Web 2.0, SocialMedia andInternet SafetyPresentation by: Kim Cullom
http://www.sxc.hu/browse.phtml?f=download&id=1353782
http://images.cdn.fotopedia.com/flickr-2386230724-original.jpg
Web 2.0?  http://www.sxc.hu/browse.phtml?f=download&id=1218115
Examples Social   Networks Blogs Video,Image and Media Sharing RSS Feeds
http://www.youtube.com/watch?v=ZQzsQkMFgHE&feature=related
What’s the lure?1.   Have as many friends/followers as possible2.   Self-promotion/advertising3.   New way of interacting4...
Digital Dangers Inappropriate   Contact Inappropriate   Content Inappropriate   Conduct    http://www.sxc.hu/browse.pht...
Privacy?http://www.sxc.hu/browse.phtml?f=download&id=839252
College Student Beliefs in Privacy   http://www.sxc.hu/browse.phtml?f=download&id=1193228
Broadcasting  http://www.sxc.hu/brow  se.phtml?f=download&id=  1020178
Viral Contenthttp://www.youtube.com/watch?v=bEkyP4A_4sQ&feature=related
Digital Footprinthttp://www.sxc.hu/browse.phtml?f=download&id=1269420
Online Reputation50%45%                          Americans Not40%                          Concerned35%30%25%             ...
Online Reputation and Job90%80%70%60%                 Rejected50%40%                 Americans who                    Beli...
Now what?ClipArt Gallery
Social Media Ethics1.   Public vs Private2.   Can vs Should3.   Conjoined Identities4.   Cause Harm5.   Golden Rule
http://www.youtube.com/watch?v=tH2Pk5fTzWs
Managing Digital Footprint SearchEngines Evaluate Reputation                        http://www.sxc.h                    ...
Protect Reputation Think Golden  Rule Vigilanthttp://www.sxc.hu/browse.phtml?f=download&id=1383270
Restore   Act   Quickly!http://www.sxc.hu/browse.phtml?f=download&id=950851
Safely Use Social Networks1.   Use caution with links2.   Don’t trust sender of message3.   Do not allow to scan address b...
Safely Use Social Networks5.   Be selective about friends6.   Choose carefully7.   Assume everything is permanent8.   Thin...
Is there a place?
Something to Think Abouthttp://www.youtube.com/watch?feature=player_embedded&v=aDycZH0CA4I#!
Works Cited   11 Tips for Social Networking Safety. Microsoft. n.d. Web. 19 Mar. 2012.    <http://www.microsoft.com/secur...
Works Cited   Kgiannas1389. “Racist Teens Ousted.” YouTube. 16 Feb 2012. Web. 14 Mar. 2012.    <http://www.youtube.com/wa...
Images   Andreyutzu. Time. 2008. Photograph. Stock.xchang, Getty Images. Web 31 Mar. 2012.    <http://www.sxc.hu/browse.p...
Upcoming SlideShare
Loading in …5
×

Web 2.0, Social Media and Internet Safety Final

1,281 views

Published on

Staying safe in a digital world.

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
1,281
On SlideShare
0
From Embeds
0
Number of Embeds
18
Actions
Shares
0
Downloads
10
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • AASL Learning Standards: 1.1.3, 1.2.3, 1.3.1, 1.3.3, 1.3.4, 1.3.5, 2.1.4, 2.3.1, 2.3.2, 3.3.2, 4.3.1, and 4.3.4
  • What used to be considered “the web” (GrethreB).
  • “The web” in today’s society (Ba Silva). In the words of Becky Hogge: “The web is developing from a place where we read stuff, through a place we interact with, into a place we personalize” (Web 2.0 57).
  • According to Dictionary.com Web 2.0 is “the internet viewed as a medium in which the interactive experience in the form of blogs, wikis, forms, etc., plays a more important role than simply accessing information.” Image: (Axonite)
  • Now that I have shared the definition of Web 2.0, this might be a good time to provide some examples. Web 2.0 covers a lot of ground and many different areas such as Social Networks (Facebook and Twitter), Blogs (Blogger and Word Press), Video, Image and Media Sharing sites (YouTube, Flickr), Wikipedia, Article Directories, and RSS feeds. These examples all make for a very interconnected world (Ventura)
  • Social media is a huge part of the Web 2.0 world. (Show Video) With the statistics illustrated in the video we cannot ignore the impact of social media and web 2.0. But with all these opportunities comes the question, how do we stay safe? How do we keep our personal information private in an increasingly interconnected world?
  • Why do we use Web 2.0 and social networking? For some it’s just an online popularity contest to see who can gather the most friends or followers. Other’s are trying to promote themselves and advertise their skills. It is also a new way of interacting with the world as a whole. Web 2.0 users can share through blogs, flickr, mashups, playing online games, and just the mundane aspects of their everyday life. It can also be used to rediscover people from their past. Perhaps find a friend you haven’t talked to in many years (Roesler 47-53 Web 2.0)
  • Much of the early teachings on internet safety focused on keeping kids safe from predators. This is not as much of a danger as originally believed. The Federal Trade Commission has outlined three categories of danger: Inappropriate contact, inappropriate content and inappropriate conduct. “Inappropriate contact is communicating with anyone whose aim is to harm” (Gallagher 16). This can include: Predators, hate groups, groups that promote dangers behaviors (i.e. anexoria). Inappropriate content includes pornography, dangerous/illegal behaviors, and making private personal information public. “Inappropriate conduct includes sexting, cyberbullying, plagiarism, hacking, spreading false or malicious information . . .” (Gallagher 16). Image: (Daxmac)
  • The growing trends in technology are giving way to a lessoning of privacy all around us. Don’t just give away the small shred of privacy we have left. Some of the examples of the lessening of our privacy include the FTC only giving Facebook the equivalent to a stern “no” and no actual punishment for changing their privacy controls in 2009 and making it more difficult to hide your personal information. Now they must inform members before the way their information is shared will be changed. This comes at an interesting time with the new Facebook Timeline that essentially asks for more information and wants to lay out your life in the pre-Facebook world. In addition there is the issue with cellphones being able to track your location by GPS and corporations saving this information, some companies also used a program which saved keystrokes, this means they were also logging what you were doing online including passwords. Along with the cellphones comes the issue of whether police can search them without a warrant or use cellphone signals to track your location. With some of these issues beyond our control unless we choose never to use Facebook or cellphones it is essential we protect the privacy we can (Popkin) Image: (Pascal79).
  • One American study of college students showed 40% of the students had no understanding of their privacy. When asked 5 questions the 40% of students were unable to answer a single question correctly. They believed there were more rights protecting them than there actually are (Carrick). Image: (Iigighost)
  • Web 2.0 has created a generation of people who are used to the ability to share ideas, images and videos whenever and where ever they wish to. This has increased the size of potential audiences and speed we can share information. These tools can be used for good, for example the ability to speak out about questionable business practices to supporting our charitable causes. In addition these tools can be used for bad, the information we share has the potential to ruin our lives along with the lives of others. Our mistakes used to be memorialized in our friends memories and those can be faulty. Today a mistake can be saved online for years. The mistakes made in high school could potentially affect your life for years to come because it’s out there online where anyone can find (McMillian). Image: (Ischerer).
  • It is imperative students realize there are consequences to their actions. Anything posted online can go worldwide in matter of minutes. Take the case of two teens from Gainesville, Florida who posted a 14 minute racist rant in February 2012 that quickly went viral and completely changed their lives forever. The teens began receiving death threats and had to leave their school as part of the backlash from this video posted on YouTube. It is yet to be seen how this video will affect their lives from here on out (McMillian)
  • A common term when discussing social media is “digital footprint.” According to Webopedia a digital footprint “is the word used to describe the grail, traces, or “footprints” that people leave online.” We need to teach children to look closely at their digital footprints. Once information has been posted in a digital format it persists somewhere over time. This is referred to as the “digital eternity” (Carrick) Not only do people need to watch what they post, they need to be aware that whatever others post about them on social media websites will also follow them forever (Frugal Dad). In 2006 a single mother had posted a picture of herself dressed as a pirate with the caption “Drunken Pirate.” Later on she was taking part in a program to get her teaching degree and was not allowed to graduate on the basis of this photo. When this single mom protested she lost the fight and was unable to graduate (Carrick). This is just one reason to watch what is put online. Image: (ColinBroug)
  • The Perceptions study from January 2010 showed that 37% of Americans are not concerned at all about the impact their online reputation may have on the ability to get a job or be admitted into college. This same study showed that 44% of college admissions personnel and human resource departments always review the online reputation of a prospective student/employee and 35% review this information most of the time (Cross-Tab).
  • This same survey found that 70% of recruiters have rejected an applicant based on information found about the applicants online reputation while only 7% of Americans believe this information can affect a job search. On a positive note 86% of the recruiters admit that a good online reputation can have an affect on a potential employees job application (Cross-Tab).
  • We’ve seen what mistakes using social media and Web 2.0 can do to people and the impact social media can have on employment opportunities. How do we prevent this from happening to us or those we care about?
  • In a posting by David McMillan on the Thought Catalog he shares the 5 key points which should be addressed in social media ethics. Point 1, “In social media, there is no difference between public and private.” it is important to remember anything posted online can be seen by the world at large potentially. This includes current and future employers, friends, and even parents. If you are not comfortable with these people all knowing something, it’s probably best not to share online. Point 2, “Just because you can post something doesn’t mean you should.” Be sure to avoid the temptation to post something just because you thought of it, make sure it’s not something you’ll regret after coming back to reality. The speed which things can be shared can often short circuit people’s thinking skills much like being inebriated. Point 3, “Your online and offline selves might not be identical, but they’re joined at the hip.” When posting anything online either publicly or privately first consider the impact on your offline life. Once things are posted online you no longer control the information and anyone has the potential to find it. Point 4, “Will what I post cause harm to others?” Stop and consider before posting judgmental comments online if you would be willing to say that to someone’s face and have your mom know about it first hand. Point 5, “Finally, call it the Social Media Golden Rule: post about others as you know have them post about you.” This doesn’t mean lie about people, just be prepared for the backlash if you post something others may not like. They will not hesitate to make their thoughts about you clear either.
  • Not only should a Web 2.0 user consider those points by McMillian, they should consider this, what will happen to their digital life when they die? All of that information which has been shared online could come back and haunt your loved ones. Is there anything out there you’d rather not share?
  • One important step in managing your digital footprint is simply searching your name online. Try several search engines to see what comes up, don’t forget to search images along with text. Make sure to try different variations of your name. Then check the information that comes up, is it you and is the information accurate? Also consider if you need multiple online profiles, such as one for personal life and one for your professional life. Keep in mind anything on the internet is searchable and permanent (Take Charge). Image: (ColinBroug).
  • It’s key to think before you post information. How will it reflect upon you? Do not hesitate to talk with friends and family about the type of information you are willing to share and not willing to share. If necessary ask them to remove items and information you don’t wish to have shared. Keeping this in mind don’t forget the “Golden Rule” when posting online and treat others as you would like to be treated. In other words don’t post information about others you would not be willing to have posted about yourself. Once your online reputation is established stay vigilant and keep running searches on yourself. It’s also a good idea to set up something like a Google Alert on yourself to keep up with when your name is posted online. Finally, check who has access to your online information, it’s okay to remove people (Take Charge). Image: (KateKrav).
  • If you find incorrect or inappropriate information about yourself online it’s important to act quickly. The sooner the information is removed the better. The first step is to ask the person who posted it to either remove or correct any errors. If this does not work ask the site administrator for help (Take Charge). Image: (Andreyutzu).
  • Some tips for using social networking include: 1.) Treat any links friends send through social networking sites with caution like you would a link sent through e-mail, 2.) Just because you think a message came from a friend, that does not mean it did, so if a message looks suspicious use a different method to contact your friend, 3.) When joining a social network it will often offer to scan your address book to find out if your contacts are on the network, using this information sites can then send e-mails to anyone you’ve ever e-mailed, 4.) Always type the web address of the social networking site or go to it through your bookmarks, don’t follow links in an e-mail, these links could take you to a fake site (11 Tips).
  • 5.) Don’t just accept anyone as a “friend” on social networking sites, confirm their identity because it could be fake, 6.) Check out the social networking site you plan to use carefully, read the privacy policy and make sure you treat this decision with the same care as selecting a site you would give your credit card number, 7.) Everything posted online is permanent, even if you delete your profile anyone could have saved the information and 8.) Don’t access social networking sites at work or at a public computer (11 Tips).
  • With all of the issues addressed is there a place for Web 2.0 and Social Media in education? Some will compare the emergence social media to the emergence of rock’n roll and blame it for corrupting the youth of America. Yes there must be a place, if we ignore the current direction society is going we will do a disservice to our students. The use of social media plays an integral part of society today. We must teach students the proper use. When students are allowed to share their work online and strangers take the time to comment it shows the student they can have an impact and people really do care. In addition building an collection of material online can help with the college application process, this helps students build a digital resume which can help sway college admissions officials. It must be recognized that social media and web 2.0 represent a new way of doing things, not just in education but in society as a whole (Careless).
  • Just something to think about after today’s presentation. (Show Video) Would you act like that in real life? If no, why do we feel it is okay online?
  • Web 2.0, Social Media and Internet Safety Final

    1. 1. Web 2.0, SocialMedia andInternet SafetyPresentation by: Kim Cullom
    2. 2. http://www.sxc.hu/browse.phtml?f=download&id=1353782
    3. 3. http://images.cdn.fotopedia.com/flickr-2386230724-original.jpg
    4. 4. Web 2.0? http://www.sxc.hu/browse.phtml?f=download&id=1218115
    5. 5. Examples Social Networks Blogs Video,Image and Media Sharing RSS Feeds
    6. 6. http://www.youtube.com/watch?v=ZQzsQkMFgHE&feature=related
    7. 7. What’s the lure?1. Have as many friends/followers as possible2. Self-promotion/advertising3. New way of interacting4. Rediscover people
    8. 8. Digital Dangers Inappropriate Contact Inappropriate Content Inappropriate Conduct http://www.sxc.hu/browse.phtml?f=download&id=1381198
    9. 9. Privacy?http://www.sxc.hu/browse.phtml?f=download&id=839252
    10. 10. College Student Beliefs in Privacy http://www.sxc.hu/browse.phtml?f=download&id=1193228
    11. 11. Broadcasting http://www.sxc.hu/brow se.phtml?f=download&id= 1020178
    12. 12. Viral Contenthttp://www.youtube.com/watch?v=bEkyP4A_4sQ&feature=related
    13. 13. Digital Footprinthttp://www.sxc.hu/browse.phtml?f=download&id=1269420
    14. 14. Online Reputation50%45% Americans Not40% Concerned35%30%25% College20% Admission/Hu15% man Resources Always10% 5% College 0% Admission/Hu man Resources Perception of Online Most of Time Reputation
    15. 15. Online Reputation and Job90%80%70%60% Rejected50%40% Americans who Believe30% Positive Imact20%10% 0% Job Impact
    16. 16. Now what?ClipArt Gallery
    17. 17. Social Media Ethics1. Public vs Private2. Can vs Should3. Conjoined Identities4. Cause Harm5. Golden Rule
    18. 18. http://www.youtube.com/watch?v=tH2Pk5fTzWs
    19. 19. Managing Digital Footprint SearchEngines Evaluate Reputation http://www.sxc.h u/browse.phtml?f =download&id=1 269420
    20. 20. Protect Reputation Think Golden Rule Vigilanthttp://www.sxc.hu/browse.phtml?f=download&id=1383270
    21. 21. Restore  Act Quickly!http://www.sxc.hu/browse.phtml?f=download&id=950851
    22. 22. Safely Use Social Networks1. Use caution with links2. Don’t trust sender of message3. Do not allow to scan address books4. Type or bookmark address
    23. 23. Safely Use Social Networks5. Be selective about friends6. Choose carefully7. Assume everything is permanent8. Think twice before access at work
    24. 24. Is there a place?
    25. 25. Something to Think Abouthttp://www.youtube.com/watch?feature=player_embedded&v=aDycZH0CA4I#!
    26. 26. Works Cited 11 Tips for Social Networking Safety. Microsoft. n.d. Web. 19 Mar. 2012. <http://www.microsoft.com/security/online-privacy/social-networking.aspx>. Careless, James. “Social Media: It Does Have a Place in the Classroom. “ Tech & Learning. 32.7. (Feb. 2012). 43-46. Print. Carrick, Damien. “Social Media and Privacy.” Law Report: Separate Stories Podcast. ABC Radio National. 28 Feb. 2012. MP3 file. 15 Mar 2012. Cross-Tab Marketing Services. “Data Privacy Day: Perceptions Study.” Trustworthy Computing Group, Miscrosoft. Jan 2010. Microsoft PowerPoint File. 15 Mar 2012. <http://www.microsoft.com/security/resources/research.aspx#social>. “Digital footprint.” Webopedia. ITBusinessEdge, QuinStreet, Inc. Web. 15 Mar. 2012. <http://www.webopedia.com/TERM/D/digital_footprint.html>. Englishnationalopera. “Can I Be Your Friend.” YouTube. 8 Jun. 2011. Web. 24 Mar. 2012. <http://www.youtube.com/watch?feature=player_embedded&v=aDycZH0CA4I#!>. Frugal Dad. Wrestling Online Privacy. 2011. Infographic. The Under Cover Recruiter. Web. 19 Mar 2012. <http://theundercoverrecruiter.com/content/infographic-how-social-media-online-privacy-risk-you>. Gallagher, Frank. “Hand in Hand: Media Literacy and Internet Safety.” Library Media Connection. 29.4 (Jan./Feb. 2011): 16-18. Print.
    27. 27. Works Cited Kgiannas1389. “Racist Teens Ousted.” YouTube. 16 Feb 2012. Web. 14 Mar. 2012. <http://www.youtube.com/watch?v=bEkyP4A_4sQ&feature=related>. McMillian, David. “How to Ruin Your Life in 14 Minutes: or Why We Need to Have a Serious Disucssion About Social Media Ethics” ThoughtCatalog. ThoughtCatalog. 23 Feb 2012. Web. 14 Mar 2012. <http://thoughtcatalog.com/2012/how-to-ruin-your-life-in-14-minutes-or-why-we-need-a- serious-conversation-about-the-ethics-of-social-media/>. Popkin, Helen A.S. “7 Signs We’re Living in the Post Privacy Era.” Posted in Technolog. MSNBC. Com Tech. n.d. Web. 14 Mar 2012. <http://www.technolog.msnbc.msn.com/technology/technolog/7-signs-were-living-post-privacy- era-118087>. Roesler, Kelly. “Privacy Issues with Web 2.0.” Social Issues Firsthand: Web 2.0. Ed. Laurie Willis. Farmington Hills: Greenhaven Press, 2009. 47-53. Print. Socialmediaboost. “Social Media Revolution 2012 (Socialnomics 3).” YouTube. 11 Jan. 2012. Web. 6 Mar. 2012. <http://www.youtube.com/watch?v=ZQzsQkMFgHE&feature=related>. Take Charge of Your Online Reputation. Microsoft. n.d. PDF. 24 Mar. 2012. <http://www.microsoft.com/security/online-privacy/social-networking.aspx>. Ventura, Paul M. “What is Web 2.0 and What Are Some Web 2.0 Examples?” EzineArticles.com. EzineArticles. 3 Oct 2011. Web. 13 Mar 2012. <http://ezinearticles.com/?What-Is-Web-2.0-and- What-Are-Some-Web-2.0-Examples?&id=6602854>. “Web 2.0." Collins English Dictionary - Complete & Unabridged 10th Edition. HarperCollins Publishers. 13 Mar. 2012.<http://dictionary.reference.com/browse/web 2.0>.
    28. 28. Images Andreyutzu. Time. 2008. Photograph. Stock.xchang, Getty Images. Web 31 Mar. 2012. <http://www.sxc.hu/browse.phtml?f=download&id=950851>. Axonite. Hardware Circuits 4. 2009. Photograph. stock.xchang, Getty Images. Web. 6 Mar 2012. <http://www.sxc.hu/browse.phtml?f=download&id=1218115>. ColinBroug. Footsteps 2. 2010. Photograph. Stock.xchang, Getty Images. Web. 31 Mar. 2012. <http://www.sxc.hu/browse.phtml?f=download&id=1269420>. Da Silva, Frank. My Cyber Social Map. NA. Photograph. fotopedia, flickr. Web. 6 Mar 2012. <http://images.cdn.fotopedia.com/flickr-2386230724-original.jpg>. Daxmac. Danger sign. 2012. Photograph. stock.xchang, Getty Images. Web. 13 Mar. 2012. <http://www.sxc.hu/browse.phtml?f=download&id=1381198>. GretheB. Cobweb 2. 2011. Photograph. stock.exchang, Getty Images. Web. 6 Mar 2012. <http://www.sxc.hu/browse.phtml?f=download&id=1353782>. Igoghost. Doodled Desks 2. 2009. Photograph. Stock.xchang, Getty Images. Web. 31 Mar. 2012. <http://www.sxc.hu/browse.phtml?f=download&id=1193228>/ Ischerer. Televosion Tower. 2008. Photograph. Stock.xchang, Getty Images. Web. 13 Mar. 2012. <http://www.sxc.hu/browse.phtml?f=download&id=1020178>. KateKrav. Door Locker with Chain. 2012. Photograph. Stock.xchang, Getty Images. Web 31 Mar. 2012. <http://www.sxc.hu/browse.phtml?f=download&id=1383270>. Pascal79. Do Not Disturb. 2007. Photograph. Stock.xchang, Getty Images. Web. 31 Mar. 2012. <http://www.sxc.hu/browse.phtml?f=download&id=839252>.

    ×