SlideShare a Scribd company logo
Social networking groups for
awareness
Dr Karan Veer Singh,
Scientist, ICAR-NBAGR
How Do We Communicate Today?
• I can write you a letter by snail mail.
• I can write you a letter by email, without any regard for
capitalization and punctuation.
• I can send you a message via Xbox Live or on my Wii.
• I can call you.
– From my office phone or mobile device.
– From my computer running Skype.
• We can instant message (AOL, Yahoo!, Google)
• I cn txt u, LOL.
• We can video conference.
• I can be your Facebook friend.
• I can access your Myspace page.
• I can follow you on Twitter.
• I can actually visit you in person?!
“Giving people the power to share and make
the world more open and connected.”
“Twitter is a service for friends, family, and co-workers to communicate
and stay connected through the exchange of quick frequent answers to
one simple question:
What are you doing?”
“Your professional network of trusted contacts gives you an
advantage in your career, and is one of your most valuable assets.
LinkedIn exists to help you make better use of your professional
network and help the people you trust in return.”
Why Use Social Media?
• It’s where the students are
• Provides a sense of community
• Seen as a forum to postulate views
• Fun way to stay connected with old friends or make
new friends
• Forum for communication (individual/group/mass)
and collaboration
• Allows for self-expression and self-representation
• “Democratizing innovation”
• “Crowd sourcing”
Fan, Friend or Foe?Social Networking groups for awareness
What Are The Security Risks?
• Malware distribution
• Cyber-bullying (“trolling,”
emotional abuse)
• “Shelf-life” of information (lives forever in cyberspace)
• Privacy concerns
– Information about you that you post
– Information about you that others post
– Information about you the social networking sites collect and
share with others
Embrace the Visual
Let it be Twitter, Facebook or Instagram, Social Media platform is the best place to
showcase your service through quality content with the help of eye-catchy images.
Compelling headlines
Headlines do matter while writing content. A catchy title would grab everyone’s
attention in Social Media platforms. So always give your content a better and fresh
headline.
Share at the right time
The content you are sharing should reach as many people as possible. For this, you
should find the crowd, when they are online. You can refer many infographics to
find the best time to post on social media.
Post multiple times
Promote the same content multiple times on social media because most of the user
do not see most of the content.
Ask q
What Are The Security Risks?
• Can result in social engineering, identity theft, financial fraud,
infected computers, stalking, child abuse, sexual predation,
defamation, lawsuits, mad boyfriend/girlfriend/spouse/parent,
unwanted legacy, embarrassment, …
Social Networking Awareness
As the popularity of social networking sites continues to grow, so do the security
risks associated with them. Sites like Facebook, Twitter and Linkedin have become
main targets for hackers.
How to Protect Yourself
Use strong passwords.
Keep antivirus software up to date
Update the security and privacy settings offered by social networking services to
ensure the strongest settings possible. View security info on the following sites:
Facebook's security info (Facebook site)
Twitter's security info (Twitter site)
Linkedin's security info (Linkedin site)
Avoid suspicious third-party applications.
Treat everything as public.
Share only with people you know.
Limit your available personal information
Be wary of making too much personal information available online. Online
banking and e-commerce sites frequently use “challenge questions” to help you
recover a forgotten password, or for other security purposes. Often, your online
profile will contain enough information to answer these questions.
If a hacker has access to this information, he may be able to break into your
online banking account. In fact, some online quizzes are nothing more than
veiled attempts to gather answers to challenge questions.
Use privacy settings to restrict who can access your information…
Most social networking websites provide a way to limit what information is
available and who can see it. Familiarize yourself with how the privacy settings
work, and set them to limit your exposure as much as possible. If your social
networking website has no privacy settings, consider taking your online
socializing elsewhere.
Vary your password
Use a password for social networking websites that is different from the ones
for your e-mail, e-commerce and financial websites. Ideally, you should use a
different password on each website.
Know who you are “friending”
Consider refusing friend requests from people you don’t know. They may be
interested in more than your friendship.
Beware of following links
Links sent in messages sometimes lead to websites that distribute
malware. Consider the source of the message: is it from someone who never
sends you messages? Does the message sound like something your friend
would send? If it looks suspicious, ask your friend if they really sent it. If they
didn’t, their computer may be infected with malware which actually sent you
the message.
Malware Distribution
• Similar to other threats that can lead to
downloading/installing malware
– Malicious ads
– Clickjacking (aka “likejacking”)
– Wall posts, inbox or chat messages with malicious
links from “Friends” (hijacked user account)
– “My wallet was stolen and I’m stuck in Rome.
Send me cash now.”
– Spam email pretending to be from Facebook
admins
Malware Distribution
• Koobface is grandaddy of malware targeting
Facebook; continues to evolve and infect today
• Suspicious friend or follow request, or link
• Bogus FB groups/Pages/profiles to entice you
• Suspicious/malicious application
mashable.com/2010/05/29/facebook-hilarious-video/
Who’s peeking?
• Friendsfamily
• Friends of friendsfamily
• Parents
• Employers and co-workers
– Dec 2009 study commissioned by Microsoft
said 79% of recruiters & hiring mgrs
researched applicants online
– CareerBuilder.com study – 45% of employers
use social networks to screen job candidates
• Customers
• Universities
• Marketing companiesvendors
• Criminalshackers
• Government agencies (IRS, SRS!)
• EVERYONE ELSE
Tips for Safer Social Networking
1. Use a strong, unique password (don’t use the same
password on multiple sites; don’t use eID password on
social networking sites)
2. Provide as little personal information as possible – avoid
revealing birth date, address, etc.
3. Understand and customize the privacy settings in all of your
social networking accounts
4. Don’t allow 3rd party applications to access
your information (if possible)
5. Be careful about what you post
a. Photos of self or others
b. Opinions on controversial topics
c. Don’t rip classmates, professors, coworkers,
employers, etc. – it WILL come back to haunt you
6. Don’t post anything related to your
employer (unless you’re authorized)
7. Supervise your kids’ use of social
networking sites
Tips for Safer Social Networking
8. Be suspicious of friend/follow requests, ads, 3rd party
applications, chat messages, etc.
9. Minimize exploration – don’t carelessly click on lots of
ads, videos, games, etc.
10. Use built-in and add-on features in web browsers to
warn you of malicious sites
a. Anti-phishing filters in IE and Firefox
b. Web of Trust
c. NoScript
d. Adblock Plus
e. Preview features of bit.ly, TinyURL
11. Trend Micro Web Reputations
Services is your friend
12. Google yourself and scrutinize results
13. Think before you click!!
Ethical Issues
How To Quit Your Addiction
• How to permanently delete your facebook
account FB group (Key is to NOT use your
FB account in any way for 14 days after
submitting the request)
• How to deactivate your Twitter account
(they claim it takes “up to 30 days to clear
from our internal systems.”)
• How to delete your
MySpace profile
• In my opinion, the value far outweighs the risk. I’d even
say the dangers are exaggerated.
• Use social networking effectively and positively to
establish new relationships, strengthen existing ones,
innovate, learn, collaborate,
and have fun.
• But beware of the risks
so you can do your
best to steer clear of
them
• And think before you click!!
Conclusion
?
? ???
?
??? ?

More Related Content

What's hot

NTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul Styrvoky
NTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul StyrvokyNTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul Styrvoky
NTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul Styrvoky
North Texas Chapter of the ISSA
 
Internet Safety for Parents presentation 2017
Internet Safety for Parents presentation 2017Internet Safety for Parents presentation 2017
Internet Safety for Parents presentation 2017
KanelandSvihlik
 
Digital Footprint
Digital FootprintDigital Footprint
Digital Footprint
darpankambo
 
Social & mobile security
Social & mobile securitySocial & mobile security
Social & mobile securityErnest Staats
 
Social Media and the Dangers
Social Media and the DangersSocial Media and the Dangers
Social Media and the Dangers
joannapasta
 
1 a ramdc social media 06.24.2010
1 a ramdc social media 06.24.20101 a ramdc social media 06.24.2010
1 a ramdc social media 06.24.2010Heather Grimes
 
A Social Media Overview of Facebook, Twitter & LinkedIn
A Social Media Overview of Facebook, Twitter & LinkedInA Social Media Overview of Facebook, Twitter & LinkedIn
A Social Media Overview of Facebook, Twitter & LinkedIn
Matt Young
 
Current Issues in Social Networking Presentation
Current Issues in Social Networking PresentationCurrent Issues in Social Networking Presentation
Current Issues in Social Networking Presentation
Donna Spear
 
Business Impact of Online Social Networking
Business Impact of Online Social NetworkingBusiness Impact of Online Social Networking
Business Impact of Online Social Networking
Micheal Axelsen
 
Digital footprint presentation
Digital footprint presentationDigital footprint presentation
Digital footprint presentationsahrdebeck52
 
Crossroads Social Network Survival Guide
Crossroads Social Network Survival GuideCrossroads Social Network Survival Guide
Crossroads Social Network Survival Guide
Crossroads: Pathways to Success, Inc.
 
Social Networking - CWCC
Social Networking - CWCCSocial Networking - CWCC
Social Networking - CWCC
Deborah Krier
 
Social Media 101 Twitter-Facebook-LinkedIn-02-22
Social Media 101 Twitter-Facebook-LinkedIn-02-22Social Media 101 Twitter-Facebook-LinkedIn-02-22
Social Media 101 Twitter-Facebook-LinkedIn-02-22
Barbara O'Neill
 
Social Media Safety for Kids and Teens - A Parent's Guide to Social Media
Social Media Safety for Kids and Teens - A Parent's Guide to Social MediaSocial Media Safety for Kids and Teens - A Parent's Guide to Social Media
Social Media Safety for Kids and Teens - A Parent's Guide to Social Media
Karen Kefauver
 
Social Technologies Penn America
Social Technologies Penn AmericaSocial Technologies Penn America
Social Technologies Penn America
Sandra Masters
 
Social Media in the Education Sector. Does it compute?
Social Media in the Education Sector. Does it compute?Social Media in the Education Sector. Does it compute?
Social Media in the Education Sector. Does it compute?
Florizel Media
 
Pr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointPr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointhmorrell1
 

What's hot (19)

NTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul Styrvoky
NTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul StyrvokyNTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul Styrvoky
NTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul Styrvoky
 
Internet Safety for Parents presentation 2017
Internet Safety for Parents presentation 2017Internet Safety for Parents presentation 2017
Internet Safety for Parents presentation 2017
 
Digital Footprint
Digital FootprintDigital Footprint
Digital Footprint
 
Social & mobile security
Social & mobile securitySocial & mobile security
Social & mobile security
 
Social Media and the Dangers
Social Media and the DangersSocial Media and the Dangers
Social Media and the Dangers
 
1 a ramdc social media 06.24.2010
1 a ramdc social media 06.24.20101 a ramdc social media 06.24.2010
1 a ramdc social media 06.24.2010
 
A Social Media Overview of Facebook, Twitter & LinkedIn
A Social Media Overview of Facebook, Twitter & LinkedInA Social Media Overview of Facebook, Twitter & LinkedIn
A Social Media Overview of Facebook, Twitter & LinkedIn
 
Current Issues in Social Networking Presentation
Current Issues in Social Networking PresentationCurrent Issues in Social Networking Presentation
Current Issues in Social Networking Presentation
 
Social Networking Project (2)
Social Networking Project (2)Social Networking Project (2)
Social Networking Project (2)
 
Business Impact of Online Social Networking
Business Impact of Online Social NetworkingBusiness Impact of Online Social Networking
Business Impact of Online Social Networking
 
Digital footprint presentation
Digital footprint presentationDigital footprint presentation
Digital footprint presentation
 
Crossroads Social Network Survival Guide
Crossroads Social Network Survival GuideCrossroads Social Network Survival Guide
Crossroads Social Network Survival Guide
 
Social Networking - CWCC
Social Networking - CWCCSocial Networking - CWCC
Social Networking - CWCC
 
Social Media 101 Twitter-Facebook-LinkedIn-02-22
Social Media 101 Twitter-Facebook-LinkedIn-02-22Social Media 101 Twitter-Facebook-LinkedIn-02-22
Social Media 101 Twitter-Facebook-LinkedIn-02-22
 
Social Media Safety for Kids and Teens - A Parent's Guide to Social Media
Social Media Safety for Kids and Teens - A Parent's Guide to Social MediaSocial Media Safety for Kids and Teens - A Parent's Guide to Social Media
Social Media Safety for Kids and Teens - A Parent's Guide to Social Media
 
Social Technologies Penn America
Social Technologies Penn AmericaSocial Technologies Penn America
Social Technologies Penn America
 
Social media-threats
Social media-threatsSocial media-threats
Social media-threats
 
Social Media in the Education Sector. Does it compute?
Social Media in the Education Sector. Does it compute?Social Media in the Education Sector. Does it compute?
Social Media in the Education Sector. Does it compute?
 
Pr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointPr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpoint
 

Similar to Social groups for awareness

INTERNET SAFETY
INTERNET SAFETY INTERNET SAFETY
INTERNET SAFETY
Cathleen Richardson
 
Lesson 2_Rules_of_Netiquette.pptx
Lesson 2_Rules_of_Netiquette.pptxLesson 2_Rules_of_Netiquette.pptx
Lesson 2_Rules_of_Netiquette.pptx
Joy Dugayo
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threats
mkinzie
 
Mark Rogers' Social Network Presentation
Mark Rogers' Social Network PresentationMark Rogers' Social Network Presentation
Mark Rogers' Social Network Presentation
Mark Rogers
 
Tot edu eng.
Tot edu eng.Tot edu eng.
Tot edu eng.
Mohamed ElGabry
 
Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...
Justin Denton
 
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2
JayMarkBandoy1
 
Guide to facebook security
Guide to facebook securityGuide to facebook security
Guide to facebook security
guadalinfoyunquera
 
Secure social networking
Secure social networkingSecure social networking
Secure social networking
Osaid To'meh
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquette
EmmanuelaSernicul
 
Social networking
Social networkingSocial networking
Social networking
Jayson Bautista
 
Cyber Awareness.pptx
Cyber Awareness.pptxCyber Awareness.pptx
Cyber Awareness.pptx
adblue2017
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
Rayanehaz
 
Cybersecurity additional activities
Cybersecurity additional activitiesCybersecurity additional activities
Cybersecurity additional activities
Yumonomics
 
What Parents need to know about social media in 2014
What Parents need to know about social media in 2014What Parents need to know about social media in 2014
What Parents need to know about social media in 2014
Pepper It Marketing ~ Time on Task Virtual Assistant Services
 
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINTEMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
TeacherNicaPrintable
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
Rayane Hazimeh
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
Marian Merritt
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
Rayane Hazimeh
 

Similar to Social groups for awareness (20)

INTERNET SAFETY
INTERNET SAFETY INTERNET SAFETY
INTERNET SAFETY
 
Lesson 2_Rules_of_Netiquette.pptx
Lesson 2_Rules_of_Netiquette.pptxLesson 2_Rules_of_Netiquette.pptx
Lesson 2_Rules_of_Netiquette.pptx
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threats
 
Mark Rogers' Social Network Presentation
Mark Rogers' Social Network PresentationMark Rogers' Social Network Presentation
Mark Rogers' Social Network Presentation
 
Tot edu eng.
Tot edu eng.Tot edu eng.
Tot edu eng.
 
Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...
 
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2
 
Guide to facebook security
Guide to facebook securityGuide to facebook security
Guide to facebook security
 
Secure social networking
Secure social networkingSecure social networking
Secure social networking
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquette
 
Social networking
Social networkingSocial networking
Social networking
 
Cyber Awareness.pptx
Cyber Awareness.pptxCyber Awareness.pptx
Cyber Awareness.pptx
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Cybersecurity additional activities
Cybersecurity additional activitiesCybersecurity additional activities
Cybersecurity additional activities
 
What Parents need to know about social media in 2014
What Parents need to know about social media in 2014What Parents need to know about social media in 2014
What Parents need to know about social media in 2014
 
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINTEMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
 
Riverview
RiverviewRiverview
Riverview
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 

More from Karan Veer Singh

Pcr primer design
Pcr primer designPcr primer design
Pcr primer design
Karan Veer Singh
 
Yak genetic resources of india
Yak genetic resources of indiaYak genetic resources of india
Yak genetic resources of india
Karan Veer Singh
 
DNA Barcoding
DNA BarcodingDNA Barcoding
DNA Barcoding
Karan Veer Singh
 
Microsatellites Markers
Microsatellites  MarkersMicrosatellites  Markers
Microsatellites Markers
Karan Veer Singh
 
Tick identification guide
Tick identification guideTick identification guide
Tick identification guide
Karan Veer Singh
 
Access and Benefit sharing from Genetic Resources
Access and Benefit sharing from Genetic ResourcesAccess and Benefit sharing from Genetic Resources
Access and Benefit sharing from Genetic Resources
Karan Veer Singh
 
IPR
IPRIPR
Indian acts governing different IPRs
Indian acts governing different IPRsIndian acts governing different IPRs
Indian acts governing different IPRs
Karan Veer Singh
 
Ip protected invention in the field of biotechnology
Ip protected invention in the field of biotechnologyIp protected invention in the field of biotechnology
Ip protected invention in the field of biotechnology
Karan Veer Singh
 
Patent In Molecular Biology
Patent In Molecular BiologyPatent In Molecular Biology
Patent In Molecular Biology
Karan Veer Singh
 
Genome annotation 2013
Genome annotation 2013Genome annotation 2013
Genome annotation 2013
Karan Veer Singh
 
NGS - QC & Dataformat
NGS - QC & Dataformat NGS - QC & Dataformat
NGS - QC & Dataformat
Karan Veer Singh
 
MICROSATELITE Markers for LIVESTOCK Genetic DIVERSITY ANALYSES
MICROSATELITE Markers for LIVESTOCK Genetic DIVERSITY ANALYSESMICROSATELITE Markers for LIVESTOCK Genetic DIVERSITY ANALYSES
MICROSATELITE Markers for LIVESTOCK Genetic DIVERSITY ANALYSES
Karan Veer Singh
 
Rna seq pipeline
Rna seq pipelineRna seq pipeline
Rna seq pipeline
Karan Veer Singh
 
Semen Banking for conservation of livestock biodiversity
Semen Banking for conservation of  livestock biodiversitySemen Banking for conservation of  livestock biodiversity
Semen Banking for conservation of livestock biodiversity
Karan Veer Singh
 
DiGE....2-D gel electrophoresis
DiGE....2-D gel electrophoresisDiGE....2-D gel electrophoresis
DiGE....2-D gel electrophoresis
Karan Veer Singh
 

More from Karan Veer Singh (20)

Pcr primer design
Pcr primer designPcr primer design
Pcr primer design
 
Yak genetic resources of india
Yak genetic resources of indiaYak genetic resources of india
Yak genetic resources of india
 
DNA Barcoding
DNA BarcodingDNA Barcoding
DNA Barcoding
 
Microsatellites Markers
Microsatellites  MarkersMicrosatellites  Markers
Microsatellites Markers
 
Tick identification guide
Tick identification guideTick identification guide
Tick identification guide
 
Access and Benefit sharing from Genetic Resources
Access and Benefit sharing from Genetic ResourcesAccess and Benefit sharing from Genetic Resources
Access and Benefit sharing from Genetic Resources
 
IPR
IPRIPR
IPR
 
Indian acts governing different IPRs
Indian acts governing different IPRsIndian acts governing different IPRs
Indian acts governing different IPRs
 
Ip protected invention in the field of biotechnology
Ip protected invention in the field of biotechnologyIp protected invention in the field of biotechnology
Ip protected invention in the field of biotechnology
 
Patent In Molecular Biology
Patent In Molecular BiologyPatent In Molecular Biology
Patent In Molecular Biology
 
Genome annotation 2013
Genome annotation 2013Genome annotation 2013
Genome annotation 2013
 
NGS - QC & Dataformat
NGS - QC & Dataformat NGS - QC & Dataformat
NGS - QC & Dataformat
 
MICROSATELITE Markers for LIVESTOCK Genetic DIVERSITY ANALYSES
MICROSATELITE Markers for LIVESTOCK Genetic DIVERSITY ANALYSESMICROSATELITE Markers for LIVESTOCK Genetic DIVERSITY ANALYSES
MICROSATELITE Markers for LIVESTOCK Genetic DIVERSITY ANALYSES
 
Rna seq pipeline
Rna seq pipelineRna seq pipeline
Rna seq pipeline
 
Semen Banking for conservation of livestock biodiversity
Semen Banking for conservation of  livestock biodiversitySemen Banking for conservation of  livestock biodiversity
Semen Banking for conservation of livestock biodiversity
 
DiGE....2-D gel electrophoresis
DiGE....2-D gel electrophoresisDiGE....2-D gel electrophoresis
DiGE....2-D gel electrophoresis
 
Tecto3
Tecto3Tecto3
Tecto3
 
Paradigm
ParadigmParadigm
Paradigm
 
Electrophoresis
ElectrophoresisElectrophoresis
Electrophoresis
 
Electrophoresis
ElectrophoresisElectrophoresis
Electrophoresis
 

Recently uploaded

SOCIOLOGY PPT. SOCIAL SECURITY POWER POINT
SOCIOLOGY PPT. SOCIAL SECURITY POWER POINTSOCIOLOGY PPT. SOCIAL SECURITY POWER POINT
SOCIOLOGY PPT. SOCIAL SECURITY POWER POINT
ssuser8d5e2d1
 
UNIVERSAL HUMAN VALUES- Harmony in the Nature
UNIVERSAL HUMAN VALUES- Harmony in the NatureUNIVERSAL HUMAN VALUES- Harmony in the Nature
UNIVERSAL HUMAN VALUES- Harmony in the Nature
Chandrakant Divate
 
Program Your Destiny eBook - Destiny University.pdf
Program Your Destiny eBook - Destiny University.pdfProgram Your Destiny eBook - Destiny University.pdf
Program Your Destiny eBook - Destiny University.pdf
Michael Herlache, MBA
 
Collocation thường gặp trong đề thi THPT Quốc gia.pdf
Collocation thường gặp trong đề thi THPT Quốc gia.pdfCollocation thường gặp trong đề thi THPT Quốc gia.pdf
Collocation thường gặp trong đề thi THPT Quốc gia.pdf
ngochaavk33a
 
Ethical_dilemmas_MDI_Gurgaon-Business Ethics Case 1.pptx
Ethical_dilemmas_MDI_Gurgaon-Business Ethics Case 1.pptxEthical_dilemmas_MDI_Gurgaon-Business Ethics Case 1.pptx
Ethical_dilemmas_MDI_Gurgaon-Business Ethics Case 1.pptx
TANMAYJAIN511570
 
What Is The Psychology Behind Reborn Dolls_.pptx
What Is The Psychology Behind Reborn Dolls_.pptxWhat Is The Psychology Behind Reborn Dolls_.pptx
What Is The Psychology Behind Reborn Dolls_.pptx
Lloyd Dobson Artist
 

Recently uploaded (6)

SOCIOLOGY PPT. SOCIAL SECURITY POWER POINT
SOCIOLOGY PPT. SOCIAL SECURITY POWER POINTSOCIOLOGY PPT. SOCIAL SECURITY POWER POINT
SOCIOLOGY PPT. SOCIAL SECURITY POWER POINT
 
UNIVERSAL HUMAN VALUES- Harmony in the Nature
UNIVERSAL HUMAN VALUES- Harmony in the NatureUNIVERSAL HUMAN VALUES- Harmony in the Nature
UNIVERSAL HUMAN VALUES- Harmony in the Nature
 
Program Your Destiny eBook - Destiny University.pdf
Program Your Destiny eBook - Destiny University.pdfProgram Your Destiny eBook - Destiny University.pdf
Program Your Destiny eBook - Destiny University.pdf
 
Collocation thường gặp trong đề thi THPT Quốc gia.pdf
Collocation thường gặp trong đề thi THPT Quốc gia.pdfCollocation thường gặp trong đề thi THPT Quốc gia.pdf
Collocation thường gặp trong đề thi THPT Quốc gia.pdf
 
Ethical_dilemmas_MDI_Gurgaon-Business Ethics Case 1.pptx
Ethical_dilemmas_MDI_Gurgaon-Business Ethics Case 1.pptxEthical_dilemmas_MDI_Gurgaon-Business Ethics Case 1.pptx
Ethical_dilemmas_MDI_Gurgaon-Business Ethics Case 1.pptx
 
What Is The Psychology Behind Reborn Dolls_.pptx
What Is The Psychology Behind Reborn Dolls_.pptxWhat Is The Psychology Behind Reborn Dolls_.pptx
What Is The Psychology Behind Reborn Dolls_.pptx
 

Social groups for awareness

  • 1. Social networking groups for awareness Dr Karan Veer Singh, Scientist, ICAR-NBAGR
  • 2.
  • 3. How Do We Communicate Today? • I can write you a letter by snail mail. • I can write you a letter by email, without any regard for capitalization and punctuation. • I can send you a message via Xbox Live or on my Wii. • I can call you. – From my office phone or mobile device. – From my computer running Skype. • We can instant message (AOL, Yahoo!, Google) • I cn txt u, LOL. • We can video conference. • I can be your Facebook friend. • I can access your Myspace page. • I can follow you on Twitter. • I can actually visit you in person?!
  • 4.
  • 5.
  • 6. “Giving people the power to share and make the world more open and connected.”
  • 7.
  • 8. “Twitter is a service for friends, family, and co-workers to communicate and stay connected through the exchange of quick frequent answers to one simple question: What are you doing?”
  • 9.
  • 10. “Your professional network of trusted contacts gives you an advantage in your career, and is one of your most valuable assets. LinkedIn exists to help you make better use of your professional network and help the people you trust in return.”
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16. Why Use Social Media? • It’s where the students are • Provides a sense of community • Seen as a forum to postulate views • Fun way to stay connected with old friends or make new friends • Forum for communication (individual/group/mass) and collaboration • Allows for self-expression and self-representation • “Democratizing innovation” • “Crowd sourcing”
  • 17.
  • 18. Fan, Friend or Foe?Social Networking groups for awareness
  • 19. What Are The Security Risks? • Malware distribution • Cyber-bullying (“trolling,” emotional abuse) • “Shelf-life” of information (lives forever in cyberspace) • Privacy concerns – Information about you that you post – Information about you that others post – Information about you the social networking sites collect and share with others
  • 20. Embrace the Visual Let it be Twitter, Facebook or Instagram, Social Media platform is the best place to showcase your service through quality content with the help of eye-catchy images. Compelling headlines Headlines do matter while writing content. A catchy title would grab everyone’s attention in Social Media platforms. So always give your content a better and fresh headline. Share at the right time The content you are sharing should reach as many people as possible. For this, you should find the crowd, when they are online. You can refer many infographics to find the best time to post on social media. Post multiple times Promote the same content multiple times on social media because most of the user do not see most of the content. Ask q
  • 21. What Are The Security Risks? • Can result in social engineering, identity theft, financial fraud, infected computers, stalking, child abuse, sexual predation, defamation, lawsuits, mad boyfriend/girlfriend/spouse/parent, unwanted legacy, embarrassment, …
  • 22. Social Networking Awareness As the popularity of social networking sites continues to grow, so do the security risks associated with them. Sites like Facebook, Twitter and Linkedin have become main targets for hackers. How to Protect Yourself Use strong passwords. Keep antivirus software up to date Update the security and privacy settings offered by social networking services to ensure the strongest settings possible. View security info on the following sites: Facebook's security info (Facebook site) Twitter's security info (Twitter site) Linkedin's security info (Linkedin site) Avoid suspicious third-party applications. Treat everything as public. Share only with people you know.
  • 23. Limit your available personal information Be wary of making too much personal information available online. Online banking and e-commerce sites frequently use “challenge questions” to help you recover a forgotten password, or for other security purposes. Often, your online profile will contain enough information to answer these questions. If a hacker has access to this information, he may be able to break into your online banking account. In fact, some online quizzes are nothing more than veiled attempts to gather answers to challenge questions. Use privacy settings to restrict who can access your information… Most social networking websites provide a way to limit what information is available and who can see it. Familiarize yourself with how the privacy settings work, and set them to limit your exposure as much as possible. If your social networking website has no privacy settings, consider taking your online socializing elsewhere.
  • 24. Vary your password Use a password for social networking websites that is different from the ones for your e-mail, e-commerce and financial websites. Ideally, you should use a different password on each website. Know who you are “friending” Consider refusing friend requests from people you don’t know. They may be interested in more than your friendship. Beware of following links Links sent in messages sometimes lead to websites that distribute malware. Consider the source of the message: is it from someone who never sends you messages? Does the message sound like something your friend would send? If it looks suspicious, ask your friend if they really sent it. If they didn’t, their computer may be infected with malware which actually sent you the message.
  • 25. Malware Distribution • Similar to other threats that can lead to downloading/installing malware – Malicious ads – Clickjacking (aka “likejacking”) – Wall posts, inbox or chat messages with malicious links from “Friends” (hijacked user account) – “My wallet was stolen and I’m stuck in Rome. Send me cash now.” – Spam email pretending to be from Facebook admins
  • 26. Malware Distribution • Koobface is grandaddy of malware targeting Facebook; continues to evolve and infect today • Suspicious friend or follow request, or link • Bogus FB groups/Pages/profiles to entice you • Suspicious/malicious application mashable.com/2010/05/29/facebook-hilarious-video/
  • 27. Who’s peeking? • Friendsfamily • Friends of friendsfamily • Parents • Employers and co-workers – Dec 2009 study commissioned by Microsoft said 79% of recruiters & hiring mgrs researched applicants online – CareerBuilder.com study – 45% of employers use social networks to screen job candidates • Customers • Universities • Marketing companiesvendors • Criminalshackers • Government agencies (IRS, SRS!) • EVERYONE ELSE
  • 28. Tips for Safer Social Networking 1. Use a strong, unique password (don’t use the same password on multiple sites; don’t use eID password on social networking sites) 2. Provide as little personal information as possible – avoid revealing birth date, address, etc. 3. Understand and customize the privacy settings in all of your social networking accounts 4. Don’t allow 3rd party applications to access your information (if possible) 5. Be careful about what you post a. Photos of self or others b. Opinions on controversial topics c. Don’t rip classmates, professors, coworkers, employers, etc. – it WILL come back to haunt you 6. Don’t post anything related to your employer (unless you’re authorized) 7. Supervise your kids’ use of social networking sites
  • 29. Tips for Safer Social Networking 8. Be suspicious of friend/follow requests, ads, 3rd party applications, chat messages, etc. 9. Minimize exploration – don’t carelessly click on lots of ads, videos, games, etc. 10. Use built-in and add-on features in web browsers to warn you of malicious sites a. Anti-phishing filters in IE and Firefox b. Web of Trust c. NoScript d. Adblock Plus e. Preview features of bit.ly, TinyURL 11. Trend Micro Web Reputations Services is your friend 12. Google yourself and scrutinize results 13. Think before you click!!
  • 30.
  • 32. How To Quit Your Addiction • How to permanently delete your facebook account FB group (Key is to NOT use your FB account in any way for 14 days after submitting the request) • How to deactivate your Twitter account (they claim it takes “up to 30 days to clear from our internal systems.”) • How to delete your MySpace profile
  • 33. • In my opinion, the value far outweighs the risk. I’d even say the dangers are exaggerated. • Use social networking effectively and positively to establish new relationships, strengthen existing ones, innovate, learn, collaborate, and have fun. • But beware of the risks so you can do your best to steer clear of them • And think before you click!! Conclusion

Editor's Notes

  1. Social media is one of many forms of communication, but an increasingly dominant one – both for good and bad Doesn’t necessarily replace other forms, including face-to-face, but could be viewed as augmenting communication
  2. Overtook MySpace as most popular social networking site in 2008 Wildly popular now with over 400 million users “Facebook is an online directory that connects people through social networks at schools” (Facebook.com) Launched to the public Wednesday Feb 4, 2004 Harvard students created the site as a tool to connect with other students in their community It announces birthdays, events and invitations Start-up based in Palo Alto, California Begin small and is now one of the top ten most visited sites on the web and is profitable
  3. Attractive to our “sound bite” culture since communication limited to 140 character “tweets” Gave a boost to URL shortening services like tinyURL and bit.ly Library of Congress plans to archive ENTIRE archive of tweets! From http://blogs.loc.gov/loc/2010/04/how-tweet-it-is-library-acquires-entire-twitter-archive/ : “Every public tweet, ever, since Twitter’s inception in March 2006, will be archived digitally at the Library of Congress. That’s a LOT of tweets, by the way: Twitter processes more than 50 million tweets every day, with the total numbering in the billions.”
  4. Are literally hundreds of social networking services, growing daily, but much volatility. Which will be the next Facebook?
  5. Key point – if you want to communicate with current generation of college students, you need a presence in social media
  6. Give credit where credit is due! My talk is stolen from Sherry Callahan at KUMC, based on a talk she gave at CHECK conference last week. I added a bunch of content and included things specific to K-State
  7. RockYou can stash 32 million passwords in the clear; when RapLeaf can index 600 million email accounts; and when Intelius can go public by buying 100 million profile pages; then our social networks have traded away our privacy for mere “privacy theater.” over the past few years — and negligently stored them in plaintext in an incompetently protected database. RockYou’s official bluster about “illegal intrusion” should fool no one: blaming Imperva, the firm who exposed the flaw , or accusing the hacker(s) of being the identity thieves is misdirection: it was actually RockYou who stole those credentials, and RockYou should be held to account. Read more: http://techcrunch.com/2009/12/27/privacy-theater/#ixzz0oaNyV1XL
  8. RockYou can stash 32 million passwords in the clear; when RapLeaf can index 600 million email accounts; and when Intelius can go public by buying 100 million profile pages; then our social networks have traded away our privacy for mere “privacy theater.” over the past few years — and negligently stored them in plaintext in an incompetently protected database. RockYou’s official bluster about “illegal intrusion” should fool no one: blaming Imperva, the firm who exposed the flaw , or accusing the hacker(s) of being the identity thieves is misdirection: it was actually RockYou who stole those credentials, and RockYou should be held to account. Read more: http://techcrunch.com/2009/12/27/privacy-theater/#ixzz0oaNyV1XL
  9. I’m very uneasy with faculty friending students, even if done to use FB for class work, because of the personal information that exposes to each other Blurs personal and professional boundaries But reality is that’s where the students live so can be effective way to communicate with them. No good answer…