SlideShare a Scribd company logo
1 of 18
Risks in Social Media




    Jairo Suarez
Risks
•   Impact in jobs and school.
•   Effect in family, friends, opportunities.
•   Identity theft.
•   Cyber-bullying.
•   Loss of privacy.
•   Stalking.
•   Can’t be taken back.
Examples

1.   Comment
2.   Video
3.   Photo
4.   Tweet
5.   Post
1. Comment
“I am sorry I said I love Fidel Castro."
                - Ozzie Guillen
Social Mention
One-minute span
2. Videos
“They were for team building."
              - GSA Officials
Reactions
Social Mention
Two-minute span
Example 3 – Email

“I regret the harm that my actions
have caused my family, my staff and
        my constituents."
                  - Christopher Lee
Example 4 – Tweeter
                    Connor Riley, 22




A Cisco employee responded: “Who is the hiring manager?
I’m sure they would love to know that you will hate the
work. We here at Cisco are versed in the Web.”
Example 5 – Youtube
Pittsburgh
• Police caught
   thieves that
   stole thousands
   of dollars in
   cash and goods.
• They posed
   with their loot.
Example 6 – Facebook

• An employee called out sick from work, claiming
  that "she could not work in front of a computer
  as she needed to lie in the dark.“
• When she was discovered to be surfing Facebook
  from home, she was terminated.
Why It Happens
Inattention
• People post for friends; forget others may information.
• Mistakenly believe page will have relative privacy.
• Few have installed software to remotely wipe the
  device if it is lost or stolen.
• Social media users don’t know how to protect their
  privacy.
Why It Happens (cont’d)
Technology
• Easier to post: phones, iPad, free WiFi
• Internet provides a sense of anonymity.
• Lack of physical interaction provides false sense of
  security.
• No “friending” is needed to gain access.
• Interlinked pages, blogs, news, tweets are all visible to
  anyone and everyone.
• The beauty of the Web is that it is open, and anyone
  can crawl it.
Why It Happens (cont’d)
Badness
• Scammers
• Many websites share / sell private data
• Envy
• Drugs
Human Nature
• Grudges
• Jealousy
• Impulsive
• Peer pressure
Conclusion
• Removing information is like removing an
  unwanted tattoo.
• It is better to avoid the tattoo in the first place
  than to try to remove it later.
• There are no guarantees that you can even
  remove it completely.
• The only way is to prevent it from ever
  showing up.
“Golden Rule”


         “In Social Media, don’t
post, send, email, upload, attach, record
      anything you would not want
  your spouse, boss or a police officer
                 to see.”
Suggestions
1. Use Social Media to promote yourself personally and
    professionally.
2. Don’t surrender to peer pressure.
3. Learn to use privacy features.
4. Be alert against phishing scams.
5. Be wary of publishing any identifying information:
   – Pick a user name that doesn’t include any personal
       information.
   – Set up a separate email account that doesn’t use your
       real name.
   – Use a ‘strong’ passwords.
6. Keep your profile closed. Only allow friends to view it.

More Related Content

What's hot

Manchester metropolitan university careers week
Manchester metropolitan university careers weekManchester metropolitan university careers week
Manchester metropolitan university careers weekTom Mason
 
Breaking news & social media
Breaking news & social mediaBreaking news & social media
Breaking news & social mediaErica Zucco
 
Writing For Social Media
Writing For Social MediaWriting For Social Media
Writing For Social MediaChip Griffin
 
Digital citizenship@
Digital citizenship@Digital citizenship@
Digital citizenship@MsCCostello
 
Social Media DOs and DON'Ts
Social Media DOs and DON'TsSocial Media DOs and DON'Ts
Social Media DOs and DON'TsGez Daring
 
Cyberbullying in Social Media_FINAL without video clip_09.14.15
Cyberbullying in Social Media_FINAL without video clip_09.14.15Cyberbullying in Social Media_FINAL without video clip_09.14.15
Cyberbullying in Social Media_FINAL without video clip_09.14.15Sue DeRosier
 
MultiMedia Presentation
MultiMedia PresentationMultiMedia Presentation
MultiMedia PresentationAshlynnH
 
Social Media Do's and Don'ts
Social Media Do's and Don'tsSocial Media Do's and Don'ts
Social Media Do's and Don'tsKathleen Gage
 
Grade 6 presentation
Grade 6 presentationGrade 6 presentation
Grade 6 presentationpatrickcauley
 
Week 7: Privacy-rev2013
Week 7:  Privacy-rev2013Week 7:  Privacy-rev2013
Week 7: Privacy-rev2013Ray Brannon
 
Social Simulator, presentation by Steph Gray at Social Media in a Corporate C...
Social Simulator, presentation by Steph Gray at Social Media in a Corporate C...Social Simulator, presentation by Steph Gray at Social Media in a Corporate C...
Social Simulator, presentation by Steph Gray at Social Media in a Corporate C...Communicate Magazine
 
Cyberbullying kbj
Cyberbullying kbjCyberbullying kbj
Cyberbullying kbjdoncoriaj
 

What's hot (17)

Social Media Course Women In Business Conference
Social Media Course Women In Business ConferenceSocial Media Course Women In Business Conference
Social Media Course Women In Business Conference
 
Safer internet day 2017
Safer internet day 2017Safer internet day 2017
Safer internet day 2017
 
Manchester metropolitan university careers week
Manchester metropolitan university careers weekManchester metropolitan university careers week
Manchester metropolitan university careers week
 
Breaking news & social media
Breaking news & social mediaBreaking news & social media
Breaking news & social media
 
Writing For Social Media
Writing For Social MediaWriting For Social Media
Writing For Social Media
 
To tweet or not to tweet
To tweet or not to tweetTo tweet or not to tweet
To tweet or not to tweet
 
Digital citizenship@
Digital citizenship@Digital citizenship@
Digital citizenship@
 
Social Media DOs and DON'Ts
Social Media DOs and DON'TsSocial Media DOs and DON'Ts
Social Media DOs and DON'Ts
 
Cyberbullying in Social Media_FINAL without video clip_09.14.15
Cyberbullying in Social Media_FINAL without video clip_09.14.15Cyberbullying in Social Media_FINAL without video clip_09.14.15
Cyberbullying in Social Media_FINAL without video clip_09.14.15
 
MultiMedia Presentation
MultiMedia PresentationMultiMedia Presentation
MultiMedia Presentation
 
Social Media Do's and Don'ts
Social Media Do's and Don'tsSocial Media Do's and Don'ts
Social Media Do's and Don'ts
 
Grade 6 presentation
Grade 6 presentationGrade 6 presentation
Grade 6 presentation
 
Week 7: Privacy-rev2013
Week 7:  Privacy-rev2013Week 7:  Privacy-rev2013
Week 7: Privacy-rev2013
 
Social Simulator, presentation by Steph Gray at Social Media in a Corporate C...
Social Simulator, presentation by Steph Gray at Social Media in a Corporate C...Social Simulator, presentation by Steph Gray at Social Media in a Corporate C...
Social Simulator, presentation by Steph Gray at Social Media in a Corporate C...
 
Is privacy an issue
Is privacy an issueIs privacy an issue
Is privacy an issue
 
Is privacy an issue
Is privacy an issueIs privacy an issue
Is privacy an issue
 
Cyberbullying kbj
Cyberbullying kbjCyberbullying kbj
Cyberbullying kbj
 

Similar to Social Media final presentation risks

Internet safety update
Internet safety updateInternet safety update
Internet safety update14071828
 
Proper use of social networking sites
Proper use of social networking sitesProper use of social networking sites
Proper use of social networking sitesner1eje
 
Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for ParentsMarian Merritt
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullyingzackkay
 
Student book key unit3
Student book key unit3Student book key unit3
Student book key unit3jesusmlaz
 
Character Development, for students, by students!
Character Development, for students, by students!Character Development, for students, by students!
Character Development, for students, by students!mediaplaylab
 
Intellectual Freedom, Privacy and Social Media
Intellectual Freedom, Privacy and Social MediaIntellectual Freedom, Privacy and Social Media
Intellectual Freedom, Privacy and Social MediaElizabeth T. "Eli" Edwards
 
L2 Rules of Netiquette.pptx
L2 Rules of Netiquette.pptxL2 Rules of Netiquette.pptx
L2 Rules of Netiquette.pptxSheenaAFuentes
 
L2 Rules of Netiquette.pptx
L2 Rules of Netiquette.pptxL2 Rules of Netiquette.pptx
L2 Rules of Netiquette.pptxsheena711714
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquetterowenick
 
E-Tech L2 Rules of Netiquette.pptx
E-Tech L2 Rules of Netiquette.pptxE-Tech L2 Rules of Netiquette.pptx
E-Tech L2 Rules of Netiquette.pptxLeah Condina
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquetterowenick
 
Advantages and disadvantages of internet
Advantages and disadvantages of internetAdvantages and disadvantages of internet
Advantages and disadvantages of internetCarlos Diclear Hijo
 
Digital citizenship.pptx
Digital citizenship.pptxDigital citizenship.pptx
Digital citizenship.pptxKnepperE
 
Digital Leaders e-safety presentation 2015
Digital Leaders e-safety presentation 2015Digital Leaders e-safety presentation 2015
Digital Leaders e-safety presentation 2015Jamie Edmondson
 
Lecture 2 Social Web 2017 (Guest Lecture By Dr. Giulia Ranzini)
Lecture 2 Social Web 2017 (Guest Lecture By Dr. Giulia Ranzini)Lecture 2 Social Web 2017 (Guest Lecture By Dr. Giulia Ranzini)
Lecture 2 Social Web 2017 (Guest Lecture By Dr. Giulia Ranzini)Davide Ceolin
 

Similar to Social Media final presentation risks (20)

Internet safety update
Internet safety updateInternet safety update
Internet safety update
 
Proper use of social networking sites
Proper use of social networking sitesProper use of social networking sites
Proper use of social networking sites
 
Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for Parents
 
cyber safety.pdf
cyber safety.pdfcyber safety.pdf
cyber safety.pdf
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Student book key unit3
Student book key unit3Student book key unit3
Student book key unit3
 
Character Development, for students, by students!
Character Development, for students, by students!Character Development, for students, by students!
Character Development, for students, by students!
 
Intellectual Freedom, Privacy and Social Media
Intellectual Freedom, Privacy and Social MediaIntellectual Freedom, Privacy and Social Media
Intellectual Freedom, Privacy and Social Media
 
L2 Rules of Netiquette.pptx
L2 Rules of Netiquette.pptxL2 Rules of Netiquette.pptx
L2 Rules of Netiquette.pptx
 
L2 Rules of Netiquette.pptx
L2 Rules of Netiquette.pptxL2 Rules of Netiquette.pptx
L2 Rules of Netiquette.pptx
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
 
E-Tech L2 Rules of Netiquette.pptx
E-Tech L2 Rules of Netiquette.pptxE-Tech L2 Rules of Netiquette.pptx
E-Tech L2 Rules of Netiquette.pptx
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
 
Advantages and disadvantages of internet
Advantages and disadvantages of internetAdvantages and disadvantages of internet
Advantages and disadvantages of internet
 
Digital citizenship.pptx
Digital citizenship.pptxDigital citizenship.pptx
Digital citizenship.pptx
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Shockproofing Your Use of Social Media
Shockproofing Your Use of Social MediaShockproofing Your Use of Social Media
Shockproofing Your Use of Social Media
 
Digital Leaders e-safety presentation 2015
Digital Leaders e-safety presentation 2015Digital Leaders e-safety presentation 2015
Digital Leaders e-safety presentation 2015
 
Lecture 2 Social Web 2017 (Guest Lecture By Dr. Giulia Ranzini)
Lecture 2 Social Web 2017 (Guest Lecture By Dr. Giulia Ranzini)Lecture 2 Social Web 2017 (Guest Lecture By Dr. Giulia Ranzini)
Lecture 2 Social Web 2017 (Guest Lecture By Dr. Giulia Ranzini)
 

Recently uploaded

USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxnelietumpap1
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 

Recently uploaded (20)

USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptx
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 

Social Media final presentation risks

  • 1. Risks in Social Media Jairo Suarez
  • 2. Risks • Impact in jobs and school. • Effect in family, friends, opportunities. • Identity theft. • Cyber-bullying. • Loss of privacy. • Stalking. • Can’t be taken back.
  • 3. Examples 1. Comment 2. Video 3. Photo 4. Tweet 5. Post
  • 4. 1. Comment “I am sorry I said I love Fidel Castro." - Ozzie Guillen
  • 6. 2. Videos “They were for team building." - GSA Officials
  • 9. Example 3 – Email “I regret the harm that my actions have caused my family, my staff and my constituents." - Christopher Lee
  • 10. Example 4 – Tweeter Connor Riley, 22 A Cisco employee responded: “Who is the hiring manager? I’m sure they would love to know that you will hate the work. We here at Cisco are versed in the Web.”
  • 11. Example 5 – Youtube Pittsburgh • Police caught thieves that stole thousands of dollars in cash and goods. • They posed with their loot.
  • 12. Example 6 – Facebook • An employee called out sick from work, claiming that "she could not work in front of a computer as she needed to lie in the dark.“ • When she was discovered to be surfing Facebook from home, she was terminated.
  • 13. Why It Happens Inattention • People post for friends; forget others may information. • Mistakenly believe page will have relative privacy. • Few have installed software to remotely wipe the device if it is lost or stolen. • Social media users don’t know how to protect their privacy.
  • 14. Why It Happens (cont’d) Technology • Easier to post: phones, iPad, free WiFi • Internet provides a sense of anonymity. • Lack of physical interaction provides false sense of security. • No “friending” is needed to gain access. • Interlinked pages, blogs, news, tweets are all visible to anyone and everyone. • The beauty of the Web is that it is open, and anyone can crawl it.
  • 15. Why It Happens (cont’d) Badness • Scammers • Many websites share / sell private data • Envy • Drugs Human Nature • Grudges • Jealousy • Impulsive • Peer pressure
  • 16. Conclusion • Removing information is like removing an unwanted tattoo. • It is better to avoid the tattoo in the first place than to try to remove it later. • There are no guarantees that you can even remove it completely. • The only way is to prevent it from ever showing up.
  • 17. “Golden Rule” “In Social Media, don’t post, send, email, upload, attach, record anything you would not want your spouse, boss or a police officer to see.”
  • 18. Suggestions 1. Use Social Media to promote yourself personally and professionally. 2. Don’t surrender to peer pressure. 3. Learn to use privacy features. 4. Be alert against phishing scams. 5. Be wary of publishing any identifying information: – Pick a user name that doesn’t include any personal information. – Set up a separate email account that doesn’t use your real name. – Use a ‘strong’ passwords. 6. Keep your profile closed. Only allow friends to view it.

Editor's Notes

  1. Criminals can use information provided about a person’s birthday, location, routine, hobbies, and interests to impersonate a trusted friend or convince the unsuspecting that they have the authority to access personal or financial data. They can even use such info to guess your account passwords—which is why you should never have a password that uses the name of your pet, favorite band, hobby, birthday, or something else easily known about you. And stalkers will really appreciate your help if you post your daily routine and whereabouts online!
  2. Criminals can use information provided about a person’s birthday, location, routine, hobbies, and interests to impersonate a trusted friend or convince the unsuspecting that they have the authority to access personal or financial data. They can even use such info to guess your account passwords—which is why you should never have a password that uses the name of your pet, favorite band, hobby, birthday, or something else easily known about you. And stalkers will really appreciate your help if you post your daily routine and whereabouts online!
  3. Criminals can use information provided about a person’s birthday, location, routine, hobbies, and interests to impersonate a trusted friend or convince the unsuspecting that they have the authority to access personal or financial data. They can even use such info to guess your account passwords—which is why you should never have a password that uses the name of your pet, favorite band, hobby, birthday, or something else easily known about you. And stalkers will really appreciate your help if you post your daily routine and whereabouts online!