SlideShare ist ein Scribd-Unternehmen logo
1 von 28
Web 2.0, Social
Media and
Internet Safety
Presentation by: Kim Cullom
http://www.sxc.hu/browse.phtml?f=download&id=1353782
http://images.cdn.
fotopedia.com/flic
kr-2386230724-
original.jpg
Web 2.0?




  http://www.sxc.hu/browse.phtml?f=download&id=1218115
Examples

 Social   Networks
 Blogs
 Video,Image and Media Sharing
 RSS Feeds
http://www.youtube.com/watch?v=ZQzsQkMFgHE&f
eature=related
What’s the lure?
1.   Have as many friends/followers as possible

2.   Self-promotion/advertising

3.   New way of interacting

4.   Rediscover people
Digital Dangers
 Inappropriate   Contact

 Inappropriate   Content

 Inappropriate   Conduct




    http://www.sxc.hu/browse.phtml?f=download&id=1381198
Privacy?

http://www.sxc.hu/brow
se.phtml?f=download&id=
839252
College Student Beliefs in Privacy




   http://www.sxc.hu/browse.phtml?f=download&id=1193228
Broadcasting

  http://www.sxc.hu/brow
  se.phtml?f=download&id=
  1020178
Viral Content




http://www.youtube.com/watch?v=bEkyP4A_4sQ&feature=related
Digital Footprint




http://www.sxc.hu/browse.phtml?f=download&id=1269420
Online Reputation
50%
45%                          Americans Not
40%                          Concerned
35%
30%
25%                          College
20%                          Admission/Hu
15%                          man Resources
                             Always
10%
 5%                          College
 0%                          Admission/Hu
                             man Resources
      Perception of Online   Most of Time
          Reputation
Online Reputation and Job
90%
80%
70%
60%                 Rejected
50%
40%                 Americans who
                    Believe
30%
                    Positive Imact
20%
10%
 0%
       Job Impact
Now what?



ClipArt Gallery
Social Media Ethics
1.   Public vs Private

2.   Can vs Should

3.   Conjoined Identities

4.   Cause Harm

5.   Golden Rule
http://www.youtube.com/watch?v=tH2Pk5fTzWs
Managing Digital Footprint
 SearchEngines
 Evaluate Reputation




                        http://www.sxc.h
                        u/browse.phtml?f
                        =download&id=1
                        269420
Protect Reputation
 Think
 Golden  Rule
 Vigilant




http://www.sxc.hu/browse.pht
ml?f=download&id=1383270
Restore
   Act   Quickly!




http://www.sxc.hu/brow
se.phtml?f=download&id=
950851
Safely Use Social Networks
1.   Use caution with links

2.   Don’t trust sender of message

3.   Do not allow to scan address books

4.   Type or bookmark address
Safely Use Social Networks
5.   Be selective about friends

6.   Choose carefully

7.   Assume everything is permanent

8.   Think twice before access at work
Is there a place?
Something to Think About




http://www.youtube.com/watch?feature=player_embedded&v=aDy
cZH0CA4I#!
Works Cited
   11 Tips for Social Networking Safety. Microsoft. n.d. Web. 19 Mar. 2012.
    <http://www.microsoft.com/security/online-privacy/social-networking.aspx>.
   Careless, James. “Social Media: It Does Have a Place in the Classroom. “ Tech & Learning.
    32.7. (Feb. 2012). 43-46. Print.
   Carrick, Damien. “Social Media and Privacy.” Law Report: Separate Stories Podcast. ABC
    Radio National. 28 Feb. 2012. MP3 file. 15 Mar 2012.
   Cross-Tab Marketing Services. “Data Privacy Day: Perceptions Study.” Trustworthy
    Computing Group, Miscrosoft. Jan 2010. Microsoft PowerPoint File. 15 Mar 2012.
    <http://www.microsoft.com/security/resources/research.aspx#social>.
   “Digital footprint.” Webopedia. ITBusinessEdge, QuinStreet, Inc. Web. 15 Mar. 2012.
    <http://www.webopedia.com/TERM/D/digital_footprint.html>.
   Englishnationalopera. “Can I Be Your Friend.” YouTube. 8 Jun. 2011. Web. 24 Mar. 2012.
    <http://www.youtube.com/watch?feature=player_embedded&v=aDycZH0CA4I#!>.
   Frugal Dad. Wrestling Online Privacy. 2011. Infographic. The Under Cover Recruiter. Web. 19 Mar 2012.
    <http://theundercoverrecruiter.com/content/infographic-how-social-media-online-privacy-risk-you>.
   Gallagher, Frank. “Hand in Hand: Media Literacy and Internet Safety.” Library Media
    Connection. 29.4 (Jan./Feb. 2011): 16-18. Print.
Works Cited
   Kgiannas1389. “Racist Teens Ousted.” YouTube. 16 Feb 2012. Web. 14 Mar. 2012.
    <http://www.youtube.com/watch?v=bEkyP4A_4sQ&feature=related>.
   McMillian, David. “How to Ruin Your Life in 14 Minutes: or Why We Need to Have a Serious
    Disucssion About Social Media Ethics” ThoughtCatalog. ThoughtCatalog. 23 Feb 2012. Web. 14 Mar
    2012. <http://thoughtcatalog.com/2012/how-to-ruin-your-life-in-14-minutes-or-why-we-need-a-
    serious-conversation-about-the-ethics-of-social-media/>.
   Popkin, Helen A.S. “7 Signs We’re Living in the Post Privacy Era.” Posted in Technolog. MSNBC.
    Com Tech. n.d. Web. 14 Mar 2012.
    <http://www.technolog.msnbc.msn.com/technology/technolog/7-signs-were-living-post-privacy-
    era-118087>.
   Roesler, Kelly. “Privacy Issues with Web 2.0.” Social Issues Firsthand: Web 2.0. Ed. Laurie Willis.
    Farmington Hills: Greenhaven Press, 2009. 47-53. Print.
   Socialmediaboost. “Social Media Revolution 2012 (Socialnomics 3).” YouTube. 11 Jan. 2012. Web. 6
    Mar. 2012. <http://www.youtube.com/watch?v=ZQzsQkMFgHE&feature=related>.
   Take Charge of Your Online Reputation. Microsoft. n.d. PDF. 24 Mar. 2012.
    <http://www.microsoft.com/security/online-privacy/social-networking.aspx>.
   Ventura, Paul M. “What is Web 2.0 and What Are Some Web 2.0 Examples?” EzineArticles.com.
    EzineArticles. 3 Oct 2011. Web. 13 Mar 2012. <http://ezinearticles.com/?What-Is-Web-2.0-and-
    What-Are-Some-Web-2.0-Examples?&id=6602854>.
   “Web 2.0." Collins English Dictionary - Complete & Unabridged 10th Edition. HarperCollins Publishers.
    13 Mar. 2012.<http://dictionary.reference.com/browse/web 2.0>.
Images
   Andreyutzu. Time. 2008. Photograph. Stock.xchang, Getty Images. Web 31 Mar. 2012.
    <http://www.sxc.hu/browse.phtml?f=download&id=950851>.
   Axonite. Hardware Circuits 4. 2009. Photograph. stock.xchang, Getty Images. Web. 6 Mar 2012.
    <http://www.sxc.hu/browse.phtml?f=download&id=1218115>.
   ColinBroug. Footsteps 2. 2010. Photograph. Stock.xchang, Getty Images. Web. 31 Mar. 2012.
    <http://www.sxc.hu/browse.phtml?f=download&id=1269420>.
   Da Silva, Frank. My Cyber Social Map. NA. Photograph. fotopedia, flickr. Web. 6 Mar 2012.
    <http://images.cdn.fotopedia.com/flickr-2386230724-original.jpg>.
   Daxmac. Danger sign. 2012. Photograph. stock.xchang, Getty Images. Web. 13 Mar. 2012.
    <http://www.sxc.hu/browse.phtml?f=download&id=1381198>.
   GretheB. Cobweb 2. 2011. Photograph. stock.exchang, Getty Images. Web. 6 Mar 2012.
    <http://www.sxc.hu/browse.phtml?f=download&id=1353782>.
   Igoghost. Doodled Desks 2. 2009. Photograph. Stock.xchang, Getty Images. Web. 31 Mar. 2012.
    <http://www.sxc.hu/browse.phtml?f=download&id=1193228>/
   Ischerer. Televosion Tower. 2008. Photograph. Stock.xchang, Getty Images. Web. 13 Mar. 2012.
    <http://www.sxc.hu/browse.phtml?f=download&id=1020178>.
   KateKrav. Door Locker with Chain. 2012. Photograph. Stock.xchang, Getty Images. Web 31 Mar.
    2012. <http://www.sxc.hu/browse.phtml?f=download&id=1383270>.
   Pascal79. Do Not Disturb. 2007. Photograph. Stock.xchang, Getty Images. Web. 31 Mar. 2012.
    <http://www.sxc.hu/browse.phtml?f=download&id=839252>.

Weitere ähnliche Inhalte

Was ist angesagt?

UMASL Search Like a Pro
UMASL Search Like a ProUMASL Search Like a Pro
UMASL Search Like a Probsdesantis
 
Learning & Web 2.0: It's all about Play!
Learning & Web 2.0:  It's all about Play!Learning & Web 2.0:  It's all about Play!
Learning & Web 2.0: It's all about Play!hblowers
 
Influence, Reputation and DigiCred: Do you have it?
Influence, Reputation and DigiCred: Do you have it?Influence, Reputation and DigiCred: Do you have it?
Influence, Reputation and DigiCred: Do you have it?robin fay
 
The future of the web
The future of the webThe future of the web
The future of the webEmily Barney
 
Digital Footprint and Social Media Impact on Time Management
Digital Footprint and Social Media Impact on Time ManagementDigital Footprint and Social Media Impact on Time Management
Digital Footprint and Social Media Impact on Time ManagementDr. Michael England
 
C.ong final 523
C.ong final 523C.ong final 523
C.ong final 523cmgw64
 
Hollywood and the power of myth zuckerberg jobs and hearst
Hollywood and the power of myth zuckerberg jobs and hearstHollywood and the power of myth zuckerberg jobs and hearst
Hollywood and the power of myth zuckerberg jobs and hearstÄĥŸäń Pegason
 
Leveraging Online Social Networking For Business
Leveraging Online Social Networking For BusinessLeveraging Online Social Networking For Business
Leveraging Online Social Networking For BusinessMicheal Axelsen
 
Online Colaboration & Digital citizenship
Online Colaboration & Digital citizenshipOnline Colaboration & Digital citizenship
Online Colaboration & Digital citizenshipSonya Engelen
 
Job Seeker's Guide to the Internet
Job Seeker's Guide to the InternetJob Seeker's Guide to the Internet
Job Seeker's Guide to the Internettcellsworth
 
Developing you public research profile
Developing you public research profile Developing you public research profile
Developing you public research profile Anna Jenkin
 
Bridging the digital divide: How schools can prepare students to be good digi...
Bridging the digital divide: How schools can prepare students to be good digi...Bridging the digital divide: How schools can prepare students to be good digi...
Bridging the digital divide: How schools can prepare students to be good digi...williamslibrary
 
Searching and Evaluating the Web (General)
Searching and Evaluating the Web (General)Searching and Evaluating the Web (General)
Searching and Evaluating the Web (General)stonca01
 
Should Social Media Be Regulated?
Should Social Media Be Regulated?Should Social Media Be Regulated?
Should Social Media Be Regulated?Andy Piper
 

Was ist angesagt? (20)

UMASL Search Like a Pro
UMASL Search Like a ProUMASL Search Like a Pro
UMASL Search Like a Pro
 
Learning & Web 2.0: It's all about Play!
Learning & Web 2.0:  It's all about Play!Learning & Web 2.0:  It's all about Play!
Learning & Web 2.0: It's all about Play!
 
Influence, Reputation and DigiCred: Do you have it?
Influence, Reputation and DigiCred: Do you have it?Influence, Reputation and DigiCred: Do you have it?
Influence, Reputation and DigiCred: Do you have it?
 
The future of the web
The future of the webThe future of the web
The future of the web
 
Web 2.0 Playground
Web 2.0 PlaygroundWeb 2.0 Playground
Web 2.0 Playground
 
Web 2.0 in Law Libraries
Web 2.0 in Law LibrariesWeb 2.0 in Law Libraries
Web 2.0 in Law Libraries
 
Digital Footprint and Social Media Impact on Time Management
Digital Footprint and Social Media Impact on Time ManagementDigital Footprint and Social Media Impact on Time Management
Digital Footprint and Social Media Impact on Time Management
 
Web 2.0 Presentation
Web 2.0 PresentationWeb 2.0 Presentation
Web 2.0 Presentation
 
Cilip08
Cilip08Cilip08
Cilip08
 
Online 1207
Online 1207Online 1207
Online 1207
 
C.ong final 523
C.ong final 523C.ong final 523
C.ong final 523
 
Hollywood and the power of myth zuckerberg jobs and hearst
Hollywood and the power of myth zuckerberg jobs and hearstHollywood and the power of myth zuckerberg jobs and hearst
Hollywood and the power of myth zuckerberg jobs and hearst
 
Leveraging Online Social Networking For Business
Leveraging Online Social Networking For BusinessLeveraging Online Social Networking For Business
Leveraging Online Social Networking For Business
 
Online Colaboration & Digital citizenship
Online Colaboration & Digital citizenshipOnline Colaboration & Digital citizenship
Online Colaboration & Digital citizenship
 
Job Seeker's Guide to the Internet
Job Seeker's Guide to the InternetJob Seeker's Guide to the Internet
Job Seeker's Guide to the Internet
 
Developing you public research profile
Developing you public research profile Developing you public research profile
Developing you public research profile
 
Bridging the digital divide: How schools can prepare students to be good digi...
Bridging the digital divide: How schools can prepare students to be good digi...Bridging the digital divide: How schools can prepare students to be good digi...
Bridging the digital divide: How schools can prepare students to be good digi...
 
E-Reputation
E-ReputationE-Reputation
E-Reputation
 
Searching and Evaluating the Web (General)
Searching and Evaluating the Web (General)Searching and Evaluating the Web (General)
Searching and Evaluating the Web (General)
 
Should Social Media Be Regulated?
Should Social Media Be Regulated?Should Social Media Be Regulated?
Should Social Media Be Regulated?
 

Ähnlich wie Web 2.0, Social Media and Internet Safety Final

Social networks and professionalism
Social networks and professionalismSocial networks and professionalism
Social networks and professionalismKaren Brooks
 
Chapter 5 Groups & Networks
Chapter 5  Groups & NetworksChapter 5  Groups & Networks
Chapter 5 Groups & NetworksRay Brannon
 
Chapter 5 Groups & Networks
Chapter 5  Groups & NetworksChapter 5  Groups & Networks
Chapter 5 Groups & NetworksRay Brannon
 
Chapter 5 Groups & Networks
Chapter 5  Groups & NetworksChapter 5  Groups & Networks
Chapter 5 Groups & NetworksRay Brannon
 
Challenging Web 2.0
Challenging Web 2.0Challenging Web 2.0
Challenging Web 2.0Roland Alton
 
University of Limerick (Training Session, June)
University of Limerick (Training Session, June)University of Limerick (Training Session, June)
University of Limerick (Training Session, June)Bex Lewis
 
Digital citizenship josti
Digital citizenship jostiDigital citizenship josti
Digital citizenship jostiSandy Munnell
 
Socialmediaandweb2.0
Socialmediaandweb2.0Socialmediaandweb2.0
Socialmediaandweb2.0shwetanema
 
Join the Secret Revolution
Join the Secret RevolutionJoin the Secret Revolution
Join the Secret RevolutionAlan Levine
 
Using social media as a business tool
Using social media as a business toolUsing social media as a business tool
Using social media as a business toolKeith De La Rue
 
A Corporate Approach To Social Media - by Jos Schuurmans / Cluetail
A Corporate Approach To Social Media - by Jos Schuurmans / CluetailA Corporate Approach To Social Media - by Jos Schuurmans / Cluetail
A Corporate Approach To Social Media - by Jos Schuurmans / CluetailJos Schuurmans
 
Web 2.0: What's the Buzz?
Web 2.0: What's the Buzz?Web 2.0: What's the Buzz?
Web 2.0: What's the Buzz?Julia Parra
 
Youth & Social Media, Oasis College 2013
Youth & Social Media, Oasis College 2013Youth & Social Media, Oasis College 2013
Youth & Social Media, Oasis College 2013Bex Lewis
 
Future of social networking group project
Future of social networking   group projectFuture of social networking   group project
Future of social networking group projectbulgarej
 
Finding & Filtering Online Resources
Finding & Filtering Online ResourcesFinding & Filtering Online Resources
Finding & Filtering Online ResourcesBarbara Lindsey
 
Socialmediaandweb2.0
Socialmediaandweb2.0Socialmediaandweb2.0
Socialmediaandweb2.0shwetanema
 
Herramientas 2.0 para comunicar la actividad científica
Herramientas 2.0 para comunicar la actividad científicaHerramientas 2.0 para comunicar la actividad científica
Herramientas 2.0 para comunicar la actividad científicaXavier Lasauca i Cisa
 
Social media marketing
Social media marketing Social media marketing
Social media marketing Robin Teigland
 

Ähnlich wie Web 2.0, Social Media and Internet Safety Final (20)

Social networks and professionalism
Social networks and professionalismSocial networks and professionalism
Social networks and professionalism
 
Don\'t Be A Twit
Don\'t Be A TwitDon\'t Be A Twit
Don\'t Be A Twit
 
Chapter 5 Groups & Networks
Chapter 5  Groups & NetworksChapter 5  Groups & Networks
Chapter 5 Groups & Networks
 
Chapter 5 Groups & Networks
Chapter 5  Groups & NetworksChapter 5  Groups & Networks
Chapter 5 Groups & Networks
 
Chapter 5 Groups & Networks
Chapter 5  Groups & NetworksChapter 5  Groups & Networks
Chapter 5 Groups & Networks
 
Challenging Web 2.0
Challenging Web 2.0Challenging Web 2.0
Challenging Web 2.0
 
University of Limerick (Training Session, June)
University of Limerick (Training Session, June)University of Limerick (Training Session, June)
University of Limerick (Training Session, June)
 
Digital citizenship josti
Digital citizenship jostiDigital citizenship josti
Digital citizenship josti
 
Socialmediaandweb2.0
Socialmediaandweb2.0Socialmediaandweb2.0
Socialmediaandweb2.0
 
Join the Secret Revolution
Join the Secret RevolutionJoin the Secret Revolution
Join the Secret Revolution
 
Using social media as a business tool
Using social media as a business toolUsing social media as a business tool
Using social media as a business tool
 
A Corporate Approach To Social Media - by Jos Schuurmans / Cluetail
A Corporate Approach To Social Media - by Jos Schuurmans / CluetailA Corporate Approach To Social Media - by Jos Schuurmans / Cluetail
A Corporate Approach To Social Media - by Jos Schuurmans / Cluetail
 
Web 2.0: What's the Buzz?
Web 2.0: What's the Buzz?Web 2.0: What's the Buzz?
Web 2.0: What's the Buzz?
 
Youth & Social Media, Oasis College 2013
Youth & Social Media, Oasis College 2013Youth & Social Media, Oasis College 2013
Youth & Social Media, Oasis College 2013
 
Future of social networking group project
Future of social networking   group projectFuture of social networking   group project
Future of social networking group project
 
Finding & Filtering Online Resources
Finding & Filtering Online ResourcesFinding & Filtering Online Resources
Finding & Filtering Online Resources
 
Digital stomping ground
Digital stomping groundDigital stomping ground
Digital stomping ground
 
Socialmediaandweb2.0
Socialmediaandweb2.0Socialmediaandweb2.0
Socialmediaandweb2.0
 
Herramientas 2.0 para comunicar la actividad científica
Herramientas 2.0 para comunicar la actividad científicaHerramientas 2.0 para comunicar la actividad científica
Herramientas 2.0 para comunicar la actividad científica
 
Social media marketing
Social media marketing Social media marketing
Social media marketing
 

Kürzlich hochgeladen

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 

Kürzlich hochgeladen (20)

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 

Web 2.0, Social Media and Internet Safety Final

  • 1. Web 2.0, Social Media and Internet Safety Presentation by: Kim Cullom
  • 4. Web 2.0? http://www.sxc.hu/browse.phtml?f=download&id=1218115
  • 5. Examples  Social Networks  Blogs  Video,Image and Media Sharing  RSS Feeds
  • 7. What’s the lure? 1. Have as many friends/followers as possible 2. Self-promotion/advertising 3. New way of interacting 4. Rediscover people
  • 8. Digital Dangers  Inappropriate Contact  Inappropriate Content  Inappropriate Conduct http://www.sxc.hu/browse.phtml?f=download&id=1381198
  • 10. College Student Beliefs in Privacy http://www.sxc.hu/browse.phtml?f=download&id=1193228
  • 11. Broadcasting http://www.sxc.hu/brow se.phtml?f=download&id= 1020178
  • 14. Online Reputation 50% 45% Americans Not 40% Concerned 35% 30% 25% College 20% Admission/Hu 15% man Resources Always 10% 5% College 0% Admission/Hu man Resources Perception of Online Most of Time Reputation
  • 15. Online Reputation and Job 90% 80% 70% 60% Rejected 50% 40% Americans who Believe 30% Positive Imact 20% 10% 0% Job Impact
  • 17. Social Media Ethics 1. Public vs Private 2. Can vs Should 3. Conjoined Identities 4. Cause Harm 5. Golden Rule
  • 19. Managing Digital Footprint  SearchEngines  Evaluate Reputation http://www.sxc.h u/browse.phtml?f =download&id=1 269420
  • 20. Protect Reputation  Think  Golden Rule  Vigilant http://www.sxc.hu/browse.pht ml?f=download&id=1383270
  • 21. Restore  Act Quickly! http://www.sxc.hu/brow se.phtml?f=download&id= 950851
  • 22. Safely Use Social Networks 1. Use caution with links 2. Don’t trust sender of message 3. Do not allow to scan address books 4. Type or bookmark address
  • 23. Safely Use Social Networks 5. Be selective about friends 6. Choose carefully 7. Assume everything is permanent 8. Think twice before access at work
  • 24. Is there a place?
  • 25. Something to Think About http://www.youtube.com/watch?feature=player_embedded&v=aDy cZH0CA4I#!
  • 26. Works Cited  11 Tips for Social Networking Safety. Microsoft. n.d. Web. 19 Mar. 2012. <http://www.microsoft.com/security/online-privacy/social-networking.aspx>.  Careless, James. “Social Media: It Does Have a Place in the Classroom. “ Tech & Learning. 32.7. (Feb. 2012). 43-46. Print.  Carrick, Damien. “Social Media and Privacy.” Law Report: Separate Stories Podcast. ABC Radio National. 28 Feb. 2012. MP3 file. 15 Mar 2012.  Cross-Tab Marketing Services. “Data Privacy Day: Perceptions Study.” Trustworthy Computing Group, Miscrosoft. Jan 2010. Microsoft PowerPoint File. 15 Mar 2012. <http://www.microsoft.com/security/resources/research.aspx#social>.  “Digital footprint.” Webopedia. ITBusinessEdge, QuinStreet, Inc. Web. 15 Mar. 2012. <http://www.webopedia.com/TERM/D/digital_footprint.html>.  Englishnationalopera. “Can I Be Your Friend.” YouTube. 8 Jun. 2011. Web. 24 Mar. 2012. <http://www.youtube.com/watch?feature=player_embedded&v=aDycZH0CA4I#!>.  Frugal Dad. Wrestling Online Privacy. 2011. Infographic. The Under Cover Recruiter. Web. 19 Mar 2012. <http://theundercoverrecruiter.com/content/infographic-how-social-media-online-privacy-risk-you>.  Gallagher, Frank. “Hand in Hand: Media Literacy and Internet Safety.” Library Media Connection. 29.4 (Jan./Feb. 2011): 16-18. Print.
  • 27. Works Cited  Kgiannas1389. “Racist Teens Ousted.” YouTube. 16 Feb 2012. Web. 14 Mar. 2012. <http://www.youtube.com/watch?v=bEkyP4A_4sQ&feature=related>.  McMillian, David. “How to Ruin Your Life in 14 Minutes: or Why We Need to Have a Serious Disucssion About Social Media Ethics” ThoughtCatalog. ThoughtCatalog. 23 Feb 2012. Web. 14 Mar 2012. <http://thoughtcatalog.com/2012/how-to-ruin-your-life-in-14-minutes-or-why-we-need-a- serious-conversation-about-the-ethics-of-social-media/>.  Popkin, Helen A.S. “7 Signs We’re Living in the Post Privacy Era.” Posted in Technolog. MSNBC. Com Tech. n.d. Web. 14 Mar 2012. <http://www.technolog.msnbc.msn.com/technology/technolog/7-signs-were-living-post-privacy- era-118087>.  Roesler, Kelly. “Privacy Issues with Web 2.0.” Social Issues Firsthand: Web 2.0. Ed. Laurie Willis. Farmington Hills: Greenhaven Press, 2009. 47-53. Print.  Socialmediaboost. “Social Media Revolution 2012 (Socialnomics 3).” YouTube. 11 Jan. 2012. Web. 6 Mar. 2012. <http://www.youtube.com/watch?v=ZQzsQkMFgHE&feature=related>.  Take Charge of Your Online Reputation. Microsoft. n.d. PDF. 24 Mar. 2012. <http://www.microsoft.com/security/online-privacy/social-networking.aspx>.  Ventura, Paul M. “What is Web 2.0 and What Are Some Web 2.0 Examples?” EzineArticles.com. EzineArticles. 3 Oct 2011. Web. 13 Mar 2012. <http://ezinearticles.com/?What-Is-Web-2.0-and- What-Are-Some-Web-2.0-Examples?&id=6602854>.  “Web 2.0." Collins English Dictionary - Complete & Unabridged 10th Edition. HarperCollins Publishers. 13 Mar. 2012.<http://dictionary.reference.com/browse/web 2.0>.
  • 28. Images  Andreyutzu. Time. 2008. Photograph. Stock.xchang, Getty Images. Web 31 Mar. 2012. <http://www.sxc.hu/browse.phtml?f=download&id=950851>.  Axonite. Hardware Circuits 4. 2009. Photograph. stock.xchang, Getty Images. Web. 6 Mar 2012. <http://www.sxc.hu/browse.phtml?f=download&id=1218115>.  ColinBroug. Footsteps 2. 2010. Photograph. Stock.xchang, Getty Images. Web. 31 Mar. 2012. <http://www.sxc.hu/browse.phtml?f=download&id=1269420>.  Da Silva, Frank. My Cyber Social Map. NA. Photograph. fotopedia, flickr. Web. 6 Mar 2012. <http://images.cdn.fotopedia.com/flickr-2386230724-original.jpg>.  Daxmac. Danger sign. 2012. Photograph. stock.xchang, Getty Images. Web. 13 Mar. 2012. <http://www.sxc.hu/browse.phtml?f=download&id=1381198>.  GretheB. Cobweb 2. 2011. Photograph. stock.exchang, Getty Images. Web. 6 Mar 2012. <http://www.sxc.hu/browse.phtml?f=download&id=1353782>.  Igoghost. Doodled Desks 2. 2009. Photograph. Stock.xchang, Getty Images. Web. 31 Mar. 2012. <http://www.sxc.hu/browse.phtml?f=download&id=1193228>/  Ischerer. Televosion Tower. 2008. Photograph. Stock.xchang, Getty Images. Web. 13 Mar. 2012. <http://www.sxc.hu/browse.phtml?f=download&id=1020178>.  KateKrav. Door Locker with Chain. 2012. Photograph. Stock.xchang, Getty Images. Web 31 Mar. 2012. <http://www.sxc.hu/browse.phtml?f=download&id=1383270>.  Pascal79. Do Not Disturb. 2007. Photograph. Stock.xchang, Getty Images. Web. 31 Mar. 2012. <http://www.sxc.hu/browse.phtml?f=download&id=839252>.

Hinweis der Redaktion

  1. AASL Learning Standards: 1.1.3, 1.2.3, 1.3.1, 1.3.3, 1.3.4, 1.3.5, 2.1.4, 2.3.1, 2.3.2, 3.3.2, 4.3.1, and 4.3.4
  2. What used to be considered “the web” (GrethreB).
  3. “The web” in today’s society (Ba Silva). In the words of Becky Hogge: “The web is developing from a place where we read stuff, through a place we interact with, into a place we personalize” (Web 2.0 57).
  4. According to Dictionary.com Web 2.0 is “the internet viewed as a medium in which the interactive experience in the form of blogs, wikis, forms, etc., plays a more important role than simply accessing information.” Image: (Axonite)
  5. Now that I have shared the definition of Web 2.0, this might be a good time to provide some examples. Web 2.0 covers a lot of ground and many different areas such as Social Networks (Facebook and Twitter), Blogs (Blogger and Word Press), Video, Image and Media Sharing sites (YouTube, Flickr), Wikipedia, Article Directories, and RSS feeds. These examples all make for a very interconnected world (Ventura)
  6. Social media is a huge part of the Web 2.0 world. (Show Video) With the statistics illustrated in the video we cannot ignore the impact of social media and web 2.0. But with all these opportunities comes the question, how do we stay safe? How do we keep our personal information private in an increasingly interconnected world?
  7. Why do we use Web 2.0 and social networking? For some it’s just an online popularity contest to see who can gather the most friends or followers. Other’s are trying to promote themselves and advertise their skills. It is also a new way of interacting with the world as a whole. Web 2.0 users can share through blogs, flickr, mashups, playing online games, and just the mundane aspects of their everyday life. It can also be used to rediscover people from their past. Perhaps find a friend you haven’t talked to in many years (Roesler 47-53 Web 2.0)
  8. Much of the early teachings on internet safety focused on keeping kids safe from predators. This is not as much of a danger as originally believed. The Federal Trade Commission has outlined three categories of danger: Inappropriate contact, inappropriate content and inappropriate conduct. “Inappropriate contact is communicating with anyone whose aim is to harm” (Gallagher 16). This can include: Predators, hate groups, groups that promote dangers behaviors (i.e. anexoria). Inappropriate content includes pornography, dangerous/illegal behaviors, and making private personal information public. “Inappropriate conduct includes sexting, cyberbullying, plagiarism, hacking, spreading false or malicious information . . .” (Gallagher 16). Image: (Daxmac)
  9. The growing trends in technology are giving way to a lessoning of privacy all around us. Don’t just give away the small shred of privacy we have left. Some of the examples of the lessening of our privacy include the FTC only giving Facebook the equivalent to a stern “no” and no actual punishment for changing their privacy controls in 2009 and making it more difficult to hide your personal information. Now they must inform members before the way their information is shared will be changed. This comes at an interesting time with the new Facebook Timeline that essentially asks for more information and wants to lay out your life in the pre-Facebook world. In addition there is the issue with cellphones being able to track your location by GPS and corporations saving this information, some companies also used a program which saved keystrokes, this means they were also logging what you were doing online including passwords. Along with the cellphones comes the issue of whether police can search them without a warrant or use cellphone signals to track your location. With some of these issues beyond our control unless we choose never to use Facebook or cellphones it is essential we protect the privacy we can (Popkin) Image: (Pascal79).
  10. One American study of college students showed 40% of the students had no understanding of their privacy. When asked 5 questions the 40% of students were unable to answer a single question correctly. They believed there were more rights protecting them than there actually are (Carrick). Image: (Iigighost)
  11. Web 2.0 has created a generation of people who are used to the ability to share ideas, images and videos whenever and where ever they wish to. This has increased the size of potential audiences and speed we can share information. These tools can be used for good, for example the ability to speak out about questionable business practices to supporting our charitable causes. In addition these tools can be used for bad, the information we share has the potential to ruin our lives along with the lives of others. Our mistakes used to be memorialized in our friends memories and those can be faulty. Today a mistake can be saved online for years. The mistakes made in high school could potentially affect your life for years to come because it’s out there online where anyone can find (McMillian). Image: (Ischerer).
  12. It is imperative students realize there are consequences to their actions. Anything posted online can go worldwide in matter of minutes. Take the case of two teens from Gainesville, Florida who posted a 14 minute racist rant in February 2012 that quickly went viral and completely changed their lives forever. The teens began receiving death threats and had to leave their school as part of the backlash from this video posted on YouTube. It is yet to be seen how this video will affect their lives from here on out (McMillian)
  13. A common term when discussing social media is “digital footprint.” According to Webopedia a digital footprint “is the word used to describe the grail, traces, or “footprints” that people leave online.” We need to teach children to look closely at their digital footprints. Once information has been posted in a digital format it persists somewhere over time. This is referred to as the “digital eternity” (Carrick) Not only do people need to watch what they post, they need to be aware that whatever others post about them on social media websites will also follow them forever (Frugal Dad). In 2006 a single mother had posted a picture of herself dressed as a pirate with the caption “Drunken Pirate.” Later on she was taking part in a program to get her teaching degree and was not allowed to graduate on the basis of this photo. When this single mom protested she lost the fight and was unable to graduate (Carrick). This is just one reason to watch what is put online. Image: (ColinBroug)
  14. The Perceptions study from January 2010 showed that 37% of Americans are not concerned at all about the impact their online reputation may have on the ability to get a job or be admitted into college. This same study showed that 44% of college admissions personnel and human resource departments always review the online reputation of a prospective student/employee and 35% review this information most of the time (Cross-Tab).
  15. This same survey found that 70% of recruiters have rejected an applicant based on information found about the applicants online reputation while only 7% of Americans believe this information can affect a job search. On a positive note 86% of the recruiters admit that a good online reputation can have an affect on a potential employees job application (Cross-Tab).
  16. We’ve seen what mistakes using social media and Web 2.0 can do to people and the impact social media can have on employment opportunities. How do we prevent this from happening to us or those we care about?
  17. In a posting by David McMillan on the Thought Catalog he shares the 5 key points which should be addressed in social media ethics. Point 1, “In social media, there is no difference between public and private.” it is important to remember anything posted online can be seen by the world at large potentially. This includes current and future employers, friends, and even parents. If you are not comfortable with these people all knowing something, it’s probably best not to share online. Point 2, “Just because you can post something doesn’t mean you should.” Be sure to avoid the temptation to post something just because you thought of it, make sure it’s not something you’ll regret after coming back to reality. The speed which things can be shared can often short circuit people’s thinking skills much like being inebriated. Point 3, “Your online and offline selves might not be identical, but they’re joined at the hip.” When posting anything online either publicly or privately first consider the impact on your offline life. Once things are posted online you no longer control the information and anyone has the potential to find it. Point 4, “Will what I post cause harm to others?” Stop and consider before posting judgmental comments online if you would be willing to say that to someone’s face and have your mom know about it first hand. Point 5, “Finally, call it the Social Media Golden Rule: post about others as you know have them post about you.” This doesn’t mean lie about people, just be prepared for the backlash if you post something others may not like. They will not hesitate to make their thoughts about you clear either.
  18. Not only should a Web 2.0 user consider those points by McMillian, they should consider this, what will happen to their digital life when they die? All of that information which has been shared online could come back and haunt your loved ones. Is there anything out there you’d rather not share?
  19. One important step in managing your digital footprint is simply searching your name online. Try several search engines to see what comes up, don’t forget to search images along with text. Make sure to try different variations of your name. Then check the information that comes up, is it you and is the information accurate? Also consider if you need multiple online profiles, such as one for personal life and one for your professional life. Keep in mind anything on the internet is searchable and permanent (Take Charge). Image: (ColinBroug).
  20. It’s key to think before you post information. How will it reflect upon you? Do not hesitate to talk with friends and family about the type of information you are willing to share and not willing to share. If necessary ask them to remove items and information you don’t wish to have shared. Keeping this in mind don’t forget the “Golden Rule” when posting online and treat others as you would like to be treated. In other words don’t post information about others you would not be willing to have posted about yourself. Once your online reputation is established stay vigilant and keep running searches on yourself. It’s also a good idea to set up something like a Google Alert on yourself to keep up with when your name is posted online. Finally, check who has access to your online information, it’s okay to remove people (Take Charge). Image: (KateKrav).
  21. If you find incorrect or inappropriate information about yourself online it’s important to act quickly. The sooner the information is removed the better. The first step is to ask the person who posted it to either remove or correct any errors. If this does not work ask the site administrator for help (Take Charge). Image: (Andreyutzu).
  22. Some tips for using social networking include: 1.) Treat any links friends send through social networking sites with caution like you would a link sent through e-mail, 2.) Just because you think a message came from a friend, that does not mean it did, so if a message looks suspicious use a different method to contact your friend, 3.) When joining a social network it will often offer to scan your address book to find out if your contacts are on the network, using this information sites can then send e-mails to anyone you’ve ever e-mailed, 4.) Always type the web address of the social networking site or go to it through your bookmarks, don’t follow links in an e-mail, these links could take you to a fake site (11 Tips).
  23. 5.) Don’t just accept anyone as a “friend” on social networking sites, confirm their identity because it could be fake, 6.) Check out the social networking site you plan to use carefully, read the privacy policy and make sure you treat this decision with the same care as selecting a site you would give your credit card number, 7.) Everything posted online is permanent, even if you delete your profile anyone could have saved the information and 8.) Don’t access social networking sites at work or at a public computer (11 Tips).
  24. With all of the issues addressed is there a place for Web 2.0 and Social Media in education? Some will compare the emergence social media to the emergence of rock’n roll and blame it for corrupting the youth of America. Yes there must be a place, if we ignore the current direction society is going we will do a disservice to our students. The use of social media plays an integral part of society today. We must teach students the proper use. When students are allowed to share their work online and strangers take the time to comment it shows the student they can have an impact and people really do care. In addition building an collection of material online can help with the college application process, this helps students build a digital resume which can help sway college admissions officials. It must be recognized that social media and web 2.0 represent a new way of doing things, not just in education but in society as a whole (Careless).
  25. Just something to think about after today’s presentation. (Show Video) Would you act like that in real life? If no, why do we feel it is okay online?