This document discusses social media and provides tips for safe usage. It defines social media as online platforms that allow users to create and share content. While social media can help people connect, it also poses risks if personal information is shared publicly. The document provides 10 tips for maintaining privacy and a positive online reputation, such as customizing privacy settings, limiting work history on profiles, avoiding oversharing of details, and being aware of how sites collect and use personal data. The overall message is that social media users should educate themselves on appropriate usage and potential downsides to ensure their online presence does not harm them professionally or personally.
Association of Fundraising Professionals G-09 Session. A social media starting guide to help NFP leaders and fundraisers better understand the functionality of key social media platforms.
Association of Fundraising Professionals G-09 Session. A social media starting guide to help NFP leaders and fundraisers better understand the functionality of key social media platforms.
This presentation was given by the National Weather Service Southern Region Social Media team to help NWS offices improve their status updates and better use Facebook.
This is a training that was conducted for the NWS offices. It includes the basics of Twitter, some tips and best practices for NWS offices to use on Twitter and finally a section on detecting fake tweets and fake pictures.
Presentation given by Natalie Wardel and Janelle Hanson at the Utah PIO Conference in Sept. 2013. How to Pitch Media, public relations tips, and social media tools to use as well as some ideas and best practices for police officers, state agencies, etc.
This presentation was created for students and parents of children from 5th to 8th grade regarding staying safe online on the Internet in general and on social networking sites in particular.
Rough ideas, perspectives and diagrams about the coolest thing since pirate radio. Yes, social media. Enjoy - but do note that this presentation works better when it's presented face to face.
11 tips for commenting on live events on social mediaBernard Muscat
After live-commenting the parliamentary vote on marriage equality for the Malta Gay Rights Movement on Facebook and Twitter (12 July 2017), here are 11 tips for successfully live-commentary on social media.
Twitter is an online social media website and phenomenon that is spurring a new revolution on the Internet -- and in modern business. More than 50 million users have joined its ranks in the past two years, and Twitter.com is amongst the most heavily used and most influential websites on the Internet.
This online presentation provides an overview of Twitter, its position and context on the Internet relative to other online tools and social media (Web 2.0), and how to use Twitter as a business tool for increasing sales, and building (or safe-guarding) corporate reputation. Presented by Toby Ward, Prescient Digital Media, for IFCA, Insurance and Financial Communicators Association (members only webinar).
This presentation was given by the National Weather Service Southern Region Social Media team to help NWS offices improve their status updates and better use Facebook.
This is a training that was conducted for the NWS offices. It includes the basics of Twitter, some tips and best practices for NWS offices to use on Twitter and finally a section on detecting fake tweets and fake pictures.
Presentation given by Natalie Wardel and Janelle Hanson at the Utah PIO Conference in Sept. 2013. How to Pitch Media, public relations tips, and social media tools to use as well as some ideas and best practices for police officers, state agencies, etc.
This presentation was created for students and parents of children from 5th to 8th grade regarding staying safe online on the Internet in general and on social networking sites in particular.
Rough ideas, perspectives and diagrams about the coolest thing since pirate radio. Yes, social media. Enjoy - but do note that this presentation works better when it's presented face to face.
11 tips for commenting on live events on social mediaBernard Muscat
After live-commenting the parliamentary vote on marriage equality for the Malta Gay Rights Movement on Facebook and Twitter (12 July 2017), here are 11 tips for successfully live-commentary on social media.
Twitter is an online social media website and phenomenon that is spurring a new revolution on the Internet -- and in modern business. More than 50 million users have joined its ranks in the past two years, and Twitter.com is amongst the most heavily used and most influential websites on the Internet.
This online presentation provides an overview of Twitter, its position and context on the Internet relative to other online tools and social media (Web 2.0), and how to use Twitter as a business tool for increasing sales, and building (or safe-guarding) corporate reputation. Presented by Toby Ward, Prescient Digital Media, for IFCA, Insurance and Financial Communicators Association (members only webinar).
Malaria is a parasitic disease caused by the protozoan of genum plasmodium
spread by mosquitoes
It affects millions of people worldwide, and causes significant illness and mortality
Symptoms- fever, headache, muscle pain, vomiting
5 Easy Steps to Social Media progress for your Non-Profit - Presented to Oakl...Dan Cohen
Five Social Media steps to take right now for your non-profit organization
Program sponsored by CARD - Collaborating Agencies Responding to Disaster & the Alameda County Public Health Department
The Internet has evolved into a collaborative environment where anyone can publish information as easily as viewing or downloading it. There are many powerful learning opportunities on the Internet and we want to ensure our students get the most of this valuable tool while being safe. This session includes introductions to the technologies, the benefits, the concerns, and proactive strategies for keeping students safe.
Fear free emergency preparedness with social mediaDan Cohen
Using social media for fear free emergency preparedness - Prepare for Health!
This is a joint effort between CARD - Collaborating Agencies Responding to Disaster & the Alameda County Public Health Department.
Presentation delivered for the Cornwall Business Enterprise Centre. Explain what is a Value Proposition and how to write it so your customers understand.
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesSanjeev Rampal
Talk presented at Kubernetes Community Day, New York, May 2024.
Technical summary of Multi-Cluster Kubernetes Networking architectures with focus on 4 key topics.
1) Key patterns for Multi-cluster architectures
2) Architectural comparison of several OSS/ CNCF projects to address these patterns
3) Evolution trends for the APIs of these projects
4) Some design recommendations & guidelines for adopting/ deploying these solutions.
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
Wireless communication involves the transmission of information over a distance without the help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
Features of Wireless Communication
The evolution of wireless technology has brought many advancements with its effective features.
The transmitted distance can be anywhere between a few meters (for example, a television's remote control) and thousands of kilometers (for example, radio communication).
Wireless communication can be used for cellular telephony, wireless access to the internet, wireless home networking, and so on.
# Internet Security: Safeguarding Your Digital World
In the contemporary digital age, the internet is a cornerstone of our daily lives. It connects us to vast amounts of information, provides platforms for communication, enables commerce, and offers endless entertainment. However, with these conveniences come significant security challenges. Internet security is essential to protect our digital identities, sensitive data, and overall online experience. This comprehensive guide explores the multifaceted world of internet security, providing insights into its importance, common threats, and effective strategies to safeguard your digital world.
## Understanding Internet Security
Internet security encompasses the measures and protocols used to protect information, devices, and networks from unauthorized access, attacks, and damage. It involves a wide range of practices designed to safeguard data confidentiality, integrity, and availability. Effective internet security is crucial for individuals, businesses, and governments alike, as cyber threats continue to evolve in complexity and scale.
### Key Components of Internet Security
1. **Confidentiality**: Ensuring that information is accessible only to those authorized to access it.
2. **Integrity**: Protecting information from being altered or tampered with by unauthorized parties.
3. **Availability**: Ensuring that authorized users have reliable access to information and resources when needed.
## Common Internet Security Threats
Cyber threats are numerous and constantly evolving. Understanding these threats is the first step in protecting against them. Some of the most common internet security threats include:
### Malware
Malware, or malicious software, is designed to harm, exploit, or otherwise compromise a device, network, or service. Common types of malware include:
- **Viruses**: Programs that attach themselves to legitimate software and replicate, spreading to other programs and files.
- **Worms**: Standalone malware that replicates itself to spread to other computers.
- **Trojan Horses**: Malicious software disguised as legitimate software.
- **Ransomware**: Malware that encrypts a user's files and demands a ransom for the decryption key.
- **Spyware**: Software that secretly monitors and collects user information.
### Phishing
Phishing is a social engineering attack that aims to steal sensitive information such as usernames, passwords, and credit card details. Attackers often masquerade as trusted entities in email or other communication channels, tricking victims into providing their information.
### Man-in-the-Middle (MitM) Attacks
MitM attacks occur when an attacker intercepts and potentially alters communication between two parties without their knowledge. This can lead to the unauthorized acquisition of sensitive information.
### Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks
This 7-second Brain Wave Ritual Attracts Money To You.!nirahealhty
Discover the power of a simple 7-second brain wave ritual that can attract wealth and abundance into your life. By tapping into specific brain frequencies, this technique helps you manifest financial success effortlessly. Ready to transform your financial future? Try this powerful ritual and start attracting money today!
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBrad Spiegel Macon GA
Brad Spiegel Macon GA’s journey exemplifies the profound impact that one individual can have on their community. Through his unwavering dedication to digital inclusion, he’s not only bridging the gap in Macon but also setting an example for others to follow.
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC
Ellisha Heppner, Grant Management Lead, presented an update on APNIC Foundation to the PNG DNS Forum held from 6 to 10 May, 2024 in Port Moresby, Papua New Guinea.
3. of the power that we have with socialof the power that we have with social
media.media.
of the lack of control we have.of the lack of control we have.
of the importance of responsible use bothof the importance of responsible use both
personally and professionally.personally and professionally.
Awareness
5. The conversation isThe conversation is notnot::
controlledcontrolled
organizedorganized
““on messageon message””
The conversationThe conversation isis::
organicorganic
complexcomplex
speaks in aspeaks in a human voicehuman voice
Social media isSocial media is not anot a
strategystrategy or aor a tactictactic ––
it’s simply ait’s simply a channelchannel..
10. Why some prefer texting
PRIVACY: less likely to be overheard.
this can also be a matter of courtesy.
GREATER ACCESSIBILITY: people with hearing impairments
to compensate for ambient noise, weak or spotty
cell network connections,
poor quality of microphones and speakers
TIME. Typically, text messaging encourages briefer, more efficient exchanges of
information.
PRESSURE TO RESPOND IMMEDIATELY
you can finish a task at hand
(such as parking your car)
or to consider what you want to say
can also reduce the chance of instantly BLURTING A RESPONSE that you'd later
regret.
12. Making sure that you are saying what you
want the person to know
and
That the person understands what you
intended to say
Challenge of texting
12
13.
14.
15. 1.Be careful with
abbreviations.
Texting is meant to be a fast form of
communication, so it's common to use
abbreviations and shortcuts such as "LOL"
(laugh out loud), "np" (no problem), or
"u" (you). But there is such a thing as an
inappropriate abbreviation.
Make sure it’s appropriate for 'u' to be that informal.
Only use those that are widely known.
A good rule of thumb is to only type what you would be comfortable saying out loud.
Ultimately, the safest route is to type out the entire word or phrase.
16. LOL Laugh out Loud
TTFN Ta Ta For Now
FYI For Your Information
L8R Later
KNIM Know what I mean?
ILBL8 I’ll be late
WDALYIC Who Died and Left you in Charge
17. 2. Be aware of your tone.
Complete sentences – read message before you send
Avoid negative words « failure » « wrong » « neglected »
Please and Thank you
18.
19. 4. Don't change meeting times or venues in
a text. (any time sensitive info)
The potential attendees may not check their phones in time.
"Older workers may not look at their phones as often as their younger
counterparts."
If you're going to change a meeting time or venue at the last minute, give
the person a call out of respect.
20. 5. Always double check when using the
voice-to-text or auto correct feature.
But a lot can be lost in the translation. Make sure that what you said is what
is showing as text, before you hit the send button.
Your phone may be picking up a conversation nearby or even lyrics from a
song on the radio.
It might be a bit confusing for your professional contact to get messages
from you that read like the latest Beyonce single.
20
21.
22. Social ReputationSocial Reputation
Why is it important?
•We live in a 24 hour/day media world
•The Internet is forever
•Delete does not = erase
•Social / online reputation impacts off-line life
and job relationships
•From Email to Instagram – You are leaving a
permanent social footprint
23. Social ReputationSocial Reputation
Social Media Managers
•Each one of you is a social media manager
•You represent yourself, your family your
employer
•What you tweet post and pin becomes your
social reputation
•Your reputation becomes one part of the
Agency’s reputation.
•The community is watching.
26. Social ReputationSocial Reputation
Don’t share, say or do anything that you
wouldn’t share say or do at a party.
(Think Grandma’s 80th birthday, not a 5
year college reunion)
27.
28.
29.
30. cloud com·put·ing
noun: cloud computing;
the practice of using a network of remote servers
hosted on the Internet to store, manage, and
process data, rather than a local server or a
personal computer.
30
31.
32. In other words:
Information we publish and store via
social media platforms are hosted on
servers over which you have no control.
You must have complete faith in the
supplier’s integrity and honesty.
33.
34. What does Google know about you?
https://www.google.com/settings/dashboard
https://history.google.com/history/lookup?hl=en&st=fin
http://google.com/ads/preferences
35. Facebook…
Name
City of birth
City of residence
Phone
Email
Current employment
Previous employment
Relationship
Anniversary
Previous relationships
Previous names (aliases)
Screen names
Address book
Family members
Birthday
Religious views
Address
Website
Email address(s)
Sexual preference
Gender
Languages spoken
Political views
Friends
Books you’ve read
Bands you like
Movies you’ve seen
TV Shows you watch
Video games you play
Food you eat
Your Favorite Athletes
Restaurants you’ve eaten at
Activities you participate in
Websites you visit
Sports teams you support
Your Favorite Sports
Inspirational people
Favorite Clothing brands
Places you’ve visited
Events you’ve attended
Events you plan on attending
Events your friends are attending
Major life events (location, dates, who with)
Photos
Wall posts
Private (haha yeah right) messages
Groups you’ve joined
Networks you are a part of
40. “People who receive more likes and comments tend to
experience the benefits of social inclusion, whereas those
who receive none feel ostracized,”
Although our results suggest that narcissists’ bragging pays
off because they receive more likes and comments to their
status updates, it could be that their Facebook friends
politely offer support while secretly disliking such egotistical
displays,”
“Greater awareness of how one’s status updates might be
perceived by friends could help people to avoid topics that
annoy more than they entertain.”
39
41.
42.
43. TIP 1 – Beware of TMI: the five things you
should never share
•Social insurance number ...duh! Not even the last few digits.
•Birth date
•Home address
•Home phone number
•Province where you were born
52. TIP 4 – Don’t trust, just verify
There are lots of reasons (most of them
bad) why someone might impersonate or
falsify an identity online.
#shinypony
53. TIP 5 – Avoid accidentally sharing personal
details
You wouldn’t put a
note on your front
door stating, “Away
for the weekend…
Returning on
Monday.”
56. TIP 8 – Learn how sites can use your
information
57. TIP 8 – Learn how sites can use your
information
58. July 2014 … Facebook performed
manipulative social experiments on
unknowing users.
They changed the information posted on
689,000 users’ home pages and
discovered it was able to influence the way
users felt via “emotional contagion.”
This approach subtly changed users’ views
so they found themselves posting more
positive or negative content, depending on
levels of exposure.
61. TIP 10– Be an informed employee
As texting and social networking become
prominent, become familiar with your agency
policy and procedures by reading through all
related guidelines to be aware of boundaries of
use and appropriate communications.
Editor's Notes
When you're writing short and fast, you're not thinking about your tone and "your text may sound harsher than you intend,“
Try to write in complete sentences to prevent sounding abrupt, and always read your message out loud to make sure it doesn't sound too harsh.
Avoid negative words such as 'failure,' 'wrong,' or 'neglected,'
"Use 'please' and 'thank you.' "
Don’t give negative feedback in a text,
Speak to the person concerned. IF negative feedback or bad news must be conveyed do it in person.
The bottom line is that texting is too casual a medium to give bad news.
It's difficult to know what tone you're giving off in a text message,
It's safer to stick to only good news when sending texts to people in your professional network.