesNidhi Vats
 
Social Media in Prevention - Oregon Prevention Conference
Social Media in Prevention - Oregon Prevention ConferenceSocial Media in Prevention - Oregon Prevention Conference
Social Media in Prevention - Oregon Prevention ConferenceLaDonna Coy
 
Washington Prevention Summit 09
Washington Prevention Summit 09Washington Prevention Summit 09
Washington Prevention Summit 09LaDonna Coy
 
Comscore Top 10 need-to-knows about social networking_and_where_it_is_headed
Comscore Top 10 need-to-knows about social networking_and_where_it_is_headedComscore Top 10 need-to-knows about social networking_and_where_it_is_headed
Comscore Top 10 need-to-knows about social networking_and_where_it_is_headedBrian Crotty
 
Metrics, Measures & Models: Forum 2010
Metrics, Measures & Models: Forum 2010Metrics, Measures & Models: Forum 2010
Metrics, Measures & Models: Forum 2010LaDonna Coy
 
Presentation on the Benefits of Social Media
Presentation on the Benefits of Social MediaPresentation on the Benefits of Social Media
Presentation on the Benefits of Social MediaSteve Theodorovich
 
MI Social Media Exploration
MI Social Media ExplorationMI Social Media Exploration
MI Social Media ExplorationLaDonna Coy
 

Mais procurados (19)

Social Media Presence and Policy
Social Media Presence and PolicySocial Media Presence and Policy
Social Media Presence and Policy
 
Social Media & Networking - Boon or Bane?
Social Media & Networking - Boon or Bane?Social Media & Networking - Boon or Bane?
Social Media & Networking - Boon or Bane?
 
Social Media & Prevention
Social Media & PreventionSocial Media & Prevention
Social Media & Prevention
 
CMM115 Social Networking Presentation
CMM115 Social Networking PresentationCMM115 Social Networking Presentation
CMM115 Social Networking Presentation
 
Choosing & Using Social Media Tools
Choosing & Using Social Media ToolsChoosing & Using Social Media Tools
Choosing & Using Social Media Tools
 
Social Media and Online Identity
Social Media and Online IdentitySocial Media and Online Identity
Social Media and Online Identity
 
Introduction to Social Media
Introduction to Social MediaIntroduction to Social Media
Introduction to Social Media
 
Social networking ... Boon or a Bane
Social networking ... Boon or a Bane Social networking ... Boon or a Bane
Social networking ... Boon or a Bane
 
UIUC Slide Presentation
UIUC Slide PresentationUIUC Slide Presentation
UIUC Slide Presentation
 
Uiucpresentation
UiucpresentationUiucpresentation
Uiucpresentation
 
Ppt of social networking sites
Ppt of social networking sitesPpt of social networking sites
Ppt of social networking sites
 
New Media Prev
New Media PrevNew Media Prev
New Media Prev
 
Social Media in Prevention - Oregon Prevention Conference
Social Media in Prevention - Oregon Prevention ConferenceSocial Media in Prevention - Oregon Prevention Conference
Social Media in Prevention - Oregon Prevention Conference
 
Washington Prevention Summit 09
Washington Prevention Summit 09Washington Prevention Summit 09
Washington Prevention Summit 09
 
Comscore Top 10 need-to-knows about social networking_and_where_it_is_headed
Comscore Top 10 need-to-knows about social networking_and_where_it_is_headedComscore Top 10 need-to-knows about social networking_and_where_it_is_headed
Comscore Top 10 need-to-knows about social networking_and_where_it_is_headed
 
Metrics, Measures & Models: Forum 2010
Metrics, Measures & Models: Forum 2010Metrics, Measures & Models: Forum 2010
Metrics, Measures & Models: Forum 2010
 
So me for nonprofits
So me for nonprofitsSo me for nonprofits
So me for nonprofits
 
Presentation on the Benefits of Social Media
Presentation on the Benefits of Social MediaPresentation on the Benefits of Social Media
Presentation on the Benefits of Social Media
 
MI Social Media Exploration
MI Social Media ExplorationMI Social Media Exploration
MI Social Media Exploration
 

Semelhante a Social Media and Privacy - Education Across the Nation - Australian Computer Society

Social Media and Privacy - National Conference, Australian Computer Society
Social Media and Privacy - National Conference, Australian Computer SocietySocial Media and Privacy - National Conference, Australian Computer Society
Social Media and Privacy - National Conference, Australian Computer SocietyMining Oil and Gas Jobs
 
Social Media and Privacy - National Conference 2012, Canberra - Australian Co...
Social Media and Privacy - National Conference 2012, Canberra - Australian Co...Social Media and Privacy - National Conference 2012, Canberra - Australian Co...
Social Media and Privacy - National Conference 2012, Canberra - Australian Co...Typeset
 
Social Media and Privacy
Social Media and PrivacySocial Media and Privacy
Social Media and PrivacyTypeset
 
Social media and Privacy - Australian Computer Society
Social media and Privacy - Australian Computer SocietySocial media and Privacy - Australian Computer Society
Social media and Privacy - Australian Computer SocietyTypeset
 
Week 7: Privacy-rev2013
Week 7:  Privacy-rev2013Week 7:  Privacy-rev2013
Week 7: Privacy-rev2013Ray Brannon
 
Chapter 5 Groups & Networks
Chapter 5  Groups & NetworksChapter 5  Groups & Networks
Chapter 5 Groups & NetworksRay Brannon
 
Production Assignment
Production AssignmentProduction Assignment
Production Assignmentcrumbsy
 
Chapter 5 Groups & Networks
Chapter 5  Groups & NetworksChapter 5  Groups & Networks
Chapter 5 Groups & NetworksRay Brannon
 
Social Network: Good or Bad
Social Network: Good or BadSocial Network: Good or Bad
Social Network: Good or Badmanesh Makheja
 
IS 20090 Week 2 - Social Networks
IS 20090 Week 2 - Social NetworksIS 20090 Week 2 - Social Networks
IS 20090 Week 2 - Social Networksis20090
 
Advantages and Disadvantages Of Social Media
 Advantages and Disadvantages Of Social Media Advantages and Disadvantages Of Social Media
Advantages and Disadvantages Of Social MediaDilna DV
 
Social network privacy.
Social network privacy.Social network privacy.
Social network privacy.STO STRATEGY
 
Cfadw presentation
Cfadw presentationCfadw presentation
Cfadw presentationguestf8d4d6f
 
Online Privacy in the Year of the Dragon
Online Privacy in the Year of the DragonOnline Privacy in the Year of the Dragon
Online Privacy in the Year of the DragonPhil Cryer
 
Social network privacy guide
Social network privacy guideSocial network privacy guide
Social network privacy guideYury Chemerkin
 
Is your data secure? privacy and trust in the social web
Is your data secure?  privacy and trust in the social webIs your data secure?  privacy and trust in the social web
Is your data secure? privacy and trust in the social webPhil Cryer
 
Should we sell ourselves in social networks
Should we sell ourselves in social networksShould we sell ourselves in social networks
Should we sell ourselves in social networksSérgio Vinícius Lucena
 
Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Kirsten Thompson
 

Semelhante a Social Media and Privacy - Education Across the Nation - Australian Computer Society (20)

Social Media and Privacy - National Conference, Australian Computer Society
Social Media and Privacy - National Conference, Australian Computer SocietySocial Media and Privacy - National Conference, Australian Computer Society
Social Media and Privacy - National Conference, Australian Computer Society
 
Social Media and Privacy - National Conference 2012, Canberra - Australian Co...
Social Media and Privacy - National Conference 2012, Canberra - Australian Co...Social Media and Privacy - National Conference 2012, Canberra - Australian Co...
Social Media and Privacy - National Conference 2012, Canberra - Australian Co...
 
Social Media and Privacy
Social Media and PrivacySocial Media and Privacy
Social Media and Privacy
 
Social media and Privacy - Australian Computer Society
Social media and Privacy - Australian Computer SocietySocial media and Privacy - Australian Computer Society
Social media and Privacy - Australian Computer Society
 
Week 7: Privacy-rev2013
Week 7:  Privacy-rev2013Week 7:  Privacy-rev2013
Week 7: Privacy-rev2013
 
Casiappt
CasiapptCasiappt
Casiappt
 
Chapter 5 Groups & Networks
Chapter 5  Groups & NetworksChapter 5  Groups & Networks
Chapter 5 Groups & Networks
 
Production Assignment
Production AssignmentProduction Assignment
Production Assignment
 
Chapter 5 Groups & Networks
Chapter 5  Groups & NetworksChapter 5  Groups & Networks
Chapter 5 Groups & Networks
 
Social Network: Good or Bad
Social Network: Good or BadSocial Network: Good or Bad
Social Network: Good or Bad
 
IS 20090 Week 2 - Social Networks
IS 20090 Week 2 - Social NetworksIS 20090 Week 2 - Social Networks
IS 20090 Week 2 - Social Networks
 
Advantages and Disadvantages Of Social Media
 Advantages and Disadvantages Of Social Media Advantages and Disadvantages Of Social Media
Advantages and Disadvantages Of Social Media
 
Social network privacy.
Social network privacy.Social network privacy.
Social network privacy.
 
Cfadw presentation
Cfadw presentationCfadw presentation
Cfadw presentation
 
Online Privacy in the Year of the Dragon
Online Privacy in the Year of the DragonOnline Privacy in the Year of the Dragon
Online Privacy in the Year of the Dragon
 
Social network privacy guide
Social network privacy guideSocial network privacy guide
Social network privacy guide
 
Is your data secure? privacy and trust in the social web
Is your data secure?  privacy and trust in the social webIs your data secure?  privacy and trust in the social web
Is your data secure? privacy and trust in the social web
 
Should we sell ourselves in social networks
Should we sell ourselves in social networksShould we sell ourselves in social networks
Should we sell ourselves in social networks
 
Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?
 
Social networking
Social networkingSocial networking
Social networking
 

Mais de Mining Oil and Gas Jobs

Making wise use of social media in your jobs search
Making wise use of social media in your jobs searchMaking wise use of social media in your jobs search
Making wise use of social media in your jobs searchMining Oil and Gas Jobs
 
Australia Looks Forward To The Asian Century - Slideshow
Australia Looks Forward To The Asian Century - SlideshowAustralia Looks Forward To The Asian Century - Slideshow
Australia Looks Forward To The Asian Century - SlideshowMining Oil and Gas Jobs
 
Want a job? Then clean up your social media act
Want a job? Then clean up your social media actWant a job? Then clean up your social media act
Want a job? Then clean up your social media actMining Oil and Gas Jobs
 
Social Media - Don't mess up your future by what you post today
Social Media - Don't mess up your future by what you post todaySocial Media - Don't mess up your future by what you post today
Social Media - Don't mess up your future by what you post todayMining Oil and Gas Jobs
 
Getting Social With Your Recruitment Brand
Getting Social With Your Recruitment BrandGetting Social With Your Recruitment Brand
Getting Social With Your Recruitment BrandMining Oil and Gas Jobs
 
Social Media - What's In It For Me Professionally?
Social Media - What's In It For Me Professionally?Social Media - What's In It For Me Professionally?
Social Media - What's In It For Me Professionally?Mining Oil and Gas Jobs
 
Planning an Effective Social Media Strategy for Your Next Event - AIME 2012
Planning an Effective Social Media Strategy for Your Next Event - AIME 2012Planning an Effective Social Media Strategy for Your Next Event - AIME 2012
Planning an Effective Social Media Strategy for Your Next Event - AIME 2012Mining Oil and Gas Jobs
 

Mais de Mining Oil and Gas Jobs (11)

Mining skills demand is strong
Mining skills demand is strongMining skills demand is strong
Mining skills demand is strong
 
Making wise use of social media in your jobs search
Making wise use of social media in your jobs searchMaking wise use of social media in your jobs search
Making wise use of social media in your jobs search
 
Women in mining
Women in miningWomen in mining
Women in mining
 
Australia Looks Forward To The Asian Century - Slideshow
Australia Looks Forward To The Asian Century - SlideshowAustralia Looks Forward To The Asian Century - Slideshow
Australia Looks Forward To The Asian Century - Slideshow
 
Mining Industry Major Projects
Mining Industry Major ProjectsMining Industry Major Projects
Mining Industry Major Projects
 
Social Media in the Resources Industry
Social Media in the Resources IndustrySocial Media in the Resources Industry
Social Media in the Resources Industry
 
Want a job? Then clean up your social media act
Want a job? Then clean up your social media actWant a job? Then clean up your social media act
Want a job? Then clean up your social media act
 
Social Media - Don't mess up your future by what you post today
Social Media - Don't mess up your future by what you post todaySocial Media - Don't mess up your future by what you post today
Social Media - Don't mess up your future by what you post today
 
Getting Social With Your Recruitment Brand
Getting Social With Your Recruitment BrandGetting Social With Your Recruitment Brand
Getting Social With Your Recruitment Brand
 
Social Media - What's In It For Me Professionally?
Social Media - What's In It For Me Professionally?Social Media - What's In It For Me Professionally?
Social Media - What's In It For Me Professionally?
 
Planning an Effective Social Media Strategy for Your Next Event - AIME 2012
Planning an Effective Social Media Strategy for Your Next Event - AIME 2012Planning an Effective Social Media Strategy for Your Next Event - AIME 2012
Planning an Effective Social Media Strategy for Your Next Event - AIME 2012
 

Último

UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 

Último (20)

UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 

Social Media and Privacy - Education Across the Nation - Australian Computer Society

  • 2. Goal for Tonight  What is Social Media?  What is Privacy?  Changes in social norms  How data is collected about you  What you can do to maintain your privacy
  • 3. Big Brother meet Mark Zuckerberg Written in 1949 Launched in 2004 Pervasive government Facebook's mission is to give people the power to share surveillance and make the world more open and connected.
  • 4. What is Social Media? Online tools designed to connect people with common interests including:  LinkedIn  Facebook  Twitter  Blogs  YouTube  FourSquare  Flickr
  • 5. Australians Online 2009 use the subscribe subscribe Internet to to Broadband Internet service service http://www.abs.gov.au/AUSSTATS/abs@.nsf/Lookup/4102.0Main+Features50Jun+2011
  • 7. Paradigm Shift in Social Norms We Assume: But Online: Conversations are Conversations are private and only public by default and made public when you have to work to we take action make them private
  • 8. What is Privacy? “Privacy isn’t about controlling functional access to content as much as knowing what to share when and how it will flow.” Danah Boyd 32nd International Conference of Data Protection and Privacy Commissioners
  • 9. The Pull of the Social Network
  • 10. The comfort of strangers 1. Most social networks have no way to qualify friendships. If they do, they’re ineffective or rarely used. 2. We’re much more relaxed about strangers in an online environment than we are in person. 3. Social networks provide a game-like atmosphere where collecting friends and building big followings is desirable. Alexander Korth, http://www.readwriteweb.com/archives/on_privacy_in_social_networks_what_drives_users.php
  • 11. Be aware  Social Media is designed to encourage people to abandon privacy. We’re MORE reserved in person.  We connect with people we don’t know and we do it often  It’s immediate; everyone has devices and networks Image courtesy of Miss Karen at Flickr.com
  • 12. Your Information is Networked  Social Media is considered part of the public domain  Over 90% of recruiters used social media tools to screen candidates  Journalists scour Facebook whenever they need a photo Image courtesy of fredcavazza at Flickr.com
  • 13. It’s not Big Brother you should be worrying about - It’s your family, friends and colleagues
  • 16. There is no privacy! “It’s highly likely that if you have had a public profile or website that has publicly accessible data, it’s been indexed and identified by someone.” tribalytic.com
  • 17. “We don’t have developed laws of individual privacy in Australia.” Michael Lishman, Partner at Clifford Chance 24 May 2011, AICD Emerging Director Briefing: Risk and Reputation Management
  • 18. What on earth is WOEID?
  • 19. WOEID Where on Earth ID (WOEID) describes your location in a more friendly way than longitude/latitude coordinates
  • 20. How is WOEID determined?  GPS coordinates from your mobile phone, computer, car or any other GPS device  Geo tags derived from user profiles like www.trendsmap.com  Your time zone
  • 21. How is WOEID determined?  Placemaker from Yahoo – Free geoparsing Web service for feeds, web pages, news, status updates  Language identifier  Text Mining – What you’re talking about in your social media activity Image courtesy of Smart Stylist on Flickr.com
  • 22. How is WOEID determined?  FourSquare and other Facebook’s ‘Social Graph’ API social media tools using that auto posting feature { "name": "Facebook Platform", "type": "page",  Network theory – "website": "http://developers.facebook.com", You probably live where "username": "platform", "founded": "May 2007", "company_overview": "Facebook your network is located Platform enables anyone to build...", "mission": "To make the web moe open and social.", "products": "Facebook Application  Publically available APIs Programming Interface (API)...", "fan_count": for nearly every social 449921, "id": 19292868552, "category": "Technology“ media site including } Facebook and Twitter
  • 23. How is WOEID determined?  Your extended social network: – Blog – Facebook – Twitter – LinkedIn – MySpace  Paid services (online detective agencies)
  • 24. Social Media is here to stay BUT:  Your data lives into perpetuity  You don’t own the data once it’s posted onto the web  Privacy policies change all the time
  • 25. How is WOEID used?
  • 27. How to Stem Privacy Erosion  Behave as if the world is paying attention – it is  Turn off GEO tracking on your electronic devices (don’t forget your car)  Remove or deactivate social networking accounts you no longer use  Refrain from using auto posting features  Refrain from using cross channel integration  Become familiar with privacy settings
  • 28. My Personal Rules  Don’t post personal photos of anyone  Never mention the names of my family  Do not discuss where I’m going or advertise when I’m going to be away from home  Don’t reveal my birthdate
  • 29. Social Media is NOT private Understanding the flow of data and the integration between social networking channels is key to protecting your privacy.
  • 30. Good Resources ∗ Privacy Commissioners website (Aus) www.privacy.gov.au ∗ Privacy Rights website (USA) www.privacyrights.org ∗ Timothy Lisko (USA), @PrivacyWonk www.privacywonk.net ∗ Vivenne Storey (Australia), @mysocialpolicy http://mysocialmedialawyer.wordpress.com/