SlideShare a Scribd company logo
1 of 13
Connecting Online
Connecting Online: Outline
 I do a lot on social networking sites – should I be
  concerned about my privacy?
 What’s my responsibility to my networks?
 Am I using location-based social networks like
  Foursquare or Facebook Places?
 What is smishing?
 How much information can people get from the
  photos I have uploaded?
Connecting Online:
      Social Networks
Social networking involves:
 What you share
 Who you share it
  with




                              Image courtesy of Eugene Kim (Flickr)
Connecting Online:
      Social Networks
Social networking involves:
 Responsibility to your networks
  – You may be comfortable posting that photo of last
    night’s party – but your friend may not
  – Remember that people are your “friends”
    and “followers”
  – Ask for help if you need it and reach out when you
    can – just as you would if faced with a similar
    situation offline
Connecting Online: Trends
                                           We are going
                                            mobile.
                                           More than half of all
                                            adults in US own a
                                            smart phone.75% of
                                            teens.

                                          Source: http://www.pewinternet.org/
                                          Commentary/2012/February/Pew-Internet-Mobile.aspx



Image courtesy of Johan Larson (Flickr)
Connecting Online: Smishing




      (Click to view)

                        Taken from YouTube
Connecting Online:
       Mobile Strategies
 If your mobile is
  compromised,
  scammers can access
  all the personal
  information on your
  phone
 Secure wifi-hotspot
  security. Even if you’re
  on your phone, the
  same rules apply
Connecting Online:
       Mobile Strategies
 Look up unknown app creators, and unknown
  numbers
 Avoid keeping too much personal information
  (ie. bank numbers and pins) on your phone
Connecting Online: Trends
              Who can see my
              location?
              • Geolocation
              • Geotagging
              • Privacy and safety
                 implications of
                 place-based apps?
Connecting Online:
        Geotagging
Who can see my location?
 While metadata makes it easier to organize
  photos, revealing metadata of your photos can
  be vulnerable to cyberstalking
 If you don’t want to be found, make sure you
  disable geotagging function
Connecting Online: Strategies

 Consider your privacy settings. Who are you
  allowing to view your location?
 If your location-based social network is linked to
  a Twitter or Facebook profile, your location is
  shared on these networks too
What’s your digital tattoo?
Resources
   My Social Network (c) Eugene Kim
    (http://www.flickr.com/photos/eekim/2235294862/in/photostream/). CC BY-NC-SA 2.0

   Pew Research Centre. “Pew Internet: Mobile.” Pew Internet. N,d. Web. 31 July 2012.

   Browser (c) Johan Larsson (http://www.flickr.com/photos/johanl/4397800453/) CC BY 2.0

   “What Is Smishing?” 16 May. 2012. YouTube. Web. 12 Aug. 2012.




                                                                                            tr

More Related Content

What's hot

Social media and security essentials.pptx
Social media and security essentials.pptxSocial media and security essentials.pptx
Social media and security essentials.pptx
Pink Elephant
 
Online Policy Primer: Facebook
Online Policy Primer: Facebook Online Policy Primer: Facebook
Online Policy Primer: Facebook
ingridkreidler
 
Social Media And Privacy October 9 2009
Social Media And Privacy October 9 2009Social Media And Privacy October 9 2009
Social Media And Privacy October 9 2009
canadianlawyer
 

What's hot (20)

How will the Internet of Things look by 2025?
How will the Internet of Things look by 2025?How will the Internet of Things look by 2025?
How will the Internet of Things look by 2025?
 
How to Like Social Media Network Security
How to Like Social Media Network SecurityHow to Like Social Media Network Security
How to Like Social Media Network Security
 
Social media and security essentials.pptx
Social media and security essentials.pptxSocial media and security essentials.pptx
Social media and security essentials.pptx
 
Government Online: The 3 “P’s” of Success - Findings from Pew Internet
Government Online: The 3 “P’s” of Success - Findings from Pew InternetGovernment Online: The 3 “P’s” of Success - Findings from Pew Internet
Government Online: The 3 “P’s” of Success - Findings from Pew Internet
 
Digital technology impacts by 2020
Digital technology impacts by 2020Digital technology impacts by 2020
Digital technology impacts by 2020
 
Social Media and Media Abuse for Parents
Social Media and Media Abuse for ParentsSocial Media and Media Abuse for Parents
Social Media and Media Abuse for Parents
 
Is Online Privacy a Thing of the Past?
Is Online Privacy a Thing of the Past?Is Online Privacy a Thing of the Past?
Is Online Privacy a Thing of the Past?
 
Social media privacy issues
Social media privacy issuesSocial media privacy issues
Social media privacy issues
 
Social Media and Privacy - Education Across the Nation - Australian Computer ...
Social Media and Privacy - Education Across the Nation - Australian Computer ...Social Media and Privacy - Education Across the Nation - Australian Computer ...
Social Media and Privacy - Education Across the Nation - Australian Computer ...
 
Online Policy Primer: Facebook
Online Policy Primer: Facebook Online Policy Primer: Facebook
Online Policy Primer: Facebook
 
Future of the Internet: Role of the Web and New Media in the Public Sector
Future of the Internet: Role of the Web and New Media in the Public SectorFuture of the Internet: Role of the Web and New Media in the Public Sector
Future of the Internet: Role of the Web and New Media in the Public Sector
 
Social media risks and controls
Social media risks and controlsSocial media risks and controls
Social media risks and controls
 
Social Media And Privacy October 9 2009
Social Media And Privacy October 9 2009Social Media And Privacy October 9 2009
Social Media And Privacy October 9 2009
 
Security Dangers of Social Networking
Security Dangers of Social NetworkingSecurity Dangers of Social Networking
Security Dangers of Social Networking
 
Networked and Hyperconnected: The New Social (and work) Operating System
Networked and Hyperconnected:The New Social (and work) Operating SystemNetworked and Hyperconnected:The New Social (and work) Operating System
Networked and Hyperconnected: The New Social (and work) Operating System
 
Misuse of social media
Misuse of social mediaMisuse of social media
Misuse of social media
 
Social media and Security: How to Ensure Safe Social Networking
Social media and Security: How to Ensure Safe Social NetworkingSocial media and Security: How to Ensure Safe Social Networking
Social media and Security: How to Ensure Safe Social Networking
 
Buying a home at their fingertips: How to reach out on the standard and mobil...
Buying a home at their fingertips: How to reach out on the standard and mobil...Buying a home at their fingertips: How to reach out on the standard and mobil...
Buying a home at their fingertips: How to reach out on the standard and mobil...
 
Web on the go: Why the mobile Internet matters to businesses
Web on the go: Why the mobile Internet matters to businessesWeb on the go: Why the mobile Internet matters to businesses
Web on the go: Why the mobile Internet matters to businesses
 
Social Media & Networking - Boon or Bane?
Social Media & Networking - Boon or Bane?Social Media & Networking - Boon or Bane?
Social Media & Networking - Boon or Bane?
 

Viewers also liked

Digital Tattoo Presentation for Canadian eLearning Conference 2009
Digital Tattoo Presentation for Canadian eLearning Conference 2009Digital Tattoo Presentation for Canadian eLearning Conference 2009
Digital Tattoo Presentation for Canadian eLearning Conference 2009
University of British Columbia
 

Viewers also liked (16)

PPDP for RAs
PPDP for RAsPPDP for RAs
PPDP for RAs
 
Your Child's Digital Tattoo
Your Child's Digital TattooYour Child's Digital Tattoo
Your Child's Digital Tattoo
 
Digital Tattoo Workshop for VPL
Digital Tattoo Workshop for VPLDigital Tattoo Workshop for VPL
Digital Tattoo Workshop for VPL
 
Digital Tattoo for Student Teachers 2012
Digital Tattoo for Student Teachers 2012 Digital Tattoo for Student Teachers 2012
Digital Tattoo for Student Teachers 2012
 
Digital Tattoo for Teacher Candidates at UBC
Digital Tattoo for Teacher Candidates at UBC Digital Tattoo for Teacher Candidates at UBC
Digital Tattoo for Teacher Candidates at UBC
 
Digital Tattoo for Parents
Digital Tattoo for ParentsDigital Tattoo for Parents
Digital Tattoo for Parents
 
Digital Tattoo Presentation for Canadian eLearning Conference 2009
Digital Tattoo Presentation for Canadian eLearning Conference 2009Digital Tattoo Presentation for Canadian eLearning Conference 2009
Digital Tattoo Presentation for Canadian eLearning Conference 2009
 
Online Professionalism for International Student Scholars
Online Professionalism for International Student ScholarsOnline Professionalism for International Student Scholars
Online Professionalism for International Student Scholars
 
Digital Tattoo for UBC Teacher Candidates: Fall 2015
Digital Tattoo for  UBC Teacher Candidates: Fall 2015Digital Tattoo for  UBC Teacher Candidates: Fall 2015
Digital Tattoo for UBC Teacher Candidates: Fall 2015
 
Ace symposium 2013
Ace symposium 2013Ace symposium 2013
Ace symposium 2013
 
Digital Tattoo Quiz
Digital  Tattoo  QuizDigital  Tattoo  Quiz
Digital Tattoo Quiz
 
Digital Tattoo Workshop for BCLA/PNLA
Digital Tattoo Workshop for BCLA/PNLADigital Tattoo Workshop for BCLA/PNLA
Digital Tattoo Workshop for BCLA/PNLA
 
Publish
PublishPublish
Publish
 
Digital Tattoo for Faculty of Education - Instructors
Digital Tattoo for Faculty of Education - InstructorsDigital Tattoo for Faculty of Education - Instructors
Digital Tattoo for Faculty of Education - Instructors
 
Digital Tattoo Open Access Week 2010
Digital Tattoo Open Access Week 2010Digital Tattoo Open Access Week 2010
Digital Tattoo Open Access Week 2010
 
Digital Tattoo for Teacher Candidates 2011
Digital Tattoo for Teacher Candidates 2011Digital Tattoo for Teacher Candidates 2011
Digital Tattoo for Teacher Candidates 2011
 

Similar to Connecting Online

Social & mobile security
Social & mobile securitySocial & mobile security
Social & mobile security
Ernest Staats
 
Spiritual social media & mobile devices
Spiritual social media & mobile devicesSpiritual social media & mobile devices
Spiritual social media & mobile devices
Ernest Staats
 
Smr week 23 opsec and safe social networking
Smr week 23   opsec and safe social networkingSmr week 23   opsec and safe social networking
Smr week 23 opsec and safe social networking
Fort Rucker FRSA
 
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITYPresentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY
gailmowal
 
Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235
brendaylo
 
How to keep your teens safe on social media
How to keep your teens safe on social mediaHow to keep your teens safe on social media
How to keep your teens safe on social media
Kwazi Communications
 
Cyber bullying on social networking sites
Cyber bullying on social networking sitesCyber bullying on social networking sites
Cyber bullying on social networking sites
Gerard1990
 

Similar to Connecting Online (20)

Privacy issues in social networking
Privacy issues in social networkingPrivacy issues in social networking
Privacy issues in social networking
 
Social & mobile security
Social & mobile securitySocial & mobile security
Social & mobile security
 
Copied research extra research
Copied research extra research Copied research extra research
Copied research extra research
 
Spiritual social media & mobile devices
Spiritual social media & mobile devicesSpiritual social media & mobile devices
Spiritual social media & mobile devices
 
Social Media and Privacy - Education Across the Nation - Australian Computer ...
Social Media and Privacy - Education Across the Nation - Australian Computer ...Social Media and Privacy - Education Across the Nation - Australian Computer ...
Social Media and Privacy - Education Across the Nation - Australian Computer ...
 
EFFECTS OF SOCIAL MEDIA ON YOUTH
EFFECTS OF SOCIAL MEDIA ON YOUTHEFFECTS OF SOCIAL MEDIA ON YOUTH
EFFECTS OF SOCIAL MEDIA ON YOUTH
 
Smr week 23 opsec and safe social networking
Smr week 23   opsec and safe social networkingSmr week 23   opsec and safe social networking
Smr week 23 opsec and safe social networking
 
Social Media and Privacy - National Conference 2012, Canberra - Australian Co...
Social Media and Privacy - National Conference 2012, Canberra - Australian Co...Social Media and Privacy - National Conference 2012, Canberra - Australian Co...
Social Media and Privacy - National Conference 2012, Canberra - Australian Co...
 
Social Media and Privacy - National Conference, Australian Computer Society
Social Media and Privacy - National Conference, Australian Computer SocietySocial Media and Privacy - National Conference, Australian Computer Society
Social Media and Privacy - National Conference, Australian Computer Society
 
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITYPresentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY
 
Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235
 
Cyberspace slide show
Cyberspace   slide showCyberspace   slide show
Cyberspace slide show
 
Mobile Devices in Education
Mobile Devices in EducationMobile Devices in Education
Mobile Devices in Education
 
Film project 2
Film project 2Film project 2
Film project 2
 
Social media ict
Social media ictSocial media ict
Social media ict
 
Social media
Social media Social media
Social media
 
How to keep your teens safe on social media
How to keep your teens safe on social mediaHow to keep your teens safe on social media
How to keep your teens safe on social media
 
Internet Safety 2.0
Internet Safety 2.0Internet Safety 2.0
Internet Safety 2.0
 
Cyber bullying on social networking sites
Cyber bullying on social networking sitesCyber bullying on social networking sites
Cyber bullying on social networking sites
 
Netsafetyoct30 Sound
Netsafetyoct30 SoundNetsafetyoct30 Sound
Netsafetyoct30 Sound
 

More from University of British Columbia

More from University of British Columbia (15)

Digital Footprints for grades 2 and 3
Digital Footprints for grades 2 and 3Digital Footprints for grades 2 and 3
Digital Footprints for grades 2 and 3
 
Teacher Trainee Presentation 2013
Teacher Trainee Presentation 2013 Teacher Trainee Presentation 2013
Teacher Trainee Presentation 2013
 
What is the dtp
What is the dtp What is the dtp
What is the dtp
 
What is the dtp
What is the dtp What is the dtp
What is the dtp
 
Protect
ProtectProtect
Protect
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Digital Tattoo for Student Teachers
Digital Tattoo for Student TeachersDigital Tattoo for Student Teachers
Digital Tattoo for Student Teachers
 
Digital Tattoo Website Orientation
Digital Tattoo Website OrientationDigital Tattoo Website Orientation
Digital Tattoo Website Orientation
 
Native youth
Native youthNative youth
Native youth
 
Digital Tattoo: for MOSAIC
Digital Tattoo: for MOSAICDigital Tattoo: for MOSAIC
Digital Tattoo: for MOSAIC
 
Digital Tattoo: for VSB Educators
Digital Tattoo: for VSB EducatorsDigital Tattoo: for VSB Educators
Digital Tattoo: for VSB Educators
 
Digital tattoo - what's yours?
Digital tattoo - what's yours?Digital tattoo - what's yours?
Digital tattoo - what's yours?
 
Digital Tattoo for NITEP students
Digital Tattoo for NITEP studentsDigital Tattoo for NITEP students
Digital Tattoo for NITEP students
 
DT Arts Coop Workshop 2010 -Activity sheet
DT Arts Coop Workshop 2010 -Activity sheetDT Arts Coop Workshop 2010 -Activity sheet
DT Arts Coop Workshop 2010 -Activity sheet
 
DT Arts Coop Workshop 2010
DT Arts Coop Workshop 2010DT Arts Coop Workshop 2010
DT Arts Coop Workshop 2010
 

Recently uploaded

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 

Connecting Online

  • 2. Connecting Online: Outline  I do a lot on social networking sites – should I be concerned about my privacy?  What’s my responsibility to my networks?  Am I using location-based social networks like Foursquare or Facebook Places?  What is smishing?  How much information can people get from the photos I have uploaded?
  • 3. Connecting Online: Social Networks Social networking involves:  What you share  Who you share it with Image courtesy of Eugene Kim (Flickr)
  • 4. Connecting Online: Social Networks Social networking involves:  Responsibility to your networks – You may be comfortable posting that photo of last night’s party – but your friend may not – Remember that people are your “friends” and “followers” – Ask for help if you need it and reach out when you can – just as you would if faced with a similar situation offline
  • 5. Connecting Online: Trends  We are going mobile.  More than half of all adults in US own a smart phone.75% of teens. Source: http://www.pewinternet.org/ Commentary/2012/February/Pew-Internet-Mobile.aspx Image courtesy of Johan Larson (Flickr)
  • 6. Connecting Online: Smishing (Click to view) Taken from YouTube
  • 7. Connecting Online: Mobile Strategies  If your mobile is compromised, scammers can access all the personal information on your phone  Secure wifi-hotspot security. Even if you’re on your phone, the same rules apply
  • 8. Connecting Online: Mobile Strategies  Look up unknown app creators, and unknown numbers  Avoid keeping too much personal information (ie. bank numbers and pins) on your phone
  • 9. Connecting Online: Trends Who can see my location? • Geolocation • Geotagging • Privacy and safety implications of place-based apps?
  • 10. Connecting Online: Geotagging Who can see my location?  While metadata makes it easier to organize photos, revealing metadata of your photos can be vulnerable to cyberstalking  If you don’t want to be found, make sure you disable geotagging function
  • 11. Connecting Online: Strategies  Consider your privacy settings. Who are you allowing to view your location?  If your location-based social network is linked to a Twitter or Facebook profile, your location is shared on these networks too
  • 13. Resources  My Social Network (c) Eugene Kim (http://www.flickr.com/photos/eekim/2235294862/in/photostream/). CC BY-NC-SA 2.0  Pew Research Centre. “Pew Internet: Mobile.” Pew Internet. N,d. Web. 31 July 2012.  Browser (c) Johan Larsson (http://www.flickr.com/photos/johanl/4397800453/) CC BY 2.0  “What Is Smishing?” 16 May. 2012. YouTube. Web. 12 Aug. 2012. tr

Editor's Notes

  1. What you shareWhenever you post something, it is open to interpretation – they people who know you well will see it one way, the people you don’t will see it another.Who you share it withWhat you share with your friends, you may not want your employers to see and what you share with your family, you may want to keep private.
  2. Consider your privacy settings. Most location-based social networks allow you to tailor your settings so you can control who sees your location – just your friends, businesses too, or perhaps anyone.Remember also that if your location-based social network is linked to a Twitter or Facebook profile, your location is shared on these networks too.