Introduction to Social Media, Types of Social Media, Professional Uses of Social Media, Impact of Social Media, Negative Side of Social Media, Cyber Bullying, Safety Tips are included in this ppt.
TITLES
SOCIAL MEDIA
WHAT IS SOCIAL MEDIA
WHY SOCIAL MEDIA IS IMPORTENT
WHAT IS SOCIAL MEDIA MARKING
BENEFITS FOR STUDENTS AND BUSINESS
NEGATIVE IMPACT
TYPES OF SOCIAL MEDIA
TWITTER
FACEBOOK
YOUTUBE
INSTAGRAM
LINKEDIN
TELEGRAM
ADVANTAGE OF SOCIAL MEDIA
DISADVANTAGES OF SOCIAL MEDIA
HOW TO USE SOCIAL MEDIA SAFELY
CONCLESION
Social Media & it's Impact in Today's WorldStephen Mokiwa
Social media and it's impacts on today's world. On Politics, Business and Society.
I was invited by and presented this to the Rotaract Club of Dar City, Tanzania on 8th August 2015.
This ppt contains following contents:
what is social media?
facts about social media.
importance of social media
types of social media
some famous social media and founders.
elements of social media
language of social media
negative and positive effects of social media
responsible use of social media
use of social media
social media and cybercrime
usage of social media according to gender, age and time.
conclusion
its about social media, its impact on our day to day life, for simple study the entire presentation is divided into two aspects i.e positive and negative impacts
Effects of social media on youth
Effects of social media on youth
Effects of social media on youthEffects of social media on youthEffects of social media on youthEffects of social media on youth
What is Social Media?Positive Effects/Advantages of Social Media,Negative effects/Disadvantages of Social Media,True research facts,Threats from Social Media,Prevention,Conclusion and Implication
For more information , visit : http://www.computercareer.in/projects-by-cc/
TITLES
SOCIAL MEDIA
WHAT IS SOCIAL MEDIA
WHY SOCIAL MEDIA IS IMPORTENT
WHAT IS SOCIAL MEDIA MARKING
BENEFITS FOR STUDENTS AND BUSINESS
NEGATIVE IMPACT
TYPES OF SOCIAL MEDIA
TWITTER
FACEBOOK
YOUTUBE
INSTAGRAM
LINKEDIN
TELEGRAM
ADVANTAGE OF SOCIAL MEDIA
DISADVANTAGES OF SOCIAL MEDIA
HOW TO USE SOCIAL MEDIA SAFELY
CONCLESION
Social Media & it's Impact in Today's WorldStephen Mokiwa
Social media and it's impacts on today's world. On Politics, Business and Society.
I was invited by and presented this to the Rotaract Club of Dar City, Tanzania on 8th August 2015.
This ppt contains following contents:
what is social media?
facts about social media.
importance of social media
types of social media
some famous social media and founders.
elements of social media
language of social media
negative and positive effects of social media
responsible use of social media
use of social media
social media and cybercrime
usage of social media according to gender, age and time.
conclusion
its about social media, its impact on our day to day life, for simple study the entire presentation is divided into two aspects i.e positive and negative impacts
Effects of social media on youth
Effects of social media on youth
Effects of social media on youthEffects of social media on youthEffects of social media on youthEffects of social media on youth
What is Social Media?Positive Effects/Advantages of Social Media,Negative effects/Disadvantages of Social Media,True research facts,Threats from Social Media,Prevention,Conclusion and Implication
For more information , visit : http://www.computercareer.in/projects-by-cc/
Social media Risk Management Presentation Sample (Animations don't work in sl...Alexander Larsen
An introduction to social media, the types of risks it can cause, some business solutions to mitigating the risks and protecting your company reputation, as well as how it can be used as a tool for successful business continuity and risk management functions.
Safeguarding Your Online Presence_ Social Media Cybersecurity Tips.pdfCIOWomenMagazine
Stay safe online! Protect your privacy & info with these crucial social media cybersecurity tips. From strong passwords to 2FA & privacy settings, learn how to navigate the web securely.
Social media privacy threats that you need to keep an eye on in 2021Impulse Digital
Social media users' interests about information protection have seen a sharp ascent throughout the most recent couple of years. Cybercriminals have developed the ability to deceive social based media users into sharing touchy individual data and information.
By Sandeep Rotte(545081).Praveen Komma( 544549).Management I.docxRAHUL126667
By Sandeep Rotte(545081).
Praveen Komma( 544549).
Management Information Systems
Sunny Onyiri
Social Media And Networking
Group D
Social Media
Social Networks are the websites which allow users to upload their contents such as Blogs, texts, pictures, videos and location etc to the web. The main advantage of social media is we can ignore the traffic to the content viewing.
It is considered as one to many communication methods as people can only repsond and comment on the content which we own and later we decide to write/record/delete the response or media by ourself.
Social Media in Real Time
In todays technical world it is easy to communicate from different locations using social networking sites such as facebook, Flickr, Twitter, Youtube, Instagram, Pinterest etc.
All above networking sites have gained popularity throughout the world in regards with their applications functionality and is usage.
Advantages Of Social Media
Increasing the brand awareness by implementing some digital marketings methods to raise the companies visibility and awareness of the brand performing in the marketing.
Exclude more inbound traffic : When people become aware of the brand then there will be less traffic of accessing and marketing them in users perspective patterns.
Search engine popularity and ranks can be raised by positioning the social media importance in business.
Disadvantages:
Decreases the F2F communication which is a main important task to be done when there is a need of interacting in presence.
Improves lazyness towards achieving aspects as the interaction is all online which makes individual become lazy of getting up and solving any issue.
Decreases interactions of friends, family closeness when there is only socially interacting online.
Social Networks
These are the websites which allow people to interact with each other and connect anywhere may be virtually or by sharing the content. Also helps in making friends and relations all over the globe.The most used social networking site is facebook , twitter, google etc(Ahmad & Ateeq, 2011).
Every social networking sites are raising their subscribers daily due to the fact that they are very easy to interact from anywhere in the world.
Facebook
Facebook has earned its repuation as best social networking site known to users where we can learn how to interact with friends, family etc.
It also helps us to write, read and take pics of any important stuff sent by any individual. The main advantage of using this sites is that they will make some important comments or send the documents.
This social networking site also advanced in making some good donations to charity by posting socially in the sites where people are reacting.
Advantages Of Social Networking Sites
There are many reasons why someone may choose to take advantage of social networks online.
Worldwide Connectivity: No matter if you are searching for a former college roommate, your first grade teac ...
Social media is a computer-based technology that facilitates the sharing of ideas, thoughts, and information through the building of virtual networks and communities. By design, social media is Internet-based and gives users quick electronic communication of content.
Mobile Phone Basics, Inside Mobile Devices, Digital Networks, Mobile Phone Seizure, Mobile Phone Examination, Mobile Forensics Equipment, Cell Seizure Tool, SIMIS, XRY,
Investigative Tools and Equipments for Cyber Crime by Raghu KhimaniDr Raghu Khimani
Details of which tools and equipment can be used for investigating cybercrime are explained well in the easy language. Also, Data Recovery is explained well.
What is digital evidence? , sources of digital evidence, types of digital evidence, the procedure for collecting digital evidence, records, digital vs physical evidence, controlling contamination.
Introduction to Cyber Crime is very necessary and useful for Forensic Science students serving in the cybercrime field and also useful for the general public. Types and Examples of Cyber Crime, How to prevent and report cybercrime, investigating cybercrime.
Introduction to Precursor Chemicals illicitly used in the manufacturing of Narcotic Drugs and Psychotropic Substances., Drug Precursor Diversion, Categories of Precursor Chemicals, Manufacturing of NDPS by Precursor Chemicals.
This lecture includes Introduction to Poisons, Different Types of Classification of Poisons, Analysis of Poisons (Volatile, Nonvolatile) (Acidic, Basic, Neutral).
Introduction to Toxicology and Forensic Toxilogical Examination and it's sign...Dr Raghu Khimani
This lecture includes Introduction to Toxicology and Related Terms are explained well in the easy language. Also, Concepts of Forensic Toxilogical Examination and it's significance is included in this lecture.
This ppt / lecture contains all the necessary information like Manufacturing / Source, Chemical Structures, Process of Extraction, Effects, Overdose and Withdrawal Symptoms, Forensic Analsys about Narcotic Drugs like Opium, Morphine, Heroine, Cannabis, Cocaine, Mandrax, LSD, Methaqualone, Mecloqualone and Psychotropic Substances like Barbiturates and Benzodiazepines.
Analysis of illicit liquor including methyl & ethyl alcoholDr Raghu Khimani
This ppt gives you information of quantitative and qualitative analysis of illicit liquor including methyl and ethyl alcohol. There are various tests given for analysis of methanol, ethanol, copper, iron, furfural.
Examination of chemicals like Phenolphthalein in Trap / Bribe Cases. It is very important to know for police and the general public how to use phenolphthalein in bribe case.
From Manufacturing to Analysis of Jaggery in one single ppt in easy language. It includes manufacturing process (manual and automatic), uses, health benefits, forensic analysis of jaggery all in one presentation.
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
4. Objectives of the Presentation
Introduction of Social Media
Types of Social Media
Professional Uses of Social Media
Impact of Social Media
Negative side of Social Media
Cyber Bullying
Safety Tips
5. Introduction of Social Media
“Social media facilitate the development of online social networks
by connecting a user's profile with those of other individuals and/or
groups”.
Social Media use Web Based Technologies, Desktop computers and
Mobile Technologies (Smartphones) to create highly interactive
platforms through which individuals, communities and organization
can Share, Create, Discuss and Modify user generated content
posted online.
6. Some of the most popular social media websites are Facebook
(and its associated Facebook Messenger), WhatsApp, Tumblr,
Instagram, Twitter, Pinterest, LinkedIn, Google+, YouTube, Viber,
Snapchat, Weibo and WeChat. These social media websites have
more than 100,000,000 registered users.
9. Impact of Social Media
On March 12, 2016, the World Wide Web turned 27.
76% people think felt that it has been positive for society as whole.
Although many people enjoy the freedom and connection they feel from
social media, it has also had a negative impact on the number of hours
you spend in face-to-face relationships and has created a platform where
sharing negative thoughts and feelings can be done in a nameless, faceless
fashion.
Social media networking has also had an amazingly positive impact on
the distribution of information and acquiring help and support during
natural disasters around the globe.
10. In 2014, Prime Minister Shri Narendra Modi successfully used
social media to communicate his platform to the voting public. Since
then, many Indian Politicians used social media platforms to
communicate with their constituents and get feedback on their
performance.
12. One of the negative effect of social media or network is it leads to
addiction. Spending countless hours on the social sites can divert the
focus and attention from a particular task.
Another downside of the social media is that the user shares too
much information which may pose threats to them. Even with the
tight security settings, your personal information may leak on the
social sites. Downloading your videos or pictures and copying your
status is an easy task and can be done within few clicks.
Sometimes social media is time consuming too. Time we spend on
social media is more then the time we spend for our family.
13.
14. Cyber Bullying
Cyber Bullying or Cyber Harassment is a form of bullying or
harassment using electronic forms of contact.
Harmful bullying behaviour can include posting rumours about a
person, threats, negative remarks, disclose victims' personal
information etc..
16. In India there are several strict bullying in the workplace laws and
regulations levied by the legal system.
These laws are supposed to address all types of workplace harassment
including discrimination (ભેદભાવ), sexual nuisance and psychological
irritation caused by the employer.
Section 66 A of The Information Technology Amendment Act 2008, deals
with the actions done through a computer or mobile device that are
grossly offensive, insult, inconvenience, injure or ill will against the person
it is directed at.
Punishment for sending offensive messages through communication
service - shall be punishable with imprisonment for a term which may
extend to three years and with fine.
17. Safety Tips
Use a strong password: The longer it is, the more secure it will be. The strong
password contains a minimum of 12 characters. (Incl. Capital Alphabets, Small
Alphabets, Numerical & Symbols).
Unique account, Unique password: Use a different password for each of your
social media accounts. (For ex. Different for Facebook, Twitter, LinkedIn,
Google+, Pinterest, G-Mail, etc…)
Set up your security answers. The two factor authentication is available for
most social media sites.
If you have social media apps on your phone, be sure to password protect your
device.
18. Be selective with friend requests. If you don’t know the person, don’t accept
their request. It could be a fake account.
Click links with caution. Social media accounts are regularly hacked. Look out
for language or content that does not sound like something your friend would
post.
Beware of TMI (Too Much Information): Be careful about what you share.
Don’t reveal sensitive personal information i.e.: birth date, home address,
financial information, phone number, etc. The more you post, the easier it is to
have your identity stolen.
Once posted, always posted: Protect your reputation on social networks. What
you post online stays online. Think twice before posting pictures you wouldn’t
want your parents or future employers to see.
19. Become familiar with the privacy policies of the social media channels you use
and customize your privacy settings to control who sees what.
Protect your computer by installing antivirus software to safeguard. Also
ensure that your browser, operating system, and software are kept up to date.
Remember to log off when you’re done.
Sites can use your Information: Social network sites are typically free to use
which means they are making their money by advertising to you. And that
means they are collecting information about you. Is your information shared
with outside companies and partners? What information can third-party plug-in
software, such as Facebook Applications, use from your profile or page content?
Review the site’s privacy policy and watch closely the privacy settings you can
control.
20. Search yourself: It is a good idea to search your name on Google and check out
your profile as others see it on social networking sites.
Know what action to take: If someone is harassing or threatening you, remove
them from your friends list, block them and report them to the Police or Cyber
Crime Cell.