SlideShare a Scribd company logo
SOCIAL MEDIA
AWARENESS
RAGHU KHIMANI
CYBER CRIME EXPERT/ADVISOR
BAHAUDDIN SCIENCE COLLEGE, JUNAGADH
What comes to your mind when you
hear Social Media?
Objectives of the Presentation
 Introduction of Social Media
 Types of Social Media
 Professional Uses of Social Media
 Impact of Social Media
 Negative side of Social Media
 Cyber Bullying
Safety Tips
Introduction of Social Media
 “Social media facilitate the development of online social networks
by connecting a user's profile with those of other individuals and/or
groups”.
 Social Media use Web Based Technologies, Desktop computers and
Mobile Technologies (Smartphones) to create highly interactive
platforms through which individuals, communities and organization
can Share, Create, Discuss and Modify user generated content
posted online.
 Some of the most popular social media websites are Facebook
(and its associated Facebook Messenger), WhatsApp, Tumblr,
Instagram, Twitter, Pinterest, LinkedIn, Google+, YouTube, Viber,
Snapchat, Weibo and WeChat. These social media websites have
more than 100,000,000 registered users.
Types of Social Media
Professional Uses of Social Media
Impact of Social Media
 On March 12, 2016, the World Wide Web turned 27.
 76% people think felt that it has been positive for society as whole.
 Although many people enjoy the freedom and connection they feel from
social media, it has also had a negative impact on the number of hours
you spend in face-to-face relationships and has created a platform where
sharing negative thoughts and feelings can be done in a nameless, faceless
fashion.
Social media networking has also had an amazingly positive impact on
the distribution of information and acquiring help and support during
natural disasters around the globe.
 In 2014, Prime Minister Shri Narendra Modi successfully used
social media to communicate his platform to the voting public. Since
then, many Indian Politicians used social media platforms to
communicate with their constituents and get feedback on their
performance.
Negative Side of Social Media
One of the negative effect of social media or network is it leads to
addiction. Spending countless hours on the social sites can divert the
focus and attention from a particular task.
Another downside of the social media is that the user shares too
much information which may pose threats to them. Even with the
tight security settings, your personal information may leak on the
social sites. Downloading your videos or pictures and copying your
status is an easy task and can be done within few clicks.
Sometimes social media is time consuming too. Time we spend on
social media is more then the time we spend for our family.
Cyber Bullying
Cyber Bullying or Cyber Harassment is a form of bullying or
harassment using electronic forms of contact.
Harmful bullying behaviour can include posting rumours about a
person, threats, negative remarks, disclose victims' personal
information etc..
Example of Anonymous bullying
In India there are several strict bullying in the workplace laws and
regulations levied by the legal system.
These laws are supposed to address all types of workplace harassment
including discrimination (ભેદભાવ), sexual nuisance and psychological
irritation caused by the employer.
Section 66 A of The Information Technology Amendment Act 2008, deals
with the actions done through a computer or mobile device that are
grossly offensive, insult, inconvenience, injure or ill will against the person
it is directed at.
Punishment for sending offensive messages through communication
service - shall be punishable with imprisonment for a term which may
extend to three years and with fine.
Safety Tips
Use a strong password: The longer it is, the more secure it will be. The strong
password contains a minimum of 12 characters. (Incl. Capital Alphabets, Small
Alphabets, Numerical & Symbols).
Unique account, Unique password: Use a different password for each of your
social media accounts. (For ex. Different for Facebook, Twitter, LinkedIn,
Google+, Pinterest, G-Mail, etc…)
Set up your security answers. The two factor authentication is available for
most social media sites.
If you have social media apps on your phone, be sure to password protect your
device.
Be selective with friend requests. If you don’t know the person, don’t accept
their request. It could be a fake account.
Click links with caution. Social media accounts are regularly hacked. Look out
for language or content that does not sound like something your friend would
post.
Beware of TMI (Too Much Information): Be careful about what you share.
Don’t reveal sensitive personal information i.e.: birth date, home address,
financial information, phone number, etc. The more you post, the easier it is to
have your identity stolen.
Once posted, always posted: Protect your reputation on social networks. What
you post online stays online. Think twice before posting pictures you wouldn’t
want your parents or future employers to see.
Become familiar with the privacy policies of the social media channels you use
and customize your privacy settings to control who sees what.
Protect your computer by installing antivirus software to safeguard. Also
ensure that your browser, operating system, and software are kept up to date.
Remember to log off when you’re done.
Sites can use your Information: Social network sites are typically free to use
which means they are making their money by advertising to you. And that
means they are collecting information about you. Is your information shared
with outside companies and partners? What information can third-party plug-in
software, such as Facebook Applications, use from your profile or page content?
Review the site’s privacy policy and watch closely the privacy settings you can
control.
Search yourself: It is a good idea to search your name on Google and check out
your profile as others see it on social networking sites.
Know what action to take: If someone is harassing or threatening you, remove
them from your friends list, block them and report them to the Police or Cyber
Crime Cell.
Social Media Awareness

More Related Content

What's hot

impact of social media on youth
impact of social media on youthimpact of social media on youth
impact of social media on youth
Su Kee
 
Effects of social media on Youth
Effects of social media on YouthEffects of social media on Youth
Effects of social media on Youth
Subham Dwivedi
 
EFFECT OF SOCIAL MEDIA ON US
EFFECT OF SOCIAL MEDIA ON USEFFECT OF SOCIAL MEDIA ON US
EFFECT OF SOCIAL MEDIA ON US
Manish Kumar
 
Social media
Social mediaSocial media
Social media
Madushan Sandaruwan
 
SOCIAL MEDIA
SOCIAL MEDIASOCIAL MEDIA
SOCIAL MEDIA
Nagapushpa1
 
Social media
Social mediaSocial media
Social media
Amina Moussa
 
Social Media & it's Impact in Today's World
Social Media & it's Impact in Today's WorldSocial Media & it's Impact in Today's World
Social Media & it's Impact in Today's World
Stephen Mokiwa
 
social media
social mediasocial media
social media
Maliha Firdous
 
Pros and cons of social networking
Pros and cons of social networkingPros and cons of social networking
Pros and cons of social networkinglilyang96
 
Impact of social media on teenagers- Presentation
Impact of social media on teenagers- PresentationImpact of social media on teenagers- Presentation
Impact of social media on teenagers- Presentation
Miss Perfect
 
Social media and the future of social networking
Social media and the future of social networkingSocial media and the future of social networking
Social media and the future of social networkingRussetanSc
 
Social Media Power : Positive or Negative
Social Media Power : Positive or NegativeSocial Media Power : Positive or Negative
Social Media Power : Positive or Negative
Kunal Gawade, CFE
 
Social Media
Social MediaSocial Media
Social Media
Bijay Bhandari
 
Advantages and Disadvantages Of Social Media
 Advantages and Disadvantages Of Social Media Advantages and Disadvantages Of Social Media
Advantages and Disadvantages Of Social Media
Dilna DV
 
Disadvantages of Social Media
Disadvantages of Social MediaDisadvantages of Social Media
Disadvantages of Social Media
Zain Abid
 
Social media
Social mediaSocial media
Social media
Eeshan Mishra
 
Effects of social media on youth by Nilender Pratap Singh
Effects of social media on youth by Nilender Pratap SinghEffects of social media on youth by Nilender Pratap Singh
Effects of social media on youth by Nilender Pratap Singh
SHASHANKKUMAR426
 
Effect of social media on youth
Effect of social media on youthEffect of social media on youth
Effect of social media on youth
Deepti Kulkarni
 
Social media pros and cons
Social media pros and consSocial media pros and cons
Social media pros and cons
VEERMANI PRASAD
 
Effects of social media on youth
Effects of social media on youthEffects of social media on youth
Effects of social media on youth
Vikas Gupta
 

What's hot (20)

impact of social media on youth
impact of social media on youthimpact of social media on youth
impact of social media on youth
 
Effects of social media on Youth
Effects of social media on YouthEffects of social media on Youth
Effects of social media on Youth
 
EFFECT OF SOCIAL MEDIA ON US
EFFECT OF SOCIAL MEDIA ON USEFFECT OF SOCIAL MEDIA ON US
EFFECT OF SOCIAL MEDIA ON US
 
Social media
Social mediaSocial media
Social media
 
SOCIAL MEDIA
SOCIAL MEDIASOCIAL MEDIA
SOCIAL MEDIA
 
Social media
Social mediaSocial media
Social media
 
Social Media & it's Impact in Today's World
Social Media & it's Impact in Today's WorldSocial Media & it's Impact in Today's World
Social Media & it's Impact in Today's World
 
social media
social mediasocial media
social media
 
Pros and cons of social networking
Pros and cons of social networkingPros and cons of social networking
Pros and cons of social networking
 
Impact of social media on teenagers- Presentation
Impact of social media on teenagers- PresentationImpact of social media on teenagers- Presentation
Impact of social media on teenagers- Presentation
 
Social media and the future of social networking
Social media and the future of social networkingSocial media and the future of social networking
Social media and the future of social networking
 
Social Media Power : Positive or Negative
Social Media Power : Positive or NegativeSocial Media Power : Positive or Negative
Social Media Power : Positive or Negative
 
Social Media
Social MediaSocial Media
Social Media
 
Advantages and Disadvantages Of Social Media
 Advantages and Disadvantages Of Social Media Advantages and Disadvantages Of Social Media
Advantages and Disadvantages Of Social Media
 
Disadvantages of Social Media
Disadvantages of Social MediaDisadvantages of Social Media
Disadvantages of Social Media
 
Social media
Social mediaSocial media
Social media
 
Effects of social media on youth by Nilender Pratap Singh
Effects of social media on youth by Nilender Pratap SinghEffects of social media on youth by Nilender Pratap Singh
Effects of social media on youth by Nilender Pratap Singh
 
Effect of social media on youth
Effect of social media on youthEffect of social media on youth
Effect of social media on youth
 
Social media pros and cons
Social media pros and consSocial media pros and cons
Social media pros and cons
 
Effects of social media on youth
Effects of social media on youthEffects of social media on youth
Effects of social media on youth
 

Similar to Social Media Awareness

Social media: Issues
Social media: Issues Social media: Issues
Social media: Issues
Sandeep Thoniparambil
 
EFFECTS OF SOCIAL MEDIA ON YOUTH
EFFECTS OF SOCIAL MEDIA ON YOUTHEFFECTS OF SOCIAL MEDIA ON YOUTH
EFFECTS OF SOCIAL MEDIA ON YOUTH
Yaman Singhania
 
week 1 Day 2 Power of Media and Information Literacy.pptx
week 1 Day 2 Power of Media and Information Literacy.pptxweek 1 Day 2 Power of Media and Information Literacy.pptx
week 1 Day 2 Power of Media and Information Literacy.pptx
danielloberiz1
 
social media presentation.pptx
social media presentation.pptxsocial media presentation.pptx
social media presentation.pptx
RACHANAB18
 
Social media Risk Management Presentation Sample (Animations don't work in sl...
Social media Risk Management Presentation Sample (Animations don't work in sl...Social media Risk Management Presentation Sample (Animations don't work in sl...
Social media Risk Management Presentation Sample (Animations don't work in sl...
Alexander Larsen
 
Social Networking
Social NetworkingSocial Networking
Social Networking
Marthamcameron
 
Security and Privacy in Social Networks.pptx
Security and Privacy in Social Networks.pptxSecurity and Privacy in Social Networks.pptx
Security and Privacy in Social Networks.pptx
SIMNchannel
 
Sociial media
Sociial media Sociial media
Sociial media
ANMOLKUMARSINGH5
 
Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235brendaylo
 
Safeguarding Your Online Presence_ Social Media Cybersecurity Tips.pdf
Safeguarding Your Online Presence_ Social Media Cybersecurity Tips.pdfSafeguarding Your Online Presence_ Social Media Cybersecurity Tips.pdf
Safeguarding Your Online Presence_ Social Media Cybersecurity Tips.pdf
CIOWomenMagazine
 
Social media privacy threats that you need to keep an eye on in 2021
Social media privacy threats that you need to keep an eye on in 2021Social media privacy threats that you need to keep an eye on in 2021
Social media privacy threats that you need to keep an eye on in 2021
Impulse Digital
 
Social Media Safety Presentation
Social Media Safety PresentationSocial Media Safety Presentation
Social Media Safety Presentation
LJ Henshell
 
Social Media & Enterprise Security Whitepaper
Social Media & Enterprise Security WhitepaperSocial Media & Enterprise Security Whitepaper
Social Media & Enterprise Security WhitepaperSchleighS
 
Security in social network araceli&arlethe
Security in social network araceli&arletheSecurity in social network araceli&arlethe
Security in social network araceli&arlethetecnologico de tuxtepec
 
By Sandeep Rotte(545081).Praveen Komma( 544549).Management I.docx
By Sandeep Rotte(545081).Praveen Komma( 544549).Management I.docxBy Sandeep Rotte(545081).Praveen Komma( 544549).Management I.docx
By Sandeep Rotte(545081).Praveen Komma( 544549).Management I.docx
RAHUL126667
 
Privacy and social media
Privacy and social mediaPrivacy and social media
Privacy and social media
AbirAhmed48
 
Social media ppt
Social media pptSocial media ppt
Social media ppt
LeadMillion
 
advantagesanddisadvantagesofsocialmedia-151211192046.pdf
advantagesanddisadvantagesofsocialmedia-151211192046.pdfadvantagesanddisadvantagesofsocialmedia-151211192046.pdf
advantagesanddisadvantagesofsocialmedia-151211192046.pdf
RinkiSharma51
 
advantagesanddisadvantagesofsocialmedia-151211192046.pptx
advantagesanddisadvantagesofsocialmedia-151211192046.pptxadvantagesanddisadvantagesofsocialmedia-151211192046.pptx
advantagesanddisadvantagesofsocialmedia-151211192046.pptx
Himabindu905359
 
Social networking boon or a bane
Social networking boon or a baneSocial networking boon or a bane
Social networking boon or a bane
Abhishek Sharma
 

Similar to Social Media Awareness (20)

Social media: Issues
Social media: Issues Social media: Issues
Social media: Issues
 
EFFECTS OF SOCIAL MEDIA ON YOUTH
EFFECTS OF SOCIAL MEDIA ON YOUTHEFFECTS OF SOCIAL MEDIA ON YOUTH
EFFECTS OF SOCIAL MEDIA ON YOUTH
 
week 1 Day 2 Power of Media and Information Literacy.pptx
week 1 Day 2 Power of Media and Information Literacy.pptxweek 1 Day 2 Power of Media and Information Literacy.pptx
week 1 Day 2 Power of Media and Information Literacy.pptx
 
social media presentation.pptx
social media presentation.pptxsocial media presentation.pptx
social media presentation.pptx
 
Social media Risk Management Presentation Sample (Animations don't work in sl...
Social media Risk Management Presentation Sample (Animations don't work in sl...Social media Risk Management Presentation Sample (Animations don't work in sl...
Social media Risk Management Presentation Sample (Animations don't work in sl...
 
Social Networking
Social NetworkingSocial Networking
Social Networking
 
Security and Privacy in Social Networks.pptx
Security and Privacy in Social Networks.pptxSecurity and Privacy in Social Networks.pptx
Security and Privacy in Social Networks.pptx
 
Sociial media
Sociial media Sociial media
Sociial media
 
Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235
 
Safeguarding Your Online Presence_ Social Media Cybersecurity Tips.pdf
Safeguarding Your Online Presence_ Social Media Cybersecurity Tips.pdfSafeguarding Your Online Presence_ Social Media Cybersecurity Tips.pdf
Safeguarding Your Online Presence_ Social Media Cybersecurity Tips.pdf
 
Social media privacy threats that you need to keep an eye on in 2021
Social media privacy threats that you need to keep an eye on in 2021Social media privacy threats that you need to keep an eye on in 2021
Social media privacy threats that you need to keep an eye on in 2021
 
Social Media Safety Presentation
Social Media Safety PresentationSocial Media Safety Presentation
Social Media Safety Presentation
 
Social Media & Enterprise Security Whitepaper
Social Media & Enterprise Security WhitepaperSocial Media & Enterprise Security Whitepaper
Social Media & Enterprise Security Whitepaper
 
Security in social network araceli&arlethe
Security in social network araceli&arletheSecurity in social network araceli&arlethe
Security in social network araceli&arlethe
 
By Sandeep Rotte(545081).Praveen Komma( 544549).Management I.docx
By Sandeep Rotte(545081).Praveen Komma( 544549).Management I.docxBy Sandeep Rotte(545081).Praveen Komma( 544549).Management I.docx
By Sandeep Rotte(545081).Praveen Komma( 544549).Management I.docx
 
Privacy and social media
Privacy and social mediaPrivacy and social media
Privacy and social media
 
Social media ppt
Social media pptSocial media ppt
Social media ppt
 
advantagesanddisadvantagesofsocialmedia-151211192046.pdf
advantagesanddisadvantagesofsocialmedia-151211192046.pdfadvantagesanddisadvantagesofsocialmedia-151211192046.pdf
advantagesanddisadvantagesofsocialmedia-151211192046.pdf
 
advantagesanddisadvantagesofsocialmedia-151211192046.pptx
advantagesanddisadvantagesofsocialmedia-151211192046.pptxadvantagesanddisadvantagesofsocialmedia-151211192046.pptx
advantagesanddisadvantagesofsocialmedia-151211192046.pptx
 
Social networking boon or a bane
Social networking boon or a baneSocial networking boon or a bane
Social networking boon or a bane
 

More from Dr Raghu Khimani

Tracing An IP Address or Domain Name by Raghu Khimani
Tracing An IP Address or Domain Name by Raghu KhimaniTracing An IP Address or Domain Name by Raghu Khimani
Tracing An IP Address or Domain Name by Raghu Khimani
Dr Raghu Khimani
 
Mobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu KhimaniMobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu Khimani
Dr Raghu Khimani
 
Guideline for Call Data Record Analysis by Raghu Khimani
Guideline for Call Data Record Analysis by Raghu KhimaniGuideline for Call Data Record Analysis by Raghu Khimani
Guideline for Call Data Record Analysis by Raghu Khimani
Dr Raghu Khimani
 
E mail Investigation
E mail InvestigationE mail Investigation
E mail Investigation
Dr Raghu Khimani
 
Investigative Tools and Equipments for Cyber Crime by Raghu Khimani
Investigative Tools and Equipments for Cyber Crime by Raghu KhimaniInvestigative Tools and Equipments for Cyber Crime by Raghu Khimani
Investigative Tools and Equipments for Cyber Crime by Raghu Khimani
Dr Raghu Khimani
 
Digital Evidence by Raghu Khimani
Digital Evidence by Raghu KhimaniDigital Evidence by Raghu Khimani
Digital Evidence by Raghu Khimani
Dr Raghu Khimani
 
Introduction to Cyber Crime
Introduction to Cyber CrimeIntroduction to Cyber Crime
Introduction to Cyber Crime
Dr Raghu Khimani
 
Precursor chemicals
Precursor chemicalsPrecursor chemicals
Precursor chemicals
Dr Raghu Khimani
 
Poisons
PoisonsPoisons
Introduction to Toxicology and Forensic Toxilogical Examination and it's sign...
Introduction to Toxicology and Forensic Toxilogical Examination and it's sign...Introduction to Toxicology and Forensic Toxilogical Examination and it's sign...
Introduction to Toxicology and Forensic Toxilogical Examination and it's sign...
Dr Raghu Khimani
 
Narcotic Drugs & Psychotropic Subtances
Narcotic Drugs & Psychotropic SubtancesNarcotic Drugs & Psychotropic Subtances
Narcotic Drugs & Psychotropic Subtances
Dr Raghu Khimani
 
Analysis of illicit liquor including methyl & ethyl alcohol
Analysis of illicit liquor including methyl & ethyl alcoholAnalysis of illicit liquor including methyl & ethyl alcohol
Analysis of illicit liquor including methyl & ethyl alcohol
Dr Raghu Khimani
 
Examination of chemicals in trap cases
Examination of chemicals in trap casesExamination of chemicals in trap cases
Examination of chemicals in trap cases
Dr Raghu Khimani
 
Analysis of jaggery
Analysis of jaggeryAnalysis of jaggery
Analysis of jaggery
Dr Raghu Khimani
 

More from Dr Raghu Khimani (14)

Tracing An IP Address or Domain Name by Raghu Khimani
Tracing An IP Address or Domain Name by Raghu KhimaniTracing An IP Address or Domain Name by Raghu Khimani
Tracing An IP Address or Domain Name by Raghu Khimani
 
Mobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu KhimaniMobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu Khimani
 
Guideline for Call Data Record Analysis by Raghu Khimani
Guideline for Call Data Record Analysis by Raghu KhimaniGuideline for Call Data Record Analysis by Raghu Khimani
Guideline for Call Data Record Analysis by Raghu Khimani
 
E mail Investigation
E mail InvestigationE mail Investigation
E mail Investigation
 
Investigative Tools and Equipments for Cyber Crime by Raghu Khimani
Investigative Tools and Equipments for Cyber Crime by Raghu KhimaniInvestigative Tools and Equipments for Cyber Crime by Raghu Khimani
Investigative Tools and Equipments for Cyber Crime by Raghu Khimani
 
Digital Evidence by Raghu Khimani
Digital Evidence by Raghu KhimaniDigital Evidence by Raghu Khimani
Digital Evidence by Raghu Khimani
 
Introduction to Cyber Crime
Introduction to Cyber CrimeIntroduction to Cyber Crime
Introduction to Cyber Crime
 
Precursor chemicals
Precursor chemicalsPrecursor chemicals
Precursor chemicals
 
Poisons
PoisonsPoisons
Poisons
 
Introduction to Toxicology and Forensic Toxilogical Examination and it's sign...
Introduction to Toxicology and Forensic Toxilogical Examination and it's sign...Introduction to Toxicology and Forensic Toxilogical Examination and it's sign...
Introduction to Toxicology and Forensic Toxilogical Examination and it's sign...
 
Narcotic Drugs & Psychotropic Subtances
Narcotic Drugs & Psychotropic SubtancesNarcotic Drugs & Psychotropic Subtances
Narcotic Drugs & Psychotropic Subtances
 
Analysis of illicit liquor including methyl & ethyl alcohol
Analysis of illicit liquor including methyl & ethyl alcoholAnalysis of illicit liquor including methyl & ethyl alcohol
Analysis of illicit liquor including methyl & ethyl alcohol
 
Examination of chemicals in trap cases
Examination of chemicals in trap casesExamination of chemicals in trap cases
Examination of chemicals in trap cases
 
Analysis of jaggery
Analysis of jaggeryAnalysis of jaggery
Analysis of jaggery
 

Recently uploaded

Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 

Recently uploaded (20)

Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 

Social Media Awareness

  • 1. SOCIAL MEDIA AWARENESS RAGHU KHIMANI CYBER CRIME EXPERT/ADVISOR BAHAUDDIN SCIENCE COLLEGE, JUNAGADH
  • 2. What comes to your mind when you hear Social Media?
  • 3.
  • 4. Objectives of the Presentation  Introduction of Social Media  Types of Social Media  Professional Uses of Social Media  Impact of Social Media  Negative side of Social Media  Cyber Bullying Safety Tips
  • 5. Introduction of Social Media  “Social media facilitate the development of online social networks by connecting a user's profile with those of other individuals and/or groups”.  Social Media use Web Based Technologies, Desktop computers and Mobile Technologies (Smartphones) to create highly interactive platforms through which individuals, communities and organization can Share, Create, Discuss and Modify user generated content posted online.
  • 6.  Some of the most popular social media websites are Facebook (and its associated Facebook Messenger), WhatsApp, Tumblr, Instagram, Twitter, Pinterest, LinkedIn, Google+, YouTube, Viber, Snapchat, Weibo and WeChat. These social media websites have more than 100,000,000 registered users.
  • 8. Professional Uses of Social Media
  • 9. Impact of Social Media  On March 12, 2016, the World Wide Web turned 27.  76% people think felt that it has been positive for society as whole.  Although many people enjoy the freedom and connection they feel from social media, it has also had a negative impact on the number of hours you spend in face-to-face relationships and has created a platform where sharing negative thoughts and feelings can be done in a nameless, faceless fashion. Social media networking has also had an amazingly positive impact on the distribution of information and acquiring help and support during natural disasters around the globe.
  • 10.  In 2014, Prime Minister Shri Narendra Modi successfully used social media to communicate his platform to the voting public. Since then, many Indian Politicians used social media platforms to communicate with their constituents and get feedback on their performance.
  • 11. Negative Side of Social Media
  • 12. One of the negative effect of social media or network is it leads to addiction. Spending countless hours on the social sites can divert the focus and attention from a particular task. Another downside of the social media is that the user shares too much information which may pose threats to them. Even with the tight security settings, your personal information may leak on the social sites. Downloading your videos or pictures and copying your status is an easy task and can be done within few clicks. Sometimes social media is time consuming too. Time we spend on social media is more then the time we spend for our family.
  • 13.
  • 14. Cyber Bullying Cyber Bullying or Cyber Harassment is a form of bullying or harassment using electronic forms of contact. Harmful bullying behaviour can include posting rumours about a person, threats, negative remarks, disclose victims' personal information etc..
  • 16. In India there are several strict bullying in the workplace laws and regulations levied by the legal system. These laws are supposed to address all types of workplace harassment including discrimination (ભેદભાવ), sexual nuisance and psychological irritation caused by the employer. Section 66 A of The Information Technology Amendment Act 2008, deals with the actions done through a computer or mobile device that are grossly offensive, insult, inconvenience, injure or ill will against the person it is directed at. Punishment for sending offensive messages through communication service - shall be punishable with imprisonment for a term which may extend to three years and with fine.
  • 17. Safety Tips Use a strong password: The longer it is, the more secure it will be. The strong password contains a minimum of 12 characters. (Incl. Capital Alphabets, Small Alphabets, Numerical & Symbols). Unique account, Unique password: Use a different password for each of your social media accounts. (For ex. Different for Facebook, Twitter, LinkedIn, Google+, Pinterest, G-Mail, etc…) Set up your security answers. The two factor authentication is available for most social media sites. If you have social media apps on your phone, be sure to password protect your device.
  • 18. Be selective with friend requests. If you don’t know the person, don’t accept their request. It could be a fake account. Click links with caution. Social media accounts are regularly hacked. Look out for language or content that does not sound like something your friend would post. Beware of TMI (Too Much Information): Be careful about what you share. Don’t reveal sensitive personal information i.e.: birth date, home address, financial information, phone number, etc. The more you post, the easier it is to have your identity stolen. Once posted, always posted: Protect your reputation on social networks. What you post online stays online. Think twice before posting pictures you wouldn’t want your parents or future employers to see.
  • 19. Become familiar with the privacy policies of the social media channels you use and customize your privacy settings to control who sees what. Protect your computer by installing antivirus software to safeguard. Also ensure that your browser, operating system, and software are kept up to date. Remember to log off when you’re done. Sites can use your Information: Social network sites are typically free to use which means they are making their money by advertising to you. And that means they are collecting information about you. Is your information shared with outside companies and partners? What information can third-party plug-in software, such as Facebook Applications, use from your profile or page content? Review the site’s privacy policy and watch closely the privacy settings you can control.
  • 20. Search yourself: It is a good idea to search your name on Google and check out your profile as others see it on social networking sites. Know what action to take: If someone is harassing or threatening you, remove them from your friends list, block them and report them to the Police or Cyber Crime Cell.