Marti digital citizen presentation
Upcoming SlideShare
Loading in...5
×
 

Like this? Share it with your network

Share

Marti digital citizen presentation

on

  • 500 views

 

Statistics

Views

Total Views
500
Views on SlideShare
500
Embed Views
0

Actions

Likes
0
Downloads
7
Comments
0

0 Embeds 0

No embeds

Accessibility

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment
  • Cheerios story.
  • 4chan
  • Facebook users AFRE concerned but ignore it anyway
  • Empathy – carcissism social capital = addiction about the same as other adictions
  • The new Facebook Privacy setting have delayed the roll out of this open source project.Subscribe and stay tuned.
  • launch of Facebook Places, a location-based service that allows users to “check in” to a specific place or event and share that information with their friends. It also allows others to “tag” or check you in at a location, provided you are Facebook friends, and this has drawn fire from the ACLU and other privacy advocates.
  • SANTA FE USES RADIO FREQUENCY TRACKING BADGESPublished October 18, 2010 SANTA FE — Secondary students in the Santa Fe district are required to wear badges on campus that track their whereabouts using radio frequency identification technology.School officials issued the badges this fall to ensure student safety and achieve more accurate attendance reporting.Attendance rates haven’t been an issue in the district, but a reliable reporting system might allow Santa Fe to recover more state money from average daily attendance funding, district spokeswoman Patti Hanssard said. The monitoring system only tracks students on campus.…Since issuing the tracking badges in 2008, Spring has received a $194,000 increase in attendance funding, Hanssard said.
  • Social media will take your data and give other people access to it. Just assume that no matter how private you think it is, its going to find a way to someone else. there is no going back to the “simpler times” before Facebook and social networking. Every social, cultural, economic and political aspect of our lives, is affected and some would say dominated by digital connectivity.
  • Gmail looks at content to serve up adsWho tracks it? Advertisers
  • Not only tracks your visits but predicts where you might end up surfing – sophisticated algorithms.
  • Why aren’t we more upset? When we don't like it or don't want it, it's an invasion of privacy. When we like it or want it, it's the price we pay. We will readily forgo our privacy in exchange for convenient and useful services, particularly if they’re free. That’s a trade-off you make all the time on the Internet. Even if people were more conscious of how this information might be exploited, I doubt most would change their behavior. In a nutshell, ask anyone if they care about their privacy and almost 100% of them will say, yes, absolutely. But then ask them about what they do both online and offline on a daily basis and most of them will reveal a very different set of preferences or values when it comes to what “protecting privacy” would mean in practice. That’s because privacy is, as Harper notes, a highly subjective condition, and that’s true even in a micro sense. We’re constantly making privacy trade-offs on the fly. Every time we enter a contest, sign up for a shopper discount card, enter absurd amounts of personal info on social networking sites, and so on, we are making privacy trade-offs. Sometimes we think them through carefully; other times we don’t. But most of the time people will trade away their supposed “privacy rights” in for even the most trivial thing.The fact is that privacy is already really, really dead. Howard Lindzonnailed it the other day when he said “Equifax, Transunion, Capital One, American Express and their cousins raped our privacy,” Everything we do, everything we buy, everywhere we go is tracked and sitting in a database somewhere. Our location via our phone, or our car GPS. Our credit card transactions. Everything. Honestly, a picture of you taking a bong hit in college is mice nuts compared to the mountain of data that is gathered and exploited about every single one of us every single day. You just don’t really see that other stuff because those companies don’t like to talk about the data their gathering.
  • Blippy is a service that lets users publish everything they buy with their credit cards.Crazy right? Who’d want to do that? Well, apparently a lot do. The company has let in 2,500 people so far. Those 2,500 people are publishing $200,000 worth of purchases a day to their friends. It’s less than a month old and they’ve tracked $3.8 million in transactions already, with an average transaction size of $46.And more than 10,000 people are on the waiting list to get an account and gladly share their consumption behavior with the world.
  • Do you like somebody and want to know when they get dumped or have dumped the person you despise for being with the person you’d rather be holding or held by? The whole point of stalking is that it’s fairly anonymous and most people who have or develop that tendency don’t always tell their closest friends about it.
  • Some viewers of Gilligan’s Island apparently took the show seriously in the 1960s. The U.S. Coast Guard received several telegrams from concerned citizens asking why they didn’t rescue the Minnow’s crew.This has been an excellent week. I have received four or five emails from London and Africa announcing that I have been selected to receive, from each of them, sums in eXcess of ten million dollars The quite remarkable fact seems to be that one fellow’s plane crash, another’s unexpected demise—apparently run over by a herd of elephants— a third’s cruel wife, have all resulted in me being just the right person on the planet to receive millions of dollars which was left in their estates. Not only that: Several lotteries have paid off this week as well, and, just like the poor African ministers who want to share their millions with me, the lottery companies are happy to send money as well. It seems all I have to do is let any one of these secret correspondents know a few details about my bank account and social security number and my life worries will be over.
  • Starting next week, Verizon will double the early-termination fee for smartphones......The phone is designed in such a way that you can almost never avoid getting $1.99 charge on the bill. Around the OK button on a typical flip phone are the up, down, left, right arrows. If you open the flip and accidentally press the up arrow key, you see that the phone starts to connect to the web. So you hit END right away. Well, too late. You will be charged $1.99 for that 0.02 kilobytes of data......Every month, the 87 million customers will accidentally hit that key a few times a month! That’s over $300 million per month in data revenue off a simple mistake!..
  • Web criminals are getting much more personal in their attacks, using social networking sites and other databases to make their story lines much more believable.Bryan Rutberg's daughter was among the first to notice something odd about her dad's Facebook page. At about 8 p.m. on Jan. 21, she ran into his bedroom and asked why he'd changed his status to: “BRYAN IS IN URGENT NEED OF HELP!!!“In Rutberg's case, criminals managed to steal his Facebook login password, steal his Facebook identity, and change his page to make it appear he was in trouble. Next, the criminals sent e-mails to dozens of friends, begging them for help.
  • Don’t do any banking unless you know it a secure location. How? Look for “https” (not just http) in the URL and the small padlock icon in the lower right hand corner of your browser.

Marti digital citizen presentation Presentation Transcript

  • 1. Raising Digital CitizensMARTI 2011
  • 2.
  • 3.
  • 4.
  • 5.
  • 6. http://social-media-and-society.wikispaces.com/
  • 7. A 2008 study sponsored by the MacArthur Foundation found that online time is key part of the social development process of teen, and that
    parents do no understand the way youth interact online.
  • 8. UCLA study citing that71% of 12-17 have been cyber bullied in the last year. Only 1 out of 10 reported it to parents or adults.WHY??
  • 9. 46% fearedrestrictions of their online activities from their parents
  • 10. Privacy, Push and ParentingA Digital Compass for the 21st Century
  • 11. Generation Z
    Generation M
    Generation Q
    Generation Nymity
  • 12. Sniffing Their Trails: Two Camps
  • 13.
  • 14.
  • 15.
  • 16. The Dis-inhibition Effect: Trolls
  • 17. THE EROSIONOF PRIVACY
  • 18. “I’m Connected”
    “There is a tendency to be impulsive and not to always look at possible consequences, plus the sense of invincibility that masks vulnerability beneath” Elaine Leader
  • 19. The Social Generation
  • 20. A downside: Is it a potential source of addiction and neurosis?
  • 21. “The reality is that nothing on Facebook is really confidential. Facebook is founded on a radical social premise -- that an inevitable enveloping transparency will overtake modern life."
  • 22. The Machine is US/ing Us
    http://www.youtube.com/watch?v=6gmP4nk0EOE
  • 23. Take the Quizhttp://www.aclu.org/privacyquiz/
  • 24. The Importance of Critical Thinking Skills“Missing” as Facilitator of Healthy Skepticism.
    Youth as actively constructing their social and cultural worlds, not as innocent victims or passive recipients of media messages
  • 25. danaboyd - Researcher at Microsoft Research New England and a Fellow at the Harvard Berkman Center for Internet and Society.
    Boyd’s Law:
    “Adding more users to a social network (site) increases the provability that it will put you in a awkward circumstance.”
  • 26. Facebook: The Entire Web Will Be SocialBy Liz Gannes Apr. 21, 2010
    Social plugins are little widgets that bring Facebook to the rest of the web. They offer “instant personalization”
    Creates a persistent relationship with you around that content. Sites give Facebook semantic information around the thing you liked — for instance, the title, type, genre and city for a band you like on Pandora.
    http://www.pandora.com/#/stations/create/
  • 27. Privacy ParadoxAn Oxymoron
    YoungpeoplewillfreelygiveuppersonalinformationtojoinsocialnetworksontheInternet.
    Afterwards,theyaresurprisedwhentheirparentsreadtheirjournals.
    "There'sabigdifferencebetweenpubliclyavailabledataandpublicizeddata.”
    Dr.DanaBoyd,co-authoranewlypublishedbook: HangingOut,MessingAround,andGeekingOut:KidsLivingandLearningwithNewMedia.
    This book is available FREE – See next slide.
  • 28. “We believe that current youth adoption of digital media production and ‘social media’ is happening in a unique historical moment, tied to longer-term and systemic changes in sociability and culture.”This Path finding Book is Available Free Here!!
    http://mitpress.mit.edu/books/full_pdfs/hanging_out.pdf
  • 29. Where and how you give up your privacy(anyone can badmouth you with the world and you may be helpless to stop it)
    Messaging and online communication
    Photo and video sharing sites
    Giving reviews and opinions
    Social bookmarking and tagging
    Communities and groups
    Virtual worlds and gaming
    Collaboration and sharing
  • 30. Networked publics differ from traditional teen publics (such as the mall or the school) in some important ways. Unlike unmediated publics, networked publics are characterized by their persistence, searchability, replicability, and invisible audiences.
  • 31.
  • 32. A Social Media Collaborative Work in Progress
    Proceed immediately to:
    http://www.reclaimprivacy.org/
  • 33. A Guide for Classroom Use
    http://www.scribd.com/doc/39495302/The-Very-Unofficial-Facebook-Privacy-Manual
  • 34. YOU ARE WHERE YOU'VE BEENLocation Technologies' Deep Privacy Impact
  • 35. George Orwell’s Vision?Monitoring of Animal-Embedded Chips
  • 36. RFID Chips in Children School ID Cards
    “To help protect our children, smart photo ID cards can contain vital information in case of a medical emergency or if the child goes missing.”
  • 37.
  • 38. http://youropenbook.org/
  • 39. Software Snooping
  • 40. http://www.privacyrights.org/Online-Privacy-and-Technology
  • 41. Web Surfing History
    Very sophisticated predictive algorithms - Feedback loops
  • 42.
  • 43. “Do Not Track” Legislation
    “But there’s good news. From what I have been reading it seems that even if this legislation passes most people won’t go through the trouble of adding themselves to the list. Why is this you might ask? Because most Americans are not that concerned about being tracked on the Internet. So, all in all this legislation is not going to affect online marketers and SEOs in any significant way.. ”
  • 44.
  • 45. Facebook shuts down 'Breakup Notifier' despite stalking app's surge in popularity
  • 46.
  • 47. Browse in the “Privacy Mode”
  • 48. http://www.privacychoice.org/trackerblock/ie9
  • 49. https://chrome.google.com/webstore/detail/hhnjdplhmcnkiecampfdgfjilccfpfoe
  • 50. Posting your Whereabouts on Facebook
    www.pleaserobme.com
  • 51. http://goanimate.com/movie/0L2gKHEHiG8U/1
  • 52.
  • 53. Best 90 Free Windows Programs to Protect You and Your Computer
    http://www.makeuseof.com/pages/best-windows-software
  • 54. Don’t Launch Cell Phone Games and Programs that are “Pushed” to you
  • 55. Just how gullible are we?
  • 56. Cell phone data charges
    Ring tones
    Vanity fraud
    Meet My Children - Sean, Lindsay, Ryan. Each of them was scammed!
  • 57. “It can’t happen to me!”
  • 58. Without protection, its just a craps game.
    Really?
    What are the odds?
  • 59. “You stand a better chance at any given time of loosing your personally identifiable information than you do of just about any other form of nasty thing than can happen to a person over their lifetime.”The National Safety Council
    1 in 146,107,962.00 could potentially win the power ball lottery grand prize1 in 3,563,608.83 could potentially win the 200,000 dollar prize in the power ball1 in 3000 will be killed by lighting in any given year
    1 in 1,313 chance of being killed by a doctor
    1 in 314 chance of being killed by a firearm
    1 in 84 chance of being killed in a car crash over your lifetime1 in 3 has had their personally identifiable information lost this year!!
  • 60. A new, targeted social media version of a very old scam -- the “Nigerian,” or “419,” ploy
  • 61. WIRE ME MONEY !FACEBOOK HACK
  • 62.
  • 63. http://www.youtube.com/watch?v=0zvPEfksbyQ
    Punked!
    Lots of tools on the net for people who may want to take advantage of you.
  • 64. Knowledge is the key.
    Click on this link and sign up for the free newsletter.
    http://www.scambusters.org/
  • 65. When in doubt about a potential scam check the Internet Crime Complaint Centerhttp://www.ic3.gov/about/default.aspx
  • 66. A word or two about passwordsand…. hacking Facebook(the following presentation is a bit scary, but you can protect yourself with the steps that follow)http://www.youtube.com/watch?v=V_kvQC5DH34&feature=related
    • No birthdates or social security numbers
    • 67. No mother’s maiden name
    • 68. No universal password
    • 69. Yes to long passwords (over eight characters)
    • 70. Yes to random patterns – first letter of each word in your favorite song with your favorite number.
    • 71. Yes to changing it frequently
  • http://www.passpack.com/en/home/
  • 72. http://www.onguardonline.gov/games/overview.aspx
  • 73. Who are the bad guys?
    Small time crooks
  • 74. http://www.youtube.com/watch?v=HwtLZV010-M
    Trans- national crime gangs.  Russian "Mafia," Colombian and Mexican drug cartels, Asian Triads, Japanese Yakuza, Nigerian confidence rings, Hell's Angels, rogue factions of the St. Regis Mohawk tribe and the surviving, leaner and meaner Cosa Nostra
  • 75. Phishing
    Beware of the push!!
    Why do people fall for it ???
  • 76. Greed…..
  • 77.
  • 78. Greed = Scam…..
  • 79. Fear….
  • 80. Fear = Scam
    MailFrontier recently claimed that over 40% of recipients fell for the recent Citibank Email Phishing Scam.
  • 81. Curiosity…..
  • 82. Curiosity = Scam
  • 83. Temptation…..Grooming
    Ref. Number:EGOGHS255125600419   Batch Number: 14/ 01259/ IPD   Ticket Number:113-2471-752-209   Serial Number: 5063-11   Attention   We are pleased to inform you of the result of the Winners   in our UNIVERSAL STAKES Lottery Program held on the 20th   JULY, 2004.Your e-mail address attached to ticket number   27522465896-6453 with serial number 3772-554 drew lucky   numbers 7-14-18-31-45 which consequently won in the 2ND   category, you have therefore been approved for a lump sum   pay out of USD$1,500,000 ( One Million Five Hundred   Dollars) Only .CONGRATULATIONS!
  • 84. SCaREWARE
    Pretends to detect a virus and offers
    to help with inexpensive debugging
    software (usually around $50) – then..
    You give your credit card # for the software fix!
    http://www.youtube.com/watch?v=m_bZiEMkd5Y
  • 85. Hidden terms..Recurring Billing..Shipping & handling
  • 86. Texting for Dollars
    Text message from your bank or credit card company to call right away and verify account information!
    OR
    You’ve won a free gift from a reputable vendor like Sears or Macy’s
  • 87. Bogus Love“Wire me some money for an airline ticket so that I can be with you forever.”
    http://www.youtube.com/watch?v=NyC0EyyuSlc&feature=player_embedded#!
    1) Fake photos: You may be virtual dating with somebody else.
    2) Hidden costs: Sign-up could be free, but everything else requires you to pay extra fees.
    3) Milking your Bank Account: The guy/girl is in distress and urgently need money, e.g. accidents, trapped at airport, hospitalized, etc.
  • 88. “Make ME your favorite charity…please :( ”http://www.youtube.com/watch?v=FyzfdTVvV5k
    Their pitch: Speed up relief efforts – wire and send personal info such as social security and checking account numbers.
  • 89. Log on here:The hot-spot Hot seat“Coming to a location near you.”
    http://telkomhell.com/wi-fi-hotspot-security.html