Webinar impact of social networking on ece community


Published on

Social media and other broader-focused web activities have become integral to many in the ECE community. How do you separate your workplace from your personal on-line activities? What are the risks that all social network users face? Is there a positive side to social media? How can you help to protect children and young adults? This session will explore these areas and provide guidelines to follow so you and the children you support can be safe out there.

Published in: Technology
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Webinar impact of social networking on ece community

  1. 1. Who are your friends really?
  2. 2.  Is there a positive side to social media? Who is reaching out to market to kids and teens? What are the risks that all social network users face? How do you separate your workplace from your personal on-line activities? How can you help to protect children and young adults?
  3. 3. Is there apositive side tosocial media? (Yes)
  4. 4.  Services like these do add value to our lives • Facebook • Foursquare • MySpace • Yelp • Twitter • Google Buzz • Blogging • YouTube • LinkedIn • Flickr • Tumblr
  5. 5. http://fanpagelist.com
  6. 6.  Vkontakte Social network service in Russia, Ukraine, Belarus, and Kazakhstan. Has features like YouTube, Pandora, and MySpace all rolled into one, with an interface highly reminiscent of Facebook Orkut In Brazil and India, Googles Orkut ranks as the most visited social networking destination out-pacing Facebook
  7. 7.  Happy Farm China and Taiwans Farmville, 23 million daily active users QQ Popular free IM program in Mainland China, number of simultaneous online QQ accounts exceeds 100 million
  8. 8.  Randall Munroe of the webcomic XKCD 2007 version http://xkcd.com/256 2010 version http://xkcd.com/802 http://xkcd.com/802_large
  9. 9. Who is reachingout to market tokids and teens?
  10. 10.  hi5 delivers a fun, expressive, and interactive entertainment experience to millions of users around the world. Available in over 50 languages, the site features localized games, virtual goods Uses hi5 Coins, a global virtual currency supporting over 60 payment methods and 30 currencies worldwide. http://www.hi5networks.com/
  11. 11.  SocioPath Launch Wraps Up at GDC Online 2010 (Oct 12, 2010) Presentation to social media game developers and publishers SocioPath is the "Anti-Social Networking Platform for Social Games" See Secrets Revealed: Exploring the Next Generation Online Gaming Platform
  12. 12.  Nobody knows the youth market better Connects with millions of young consumers online through highly trafficked websites and premium original web programming. Broadcasts Gossip Girl, Vampire Diaries, Sisterhood of the Traveling Pants, and Private In June 2010 Alloy Digital Network had 16.9 million unique visitors http://www.alloydigital.com/ http://www.alloytv.com/index.vm
  13. 13.  The worlds largest online ad sales rep firm. We exclusively represent over 300 leading web publishers and offer integrated media and promotional programs to Fortune 500 brand advertisers GN Kids Representing many of industry’s well known, online brands for reaching boys and girls ages 3-14, incld Disney Channel, Nick.com, Cartoon Network and Yahoo! Kids
  14. 14.  Summer Recreation Drives Millions to Gaming and Teens Sites (July 28, 2010) Social Networking Ranks as Fastest-Growing Mobile Content Category (June 2, 2010) Internet Users Age 6-14 in Brazil Spend 60 Percent of their Online Time on Entertainment and Communication Sites (June 30, 2010) 92% of U.S. 2-year-olds have Online Record (Oct 2010)
  15. 15. What are the risks that allsocial network users face?(and there are many)
  16. 16.  Twitter Phishing Attack Spreading via Direct Message (Feb 20, 2010) Facebook Accounts Hacked; 1.5 Million Login IDs For Sale? (April 23, 2010) Google Asking Buzz Users to Confirm Contacts (April 6, 2010) Foursquares privacy loopholes (March 25, 2010)
  17. 17.  Koobface (Facebook anagram) is a worm targeting Windows users of social networking sites like Facebook, MySpace, and Twitter Koobface attempts to gather sensitive information from the victims such as credit card numbers Let’s watch ... http://www.youtube.com/watch?v=q7xzsHLHSfc
  18. 18.  “Dont be surprised if a criminal compromises your or one of your colleagues personal social networking accounts to retrieve the E-mail addresses of some of your friends, and then uses that information to spoof an E-mail to you or your colleague at work. ” Steven R. Chabinsky Deputy Assistant Director, Cyber Division Federal Bureau of Investigation in speech March 23, 2010
  19. 19.  My pet peeve Do you post on Twitter or Facebook where you are ... or plan to go Foursquare’s business model Facebooks "Places" Geo-tagging Service raising serious privacy concerns; Could show strangers where you are ... and your Kids Keep it quiet and post later or turn off services like Facebook Places
  20. 20. What about the separation ofworkplace and personal on-line activities?
  21. 21.  Password Security – dont share between work accounts and Social Media sites Web Publishing – if you blog, have both a work blog and personal blog Computer Use – do you keep the churches checkbook on your work machine, do you use a work email to send out mass mailings for "non-official" use Relationships with vendors – dont use for personal gain
  22. 22.  Student-Teacher-Coaches Relations On-line ◦ Should you "friend" students on Facebook ◦ Use online classrooms on sites such as Blackboard or forums within a school district’s website rather than public SM sites ◦ Follow policy from Administration or School Board ◦ Create Friend Lists, then customize privacy levels for different information and content you include on your Profile. See Back to School: Tips for Teachers on Facebook (Sept 2009)
  23. 23. How can youhelp to protect children andyoung adults?
  24. 24.  Free ebook for Online Teens (Sept 2010) Own Your Space - Keep Yourself and Your Stuff Safe Online is written for computer and Internet savvy "tweens" and teens and their parents or educators 250 PAGES To download either the entire book or individual chapters, go here: http://goo.gl/hW5u
  25. 25. Chapter List for Own Your SpaceChapter 01 - Protect Your Turf Chapter 09 - Browsers Bite BackChapter 02 - Know Your Villains Chapter 10 - Private Blogs and Public SpacesChapter 03 - Nasty Ware Chapter 11 - Going SocialChapter 04 - Hackers and Crackers Chapter 12 - Friends, Creeps, and PiratesChapter 05 - Taking SPAM Off the Chapter 13 - Any Port in a Storm MenuChapter 06 - Cyberbullies Chapter 14 - Look Pa, No StringsChapter 07 - Phishing for Dollars Chapter 15 - Getting HelpChapter 08 - Safe Cyber Shopping Chapter 16 - Tweaks
  26. 26.  8 tips for Explaining to Your Children How To Protect Themselves on Internet (Aug 2010) "you can’t protect them against all Internet dangers, but you can certainly teach them how to protect themselves." Beware These Social Networking Pitfalls For Kids (Sept 2010) "Quick: Whats the legal age required for someone to create a Facebook account?"
  27. 27.  8 tips for Explaining to Your Children How To Protect Themselves on Internet (Aug 2010) "you can’t protect them against all Internet dangers, but you can certainly teach them how to protect themselves." Beware These Social Networking Pitfalls For Kids (Sept 2010) "Quick: Whats the legal age required for someone to create a Facebook account?" Its 13!
  28. 28.  Facebook Safety Center Sophoss recommendations for Facebook settings Facebook Newbie | Good Practices ◦ Be careful of stuff sent to you, even by people you respect (their Facebook account may have been hacked) ◦ Limit or eliminate access to games and plugins ◦ Think before you click
  29. 29.  Phishing ◦ Tried and True – but new for them Used Console Sales ◦ Selling banned consoles is a popular on EBay Free Programs ◦ Asked to fill in a survey (handing over personal information) in return for a non functional program. Big name, Big target ◦ When hot programs come out (Halo Reach) scammers will be using it as bait http://sunbeltblog.blogspot.com/2010/10/popular- gaming-scams-you-should-warn.html
  30. 30.  "Stop Think Connect" - public education campaign Campaign spearheaded by the National Cyber Security Alliance, the Anti-Phishing Working Group (APWG), countless government agencies (including the Department of Homeland Security), and companies such as Microsoft, Google, PayPal and Facebook. Music video PSA (starring Jay Wise and local Massachusetts school kids)
  31. 31.  SANS Internet Storm Center is focusing on ways to Secure the Human Children, schools, and young friends (Week 2) 10 -Safe browsing for pre-teens 11 -Safe browsing for teens 12 -Social media usage 13 -Online bullying 14 -Securing a public computer 15 -What teachers need to know about students 16 -Securing a donated computer
  32. 32.  Co-workers (Week 4) 24 - Using work computers at home 25 - Using home computers for work 26 - Sharing office files 27 - Use of social media in the office 28 - Role of the employee 29 - Role of the office geek 30 - Role of the network team 31 - Tying it all together
  33. 33. What to do if someone cyberbullys your child: ◦ Act immediately by letting them know you can and will help ◦ Acknowledge the pain. Affirm what happened isn’t right and that they’re not at fault ◦ Tell your kids not to respond or retaliate, but save any evidence for authorities ◦ Block anyone whose behavior is inappropriate or threatening ◦ Report the problem. Consider reporting fellow students to the school. Report bullying on a website where the abuse occurred Parents and Educators Cyberbullying Survey - Executive Summary
  34. 34.  Develop and implement a formal policy for the school Provide training on how to address cyberbullying for faculty and staff Provide education for students and parents on: ◦ What cyberbullying is and how it works ◦ How to help kids avoid cyberbullying ◦ What to do if a child is a cyberbully or is being cyberbullied Parents and Educators Cyberbullying Survey - Executive Summary
  35. 35.  Va. may limit student-teacher contact on web (Jan 2011) Virginia Board of Education votes in Feb 2001 to establish the states policy for how students and teachers can interact via text- messaging, social networking, and online gaming. In a nutshell: they cant. 28 page proposal - Proposed Guidelines for the Prevention of Sexual Misconduct & Abuse in Virginia Public Schools
  36. 36.  Girl Posts Birthday Invitation on Facebook, Gets 21000 RSVP’s (Sept 2010) Like any other tech savvy 14-year-old girl, Rebecca J. decided that the best way to get the word out about her 15th birthday party was to put out an invite on Facebook Except, Rebecca didn’t just send out the invitation to her friends, she accidentally sent it to the entire Facebook community Within a short time, more than 21,000 people RSVP’d to the event
  37. 37.  New “OMG Guy” Clickjacking Attack Spreads on Facebook (Sept 2010) Facebook scam involves a status update containing a link with the words: “OMG This GUY Went A Little To Far WITH His Revenge On His EX Girlfriend” When you click the link, you are taken to a fake captcha mechanism that tricks you into “liking” the content and spreading it on your profile
  38. 38.  Sydney Dalton, Bieber Fever And The New Cyber Bullying (Aug 2010) Teenage girl who had a crush on teen pop sensation Justin Bieber Posted YouTube video she was "over" him Video went viral, Dalton became Public Enemy #1 to the Bieber Army Criticism quickly turned to threats Long term, Dalton must deal with fact that her name and reputation is attached to story
  39. 39.  Target to Sell Facebook Credits as Gift Cards in Stores (Sept 2010) Facebook extends tentacles into the physical world Facebook Credits gift cards are sold in Target stores in $15, $25, and $50 denominations Cards allow purchase of virtual goods on Facebook, including popular games such as Farmville
  40. 40.  The Internet is fun but also dangerous People don’t know what they do and can easily be duped The more cool stuff, the more risks Updates should be applied religiously. Browsing to a site (ANY site) can infect your computerSource: Safe Computing Tips For All
  41. 41.  You need to review and look at your various social media account settings Be aware that what you post is there for everyone to see ◦ bad folks to gather and sell ◦ Google to cache ◦ Library of Congress to archive (April 28, 2010) Adults need to help educate and raise awareness for our youth If needed, just WALK AWAY from Social Media
  42. 42.  Get this presentation online: ◦ http://www.slideshare.net/vcv1/ Reputation Defender Blog ◦ http://www.reputationdefender.com/blog/ Krebs on Security ◦ http://krebsonsecurity.com/ Ag IT eNews ◦ http://agsci.psu.edu/it/news/latest/RSS ◦ or send a blank email to l-agit-enews-subscribe-request@lists.psu.edu