Presentation<br /><ul><li>In this presentation, we will discuss:</li></ul>The history of privacy and online social networking<br />Perceptions of privacy<br />Privacy risks and consequences<br />Tools for teaching privacy<br />
A Brief History of Online Social Networking<br />
What is Online Social Networking?<br /><ul><li>Construct a public or semi-public profile within a bounded system
Articulate a list of other users with whom they share a connection
View and traverse their list of connections and those made by others within the system. The nature and nomenclature of these connections may vary from site to site</li></li></ul><li>1945: Memex<br /><ul><li>First mention of personal computer
“Wholly new forms of encyclopedias will appear, ready-made with a mesh of associative trails running through them, ready to be dropped into the memex and there amplified.”
Predicted many kinds of technology invented such as the Internet the World Wide Web and Wikipedia</li></li></ul><li>1962: Advanced Research Project Agency<br /><ul><li>Resulted in the creation of commercial time-sharing systems
“There has to be some way of facilitating communication among people without bringing them together in one place.”</li></ul> - Dr. J.C.R. Licklider<br />
1960’s-1970’s: Electronic Mail <br /><ul><li>1965 - First email system was MAILBOX, used at MIT
Email could only be used to send messages to various users of the same computer.
With computer internetworking, electronic mail required an address just like the postal system
1972 – Ray Tomlinson is credited with inventing email </li></li></ul><li>1980’s: Bulletin Board Systems<br /><ul><li>Online meeting places
Allowed users to communicate with a central system
Could download files or games (many times including pirated software) and post messages to other users. </li></li></ul><li>BBS: FidoNet<br />How to set up an account:<br /><ul><li>Gain a basic understanding of Fidonet and your software. Download the POLICY4.ZIP document from a nearby FidoNet BBS. Read this thoroughly.
Then read it again. Do the same with your software's documentation. You will also need a current copy of the FidonetNodelist.
Set up your BBS. Make sure it operates correctly, to the best of your knowledge.
Follow, to the letter, the procedure outlined in POLICY4 for joining Fidonet. The request *MUST* come in as a Netmail message. This shows the NC that your system is indeed capable of exchanging mail -- the basic requirement for membership. Do NOT request a node number in a LOCAL message on your NC's system, it will only delay the process, and may even be simply ignored.
Be patient. It may take up to 2 weeks for your request to be fully processed and appear in the Nodelist. Remember that your NC may not be able to contact you at all until your address becomes official. </li></li></ul><li>1989 through Early 1990’s: America Online<br /><ul><li>At it’s peak, had over 30 million members
Began as forum to play video games and track high scores
Created concept of chat rooms </li></li></ul><li>1997: Sixdegrees<br /><ul><li>Many consider this the first social networking site
Privacy is NOT solitude<br /><ul><li>Essentially meaningless in the context of Social Networks
Teens want to be connected 24/7</li></li></ul><li>Is privacy anonymity?<br /><ul><li>Anonymity precludes the need for privacy</li></ul> but…<br /><ul><li>Can you be sure you’re anonymous online?</li></li></ul><li>What about secrecy?<br /><ul><li>Remember – once posted, information is in the public sphere
Best way to keep a secret: Don’t share it!</li></li></ul><li>Underlying Issue: Control<br /><ul><li>You have NO control over the information others share…even if it’s about you!
You CAN control the information YOU share (and access to it!)</li></li></ul><li>Don’t I Have a Right to Privacy?<br />The constitution only guarantees freedom from governmental intrusion<br />
Something to Know About…<br />Deleting Online Predators Act of 2006<br /><ul><li>Intended to Protect Children
Could require libraries to block access to Social Networking Sites
The keg party consisted of a group of students eating cupcakes with the word “beer” written on them
Confirmed their belief that university and police officials WERE monitoring their activity!</li></li></ul><li>Who are we affecting when we post other people’s information?<br /><ul><li>How many of you have heard of the “Star Wars Kid”?
Seen by millions and millions of viewers</li></ul>Not just ourselves!<br />Have you seen me?<br />
What happened to him?<br /><ul><li>People remixed the video of him with special effects and Star Wars music, “mashed” it with other movies
Appeared in a video game and on several TV shows
More or less disappeared</li></li></ul><li>Whose reputation are you ruining?<br /><ul><li>What employees post during the work day and what they post about their company are things they SHOULD be aware they will be held accountable for
Companies like IBM developing extensive policies – must be signed and read each year
Outlines that you must be upfront about your identity and position at IBM when blogging and what constitutes “suitable behavior” on social media sites (such as Twitter and Facebook)</li></li></ul><li>How about our own reputation being at stake?<br /><ul><li>We usually take pride in our reputation
He took down all photos but one on his Facebook profile
Apologized profusely to Clinton and her team</li></li></ul><li>Employers Not Taking Us Seriously…<br /><ul><li>A substantial proportion of employers are screening social networking sites before they hire a prospective employee
35% of employers have not hired someone because of something they found online</li></li></ul><li>So…who else is paying attention?<br /><ul><li>We don’t even know!
Nearly 4 in 10 Facebook and Twitter users have posted specifics on holiday plans or statuses on holiday getaways
Posting even your birthday on Facebook can allow others to “predict” your SSN
In new study, researchers were able to predict SSN of recently born with 60% accuracy (of 1000 tries)
Can be used to steal identity and/or open credit cards in someone’s name</li></li></ul><li>Tools and Methods for Protecting your Online Image<br />
You CAN protect your online privacy and reputation with just a few simple steps<br />
Facebook<br /><ul><li>Adjust your Privacy Settings
Read the fine print on all those applications and quizzes
Consider using separate Facebook profiles for your professional and social life
Be mindful about what you post</li></li></ul><li>flickr<br /><ul><li>Adjust your Privacy and Permissions settings, your Profile privacy, and your account search options
Consider licensing your photos under a Creative Commons license
Again, be careful about what you share</li></li></ul><li>Google<br /><ul><li>Google yourself and seewhatpopsup
Contact the site's webmaster to see if you can have unwanted information removed
Consider signing up for an online monitoring service such as ReputationDefender.com</li></li></ul><li>Twitter<br /><ul><li>Twitter is generally considered a fairly public platform, but there are still steps that you can take to make your content more private if you prefer:
One more time: be mindful about what you post</li></li></ul><li>And in general…<br /><ul><li>Always be sure to readthefineprint before signing up for a new online tool
Check regularly for new or altered online content- BE VIGILANT!</li></ul> Finally (all together now): Be mindful about what you post or share!<br />
Citations<br /><ul><li>Barnes, Susan B. “A privacy paradox: Social networking in the United States.” First Monday 11.9 (2006). http://firstmonday.org/issues/issue11_9/barnes/index.html. 8 Dec. 2009.
Blakley, Bob. “What is Privacy, Really?” 12 September 2006. The Burton Group. http://podcast.burtongroup.com/ip/files/what_is_privacy_really.pdf 10 Dec 2009.
Brandenburg, Carly. "The Newest Way to Screen Job Applicants: A Social Networker's Nightmare." Federal Communications Law Journal 60.3 (2008): 597-626. Academic Search Premier. Web. 1 Dec. 2009.
Claburn, Thomas. "Social Security Number Prediction Makes Identity Theft Easy." InformationWeek (2009). Http://www.informationweek.com. 7 July 2009. Web. 1 Dec. 2009. <http://www.informationweek.com/news/security/privacy/showArticle.jhtml?articleID=218400854>.
Couch, C. (2009). Fix Twitter and Facebook. Time Out Chicago Retrieved December 7,2009, from http://chicago.timeout.com/articles/features/81016/fix-twitter-and-facebook
Ensign, E. (2009). Facebook Quitters. Time Out Chicago. Retrieved December 7, 2009 from http://chicago.timeout.com/articles/features/81051/love-your-online-life-again
"Forty-five Percent of Employers Use Social Networking Sites to Research Job Candidates, CareerBuilder Survey Finds". CareerBuilder.com. CareerBuilder.com, 19 Aug. 2009. Web. 5 Dec. 2009 <http://www.careerbuilder.com/share/aboutus/pressreleasesdetail.aspx?id=pr519&sd=8%2f19%2f2009&ed=12%2f31%2f2009&siteid=cbpr&sc_cmp1=cb_pr519_>
George, Alison. "Things You Wouldn't Tell Your Mother." New Scientist 191.2569 (2006): 50-51. Academic Search Premier. Web. 1 Dec. 2009.
Gonsalves, Antone. "Social Networkers Risk More than Just Privacy." Information Week (2009). Information Week. 27 Aug. 2009. Web. 1 Dec. 2009. <http://www.informationweek.com/news/internet/social_network/showArticle.jhtml?articleID=219500360http://www.informationweek.com/news/internet/social_network/showArticle.jhtml?articleID=219500360>. </li></li></ul><li>Citations<br /><ul><li>Fidonet. (Full Date of publication). How to Join Fidonet. Fidonet.com. Retrieved November 20, 2009, from http://www.fidonet.org/old/genlinfo.html
Haythornthwaite, C. (1996). Social network analysis: An approach and set of techniques for the study of information exchange. Library and Information Science Research, 18(4), 323-342.
“How To Protect, Fix Your Online Reputation: Expert Explains Dangers Of Negative Web Postings, And Tells How To Avoid And Repair Them". CBS News.com: The Early Show. CBS Corporation, 10 Jan. 2009. Web. 5 Dec. 2009 http://www.cbsnews.com/stories/2009/01/10/earlyshow/main4711988.shtml
Huang, Phil "How You Can Protect Public Access Computers and Their Users." Computers in Libraries 27.5 (2007): 16-20. ERIC. EBSCO. Web. 8 Dec. 2009.
"Internet, communications and other technologies". Australian Government: Office of the Privacy Commissioner. Australian Government, n.d. Web. 5 Dec. 2009 http://www.privacy.gov.au/topics/technologies
Kamen, Al. "One More Question." The Washington Post. 4 Dec. 2008. Web. 1 Dec. 2009. <http://voices.washingtonpost.com/44/2008/12/04/one_more_question.html>.
Kaste, Martin. "Is Your Facebook Profile As Private As You Think?". NPR.org: All Things Considered. National Public Radio, 27 Oct. 2009. Web. 5 Dec. 2009 <http://www.npr.org/templates/story/story.php?storyId=114187478&sc=emaf>
Kluth, Andreas. "The Perils of Sharing." Economist (2008): 28. Print.
Kranich, Nancy "Librarians and Teen Privacy in the Age of Social Networking." Knowledge Quest 36.(2007): 34-37. ERIC. EBSCO. Web. 8 Dec. 2009.
Lenhart, Amanda and Mary Madden. “Teens, Privacy & Online Social Networks: How teens manage their online identities and personal information in the age of MySpace.” Pew Internet and American Life Project (18 April 2007). 11 Dec 2009. http://www.atg.was.gov/uploadedFiles/Another/Office_Initiatives/Teens,Privacy%20and%20Social%20Networks.pdf</li></li></ul><li>Citations<br /><ul><li>Lorenz, Kate. "Employers are digging up your digital dirt". The Work Buzz. CareerBuilder.com, 19 Aug. 2009. Web. 5 Dec. 2009 <http://www.theworkbuzz.com/job-surveys/social-network/>
MacMillan, Douglas. "A Twitter Code of Conduct." BusinessWeek (2009): 26. Academic Search Premier. Web. 1 Dec. 2009.
Mangla, Ismat Sarah. "Fired for Facebook: Don't Let it Happen to You." CNN. 21 Apr. 2009. Web. 3 Dec. 2009. <http://www.cnn.com>.
McConnell, B. (2008). Social Networks from the 80’s to the 00’s. Gigaom Retrieved November 16, 2009, from http://gigaom.com/2008/01/20/social-networks-from-the-80s-to-the-00s/
Mitrano, Tracy "A Wider World: Youth, Privacy, and Social Networking Technologies." EDUCAUSE Review 41.(2006): 16-18,. ERIC. EBSCO. Web. 8 Dec. 2009.
Nyce and Kahn (n.d.) Vannevar Bush and MemexThe World Wide Web: the Beginning and Now Retrieved November 16, 2009, fromhttp://www-personal.umich.edu/~mattkaz/history/memex3.html
O'Neill, Nick. "10 Privacy Settings Every Facebook User Should Know". All Facebook. n.p, 2 Feb. 09. Web. 5 Dec. 2009 http://www.allfacebook.com/2009/02/facebook-privacy/
Peter, I. (2004). History of Email. Net History. Retrieved November 16, 2009, from http://www.nethistory.info/History%20of%20the%20Internet/email.html
Popkin, Helen A.S. "Twitter Gets You Fired in 140 Characters or Less." MSNBC. 23 Mar. 2009. Web. 1 Dec. 2009. <http://www.msnbc.com>. </li></li></ul><li>Citations<br /><ul><li>"Rules and Tools for Protecting Personal Privacy Online". Online Privacy Alliance. Online Privacy Alliance, n.d. Web. 5 Dec. 2009 http://www.privacyalliance.org/resources/rulesntools.shtml
Schmidt, Cynthia Martin "The Library Media Specialist's Role in Teaching Online Safety." Library Media Connection 28.1 (2009): 10-13. ERIC. EBSCO. Web. 8 Dec. 2009.
Sheehan, Kim Bartel “How public opinion polls define and circumscribe online privacy.” First Monday 9.7 (2004). 8 Dec. 2009. http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/1162/1082.
Solove, Daniel J. "The End of Privacy?" Scientific American 299.3 (2008): 100-06. Academic Search Premier. Web. 1 Dec. 2009.
Sydell, Laura. "Teens Take Advantage of Online Privacy Tools". NPR.org: All Things Considered. National Public Radio, 3 April 2008. Web. 5 Dec. 2009. <http://www.npr.org/templates/story/story.php?storyId=89355786>
Timm, Dianne M., and Carolyn J. Duven "Privacy and Social Networking Sites." New Directions for Student Services 124 (2008): 89-102. ERIC. EBSCO. Web. 8 Dec. 2009.
U.S. Department of Education “Family Educational Rights and Privacy Act (FERPA).” 8 Dec. 2009. http://www.ed.gov/policy/gen/guid/fpco/ferpa/index.html.
West, Heather. “Is Online Privacy a Generational Issue?” Pew Internet & American Life Project, October 1, 2009. 8 Dec. 2009. http://www.pewinternet.org/Media-Mentions/2009/Is-Online-Privacy-a-Generational-Issue.aspx.
Wikipedia (2009). YouTube. Wikipedia. Retrieved November 16, 2009, from http://en.wikipedia.org/wiki/YouTube
Yadav, Sid (2006). Facebook – The Complete Biography. Mashable: The Social Media Guide Retrieved November 20, 2009, from http://mashable.com/2006/08/25/facebook-profile/
Young Adult Library Serivices Association. “DOPA Information Packet: A Resource for Librarians and Library Workers.: 8 August 2006. 12 Dec. 2009 <http://www.ala.org/ala/mgrps/divs/yalsa/profdev/DOPAInfoPacket.pdf></li></li></ul><li>Citations – Images <br /><ul><li>“Defining Online Privacy” - http://www.anniefox.com/parents/images/keep_out_sign.jpg
“Privacy is Not Solitude” -http://media.photobucket.com/image/loneliness/spectrojin/loneliness.gif