Social media platforms collect users' personal information which can sometimes be accessed or shared without users' consent, violating their privacy. Some key privacy issues discussed include data breaches from hacker attacks and third party apps, cyber manhunts doxing users, and targeted ads using private message content. Governments have begun enacting privacy laws while platforms and users also have responsibilities - platforms to protect data and be transparent, and users to manage privacy settings and share information wisely. Overall the document discusses important social media privacy concerns and some measures taken to enhance protection.
Originally crafted for re:publica 2015 by @TetyUAna, @MaliciaRogue, and @NikiBGD, this is an updated version of Plug & Play News for the European Press Youth Digital Media Literacy Program.
Fake news is untrue information presented as news. It often has the aim of damaging the reputation of a person or entity or making money through advertising revenue. Once common in print, the prevalence of fake news has increased with the rise of social media, especially the Facebook News Feed
Plug & Play News: Sourcing and Verifying News Online in 2022Niki Radisic
Drawing on real-life examples and first-hand accounts of reporting on crisis situations in Eastern Europe, the first version of Plug & Play News was created in 2014 and presented at re:publica Berlin 2015 conference. Regardless of year or location, the tools and methods used to source, verify, and make critical information available to the public in real-time are applicable in similar contexts worldwide.
Originally crafted for re:publica 2015 by @TetyUAna, @MaliciaRogue, and @NikiBGD, this is an updated version of Plug & Play News for the European Press Youth Digital Media Literacy Program.
Fake news is untrue information presented as news. It often has the aim of damaging the reputation of a person or entity or making money through advertising revenue. Once common in print, the prevalence of fake news has increased with the rise of social media, especially the Facebook News Feed
Plug & Play News: Sourcing and Verifying News Online in 2022Niki Radisic
Drawing on real-life examples and first-hand accounts of reporting on crisis situations in Eastern Europe, the first version of Plug & Play News was created in 2014 and presented at re:publica Berlin 2015 conference. Regardless of year or location, the tools and methods used to source, verify, and make critical information available to the public in real-time are applicable in similar contexts worldwide.
Brian Housand, Ph.D.
brianhousand.com
@brianhousand
In 2006, we first learned that even the brightest students were easily fooled by internet hoaxes like the Pacific Northwest Tree Octopus. While we tried to laugh this off as the folly of misguided youth, a decade later we witnessed the rise of fake news and its impact on the “post-truth” world of 2016 overrun by an ever-growing network of social media. To fight for truth, justice, and yes, even the American way, this session presents a collection of superhero-themed critical thinking activities designed to empower you and your students to conquer the evils of fake news.
Handling fake news and eyewitness mediaAlastair Reid
How to debunk hoaxes effectively, deal with graphic images and understand copyright on social media – as presented at the 2016 Online News Association annual conference
Plug & Play News: Sourcing, Verifying and Publishing Info in Real-Time Crisis. Presented at 're:publica 15'
More info: https://re-publica.de/session/plug-play-news-sourcing-verifying-and-publishing-information-real-time-crisis
What is 'fake news', why it matters and what we can do to help curb it. How do we build brands in a post-truth era? How to build emotional connections, respond in a crisis and power start-ups with social media
I was recently asked to put together a presentation on the fake news phenomenon for discussions with leading journalists and media institutions in a developing country, with extremely poor media literacy but strong growth around social media use, on how to both identify misleading content and also stem its flow, reach and influence.
Download the full presentation as a PowerPoint (with embedded videos) or as an Apple Keynote file, here - https://drive.google.com/open?id=0Bxbk4wYolphwcVk4bV85aEFtYXc
Detailed Research on Fake News: Opportunities, Challenges and MethodsMilap Bhanderi
This paper is submitted at Dalhousie University for Technology Innovation course as a deliverable. This paper focuses on the opportunities, challenges and methods for Fake news.
Brian Housand, Ph.D.
brianhousand.com
@brianhousand
In 2006, we first learned that even the brightest students were easily fooled by internet hoaxes like the Pacific Northwest Tree Octopus. While we tried to laugh this off as the folly of misguided youth, a decade later we witnessed the rise of fake news and its impact on the “post-truth” world of 2016 overrun by an ever-growing network of social media. To fight for truth, justice, and yes, even the American way, this session presents a collection of superhero-themed critical thinking activities designed to empower you and your students to conquer the evils of fake news.
Handling fake news and eyewitness mediaAlastair Reid
How to debunk hoaxes effectively, deal with graphic images and understand copyright on social media – as presented at the 2016 Online News Association annual conference
Plug & Play News: Sourcing, Verifying and Publishing Info in Real-Time Crisis. Presented at 're:publica 15'
More info: https://re-publica.de/session/plug-play-news-sourcing-verifying-and-publishing-information-real-time-crisis
What is 'fake news', why it matters and what we can do to help curb it. How do we build brands in a post-truth era? How to build emotional connections, respond in a crisis and power start-ups with social media
I was recently asked to put together a presentation on the fake news phenomenon for discussions with leading journalists and media institutions in a developing country, with extremely poor media literacy but strong growth around social media use, on how to both identify misleading content and also stem its flow, reach and influence.
Download the full presentation as a PowerPoint (with embedded videos) or as an Apple Keynote file, here - https://drive.google.com/open?id=0Bxbk4wYolphwcVk4bV85aEFtYXc
Detailed Research on Fake News: Opportunities, Challenges and MethodsMilap Bhanderi
This paper is submitted at Dalhousie University for Technology Innovation course as a deliverable. This paper focuses on the opportunities, challenges and methods for Fake news.
First presented at Future of Digital Identity, British Library, 7 Jan 2010. Updated for presentation at Privacy and the Law Conference, London, 1 Dec 2010, and for an OxPILS seminar at Balliol College, 23 May 2012.
More than Communication Surveillance: Data Protection in the Age of Big Data.
Discussing about re-identification issues, with focus on database for development/aid/public services.
Presented at "Next Generation Technologies for Empowering People" workshop (Frontiers Learning Series) — 14 November 2016, Asia Regional Training Center (ARTC) Bangkok, USAID Regional Development Mission for Asia (RDMA)
https://sites.google.com/site/frontierslearningseries2016/
The European Union is serious about the protection of personal data, including health information. Data controllers must demonstrate that their compelling legitimate interest overrides the interests of the data subjects. Data subjects, in general, have the right to object to the processing of personal data. The reasons for data retention have to be compelling enough, e.g., compliance with a legal obligation, tasks carried out in public interest in the area of public health, the official authority vested in the controller, scientific or historical research, statistical purposes and the defense of legal claims. The recognized risks to natural persons include discrimination, identity theft or fraud, financial loss, damage to reputation, loss of confidentiality of data protected by professional secrecy, the reversal of pseudonymization, and economic and social disadvantage.
Deep Learning - The Past, Present and Future of Artificial IntelligenceLukas Masuch
In the last couple of years, deep learning techniques have transformed the world of artificial intelligence. One by one, the abilities and techniques that humans once imagined were uniquely our own have begun to fall to the onslaught of ever more powerful machines. Deep neural networks are now better than humans at tasks such as face recognition and object recognition. They’ve mastered the ancient game of Go and thrashed the best human players. “The pace of progress in artificial general intelligence is incredible fast” (Elon Musk – CEO Tesla & SpaceX) leading to an AI that “would be either the best or the worst thing ever to happen to humanity” (Stephen Hawking – Physicist).
What sparked this new hype? How is Deep Learning different from previous approaches? Let’s look behind the curtain and unravel the reality. This talk will introduce the core concept of deep learning, explore why Sundar Pichai (CEO Google) recently announced that “machine learning is a core transformative way by which Google is rethinking everything they are doing” and explain why “deep learning is probably one of the most exciting things that is happening in the computer industry“ (Jen-Hsun Huang – CEO NVIDIA).
The Dark Side of Social Media: Legal Issues
Legal Aspects of Abuse and Misuse of Social Media
(Facebook, Twitter, etc.)
Final project of Legal Aspects of Information Systems courses
By mprabuw & Said Altinsik
Hello Guy's Here The Advantage and Disadvantages of Social Netwoking .
Social media Challenges and Advantage.
Social media bad or good.
pros and cons social media .
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
Ethnobotany and Ethnopharmacology:
Ethnobotany in herbal drug evaluation,
Impact of Ethnobotany in traditional medicine,
New development in herbals,
Bio-prospecting tools for drug discovery,
Role of Ethnopharmacology in drug evaluation,
Reverse Pharmacology.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
The Indian economy is classified into different sectors to simplify the analysis and understanding of economic activities. For Class 10, it's essential to grasp the sectors of the Indian economy, understand their characteristics, and recognize their importance. This guide will provide detailed notes on the Sectors of the Indian Economy Class 10, using specific long-tail keywords to enhance comprehension.
For more information, visit-www.vavaclasses.com
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
The Art Pastor's Guide to Sabbath | Steve ThomasonSteve Thomason
What is the purpose of the Sabbath Law in the Torah. It is interesting to compare how the context of the law shifts from Exodus to Deuteronomy. Who gets to rest, and why?
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
4. Privacy
• In general, it refers to the right to be free from secret surveillance and
to determine whether, when, how, and to whom, one's personal or
organizational information is to be revealed.
• Specifically, privacy may be divided into four categories (1) Physical:
restriction on others to experience a person or situation through one
or more of the human senses; (2) Informational: restriction on
searching for or revealing facts that are unknown or unknowable to
others; (3) Decisional: restriction on interfering in decisions that are
exclusive to an entity; (4) Dispositional: restriction on attempts to
know an individual's state of mind.
http://www.businessdictionary.com/definition/privacy.html
5. • Web 2.0
• Participatory information sharing
• Social networking sites (SNSs)
• Give personal information out
• A growing attention to the issue of privacy
7. Social Media Privacy
Basic Information: Name, telephone number, Email address, home address…
Social Networking activity data: browsing behavior, location, what time using
which services…
Analyzed data based on existed information: occupation, hobbies, attributes,
emotional tendency…
8. Exploiting Social Media Information for relational user Attribute Inference
— Institute of Automation, the Chinese of Academy Science
12. 2. Third-party Websites
Meeting users’ need among
different platforms
Games、News、Music
Given certain permissions, they
can even see information that
our friends share with us.
13. In 2014, Gigya conducted a survey
which polled 4,000 respondents in the
United States and Britain on their
thoughts about data privacy
Convenience : 60% users will still log
into other websites, even though they
fear those companies aren't being
careful with their data
2. Third-party Websites
14. 3. Cyber Manhunt
tracking down and exploring
one’s private information via
internet media
sometimes gained notoriety
to the target after blame
and shame
15. 4. Users
In 2013, A survey interviewed 802 teens
that examines teens' privacy management
on social media sites
92% post their real name to the profile
they use most often.
84% post their interests, such as movies,
music, or books they like
82% post their birth date
62% post their relationship status
24% post videos of themselves
16. 5. Social Networking Sites
Max Schrems wrote term paper on
Facebook‘s lack of awareness of
European privacy law in 2011
Under European “right to access”, he
made a request for Facebook’s records
on him and received a CD containing
over 1,200 pages of data
Sensitive personal data: friends he no
longer followed, deleted information
Max Schrems
collecting data without valid permission
17. 6. Recommending ads, is that simple?
On Facebook or other social media apps, an advertiser can only send
ads to a user if that user has some connection to the brand in question.
A connection can include group membership or a "like" of that brand's
corporate page.
18. • An Arkansas lawyer and political blogger, Matt Campbell, has sued Facebook
for allegedly using data from private messages to target ads.
• The core of their complaint concerns the access advertisers have the messages.
• “Contrary to its representations, 'private' Facebook messages are
systematically intercepted by the Company in an effort to learn the contents
of the users' communications... This practice...enables Facebook to mine user
data and profit from those data by sharing them with advertisers.”
19. •
•
Imagining that your conversations
with your friends actually have
other unknown “audience”, kind of
scary?
Hacker News revealed back in Oct. 2012 that a shared link within
a private message between Facebook users also counts toward
the total.
Facebook admitted this to the Wall Street Journal in that
publication's follow-up story.
20. 7. They are tracking your locations?
• “people around you” in Wechat(附近的人)
• Three - point positioning method(三点定位法)
a popular saying in the social media
a panic concerning safety arises and spread
微信=危信?
22. 8. No location sharing, but you know where I live?
• A student took 40 mins to deduce actress's address from pictures
23. 8. No location sharing, but I know where you live?
• A student from Tsinghua University said he took four simple steps to deduce
the famous actress (WANG Luodan)'s address through the pictures posted
on her Weibo.
• Step 1: Get information
• The student selected two pictures which contain some clues on her Weibo
24. • From the photographs, there are at least three square parterres we could
see. Then the student used GoogleEarth to intercept the bird's-eye view of
Beijing and compared it with the selected pictures of WANG's Weibo.
25. Step 2: Select the district
The student used other information on Weibo to narrow his selected
regions, like...
26. • Step 3: Search
• As excluding several possible regions, the student intercepted a
bird's-eye view in GoogleEarth and zoomed in a part of picture. He
soon found that the picture was extremely similar to WANG's picture
selected in step1.
27. • Step 4: Field test
The student went to the place he deduced in step 3 and finally verified his
conclusion.
So a simple picture is more than that.
Be careful about the detective
in your daily life, like you Suitors
or your Suspicious girlfriend.
28. 9. "People You May Know", but I don't want to be known
E1: friends recommending on QQ
• QQ’s “recommending friends” feature do not simply show your QQ name.
It shows your real name .
• You can find that almost all people you knew are listed here.
“腾讯的实名
好友推荐翻一
遍后,感觉就
是自己以前在
读年级所有学
生的通讯录“
29. E2: Washington woman found husband's other wife on Facebook
• An American named Alan L. O'Neill married a woman in 2001, moved
out in 2009, changed his name and remarried without divorcing her.
• The first wife first noticed O'Neill had moved on to another woman
when Facebook suggested the friendship connection to wife No.2
under the "People You May Know" feature.
30. • Wife No.1 then called the defendant's mother.
• “An hour later the defendant arrived at [Wife No.1’s] apartment, and she
asked him several times if they were divorced”, court records show. The
defendant said, 'No, we are still married.'"
• Neither O'Neill nor his first wife had filed for divorce, according to charging
documents. The name change came in December, and later that month he
married his second wife.
31. From the issue mentioned above...
• Obviously, Facebook helps the woman to find out that his husband has
cheated her for several years.
• The Prosecutor Lindquist said, "Facebook is now a place where people
discover things about each other ."
32. • But on the other side, some people are concerned about their privacy
of social contacts, because people can easily know what kind of people
you are acquainted with.
• Athima Chansanchai, a freelance journalist who writes about social
media, said Facebook over the years has played a role in both creating
relationships and destroying them.
35. Government and legislature
• Lawmakers should enact laws and regulations to protect social media
users’ privacy.
• Stipulate the responsibility of service providers.
• Specify the punishment that online information criminals will face.
• Provide some guidance for social media users to raise their awareness
of online security and privacy protection.
• Offer necessary help when users are threatened, harassed or
defamed online
36. USA
• 25 states of the US have enacted social media privacy laws (2012.4-
2016.7)
• Regulating the use of social media by employers and educational
institutions
37.
38. USA
• United States Congress
• Introduce Social Networking Online Protection Act
44. Service providers
• When designing social networking sites and apps, personal data protection
should be proactive and preventative in nature, and it should cover the
entire cycle of personal data flow from collection to erasure.
• Personal information Collection Statement should be declared clearly
before users confirm signing up for accounts. Users have the right to know
under what circumstances will their personal data be collected, accessed or
shared and for what purposes. The purposes must be lawful and directly
related to a function or activity of the data users.
• Service providers should remind the users to pay high attention to
information storage, privacy settings and online security. For example, when
the users turn on the geolocation function of the apps, providers should
inform users of the potential risks.
45. Social media users
• Read the Privacy Statement before signing up for any SNS
• Manage your privacy settings
• Protect your accounts with strong, unique passwords
• Think twice before you post any information
• Don’t reveal personal information
46. Social media users
• Be selective when accepting a friend
• Exercise caution when clicking on links
• Turn off the geolocation features in social networking apps
• Don’t enable auto login
• Close old accounts that you don’t use anymore