SlideShare a Scribd company logo
1 of 31
Social Networks, Digital Breadcrumbs & Privacy  GreatMystery14 www.facebook.com/sureshsood soody ssood Hero5! twitter.com/soody www.bravenewtalent.com/talent/suresh_sood www.linkedin.com/in/sureshsood Geektoid Mangala scuzzy55 suresh.sood@uts.edu.au
Agenda 0.    Inappropriate Content and Contact   1.	Online Social Networks 101, “FaceBook to Dogster”   2.	TV 3.0 - The Future of Social Networks 3.	How should I organise my security settings? Where does Twitter Fit? Digital Breadcrumbs 6. 	Steps to Avoid Social Engineering Attacks   The Australian Government Resources for Safety on the Internet Parents – What Should We Do?
5 Inappropriate Content
6 Linguistic Inquiry & Word Count : “junk words” in content  http://www.liwc.net/liwcresearch07.php Cognitive complexity = zexcl + ztentat + znegate + zdiscrepzincl Depression = zI + zphyscal + znegemo – zposemo Liar = – zself – zother – zexcl + znegemo or  Honesty = zself + zother + zexcl - znegemo -  zmotion Female = zself – zsixltr +z other + znegate – zarticle – zpreps + zcertain + zsocial+ zpresent– zspace – zoccup + zhome – zmoney Aging = zposemo – zI + zsixltr + zcogmech + zexcl + zfuture – zpast – ztime Presidential = zsixltr – zwps – zunique – zpronoun – zself – zyou – zother –znegate+ zarticle + zprep Slatcher, R.B., Chung, C.K., Pennebaker, J.W., & Stone, L.D. (2007), Winning words: Individual differences in linguistic style among U.S. presidential and vice presidential candidates, Journal of Research in Personality, 41, 63-75.
Lurking A Fact of Life Online  0.1 0.003 0 5 0.2 1 95 99.8 99
http://namechk.com/
Social Media  Blog reflect, read, write and comment e.g. WordPress, LiveJournal,  Microblogging brief notes, messages, comments e.g. Twitter, Tumblr Social Network connect, communicate, and sharee.g. Facebook, Ning, MySpace, etc Generate content  upload content to share with others, comment or tag or reuse the content e.g. YouTube, Vimeo, Flickr, Slideshare
Social Networking Sites  Parse through friends activities forwards & reverse as well as own social gestures  Allow users to: Create personal profiles inclusive of location information  Write status updates (postings to friends) c.f. blog entries Friends specify updates they like  Post photographs, videos, and audio clips Send and receive private messages  Link to the pages of friends
TV 3.0 Livestation All your channels in one place Surf and email while you watch Instant, live chat with others watching Livestation Desktop alerts bring you breaking news and Livestation updates  Share with friends. Boxee makes it easy for friends to share their favorite movies, TV Shows, and songs with each other, on Boxee or on social networks like Facebook and Twitter.
World Map of Social Networkswww.incos.it
Facebook is My Newspaper(Susie Wilkening, http://reachadvisors.typepad.com/ OneRiot.com: Search the realtime web
16 million people in the UK accessed Internet via mobile phones in December 2009.  Total of 6.7 billion pages and 4.8 billion minutes online during the month.  Top 10 sites accounted for 70 per cent of both total pages viewed and total time spent online
Australia Leads Average Time Spent per Person on Social Media Sites in December 2009
Facebook Founded in 2004, primarily catering to students  Over 400M active members worldwide with 2011 predictions for  1 billion users (Gartner)  Facebook has communities,users,applications & albums Over 10 Billion  photos in Oct 2008 and adds over 3Billion monthly Australian 8.1 M users in October2009  had uploaded 80 million pictures and written 32 million "wall posts" and 45 million "status updates". (Nielsen Online) Australians are spending 29% of all time browsing the internet on Facebook alone (Nielsen) Applications run on Facebook platform True names encouraged but not guaranteed Privacy model is highly granular present different information to different groups or individual users Messaging includes mail, real-time chat, "wall"  Now used in private background checks
20 Inappropriate Contact with Strangers and Bullies Public info:  	Name, Profile Picture, Current City, Gender, Networks, 			Friend List and Pages.
Facebook Tips - Privacy Friends Lists Facebook Search & Google Photo Tag Mishaps Relationship Changes Contact Info Wall Postings
TWITTER Market leader in "micro-blogging"  Began in mid-2006 as "status message" service  Ubiquity and ease of updating, but limited space  Breaking news, real-time updates: USAir, Iran  Most multimedia handled by 3d party links  Simplified privacy model: updates public or private  Most Twitter content is public  Private messages kept until user deletes them Direct messages are private; sender can delete  Short URLs used to serve malicious links and code
Digital Breadcrumbs
Social Engineering Attacks Malicious software (malware) is installed into a computer        fixed or mobile − to collect personal informationover time.  Computers or mobile devices are hacked forpersonal data. Phishing criminals use deceptive e-mails to get users to divulge personal information, includes luring them to fake bank and credit-cards websites.  “Pharming”: using deceptive e-mail messages to redirect users from an authentic website to a fraudulent one, which replicates the original in appearance. “SMiShing”: sending text messages (“SMS”) to cell phone users that trick them into going to a website operated by the thieves. Messages typically say that unless users go to the website and cancel, they will be charged for services they never actually ordered. “Spear-phishing”: impersonating a company employee/employer via e- mail in order to steal colleagues’ passwords/usernames and gain access the company’s computer system. ID thieves misuse victims’ personal info.
What to Do –Elements of Strategy
Caution! “Children never put off till tomorrow what will keep them from going to bed tonight” 						(Anonymous)

More Related Content

What's hot

Cfadw presentation
Cfadw presentationCfadw presentation
Cfadw presentationguestf8d4d6f
 
What is social media?
What is social media?What is social media?
What is social media?WheresOllie
 
How To Be A Social Media Butterfly
How To Be A Social Media ButterflyHow To Be A Social Media Butterfly
How To Be A Social Media ButterflyCaryn Brown
 
Social Media Privacy
Social Media PrivacySocial Media Privacy
Social Media PrivacyLisa Turner
 
Social media dangers
Social media dangersSocial media dangers
Social media dangersSaman Sara
 
To roulette facebook-events
To roulette facebook-eventsTo roulette facebook-events
To roulette facebook-eventsgueste4066bf
 
Irwin Onlinepresentation
Irwin OnlinepresentationIrwin Onlinepresentation
Irwin Onlinepresentationapberard
 
Using Social Software To Get Your Word Out
Using Social Software To Get Your Word OutUsing Social Software To Get Your Word Out
Using Social Software To Get Your Word OutMatt Ganis
 
Social Network Privacy II
Social Network Privacy IISocial Network Privacy II
Social Network Privacy IIYury Chemerkin
 
What Is Social Media?
What Is Social Media?What Is Social Media?
What Is Social Media?AlexLowe
 
The advantages and disadvantages of the social network
The advantages and disadvantages of the social networkThe advantages and disadvantages of the social network
The advantages and disadvantages of the social networkLy Saroth
 
Social Media: Friend or Foe (MPSEOC 2014)
Social Media: Friend or Foe (MPSEOC 2014)Social Media: Friend or Foe (MPSEOC 2014)
Social Media: Friend or Foe (MPSEOC 2014)nilamapatel
 
6 online identity
6 online identity6 online identity
6 online identityCOMP 113
 
Privacy and Security in Online Social Media : Privacy and Social Media
Privacy and Security in Online Social Media : Privacy and Social MediaPrivacy and Security in Online Social Media : Privacy and Social Media
Privacy and Security in Online Social Media : Privacy and Social MediaIIIT Hyderabad
 
Famous social networking sites
Famous social networking sitesFamous social networking sites
Famous social networking sitesJonayed Rousan
 

What's hot (20)

Cfadw presentation
Cfadw presentationCfadw presentation
Cfadw presentation
 
What is social media?
What is social media?What is social media?
What is social media?
 
Tweet tweet
Tweet tweetTweet tweet
Tweet tweet
 
How To Be A Social Media Butterfly
How To Be A Social Media ButterflyHow To Be A Social Media Butterfly
How To Be A Social Media Butterfly
 
Social Media Privacy
Social Media PrivacySocial Media Privacy
Social Media Privacy
 
Social Network
Social NetworkSocial Network
Social Network
 
Social media dangers
Social media dangersSocial media dangers
Social media dangers
 
To roulette facebook-events
To roulette facebook-eventsTo roulette facebook-events
To roulette facebook-events
 
Irwin Onlinepresentation
Irwin OnlinepresentationIrwin Onlinepresentation
Irwin Onlinepresentation
 
Using Social Software To Get Your Word Out
Using Social Software To Get Your Word OutUsing Social Software To Get Your Word Out
Using Social Software To Get Your Word Out
 
Social Network Privacy II
Social Network Privacy IISocial Network Privacy II
Social Network Privacy II
 
Twitter
TwitterTwitter
Twitter
 
What Is Social Media?
What Is Social Media?What Is Social Media?
What Is Social Media?
 
After facebook who!!
After facebook who!!After facebook who!!
After facebook who!!
 
The advantages and disadvantages of the social network
The advantages and disadvantages of the social networkThe advantages and disadvantages of the social network
The advantages and disadvantages of the social network
 
Social Media: Friend or Foe (MPSEOC 2014)
Social Media: Friend or Foe (MPSEOC 2014)Social Media: Friend or Foe (MPSEOC 2014)
Social Media: Friend or Foe (MPSEOC 2014)
 
YPN Social Media Presentation (PDF)
YPN Social Media Presentation (PDF)YPN Social Media Presentation (PDF)
YPN Social Media Presentation (PDF)
 
6 online identity
6 online identity6 online identity
6 online identity
 
Privacy and Security in Online Social Media : Privacy and Social Media
Privacy and Security in Online Social Media : Privacy and Social MediaPrivacy and Security in Online Social Media : Privacy and Social Media
Privacy and Security in Online Social Media : Privacy and Social Media
 
Famous social networking sites
Famous social networking sitesFamous social networking sites
Famous social networking sites
 

Viewers also liked

Uts participant workbook smmp for planet ark
Uts participant workbook smmp for planet arkUts participant workbook smmp for planet ark
Uts participant workbook smmp for planet arksuresh sood
 
Urban Plunge
Urban Plunge Urban Plunge
Urban Plunge meaganp
 
21228 wk 1 introduction handout ss
21228 wk 1 introduction handout ss21228 wk 1 introduction handout ss
21228 wk 1 introduction handout sssuresh sood
 
Small Worlds Social Graphs Social Media
Small Worlds Social Graphs Social MediaSmall Worlds Social Graphs Social Media
Small Worlds Social Graphs Social Mediasuresh sood
 
Active Directory and PKI solutions for secure business
Active Directory and PKI solutions for secure businessActive Directory and PKI solutions for secure business
Active Directory and PKI solutions for secure businessVilius Benetis
 
[LT] V.Benetis. Kibernetinis saugumas: ką būtina žinoti IT paslaugų pirkėjams
[LT] V.Benetis. Kibernetinis saugumas: ką būtina žinoti IT paslaugų pirkėjams[LT] V.Benetis. Kibernetinis saugumas: ką būtina žinoti IT paslaugų pirkėjams
[LT] V.Benetis. Kibernetinis saugumas: ką būtina žinoti IT paslaugų pirkėjamsVilius Benetis
 
[LT] 2015 11 19 V.Benetis. Asmens duomenų apsauga kibernetinėje erdvėje kas p...
[LT] 2015 11 19 V.Benetis. Asmens duomenų apsauga kibernetinėje erdvėje kas p...[LT] 2015 11 19 V.Benetis. Asmens duomenų apsauga kibernetinėje erdvėje kas p...
[LT] 2015 11 19 V.Benetis. Asmens duomenų apsauga kibernetinėje erdvėje kas p...Vilius Benetis
 
bodyboard
bodyboardbodyboard
bodyboardnikolas
 
Workshop B - Tools for SNA
Workshop B - Tools for SNA Workshop B - Tools for SNA
Workshop B - Tools for SNA suresh sood
 
Systemof insight
Systemof insightSystemof insight
Systemof insightsuresh sood
 
Future of jobs, big data & innovation
Future of jobs, big data & innovation Future of jobs, big data & innovation
Future of jobs, big data & innovation suresh sood
 
Netnography online course part 1 of 3 17 november 2016
Netnography online course part 1 of 3 17 november 2016Netnography online course part 1 of 3 17 november 2016
Netnography online course part 1 of 3 17 november 2016suresh sood
 
Cybersecurity Skills Audit
Cybersecurity Skills AuditCybersecurity Skills Audit
Cybersecurity Skills AuditVilius Benetis
 
Australian Business Culture
Australian Business Culture Australian Business Culture
Australian Business Culture suresh sood
 

Viewers also liked (19)

Uts participant workbook smmp for planet ark
Uts participant workbook smmp for planet arkUts participant workbook smmp for planet ark
Uts participant workbook smmp for planet ark
 
Cool Tools
Cool Tools Cool Tools
Cool Tools
 
Urban Plunge
Urban Plunge Urban Plunge
Urban Plunge
 
Datainnovation
DatainnovationDatainnovation
Datainnovation
 
21228 wk 1 introduction handout ss
21228 wk 1 introduction handout ss21228 wk 1 introduction handout ss
21228 wk 1 introduction handout ss
 
Small Worlds Social Graphs Social Media
Small Worlds Social Graphs Social MediaSmall Worlds Social Graphs Social Media
Small Worlds Social Graphs Social Media
 
Active Directory and PKI solutions for secure business
Active Directory and PKI solutions for secure businessActive Directory and PKI solutions for secure business
Active Directory and PKI solutions for secure business
 
Bigdatahuman
BigdatahumanBigdatahuman
Bigdatahuman
 
[LT] V.Benetis. Kibernetinis saugumas: ką būtina žinoti IT paslaugų pirkėjams
[LT] V.Benetis. Kibernetinis saugumas: ką būtina žinoti IT paslaugų pirkėjams[LT] V.Benetis. Kibernetinis saugumas: ką būtina žinoti IT paslaugų pirkėjams
[LT] V.Benetis. Kibernetinis saugumas: ką būtina žinoti IT paslaugų pirkėjams
 
[LT] 2015 11 19 V.Benetis. Asmens duomenų apsauga kibernetinėje erdvėje kas p...
[LT] 2015 11 19 V.Benetis. Asmens duomenų apsauga kibernetinėje erdvėje kas p...[LT] 2015 11 19 V.Benetis. Asmens duomenų apsauga kibernetinėje erdvėje kas p...
[LT] 2015 11 19 V.Benetis. Asmens duomenų apsauga kibernetinėje erdvėje kas p...
 
bodyboard
bodyboardbodyboard
bodyboard
 
Spark
SparkSpark
Spark
 
Workshop B - Tools for SNA
Workshop B - Tools for SNA Workshop B - Tools for SNA
Workshop B - Tools for SNA
 
Systemof insight
Systemof insightSystemof insight
Systemof insight
 
Future of jobs, big data & innovation
Future of jobs, big data & innovation Future of jobs, big data & innovation
Future of jobs, big data & innovation
 
Netnography online course part 1 of 3 17 november 2016
Netnography online course part 1 of 3 17 november 2016Netnography online course part 1 of 3 17 november 2016
Netnography online course part 1 of 3 17 november 2016
 
Cybersecurity Skills Audit
Cybersecurity Skills AuditCybersecurity Skills Audit
Cybersecurity Skills Audit
 
Australian Business Culture
Australian Business Culture Australian Business Culture
Australian Business Culture
 
Session 1
Session 1Session 1
Session 1
 

Similar to Internet Safety

Cybersafety Talk
Cybersafety TalkCybersafety Talk
Cybersafety Talksuresh sood
 
Social media and the future of social networking
Social media and the future of social networkingSocial media and the future of social networking
Social media and the future of social networkingRussetanSc
 
Social media privacy issues
Social media privacy issuesSocial media privacy issues
Social media privacy issuesNousheen Arshad
 
Security Dangers of Social Networking
Security Dangers of Social NetworkingSecurity Dangers of Social Networking
Security Dangers of Social NetworkingBillBrenner70
 
Spiritual social media & mobile devices
Spiritual social media & mobile devicesSpiritual social media & mobile devices
Spiritual social media & mobile devicesErnest Staats
 
Intro Social Media for Small Business
Intro Social Media for Small BusinessIntro Social Media for Small Business
Intro Social Media for Small BusinessAnne Adrian
 
L1b Trends in ICT - Online Safety and Security.pdf
L1b Trends in ICT - Online Safety and Security.pdfL1b Trends in ICT - Online Safety and Security.pdf
L1b Trends in ICT - Online Safety and Security.pdfJeth Cuenco
 
IS 20090 Week 2 - Social Networks
IS 20090 Week 2 - Social NetworksIS 20090 Week 2 - Social Networks
IS 20090 Week 2 - Social Networksis20090
 
Social & mobile security
Social & mobile securitySocial & mobile security
Social & mobile securityErnest Staats
 
socialmediapowerpointpresentation-190930121315_221119_171539.pptx
socialmediapowerpointpresentation-190930121315_221119_171539.pptxsocialmediapowerpointpresentation-190930121315_221119_171539.pptx
socialmediapowerpointpresentation-190930121315_221119_171539.pptxssuser196c47
 
social Media Power Point Presentation.pptx
social Media Power Point Presentation.pptxsocial Media Power Point Presentation.pptx
social Media Power Point Presentation.pptxPrashanthReddyTirlap
 
Social media powerpoint presentation
Social media powerpoint presentationSocial media powerpoint presentation
Social media powerpoint presentationSlideegg
 
Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Kirsten Thompson
 
Future of social networking group project
Future of social networking   group projectFuture of social networking   group project
Future of social networking group projectbulgarej
 
Advantages and Disadvantages Of Social Media
 Advantages and Disadvantages Of Social Media Advantages and Disadvantages Of Social Media
Advantages and Disadvantages Of Social MediaDilna DV
 
CIPR Fifth Estate - Voluntary Sector Group: "Social Media - an introduction"
CIPR Fifth Estate - Voluntary Sector Group: "Social Media - an introduction"CIPR Fifth Estate - Voluntary Sector Group: "Social Media - an introduction"
CIPR Fifth Estate - Voluntary Sector Group: "Social Media - an introduction"Bright One
 
Introduction to Facebook and Twitter
Introduction to Facebook and TwitterIntroduction to Facebook and Twitter
Introduction to Facebook and TwitterAnne Adrian
 
1 a ramdc social media 06.24.2010
1 a ramdc social media 06.24.20101 a ramdc social media 06.24.2010
1 a ramdc social media 06.24.2010Heather Grimes
 

Similar to Internet Safety (20)

Cybersafety Talk
Cybersafety TalkCybersafety Talk
Cybersafety Talk
 
Social media and the future of social networking
Social media and the future of social networkingSocial media and the future of social networking
Social media and the future of social networking
 
Social media privacy issues
Social media privacy issuesSocial media privacy issues
Social media privacy issues
 
Security Dangers of Social Networking
Security Dangers of Social NetworkingSecurity Dangers of Social Networking
Security Dangers of Social Networking
 
Spiritual social media & mobile devices
Spiritual social media & mobile devicesSpiritual social media & mobile devices
Spiritual social media & mobile devices
 
Engaging The Conversation, Presented to the Fort Bend Chamber
Engaging The Conversation, Presented to the Fort Bend ChamberEngaging The Conversation, Presented to the Fort Bend Chamber
Engaging The Conversation, Presented to the Fort Bend Chamber
 
Intro Social Media for Small Business
Intro Social Media for Small BusinessIntro Social Media for Small Business
Intro Social Media for Small Business
 
L1b Trends in ICT - Online Safety and Security.pdf
L1b Trends in ICT - Online Safety and Security.pdfL1b Trends in ICT - Online Safety and Security.pdf
L1b Trends in ICT - Online Safety and Security.pdf
 
IS 20090 Week 2 - Social Networks
IS 20090 Week 2 - Social NetworksIS 20090 Week 2 - Social Networks
IS 20090 Week 2 - Social Networks
 
Social & mobile security
Social & mobile securitySocial & mobile security
Social & mobile security
 
socialmediapowerpointpresentation-190930121315_221119_171539.pptx
socialmediapowerpointpresentation-190930121315_221119_171539.pptxsocialmediapowerpointpresentation-190930121315_221119_171539.pptx
socialmediapowerpointpresentation-190930121315_221119_171539.pptx
 
social Media Power Point Presentation.pptx
social Media Power Point Presentation.pptxsocial Media Power Point Presentation.pptx
social Media Power Point Presentation.pptx
 
Social media powerpoint presentation
Social media powerpoint presentationSocial media powerpoint presentation
Social media powerpoint presentation
 
Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?
 
Future of social networking group project
Future of social networking   group projectFuture of social networking   group project
Future of social networking group project
 
Advantages and Disadvantages Of Social Media
 Advantages and Disadvantages Of Social Media Advantages and Disadvantages Of Social Media
Advantages and Disadvantages Of Social Media
 
CIPR Fifth Estate - Voluntary Sector Group: "Social Media - an introduction"
CIPR Fifth Estate - Voluntary Sector Group: "Social Media - an introduction"CIPR Fifth Estate - Voluntary Sector Group: "Social Media - an introduction"
CIPR Fifth Estate - Voluntary Sector Group: "Social Media - an introduction"
 
Social Media Strategies For Teams
Social Media Strategies For TeamsSocial Media Strategies For Teams
Social Media Strategies For Teams
 
Introduction to Facebook and Twitter
Introduction to Facebook and TwitterIntroduction to Facebook and Twitter
Introduction to Facebook and Twitter
 
1 a ramdc social media 06.24.2010
1 a ramdc social media 06.24.20101 a ramdc social media 06.24.2010
1 a ramdc social media 06.24.2010
 

More from suresh sood

Getting to the Edge of the Future - Tools & Trends of Foresight to Nowcasting
Getting to the Edge of the Future - Tools & Trends of Foresight to NowcastingGetting to the Edge of the Future - Tools & Trends of Foresight to Nowcasting
Getting to the Edge of the Future - Tools & Trends of Foresight to Nowcastingsuresh sood
 
Data Science Innovations
Data Science InnovationsData Science Innovations
Data Science Innovationssuresh sood
 
Foresight conversation
Foresight conversationForesight conversation
Foresight conversationsuresh sood
 
Data science Innovations January 2018
Data science Innovations January 2018Data science Innovations January 2018
Data science Innovations January 2018suresh sood
 
Data science innovations
Data science innovations Data science innovations
Data science innovations suresh sood
 
Data Science Innovations : Democratisation of Data and Data Science
Data Science Innovations : Democratisation of Data and Data Science  Data Science Innovations : Democratisation of Data and Data Science
Data Science Innovations : Democratisation of Data and Data Science suresh sood
 
Beyond dashboards
Beyond dashboardsBeyond dashboards
Beyond dashboardssuresh sood
 
Foresight Analytics
Foresight AnalyticsForesight Analytics
Foresight Analyticssuresh sood
 
Spark Social Media
Spark Social Media Spark Social Media
Spark Social Media suresh sood
 
Bigdatacooltools
BigdatacooltoolsBigdatacooltools
Bigdatacooltoolssuresh sood
 
Bigdataforesight
BigdataforesightBigdataforesight
Bigdataforesightsuresh sood
 
Transforming instagram data into location intelligence
Transforming instagram data into location intelligenceTransforming instagram data into location intelligence
Transforming instagram data into location intelligencesuresh sood
 

More from suresh sood (20)

Getting to the Edge of the Future - Tools & Trends of Foresight to Nowcasting
Getting to the Edge of the Future - Tools & Trends of Foresight to NowcastingGetting to the Edge of the Future - Tools & Trends of Foresight to Nowcasting
Getting to the Edge of the Future - Tools & Trends of Foresight to Nowcasting
 
Bigdata AI
Bigdata AI Bigdata AI
Bigdata AI
 
Bigdata ai
Bigdata aiBigdata ai
Bigdata ai
 
Data Science Innovations
Data Science InnovationsData Science Innovations
Data Science Innovations
 
Foresight conversation
Foresight conversationForesight conversation
Foresight conversation
 
Data science Innovations January 2018
Data science Innovations January 2018Data science Innovations January 2018
Data science Innovations January 2018
 
future2020
future2020future2020
future2020
 
Data science innovations
Data science innovations Data science innovations
Data science innovations
 
Data Science Innovations : Democratisation of Data and Data Science
Data Science Innovations : Democratisation of Data and Data Science  Data Science Innovations : Democratisation of Data and Data Science
Data Science Innovations : Democratisation of Data and Data Science
 
Swarm jobs
Swarm jobsSwarm jobs
Swarm jobs
 
Beyond dashboards
Beyond dashboardsBeyond dashboards
Beyond dashboards
 
Foresight Analytics
Foresight AnalyticsForesight Analytics
Foresight Analytics
 
TPA
TPATPA
TPA
 
Datapreneurs
DatapreneursDatapreneurs
Datapreneurs
 
Jobs Complexity
Jobs ComplexityJobs Complexity
Jobs Complexity
 
Spark Social Media
Spark Social Media Spark Social Media
Spark Social Media
 
Bigdatacooltools
BigdatacooltoolsBigdatacooltools
Bigdatacooltools
 
Bigdataforesight
BigdataforesightBigdataforesight
Bigdataforesight
 
DBIA
DBIADBIA
DBIA
 
Transforming instagram data into location intelligence
Transforming instagram data into location intelligenceTransforming instagram data into location intelligence
Transforming instagram data into location intelligence
 

Internet Safety

  • 1. Social Networks, Digital Breadcrumbs & Privacy GreatMystery14 www.facebook.com/sureshsood soody ssood Hero5! twitter.com/soody www.bravenewtalent.com/talent/suresh_sood www.linkedin.com/in/sureshsood Geektoid Mangala scuzzy55 suresh.sood@uts.edu.au
  • 2.
  • 3.
  • 4. Agenda 0. Inappropriate Content and Contact 1. Online Social Networks 101, “FaceBook to Dogster” 2. TV 3.0 - The Future of Social Networks 3. How should I organise my security settings? Where does Twitter Fit? Digital Breadcrumbs 6. Steps to Avoid Social Engineering Attacks The Australian Government Resources for Safety on the Internet Parents – What Should We Do?
  • 6. 6 Linguistic Inquiry & Word Count : “junk words” in content http://www.liwc.net/liwcresearch07.php Cognitive complexity = zexcl + ztentat + znegate + zdiscrepzincl Depression = zI + zphyscal + znegemo – zposemo Liar = – zself – zother – zexcl + znegemo or Honesty = zself + zother + zexcl - znegemo - zmotion Female = zself – zsixltr +z other + znegate – zarticle – zpreps + zcertain + zsocial+ zpresent– zspace – zoccup + zhome – zmoney Aging = zposemo – zI + zsixltr + zcogmech + zexcl + zfuture – zpast – ztime Presidential = zsixltr – zwps – zunique – zpronoun – zself – zyou – zother –znegate+ zarticle + zprep Slatcher, R.B., Chung, C.K., Pennebaker, J.W., & Stone, L.D. (2007), Winning words: Individual differences in linguistic style among U.S. presidential and vice presidential candidates, Journal of Research in Personality, 41, 63-75.
  • 7. Lurking A Fact of Life Online 0.1 0.003 0 5 0.2 1 95 99.8 99
  • 9. Social Media Blog reflect, read, write and comment e.g. WordPress, LiveJournal, Microblogging brief notes, messages, comments e.g. Twitter, Tumblr Social Network connect, communicate, and sharee.g. Facebook, Ning, MySpace, etc Generate content upload content to share with others, comment or tag or reuse the content e.g. YouTube, Vimeo, Flickr, Slideshare
  • 10. Social Networking Sites Parse through friends activities forwards & reverse as well as own social gestures Allow users to: Create personal profiles inclusive of location information Write status updates (postings to friends) c.f. blog entries Friends specify updates they like Post photographs, videos, and audio clips Send and receive private messages Link to the pages of friends
  • 11. TV 3.0 Livestation All your channels in one place Surf and email while you watch Instant, live chat with others watching Livestation Desktop alerts bring you breaking news and Livestation updates Share with friends. Boxee makes it easy for friends to share their favorite movies, TV Shows, and songs with each other, on Boxee or on social networks like Facebook and Twitter.
  • 12. World Map of Social Networkswww.incos.it
  • 13. Facebook is My Newspaper(Susie Wilkening, http://reachadvisors.typepad.com/ OneRiot.com: Search the realtime web
  • 14.
  • 15. 16 million people in the UK accessed Internet via mobile phones in December 2009. Total of 6.7 billion pages and 4.8 billion minutes online during the month. Top 10 sites accounted for 70 per cent of both total pages viewed and total time spent online
  • 16. Australia Leads Average Time Spent per Person on Social Media Sites in December 2009
  • 17. Facebook Founded in 2004, primarily catering to students Over 400M active members worldwide with 2011 predictions for 1 billion users (Gartner) Facebook has communities,users,applications & albums Over 10 Billion photos in Oct 2008 and adds over 3Billion monthly Australian 8.1 M users in October2009 had uploaded 80 million pictures and written 32 million "wall posts" and 45 million "status updates". (Nielsen Online) Australians are spending 29% of all time browsing the internet on Facebook alone (Nielsen) Applications run on Facebook platform True names encouraged but not guaranteed Privacy model is highly granular present different information to different groups or individual users Messaging includes mail, real-time chat, "wall" Now used in private background checks
  • 18.
  • 19.
  • 20. 20 Inappropriate Contact with Strangers and Bullies Public info: Name, Profile Picture, Current City, Gender, Networks, Friend List and Pages.
  • 21. Facebook Tips - Privacy Friends Lists Facebook Search & Google Photo Tag Mishaps Relationship Changes Contact Info Wall Postings
  • 22.
  • 23. TWITTER Market leader in "micro-blogging" Began in mid-2006 as "status message" service Ubiquity and ease of updating, but limited space Breaking news, real-time updates: USAir, Iran Most multimedia handled by 3d party links Simplified privacy model: updates public or private Most Twitter content is public Private messages kept until user deletes them Direct messages are private; sender can delete Short URLs used to serve malicious links and code
  • 24.
  • 25.
  • 27. Social Engineering Attacks Malicious software (malware) is installed into a computer fixed or mobile − to collect personal informationover time. Computers or mobile devices are hacked forpersonal data. Phishing criminals use deceptive e-mails to get users to divulge personal information, includes luring them to fake bank and credit-cards websites. “Pharming”: using deceptive e-mail messages to redirect users from an authentic website to a fraudulent one, which replicates the original in appearance. “SMiShing”: sending text messages (“SMS”) to cell phone users that trick them into going to a website operated by the thieves. Messages typically say that unless users go to the website and cancel, they will be charged for services they never actually ordered. “Spear-phishing”: impersonating a company employee/employer via e- mail in order to steal colleagues’ passwords/usernames and gain access the company’s computer system. ID thieves misuse victims’ personal info.
  • 28.
  • 29.
  • 30. What to Do –Elements of Strategy
  • 31. Caution! “Children never put off till tomorrow what will keep them from going to bed tonight” (Anonymous)

Editor's Notes

  1. Social graph in the following order: you, your social network friends, friends-of-friends, your followers, and the overall community.Wall Street feed – simple way to navigate social network of friends social gestures and your –efficient, increased engagement , increases importance of attention info c.f. banking – remember fuss around news feedGoogle Open Social Attention Streams (already included in Plaxo Pulse) - MySpace Friends Updates -Netvibes Activities-LinkedIn Network UpdatesHigh social engagement vs traditional media (radio, tv, print, outdoor) with low engagement. This is about dialogue, interactivity, informality, people + technology & niche NOT Tradigital for mass using push, automation & technology only. Social Media Marketing practice centres around – networks, communities, blogs and microblogging. Traditional business functions can be socialised e.g. legal, supply chain, R&D, HR…Social Strategy (Media) - through sharing; engaging; building relationships and influencingincrease our reach, influence and relevancecreate ambassadors to support and promote what we dopersonalise interactionsencourage and grow communities through a critical mass of active cultural and scientific participants maximise revenuechange our work models from one-to-one communication to many-to-many communicationmove from providing information to creating shared meaning with audiences
  2. For participation on Amazon see: http://www.amazon.com/review/top-reviewers-classic
  3. Also, think Mobile we will discuss UK stats shortly from December released over weekend. Social Media moving rapidly to be the gateway to web content Facebook has replaced her newspaper as the go-to place for relevant news in Susie’s life. It's not hard to imagine a near future where Facebook (and sites like it) also replace a lot of the ways we use atomized search.For people who are deeply immersed in social media, social networks are already a much heavier influence on personal choices--where to visit, what concert to attend--than traditional advertising. Which means that your organization's website--a brochure out in the wilderness of the Web--is only going to remain relevant and useful as a marketing piece if it is being referenced in the social context of your users' lives. the next generation of Web users may find what they want by using their social network rather than a search algorithm. Social Media changes way we deal with web and in a sec we see mobile.
  4. EducationParent participation (not lurking) in social networks Virus software to combat e.g. KoobfaceMonitoring inappropriate content Contact management (stranger danger ; gangster errand)Etiquette do not post anything embarrassing Treat social networks as public – zero privacy , zero confidentialityVerify information where relevant Use password creation rules Curb any addictive nature Never give out socially sensitive on profile , directly or via social updates Parents name onlineParents on holiday Photos of home or holiday homeBirthdays ??? Enter surveysTell stories