SlideShare a Scribd company logo
Social Media
and Privacy
Sarah Mitchell
Goal
for Tonight

 What is Social Media?

 What is Privacy?

 Changes in social norms

 How data is collected about you

 What you can do to maintain your privacy
Big Brother meet Mark Zuckerberg

Written in 1949          Launched in 2004
  Pervasive government   Facebook's mission is to give people
                                  the power to share
        surveillance           and make the world more
                                 open and connected.
What is Social Media?

Online tools designed to connect people with
common interests including:

     LinkedIn
     Facebook
     Twitter
     Blogs
     YouTube
     FourSquare
     Flickr
Australians
Online 2009



 use the   subscribe                                 subscribe
Internet       to                                        to
           Broadband                                  Internet
             service                                   service



             http://www.abs.gov.au/AUSSTATS/abs@.nsf/Lookup/4102.0Main+Features50Jun+2011
http://www.socialmedianews.com.au/social-media-statistics-australia-january-2012/
Paradigm Shift in
Social Norms




     We
     Assume:             But Online:
     Conversations are   Conversations are
     private and only    public by default and
     made public when    you have to work to
     we take action      make them private
What is Privacy?

 “Privacy
        isn’t about controlling
functional access to content as
much as knowing what to share
  when and how it will flow.”


                 Danah Boyd

                 32nd International Conference
                 of Data Protection and
                 Privacy Commissioners
The Pull
of the Social Network
The comfort
of strangers
1. Most social networks have no way to
   qualify friendships. If they do, they’re
   ineffective or rarely used.
2. We’re much more relaxed about strangers
   in an online environment than we are
   in person.
3. Social networks provide a game-like
   atmosphere where collecting friends
   and building big followings is desirable.
   Alexander Korth, http://www.readwriteweb.com/archives/on_privacy_in_social_networks_what_drives_users.php
Be aware
 Social Media is
  designed to encourage
  people to abandon
  privacy. We’re MORE
  reserved in person.
 We connect with
  people we don’t know
  and we do it often
 It’s immediate;
  everyone has devices
  and networks
                          Image courtesy of Miss Karen at Flickr.com
Your Information
is Networked

                                                 Social Media is considered
                                                  part of the public domain

                                                 Over 90% of recruiters
                                                  used social media tools to
                                                  screen candidates

                                                 Journalists scour
                                                  Facebook whenever
                                                  they need a photo
Image courtesy of fredcavazza at Flickr.com
It’s not
Big Brother
you should be
worrying about -
It’s your
family, friends
and colleagues
You’re being
exposed in new ways
In many
different forums
There is
no privacy!


“It’s highly likely that if you have
had a public profile or website that
has publicly accessible data, it’s
been indexed and identified by
someone.”    tribalytic.com
“We don’t have developed
    laws of individual
  privacy in Australia.”


             Michael Lishman,
             Partner at Clifford Chance

             24 May 2011, AICD Emerging
             Director Briefing: Risk and
             Reputation Management
What on earth is

WOEID?
WOEID
Where on Earth ID (WOEID)
describes your location in a
more friendly way than
longitude/latitude coordinates
How is WOEID
determined?

 GPS coordinates from
  your mobile phone,
  computer, car or any
  other GPS device

 Geo tags derived from
  user profiles like
  www.trendsmap.com

 Your time zone
How is WOEID
determined?

 Placemaker from Yahoo –
  Free geoparsing Web service
  for feeds, web pages, news,
  status updates

 Language identifier

 Text Mining – What you’re
  talking about in your social
  media activity                 Image courtesy of Smart Stylist on Flickr.com
How is WOEID
determined?

 FourSquare and other        Facebook’s ‘Social Graph’ API
  social media tools using
  that auto posting feature    {
                                "name": "Facebook Platform",
                               "type": "page",
 Network theory –              "website": "http://developers.facebook.com",
  You probably live where      "username": "platform", "founded": "May
                               2007", "company_overview": "Facebook
  your network is located      Platform enables anyone to build...",
                               "mission": "To make the web moe open and
                               social.", "products": "Facebook Application
 Publically available APIs    Programming Interface (API)...", "fan_count":
  for nearly every social      449921, "id": 19292868552, "category":
                               "Technology“
  media site including          }
  Facebook and Twitter
How is WOEID
determined?

 Your extended
  social network:
  –   Blog
  –   Facebook
  –   Twitter
  –   LinkedIn
  –   MySpace

 Paid services (online
  detective agencies)
Social Media is here to stay BUT:

                  Your data lives into
                   perpetuity

                  You don’t own the
                   data once it’s
                   posted onto the
                   web

                  Privacy policies
                   change all the time
How is WOEID used?
Recommendations
How to Stem
Privacy Erosion

 Behave as if the world is paying attention – it is

 Turn off GEO tracking on your electronic devices
  (don’t forget your car)
 Remove or deactivate social networking accounts
  you no longer use
 Refrain from using auto posting features

 Refrain from using cross channel integration

 Become familiar with privacy settings
My Personal
Rules

 Don’t post personal photos
  of anyone
 Never mention the names of
  my family
 Do not discuss where I’m going or
  advertise when I’m going to be away
  from home
 Don’t reveal my birthdate
Social Media is
 NOT private



 Understanding the flow of data
  and the integration between
social networking channels is key
   to protecting your privacy.
Good
Resources

∗ Privacy Commissioners website (Aus)
 www.privacy.gov.au
∗ Privacy Rights website (USA)
  www.privacyrights.org
∗ Timothy Lisko (USA), @PrivacyWonk
 www.privacywonk.net
∗ Vivenne Storey (Australia), @mysocialpolicy
 http://mysocialmedialawyer.wordpress.com/
Questions?

More Related Content

What's hot

Social Media Presence and Policy
Social Media Presence and PolicySocial Media Presence and Policy
Social Media Presence and Policy
LaDonna Coy
 
Social Media & Networking - Boon or Bane?
Social Media & Networking - Boon or Bane?Social Media & Networking - Boon or Bane?
Social Media & Networking - Boon or Bane?
Yash Mittal
 
Social Media & Prevention
Social Media & PreventionSocial Media & Prevention
Social Media & Prevention
LaDonna Coy
 
CMM115 Social Networking Presentation
CMM115 Social Networking PresentationCMM115 Social Networking Presentation
CMM115 Social Networking Presentation
Bernie Baker ☁️
 
Choosing & Using Social Media Tools
Choosing & Using Social Media ToolsChoosing & Using Social Media Tools
Choosing & Using Social Media Tools
LaDonna Coy
 
Introduction to Social Media
Introduction to Social MediaIntroduction to Social Media
Introduction to Social Media
Michele Martin
 
Social networking ... Boon or a Bane
Social networking ... Boon or a Bane Social networking ... Boon or a Bane
Social networking ... Boon or a Bane
Nivesh Yadav
 
UIUC Slide Presentation
UIUC Slide PresentationUIUC Slide Presentation
UIUC Slide PresentationJohn Fudrow
 
Uiucpresentation
UiucpresentationUiucpresentation
UiucpresentationJohn Fudrow
 
Ppt of social networking sites
Ppt of social networking sitesPpt of social networking sites
Ppt of social networking sitesNidhi Vats
 
New Media Prev
New Media PrevNew Media Prev
New Media Prev
LaDonna Coy
 
Social Media in Prevention - Oregon Prevention Conference
Social Media in Prevention - Oregon Prevention ConferenceSocial Media in Prevention - Oregon Prevention Conference
Social Media in Prevention - Oregon Prevention Conference
LaDonna Coy
 
Washington Prevention Summit 09
Washington Prevention Summit 09Washington Prevention Summit 09
Washington Prevention Summit 09
LaDonna Coy
 
Comscore Top 10 need-to-knows about social networking_and_where_it_is_headed
Comscore Top 10 need-to-knows about social networking_and_where_it_is_headedComscore Top 10 need-to-knows about social networking_and_where_it_is_headed
Comscore Top 10 need-to-knows about social networking_and_where_it_is_headedBrian Crotty
 
Metrics, Measures & Models: Forum 2010
Metrics, Measures & Models: Forum 2010Metrics, Measures & Models: Forum 2010
Metrics, Measures & Models: Forum 2010
LaDonna Coy
 
So me for nonprofits
So me for nonprofitsSo me for nonprofits
Presentation on the Benefits of Social Media
Presentation on the Benefits of Social MediaPresentation on the Benefits of Social Media
Presentation on the Benefits of Social Media
Steve Theodorovich
 
MI Social Media Exploration
MI Social Media ExplorationMI Social Media Exploration
MI Social Media Exploration
LaDonna Coy
 

What's hot (19)

Social Media Presence and Policy
Social Media Presence and PolicySocial Media Presence and Policy
Social Media Presence and Policy
 
Social Media & Networking - Boon or Bane?
Social Media & Networking - Boon or Bane?Social Media & Networking - Boon or Bane?
Social Media & Networking - Boon or Bane?
 
Social Media & Prevention
Social Media & PreventionSocial Media & Prevention
Social Media & Prevention
 
CMM115 Social Networking Presentation
CMM115 Social Networking PresentationCMM115 Social Networking Presentation
CMM115 Social Networking Presentation
 
Choosing & Using Social Media Tools
Choosing & Using Social Media ToolsChoosing & Using Social Media Tools
Choosing & Using Social Media Tools
 
Social Media and Online Identity
Social Media and Online IdentitySocial Media and Online Identity
Social Media and Online Identity
 
Introduction to Social Media
Introduction to Social MediaIntroduction to Social Media
Introduction to Social Media
 
Social networking ... Boon or a Bane
Social networking ... Boon or a Bane Social networking ... Boon or a Bane
Social networking ... Boon or a Bane
 
UIUC Slide Presentation
UIUC Slide PresentationUIUC Slide Presentation
UIUC Slide Presentation
 
Uiucpresentation
UiucpresentationUiucpresentation
Uiucpresentation
 
Ppt of social networking sites
Ppt of social networking sitesPpt of social networking sites
Ppt of social networking sites
 
New Media Prev
New Media PrevNew Media Prev
New Media Prev
 
Social Media in Prevention - Oregon Prevention Conference
Social Media in Prevention - Oregon Prevention ConferenceSocial Media in Prevention - Oregon Prevention Conference
Social Media in Prevention - Oregon Prevention Conference
 
Washington Prevention Summit 09
Washington Prevention Summit 09Washington Prevention Summit 09
Washington Prevention Summit 09
 
Comscore Top 10 need-to-knows about social networking_and_where_it_is_headed
Comscore Top 10 need-to-knows about social networking_and_where_it_is_headedComscore Top 10 need-to-knows about social networking_and_where_it_is_headed
Comscore Top 10 need-to-knows about social networking_and_where_it_is_headed
 
Metrics, Measures & Models: Forum 2010
Metrics, Measures & Models: Forum 2010Metrics, Measures & Models: Forum 2010
Metrics, Measures & Models: Forum 2010
 
So me for nonprofits
So me for nonprofitsSo me for nonprofits
So me for nonprofits
 
Presentation on the Benefits of Social Media
Presentation on the Benefits of Social MediaPresentation on the Benefits of Social Media
Presentation on the Benefits of Social Media
 
MI Social Media Exploration
MI Social Media ExplorationMI Social Media Exploration
MI Social Media Exploration
 

Viewers also liked

HIN 2016 Educational Session Slides: Privacy, the Law and Best practice - Sic...
HIN 2016 Educational Session Slides: Privacy, the Law and Best practice - Sic...HIN 2016 Educational Session Slides: Privacy, the Law and Best practice - Sic...
HIN 2016 Educational Session Slides: Privacy, the Law and Best practice - Sic...
hintnet
 
Golden Gekko, 10 burning questions on privacy
Golden Gekko, 10 burning questions on privacyGolden Gekko, 10 burning questions on privacy
Golden Gekko, 10 burning questions on privacy
DMI
 
PRIVACY TRAINING PLAN - KATY SMATHERS
PRIVACY TRAINING PLAN - KATY SMATHERSPRIVACY TRAINING PLAN - KATY SMATHERS
PRIVACY TRAINING PLAN - KATY SMATHERS
Katy Smathers
 
Ethics and consent for data sharing
Ethics and consent for data sharingEthics and consent for data sharing
Ethics and consent for data sharing
ARDC
 
Facebook and Twitter for Business Course Notes USYD
Facebook and Twitter for Business Course Notes USYDFacebook and Twitter for Business Course Notes USYD
Facebook and Twitter for Business Course Notes USYD
Laurel Papworth
 
Privacy and Data Protection Act 2014 (VIC)
Privacy and Data Protection Act 2014 (VIC)Privacy and Data Protection Act 2014 (VIC)
Privacy and Data Protection Act 2014 (VIC)
Russell_Kennedy
 
Induction Slideshow Privacy And Confidentiality
Induction Slideshow  Privacy And ConfidentialityInduction Slideshow  Privacy And Confidentiality
Induction Slideshow Privacy And Confidentiality
D S
 

Viewers also liked (7)

HIN 2016 Educational Session Slides: Privacy, the Law and Best practice - Sic...
HIN 2016 Educational Session Slides: Privacy, the Law and Best practice - Sic...HIN 2016 Educational Session Slides: Privacy, the Law and Best practice - Sic...
HIN 2016 Educational Session Slides: Privacy, the Law and Best practice - Sic...
 
Golden Gekko, 10 burning questions on privacy
Golden Gekko, 10 burning questions on privacyGolden Gekko, 10 burning questions on privacy
Golden Gekko, 10 burning questions on privacy
 
PRIVACY TRAINING PLAN - KATY SMATHERS
PRIVACY TRAINING PLAN - KATY SMATHERSPRIVACY TRAINING PLAN - KATY SMATHERS
PRIVACY TRAINING PLAN - KATY SMATHERS
 
Ethics and consent for data sharing
Ethics and consent for data sharingEthics and consent for data sharing
Ethics and consent for data sharing
 
Facebook and Twitter for Business Course Notes USYD
Facebook and Twitter for Business Course Notes USYDFacebook and Twitter for Business Course Notes USYD
Facebook and Twitter for Business Course Notes USYD
 
Privacy and Data Protection Act 2014 (VIC)
Privacy and Data Protection Act 2014 (VIC)Privacy and Data Protection Act 2014 (VIC)
Privacy and Data Protection Act 2014 (VIC)
 
Induction Slideshow Privacy And Confidentiality
Induction Slideshow  Privacy And ConfidentialityInduction Slideshow  Privacy And Confidentiality
Induction Slideshow Privacy And Confidentiality
 

Similar to Social Media and Privacy - Education Across the Nation - Australian Computer Society

Social Media and Privacy - National Conference, Australian Computer Society
Social Media and Privacy - National Conference, Australian Computer SocietySocial Media and Privacy - National Conference, Australian Computer Society
Social Media and Privacy - National Conference, Australian Computer Society
Mining Oil and Gas Jobs
 
Social Media and Privacy - National Conference 2012, Canberra - Australian Co...
Social Media and Privacy - National Conference 2012, Canberra - Australian Co...Social Media and Privacy - National Conference 2012, Canberra - Australian Co...
Social Media and Privacy - National Conference 2012, Canberra - Australian Co...
Typeset
 
Social Media and Privacy
Social Media and PrivacySocial Media and Privacy
Social Media and Privacy
Typeset
 
Social media and Privacy - Australian Computer Society
Social media and Privacy - Australian Computer SocietySocial media and Privacy - Australian Computer Society
Social media and Privacy - Australian Computer Society
Typeset
 
Week 7: Privacy-rev2013
Week 7:  Privacy-rev2013Week 7:  Privacy-rev2013
Week 7: Privacy-rev2013Ray Brannon
 
Chapter 5 Groups & Networks
Chapter 5  Groups & NetworksChapter 5  Groups & Networks
Chapter 5 Groups & NetworksRay Brannon
 
Production Assignment
Production AssignmentProduction Assignment
Production Assignmentcrumbsy
 
Chapter 5 Groups & Networks
Chapter 5  Groups & NetworksChapter 5  Groups & Networks
Chapter 5 Groups & NetworksRay Brannon
 
Social Network: Good or Bad
Social Network: Good or BadSocial Network: Good or Bad
Social Network: Good or Bad
manesh Makheja
 
IS 20090 Week 2 - Social Networks
IS 20090 Week 2 - Social NetworksIS 20090 Week 2 - Social Networks
IS 20090 Week 2 - Social Networks
is20090
 
Advantages and Disadvantages Of Social Media
 Advantages and Disadvantages Of Social Media Advantages and Disadvantages Of Social Media
Advantages and Disadvantages Of Social Media
Dilna DV
 
Social network privacy.
Social network privacy.Social network privacy.
Social network privacy.STO STRATEGY
 
Cfadw presentation
Cfadw presentationCfadw presentation
Cfadw presentationguestf8d4d6f
 
Online Privacy in the Year of the Dragon
Online Privacy in the Year of the DragonOnline Privacy in the Year of the Dragon
Online Privacy in the Year of the Dragon
Phil Cryer
 
Social network privacy guide
Social network privacy guideSocial network privacy guide
Social network privacy guide
Yury Chemerkin
 
Is your data secure? privacy and trust in the social web
Is your data secure?  privacy and trust in the social webIs your data secure?  privacy and trust in the social web
Is your data secure? privacy and trust in the social web
Phil Cryer
 
Should we sell ourselves in social networks
Should we sell ourselves in social networksShould we sell ourselves in social networks
Should we sell ourselves in social networksSérgio Vinícius Lucena
 
Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?
Kirsten Thompson
 
Social networking
Social networkingSocial networking
Social networking
athiya salagram
 

Similar to Social Media and Privacy - Education Across the Nation - Australian Computer Society (20)

Social Media and Privacy - National Conference, Australian Computer Society
Social Media and Privacy - National Conference, Australian Computer SocietySocial Media and Privacy - National Conference, Australian Computer Society
Social Media and Privacy - National Conference, Australian Computer Society
 
Social Media and Privacy - National Conference 2012, Canberra - Australian Co...
Social Media and Privacy - National Conference 2012, Canberra - Australian Co...Social Media and Privacy - National Conference 2012, Canberra - Australian Co...
Social Media and Privacy - National Conference 2012, Canberra - Australian Co...
 
Social Media and Privacy
Social Media and PrivacySocial Media and Privacy
Social Media and Privacy
 
Social media and Privacy - Australian Computer Society
Social media and Privacy - Australian Computer SocietySocial media and Privacy - Australian Computer Society
Social media and Privacy - Australian Computer Society
 
Week 7: Privacy-rev2013
Week 7:  Privacy-rev2013Week 7:  Privacy-rev2013
Week 7: Privacy-rev2013
 
Casiappt
CasiapptCasiappt
Casiappt
 
Chapter 5 Groups & Networks
Chapter 5  Groups & NetworksChapter 5  Groups & Networks
Chapter 5 Groups & Networks
 
Production Assignment
Production AssignmentProduction Assignment
Production Assignment
 
Chapter 5 Groups & Networks
Chapter 5  Groups & NetworksChapter 5  Groups & Networks
Chapter 5 Groups & Networks
 
Social Network: Good or Bad
Social Network: Good or BadSocial Network: Good or Bad
Social Network: Good or Bad
 
IS 20090 Week 2 - Social Networks
IS 20090 Week 2 - Social NetworksIS 20090 Week 2 - Social Networks
IS 20090 Week 2 - Social Networks
 
Advantages and Disadvantages Of Social Media
 Advantages and Disadvantages Of Social Media Advantages and Disadvantages Of Social Media
Advantages and Disadvantages Of Social Media
 
Social network privacy.
Social network privacy.Social network privacy.
Social network privacy.
 
Cfadw presentation
Cfadw presentationCfadw presentation
Cfadw presentation
 
Online Privacy in the Year of the Dragon
Online Privacy in the Year of the DragonOnline Privacy in the Year of the Dragon
Online Privacy in the Year of the Dragon
 
Social network privacy guide
Social network privacy guideSocial network privacy guide
Social network privacy guide
 
Is your data secure? privacy and trust in the social web
Is your data secure?  privacy and trust in the social webIs your data secure?  privacy and trust in the social web
Is your data secure? privacy and trust in the social web
 
Should we sell ourselves in social networks
Should we sell ourselves in social networksShould we sell ourselves in social networks
Should we sell ourselves in social networks
 
Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?
 
Social networking
Social networkingSocial networking
Social networking
 

More from Typeset

Localizing Content for a Global Audience: What every content marketer should ...
Localizing Content for a Global Audience: What every content marketer should ...Localizing Content for a Global Audience: What every content marketer should ...
Localizing Content for a Global Audience: What every content marketer should ...
Typeset
 
10 Content Marketing Essentials for Professional Conference Organisers
10 Content Marketing Essentials for Professional Conference Organisers10 Content Marketing Essentials for Professional Conference Organisers
10 Content Marketing Essentials for Professional Conference Organisers
Typeset
 
12 Blogging Rules Every Content Marketer Should Follow
12 Blogging Rules Every Content Marketer Should Follow12 Blogging Rules Every Content Marketer Should Follow
12 Blogging Rules Every Content Marketer Should Follow
Typeset
 
Globalising Content for an International Audience
Globalising Content for an International AudienceGlobalising Content for an International Audience
Globalising Content for an International Audience
Typeset
 
Globalising Content for an International Audience -
Globalising Content for an International Audience - Globalising Content for an International Audience -
Globalising Content for an International Audience -
Typeset
 
Developing an Effective Content Marketing and Social Media Strategy
Developing an Effective Content Marketing and Social Media StrategyDeveloping an Effective Content Marketing and Social Media Strategy
Developing an Effective Content Marketing and Social Media Strategy
Typeset
 
Social Media: Benefits and Challenges for the Aged Care Industry
Social Media: Benefits and Challenges for the Aged Care IndustrySocial Media: Benefits and Challenges for the Aged Care Industry
Social Media: Benefits and Challenges for the Aged Care Industry
Typeset
 
Convenience and impulse retailing april may 2013, page 46
Convenience and impulse retailing   april may 2013, page 46Convenience and impulse retailing   april may 2013, page 46
Convenience and impulse retailing april may 2013, page 46
Typeset
 
Barriers to Retail Growth - And How To Remove Them
Barriers to Retail Growth - And How To Remove ThemBarriers to Retail Growth - And How To Remove Them
Barriers to Retail Growth - And How To Remove Them
Typeset
 
Practical advice for making Social Media work for your business HINTS, TIPS A...
Practical advice for making Social Media work for your business HINTS, TIPS A...Practical advice for making Social Media work for your business HINTS, TIPS A...
Practical advice for making Social Media work for your business HINTS, TIPS A...
Typeset
 
3 essential components to a content marketing strategy
3 essential components to a content marketing strategy3 essential components to a content marketing strategy
3 essential components to a content marketing strategy
Typeset
 
Social Media - What's In It For Me Professionally?
Social Media - What's In It For Me Professionally?Social Media - What's In It For Me Professionally?
Social Media - What's In It For Me Professionally?
Typeset
 
Want a job? Then clean up your social media act
Want a job? Then clean up your social media actWant a job? Then clean up your social media act
Want a job? Then clean up your social media act
Typeset
 
Social Media - Don't mess up your future by what you post today
Social Media - Don't mess up your future by what you post todaySocial Media - Don't mess up your future by what you post today
Social Media - Don't mess up your future by what you post today
Typeset
 
Social Media - What's in it for me, professionally?
Social Media - What's in it for me, professionally?Social Media - What's in it for me, professionally?
Social Media - What's in it for me, professionally?
Typeset
 
Getting Social With Your Recruitment Brand - AMMA National Conference 2012
Getting Social With Your Recruitment Brand - AMMA National Conference 2012Getting Social With Your Recruitment Brand - AMMA National Conference 2012
Getting Social With Your Recruitment Brand - AMMA National Conference 2012
Typeset
 
Planning an Effective Social Media Strategy for Your Next Event
Planning an Effective Social Media Strategy for Your Next EventPlanning an Effective Social Media Strategy for Your Next Event
Planning an Effective Social Media Strategy for Your Next Event
Typeset
 
Pulling them in: Content Marketing for Conference Organisers
Pulling them in: Content Marketing for Conference Organisers   Pulling them in: Content Marketing for Conference Organisers
Pulling them in: Content Marketing for Conference Organisers
Typeset
 
Content Marketing for Small Business: How to use your knowledge & expertise t...
Content Marketing for Small Business: How to use your knowledge & expertise t...Content Marketing for Small Business: How to use your knowledge & expertise t...
Content Marketing for Small Business: How to use your knowledge & expertise t...
Typeset
 
Pulling them in perth
Pulling them in   perthPulling them in   perth
Pulling them in perthTypeset
 

More from Typeset (20)

Localizing Content for a Global Audience: What every content marketer should ...
Localizing Content for a Global Audience: What every content marketer should ...Localizing Content for a Global Audience: What every content marketer should ...
Localizing Content for a Global Audience: What every content marketer should ...
 
10 Content Marketing Essentials for Professional Conference Organisers
10 Content Marketing Essentials for Professional Conference Organisers10 Content Marketing Essentials for Professional Conference Organisers
10 Content Marketing Essentials for Professional Conference Organisers
 
12 Blogging Rules Every Content Marketer Should Follow
12 Blogging Rules Every Content Marketer Should Follow12 Blogging Rules Every Content Marketer Should Follow
12 Blogging Rules Every Content Marketer Should Follow
 
Globalising Content for an International Audience
Globalising Content for an International AudienceGlobalising Content for an International Audience
Globalising Content for an International Audience
 
Globalising Content for an International Audience -
Globalising Content for an International Audience - Globalising Content for an International Audience -
Globalising Content for an International Audience -
 
Developing an Effective Content Marketing and Social Media Strategy
Developing an Effective Content Marketing and Social Media StrategyDeveloping an Effective Content Marketing and Social Media Strategy
Developing an Effective Content Marketing and Social Media Strategy
 
Social Media: Benefits and Challenges for the Aged Care Industry
Social Media: Benefits and Challenges for the Aged Care IndustrySocial Media: Benefits and Challenges for the Aged Care Industry
Social Media: Benefits and Challenges for the Aged Care Industry
 
Convenience and impulse retailing april may 2013, page 46
Convenience and impulse retailing   april may 2013, page 46Convenience and impulse retailing   april may 2013, page 46
Convenience and impulse retailing april may 2013, page 46
 
Barriers to Retail Growth - And How To Remove Them
Barriers to Retail Growth - And How To Remove ThemBarriers to Retail Growth - And How To Remove Them
Barriers to Retail Growth - And How To Remove Them
 
Practical advice for making Social Media work for your business HINTS, TIPS A...
Practical advice for making Social Media work for your business HINTS, TIPS A...Practical advice for making Social Media work for your business HINTS, TIPS A...
Practical advice for making Social Media work for your business HINTS, TIPS A...
 
3 essential components to a content marketing strategy
3 essential components to a content marketing strategy3 essential components to a content marketing strategy
3 essential components to a content marketing strategy
 
Social Media - What's In It For Me Professionally?
Social Media - What's In It For Me Professionally?Social Media - What's In It For Me Professionally?
Social Media - What's In It For Me Professionally?
 
Want a job? Then clean up your social media act
Want a job? Then clean up your social media actWant a job? Then clean up your social media act
Want a job? Then clean up your social media act
 
Social Media - Don't mess up your future by what you post today
Social Media - Don't mess up your future by what you post todaySocial Media - Don't mess up your future by what you post today
Social Media - Don't mess up your future by what you post today
 
Social Media - What's in it for me, professionally?
Social Media - What's in it for me, professionally?Social Media - What's in it for me, professionally?
Social Media - What's in it for me, professionally?
 
Getting Social With Your Recruitment Brand - AMMA National Conference 2012
Getting Social With Your Recruitment Brand - AMMA National Conference 2012Getting Social With Your Recruitment Brand - AMMA National Conference 2012
Getting Social With Your Recruitment Brand - AMMA National Conference 2012
 
Planning an Effective Social Media Strategy for Your Next Event
Planning an Effective Social Media Strategy for Your Next EventPlanning an Effective Social Media Strategy for Your Next Event
Planning an Effective Social Media Strategy for Your Next Event
 
Pulling them in: Content Marketing for Conference Organisers
Pulling them in: Content Marketing for Conference Organisers   Pulling them in: Content Marketing for Conference Organisers
Pulling them in: Content Marketing for Conference Organisers
 
Content Marketing for Small Business: How to use your knowledge & expertise t...
Content Marketing for Small Business: How to use your knowledge & expertise t...Content Marketing for Small Business: How to use your knowledge & expertise t...
Content Marketing for Small Business: How to use your knowledge & expertise t...
 
Pulling them in perth
Pulling them in   perthPulling them in   perth
Pulling them in perth
 

Recently uploaded

PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 

Recently uploaded (20)

PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 

Social Media and Privacy - Education Across the Nation - Australian Computer Society

  • 2. Goal for Tonight  What is Social Media?  What is Privacy?  Changes in social norms  How data is collected about you  What you can do to maintain your privacy
  • 3. Big Brother meet Mark Zuckerberg Written in 1949 Launched in 2004 Pervasive government Facebook's mission is to give people the power to share surveillance and make the world more open and connected.
  • 4. What is Social Media? Online tools designed to connect people with common interests including:  LinkedIn  Facebook  Twitter  Blogs  YouTube  FourSquare  Flickr
  • 5. Australians Online 2009 use the subscribe subscribe Internet to to Broadband Internet service service http://www.abs.gov.au/AUSSTATS/abs@.nsf/Lookup/4102.0Main+Features50Jun+2011
  • 7. Paradigm Shift in Social Norms We Assume: But Online: Conversations are Conversations are private and only public by default and made public when you have to work to we take action make them private
  • 8. What is Privacy? “Privacy isn’t about controlling functional access to content as much as knowing what to share when and how it will flow.” Danah Boyd 32nd International Conference of Data Protection and Privacy Commissioners
  • 9. The Pull of the Social Network
  • 10. The comfort of strangers 1. Most social networks have no way to qualify friendships. If they do, they’re ineffective or rarely used. 2. We’re much more relaxed about strangers in an online environment than we are in person. 3. Social networks provide a game-like atmosphere where collecting friends and building big followings is desirable. Alexander Korth, http://www.readwriteweb.com/archives/on_privacy_in_social_networks_what_drives_users.php
  • 11. Be aware  Social Media is designed to encourage people to abandon privacy. We’re MORE reserved in person.  We connect with people we don’t know and we do it often  It’s immediate; everyone has devices and networks Image courtesy of Miss Karen at Flickr.com
  • 12. Your Information is Networked  Social Media is considered part of the public domain  Over 90% of recruiters used social media tools to screen candidates  Journalists scour Facebook whenever they need a photo Image courtesy of fredcavazza at Flickr.com
  • 13. It’s not Big Brother you should be worrying about - It’s your family, friends and colleagues
  • 16. There is no privacy! “It’s highly likely that if you have had a public profile or website that has publicly accessible data, it’s been indexed and identified by someone.” tribalytic.com
  • 17. “We don’t have developed laws of individual privacy in Australia.” Michael Lishman, Partner at Clifford Chance 24 May 2011, AICD Emerging Director Briefing: Risk and Reputation Management
  • 18. What on earth is WOEID?
  • 19. WOEID Where on Earth ID (WOEID) describes your location in a more friendly way than longitude/latitude coordinates
  • 20. How is WOEID determined?  GPS coordinates from your mobile phone, computer, car or any other GPS device  Geo tags derived from user profiles like www.trendsmap.com  Your time zone
  • 21. How is WOEID determined?  Placemaker from Yahoo – Free geoparsing Web service for feeds, web pages, news, status updates  Language identifier  Text Mining – What you’re talking about in your social media activity Image courtesy of Smart Stylist on Flickr.com
  • 22. How is WOEID determined?  FourSquare and other Facebook’s ‘Social Graph’ API social media tools using that auto posting feature { "name": "Facebook Platform", "type": "page",  Network theory – "website": "http://developers.facebook.com", You probably live where "username": "platform", "founded": "May 2007", "company_overview": "Facebook your network is located Platform enables anyone to build...", "mission": "To make the web moe open and social.", "products": "Facebook Application  Publically available APIs Programming Interface (API)...", "fan_count": for nearly every social 449921, "id": 19292868552, "category": "Technology“ media site including } Facebook and Twitter
  • 23. How is WOEID determined?  Your extended social network: – Blog – Facebook – Twitter – LinkedIn – MySpace  Paid services (online detective agencies)
  • 24. Social Media is here to stay BUT:  Your data lives into perpetuity  You don’t own the data once it’s posted onto the web  Privacy policies change all the time
  • 25. How is WOEID used?
  • 27. How to Stem Privacy Erosion  Behave as if the world is paying attention – it is  Turn off GEO tracking on your electronic devices (don’t forget your car)  Remove or deactivate social networking accounts you no longer use  Refrain from using auto posting features  Refrain from using cross channel integration  Become familiar with privacy settings
  • 28. My Personal Rules  Don’t post personal photos of anyone  Never mention the names of my family  Do not discuss where I’m going or advertise when I’m going to be away from home  Don’t reveal my birthdate
  • 29. Social Media is NOT private Understanding the flow of data and the integration between social networking channels is key to protecting your privacy.
  • 30. Good Resources ∗ Privacy Commissioners website (Aus) www.privacy.gov.au ∗ Privacy Rights website (USA) www.privacyrights.org ∗ Timothy Lisko (USA), @PrivacyWonk www.privacywonk.net ∗ Vivenne Storey (Australia), @mysocialpolicy http://mysocialmedialawyer.wordpress.com/