Pdf file of prezzo :
Parent Awareness Evening - Interactive workshop for parents to keep their children safe whilst using the Internet.
Monday 22 March 2010 4 7 part Library conference room -William Clark College, Morris Grove
This presentation covers utilizing Social Media to grow your business. Topics include branding, engagement and interaction with prospective customers and brand advocates.
This presentation covers utilizing Social Media to grow your business. Topics include branding, engagement and interaction with prospective customers and brand advocates.
Using Social Software For Online Classes - SlidecastAlan Lew
Examples of how I used blogs, wikis, and podcasts in an online class that I taught in Spring 2007 at Northern Arizona University. --- Note that this version of the Powerpoint presentation is slightly different from the audio file. There are a couple of slides at the start and at the end that were not in the presentation when the audio was recorded, and there is one slide at the end that I mention (very briefly) that is not in the slidecast. --- Long story....
Social Networking - An Ethical Hacker's ViewPeter Wood
People gossip because they like gossiping together. It’s in the make-up of the creature: humans are sociable gossiping animals. We can't change those core characteristics of our natures.
Cybersafety talk given to parents at William Clark College:
How can I be sure my child will be safe when using the Internet?
What are the new social networking sites?
How can I learn more about protecting my child? Internet Safety - Parent A wareness Evening
Come to an interactive workshop where these issues will be addressed to help you learn how to best protect your children when using the Internet. The evening will include a 30 minute demonstration session followed by Q&A. All are welcome to attend free of charge; tea/coffee will be available.
Facilitator: Suresh Sood (Researcher with the School of Marketing in the Faculty of Business, University of Technology Sydney)
Monday 22" , March 2010, 7 pm William Clarke College, Library Conference Room
Enquiries: Liz Nix Ph 8882 2100 (extension 182) efn@wcc.nsw.edu.au
l highly recommend this workshop to all College parents and encourage you to attend and invite others who may be interested: David Raphael
Social media advice for parents of teens and tweens.
How do you talk to your kids about social media?
Includes basic stay safe tips for internet, mobile, and beyond, plus a look at the major platforms.
Newcastle graduates of the last decade (gold) the digital generation?Ewan McIntosh
A presentation given to Graduates Of the Last Decade from Newcastle University, in The Hospital Club, London, April 16th.
The main areas: there is huge potential for investment in digital media ideas, particularly in the North of the UK; part of this is understanding that mobile and gaming constitute a mindset as well as interesting technologies and platforms on which to develop; your personal reputation is as important as your ideas - make sure you're not just Googleable thanks to the legwork you've done building a digital profile, but thanks to the positive contributions you make to your communities.
2nd part of presentation The Future of Media deals with Content. Again, very few slides in which I try to offer basic references when looking into the future with the objective of presenting practical guidelines being followed by media companies, regardless of their size, when trying to build the news content they need.
Knowledge and Content UK 2009 (KCUK) presentation and case studyScott Gavin
This is the presentation we gave at the Knowledge and Content conference in London, June 2009. We were praised for not 'selling' even though we were there as vendors/sponsors. Without the narrative it's not the easiest set of slides to read but you get the idea.
Using Social Software For Online Classes - SlidecastAlan Lew
Examples of how I used blogs, wikis, and podcasts in an online class that I taught in Spring 2007 at Northern Arizona University. --- Note that this version of the Powerpoint presentation is slightly different from the audio file. There are a couple of slides at the start and at the end that were not in the presentation when the audio was recorded, and there is one slide at the end that I mention (very briefly) that is not in the slidecast. --- Long story....
Social Networking - An Ethical Hacker's ViewPeter Wood
People gossip because they like gossiping together. It’s in the make-up of the creature: humans are sociable gossiping animals. We can't change those core characteristics of our natures.
Cybersafety talk given to parents at William Clark College:
How can I be sure my child will be safe when using the Internet?
What are the new social networking sites?
How can I learn more about protecting my child? Internet Safety - Parent A wareness Evening
Come to an interactive workshop where these issues will be addressed to help you learn how to best protect your children when using the Internet. The evening will include a 30 minute demonstration session followed by Q&A. All are welcome to attend free of charge; tea/coffee will be available.
Facilitator: Suresh Sood (Researcher with the School of Marketing in the Faculty of Business, University of Technology Sydney)
Monday 22" , March 2010, 7 pm William Clarke College, Library Conference Room
Enquiries: Liz Nix Ph 8882 2100 (extension 182) efn@wcc.nsw.edu.au
l highly recommend this workshop to all College parents and encourage you to attend and invite others who may be interested: David Raphael
Social media advice for parents of teens and tweens.
How do you talk to your kids about social media?
Includes basic stay safe tips for internet, mobile, and beyond, plus a look at the major platforms.
Newcastle graduates of the last decade (gold) the digital generation?Ewan McIntosh
A presentation given to Graduates Of the Last Decade from Newcastle University, in The Hospital Club, London, April 16th.
The main areas: there is huge potential for investment in digital media ideas, particularly in the North of the UK; part of this is understanding that mobile and gaming constitute a mindset as well as interesting technologies and platforms on which to develop; your personal reputation is as important as your ideas - make sure you're not just Googleable thanks to the legwork you've done building a digital profile, but thanks to the positive contributions you make to your communities.
2nd part of presentation The Future of Media deals with Content. Again, very few slides in which I try to offer basic references when looking into the future with the objective of presenting practical guidelines being followed by media companies, regardless of their size, when trying to build the news content they need.
Knowledge and Content UK 2009 (KCUK) presentation and case studyScott Gavin
This is the presentation we gave at the Knowledge and Content conference in London, June 2009. We were praised for not 'selling' even though we were there as vendors/sponsors. Without the narrative it's not the easiest set of slides to read but you get the idea.
Intuitive Navigation for Future HospitalsBen Kraal
My presentation for the QUT IHBI Quest seminar on Friday 19 July. It's supposed to be a 5 minute presentation with three other academics followed by a panel discussion.
We (Design Researchers at the People and Systems Lab, QUT) do a lot of work with video, collected in our usability lab and in the field, but we rarely show that video to other people. We’ve found that by turning video into visualisations it’s easier to compare different videos. When we have visualistions that “sit still” the patterns of use that people engage in become more apparent. In order to make the video “sit still” we use the common technique of coding behaviours and activities that we are interested in observing.
In this presentation Dr Ben Kraal will show some of these visualisations and talk about how they work and how we’ve used them to develop insights into the activities we observed.
In particular this presentation will show how we used these visualisations to understand the different levels of expertise shown by nurses doing compression bandaging to treat venous leg ulcers.
My presentation from UX Australia 2011.
I discussed some recent research from the QUT Airports of the Future project's Human Systems team. I explored how to make better sense of people's actions and experience during service interactions using the concept of frames.
Looking for Expertise in Physical InteractionsBen Kraal
Slides from my presentation at OZCHI 2007.
Will probably not mean a great deal without the presentation or the paper.
Also, pictures of nurses and bandaging process have been removed for reason of confidentiality.
In the Serial Number Feat, a spectator keeps a bill's serial number hidden from the performer. The performer asks for several totals from the serial number, and after some calculations, is able to give the serial number itself!
Social Media and Privacy - Education Across the Nation - Australian Computer ...Mining Oil and Gas Jobs
Developed for the Australian Computer Society's Education Across the Nation series - First quarter, 2012
Social media is firmly entrenched in our society, both in our professional and personal lives. The way we communicate with each other has changed because of these tools. Understanding what content to share and how the information flows through your network is a critical step in addressing privacy concerns. Old privacy concerns are no longer valid and you may be unintentionally exposing yourself, your family and friends.
This presentation is designed to provide information and frank discussion about the privacy issues surrounding social media. In addition, recommendations for corporate social media policies and the role of IT in social media will be addressed.
Social Media and Privacy - Education Across the Nation - Australian Computer ...Typeset
Social media is firmly entrenched in our society, both in our professional and personal lives. The way we communicate with each other has changed because of these tools. Understanding what content to share and how the information flows through your network is a critical step in addressing privacy concerns. Old privacy concerns are no longer valid and you may be unintentionally exposing yourself, your family and friends.
This presentation is designed to provide information and frank discussion about the privacy issues surrounding social media. In addition, recommendations for corporate social media policies and the role of IT in social media will be addressed.
Presented in first quarter 2012 as the Education Across the Nation (EDxN) series for the Australian Computer Society.
Going beyond google 2 philadelphia loss conferencemikep007
Some attorneys have argued that scouring social networking sites in search of a reason not to hire someone, or evidence of insurance fraud, is an invasion of privacy. But insurance companies and their attorneys argue that internet searches for public social networking profiles are similar to the informal video surveillance investigations of property-casualty claimants that are common in the industry.
Clifford Chance, Canary Wharf London. 3rd July 2012
I use PP as a 'background' so it will be difficult to get all what I was saying by just seeing the slides. However, it may be useful so here it is, in the spirit of sharing
Online Networking: Using Social Media to Grow Your NetworkRasmussen College
It's no secret that social media is helping businesses grow. Facebook and Twitter have taken over mainstream media; however, jumping into social media without any kind of plan is not going to show results. Our Rasmussen College subject matter expert, Dana DeLapi-Haesemeyer, shows you how to strategically use social media to boost marketing efforts, customer service and spur sales.
Data Science Innovations is a guest lecture for the Advanced Data Analytics (an Introduction) course at the Advanced Analytics Institute at University of Technology Sydney
Data Science Innovations : Democratisation of Data and Data Science suresh sood
Data Science Innovations : Democratisation of Data and Data Science covers the opportunity of citizen data science lying at the convergence of natural language generation and discoveries in data made by the professions, not data scientists.
1. Social Networks, Digital Breadcrumbs & Privacy
GreatMystery14
soody
www.facebook.com/sureshsood
ssood
Hero5!
twi7er.com/soody
www.bravenewtalent.com/talent/suresh_sood
www.linkedin.com/in/sureshsood
Geektoid
scuzzy55
Mangala
suresh.sood@uts.edu.au
2.
3.
4. Agenda
0.
Inappropriate
Content
and
Contact
1.
Online
Social
Networks
101,
“FaceBook
to
Dogster”
2.
TV
3.0
-‐
The
Future
of
Social
Networks
3.
How
should
I
organise
my
security
seUngs?
4. Where
does
Twi7er
Fit?
5. Digital
Breadcrumbs
6.
Steps
to
Avoid
Social
Engineering
A7acks
7. The
Australian
Government
Resources
for
Safety
on
the
Internet
8. Parents
–
What
Should
We
Do?
9. Social
Media
• Blog
– reflect,
read,
write
and
comment
e.g.
WordPress,
LiveJournal,
• Microblogging
– brief
notes,
messages,
comments
e.g.
Twi7er,
Tumblr
• Social
Network
– connect,
communicate,
and
sharee.g.
Facebook,
Ning,
MySpace,
etc
• Generate
content
– upload
content
to
share
with
others,
comment
or
tag
or
reuse
the
content
e.g.
YouTube,
Vimeo,
Flickr,
Slideshare
10. Social
Networking
Sites
• Parse
through
friends
ac`vi`es
forwards
&
reverse
as
well
as
own
social
gestures
• Allow
users
to:
– Create
personal
profiles
inclusive
of
loca`on
informa`on
– Write
status
updates
(pos`ngs
to
friends)
c.f.
blog
entries
– Friends
specify
updates
they
like
– Post
photographs,
videos,
and
audio
clips
– Send
and
receive
private
messages
– Link
to
the
pages
of
friends
11. TV
3.0
Livesta`on
All
your
channels
in
one
place
Surf
and
email
while
you
watch
Instant,
live
chat
with
others
watching
Livesta`on
Desktop
alerts
bring
you
breaking
news
and
Livesta`on
updates
Share
with
friends.
Boxee
makes
it
easy
for
friends
to
share
their
favorite
movies,
TV
Shows,
and
songs
with
each
other,
on
Boxee
or
on
social
networks
like
Facebook
and
Twi7er.
13. Facebook
is
My
Newspaper
(Susie
Wilkening,
h7p://reachadvisors.typepad.com/
OneRiot.com:
Search
the
real`me
web
14.
15. 16
million
people
in
the
UK
accessed
Internet
via
mobile
phones
in
December
2009.
Total
of
6.7
billion
pages
and
4.8
billion
minutes
online
during
the
month.
Top
10
sites
accounted
for
70
per
cent
of
both
total
pages
viewed
and
total
`me
spent
online
17. Facebook
• Founded
in
2004,
primarily
catering
to
students
• Over
400M
ac`ve
members
worldwide
with
2011
predic`ons
for
1
billion
users
(Gartner)
• Facebook
has
communi`es,users,applica`ons
&
albums
• Over
10
Billion
photos
in
Oct
2008
and
adds
over
3Billion
monthly
• Australian
8.1
M
users
in
October2009
had
uploaded
80
million
pictures
and
wri7en
32
million
"wall
posts"
and
45
million
"status
updates".
(Nielsen
Online)
• Australians
are
spending
29%
of
all
`me
browsing
the
internet
on
Facebook
alone
(Nielsen)
• Applica`ons
run
on
Facebook
platorm
• True
names
encouraged
but
not
guaranteed
• Privacy
model
is
highly
granular
– present
different
informa`on
to
different
groups
or
individual
users
• Messaging
includes
mail,
real-‐`me
chat,
"wall"
• Now
used
in
private
background
checks
18.
19.
20. Inappropriate
Contact
with
Strangers
and
Bullies
Public
info:
Name,
Profile
Picture,
Current
City,
Gender,
Networks,
Friend
List
and
Pages.
20
21. Facebook
Tips
-‐
Privacy
• Friends
Lists
• Facebook
Search
&
Google
• Photo
Tag
Mishaps
• Rela`onship
Changes
• Contact
Info
• Wall
Pos`ngs
22.
23. TWITTER
• Market
leader
in
"micro-‐blogging"
• Began
in
mid-‐2006
as
"status
message"
service
•
Ubiquity
and
ease
of
upda`ng,
but
limited
space
• Breaking
news,
real-‐`me
updates:
USAir,
Iran
• Most
mul`media
handled
by
3d
party
links
• Simplified
privacy
model:
updates
public
or
private
• Most
Twi7er
content
is
public
• Private
messages
kept
un`l
user
deletes
them
• Direct
messages
are
private;
sender
can
delete
• Short
URLs
used
to
serve
malicious
links
and
code
27. Social
Engineering
A7acks
• Malicious
sovware
(malware)
is
installed
into
a
computer
fixed
or
mobile
−
to
collect
personal
informa`on
over
`me.
•
Computers
or
mobile
devices
are
hacked
for
personal
data.
• Phishing
– criminals
use
decep`ve
e-‐mails
to
get
users
to
divulge
personal
informa`on,
includes
luring
them
to
fake
bank
and
credit-‐
cards
websites.
“Pharming”:
using
decep`ve
e-‐mail
messages
to
redirect
users
from
an
authen`c
website
to
a
fraudulent
one,
which
replicates
the
original
in
appearance.
– “SMiShing”:
sending
text
messages
(“SMS”)
to
cell
phone
users
that
trick
them
into
going
to
a
website
operated
by
the
thieves.
Messages
typically
say
that
unless
users
go
to
the
website
and
cancel,
they
will
be
charged
for
services
they
never
actually
ordered.
– “Spear-‐phishing”:
impersona`ng
a
company
employee/employer
via
e-‐
mail
in
order
to
steal
colleagues’
passwords/
usernames
and
gain
access
the
company’s
computer
system.
ID
thieves
misuse
vic`ms’
personal
info.