SlideShare a Scribd company logo
1 of 46
Taking the Mystery
out of Facebook
Presented by Beth Gallaway
informationgoddess29@gmail.com
603-247-3196
"Generation M2: Media in the Lives of 8- to 18-
Year-Olds”
http://www.kff.org/entmedia/mh012010pkg.cfm
Teens & Sexting
http://www.pewinternet.org/Reports/2009/Teens-and-Sexting.aspx
http://www.mvtimes.com/news/2006/03/09/myspace.php
What is Web 2.0?
• Web as platform (Face Your Manga)
• Collective intelligence (YouTube)
• Data driven (Online Summer Reading)
• Everything is in beta (meebo)
• Simple programming (Facebook)
• Cross platform (Twitter)
• Rich user experience (Club Penguin,
Cartoon Network Game Creator)
What is Social Software?
ajax.phpmagazine.net/2006/02/great_collection_of_web_20_log.html
Social Software
Assumptions
• Everything is meant to be shared
(“public” is the default)
• Everything is meant to be critiqued
(commenting “ON” is the default)
• Everything is meant to be remixed
(Creative Commons licensing is the default)
How do you feel about
Social Networking sites?
“Libraries cannot afford to ignore the social
networking potential to attract new,
younger and more technologically
interested customers.” "It's where the patrons are so we need to be
visible to them-marketing, information and
building community online. Not all patrons
have to walk through the door. We can
make connections with and serve online
those patrons who, for whatever reason,
won't be physically in the library."
“At this time we feel the
drawbacks outweigh
the benefits."
“not sure--need more info"
Why are Social Networks
so popular?
• It’s all about ME!
• Customizable
• Social
• Developmental Assets
Developmental Assets
• Support
• Empowerment
• Boundaries & Expectations
• Constructive Use of Time
• Commitment to Learn
• Positive Values
• Social Competencies
• Positive Identity
The Search Institute. 40 Developmental Assets of Adolescents/Middle Childhood/Early Childhood.
http://search-institute.org
Teen Brain Development
•Risk Takers
•Consequences
•Impulse
Gamers
• Risk-takers
• Social
• Competitive
• Global
• Technical
Beck, John & Mitchell Wade. The Kids are Alright. Harvard Business School Press, 2007.
http://www.nslg.net/gotgamebook/index.html
4 Ps
PREDATORS
PRIVACY
PORNOGRAPHY
POPUPS
Cyberbullying
http://www.stopcyberbullying.org
Escalating Cyberbullying
• Ignore it?
• Restrict Communication
• Restrict “Friending”
• Google your child
• Block Sender
Warn Sender
• Report to ISP
• Report to School
• Report to Police
• Legal Action
P E A C E F I R E
http://www.peacefire.org
Tips for Parents & Guardians
• Begin a dialogue with your kids about safe Internet use and
supervise their online activities
• Consider rating, blocking, monitoring, and filtering
applications for your computer
• Make Internet use a family activity
• Encourage your kids’ critical-thinking skills
• Set reasonable rules for going online
• Encourage your kids to tell you when they encounter
problems online
• If they come across lewd, obscene, or illegal material or if
they are contacted by someone who attempts to engage
them in sexual conversation, make a report to NCMEC’s
CyberTipline at www.cybertipline.com or 1-800-843-5678
http://www.missingkids.com/missingkids/servlet/PageServlet?LanguageCountry=en_US&PageId=
When Creating a Username,
DO Use…
• Something original and creative
• A nickname
• A character's name
• A name that references a
favorite band, animal, food, hobby...
When Creating a Username,
DON’T use
• Your real first or last name

Your age

Your phone number

Your zip code or location

A suggestive name or word

Pornographic or obscene words

Derogatory terms
Password Tips
• Choose passwords that are:
– At least 6 to 8 characters
– Combinations of letters and numbers
– Personally meaningful for easy
remembering
– Not obvious to the rest of the world
– Former address is a good one to try!
• Use a password generator for help
• Write the password down and store in
a safe place
Web As Platform:
Face Your Manga
• Create a digital
representation of
yourself
• Use in a variety of
applications
Face Your Manga
http://www.faceyourmanga.com
Face Your Manga: Uses
• Contest: create a
personal
• Contest: create a
celebrity, author,
character…
• Internet safety
session
Face Your Manga
http://www.faceyourmanga.com
Face Your Manga
Face Your Manga
http://www.faceyourmanga.com
Collective Intelligence:
YouTube
• Home for archiving, rating, &
commenting on video
http://www.youtube.com/oceanking97
Comments on
Re: Cry of the Dolphins
http://www.youtube.com/oceanking97
Data Driven:
Online Summer Reading
• Online registration
• Online book logs
• Online book reviewing/rating
MA 2008 Statewide Summer Reading Program: Wild Reads
http://www.readsinMA.org
Alternatives to Facebook
Reads in MA
MA 2009 Statewide Summer Reading Program: Go Green @ your library
http://www.readsinMA.org
Everything’s in Beta: MEEBO
Meebo
http://www.meebo.com
Cross Platform:
Twitter
• Record what you are
reading, viewing,
doing, thinking
• Connect with friends
and colleagues to
share information
Twitter
http://www.twitter.com
Rich User Experience:
Club Penguin
• Avatar creation
• Games
• Chat
Club Penguin
http://www.clubpenguin.com/
Club Penguin
Club Penguin
http://www.clubpenguin.com/
Game Design
• Ben 10 Alien Force Game Creator
– http://gamecreator.cartoonnetwork.com/
Light Programming
Facebook
• Status Updates
• Instant Messaging
• Email
• Social Networking
• Affinity Groups
• Applications – Games!
“Facebook helps you connect and share
with the people in your life.”
Using Facebook
Turning off Chat – Go Offline!
Click HELP under account to find
the Safety Center
Select Teen to get tips for your
teen
On Safety for Teens page, scroll
down & click “More information
on reporting abuse”
Note section on Cyberbullying…
Facebook Etiquette
• Create a friending policy for yourself
• Use filters
• It’s okay to not use Applications or block them
• Reply within 24-48 hours if possible
• Etiquette article:
http://www.pcworld.com/article/169120/faceb
ook_etiquette_10_rules_for_better_socializin
g.html
Click Friends, then Edit Friends…
Then Create list and move
individuals to appropriate category
For more resources…
http://www.delicious.com/informationgoddess29/facebook
Contact
Beth Gallaway
603-247-3196
informationgoddess29@gmail.com
http://informationgoddess.info
• Slides: Slideshare
http://www.slideshare.net/
informationgoddess29
• Links: SocialSoftware
http://www.delicious.com/
informationgoddess29/socialsoftware
&
• http://www.delicious.com/informatio
ngoddess29/facebook

More Related Content

What's hot

New media for graphics designers and photographers
New media for graphics designers and photographersNew media for graphics designers and photographers
New media for graphics designers and photographersSanjana Hattotuwa
 
Social Media Training for Youth Leaders, for York Diocese, November 2014.
Social Media Training for Youth Leaders, for York Diocese, November 2014.Social Media Training for Youth Leaders, for York Diocese, November 2014.
Social Media Training for Youth Leaders, for York Diocese, November 2014.Bex Lewis
 
Technology and Social Studies
Technology and Social StudiesTechnology and Social Studies
Technology and Social StudiesGlenn Wiebe
 
Mini-geekfest Webinar March 14, 2011
Mini-geekfest Webinar March 14, 2011Mini-geekfest Webinar March 14, 2011
Mini-geekfest Webinar March 14, 2011Peggy George
 
LILRC fall conference
LILRC fall conferenceLILRC fall conference
LILRC fall conferenceBeth Gallaway
 
Social Applications To Watch
Social Applications To WatchSocial Applications To Watch
Social Applications To WatchChad Mairn
 
Handheld Librarian 7 Online Conference - August 15, 2012
Handheld Librarian 7 Online Conference - August 15, 2012 Handheld Librarian 7 Online Conference - August 15, 2012
Handheld Librarian 7 Online Conference - August 15, 2012 Robin M. Ashford, MSLIS
 
Youth Social Media Doncaster
Youth Social Media DoncasterYouth Social Media Doncaster
Youth Social Media DoncasterBex Lewis
 
Sifiso mazibuko facebook habari media presentation at tns digital life event ...
Sifiso mazibuko facebook habari media presentation at tns digital life event ...Sifiso mazibuko facebook habari media presentation at tns digital life event ...
Sifiso mazibuko facebook habari media presentation at tns digital life event ...karinduchenne
 
The 21st Century Social Studies classroom MACE 2014
The 21st Century Social Studies classroom MACE 2014The 21st Century Social Studies classroom MACE 2014
The 21st Century Social Studies classroom MACE 2014Glenn Wiebe
 
Game-Based Learning in Social Studies
Game-Based Learning in Social StudiesGame-Based Learning in Social Studies
Game-Based Learning in Social StudiesGlenn Wiebe
 
Factors that Influence Youth
Factors that Influence YouthFactors that Influence Youth
Factors that Influence YouthDeshawna Colvin
 

What's hot (18)

New media for graphics designers and photographers
New media for graphics designers and photographersNew media for graphics designers and photographers
New media for graphics designers and photographers
 
Social Media Training for Youth Leaders, for York Diocese, November 2014.
Social Media Training for Youth Leaders, for York Diocese, November 2014.Social Media Training for Youth Leaders, for York Diocese, November 2014.
Social Media Training for Youth Leaders, for York Diocese, November 2014.
 
Social Applications on the Verge
Social Applications on the VergeSocial Applications on the Verge
Social Applications on the Verge
 
Technology and Social Studies
Technology and Social StudiesTechnology and Social Studies
Technology and Social Studies
 
Mini-geekfest Webinar March 14, 2011
Mini-geekfest Webinar March 14, 2011Mini-geekfest Webinar March 14, 2011
Mini-geekfest Webinar March 14, 2011
 
LILRC fall conference
LILRC fall conferenceLILRC fall conference
LILRC fall conference
 
Social Applications To Watch
Social Applications To WatchSocial Applications To Watch
Social Applications To Watch
 
Handheld Librarian 7 Online Conference - August 15, 2012
Handheld Librarian 7 Online Conference - August 15, 2012 Handheld Librarian 7 Online Conference - August 15, 2012
Handheld Librarian 7 Online Conference - August 15, 2012
 
Youth Social Media Doncaster
Youth Social Media DoncasterYouth Social Media Doncaster
Youth Social Media Doncaster
 
326 nicholas web_seminar2010
326 nicholas web_seminar2010326 nicholas web_seminar2010
326 nicholas web_seminar2010
 
Sifiso mazibuko facebook habari media presentation at tns digital life event ...
Sifiso mazibuko facebook habari media presentation at tns digital life event ...Sifiso mazibuko facebook habari media presentation at tns digital life event ...
Sifiso mazibuko facebook habari media presentation at tns digital life event ...
 
The 21st Century Social Studies classroom MACE 2014
The 21st Century Social Studies classroom MACE 2014The 21st Century Social Studies classroom MACE 2014
The 21st Century Social Studies classroom MACE 2014
 
Fontana
FontanaFontana
Fontana
 
Game-Based Learning in Social Studies
Game-Based Learning in Social StudiesGame-Based Learning in Social Studies
Game-Based Learning in Social Studies
 
Seneca College
Seneca CollegeSeneca College
Seneca College
 
teens n tech: where r wii?
teens n tech:  where r wii?teens n tech:  where r wii?
teens n tech: where r wii?
 
Research Overview at UW-Madison in GLS group
Research Overview at UW-Madison in GLS groupResearch Overview at UW-Madison in GLS group
Research Overview at UW-Madison in GLS group
 
Factors that Influence Youth
Factors that Influence YouthFactors that Influence Youth
Factors that Influence Youth
 

Similar to Taking the Mystery out of Facebook

Pod camp boston 2011 locking up yourself online
Pod camp boston 2011 locking up yourself onlinePod camp boston 2011 locking up yourself online
Pod camp boston 2011 locking up yourself onlineLane Sutton
 
How Not to Get Fired Using Social Media at Work - EEO, Diversity and Social M...
How Not to Get Fired Using Social Media at Work - EEO, Diversity and Social M...How Not to Get Fired Using Social Media at Work - EEO, Diversity and Social M...
How Not to Get Fired Using Social Media at Work - EEO, Diversity and Social M...GovLoop
 
Women on the internet and Social Networks
Women on the internet and Social NetworksWomen on the internet and Social Networks
Women on the internet and Social NetworksRené van den Bos
 
Technology Influence
Technology Influence Technology Influence
Technology Influence Ilaxi Patel
 
WLA Presentation
WLA PresentationWLA Presentation
WLA Presentationwlsteens
 
Emerging Trends for Engaging Communities
Emerging Trends for Engaging CommunitiesEmerging Trends for Engaging Communities
Emerging Trends for Engaging CommunitiesCole Camplese
 
Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for ParentsMarian Merritt
 
Internetsafety
InternetsafetyInternetsafety
Internetsafetydanriles
 
Week 7: Privacy-rev2013
Week 7:  Privacy-rev2013Week 7:  Privacy-rev2013
Week 7: Privacy-rev2013Ray Brannon
 
Teaching The Net Generation
Teaching The  Net  GenerationTeaching The  Net  Generation
Teaching The Net GenerationGary Toews
 
Teens on the Web: What Every Parent Should Know
Teens on the Web: What Every Parent Should KnowTeens on the Web: What Every Parent Should Know
Teens on the Web: What Every Parent Should KnowVA Simple Services
 
7 Ways the Social Web is Changing the World
7 Ways the Social Web is Changing the World7 Ways the Social Web is Changing the World
7 Ways the Social Web is Changing the WorldTara Hunt
 
Social Media Trends Colloquium Seminar
Social Media Trends Colloquium SeminarSocial Media Trends Colloquium Seminar
Social Media Trends Colloquium SeminarKaren Yang
 
Digital parenting seminars
Digital parenting seminarsDigital parenting seminars
Digital parenting seminarsEmmanuel Arthur
 

Similar to Taking the Mystery out of Facebook (20)

Pod camp boston 2011 locking up yourself online
Pod camp boston 2011 locking up yourself onlinePod camp boston 2011 locking up yourself online
Pod camp boston 2011 locking up yourself online
 
MyFacebook
MyFacebookMyFacebook
MyFacebook
 
How Not to Get Fired Using Social Media at Work - EEO, Diversity and Social M...
How Not to Get Fired Using Social Media at Work - EEO, Diversity and Social M...How Not to Get Fired Using Social Media at Work - EEO, Diversity and Social M...
How Not to Get Fired Using Social Media at Work - EEO, Diversity and Social M...
 
Women on the internet and Social Networks
Women on the internet and Social NetworksWomen on the internet and Social Networks
Women on the internet and Social Networks
 
Davy Lunch & Learn
Davy Lunch & LearnDavy Lunch & Learn
Davy Lunch & Learn
 
Technology Influence
Technology Influence Technology Influence
Technology Influence
 
Who/Why/How YA
Who/Why/How YAWho/Why/How YA
Who/Why/How YA
 
WLA Presentation
WLA PresentationWLA Presentation
WLA Presentation
 
Emerging Trends for Engaging Communities
Emerging Trends for Engaging CommunitiesEmerging Trends for Engaging Communities
Emerging Trends for Engaging Communities
 
Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for Parents
 
Internetsafety
InternetsafetyInternetsafety
Internetsafety
 
Week 7: Privacy-rev2013
Week 7:  Privacy-rev2013Week 7:  Privacy-rev2013
Week 7: Privacy-rev2013
 
Creating the Internet-Based Nonprofit
Creating the Internet-Based NonprofitCreating the Internet-Based Nonprofit
Creating the Internet-Based Nonprofit
 
Teaching The Net Generation
Teaching The  Net  GenerationTeaching The  Net  Generation
Teaching The Net Generation
 
Teens on the Web: What Every Parent Should Know
Teens on the Web: What Every Parent Should KnowTeens on the Web: What Every Parent Should Know
Teens on the Web: What Every Parent Should Know
 
7 Ways the Social Web is Changing the World
7 Ways the Social Web is Changing the World7 Ways the Social Web is Changing the World
7 Ways the Social Web is Changing the World
 
Social Media Trends Colloquium Seminar
Social Media Trends Colloquium SeminarSocial Media Trends Colloquium Seminar
Social Media Trends Colloquium Seminar
 
CyberSafety
CyberSafetyCyberSafety
CyberSafety
 
Riverview
RiverviewRiverview
Riverview
 
Digital parenting seminars
Digital parenting seminarsDigital parenting seminars
Digital parenting seminars
 

More from Beth Gallaway

The Time is Now 5-8-2017
The Time is Now 5-8-2017The Time is Now 5-8-2017
The Time is Now 5-8-2017Beth Gallaway
 
Picture Perfect presentation - MA Library Snapshot Day 2011
Picture Perfect presentation - MA Library Snapshot Day 2011Picture Perfect presentation - MA Library Snapshot Day 2011
Picture Perfect presentation - MA Library Snapshot Day 2011Beth Gallaway
 
Picture Perfect: 2011 MA Library Snapshot Day
Picture Perfect: 2011 MA Library Snapshot DayPicture Perfect: 2011 MA Library Snapshot Day
Picture Perfect: 2011 MA Library Snapshot DayBeth Gallaway
 
Library Behavior 101
Library Behavior 101Library Behavior 101
Library Behavior 101Beth Gallaway
 
NEFLIN: Childrens Collection Development
NEFLIN: Childrens Collection DevelopmentNEFLIN: Childrens Collection Development
NEFLIN: Childrens Collection DevelopmentBeth Gallaway
 
NEFLIN: YA Collection Development
NEFLIN: YA Collection DevelopmentNEFLIN: YA Collection Development
NEFLIN: YA Collection DevelopmentBeth Gallaway
 
Teen Library Behavior
Teen Library BehaviorTeen Library Behavior
Teen Library BehaviorBeth Gallaway
 
Game Design FAIL slides
Game Design FAIL slidesGame Design FAIL slides
Game Design FAIL slidesBeth Gallaway
 
Using Facebook for Online Courses
Using Facebook for Online CoursesUsing Facebook for Online Courses
Using Facebook for Online CoursesBeth Gallaway
 
Teen Library (Mis) Behavior 101, or, Beasts in the Fair Garden
Teen Library (Mis) Behavior 101, or, Beasts in the Fair GardenTeen Library (Mis) Behavior 101, or, Beasts in the Fair Garden
Teen Library (Mis) Behavior 101, or, Beasts in the Fair GardenBeth Gallaway
 
RA: Contemporary Realistic Fiction for Middle Grade Readers
RA: Contemporary Realistic Fiction for Middle Grade ReadersRA: Contemporary Realistic Fiction for Middle Grade Readers
RA: Contemporary Realistic Fiction for Middle Grade ReadersBeth Gallaway
 
The Fair Garden & Swarm of Beasts: Cultivating Life Long Library Users
The Fair Garden & Swarm of Beasts: Cultivating Life Long Library UsersThe Fair Garden & Swarm of Beasts: Cultivating Life Long Library Users
The Fair Garden & Swarm of Beasts: Cultivating Life Long Library UsersBeth Gallaway
 

More from Beth Gallaway (20)

The Time is Now 5-8-2017
The Time is Now 5-8-2017The Time is Now 5-8-2017
The Time is Now 5-8-2017
 
Hpl behavior
Hpl behaviorHpl behavior
Hpl behavior
 
Picture Perfect presentation - MA Library Snapshot Day 2011
Picture Perfect presentation - MA Library Snapshot Day 2011Picture Perfect presentation - MA Library Snapshot Day 2011
Picture Perfect presentation - MA Library Snapshot Day 2011
 
Picture Perfect: 2011 MA Library Snapshot Day
Picture Perfect: 2011 MA Library Snapshot DayPicture Perfect: 2011 MA Library Snapshot Day
Picture Perfect: 2011 MA Library Snapshot Day
 
Library Behavior 101
Library Behavior 101Library Behavior 101
Library Behavior 101
 
NEFLIN: Childrens Collection Development
NEFLIN: Childrens Collection DevelopmentNEFLIN: Childrens Collection Development
NEFLIN: Childrens Collection Development
 
NEFLIN: YA Collection Development
NEFLIN: YA Collection DevelopmentNEFLIN: YA Collection Development
NEFLIN: YA Collection Development
 
Teen Library Behavior
Teen Library BehaviorTeen Library Behavior
Teen Library Behavior
 
Web2whoapart2
Web2whoapart2Web2whoapart2
Web2whoapart2
 
Game Design FAIL slides
Game Design FAIL slidesGame Design FAIL slides
Game Design FAIL slides
 
Using Facebook for Online Courses
Using Facebook for Online CoursesUsing Facebook for Online Courses
Using Facebook for Online Courses
 
Teen Library (Mis) Behavior 101, or, Beasts in the Fair Garden
Teen Library (Mis) Behavior 101, or, Beasts in the Fair GardenTeen Library (Mis) Behavior 101, or, Beasts in the Fair Garden
Teen Library (Mis) Behavior 101, or, Beasts in the Fair Garden
 
Boxford RA Wrapup
Boxford RA WrapupBoxford RA Wrapup
Boxford RA Wrapup
 
RA: Contemporary Realistic Fiction for Middle Grade Readers
RA: Contemporary Realistic Fiction for Middle Grade ReadersRA: Contemporary Realistic Fiction for Middle Grade Readers
RA: Contemporary Realistic Fiction for Middle Grade Readers
 
Yeswecan
YeswecanYeswecan
Yeswecan
 
Yes We Can!
Yes We Can!Yes We Can!
Yes We Can!
 
Ruatwit
RuatwitRuatwit
Ruatwit
 
Maricopa Keynote
Maricopa KeynoteMaricopa Keynote
Maricopa Keynote
 
The Fair Garden & Swarm of Beasts: Cultivating Life Long Library Users
The Fair Garden & Swarm of Beasts: Cultivating Life Long Library UsersThe Fair Garden & Swarm of Beasts: Cultivating Life Long Library Users
The Fair Garden & Swarm of Beasts: Cultivating Life Long Library Users
 
Podcasting Toolkit
Podcasting ToolkitPodcasting Toolkit
Podcasting Toolkit
 

Recently uploaded

TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 

Recently uploaded (20)

TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 

Taking the Mystery out of Facebook

  • 1. Taking the Mystery out of Facebook Presented by Beth Gallaway informationgoddess29@gmail.com 603-247-3196
  • 2. "Generation M2: Media in the Lives of 8- to 18- Year-Olds” http://www.kff.org/entmedia/mh012010pkg.cfm
  • 5. What is Web 2.0? • Web as platform (Face Your Manga) • Collective intelligence (YouTube) • Data driven (Online Summer Reading) • Everything is in beta (meebo) • Simple programming (Facebook) • Cross platform (Twitter) • Rich user experience (Club Penguin, Cartoon Network Game Creator)
  • 6. What is Social Software? ajax.phpmagazine.net/2006/02/great_collection_of_web_20_log.html
  • 7. Social Software Assumptions • Everything is meant to be shared (“public” is the default) • Everything is meant to be critiqued (commenting “ON” is the default) • Everything is meant to be remixed (Creative Commons licensing is the default)
  • 8. How do you feel about Social Networking sites? “Libraries cannot afford to ignore the social networking potential to attract new, younger and more technologically interested customers.” "It's where the patrons are so we need to be visible to them-marketing, information and building community online. Not all patrons have to walk through the door. We can make connections with and serve online those patrons who, for whatever reason, won't be physically in the library." “At this time we feel the drawbacks outweigh the benefits." “not sure--need more info"
  • 9. Why are Social Networks so popular? • It’s all about ME! • Customizable • Social • Developmental Assets
  • 10. Developmental Assets • Support • Empowerment • Boundaries & Expectations • Constructive Use of Time • Commitment to Learn • Positive Values • Social Competencies • Positive Identity The Search Institute. 40 Developmental Assets of Adolescents/Middle Childhood/Early Childhood. http://search-institute.org
  • 11. Teen Brain Development •Risk Takers •Consequences •Impulse
  • 12. Gamers • Risk-takers • Social • Competitive • Global • Technical Beck, John & Mitchell Wade. The Kids are Alright. Harvard Business School Press, 2007. http://www.nslg.net/gotgamebook/index.html
  • 13.
  • 16. Escalating Cyberbullying • Ignore it? • Restrict Communication • Restrict “Friending” • Google your child • Block Sender Warn Sender • Report to ISP • Report to School • Report to Police • Legal Action
  • 17. P E A C E F I R E http://www.peacefire.org
  • 18. Tips for Parents & Guardians • Begin a dialogue with your kids about safe Internet use and supervise their online activities • Consider rating, blocking, monitoring, and filtering applications for your computer • Make Internet use a family activity • Encourage your kids’ critical-thinking skills • Set reasonable rules for going online • Encourage your kids to tell you when they encounter problems online • If they come across lewd, obscene, or illegal material or if they are contacted by someone who attempts to engage them in sexual conversation, make a report to NCMEC’s CyberTipline at www.cybertipline.com or 1-800-843-5678 http://www.missingkids.com/missingkids/servlet/PageServlet?LanguageCountry=en_US&PageId=
  • 19. When Creating a Username, DO Use… • Something original and creative • A nickname • A character's name • A name that references a favorite band, animal, food, hobby...
  • 20. When Creating a Username, DON’T use • Your real first or last name  Your age  Your phone number  Your zip code or location  A suggestive name or word  Pornographic or obscene words  Derogatory terms
  • 21. Password Tips • Choose passwords that are: – At least 6 to 8 characters – Combinations of letters and numbers – Personally meaningful for easy remembering – Not obvious to the rest of the world – Former address is a good one to try! • Use a password generator for help • Write the password down and store in a safe place
  • 22. Web As Platform: Face Your Manga • Create a digital representation of yourself • Use in a variety of applications Face Your Manga http://www.faceyourmanga.com
  • 23. Face Your Manga: Uses • Contest: create a personal • Contest: create a celebrity, author, character… • Internet safety session Face Your Manga http://www.faceyourmanga.com
  • 24. Face Your Manga Face Your Manga http://www.faceyourmanga.com
  • 25. Collective Intelligence: YouTube • Home for archiving, rating, & commenting on video http://www.youtube.com/oceanking97
  • 26. Comments on Re: Cry of the Dolphins http://www.youtube.com/oceanking97
  • 27. Data Driven: Online Summer Reading • Online registration • Online book logs • Online book reviewing/rating MA 2008 Statewide Summer Reading Program: Wild Reads http://www.readsinMA.org
  • 29. Reads in MA MA 2009 Statewide Summer Reading Program: Go Green @ your library http://www.readsinMA.org
  • 30. Everything’s in Beta: MEEBO Meebo http://www.meebo.com
  • 31. Cross Platform: Twitter • Record what you are reading, viewing, doing, thinking • Connect with friends and colleagues to share information Twitter http://www.twitter.com
  • 32. Rich User Experience: Club Penguin • Avatar creation • Games • Chat Club Penguin http://www.clubpenguin.com/
  • 34. Game Design • Ben 10 Alien Force Game Creator – http://gamecreator.cartoonnetwork.com/
  • 35. Light Programming Facebook • Status Updates • Instant Messaging • Email • Social Networking • Affinity Groups • Applications – Games! “Facebook helps you connect and share with the people in your life.”
  • 37.
  • 38. Turning off Chat – Go Offline!
  • 39. Click HELP under account to find the Safety Center
  • 40. Select Teen to get tips for your teen
  • 41. On Safety for Teens page, scroll down & click “More information on reporting abuse”
  • 42. Note section on Cyberbullying…
  • 43. Facebook Etiquette • Create a friending policy for yourself • Use filters • It’s okay to not use Applications or block them • Reply within 24-48 hours if possible • Etiquette article: http://www.pcworld.com/article/169120/faceb ook_etiquette_10_rules_for_better_socializin g.html
  • 44. Click Friends, then Edit Friends… Then Create list and move individuals to appropriate category
  • 46. Contact Beth Gallaway 603-247-3196 informationgoddess29@gmail.com http://informationgoddess.info • Slides: Slideshare http://www.slideshare.net/ informationgoddess29 • Links: SocialSoftware http://www.delicious.com/ informationgoddess29/socialsoftware & • http://www.delicious.com/informatio ngoddess29/facebook

Editor's Notes

  1. Methods: Generation M2: Media in the Lives of 8- to 18-Year-Olds is the third in a series of large-scale, nationally representative surveys by the Foundation about young people’s media use.  The report is based on a survey conducted between October 2008 and May 2009 among a nationally representative sample of 2,002 3rd-12th grade students ages 8-18, including a self-selected subsample of 702 respondents who completed seven-day media use diaries, which were used to calculate multitasking proportions. Kaiser Family Foundation has conducted a study that found entertainment media use by children and teens has risen considerably when compared to usage five years ago. The study found that kids aged between 8 and18 years spend almost eight hours a day using entertainment media which is the same amount of time adults spent at work. The time recorded is 1 hour 17 minutes higher from time recorded in 2004. "Anything that children spend that much time doing is something that needs to be studied," warns Victoria Rideout who is the author of the study and a Kaiser official. She said that media usage cannot be branded well or bad however, from the view point of health the usage is high. The survey was conducted between October 2008 and May 2009 and included more than 2,000 American children aged between 8-18. Key findings of the report titled "Generation M2: Media in the Lives of 8- to 18-Year-Olds," are that more than half of the children use media while doing homework and female children spend more time on social networking sites, listening to music and reading. Boys on the other hand, spend more time playing video and computer games, or visiting YouTube. When the kids reach 11 their media usage goes up dramatically. Teens are found to spend about an hour and a half texting each day. About 70% of the children said that their families did not restrict the time on watching TV. Black and Hispanic youth were found to spend much more time with media than white youth. They spend 4½ hours more when compared to the white youth. As for TV, Black children spend nearly 6 hours and Hispanics just under 5½ hours while white youths spend 3½ hours a day. Showing the importance of diet and exercise, about one-fifth of U. S. teenagers was identified through tests of lipids in the blood for heart diseases. The Centers for Disease Control and Prevention published report which found that 43% of the obese children tested outside the recommended ranges. The results were on the basis of blood tests taken from 3,125 children ages 12-19 from 1999 to 2006.
  2. 4% of cell-owning teens ages 12-17 say they have sent sexually suggestive nude or nearly nude images of themselves to someone else via text messaging 15% of cell-owning teens ages 12-17 say they have received sexually suggestive nude or nearly nude images of someone they know via text messaging on their cell phone. Older teens are much more likely to send and receive these images; 8% of 17-year-olds with cell phones have sent a sexually provocative image by text and 30% have received a nude or nearly nude image on their phone. The teens who pay their own phone bills are more likely to send “sexts”: 17% of teens who pay for all of the costs associated with their cell phones send sexually suggestive images via text; just 3% of teens who do not pay for, or only pay for a portion of the cost of the cell phone send these images. Our focus groups revealed that there are three main scenarios for sexting: 1) exchange of images solely between two romantic partners; 2) exchanges between partners that are shared with others outside the relationship and 3) exchanges between people who are not yet in a relationship, but where at least one person hopes to be.
  3. Any website where you create a username, password and PROFILE Sites that allow you to contribute by uploading or posting your own content for rating review and remixing
  4. Predators With increasing numbers of teens admitting they are meeting Internet strangers in real life (between 12% and 24 of young teens, depending on the study), they will increasingly encounter sexual predators. Working closely with law enforcement and survivors of Internet sexual exploitation, Internet Super Heroes has developed an stranger-danger message in a non-threatening format. Using Green Goblin as the predator posing as a young teen boy to lure Spider-Girl into an offline meeting, the message is delivered loud and clear. Yet, it is as appropriate for preteens as it is for teens. The program isn’t designed to scare the children or teens. It is designed to make them more careful and help them understand how the bad guys trick even the smartest children into giving away important and personal information. It helps them understand why some kids agree to meet strangers offline, and how it is never safe to do that. If they insist on meeting their online friends in real life, it also helps them understand how to reduce the risks and get their parents and other trustworthy adults involved. Privacy Privacy has several parts. One is closely related to the stranger-danger message. Teaching children not to share personal information with people they meet online is much easier when the superhero model is applied. Super Heroes always strive to keep their identities secret. It’s the only way they can protect themselves and their loved ones. By using games where Spiderman, Spider-Girl and Hulk leave behind bits of information that could be used to trace their real identities, children are taught how items of seemingly innocent information, when combined, can be very dangerous to the superhero. By learning to protect the Super Heroes, they are learning to protect themselves and their friends as well. But this isn’t only about predator issues. It’s also about responsible commercial data collection practices. Using the expertise of Parry Aftab (Internet Super Heroes’ Executive Director, cyberspace privacy lawyer and The Privacy Lawyer columnist for Information Week Magazine, informationweek.com) the children and teens will be taught how to look for and read a privacy policy and how to find trustworthy Web site. They will learn about the children’s privacy laws that protect them against unscrupulous marketing tactics and sites that misuse their personal information. And the kids will understand the importance of privacy itself and keeping some things secret, even from their best friends. These include credit card information, debit card passwords and even their e-mail passwords. Everyone knows that Super Heroes don’t share their personal and secret information with anyone else, even their non-superhero best friends. Hopefully, after understanding why, neither will your children. Pornography One of the biggest problems parents complain about online is graphic pornographic images their children encounter in their e-mail boxes and online. The pornographers in an effort to increase their advertising revenue and online profile, have used popular kid Web site. names with common misspellings and other similar tricks to lure our kids to their sites accidentally. By understanding the tricks used by pornographers to push their content to everyone online, children and teens can avoid most pornography. And learning where and how to report misleading domain names and typosquatting will make a big difference too. Pop-Ups Now, by using spyware and adware, the pornographers are reaching out to our computers to personally deliver the messages using disgusting pop-ups and graphic sexual images even when our children aren’t surfing. By being made aware of spyware and adware installation schemes, and the pop-ups they deliver, children can use pop-up blocker programs and toolbars to prevent being exposed to countless and disgusting pop-ups.
  5. Talk to your childCaution them about responding "in kind." This is not a time for them to lash out or start a cyberwar themselves. See if they think they know the identity of the cyberbully or cyberbullies. See if this is related to an offline bullying situation, and deal with that quickly. And don't confuse the language most kids use online with cyberbullying. It may be shocking to us, but unless it is shocking to your child, it's not cyberbullying. Ignore itA one time, seemingly unthreatening act, like a prank or mild teasing should probably be ignored. (If it's a threat, you must report it.) At the same time, you may want to consider using some preventive measures: Restrict the people who can send you communicationsConsider restricting all incoming communications to pre-approved senders, such as those on your child's buddy list. (If the cyberbully is someone on their buddy list, though, this method won't help. In that case the cyberbully will have to be removed from the buddy list and/or blocked.) Restrict others from being able to add your child to their buddy listCyberbullies track when your child is online by using buddy lists, and similar tracking programs. It will let them know when one of their "buddies" is online, when they are inactive and, in some cases, where they are. This is like adding a tracking device to your child's online ankle, allowing their cyberbullies to find them more easily and target them more effectively. This feature is usually found in the privacy settings or parental controls of a communications program. Google your childMake sure that the cyberbully isn't posting attacks online. When you get an early warning of a cyberbullying campaign, it is essential that you keep an eye on  your child's screen name, nick names, full name, address, telephone and cell numbers and Web sites. You can also set up an "alert" on Google to notify you whenever anything about your child is posted online. To learn more about "Googling" yourself or your child, read "Google Yourself!" Block the senderSomeone who seems aggressive, or makes you uncomfortable and does not respond to verbal please or formal warnings should be blocked. This way, they will not be able to know when you are online or be able to contact you through instant messaging. Even if the communicates are not particularly aggressive or threatening, if they are annoying or, block the sender. (Most ISPs and instant messaging programs have a blocking feature to allow you to prevent the sender from getting through.) "Warn" the senderIf the cyberbully uses another screen name to avoid the block , otherwise manages to get through or around the block or communicates through others, "warn" them, or "notify" the ISP. (This is usually a button on the IM application.) This creates a record of the incident for later review, and if the person is warned enough, they can lose their ISP or instant messenger account. (Unfortunately, many cyberbullies use "warning wars" or "notify wars" to harass their victims, by making it appear the victim is really the cyberbully. This is a method of cyberbullying by proxy, getting the ISP to be an unwitting accomplice of the cyberbullying.) Report to ISPMost cyberbullying and harassment incidents violate the ISP's terms of service. These are typically called a "TOS violation" (for a "terms of service" violation, and can have serious consequences for the account holder. Many ISPs will close a cyberbully's account (which will also close their parents' household account in most cases.) You should report this to the sender's ISP, not yours. (For more information about how to make a report, read "Making a Report to Their ISP." If you use a monitoring software, like Spectorsoft, this is much easier.) If your child's account has been hacked or their password compromised, or if someone is posing as your child, you should make a formal report to your ISP as well. You can call them or send an e-mail to their security department (NOT their terms of service report line). But before changing your password, you should scan your computer for any hacking programs or spyware, such as a Trojan horse. If one is on your computer, the cyberbully may be able to access the new password. Most good anti-virus programs can find and remove a hacking program. All spyware applications can. We recommend SpyBot Search and Destroy (a freeware) or Ad-Aware (by Lavasoft, they have a free "lite" program). Report to SchoolMost cases of cyberbullying occur off school grounds and outside of school hours. In the United States , often the school has no legal authority to take action relating to an off-premises and off-hours activity, even if it has an impact on the welfare of their students. The laws are tricky, and vary jurisdiction by jurisdiction. So while you should notify the school (especially if your child suspects whom is behind the attacks), they may not be able to take disciplinary action. They can keep any eye on the situation in school, however. And since many cyberbullying incidents are combined with offline bullying incidents, your child may be safer because of the report. Also, while the school may have limited authority over disciplining the cyberbully, they can call the parents in and try and mediate the situation. They can also institute an educational and awareness program to help stop further cyberbullying by students, and to help educate parents about the problem. Report to PoliceSomeone who threatens you physically, who is posting details about your or your child's offline contact information or instigating a cyberbullying by proxy campaign should be reported to the police. (Although you should err on the side of caution and report anything that worries you.) Using a monitoring program, such as Spectorsoft, can facilitate the investigation and any eventual prosecution by collecting and preserving electronic evidence. Print-outs, while helpful in explaining the situation, are generally not admissible evidence.) If you feel like your child, you or someone you know is in danger, contact the police immediately and cut off contact with this person or user, staying offline if need be until you are otherwise instructed. Do not install any programs, or remove any programs or take other remedial action on your computer or communication device during this process. It may adversely affect the investigation and any eventual prosecution. Take Legal ActionMany cases of cyberbullying (like their adult cyber-harassment equivalent) are not criminal. They may come close to violating the law, but may not cross the line. Most of the time, the threat of closing their ISP or instant messaging account is enough to make things stop. But sometimes, either because the parents want to make an example of the cyberbully or because it isn't stopping, lawyers need to be brought in. It may also be the only way you can find out whom is behind the attacks. Think carefully before you decide to take this kind of action. Even if you win in the end, it may take you two or three years to get there and cost you tens of thousands of dollars. You may be angry enough to start it, but make sure that you have something more than anger to sustain the long months and years of litigation.  
  6. Another example
  7. Another example
  8. Record content consumption Poll collective brain Take notes Converse De-stress
  9. Click Chat, Select Options, Pick “Go Offline”