SlideShare uma empresa Scribd logo
1 de 12
Safe Social Media for Positive Social Change
Contents
• Introduction: Did you know?
• What do you give when you register?
• What do I need to know to stay safe on
  Facebook?
• Twitter: Keeping Your Account Secure
• Blogging: Introduce other NOT BlogSpot or
  Wordpress and Online Petition: Change.org
• Tips for Geeks
Introduction: Did you know?
• Internet usage has risen around 1,500% bwt 2007 –
  end of 2011.
• By December 2011 the country had 755,000 Internet
  users = 5%
• Licensed 37 ISPs (a license costs $25,000)
• Most Cambodian have access to a mobile phone
  (93%), and around half own a phone.
• Draft of Internet Law (Cyber law)
• No research of Cambodia online internet users
  behavior
• Password with 20 digits can be cracked only 24hs
What do you give when you register?
•   Your full names
•   Addresses
•   DOB
•   Location
•   Occupation
•   Marriage Statue
•   Age
•   Credit card number
•   Gender
•   School/University
What do I need to know to stay safe on
             Facebook?
•   Privacy Setting
•   Intellectual Property
•   Statement of Rights and Responsibilities
•   Reporting a Violation
What do I need to know to stay safe on
             Facebook?
• Never share your password.
• Think before you post. Each comment and
  photo builds your online presence.
• Adjust your privacy settings and review them
  often.
• Accept friend requests only from people you
  know personally.
• Report content and timelines that look
  suspicious.
Twitter: Keeping Your Account Secure
•    Safe Tweeting: The Basics
       We want Twitter to be a safe and open community. This
       help page provides some information and tips to help you
       practice safe Tweeting and keep your account secure.
       Here are some basics:
a.     Use a strong password.
b.     Watch out for suspicious links, and always make sure
       you’re on Twitter.com before you enter your login
       information.
c.     Use HTTPS for improved security.
d.     Don't give your username and password out to untrusted
       third-parties, especially those promising to get you
       followers or make you money.
e.     Make sure your computer and operating system is up-to-
       date with the most recent patches, upgrades, and anti-
       virus software.
•    Use a Strong and Unique Password
•    Use HTTPS for Improved Security
Blogging and Online Campaign
• Favorite Blog in Cambodia:
  Wordpress; Blogspot
• Introduce to http://storify.com/
• Posterous.com
• Change.org
• Visit:
  – http://freethe15.wordpress.com
  – http://sahrika.wordpress.com
Tips for Geeks
• See who are using your
  Gmail
• iPhone and iPad app (Your
  own morning newspaper)
• HideMyAssDotCom (Open
  restricted website)
• Using http and https
• PiPl.com (See your post
  online)
• Live Stream Tweet on your
  blog
STAY SAFE. BUT DON’T BE AFRAID!




         Thank You!
Safety social media for positive social change
Safety social media for positive social change

Mais conteúdo relacionado

Mais procurados

Online privacy
Online privacyOnline privacy
Online privacy
jo-jo23
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
rowenick
 
Cyber Safety Month summary
 Cyber Safety Month summary Cyber Safety Month summary
Cyber Safety Month summary
icts-uct
 
Formative Task - Safe Internet Usage
Formative Task - Safe Internet UsageFormative Task - Safe Internet Usage
Formative Task - Safe Internet Usage
aligi
 
Phishing-Email-Fraud-General
Phishing-Email-Fraud-GeneralPhishing-Email-Fraud-General
Phishing-Email-Fraud-General
Andrew Voorhies
 

Mais procurados (19)

Internet security tips that every parent should know
Internet security tips that every parent should knowInternet security tips that every parent should know
Internet security tips that every parent should know
 
CYBER SAFETY BY YOGESH
CYBER SAFETY BY YOGESHCYBER SAFETY BY YOGESH
CYBER SAFETY BY YOGESH
 
Netiquette
NetiquetteNetiquette
Netiquette
 
Digital citizenship.pptx
Digital citizenship.pptxDigital citizenship.pptx
Digital citizenship.pptx
 
Online privacy
Online privacyOnline privacy
Online privacy
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
 
Cyber Safety Month summary
 Cyber Safety Month summary Cyber Safety Month summary
Cyber Safety Month summary
 
Formative Task - Safe Internet Usage
Formative Task - Safe Internet UsageFormative Task - Safe Internet Usage
Formative Task - Safe Internet Usage
 
Basic Digital Security
Basic Digital SecurityBasic Digital Security
Basic Digital Security
 
Computer Ethics
Computer  EthicsComputer  Ethics
Computer Ethics
 
E-Safety and Kite Info
E-Safety and Kite InfoE-Safety and Kite Info
E-Safety and Kite Info
 
For schoolchildren1
For schoolchildren1For schoolchildren1
For schoolchildren1
 
International Data Privacy Day 2017
International Data Privacy Day 2017International Data Privacy Day 2017
International Data Privacy Day 2017
 
Current issues
Current issuesCurrent issues
Current issues
 
Phishing-Email-Fraud-General
Phishing-Email-Fraud-GeneralPhishing-Email-Fraud-General
Phishing-Email-Fraud-General
 
Ass3 Sum
Ass3 SumAss3 Sum
Ass3 Sum
 
The internet websites
The internet websitesThe internet websites
The internet websites
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Internet safety
Internet safetyInternet safety
Internet safety
 

Destaque

Facebook and security settings settings
Facebook and security settings settingsFacebook and security settings settings
Facebook and security settings settings
Abhishek Gupta
 
Facebook Policy Primer by Prasanth Kandeepan
Facebook Policy Primer by Prasanth KandeepanFacebook Policy Primer by Prasanth Kandeepan
Facebook Policy Primer by Prasanth Kandeepan
prasanthkandeepan
 
Facebook Privacy Issues
Facebook Privacy IssuesFacebook Privacy Issues
Facebook Privacy Issues
BusinessOnline
 
Facebook Powerpoint
Facebook PowerpointFacebook Powerpoint
Facebook Powerpoint
myra14
 

Destaque (11)

Cool facebook tricks and hacks
Cool facebook tricks and hacksCool facebook tricks and hacks
Cool facebook tricks and hacks
 
Facebook and security settings settings
Facebook and security settings settingsFacebook and security settings settings
Facebook and security settings settings
 
Facebook Policy Primer by Prasanth Kandeepan
Facebook Policy Primer by Prasanth KandeepanFacebook Policy Primer by Prasanth Kandeepan
Facebook Policy Primer by Prasanth Kandeepan
 
Assessing learning via social bookmarking using diigo
Assessing learning via social bookmarking using diigoAssessing learning via social bookmarking using diigo
Assessing learning via social bookmarking using diigo
 
Basic mobile and internet security
Basic mobile and internet securityBasic mobile and internet security
Basic mobile and internet security
 
Facebook Privacy Issues
Facebook Privacy IssuesFacebook Privacy Issues
Facebook Privacy Issues
 
Facebook privacy presentation
Facebook privacy presentationFacebook privacy presentation
Facebook privacy presentation
 
Facebook privacy.
Facebook privacy.Facebook privacy.
Facebook privacy.
 
2017 Call Erasmus+ Information Sessions UK: Adult Education
2017 Call Erasmus+ Information Sessions UK: Adult Education2017 Call Erasmus+ Information Sessions UK: Adult Education
2017 Call Erasmus+ Information Sessions UK: Adult Education
 
Facebook Powerpoint
Facebook PowerpointFacebook Powerpoint
Facebook Powerpoint
 
The Top Skills That Can Get You Hired in 2017
The Top Skills That Can Get You Hired in 2017The Top Skills That Can Get You Hired in 2017
The Top Skills That Can Get You Hired in 2017
 

Semelhante a Safety social media for positive social change

Internet Safety & Privacy
Internet Safety & PrivacyInternet Safety & Privacy
Internet Safety & Privacy
Alexine Marier
 
Building Donor Engagement through Social Media
Building Donor Engagement through Social MediaBuilding Donor Engagement through Social Media
Building Donor Engagement through Social Media
Kyle Lacy
 
PROTECTION PERSONAL PRIVACY
PROTECTION PERSONAL PRIVACYPROTECTION PERSONAL PRIVACY
PROTECTION PERSONAL PRIVACY
DoubleXDS
 
Protecting Personal Privacy
Protecting Personal PrivacyProtecting Personal Privacy
Protecting Personal Privacy
DoubleXDS
 
Security and Privacy Brown Bag
Security and Privacy Brown BagSecurity and Privacy Brown Bag
Security and Privacy Brown Bag
501 Commons
 
Social media and the internet evolution
Social media and the internet evolutionSocial media and the internet evolution
Social media and the internet evolution
Karlton Utter
 

Semelhante a Safety social media for positive social change (20)

Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...
 
Tweet tweet 12 (1)
Tweet tweet 12 (1)Tweet tweet 12 (1)
Tweet tweet 12 (1)
 
Internet Safety & Privacy
Internet Safety & PrivacyInternet Safety & Privacy
Internet Safety & Privacy
 
Securing & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptxSecuring & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptx
 
How To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber MondayHow To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber Monday
 
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter StyleCybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
 
CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024
 
Corporate Counsel: How To Use Social Media To Find Jobs
Corporate Counsel: How To Use Social Media To Find JobsCorporate Counsel: How To Use Social Media To Find Jobs
Corporate Counsel: How To Use Social Media To Find Jobs
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Building Donor Engagement through Social Media
Building Donor Engagement through Social MediaBuilding Donor Engagement through Social Media
Building Donor Engagement through Social Media
 
Securing and Safeguarding Your Library Setup
Securing and Safeguarding Your Library SetupSecuring and Safeguarding Your Library Setup
Securing and Safeguarding Your Library Setup
 
PROTECTION PERSONAL PRIVACY
PROTECTION PERSONAL PRIVACYPROTECTION PERSONAL PRIVACY
PROTECTION PERSONAL PRIVACY
 
Protecting Personal Privacy
Protecting Personal PrivacyProtecting Personal Privacy
Protecting Personal Privacy
 
Personal Internet Security Practice
Personal Internet Security PracticePersonal Internet Security Practice
Personal Internet Security Practice
 
Online Self Defense
Online Self DefenseOnline Self Defense
Online Self Defense
 
Security and Privacy Brown Bag
Security and Privacy Brown BagSecurity and Privacy Brown Bag
Security and Privacy Brown Bag
 
Social media and the internet evolution
Social media and the internet evolutionSocial media and the internet evolution
Social media and the internet evolution
 
How Real Estate Businesses use Twitter
How Real Estate Businesses use TwitterHow Real Estate Businesses use Twitter
How Real Estate Businesses use Twitter
 
twitter hacking causes and protection
twitter hacking causes and protectiontwitter hacking causes and protection
twitter hacking causes and protection
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 

Último

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 

Último (20)

REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 

Safety social media for positive social change

  • 1. Safe Social Media for Positive Social Change
  • 2. Contents • Introduction: Did you know? • What do you give when you register? • What do I need to know to stay safe on Facebook? • Twitter: Keeping Your Account Secure • Blogging: Introduce other NOT BlogSpot or Wordpress and Online Petition: Change.org • Tips for Geeks
  • 3. Introduction: Did you know? • Internet usage has risen around 1,500% bwt 2007 – end of 2011. • By December 2011 the country had 755,000 Internet users = 5% • Licensed 37 ISPs (a license costs $25,000) • Most Cambodian have access to a mobile phone (93%), and around half own a phone. • Draft of Internet Law (Cyber law) • No research of Cambodia online internet users behavior • Password with 20 digits can be cracked only 24hs
  • 4. What do you give when you register? • Your full names • Addresses • DOB • Location • Occupation • Marriage Statue • Age • Credit card number • Gender • School/University
  • 5. What do I need to know to stay safe on Facebook? • Privacy Setting • Intellectual Property • Statement of Rights and Responsibilities • Reporting a Violation
  • 6. What do I need to know to stay safe on Facebook? • Never share your password. • Think before you post. Each comment and photo builds your online presence. • Adjust your privacy settings and review them often. • Accept friend requests only from people you know personally. • Report content and timelines that look suspicious.
  • 7. Twitter: Keeping Your Account Secure • Safe Tweeting: The Basics We want Twitter to be a safe and open community. This help page provides some information and tips to help you practice safe Tweeting and keep your account secure. Here are some basics: a. Use a strong password. b. Watch out for suspicious links, and always make sure you’re on Twitter.com before you enter your login information. c. Use HTTPS for improved security. d. Don't give your username and password out to untrusted third-parties, especially those promising to get you followers or make you money. e. Make sure your computer and operating system is up-to- date with the most recent patches, upgrades, and anti- virus software. • Use a Strong and Unique Password • Use HTTPS for Improved Security
  • 8. Blogging and Online Campaign • Favorite Blog in Cambodia: Wordpress; Blogspot • Introduce to http://storify.com/ • Posterous.com • Change.org • Visit: – http://freethe15.wordpress.com – http://sahrika.wordpress.com
  • 9. Tips for Geeks • See who are using your Gmail • iPhone and iPad app (Your own morning newspaper) • HideMyAssDotCom (Open restricted website) • Using http and https • PiPl.com (See your post online) • Live Stream Tweet on your blog
  • 10. STAY SAFE. BUT DON’T BE AFRAID! Thank You!