SlideShare a Scribd company logo
1 of 14
SocialMediaandSecurity
Kyle Basedow, Alexandra Linde, Nina Rodgers
Introduction
● A majority of the time, social media creates a community
● Issues begin to arise during times of crisis/emergency when social media
users endanger themselves and others
● Certain social media platforms are more vulnerable to safety threats than
others (Twitter vs. LinkedIn)
● Two main issues involving personal safety/security: Identifying locations
and targeted threats
Location,Location,Location
#SULockdown
ParisAttacks
#porteouverte
Parisians used the
hashtag to signal that
they needed a safe
place to go, or have a
safe place to offer
(McHugh, 2015)
The hashtag became
inundated with
inspirational messages,
pushing down the tweets
citizens could actually
use to the bottom of
the stream
SocialMediaSurveillance
Screeningsocialmediaaccounts
Should the government be allowed access to the public's social media platforms
for background checks upon entering the U.S.?
→ In early 2015 the secret policy that prohibited immigration officials to
utilize social media platforms for all immigrants applying for U.S. visas was
renewed by Homeland Security Secretary Jeh Johnson despite controversy.
(Apuzzo,Schmidt,Preston, NYT)
→ Some may argue that it is an invasion of privacy for the government to hack
into our social media accounts.
→ On July 27th 2014, Tashfeen
Malik and her husband entered the
U.S.
(Figure 1, 2015. CNN Headline.)
→ San Bernardino attacks occurred
on Dec. 2, 2015
→ Years before entering the U.S.,
Tashfeen Malik direct messaged
people over social media saying
how she wanted to commit jihad and
martyrdom.(Evan Bleier, Daily Mail)
→ None of the messages were discovered
in the screening process.
→ The Immigration department has no
program that is known to screen social
media platforms.
→ Time concerns are not an issue
because our advanced technology has the
ability to identify these “red flags”
for the immigration department.
(Apuzzo,Schmidt,Preston, NYT)
→ National security has become a major
concern
→ Former SU Student posts anonymous tip
on Yik Yak about harming others.
→ DPS and Syracuse police were able to
stop the individual and locate them
because of his social media post.
(Samantha House, Syracuse.com)
Another Example...
→ Two students were arrested at the
University of Northwest Missouri after
posting anonymously on Yik Yak about
shooting black students on
campus.(Alcindor and Stanglin. USA TODAY)
→ What would it be like if a social media screening program existed during the
immigration process to the U.S.? Would these red flags have been found?
→ Where do you draw the line?
→ What is the threshold of people's comments that would allow suspicion and
call for further investigation?
Recommendations
PossibleSolutions
➔ It comes down to a question of ethics
◆ How far should the government be able to go? Once the access is
granted, it would be very difficult to get back
◆ How much do they have access to already?
➔ Should they be granted access, there must be guidelines
◆ Protection of freedom of speech
➔ More location based services (like Facebook check-ins)
◆ Separate streams by location
◆ City based apps
References
1) Figure 1, 2015. CNN Headline. http://www.cnn.com/2015/12/14/us/san-bernardino-shooting/
2) Visa Process Missed San Bernardino Wife’s Zealotry on Social Media, The New York Times. http://www.nytimes.com/2015/12/13/us/san-bernardino-attacks-
us-visa-process-tashfeen-maliks-remarks-on-social-media-about-jihad-were-missed.html?_r=0.
3) Tashfeen Malik reportedly passed background checks despite questionable social media posts, Fox News, http://www.foxnews.com/us/2015/12/13/tashfeen-
malik-reportedly-passed-background-checks-despite-questionable-social/.
4) Evan Bleier, REVEALED: San Bernardino terrorist Tashfeen Malik openly supported violent jihad on social media yet still passed THREE background checks to
gain entry into America, Daily Mail, http://www.dailymail.co.uk/news/article-3357799/Tashfeen-Malik-discussed-jihad-social-media-getting-visa-carrying-San-
Bernardino-shooting.html
5) Samantha House. Syracuse University officers charge former student with making threat.Syracuse.com.
http://www.syracuse.com/crime/index.ssf/2015/11/syracuse_university_officers_charge_former_student_with_making_threat.html
6) Yamiche Alcindor and Doug Stanglin, 2 suspects arrested in social media threats at Missouri campuses. USA TODAY,
http://www.usatoday.com/story/news/2015/11/11/some-at-u-of-missouri-on-edge-after-social-media-threats-of-violence/75559034/
7) Aryeh Savir, Tazpit. ynetnews App helps Israelis seek bomb shelters. http://www.ynetnews.com/articles/0,7340,L-4353723,00.html
8) Molly McHugh. After Paris Attacks, Parisians Use Hashtag to Offer Shelter. Wired.com http://www.wired.com/2015/11/paris-attacks-parisians-use-porteouverte-
hashtag-to-seek-offer-safe-shelter/

More Related Content

What's hot

Mass media and communication
Mass media and communication Mass media and communication
Mass media and communication NiraliMakvana1
 
Thought Leadership in Cybersecurity, Emerging Technologies, Homeland Security...
Thought Leadership in Cybersecurity, Emerging Technologies, Homeland Security...Thought Leadership in Cybersecurity, Emerging Technologies, Homeland Security...
Thought Leadership in Cybersecurity, Emerging Technologies, Homeland Security...Chuck Brooks
 
2020 12 nyu-workshop_cog_sec
2020 12 nyu-workshop_cog_sec2020 12 nyu-workshop_cog_sec
2020 12 nyu-workshop_cog_secSara-Jayne Terp
 
lis 3201 Final presentation
lis 3201 Final presentationlis 3201 Final presentation
lis 3201 Final presentationMonte VanDyke
 
Exploring Fake News and Alternative Facts
Exploring Fake News and Alternative FactsExploring Fake News and Alternative Facts
Exploring Fake News and Alternative FactsJonathan Bacon
 
Government 2.0 Defined
Government 2.0 DefinedGovernment 2.0 Defined
Government 2.0 DefinedWalter Schwabe
 
How To Set Up Social Media Sites - Some new stuff | Crash, BOOM, tweet…with a...
How To Set Up Social Media Sites - Some new stuff | Crash, BOOM, tweet…with a...How To Set Up Social Media Sites - Some new stuff | Crash, BOOM, tweet…with a...
How To Set Up Social Media Sites - Some new stuff | Crash, BOOM, tweet…with a...Lee Yount
 
Social media use in times of crisis
Social media use in times of crisisSocial media use in times of crisis
Social media use in times of crisisInes Mergel
 
Social Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social MediaSocial Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social MediaTyler Shields
 
Misinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the WorldMisinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the WorldCharles Mok
 
Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...
Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...
Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...Charles Mok
 
Updated flipbook
Updated flipbookUpdated flipbook
Updated flipbookMika Ch
 
The case for integrating crisis response with social media
The case for integrating crisis response with social media The case for integrating crisis response with social media
The case for integrating crisis response with social media American Red Cross
 
Wikileaks script
Wikileaks scriptWikileaks script
Wikileaks script043cyeung
 
Crossing the Line: The Law of War and Cyber Engagement - A Symposium
Crossing the Line: The Law of War and Cyber Engagement - A SymposiumCrossing the Line: The Law of War and Cyber Engagement - A Symposium
Crossing the Line: The Law of War and Cyber Engagement - A SymposiumJonathan Meyer
 
Instructions please write a 5 page paper answering the question con
Instructions please write a 5 page paper answering the question conInstructions please write a 5 page paper answering the question con
Instructions please write a 5 page paper answering the question consimba35
 

What's hot (19)

Mass media and communication
Mass media and communication Mass media and communication
Mass media and communication
 
Thought Leadership in Cybersecurity, Emerging Technologies, Homeland Security...
Thought Leadership in Cybersecurity, Emerging Technologies, Homeland Security...Thought Leadership in Cybersecurity, Emerging Technologies, Homeland Security...
Thought Leadership in Cybersecurity, Emerging Technologies, Homeland Security...
 
2020 12 nyu-workshop_cog_sec
2020 12 nyu-workshop_cog_sec2020 12 nyu-workshop_cog_sec
2020 12 nyu-workshop_cog_sec
 
lis 3201 Final presentation
lis 3201 Final presentationlis 3201 Final presentation
lis 3201 Final presentation
 
Exploring Fake News and Alternative Facts
Exploring Fake News and Alternative FactsExploring Fake News and Alternative Facts
Exploring Fake News and Alternative Facts
 
Government 2.0 Defined
Government 2.0 DefinedGovernment 2.0 Defined
Government 2.0 Defined
 
How To Set Up Social Media Sites - Some new stuff | Crash, BOOM, tweet…with a...
How To Set Up Social Media Sites - Some new stuff | Crash, BOOM, tweet…with a...How To Set Up Social Media Sites - Some new stuff | Crash, BOOM, tweet…with a...
How To Set Up Social Media Sites - Some new stuff | Crash, BOOM, tweet…with a...
 
Social media use in times of crisis
Social media use in times of crisisSocial media use in times of crisis
Social media use in times of crisis
 
Social Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social MediaSocial Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social Media
 
Misinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the WorldMisinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the World
 
Wiki leaks
Wiki leaksWiki leaks
Wiki leaks
 
Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...
Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...
Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...
 
Updated flipbook
Updated flipbookUpdated flipbook
Updated flipbook
 
The case for integrating crisis response with social media
The case for integrating crisis response with social media The case for integrating crisis response with social media
The case for integrating crisis response with social media
 
Wikileaks script
Wikileaks scriptWikileaks script
Wikileaks script
 
Rahm 2.0
Rahm 2.0Rahm 2.0
Rahm 2.0
 
Situational Awareness Through Social Media
 Situational Awareness Through Social Media  Situational Awareness Through Social Media
Situational Awareness Through Social Media
 
Crossing the Line: The Law of War and Cyber Engagement - A Symposium
Crossing the Line: The Law of War and Cyber Engagement - A SymposiumCrossing the Line: The Law of War and Cyber Engagement - A Symposium
Crossing the Line: The Law of War and Cyber Engagement - A Symposium
 
Instructions please write a 5 page paper answering the question con
Instructions please write a 5 page paper answering the question conInstructions please write a 5 page paper answering the question con
Instructions please write a 5 page paper answering the question con
 

Viewers also liked

Technical_Update_Germany
Technical_Update_GermanyTechnical_Update_Germany
Technical_Update_GermanyBogdan Doinea
 
Capstone Industrial Distribution_Q4 2015
Capstone Industrial Distribution_Q4 2015Capstone Industrial Distribution_Q4 2015
Capstone Industrial Distribution_Q4 2015Todd McMahon
 
Ppis 12-dec-muryono
Ppis 12-dec-muryonoPpis 12-dec-muryono
Ppis 12-dec-muryonoPPI Sendai
 
Buckinghamshire
BuckinghamshireBuckinghamshire
BuckinghamshireCanh Ket
 
Etude IPSOS pour HEC Au Féminin "Sortez du cadre"
Etude IPSOS pour HEC Au Féminin "Sortez du cadre"Etude IPSOS pour HEC Au Féminin "Sortez du cadre"
Etude IPSOS pour HEC Au Féminin "Sortez du cadre"Caroline BIROS
 
Smedema - Vita 12-8-2015
Smedema - Vita 12-8-2015Smedema - Vita 12-8-2015
Smedema - Vita 12-8-2015Susan Smedema
 
Hyperparathyroïdie
HyperparathyroïdieHyperparathyroïdie
HyperparathyroïdieMede Space
 
Optimization of 3 d geometrical soil model for multiple footing resting on sand
Optimization of 3 d geometrical soil model for multiple footing resting on sandOptimization of 3 d geometrical soil model for multiple footing resting on sand
Optimization of 3 d geometrical soil model for multiple footing resting on sandeSAT Journals
 
Performance analysis of active clamped interleaved fly-back inverter for phot...
Performance analysis of active clamped interleaved fly-back inverter for phot...Performance analysis of active clamped interleaved fly-back inverter for phot...
Performance analysis of active clamped interleaved fly-back inverter for phot...eSAT Journals
 
Microbial community analysis in anaerobic palm oil mill effluent (pome) waste...
Microbial community analysis in anaerobic palm oil mill effluent (pome) waste...Microbial community analysis in anaerobic palm oil mill effluent (pome) waste...
Microbial community analysis in anaerobic palm oil mill effluent (pome) waste...eSAT Journals
 
Đề luyện thi trắc nghiệm môn Toán lần 2 THPT Quốc gia 2017
Đề luyện thi trắc nghiệm môn Toán lần 2 THPT Quốc gia 2017Đề luyện thi trắc nghiệm môn Toán lần 2 THPT Quốc gia 2017
Đề luyện thi trắc nghiệm môn Toán lần 2 THPT Quốc gia 2017haic2hv.net
 
50 câu hỏi trắc nghiệm thể tích khối đa diện phần 3 - Nhóm Toán | iHoc.me
50 câu hỏi trắc nghiệm thể tích khối đa diện phần 3 - Nhóm Toán | iHoc.me50 câu hỏi trắc nghiệm thể tích khối đa diện phần 3 - Nhóm Toán | iHoc.me
50 câu hỏi trắc nghiệm thể tích khối đa diện phần 3 - Nhóm Toán | iHoc.mehaic2hv.net
 
[iHoc.me] 81 câu hỏi trắc nghiệm có đáp án hàm số mũ, hàm số logarit
[iHoc.me] 81 câu hỏi trắc nghiệm có đáp án hàm số mũ, hàm số logarit[iHoc.me] 81 câu hỏi trắc nghiệm có đáp án hàm số mũ, hàm số logarit
[iHoc.me] 81 câu hỏi trắc nghiệm có đáp án hàm số mũ, hàm số logarithaic2hv.net
 
Revisi MAKALAH penggunaan metode dalam pembelajaran dan strategi pembelajaran...
Revisi MAKALAH penggunaan metode dalam pembelajaran dan strategi pembelajaran...Revisi MAKALAH penggunaan metode dalam pembelajaran dan strategi pembelajaran...
Revisi MAKALAH penggunaan metode dalam pembelajaran dan strategi pembelajaran...Khusnul Kotimah
 
Sales Promotion – Parachute Oil
Sales Promotion – Parachute OilSales Promotion – Parachute Oil
Sales Promotion – Parachute OilShahzad Khan
 
747 bài tập trắc nghiệm cực trị hàm số toán 12 luyện thi năm 2017
747 bài tập trắc nghiệm cực trị hàm số toán 12 luyện thi năm 2017747 bài tập trắc nghiệm cực trị hàm số toán 12 luyện thi năm 2017
747 bài tập trắc nghiệm cực trị hàm số toán 12 luyện thi năm 2017haic2hv.net
 
Luxtation du coude
Luxtation du coudeLuxtation du coude
Luxtation du coudeMede Space
 

Viewers also liked (20)

Technical_Update_Germany
Technical_Update_GermanyTechnical_Update_Germany
Technical_Update_Germany
 
Capstone Industrial Distribution_Q4 2015
Capstone Industrial Distribution_Q4 2015Capstone Industrial Distribution_Q4 2015
Capstone Industrial Distribution_Q4 2015
 
Ppis 12-dec-muryono
Ppis 12-dec-muryonoPpis 12-dec-muryono
Ppis 12-dec-muryono
 
Buckinghamshire
BuckinghamshireBuckinghamshire
Buckinghamshire
 
Seguridad Industrial
Seguridad IndustrialSeguridad Industrial
Seguridad Industrial
 
Etude IPSOS pour HEC Au Féminin "Sortez du cadre"
Etude IPSOS pour HEC Au Féminin "Sortez du cadre"Etude IPSOS pour HEC Au Féminin "Sortez du cadre"
Etude IPSOS pour HEC Au Féminin "Sortez du cadre"
 
Smedema - Vita 12-8-2015
Smedema - Vita 12-8-2015Smedema - Vita 12-8-2015
Smedema - Vita 12-8-2015
 
Hyperparathyroïdie
HyperparathyroïdieHyperparathyroïdie
Hyperparathyroïdie
 
Optimization of 3 d geometrical soil model for multiple footing resting on sand
Optimization of 3 d geometrical soil model for multiple footing resting on sandOptimization of 3 d geometrical soil model for multiple footing resting on sand
Optimization of 3 d geometrical soil model for multiple footing resting on sand
 
Performance analysis of active clamped interleaved fly-back inverter for phot...
Performance analysis of active clamped interleaved fly-back inverter for phot...Performance analysis of active clamped interleaved fly-back inverter for phot...
Performance analysis of active clamped interleaved fly-back inverter for phot...
 
Microbial community analysis in anaerobic palm oil mill effluent (pome) waste...
Microbial community analysis in anaerobic palm oil mill effluent (pome) waste...Microbial community analysis in anaerobic palm oil mill effluent (pome) waste...
Microbial community analysis in anaerobic palm oil mill effluent (pome) waste...
 
Paradigmes et habitudes en mouvement
Paradigmes et habitudes en mouvementParadigmes et habitudes en mouvement
Paradigmes et habitudes en mouvement
 
Đề luyện thi trắc nghiệm môn Toán lần 2 THPT Quốc gia 2017
Đề luyện thi trắc nghiệm môn Toán lần 2 THPT Quốc gia 2017Đề luyện thi trắc nghiệm môn Toán lần 2 THPT Quốc gia 2017
Đề luyện thi trắc nghiệm môn Toán lần 2 THPT Quốc gia 2017
 
Kétamine dans le Trauma Cranien : Oui ou Oui ?
Kétamine dans le Trauma Cranien : Oui ou Oui ?Kétamine dans le Trauma Cranien : Oui ou Oui ?
Kétamine dans le Trauma Cranien : Oui ou Oui ?
 
50 câu hỏi trắc nghiệm thể tích khối đa diện phần 3 - Nhóm Toán | iHoc.me
50 câu hỏi trắc nghiệm thể tích khối đa diện phần 3 - Nhóm Toán | iHoc.me50 câu hỏi trắc nghiệm thể tích khối đa diện phần 3 - Nhóm Toán | iHoc.me
50 câu hỏi trắc nghiệm thể tích khối đa diện phần 3 - Nhóm Toán | iHoc.me
 
[iHoc.me] 81 câu hỏi trắc nghiệm có đáp án hàm số mũ, hàm số logarit
[iHoc.me] 81 câu hỏi trắc nghiệm có đáp án hàm số mũ, hàm số logarit[iHoc.me] 81 câu hỏi trắc nghiệm có đáp án hàm số mũ, hàm số logarit
[iHoc.me] 81 câu hỏi trắc nghiệm có đáp án hàm số mũ, hàm số logarit
 
Revisi MAKALAH penggunaan metode dalam pembelajaran dan strategi pembelajaran...
Revisi MAKALAH penggunaan metode dalam pembelajaran dan strategi pembelajaran...Revisi MAKALAH penggunaan metode dalam pembelajaran dan strategi pembelajaran...
Revisi MAKALAH penggunaan metode dalam pembelajaran dan strategi pembelajaran...
 
Sales Promotion – Parachute Oil
Sales Promotion – Parachute OilSales Promotion – Parachute Oil
Sales Promotion – Parachute Oil
 
747 bài tập trắc nghiệm cực trị hàm số toán 12 luyện thi năm 2017
747 bài tập trắc nghiệm cực trị hàm số toán 12 luyện thi năm 2017747 bài tập trắc nghiệm cực trị hàm số toán 12 luyện thi năm 2017
747 bài tập trắc nghiệm cực trị hàm số toán 12 luyện thi năm 2017
 
Luxtation du coude
Luxtation du coudeLuxtation du coude
Luxtation du coude
 

Similar to Com 427 final presentation

64The Empire Strikes Back Social Media Uprisings and .docx
64The Empire Strikes Back Social Media Uprisings and .docx64The Empire Strikes Back Social Media Uprisings and .docx
64The Empire Strikes Back Social Media Uprisings and .docxevonnehoggarth79783
 
CDG14_BRIEF_ArchiveSocial_V
CDG14_BRIEF_ArchiveSocial_VCDG14_BRIEF_ArchiveSocial_V
CDG14_BRIEF_ArchiveSocial_VBronlea Mishler
 
Social Media & Emergencies for the National Capital Region
Social Media & Emergencies for the National Capital RegionSocial Media & Emergencies for the National Capital Region
Social Media & Emergencies for the National Capital RegionGreg Licamele
 
Technology & Society#SocialChangeA preeminent form of social.docx
Technology & Society#SocialChangeA preeminent form of social.docxTechnology & Society#SocialChangeA preeminent form of social.docx
Technology & Society#SocialChangeA preeminent form of social.docxmattinsonjanel
 
Digital Keepers: Ethics of Saving Online Data About Latin American Social Mo...
Digital Keepers:  Ethics of Saving Online Data About Latin American Social Mo...Digital Keepers:  Ethics of Saving Online Data About Latin American Social Mo...
Digital Keepers: Ethics of Saving Online Data About Latin American Social Mo...Itza Carbajal
 
Social Media's New Role in Disaster Response
Social Media's New Role in Disaster ResponseSocial Media's New Role in Disaster Response
Social Media's New Role in Disaster ResponseMeredith Binns
 
SANSFIRE - Elections, Deceptions and Political Breaches
SANSFIRE - Elections, Deceptions and Political BreachesSANSFIRE - Elections, Deceptions and Political Breaches
SANSFIRE - Elections, Deceptions and Political BreachesJohn Bambenek
 
Twitter And Social Justice
Twitter And Social JusticeTwitter And Social Justice
Twitter And Social JusticeJodi Sperber
 
Capstone Lessons Learned
Capstone Lessons LearnedCapstone Lessons Learned
Capstone Lessons LearnedGuy DeMarco
 
How information spreads on social networks when unexpected events occur
How information spreads on social networks when unexpected events occurHow information spreads on social networks when unexpected events occur
How information spreads on social networks when unexpected events occurFarida Vis
 
Invasion Of Privacy In Canadian Media
Invasion Of Privacy In Canadian MediaInvasion Of Privacy In Canadian Media
Invasion Of Privacy In Canadian MediaKelly Ratkovic
 
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...Maurice Dawson
 
Communication Theories - Knowledge Gap & Modernization Theory
Communication Theories - Knowledge Gap & Modernization Theory Communication Theories - Knowledge Gap & Modernization Theory
Communication Theories - Knowledge Gap & Modernization Theory Alyssa G. Lobo
 
Amend Section 230 Now
Amend Section 230 NowAmend Section 230 Now
Amend Section 230 NowCady11
 
Weapons of-mass-distraction-foreign-state-sponsored-disinformation-in-the-dig...
Weapons of-mass-distraction-foreign-state-sponsored-disinformation-in-the-dig...Weapons of-mass-distraction-foreign-state-sponsored-disinformation-in-the-dig...
Weapons of-mass-distraction-foreign-state-sponsored-disinformation-in-the-dig...archiejones4
 
Cyber Security in the Age of Globalization
Cyber Security in the Age of GlobalizationCyber Security in the Age of Globalization
Cyber Security in the Age of GlobalizationBenjamin Morley
 
Presentation
PresentationPresentation
Presentationokunka
 
Presentation
PresentationPresentation
Presentationospinaan
 

Similar to Com 427 final presentation (20)

64The Empire Strikes Back Social Media Uprisings and .docx
64The Empire Strikes Back Social Media Uprisings and .docx64The Empire Strikes Back Social Media Uprisings and .docx
64The Empire Strikes Back Social Media Uprisings and .docx
 
CDG14_BRIEF_ArchiveSocial_V
CDG14_BRIEF_ArchiveSocial_VCDG14_BRIEF_ArchiveSocial_V
CDG14_BRIEF_ArchiveSocial_V
 
Social Media & Emergencies for the National Capital Region
Social Media & Emergencies for the National Capital RegionSocial Media & Emergencies for the National Capital Region
Social Media & Emergencies for the National Capital Region
 
Technology & Society#SocialChangeA preeminent form of social.docx
Technology & Society#SocialChangeA preeminent form of social.docxTechnology & Society#SocialChangeA preeminent form of social.docx
Technology & Society#SocialChangeA preeminent form of social.docx
 
Digital Keepers: Ethics of Saving Online Data About Latin American Social Mo...
Digital Keepers:  Ethics of Saving Online Data About Latin American Social Mo...Digital Keepers:  Ethics of Saving Online Data About Latin American Social Mo...
Digital Keepers: Ethics of Saving Online Data About Latin American Social Mo...
 
Social Media's New Role in Disaster Response
Social Media's New Role in Disaster ResponseSocial Media's New Role in Disaster Response
Social Media's New Role in Disaster Response
 
SANSFIRE - Elections, Deceptions and Political Breaches
SANSFIRE - Elections, Deceptions and Political BreachesSANSFIRE - Elections, Deceptions and Political Breaches
SANSFIRE - Elections, Deceptions and Political Breaches
 
Twitter And Social Justice
Twitter And Social JusticeTwitter And Social Justice
Twitter And Social Justice
 
Capstone Lessons Learned
Capstone Lessons LearnedCapstone Lessons Learned
Capstone Lessons Learned
 
How information spreads on social networks when unexpected events occur
How information spreads on social networks when unexpected events occurHow information spreads on social networks when unexpected events occur
How information spreads on social networks when unexpected events occur
 
Presentation
PresentationPresentation
Presentation
 
Invasion Of Privacy In Canadian Media
Invasion Of Privacy In Canadian MediaInvasion Of Privacy In Canadian Media
Invasion Of Privacy In Canadian Media
 
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
 
Communication Theories - Knowledge Gap & Modernization Theory
Communication Theories - Knowledge Gap & Modernization Theory Communication Theories - Knowledge Gap & Modernization Theory
Communication Theories - Knowledge Gap & Modernization Theory
 
Amend Section 230 Now
Amend Section 230 NowAmend Section 230 Now
Amend Section 230 Now
 
Weapons of-mass-distraction-foreign-state-sponsored-disinformation-in-the-dig...
Weapons of-mass-distraction-foreign-state-sponsored-disinformation-in-the-dig...Weapons of-mass-distraction-foreign-state-sponsored-disinformation-in-the-dig...
Weapons of-mass-distraction-foreign-state-sponsored-disinformation-in-the-dig...
 
Cyber Security in the Age of Globalization
Cyber Security in the Age of GlobalizationCyber Security in the Age of Globalization
Cyber Security in the Age of Globalization
 
The Role of Social Media in Da'awah
The Role of Social Media in Da'awahThe Role of Social Media in Da'awah
The Role of Social Media in Da'awah
 
Presentation
PresentationPresentation
Presentation
 
Presentation
PresentationPresentation
Presentation
 

Com 427 final presentation

  • 2. Introduction ● A majority of the time, social media creates a community ● Issues begin to arise during times of crisis/emergency when social media users endanger themselves and others ● Certain social media platforms are more vulnerable to safety threats than others (Twitter vs. LinkedIn) ● Two main issues involving personal safety/security: Identifying locations and targeted threats
  • 5. ParisAttacks #porteouverte Parisians used the hashtag to signal that they needed a safe place to go, or have a safe place to offer (McHugh, 2015) The hashtag became inundated with inspirational messages, pushing down the tweets citizens could actually use to the bottom of the stream
  • 7. Screeningsocialmediaaccounts Should the government be allowed access to the public's social media platforms for background checks upon entering the U.S.? → In early 2015 the secret policy that prohibited immigration officials to utilize social media platforms for all immigrants applying for U.S. visas was renewed by Homeland Security Secretary Jeh Johnson despite controversy. (Apuzzo,Schmidt,Preston, NYT) → Some may argue that it is an invasion of privacy for the government to hack into our social media accounts.
  • 8. → On July 27th 2014, Tashfeen Malik and her husband entered the U.S. (Figure 1, 2015. CNN Headline.) → San Bernardino attacks occurred on Dec. 2, 2015 → Years before entering the U.S., Tashfeen Malik direct messaged people over social media saying how she wanted to commit jihad and martyrdom.(Evan Bleier, Daily Mail)
  • 9. → None of the messages were discovered in the screening process. → The Immigration department has no program that is known to screen social media platforms. → Time concerns are not an issue because our advanced technology has the ability to identify these “red flags” for the immigration department. (Apuzzo,Schmidt,Preston, NYT) → National security has become a major concern
  • 10. → Former SU Student posts anonymous tip on Yik Yak about harming others. → DPS and Syracuse police were able to stop the individual and locate them because of his social media post. (Samantha House, Syracuse.com) Another Example... → Two students were arrested at the University of Northwest Missouri after posting anonymously on Yik Yak about shooting black students on campus.(Alcindor and Stanglin. USA TODAY)
  • 11. → What would it be like if a social media screening program existed during the immigration process to the U.S.? Would these red flags have been found? → Where do you draw the line? → What is the threshold of people's comments that would allow suspicion and call for further investigation?
  • 13. PossibleSolutions ➔ It comes down to a question of ethics ◆ How far should the government be able to go? Once the access is granted, it would be very difficult to get back ◆ How much do they have access to already? ➔ Should they be granted access, there must be guidelines ◆ Protection of freedom of speech ➔ More location based services (like Facebook check-ins) ◆ Separate streams by location ◆ City based apps
  • 14. References 1) Figure 1, 2015. CNN Headline. http://www.cnn.com/2015/12/14/us/san-bernardino-shooting/ 2) Visa Process Missed San Bernardino Wife’s Zealotry on Social Media, The New York Times. http://www.nytimes.com/2015/12/13/us/san-bernardino-attacks- us-visa-process-tashfeen-maliks-remarks-on-social-media-about-jihad-were-missed.html?_r=0. 3) Tashfeen Malik reportedly passed background checks despite questionable social media posts, Fox News, http://www.foxnews.com/us/2015/12/13/tashfeen- malik-reportedly-passed-background-checks-despite-questionable-social/. 4) Evan Bleier, REVEALED: San Bernardino terrorist Tashfeen Malik openly supported violent jihad on social media yet still passed THREE background checks to gain entry into America, Daily Mail, http://www.dailymail.co.uk/news/article-3357799/Tashfeen-Malik-discussed-jihad-social-media-getting-visa-carrying-San- Bernardino-shooting.html 5) Samantha House. Syracuse University officers charge former student with making threat.Syracuse.com. http://www.syracuse.com/crime/index.ssf/2015/11/syracuse_university_officers_charge_former_student_with_making_threat.html 6) Yamiche Alcindor and Doug Stanglin, 2 suspects arrested in social media threats at Missouri campuses. USA TODAY, http://www.usatoday.com/story/news/2015/11/11/some-at-u-of-missouri-on-edge-after-social-media-threats-of-violence/75559034/ 7) Aryeh Savir, Tazpit. ynetnews App helps Israelis seek bomb shelters. http://www.ynetnews.com/articles/0,7340,L-4353723,00.html 8) Molly McHugh. After Paris Attacks, Parisians Use Hashtag to Offer Shelter. Wired.com http://www.wired.com/2015/11/paris-attacks-parisians-use-porteouverte- hashtag-to-seek-offer-safe-shelter/

Editor's Notes

  1. -What is this picture? -Local outlets were tweeting out updates, but what’s the issue with tweeting out your real-time location?