Connecting Online

353 views

Published on

Published in: Technology, Sports
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
353
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
3
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • What you shareWhenever you post something, it is open to interpretation – they people who know you well will see it one way, the people you don’t will see it another.Who you share it withWhat you share with your friends, you may not want your employers to see and what you share with your family, you may want to keep private.
  • Consider your privacy settings. Most location-based social networks allow you to tailor your settings so you can control who sees your location – just your friends, businesses too, or perhaps anyone.Remember also that if your location-based social network is linked to a Twitter or Facebook profile, your location is shared on these networks too.
  • Connecting Online

    1. 1. Connecting Online
    2. 2. Connecting Online: Outline I do a lot on social networking sites – should I be concerned about my privacy? What’s my responsibility to my networks? Am I using location-based social networks like Foursquare or Facebook Places? What is smishing? How much information can people get from the photos I have uploaded?
    3. 3. Connecting Online: Social NetworksSocial networking involves: What you share Who you share it with Image courtesy of Eugene Kim (Flickr)
    4. 4. Connecting Online: Social NetworksSocial networking involves: Responsibility to your networks – You may be comfortable posting that photo of last night’s party – but your friend may not – Remember that people are your “friends” and “followers” – Ask for help if you need it and reach out when you can – just as you would if faced with a similar situation offline
    5. 5. Connecting Online: Trends  We are going mobile.  More than half of all adults in US own a smart phone.75% of teens. Source: http://www.pewinternet.org/ Commentary/2012/February/Pew-Internet-Mobile.aspxImage courtesy of Johan Larson (Flickr)
    6. 6. Connecting Online: Smishing (Click to view) Taken from YouTube
    7. 7. Connecting Online: Mobile Strategies If your mobile is compromised, scammers can access all the personal information on your phone Secure wifi-hotspot security. Even if you’re on your phone, the same rules apply
    8. 8. Connecting Online: Mobile Strategies Look up unknown app creators, and unknown numbers Avoid keeping too much personal information (ie. bank numbers and pins) on your phone
    9. 9. Connecting Online: Trends Who can see my location? • Geolocation • Geotagging • Privacy and safety implications of place-based apps?
    10. 10. Connecting Online: GeotaggingWho can see my location? While metadata makes it easier to organize photos, revealing metadata of your photos can be vulnerable to cyberstalking If you don’t want to be found, make sure you disable geotagging function
    11. 11. Connecting Online: Strategies Consider your privacy settings. Who are you allowing to view your location? If your location-based social network is linked to a Twitter or Facebook profile, your location is shared on these networks too
    12. 12. What’s your digital tattoo?
    13. 13. Resources My Social Network (c) Eugene Kim (http://www.flickr.com/photos/eekim/2235294862/in/photostream/). CC BY-NC-SA 2.0 Pew Research Centre. “Pew Internet: Mobile.” Pew Internet. N,d. Web. 31 July 2012. Browser (c) Johan Larsson (http://www.flickr.com/photos/johanl/4397800453/) CC BY 2.0 “What Is Smishing?” 16 May. 2012. YouTube. Web. 12 Aug. 2012. tr

    ×