Social Networks, Digital Breadcrumbs & Privacy <br />GreatMystery14<br />www.facebook.com/sureshsood<br />soody<br />ssood...
Agenda<br />0.    Inappropriate Content and Contact  <br />1.	Online Social Networks 101, “FaceBook to Dogster”  <br />2.	...
5<br />Inappropriate Content<br />
6<br />Linguistic Inquiry & Word Count : “junk words” in content <br />http://www.liwc.net/liwcresearch07.php<br />Cogniti...
Lurking A Fact of Life Online <br />0.1<br />0.003<br />0<br />5<br />0.2<br />1<br />95<br />99.8<br />99<br />
http://namechk.com/<br />
Social Media <br />Blog<br />reflect, read, write and comment e.g. WordPress, LiveJournal, <br />Microblogging<br />brief ...
Social Networking Sites <br />Parse through friends activities forwards & reverse as well as own social gestures <br />All...
TV 3.0<br />Livestation<br />All your channels in one place<br />Surf and email while you watch<br />Instant, live chat wi...
World Map of Social Networkswww.incos.it<br />
Facebook is My Newspaper(Susie Wilkening, http://reachadvisors.typepad.com/<br />OneRiot.com: Search the realtime web<br />
16 million people in the UK accessed Internet via mobile phones in December 2009. <br />Total of 6.7 billion pages and 4.8...
Australia Leads Average Time Spent per Person on Social Media Sites in December 2009<br />
Facebook<br />Founded in 2004, primarily catering to students <br />Over 400M active members worldwide with 2011 predictio...
20<br />Inappropriate Contact with Strangers and Bullies<br />Public info:  	Name, Profile Picture, Current City, Gender, ...
Facebook Tips - Privacy<br />Friends Lists<br />Facebook Search & Google<br />Photo Tag Mishaps<br />Relationship Changes<...
TWITTER<br />Market leader in "micro-blogging" <br />Began in mid-2006 as "status message" service<br /> Ubiquity and ease...
Digital Breadcrumbs<br />
Social Engineering Attacks<br />Malicious software (malware) is installed into a computer<br />       fixed or mobile − to...
What to Do –Elements of Strategy  <br />
Caution!<br />“Children never put off till tomorrow what will keep them from going to bed tonight”<br />						(Anonymous)<...
Upcoming SlideShare
Loading in …5
×

Internet Safety

1,010 views
870 views

Published on

Cybersafety talk given to parents at William Clark College:
How can I be sure my child will be safe when using the Internet?
What are the new social networking sites?
How can I learn more about protecting my child? Internet Safety - Parent A wareness Evening
Come to an interactive workshop where these issues will be addressed to help you learn how to best protect your children when using the Internet. The evening will include a 30 minute demonstration session followed by Q&A. All are welcome to attend free of charge; tea/coffee will be available.
Facilitator: Suresh Sood (Researcher with the School of Marketing in the Faculty of Business, University of Technology Sydney)
Monday 22" , March 2010, 7 pm William Clarke College, Library Conference Room
Enquiries: Liz Nix Ph 8882 2100 (extension 182) efn@wcc.nsw.edu.au
l highly recommend this workshop to all College parents and encourage you to attend and invite others who may be interested: David Raphael

0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
1,010
On SlideShare
0
From Embeds
0
Number of Embeds
13
Actions
Shares
0
Downloads
17
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide
  • Social graph in the following order: you, your social network friends, friends-of-friends, your followers, and the overall community.Wall Street feed – simple way to navigate social network of friends social gestures and your –efficient, increased engagement , increases importance of attention info c.f. banking – remember fuss around news feedGoogle Open Social Attention Streams (already included in Plaxo Pulse) - MySpace Friends Updates -Netvibes Activities-LinkedIn Network UpdatesHigh social engagement vs traditional media (radio, tv, print, outdoor) with low engagement. This is about dialogue, interactivity, informality, people + technology &amp; niche NOT Tradigital for mass using push, automation &amp; technology only. Social Media Marketing practice centres around – networks, communities, blogs and microblogging. Traditional business functions can be socialised e.g. legal, supply chain, R&amp;D, HR…Social Strategy (Media) - through sharing; engaging; building relationships and influencingincrease our reach, influence and relevancecreate ambassadors to support and promote what we dopersonalise interactionsencourage and grow communities through a critical mass of active cultural and scientific participants maximise revenuechange our work models from one-to-one communication to many-to-many communicationmove from providing information to creating shared meaning with audiences
  • For participation on Amazon see: http://www.amazon.com/review/top-reviewers-classic
  • Also, think Mobile we will discuss UK stats shortly from December released over weekend. Social Media moving rapidly to be the gateway to web content Facebook has replaced her newspaper as the go-to place for relevant news in Susie’s life. It&apos;s not hard to imagine a near future where Facebook (and sites like it) also replace a lot of the ways we use atomized search.For people who are deeply immersed in social media, social networks are already a much heavier influence on personal choices--where to visit, what concert to attend--than traditional advertising. Which means that your organization&apos;s website--a brochure out in the wilderness of the Web--is only going to remain relevant and useful as a marketing piece if it is being referenced in the social context of your users&apos; lives. the next generation of Web users may find what they want by using their social network rather than a search algorithm. Social Media changes way we deal with web and in a sec we see mobile.
  • EducationParent participation (not lurking) in social networks Virus software to combat e.g. KoobfaceMonitoring inappropriate content Contact management (stranger danger ; gangster errand)Etiquette do not post anything embarrassing Treat social networks as public – zero privacy , zero confidentialityVerify information where relevant Use password creation rules Curb any addictive nature Never give out socially sensitive on profile , directly or via social updates Parents name onlineParents on holiday Photos of home or holiday homeBirthdays ??? Enter surveysTell stories
  • Internet Safety

    1. 1. Social Networks, Digital Breadcrumbs & Privacy <br />GreatMystery14<br />www.facebook.com/sureshsood<br />soody<br />ssood<br />Hero5!<br />twitter.com/soody<br />www.bravenewtalent.com/talent/suresh_sood<br />www.linkedin.com/in/sureshsood<br />Geektoid<br />Mangala<br />scuzzy55<br />suresh.sood@uts.edu.au<br />
    2. 2.
    3. 3.
    4. 4. Agenda<br />0. Inappropriate Content and Contact <br />1. Online Social Networks 101, “FaceBook to Dogster” <br />2. TV 3.0 - The Future of Social Networks<br />3. How should I organise my security settings?<br />Where does Twitter Fit?<br />Digital Breadcrumbs<br />6. Steps to Avoid Social Engineering Attacks <br />The Australian Government Resources for Safety on the Internet<br />Parents – What Should We Do? <br />
    5. 5. 5<br />Inappropriate Content<br />
    6. 6. 6<br />Linguistic Inquiry & Word Count : “junk words” in content <br />http://www.liwc.net/liwcresearch07.php<br />Cognitive complexity = zexcl + ztentat + znegate + zdiscrepzincl<br />Depression = zI + zphyscal + znegemo – zposemo<br />Liar = – zself – zother – zexcl + znegemo or <br />Honesty = zself + zother + zexcl - znegemo - zmotion<br />Female = zself – zsixltr +z other + znegate – zarticle – zpreps + zcertain + zsocial+ zpresent– zspace – zoccup + zhome – zmoney<br />Aging = zposemo – zI + zsixltr + zcogmech + zexcl + zfuture – zpast – ztime<br />Presidential = zsixltr – zwps – zunique – zpronoun – zself – zyou – zother –znegate+ zarticle + zprep<br />Slatcher, R.B., Chung, C.K., Pennebaker, J.W., & Stone, L.D. (2007), Winning words: Individual differences in linguistic style among U.S. presidential and vice presidential candidates, Journal of Research in Personality, 41, 63-75.<br />
    7. 7. Lurking A Fact of Life Online <br />0.1<br />0.003<br />0<br />5<br />0.2<br />1<br />95<br />99.8<br />99<br />
    8. 8. http://namechk.com/<br />
    9. 9. Social Media <br />Blog<br />reflect, read, write and comment e.g. WordPress, LiveJournal, <br />Microblogging<br />brief notes, messages, comments e.g. Twitter, Tumblr<br />Social Network<br />connect, communicate, and sharee.g. Facebook, Ning, MySpace, etc<br />Generate content <br />upload content to share with others, comment or tag or reuse the content e.g. YouTube, Vimeo, Flickr, Slideshare<br />
    10. 10. Social Networking Sites <br />Parse through friends activities forwards & reverse as well as own social gestures <br />Allow users to:<br />Create personal profiles inclusive of location information <br />Write status updates (postings to friends) c.f. blog entries<br />Friends specify updates they like <br />Post photographs, videos, and audio clips<br />Send and receive private messages <br />Link to the pages of friends<br />
    11. 11. TV 3.0<br />Livestation<br />All your channels in one place<br />Surf and email while you watch<br />Instant, live chat with others watching Livestation<br />Desktop alerts bring you breaking news and Livestation updates <br />Share with friends.<br />Boxee makes it easy for friends to share their favorite movies, TV Shows, and songs with each other, on Boxee or on social networks like Facebook and Twitter. <br />
    12. 12. World Map of Social Networkswww.incos.it<br />
    13. 13. Facebook is My Newspaper(Susie Wilkening, http://reachadvisors.typepad.com/<br />OneRiot.com: Search the realtime web<br />
    14. 14.
    15. 15. 16 million people in the UK accessed Internet via mobile phones in December 2009. <br />Total of 6.7 billion pages and 4.8 billion minutes online during the month. <br />Top 10 sites accounted for 70 per cent of both total pages viewed and total time spent online<br />
    16. 16. Australia Leads Average Time Spent per Person on Social Media Sites in December 2009<br />
    17. 17. Facebook<br />Founded in 2004, primarily catering to students <br />Over 400M active members worldwide with 2011 predictions for 1 billion users (Gartner) <br />Facebook has communities,users,applications & albums<br />Over 10 Billion photos in Oct 2008 and adds over 3Billion monthly<br />Australian 8.1 M users in October2009 had uploaded 80 million pictures and written 32 million "wall posts" and 45 million "status updates". (Nielsen Online)<br />Australians are spending 29% of all time browsing the internet on Facebook alone (Nielsen)<br />Applications run on Facebook platform<br />True names encouraged but not guaranteed<br />Privacy model is highly granular<br />present different information to different groups or individual users<br />Messaging includes mail, real-time chat, "wall" <br />Now used in private background checks <br />
    18. 18.
    19. 19.
    20. 20. 20<br />Inappropriate Contact with Strangers and Bullies<br />Public info: Name, Profile Picture, Current City, Gender, Networks,<br /> Friend List and Pages.<br />
    21. 21. Facebook Tips - Privacy<br />Friends Lists<br />Facebook Search & Google<br />Photo Tag Mishaps<br />Relationship Changes<br />Contact Info<br />Wall Postings<br />
    22. 22.
    23. 23. TWITTER<br />Market leader in "micro-blogging" <br />Began in mid-2006 as "status message" service<br /> Ubiquity and ease of updating, but limited space <br />Breaking news, real-time updates: USAir, Iran <br />Most multimedia handled by 3d party links <br />Simplified privacy model: updates public or private <br />Most Twitter content is public <br />Private messages kept until user deletes them<br />Direct messages are private; sender can delete <br />Short URLs used to serve malicious links and code<br />
    24. 24.
    25. 25.
    26. 26. Digital Breadcrumbs<br />
    27. 27. Social Engineering Attacks<br />Malicious software (malware) is installed into a computer<br /> fixed or mobile − to collect personal informationover time.<br /> Computers or mobile devices are hacked forpersonal data.<br />Phishing<br />criminals use deceptive e-mails to get users to divulge personal information, includes luring them to fake bank and credit-cards websites. <br />“Pharming”: using deceptive e-mail messages to redirect users from an authentic website to a fraudulent one, which replicates the original in appearance.<br />“SMiShing”: sending text messages (“SMS”) to cell phone users that trick them into going to a website operated by the thieves. Messages typically say that unless users go to the website and cancel, they will be charged for services they never actually ordered.<br />“Spear-phishing”: impersonating a company employee/employer via e- mail in order to steal colleagues’ passwords/usernames and gain access the company’s computer system. ID thieves misuse victims’ personal info. <br />
    28. 28.
    29. 29.
    30. 30. What to Do –Elements of Strategy <br />
    31. 31. Caution!<br />“Children never put off till tomorrow what will keep them from going to bed tonight”<br /> (Anonymous)<br />

    ×