By: Rachel Brock, Alyssa Budhoo,
Claire Keating & Yuxing Zeng












Why Do People Use Social Media?
Legal Issues With Social Media
Facebook – Privacy Issues
Twitter – P...






Social Interaction- allows people to be social.
They meet new people and keep in touch with
family, friends, and ...








Entertainment-social media gives access to
games, music and videos.
Relaxation- social media helps relieve str...






Convenience- social media is easily
accessible anywhere at any time. People can
talk to numerous people at the sa...
Why Use Social Media in Business?

The video states facts about social media networks
and how much popularity they are gai...






Branding- creates a noticeable identity for the
product/service.
Creates a Buzz- word gets out about the
products...






Established as an Expert- using forums and
message boards to answer questions
professionally, honestly, and corre...






Open up the line of communication between
business owner and millions of potential
customers- Millions of people ...






Generates Traffic- If an item becomes viral and
makes it to the front page of a big social news
site, the viewers...






The company is more accessible- everyone
can access online interaction anywhere at any
time.
Direct conversation ...




A way to explain yourself- it’s always going
to be possible to receive negative comments.
Social media provides a pl...




Find out what customers want- social media
allows you to ask customers exactly what
they want.

Customers can play a...
1.

2.
3.
4.
5.

6.
7.
8.
9.
10.

Disclosure of Confidential Information
Unauthorized Use of Trademarks
Unauthorized Use o...
Posting videos and photos without proper releases
may infringe the privacy or publicity rights of
individuals. Companies m...
Top 10 Legal Issues in Social Media
Social networking and Social media is becoming the
“next big thing” for both small and...
As you have read, social media sites come with
great advantages and opportunities for people
both in their personal and bu...
Privacy App Pinpoints Your Exact Location Using
Social Media
With the ongoing popularity among high school
students using ...


Launched February 2004

"Facebook to offer TV data to networks Comments."
Digital TV Europe . N.p., n.d. Web. 28 Nov. 2...




News feed: angered many users by not giving them control
of who could see their updates, or the ability to opt out
◦...




Privacy settings
◦ Facebook changed their privacy settings, sharing
information with everyone became the default set...




The anti-Google campaign (2011):
◦ Facebook wanted it kept private that they were behind
the anti-Google campaign in...






Tech Yeah! Facebook privacy issues
This video shows that Facebook is relaxing its
rules such as “Follow” button p...
"Twitter Now Covered by Analysts at Wells Fargo & Co.
(TWTR)." WKRB News RSS. N.p., n.d. Web. 28 Nov.
2013.
<http://www.wk...




Design
◦ Mostly dodged privacy concerns
◦ Anyone can see your tweets

Twitter collects data
(tweets, retweets, locat...




Judge Napolitano on Twitter Privacy Ruling in
Occupy Wall Street Case
This video shows that the tweet isn’t your
own...
"Buy YouTube Views." Buy Likes and Followers.
N.p., n.d. Web. 27 Nov. 2013.
<http://www.buylikesandfollowers.net/buyyoutub...




Creating people’s YouTube channels without
their permissions
YouTube put web banners or rich media by
collecting you...


YouTube's video privacy and sharing options:
◦ If a YouTube user doesn't want to offend anyone
but also happens to be p...




New Google/YouTube Privacy Issues
This video shows that Google announced
privacy settings that will affect YouTube o...
"How Can Agencies Step Beyond LinkedIn to Gain a Competitive
Edge?." Blog FireFish Software. N.p., n.d. Web. 28 Nov. 2013....




Managed to lose millions of users' email and
password combinations
A LinkedIn user who indicates they want their
pro...




Not taking the measures it needs to acquire
the support of individuals who want to be as
private as possible on the ...




Protecting your privacy on LinkedIn
This video shows that how to protect your
LinkedIn profile by disenable the acti...


Consumers using online social networking
sites need to remember that once you post
something online it is there FOREVER...










Because there are a number of dishonest people
online who aim to steal your personal information
for fin...


People who use the internet to take advantage of
victims, usually involving theft of personal or
financial information....


15 People Arrested in RCMP Raids On Alleged
Fraudsters in Montreal
•

Fifteen people working at a call center in
Montre...


An individual with extensive computer programming
knowledge, that seeks and exploits weaknesses in a
computer system or...
Recent Hacker Attacks in Canada
This article discusses the hacker software titles
“Citadel” and how it was discovered by t...
Top 10 Infamous Computer Hackers

This video shows the top 10 most infamous
computer hackers, and the effect they had on
p...


Hoax: Noun

1. to trick into believing or accepting as genuine something
false and often preposterous.
2. something acc...


Hacked Fox News Twitter Account Declares
Obama Died

This article released to the public through the
online press "The ...


The use of technology, specifically the internet and
social media websites, to harass or harm people in
a deliberate an...




95% of social media-using teens who have
witnessed cruel behavior on social
networking sites say they have seen othe...




Only 7% of U.S. parents are worried about
cyberbullying, even though 33% of teenagers
have been victims of cyberbull...




68% of teens agree that cyberbullying is a serious
problem with today’s youth.[6]Reasons cyberbullies said
they enga...


Delete Cyber Bullying

This YouTube video explains what cyber-bullying
really is and describes the characteristics of a...


The Case of Tyler Clementi

Attention to the issue of cyber-bullying was first brought to the
public eye through the ca...


Online predators are arguably the most dangerous
internet users. Online predators are people who
look for weakness in o...
Child Internet Safety PSA – Online Predators

This video shows how easily a child can be
manipulated into giving out perso...






In 82% of online sex crimes against minors, the
offender used the victim's social networking site to
gain informa...






26% of online sex offenders used the victim's social
networking site to gain information about the victim's
where...




Virtual Girl "Sweetie" Helps Track Thousands
of Online Sexual Predators
Another example is the virtual girl “Sweetie...
THE NUMBER ONE RULE!:


The only way to ensure your information is safe
online, is to be careful of and responsible for
e...
2. Do not trust strangers you meet online


People you meet online should not be trusted with
your personal information. ...
3. Do not share personal information over the
Internet or through social networking sites.


Sharing your banking informa...
4. Have multiple passwords and security
questions.


Many people make the mistake of having one
simple password for all o...
5. Report online abuse.


If you are a witness to cyber bullying, fraud, or any
other illegal online activity it is impor...
6. Format Your Privacy Settings


Make sure your privacy settings are limited to the
public. Allowing only your friends a...


Online Privacy

Online privacy animation video, that makes us
wonder “what if online actions were set in the
physical, ...
Protecting Your Privacy On The Internet

This page posts tips on how to protect personal
privacy on the Internet, through ...
“Data Privacy Day, held annually on January
28, encourages everyone to make protecting
privacy and data a greater priority...


Privacy and Social Networks

Social networking sites are a commercial operation
where they focus on making money by col...
The Future of Online Privacy

This video discovers how digital footprints are
everywhere through facial recognition softwa...
“Once conversations that should be private are
undertaken in a public forum, they become
theater – meant for the onlookers...
Social media and the future of privacy
Upcoming SlideShare
Loading in …5
×

Social media and the future of privacy

608 views

Published on

Published in: Social Media, Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
608
On SlideShare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
6
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • * SOURCE
  • **ADDED****
  • *** ADDED
  • ***ADDED STUFF*****
  • Social media and the future of privacy

    1. 1. By: Rachel Brock, Alyssa Budhoo, Claire Keating & Yuxing Zeng
    2. 2.           Why Do People Use Social Media? Legal Issues With Social Media Facebook – Privacy Issues Twitter – Privacy Issues YouTube – Privacy Issues LinkedIn – Privacy Issues Protecting Your Privacy Online Threats Steps To Ensuring Online Privacy National Privacy Day
    3. 3.    Social Interaction- allows people to be social. They meet new people and keep in touch with family, friends, and acquaintances. Seek Information- used to find information about products/services, keeping up with real-world social events, and learning new things. Pass Time- great tool to kill time and when you’re bored. Connor, O. (2013, July 5). 10 reasons people use social media. Retrieved from https://www.onepoll.com/10-reasons-people-use-social-media/ Alyssa Budhoo
    4. 4.     Entertainment-social media gives access to games, music and videos. Relaxation- social media helps relieve stress and escape reality. Expression of Opinions- people express thoughts and opinions through social media. Things to Talk About- social media provides topics for people to talk and gossip about with others. Connor, O. (2013, July 5). 10 reasons people use social media. Retrieved from https://www.onepoll.com/10-reasons-people-use-social-media/ Alyssa Budhoo
    5. 5.    Convenience- social media is easily accessible anywhere at any time. People can talk to numerous people at the same time. Sharing Information- people market their own image through social media by broadcasting things about themselves through publishing updates, videos and pictures. Know about others- social media gives people a display into the lives of others, by being able to check out other profiles. Connor, O. (2013, July 5). 10 reasons people use social media. Retrieved from https://www.onepoll.com/10-reasons-people-use-social-media/ Alyssa Budhoo
    6. 6. Why Use Social Media in Business? The video states facts about social media networks and how much popularity they are gaining due to the fact that there are more users and people joining these sites. Therefore, giving businesses an effective reason to use social media in their business practices. Alyssa Budhoo
    7. 7.    Branding- creates a noticeable identity for the product/service. Creates a Buzz- word gets out about the products/services through online conversation. Online Reputation Management- Easy to see what other people and sites are saying about the name, company, or brand online. Albert, S. (n.d.). 20 reasons your small business should use social media . Retrieved from http://blissfullydomestic.com/life-bliss/20-reasons-small-businessesshould-use-social-media/7414/ Alyssa Budhoo
    8. 8.    Established as an Expert- using forums and message boards to answer questions professionally, honestly, and correctly will earn businesses respect as an expert. Word of Mouth- market products through word of mouth virtually. Customers trust friends and family; they need to trust before purchasing, therefore hearing about the product from someone trustworthy, will insist them to buy. Builds relationships and Becomes More Personalusing a variety of social media will build relationships with customers and potential customers. Albert, S. (n.d.). 20 reasons your small business should use social media . Retrieved from http://blissfullydomestic.com/life-bliss/20-reasons-small-businessesshould-use-social-media/7414/ Alyssa Budhoo
    9. 9.    Open up the line of communication between business owner and millions of potential customers- Millions of people use social media everyday and can become potential customers, this does not come so easily in the offline world. Small businesses can compete with large companies- with the right type of viral social media, an immense amount of traffic can grow quickly with natural links, and keep traffic coming for a long time. Social networking with potential clients and customers from all over the globe- with all the social networking sites available, businesses can hold personal conversations with each of their customers. Albert, S. (n.d.). 20 reasons your small business should use social media . Retrieved from http://blissfullydomestic.com/life-bliss/20-reasons-small-businessesshould-use-social-media/7414/ Alyssa Budhoo
    10. 10.    Generates Traffic- If an item becomes viral and makes it to the front page of a big social news site, the viewership can grow tremendously. Increased link-ability- in order to move up in search engines, having links from other sites pointed to the business site is essential. Natural links-or links that come from a great post, video, or picture, are best for the business. Cheaper than traditional Marketing and Advertising- social media is a portion of the cost of traditional marketing and advertising. Albert, S. (n.d.). 20 reasons your small business should use social media . Retrieved from http://blissfullydomestic.com/life-bliss/20-reasons-small-businessesshould-use-social-media/7414/ Alyssa Budhoo
    11. 11.    The company is more accessible- everyone can access online interaction anywhere at any time. Direct conversation to a specific niche- many social networking, social bookmarking, and social news site are directed to specific niches. Business’ have the ability to speak directly to them. Another way for potential customers to find you- if the business is not high enough in search engines, customers can still find the business through social media. Albert, S. (n.d.). 20 reasons your small business should use social media . Retrieved from http://blissfullydomestic.com/life-bliss/20-reasons-small-businessesshould-use-social-media/7414/ Alyssa Budhoo
    12. 12.   A way to explain yourself- it’s always going to be possible to receive negative comments. Social media provides a platform to explain, and fix things to make them right. Shows your stuff- Universal search is now accessible through Google, meaning everything appears on Google Search. So product images can rank like the business site, making it easier for customers to see your product right on the Google search. Albert, S. (n.d.). 20 reasons your small business should use social media . Retrieved from http://blissfullydomestic.com/life-bliss/20-reasons-small-businessesshould-use-social-media/7414/ Alyssa Budhoo
    13. 13.   Find out what customers want- social media allows you to ask customers exactly what they want. Customers can play an active role in the business- customers can offer suggestions, share their likes and dislikes all on social media. Therefore, ideas for new products and services can develop. Albert, S. (n.d.). 20 reasons your small business should use social media . Retrieved from http://blissfullydomestic.com/life-bliss/20-reasons-small-businessesshould-use-social-media/7414/ Alyssa Budhoo
    14. 14. 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. Disclosure of Confidential Information Unauthorized Use of Trademarks Unauthorized Use of Copyright-Protected Works Defamation Issues Electronic Discovery Dynamic Information Human Resources Issues Securities Privacy/Publicity Endorsements Neal & McDevitt. (2010). Top 10 legal issues in social media. Retrieved from http://www.bartonchicago.com/pdf/socialmedia.pdf Alyssa Budhoo
    15. 15. Posting videos and photos without proper releases may infringe the privacy or publicity rights of individuals. Companies must make sure that their employees are not violating specific privacy regulations in their activities on social media sites. Neal & McDevitt. (2010). Top 10 legal issues in social media. Retrieved from http://www.bartonchicago.com/pdf/socialmedia.pdf Alyssa Budhoo
    16. 16. Top 10 Legal Issues in Social Media Social networking and Social media is becoming the “next big thing” for both small and large businesses. With advertisers, marketers, HR departments, job seekers, and employees using these tools, they need to be aware of potential consequences in order to avoid legal problems. The article lists the top 10 legal problems companies may face when using social media in their business practices. Alyssa Budhoo
    17. 17. As you have read, social media sites come with great advantages and opportunities for people both in their personal and business world. They do, however, come with issues and threats specifically aimed towards our privacy. The following slides will examine privacy issues with the most popular social media sites: Facebook, Twitter, YouTube and LinkedIn. Rachel Brock
    18. 18. Privacy App Pinpoints Your Exact Location Using Social Media With the ongoing popularity among high school students using Twitter and Instagram, they are not aware of the amount of information being posted from their social media updates. In the article, researchers at the International Computer Science Institute and UC Berkeley present findings about geo-tags and the threats they can impose on high school students who update regularly on social media. Alyssa Budhoo
    19. 19.  Launched February 2004 "Facebook to offer TV data to networks Comments." Digital TV Europe . N.p., n.d. Web. 28 Nov. 2013. <http://www.digitaltveurope.net/106962/facebook-tooffer-tv-data-to-networks/>.  Created by Mark Zuckerberg Facebook allows you to connect with friends, upload photos, and share links and videos  The most popular online Social networking site   In 2013, Facebook reached 750 million unique visits per month "Facebook." Answers.com. Answers, n.d. Web. 28 Nov. 2013. <http://www.answers.com/topic/facebook>. "Visual.Ly." Top 10 Most Popular Social Networks 2013. N.p., n.d. Web. 28 Nov. 2013. <http://visual.ly/top-10-most-popular-social-networks-2013>. Yuxing Zeng
    20. 20.   News feed: angered many users by not giving them control of who could see their updates, or the ability to opt out ◦ Launched in 2006 Beacon (2007) ◦ a Facebook ad system that tracked what users did and what they purchased on partner websites, even for users who were not Facebook members ◦ Adding to the privacy concerns, information about Facebook users' purchases were published without their explicit consent on their friends' news feeds "8 Facebook privacy flaps - Technology & Science - CBC News." CBCnews. CBC/Radio Canada, n.d. Web. 28 Nov. 2013. <http://www.cbc.ca/news/technology/8-facebook-privacy-flaps-1.1140969>. Yuxing Zeng
    21. 21.   Privacy settings ◦ Facebook changed their privacy settings, sharing information with everyone became the default setting ◦ Terrible guide for the privacy settings of Facebook Private messages ◦ A glitch in February 2010 caused some private messages on Facebook to be sent to unintended recipients ◦ A coding error opened Facebook chats, which are supposed to be private, for others to see "8 Facebook privacy flaps - Technology & Science - CBC News." CBCnews. CBC/Radio Canada, n.d. Web. 28 Nov. 2013. <http://www.cbc.ca/news/technology/8-facebook-privacy-flaps-1.1140969>. Yuxing Zeng
    22. 22.   The anti-Google campaign (2011): ◦ Facebook wanted it kept private that they were behind the anti-Google campaign in 2011. Once exposed, Facebook admitted that they should have behaved "in a serious and transparent way.” Timeline: ◦ Users could decide who could see that information but not if it was on their friends' Facebook pages. "8 Facebook privacy flaps - Technology & Science - CBC News." CBCnews. CBC/Radio Canada, n.d. Web. 28 Nov. 2013. <http://www.cbc.ca/news/technology/8-facebook-privacy-flaps-1.1140969>. Yuxing Zeng
    23. 23.    Tech Yeah! Facebook privacy issues This video shows that Facebook is relaxing its rules such as “Follow” button puts posts in News feeds which will cause more privacy issues among teenagers. http://video.cnbc.com/gallery/?video=30002 08666 Yuxing Zeng
    24. 24. "Twitter Now Covered by Analysts at Wells Fargo & Co. (TWTR)." WKRB News RSS. N.p., n.d. Web. 28 Nov. 2013. <http://www.wkrb13.com/markets/232262/twitternow-covered-by-analysts-at-wells-fargo-co-twtr/>.  Created in 2006  Global real-time communications platform  400 million monthly visitors  One billion tweets every 2.5 days "Twitter." CrunchBase, The Free Tech Company Database. N.p., n.d. Web. 27 Nov. 2013. <http://www.crunchbase.com/company/twitter>. Yuxing Zeng
    25. 25.   Design ◦ Mostly dodged privacy concerns ◦ Anyone can see your tweets Twitter collects data (tweets, retweets, location, people who you follow) ◦ Twitter than promotes “Promoted Tweets” on your timeline that relates to your profile "Here&apos;s How Twitter Can Track You on All of Your Devices." Mother Jones. N.p., n.d. Web. 26 Nov. 2013. <http://www.motherjones.com/politics/2013/09/twitter-could-threaten-your-privacy-more-facebook>. Yuxing Zeng
    26. 26.   Judge Napolitano on Twitter Privacy Ruling in Occupy Wall Street Case This video shows that the tweet isn’t your own anymore and they even can be the evidence that are against yourself at the court. http://www.youtube.com/watch?v=2JRxoXqVix g Yuxing Zeng
    27. 27. "Buy YouTube Views." Buy Likes and Followers. N.p., n.d. Web. 27 Nov. 2013. <http://www.buylikesandfollowers.net/buyyoutube-views.html>.    A platform for users to create, connect and discover the world’s videos Was founded in 2005 by Chad Hurley, Steve Chen and Jawed Karim Received funding from Sequoia Capital, and was acquired by Google Inc. in 2006 "YouTube." CrunchBase, The Free Tech Company Database. N.p., n.d. Web. 28 Nov. 2013. <http://www.crunchbase.com/company/youtube>. Yuxing Zeng
    28. 28.   Creating people’s YouTube channels without their permissions YouTube put web banners or rich media by collecting your search history "Laura Bruno&apos;s Blog Medical Intuition, Soul Readings, Intuitive Coaching, Tarot, Reiki: Inspiring and Empowering Visionaries and Healers." Laura Brunos Blog. N.p., n.d. Web. 28 Nov. 2013. <http://laurabruno.wordpress.com/tag/youtube-privacy-issues/>. Yuxing Zeng
    29. 29.  YouTube's video privacy and sharing options: ◦ If a YouTube user doesn't want to offend anyone but also happens to be popular (having a substantial amount of subscribers), this user will want to reach more than 25 people. This situation renders the entire option of privatizing videos pointless. "Google Groups." Google Groups. N.p., n.d. Web. 28 Nov. 2013. <http://productforums.google.com/forum/#!topic/youtube/aFLbzsGU66w>. Yuxing Zeng
    30. 30.   New Google/YouTube Privacy Issues This video shows that Google announced privacy settings that will affect YouTube on January 24,2012. Google will require users to follow by the companies for their activates on YouTube. http://www.youtube.com/watch?v=jm8J9OHCv iM Yuxing Zeng
    31. 31. "How Can Agencies Step Beyond LinkedIn to Gain a Competitive Edge?." Blog FireFish Software. N.p., n.d. Web. 28 Nov. 2013. <http://blog.firefishsoftware.com/bid/101435/How-CanAgencies-Step-Beyond-LinkedIn-to-Gain-a-Competitive-Edge>.  The Social network for work professionals  Created by Reid Hoffman in 2002  4.2 billions “ professionally-oriented searches” in 2011 "Mashable." Mashable. N.p., n.d. Web. 25 Nov. 2013. <http://mashable.com/category/linkedin/>. Yuxing Zeng
    32. 32.   Managed to lose millions of users' email and password combinations A LinkedIn user who indicates they want their profile to remain anonymous to the person whose profile they've viewed, that occasionally the searcher's profile comes up on the said viewed member's page as someone who they might like to connect with. "LinkedIn (LNKD) Has Major Privacy Issues." Insider Monkey Free Hedge Fund and Insider Trading Data RSS. N.p., n.d. Web. 28 Nov. 2013. <http://www.insidermonkey.com/blog/linkedin-lnkd-has-major-privacy-issues23328/#3HEy13RT35rpjrB2.99>. Yuxing Zeng
    33. 33.   Not taking the measures it needs to acquire the support of individuals who want to be as private as possible on the Internet Exposing users’ Google searches "privacy issue? linkedin exposing my google searches???." - LinkedIn Help Center. N.p., n.d. Web. 28 Nov. 2013. <http://community.linkedin.com/questions/73446/privacy-issue-linkedinexposing-my-google-searches.html>. "LinkedIn (LNKD) Has Major Privacy Issues." Insider Monkey Free Hedge Fund and Insider Trading Data RSS. N.p., n.d. Web. 28 Nov. 2013. <http://www.insidermonkey.com/blog/linkedin-lnkd-has-major-privacy-issues23328/#3HEy13RT35rpjrB2.99>. Yuxing Zeng
    34. 34.   Protecting your privacy on LinkedIn This video shows that how to protect your LinkedIn profile by disenable the activities broadcasts. It already became a privacy issues for the LinkedIn that other people can see your own news feed. http://www.youtube.com/watch?v=vnJ4Tv_4p Mk Yuxing Zeng
    35. 35.  Consumers using online social networking sites need to remember that once you post something online it is there FOREVER. You can erase, delete, backspace what ever you want, but the fact of the matter is that once posted online, NOTHING IS DELETABLE. Rachel Brock
    36. 36.         Because there are a number of dishonest people online who aim to steal your personal information for financial gain, personal gain, or just plain fun. Types of Online Threats: Fraudsters Hackers Hoaxsters Cyber-Bullies Online Predators Cyber Stalkers Rachel Brock
    37. 37.  People who use the internet to take advantage of victims, usually involving theft of personal or financial information. These people may use the internet to present fraudulent solicitations, fraudulent transactions, or transmit the proceeds of fraud to institutions or other individuals connected with the scheme. "Internet Fraud." TheFreeDictionary.com. N.p., n.d. Web. 27 Nov. 2013. http://legal-dictionary.thefreedictionary.com/Internet+Fraud Claire Keating
    38. 38.  15 People Arrested in RCMP Raids On Alleged Fraudsters in Montreal • Fifteen people working at a call center in Montreal were arrested on charges of massmarket fraud that spanned Canada and the U.S., targeting thousands of victims and robbing approximately $20 million. "680News." 680News Fifteen people arrested in RCMP raids on alleged fraudsters in Montreal Comments. N.p., n.d. Web. 28 Nov. 2013. <http://www.680news.com/2013/11/19/fifteenpeople-arrested-in-rcmp-raids-on-alleged-fraudsters-in-montreal/>. Claire Keating
    39. 39.  An individual with extensive computer programming knowledge, that seeks and exploits weaknesses in a computer system or computer network (ex – social media sites). Through these software weaknesses they may gain access to personal files and information, and the lengths to which they may use this information is endless. They may be motivated by a number of reasons including profit, protest, or challenge. "hacker." hacker. N.p., n.d. Web. 28 Nov. 2013. <http://www.catb.org/jargon/html/H/hacker.html>. Rachel Brock
    40. 40. Recent Hacker Attacks in Canada This article discusses the hacker software titles “Citadel” and how it was discovered by the RCMP in Burnaby. The software is estimated to have effected more that 5 million people in over 90 countries, stealing over $500 million dollars from victims bank accounts. "B.C. Computer Servers Linked to $500M Global Theft Ring - British Columbia - CBC News." CBCnews. CBC/Radio Canada, n.d. Web. 27 Nov. 2013. Rachel Brock
    41. 41. Top 10 Infamous Computer Hackers This video shows the top 10 most infamous computer hackers, and the effect they had on people and businesses around the world. Rachel Brock
    42. 42.  Hoax: Noun 1. to trick into believing or accepting as genuine something false and often preposterous. 2. something accepted or established by fraud or fabrication  Hoaxsters are people who deliberately fabricate false information and spread it virally. This information is heard and seen by others, and passed around because it is perceived to be factual. "Hoax." Merriam-Webster. Merriam-Webster, n.d. Web. 27 Nov. 2013. Rachel Brock
    43. 43.  Hacked Fox News Twitter Account Declares Obama Died This article released to the public through the online press "The Free Library," states how Fox News' Twitter account was hacked by a hoaxer group called "The Script Kiddies." They released false information that went viral stating that Obama had been assassinated. "Hacked Fox News Twitter Account Declares Obama Died." - Free Online Library. N.p., n.d. Web. 27 Nov. 2013. Rachel Brock
    44. 44.  The use of technology, specifically the internet and social media websites, to harass or harm people in a deliberate and hostile manner. It can involve anything from gossiping, to spreading false rumours, to making harmful threats to people. Cyber-bullying has become common among young social media users. "Category Archives: Cyberbullying." Cyberbullying. N.p., n.d. Web. 26 Nov. 2013. <http://definetheline.ca/dtl/category/cyberbullying/>. Claire Keating
    45. 45.   95% of social media-using teens who have witnessed cruel behavior on social networking sites say they have seen others ignoring the mean behavior; 55% witness this frequently 66% of teens who have witnessed online cruelty have also witnessed others joining; 21% say they have also joined in the harassment "Cyberbullying Statistics." InternetSafety101.org: Statistics. N.p., n.d. Web. 27 Nov. 2013. http://www.internetsafety101.org/cyberbullyingstatistics.htm Claire Keating
    46. 46.   Only 7% of U.S. parents are worried about cyberbullying, even though 33% of teenagers have been victims of cyberbullying One million children were harassed, threatened or subjected to other forms of cyberbullying on Facebook during the past year "Cyberbullying Statistics." InternetSafety101.org: Statistics. N.p., n.d. Web. 27 Nov. 2013. http://www.internetsafety101.org/cyberbullyingstatistics.htm Claire Keating
    47. 47.   68% of teens agree that cyberbullying is a serious problem with today’s youth.[6]Reasons cyberbullies said they engaged in cyberbullying: ◦ To show off to friends (11%) ◦ To be mean (14%) ◦ Something else (16%) ◦ To embarrass them (21%) ◦ For fun or entertainment (28%) ◦ They deserved it (58%) ◦ To get back at someone (58%) 81% of youth agree that bullying online is easier to get away with than bullying in person "Cyberbullying Statistics." InternetSafety101.org: Statistics. N.p., n.d. Web. 27 Nov. 2013. http://www.internetsafety101.org/cyberbullyingstatistics.htm Claire Keating
    48. 48.  Delete Cyber Bullying This YouTube video explains what cyber-bullying really is and describes the characteristics of a cyberbully. They believe they have an advantage online because they are secured online and there actions have no consequences. Cyber-bullying is a monster that we as consumers of social media have created ourselves. The YouTube video encourages online consumer to “Be The Change” and spread positive thoughts, messages, images and videos online. Claire Keating
    49. 49.  The Case of Tyler Clementi Attention to the issue of cyber-bullying was first brought to the public eye through the case of the suicide of Tyler Clementi. Tyler Cementi’s roommate set up a web-cam and recorded Tyler having homosexual intercourse with another man, and broadcasted it on the internet. After Tyler’s suicide, his roommate, Dharun Ravi, was sentenced to 30 days in jail. "Tyler Clementi." Times Topics. N.p., n.d. Web. 27 Nov. 2013. Claire Keating
    50. 50.  Online predators are arguably the most dangerous internet users. Online predators are people who look for weakness in others online, and intend to inflict harm on them. The most common type of online predators are mature men and females using open chat sites to lure in minors and commit lewd and perverse acts with them. These people are often pedophiles, and attack young naïve children who agree to meet with them in person. "The Facts About Online Predators." Family Safe Computers. N.p., n.d. Web. 28 Nov. 2013. <http://www.familysafecomputers.org/predators.htm>. Rachel Brock
    51. 51. Child Internet Safety PSA – Online Predators This video shows how easily a child can be manipulated into giving out personal information to predators. Rachel Brock
    52. 52.    In 82% of online sex crimes against minors, the offender used the victim's social networking site to gain information about the victim's likes and dislikes 65% of online sex offenders used the victim's social networking site to gain home and school information about the victim Only 1 in 3 people will report sexual crimes to a trusted adult "InternetSafety101.org: Statistics." InternetSafety101.org: Statistics. N.p., n.d. Web. 27 Nov. 2013. Rachel Brock
    53. 53.    26% of online sex offenders used the victim's social networking site to gain information about the victim's whereabouts at a specific time There are over 747,408 registered sex offenders in the United States, and over 100,000 are lost in the system Four percent of all youth Internet users received aggressive sexual solicitations, which threatened to spill over into “real life”. These solicitors asked to meet the youth in person, called them on the telephone or sent offline mail, money or gifts. Also, four percent of youth had distressing sexual solicitations that left them feeling upset of extremely afraid. "InternetSafety101.org: Statistics." InternetSafety101.org: Statistics. N.p., n.d. Web. 27 Nov. 2013. Rachel Brock
    54. 54.   Virtual Girl "Sweetie" Helps Track Thousands of Online Sexual Predators Another example is the virtual girl “Sweetie,” a 10 year old Pilipino girl designed through computer software, who helps to track online predators. Rachel Brock
    55. 55. THE NUMBER ONE RULE!:  The only way to ensure your information is safe online, is to be careful of and responsible for everything that you post. Since nothing can ever be removed from the online world, you must make sure you don’t post personal information, reputation damaging pictures, blogs, ANYTHING that may come back to haunt you. Future employers may access your social networking sites and choose not to hire you based on pictures and posts they find. Rachel Brock
    56. 56. 2. Do not trust strangers you meet online  People you meet online should not be trusted with your personal information. People are able to create multiple cyber identities, and may not really be the trustworthy person you think you are talking to behind the computer screen. Rachel Brock
    57. 57. 3. Do not share personal information over the Internet or through social networking sites.  Sharing your banking information, your whereabouts, our address, phone number, or contact information on social networking sites or with people you talk to online can be a threat to your privacy and safety. Rachel Brock
    58. 58. 4. Have multiple passwords and security questions.  Many people make the mistake of having one simple password for all of their online accounts. If this password were to be compromised, this could have devastating results. Claire Keating
    59. 59. 5. Report online abuse.  If you are a witness to cyber bullying, fraud, or any other illegal online activity it is important to report it immediately. The failure to report could have devastating effects for not only you, but others around you. If someone is cyber-bullying you, the odd are high that they are doing it to others as well. Claire Keating
    60. 60. 6. Format Your Privacy Settings  Make sure your privacy settings are limited to the public. Allowing only your friends and family to have access to your profiles prevents strangers from viewing your personal information. Claire Keating
    61. 61.  Online Privacy Online privacy animation video, that makes us wonder “what if online actions were set in the physical, tangible world?” The YouTube video shares with consumers that we have to be aware of what we are posting online and who we are sharing it with because there could be consequences. Remember… Think before you click! Claire Keating
    62. 62. Protecting Your Privacy On The Internet This page posts tips on how to protect personal privacy on the Internet, through Microsoft’s Safety & Security Center. It details topics such as thinking before sharing personal information, monitoring what others post, guarding personal information, and protecting yourself from fraud. Alyssa Budhoo
    63. 63. “Data Privacy Day, held annually on January 28, encourages everyone to make protecting privacy and data a greater priority. DPD is an effort to empower and educate people to protect their privacy and control their digital footprint. Contribute to the success of Data Privacy Day by sharing resources and advice on social media, hosting an event, or having your organization become a DPD Champion. You can make a difference in just a few minutes Jan. 28!” "Overview | StaySafeOnline.org." Overview | StaySafeOnline.org. N.p., n.d. Web. 28 Nov. 2013 Claire Keating
    64. 64.  Privacy and Social Networks Social networking sites are a commercial operation where they focus on making money by collecting user data. By knowing what we like, where we live, and what are interest are, companies, advertisers, marketers and employers make money. The data that we post online on social networking sites such as Facebook and Twitter make decisions about you. Claire Keating
    65. 65. The Future of Online Privacy This video discovers how digital footprints are everywhere through facial recognition software, for example, among all online personal users. The video features the speaker, Jonathan Stickland, who investigates the future of online privacy and what to expect. Alyssa Budhoo
    66. 66. “Once conversations that should be private are undertaken in a public forum, they become theater – meant for the onlookers more than the participants.” -ANNONYMOUS Claire Keating

    ×