SlideShare a Scribd company logo
1 of 23
Download to read offline
The	
  Implica,ons	
  of	
  Social	
  
Media	
  on	
  Campus	
  Safety	
  
and	
  Security	
  
The	
  Role	
  of	
  Social	
  Media	
  Threat	
  Alerts	
  
Dr.	
  Gary	
  J.	
  Margolis	
  
Co-­‐Founder,	
  Margolis	
  Healy	
  
President	
  &	
  CEO,	
  Social	
  Sen,nel,	
  Inc.	
  
2	
  
“We	
  need	
  to	
  understand	
  that	
  kids	
  don’t	
  use	
  
their	
  voices	
  in	
  the	
  same	
  way	
  as	
  they	
  used	
  to	
  –	
  
they	
  turn	
  to	
  social	
  media	
  when	
  they	
  need	
  help,	
  
and	
  we	
  need	
  to	
  be	
  there	
  to	
  hear	
  them.”	
  	
  
	
   	
  Dr.	
  Clayton	
  Wilcox,	
  Superintendent,	
  Washington	
  County	
  Public	
  Schools	
  
(c)2015	
  Social	
  Sen,nel,	
  Inc.	
  
3	
  
 Overview	
  
-  The	
  digital	
  conversa1on	
  –	
  how	
  it	
  is	
  impac,ng	
  safety	
  and	
  
disrup,ng	
  the	
  ability	
  of	
  those	
  charged	
  to	
  protect	
  with	
  
protec,ng?	
  
-  Social	
  media	
  threat	
  alerts	
  -­‐	
  how	
  to	
  incorporate	
  into	
  your	
  
organiza,on	
  to	
  streamline	
  opera,ons	
  and	
  have	
  beZer	
  
insight,	
  oversight,	
  and	
  resource	
  management	
  
-  Public	
  vs.	
  private	
  –	
  how	
  to	
  respect	
  both	
  
4	
  
(c)2015	
  Social	
  Sen,nel,	
  Inc.	
  
5	
  
(c)2015	
  Social	
  Sen,nel,	
  Inc.	
  
6	
  
(c)2015	
  Social	
  Sen,nel,	
  Inc.	
  
7	
  (c)2015	
  Social	
  Sen,nel,	
  Inc.	
  
Popular	
  Social	
  media	
  
8	
  
(c)2015	
  Social	
  Sen,nel,	
  Inc.	
  
9	
  
SOCIAL	
  MEDIA	
  SERVICES	
  
•  70%	
  of	
  Americans	
  who	
  are	
  online	
  
use	
  social	
  networking	
  (Pew	
  Research	
  
Center)	
  
•  More	
  prevalent	
  with	
  people	
  under	
  
50,	
  but	
  growing	
  amongst	
  older…	
  
10	
  
(c)2015	
  Social	
  Sen,nel,	
  Inc.	
  
11	
  
(c)2015	
  Social	
  Sen,nel,	
  Inc.	
  
Why?	
  
•  Public	
  posts	
  can	
  incite	
  others	
  to	
  take	
  ac,on	
  –	
  quickly	
  
•  Gang	
  ac1vity	
  across	
  the	
  US	
  aeer	
  the	
  shoo,ng	
  of	
  a	
  popular	
  rising	
  rapper	
  
•  Nega1ve	
  sen1ment	
  shared	
  at	
  a	
  campus	
  protest	
  quickly	
  incited	
  the	
  crowd	
  
•  Shoo,ng	
  across	
  the	
  street	
  from	
  campus	
  aeer	
  24	
  hours	
  of	
  taun,ng	
  on	
  social	
  
media	
  
•  Private	
  correspondence	
  (e.g.,	
  email,	
  text	
  messages,	
  even	
  some	
  social	
  
media	
  posts)	
  is	
  protected.	
  Peeking	
  behind	
  that	
  curtain	
  is	
  not	
  OK	
  
•  Social	
  media	
  has	
  become	
  an	
  open	
  venue	
  to	
  share	
  chronic	
  mental	
  health	
  
issues	
  
•  There	
  is	
  a	
  duty	
  of	
  care	
  
12	
  
(c)2015	
  Social	
  Sen,nel,	
  Inc.	
  
How	
  SOCIAL	
  MEDIA	
  THREAT	
  service	
  is	
  Used	
  
-  Iden1fy	
  and	
  evaluate	
  the	
  severity	
  of	
  a	
  threat	
  against	
  people,	
  groups,	
  
buildings,	
  and	
  the	
  community	
  at	
  large	
  
-  Gather	
  informa1on	
  to	
  support	
  criminal	
  inves,ga,ons	
  and	
  protect	
  vic,ms	
  and	
  
witnesses	
  
-  Intervene	
  when	
  a	
  person	
  discusses	
  self-­‐directed	
  harm,	
  suicide,	
  or	
  shows	
  signs	
  
of	
  psychological	
  distress	
  
-  Monitor	
  crowd	
  sen1ment	
  at	
  local	
  events	
  or	
  large	
  public	
  gatherings	
  to	
  assist	
  
safety	
  teams	
  and	
  ascertain	
  whether	
  addi,onal	
  public	
  safety	
  support	
  is	
  needed	
  
-  Track	
  ongoing	
  threat	
  cases	
  to	
  protect	
  execu,ves	
  and	
  leadership	
  team	
  
-  Use	
  alert	
  results	
  to	
  corroborate	
  witness	
  accounts	
  
-  Iden1fy	
  viola1ons	
  of	
  trespass	
  no,fica,ons	
  and	
  restraining	
  orders	
  
-  Perform	
  post-­‐incident	
  evalua1ons	
  to	
  assist	
  in	
  inves,ga,ons	
  
13	
  
(c)2015	
  Social	
  Sen,nel,	
  Inc.	
  
14	
  
(c)2015	
  Social	
  Sen,nel,	
  Inc.	
  
15	
  
(c)2015	
  Social	
  Sen,nel,	
  Inc.	
  
64%	
  
Of	
  universi,es	
  and	
  colleges	
  
pay	
  aZen,on	
  to	
  social	
  media	
  
for	
  safety	
  and	
  security	
  in	
  
some	
  way.	
  
2/3	
  of	
  those	
  do	
  so	
  manually…	
  
Margolis	
  Healy	
  /	
  Na,onal	
  Center	
  for	
  Campus	
  Public	
  
Safety	
  2015	
  Campus	
  Safety	
  Survey	
  
16	
  
(c)2015	
  Social	
  Sen,nel,	
  Inc.	
  
A	
  student	
  in	
  trouble	
  
17	
  
You	
  have	
  a	
  student	
  who:	
  
•  Is	
  a	
  15	
  year	
  old	
  freshman	
  
•  Is	
  a	
  wrestler	
  and	
  football	
  player	
  at	
  the	
  school	
  
•  Was	
  recently	
  named	
  the	
  school’s	
  freshman	
  homecoming	
  prince	
  
•  Has	
  been	
  described	
  as	
  being	
  likable	
  and	
  generally	
  happy	
  
•  Was	
  recently	
  suspended	
  from	
  school	
  and	
  the	
  football	
  team	
  for	
  a	
  
fight	
  
There	
  doesn’t	
  seem	
  to	
  be	
  much	
  standing	
  out	
  to	
  you	
  here,	
  right?	
  
(c)2015	
  Social	
  Sen,nel,	
  Inc.	
  
Overlay	
  what	
  He	
  has	
  posted	
  on	
  TwiZer	
  
18	
  
Would	
  you	
  reach	
  out	
  to	
  him	
  and	
  
his	
  family	
  and	
  try	
  to	
  get	
  him	
  some	
  
help	
  if	
  you	
  knew	
  that	
  he	
  said	
  this	
  
on	
  social	
  media?	
  
What	
  if,	
  on	
  that	
  social	
  media	
  
account,	
  there	
  were	
  pictures	
  of	
  
him	
  hun,ng	
  and	
  using	
  rifles?	
  
(c)2015	
  Social	
  Sen,nel,	
  Inc.	
  
What	
  happened	
  
19	
  
Jaylen	
  Fryberg	
  sent	
  a	
  text	
  to	
  several	
  of	
  his	
  friends	
  and	
  two	
  cousins	
  
asking	
  them	
  to	
  join	
  him	
  in	
  the	
  cafeteria	
  at	
  their	
  school.	
  
	
  
According	
  to	
  eyewitnesses,	
  at	
  10:39	
  AM,	
  he	
  approached	
  the	
  table	
  
where	
  his	
  friends	
  were	
  sipng,	
  had	
  a	
  verbal	
  alterca,on	
  with	
  them,	
  
pulled	
  out	
  a	
  .40-­‐caliber	
  BereZa	
  handgun	
  and	
  shot	
  them	
  in	
  “a	
  calm,	
  
methodical	
  way”	
  before	
  killing	
  himself.	
  
	
  
On	
  October	
  24,	
  2014,	
  five	
  children	
  at	
  Marysville	
  Pilchuck	
  High	
  School	
  
lost	
  their	
  lives	
  and	
  another	
  student	
  was	
  seriously	
  injured.	
  
(c)2015	
  Social	
  Sen,nel,	
  Inc.	
  
A	
  student	
  in	
  trouble	
  
20	
  
(c)2015	
  Social	
  Sen,nel,	
  Inc.	
  
Effec,ve	
  Opera,ng	
  Procedures	
  for	
  
Social	
  Media	
  Threat	
  Alert	
  Service	
  
1.  Determine	
  who	
  is	
  authorized	
  to	
  use	
  the	
  system	
  
2.  Define	
  user	
  roles	
  and	
  permissions	
  at	
  the	
  user	
  level	
  
3.  Specify	
  how	
  the	
  service	
  should	
  and	
  should	
  not	
  be	
  
used,	
  and	
  who	
  has	
  oversight	
  
4.  Ensure	
  keywords	
  and	
  phrases	
  that	
  are	
  used	
  are	
  
approved	
  
5.  Define	
  the	
  procedures	
  to	
  follow	
  when	
  an	
  alert	
  is	
  
received	
  
21	
  
(c)2015	
  Social	
  Sen,nel,	
  Inc.	
  
22	
  
SM
www.socialsen,nel.com	
  
(c)2015	
  Social	
  Sen,nel,	
  Inc.	
  
The Implications of Social Media on Campus Safety and Security: The Role of Social Media Threat Alerts

More Related Content

What's hot

Why Colleges and Universities Should Conduct Trauma-Informed Sexual Assault I...
Why Colleges and Universities Should Conduct Trauma-Informed Sexual Assault I...Why Colleges and Universities Should Conduct Trauma-Informed Sexual Assault I...
Why Colleges and Universities Should Conduct Trauma-Informed Sexual Assault I...National Center for Campus Public Safety
 
You Have Options: An Overview of the National Law Enforcement Sexual Assault ...
You Have Options: An Overview of the National Law Enforcement Sexual Assault ...You Have Options: An Overview of the National Law Enforcement Sexual Assault ...
You Have Options: An Overview of the National Law Enforcement Sexual Assault ...National Center for Campus Public Safety
 
Sexual Assault Prevention for Community Colleges Webinar
Sexual Assault Prevention for Community Colleges WebinarSexual Assault Prevention for Community Colleges Webinar
Sexual Assault Prevention for Community Colleges WebinarMaria Candelaria
 
ODF III - 3.15.16 - Day Two Afternoon Sessions
ODF III - 3.15.16 - Day Two Afternoon SessionsODF III - 3.15.16 - Day Two Afternoon Sessions
ODF III - 3.15.16 - Day Two Afternoon SessionsMichael Kerr
 
Margolis Healy Campus Threat Assessment Case Studies: A Training Tool
Margolis Healy Campus Threat Assessment Case Studies: A Training ToolMargolis Healy Campus Threat Assessment Case Studies: A Training Tool
Margolis Healy Campus Threat Assessment Case Studies: A Training ToolMargolis Healy
 
Pr plan (official) 233
Pr plan (official) 233Pr plan (official) 233
Pr plan (official) 233Joi Archie
 
Diminishing the negative_impact_of_hazing_on_our
Diminishing the negative_impact_of_hazing_on_ourDiminishing the negative_impact_of_hazing_on_our
Diminishing the negative_impact_of_hazing_on_ourjoeroachex
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying VarAgg
 
Digital citizenship (cyberbullying)
Digital citizenship (cyberbullying)Digital citizenship (cyberbullying)
Digital citizenship (cyberbullying)amalgarn
 

What's hot (20)

Why Colleges and Universities Should Conduct Trauma-Informed Sexual Assault I...
Why Colleges and Universities Should Conduct Trauma-Informed Sexual Assault I...Why Colleges and Universities Should Conduct Trauma-Informed Sexual Assault I...
Why Colleges and Universities Should Conduct Trauma-Informed Sexual Assault I...
 
Top 5 Challenges with the Clery Act and Title IX
Top 5 Challenges with the Clery Act and Title IXTop 5 Challenges with the Clery Act and Title IX
Top 5 Challenges with the Clery Act and Title IX
 
You Have Options: An Overview of the National Law Enforcement Sexual Assault ...
You Have Options: An Overview of the National Law Enforcement Sexual Assault ...You Have Options: An Overview of the National Law Enforcement Sexual Assault ...
You Have Options: An Overview of the National Law Enforcement Sexual Assault ...
 
Remaining Trauma-Informed in an Era of Changing Title IX Regulations
Remaining Trauma-Informed in an Era of Changing Title IX RegulationsRemaining Trauma-Informed in an Era of Changing Title IX Regulations
Remaining Trauma-Informed in an Era of Changing Title IX Regulations
 
Just in Time: Clery Act Tips Before Fall 2019
Just in Time: Clery Act Tips Before Fall 2019Just in Time: Clery Act Tips Before Fall 2019
Just in Time: Clery Act Tips Before Fall 2019
 
The Importance of Learning from Averted and Completed School Attacks
The Importance of Learning from Averted and Completed School AttacksThe Importance of Learning from Averted and Completed School Attacks
The Importance of Learning from Averted and Completed School Attacks
 
Violence Prevention/De-Escalation of Emotionally Charged Situations
Violence Prevention/De-Escalation of Emotionally Charged SituationsViolence Prevention/De-Escalation of Emotionally Charged Situations
Violence Prevention/De-Escalation of Emotionally Charged Situations
 
Sexual Assault Prevention for Community Colleges Webinar
Sexual Assault Prevention for Community Colleges WebinarSexual Assault Prevention for Community Colleges Webinar
Sexual Assault Prevention for Community Colleges Webinar
 
School Violence Toolkit
School Violence ToolkitSchool Violence Toolkit
School Violence Toolkit
 
Campus Threat Assessment: An In-Depth Expert Q&A
Campus Threat Assessment: An In-Depth Expert Q&ACampus Threat Assessment: An In-Depth Expert Q&A
Campus Threat Assessment: An In-Depth Expert Q&A
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Social Media
Social MediaSocial Media
Social Media
 
Social Media
Social MediaSocial Media
Social Media
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
ODF III - 3.15.16 - Day Two Afternoon Sessions
ODF III - 3.15.16 - Day Two Afternoon SessionsODF III - 3.15.16 - Day Two Afternoon Sessions
ODF III - 3.15.16 - Day Two Afternoon Sessions
 
Margolis Healy Campus Threat Assessment Case Studies: A Training Tool
Margolis Healy Campus Threat Assessment Case Studies: A Training ToolMargolis Healy Campus Threat Assessment Case Studies: A Training Tool
Margolis Healy Campus Threat Assessment Case Studies: A Training Tool
 
Pr plan (official) 233
Pr plan (official) 233Pr plan (official) 233
Pr plan (official) 233
 
Diminishing the negative_impact_of_hazing_on_our
Diminishing the negative_impact_of_hazing_on_ourDiminishing the negative_impact_of_hazing_on_our
Diminishing the negative_impact_of_hazing_on_our
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
 
Digital citizenship (cyberbullying)
Digital citizenship (cyberbullying)Digital citizenship (cyberbullying)
Digital citizenship (cyberbullying)
 

Similar to The Implications of Social Media on Campus Safety and Security: The Role of Social Media Threat Alerts

Digital health and safety
Digital health and safetyDigital health and safety
Digital health and safetyRay Brannon
 
Cyberbullying edc105
Cyberbullying edc105Cyberbullying edc105
Cyberbullying edc105CarolRusch1
 
Media literacy workshop - Media Literacy and digital citizenship
Media literacy workshop - Media Literacy and digital citizenshipMedia literacy workshop - Media Literacy and digital citizenship
Media literacy workshop - Media Literacy and digital citizenshipMarcus Leaning
 
Safeguarding Children & Young People Online
Safeguarding Children & Young People OnlineSafeguarding Children & Young People Online
Safeguarding Children & Young People OnlineClaudia Megele
 
Colorado DHSEM: Understanding Social Media and Using it to Your Advantage
Colorado DHSEM:  Understanding Social Media and Using it to Your AdvantageColorado DHSEM:  Understanding Social Media and Using it to Your Advantage
Colorado DHSEM: Understanding Social Media and Using it to Your AdvantageTrost, Micki
 
SEG AT2 final update
SEG AT2 final updateSEG AT2 final update
SEG AT2 final updateBradyTrotman
 
Social media, Technology, and Youth
Social media, Technology, and YouthSocial media, Technology, and Youth
Social media, Technology, and YouthKhadija Parween
 
Higher Education Social Media for Emergency Management
Higher Education Social Media for Emergency ManagementHigher Education Social Media for Emergency Management
Higher Education Social Media for Emergency ManagementElizabeth King - MHA, MEP
 
Ethical Considerations in the use of Social Media (L. Gelinas)
Ethical Considerations in the use of Social Media (L. Gelinas)Ethical Considerations in the use of Social Media (L. Gelinas)
Ethical Considerations in the use of Social Media (L. Gelinas)Esmeralda Casas-Silva, Ph.D.
 
Eng662 cyber culture_e_poster_dawnboyer
Eng662 cyber culture_e_poster_dawnboyerEng662 cyber culture_e_poster_dawnboyer
Eng662 cyber culture_e_poster_dawnboyerD Boyer Consulting
 
Can excessive use of social media lead to mental illness
Can excessive use of social media lead to mental illnessCan excessive use of social media lead to mental illness
Can excessive use of social media lead to mental illnessHarsh Vardhan
 
Social Media Survival Guide for Public Safety
Social Media Survival Guide for Public SafetySocial Media Survival Guide for Public Safety
Social Media Survival Guide for Public SafetyBrett Hicks
 
Magazine on the PERVENTION OF CYBERBULLYING
Magazine on the PERVENTION OF CYBERBULLYINGMagazine on the PERVENTION OF CYBERBULLYING
Magazine on the PERVENTION OF CYBERBULLYINGJaveriaZain1
 
Social media debate research paper
Social media debate research paperSocial media debate research paper
Social media debate research paperChristopher Swires
 
Social networking and its impact on teenagers pdf
Social networking and its impact on teenagers pdfSocial networking and its impact on teenagers pdf
Social networking and its impact on teenagers pdfJohann Tailor
 
Sean.kenny.film240.flipbook.assignment2
Sean.kenny.film240.flipbook.assignment2Sean.kenny.film240.flipbook.assignment2
Sean.kenny.film240.flipbook.assignment2Sean Kenny
 
Social Media Threat Guidance for School Staff and Authorities .pdf
Social Media Threat Guidance for School Staff and Authorities .pdfSocial Media Threat Guidance for School Staff and Authorities .pdf
Social Media Threat Guidance for School Staff and Authorities .pdfxstokes825
 
Ned workwise-week 4 508
Ned workwise-week 4 508Ned workwise-week 4 508
Ned workwise-week 4 508CASATmedia
 

Similar to The Implications of Social Media on Campus Safety and Security: The Role of Social Media Threat Alerts (20)

final campaign
final campaignfinal campaign
final campaign
 
Digital health and safety
Digital health and safetyDigital health and safety
Digital health and safety
 
Cyberbullying edc105
Cyberbullying edc105Cyberbullying edc105
Cyberbullying edc105
 
Media literacy workshop - Media Literacy and digital citizenship
Media literacy workshop - Media Literacy and digital citizenshipMedia literacy workshop - Media Literacy and digital citizenship
Media literacy workshop - Media Literacy and digital citizenship
 
Safeguarding Children & Young People Online
Safeguarding Children & Young People OnlineSafeguarding Children & Young People Online
Safeguarding Children & Young People Online
 
Colorado DHSEM: Understanding Social Media and Using it to Your Advantage
Colorado DHSEM:  Understanding Social Media and Using it to Your AdvantageColorado DHSEM:  Understanding Social Media and Using it to Your Advantage
Colorado DHSEM: Understanding Social Media and Using it to Your Advantage
 
SEG AT2 final update
SEG AT2 final updateSEG AT2 final update
SEG AT2 final update
 
Social media, Technology, and Youth
Social media, Technology, and YouthSocial media, Technology, and Youth
Social media, Technology, and Youth
 
Higher Education Social Media for Emergency Management
Higher Education Social Media for Emergency ManagementHigher Education Social Media for Emergency Management
Higher Education Social Media for Emergency Management
 
Ethical Considerations in the use of Social Media (L. Gelinas)
Ethical Considerations in the use of Social Media (L. Gelinas)Ethical Considerations in the use of Social Media (L. Gelinas)
Ethical Considerations in the use of Social Media (L. Gelinas)
 
Eng662 cyber culture_e_poster_dawnboyer
Eng662 cyber culture_e_poster_dawnboyerEng662 cyber culture_e_poster_dawnboyer
Eng662 cyber culture_e_poster_dawnboyer
 
Can excessive use of social media lead to mental illness
Can excessive use of social media lead to mental illnessCan excessive use of social media lead to mental illness
Can excessive use of social media lead to mental illness
 
Social Media Survival Guide for Public Safety
Social Media Survival Guide for Public SafetySocial Media Survival Guide for Public Safety
Social Media Survival Guide for Public Safety
 
2010 Census PR Plan
2010 Census PR Plan2010 Census PR Plan
2010 Census PR Plan
 
Magazine on the PERVENTION OF CYBERBULLYING
Magazine on the PERVENTION OF CYBERBULLYINGMagazine on the PERVENTION OF CYBERBULLYING
Magazine on the PERVENTION OF CYBERBULLYING
 
Social media debate research paper
Social media debate research paperSocial media debate research paper
Social media debate research paper
 
Social networking and its impact on teenagers pdf
Social networking and its impact on teenagers pdfSocial networking and its impact on teenagers pdf
Social networking and its impact on teenagers pdf
 
Sean.kenny.film240.flipbook.assignment2
Sean.kenny.film240.flipbook.assignment2Sean.kenny.film240.flipbook.assignment2
Sean.kenny.film240.flipbook.assignment2
 
Social Media Threat Guidance for School Staff and Authorities .pdf
Social Media Threat Guidance for School Staff and Authorities .pdfSocial Media Threat Guidance for School Staff and Authorities .pdf
Social Media Threat Guidance for School Staff and Authorities .pdf
 
Ned workwise-week 4 508
Ned workwise-week 4 508Ned workwise-week 4 508
Ned workwise-week 4 508
 

More from National Center for Campus Public Safety

Adaptive Continuity Planning: What the Industry Can Learn from Case Studies i...
Adaptive Continuity Planning: What the Industry Can Learn from Case Studies i...Adaptive Continuity Planning: What the Industry Can Learn from Case Studies i...
Adaptive Continuity Planning: What the Industry Can Learn from Case Studies i...National Center for Campus Public Safety
 
Understanding How the REMS TA Center Supports Institutions of Higher Education
Understanding How the REMS TA Center Supports Institutions of Higher EducationUnderstanding How the REMS TA Center Supports Institutions of Higher Education
Understanding How the REMS TA Center Supports Institutions of Higher EducationNational Center for Campus Public Safety
 
Findings of the 2016 National Higher Education Emergency Management Program N...
Findings of the 2016 National Higher Education Emergency Management Program N...Findings of the 2016 National Higher Education Emergency Management Program N...
Findings of the 2016 National Higher Education Emergency Management Program N...National Center for Campus Public Safety
 

More from National Center for Campus Public Safety (16)

Get to Know SEVP: An Introduction to Working with International Students
Get to Know SEVP: An Introduction to Working with International StudentsGet to Know SEVP: An Introduction to Working with International Students
Get to Know SEVP: An Introduction to Working with International Students
 
Adaptive Continuity Planning: What the Industry Can Learn from Case Studies i...
Adaptive Continuity Planning: What the Industry Can Learn from Case Studies i...Adaptive Continuity Planning: What the Industry Can Learn from Case Studies i...
Adaptive Continuity Planning: What the Industry Can Learn from Case Studies i...
 
Reunification Planning: The Next Step
Reunification Planning: The Next StepReunification Planning: The Next Step
Reunification Planning: The Next Step
 
Unmanned Aircraft Systems on Campus
Unmanned Aircraft Systems on CampusUnmanned Aircraft Systems on Campus
Unmanned Aircraft Systems on Campus
 
Next Steps for Campus Threat Assessment Teams
Next Steps for Campus Threat Assessment TeamsNext Steps for Campus Threat Assessment Teams
Next Steps for Campus Threat Assessment Teams
 
Hazing Prevention: A Call to Action
Hazing Prevention: A Call to ActionHazing Prevention: A Call to Action
Hazing Prevention: A Call to Action
 
Human Trafficking: What Your Campus Needs to Know
Human Trafficking: What Your Campus Needs to KnowHuman Trafficking: What Your Campus Needs to Know
Human Trafficking: What Your Campus Needs to Know
 
The Nationwide Suspicious Activity Reporting (SAR) Initiative (NSI)
The Nationwide Suspicious Activity Reporting (SAR) Initiative (NSI)The Nationwide Suspicious Activity Reporting (SAR) Initiative (NSI)
The Nationwide Suspicious Activity Reporting (SAR) Initiative (NSI)
 
Understanding How the REMS TA Center Supports Institutions of Higher Education
Understanding How the REMS TA Center Supports Institutions of Higher EducationUnderstanding How the REMS TA Center Supports Institutions of Higher Education
Understanding How the REMS TA Center Supports Institutions of Higher Education
 
Handling Threats and Other Disturbing Behavior on Campus
Handling Threats and Other Disturbing Behavior on CampusHandling Threats and Other Disturbing Behavior on Campus
Handling Threats and Other Disturbing Behavior on Campus
 
Legalization of Marijuana: Challenges Facing College Campuses
Legalization of Marijuana: Challenges Facing College CampusesLegalization of Marijuana: Challenges Facing College Campuses
Legalization of Marijuana: Challenges Facing College Campuses
 
Bystander Intervention in Action: Training the How-Tos of Intervention
Bystander Intervention in Action: Training the How-Tos of InterventionBystander Intervention in Action: Training the How-Tos of Intervention
Bystander Intervention in Action: Training the How-Tos of Intervention
 
Building and Assessing Your Physical Security Program
Building and Assessing Your Physical Security ProgramBuilding and Assessing Your Physical Security Program
Building and Assessing Your Physical Security Program
 
Designing Safety on Higher Ed Campuses: A CPTED Primer
Designing Safety on Higher Ed Campuses: A CPTED PrimerDesigning Safety on Higher Ed Campuses: A CPTED Primer
Designing Safety on Higher Ed Campuses: A CPTED Primer
 
Business Continuity: Getting Your Ducks in a Row
Business Continuity: Getting Your Ducks in a RowBusiness Continuity: Getting Your Ducks in a Row
Business Continuity: Getting Your Ducks in a Row
 
Findings of the 2016 National Higher Education Emergency Management Program N...
Findings of the 2016 National Higher Education Emergency Management Program N...Findings of the 2016 National Higher Education Emergency Management Program N...
Findings of the 2016 National Higher Education Emergency Management Program N...
 

Recently uploaded

POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 

Recently uploaded (20)

POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 

The Implications of Social Media on Campus Safety and Security: The Role of Social Media Threat Alerts

  • 1.
  • 2. The  Implica,ons  of  Social   Media  on  Campus  Safety   and  Security   The  Role  of  Social  Media  Threat  Alerts   Dr.  Gary  J.  Margolis   Co-­‐Founder,  Margolis  Healy   President  &  CEO,  Social  Sen,nel,  Inc.   2  
  • 3. “We  need  to  understand  that  kids  don’t  use   their  voices  in  the  same  way  as  they  used  to  –   they  turn  to  social  media  when  they  need  help,   and  we  need  to  be  there  to  hear  them.”        Dr.  Clayton  Wilcox,  Superintendent,  Washington  County  Public  Schools   (c)2015  Social  Sen,nel,  Inc.   3  
  • 4.  Overview   -  The  digital  conversa1on  –  how  it  is  impac,ng  safety  and   disrup,ng  the  ability  of  those  charged  to  protect  with   protec,ng?   -  Social  media  threat  alerts  -­‐  how  to  incorporate  into  your   organiza,on  to  streamline  opera,ons  and  have  beZer   insight,  oversight,  and  resource  management   -  Public  vs.  private  –  how  to  respect  both   4   (c)2015  Social  Sen,nel,  Inc.  
  • 5. 5   (c)2015  Social  Sen,nel,  Inc.  
  • 6. 6   (c)2015  Social  Sen,nel,  Inc.  
  • 7. 7  (c)2015  Social  Sen,nel,  Inc.  
  • 8. Popular  Social  media   8   (c)2015  Social  Sen,nel,  Inc.  
  • 10. SOCIAL  MEDIA  SERVICES   •  70%  of  Americans  who  are  online   use  social  networking  (Pew  Research   Center)   •  More  prevalent  with  people  under   50,  but  growing  amongst  older…   10   (c)2015  Social  Sen,nel,  Inc.  
  • 11. 11   (c)2015  Social  Sen,nel,  Inc.  
  • 12. Why?   •  Public  posts  can  incite  others  to  take  ac,on  –  quickly   •  Gang  ac1vity  across  the  US  aeer  the  shoo,ng  of  a  popular  rising  rapper   •  Nega1ve  sen1ment  shared  at  a  campus  protest  quickly  incited  the  crowd   •  Shoo,ng  across  the  street  from  campus  aeer  24  hours  of  taun,ng  on  social   media   •  Private  correspondence  (e.g.,  email,  text  messages,  even  some  social   media  posts)  is  protected.  Peeking  behind  that  curtain  is  not  OK   •  Social  media  has  become  an  open  venue  to  share  chronic  mental  health   issues   •  There  is  a  duty  of  care   12   (c)2015  Social  Sen,nel,  Inc.  
  • 13. How  SOCIAL  MEDIA  THREAT  service  is  Used   -  Iden1fy  and  evaluate  the  severity  of  a  threat  against  people,  groups,   buildings,  and  the  community  at  large   -  Gather  informa1on  to  support  criminal  inves,ga,ons  and  protect  vic,ms  and   witnesses   -  Intervene  when  a  person  discusses  self-­‐directed  harm,  suicide,  or  shows  signs   of  psychological  distress   -  Monitor  crowd  sen1ment  at  local  events  or  large  public  gatherings  to  assist   safety  teams  and  ascertain  whether  addi,onal  public  safety  support  is  needed   -  Track  ongoing  threat  cases  to  protect  execu,ves  and  leadership  team   -  Use  alert  results  to  corroborate  witness  accounts   -  Iden1fy  viola1ons  of  trespass  no,fica,ons  and  restraining  orders   -  Perform  post-­‐incident  evalua1ons  to  assist  in  inves,ga,ons   13   (c)2015  Social  Sen,nel,  Inc.  
  • 14. 14   (c)2015  Social  Sen,nel,  Inc.  
  • 15. 15   (c)2015  Social  Sen,nel,  Inc.  
  • 16. 64%   Of  universi,es  and  colleges   pay  aZen,on  to  social  media   for  safety  and  security  in   some  way.   2/3  of  those  do  so  manually…   Margolis  Healy  /  Na,onal  Center  for  Campus  Public   Safety  2015  Campus  Safety  Survey   16   (c)2015  Social  Sen,nel,  Inc.  
  • 17. A  student  in  trouble   17   You  have  a  student  who:   •  Is  a  15  year  old  freshman   •  Is  a  wrestler  and  football  player  at  the  school   •  Was  recently  named  the  school’s  freshman  homecoming  prince   •  Has  been  described  as  being  likable  and  generally  happy   •  Was  recently  suspended  from  school  and  the  football  team  for  a   fight   There  doesn’t  seem  to  be  much  standing  out  to  you  here,  right?   (c)2015  Social  Sen,nel,  Inc.  
  • 18. Overlay  what  He  has  posted  on  TwiZer   18   Would  you  reach  out  to  him  and   his  family  and  try  to  get  him  some   help  if  you  knew  that  he  said  this   on  social  media?   What  if,  on  that  social  media   account,  there  were  pictures  of   him  hun,ng  and  using  rifles?   (c)2015  Social  Sen,nel,  Inc.  
  • 19. What  happened   19   Jaylen  Fryberg  sent  a  text  to  several  of  his  friends  and  two  cousins   asking  them  to  join  him  in  the  cafeteria  at  their  school.     According  to  eyewitnesses,  at  10:39  AM,  he  approached  the  table   where  his  friends  were  sipng,  had  a  verbal  alterca,on  with  them,   pulled  out  a  .40-­‐caliber  BereZa  handgun  and  shot  them  in  “a  calm,   methodical  way”  before  killing  himself.     On  October  24,  2014,  five  children  at  Marysville  Pilchuck  High  School   lost  their  lives  and  another  student  was  seriously  injured.   (c)2015  Social  Sen,nel,  Inc.  
  • 20. A  student  in  trouble   20   (c)2015  Social  Sen,nel,  Inc.  
  • 21. Effec,ve  Opera,ng  Procedures  for   Social  Media  Threat  Alert  Service   1.  Determine  who  is  authorized  to  use  the  system   2.  Define  user  roles  and  permissions  at  the  user  level   3.  Specify  how  the  service  should  and  should  not  be   used,  and  who  has  oversight   4.  Ensure  keywords  and  phrases  that  are  used  are   approved   5.  Define  the  procedures  to  follow  when  an  alert  is   received   21   (c)2015  Social  Sen,nel,  Inc.  
  • 22. 22   SM www.socialsen,nel.com   (c)2015  Social  Sen,nel,  Inc.