SlideShare a Scribd company logo
Safe Social Media for Positive Social Change
Contents
• Introduction: Did you know?
• What do you give when you register?
• What do I need to know to stay safe on
  Facebook?
• Twitter: Keeping Your Account Secure
• Blogging: Introduce other NOT BlogSpot or
  Wordpress and Online Petition: Change.org
• Tips for Geeks
Introduction: Did you know?
• Internet usage has risen around 1,500% bwt 2007 –
  end of 2011.
• By December 2011 the country had 755,000 Internet
  users = 5%
• Licensed 37 ISPs (a license costs $25,000)
• Most Cambodian have access to a mobile phone (93%),
  and around half own a phone.
• Draft of Internet Law (Cyber law)
• No research of Cambodia online internet users
  behavior
• Password with 20 digits can be cracked only 24hs
What do you give when you register?
•   Your full names
•   Addresses
•   DOB
•   Location
•   Occupation
•   Marriage Statue
•   Age
•   Credit card number
•   Gender
•   School/University
What do I need to know to stay safe on
             Facebook?
•   Privacy Setting
•   Intellectual Property
•   Statement of Rights and Responsibilities
•   Reporting a Violation
What do I need to know to stay safe on
             Facebook?
• Never share your password.
• Think before you post. Each comment and
  photo builds your online presence.
• Adjust your privacy settings and review them
  often.
• Accept friend requests only from people you
  know personally.
• Report content and timelines that look
  suspicious.
Twitter: Keeping Your Account Secure
•    Safe Tweeting: The Basics
       We want Twitter to be a safe and open community. This
       help page provides some information and tips to help you
       practice safe Tweeting and keep your account secure.
       Here are some basics:
a.     Use a strong password.
b.     Watch out for suspicious links, and always make sure
       you’re on Twitter.com before you enter your login
       information.
c.     Use HTTPS for improved security.
d.     Don't give your username and password out to untrusted
       third-parties, especially those promising to get you
       followers or make you money.
e.     Make sure your computer and operating system is up-to-
       date with the most recent patches, upgrades, and anti-
       virus software.
•    Use a Strong and Unique Password
•    Use HTTPS for Improved Security
Blogging and Online Campaign
• Favorite Blog in Cambodia:
  Wordpress; Blogspot
• Introduce to http://storify.com/
• Posterous.com
• Change.org
• Visit:
  – http://freethe15.wordpress.com
  – http://sahrika.wordpress.com
Tips for Geeks
• See who are using your
  Gmail
• iPhone and iPad app (Your
  own morning newspaper)
• HideMyAssDotCom (Open
  restricted website)
• Using http and https
• PiPl.com (See your post
  online)
• Live Stream Tweet on your
  blog
STAY SAFE. BUT DON’T BE AFRAID!




         Thank You!
Safety social media for positive social change
Safety social media for positive social change

More Related Content

What's hot

Internet security tips that every parent should know
Internet security tips that every parent should knowInternet security tips that every parent should know
Internet security tips that every parent should know
kanika sharma
 
CYBER SAFETY BY YOGESH
CYBER SAFETY BY YOGESHCYBER SAFETY BY YOGESH
CYBER SAFETY BY YOGESH
Yogesh Prajapati
 
Netiquette
NetiquetteNetiquette
Netiquette
tracy Wilsom
 
Digital citizenship.pptx
Digital citizenship.pptxDigital citizenship.pptx
Digital citizenship.pptx
KnepperE
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
rowenick
 
Online privacy
Online privacyOnline privacy
Online privacy
jo-jo23
 
Cyber Safety Month summary
 Cyber Safety Month summary Cyber Safety Month summary
Cyber Safety Month summary
icts-uct
 
Formative Task - Safe Internet Usage
Formative Task - Safe Internet UsageFormative Task - Safe Internet Usage
Formative Task - Safe Internet Usage
aligi
 
Basic Digital Security
Basic Digital SecurityBasic Digital Security
Basic Digital Security
Ujjwal Acharya
 
Computer Ethics
Computer  EthicsComputer  Ethics
Computer Ethics
guestbdea62
 
E-Safety and Kite Info
E-Safety and Kite InfoE-Safety and Kite Info
E-Safety and Kite Info
oneill74
 
For schoolchildren1
For schoolchildren1For schoolchildren1
For schoolchildren1
Vinay Kumar
 
International Data Privacy Day 2017
International Data Privacy Day 2017International Data Privacy Day 2017
International Data Privacy Day 2017
Cherlowe Reinard Ramirez, MCTS
 
Current issues
Current issuesCurrent issues
Current issues
msunorm
 
Phishing-Email-Fraud-General
Phishing-Email-Fraud-GeneralPhishing-Email-Fraud-General
Phishing-Email-Fraud-General
Andrew Voorhies
 
Ass3 Sum
Ass3 SumAss3 Sum
Ass3 Sum
Antglynn
 
The internet websites
The internet websitesThe internet websites
The internet websites
miriamcamposflores
 
Internet safety
Internet safetyInternet safety
Internet safety
lindes dominguez
 
Internet safety
Internet safetyInternet safety
Internet safety
Marcos González
 

What's hot (19)

Internet security tips that every parent should know
Internet security tips that every parent should knowInternet security tips that every parent should know
Internet security tips that every parent should know
 
CYBER SAFETY BY YOGESH
CYBER SAFETY BY YOGESHCYBER SAFETY BY YOGESH
CYBER SAFETY BY YOGESH
 
Netiquette
NetiquetteNetiquette
Netiquette
 
Digital citizenship.pptx
Digital citizenship.pptxDigital citizenship.pptx
Digital citizenship.pptx
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
 
Online privacy
Online privacyOnline privacy
Online privacy
 
Cyber Safety Month summary
 Cyber Safety Month summary Cyber Safety Month summary
Cyber Safety Month summary
 
Formative Task - Safe Internet Usage
Formative Task - Safe Internet UsageFormative Task - Safe Internet Usage
Formative Task - Safe Internet Usage
 
Basic Digital Security
Basic Digital SecurityBasic Digital Security
Basic Digital Security
 
Computer Ethics
Computer  EthicsComputer  Ethics
Computer Ethics
 
E-Safety and Kite Info
E-Safety and Kite InfoE-Safety and Kite Info
E-Safety and Kite Info
 
For schoolchildren1
For schoolchildren1For schoolchildren1
For schoolchildren1
 
International Data Privacy Day 2017
International Data Privacy Day 2017International Data Privacy Day 2017
International Data Privacy Day 2017
 
Current issues
Current issuesCurrent issues
Current issues
 
Phishing-Email-Fraud-General
Phishing-Email-Fraud-GeneralPhishing-Email-Fraud-General
Phishing-Email-Fraud-General
 
Ass3 Sum
Ass3 SumAss3 Sum
Ass3 Sum
 
The internet websites
The internet websitesThe internet websites
The internet websites
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Internet safety
Internet safetyInternet safety
Internet safety
 

Viewers also liked

Sithi hub
Sithi hubSithi hub
Sithi hub
Bill Chea
 
How to build up communication skill
How to build up communication skillHow to build up communication skill
How to build up communication skill
Bill Chea
 
Open street map
Open street mapOpen street map
Open street map
Bill Chea
 
Open development cambodia
Open development cambodiaOpen development cambodia
Open development cambodia
Bill Chea
 
UrbanVoice
UrbanVoiceUrbanVoice
UrbanVoice
Bill Chea
 
Unix tc
Unix tcUnix tc
Unix tc
Bill Chea
 

Viewers also liked (6)

Sithi hub
Sithi hubSithi hub
Sithi hub
 
How to build up communication skill
How to build up communication skillHow to build up communication skill
How to build up communication skill
 
Open street map
Open street mapOpen street map
Open street map
 
Open development cambodia
Open development cambodiaOpen development cambodia
Open development cambodia
 
UrbanVoice
UrbanVoiceUrbanVoice
UrbanVoice
 
Unix tc
Unix tcUnix tc
Unix tc
 

Similar to Safety social media for positive social change

Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...
Justin Denton
 
Tweet tweet 12 (1)
Tweet tweet 12 (1)Tweet tweet 12 (1)
Tweet tweet 12 (1)
MaryamSaeedAhmad
 
Internet Safety & Privacy
Internet Safety & PrivacyInternet Safety & Privacy
Internet Safety & Privacy
Alexine Marier
 
Securing & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptxSecuring & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptx
Brian Pichman
 
How To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber MondayHow To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber Monday
Michele Chubirka
 
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter StyleCybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
Brian Pichman
 
CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024
Brian Pichman
 
Corporate Counsel: How To Use Social Media To Find Jobs
Corporate Counsel: How To Use Social Media To Find JobsCorporate Counsel: How To Use Social Media To Find Jobs
Corporate Counsel: How To Use Social Media To Find Jobs
Inflow
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
DeepasreeBiju
 
Building Donor Engagement through Social Media
Building Donor Engagement through Social MediaBuilding Donor Engagement through Social Media
Building Donor Engagement through Social Media
Kyle Lacy
 
Securing and Safeguarding Your Library Setup
Securing and Safeguarding Your Library SetupSecuring and Safeguarding Your Library Setup
Securing and Safeguarding Your Library Setup
Brian Pichman
 
PROTECTION PERSONAL PRIVACY
PROTECTION PERSONAL PRIVACYPROTECTION PERSONAL PRIVACY
PROTECTION PERSONAL PRIVACY
DoubleXDS
 
Protecting Personal Privacy
Protecting Personal PrivacyProtecting Personal Privacy
Protecting Personal Privacy
DoubleXDS
 
Personal Internet Security Practice
Personal Internet Security PracticePersonal Internet Security Practice
Personal Internet Security Practice
Brian Pichman
 
Online Self Defense
Online Self DefenseOnline Self Defense
Online Self Defense
Barry Caplin
 
Security and Privacy Brown Bag
Security and Privacy Brown BagSecurity and Privacy Brown Bag
Security and Privacy Brown Bag
501 Commons
 
Social media and the internet evolution
Social media and the internet evolutionSocial media and the internet evolution
Social media and the internet evolution
Karlton Utter
 
How Real Estate Businesses use Twitter
How Real Estate Businesses use TwitterHow Real Estate Businesses use Twitter
How Real Estate Businesses use Twitter
WebTech Dezine
 
twitter hacking causes and protection
twitter hacking causes and protectiontwitter hacking causes and protection
twitter hacking causes and protection
Fahd Allebdi
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
jitiyaashwin
 

Similar to Safety social media for positive social change (20)

Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...
 
Tweet tweet 12 (1)
Tweet tweet 12 (1)Tweet tweet 12 (1)
Tweet tweet 12 (1)
 
Internet Safety & Privacy
Internet Safety & PrivacyInternet Safety & Privacy
Internet Safety & Privacy
 
Securing & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptxSecuring & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptx
 
How To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber MondayHow To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber Monday
 
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter StyleCybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
 
CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024
 
Corporate Counsel: How To Use Social Media To Find Jobs
Corporate Counsel: How To Use Social Media To Find JobsCorporate Counsel: How To Use Social Media To Find Jobs
Corporate Counsel: How To Use Social Media To Find Jobs
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Building Donor Engagement through Social Media
Building Donor Engagement through Social MediaBuilding Donor Engagement through Social Media
Building Donor Engagement through Social Media
 
Securing and Safeguarding Your Library Setup
Securing and Safeguarding Your Library SetupSecuring and Safeguarding Your Library Setup
Securing and Safeguarding Your Library Setup
 
PROTECTION PERSONAL PRIVACY
PROTECTION PERSONAL PRIVACYPROTECTION PERSONAL PRIVACY
PROTECTION PERSONAL PRIVACY
 
Protecting Personal Privacy
Protecting Personal PrivacyProtecting Personal Privacy
Protecting Personal Privacy
 
Personal Internet Security Practice
Personal Internet Security PracticePersonal Internet Security Practice
Personal Internet Security Practice
 
Online Self Defense
Online Self DefenseOnline Self Defense
Online Self Defense
 
Security and Privacy Brown Bag
Security and Privacy Brown BagSecurity and Privacy Brown Bag
Security and Privacy Brown Bag
 
Social media and the internet evolution
Social media and the internet evolutionSocial media and the internet evolution
Social media and the internet evolution
 
How Real Estate Businesses use Twitter
How Real Estate Businesses use TwitterHow Real Estate Businesses use Twitter
How Real Estate Businesses use Twitter
 
twitter hacking causes and protection
twitter hacking causes and protectiontwitter hacking causes and protection
twitter hacking causes and protection
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 

More from Bill Chea

Xen cloud platform
Xen cloud platformXen cloud platform
Xen cloud platform
Bill Chea
 
Why ruby
Why rubyWhy ruby
Why ruby
Bill Chea
 
Save time by using sass to develop css
Save time by using sass to develop cssSave time by using sass to develop css
Save time by using sass to develop css
Bill Chea
 
Less css
Less cssLess css
Less css
Bill Chea
 
Job hunting & career development
Job hunting & career developmentJob hunting & career development
Job hunting & career development
Bill Chea
 
Internet security
Internet securityInternet security
Internet security
Bill Chea
 
Google mapmaker
Google mapmakerGoogle mapmaker
Google mapmakerBill Chea
 
Financial job study travel planning
Financial job study travel planningFinancial job study travel planning
Financial job study travel planning
Bill Chea
 
Khmer TTS
Khmer TTSKhmer TTS
Khmer TTS
Bill Chea
 
Khmer OCR
Khmer OCRKhmer OCR
Khmer OCR
Bill Chea
 
Khmer ASR
Khmer ASRKhmer ASR
Khmer ASR
Bill Chea
 
ERP web based system
ERP web based systemERP web based system
ERP web based system
Bill Chea
 
10 golden features of business website
10 golden features of business website10 golden features of business website
10 golden features of business website
Bill Chea
 
UrbanVoicePDF
UrbanVoicePDFUrbanVoicePDF
UrbanVoicePDFBill Chea
 
4 hour-workweek-blogger
4 hour-workweek-blogger4 hour-workweek-blogger
4 hour-workweek-bloggerBill Chea
 

More from Bill Chea (15)

Xen cloud platform
Xen cloud platformXen cloud platform
Xen cloud platform
 
Why ruby
Why rubyWhy ruby
Why ruby
 
Save time by using sass to develop css
Save time by using sass to develop cssSave time by using sass to develop css
Save time by using sass to develop css
 
Less css
Less cssLess css
Less css
 
Job hunting & career development
Job hunting & career developmentJob hunting & career development
Job hunting & career development
 
Internet security
Internet securityInternet security
Internet security
 
Google mapmaker
Google mapmakerGoogle mapmaker
Google mapmaker
 
Financial job study travel planning
Financial job study travel planningFinancial job study travel planning
Financial job study travel planning
 
Khmer TTS
Khmer TTSKhmer TTS
Khmer TTS
 
Khmer OCR
Khmer OCRKhmer OCR
Khmer OCR
 
Khmer ASR
Khmer ASRKhmer ASR
Khmer ASR
 
ERP web based system
ERP web based systemERP web based system
ERP web based system
 
10 golden features of business website
10 golden features of business website10 golden features of business website
10 golden features of business website
 
UrbanVoicePDF
UrbanVoicePDFUrbanVoicePDF
UrbanVoicePDF
 
4 hour-workweek-blogger
4 hour-workweek-blogger4 hour-workweek-blogger
4 hour-workweek-blogger
 

Safety social media for positive social change

  • 1. Safe Social Media for Positive Social Change
  • 2. Contents • Introduction: Did you know? • What do you give when you register? • What do I need to know to stay safe on Facebook? • Twitter: Keeping Your Account Secure • Blogging: Introduce other NOT BlogSpot or Wordpress and Online Petition: Change.org • Tips for Geeks
  • 3. Introduction: Did you know? • Internet usage has risen around 1,500% bwt 2007 – end of 2011. • By December 2011 the country had 755,000 Internet users = 5% • Licensed 37 ISPs (a license costs $25,000) • Most Cambodian have access to a mobile phone (93%), and around half own a phone. • Draft of Internet Law (Cyber law) • No research of Cambodia online internet users behavior • Password with 20 digits can be cracked only 24hs
  • 4. What do you give when you register? • Your full names • Addresses • DOB • Location • Occupation • Marriage Statue • Age • Credit card number • Gender • School/University
  • 5. What do I need to know to stay safe on Facebook? • Privacy Setting • Intellectual Property • Statement of Rights and Responsibilities • Reporting a Violation
  • 6. What do I need to know to stay safe on Facebook? • Never share your password. • Think before you post. Each comment and photo builds your online presence. • Adjust your privacy settings and review them often. • Accept friend requests only from people you know personally. • Report content and timelines that look suspicious.
  • 7. Twitter: Keeping Your Account Secure • Safe Tweeting: The Basics We want Twitter to be a safe and open community. This help page provides some information and tips to help you practice safe Tweeting and keep your account secure. Here are some basics: a. Use a strong password. b. Watch out for suspicious links, and always make sure you’re on Twitter.com before you enter your login information. c. Use HTTPS for improved security. d. Don't give your username and password out to untrusted third-parties, especially those promising to get you followers or make you money. e. Make sure your computer and operating system is up-to- date with the most recent patches, upgrades, and anti- virus software. • Use a Strong and Unique Password • Use HTTPS for Improved Security
  • 8. Blogging and Online Campaign • Favorite Blog in Cambodia: Wordpress; Blogspot • Introduce to http://storify.com/ • Posterous.com • Change.org • Visit: – http://freethe15.wordpress.com – http://sahrika.wordpress.com
  • 9. Tips for Geeks • See who are using your Gmail • iPhone and iPad app (Your own morning newspaper) • HideMyAssDotCom (Open restricted website) • Using http and https • PiPl.com (See your post online) • Live Stream Tweet on your blog
  • 10. STAY SAFE. BUT DON’T BE AFRAID! Thank You!