Your SlideShare is downloading. ×
0
Future of social networking   group project
Future of social networking   group project
Future of social networking   group project
Future of social networking   group project
Future of social networking   group project
Future of social networking   group project
Future of social networking   group project
Future of social networking   group project
Future of social networking   group project
Future of social networking   group project
Future of social networking   group project
Future of social networking   group project
Future of social networking   group project
Future of social networking   group project
Future of social networking   group project
Future of social networking   group project
Future of social networking   group project
Future of social networking   group project
Future of social networking   group project
Future of social networking   group project
Future of social networking   group project
Future of social networking   group project
Future of social networking   group project
Future of social networking   group project
Future of social networking   group project
Future of social networking   group project
Future of social networking   group project
Future of social networking   group project
Future of social networking   group project
Future of social networking   group project
Future of social networking   group project
Future of social networking   group project
Future of social networking   group project
Future of social networking   group project
Future of social networking   group project
Future of social networking   group project
Future of social networking   group project
Future of social networking   group project
Future of social networking   group project
Future of social networking   group project
Future of social networking   group project
Future of social networking   group project
Future of social networking   group project
Future of social networking   group project
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Future of social networking group project

2,142

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
2,142
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
106
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. The Future of Social Networking Final Assignment Issues in Social Media Julian Bulgaretti, Robin Hazell, Brittany Hills, Day Park October 20, 2010 Photo source:http://www.jonathannicholas.com/2008/12/social-networking-prospecting-in-web-20/
  • 2. Popular Types of Social Networking <ul><li>Facebook </li></ul><ul><li>MySpace </li></ul><ul><li>Twitter </li></ul><ul><li>Blogger </li></ul><ul><li>YouTube </li></ul><ul><li>Flickr </li></ul>Photo source: www.socialmediamom.com
  • 3. Photo sources: www.offthemark.com ; www.imod.co.za ; http://omglog.com/tag/satire
  • 4. <ul><li>Social network service launched in 2004 by Mark Zuckerberg </li></ul><ul><li>Has over 500 million active users (July 2010) </li></ul><ul><li>Users can create a profile, add other users as friends, exchange messages, post photos, organize groups/events </li></ul><ul><li>The most popular social networking site in English-speaking countries including Canada, the U.K., and the U.S. </li></ul><ul><li>Although very popular and well-received, Facebook has been criticized for its privacy policies and account terminations </li></ul>Sourced from: http://en.wikipedia.org/wiki/Criticism_of_Facebook and http://en.wikipedia.org/wiki/Facebook
  • 5. Sourced from: www.offthemark.com
  • 6. <ul><li>Social networking site launched by News Corp. Digital Media in 2003 </li></ul><ul><li>Was the most popular networking site in 2006 </li></ul><ul><li>Facebook is their main competitor and has succeeded to become most popular in 2008 </li></ul><ul><li>Profiles have a mood indicator of user, and user can post blogs, multimedia, and photos </li></ul><ul><li>Hugely popular with musicians who have profiles and post tracks from their albums </li></ul><ul><li>Has been criticized for not being user-friendly, security issues, and child safety </li></ul>Sourced from: http://en.wikipedia.org/wiki/MySpace
  • 7. Sourced from: http://trendsupdates.com ; www.socialsignal.com ; http://www.altafsayani.com ; www.stumbleupon.com
  • 8. <ul><li>Social micro-blogging service </li></ul><ul><li>Users limited to 140 characters/post but can “tweet” as many times, whenever they want </li></ul><ul><li>“ Tweets” can be seen by others who follow them </li></ul><ul><li>Launched in 2006 by Jack Dorsey, has more than 100 million users </li></ul><ul><li>Fans love being very connected to close ones but some people feel “too connected” </li></ul><ul><li>Collects and shares information with third-parties </li></ul>Sourced from: twitter.com and http://en.wikipedia.org/wiki/Twitter
  • 9. Sourced from: newyorker.com ; wallstreetjackass.typepad.com ; www.stumbleupon.com ; www.concurringopinions.com
  • 10. <ul><li>Blogger is a free blog publishing service </li></ul><ul><li>Users can create private or multi-user blogs </li></ul><ul><li>Launched by Pyra Labs in 1999 </li></ul><ul><li>Has been blocked for certain time periods in several countries including Iran, Syria, China, Cuba, Myanmar, and Fiji </li></ul><ul><li>Redesigned in 2004, offering templates and photo-posting </li></ul><ul><li>Now completely Google operated after Google acquired Pyra Labs in 2003 </li></ul>Sourced from: http://en.wikipedia.org/wiki/History_of_Blogger and http://en.wikipedia.org/wiki/Blogger_%28service%29
  • 11. <ul><li>Photo/video management and sharing site </li></ul><ul><li>Blogging in photographs </li></ul><ul><li>Launched by Ludicorp in 2004 </li></ul><ul><li>Bought by Yahoo in 2006 </li></ul><ul><li>Similar sites include Snapfish and Photobucket </li></ul><ul><li>Criticized for censorship management </li></ul>Sourced from: http://en.wikipedia.org/wiki/Flickr ; http://www.flickr.com/about/ and www.code.ae
  • 12. <ul><li>Video management and sharing site </li></ul><ul><li>Launched in 2005 by former PayPal employees </li></ul><ul><li>Users can upload, search, and watch videos </li></ul><ul><li>Awarded for being a “Speaker’s Corner” and promoting democracy </li></ul><ul><li>Criticized for copyright material, privacy, and controversial content </li></ul><ul><li>Blocked for periods of time in some countries including Pakistan, Iran, China, and Thailand </li></ul>Sourced from: http://en.wikipedia.org/wiki/Youtube
  • 13. <ul><li>The issues and challenges that the future of social networking is faced with are growing rapidly. We are moving forward to an ever-changing world filled with computers and relying on networking sites in our everyday lives. We use networking sites for employment opportunities, starting a business and we rely on the networking sites as a source of income, fame, entertainment, downloading music, socializing on numerous sites. The social network services connect people who share interests in all aspects. It’s a great way to communicate digitally. </li></ul>
  • 14. <ul><li>As we go forward we are faced with issues in social networking. You can create a profile, post blogs for everyone to see and share a list of contacts. To protect your privacy, you can control who you can be friends with and who can see your profile but what about a posting that you did 5 years ago? Will that go away? No. You have to remember that internet postings never go away so think before you post something. How do you say that to a 13 year old? </li></ul><ul><li>We hear in the news that there have been concerns about giving out too much information on social networking sites and there are things you have to watch out for like sexual predators. For example if you blog about yourself in a funny way-years later it can haunt you. Anyone can search your name including large corporations. </li></ul>
  • 15. Concerns of Social Networking <ul><li>One of the concerns is that social networking sites are not protecting our privacy rights. For people who have nothing to hide-that could be okay but you have to be really careful about what you say to people or what other people say about you and someone else can distort information. The problem is that younger people using the networking sites and have no idea about the privacy issues. There should be laws protecting children’s privacy to ensure their safety and wellbeing. </li></ul><ul><li>Negative comments or blogging can hurt you in the future, especially in your professional career and can cause consequences in the future. </li></ul><ul><li>Users communicating on websites sometimes misuse the intention of socially interacting with others. For example: bullying others, stalking people, etc. </li></ul><ul><li>The largest crime to date is child pornography social networking site and some has been dismantled by law enforcement. </li></ul><ul><li>There is the problem of others using your personal information and creating multiple identities which is called identity manipulation. How can you stop that? You can’t and the social networking sites should implement measures to stop identity manipulation. </li></ul>
  • 16. <ul><li>There is tainted reputation which can be destroyed through malicious gossip and hurting people. There is online shaming which is a privacy violation. </li></ul><ul><li>There are many issues and challenges on social networking sites and I believe they are not doing enough to stop these issues. They are making billions of dollars as many people are using it but they are not doing enough to stop the serious problems of cyber bullying, identity manipulation, child pornography, etc. </li></ul><ul><li>There are theories that Facebook was started by the CIA through connections of capital backers and American Spy Agency. The CIA did say that they use Facebook for job opportunities. Facebook’s privacy policy says it does not share 3 rd party information but it will give out information to government agencies to abide by the law. They say that the CIA is watching users on Facebook and could be using this information in other ways. </li></ul><ul><li>Source: Info from Throwing sheep in the boardroom, Page 267 Matthew Fraser & Soumitra Dutta </li></ul>
  • 17. <ul><li>Millions of people are using networking sites and people are expressing their feelings openly for the world to see and sometimes there is concern about privacy invasion, identity theft and reputational damage. We have to remember that privacy is a freedom protected under the Human Rights Code. </li></ul><ul><li>Here is an article where Facebook introduced “Instant Personalization” which allows users to view websites based on their interest and social connections and this was raising privacy concerns. </li></ul><ul><li>Source: Info from Throwing sheep in the boardroom, Page 80, Matthew Fraser & Soumitra Dutta </li></ul><ul><li>http://www.cbc.ca/technology/story/2010/04/23/tech-facebook-instant-personalization-privacy-concerns.html </li></ul>
  • 18. Possible solutions to our privacy on social sites <ul><li>I recommend that each country should set up social networking regulations for the safety of users as it is becoming dangerous. There should be a restriction any type of negative activity on the sites to discourage bad behaviour on networking sites. Each government can set up rules just like there are rules for drivers without seatbelts, drunk drivers. There should be consequences for people that abuse social networking sites. These laws should then be enforced daily and I think we can move ahead in real world relationships and the entire world can prosper and enjoy social networking sites in a positive way. </li></ul>
  • 19. How privacy is affecting real world relationships <ul><li>There are may benefits of social networking but there are some disadvantages as one of the major crimes in Social Networking is Child Pornography. This is effecting our real world relationships with others. These issues are affecting the real world relationships and what if our government shuts down Facebook and other sites until they can work together and come up with a set of regulations to enforce bad behaviour and to protect our privacy? How about if we all protest and blog that we want restrictions on the identity and security issues as our privacy is being violated. I think that they would listen to the users and maybe another networking site can provide that for us as we are moving forward in the cyber world. </li></ul><ul><li>Source: http://en.wikipedia.org/wiki/Social_network_service </li></ul>
  • 20. <ul><li>http://www.priv.gc.ca/information/illustrations/index_e.cfm </li></ul>
  • 21. Here are some ways to protect yourself on social networking sites: <ul><li>Remember never to expect privacy. Make sure you read the privacy states and policies. </li></ul><ul><li>Investigate different social networking sites before you join a site and post your profile. Remember to look for closed network and find out if others can view your profile without your permission. </li></ul><ul><li>Use the most highest and restrictive security setting and NEVER give out your birthday, full name, phone number and social insurance number or your address. </li></ul><ul><li>Before you post anything on the website – think about what you are going to say to your friends and family. Remember never to post embarrassing moments because it can haunt you in the future. It will be in the history books. </li></ul><ul><li>Remember that even if the sites have extensive privacy options where they may have to give out your personal information to the police or law enforcement agencies. </li></ul><ul><li>http://www.priv.gc.ca/fs-fi/02_05_d_35_sn_e.cfm </li></ul>
  • 22. How does social media affects real world relationships with respect to privacy issues? <ul><li>In an article published in January 2009, Google warns us of privacy issues on the social web in regards to the expansion of the social web are growing and we are compromising our privacy. There is lack of control over activities and unwelcome linkage. </li></ul><ul><li>http://www.readwriteweb.com/archives/google_warns_of_privacy_issues.php </li></ul>
  • 23. Possible solutions or recommendations <ul><li>The issues and challenges with respect to identity and security issues is that we need to implement a policing system on the websites. You need a group of specialists who can target these people like hackers, identity manipulation, child pornography, cyber-bullying and a list of other illegal activities that are going on. We need to inform users of the privacy issues because a lot of them create profiles without knowing what the consequences can lead to. They have no idea that there is no privacy, especially children. </li></ul>
  • 24. Resources <ul><li>Sources cited: </li></ul><ul><li>Info from Throwing sheep in the boardroom, Page 267 Matthew Fraser & Soumitra Dutta Info from Throwing sheep in the boardroom, Page 80, Matthew Fraser & Soumitra Dutta </li></ul><ul><li>http://www.cbc.ca/technology/story/2010/04/23/tech-facebook-instant-personalization-privacy-concerns.html http://en.wikipedia.org/wiki/Social_network_service </li></ul><ul><li>http:// www.priv.gc.ca/fs-fi/02_05_d_35_sn_e.cfm http :// www.readwriteweb.com/archives/google_warns_of_privacy_issues.php </li></ul><ul><li>Pictures: </li></ul><ul><li>http:// www.priv.gc.ca/information/illustrations/index_e.cfm </li></ul><ul><li>http:// bub.blicio.us/wp-content/uploads/2010/02/privacy_policy_1673_1673.jpg </li></ul><ul><li>http:// www.greenvalleyrecycling.ca/images/privacy.gif </li></ul><ul><li>http:// cdn.thetechjournal.com/wp-content/uploads/2010/08/51a.jpg </li></ul>
  • 25. Past, Present and Future of Social Networking Time can means development of technology Number of users can mean popularity, same as participations of people
  • 26. PAST - Early 90’s BBS (Bulletin board system ) AOL (American Online ) The Infant Years for social networking <ul><li>Used telephone lines </li></ul><ul><li>Started using e-mail </li></ul><ul><li>Rised of the Dot-Coms </li></ul><ul><li>Communicated with a central system </li></ul>
  • 27. PAST - Mid 90’s Created in 1995 , 50 millions members in 2008 Social Networking’s Adolescence <ul><li>Social networking sites started </li></ul><ul><li>classmates.com is about </li></ul><ul><li>&quot;Who can I connect with that was </li></ul><ul><li>once a schoolmate of mine?“ </li></ul><ul><li>Sixdegrees.com is about </li></ul><ul><li>creating circles of friends via online </li></ul><ul><li>registration and matching-up of likes, </li></ul><ul><li>dislikes, interests, or what have you </li></ul>1997 to 2001, 1 million members
  • 28. PRESENT - 2000’s The boom Of Social networking sites Relationship is expanding to from real world to virtual world through social media World is getting smaller
  • 29. PRESENT - 2000’s The Golden Period of Social Networking <ul><li>Vast opportunities of self-expression </li></ul><ul><li>: broadcasting themselves on Youtube </li></ul><ul><li>Openness of information </li></ul><ul><li>: sharing and controlling </li></ul><ul><li>Global social networking </li></ul><ul><li>: more sharing ideas and contents </li></ul><ul><li>: gathering as same interests </li></ul><ul><li>Microblogging </li></ul><ul><li>such as &quot;what I'm doing right now,“ </li></ul><ul><li>Privacy issues </li></ul><ul><li>: be searched personal identity </li></ul><ul><li>popularity of social networking in business </li></ul>Created in 2004 , 500 millions members in 2010 Created in 2006 , 190 millions monthly Created in 2005
  • 30. Future 2020 Anywhere and Everywhere like Air <ul><li>Continuing development </li></ul><ul><li>Reinventing and the world connected </li></ul><ul><li>High technology </li></ul><ul><li>: ubiquitous internet access and the servers to enable real time social graph access </li></ul><ul><li>: advanced mobile devices </li></ul><ul><li>Seamless fabric of classic networks and networked objects </li></ul><ul><li>Privacy issues under the control </li></ul>
  • 31. Positive and Negative aspects of future social networking Vs. Future social networking provides many advantages in real world At the same time, using social media without control could be dangerous
  • 32. POSITIVE ASPECTS Individuals <ul><li>Enrich social lives regard less distance and time </li></ul><ul><li>: bridging, bonding and maintaining social capital </li></ul><ul><li>Saving time and money by using online </li></ul><ul><li>e g ) interview via web cam </li></ul>Organizations <ul><li>Saving time and money for advertising </li></ul><ul><li>: Traditional media will be replaced by social media </li></ul><ul><li>: </li></ul><ul><li>Get more engaged customers through interactions on social media </li></ul><ul><li>: Customer engagement is key to improving satisfaction and loyalty rates, </li></ul><ul><li>and revenue </li></ul>
  • 33. NEGATIVE ASPECTS Individuals <ul><li>Missing valuable face-to face relationships </li></ul><ul><li>: More relationship and teams will be based on “weak links” </li></ul><ul><li>Imbalance between real and virtual world </li></ul><ul><li>Uncertainty about meaningful conversation and transparency </li></ul><ul><li>: People will hide behind keyboard </li></ul><ul><li>Digital jet leg </li></ul><ul><li>: too much information and pressure </li></ul>Organizations <ul><li>Easily lose loyalty from customers </li></ul><ul><li>: Social media has a viral factor </li></ul>
  • 34. Conclusion Social media With advanced technology is changing people’s lives more convenient and faster. Also social media is still positive in spite of some negative things. Ironically, the bigger social networking is in people’s lives, the more traditional values are important such as trust and transparency. Social media is a tool, which is amazing and powerful. At the same time, it is manageable for people. In the future , it will be same What do people need to do ? <ul><li>Keep transparency on social networks </li></ul><ul><li>: sharing accurate and real time data </li></ul><ul><li>Engage or participate </li></ul><ul><li>: Openness and revenue or reputation will be related </li></ul>
  • 35. Resources http://www.digitaltrends.com/features/the-history-of-social-networking/ ( The History of Social Networking ) http://www.startupbooster.com/2009/12/30/social-media-a-history-of-social-media-and-social-media-marketing/ ( Social Media – A History of Social Media and Social Media Marketing ) http://www.youtube.com/watch?v=j2aiXUM4Kzo ( The Future of Social Media Gerd Leonhard Picnic 2009 Amsterdam ) http://advice.cio.com/kristin_burnham/three_dangerous_social_media_misconceptions ( Three Dangerous Social Media Misconceptions ) http://hubpages.com/hub/Positive-Impacts-of-Social-Networking ( Positive Impacts of Social Networking ) http://www.future-internet.eu/fileadmin/documents/reports/FI_Panel_Report_v3.1_Final.pdf (Future Internet 2020)
  • 36. Pictures http://deadhedge.blogspot.com/2010/03/medicare-understands-social-networking.html http://matthewbuckland.com/?p=1041 http://compassioninpolitics.wordpress.com/2008/11/16/five-top-social-media-and-web-trends-for-2009/ http://webdevelopmentby.ifoundries.com/2009/01/10-ways-to-measure-social-media-success/ http://www.thenextbigclip.com/balancing-work-and-social-media/business/2009/11/
  • 37. Identity Manipulation & Misrepresentation <ul><li>Reasons to Manipulate and/or misrepresent yourself: </li></ul><ul><li>Cyber bullying </li></ul><ul><li>Convenience </li></ul><ul><li>Avoiding spam and the ability to be traced </li></ul><ul><li>Shallow relationships (spying on someone) </li></ul><ul><li>Make yourself more appealing to the opposite sex </li></ul><ul><li>Privacy </li></ul><ul><li>Business </li></ul><ul><li>http://ezinearticles.com/?Fake-Accounts-in-Facebook—
How-to-Counter-It&id=3703889 </li></ul>
  • 38. Websites which encourage bypassing registering yourself: <ul><li>BugMeNot.com is a site which allows you to bypass the login section of social network sites and any other login oriented websites. </li></ul><ul><li>http://lifehacker.com/031809/bugmenot--bypass-web-site-registration </li></ul>
  • 39. <ul><li>Around 37% of Facebook accounts are Fake. </li></ul><ul><li>Out of friend 10 requests only 7 or 8 are real. </li></ul><ul><li>http://www.pc1news.com/news/0325/fake-profiles-on-fakebook-facebook.html </li></ul>
  • 40. MEGAN MEIER STORY <ul><li>Megan Taylor Meier (November 6, 1992 – </li></ul><ul><li>October 17, 2006) from Dardenne Prairie, </li></ul><ul><li>Missouri. </li></ul><ul><li>She had trouble fitting in as she was </li></ul><ul><li>overweight, and depressed. She had </li></ul><ul><li>been the subject of bullying since she </li></ul><ul><li>was 13-years-old. </li></ul><ul><li>Meier created a MySpace page to connect </li></ul><ul><li>with friends and become social. </li></ul><ul><li>Suddenly she started receiving messages </li></ul><ul><li>from a 16-year-old boy named “Josh Evans” </li></ul><ul><li>telling her how beautiful she was. </li></ul><ul><li>This grew slowly into an online relationship that Megan took very seriously. </li></ul>
  • 41. <ul><li>Shortly after Megan received a message from “Josh” saying &quot;I don't know if I want to be friends with you anymore because I've heard that you are not very nice to your friends&quot;. </li></ul><ul><li>Rumors started to swirl about Megan. </li></ul><ul><li>The last message “Josh” sent read: &quot;Everybody in O'Fallon knows how you are. You are a bad person and everybody hates you. Have a shitty rest of your life. The world would be a better place without you.&quot; </li></ul><ul><li>Meier responded with &quot;You’re the kind of boy a girl would kill herself over.“ </li></ul><ul><li>20 minutes later Meier was found dead hanging from her closet. </li></ul><ul><li>Six weeks later Megans parents were informed the mother of Megan’s friend Lori Drew, was the creator of “Josh Evans” and between Drew, her daugter and Ashley Grillis, Drews 18-year-old employee they had harrased a 13-year-old girl to her grave. </li></ul><ul><li>http://en.wikipedia.org/wiki/Suicide_of_Megan_Meier </li></ul>
  • 42. <ul><li>The experiment: </li></ul><ul><li>Join various social networking websites with this false identity. </li></ul><ul><li>Purpose: </li></ul><ul><li>“ Research people’s decisions to trust and share information with the false identity.”  </li></ul><ul><li>False Identity: </li></ul><ul><li>The identity was a young, attractive, educated female. </li></ul><ul><li>Goal: </li></ul><ul><li>Connect with knowledgeable corporate and military personnel, and extract confidential information. </li></ul>
  • 43. <ul><li>Result: </li></ul><ul><li>Robin Sage “exploited individuals trust based on gender, occupation, education/credentials, and connections.” </li></ul><ul><li>Collected hundreds of ‘friends’ through different social networks. Some executives at NSA, DOD, Military Intelligence groups, and Global 500 corporations. </li></ul><ul><li>Robin was offered gifts, government and corporate jobs, and the ability to speak at security conferences. </li></ul><ul><li>Conclusion:   </li></ul><ul><li>The creators choice of a young, attractive, educated female allowed her to connect and gain trust and information from multiple well informed government and corporate employees. </li></ul><ul><li>“ The false identity combined with carefully chosen false credentials led to a false trust that could have resulted in the breach of multiple security protocols.” </li></ul><ul><li>http://media.blackhat.com/bh-us-10/whitepapers/Ryan/BlackHat-USA-2010-Ryan-Getting-In-Bed-With-Robin-Sage-v1.0.pdf </li></ul>
  • 44. <ul><li>Twitter has set the bar. </li></ul><ul><li>With high profile celebrities </li></ul><ul><li>joining on to their website </li></ul><ul><li>Twitter needs to make sure </li></ul><ul><li>nobody can impersonate them. </li></ul><ul><li>Therefore, Twitter is launching </li></ul><ul><li>Verified Accounts. </li></ul><ul><li>Each account will have an official notification on the users profile. </li></ul><ul><li>This will increase awareness of fraudulent accounts and deter users from attempting to cyber bullying, spying, identity theft, and much more. </li></ul><ul><li>http://mashable.com/2009/06/06/twitter-verified-accounts/ </li></ul>

×