1. The High Costof SocialNetworks Mark Rogers Assistant Professor CIS/ELT John A Logan
2. What are ―Social Networks‖ A website offering people ways to communicate via the Internet, whether through their computer or mobile phone. These sites allow people to easily and simply create their own online profile and maintain a network of contacts or friends.
3. Some issues social networking sitespresent: Anonymity- can provide a forum for free expression. Lack of physical interaction sometimes gives people a false sense of security. Easy to forget who could see your personal information. Easy to put up a false persona.
4. Which Social Networks do peopleuse Most? Facebook – 122,220,617 Monthly Visits Myspace – 55,559,585 Monthly Visits Twitter – 23,579,044 Monthly Visits Linkedin – 11,228,746 Visits Classmates – 14,649,224
5. Some issues that have recently beenin the news? Teen faces charges for Facebook comments Joshua A. Walker, 18, is accused of posting threatening messages on the social networking site. Walker is charged with two counts of harassment through electronic communication, Jones said, one a misdemeanor and the other a felony charge. He was arrested and taken to Franklin County Jail.
6. How to lose your new job in 140characters or less, seriously. Person gets a job offer from Cisco Person then posts less than enthused opinion about the Cisco job on Twitter (actually naming Cisco as his new employer) Cisco employee on Twitter spots the post and promptly responds. Person hides his Twitter from public view but it is to late. Cisco pulls job offer.
7. University of Kentucky player losesscholarship because of Facebook. An University of KY softball player had her 4 year scholarship revoked (she was in her first year), because of pictures she posted on Facebook. -She sued the school and lost.
8. Some tips to keep you safe whileusing Social Networks:
9. Limit the amount of personalinformation you post Do not post information that would make you vulnerable, such as your address or information about your schedule or routine. If your friends post information about you, make sure the combined information is not more than you would be comfortable with a stranger knowing. Also be aware of other peoples’ personal information, including photos, when making your own posts.
10. Remember that the Internet is apublic resource Only post information you are comfortable with anyone seeing. By anyone I mean your Mother. This includes information and photos in your profile and in blogs and other forums. Also, keep in mind, once you post information online, you cant retract it. Even if you remove the information from a site, saved or cached versions may still exist on other peoples’ machines
11. Guidelines for Publishing InformationOnline View the internet as a novel, not a diary Be careful what you advertise Realize that you cant take it back
12. View the Internet as a novel, not adiary Make sure you are comfortable with anyone seeing the information you put online. Expect that people you have never met will find your page; even if you are keeping an online journal or blog, write it with the expectation that it is available for public consumption.
13. Be careful what you advertise In the past, it was difficult to find information about people other than their phone numbers or address. Now, an increasing amount of personal information is available online, especially because people are creating personal web pages with information about themselves. When deciding how much information to reveal, realize that you are broadcasting it to the entire world.
14. Realize that you cant take it back Once you publish something online, it is available to other people through search engines. You can change or remove information after something has been published, but it is possible that someone has already seen the original version. Even if you try to remove the post from the internet, someone may have saved a copy of the page or used excerpts from another source.
15. Realize that you cant take it back(2) Some search engines "cache" copies of web pages so that they open faster; these cached copies may be available after a web page has been deleted or altered. Some web browsers may also maintain a cache of the web pages a user has visited, so the original version may be stored in a temporary file on the users computer. Think about these implications before publishing information—once something is out there, you cant guarantee that you can completely remove it.
16. Be wary of strangers The Internet makes it easy for people to misrepresent their identities and motives. Consider limiting the people who are allowed to contact you on these sites. If you interact with people you do not know, be cautious about the amount of information you reveal. You HAVE to protect yourself.
17. Evaluate your settings Take advantage of a sites privacy settings. The default settings for some sites may allow anyone to see your profile. You can customize your settings to restrict access to only certain people. However, there is a risk that even this private information could be exposed, so dont post anything that you wouldnt want the public to see. Also, be cautious when deciding which applications to enable, and check your settings to see what information the applications will be able to access.
18. Use strong passwords Protect your account with passwords that cannot easily be guessed. If your password is compromised, someone else may be able to access your account and pretend to be you. Think about this…save yourself from this potential nightmare.
19. Choosing and Protecting Passwords Why do you need a password? How do you choose a good password? How can you protect your password?
20. Passwords are a common form ofauthentication and are often the only barrierbetween a user and your personalinformation. There are several programsattackers can use to help guess or "crack"passwords, but by choosing good passwordsand keeping them confidential, you canmake it more difficult for an unauthorizedperson to access your information.
21. Check privacy policies Some sites may share information such as email addresses or user preferences with other companies. This may lead to an increase in spam. Also, try to locate the policy for handling referrals to make sure that you do not unintentionally sign your friends up for spam. Some sites will continue to send email messages to anyone you refer until they join.
22. What are the differences between some ofthe tools used for real-time communication? Instant messaging (IM) Chat rooms Bots
23. Use and maintain anti-virussoftware Anti-virus software recognizes most known viruses and protects your computer against them, so you may be able to detect and remove the virus before it can do any damage. Because attackers are continually writing new viruses, it is important to keep your definitions up to date.
24. Some Good Things Social NetworkSites Have Done Social networking sites such as MySpace and Facebook have made communication much easier. Friends’ and family now have a quicker, cheaper way of keeping in touch, making important relationships easier to maintain.