SlideShare uma empresa Scribd logo
1 de 13
Connecting Online
Connecting Online: Outline
 I do a lot on social networking sites – should I be
  concerned about my privacy?
 What’s my responsibility to my networks?
 Am I using location-based social networks like
  Foursquare or Facebook Places?
 What is smishing?
 How much information can people get from the
  photos I have uploaded?
Connecting Online:
      Social Networks
Social networking involves:
 What you share
 Who you share it
  with




                              Image courtesy of Eugene Kim (Flickr)
Connecting Online:
      Social Networks
Social networking involves:
 Responsibility to your networks
  – You may be comfortable posting that photo of last
    night’s party – but your friend may not
  – Remember that people are your “friends”
    and “followers”
  – Ask for help if you need it and reach out when you
    can – just as you would if faced with a similar
    situation offline
Connecting Online: Trends
                                           We are going
                                            mobile.
                                           More than half of all
                                            adults in US own a
                                            smart phone.75% of
                                            teens.

                                          Source: http://www.pewinternet.org/
                                          Commentary/2012/February/Pew-Internet-Mobile.aspx



Image courtesy of Johan Larson (Flickr)
Connecting Online: Smishing




      (Click to view)

                        Taken from YouTube
Connecting Online:
       Mobile Strategies
 If your mobile is
  compromised,
  scammers can access
  all the personal
  information on your
  phone
 Secure wifi-hotspot
  security. Even if you’re
  on your phone, the
  same rules apply
Connecting Online:
       Mobile Strategies
 Look up unknown app creators, and unknown
  numbers
 Avoid keeping too much personal information
  (ie. bank numbers and pins) on your phone
Connecting Online: Trends
              Who can see my
              location?
              • Geolocation
              • Geotagging
              • Privacy and safety
                 implications of
                 place-based apps?
Connecting Online:
        Geotagging
Who can see my location?
 While metadata makes it easier to organize
  photos, revealing metadata of your photos can
  be vulnerable to cyberstalking
 If you don’t want to be found, make sure you
  disable geotagging function
Connecting Online: Strategies

 Consider your privacy settings. Who are you
  allowing to view your location?
 If your location-based social network is linked to
  a Twitter or Facebook profile, your location is
  shared on these networks too
What’s your digital tattoo?
Resources
   My Social Network (c) Eugene Kim
    (http://www.flickr.com/photos/eekim/2235294862/in/photostream/). CC BY-NC-SA 2.0

   Pew Research Centre. “Pew Internet: Mobile.” Pew Internet. N,d. Web. 31 July 2012.

   Browser (c) Johan Larsson (http://www.flickr.com/photos/johanl/4397800453/) CC BY 2.0

   “What Is Smishing?” 16 May. 2012. YouTube. Web. 12 Aug. 2012.




                                                                                            tr

Mais conteúdo relacionado

Mais procurados

Social media and security essentials.pptx
Social media and security essentials.pptxSocial media and security essentials.pptx
Social media and security essentials.pptx
Pink Elephant
 
Online Policy Primer: Facebook
Online Policy Primer: Facebook Online Policy Primer: Facebook
Online Policy Primer: Facebook
ingridkreidler
 
Social Media And Privacy October 9 2009
Social Media And Privacy October 9 2009Social Media And Privacy October 9 2009
Social Media And Privacy October 9 2009
canadianlawyer
 

Mais procurados (20)

How will the Internet of Things look by 2025?
How will the Internet of Things look by 2025?How will the Internet of Things look by 2025?
How will the Internet of Things look by 2025?
 
How to Like Social Media Network Security
How to Like Social Media Network SecurityHow to Like Social Media Network Security
How to Like Social Media Network Security
 
Social media and security essentials.pptx
Social media and security essentials.pptxSocial media and security essentials.pptx
Social media and security essentials.pptx
 
Government Online: The 3 “P’s” of Success - Findings from Pew Internet
Government Online: The 3 “P’s” of Success - Findings from Pew InternetGovernment Online: The 3 “P’s” of Success - Findings from Pew Internet
Government Online: The 3 “P’s” of Success - Findings from Pew Internet
 
Digital technology impacts by 2020
Digital technology impacts by 2020Digital technology impacts by 2020
Digital technology impacts by 2020
 
Social Media and Media Abuse for Parents
Social Media and Media Abuse for ParentsSocial Media and Media Abuse for Parents
Social Media and Media Abuse for Parents
 
Is Online Privacy a Thing of the Past?
Is Online Privacy a Thing of the Past?Is Online Privacy a Thing of the Past?
Is Online Privacy a Thing of the Past?
 
Social media privacy issues
Social media privacy issuesSocial media privacy issues
Social media privacy issues
 
Social Media and Privacy - Education Across the Nation - Australian Computer ...
Social Media and Privacy - Education Across the Nation - Australian Computer ...Social Media and Privacy - Education Across the Nation - Australian Computer ...
Social Media and Privacy - Education Across the Nation - Australian Computer ...
 
Online Policy Primer: Facebook
Online Policy Primer: Facebook Online Policy Primer: Facebook
Online Policy Primer: Facebook
 
Future of the Internet: Role of the Web and New Media in the Public Sector
Future of the Internet: Role of the Web and New Media in the Public SectorFuture of the Internet: Role of the Web and New Media in the Public Sector
Future of the Internet: Role of the Web and New Media in the Public Sector
 
Social media risks and controls
Social media risks and controlsSocial media risks and controls
Social media risks and controls
 
Social Media And Privacy October 9 2009
Social Media And Privacy October 9 2009Social Media And Privacy October 9 2009
Social Media And Privacy October 9 2009
 
Security Dangers of Social Networking
Security Dangers of Social NetworkingSecurity Dangers of Social Networking
Security Dangers of Social Networking
 
Networked and Hyperconnected: The New Social (and work) Operating System
Networked and Hyperconnected:The New Social (and work) Operating SystemNetworked and Hyperconnected:The New Social (and work) Operating System
Networked and Hyperconnected: The New Social (and work) Operating System
 
Misuse of social media
Misuse of social mediaMisuse of social media
Misuse of social media
 
Social media and Security: How to Ensure Safe Social Networking
Social media and Security: How to Ensure Safe Social NetworkingSocial media and Security: How to Ensure Safe Social Networking
Social media and Security: How to Ensure Safe Social Networking
 
Buying a home at their fingertips: How to reach out on the standard and mobil...
Buying a home at their fingertips: How to reach out on the standard and mobil...Buying a home at their fingertips: How to reach out on the standard and mobil...
Buying a home at their fingertips: How to reach out on the standard and mobil...
 
Web on the go: Why the mobile Internet matters to businesses
Web on the go: Why the mobile Internet matters to businessesWeb on the go: Why the mobile Internet matters to businesses
Web on the go: Why the mobile Internet matters to businesses
 
Social Media & Networking - Boon or Bane?
Social Media & Networking - Boon or Bane?Social Media & Networking - Boon or Bane?
Social Media & Networking - Boon or Bane?
 

Destaque

Digital Tattoo Presentation for Canadian eLearning Conference 2009
Digital Tattoo Presentation for Canadian eLearning Conference 2009Digital Tattoo Presentation for Canadian eLearning Conference 2009
Digital Tattoo Presentation for Canadian eLearning Conference 2009
University of British Columbia
 

Destaque (16)

PPDP for RAs
PPDP for RAsPPDP for RAs
PPDP for RAs
 
Your Child's Digital Tattoo
Your Child's Digital TattooYour Child's Digital Tattoo
Your Child's Digital Tattoo
 
Digital Tattoo Workshop for VPL
Digital Tattoo Workshop for VPLDigital Tattoo Workshop for VPL
Digital Tattoo Workshop for VPL
 
Digital Tattoo for Student Teachers 2012
Digital Tattoo for Student Teachers 2012 Digital Tattoo for Student Teachers 2012
Digital Tattoo for Student Teachers 2012
 
Digital Tattoo for Teacher Candidates at UBC
Digital Tattoo for Teacher Candidates at UBC Digital Tattoo for Teacher Candidates at UBC
Digital Tattoo for Teacher Candidates at UBC
 
Digital Tattoo for Parents
Digital Tattoo for ParentsDigital Tattoo for Parents
Digital Tattoo for Parents
 
Digital Tattoo Presentation for Canadian eLearning Conference 2009
Digital Tattoo Presentation for Canadian eLearning Conference 2009Digital Tattoo Presentation for Canadian eLearning Conference 2009
Digital Tattoo Presentation for Canadian eLearning Conference 2009
 
Online Professionalism for International Student Scholars
Online Professionalism for International Student ScholarsOnline Professionalism for International Student Scholars
Online Professionalism for International Student Scholars
 
Digital Tattoo for UBC Teacher Candidates: Fall 2015
Digital Tattoo for  UBC Teacher Candidates: Fall 2015Digital Tattoo for  UBC Teacher Candidates: Fall 2015
Digital Tattoo for UBC Teacher Candidates: Fall 2015
 
Ace symposium 2013
Ace symposium 2013Ace symposium 2013
Ace symposium 2013
 
Digital Tattoo Quiz
Digital  Tattoo  QuizDigital  Tattoo  Quiz
Digital Tattoo Quiz
 
Digital Tattoo Workshop for BCLA/PNLA
Digital Tattoo Workshop for BCLA/PNLADigital Tattoo Workshop for BCLA/PNLA
Digital Tattoo Workshop for BCLA/PNLA
 
Publish
PublishPublish
Publish
 
Digital Tattoo for Faculty of Education - Instructors
Digital Tattoo for Faculty of Education - InstructorsDigital Tattoo for Faculty of Education - Instructors
Digital Tattoo for Faculty of Education - Instructors
 
Digital Tattoo Open Access Week 2010
Digital Tattoo Open Access Week 2010Digital Tattoo Open Access Week 2010
Digital Tattoo Open Access Week 2010
 
Digital Tattoo for Teacher Candidates 2011
Digital Tattoo for Teacher Candidates 2011Digital Tattoo for Teacher Candidates 2011
Digital Tattoo for Teacher Candidates 2011
 

Semelhante a Connecting Online

Social & mobile security
Social & mobile securitySocial & mobile security
Social & mobile security
Ernest Staats
 
Spiritual social media & mobile devices
Spiritual social media & mobile devicesSpiritual social media & mobile devices
Spiritual social media & mobile devices
Ernest Staats
 
Smr week 23 opsec and safe social networking
Smr week 23   opsec and safe social networkingSmr week 23   opsec and safe social networking
Smr week 23 opsec and safe social networking
Fort Rucker FRSA
 
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITYPresentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY
gailmowal
 
Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235
brendaylo
 
How to keep your teens safe on social media
How to keep your teens safe on social mediaHow to keep your teens safe on social media
How to keep your teens safe on social media
Kwazi Communications
 
Cyber bullying on social networking sites
Cyber bullying on social networking sitesCyber bullying on social networking sites
Cyber bullying on social networking sites
Gerard1990
 

Semelhante a Connecting Online (20)

Privacy issues in social networking
Privacy issues in social networkingPrivacy issues in social networking
Privacy issues in social networking
 
Social & mobile security
Social & mobile securitySocial & mobile security
Social & mobile security
 
Copied research extra research
Copied research extra research Copied research extra research
Copied research extra research
 
Spiritual social media & mobile devices
Spiritual social media & mobile devicesSpiritual social media & mobile devices
Spiritual social media & mobile devices
 
Social Media and Privacy - Education Across the Nation - Australian Computer ...
Social Media and Privacy - Education Across the Nation - Australian Computer ...Social Media and Privacy - Education Across the Nation - Australian Computer ...
Social Media and Privacy - Education Across the Nation - Australian Computer ...
 
EFFECTS OF SOCIAL MEDIA ON YOUTH
EFFECTS OF SOCIAL MEDIA ON YOUTHEFFECTS OF SOCIAL MEDIA ON YOUTH
EFFECTS OF SOCIAL MEDIA ON YOUTH
 
Smr week 23 opsec and safe social networking
Smr week 23   opsec and safe social networkingSmr week 23   opsec and safe social networking
Smr week 23 opsec and safe social networking
 
Social Media and Privacy - National Conference 2012, Canberra - Australian Co...
Social Media and Privacy - National Conference 2012, Canberra - Australian Co...Social Media and Privacy - National Conference 2012, Canberra - Australian Co...
Social Media and Privacy - National Conference 2012, Canberra - Australian Co...
 
Social Media and Privacy - National Conference, Australian Computer Society
Social Media and Privacy - National Conference, Australian Computer SocietySocial Media and Privacy - National Conference, Australian Computer Society
Social Media and Privacy - National Conference, Australian Computer Society
 
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITYPresentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY
 
Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235
 
Cyberspace slide show
Cyberspace   slide showCyberspace   slide show
Cyberspace slide show
 
Mobile Devices in Education
Mobile Devices in EducationMobile Devices in Education
Mobile Devices in Education
 
Film project 2
Film project 2Film project 2
Film project 2
 
Social media ict
Social media ictSocial media ict
Social media ict
 
Social media
Social media Social media
Social media
 
How to keep your teens safe on social media
How to keep your teens safe on social mediaHow to keep your teens safe on social media
How to keep your teens safe on social media
 
Internet Safety 2.0
Internet Safety 2.0Internet Safety 2.0
Internet Safety 2.0
 
Cyber bullying on social networking sites
Cyber bullying on social networking sitesCyber bullying on social networking sites
Cyber bullying on social networking sites
 
Netsafetyoct30 Sound
Netsafetyoct30 SoundNetsafetyoct30 Sound
Netsafetyoct30 Sound
 

Mais de University of British Columbia

Mais de University of British Columbia (15)

Digital Footprints for grades 2 and 3
Digital Footprints for grades 2 and 3Digital Footprints for grades 2 and 3
Digital Footprints for grades 2 and 3
 
Teacher Trainee Presentation 2013
Teacher Trainee Presentation 2013 Teacher Trainee Presentation 2013
Teacher Trainee Presentation 2013
 
What is the dtp
What is the dtp What is the dtp
What is the dtp
 
What is the dtp
What is the dtp What is the dtp
What is the dtp
 
Protect
ProtectProtect
Protect
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Digital Tattoo for Student Teachers
Digital Tattoo for Student TeachersDigital Tattoo for Student Teachers
Digital Tattoo for Student Teachers
 
Digital Tattoo Website Orientation
Digital Tattoo Website OrientationDigital Tattoo Website Orientation
Digital Tattoo Website Orientation
 
Native youth
Native youthNative youth
Native youth
 
Digital Tattoo: for MOSAIC
Digital Tattoo: for MOSAICDigital Tattoo: for MOSAIC
Digital Tattoo: for MOSAIC
 
Digital Tattoo: for VSB Educators
Digital Tattoo: for VSB EducatorsDigital Tattoo: for VSB Educators
Digital Tattoo: for VSB Educators
 
Digital tattoo - what's yours?
Digital tattoo - what's yours?Digital tattoo - what's yours?
Digital tattoo - what's yours?
 
Digital Tattoo for NITEP students
Digital Tattoo for NITEP studentsDigital Tattoo for NITEP students
Digital Tattoo for NITEP students
 
DT Arts Coop Workshop 2010 -Activity sheet
DT Arts Coop Workshop 2010 -Activity sheetDT Arts Coop Workshop 2010 -Activity sheet
DT Arts Coop Workshop 2010 -Activity sheet
 
DT Arts Coop Workshop 2010
DT Arts Coop Workshop 2010DT Arts Coop Workshop 2010
DT Arts Coop Workshop 2010
 

Último

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Último (20)

Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 

Connecting Online

  • 2. Connecting Online: Outline  I do a lot on social networking sites – should I be concerned about my privacy?  What’s my responsibility to my networks?  Am I using location-based social networks like Foursquare or Facebook Places?  What is smishing?  How much information can people get from the photos I have uploaded?
  • 3. Connecting Online: Social Networks Social networking involves:  What you share  Who you share it with Image courtesy of Eugene Kim (Flickr)
  • 4. Connecting Online: Social Networks Social networking involves:  Responsibility to your networks – You may be comfortable posting that photo of last night’s party – but your friend may not – Remember that people are your “friends” and “followers” – Ask for help if you need it and reach out when you can – just as you would if faced with a similar situation offline
  • 5. Connecting Online: Trends  We are going mobile.  More than half of all adults in US own a smart phone.75% of teens. Source: http://www.pewinternet.org/ Commentary/2012/February/Pew-Internet-Mobile.aspx Image courtesy of Johan Larson (Flickr)
  • 6. Connecting Online: Smishing (Click to view) Taken from YouTube
  • 7. Connecting Online: Mobile Strategies  If your mobile is compromised, scammers can access all the personal information on your phone  Secure wifi-hotspot security. Even if you’re on your phone, the same rules apply
  • 8. Connecting Online: Mobile Strategies  Look up unknown app creators, and unknown numbers  Avoid keeping too much personal information (ie. bank numbers and pins) on your phone
  • 9. Connecting Online: Trends Who can see my location? • Geolocation • Geotagging • Privacy and safety implications of place-based apps?
  • 10. Connecting Online: Geotagging Who can see my location?  While metadata makes it easier to organize photos, revealing metadata of your photos can be vulnerable to cyberstalking  If you don’t want to be found, make sure you disable geotagging function
  • 11. Connecting Online: Strategies  Consider your privacy settings. Who are you allowing to view your location?  If your location-based social network is linked to a Twitter or Facebook profile, your location is shared on these networks too
  • 13. Resources  My Social Network (c) Eugene Kim (http://www.flickr.com/photos/eekim/2235294862/in/photostream/). CC BY-NC-SA 2.0  Pew Research Centre. “Pew Internet: Mobile.” Pew Internet. N,d. Web. 31 July 2012.  Browser (c) Johan Larsson (http://www.flickr.com/photos/johanl/4397800453/) CC BY 2.0  “What Is Smishing?” 16 May. 2012. YouTube. Web. 12 Aug. 2012. tr

Notas do Editor

  1. What you shareWhenever you post something, it is open to interpretation – they people who know you well will see it one way, the people you don’t will see it another.Who you share it withWhat you share with your friends, you may not want your employers to see and what you share with your family, you may want to keep private.
  2. Consider your privacy settings. Most location-based social networks allow you to tailor your settings so you can control who sees your location – just your friends, businesses too, or perhaps anyone.Remember also that if your location-based social network is linked to a Twitter or Facebook profile, your location is shared on these networks too.