SlideShare a Scribd company logo
Social Media and Privacy Sarah Mitchell, WITWA May 2011 http://www.globalcopywriting.com
What is Privacy? Changes in social norms How data is collected about you What you can do to maintain your privacy 2 Goal for this morning
Big Brother meet Mark Zuckerberg Written in 1949 -  pervasive government surveillance Launched in 2004 - Facebook's mission is to give people the power to share and make the world more open and connected. 3
Australians Online 2009 74.3 % use the Internet 24.4% subscribe to Broadband service 28.7% subscribe to Internet service 4 Image courtesy of courosa at Flickr.com
LinkedIn:	  2 million users Twitter: 	  2.5 million users Facebook:   9.5 million users FourSquare: 60,000 in Sydney  5 Recent Social Media Statistics for Australia
Paradigm Shift in Social Norms We Assume: Conversations are private and only made public when we take action But Online: Conversations are public by default and you have to work to make them private 6 Images by follystone,  Jef Aerosol on Flickr.com
Image courtesy of Portable Gratfiti on Flickr.com 7 What is Privacy? “Privacy isn’t about controlling functional access to content as much as knowing what to share when and how it will flow.”  – Danah Boyd, 32nd International Conference of Data Protection and Privacy Commissioners
The Pull of the Social Network 8
Most social networks have no way to qualify friendships. If they do, they’re ineffective or rarely used.  We’re much more relaxed about strangers in an online environment than we are in person. Social networks provide a game-like atmosphere where collecting friends and building big followings is desirable.  9 The Comfort of Strangers Alexander Korth, http://www.readwriteweb.com/archives/on_privacy_in_social_networks_what_drives_users.php
10 Be Aware ,[object Object]
We connect with people we don’t know and we do it often
It’s immediate; everyone has devices and networksImage courtesy of Miss Karen at Flickr.com
Your Information is Networked Social Media is considered part of the public domain Over 60% of recruiters used LinkedIn and Facebook to vet candidates Journalists scour Facebook whenever they need a photo 11 Image courtesy of fredcavazza at Flickr.com
It’s not Big Brother you should be worrying about - It’s your family, friends, and colleagues 12
You’re being exposed in new ways 13
In many different forums 14
There is no privacy! “It’s highly likely that if you have had a public profile or website that has publicly accessible data, it’s been indexed and identified by someone.” tribalytic.com Image courtesy of Twodogz photography at Flicker.com 15
16 “We don’t have developed laws of individual privacy in Australia.”  – Michael Lishman, Partner at Clifford Chance, 24 May 2011, AICD Emerging Director Briefing: Risk and Reputation Management
What on earth is WOEID? 17
18 WOEID Where on Earth ID (WOEID) describes your location in a more friendly way than  longitude/latitude coordinates Image courtesy of projectarchive.net
How is WOEID determined? 19 GPS coordinates from  your mobile phone, computer, car or any other GPS device Geo tags derived from user profiles like www.trendsmap.com Your time zone Image courtesy of Scott McLead at Flickr.com
Placemaker from Yahoo – Free geoparsing Web service for feeds, web pages, news, status updates Language identifier  Text Mining – What you’re talking about in your social media activity 20 How is WOEID determined? Image courtesy of Smart Stylist on Flickr.com
How is WOEID determined? FourSquare and other social media tools using that auto posting feature Network theory – You probably live where your network is located Publically available APIs for nearly every social media site including Facebook and Twitter Facebook’s ‘Social Graph’ API { "name": "Facebook Platform",  "type": "page", "website": "http://developers.facebook.com", "username": "platform", "founded": "May 2007", "company_overview": "Facebook Platform enables anyone to build...", "mission": "To make the web moe open and social.", "products": "Facebook Application Programming Interface (API)...", "fan_count": 449921, "id": 19292868552, "category": "Technology“  } 21
How is WOEID determined? 22 Your extended social network: Blog Facebook Twitter LinkedIn MySpace Paid services (online detective agencies)
[object Object]
You don’t own the data once it’s posted onto the web
Privacy policies change all the time23 Social Media is here to stay BUT: Image courtesy of Leonid Mamchenkov on Flickr.com
24 How is WOEID used?
Recommendations  25
Behave as if the world is paying attention – it is Turn off GEO tracking on your electronic devices (don’t forget your car) Remove or deactivate social networking accounts you no longer use Refrain from using auto posting features  Refrain from using cross channel integration Become familiar with privacy settings 26 How to Stem Privacy Erosion

More Related Content

What's hot

How Safe Is YOUR Social Network?
How Safe Is YOUR Social Network?How Safe Is YOUR Social Network?
How Safe Is YOUR Social Network?
Blue Coat
 
Social Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social MediaSocial Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social Media
Tyler Shields
 
social networking sites
social networking sitessocial networking sites
social networking sites
Anant Agarwal
 
Social Media From a Security Point Of View - Telenor GoToSec and Telenor Peop...
Social Media From a Security Point Of View - Telenor GoToSec and Telenor Peop...Social Media From a Security Point Of View - Telenor GoToSec and Telenor Peop...
Social Media From a Security Point Of View - Telenor GoToSec and Telenor Peop...
SpareBank 1 Gruppen AS
 
Introduction to Social Networking
Introduction to Social NetworkingIntroduction to Social Networking
Introduction to Social Networking
Hariharan Ganesan
 
NTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul Styrvoky
NTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul StyrvokyNTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul Styrvoky
NTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul Styrvoky
North Texas Chapter of the ISSA
 
The advantages and disadvantages of the social network
The advantages and disadvantages of the social networkThe advantages and disadvantages of the social network
The advantages and disadvantages of the social network
Ly Saroth
 
facebook privacy and legal issues
facebook privacy and legal issuesfacebook privacy and legal issues
facebook privacy and legal issues
Aman Khanna
 
Social networking boon or a bane
Social networking boon or a baneSocial networking boon or a bane
Social networking boon or a bane
Abhishek Sharma
 
Social networks: Advantages and disadvantages
Social networks: Advantages and disadvantagesSocial networks: Advantages and disadvantages
Social networks: Advantages and disadvantages
ntechproject
 
Social networking sites presentation
Social networking sites presentationSocial networking sites presentation
Social networking sites presentation
A K DAS's | Law
 
Social media powerpoint presentation
Social media powerpoint presentationSocial media powerpoint presentation
Social media powerpoint presentation
Slideegg
 
Social media and Privacy - Australian Computer Society
Social media and Privacy - Australian Computer SocietySocial media and Privacy - Australian Computer Society
Social media and Privacy - Australian Computer Society
Typeset
 
The role of social media in our personal life
The role of social media in our personal lifeThe role of social media in our personal life
The role of social media in our personal life
Arnob Khan
 
Using Social Media Marketing For Business
Using Social Media Marketing For BusinessUsing Social Media Marketing For Business
Using Social Media Marketing For Business
iExpertsforum
 
A presentation on social networking sites
A presentation on social networking sitesA presentation on social networking sites
A presentation on social networking sites
Amit Kundu
 
Social media course conclusion 2010 2011
Social media course conclusion 2010 2011Social media course conclusion 2010 2011
Social media course conclusion 2010 2011
guillaume ereteo
 
Social Media for Law Enforcement Agencies
Social Media for Law Enforcement AgenciesSocial Media for Law Enforcement Agencies
Social Media for Law Enforcement Agencies
Small World Social
 

What's hot (19)

How Safe Is YOUR Social Network?
How Safe Is YOUR Social Network?How Safe Is YOUR Social Network?
How Safe Is YOUR Social Network?
 
Social Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social MediaSocial Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social Media
 
social networking sites
social networking sitessocial networking sites
social networking sites
 
Social Media From a Security Point Of View - Telenor GoToSec and Telenor Peop...
Social Media From a Security Point Of View - Telenor GoToSec and Telenor Peop...Social Media From a Security Point Of View - Telenor GoToSec and Telenor Peop...
Social Media From a Security Point Of View - Telenor GoToSec and Telenor Peop...
 
Introduction to Social Networking
Introduction to Social NetworkingIntroduction to Social Networking
Introduction to Social Networking
 
NTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul Styrvoky
NTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul StyrvokyNTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul Styrvoky
NTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul Styrvoky
 
The advantages and disadvantages of the social network
The advantages and disadvantages of the social networkThe advantages and disadvantages of the social network
The advantages and disadvantages of the social network
 
facebook privacy and legal issues
facebook privacy and legal issuesfacebook privacy and legal issues
facebook privacy and legal issues
 
Social networking boon or a bane
Social networking boon or a baneSocial networking boon or a bane
Social networking boon or a bane
 
Social networks: Advantages and disadvantages
Social networks: Advantages and disadvantagesSocial networks: Advantages and disadvantages
Social networks: Advantages and disadvantages
 
Social networking sites presentation
Social networking sites presentationSocial networking sites presentation
Social networking sites presentation
 
Social media powerpoint presentation
Social media powerpoint presentationSocial media powerpoint presentation
Social media powerpoint presentation
 
Social media and Privacy - Australian Computer Society
Social media and Privacy - Australian Computer SocietySocial media and Privacy - Australian Computer Society
Social media and Privacy - Australian Computer Society
 
What is Social Media
What is Social MediaWhat is Social Media
What is Social Media
 
The role of social media in our personal life
The role of social media in our personal lifeThe role of social media in our personal life
The role of social media in our personal life
 
Using Social Media Marketing For Business
Using Social Media Marketing For BusinessUsing Social Media Marketing For Business
Using Social Media Marketing For Business
 
A presentation on social networking sites
A presentation on social networking sitesA presentation on social networking sites
A presentation on social networking sites
 
Social media course conclusion 2010 2011
Social media course conclusion 2010 2011Social media course conclusion 2010 2011
Social media course conclusion 2010 2011
 
Social Media for Law Enforcement Agencies
Social Media for Law Enforcement AgenciesSocial Media for Law Enforcement Agencies
Social Media for Law Enforcement Agencies
 

Viewers also liked

Google Analytics 100% (not provided) - what does it mean?
Google Analytics 100% (not provided) - what does it mean? Google Analytics 100% (not provided) - what does it mean?
Google Analytics 100% (not provided) - what does it mean?
Crafted
 
Privacy & social media
Privacy & social media Privacy & social media
Privacy & social media
Prof. Jacques Folon (Ph.D)
 
Privacy and Social Media
Privacy and Social MediaPrivacy and Social Media
Privacy and Social Media
Victoria Herring
 
How Privacy in the Cloud Affects End-Users
How Privacy in the Cloud Affects End-UsersHow Privacy in the Cloud Affects End-Users
How Privacy in the Cloud Affects End-Users
WSO2
 
How Privacy in the Cloud Affects Organizations
How Privacy in the Cloud Affects OrganizationsHow Privacy in the Cloud Affects Organizations
How Privacy in the Cloud Affects Organizations
WSO2
 
Let's Google My Audience - Privacy is for Losers!
Let's Google My Audience - Privacy is for Losers!Let's Google My Audience - Privacy is for Losers!
Let's Google My Audience - Privacy is for Losers!
Cain Ransbottyn
 
Google Strategic Mktg Presentation (2010-2012)
Google Strategic Mktg Presentation (2010-2012)Google Strategic Mktg Presentation (2010-2012)
Google Strategic Mktg Presentation (2010-2012)
Mudbrick McFinnigan
 
Google Ppt
Google PptGoogle Ppt
Google Ppt
prabalaggarwal
 

Viewers also liked (8)

Google Analytics 100% (not provided) - what does it mean?
Google Analytics 100% (not provided) - what does it mean? Google Analytics 100% (not provided) - what does it mean?
Google Analytics 100% (not provided) - what does it mean?
 
Privacy & social media
Privacy & social media Privacy & social media
Privacy & social media
 
Privacy and Social Media
Privacy and Social MediaPrivacy and Social Media
Privacy and Social Media
 
How Privacy in the Cloud Affects End-Users
How Privacy in the Cloud Affects End-UsersHow Privacy in the Cloud Affects End-Users
How Privacy in the Cloud Affects End-Users
 
How Privacy in the Cloud Affects Organizations
How Privacy in the Cloud Affects OrganizationsHow Privacy in the Cloud Affects Organizations
How Privacy in the Cloud Affects Organizations
 
Let's Google My Audience - Privacy is for Losers!
Let's Google My Audience - Privacy is for Losers!Let's Google My Audience - Privacy is for Losers!
Let's Google My Audience - Privacy is for Losers!
 
Google Strategic Mktg Presentation (2010-2012)
Google Strategic Mktg Presentation (2010-2012)Google Strategic Mktg Presentation (2010-2012)
Google Strategic Mktg Presentation (2010-2012)
 
Google Ppt
Google PptGoogle Ppt
Google Ppt
 

Similar to Social Media and Privacy

Social Media and Privacy - Education Across the Nation - Australian Computer ...
Social Media and Privacy - Education Across the Nation - Australian Computer ...Social Media and Privacy - Education Across the Nation - Australian Computer ...
Social Media and Privacy - Education Across the Nation - Australian Computer ...
Mining Oil and Gas Jobs
 
Social Media and Privacy - Education Across the Nation - Australian Computer ...
Social Media and Privacy - Education Across the Nation - Australian Computer ...Social Media and Privacy - Education Across the Nation - Australian Computer ...
Social Media and Privacy - Education Across the Nation - Australian Computer ...
Typeset
 
Online Privacy in the Year of the Dragon
Online Privacy in the Year of the DragonOnline Privacy in the Year of the Dragon
Online Privacy in the Year of the Dragon
Phil Cryer
 
Is your data secure? privacy and trust in the social web
Is your data secure?  privacy and trust in the social webIs your data secure?  privacy and trust in the social web
Is your data secure? privacy and trust in the social web
Phil Cryer
 
Social Media and Privacy - National Conference, Australian Computer Society
Social Media and Privacy - National Conference, Australian Computer SocietySocial Media and Privacy - National Conference, Australian Computer Society
Social Media and Privacy - National Conference, Australian Computer Society
Mining Oil and Gas Jobs
 
Social Media and Privacy - National Conference 2012, Canberra - Australian Co...
Social Media and Privacy - National Conference 2012, Canberra - Australian Co...Social Media and Privacy - National Conference 2012, Canberra - Australian Co...
Social Media and Privacy - National Conference 2012, Canberra - Australian Co...
Typeset
 
Social media and the future of social networking
Social media and the future of social networkingSocial media and the future of social networking
Social media and the future of social networkingRussetanSc
 
Future of social networking group project
Future of social networking   group projectFuture of social networking   group project
Future of social networking group projectbulgarej
 
Week 7: Privacy-rev2013
Week 7:  Privacy-rev2013Week 7:  Privacy-rev2013
Week 7: Privacy-rev2013Ray Brannon
 
Cfadw presentation
Cfadw presentationCfadw presentation
Cfadw presentationguestf8d4d6f
 
Prof. Hendrik Speck - Privacy and Social Networks
Prof. Hendrik Speck - Privacy and Social NetworksProf. Hendrik Speck - Privacy and Social Networks
Prof. Hendrik Speck - Privacy and Social Networks
Hendrik Speck
 
IS 20090 Week 2 - Social Networks
IS 20090 Week 2 - Social NetworksIS 20090 Week 2 - Social Networks
IS 20090 Week 2 - Social Networks
is20090
 
Cfadw Presentation
Cfadw PresentationCfadw Presentation
Cfadw Presentationguest09025b
 
Social network privacy.
Social network privacy.Social network privacy.
Social network privacy.STO STRATEGY
 
How To Use Social Networks As A Hr Tool
How To Use Social Networks As A Hr ToolHow To Use Social Networks As A Hr Tool
How To Use Social Networks As A Hr ToolJason P. Sullivan
 
Social Network: Good or Bad
Social Network: Good or BadSocial Network: Good or Bad
Social Network: Good or Bad
manesh Makheja
 
Your e image presentation
Your e image presentationYour e image presentation
Your e image presentationlahill16
 
Lis 768 Privacy Presentation
Lis 768 Privacy PresentationLis 768 Privacy Presentation
Lis 768 Privacy PresentationJulia Bryan-Diehl
 
Social networking
Social networkingSocial networking
Social networking
akshay kumar
 

Similar to Social Media and Privacy (20)

Social Media and Privacy - Education Across the Nation - Australian Computer ...
Social Media and Privacy - Education Across the Nation - Australian Computer ...Social Media and Privacy - Education Across the Nation - Australian Computer ...
Social Media and Privacy - Education Across the Nation - Australian Computer ...
 
Social Media and Privacy - Education Across the Nation - Australian Computer ...
Social Media and Privacy - Education Across the Nation - Australian Computer ...Social Media and Privacy - Education Across the Nation - Australian Computer ...
Social Media and Privacy - Education Across the Nation - Australian Computer ...
 
Online Privacy in the Year of the Dragon
Online Privacy in the Year of the DragonOnline Privacy in the Year of the Dragon
Online Privacy in the Year of the Dragon
 
Is your data secure? privacy and trust in the social web
Is your data secure?  privacy and trust in the social webIs your data secure?  privacy and trust in the social web
Is your data secure? privacy and trust in the social web
 
Social Media and Privacy - National Conference, Australian Computer Society
Social Media and Privacy - National Conference, Australian Computer SocietySocial Media and Privacy - National Conference, Australian Computer Society
Social Media and Privacy - National Conference, Australian Computer Society
 
Social Media and Privacy - National Conference 2012, Canberra - Australian Co...
Social Media and Privacy - National Conference 2012, Canberra - Australian Co...Social Media and Privacy - National Conference 2012, Canberra - Australian Co...
Social Media and Privacy - National Conference 2012, Canberra - Australian Co...
 
Social media and the future of social networking
Social media and the future of social networkingSocial media and the future of social networking
Social media and the future of social networking
 
Future of social networking group project
Future of social networking   group projectFuture of social networking   group project
Future of social networking group project
 
Week 7: Privacy-rev2013
Week 7:  Privacy-rev2013Week 7:  Privacy-rev2013
Week 7: Privacy-rev2013
 
Cfadw presentation
Cfadw presentationCfadw presentation
Cfadw presentation
 
Prof. Hendrik Speck - Privacy and Social Networks
Prof. Hendrik Speck - Privacy and Social NetworksProf. Hendrik Speck - Privacy and Social Networks
Prof. Hendrik Speck - Privacy and Social Networks
 
IS 20090 Week 2 - Social Networks
IS 20090 Week 2 - Social NetworksIS 20090 Week 2 - Social Networks
IS 20090 Week 2 - Social Networks
 
Cfadw Presentation
Cfadw PresentationCfadw Presentation
Cfadw Presentation
 
Social network privacy.
Social network privacy.Social network privacy.
Social network privacy.
 
How To Use Social Networks As A Hr Tool
How To Use Social Networks As A Hr ToolHow To Use Social Networks As A Hr Tool
How To Use Social Networks As A Hr Tool
 
Social Network: Good or Bad
Social Network: Good or BadSocial Network: Good or Bad
Social Network: Good or Bad
 
Your e image presentation
Your e image presentationYour e image presentation
Your e image presentation
 
Online Policy Primer
Online Policy PrimerOnline Policy Primer
Online Policy Primer
 
Lis 768 Privacy Presentation
Lis 768 Privacy PresentationLis 768 Privacy Presentation
Lis 768 Privacy Presentation
 
Social networking
Social networkingSocial networking
Social networking
 

More from Typeset

Localizing Content for a Global Audience: What every content marketer should ...
Localizing Content for a Global Audience: What every content marketer should ...Localizing Content for a Global Audience: What every content marketer should ...
Localizing Content for a Global Audience: What every content marketer should ...
Typeset
 
10 Content Marketing Essentials for Professional Conference Organisers
10 Content Marketing Essentials for Professional Conference Organisers10 Content Marketing Essentials for Professional Conference Organisers
10 Content Marketing Essentials for Professional Conference Organisers
Typeset
 
12 Blogging Rules Every Content Marketer Should Follow
12 Blogging Rules Every Content Marketer Should Follow12 Blogging Rules Every Content Marketer Should Follow
12 Blogging Rules Every Content Marketer Should Follow
Typeset
 
Globalising Content for an International Audience
Globalising Content for an International AudienceGlobalising Content for an International Audience
Globalising Content for an International Audience
Typeset
 
Globalising Content for an International Audience -
Globalising Content for an International Audience - Globalising Content for an International Audience -
Globalising Content for an International Audience -
Typeset
 
Developing an Effective Content Marketing and Social Media Strategy
Developing an Effective Content Marketing and Social Media StrategyDeveloping an Effective Content Marketing and Social Media Strategy
Developing an Effective Content Marketing and Social Media Strategy
Typeset
 
Social Media: Benefits and Challenges for the Aged Care Industry
Social Media: Benefits and Challenges for the Aged Care IndustrySocial Media: Benefits and Challenges for the Aged Care Industry
Social Media: Benefits and Challenges for the Aged Care Industry
Typeset
 
Convenience and impulse retailing april may 2013, page 46
Convenience and impulse retailing   april may 2013, page 46Convenience and impulse retailing   april may 2013, page 46
Convenience and impulse retailing april may 2013, page 46
Typeset
 
Barriers to Retail Growth - And How To Remove Them
Barriers to Retail Growth - And How To Remove ThemBarriers to Retail Growth - And How To Remove Them
Barriers to Retail Growth - And How To Remove Them
Typeset
 
Practical advice for making Social Media work for your business HINTS, TIPS A...
Practical advice for making Social Media work for your business HINTS, TIPS A...Practical advice for making Social Media work for your business HINTS, TIPS A...
Practical advice for making Social Media work for your business HINTS, TIPS A...
Typeset
 
3 essential components to a content marketing strategy
3 essential components to a content marketing strategy3 essential components to a content marketing strategy
3 essential components to a content marketing strategy
Typeset
 
Social Media - What's In It For Me Professionally?
Social Media - What's In It For Me Professionally?Social Media - What's In It For Me Professionally?
Social Media - What's In It For Me Professionally?
Typeset
 
Want a job? Then clean up your social media act
Want a job? Then clean up your social media actWant a job? Then clean up your social media act
Want a job? Then clean up your social media act
Typeset
 
Social Media - Don't mess up your future by what you post today
Social Media - Don't mess up your future by what you post todaySocial Media - Don't mess up your future by what you post today
Social Media - Don't mess up your future by what you post today
Typeset
 
Social Media - What's in it for me, professionally?
Social Media - What's in it for me, professionally?Social Media - What's in it for me, professionally?
Social Media - What's in it for me, professionally?
Typeset
 
Getting Social With Your Recruitment Brand - AMMA National Conference 2012
Getting Social With Your Recruitment Brand - AMMA National Conference 2012Getting Social With Your Recruitment Brand - AMMA National Conference 2012
Getting Social With Your Recruitment Brand - AMMA National Conference 2012
Typeset
 
Planning an Effective Social Media Strategy for Your Next Event
Planning an Effective Social Media Strategy for Your Next EventPlanning an Effective Social Media Strategy for Your Next Event
Planning an Effective Social Media Strategy for Your Next Event
Typeset
 
Pulling them in: Content Marketing for Conference Organisers
Pulling them in: Content Marketing for Conference Organisers   Pulling them in: Content Marketing for Conference Organisers
Pulling them in: Content Marketing for Conference Organisers
Typeset
 
Content Marketing for Small Business: How to use your knowledge & expertise t...
Content Marketing for Small Business: How to use your knowledge & expertise t...Content Marketing for Small Business: How to use your knowledge & expertise t...
Content Marketing for Small Business: How to use your knowledge & expertise t...
Typeset
 
Pulling them in perth
Pulling them in   perthPulling them in   perth
Pulling them in perthTypeset
 

More from Typeset (20)

Localizing Content for a Global Audience: What every content marketer should ...
Localizing Content for a Global Audience: What every content marketer should ...Localizing Content for a Global Audience: What every content marketer should ...
Localizing Content for a Global Audience: What every content marketer should ...
 
10 Content Marketing Essentials for Professional Conference Organisers
10 Content Marketing Essentials for Professional Conference Organisers10 Content Marketing Essentials for Professional Conference Organisers
10 Content Marketing Essentials for Professional Conference Organisers
 
12 Blogging Rules Every Content Marketer Should Follow
12 Blogging Rules Every Content Marketer Should Follow12 Blogging Rules Every Content Marketer Should Follow
12 Blogging Rules Every Content Marketer Should Follow
 
Globalising Content for an International Audience
Globalising Content for an International AudienceGlobalising Content for an International Audience
Globalising Content for an International Audience
 
Globalising Content for an International Audience -
Globalising Content for an International Audience - Globalising Content for an International Audience -
Globalising Content for an International Audience -
 
Developing an Effective Content Marketing and Social Media Strategy
Developing an Effective Content Marketing and Social Media StrategyDeveloping an Effective Content Marketing and Social Media Strategy
Developing an Effective Content Marketing and Social Media Strategy
 
Social Media: Benefits and Challenges for the Aged Care Industry
Social Media: Benefits and Challenges for the Aged Care IndustrySocial Media: Benefits and Challenges for the Aged Care Industry
Social Media: Benefits and Challenges for the Aged Care Industry
 
Convenience and impulse retailing april may 2013, page 46
Convenience and impulse retailing   april may 2013, page 46Convenience and impulse retailing   april may 2013, page 46
Convenience and impulse retailing april may 2013, page 46
 
Barriers to Retail Growth - And How To Remove Them
Barriers to Retail Growth - And How To Remove ThemBarriers to Retail Growth - And How To Remove Them
Barriers to Retail Growth - And How To Remove Them
 
Practical advice for making Social Media work for your business HINTS, TIPS A...
Practical advice for making Social Media work for your business HINTS, TIPS A...Practical advice for making Social Media work for your business HINTS, TIPS A...
Practical advice for making Social Media work for your business HINTS, TIPS A...
 
3 essential components to a content marketing strategy
3 essential components to a content marketing strategy3 essential components to a content marketing strategy
3 essential components to a content marketing strategy
 
Social Media - What's In It For Me Professionally?
Social Media - What's In It For Me Professionally?Social Media - What's In It For Me Professionally?
Social Media - What's In It For Me Professionally?
 
Want a job? Then clean up your social media act
Want a job? Then clean up your social media actWant a job? Then clean up your social media act
Want a job? Then clean up your social media act
 
Social Media - Don't mess up your future by what you post today
Social Media - Don't mess up your future by what you post todaySocial Media - Don't mess up your future by what you post today
Social Media - Don't mess up your future by what you post today
 
Social Media - What's in it for me, professionally?
Social Media - What's in it for me, professionally?Social Media - What's in it for me, professionally?
Social Media - What's in it for me, professionally?
 
Getting Social With Your Recruitment Brand - AMMA National Conference 2012
Getting Social With Your Recruitment Brand - AMMA National Conference 2012Getting Social With Your Recruitment Brand - AMMA National Conference 2012
Getting Social With Your Recruitment Brand - AMMA National Conference 2012
 
Planning an Effective Social Media Strategy for Your Next Event
Planning an Effective Social Media Strategy for Your Next EventPlanning an Effective Social Media Strategy for Your Next Event
Planning an Effective Social Media Strategy for Your Next Event
 
Pulling them in: Content Marketing for Conference Organisers
Pulling them in: Content Marketing for Conference Organisers   Pulling them in: Content Marketing for Conference Organisers
Pulling them in: Content Marketing for Conference Organisers
 
Content Marketing for Small Business: How to use your knowledge & expertise t...
Content Marketing for Small Business: How to use your knowledge & expertise t...Content Marketing for Small Business: How to use your knowledge & expertise t...
Content Marketing for Small Business: How to use your knowledge & expertise t...
 
Pulling them in perth
Pulling them in   perthPulling them in   perth
Pulling them in perth
 

Recently uploaded

みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 

Recently uploaded (20)

みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 

Social Media and Privacy

  • 1. Social Media and Privacy Sarah Mitchell, WITWA May 2011 http://www.globalcopywriting.com
  • 2. What is Privacy? Changes in social norms How data is collected about you What you can do to maintain your privacy 2 Goal for this morning
  • 3. Big Brother meet Mark Zuckerberg Written in 1949 - pervasive government surveillance Launched in 2004 - Facebook's mission is to give people the power to share and make the world more open and connected. 3
  • 4. Australians Online 2009 74.3 % use the Internet 24.4% subscribe to Broadband service 28.7% subscribe to Internet service 4 Image courtesy of courosa at Flickr.com
  • 5. LinkedIn: 2 million users Twitter: 2.5 million users Facebook: 9.5 million users FourSquare: 60,000 in Sydney 5 Recent Social Media Statistics for Australia
  • 6. Paradigm Shift in Social Norms We Assume: Conversations are private and only made public when we take action But Online: Conversations are public by default and you have to work to make them private 6 Images by follystone, Jef Aerosol on Flickr.com
  • 7. Image courtesy of Portable Gratfiti on Flickr.com 7 What is Privacy? “Privacy isn’t about controlling functional access to content as much as knowing what to share when and how it will flow.” – Danah Boyd, 32nd International Conference of Data Protection and Privacy Commissioners
  • 8. The Pull of the Social Network 8
  • 9. Most social networks have no way to qualify friendships. If they do, they’re ineffective or rarely used. We’re much more relaxed about strangers in an online environment than we are in person. Social networks provide a game-like atmosphere where collecting friends and building big followings is desirable. 9 The Comfort of Strangers Alexander Korth, http://www.readwriteweb.com/archives/on_privacy_in_social_networks_what_drives_users.php
  • 10.
  • 11. We connect with people we don’t know and we do it often
  • 12. It’s immediate; everyone has devices and networksImage courtesy of Miss Karen at Flickr.com
  • 13. Your Information is Networked Social Media is considered part of the public domain Over 60% of recruiters used LinkedIn and Facebook to vet candidates Journalists scour Facebook whenever they need a photo 11 Image courtesy of fredcavazza at Flickr.com
  • 14. It’s not Big Brother you should be worrying about - It’s your family, friends, and colleagues 12
  • 15. You’re being exposed in new ways 13
  • 16. In many different forums 14
  • 17. There is no privacy! “It’s highly likely that if you have had a public profile or website that has publicly accessible data, it’s been indexed and identified by someone.” tribalytic.com Image courtesy of Twodogz photography at Flicker.com 15
  • 18. 16 “We don’t have developed laws of individual privacy in Australia.” – Michael Lishman, Partner at Clifford Chance, 24 May 2011, AICD Emerging Director Briefing: Risk and Reputation Management
  • 19. What on earth is WOEID? 17
  • 20. 18 WOEID Where on Earth ID (WOEID) describes your location in a more friendly way than longitude/latitude coordinates Image courtesy of projectarchive.net
  • 21. How is WOEID determined? 19 GPS coordinates from your mobile phone, computer, car or any other GPS device Geo tags derived from user profiles like www.trendsmap.com Your time zone Image courtesy of Scott McLead at Flickr.com
  • 22. Placemaker from Yahoo – Free geoparsing Web service for feeds, web pages, news, status updates Language identifier Text Mining – What you’re talking about in your social media activity 20 How is WOEID determined? Image courtesy of Smart Stylist on Flickr.com
  • 23. How is WOEID determined? FourSquare and other social media tools using that auto posting feature Network theory – You probably live where your network is located Publically available APIs for nearly every social media site including Facebook and Twitter Facebook’s ‘Social Graph’ API { "name": "Facebook Platform", "type": "page", "website": "http://developers.facebook.com", "username": "platform", "founded": "May 2007", "company_overview": "Facebook Platform enables anyone to build...", "mission": "To make the web moe open and social.", "products": "Facebook Application Programming Interface (API)...", "fan_count": 449921, "id": 19292868552, "category": "Technology“ } 21
  • 24. How is WOEID determined? 22 Your extended social network: Blog Facebook Twitter LinkedIn MySpace Paid services (online detective agencies)
  • 25.
  • 26. You don’t own the data once it’s posted onto the web
  • 27. Privacy policies change all the time23 Social Media is here to stay BUT: Image courtesy of Leonid Mamchenkov on Flickr.com
  • 28. 24 How is WOEID used?
  • 30. Behave as if the world is paying attention – it is Turn off GEO tracking on your electronic devices (don’t forget your car) Remove or deactivate social networking accounts you no longer use Refrain from using auto posting features Refrain from using cross channel integration Become familiar with privacy settings 26 How to Stem Privacy Erosion
  • 31. Don’t post personal photos of anyone Never mention the names of my family Do not discuss where I’m going or advertise when I’m going to be away from home Don’t reveal my birthdate 27 My Personal Rules
  • 32. 28 Understanding the flow of data and the integration between social networking channels is key to protecting your privacy. Social Media is NOT private Image courtesy of Jorge Quinteros at Flickr.com
  • 33. Privacy Commissioners website (Australia) www.privacy.gov.au Privacy Rights website (USA) www.privacyrights.org Timothy Lisko (USA), @PrivacyWonk www.privacywonk.net Vivenne Storey (Australia), @mysocialpolicy http://mysocialmedialawyer.wordpress.com/ 29 Good Resources