Privacy Presentation

784 views
716 views

Published on

Social Media Presentation regarding Privacy On Social Networks

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
784
On SlideShare
0
From Embeds
0
Number of Embeds
386
Actions
Shares
0
Downloads
3
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Privacy Presentation

  1. 1. Social Media Privacy~Your Responsibilities<br />Introduction<br />There are virtually thousand of social media platforms that users can actively engage in and participate online. By doing so they are essentially trusting that platform with personal information about themselves. In order to be successful in maintaining the integrity of their personal information, they must be responsible users of the services.<br />Several studies conducted conclude that:<br />1) Most users are unaware of how their info is used (85%)<br />2) Most users don’t know how to protect their online info<br />3) Most users trust that their privacy is maintained<br />4) Most users access more than one social media platform<br />Awad and Krishnan 2008, Gross and Acquisti 2005, White 2010, PEW Trust Report 2000, Krishnamurthy and Willis 2008)<br />
  2. 2. Social Media Privacy Settings~Harris Poll<br />Taken from http://www.marketingcharts.com/direct/younger-see-more-socnet-.....<br />…..benefit-15761/harris-social-media-privacy-settings-jan11gif/<br />
  3. 3. Steps in Safeguarding Your Privacy<br />Anti-Virus Software 2) Beware Of Phishing<br />Setup Safeguards 4) Don’t Chat With Strangers<br />Wipe Clean 6) Clear Private Data<br />7) Log Off<br />Facebook Privacy Settings~4 Simple Steps<br />On the Facebook homepage click Account (pull-down at top right)<br /> Select Privacy Settings (a menu choice)<br /> Select Customize Settings (click link)<br /> Choose one of the following: <br /> a) Everyone<br /> b) Friends of Friends<br /> c) Friends Only<br />
  4. 4. 26%<br />23%<br />FB users don’t know <br />about FB privacy<br />controls or care <br />how to use them<br />Parents posted<br />photos & info<br />about their kids<br />7%<br />5%<br />Users access 3rd party<br />applications while<br />on Facebook<br />Have listed their<br />full addresses<br />
  5. 5. Third party Application Programming Interfaces (API’s)<br />“HMM, TO GET SUPERPOKE, I HAVE TO INSTALL “SUPERPOKE EXTREME”<br />“OH COOL, SOMEONE POKED ME”<br />“TO INSTALL SUPERPOKE EXTREME, YOU MUST ALLOW ACCESS TO SOME OF YOUR INFO…”<br />“WHAT THE??? DISPLAY ALL INTERNET ACTIVITY, PUBLISH ALL MY PASSWORDS, SHOW ALL INTERNET BANKING, DISPLAY ALL MEDICAL RECORDS AND LIST MY MEDICATIONS?”<br />“DAMN, I’D REALLY LIKE TO SEE THAT POKE!”<br />“THIS IS PRIVACY OUTRAGE!!”<br />“OK, INSTALL SUPERPOKE EXTREME”<br />CLICK<br />
  6. 6. Third party Application Programming Interfaces (API’s)<br />An application programming interface (API) is a particular set of rules and specifications that a software program can follow to access and make use of the services and resources provided by another particular software program that implements that API. It serves as an interface between different software programs and facilitates their interaction, similar to the way the user interface facilitates interaction between humans and computers. (http://en.wikipedia.org/wiki/API/ accessed 4/11/11)<br />Popular Examples Include:<br />Java, DirectX, Carbon & Cocoa for Macintosh, GroupTweet, Farmville, Like/ Dislike, StumbleUpon, Ghacks, Voyage<br />
  7. 7. Third party Application Programming Interfaces (API’s)<br />Main Idea:<br />Third party apps and services can improve the core service significantly. Users do need to make sure on the other hand that they check the permissions and authorizations regularly, to block apps and services that they no longer use. This reduces the risk of information theft, account tampering and of other malicious activities significantly<br />WARNING DISCLAIMER!!!<br />Third party services can only access your data only if it is authorized by the user. There exists dangers regardless if maximum security efforts are exercised. Once access has been granted developers could sell their product to another company or their service could be hacked or high-jacked and there is the possibility that you authorize malicious services or tools unknowingly.<br />
  8. 8. Social Media Privacy~Your Responsibilities<br />A BRIEF STATMENT<br />Using social media is a choice, and like with any choice come benefits and drawbacks. Users can greatly reduce their drawbacks by being conscientious and responsible users when using social media. Simple immediate steps can be the difference between being hacked or even hacked to pieces……<br />(just kidding)<br /><ul><li>Research applications before adding them to existing social media
  9. 9. Check the privacy settings on ALL social media being used
  10. 10. Never give out private information unless you trust the source</li></ul>Remember: The only tried and true solution to social network privacy and security issues is to limit your presence altogether. Don't post anything you wouldn't mind telling a complete stranger, because in reality that's the potential for access. - Brendan Collins<br />
  11. 11. Questions<br />
  12. 12. References<br />http://www.fastcompany.com/articles/2008/10/social-networking-security.html?page=0%2C1<br />http://thetechjournal.com/internet/social-community/people-use-facebook-44-and-twitter-29-for-social-sharing.xhtml<br />http://en.wikipedia.org/wiki/API<br />http://en.wikipedia.org/wiki/Facebook_Platform<br />http://www.marketingcharts.com/direct/younger-see-more-socnet-benefit-15761/harris-social-media-privacy-settings-jan11gif/<br />http://socialmediagraphics.posterous.com/internet-privacy<br />http://www.adrants.com/2010/05/data-advertising-privacy-key.php<br />http://www.squidoo.com/howtousefacebook<br />http://www.technewsworld.com/story/69158.html<br />

×