SlideShare a Scribd company logo
1 of 72
@NTXISSA
Social Media - The Good, The Bad and The
Ugly
Paul Styrvoky, CISA, ITIL
Information Technology Internal Auditor
Dallas County Community College District
April 24, 2015
Disclaimer: This presentation does not represent an official opinion, solicitation and/or endorsement of social media by the Dallas County Community College District (DCCCD) and the
DCCCD Internal Audit Department
@NTXISSA
@NTXISSA
“The relationship between stress and social media is indirect. It is the social uses of digital technologies, and the way
they increase awareness of distressing events in others’ lives, that can result in users’ feeling more stress.”
Medical News Today
Source: http://www.medicalnewstoday.com/articles/288146.php
@NTXISSA
ISSA Web Conference – November 18, 2014
Dorian Grey & The Net: Social Media Monitoring
Overview:
Social media has become a ubiquitous part of our lives. As with many new
technologies, social networks have evolved much more rapidly than the
security model around them, creating a tremendous attack surface as well as
potential risk to privacy.
There are security and privacy implications of social media and social networks,
for individuals corporations, and government organizations. These networks are
being used both by adversaries, white hats, and even governments in the daily
battle for control of your privacy and what you can do to protect your assets
and information.
@NTXISSA
Social Media – The Ugly
•Cyberbullying
•Cyberstalking
•Online harassment/trolling
•Unauthorized disclosure of personal
information/photographs
@NTXISSA
Social Media – The Good
Source: https://www.ultimateknowledge.com/_SMSP.asp
@NTXISSA
World Cup
672 Million Tweets
350 million people = 3 Billion Facebook Interactions (posts, comments and likes)
Source: http://www.cnet.com/news/world-cup-most-talked-about-event-on-social-media-ever/
@NTXISSA
Super Bowl 2015 – Twitter Conversation
https://www.spredfast.com/social-marketing-blog/tweets-ads-data-recap-2015-social-super-bowl
@NTXISSA
Awarded
@NTXISSA
Location Status
Able to unexpected meet a friend at the airport
@NTXISSA
The Ugly
@NTXISSA
Facebook partners with cyber security experts
http://www.ft.com/cms/s/0/ada0a66c-b0c1-11e4-92b6-00144feab7de.html#axzz3UqZFvcbL
@NTXISSA
Tips to Safely Enjoy Social Media
Facebook, Twitter, Google+, YouTube, Pinterest, LinkedIn and other social networks have become an integral part of online lives.
Social networks are a great way to stay connected with others, but you should be wary about how much personal information you
post. Privacy and security settings exist for a reason
• Once posted, always posted
• Your online reputation can be a good thing
• Keep personal info personal
• Know and manage your friends
• Be honest if you’re uncomfortable
• Know what action to take: If someone is harassing or threatening you, remove them from your friends list, block them, and
report them to the site administrator.
Protect Yourself with these STOP. THINK. CONNECT. Tips:
• Keep a clean machine
• Own your online presence
• Make passwords long and strong
• Unique account, unique password
• When in doubt, throw it out
• Post only about others as you have them post about you.
https://www.staysafeonline.org/stay-safe-online/protect-your-personal-information/social-networks
@NTXISSA
5 Tips for Social Media Security and Privacy
• Use unique passwords for each social network: It’s a pain, but it is also absolutely essential that you don’t use the same password for Twitter as you do for,
say, Facebook, Instagram and other social tools. Using a single password makes it easy for hackers, as gaining access to one means gaining access to all –
and imagine how painful it will be when you find you’re locked out of your entire online life. When you use one password for multiple services, you’re only
as safe as the least secure service you use.
• Watch your mailbox: How can these social account hacks happen? By direct messages to you. Yes, using the same approach phishers have used for years it
tends to be a rogue link in a message or email, perhaps sent to look like it’s from a colleague or friend, that exposes that all-important password. Phishers
will find out who you would expect to receive an email from and use that as a way in. This social engineering approach has worked on staff at major
newspapers and government organizations, so don’t fool yourself into thinking hacking social network accounts must require more sophisticated
techniques.
• Don’t be too personal: Social engineering is where attackers use whatever information they can glean from your public profiles – date of birth, education,
interests – to try to get into your accounts on all sorts of services. Just imagine how easily someone can find out the name of your first pet or school from
your Facebook profile, then think about how many services use them as security questions. Keep as much of your profile private as you can, and think twice
before posting absolutely every aspect of your life.
• Lock your phone: It’s not only faceless scammers on the internet. Your phone can end up in the hands of a stranger, giving access to your social accounts
(and more). It’s not just rogue updates: once they’re in they can obtain your email address, target your friends using your profile as bait, and even change
your password. To make it as difficult as possible for an intruder, you should always enable the passcode lock on your phone, and set it to time out at no
more than a few minutes.
• Use the block button: When a spammer follows you and sends you links, don’t just ignore it. For the sake of others who are less well informed than you,
always report the account as spam. The social networking service will monitor it and, if enough people take the same action, remove the account. It won’t
stop spammers coming back with new accounts but it at least hinders their efforts.
Source: http://community.norton.com/t5/Norton-Protection-Blog/5-Tips-for-Social-Media-Security-and-Privacy/ba-p/1099203
@NTXISSA
Facebook General Account Settings
@NTXISSA
Facebook Security Settings
@NTXISSA
Facebook Privacy
@NTXISSA
Facebook Timeline and Tagging Settings
@NTXISSA
Facebook Blocking
@NTXISSA
Facebook Blocking - Continued
@NTXISSA
Facebook Notifications
@NTXISSA
Facebook - Mobile
@NTXISSA
Facebook - Follower
@NTXISSA
Facebook - Apps
@NTXISSA
Facebook - Ads
@NTXISSA
Facebook - Payments
@NTXISSA
Facebook – Privacy Checkup
@NTXISSA
Facebook – Privacy - Help
Source: https://www.facebook.com/help/466544860022370/
@NTXISSA
Safe Tweeting – The Basics
https://support.twitter.com/articles/76036-safe-tweeting-the-basics
@NTXISSA
Safe Tweeting – Passwords & Verification
https://support.twitter.com/articles/76036-safe-tweeting-the-basics
@NTXISSA
Safe Tweeting – Log into twitter.com
https://support.twitter.com/articles/76036-safe-tweeting-the-basics
@NTXISSA
Safe tweeting – Other
https://support.twitter.com/articles/76036-safe-tweeting-the-basics
@NTXISSA
8 terrible social media myths to be aware of – And
what NOT to do in Social Media in 2015
• My customers don't care about social media. - Whether you know it or not, your potential customers are using social media. Recognize the facts. According
to Pew Research Center, 74 percent of adults use social media, so chances are some of your prospects are out there.
• I need to join every social network. - Spreading yourself too thin can be more trouble than it's worth. It's important to research the specific social media
channels your customers frequent and to target those channels. If you're new to social media, check out Facebook, Twitter and, LinkedIn--all have expansive
demographics and usage rates.
• I need choose only one channel. - The opposite is also true. Don't put all your eggs in one basket. Focus is important but creating a social media silo could
limit your brand awareness.
• Content: The more, the better. - Don't over post. Less can be more. Share information that is interesting and relevant, and, most important, valuable to end
customers and prospects.
• It's OK to ignore or delete negative feedback. - It's important to actively manage your brand reputation. To mitigate negative comments, it's important to
respond thoughtfully, authentically, and with a plan to address a problem. By simply ignoring negative feedback, a customer may become increasingly angry
and spread the feedback virally. More important, when a potential new customer searches for your product or service, this feedback will be part of the
landscape of their research.
• It's all about the number of fans or followers. - Relevancy is important. Fans and followers are important to any social media channel but are they fans or
potential customers or word-of-mouth ambassadors? Maybe they're influencers who can help you spread the word about your brand.
• Social media cannot be measured. - As on other channels, you can track content, new leads, conversions, visits to your website, specific campaigns, and
more. Social media metrics and providers exist to help measure results. Twitter and Facebook, for example, will allow you to place a pixel on your website
that can track when a visitor from one of those sites has created a lead or landed on a certain page.
• It's all about you. - No, it's not! Promotional messages have a place in your social media strategy. However, if you promote yourself constantly, you'll lose
followers. Social media should be used to build brand awareness, identity, and reputation. Ask yourself, if you saw this update, would you click the like,
comment, retweet, or share button yourself?
Your social media posts should reflect your expertise in an industry, your awareness of the world around you, and your ability to share
content that your followers find relevant and helpful. Solve problems, share ideas, and seek feedback. Social media is two-way dialogue.
Source: http://www.inc.com/dave-kerpen/8-terrible-social-media-myths-to-avoid-in-2015.html
@NTXISSA
Virtual communities with more than 100 million active
users
Source: http://en.wikipedia.org/wiki/List_of_virtual_communities_with_more_than_100_million_users
@NTXISSA
Global Digital Snapshot
@NTXISSA
Social Media Statistics - 2014
@NTXISSA
US Adult Facebook Users
http://www.businessinsider.com/social-media-demographics-stats-2015-1
@NTXISSA
Frequency of social media site use
http://www.pewinternet.org/2015/01/09/frequency-of-social-media-use-2/
@NTXISSA
DCCCD - Pinterest
@NTXISSA
Collin College - Pinterest
@NTXISSA
DCCCD – Human Resources - Twitter
@NTXISSA
Collin College - Twitter
@NTXISSA
DCCCD-Facebook
@NTXISSA
Collin College - Facebook
@NTXISSA
#DCCCD… Instagram
@NTXISSA
Collin College - Instagram
@NTXISSA
DCCCD – Google+
@NTXISSA
Collin College – Google+
@NTXISSA
DCCCD - LinkedIn
@NTXISSA
Collin College - Linkedin
@NTXISSA
ISSA – North Texas - Twitter
@NTXISSA
ISSA – North Texas – Website (from Twitter)
@NTXISSA
ISSA - Linkedin
@NTXISSA
Social Media – A Good Thing or a Bad Thing?
Positive Effects:
• Friends and Relations: Social networks started as a place to connect with your
friends in an easy an convenient way.
• Reducing Communication Barriers: With social networks we are able to
communicate our thoughts and perceptions over different topics with a large
number of audiences, and raise our voice.
• Opportunities for Businesses: Social networks have become a crucial part of many
of us. We don’t even notice this but as soon as we open our desktops or laptops to
access the web, we sub-consciously open our favorite social network just to see
about the updates received.
Source: http://www.socialmediatoday.com/content/social-media-good-thing-or-bad-thing
@NTXISSA
Social Media – A Good Thing or a Bad Thing?
Negative Effects:
• Leads to Addiction: Many studies have shown that the extensive use of social media
can actually cause addiction to the users. Throughout their day, they feel to post
something on their pages or check others posts as it has become an important part of
our life.
• Lead to Isolation: Extreme usage of social media has reduced the level of human
interaction. Because of social networks the interaction with other people has become
effortless and people have isolated their lives behind their online identities. Face to
face communication and meetings has been reduced and many of us have lost the
flavor and charm to be together under one roof.
• Affecting Productivity: Mostly businesses use social media to find and communicate
with clients. But it is a great distraction to employees, who may show more interest in
what their friends are posting than in their work tasks.
Source: http://www.socialmediatoday.com/content/social-media-good-thing-or-bad-thing
@NTXISSA
Pro & Con Arguments – Are Social Networking Sites
Good for our Society?
• Social networking sites spread information faster than any other media. Over 50% of people learn about breaking news on social
media.
• Law enforcement uses social networking sites to catch and prosecute criminals. 67% of federal, state, and local law enforcement
professionals surveyed think "social media helps solve crimes more quickly.“
• Social networking sites allow people to improve their relationships and make new friends. 70% of adult social networking users visit
the sites to connect with friends and family, and increased online communication strengthens relationships.
• Social media helps empower business women. Being able to connect on social networking sites gives business women a support group
not readily found offline where female CEOs of Fortune 500 companies are outnumbered by male CEOs 15 to 485.
• Social media sites help employers find employees and job-seekers find work. 64% of companies are on two or more social networks for
recruiting because of the wider pool of applicants and more efficient searching capabilities.
• Being a part of a social networking site can increase a person's quality of life and reduce the risk of health problems. Social media can
help improve life satisfaction, stroke recovery, memory retention, and overall well-being by providing users with a large social group.
• Social networking sites facilitate face-to-face interaction. People use social media to network at in-person events and get to know
people before personal, business, and other meetings.
• Social networking sites increase voter participation. Facebook users reported they are more likely to vote if they see on social
networking sites that their friends did.
• Social media facilitates political change. Social networking sites give social movements a quick, no-cost method to organize, disseminate
information, and mobilize people. (Egyptian uprising)
• Social networking is good for the economy. Social media sites have created a new industry and thousands of jobs in addition to
providing new income and sales.
Source: http://socialnetworking.procon.org/
@NTXISSA
Pro & Con Arguments – Are Social Networking Sites
Good for our Society?
• Social media enables the spread of unreliable and false information. 49.1% of people have heard false news via social media.
• Social networking sites lack privacy and expose users to government and corporate intrusions. 13 million users said they had not set or
did not know about Facebook's privacy settings and 28% shared all or nearly all of their posts publicly.
• Students who are heavy social media users tend to have lower grades. Students who use social media had an average GPA of 3.06
while non-users had an average GPA of 3.82 and students who used social networking sites while studying scored 20% lower on tests.
• Social networking sites can lead to stress and offline relationship problems. A University of Edinburgh Business School study found the
more Facebook friends a person has, the more stressful the person finds Facebook to use.
• Social networking sites entice people to waste time. 40% of 8 to 18 year olds spend 54 minutes a day on social media sites.
• Using social media can harm job stability and employment prospects. Job recruiters reported negative reactions to finding profanity
(61%), poor spelling or grammar (54%), illegal drugs (78%), sexual content (66%), pictures of or with alcohol (47%), and religious content
(26%) on potential employees’ social media pages.
• The use of social networking sites is correlated with personality and brain disorders Pathological Internet Use (caused or exacerbated
by social networking use) is associated with feelings of loneliness, depression, anxiety and general distress.
• Social media causes people to spend less time interacting face-to-face. A Jan. 2012 Center for the Digital Future at the USC Annenberg
School study found that the percentage of people reporting less face-to-face time with family in their homes rose from 8% in 2000 to
34% in 2011.
• Criminals use social media to commit and promote crimes. Gangs use the sites to recruit younger members, coordinate violent crimes,
and threaten other gangs.
• Social media can endanger the military and journalists. The US Army notes that checking in with location based services on social
networking sites like Foursquare or Facebook could expose sensitive whereabouts and endanger military personnel and operations.
• Social networking sites harm employees' productivity. 51% of people aged 25-34 accessed social media while at work.
http://socialnetworking.procon.org/
@NTXISSA
Top 9 Most Common Facebook Scams
• Find Out Who Has Been Looking at your Profile: this scam claims that it will show you who has been viewing your profile and who has
blocked you from theirs, but none of these apps work because Facebook doesn’t provide such information to developers.
• Free Items and Gift Cards: don’t expect to get anything for free just by completing a survey.
• New Facebook Features: some apps promise to change your Facebook color or to provide you with a dislike button, but make sure you
install them only from trusted and well-known developers.
• Free iPads & iPhones: messages stating that you can win a free iPad or iPhone are usually just a thought-out marketing trick.
• Free Facebook Credits: basically you shouldn’t trust anything that offers something for free. When it sounds too good to be true, you
can be pretty sure it’s a scam, just like free credits for Facebook games like Farmville, Cityville etc.
• Breaking News: scammers know that most users will click on a link promising exclusive coverage, so stay alert and if you are not sure,
check with online media websites for the story first.
• Help, I Need Your Help And Money: if you get a message from a friend saying he has been robbed somewhere abroad and he is left with
no phone, passport or money and then asks you for help, beware – his Facebook account has probably been hijacked by scammers. You
can verify this also by asking your mutual friends if they received an identical message.
• Shocking Headlines and Fake Celebrity Stories: scammers also often use sensational news or false stories with a headline including
words like “shocking” because Facebook users tend to share them without verifying the news.
• False Privacy Settings: scammers mainly want to get your login details, so make sure to verify messages claiming to be from Facebook
security. Even the examples above show that they can look very credible and trustworthy.
Source: www.socialbakers.com
@NTXISSA
Personal Story – Compassion International
http://www.compassion.com
@NTXISSA
Child to Sponsor – Correspondence Process
Slow – Two to Three Month Turn-around
@NTXISSA
I had received these photos through the postal mail
@NTXISSA
Oh no, this happened in September 2013
@NTXISSA
What Should I Do if My Sponsored Child Contacts Me
Via Facebook?
• It probably would save time, but it could also come at the expense of you and your sponsored child’s
safety, and this type of communication places the child, family and church partner staff in a difficult
situation.
• It’s not uncommon for someone who knows a child who is sponsored to create an account on a social
networking site and pretend to be the child, to contact the sponsor and ask for money, and to threaten
the child’s well-being if money isn’t provided.
• We cannot protect you or your sponsored child if we are not involved in the correspondence between
you and the child. We also have a responsibility to protect the children from sponsors who don’t have
the children’s best interest in mind.
• Without being the center of the correspondence process, we also cannot ensure that you don’t
inadvertently write something inappropriate or offensive to the child – cross-cultural sensitivities
seem to appear out of nowhere, even out of good intentions.
Courtesy of Compassion International: http://blog.compassion.com/what-should-i-do-if-my-
sponsored-child-contacts-me-via-facebook/#ixzz37TRvUs5A
@NTXISSA
I was aware and followed the process …
• In situations like this, the country office works with the development center staff to
remind the child of our guidelines regarding direct contact with sponsors. The center
staff also makes sure it was indeed the child who initiated the contact.
• If you are contacted by your sponsored child outside of Compassion’s portals (e.g., by
phone, e-mail, Facebook, Twitter, etc.), please don’t respond, even to say, “I’m sorry
but I can’t talk with you in this manner.” And please let us know about the contact.
• If it happens in Facebook or Twitter, please use the site’s “block” feature to block the
person from asking you to be their friend. This may sound harsh, but please try to
imagine what could happen if these guidelines weren’t in place.
Courtesy of Compassion International: http://blog.compassion.com/what-should-i-do-if-
my-sponsored-child-contacts-me-via-facebook/#ixzz37TTqF2NI
@NTXISSA
A safe and happy ending after all ...
@NTXISSA
Inside her special book (Bible)
@NTXISSA
The top demographic trends for every major social
network – as of February 9, 2015
• Facebook remains the top social network for U.S. teens. Nearly half of teen Facebook users say they're using
the site more than last year, and Facebook has more daily teen users than any other social network.
• Instagram has edged out Facebook and Twitter in terms of prestige among young users. U.S. teens now
describe Instagram as "most important," while Facebook and Twitter lost ground on this measure, according
to Piper Jaffray's twice yearly teen survey. The survey also found that 83% of U.S. teens in wealthy
households were on Instagram.
• LinkedIn is actually more popular than Twitter among U.S. adults. LinkedIn's core demographic are those
aged between 30 and 49, i.e. those in the prime of their career-rising years. Not surprisingly, LinkedIn also
has a pronounced skew toward well-educated users.
• Twitter has begun to lean worryingly toward male users, whereas previously it was a more gender-balanced
social network. Pew found that 22% of men use Twitter, while only 15% of women do.
• YouTube reaches more adults aged 18 to 34 than any single cable TV network. Nearly half of people in this
age group visited YouTube between December 2013 and February 2014, according to Nielsen. It was rated by
millennials as the top place to watch content, ahead of digital and TV properties like Facebook and ESPN.
• Snapchat is the youngest social network of all. More than six out of 10 Snapchat users are in the 18-to-24
age group, compared to 28% of Instagram users, according to a survey by Informate.
Source: http://www.businessinsider.com/2015-social-network-demographic-trends-2015-2#ixzz3UaDz3peV
@NTXISSA
Why Hackers Love Organizations Who Use
Social Media
After all, cybercriminals
want to get as much
information as they can
to find a way to
spoof your customers.
http://www.forbes.com/sites/sungardas/2015/02/24/why-hackers-love-companies-who-use-social-media/
This kind of personalized
communication is lethal
when combined with social
engineering. Hackers know this
and will exploit this.
@NTXISSA
10 New Social Media Apps to Watch for 2015
• Storehouse: - Have you ever wanted to do more than just share your photos and add text? Storehouse is a new mobile app that addresses that desire. They say it
lets you “share your stories as they happen.”
• Moment: - Are you trying to spend less time on your phone or mobile device and more time in the real world? Moment helps alert you to how much you actually
use your iPhone or iPad by tracking your time spent on your device each day.
• Secret: - Ever have something that you absolutely must share on your social network, but just can’t face the consequences of posting it? Secret is your answer, it
allows you to share updates anonymously with your friends, and if your friends “love” it by clicking the heart icon, then their friends will see it too.
• Everyware: - This app is from a new startup company that is developing a very interesting concept for an app that can serve to replace many other apps on your
phone because it can manage special offers or deals, check-ins, mapping to locations, reviews, and appointments or dinner reservations
• Wanelo: - The name for this shopping app comes from merging ‘want, need, and love’. There are currently over 11 million users on this new but growing app that
features millions of different products from all types of retailers from big brands to Etsy independent sellers
• Nudge: - Connects your health to your fitness tracking. It works in conjunction with apps like RunKeeper, Moves, Fitbit, and more and gives you a Nudge Score.
• Ibotta: - Is a shopping rebate app that works with 200 of the largest retailers like Walmart, Target, Best Buy, Sephora, and Whole Foods. Next you buy the
featured products and verify your purchases by taking a picture of your receipt. Then Ibotta pays you cash to your PayPal or Venmo account or via a gift card. If
you join via Facebook, your friends will automatically join your Ibotta team. The more friends, the more bonuses can be earned through teamwork. Bonuses add
up to extra cash and are added to the bonus section of the app on a regular basis.
• Opoli: Is a competitor app for the more well-known start up Uber where you book a ride via the app. However, the difference with Opoli is the added safety
factor. All Opoli drivers are commercially licensed and insured professionals.
• SideChef: - If you like to cook but need detailed instructions or are just learning to cook, then SideChef is a great app to help you look like a professional,
seasoned chef. If you need coaching, this app does everything for you from providing recipes, audio and visual directions, voice command technology, timers, and
even tutorial videos. There are over 1,000 step-by-step recipes on the app including ones from new and notable chefs or food bloggers so you can browse recipes
and even add your own to the cookbook. On top of all that, the My Table feature keeps a photo journal of everything you’ve cooked using the app.
• Pensoul: - Is a graphic design app and It shows the scale and detail of images at the same time. It can be magnified up to 1 million times without graphic quality
deterioration
http://www.socialmediatoday.com/content/10-new-social-media-apps-watch-2015
@NTXISSA
What Comes Next?
5 Social Media Trends for 2015
• Major social networks battle harder for your wallet – Facebook to facilitate
money transfers
• Niche social networks continue to rise … but will Ello, Yik Yak, tsu … last?
• Shopping finally comes to social media – Twitter and Facebook beta-testing
“buy” buttons
• Smart devices get even smarter, to users’ benefit - thermostats, bathroom
scales and refrigerators to wearables like fitness bracelets and smart
watches are now collecting data and zapping it off wirelessly to the Internet.
• Increasing demand for (truly) private social media gives way to the real
thing - anonymous and ephemeral social networks—Snapchat, Secret,
Whisper, Yik Yak and Telegram, to name a few—surge in popularity
: https://www.linkedin.com/pulse/what-comes-next-5-social-media-trends-2015-ryan-holmes
@NTXISSA
Be Careful
• Use Social Media wisely
• Protect Your Identity, Privacy and Reputation
Pstyrvoky@yahoo.com
QUESTIONS?
@NTXISSA@NTXISSA
Thank you
The Collin College Engineering Department
Collin College Student Chapter of the North Texas ISSA
North Texas ISSA (Information Systems Security Association)
NTX ISSA Cyber Security Conference – April 24-25, 2015 72

More Related Content

What's hot

Social media privacy issues
Social media privacy issuesSocial media privacy issues
Social media privacy issuesNousheen Arshad
 
Disadvantages of Social Networking
Disadvantages of Social NetworkingDisadvantages of Social Networking
Disadvantages of Social NetworkingAshwin Agarwal
 
Social media course conclusion 2010 2011
Social media course conclusion 2010 2011Social media course conclusion 2010 2011
Social media course conclusion 2010 2011guillaume ereteo
 
Advantages & Disadvantages of Social Networking
Advantages & Disadvantages of Social NetworkingAdvantages & Disadvantages of Social Networking
Advantages & Disadvantages of Social NetworkingSofia Naznim
 
Social networking boon or a bane
Social networking boon or a baneSocial networking boon or a bane
Social networking boon or a baneAbhishek Sharma
 
Side Effects of Social Media
Side Effects of Social MediaSide Effects of Social Media
Side Effects of Social MediaAniket Maithani
 
Social media group project
Social media group projectSocial media group project
Social media group projectSukhvinder Singh
 
EFFECTS OF SOCIAL NETWORKING
EFFECTS OF SOCIAL NETWORKINGEFFECTS OF SOCIAL NETWORKING
EFFECTS OF SOCIAL NETWORKINGNITIN BASANTWANI
 
Disadvantages of Social networking
Disadvantages of Social networkingDisadvantages of Social networking
Disadvantages of Social networkingdrshrikant2
 
Social Media or Social Destruction?
Social Media or Social Destruction?Social Media or Social Destruction?
Social Media or Social Destruction?kswaterman
 
Effects of social media on youth.
Effects of social media on youth.Effects of social media on youth.
Effects of social media on youth.ALI IRFAN ASHRAF
 
Social media and impact on economy and society
Social media and impact on economy and societySocial media and impact on economy and society
Social media and impact on economy and societyBhaswati Guha Majumder
 
Future of social networking group project
Future of social networking   group projectFuture of social networking   group project
Future of social networking group projectbulgarej
 
Social Media Workshop : Social Media Facts and Figures
Social Media Workshop : Social Media Facts and FiguresSocial Media Workshop : Social Media Facts and Figures
Social Media Workshop : Social Media Facts and FiguresInteract
 
impact of social media on youth m.com ppt
impact of social media on youth m.com ppt impact of social media on youth m.com ppt
impact of social media on youth m.com ppt Sudhanshu Sandhir
 
Social media Advantages and Disadvantages
Social media Advantages and DisadvantagesSocial media Advantages and Disadvantages
Social media Advantages and DisadvantagesJagmohan Singh
 
Social networking sites.
Social networking sites.Social networking sites.
Social networking sites.Jagdeep Gill
 

What's hot (20)

Social media privacy issues
Social media privacy issuesSocial media privacy issues
Social media privacy issues
 
Disadvantages of Social Networking
Disadvantages of Social NetworkingDisadvantages of Social Networking
Disadvantages of Social Networking
 
The social dilemma
The social dilemmaThe social dilemma
The social dilemma
 
Social media course conclusion 2010 2011
Social media course conclusion 2010 2011Social media course conclusion 2010 2011
Social media course conclusion 2010 2011
 
Advantages & Disadvantages of Social Networking
Advantages & Disadvantages of Social NetworkingAdvantages & Disadvantages of Social Networking
Advantages & Disadvantages of Social Networking
 
Social networking boon or a bane
Social networking boon or a baneSocial networking boon or a bane
Social networking boon or a bane
 
Side Effects of Social Media
Side Effects of Social MediaSide Effects of Social Media
Side Effects of Social Media
 
Social media group project
Social media group projectSocial media group project
Social media group project
 
EFFECTS OF SOCIAL NETWORKING
EFFECTS OF SOCIAL NETWORKINGEFFECTS OF SOCIAL NETWORKING
EFFECTS OF SOCIAL NETWORKING
 
Disadvantages of Social networking
Disadvantages of Social networkingDisadvantages of Social networking
Disadvantages of Social networking
 
Social Media or Social Destruction?
Social Media or Social Destruction?Social Media or Social Destruction?
Social Media or Social Destruction?
 
Effects of social media on youth.
Effects of social media on youth.Effects of social media on youth.
Effects of social media on youth.
 
Social media and impact on economy and society
Social media and impact on economy and societySocial media and impact on economy and society
Social media and impact on economy and society
 
Social dilemma
Social dilemmaSocial dilemma
Social dilemma
 
Future of social networking group project
Future of social networking   group projectFuture of social networking   group project
Future of social networking group project
 
Social Media Workshop : Social Media Facts and Figures
Social Media Workshop : Social Media Facts and FiguresSocial Media Workshop : Social Media Facts and Figures
Social Media Workshop : Social Media Facts and Figures
 
Social Networking Project (2)
Social Networking Project (2)Social Networking Project (2)
Social Networking Project (2)
 
impact of social media on youth m.com ppt
impact of social media on youth m.com ppt impact of social media on youth m.com ppt
impact of social media on youth m.com ppt
 
Social media Advantages and Disadvantages
Social media Advantages and DisadvantagesSocial media Advantages and Disadvantages
Social media Advantages and Disadvantages
 
Social networking sites.
Social networking sites.Social networking sites.
Social networking sites.
 

Similar to Social Media - The Good, The Bad and The Ugly

media safety .pptx
media safety .pptxmedia safety .pptx
media safety .pptxGAmarioarei
 
Social Media Trends Presentation
Social Media Trends PresentationSocial Media Trends Presentation
Social Media Trends PresentationCreston Blanchard
 
Cyber Awareness.pptx
Cyber Awareness.pptxCyber Awareness.pptx
Cyber Awareness.pptxadblue2017
 
Social Media and the Job World
Social Media and the Job WorldSocial Media and the Job World
Social Media and the Job WorldMike Schaffer
 
8 Things People Don't Tell You About Social Media
8 Things People Don't Tell You About Social Media8 Things People Don't Tell You About Social Media
8 Things People Don't Tell You About Social MediaFalcon.io
 
Old Media, New Tricks: Ragan Presentation
Old Media, New Tricks: Ragan PresentationOld Media, New Tricks: Ragan Presentation
Old Media, New Tricks: Ragan PresentationDaniel Honigman
 
Old Media, New Tricks (Ragan
Old Media, New Tricks (RaganOld Media, New Tricks (Ragan
Old Media, New Tricks (RaganDaniel Honigman
 
Social Media Orientation
Social Media Orientation Social Media Orientation
Social Media Orientation Farris Timimi
 
YouthLink Scotland - Intro to Social Media
YouthLink Scotland - Intro to Social MediaYouthLink Scotland - Intro to Social Media
YouthLink Scotland - Intro to Social MediaAdam Lang
 
Information Technology and EthicsSocial Networking and Business.docx
Information Technology and EthicsSocial Networking and Business.docxInformation Technology and EthicsSocial Networking and Business.docx
Information Technology and EthicsSocial Networking and Business.docxjaggernaoma
 
Social Media Marketing (Empirical and Theoretical Lessons)
Social Media Marketing (Empirical and Theoretical Lessons)Social Media Marketing (Empirical and Theoretical Lessons)
Social Media Marketing (Empirical and Theoretical Lessons)Raul Pacheco-Vega
 
Social Media Skills to Set You Apart | Lia Haberman
Social Media Skills to Set You Apart | Lia HabermanSocial Media Skills to Set You Apart | Lia Haberman
Social Media Skills to Set You Apart | Lia HabermanLia Haberman
 
Celestine Ukpere's WYA Strathmore Cconference
Celestine Ukpere's WYA Strathmore CconferenceCelestine Ukpere's WYA Strathmore Cconference
Celestine Ukpere's WYA Strathmore CconferenceCelestine Ukpere
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awarenessKaran Veer Singh
 
News Agencies and the new media
News Agencies and the new mediaNews Agencies and the new media
News Agencies and the new mediaAlimi Eyitayo
 
Social media Challenges and Advantage
Social media Challenges and AdvantageSocial media Challenges and Advantage
Social media Challenges and AdvantageTechno World 4 U
 
Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235brendaylo
 
Help Employees Socialize Your Brand
Help Employees Socialize Your BrandHelp Employees Socialize Your Brand
Help Employees Socialize Your BrandThe Safdar Group
 

Similar to Social Media - The Good, The Bad and The Ugly (20)

media safety .pptx
media safety .pptxmedia safety .pptx
media safety .pptx
 
Social Media Trends Presentation
Social Media Trends PresentationSocial Media Trends Presentation
Social Media Trends Presentation
 
Cyber Awareness.pptx
Cyber Awareness.pptxCyber Awareness.pptx
Cyber Awareness.pptx
 
Social Media and the Job World
Social Media and the Job WorldSocial Media and the Job World
Social Media and the Job World
 
8 Things People Don't Tell You About Social Media
8 Things People Don't Tell You About Social Media8 Things People Don't Tell You About Social Media
8 Things People Don't Tell You About Social Media
 
Old Media, New Tricks: Ragan Presentation
Old Media, New Tricks: Ragan PresentationOld Media, New Tricks: Ragan Presentation
Old Media, New Tricks: Ragan Presentation
 
Old Media, New Tricks (Ragan
Old Media, New Tricks (RaganOld Media, New Tricks (Ragan
Old Media, New Tricks (Ragan
 
Social Media Orientation
Social Media Orientation Social Media Orientation
Social Media Orientation
 
YouthLink Scotland - Intro to Social Media
YouthLink Scotland - Intro to Social MediaYouthLink Scotland - Intro to Social Media
YouthLink Scotland - Intro to Social Media
 
Information Technology and EthicsSocial Networking and Business.docx
Information Technology and EthicsSocial Networking and Business.docxInformation Technology and EthicsSocial Networking and Business.docx
Information Technology and EthicsSocial Networking and Business.docx
 
Social Media Marketing (Empirical and Theoretical Lessons)
Social Media Marketing (Empirical and Theoretical Lessons)Social Media Marketing (Empirical and Theoretical Lessons)
Social Media Marketing (Empirical and Theoretical Lessons)
 
Sociial media
Sociial media Sociial media
Sociial media
 
Social Media Skills to Set You Apart | Lia Haberman
Social Media Skills to Set You Apart | Lia HabermanSocial Media Skills to Set You Apart | Lia Haberman
Social Media Skills to Set You Apart | Lia Haberman
 
Project
ProjectProject
Project
 
Celestine Ukpere's WYA Strathmore Cconference
Celestine Ukpere's WYA Strathmore CconferenceCelestine Ukpere's WYA Strathmore Cconference
Celestine Ukpere's WYA Strathmore Cconference
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awareness
 
News Agencies and the new media
News Agencies and the new mediaNews Agencies and the new media
News Agencies and the new media
 
Social media Challenges and Advantage
Social media Challenges and AdvantageSocial media Challenges and Advantage
Social media Challenges and Advantage
 
Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235
 
Help Employees Socialize Your Brand
Help Employees Socialize Your BrandHelp Employees Socialize Your Brand
Help Employees Socialize Your Brand
 

More from North Texas Chapter of the ISSA

Ntxissacsc5 gold 4 beyond detection and prevension remediation
Ntxissacsc5 gold 4 beyond detection and prevension   remediationNtxissacsc5 gold 4 beyond detection and prevension   remediation
Ntxissacsc5 gold 4 beyond detection and prevension remediationNorth Texas Chapter of the ISSA
 
Ntxissacsc5 yellow 6-abusing protocols for dynamic addressing in space-jacenr...
Ntxissacsc5 yellow 6-abusing protocols for dynamic addressing in space-jacenr...Ntxissacsc5 yellow 6-abusing protocols for dynamic addressing in space-jacenr...
Ntxissacsc5 yellow 6-abusing protocols for dynamic addressing in space-jacenr...North Texas Chapter of the ISSA
 
Ntxissacsc5 yellow 2-evidence driven infosec compliance strategy-garrettp1
Ntxissacsc5 yellow 2-evidence driven infosec compliance strategy-garrettp1Ntxissacsc5 yellow 2-evidence driven infosec compliance strategy-garrettp1
Ntxissacsc5 yellow 2-evidence driven infosec compliance strategy-garrettp1North Texas Chapter of the ISSA
 
Ntxissacsc5 purple 4-threat detection using machine learning-markszewczul
Ntxissacsc5 purple 4-threat detection using machine learning-markszewczulNtxissacsc5 purple 4-threat detection using machine learning-markszewczul
Ntxissacsc5 purple 4-threat detection using machine learning-markszewczulNorth Texas Chapter of the ISSA
 
Ntxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptx
Ntxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptxNtxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptx
Ntxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptxNorth Texas Chapter of the ISSA
 
Ntxissacsc5 gold 1--mimecast email resiliency- erez-haimowicz
Ntxissacsc5 gold 1--mimecast email resiliency- erez-haimowiczNtxissacsc5 gold 1--mimecast email resiliency- erez-haimowicz
Ntxissacsc5 gold 1--mimecast email resiliency- erez-haimowiczNorth Texas Chapter of the ISSA
 
Ntxissacsc5 blue 7-zerotrust more effective approach to security-ed higgins
Ntxissacsc5 blue 7-zerotrust more effective approach to security-ed higginsNtxissacsc5 blue 7-zerotrust more effective approach to security-ed higgins
Ntxissacsc5 blue 7-zerotrust more effective approach to security-ed higginsNorth Texas Chapter of the ISSA
 
Ntxissacsc5 blue 6-securityawareness-laurianna_callaghan
Ntxissacsc5 blue 6-securityawareness-laurianna_callaghanNtxissacsc5 blue 6-securityawareness-laurianna_callaghan
Ntxissacsc5 blue 6-securityawareness-laurianna_callaghanNorth Texas Chapter of the ISSA
 
Ntxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeq
Ntxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeqNtxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeq
Ntxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeqNorth Texas Chapter of the ISSA
 
Ntxissacsc5 blue 3-shifting from incident to continuous response bill white
Ntxissacsc5 blue 3-shifting from  incident to continuous response bill whiteNtxissacsc5 blue 3-shifting from  incident to continuous response bill white
Ntxissacsc5 blue 3-shifting from incident to continuous response bill whiteNorth Texas Chapter of the ISSA
 
Ntxissacsc5 blue 2-herding cats and security tools-harold_toomey
Ntxissacsc5 blue 2-herding cats and security tools-harold_toomeyNtxissacsc5 blue 2-herding cats and security tools-harold_toomey
Ntxissacsc5 blue 2-herding cats and security tools-harold_toomeyNorth Texas Chapter of the ISSA
 

More from North Texas Chapter of the ISSA (20)

Purple seven-ntxissacsc5 walcutt
Purple seven-ntxissacsc5 walcuttPurple seven-ntxissacsc5 walcutt
Purple seven-ntxissacsc5 walcutt
 
Ntxissacsc5 yellow 7 protecting the cloud with cep
Ntxissacsc5 yellow 7 protecting the cloud with cepNtxissacsc5 yellow 7 protecting the cloud with cep
Ntxissacsc5 yellow 7 protecting the cloud with cep
 
Ntxissacsc5 gold 4 beyond detection and prevension remediation
Ntxissacsc5 gold 4 beyond detection and prevension   remediationNtxissacsc5 gold 4 beyond detection and prevension   remediation
Ntxissacsc5 gold 4 beyond detection and prevension remediation
 
Ntxissacsc5 gold 1 mimecast e mail resiliency
Ntxissacsc5  gold 1 mimecast e mail resiliencyNtxissacsc5  gold 1 mimecast e mail resiliency
Ntxissacsc5 gold 1 mimecast e mail resiliency
 
Ntxissacsc5 yellow 6-abusing protocols for dynamic addressing in space-jacenr...
Ntxissacsc5 yellow 6-abusing protocols for dynamic addressing in space-jacenr...Ntxissacsc5 yellow 6-abusing protocols for dynamic addressing in space-jacenr...
Ntxissacsc5 yellow 6-abusing protocols for dynamic addressing in space-jacenr...
 
Ntxissacsc5 yellow 2-evidence driven infosec compliance strategy-garrettp1
Ntxissacsc5 yellow 2-evidence driven infosec compliance strategy-garrettp1Ntxissacsc5 yellow 2-evidence driven infosec compliance strategy-garrettp1
Ntxissacsc5 yellow 2-evidence driven infosec compliance strategy-garrettp1
 
Ntxissacsc5 yellow 1-beginnerslinux bill-petersen
Ntxissacsc5 yellow 1-beginnerslinux bill-petersenNtxissacsc5 yellow 1-beginnerslinux bill-petersen
Ntxissacsc5 yellow 1-beginnerslinux bill-petersen
 
Ntxissacsc5 red 6-diy-pentest-lab dustin-dykes
Ntxissacsc5 red 6-diy-pentest-lab dustin-dykesNtxissacsc5 red 6-diy-pentest-lab dustin-dykes
Ntxissacsc5 red 6-diy-pentest-lab dustin-dykes
 
Ntxissacsc5 red 1 & 2 basic hacking tools ncc group
Ntxissacsc5 red 1 & 2   basic hacking tools ncc groupNtxissacsc5 red 1 & 2   basic hacking tools ncc group
Ntxissacsc5 red 1 & 2 basic hacking tools ncc group
 
Ntxissacsc5 purple 5-insider threat-_andy_thompson
Ntxissacsc5 purple 5-insider threat-_andy_thompsonNtxissacsc5 purple 5-insider threat-_andy_thompson
Ntxissacsc5 purple 5-insider threat-_andy_thompson
 
Ntxissacsc5 purple 4-threat detection using machine learning-markszewczul
Ntxissacsc5 purple 4-threat detection using machine learning-markszewczulNtxissacsc5 purple 4-threat detection using machine learning-markszewczul
Ntxissacsc5 purple 4-threat detection using machine learning-markszewczul
 
Ntxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptx
Ntxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptxNtxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptx
Ntxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptx
 
Ntxissacsc5 purple 1-eu-gdpr_patrick_florer
Ntxissacsc5 purple 1-eu-gdpr_patrick_florerNtxissacsc5 purple 1-eu-gdpr_patrick_florer
Ntxissacsc5 purple 1-eu-gdpr_patrick_florer
 
Ntxissacsc5 gold 1--mimecast email resiliency- erez-haimowicz
Ntxissacsc5 gold 1--mimecast email resiliency- erez-haimowiczNtxissacsc5 gold 1--mimecast email resiliency- erez-haimowicz
Ntxissacsc5 gold 1--mimecast email resiliency- erez-haimowicz
 
Ntxissacsc5 blue 7-zerotrust more effective approach to security-ed higgins
Ntxissacsc5 blue 7-zerotrust more effective approach to security-ed higginsNtxissacsc5 blue 7-zerotrust more effective approach to security-ed higgins
Ntxissacsc5 blue 7-zerotrust more effective approach to security-ed higgins
 
Ntxissacsc5 blue 6-securityawareness-laurianna_callaghan
Ntxissacsc5 blue 6-securityawareness-laurianna_callaghanNtxissacsc5 blue 6-securityawareness-laurianna_callaghan
Ntxissacsc5 blue 6-securityawareness-laurianna_callaghan
 
Ntxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeq
Ntxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeqNtxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeq
Ntxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeq
 
Ntxissacsc5 blue 3-shifting from incident to continuous response bill white
Ntxissacsc5 blue 3-shifting from  incident to continuous response bill whiteNtxissacsc5 blue 3-shifting from  incident to continuous response bill white
Ntxissacsc5 blue 3-shifting from incident to continuous response bill white
 
Ntxissacsc5 blue 4-the-attack_life_cycle_erich_mueller
Ntxissacsc5 blue 4-the-attack_life_cycle_erich_muellerNtxissacsc5 blue 4-the-attack_life_cycle_erich_mueller
Ntxissacsc5 blue 4-the-attack_life_cycle_erich_mueller
 
Ntxissacsc5 blue 2-herding cats and security tools-harold_toomey
Ntxissacsc5 blue 2-herding cats and security tools-harold_toomeyNtxissacsc5 blue 2-herding cats and security tools-harold_toomey
Ntxissacsc5 blue 2-herding cats and security tools-harold_toomey
 

Recently uploaded

Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Sonam Pathan
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作ys8omjxb
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Paul Calvano
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一Fs
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhimiss dipika
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 
Complet Documnetation for Smart Assistant Application for Disabled Person
Complet Documnetation   for Smart Assistant Application for Disabled PersonComplet Documnetation   for Smart Assistant Application for Disabled Person
Complet Documnetation for Smart Assistant Application for Disabled Personfurqan222004
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMartaLoveguard
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Excelmac1
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一z xss
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Roomdivyansh0kumar0
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一Fs
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Lucknow
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 

Recently uploaded (20)

Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhi
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 
Complet Documnetation for Smart Assistant Application for Disabled Person
Complet Documnetation   for Smart Assistant Application for Disabled PersonComplet Documnetation   for Smart Assistant Application for Disabled Person
Complet Documnetation for Smart Assistant Application for Disabled Person
 
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
 
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptx
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 

Social Media - The Good, The Bad and The Ugly

  • 1. @NTXISSA Social Media - The Good, The Bad and The Ugly Paul Styrvoky, CISA, ITIL Information Technology Internal Auditor Dallas County Community College District April 24, 2015 Disclaimer: This presentation does not represent an official opinion, solicitation and/or endorsement of social media by the Dallas County Community College District (DCCCD) and the DCCCD Internal Audit Department
  • 3. @NTXISSA “The relationship between stress and social media is indirect. It is the social uses of digital technologies, and the way they increase awareness of distressing events in others’ lives, that can result in users’ feeling more stress.” Medical News Today Source: http://www.medicalnewstoday.com/articles/288146.php
  • 4. @NTXISSA ISSA Web Conference – November 18, 2014 Dorian Grey & The Net: Social Media Monitoring Overview: Social media has become a ubiquitous part of our lives. As with many new technologies, social networks have evolved much more rapidly than the security model around them, creating a tremendous attack surface as well as potential risk to privacy. There are security and privacy implications of social media and social networks, for individuals corporations, and government organizations. These networks are being used both by adversaries, white hats, and even governments in the daily battle for control of your privacy and what you can do to protect your assets and information.
  • 5. @NTXISSA Social Media – The Ugly •Cyberbullying •Cyberstalking •Online harassment/trolling •Unauthorized disclosure of personal information/photographs
  • 6. @NTXISSA Social Media – The Good Source: https://www.ultimateknowledge.com/_SMSP.asp
  • 7. @NTXISSA World Cup 672 Million Tweets 350 million people = 3 Billion Facebook Interactions (posts, comments and likes) Source: http://www.cnet.com/news/world-cup-most-talked-about-event-on-social-media-ever/
  • 8. @NTXISSA Super Bowl 2015 – Twitter Conversation https://www.spredfast.com/social-marketing-blog/tweets-ads-data-recap-2015-social-super-bowl
  • 10. @NTXISSA Location Status Able to unexpected meet a friend at the airport
  • 12. @NTXISSA Facebook partners with cyber security experts http://www.ft.com/cms/s/0/ada0a66c-b0c1-11e4-92b6-00144feab7de.html#axzz3UqZFvcbL
  • 13. @NTXISSA Tips to Safely Enjoy Social Media Facebook, Twitter, Google+, YouTube, Pinterest, LinkedIn and other social networks have become an integral part of online lives. Social networks are a great way to stay connected with others, but you should be wary about how much personal information you post. Privacy and security settings exist for a reason • Once posted, always posted • Your online reputation can be a good thing • Keep personal info personal • Know and manage your friends • Be honest if you’re uncomfortable • Know what action to take: If someone is harassing or threatening you, remove them from your friends list, block them, and report them to the site administrator. Protect Yourself with these STOP. THINK. CONNECT. Tips: • Keep a clean machine • Own your online presence • Make passwords long and strong • Unique account, unique password • When in doubt, throw it out • Post only about others as you have them post about you. https://www.staysafeonline.org/stay-safe-online/protect-your-personal-information/social-networks
  • 14. @NTXISSA 5 Tips for Social Media Security and Privacy • Use unique passwords for each social network: It’s a pain, but it is also absolutely essential that you don’t use the same password for Twitter as you do for, say, Facebook, Instagram and other social tools. Using a single password makes it easy for hackers, as gaining access to one means gaining access to all – and imagine how painful it will be when you find you’re locked out of your entire online life. When you use one password for multiple services, you’re only as safe as the least secure service you use. • Watch your mailbox: How can these social account hacks happen? By direct messages to you. Yes, using the same approach phishers have used for years it tends to be a rogue link in a message or email, perhaps sent to look like it’s from a colleague or friend, that exposes that all-important password. Phishers will find out who you would expect to receive an email from and use that as a way in. This social engineering approach has worked on staff at major newspapers and government organizations, so don’t fool yourself into thinking hacking social network accounts must require more sophisticated techniques. • Don’t be too personal: Social engineering is where attackers use whatever information they can glean from your public profiles – date of birth, education, interests – to try to get into your accounts on all sorts of services. Just imagine how easily someone can find out the name of your first pet or school from your Facebook profile, then think about how many services use them as security questions. Keep as much of your profile private as you can, and think twice before posting absolutely every aspect of your life. • Lock your phone: It’s not only faceless scammers on the internet. Your phone can end up in the hands of a stranger, giving access to your social accounts (and more). It’s not just rogue updates: once they’re in they can obtain your email address, target your friends using your profile as bait, and even change your password. To make it as difficult as possible for an intruder, you should always enable the passcode lock on your phone, and set it to time out at no more than a few minutes. • Use the block button: When a spammer follows you and sends you links, don’t just ignore it. For the sake of others who are less well informed than you, always report the account as spam. The social networking service will monitor it and, if enough people take the same action, remove the account. It won’t stop spammers coming back with new accounts but it at least hinders their efforts. Source: http://community.norton.com/t5/Norton-Protection-Blog/5-Tips-for-Social-Media-Security-and-Privacy/ba-p/1099203
  • 18. @NTXISSA Facebook Timeline and Tagging Settings
  • 28. @NTXISSA Facebook – Privacy - Help Source: https://www.facebook.com/help/466544860022370/
  • 29. @NTXISSA Safe Tweeting – The Basics https://support.twitter.com/articles/76036-safe-tweeting-the-basics
  • 30. @NTXISSA Safe Tweeting – Passwords & Verification https://support.twitter.com/articles/76036-safe-tweeting-the-basics
  • 31. @NTXISSA Safe Tweeting – Log into twitter.com https://support.twitter.com/articles/76036-safe-tweeting-the-basics
  • 32. @NTXISSA Safe tweeting – Other https://support.twitter.com/articles/76036-safe-tweeting-the-basics
  • 33. @NTXISSA 8 terrible social media myths to be aware of – And what NOT to do in Social Media in 2015 • My customers don't care about social media. - Whether you know it or not, your potential customers are using social media. Recognize the facts. According to Pew Research Center, 74 percent of adults use social media, so chances are some of your prospects are out there. • I need to join every social network. - Spreading yourself too thin can be more trouble than it's worth. It's important to research the specific social media channels your customers frequent and to target those channels. If you're new to social media, check out Facebook, Twitter and, LinkedIn--all have expansive demographics and usage rates. • I need choose only one channel. - The opposite is also true. Don't put all your eggs in one basket. Focus is important but creating a social media silo could limit your brand awareness. • Content: The more, the better. - Don't over post. Less can be more. Share information that is interesting and relevant, and, most important, valuable to end customers and prospects. • It's OK to ignore or delete negative feedback. - It's important to actively manage your brand reputation. To mitigate negative comments, it's important to respond thoughtfully, authentically, and with a plan to address a problem. By simply ignoring negative feedback, a customer may become increasingly angry and spread the feedback virally. More important, when a potential new customer searches for your product or service, this feedback will be part of the landscape of their research. • It's all about the number of fans or followers. - Relevancy is important. Fans and followers are important to any social media channel but are they fans or potential customers or word-of-mouth ambassadors? Maybe they're influencers who can help you spread the word about your brand. • Social media cannot be measured. - As on other channels, you can track content, new leads, conversions, visits to your website, specific campaigns, and more. Social media metrics and providers exist to help measure results. Twitter and Facebook, for example, will allow you to place a pixel on your website that can track when a visitor from one of those sites has created a lead or landed on a certain page. • It's all about you. - No, it's not! Promotional messages have a place in your social media strategy. However, if you promote yourself constantly, you'll lose followers. Social media should be used to build brand awareness, identity, and reputation. Ask yourself, if you saw this update, would you click the like, comment, retweet, or share button yourself? Your social media posts should reflect your expertise in an industry, your awareness of the world around you, and your ability to share content that your followers find relevant and helpful. Solve problems, share ideas, and seek feedback. Social media is two-way dialogue. Source: http://www.inc.com/dave-kerpen/8-terrible-social-media-myths-to-avoid-in-2015.html
  • 34. @NTXISSA Virtual communities with more than 100 million active users Source: http://en.wikipedia.org/wiki/List_of_virtual_communities_with_more_than_100_million_users
  • 37. @NTXISSA US Adult Facebook Users http://www.businessinsider.com/social-media-demographics-stats-2015-1
  • 38. @NTXISSA Frequency of social media site use http://www.pewinternet.org/2015/01/09/frequency-of-social-media-use-2/
  • 41. @NTXISSA DCCCD – Human Resources - Twitter
  • 51. @NTXISSA ISSA – North Texas - Twitter
  • 52. @NTXISSA ISSA – North Texas – Website (from Twitter)
  • 54. @NTXISSA Social Media – A Good Thing or a Bad Thing? Positive Effects: • Friends and Relations: Social networks started as a place to connect with your friends in an easy an convenient way. • Reducing Communication Barriers: With social networks we are able to communicate our thoughts and perceptions over different topics with a large number of audiences, and raise our voice. • Opportunities for Businesses: Social networks have become a crucial part of many of us. We don’t even notice this but as soon as we open our desktops or laptops to access the web, we sub-consciously open our favorite social network just to see about the updates received. Source: http://www.socialmediatoday.com/content/social-media-good-thing-or-bad-thing
  • 55. @NTXISSA Social Media – A Good Thing or a Bad Thing? Negative Effects: • Leads to Addiction: Many studies have shown that the extensive use of social media can actually cause addiction to the users. Throughout their day, they feel to post something on their pages or check others posts as it has become an important part of our life. • Lead to Isolation: Extreme usage of social media has reduced the level of human interaction. Because of social networks the interaction with other people has become effortless and people have isolated their lives behind their online identities. Face to face communication and meetings has been reduced and many of us have lost the flavor and charm to be together under one roof. • Affecting Productivity: Mostly businesses use social media to find and communicate with clients. But it is a great distraction to employees, who may show more interest in what their friends are posting than in their work tasks. Source: http://www.socialmediatoday.com/content/social-media-good-thing-or-bad-thing
  • 56. @NTXISSA Pro & Con Arguments – Are Social Networking Sites Good for our Society? • Social networking sites spread information faster than any other media. Over 50% of people learn about breaking news on social media. • Law enforcement uses social networking sites to catch and prosecute criminals. 67% of federal, state, and local law enforcement professionals surveyed think "social media helps solve crimes more quickly.“ • Social networking sites allow people to improve their relationships and make new friends. 70% of adult social networking users visit the sites to connect with friends and family, and increased online communication strengthens relationships. • Social media helps empower business women. Being able to connect on social networking sites gives business women a support group not readily found offline where female CEOs of Fortune 500 companies are outnumbered by male CEOs 15 to 485. • Social media sites help employers find employees and job-seekers find work. 64% of companies are on two or more social networks for recruiting because of the wider pool of applicants and more efficient searching capabilities. • Being a part of a social networking site can increase a person's quality of life and reduce the risk of health problems. Social media can help improve life satisfaction, stroke recovery, memory retention, and overall well-being by providing users with a large social group. • Social networking sites facilitate face-to-face interaction. People use social media to network at in-person events and get to know people before personal, business, and other meetings. • Social networking sites increase voter participation. Facebook users reported they are more likely to vote if they see on social networking sites that their friends did. • Social media facilitates political change. Social networking sites give social movements a quick, no-cost method to organize, disseminate information, and mobilize people. (Egyptian uprising) • Social networking is good for the economy. Social media sites have created a new industry and thousands of jobs in addition to providing new income and sales. Source: http://socialnetworking.procon.org/
  • 57. @NTXISSA Pro & Con Arguments – Are Social Networking Sites Good for our Society? • Social media enables the spread of unreliable and false information. 49.1% of people have heard false news via social media. • Social networking sites lack privacy and expose users to government and corporate intrusions. 13 million users said they had not set or did not know about Facebook's privacy settings and 28% shared all or nearly all of their posts publicly. • Students who are heavy social media users tend to have lower grades. Students who use social media had an average GPA of 3.06 while non-users had an average GPA of 3.82 and students who used social networking sites while studying scored 20% lower on tests. • Social networking sites can lead to stress and offline relationship problems. A University of Edinburgh Business School study found the more Facebook friends a person has, the more stressful the person finds Facebook to use. • Social networking sites entice people to waste time. 40% of 8 to 18 year olds spend 54 minutes a day on social media sites. • Using social media can harm job stability and employment prospects. Job recruiters reported negative reactions to finding profanity (61%), poor spelling or grammar (54%), illegal drugs (78%), sexual content (66%), pictures of or with alcohol (47%), and religious content (26%) on potential employees’ social media pages. • The use of social networking sites is correlated with personality and brain disorders Pathological Internet Use (caused or exacerbated by social networking use) is associated with feelings of loneliness, depression, anxiety and general distress. • Social media causes people to spend less time interacting face-to-face. A Jan. 2012 Center for the Digital Future at the USC Annenberg School study found that the percentage of people reporting less face-to-face time with family in their homes rose from 8% in 2000 to 34% in 2011. • Criminals use social media to commit and promote crimes. Gangs use the sites to recruit younger members, coordinate violent crimes, and threaten other gangs. • Social media can endanger the military and journalists. The US Army notes that checking in with location based services on social networking sites like Foursquare or Facebook could expose sensitive whereabouts and endanger military personnel and operations. • Social networking sites harm employees' productivity. 51% of people aged 25-34 accessed social media while at work. http://socialnetworking.procon.org/
  • 58. @NTXISSA Top 9 Most Common Facebook Scams • Find Out Who Has Been Looking at your Profile: this scam claims that it will show you who has been viewing your profile and who has blocked you from theirs, but none of these apps work because Facebook doesn’t provide such information to developers. • Free Items and Gift Cards: don’t expect to get anything for free just by completing a survey. • New Facebook Features: some apps promise to change your Facebook color or to provide you with a dislike button, but make sure you install them only from trusted and well-known developers. • Free iPads & iPhones: messages stating that you can win a free iPad or iPhone are usually just a thought-out marketing trick. • Free Facebook Credits: basically you shouldn’t trust anything that offers something for free. When it sounds too good to be true, you can be pretty sure it’s a scam, just like free credits for Facebook games like Farmville, Cityville etc. • Breaking News: scammers know that most users will click on a link promising exclusive coverage, so stay alert and if you are not sure, check with online media websites for the story first. • Help, I Need Your Help And Money: if you get a message from a friend saying he has been robbed somewhere abroad and he is left with no phone, passport or money and then asks you for help, beware – his Facebook account has probably been hijacked by scammers. You can verify this also by asking your mutual friends if they received an identical message. • Shocking Headlines and Fake Celebrity Stories: scammers also often use sensational news or false stories with a headline including words like “shocking” because Facebook users tend to share them without verifying the news. • False Privacy Settings: scammers mainly want to get your login details, so make sure to verify messages claiming to be from Facebook security. Even the examples above show that they can look very credible and trustworthy. Source: www.socialbakers.com
  • 59. @NTXISSA Personal Story – Compassion International http://www.compassion.com
  • 60. @NTXISSA Child to Sponsor – Correspondence Process Slow – Two to Three Month Turn-around
  • 61. @NTXISSA I had received these photos through the postal mail
  • 62. @NTXISSA Oh no, this happened in September 2013
  • 63. @NTXISSA What Should I Do if My Sponsored Child Contacts Me Via Facebook? • It probably would save time, but it could also come at the expense of you and your sponsored child’s safety, and this type of communication places the child, family and church partner staff in a difficult situation. • It’s not uncommon for someone who knows a child who is sponsored to create an account on a social networking site and pretend to be the child, to contact the sponsor and ask for money, and to threaten the child’s well-being if money isn’t provided. • We cannot protect you or your sponsored child if we are not involved in the correspondence between you and the child. We also have a responsibility to protect the children from sponsors who don’t have the children’s best interest in mind. • Without being the center of the correspondence process, we also cannot ensure that you don’t inadvertently write something inappropriate or offensive to the child – cross-cultural sensitivities seem to appear out of nowhere, even out of good intentions. Courtesy of Compassion International: http://blog.compassion.com/what-should-i-do-if-my- sponsored-child-contacts-me-via-facebook/#ixzz37TRvUs5A
  • 64. @NTXISSA I was aware and followed the process … • In situations like this, the country office works with the development center staff to remind the child of our guidelines regarding direct contact with sponsors. The center staff also makes sure it was indeed the child who initiated the contact. • If you are contacted by your sponsored child outside of Compassion’s portals (e.g., by phone, e-mail, Facebook, Twitter, etc.), please don’t respond, even to say, “I’m sorry but I can’t talk with you in this manner.” And please let us know about the contact. • If it happens in Facebook or Twitter, please use the site’s “block” feature to block the person from asking you to be their friend. This may sound harsh, but please try to imagine what could happen if these guidelines weren’t in place. Courtesy of Compassion International: http://blog.compassion.com/what-should-i-do-if- my-sponsored-child-contacts-me-via-facebook/#ixzz37TTqF2NI
  • 65. @NTXISSA A safe and happy ending after all ...
  • 67. @NTXISSA The top demographic trends for every major social network – as of February 9, 2015 • Facebook remains the top social network for U.S. teens. Nearly half of teen Facebook users say they're using the site more than last year, and Facebook has more daily teen users than any other social network. • Instagram has edged out Facebook and Twitter in terms of prestige among young users. U.S. teens now describe Instagram as "most important," while Facebook and Twitter lost ground on this measure, according to Piper Jaffray's twice yearly teen survey. The survey also found that 83% of U.S. teens in wealthy households were on Instagram. • LinkedIn is actually more popular than Twitter among U.S. adults. LinkedIn's core demographic are those aged between 30 and 49, i.e. those in the prime of their career-rising years. Not surprisingly, LinkedIn also has a pronounced skew toward well-educated users. • Twitter has begun to lean worryingly toward male users, whereas previously it was a more gender-balanced social network. Pew found that 22% of men use Twitter, while only 15% of women do. • YouTube reaches more adults aged 18 to 34 than any single cable TV network. Nearly half of people in this age group visited YouTube between December 2013 and February 2014, according to Nielsen. It was rated by millennials as the top place to watch content, ahead of digital and TV properties like Facebook and ESPN. • Snapchat is the youngest social network of all. More than six out of 10 Snapchat users are in the 18-to-24 age group, compared to 28% of Instagram users, according to a survey by Informate. Source: http://www.businessinsider.com/2015-social-network-demographic-trends-2015-2#ixzz3UaDz3peV
  • 68. @NTXISSA Why Hackers Love Organizations Who Use Social Media After all, cybercriminals want to get as much information as they can to find a way to spoof your customers. http://www.forbes.com/sites/sungardas/2015/02/24/why-hackers-love-companies-who-use-social-media/ This kind of personalized communication is lethal when combined with social engineering. Hackers know this and will exploit this.
  • 69. @NTXISSA 10 New Social Media Apps to Watch for 2015 • Storehouse: - Have you ever wanted to do more than just share your photos and add text? Storehouse is a new mobile app that addresses that desire. They say it lets you “share your stories as they happen.” • Moment: - Are you trying to spend less time on your phone or mobile device and more time in the real world? Moment helps alert you to how much you actually use your iPhone or iPad by tracking your time spent on your device each day. • Secret: - Ever have something that you absolutely must share on your social network, but just can’t face the consequences of posting it? Secret is your answer, it allows you to share updates anonymously with your friends, and if your friends “love” it by clicking the heart icon, then their friends will see it too. • Everyware: - This app is from a new startup company that is developing a very interesting concept for an app that can serve to replace many other apps on your phone because it can manage special offers or deals, check-ins, mapping to locations, reviews, and appointments or dinner reservations • Wanelo: - The name for this shopping app comes from merging ‘want, need, and love’. There are currently over 11 million users on this new but growing app that features millions of different products from all types of retailers from big brands to Etsy independent sellers • Nudge: - Connects your health to your fitness tracking. It works in conjunction with apps like RunKeeper, Moves, Fitbit, and more and gives you a Nudge Score. • Ibotta: - Is a shopping rebate app that works with 200 of the largest retailers like Walmart, Target, Best Buy, Sephora, and Whole Foods. Next you buy the featured products and verify your purchases by taking a picture of your receipt. Then Ibotta pays you cash to your PayPal or Venmo account or via a gift card. If you join via Facebook, your friends will automatically join your Ibotta team. The more friends, the more bonuses can be earned through teamwork. Bonuses add up to extra cash and are added to the bonus section of the app on a regular basis. • Opoli: Is a competitor app for the more well-known start up Uber where you book a ride via the app. However, the difference with Opoli is the added safety factor. All Opoli drivers are commercially licensed and insured professionals. • SideChef: - If you like to cook but need detailed instructions or are just learning to cook, then SideChef is a great app to help you look like a professional, seasoned chef. If you need coaching, this app does everything for you from providing recipes, audio and visual directions, voice command technology, timers, and even tutorial videos. There are over 1,000 step-by-step recipes on the app including ones from new and notable chefs or food bloggers so you can browse recipes and even add your own to the cookbook. On top of all that, the My Table feature keeps a photo journal of everything you’ve cooked using the app. • Pensoul: - Is a graphic design app and It shows the scale and detail of images at the same time. It can be magnified up to 1 million times without graphic quality deterioration http://www.socialmediatoday.com/content/10-new-social-media-apps-watch-2015
  • 70. @NTXISSA What Comes Next? 5 Social Media Trends for 2015 • Major social networks battle harder for your wallet – Facebook to facilitate money transfers • Niche social networks continue to rise … but will Ello, Yik Yak, tsu … last? • Shopping finally comes to social media – Twitter and Facebook beta-testing “buy” buttons • Smart devices get even smarter, to users’ benefit - thermostats, bathroom scales and refrigerators to wearables like fitness bracelets and smart watches are now collecting data and zapping it off wirelessly to the Internet. • Increasing demand for (truly) private social media gives way to the real thing - anonymous and ephemeral social networks—Snapchat, Secret, Whisper, Yik Yak and Telegram, to name a few—surge in popularity : https://www.linkedin.com/pulse/what-comes-next-5-social-media-trends-2015-ryan-holmes
  • 71. @NTXISSA Be Careful • Use Social Media wisely • Protect Your Identity, Privacy and Reputation Pstyrvoky@yahoo.com QUESTIONS?
  • 72. @NTXISSA@NTXISSA Thank you The Collin College Engineering Department Collin College Student Chapter of the North Texas ISSA North Texas ISSA (Information Systems Security Association) NTX ISSA Cyber Security Conference – April 24-25, 2015 72