SlideShare a Scribd company logo
1 of 32
http://www.flickr.com/photos/rosauraochoa/3419823308/in/photostream/
What you need to know before
           clicking “I Agree”.


                               A guide by Sian Cooper




This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 2.5
                                      Australia License.
Firstly, what is Twitter?
Twitter is a Social Networking Service that allows its users to
      post ‘Tweets’ containing 140 characters or less.

 Anybody over the age of 13 years can register for their own
   Twitter account. As long as you meet the minimum age
requirement, you can be anything you want to be on Twitter…
                       Even a pigeon!
Prior to becoming an active user, you must
             agree to Twitters

            Terms of Service
              http://twitter.com/tos


                       and



             Privacy Policy
            http://twitter.com/privacy
Did you know that approximately
95% of people do not read through
  a ‘Terms of Service’ statement
          before clicking


                           - Leaver, 2009.
What have you just agreed to?




      http://www.flickr.com/photos/rosauraochoa/3274257201/in/photostream/
Well…


                                                                      Firstly, Twitter is an open platform
                                                                      meaning that anything you post on
                                                                         Twitter can be broadcast to a
                                                                         wider audience… the general
                                                                       public… third party services and
                                                                       websites… virtually anybody that
                                                                           has access to the internet
                                                                                   worldwide.




http://www.flickr.com/photos/rosauraochoa/4527329648/in/photostream
Why is it important to think before
            you Tweet?

       Although cyberspace is a virtual
     place where you cannot physically
     see the audience that will view the
        content that you post online…
      always remember that you have a
        worldwide audience. YOU are
    responsible for the content that you
                 post online.
http://www.flickr.com/photos/rosauraochoa/3326772902/




    Tips: Try not to use offensive language, post misleading
 information or harmful content, share copyrighted images or
pornographic material. These things may get you into trouble!
Things that may get you into trouble…

                             Recently, a “troll scandal” broke out on
                             Twitter which resulted in an employee
                              being suspended from her position at
                                       Monash University.

                           She sent a Tweet to TV presenter Charlotte
                           Dawson which read “If I was your fiancé I'd
                           hang myself too #gohangyourself” (Byrnes,
                                             2012).


http://www.flickr.com/ph
otos/rosauraochoa/35280
68649/in/photostream/
Suicide taunts and other forms of harassment are not
condoned on Twitter, and may place you in breach of
Twitter’s rules and regulations.
Cyber crime experts have warned that hate tweets could
   also be prosecuted as a breach of the Commonwealth
   Crimes Act, relating to using "a carriage service to
   menace, harass or cause offence or for the purposes of a
   threat“
                                              - Byrnes, 2012.




http://www.flickr.com/photos/rosauraochoa/4838897235/in/photostream/
More things that may get you into
                     trouble…

                           Earlier this year, two British tourists were restricted
                           from entering America following a joke on Twitter
                           stating “I’m going to destroy America and dig up
                           Marilyn Monroe” (Hartley-Parkinson, 2012). The
                           Department of Homeland Security initially flagged one
                           of the tourists as a potential threat following a Tweet
                           stating “Free this week, for quick gossip/prep before I
                           go and destroy America?” (Hartley-Parkinson, 2012).




http://www.flickr.com/ph
otos/rosauraochoa/35280
68649/in/photostream/
The tourists were detained at Los Angeles airport on suspicion
of ‘planning to commit crimes’. The 26 year old boy who
initially sent the Tweet argued that the word ‘destroy’ is a
British word used for ‘party’.

Nevertheless, the content and wording of his Tweet was enough
to place security officials on high alert.

                                            -Hartley-Parkinson (2012).
Another thing to keep in mind…
  When posting images and sharing information on Twitter, please
 take note of and respect the copyright attached to the content that
                          you are sharing.




                      http://www.flickr.com/photos/27302612@N03/3179098895/
Twitters Copyright Policy



                   “Respects the intellectual property rights of
                   others and expects users of the service to do
                   the same”
                                               - Twitter Terms of Service (2012).




http://www.flickr.com/photos/27302612@N03
                /3179098895/
What happens if you are in breach of
    the rules and regulations?
                                                                       If you are found to be in
                                                                       breach of the rules and
                                                                       regulations, Twitter has
                                                                       the right to remove and
                                                                       refuse to distribute
                                                                       content that you have
                                                                       posted, to suspend your
http://www.flickr.com/photos/rosauraochoa/4838897235/in/photostream/
                                                                       user account, or reclaim
                                                                       your username
                                                                              -Twitter Terms of Service (2012).
Remember…

YOU are responsible for your use of the services that
   Twitter provides, for any content you post and
   share, and for any consequences thereof. This
 includes other users and third party services using
                   your content.
                                 - Twitter Terms of Service (2012).
If you do not agree to these terms of service,
               then do not click
What about Twitters
Privacy Policy?




 http://www.flickr.com/photos/rosauraochoa/3528880050/in/photostream/
Did you know…

A Consumer Reports ‘State of the Net’ survey conducted in 2010
revealed that up to 9 per cent of social network users had experienced
some form of abuse online in that past year, such as scams, harassment,
and identity theft (Sachoff, 2010).



Social network users that post personal information such as their full
birth dates, home addresses, photos and names of children, have been
found to be most at risk of falling victim to cybercrime (Sachoff, 2010).
Although Twitter does ask you to provide some of your personal
 information during the registration process, such as your name,
   password, username and email address, you CAN control the
amount of personal information that you share with the public by
                         adjusting your
Remember that, unless you adjust your PRIVACY SETTINGS,
            everything you post on Twitter is PUBLIC. This includes:


              Metadata provided with Tweets…




                                                                       Tweets…



                                                                                 And Retweets.



                                                                                          -Twitter Privacy Policy (2012).


http://www.flickr.com/photos/rosauraochoa/3330891783/in/photostream/
Twitter does not actively monitor every post that is published on it’s site, nor does
       it proactively remove Tweets on behalf of other users (Holt, 2012).




If you feel that your privacy has been
violated, you need to fill out a
complaint form in order for Twitter to
take further action. The complaint form
can be found at

https://support.twitter.com/forms/abusi
veuser




                                                    http://www.flickr.com/photos/carrotcreative/2511539541/
What other types of information can
      Twitter access from you?
 Your location information, such as the location that you are in when you send a Tweet from
  your mobile phone.

 Twitter monitors your website usage by using tracking cookies (a small data file that is
  transferred to your computer), in order to gain a better understanding of how you use it’s
  services.

 Log data, such as your computers IP address, the search terms that you use, your mobile
  carrier, and the pages that you have visited, are all recorded by Twitter.

 Third-Party services may also retrieve aspects of information that are sent by your web
  browser, on the condition that these third parties use this data in line with Twitters Privacy
  Policy.

 In the case that Twitter faces issues such as bankruptcy and sale of assets, your personal
  information and account information may be sold as part of that transaction.

                                                                        - Twitter Privacy Policy (2012).
So…

“We’re accustomed to thinking of the internet as being a neutral place, a
blank sheet upon which we are free to do whatever we desire, whether
liberal or conservative, corporate or anarchist, commercial or free” (Barthel,
2012).
Always remember…

“Before posting something about yourself or your family on the
internet, ask yourself: have you or would you ever disclose this kind of
information to a stranger in real life?


If the answer is NO then you’d better think twice before you send it out
      into a world where it can be put to countless illicit uses and, more
 importantly, from which you may never be able to completely erase it”
                                                            (Datcu, 2012).
References
Barthel, M. (July 5, 2012). What are the Politics of the Internet? The AWL. Retrieved 5th September 2012 from
http://www.theawl.com/2012/07/politics-of-the-internet

Byrnes, H. (August 29, 2012). Australia's Next Top Model judge Charlotte Dawson takes aim at Twitter trolls.
News Limited Network. Retrieved 31st August 2012 from
http://www.news.com.au/entertainment/television/australias-next-top-model-judge-charlotte-dawson-takes-
aim-at-twitter-trolls/story-e6frfmyi-1226459899947

Carrotcreative. (May 21, 2008). Twitter Pack, [Image]. Retrieved 5th September 2012 from
http://www.flickr.com/photos/carrotcreative/2511539541/

Dactu, S. (February 9, 2012). The Psychology of Personal Information Sharing. Bitfender Resource Center.
Retrieved 4th September 2012 from http://www.bitdefender.com/blog/The-Psychology-of-Personal-Information-
Sharing-44.html

Hartley-Parkinson, R. (January 31, 2012). I'm going to destroy America and dig up Marilyn Monroe: British pair
arrested in U.S. on terror charges over Twitter jokes. Mail Online. Retrieved 31st August 2012 from
http://www.dailymail.co.uk/news/article-2093796/Emily-Bunting-Leigh-Van-Bryan-UK-tourists-arrested-destroy-
America-Twitter-jokes.html

Holt, K. (August 1, 2012). What to do when someone Tweets your phone number without permission. The Daily
Dot. Retrieved 5th September 2012 from http://www.dailydot.com/society/how-to-twitter-privacy-complaint/
References
Leaver, T. (November 18, 2009). Learning, Authenticity & Online Policy Primers. Tama’s Learning Blog, [Blog].
Retrieved 28th August 2012 from http://tama.edublogs.org/

Marc.benton (January 4, 2009). Photography on Twitter, [Image]. Retrieved 1st September 2012 from
http://www.flickr.com/photos/27302612@N03/3179098895/

Rosaura Ochoa. (April 16, 2010). Twitter on Paper , [Image]. Retrieved 3rd September 2012 from
http://www.flickr.com/photos/rosauraochoa/4527329648/in/photostream

Rosaura Ochoa. (May 13, 2009). Nonviolenceiamx_banner_120x600, [Image]. Retrieved 2nd September 2012 from
http://www.flickr.com/photos/rosauraochoa/3528068649/in/photostream/

Rosaura Ochoa. (April 6, 2009). Twitter Profile, [Image]. Retrieved 2nd September 2012 from
http://www.flickr.com/photos/rosauraochoa/3419823308/in/photostream/

Rosaura Ochoa. (May 13, 2009). Twitter_Good_Bad, [Image]. Retrieved 5th September 2012 from
http://www.flickr.com/photos/rosauraochoa/3528880050/in/photostream/

Rosaura Ochoa. (March 5, 2009). Retweet, [Image]. Retrieved 5th September 2012 from
http://www.flickr.com/photos/rosauraochoa/3330891783/in/photostream/

Rosaura Ochoa. (February 12, 2009). Twitter, [Image]. Retrieved 5th September 2012 from
http://www.flickr.com/photos/rosauraochoa/3274257201/in/photostream/
References
Rosaura Ochoa. (July 28, 2010). Twitter En La Vida Real, [Image]. Retrieved 1st September 2012 from
http://www.flickr.com/photos/rosauraochoa/4838897235/in/photostream/

Rosaura Ochoa. (March 3, 2009). Alto a la Violencia, [Image]. Retrieved 5th September 2012 from
http://www.flickr.com/photos/rosauraochoa/3326772902/

Sachoff, M. (May 4, 2010). Social Network Users Posting Too Much Personal Information: Social Network Users
Vulnerable to Cybercrime. WebProNews. Retrieved 4th September 2012 from
http://www.webpronews.com/social-network-users-posting-too-much-personal-information-2010-05

Twitter Privacy Policy. (May 17, 2012). Retrieved 31st August 2012 from http://twitter.com/privacy

Twitter Terms of Service. (June 25, 2012). Retrieved 31st August from http://twitter.com/tos

More Related Content

What's hot

Online policy primer - Facebook
Online policy primer - FacebookOnline policy primer - Facebook
Online policy primer - Facebookelscobio79
 
Intro Social Media for Small Business
Intro Social Media for Small BusinessIntro Social Media for Small Business
Intro Social Media for Small BusinessAnne Adrian
 
Introduction to Facebook and Twitter
Introduction to Facebook and TwitterIntroduction to Facebook and Twitter
Introduction to Facebook and TwitterAnne Adrian
 
21st Century Research Profiles
21st Century Research Profiles21st Century Research Profiles
21st Century Research ProfilesEmma Gillaspy
 
Social Media Beltwide Cotton
Social Media Beltwide CottonSocial Media Beltwide Cotton
Social Media Beltwide CottonAnne Adrian
 
Introduction to Social Media for Small Business
Introduction to Social Media for Small BusinessIntroduction to Social Media for Small Business
Introduction to Social Media for Small BusinessAnne Adrian
 
Drinking from a Fire Hose
Drinking from a Fire HoseDrinking from a Fire Hose
Drinking from a Fire HoseAnne Adrian
 
Instagramming The Ends of Identity: Pre-birth and post-death identity pract...
InstagrammingThe Ends of Identity: Pre-birth and post-death identity pract...InstagrammingThe Ends of Identity: Pre-birth and post-death identity pract...
Instagramming The Ends of Identity: Pre-birth and post-death identity pract...Tim Highfield
 
E&Y Social Media 101 Class -- 12-03-09
E&Y Social Media 101 Class -- 12-03-09E&Y Social Media 101 Class -- 12-03-09
E&Y Social Media 101 Class -- 12-03-09Tom Humbarger
 
Spiritual social media & mobile devices
Spiritual social media & mobile devicesSpiritual social media & mobile devices
Spiritual social media & mobile devicesErnest Staats
 
ACFPE Social Networking Workshop
ACFPE Social Networking WorkshopACFPE Social Networking Workshop
ACFPE Social Networking WorkshopAnne Adrian
 
ASMI: Engagement and Brand
ASMI: Engagement and BrandASMI: Engagement and Brand
ASMI: Engagement and BrandLaura Lee Dooley
 
How People are using Twitter at Conferences
How People are using Twitter at ConferencesHow People are using Twitter at Conferences
How People are using Twitter at ConferencesMartin Ebner
 
Living Online Frankie Forsyth Pp V1
Living Online Frankie Forsyth Pp V1Living Online Frankie Forsyth Pp V1
Living Online Frankie Forsyth Pp V1Frankie Forsyth
 

What's hot (20)

Online policy primer - Facebook
Online policy primer - FacebookOnline policy primer - Facebook
Online policy primer - Facebook
 
Intro Social Media for Small Business
Intro Social Media for Small BusinessIntro Social Media for Small Business
Intro Social Media for Small Business
 
Introduction to Facebook and Twitter
Introduction to Facebook and TwitterIntroduction to Facebook and Twitter
Introduction to Facebook and Twitter
 
4-H volunteers final
4-H volunteers final4-H volunteers final
4-H volunteers final
 
21st Century Research Profiles
21st Century Research Profiles21st Century Research Profiles
21st Century Research Profiles
 
Social Media Beltwide Cotton
Social Media Beltwide CottonSocial Media Beltwide Cotton
Social Media Beltwide Cotton
 
Introduction to Social Media for Small Business
Introduction to Social Media for Small BusinessIntroduction to Social Media for Small Business
Introduction to Social Media for Small Business
 
Socialmediaagtech
SocialmediaagtechSocialmediaagtech
Socialmediaagtech
 
Drinking from a Fire Hose
Drinking from a Fire HoseDrinking from a Fire Hose
Drinking from a Fire Hose
 
Instagramming The Ends of Identity: Pre-birth and post-death identity pract...
InstagrammingThe Ends of Identity: Pre-birth and post-death identity pract...InstagrammingThe Ends of Identity: Pre-birth and post-death identity pract...
Instagramming The Ends of Identity: Pre-birth and post-death identity pract...
 
E&Y Social Media 101 Class -- 12-03-09
E&Y Social Media 101 Class -- 12-03-09E&Y Social Media 101 Class -- 12-03-09
E&Y Social Media 101 Class -- 12-03-09
 
Spiritual social media & mobile devices
Spiritual social media & mobile devicesSpiritual social media & mobile devices
Spiritual social media & mobile devices
 
ACFPE Social Networking Workshop
ACFPE Social Networking WorkshopACFPE Social Networking Workshop
ACFPE Social Networking Workshop
 
ASMI: Engagement and Brand
ASMI: Engagement and BrandASMI: Engagement and Brand
ASMI: Engagement and Brand
 
Twitter And Telco
Twitter And TelcoTwitter And Telco
Twitter And Telco
 
What Is Web 20?
What Is Web 20?What Is Web 20?
What Is Web 20?
 
How People are using Twitter at Conferences
How People are using Twitter at ConferencesHow People are using Twitter at Conferences
How People are using Twitter at Conferences
 
Keynote Edna July 2008
Keynote Edna July 2008Keynote Edna July 2008
Keynote Edna July 2008
 
Living Online Frankie Forsyth Pp V1
Living Online Frankie Forsyth Pp V1Living Online Frankie Forsyth Pp V1
Living Online Frankie Forsyth Pp V1
 
Net503 a.2 Williams
Net503 a.2 WilliamsNet503 a.2 Williams
Net503 a.2 Williams
 

Viewers also liked (6)

Entrepreneurship profile
Entrepreneurship profileEntrepreneurship profile
Entrepreneurship profile
 
Pengkajian Gerontik
Pengkajian GerontikPengkajian Gerontik
Pengkajian Gerontik
 
Task 1 of instrumentation
Task 1 of instrumentationTask 1 of instrumentation
Task 1 of instrumentation
 
Entrepreneurship profile print jadi
Entrepreneurship profile print jadiEntrepreneurship profile print jadi
Entrepreneurship profile print jadi
 
Presentasistu [autosaved]
Presentasistu [autosaved]Presentasistu [autosaved]
Presentasistu [autosaved]
 
Entrepreneurship Profile
Entrepreneurship ProfileEntrepreneurship Profile
Entrepreneurship Profile
 

Similar to Net503_a.2_Cooper

Twitter Terms of Service - Policy Primer
Twitter Terms of Service - Policy Primer Twitter Terms of Service - Policy Primer
Twitter Terms of Service - Policy Primer anielkerko
 
Future of social networking group project
Future of social networking   group projectFuture of social networking   group project
Future of social networking group projectbulgarej
 
Net 213 Policy Primer
Net 213 Policy PrimerNet 213 Policy Primer
Net 213 Policy Primercheahwey
 
Pharma Twitterama
Pharma TwitteramaPharma Twitterama
Pharma TwitteramaShwen Gwee
 
Online Policy Primer Twitter
Online Policy Primer TwitterOnline Policy Primer Twitter
Online Policy Primer Twitterguestb39306
 
Twitter Copyright Embeds Privacy #SMSociety14
Twitter Copyright Embeds Privacy #SMSociety14Twitter Copyright Embeds Privacy #SMSociety14
Twitter Copyright Embeds Privacy #SMSociety14Siobhan O'Flynn
 
The War on Attention Poverty: Measuring Twitter Authority
The War on Attention Poverty: Measuring Twitter AuthorityThe War on Attention Poverty: Measuring Twitter Authority
The War on Attention Poverty: Measuring Twitter AuthorityDaniel Tunkelang
 
Social Media and the Future of Privacy
Social Media and the Future of PrivacySocial Media and the Future of Privacy
Social Media and the Future of Privacyjulia594
 
Twitter For Jisc 1 March 2010
Twitter For Jisc 1 March 2010Twitter For Jisc 1 March 2010
Twitter For Jisc 1 March 2010Bex Lewis
 
Online Impact Oct 12 2009
Online Impact Oct 12 2009Online Impact Oct 12 2009
Online Impact Oct 12 2009Mike Qaissaunee
 
Online Impact Oct 12 2009
Online Impact Oct 12 2009Online Impact Oct 12 2009
Online Impact Oct 12 2009Mike Qaissaunee
 
Online Impact Oct 12 2009
Online Impact Oct 12 2009Online Impact Oct 12 2009
Online Impact Oct 12 2009Mike Qaissaunee
 
Online Impact Oct 12 2009
Online Impact Oct 12 2009Online Impact Oct 12 2009
Online Impact Oct 12 2009Mike Qaissaunee
 
Online Impact Oct 12 2009
Online Impact Oct 12 2009Online Impact Oct 12 2009
Online Impact Oct 12 2009Mike Qaissaunee
 
Online Impact Oct 12 2009
Online Impact Oct 12 2009Online Impact Oct 12 2009
Online Impact Oct 12 2009Mike Qaissaunee
 
Online Impact Oct 12 2009
Online Impact Oct 12 2009Online Impact Oct 12 2009
Online Impact Oct 12 2009Mike Qaissaunee
 
Online Impact Oct 12 2009
Online Impact Oct 12 2009Online Impact Oct 12 2009
Online Impact Oct 12 2009Mike Qaissaunee
 
Twitter Terms Policy Primer
Twitter Terms Policy PrimerTwitter Terms Policy Primer
Twitter Terms Policy Primerjustbecos
 

Similar to Net503_a.2_Cooper (20)

Twitter Terms of Service - Policy Primer
Twitter Terms of Service - Policy Primer Twitter Terms of Service - Policy Primer
Twitter Terms of Service - Policy Primer
 
Twitter terms of service
Twitter terms of serviceTwitter terms of service
Twitter terms of service
 
Future of social networking group project
Future of social networking   group projectFuture of social networking   group project
Future of social networking group project
 
Net 213 Policy Primer
Net 213 Policy PrimerNet 213 Policy Primer
Net 213 Policy Primer
 
Pharma Twitterama
Pharma TwitteramaPharma Twitterama
Pharma Twitterama
 
Online Policy Primer Twitter
Online Policy Primer TwitterOnline Policy Primer Twitter
Online Policy Primer Twitter
 
Twitter Copyright Embeds Privacy #SMSociety14
Twitter Copyright Embeds Privacy #SMSociety14Twitter Copyright Embeds Privacy #SMSociety14
Twitter Copyright Embeds Privacy #SMSociety14
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
The War on Attention Poverty: Measuring Twitter Authority
The War on Attention Poverty: Measuring Twitter AuthorityThe War on Attention Poverty: Measuring Twitter Authority
The War on Attention Poverty: Measuring Twitter Authority
 
Social Media and the Future of Privacy
Social Media and the Future of PrivacySocial Media and the Future of Privacy
Social Media and the Future of Privacy
 
Twitter For Jisc 1 March 2010
Twitter For Jisc 1 March 2010Twitter For Jisc 1 March 2010
Twitter For Jisc 1 March 2010
 
Online Impact Oct 12 2009
Online Impact Oct 12 2009Online Impact Oct 12 2009
Online Impact Oct 12 2009
 
Online Impact Oct 12 2009
Online Impact Oct 12 2009Online Impact Oct 12 2009
Online Impact Oct 12 2009
 
Online Impact Oct 12 2009
Online Impact Oct 12 2009Online Impact Oct 12 2009
Online Impact Oct 12 2009
 
Online Impact Oct 12 2009
Online Impact Oct 12 2009Online Impact Oct 12 2009
Online Impact Oct 12 2009
 
Online Impact Oct 12 2009
Online Impact Oct 12 2009Online Impact Oct 12 2009
Online Impact Oct 12 2009
 
Online Impact Oct 12 2009
Online Impact Oct 12 2009Online Impact Oct 12 2009
Online Impact Oct 12 2009
 
Online Impact Oct 12 2009
Online Impact Oct 12 2009Online Impact Oct 12 2009
Online Impact Oct 12 2009
 
Online Impact Oct 12 2009
Online Impact Oct 12 2009Online Impact Oct 12 2009
Online Impact Oct 12 2009
 
Twitter Terms Policy Primer
Twitter Terms Policy PrimerTwitter Terms Policy Primer
Twitter Terms Policy Primer
 

Recently uploaded

Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 

Recently uploaded (20)

Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 

Net503_a.2_Cooper

  • 2. What you need to know before clicking “I Agree”. A guide by Sian Cooper This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 2.5 Australia License.
  • 3. Firstly, what is Twitter? Twitter is a Social Networking Service that allows its users to post ‘Tweets’ containing 140 characters or less. Anybody over the age of 13 years can register for their own Twitter account. As long as you meet the minimum age requirement, you can be anything you want to be on Twitter… Even a pigeon!
  • 4. Prior to becoming an active user, you must agree to Twitters Terms of Service http://twitter.com/tos and Privacy Policy http://twitter.com/privacy
  • 5. Did you know that approximately 95% of people do not read through a ‘Terms of Service’ statement before clicking - Leaver, 2009.
  • 6. What have you just agreed to? http://www.flickr.com/photos/rosauraochoa/3274257201/in/photostream/
  • 7. Well… Firstly, Twitter is an open platform meaning that anything you post on Twitter can be broadcast to a wider audience… the general public… third party services and websites… virtually anybody that has access to the internet worldwide. http://www.flickr.com/photos/rosauraochoa/4527329648/in/photostream
  • 8.
  • 9. Why is it important to think before you Tweet? Although cyberspace is a virtual place where you cannot physically see the audience that will view the content that you post online… always remember that you have a worldwide audience. YOU are responsible for the content that you post online.
  • 10. http://www.flickr.com/photos/rosauraochoa/3326772902/ Tips: Try not to use offensive language, post misleading information or harmful content, share copyrighted images or pornographic material. These things may get you into trouble!
  • 11. Things that may get you into trouble… Recently, a “troll scandal” broke out on Twitter which resulted in an employee being suspended from her position at Monash University. She sent a Tweet to TV presenter Charlotte Dawson which read “If I was your fiancé I'd hang myself too #gohangyourself” (Byrnes, 2012). http://www.flickr.com/ph otos/rosauraochoa/35280 68649/in/photostream/
  • 12. Suicide taunts and other forms of harassment are not condoned on Twitter, and may place you in breach of Twitter’s rules and regulations.
  • 13. Cyber crime experts have warned that hate tweets could also be prosecuted as a breach of the Commonwealth Crimes Act, relating to using "a carriage service to menace, harass or cause offence or for the purposes of a threat“ - Byrnes, 2012. http://www.flickr.com/photos/rosauraochoa/4838897235/in/photostream/
  • 14. More things that may get you into trouble… Earlier this year, two British tourists were restricted from entering America following a joke on Twitter stating “I’m going to destroy America and dig up Marilyn Monroe” (Hartley-Parkinson, 2012). The Department of Homeland Security initially flagged one of the tourists as a potential threat following a Tweet stating “Free this week, for quick gossip/prep before I go and destroy America?” (Hartley-Parkinson, 2012). http://www.flickr.com/ph otos/rosauraochoa/35280 68649/in/photostream/
  • 15. The tourists were detained at Los Angeles airport on suspicion of ‘planning to commit crimes’. The 26 year old boy who initially sent the Tweet argued that the word ‘destroy’ is a British word used for ‘party’. Nevertheless, the content and wording of his Tweet was enough to place security officials on high alert. -Hartley-Parkinson (2012).
  • 16. Another thing to keep in mind… When posting images and sharing information on Twitter, please take note of and respect the copyright attached to the content that you are sharing. http://www.flickr.com/photos/27302612@N03/3179098895/
  • 17. Twitters Copyright Policy “Respects the intellectual property rights of others and expects users of the service to do the same” - Twitter Terms of Service (2012). http://www.flickr.com/photos/27302612@N03 /3179098895/
  • 18. What happens if you are in breach of the rules and regulations? If you are found to be in breach of the rules and regulations, Twitter has the right to remove and refuse to distribute content that you have posted, to suspend your http://www.flickr.com/photos/rosauraochoa/4838897235/in/photostream/ user account, or reclaim your username -Twitter Terms of Service (2012).
  • 19. Remember… YOU are responsible for your use of the services that Twitter provides, for any content you post and share, and for any consequences thereof. This includes other users and third party services using your content. - Twitter Terms of Service (2012).
  • 20. If you do not agree to these terms of service, then do not click
  • 21. What about Twitters Privacy Policy? http://www.flickr.com/photos/rosauraochoa/3528880050/in/photostream/
  • 22. Did you know… A Consumer Reports ‘State of the Net’ survey conducted in 2010 revealed that up to 9 per cent of social network users had experienced some form of abuse online in that past year, such as scams, harassment, and identity theft (Sachoff, 2010). Social network users that post personal information such as their full birth dates, home addresses, photos and names of children, have been found to be most at risk of falling victim to cybercrime (Sachoff, 2010).
  • 23. Although Twitter does ask you to provide some of your personal information during the registration process, such as your name, password, username and email address, you CAN control the amount of personal information that you share with the public by adjusting your
  • 24. Remember that, unless you adjust your PRIVACY SETTINGS, everything you post on Twitter is PUBLIC. This includes: Metadata provided with Tweets… Tweets… And Retweets. -Twitter Privacy Policy (2012). http://www.flickr.com/photos/rosauraochoa/3330891783/in/photostream/
  • 25.
  • 26. Twitter does not actively monitor every post that is published on it’s site, nor does it proactively remove Tweets on behalf of other users (Holt, 2012). If you feel that your privacy has been violated, you need to fill out a complaint form in order for Twitter to take further action. The complaint form can be found at https://support.twitter.com/forms/abusi veuser http://www.flickr.com/photos/carrotcreative/2511539541/
  • 27. What other types of information can Twitter access from you?  Your location information, such as the location that you are in when you send a Tweet from your mobile phone.  Twitter monitors your website usage by using tracking cookies (a small data file that is transferred to your computer), in order to gain a better understanding of how you use it’s services.  Log data, such as your computers IP address, the search terms that you use, your mobile carrier, and the pages that you have visited, are all recorded by Twitter.  Third-Party services may also retrieve aspects of information that are sent by your web browser, on the condition that these third parties use this data in line with Twitters Privacy Policy.  In the case that Twitter faces issues such as bankruptcy and sale of assets, your personal information and account information may be sold as part of that transaction. - Twitter Privacy Policy (2012).
  • 28. So… “We’re accustomed to thinking of the internet as being a neutral place, a blank sheet upon which we are free to do whatever we desire, whether liberal or conservative, corporate or anarchist, commercial or free” (Barthel, 2012).
  • 29. Always remember… “Before posting something about yourself or your family on the internet, ask yourself: have you or would you ever disclose this kind of information to a stranger in real life? If the answer is NO then you’d better think twice before you send it out into a world where it can be put to countless illicit uses and, more importantly, from which you may never be able to completely erase it” (Datcu, 2012).
  • 30. References Barthel, M. (July 5, 2012). What are the Politics of the Internet? The AWL. Retrieved 5th September 2012 from http://www.theawl.com/2012/07/politics-of-the-internet Byrnes, H. (August 29, 2012). Australia's Next Top Model judge Charlotte Dawson takes aim at Twitter trolls. News Limited Network. Retrieved 31st August 2012 from http://www.news.com.au/entertainment/television/australias-next-top-model-judge-charlotte-dawson-takes- aim-at-twitter-trolls/story-e6frfmyi-1226459899947 Carrotcreative. (May 21, 2008). Twitter Pack, [Image]. Retrieved 5th September 2012 from http://www.flickr.com/photos/carrotcreative/2511539541/ Dactu, S. (February 9, 2012). The Psychology of Personal Information Sharing. Bitfender Resource Center. Retrieved 4th September 2012 from http://www.bitdefender.com/blog/The-Psychology-of-Personal-Information- Sharing-44.html Hartley-Parkinson, R. (January 31, 2012). I'm going to destroy America and dig up Marilyn Monroe: British pair arrested in U.S. on terror charges over Twitter jokes. Mail Online. Retrieved 31st August 2012 from http://www.dailymail.co.uk/news/article-2093796/Emily-Bunting-Leigh-Van-Bryan-UK-tourists-arrested-destroy- America-Twitter-jokes.html Holt, K. (August 1, 2012). What to do when someone Tweets your phone number without permission. The Daily Dot. Retrieved 5th September 2012 from http://www.dailydot.com/society/how-to-twitter-privacy-complaint/
  • 31. References Leaver, T. (November 18, 2009). Learning, Authenticity & Online Policy Primers. Tama’s Learning Blog, [Blog]. Retrieved 28th August 2012 from http://tama.edublogs.org/ Marc.benton (January 4, 2009). Photography on Twitter, [Image]. Retrieved 1st September 2012 from http://www.flickr.com/photos/27302612@N03/3179098895/ Rosaura Ochoa. (April 16, 2010). Twitter on Paper , [Image]. Retrieved 3rd September 2012 from http://www.flickr.com/photos/rosauraochoa/4527329648/in/photostream Rosaura Ochoa. (May 13, 2009). Nonviolenceiamx_banner_120x600, [Image]. Retrieved 2nd September 2012 from http://www.flickr.com/photos/rosauraochoa/3528068649/in/photostream/ Rosaura Ochoa. (April 6, 2009). Twitter Profile, [Image]. Retrieved 2nd September 2012 from http://www.flickr.com/photos/rosauraochoa/3419823308/in/photostream/ Rosaura Ochoa. (May 13, 2009). Twitter_Good_Bad, [Image]. Retrieved 5th September 2012 from http://www.flickr.com/photos/rosauraochoa/3528880050/in/photostream/ Rosaura Ochoa. (March 5, 2009). Retweet, [Image]. Retrieved 5th September 2012 from http://www.flickr.com/photos/rosauraochoa/3330891783/in/photostream/ Rosaura Ochoa. (February 12, 2009). Twitter, [Image]. Retrieved 5th September 2012 from http://www.flickr.com/photos/rosauraochoa/3274257201/in/photostream/
  • 32. References Rosaura Ochoa. (July 28, 2010). Twitter En La Vida Real, [Image]. Retrieved 1st September 2012 from http://www.flickr.com/photos/rosauraochoa/4838897235/in/photostream/ Rosaura Ochoa. (March 3, 2009). Alto a la Violencia, [Image]. Retrieved 5th September 2012 from http://www.flickr.com/photos/rosauraochoa/3326772902/ Sachoff, M. (May 4, 2010). Social Network Users Posting Too Much Personal Information: Social Network Users Vulnerable to Cybercrime. WebProNews. Retrieved 4th September 2012 from http://www.webpronews.com/social-network-users-posting-too-much-personal-information-2010-05 Twitter Privacy Policy. (May 17, 2012). Retrieved 31st August 2012 from http://twitter.com/privacy Twitter Terms of Service. (June 25, 2012). Retrieved 31st August from http://twitter.com/tos