Social media Risk Management Presentation Sample (Animations don't work in sl...Alexander Larsen
An introduction to social media, the types of risks it can cause, some business solutions to mitigating the risks and protecting your company reputation, as well as how it can be used as a tool for successful business continuity and risk management functions.
Social media Risk Management Presentation Sample (Animations don't work in sl...Alexander Larsen
An introduction to social media, the types of risks it can cause, some business solutions to mitigating the risks and protecting your company reputation, as well as how it can be used as a tool for successful business continuity and risk management functions.
Social Media: The Good, The Bad, and The Ugly
People are social creatures and have communicated for centuries using various means and methods. Now with the explosion of global tele-communications and data networks, people can rapidly communicate using multiple social media virtual communities and powerful mobile platforms. Significant news and sporting events are often reported in a real-time impacting the effectiveness of traditional communication channels (i.e., network TV news broadcasts). Students are collaborating on homework and activities through the use of social media virtual communities. Job seekers and employers are exploiting social media virtual communities. We will discuss tips for avoiding the top 9 most common Facebook scams will be shared. My presentation will highlight examples of social media use within the DCCCD community. I will share a personal story from my volunteer child advocate experience,
Social Media Safety for Kids and Teens - A Parent's Guide to Social MediaKaren Kefauver
5 simple tips on how can parents can keep kids and teen safe in the world of social media. Social media marketing is designed to reach kids - how can you protect your kids from social media predators, scams, porn and more.
The Internet has evolved into a collaborative environment where anyone can publish information as easily as viewing or downloading it. There are many powerful learning opportunities on the Internet and we want to ensure our students get the most of this valuable tool while being safe. This session includes introductions to the technologies, the benefits, the concerns, and proactive strategies for keeping students safe.
Social Media: The Good, The Bad, and The Ugly
People are social creatures and have communicated for centuries using various means and methods. Now with the explosion of global tele-communications and data networks, people can rapidly communicate using multiple social media virtual communities and powerful mobile platforms. Significant news and sporting events are often reported in a real-time impacting the effectiveness of traditional communication channels (i.e., network TV news broadcasts). Students are collaborating on homework and activities through the use of social media virtual communities. Job seekers and employers are exploiting social media virtual communities. We will discuss tips for avoiding the top 9 most common Facebook scams will be shared. My presentation will highlight examples of social media use within the DCCCD community. I will share a personal story from my volunteer child advocate experience,
Social Media Safety for Kids and Teens - A Parent's Guide to Social MediaKaren Kefauver
5 simple tips on how can parents can keep kids and teen safe in the world of social media. Social media marketing is designed to reach kids - how can you protect your kids from social media predators, scams, porn and more.
The Internet has evolved into a collaborative environment where anyone can publish information as easily as viewing or downloading it. There are many powerful learning opportunities on the Internet and we want to ensure our students get the most of this valuable tool while being safe. This session includes introductions to the technologies, the benefits, the concerns, and proactive strategies for keeping students safe.
Creating a digital toolkit for users: How to teach our users how to limit the...Justin Denton
Ever wonder what you should or shouldn’t share on the internet? Do you see users who are posting everything thing they possibly could on the internet and wonder how to help educate them to protect themselves?
All of this collective sharing, creates a data gold mine for hackers to do their evil bidding. In this session we will talk about what to post on the internet and what not too. We will also look into what hackers can use from the information you’ve posted on the internet and how they can use it to gain access to your and your users personal lives, accounts, credit cards, and more. During this session, we’ll dive into building a strategy plan to help limit and hopefully eliminate these references from your digital footprint to help ensure you are more secure than you were when you first started this session.
By the end of this webinar, attendees will have a virtual toolkit and strategies to help educate users on protecting themselves while online.
This wonderful presentation, appropriate for teens and young adults, was created by Symantec's Rayane Hazimeh for the Dubai Techfest, 2013. We thank her for generously sharing her content with the SlideShare community.
The yak is one of the most enduring symbols of the high Himalayas. Whether you visit Tibet, Bhutan, India or Nepal, you will inevitably find tourist places with yaks for picture clicking and ride.
As the largest animal on the Tibetan plateau and its surrounding regions, the yak is a “flagship species”, and indicates the health of the ecosystem within which it lives.
DNA sequence analysis of a uniform target gene like the mitochondrial cytochrome oxidase subunit I (COI) to enable species identification has been referred to as “DNA Barcoding”, by analogy with the Universal Product Code (UPC) system barcodes used to identify manufactured goods.
DNA barcoding has the potential to be a practical method for identification of the estimated 10 million species of eukaryotic life on earth.
Microsatellite are powerful DNA markers for quantifying genetic variations within & between populations of a species, also called as STR, SSR, VNTR. Tandemly repeated DNA sequences with the repeat/size of 1 – 6 bases repeated several times
Access and Benefit sharing from Genetic ResourcesKaran Veer Singh
Millions of people depend on biological (genetic) resources and traditional knowledge for their livelihoods. While the concept of an access and benefit sharing (ABS) regime is new, access to biological resources and transfer of associated traditional knowledge is centuries old.
Indian act on IPRs, CBD, Copyright Act, 1957
The Patents Act, 1970
The Geographical Indications of Goods (Registration and Protection) Act, 1999
The Trade Marks Act, 1999
The Designs Act, 2000
The Semiconductor Integrated Circuits Layout-Design Act, 2000
Protection of Plant Varieties and Farmers' Rights Act, 2001
Biological Diversity Act, 2002
Genome annotation, NGS sequence data, decoding sequence information, The genome contains all the biological information required to build and maintain any given living organism.
The quality of data is very important for various downstream analyses, such as sequence assembly, single nucleotide polymorphisms identification this ppt show parameters for
NGS Data quality check and Dataformat of top sequencing machine
RNA Sequence data analysis,Transcriptome sequencing, Sequencing steady state RNA in a sample is known as RNA-Seq. It is free of limitations such as prior knowledge about the organism is not required.
RNA-Seq is useful to unravel inaccessible complexities of transcriptomics such as finding novel transcripts and isoforms.
Data set produced is large and complex; interpretation is not straight forward.
Welcome to the Program Your Destiny course. In this course, we will be learning the technology of personal transformation, neuroassociative conditioning (NAC) as pioneered by Tony Robbins. NAC is used to deprogram negative neuroassociations that are causing approach avoidance and instead reprogram yourself with positive neuroassociations that lead to being approach automatic. In doing so, you change your destiny, moving towards unlocking the hypersocial self within, the true self free from fear and operating from a place of personal power and love.
https://bit.ly/BabeSideDoll4u Babeside is a company that specializes in creating handcrafted reborn dolls. These dolls are designed to be incredibly lifelike, with realistic skin tones and hair, and they have become increasingly popular among collectors and those who use them for therapeutic purposes. At Babeside, we believe that our reborn dolls can provide comfort and healing to anyone who needs it.
The Healing Power of Babeside's Handcrafted Creations
Our reborn dolls are more than just beautiful pieces of art - they can also help alleviate stress, anxiety, depression, and other mental health conditions. Studies have shown that holding or cuddling a soft object like a stuffed animal or a reborn doll can release oxytocin, which is often referred to as the "love hormone." This hormone helps us feel calm and relaxed, reducing feelings of stress and anxiety.
In addition to their physical benefits, reborn dolls can also offer emotional support. For many people, having something to care for and nurture can bring a sense of purpose and fulfillment. Reborn dolls can also serve as a reminder of happy memories or loved ones who have passed away.
3. How Do We Communicate Today?
• I can write you a letter by snail mail.
• I can write you a letter by email, without any regard for
capitalization and punctuation.
• I can send you a message via Xbox Live or on my Wii.
• I can call you.
– From my office phone or mobile device.
– From my computer running Skype.
• We can instant message (AOL, Yahoo!, Google)
• I cn txt u, LOL.
• We can video conference.
• I can be your Facebook friend.
• I can access your Myspace page.
• I can follow you on Twitter.
• I can actually visit you in person?!
4.
5.
6. “Giving people the power to share and make
the world more open and connected.”
7.
8. “Twitter is a service for friends, family, and co-workers to communicate
and stay connected through the exchange of quick frequent answers to
one simple question:
What are you doing?”
9.
10. “Your professional network of trusted contacts gives you an
advantage in your career, and is one of your most valuable assets.
LinkedIn exists to help you make better use of your professional
network and help the people you trust in return.”
11.
12.
13.
14.
15.
16. Why Use Social Media?
• It’s where the students are
• Provides a sense of community
• Seen as a forum to postulate views
• Fun way to stay connected with old friends or make
new friends
• Forum for communication (individual/group/mass)
and collaboration
• Allows for self-expression and self-representation
• “Democratizing innovation”
• “Crowd sourcing”
17.
18. Fan, Friend or Foe?Social Networking groups for awareness
19. What Are The Security Risks?
• Malware distribution
• Cyber-bullying (“trolling,”
emotional abuse)
• “Shelf-life” of information (lives forever in cyberspace)
• Privacy concerns
– Information about you that you post
– Information about you that others post
– Information about you the social networking sites collect and
share with others
20. Embrace the Visual
Let it be Twitter, Facebook or Instagram, Social Media platform is the best place to
showcase your service through quality content with the help of eye-catchy images.
Compelling headlines
Headlines do matter while writing content. A catchy title would grab everyone’s
attention in Social Media platforms. So always give your content a better and fresh
headline.
Share at the right time
The content you are sharing should reach as many people as possible. For this, you
should find the crowd, when they are online. You can refer many infographics to
find the best time to post on social media.
Post multiple times
Promote the same content multiple times on social media because most of the user
do not see most of the content.
Ask q
21. What Are The Security Risks?
• Can result in social engineering, identity theft, financial fraud,
infected computers, stalking, child abuse, sexual predation,
defamation, lawsuits, mad boyfriend/girlfriend/spouse/parent,
unwanted legacy, embarrassment, …
22. Social Networking Awareness
As the popularity of social networking sites continues to grow, so do the security
risks associated with them. Sites like Facebook, Twitter and Linkedin have become
main targets for hackers.
How to Protect Yourself
Use strong passwords.
Keep antivirus software up to date
Update the security and privacy settings offered by social networking services to
ensure the strongest settings possible. View security info on the following sites:
Facebook's security info (Facebook site)
Twitter's security info (Twitter site)
Linkedin's security info (Linkedin site)
Avoid suspicious third-party applications.
Treat everything as public.
Share only with people you know.
23. Limit your available personal information
Be wary of making too much personal information available online. Online
banking and e-commerce sites frequently use “challenge questions” to help you
recover a forgotten password, or for other security purposes. Often, your online
profile will contain enough information to answer these questions.
If a hacker has access to this information, he may be able to break into your
online banking account. In fact, some online quizzes are nothing more than
veiled attempts to gather answers to challenge questions.
Use privacy settings to restrict who can access your information…
Most social networking websites provide a way to limit what information is
available and who can see it. Familiarize yourself with how the privacy settings
work, and set them to limit your exposure as much as possible. If your social
networking website has no privacy settings, consider taking your online
socializing elsewhere.
24. Vary your password
Use a password for social networking websites that is different from the ones
for your e-mail, e-commerce and financial websites. Ideally, you should use a
different password on each website.
Know who you are “friending”
Consider refusing friend requests from people you don’t know. They may be
interested in more than your friendship.
Beware of following links
Links sent in messages sometimes lead to websites that distribute
malware. Consider the source of the message: is it from someone who never
sends you messages? Does the message sound like something your friend
would send? If it looks suspicious, ask your friend if they really sent it. If they
didn’t, their computer may be infected with malware which actually sent you
the message.
25. Malware Distribution
• Similar to other threats that can lead to
downloading/installing malware
– Malicious ads
– Clickjacking (aka “likejacking”)
– Wall posts, inbox or chat messages with malicious
links from “Friends” (hijacked user account)
– “My wallet was stolen and I’m stuck in Rome.
Send me cash now.”
– Spam email pretending to be from Facebook
admins
26. Malware Distribution
• Koobface is grandaddy of malware targeting
Facebook; continues to evolve and infect today
• Suspicious friend or follow request, or link
• Bogus FB groups/Pages/profiles to entice you
• Suspicious/malicious application
mashable.com/2010/05/29/facebook-hilarious-video/
27. Who’s peeking?
• Friendsfamily
• Friends of friendsfamily
• Parents
• Employers and co-workers
– Dec 2009 study commissioned by Microsoft
said 79% of recruiters & hiring mgrs
researched applicants online
– CareerBuilder.com study – 45% of employers
use social networks to screen job candidates
• Customers
• Universities
• Marketing companiesvendors
• Criminalshackers
• Government agencies (IRS, SRS!)
• EVERYONE ELSE
28. Tips for Safer Social Networking
1. Use a strong, unique password (don’t use the same
password on multiple sites; don’t use eID password on
social networking sites)
2. Provide as little personal information as possible – avoid
revealing birth date, address, etc.
3. Understand and customize the privacy settings in all of your
social networking accounts
4. Don’t allow 3rd party applications to access
your information (if possible)
5. Be careful about what you post
a. Photos of self or others
b. Opinions on controversial topics
c. Don’t rip classmates, professors, coworkers,
employers, etc. – it WILL come back to haunt you
6. Don’t post anything related to your
employer (unless you’re authorized)
7. Supervise your kids’ use of social
networking sites
29. Tips for Safer Social Networking
8. Be suspicious of friend/follow requests, ads, 3rd party
applications, chat messages, etc.
9. Minimize exploration – don’t carelessly click on lots of
ads, videos, games, etc.
10. Use built-in and add-on features in web browsers to
warn you of malicious sites
a. Anti-phishing filters in IE and Firefox
b. Web of Trust
c. NoScript
d. Adblock Plus
e. Preview features of bit.ly, TinyURL
11. Trend Micro Web Reputations
Services is your friend
12. Google yourself and scrutinize results
13. Think before you click!!
32. How To Quit Your Addiction
• How to permanently delete your facebook
account FB group (Key is to NOT use your
FB account in any way for 14 days after
submitting the request)
• How to deactivate your Twitter account
(they claim it takes “up to 30 days to clear
from our internal systems.”)
• How to delete your
MySpace profile
33. • In my opinion, the value far outweighs the risk. I’d even
say the dangers are exaggerated.
• Use social networking effectively and positively to
establish new relationships, strengthen existing ones,
innovate, learn, collaborate,
and have fun.
• But beware of the risks
so you can do your
best to steer clear of
them
• And think before you click!!
Conclusion
Social media is one of many forms of communication, but an increasingly dominant one – both for good and bad
Doesn’t necessarily replace other forms, including face-to-face, but could be viewed as augmenting communication
Overtook MySpace as most popular social networking site in 2008
Wildly popular now with over 400 million users
“Facebook is an online directory that connects people through social networks at schools” (Facebook.com)
Launched to the public Wednesday Feb 4, 2004
Harvard students created the site as a tool to connect with other students in their community
It announces birthdays, events and invitations
Start-up based in Palo Alto, California
Begin small and is now one of the top ten most visited sites on the web and is profitable
Attractive to our “sound bite” culture since communication limited to 140 character “tweets”
Gave a boost to URL shortening services like tinyURL and bit.ly
Library of Congress plans to archive ENTIRE archive of tweets!
From http://blogs.loc.gov/loc/2010/04/how-tweet-it-is-library-acquires-entire-twitter-archive/ :
“Every public tweet, ever, since Twitter’s inception in March 2006, will be archived digitally at the Library of Congress. That’s a LOT of tweets, by the way: Twitter processes more than 50 million tweets every day, with the total numbering in the billions.”
Are literally hundreds of social networking services, growing daily, but much volatility. Which will be the next Facebook?
Key point – if you want to communicate with current generation of college students, you need a presence in social media
Give credit where credit is due! My talk is stolen from Sherry Callahan at KUMC, based on a talk she gave at CHECK conference last week. I added a bunch of content and included things specific to K-State
RockYou can stash 32 million passwords in the clear; when RapLeaf can index 600 million email accounts; and when Intelius can go public by buying 100 million profile pages; then our social networks have traded away our privacy for mere “privacy theater.”over the past few years — and negligently stored them in plaintext in an incompetently protected database.
RockYou’s official bluster about “illegal intrusion” should fool no one: blaming Imperva, the firm who exposed the flaw , or accusing the hacker(s) of being the identity thieves is misdirection: it was actually RockYou who stole those credentials, and RockYou should be held to account.
Read more: http://techcrunch.com/2009/12/27/privacy-theater/#ixzz0oaNyV1XL
RockYou can stash 32 million passwords in the clear; when RapLeaf can index 600 million email accounts; and when Intelius can go public by buying 100 million profile pages; then our social networks have traded away our privacy for mere “privacy theater.”over the past few years — and negligently stored them in plaintext in an incompetently protected database.
RockYou’s official bluster about “illegal intrusion” should fool no one: blaming Imperva, the firm who exposed the flaw , or accusing the hacker(s) of being the identity thieves is misdirection: it was actually RockYou who stole those credentials, and RockYou should be held to account.
Read more: http://techcrunch.com/2009/12/27/privacy-theater/#ixzz0oaNyV1XL
I’m very uneasy with faculty friending students, even if done to use FB for class work, because of the personal information that exposes to each other
Blurs personal and professional boundaries
But reality is that’s where the students live so can be effective way to communicate with them. No good answer…