SlideShare a Scribd company logo
1 of 24
The High Cost
of Social
Networks


                Mark Rogers
                Assistant Professor
                CIS/ELT
                John A Logan
What are ―Social Networks‖
   A website offering people ways to
    communicate via the Internet, whether
    through their computer or mobile phone.

   These sites allow people to easily and
    simply create their own online profile and
    maintain a network of contacts or friends.
Some issues social networking sites
present:
   Anonymity- can provide a forum for free
    expression.

   Lack of physical interaction sometimes gives
    people a false sense of security.

   Easy to forget who could see your personal
    information.

   Easy to put up a false persona.
Which Social Networks do people
use Most?
   Facebook – 122,220,617 Monthly Visits

   Myspace – 55,559,585 Monthly Visits

   Twitter – 23,579,044 Monthly Visits

   Linkedin – 11,228,746 Visits

   Classmates – 14,649,224
Some issues that have recently been
in the news?
   Teen faces charges for Facebook comments
       Joshua A. Walker, 18, is accused of posting threatening
        messages on the social networking site.

       Walker is charged with two counts of harassment
        through electronic communication, Jones said, one a
        misdemeanor and the other a felony charge. He was
        arrested and taken to Franklin County Jail.
How to lose your new job in 140
characters or less, seriously.
 Person gets a job offer from Cisco
 Person then posts less than enthused
  opinion about the Cisco job on Twitter
  (actually naming Cisco as his new employer)
 Cisco employee on Twitter spots the post
  and promptly responds.
 Person hides his Twitter from public view
  but it is to late. Cisco pulls job offer.
University of Kentucky player loses
scholarship because of Facebook.
   An University of KY softball player had her 4
    year scholarship revoked (she was in her
    first year), because of pictures she posted
    on Facebook.
    -She sued the school and lost.
Some tips to keep you safe while
using Social Networks:
Limit the amount of personal
information you post
   Do not post information that would make
    you vulnerable, such as your address or
    information about your schedule or routine.
    If your friends post information about you,
    make sure the combined information is not
    more than you would be comfortable with a
    stranger knowing. Also be aware of other
    peoples’ personal information, including
    photos, when making your own posts.
Remember that the Internet is a
public resource
   Only post information you are comfortable with
    anyone seeing. By anyone I mean your Mother.
    This includes information and photos in your
    profile and in blogs and other forums.

   Also, keep in mind, once you post information
    online, you can't retract it. Even if you remove the
    information from a site, saved or cached versions
    may still exist on other peoples’ machines
Guidelines for Publishing Information
Online
   View the internet as a novel, not a
    diary

   Be careful what you advertise

   Realize that you can't take it back
View the Internet as a novel, not a
diary
   Make sure you are comfortable with anyone
    seeing the information you put online.
    Expect that people you have never met will
    find your page; even if you are keeping an
    online journal or blog, write it with the
    expectation that it is available for public
    consumption.
Be careful what you advertise
   In the past, it was difficult to find
    information about people other than their
    phone numbers or address. Now, an
    increasing amount of personal information is
    available online, especially because people
    are creating personal web pages with
    information about themselves. When
    deciding how much information to reveal,
    realize that you are broadcasting it to the
    entire world.
Realize that you can't take it back
   Once you publish something online, it is
    available to other people through search
    engines. You can change or remove
    information after something has been
    published, but it is possible that someone
    has already seen the original version. Even
    if you try to remove the post from the
    internet, someone may have saved a copy
    of the page or used excerpts from another
    source.
Realize that you can't take it back
(2)
   Some search engines "cache" copies of web pages
    so that they open faster; these cached copies may
    be available after a web page has been deleted or
    altered. Some web browsers may also maintain a
    cache of the web pages a user has visited, so the
    original version may be stored in a temporary file
    on the user's computer. Think about these
    implications before publishing information—once
    something is out there, you can't guarantee that
    you can completely remove it.
Be wary of strangers
 The Internet makes it easy for people to
  misrepresent their identities and motives.
 Consider limiting the people who are
  allowed to contact you on these sites. If you
  interact with people you do not know, be
  cautious about the amount of information
  you reveal.
 You HAVE to protect yourself.
Evaluate your settings
   Take advantage of a site's privacy settings. The
    default settings for some sites may allow anyone
    to see your profile. You can customize your
    settings to restrict access to only certain people.
    However, there is a risk that even this private
    information could be exposed, so don't post
    anything that you wouldn't want the public to see.
    Also, be cautious when deciding which applications
    to enable, and check your settings to see what
    information the applications will be able to access.
Use strong passwords
   Protect your account with passwords that
    cannot easily be guessed. If your password
    is compromised, someone else may be able
    to access your account and pretend to be
    you. Think about this…save yourself from
    this potential nightmare.
Choosing and Protecting Passwords
 Why do you need a password?
 How do you choose a good password?
 How can you protect your password?
Passwords are a common form of
authentication and are often the only barrier
between a user and your personal
information. There are several programs
attackers can use to help guess or "crack"
passwords, but by choosing good passwords
and keeping them confidential, you can
make it more difficult for an unauthorized
person to access your information.
Check privacy policies
   Some sites may share information such as
    email addresses or user preferences with
    other companies. This may lead to an
    increase in spam. Also, try to locate the
    policy for handling referrals to make sure
    that you do not unintentionally sign your
    friends up for spam. Some sites will
    continue to send email messages to anyone
    you refer until they join.
What are the differences between some of
the tools used for real-time communication?

     Instant messaging (IM)

     Chat rooms

     Bots
Use and maintain anti-virus
software
   Anti-virus software recognizes most known
    viruses and protects your computer against
    them, so you may be able to detect and
    remove the virus before it can do any
    damage. Because attackers are continually
    writing new viruses, it is important to keep
    your definitions up to date.
Some Good Things Social Network
Sites Have Done
   Social networking sites such as MySpace
    and Facebook have made communication
    much easier. Friends’ and family now have a
    quicker, cheaper way of keeping in touch,
    making important relationships easier to
    maintain.

More Related Content

What's hot

Our Digital World - A look at E-safety issues for teenagers
Our Digital World - A look at E-safety issues for teenagersOur Digital World - A look at E-safety issues for teenagers
Our Digital World - A look at E-safety issues for teenagersBrian Sharland
 
Facebook and security settings settings
Facebook and security settings settingsFacebook and security settings settings
Facebook and security settings settingsAbhishek Gupta
 
Using the Internet Safely
Using the Internet SafelyUsing the Internet Safely
Using the Internet SafelyJoanne Hewitt
 
Internet safety presentation for parents 2018
Internet safety presentation for parents 2018Internet safety presentation for parents 2018
Internet safety presentation for parents 2018KanelandSvihlik
 
Social Media on Education and its Effects
Social Media on Education and its EffectsSocial Media on Education and its Effects
Social Media on Education and its EffectsPrem Kumar
 
Internet safety presentation 2015
Internet safety presentation 2015Internet safety presentation 2015
Internet safety presentation 2015KanelandSvihlik
 
How to keep your digital identity safe
How to keep your digital identity safeHow to keep your digital identity safe
How to keep your digital identity safeTSageer
 
Maryam Abbas 9 B
Maryam Abbas 9 BMaryam Abbas 9 B
Maryam Abbas 9 Bjboulanger
 
Social & mobile security
Social & mobile securitySocial & mobile security
Social & mobile securityErnest Staats
 
Digital Footprint
Digital FootprintDigital Footprint
Digital Footprintdarpankambo
 
Child safety 16 jun14
Child safety 16 jun14Child safety 16 jun14
Child safety 16 jun14Naval OPSEC
 
6 online identity
6 online identity6 online identity
6 online identityCOMP 113
 
Internet Safety Guide For Parents & Teachers
Internet Safety Guide For Parents & TeachersInternet Safety Guide For Parents & Teachers
Internet Safety Guide For Parents & TeachersJVGAJJAR
 
Misuse of personal information
Misuse of personal informationMisuse of personal information
Misuse of personal informationZev Aidikoff
 
Parent workshop - Social Networks
Parent workshop - Social NetworksParent workshop - Social Networks
Parent workshop - Social NetworksClint Hamada
 
Using social media responsibly
Using social media responsibly Using social media responsibly
Using social media responsibly Donal O' Mahony
 
Internet Safety for Parents presentation 2017
Internet Safety for Parents presentation 2017Internet Safety for Parents presentation 2017
Internet Safety for Parents presentation 2017KanelandSvihlik
 
Becybersmart
BecybersmartBecybersmart
BecybersmartVelma
 

What's hot (18)

Our Digital World - A look at E-safety issues for teenagers
Our Digital World - A look at E-safety issues for teenagersOur Digital World - A look at E-safety issues for teenagers
Our Digital World - A look at E-safety issues for teenagers
 
Facebook and security settings settings
Facebook and security settings settingsFacebook and security settings settings
Facebook and security settings settings
 
Using the Internet Safely
Using the Internet SafelyUsing the Internet Safely
Using the Internet Safely
 
Internet safety presentation for parents 2018
Internet safety presentation for parents 2018Internet safety presentation for parents 2018
Internet safety presentation for parents 2018
 
Social Media on Education and its Effects
Social Media on Education and its EffectsSocial Media on Education and its Effects
Social Media on Education and its Effects
 
Internet safety presentation 2015
Internet safety presentation 2015Internet safety presentation 2015
Internet safety presentation 2015
 
How to keep your digital identity safe
How to keep your digital identity safeHow to keep your digital identity safe
How to keep your digital identity safe
 
Maryam Abbas 9 B
Maryam Abbas 9 BMaryam Abbas 9 B
Maryam Abbas 9 B
 
Social & mobile security
Social & mobile securitySocial & mobile security
Social & mobile security
 
Digital Footprint
Digital FootprintDigital Footprint
Digital Footprint
 
Child safety 16 jun14
Child safety 16 jun14Child safety 16 jun14
Child safety 16 jun14
 
6 online identity
6 online identity6 online identity
6 online identity
 
Internet Safety Guide For Parents & Teachers
Internet Safety Guide For Parents & TeachersInternet Safety Guide For Parents & Teachers
Internet Safety Guide For Parents & Teachers
 
Misuse of personal information
Misuse of personal informationMisuse of personal information
Misuse of personal information
 
Parent workshop - Social Networks
Parent workshop - Social NetworksParent workshop - Social Networks
Parent workshop - Social Networks
 
Using social media responsibly
Using social media responsibly Using social media responsibly
Using social media responsibly
 
Internet Safety for Parents presentation 2017
Internet Safety for Parents presentation 2017Internet Safety for Parents presentation 2017
Internet Safety for Parents presentation 2017
 
Becybersmart
BecybersmartBecybersmart
Becybersmart
 

Similar to The High Cost of Anonymity on Social Networks

Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awarenessKaran Veer Singh
 
Social Media Security
Social Media Security Social Media Security
Social Media Security kamranrazzaq8
 
Group 2 privacy and me in a web 2.0 world final
Group 2   privacy and me in a web 2.0 world  finalGroup 2   privacy and me in a web 2.0 world  final
Group 2 privacy and me in a web 2.0 world finalshanikosh
 
Dos and don's on social media
Dos and don's on social mediaDos and don's on social media
Dos and don's on social mediasanjeev kumar
 
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2JayMarkBandoy1
 
advantagesanddisadvantagesofsocialmedia-151211192046.pdf
advantagesanddisadvantagesofsocialmedia-151211192046.pdfadvantagesanddisadvantagesofsocialmedia-151211192046.pdf
advantagesanddisadvantagesofsocialmedia-151211192046.pdfRinkiSharma51
 
advantagesanddisadvantagesofsocialmedia-151211192046.pptx
advantagesanddisadvantagesofsocialmedia-151211192046.pptxadvantagesanddisadvantagesofsocialmedia-151211192046.pptx
advantagesanddisadvantagesofsocialmedia-151211192046.pptxHimabindu905359
 
Advantages and disadvantages of social media
Advantages and disadvantages of social mediaAdvantages and disadvantages of social media
Advantages and disadvantages of social mediaAlan Raj
 
Advantages and disadvantages of social media
Advantages and disadvantages of social mediaAdvantages and disadvantages of social media
Advantages and disadvantages of social mediaAlan Raj
 
Negative impacts of social networking
Negative impacts of social networkingNegative impacts of social networking
Negative impacts of social networkingrei_ra
 
Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235brendaylo
 
2013 09 liberteks monthly security tips newsletter 518-452-0550
2013 09 liberteks monthly security tips newsletter 518-452-05502013 09 liberteks monthly security tips newsletter 518-452-0550
2013 09 liberteks monthly security tips newsletter 518-452-0550Liberteks
 
Lecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxLecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxDominicCaling
 
Rules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxRules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxNoelBuctot1
 
Cyber Awareness.pptx
Cyber Awareness.pptxCyber Awareness.pptx
Cyber Awareness.pptxadblue2017
 
Security and Privacy in Social Networks.pptx
Security and Privacy in Social Networks.pptxSecurity and Privacy in Social Networks.pptx
Security and Privacy in Social Networks.pptxSIMNchannel
 

Similar to The High Cost of Anonymity on Social Networks (20)

Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awareness
 
INTERNET SAFETY
INTERNET SAFETY INTERNET SAFETY
INTERNET SAFETY
 
Social Media Security
Social Media Security Social Media Security
Social Media Security
 
Social Networking
Social NetworkingSocial Networking
Social Networking
 
Group 2 privacy and me in a web 2.0 world final
Group 2   privacy and me in a web 2.0 world  finalGroup 2   privacy and me in a web 2.0 world  final
Group 2 privacy and me in a web 2.0 world final
 
Dos and don's on social media
Dos and don's on social mediaDos and don's on social media
Dos and don's on social media
 
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2
 
Heads up!
Heads up!Heads up!
Heads up!
 
advantagesanddisadvantagesofsocialmedia-151211192046.pdf
advantagesanddisadvantagesofsocialmedia-151211192046.pdfadvantagesanddisadvantagesofsocialmedia-151211192046.pdf
advantagesanddisadvantagesofsocialmedia-151211192046.pdf
 
advantagesanddisadvantagesofsocialmedia-151211192046.pptx
advantagesanddisadvantagesofsocialmedia-151211192046.pptxadvantagesanddisadvantagesofsocialmedia-151211192046.pptx
advantagesanddisadvantagesofsocialmedia-151211192046.pptx
 
Advantages and disadvantages of social media
Advantages and disadvantages of social mediaAdvantages and disadvantages of social media
Advantages and disadvantages of social media
 
Advantages and disadvantages of social media
Advantages and disadvantages of social mediaAdvantages and disadvantages of social media
Advantages and disadvantages of social media
 
Negative impacts of social networking
Negative impacts of social networkingNegative impacts of social networking
Negative impacts of social networking
 
Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235
 
2013 09 liberteks monthly security tips newsletter 518-452-0550
2013 09 liberteks monthly security tips newsletter 518-452-05502013 09 liberteks monthly security tips newsletter 518-452-0550
2013 09 liberteks monthly security tips newsletter 518-452-0550
 
Lecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxLecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptx
 
Rules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxRules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptx
 
Cyber Awareness.pptx
Cyber Awareness.pptxCyber Awareness.pptx
Cyber Awareness.pptx
 
Project
ProjectProject
Project
 
Security and Privacy in Social Networks.pptx
Security and Privacy in Social Networks.pptxSecurity and Privacy in Social Networks.pptx
Security and Privacy in Social Networks.pptx
 

Recently uploaded

Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 

Recently uploaded (20)

Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 

The High Cost of Anonymity on Social Networks

  • 1. The High Cost of Social Networks Mark Rogers Assistant Professor CIS/ELT John A Logan
  • 2. What are ―Social Networks‖  A website offering people ways to communicate via the Internet, whether through their computer or mobile phone.  These sites allow people to easily and simply create their own online profile and maintain a network of contacts or friends.
  • 3. Some issues social networking sites present:  Anonymity- can provide a forum for free expression.  Lack of physical interaction sometimes gives people a false sense of security.  Easy to forget who could see your personal information.  Easy to put up a false persona.
  • 4. Which Social Networks do people use Most?  Facebook – 122,220,617 Monthly Visits  Myspace – 55,559,585 Monthly Visits  Twitter – 23,579,044 Monthly Visits  Linkedin – 11,228,746 Visits  Classmates – 14,649,224
  • 5. Some issues that have recently been in the news?  Teen faces charges for Facebook comments  Joshua A. Walker, 18, is accused of posting threatening messages on the social networking site.  Walker is charged with two counts of harassment through electronic communication, Jones said, one a misdemeanor and the other a felony charge. He was arrested and taken to Franklin County Jail.
  • 6. How to lose your new job in 140 characters or less, seriously.  Person gets a job offer from Cisco  Person then posts less than enthused opinion about the Cisco job on Twitter (actually naming Cisco as his new employer)  Cisco employee on Twitter spots the post and promptly responds.  Person hides his Twitter from public view but it is to late. Cisco pulls job offer.
  • 7. University of Kentucky player loses scholarship because of Facebook.  An University of KY softball player had her 4 year scholarship revoked (she was in her first year), because of pictures she posted on Facebook. -She sued the school and lost.
  • 8. Some tips to keep you safe while using Social Networks:
  • 9. Limit the amount of personal information you post  Do not post information that would make you vulnerable, such as your address or information about your schedule or routine. If your friends post information about you, make sure the combined information is not more than you would be comfortable with a stranger knowing. Also be aware of other peoples’ personal information, including photos, when making your own posts.
  • 10. Remember that the Internet is a public resource  Only post information you are comfortable with anyone seeing. By anyone I mean your Mother. This includes information and photos in your profile and in blogs and other forums.  Also, keep in mind, once you post information online, you can't retract it. Even if you remove the information from a site, saved or cached versions may still exist on other peoples’ machines
  • 11. Guidelines for Publishing Information Online  View the internet as a novel, not a diary  Be careful what you advertise  Realize that you can't take it back
  • 12. View the Internet as a novel, not a diary  Make sure you are comfortable with anyone seeing the information you put online. Expect that people you have never met will find your page; even if you are keeping an online journal or blog, write it with the expectation that it is available for public consumption.
  • 13. Be careful what you advertise  In the past, it was difficult to find information about people other than their phone numbers or address. Now, an increasing amount of personal information is available online, especially because people are creating personal web pages with information about themselves. When deciding how much information to reveal, realize that you are broadcasting it to the entire world.
  • 14. Realize that you can't take it back  Once you publish something online, it is available to other people through search engines. You can change or remove information after something has been published, but it is possible that someone has already seen the original version. Even if you try to remove the post from the internet, someone may have saved a copy of the page or used excerpts from another source.
  • 15. Realize that you can't take it back (2)  Some search engines "cache" copies of web pages so that they open faster; these cached copies may be available after a web page has been deleted or altered. Some web browsers may also maintain a cache of the web pages a user has visited, so the original version may be stored in a temporary file on the user's computer. Think about these implications before publishing information—once something is out there, you can't guarantee that you can completely remove it.
  • 16. Be wary of strangers  The Internet makes it easy for people to misrepresent their identities and motives.  Consider limiting the people who are allowed to contact you on these sites. If you interact with people you do not know, be cautious about the amount of information you reveal.  You HAVE to protect yourself.
  • 17. Evaluate your settings  Take advantage of a site's privacy settings. The default settings for some sites may allow anyone to see your profile. You can customize your settings to restrict access to only certain people. However, there is a risk that even this private information could be exposed, so don't post anything that you wouldn't want the public to see. Also, be cautious when deciding which applications to enable, and check your settings to see what information the applications will be able to access.
  • 18. Use strong passwords  Protect your account with passwords that cannot easily be guessed. If your password is compromised, someone else may be able to access your account and pretend to be you. Think about this…save yourself from this potential nightmare.
  • 19. Choosing and Protecting Passwords  Why do you need a password?  How do you choose a good password?  How can you protect your password?
  • 20. Passwords are a common form of authentication and are often the only barrier between a user and your personal information. There are several programs attackers can use to help guess or "crack" passwords, but by choosing good passwords and keeping them confidential, you can make it more difficult for an unauthorized person to access your information.
  • 21. Check privacy policies  Some sites may share information such as email addresses or user preferences with other companies. This may lead to an increase in spam. Also, try to locate the policy for handling referrals to make sure that you do not unintentionally sign your friends up for spam. Some sites will continue to send email messages to anyone you refer until they join.
  • 22. What are the differences between some of the tools used for real-time communication?  Instant messaging (IM)  Chat rooms  Bots
  • 23. Use and maintain anti-virus software  Anti-virus software recognizes most known viruses and protects your computer against them, so you may be able to detect and remove the virus before it can do any damage. Because attackers are continually writing new viruses, it is important to keep your definitions up to date.
  • 24. Some Good Things Social Network Sites Have Done  Social networking sites such as MySpace and Facebook have made communication much easier. Friends’ and family now have a quicker, cheaper way of keeping in touch, making important relationships easier to maintain.