SlideShare a Scribd company logo
1 of 8
Download to read offline
FEAR IS NOT A STOP SIGN – IT IS A GUIDELINE

                               “Nothing in life is to
                               be feared. It is only
                                to be understood”
                                   ~Marie Curie




                               Is your social life
                                    in hand?
                                GGSB Feb 2011
How Social are YOU?
                      On the go! – text to others in
                      room by phone, multitask while in
                      1:1 conversation, text from private
                      places?

                      Social creature –
                      relationships are critical to
                      business success

“Apparently we love   New Opportunities
our own cell phones
    but we hate
  everyone else's.”   New Risks
   - Joe Bob Briggs
How many mobile interaction points do you
                   have?
Points                                      Activity
  1      Talk with others 1:1 (phone)
  1      Send/receive instant text messages (no talking required)

  1      Send or view images (photo or video)

  2      Check email or browse internet

  2      Receive alerts from an external source (football score, arrival of airplane)

  3      Collaborate with a group (conference, tweetup, play multiplayer game)
  3      Find out what or who is physically around you (location based services)

  3      Get mobile notifications that tell you what your friends are doing

  4      Exchange money (transact business)

         Total
How many mobile RISK points do you have?
Points                                         Activity
    2        Identify your mobile phone number to those you call (caller ID)
    2        Broadcast your position from your phone (location services)

    2        Submit your mobile device number in a form

    2        Publish your mobile device number online or in an email signature

    2 Sharon@ mobile device for personal and professional purposes
       Use the same
socialmediaalive.com you are or what you are doing
  3    Post online where
    3        Use your phone to shop, pay bills, exchange money
SUBTRACT--
    5        Regularly change your phone number, identity, passwords
SUBTRACT--
    5        Have established your own guidelines for mobile device activity

             TOTAL
Risk and Return


             Is your Risk /
             Return Ratio
             Acceptable?
Your Guidelines
1.  Turn off/on caller ID
2.  Turn off/on location broadcast
3.  Manage submission of your number to others        “Risk comes from
                                                      not knowing what
4.  Personalise your privacy settings
                                                      you're doing”
5.  Personalise your online networks
6.  Regularly “Google” your phone number to see       - Warren Buffett
    where you are online
7.  Check for unlisted and “Do Not Call” registries
    (US)
8.  Change your passwords
9.  Tell your friends your mobile preferences
10.  Know when to turn off your phone or say no
Social Responsibilities
                      1.    Respect your contact’s privacy guidelines
   "The price of      2.    Turn off your ring tone/buzzers/alerts
   greatness is       3.    Do not spam
  responsibility”     4.    Keep your contact’s phone number info
- Winston Churchill         private
                      5.    Keep your contact’s location private
                      6.    Check with people if you suspect they have
                            been hacked
                      7.    Tell people (via a different channel) if
                            you’ve been hacked
                      8.    Be willing to shut down / fix your problem
                            to avoid harming others
Action!
   “Watch your
thoughts, for they    1.    Outline your guidelines
 become words.        2.    Ask your contacts for their preferences
    Watch your        3.    Discuss guidelines with your contacts
  words, for they     4.    Communicate safely and with confidence!
 become actions.
    Watch your
 actions, for they
 become habits.
    Watch your
  habits, for they
     become
    character.
    Watch your
  character, for it
  becomes your
     destiny.”

More Related Content

Similar to Mobile conference ggsb social media sc feb23

What Children Get Up To Online (and how we can try to keep them safe)
What Children Get Up To Online (and how we can try to keep them safe)What Children Get Up To Online (and how we can try to keep them safe)
What Children Get Up To Online (and how we can try to keep them safe)MrYoung
 
Student book key unit3
Student book key unit3Student book key unit3
Student book key unit3jesusmlaz
 
Are you hostage to your digital habits
Are you hostage to your digital habitsAre you hostage to your digital habits
Are you hostage to your digital habitsljvanwingerden
 
Casott employee conference 2015
Casott employee conference 2015Casott employee conference 2015
Casott employee conference 2015Bernard Charlebois
 
Social Media Privacy for our kids safety
Social Media Privacy for our kids safety Social Media Privacy for our kids safety
Social Media Privacy for our kids safety Rohan Zakie
 
ECSM 2021 - Sfaturi pentru a te proteja în mediul online
ECSM 2021 - Sfaturi pentru a te proteja în mediul online ECSM 2021 - Sfaturi pentru a te proteja în mediul online
ECSM 2021 - Sfaturi pentru a te proteja în mediul online One-IT
 
The-Netiquette-and-the-Computer-Ethics.pdf
The-Netiquette-and-the-Computer-Ethics.pdfThe-Netiquette-and-the-Computer-Ethics.pdf
The-Netiquette-and-the-Computer-Ethics.pdfMelchorTolentino2
 
DIgital Citizenship for Parents of Middle School Students
DIgital Citizenship for Parents of Middle School StudentsDIgital Citizenship for Parents of Middle School Students
DIgital Citizenship for Parents of Middle School StudentsLeon Letkeman
 
Social Engineering and What to do About it
Social Engineering and What to do About itSocial Engineering and What to do About it
Social Engineering and What to do About itAleksandr Yampolskiy
 
6 8 safety ppt final copy
6 8 safety ppt final copy6 8 safety ppt final copy
6 8 safety ppt final copymarkkreiter
 
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2JayMarkBandoy1
 
Social skydiving final
Social skydiving finalSocial skydiving final
Social skydiving finalmrryanstitt
 
Opsec for families
Opsec for familiesOpsec for families
Opsec for familiesLindy Kyzer
 
Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of NetiquetteLeelet1121
 
Bullying pp best
Bullying pp bestBullying pp best
Bullying pp besterinmacks
 

Similar to Mobile conference ggsb social media sc feb23 (20)

What Children Get Up To Online (and how we can try to keep them safe)
What Children Get Up To Online (and how we can try to keep them safe)What Children Get Up To Online (and how we can try to keep them safe)
What Children Get Up To Online (and how we can try to keep them safe)
 
Student book key unit3
Student book key unit3Student book key unit3
Student book key unit3
 
Test on BB
Test on BBTest on BB
Test on BB
 
Are you hostage to your digital habits
Are you hostage to your digital habitsAre you hostage to your digital habits
Are you hostage to your digital habits
 
Casott employee conference 2015
Casott employee conference 2015Casott employee conference 2015
Casott employee conference 2015
 
Internet safety
Internet safetyInternet safety
Internet safety
 
edtech. ppt.pptx
edtech. ppt.pptxedtech. ppt.pptx
edtech. ppt.pptx
 
Social Media Privacy for our kids safety
Social Media Privacy for our kids safety Social Media Privacy for our kids safety
Social Media Privacy for our kids safety
 
ECSM 2021 - Sfaturi pentru a te proteja în mediul online
ECSM 2021 - Sfaturi pentru a te proteja în mediul online ECSM 2021 - Sfaturi pentru a te proteja în mediul online
ECSM 2021 - Sfaturi pentru a te proteja în mediul online
 
The-Netiquette-and-the-Computer-Ethics.pdf
The-Netiquette-and-the-Computer-Ethics.pdfThe-Netiquette-and-the-Computer-Ethics.pdf
The-Netiquette-and-the-Computer-Ethics.pdf
 
DIgital Citizenship for Parents of Middle School Students
DIgital Citizenship for Parents of Middle School StudentsDIgital Citizenship for Parents of Middle School Students
DIgital Citizenship for Parents of Middle School Students
 
Social Engineering and What to do About it
Social Engineering and What to do About itSocial Engineering and What to do About it
Social Engineering and What to do About it
 
6 8 safety ppt final copy
6 8 safety ppt final copy6 8 safety ppt final copy
6 8 safety ppt final copy
 
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2
 
Social skydiving final
Social skydiving finalSocial skydiving final
Social skydiving final
 
Opsec for families
Opsec for familiesOpsec for families
Opsec for families
 
Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of Netiquette
 
Bullying pp best
Bullying pp bestBullying pp best
Bullying pp best
 
Heads up!
Heads up!Heads up!
Heads up!
 
Maximizing Interpersonal Skills
Maximizing Interpersonal SkillsMaximizing Interpersonal Skills
Maximizing Interpersonal Skills
 

More from Sharon Crost

The Power of Business Networking
The Power of Business NetworkingThe Power of Business Networking
The Power of Business NetworkingSharon Crost
 
Happy and Prosperous 2013
Happy and Prosperous 2013Happy and Prosperous 2013
Happy and Prosperous 2013Sharon Crost
 
Mist smartphone apps
Mist smartphone appsMist smartphone apps
Mist smartphone appsSharon Crost
 
MIST - social opportunities sharon crost mistcon
MIST - social opportunities sharon crost mistconMIST - social opportunities sharon crost mistcon
MIST - social opportunities sharon crost mistconSharon Crost
 
Columbia College Inside The Entrepreneur
Columbia College Inside The EntrepreneurColumbia College Inside The Entrepreneur
Columbia College Inside The EntrepreneurSharon Crost
 
Calaveras Economic Summit
Calaveras Economic SummitCalaveras Economic Summit
Calaveras Economic SummitSharon Crost
 

More from Sharon Crost (6)

The Power of Business Networking
The Power of Business NetworkingThe Power of Business Networking
The Power of Business Networking
 
Happy and Prosperous 2013
Happy and Prosperous 2013Happy and Prosperous 2013
Happy and Prosperous 2013
 
Mist smartphone apps
Mist smartphone appsMist smartphone apps
Mist smartphone apps
 
MIST - social opportunities sharon crost mistcon
MIST - social opportunities sharon crost mistconMIST - social opportunities sharon crost mistcon
MIST - social opportunities sharon crost mistcon
 
Columbia College Inside The Entrepreneur
Columbia College Inside The EntrepreneurColumbia College Inside The Entrepreneur
Columbia College Inside The Entrepreneur
 
Calaveras Economic Summit
Calaveras Economic SummitCalaveras Economic Summit
Calaveras Economic Summit
 

Mobile conference ggsb social media sc feb23

  • 1. FEAR IS NOT A STOP SIGN – IT IS A GUIDELINE “Nothing in life is to be feared. It is only to be understood” ~Marie Curie Is your social life in hand? GGSB Feb 2011
  • 2. How Social are YOU? On the go! – text to others in room by phone, multitask while in 1:1 conversation, text from private places? Social creature – relationships are critical to business success “Apparently we love New Opportunities our own cell phones but we hate everyone else's.” New Risks - Joe Bob Briggs
  • 3. How many mobile interaction points do you have? Points Activity 1 Talk with others 1:1 (phone) 1 Send/receive instant text messages (no talking required) 1 Send or view images (photo or video) 2 Check email or browse internet 2 Receive alerts from an external source (football score, arrival of airplane) 3 Collaborate with a group (conference, tweetup, play multiplayer game) 3 Find out what or who is physically around you (location based services) 3 Get mobile notifications that tell you what your friends are doing 4 Exchange money (transact business) Total
  • 4. How many mobile RISK points do you have? Points Activity 2 Identify your mobile phone number to those you call (caller ID) 2 Broadcast your position from your phone (location services) 2 Submit your mobile device number in a form 2 Publish your mobile device number online or in an email signature 2 Sharon@ mobile device for personal and professional purposes Use the same socialmediaalive.com you are or what you are doing 3 Post online where 3 Use your phone to shop, pay bills, exchange money SUBTRACT-- 5 Regularly change your phone number, identity, passwords SUBTRACT-- 5 Have established your own guidelines for mobile device activity TOTAL
  • 5. Risk and Return Is your Risk / Return Ratio Acceptable?
  • 6. Your Guidelines 1.  Turn off/on caller ID 2.  Turn off/on location broadcast 3.  Manage submission of your number to others “Risk comes from not knowing what 4.  Personalise your privacy settings you're doing” 5.  Personalise your online networks 6.  Regularly “Google” your phone number to see - Warren Buffett where you are online 7.  Check for unlisted and “Do Not Call” registries (US) 8.  Change your passwords 9.  Tell your friends your mobile preferences 10.  Know when to turn off your phone or say no
  • 7. Social Responsibilities 1.  Respect your contact’s privacy guidelines "The price of 2.  Turn off your ring tone/buzzers/alerts greatness is 3.  Do not spam responsibility” 4.  Keep your contact’s phone number info - Winston Churchill private 5.  Keep your contact’s location private 6.  Check with people if you suspect they have been hacked 7.  Tell people (via a different channel) if you’ve been hacked 8.  Be willing to shut down / fix your problem to avoid harming others
  • 8. Action! “Watch your thoughts, for they 1.  Outline your guidelines become words. 2.  Ask your contacts for their preferences Watch your 3.  Discuss guidelines with your contacts words, for they 4.  Communicate safely and with confidence! become actions. Watch your actions, for they become habits. Watch your habits, for they become character. Watch your character, for it becomes your destiny.”