Your SlideShare is downloading. ×
0
Social media and the future of privacy
Social media and the future of privacy
Social media and the future of privacy
Social media and the future of privacy
Social media and the future of privacy
Social media and the future of privacy
Social media and the future of privacy
Social media and the future of privacy
Social media and the future of privacy
Social media and the future of privacy
Social media and the future of privacy
Social media and the future of privacy
Social media and the future of privacy
Social media and the future of privacy
Social media and the future of privacy
Social media and the future of privacy
Social media and the future of privacy
Social media and the future of privacy
Social media and the future of privacy
Social media and the future of privacy
Social media and the future of privacy
Social media and the future of privacy
Social media and the future of privacy
Social media and the future of privacy
Social media and the future of privacy
Social media and the future of privacy
Social media and the future of privacy
Social media and the future of privacy
Social media and the future of privacy
Social media and the future of privacy
Social media and the future of privacy
Social media and the future of privacy
Social media and the future of privacy
Social media and the future of privacy
Social media and the future of privacy
Social media and the future of privacy
Social media and the future of privacy
Social media and the future of privacy
Social media and the future of privacy
Social media and the future of privacy
Social media and the future of privacy
Social media and the future of privacy
Social media and the future of privacy
Social media and the future of privacy
Social media and the future of privacy
Social media and the future of privacy
Social media and the future of privacy
Social media and the future of privacy
Social media and the future of privacy
Social media and the future of privacy
Social media and the future of privacy
Social media and the future of privacy
Social media and the future of privacy
Social media and the future of privacy
Social media and the future of privacy
Social media and the future of privacy
Social media and the future of privacy
Social media and the future of privacy
Social media and the future of privacy
Social media and the future of privacy
Social media and the future of privacy
Social media and the future of privacy
Social media and the future of privacy
Social media and the future of privacy
Social media and the future of privacy
Social media and the future of privacy
Social media and the future of privacy
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Social media and the future of privacy

371

Published on

Published in: Social Media, Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
371
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
3
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide
  • * SOURCE
  • **ADDED****
  • *** ADDED
  • ***ADDED STUFF*****
  • Transcript

    • 1. By: Rachel Brock, Alyssa Budhoo, Claire Keating & Yuxing Zeng
    • 2.           Why Do People Use Social Media? Legal Issues With Social Media Facebook – Privacy Issues Twitter – Privacy Issues YouTube – Privacy Issues LinkedIn – Privacy Issues Protecting Your Privacy Online Threats Steps To Ensuring Online Privacy National Privacy Day
    • 3.    Social Interaction- allows people to be social. They meet new people and keep in touch with family, friends, and acquaintances. Seek Information- used to find information about products/services, keeping up with real-world social events, and learning new things. Pass Time- great tool to kill time and when you’re bored. Connor, O. (2013, July 5). 10 reasons people use social media. Retrieved from https://www.onepoll.com/10-reasons-people-use-social-media/ Alyssa Budhoo
    • 4.     Entertainment-social media gives access to games, music and videos. Relaxation- social media helps relieve stress and escape reality. Expression of Opinions- people express thoughts and opinions through social media. Things to Talk About- social media provides topics for people to talk and gossip about with others. Connor, O. (2013, July 5). 10 reasons people use social media. Retrieved from https://www.onepoll.com/10-reasons-people-use-social-media/ Alyssa Budhoo
    • 5.    Convenience- social media is easily accessible anywhere at any time. People can talk to numerous people at the same time. Sharing Information- people market their own image through social media by broadcasting things about themselves through publishing updates, videos and pictures. Know about others- social media gives people a display into the lives of others, by being able to check out other profiles. Connor, O. (2013, July 5). 10 reasons people use social media. Retrieved from https://www.onepoll.com/10-reasons-people-use-social-media/ Alyssa Budhoo
    • 6. Why Use Social Media in Business? The video states facts about social media networks and how much popularity they are gaining due to the fact that there are more users and people joining these sites. Therefore, giving businesses an effective reason to use social media in their business practices. Alyssa Budhoo
    • 7.    Branding- creates a noticeable identity for the product/service. Creates a Buzz- word gets out about the products/services through online conversation. Online Reputation Management- Easy to see what other people and sites are saying about the name, company, or brand online. Albert, S. (n.d.). 20 reasons your small business should use social media . Retrieved from http://blissfullydomestic.com/life-bliss/20-reasons-small-businessesshould-use-social-media/7414/ Alyssa Budhoo
    • 8.    Established as an Expert- using forums and message boards to answer questions professionally, honestly, and correctly will earn businesses respect as an expert. Word of Mouth- market products through word of mouth virtually. Customers trust friends and family; they need to trust before purchasing, therefore hearing about the product from someone trustworthy, will insist them to buy. Builds relationships and Becomes More Personalusing a variety of social media will build relationships with customers and potential customers. Albert, S. (n.d.). 20 reasons your small business should use social media . Retrieved from http://blissfullydomestic.com/life-bliss/20-reasons-small-businessesshould-use-social-media/7414/ Alyssa Budhoo
    • 9.    Open up the line of communication between business owner and millions of potential customers- Millions of people use social media everyday and can become potential customers, this does not come so easily in the offline world. Small businesses can compete with large companies- with the right type of viral social media, an immense amount of traffic can grow quickly with natural links, and keep traffic coming for a long time. Social networking with potential clients and customers from all over the globe- with all the social networking sites available, businesses can hold personal conversations with each of their customers. Albert, S. (n.d.). 20 reasons your small business should use social media . Retrieved from http://blissfullydomestic.com/life-bliss/20-reasons-small-businessesshould-use-social-media/7414/ Alyssa Budhoo
    • 10.    Generates Traffic- If an item becomes viral and makes it to the front page of a big social news site, the viewership can grow tremendously. Increased link-ability- in order to move up in search engines, having links from other sites pointed to the business site is essential. Natural links-or links that come from a great post, video, or picture, are best for the business. Cheaper than traditional Marketing and Advertising- social media is a portion of the cost of traditional marketing and advertising. Albert, S. (n.d.). 20 reasons your small business should use social media . Retrieved from http://blissfullydomestic.com/life-bliss/20-reasons-small-businessesshould-use-social-media/7414/ Alyssa Budhoo
    • 11.    The company is more accessible- everyone can access online interaction anywhere at any time. Direct conversation to a specific niche- many social networking, social bookmarking, and social news site are directed to specific niches. Business’ have the ability to speak directly to them. Another way for potential customers to find you- if the business is not high enough in search engines, customers can still find the business through social media. Albert, S. (n.d.). 20 reasons your small business should use social media . Retrieved from http://blissfullydomestic.com/life-bliss/20-reasons-small-businessesshould-use-social-media/7414/ Alyssa Budhoo
    • 12.   A way to explain yourself- it’s always going to be possible to receive negative comments. Social media provides a platform to explain, and fix things to make them right. Shows your stuff- Universal search is now accessible through Google, meaning everything appears on Google Search. So product images can rank like the business site, making it easier for customers to see your product right on the Google search. Albert, S. (n.d.). 20 reasons your small business should use social media . Retrieved from http://blissfullydomestic.com/life-bliss/20-reasons-small-businessesshould-use-social-media/7414/ Alyssa Budhoo
    • 13.   Find out what customers want- social media allows you to ask customers exactly what they want. Customers can play an active role in the business- customers can offer suggestions, share their likes and dislikes all on social media. Therefore, ideas for new products and services can develop. Albert, S. (n.d.). 20 reasons your small business should use social media . Retrieved from http://blissfullydomestic.com/life-bliss/20-reasons-small-businessesshould-use-social-media/7414/ Alyssa Budhoo
    • 14. 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. Disclosure of Confidential Information Unauthorized Use of Trademarks Unauthorized Use of Copyright-Protected Works Defamation Issues Electronic Discovery Dynamic Information Human Resources Issues Securities Privacy/Publicity Endorsements Neal & McDevitt. (2010). Top 10 legal issues in social media. Retrieved from http://www.bartonchicago.com/pdf/socialmedia.pdf Alyssa Budhoo
    • 15. Posting videos and photos without proper releases may infringe the privacy or publicity rights of individuals. Companies must make sure that their employees are not violating specific privacy regulations in their activities on social media sites. Neal & McDevitt. (2010). Top 10 legal issues in social media. Retrieved from http://www.bartonchicago.com/pdf/socialmedia.pdf Alyssa Budhoo
    • 16. Top 10 Legal Issues in Social Media Social networking and Social media is becoming the “next big thing” for both small and large businesses. With advertisers, marketers, HR departments, job seekers, and employees using these tools, they need to be aware of potential consequences in order to avoid legal problems. The article lists the top 10 legal problems companies may face when using social media in their business practices. Alyssa Budhoo
    • 17. As you have read, social media sites come with great advantages and opportunities for people both in their personal and business world. They do, however, come with issues and threats specifically aimed towards our privacy. The following slides will examine privacy issues with the most popular social media sites: Facebook, Twitter, YouTube and LinkedIn. Rachel Brock
    • 18. Privacy App Pinpoints Your Exact Location Using Social Media With the ongoing popularity among high school students using Twitter and Instagram, they are not aware of the amount of information being posted from their social media updates. In the article, researchers at the International Computer Science Institute and UC Berkeley present findings about geo-tags and the threats they can impose on high school students who update regularly on social media. Alyssa Budhoo
    • 19.  Launched February 2004 "Facebook to offer TV data to networks Comments." Digital TV Europe . N.p., n.d. Web. 28 Nov. 2013. <http://www.digitaltveurope.net/106962/facebook-tooffer-tv-data-to-networks/>.  Created by Mark Zuckerberg Facebook allows you to connect with friends, upload photos, and share links and videos  The most popular online Social networking site   In 2013, Facebook reached 750 million unique visits per month "Facebook." Answers.com. Answers, n.d. Web. 28 Nov. 2013. <http://www.answers.com/topic/facebook>. "Visual.Ly." Top 10 Most Popular Social Networks 2013. N.p., n.d. Web. 28 Nov. 2013. <http://visual.ly/top-10-most-popular-social-networks-2013>. Yuxing Zeng
    • 20.   News feed: angered many users by not giving them control of who could see their updates, or the ability to opt out ◦ Launched in 2006 Beacon (2007) ◦ a Facebook ad system that tracked what users did and what they purchased on partner websites, even for users who were not Facebook members ◦ Adding to the privacy concerns, information about Facebook users' purchases were published without their explicit consent on their friends' news feeds "8 Facebook privacy flaps - Technology & Science - CBC News." CBCnews. CBC/Radio Canada, n.d. Web. 28 Nov. 2013. <http://www.cbc.ca/news/technology/8-facebook-privacy-flaps-1.1140969>. Yuxing Zeng
    • 21.   Privacy settings ◦ Facebook changed their privacy settings, sharing information with everyone became the default setting ◦ Terrible guide for the privacy settings of Facebook Private messages ◦ A glitch in February 2010 caused some private messages on Facebook to be sent to unintended recipients ◦ A coding error opened Facebook chats, which are supposed to be private, for others to see "8 Facebook privacy flaps - Technology & Science - CBC News." CBCnews. CBC/Radio Canada, n.d. Web. 28 Nov. 2013. <http://www.cbc.ca/news/technology/8-facebook-privacy-flaps-1.1140969>. Yuxing Zeng
    • 22.   The anti-Google campaign (2011): ◦ Facebook wanted it kept private that they were behind the anti-Google campaign in 2011. Once exposed, Facebook admitted that they should have behaved "in a serious and transparent way.” Timeline: ◦ Users could decide who could see that information but not if it was on their friends' Facebook pages. "8 Facebook privacy flaps - Technology & Science - CBC News." CBCnews. CBC/Radio Canada, n.d. Web. 28 Nov. 2013. <http://www.cbc.ca/news/technology/8-facebook-privacy-flaps-1.1140969>. Yuxing Zeng
    • 23.    Tech Yeah! Facebook privacy issues This video shows that Facebook is relaxing its rules such as “Follow” button puts posts in News feeds which will cause more privacy issues among teenagers. http://video.cnbc.com/gallery/?video=30002 08666 Yuxing Zeng
    • 24. "Twitter Now Covered by Analysts at Wells Fargo & Co. (TWTR)." WKRB News RSS. N.p., n.d. Web. 28 Nov. 2013. <http://www.wkrb13.com/markets/232262/twitternow-covered-by-analysts-at-wells-fargo-co-twtr/>.  Created in 2006  Global real-time communications platform  400 million monthly visitors  One billion tweets every 2.5 days "Twitter." CrunchBase, The Free Tech Company Database. N.p., n.d. Web. 27 Nov. 2013. <http://www.crunchbase.com/company/twitter>. Yuxing Zeng
    • 25.   Design ◦ Mostly dodged privacy concerns ◦ Anyone can see your tweets Twitter collects data (tweets, retweets, location, people who you follow) ◦ Twitter than promotes “Promoted Tweets” on your timeline that relates to your profile "Here's How Twitter Can Track You on All of Your Devices." Mother Jones. N.p., n.d. Web. 26 Nov. 2013. <http://www.motherjones.com/politics/2013/09/twitter-could-threaten-your-privacy-more-facebook>. Yuxing Zeng
    • 26.   Judge Napolitano on Twitter Privacy Ruling in Occupy Wall Street Case This video shows that the tweet isn’t your own anymore and they even can be the evidence that are against yourself at the court. http://www.youtube.com/watch?v=2JRxoXqVix g Yuxing Zeng
    • 27. "Buy YouTube Views." Buy Likes and Followers. N.p., n.d. Web. 27 Nov. 2013. <http://www.buylikesandfollowers.net/buyyoutube-views.html>.    A platform for users to create, connect and discover the world’s videos Was founded in 2005 by Chad Hurley, Steve Chen and Jawed Karim Received funding from Sequoia Capital, and was acquired by Google Inc. in 2006 "YouTube." CrunchBase, The Free Tech Company Database. N.p., n.d. Web. 28 Nov. 2013. <http://www.crunchbase.com/company/youtube>. Yuxing Zeng
    • 28.   Creating people’s YouTube channels without their permissions YouTube put web banners or rich media by collecting your search history "Laura Bruno's Blog Medical Intuition, Soul Readings, Intuitive Coaching, Tarot, Reiki: Inspiring and Empowering Visionaries and Healers." Laura Brunos Blog. N.p., n.d. Web. 28 Nov. 2013. <http://laurabruno.wordpress.com/tag/youtube-privacy-issues/>. Yuxing Zeng
    • 29.  YouTube's video privacy and sharing options: ◦ If a YouTube user doesn't want to offend anyone but also happens to be popular (having a substantial amount of subscribers), this user will want to reach more than 25 people. This situation renders the entire option of privatizing videos pointless. "Google Groups." Google Groups. N.p., n.d. Web. 28 Nov. 2013. <http://productforums.google.com/forum/#!topic/youtube/aFLbzsGU66w>. Yuxing Zeng
    • 30.   New Google/YouTube Privacy Issues This video shows that Google announced privacy settings that will affect YouTube on January 24,2012. Google will require users to follow by the companies for their activates on YouTube. http://www.youtube.com/watch?v=jm8J9OHCv iM Yuxing Zeng
    • 31. "How Can Agencies Step Beyond LinkedIn to Gain a Competitive Edge?." Blog FireFish Software. N.p., n.d. Web. 28 Nov. 2013. <http://blog.firefishsoftware.com/bid/101435/How-CanAgencies-Step-Beyond-LinkedIn-to-Gain-a-Competitive-Edge>.  The Social network for work professionals  Created by Reid Hoffman in 2002  4.2 billions “ professionally-oriented searches” in 2011 "Mashable." Mashable. N.p., n.d. Web. 25 Nov. 2013. <http://mashable.com/category/linkedin/>. Yuxing Zeng
    • 32.   Managed to lose millions of users' email and password combinations A LinkedIn user who indicates they want their profile to remain anonymous to the person whose profile they've viewed, that occasionally the searcher's profile comes up on the said viewed member's page as someone who they might like to connect with. "LinkedIn (LNKD) Has Major Privacy Issues." Insider Monkey Free Hedge Fund and Insider Trading Data RSS. N.p., n.d. Web. 28 Nov. 2013. <http://www.insidermonkey.com/blog/linkedin-lnkd-has-major-privacy-issues23328/#3HEy13RT35rpjrB2.99>. Yuxing Zeng
    • 33.   Not taking the measures it needs to acquire the support of individuals who want to be as private as possible on the Internet Exposing users’ Google searches "privacy issue? linkedin exposing my google searches???." - LinkedIn Help Center. N.p., n.d. Web. 28 Nov. 2013. <http://community.linkedin.com/questions/73446/privacy-issue-linkedinexposing-my-google-searches.html>. "LinkedIn (LNKD) Has Major Privacy Issues." Insider Monkey Free Hedge Fund and Insider Trading Data RSS. N.p., n.d. Web. 28 Nov. 2013. <http://www.insidermonkey.com/blog/linkedin-lnkd-has-major-privacy-issues23328/#3HEy13RT35rpjrB2.99>. Yuxing Zeng
    • 34.   Protecting your privacy on LinkedIn This video shows that how to protect your LinkedIn profile by disenable the activities broadcasts. It already became a privacy issues for the LinkedIn that other people can see your own news feed. http://www.youtube.com/watch?v=vnJ4Tv_4p Mk Yuxing Zeng
    • 35.  Consumers using online social networking sites need to remember that once you post something online it is there FOREVER. You can erase, delete, backspace what ever you want, but the fact of the matter is that once posted online, NOTHING IS DELETABLE. Rachel Brock
    • 36.         Because there are a number of dishonest people online who aim to steal your personal information for financial gain, personal gain, or just plain fun. Types of Online Threats: Fraudsters Hackers Hoaxsters Cyber-Bullies Online Predators Cyber Stalkers Rachel Brock
    • 37.  People who use the internet to take advantage of victims, usually involving theft of personal or financial information. These people may use the internet to present fraudulent solicitations, fraudulent transactions, or transmit the proceeds of fraud to institutions or other individuals connected with the scheme. "Internet Fraud." TheFreeDictionary.com. N.p., n.d. Web. 27 Nov. 2013. http://legal-dictionary.thefreedictionary.com/Internet+Fraud Claire Keating
    • 38.  15 People Arrested in RCMP Raids On Alleged Fraudsters in Montreal • Fifteen people working at a call center in Montreal were arrested on charges of massmarket fraud that spanned Canada and the U.S., targeting thousands of victims and robbing approximately $20 million. "680News." 680News Fifteen people arrested in RCMP raids on alleged fraudsters in Montreal Comments. N.p., n.d. Web. 28 Nov. 2013. <http://www.680news.com/2013/11/19/fifteenpeople-arrested-in-rcmp-raids-on-alleged-fraudsters-in-montreal/>. Claire Keating
    • 39.  An individual with extensive computer programming knowledge, that seeks and exploits weaknesses in a computer system or computer network (ex – social media sites). Through these software weaknesses they may gain access to personal files and information, and the lengths to which they may use this information is endless. They may be motivated by a number of reasons including profit, protest, or challenge. "hacker." hacker. N.p., n.d. Web. 28 Nov. 2013. <http://www.catb.org/jargon/html/H/hacker.html>. Rachel Brock
    • 40. Recent Hacker Attacks in Canada This article discusses the hacker software titles “Citadel” and how it was discovered by the RCMP in Burnaby. The software is estimated to have effected more that 5 million people in over 90 countries, stealing over $500 million dollars from victims bank accounts. "B.C. Computer Servers Linked to $500M Global Theft Ring - British Columbia - CBC News." CBCnews. CBC/Radio Canada, n.d. Web. 27 Nov. 2013. Rachel Brock
    • 41. Top 10 Infamous Computer Hackers This video shows the top 10 most infamous computer hackers, and the effect they had on people and businesses around the world. Rachel Brock
    • 42.  Hoax: Noun 1. to trick into believing or accepting as genuine something false and often preposterous. 2. something accepted or established by fraud or fabrication  Hoaxsters are people who deliberately fabricate false information and spread it virally. This information is heard and seen by others, and passed around because it is perceived to be factual. "Hoax." Merriam-Webster. Merriam-Webster, n.d. Web. 27 Nov. 2013. Rachel Brock
    • 43.  Hacked Fox News Twitter Account Declares Obama Died This article released to the public through the online press "The Free Library," states how Fox News' Twitter account was hacked by a hoaxer group called "The Script Kiddies." They released false information that went viral stating that Obama had been assassinated. "Hacked Fox News Twitter Account Declares Obama Died." - Free Online Library. N.p., n.d. Web. 27 Nov. 2013. Rachel Brock
    • 44.  The use of technology, specifically the internet and social media websites, to harass or harm people in a deliberate and hostile manner. It can involve anything from gossiping, to spreading false rumours, to making harmful threats to people. Cyber-bullying has become common among young social media users. "Category Archives: Cyberbullying." Cyberbullying. N.p., n.d. Web. 26 Nov. 2013. <http://definetheline.ca/dtl/category/cyberbullying/>. Claire Keating
    • 45.   95% of social media-using teens who have witnessed cruel behavior on social networking sites say they have seen others ignoring the mean behavior; 55% witness this frequently 66% of teens who have witnessed online cruelty have also witnessed others joining; 21% say they have also joined in the harassment "Cyberbullying Statistics." InternetSafety101.org: Statistics. N.p., n.d. Web. 27 Nov. 2013. http://www.internetsafety101.org/cyberbullyingstatistics.htm Claire Keating
    • 46.   Only 7% of U.S. parents are worried about cyberbullying, even though 33% of teenagers have been victims of cyberbullying One million children were harassed, threatened or subjected to other forms of cyberbullying on Facebook during the past year "Cyberbullying Statistics." InternetSafety101.org: Statistics. N.p., n.d. Web. 27 Nov. 2013. http://www.internetsafety101.org/cyberbullyingstatistics.htm Claire Keating
    • 47.   68% of teens agree that cyberbullying is a serious problem with today’s youth.[6]Reasons cyberbullies said they engaged in cyberbullying: ◦ To show off to friends (11%) ◦ To be mean (14%) ◦ Something else (16%) ◦ To embarrass them (21%) ◦ For fun or entertainment (28%) ◦ They deserved it (58%) ◦ To get back at someone (58%) 81% of youth agree that bullying online is easier to get away with than bullying in person "Cyberbullying Statistics." InternetSafety101.org: Statistics. N.p., n.d. Web. 27 Nov. 2013. http://www.internetsafety101.org/cyberbullyingstatistics.htm Claire Keating
    • 48.  Delete Cyber Bullying This YouTube video explains what cyber-bullying really is and describes the characteristics of a cyberbully. They believe they have an advantage online because they are secured online and there actions have no consequences. Cyber-bullying is a monster that we as consumers of social media have created ourselves. The YouTube video encourages online consumer to “Be The Change” and spread positive thoughts, messages, images and videos online. Claire Keating
    • 49.  The Case of Tyler Clementi Attention to the issue of cyber-bullying was first brought to the public eye through the case of the suicide of Tyler Clementi. Tyler Cementi’s roommate set up a web-cam and recorded Tyler having homosexual intercourse with another man, and broadcasted it on the internet. After Tyler’s suicide, his roommate, Dharun Ravi, was sentenced to 30 days in jail. "Tyler Clementi." Times Topics. N.p., n.d. Web. 27 Nov. 2013. Claire Keating
    • 50.  Online predators are arguably the most dangerous internet users. Online predators are people who look for weakness in others online, and intend to inflict harm on them. The most common type of online predators are mature men and females using open chat sites to lure in minors and commit lewd and perverse acts with them. These people are often pedophiles, and attack young naïve children who agree to meet with them in person. "The Facts About Online Predators." Family Safe Computers. N.p., n.d. Web. 28 Nov. 2013. <http://www.familysafecomputers.org/predators.htm>. Rachel Brock
    • 51. Child Internet Safety PSA – Online Predators This video shows how easily a child can be manipulated into giving out personal information to predators. Rachel Brock
    • 52.    In 82% of online sex crimes against minors, the offender used the victim's social networking site to gain information about the victim's likes and dislikes 65% of online sex offenders used the victim's social networking site to gain home and school information about the victim Only 1 in 3 people will report sexual crimes to a trusted adult "InternetSafety101.org: Statistics." InternetSafety101.org: Statistics. N.p., n.d. Web. 27 Nov. 2013. Rachel Brock
    • 53.    26% of online sex offenders used the victim's social networking site to gain information about the victim's whereabouts at a specific time There are over 747,408 registered sex offenders in the United States, and over 100,000 are lost in the system Four percent of all youth Internet users received aggressive sexual solicitations, which threatened to spill over into “real life”. These solicitors asked to meet the youth in person, called them on the telephone or sent offline mail, money or gifts. Also, four percent of youth had distressing sexual solicitations that left them feeling upset of extremely afraid. "InternetSafety101.org: Statistics." InternetSafety101.org: Statistics. N.p., n.d. Web. 27 Nov. 2013. Rachel Brock
    • 54.   Virtual Girl "Sweetie" Helps Track Thousands of Online Sexual Predators Another example is the virtual girl “Sweetie,” a 10 year old Pilipino girl designed through computer software, who helps to track online predators. Rachel Brock
    • 55. THE NUMBER ONE RULE!:  The only way to ensure your information is safe online, is to be careful of and responsible for everything that you post. Since nothing can ever be removed from the online world, you must make sure you don’t post personal information, reputation damaging pictures, blogs, ANYTHING that may come back to haunt you. Future employers may access your social networking sites and choose not to hire you based on pictures and posts they find. Rachel Brock
    • 56. 2. Do not trust strangers you meet online  People you meet online should not be trusted with your personal information. People are able to create multiple cyber identities, and may not really be the trustworthy person you think you are talking to behind the computer screen. Rachel Brock
    • 57. 3. Do not share personal information over the Internet or through social networking sites.  Sharing your banking information, your whereabouts, our address, phone number, or contact information on social networking sites or with people you talk to online can be a threat to your privacy and safety. Rachel Brock
    • 58. 4. Have multiple passwords and security questions.  Many people make the mistake of having one simple password for all of their online accounts. If this password were to be compromised, this could have devastating results. Claire Keating
    • 59. 5. Report online abuse.  If you are a witness to cyber bullying, fraud, or any other illegal online activity it is important to report it immediately. The failure to report could have devastating effects for not only you, but others around you. If someone is cyber-bullying you, the odd are high that they are doing it to others as well. Claire Keating
    • 60. 6. Format Your Privacy Settings  Make sure your privacy settings are limited to the public. Allowing only your friends and family to have access to your profiles prevents strangers from viewing your personal information. Claire Keating
    • 61.  Online Privacy Online privacy animation video, that makes us wonder “what if online actions were set in the physical, tangible world?” The YouTube video shares with consumers that we have to be aware of what we are posting online and who we are sharing it with because there could be consequences. Remember… Think before you click! Claire Keating
    • 62. Protecting Your Privacy On The Internet This page posts tips on how to protect personal privacy on the Internet, through Microsoft’s Safety & Security Center. It details topics such as thinking before sharing personal information, monitoring what others post, guarding personal information, and protecting yourself from fraud. Alyssa Budhoo
    • 63. “Data Privacy Day, held annually on January 28, encourages everyone to make protecting privacy and data a greater priority. DPD is an effort to empower and educate people to protect their privacy and control their digital footprint. Contribute to the success of Data Privacy Day by sharing resources and advice on social media, hosting an event, or having your organization become a DPD Champion. You can make a difference in just a few minutes Jan. 28!” "Overview | StaySafeOnline.org." Overview | StaySafeOnline.org. N.p., n.d. Web. 28 Nov. 2013 Claire Keating
    • 64.  Privacy and Social Networks Social networking sites are a commercial operation where they focus on making money by collecting user data. By knowing what we like, where we live, and what are interest are, companies, advertisers, marketers and employers make money. The data that we post online on social networking sites such as Facebook and Twitter make decisions about you. Claire Keating
    • 65. The Future of Online Privacy This video discovers how digital footprints are everywhere through facial recognition software, for example, among all online personal users. The video features the speaker, Jonathan Stickland, who investigates the future of online privacy and what to expect. Alyssa Budhoo
    • 66. “Once conversations that should be private are undertaken in a public forum, they become theater – meant for the onlookers more than the participants.” -ANNONYMOUS Claire Keating

    ×