SlideShare a Scribd company logo
1 of 21
MEDIA SAFETY
Don’t fall into these traps
Quick diagnostic quiz
• How much do you know about cyber attacks and cyber safety ??
Social media in school?
• Social media can be beneficial when it comes to schoolwork.
It gives students the opportunity to collaborate and discuss
things, such as if they’re stuck on a homework task, and they
develop more familiarity with computers and other pieces of
technology.
***However, there are a number of risks associated with it:
Downfalls:
1. BULLYING
• Bullies may use their personal accounts or hide behind an
anonymous persona to target others. They might send nasty
and abusive messages, share embarrassing photos and
secrets, or deliberately leave someone out of an online chat.
2. DISTARCTIONS***
-*****Students may spend lesson time on social apps on their
phones, which distracts them from their work. This reduces their
concentration and could lead to lower academic performance.
 Ahem.. Netflix and Omegle etc…
Downfalls:
3. Reduced social skills. The more time teens spend on social
media, the less time they spend interacting with their friends
face-to-face.
4. Sharing personal information. Groomers often use social
media to target their victims, so students should never talk to
someone they don’t know and share their personal
information. Furthermore, they must be cautious of sharing
certain images that can be dangerous if they fall into the wrong
hands.
Downfalls
5. Making inappropriate comments. Students should know that
what they say online can have repercussions in later life. Many
employers look at an applicant’s social media accounts before
they offer them an interview. A stupid comment could therefore
cost a student their dream job further down the line.
6. Links to mental health issues. Social media sites can have
many negative consequences on mental health. Sites that
promote image sharing may lead to teens comparing themselves
with their peers, and certain blogs may promote dangerous
lifestyles.
Some serious threats:
DATA LEAKING
- Hackers and Malware
This resulted in a loss of almost $21 billion in the United States in
2012 (imagine 2022…).
The financial organizations and other companies that handle their
customer’s confidential information, are taking steps to conserve
those and keep it safe from hackers.
In spite of these preventive measures, the hackers manage to attain
all the information, which is, of course, a criminal offense and should
be stopped.
Data Leaking
Worse case scenarios:
- Identity theft
- Money theft
- Framing
- Blackmail
- Loss of important information
And more….
Can you think of any more?????
Less serious consequences:
• Account hacks (social media)
• Computer virus
• Spam
• Unstoppable pop ups
• Annoyances
Social sharing: Careful what you reveal/share.
• What seems like a fun feature can be taken advantage of by ill intending
people:
On social media websites like Facebook, Instagram, and Snapchat, there
is a feature in which one can share their current locations along with their
photographs.
- This proves to be helpful for social media criminals to receive information
about the person. These locations are shown on the web in the form of
detailed addresses, and this advanced feature can lead to strangers
contacting or finding you
- Think also: Status updates, vacation announcements etc..
Risk? Reveals perfect opportunities.
That being said…
• You don’t always have to be absolutely paranoid that someone is
waiting to hack or rob you etc..
• BUT do be careful and be smart about your social media activities.
Are you media safe Handout
20min ish
Risk assessment:
• If you come across any suspicious activity on your social media
accounts or your friends find any doubtful message posted on your
account that doesn’t match your behavior, then you should take it as
an alarm. It’s a high time you should take the necessary steps to avoid
losing complete control of your account. Performing free identity
checks can be a starting point for you.
• If you are getting regular popups when you are accessing social media
accounts on a computer or smartphone then you should take a cue
and start updating security as well as privacy settings in your device
Prevention:
1. Strong password!
Seems obvious but..
A strong password is key to avoid your social media account from
getting hacked on a primary level. To make the password a stronger
one and difficult to crack, one must make use of an alphanumeric
pattern of codes and also must include some symbols in it.
There are very fewer chances of their account being hacked if this
trend is followed.
Don’t do easily guessable passwords: pet, birthdays, family names
etc…
Careful who you allow to have access to your
accounts!
• Is it really worth the extra follower????
• If you wish to stay away from frauds and scams, just avoid accepting
friend requests on social media from unknown people.
• It is a cleverer and much simpler way to avoid unwanted social media
risks and dangers.
• You should not click on any suspicious links that you receive in your
message box.
 promotions, fake offers, free stuff etc…
Be mindful of your FOOTPRINT
• Very important for future career!!!!
• Remember when we talked about cancel culture? Don’t put yourself
in a position where you can lose important opportunities..
Includes: Jobs, School, Relationships etc..
Self censorship? NO.
-- but be mindful what you post and how it can come off..
What do I mean by this?
 Online hate, controversial opinions, inappropriate content etc…
Footprint handout
• About 20min
YouTube vid:

More Related Content

Similar to Stay Safe with Social Media

advantagesanddisadvantagesofsocialmedia-151211192046.pptx
advantagesanddisadvantagesofsocialmedia-151211192046.pptxadvantagesanddisadvantagesofsocialmedia-151211192046.pptx
advantagesanddisadvantagesofsocialmedia-151211192046.pptxHimabindu905359
 
Social media Challenges and Advantage
Social media Challenges and AdvantageSocial media Challenges and Advantage
Social media Challenges and AdvantageTechno World 4 U
 
Advantages and disadvantages of social media
Advantages and disadvantages of social mediaAdvantages and disadvantages of social media
Advantages and disadvantages of social mediaAlan Raj
 
Advantages and disadvantages of social media
Advantages and disadvantages of social mediaAdvantages and disadvantages of social media
Advantages and disadvantages of social mediaAlan Raj
 
DIGITAL FOOTPRINTS
DIGITAL FOOTPRINTSDIGITAL FOOTPRINTS
DIGITAL FOOTPRINTSOodit Jethwa
 
Q3 G11 Empowerment Technologies Module 2.pdf
Q3 G11 Empowerment Technologies Module 2.pdfQ3 G11 Empowerment Technologies Module 2.pdf
Q3 G11 Empowerment Technologies Module 2.pdfBryanSmile
 
Lecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxLecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxDominicCaling
 
Social Media Safety Presentation
Social Media Safety PresentationSocial Media Safety Presentation
Social Media Safety PresentationLJ Henshell
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threatsmkinzie
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awarenessKaran Veer Singh
 
Guide to facebook security
Guide to facebook securityGuide to facebook security
Guide to facebook securityErnest Staats
 
10.a guide-to-facebook-security
10.a guide-to-facebook-security10.a guide-to-facebook-security
10.a guide-to-facebook-securityrobert mota
 
MIL_Lesson 5_Responsible Use of Media and Information.pdf
MIL_Lesson 5_Responsible Use of Media and Information.pdfMIL_Lesson 5_Responsible Use of Media and Information.pdf
MIL_Lesson 5_Responsible Use of Media and Information.pdfranniejhon
 
Business Impact of Online Social Networking
Business Impact of Online Social NetworkingBusiness Impact of Online Social Networking
Business Impact of Online Social NetworkingMicheal Axelsen
 
EFFECTS OF SOCIAL MEDIA ON YOUTH
EFFECTS OF SOCIAL MEDIA ON YOUTHEFFECTS OF SOCIAL MEDIA ON YOUTH
EFFECTS OF SOCIAL MEDIA ON YOUTHYaman Singhania
 

Similar to Stay Safe with Social Media (20)

advantagesanddisadvantagesofsocialmedia-151211192046.pptx
advantagesanddisadvantagesofsocialmedia-151211192046.pptxadvantagesanddisadvantagesofsocialmedia-151211192046.pptx
advantagesanddisadvantagesofsocialmedia-151211192046.pptx
 
Social media Challenges and Advantage
Social media Challenges and AdvantageSocial media Challenges and Advantage
Social media Challenges and Advantage
 
Advantages and disadvantages of social media
Advantages and disadvantages of social mediaAdvantages and disadvantages of social media
Advantages and disadvantages of social media
 
Advantages and disadvantages of social media
Advantages and disadvantages of social mediaAdvantages and disadvantages of social media
Advantages and disadvantages of social media
 
Users guide
Users guideUsers guide
Users guide
 
DIGITAL FOOTPRINTS
DIGITAL FOOTPRINTSDIGITAL FOOTPRINTS
DIGITAL FOOTPRINTS
 
Q3 G11 Empowerment Technologies Module 2.pdf
Q3 G11 Empowerment Technologies Module 2.pdfQ3 G11 Empowerment Technologies Module 2.pdf
Q3 G11 Empowerment Technologies Module 2.pdf
 
Putting your life online
Putting your life onlinePutting your life online
Putting your life online
 
Lecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxLecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptx
 
Social Media Safety Presentation
Social Media Safety PresentationSocial Media Safety Presentation
Social Media Safety Presentation
 
cyber safety.pdf
cyber safety.pdfcyber safety.pdf
cyber safety.pdf
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threats
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awareness
 
Guide to facebook security
Guide to facebook securityGuide to facebook security
Guide to facebook security
 
10.a guide-to-facebook-security
10.a guide-to-facebook-security10.a guide-to-facebook-security
10.a guide-to-facebook-security
 
MIL_Lesson 5_Responsible Use of Media and Information.pdf
MIL_Lesson 5_Responsible Use of Media and Information.pdfMIL_Lesson 5_Responsible Use of Media and Information.pdf
MIL_Lesson 5_Responsible Use of Media and Information.pdf
 
Social Media Awareness
Social Media AwarenessSocial Media Awareness
Social Media Awareness
 
Facebook
FacebookFacebook
Facebook
 
Business Impact of Online Social Networking
Business Impact of Online Social NetworkingBusiness Impact of Online Social Networking
Business Impact of Online Social Networking
 
EFFECTS OF SOCIAL MEDIA ON YOUTH
EFFECTS OF SOCIAL MEDIA ON YOUTHEFFECTS OF SOCIAL MEDIA ON YOUTH
EFFECTS OF SOCIAL MEDIA ON YOUTH
 

More from GAmarioarei

07 - The Periodic Table.ppt
07 - The Periodic Table.ppt07 - The Periodic Table.ppt
07 - The Periodic Table.pptGAmarioarei
 
Anaerobic respiration .pptx
Anaerobic respiration .pptxAnaerobic respiration .pptx
Anaerobic respiration .pptxGAmarioarei
 
Scarlet Letter chapter 16 to 21 .pptx
Scarlet Letter chapter 16 to 21 .pptxScarlet Letter chapter 16 to 21 .pptx
Scarlet Letter chapter 16 to 21 .pptxGAmarioarei
 
evolution first slide deck.pdf
evolution first slide deck.pdfevolution first slide deck.pdf
evolution first slide deck.pdfGAmarioarei
 
chapters 1 & 2 of novels.pptx
chapters 1 & 2 of novels.pptxchapters 1 & 2 of novels.pptx
chapters 1 & 2 of novels.pptxGAmarioarei
 
writing tips plus dangerous game ppt.pptx
writing tips plus dangerous game ppt.pptxwriting tips plus dangerous game ppt.pptx
writing tips plus dangerous game ppt.pptxGAmarioarei
 
propoganda in ww1 ppt.pdf
propoganda in ww1 ppt.pdfpropoganda in ww1 ppt.pdf
propoganda in ww1 ppt.pdfGAmarioarei
 
After short story writing.pptx
After short story writing.pptxAfter short story writing.pptx
After short story writing.pptxGAmarioarei
 
intro to poetry.ppt
intro to poetry.pptintro to poetry.ppt
intro to poetry.pptGAmarioarei
 
types of media ppt .pptx
types of media ppt .pptxtypes of media ppt .pptx
types of media ppt .pptxGAmarioarei
 

More from GAmarioarei (11)

07 - The Periodic Table.ppt
07 - The Periodic Table.ppt07 - The Periodic Table.ppt
07 - The Periodic Table.ppt
 
Anaerobic respiration .pptx
Anaerobic respiration .pptxAnaerobic respiration .pptx
Anaerobic respiration .pptx
 
Scarlet Letter chapter 16 to 21 .pptx
Scarlet Letter chapter 16 to 21 .pptxScarlet Letter chapter 16 to 21 .pptx
Scarlet Letter chapter 16 to 21 .pptx
 
evolution first slide deck.pdf
evolution first slide deck.pdfevolution first slide deck.pdf
evolution first slide deck.pdf
 
fossils ppt.pdf
fossils ppt.pdffossils ppt.pdf
fossils ppt.pdf
 
chapters 1 & 2 of novels.pptx
chapters 1 & 2 of novels.pptxchapters 1 & 2 of novels.pptx
chapters 1 & 2 of novels.pptx
 
writing tips plus dangerous game ppt.pptx
writing tips plus dangerous game ppt.pptxwriting tips plus dangerous game ppt.pptx
writing tips plus dangerous game ppt.pptx
 
propoganda in ww1 ppt.pdf
propoganda in ww1 ppt.pdfpropoganda in ww1 ppt.pdf
propoganda in ww1 ppt.pdf
 
After short story writing.pptx
After short story writing.pptxAfter short story writing.pptx
After short story writing.pptx
 
intro to poetry.ppt
intro to poetry.pptintro to poetry.ppt
intro to poetry.ppt
 
types of media ppt .pptx
types of media ppt .pptxtypes of media ppt .pptx
types of media ppt .pptx
 

Recently uploaded

Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonJericReyAuditor
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 

Recently uploaded (20)

Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lesson
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 

Stay Safe with Social Media

  • 1. MEDIA SAFETY Don’t fall into these traps
  • 2. Quick diagnostic quiz • How much do you know about cyber attacks and cyber safety ??
  • 3. Social media in school? • Social media can be beneficial when it comes to schoolwork. It gives students the opportunity to collaborate and discuss things, such as if they’re stuck on a homework task, and they develop more familiarity with computers and other pieces of technology. ***However, there are a number of risks associated with it:
  • 4. Downfalls: 1. BULLYING • Bullies may use their personal accounts or hide behind an anonymous persona to target others. They might send nasty and abusive messages, share embarrassing photos and secrets, or deliberately leave someone out of an online chat. 2. DISTARCTIONS*** -*****Students may spend lesson time on social apps on their phones, which distracts them from their work. This reduces their concentration and could lead to lower academic performance.  Ahem.. Netflix and Omegle etc…
  • 5. Downfalls: 3. Reduced social skills. The more time teens spend on social media, the less time they spend interacting with their friends face-to-face. 4. Sharing personal information. Groomers often use social media to target their victims, so students should never talk to someone they don’t know and share their personal information. Furthermore, they must be cautious of sharing certain images that can be dangerous if they fall into the wrong hands.
  • 6. Downfalls 5. Making inappropriate comments. Students should know that what they say online can have repercussions in later life. Many employers look at an applicant’s social media accounts before they offer them an interview. A stupid comment could therefore cost a student their dream job further down the line. 6. Links to mental health issues. Social media sites can have many negative consequences on mental health. Sites that promote image sharing may lead to teens comparing themselves with their peers, and certain blogs may promote dangerous lifestyles.
  • 7. Some serious threats: DATA LEAKING - Hackers and Malware This resulted in a loss of almost $21 billion in the United States in 2012 (imagine 2022…). The financial organizations and other companies that handle their customer’s confidential information, are taking steps to conserve those and keep it safe from hackers. In spite of these preventive measures, the hackers manage to attain all the information, which is, of course, a criminal offense and should be stopped.
  • 8. Data Leaking Worse case scenarios: - Identity theft - Money theft - Framing - Blackmail - Loss of important information And more…. Can you think of any more?????
  • 9. Less serious consequences: • Account hacks (social media) • Computer virus • Spam • Unstoppable pop ups • Annoyances
  • 10. Social sharing: Careful what you reveal/share. • What seems like a fun feature can be taken advantage of by ill intending people: On social media websites like Facebook, Instagram, and Snapchat, there is a feature in which one can share their current locations along with their photographs. - This proves to be helpful for social media criminals to receive information about the person. These locations are shown on the web in the form of detailed addresses, and this advanced feature can lead to strangers contacting or finding you - Think also: Status updates, vacation announcements etc.. Risk? Reveals perfect opportunities.
  • 11. That being said… • You don’t always have to be absolutely paranoid that someone is waiting to hack or rob you etc.. • BUT do be careful and be smart about your social media activities.
  • 12. Are you media safe Handout 20min ish
  • 13. Risk assessment: • If you come across any suspicious activity on your social media accounts or your friends find any doubtful message posted on your account that doesn’t match your behavior, then you should take it as an alarm. It’s a high time you should take the necessary steps to avoid losing complete control of your account. Performing free identity checks can be a starting point for you. • If you are getting regular popups when you are accessing social media accounts on a computer or smartphone then you should take a cue and start updating security as well as privacy settings in your device
  • 14. Prevention: 1. Strong password! Seems obvious but.. A strong password is key to avoid your social media account from getting hacked on a primary level. To make the password a stronger one and difficult to crack, one must make use of an alphanumeric pattern of codes and also must include some symbols in it. There are very fewer chances of their account being hacked if this trend is followed. Don’t do easily guessable passwords: pet, birthdays, family names etc…
  • 15. Careful who you allow to have access to your accounts! • Is it really worth the extra follower???? • If you wish to stay away from frauds and scams, just avoid accepting friend requests on social media from unknown people. • It is a cleverer and much simpler way to avoid unwanted social media risks and dangers. • You should not click on any suspicious links that you receive in your message box.  promotions, fake offers, free stuff etc…
  • 16. Be mindful of your FOOTPRINT • Very important for future career!!!! • Remember when we talked about cancel culture? Don’t put yourself in a position where you can lose important opportunities.. Includes: Jobs, School, Relationships etc.. Self censorship? NO. -- but be mindful what you post and how it can come off.. What do I mean by this?  Online hate, controversial opinions, inappropriate content etc…
  • 18.
  • 19.
  • 20.