SlideShare una empresa de Scribd logo
1 de 14
SocialMediaandSecurity
Kyle Basedow, Alexandra Linde, Nina Rodgers
Introduction
● A majority of the time, social media creates a community
● Issues begin to arise during times of crisis/emergency when social media
users endanger themselves and others
● Certain social media platforms are more vulnerable to safety threats than
others (Twitter vs. LinkedIn)
● Two main issues involving personal safety/security: Identifying locations
and targeted threats
Location,Location,Location
#SULockdown
ParisAttacks
#porteouverte
Parisians used the
hashtag to signal that
they needed a safe
place to go, or have a
safe place to offer
(McHugh, 2015)
The hashtag became
inundated with
inspirational messages,
pushing down the tweets
citizens could actually
use to the bottom of
the stream
SocialMediaSurveillance
Screeningsocialmediaaccounts
Should the government be allowed access to the public's social media platforms
for background checks upon entering the U.S.?
→ In early 2015 the secret policy that prohibited immigration officials to
utilize social media platforms for all immigrants applying for U.S. visas was
renewed by Homeland Security Secretary Jeh Johnson despite controversy.
(Apuzzo,Schmidt,Preston, NYT)
→ Some may argue that it is an invasion of privacy for the government to hack
into our social media accounts.
→ On July 27th 2014, Tashfeen
Malik and her husband entered the
U.S.
(Figure 1, 2015. CNN Headline.)
→ San Bernardino attacks occurred
on Dec. 2, 2015
→ Years before entering the U.S.,
Tashfeen Malik direct messaged
people over social media saying
how she wanted to commit jihad and
martyrdom.(Evan Bleier, Daily Mail)
→ None of the messages were discovered
in the screening process.
→ The Immigration department has no
program that is known to screen social
media platforms.
→ Time concerns are not an issue
because our advanced technology has the
ability to identify these “red flags”
for the immigration department.
(Apuzzo,Schmidt,Preston, NYT)
→ National security has become a major
concern
→ Former SU Student posts anonymous tip
on Yik Yak about harming others.
→ DPS and Syracuse police were able to
stop the individual and locate them
because of his social media post.
(Samantha House, Syracuse.com)
Another Example...
→ Two students were arrested at the
University of Missouri after posting
anonymously on Yik Yak about shooting
black students on campus.(Alcindor and
Stanglin. USA TODAY)
→ What would it be like if a social media screening program existed during the
immigration process to the U.S.? Would these red flags have been found?
→ Where do you draw the line?
→ What is the threshold of people's comments that would allow suspicion and
call for further investigation?
Recommendations
PossibleSolutions
➔ It comes down to a question of ethics
◆ How far should the government be able to go? Once the access is
granted, it would be very difficult to get back
◆ How much do they have access to already?
➔ Should they be granted access, there must be guidelines
◆ Protection of freedom of speech
➔ More location based services (like Facebook check-ins)
◆ Separate streams by location
◆ City based apps
References
1) Figure 1, 2015. CNN Headline. http://www.cnn.com/2015/12/14/us/san-bernardino-shooting/
2) Visa Process Missed San Bernardino Wife’s Zealotry on Social Media, The New York Times. http://www.nytimes.com/2015/12/13/us/san-bernardino-attacks-
us-visa-process-tashfeen-maliks-remarks-on-social-media-about-jihad-were-missed.html?_r=0.
3) Tashfeen Malik reportedly passed background checks despite questionable social media posts, Fox News, http://www.foxnews.com/us/2015/12/13/tashfeen-
malik-reportedly-passed-background-checks-despite-questionable-social/.
4) Evan Bleier, REVEALED: San Bernardino terrorist Tashfeen Malik openly supported violent jihad on social media yet still passed THREE background checks to
gain entry into America, Daily Mail, http://www.dailymail.co.uk/news/article-3357799/Tashfeen-Malik-discussed-jihad-social-media-getting-visa-carrying-San-
Bernardino-shooting.html
5) Samantha House. Syracuse University officers charge former student with making threat.Syracuse.com.
http://www.syracuse.com/crime/index.ssf/2015/11/syracuse_university_officers_charge_former_student_with_making_threat.html
6) Yamiche Alcindor and Doug Stanglin, 2 suspects arrested in social media threats at Missouri campuses. USA TODAY,
http://www.usatoday.com/story/news/2015/11/11/some-at-u-of-missouri-on-edge-after-social-media-threats-of-violence/75559034/
7) Aryeh Savir, Tazpit. ynetnews App helps Israelis seek bomb shelters. http://www.ynetnews.com/articles/0,7340,L-4353723,00.html
8) Molly McHugh. After Paris Attacks, Parisians Use Hashtag to Offer Shelter. Wired.com http://www.wired.com/2015/11/paris-attacks-parisians-use-porteouverte-
hashtag-to-seek-offer-safe-shelter/

Más contenido relacionado

La actualidad más candente

Government 2.0 Defined
Government 2.0 DefinedGovernment 2.0 Defined
Government 2.0 DefinedWalter Schwabe
 
2020 12 nyu-workshop_cog_sec
2020 12 nyu-workshop_cog_sec2020 12 nyu-workshop_cog_sec
2020 12 nyu-workshop_cog_secSara-Jayne Terp
 
Social media use in times of crisis
Social media use in times of crisisSocial media use in times of crisis
Social media use in times of crisisInes Mergel
 
How To Set Up Social Media Sites - Some new stuff | Crash, BOOM, tweet…with a...
How To Set Up Social Media Sites - Some new stuff | Crash, BOOM, tweet…with a...How To Set Up Social Media Sites - Some new stuff | Crash, BOOM, tweet…with a...
How To Set Up Social Media Sites - Some new stuff | Crash, BOOM, tweet…with a...Lee Yount
 
Social Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social MediaSocial Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social MediaTyler Shields
 
Misinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the WorldMisinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the WorldCharles Mok
 
Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...
Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...
Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...Charles Mok
 
The case for integrating crisis response with social media
The case for integrating crisis response with social media The case for integrating crisis response with social media
The case for integrating crisis response with social media American Red Cross
 
Katherine Neal_Written Brief 1
Katherine Neal_Written Brief 1Katherine Neal_Written Brief 1
Katherine Neal_Written Brief 1Kate Neal
 
Socialmediapublicsavety
SocialmediapublicsavetySocialmediapublicsavety
SocialmediapublicsavetyFrank Smilda
 
Language of Politics on Twitter - 01 Political
Language of Politics on Twitter - 01 PoliticalLanguage of Politics on Twitter - 01 Political
Language of Politics on Twitter - 01 PoliticalYelena Mejova
 
Updated flipbook
Updated flipbookUpdated flipbook
Updated flipbookMika Ch
 
Crossing the Line: The Law of War and Cyber Engagement - A Symposium
Crossing the Line: The Law of War and Cyber Engagement - A SymposiumCrossing the Line: The Law of War and Cyber Engagement - A Symposium
Crossing the Line: The Law of War and Cyber Engagement - A SymposiumJonathan Meyer
 
Wikileaks script
Wikileaks scriptWikileaks script
Wikileaks script043cyeung
 
Bashar H. Malkawi, The Forum on National Security Law
Bashar H. Malkawi, The Forum on National Security LawBashar H. Malkawi, The Forum on National Security Law
Bashar H. Malkawi, The Forum on National Security LawBashar H. Malkawi
 
Instructions please write a 5 page paper answering the question con
Instructions please write a 5 page paper answering the question conInstructions please write a 5 page paper answering the question con
Instructions please write a 5 page paper answering the question consimba35
 

La actualidad más candente (18)

Government 2.0 Defined
Government 2.0 DefinedGovernment 2.0 Defined
Government 2.0 Defined
 
2020 12 nyu-workshop_cog_sec
2020 12 nyu-workshop_cog_sec2020 12 nyu-workshop_cog_sec
2020 12 nyu-workshop_cog_sec
 
Social media use in times of crisis
Social media use in times of crisisSocial media use in times of crisis
Social media use in times of crisis
 
How To Set Up Social Media Sites - Some new stuff | Crash, BOOM, tweet…with a...
How To Set Up Social Media Sites - Some new stuff | Crash, BOOM, tweet…with a...How To Set Up Social Media Sites - Some new stuff | Crash, BOOM, tweet…with a...
How To Set Up Social Media Sites - Some new stuff | Crash, BOOM, tweet…with a...
 
Social Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social MediaSocial Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social Media
 
Wiki leaks
Wiki leaksWiki leaks
Wiki leaks
 
Misinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the WorldMisinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the World
 
Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...
Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...
Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...
 
The case for integrating crisis response with social media
The case for integrating crisis response with social media The case for integrating crisis response with social media
The case for integrating crisis response with social media
 
Katherine Neal_Written Brief 1
Katherine Neal_Written Brief 1Katherine Neal_Written Brief 1
Katherine Neal_Written Brief 1
 
Socialmediapublicsavety
SocialmediapublicsavetySocialmediapublicsavety
Socialmediapublicsavety
 
Language of Politics on Twitter - 01 Political
Language of Politics on Twitter - 01 PoliticalLanguage of Politics on Twitter - 01 Political
Language of Politics on Twitter - 01 Political
 
Updated flipbook
Updated flipbookUpdated flipbook
Updated flipbook
 
Crossing the Line: The Law of War and Cyber Engagement - A Symposium
Crossing the Line: The Law of War and Cyber Engagement - A SymposiumCrossing the Line: The Law of War and Cyber Engagement - A Symposium
Crossing the Line: The Law of War and Cyber Engagement - A Symposium
 
Wikileaks script
Wikileaks scriptWikileaks script
Wikileaks script
 
Bashar H. Malkawi, The Forum on National Security Law
Bashar H. Malkawi, The Forum on National Security LawBashar H. Malkawi, The Forum on National Security Law
Bashar H. Malkawi, The Forum on National Security Law
 
The Digital Divide in the Post Snowden Era Presentation
The Digital Divide in the Post Snowden Era PresentationThe Digital Divide in the Post Snowden Era Presentation
The Digital Divide in the Post Snowden Era Presentation
 
Instructions please write a 5 page paper answering the question con
Instructions please write a 5 page paper answering the question conInstructions please write a 5 page paper answering the question con
Instructions please write a 5 page paper answering the question con
 

Destacado

Petit Club Cookies - The future of privacy par nugg.ad
Petit Club Cookies - The future of privacy par nugg.adPetit Club Cookies - The future of privacy par nugg.ad
Petit Club Cookies - The future of privacy par nugg.adPetit Web
 
Future of community engagement 11 05 2016
Future of community engagement 11 05 2016Future of community engagement 11 05 2016
Future of community engagement 11 05 2016Future Agenda
 
From Gold Rush to Online Gold Mine: How Brooks Brothers Used Analytics to Dri...
From Gold Rush to Online Gold Mine: How Brooks Brothers Used Analytics to Dri...From Gold Rush to Online Gold Mine: How Brooks Brothers Used Analytics to Dri...
From Gold Rush to Online Gold Mine: How Brooks Brothers Used Analytics to Dri...Adobe
 
Ulcère de jambe
Ulcère de jambeUlcère de jambe
Ulcère de jambeMede Space
 
Soil lixiviation and slow release pattern of starch-nano sliver particles-enc...
Soil lixiviation and slow release pattern of starch-nano sliver particles-enc...Soil lixiviation and slow release pattern of starch-nano sliver particles-enc...
Soil lixiviation and slow release pattern of starch-nano sliver particles-enc...iosrjce
 
LA DÉPENDANCE TABAGIQUE
LA DÉPENDANCE TABAGIQUELA DÉPENDANCE TABAGIQUE
LA DÉPENDANCE TABAGIQUEMede Space
 
Ethique Professionnelle
Ethique ProfessionnelleEthique Professionnelle
Ethique ProfessionnelleMehdi Razzok
 
270 bài tập trắc nghiệm tiệm cận hàm số lớp 12 - iHoc.me
270 bài tập trắc nghiệm tiệm cận hàm số lớp 12 - iHoc.me 270 bài tập trắc nghiệm tiệm cận hàm số lớp 12 - iHoc.me
270 bài tập trắc nghiệm tiệm cận hàm số lớp 12 - iHoc.me haic2hv.net
 
Programme nationale de lutte contre la tuberculose
Programme nationale de lutte contre la tuberculoseProgramme nationale de lutte contre la tuberculose
Programme nationale de lutte contre la tuberculoseMehdi Razzok
 
STRATEGIC PLAN OF INDIAN TOBACCO COMPANY (ITC)
STRATEGIC PLAN OF INDIAN TOBACCO COMPANY (ITC)STRATEGIC PLAN OF INDIAN TOBACCO COMPANY (ITC)
STRATEGIC PLAN OF INDIAN TOBACCO COMPANY (ITC)Utkarsh Bisht
 
AmebaのOpenStack - OpenStack最新情報セミナー 2015年12月
AmebaのOpenStack - OpenStack最新情報セミナー 2015年12月AmebaのOpenStack - OpenStack最新情報セミナー 2015年12月
AmebaのOpenStack - OpenStack最新情報セミナー 2015年12月VirtualTech Japan Inc.
 
Functional Programming For All - Scala Matsuri 2016
Functional Programming For All - Scala Matsuri 2016Functional Programming For All - Scala Matsuri 2016
Functional Programming For All - Scala Matsuri 2016Zachary Abbott
 
あなたのScalaを爆速にする7つの方法(日本語版)
あなたのScalaを爆速にする7つの方法(日本語版)あなたのScalaを爆速にする7つの方法(日本語版)
あなたのScalaを爆速にする7つの方法(日本語版)x1 ichi
 
536 bài tập trắc nghiệm toán phương trình, hệ phương trình mũ, logarit
536 bài tập trắc nghiệm toán phương trình, hệ phương trình mũ, logarit536 bài tập trắc nghiệm toán phương trình, hệ phương trình mũ, logarit
536 bài tập trắc nghiệm toán phương trình, hệ phương trình mũ, logarithaic2hv.net
 
MARICO - Parachute Oil Distribution Mgmt
MARICO - Parachute Oil Distribution MgmtMARICO - Parachute Oil Distribution Mgmt
MARICO - Parachute Oil Distribution MgmtRajesh Shetty
 
F.O.Xを支える技術
F.O.Xを支える技術F.O.Xを支える技術
F.O.Xを支える技術Yuto Suzuki
 
Node.jsv0.8からv4.xへのバージョンアップ ~大規模Push通知基盤の運用事例~
Node.jsv0.8からv4.xへのバージョンアップ ~大規模Push通知基盤の運用事例~Node.jsv0.8からv4.xへのバージョンアップ ~大規模Push通知基盤の運用事例~
Node.jsv0.8からv4.xへのバージョンアップ ~大規模Push通知基盤の運用事例~Recruit Technologies
 

Destacado (20)

Mazeau-1901
Mazeau-1901Mazeau-1901
Mazeau-1901
 
Petit Club Cookies - The future of privacy par nugg.ad
Petit Club Cookies - The future of privacy par nugg.adPetit Club Cookies - The future of privacy par nugg.ad
Petit Club Cookies - The future of privacy par nugg.ad
 
Future of community engagement 11 05 2016
Future of community engagement 11 05 2016Future of community engagement 11 05 2016
Future of community engagement 11 05 2016
 
Eye
EyeEye
Eye
 
From Gold Rush to Online Gold Mine: How Brooks Brothers Used Analytics to Dri...
From Gold Rush to Online Gold Mine: How Brooks Brothers Used Analytics to Dri...From Gold Rush to Online Gold Mine: How Brooks Brothers Used Analytics to Dri...
From Gold Rush to Online Gold Mine: How Brooks Brothers Used Analytics to Dri...
 
Ulcère de jambe
Ulcère de jambeUlcère de jambe
Ulcère de jambe
 
developer
developerdeveloper
developer
 
Soil lixiviation and slow release pattern of starch-nano sliver particles-enc...
Soil lixiviation and slow release pattern of starch-nano sliver particles-enc...Soil lixiviation and slow release pattern of starch-nano sliver particles-enc...
Soil lixiviation and slow release pattern of starch-nano sliver particles-enc...
 
LA DÉPENDANCE TABAGIQUE
LA DÉPENDANCE TABAGIQUELA DÉPENDANCE TABAGIQUE
LA DÉPENDANCE TABAGIQUE
 
Ethique Professionnelle
Ethique ProfessionnelleEthique Professionnelle
Ethique Professionnelle
 
270 bài tập trắc nghiệm tiệm cận hàm số lớp 12 - iHoc.me
270 bài tập trắc nghiệm tiệm cận hàm số lớp 12 - iHoc.me 270 bài tập trắc nghiệm tiệm cận hàm số lớp 12 - iHoc.me
270 bài tập trắc nghiệm tiệm cận hàm số lớp 12 - iHoc.me
 
Programme nationale de lutte contre la tuberculose
Programme nationale de lutte contre la tuberculoseProgramme nationale de lutte contre la tuberculose
Programme nationale de lutte contre la tuberculose
 
STRATEGIC PLAN OF INDIAN TOBACCO COMPANY (ITC)
STRATEGIC PLAN OF INDIAN TOBACCO COMPANY (ITC)STRATEGIC PLAN OF INDIAN TOBACCO COMPANY (ITC)
STRATEGIC PLAN OF INDIAN TOBACCO COMPANY (ITC)
 
AmebaのOpenStack - OpenStack最新情報セミナー 2015年12月
AmebaのOpenStack - OpenStack最新情報セミナー 2015年12月AmebaのOpenStack - OpenStack最新情報セミナー 2015年12月
AmebaのOpenStack - OpenStack最新情報セミナー 2015年12月
 
Functional Programming For All - Scala Matsuri 2016
Functional Programming For All - Scala Matsuri 2016Functional Programming For All - Scala Matsuri 2016
Functional Programming For All - Scala Matsuri 2016
 
あなたのScalaを爆速にする7つの方法(日本語版)
あなたのScalaを爆速にする7つの方法(日本語版)あなたのScalaを爆速にする7つの方法(日本語版)
あなたのScalaを爆速にする7つの方法(日本語版)
 
536 bài tập trắc nghiệm toán phương trình, hệ phương trình mũ, logarit
536 bài tập trắc nghiệm toán phương trình, hệ phương trình mũ, logarit536 bài tập trắc nghiệm toán phương trình, hệ phương trình mũ, logarit
536 bài tập trắc nghiệm toán phương trình, hệ phương trình mũ, logarit
 
MARICO - Parachute Oil Distribution Mgmt
MARICO - Parachute Oil Distribution MgmtMARICO - Parachute Oil Distribution Mgmt
MARICO - Parachute Oil Distribution Mgmt
 
F.O.Xを支える技術
F.O.Xを支える技術F.O.Xを支える技術
F.O.Xを支える技術
 
Node.jsv0.8からv4.xへのバージョンアップ ~大規模Push通知基盤の運用事例~
Node.jsv0.8からv4.xへのバージョンアップ ~大規模Push通知基盤の運用事例~Node.jsv0.8からv4.xへのバージョンアップ ~大規模Push通知基盤の運用事例~
Node.jsv0.8からv4.xへのバージョンアップ ~大規模Push通知基盤の運用事例~
 

Similar a Com 427 final presentation

CDG14_BRIEF_ArchiveSocial_V
CDG14_BRIEF_ArchiveSocial_VCDG14_BRIEF_ArchiveSocial_V
CDG14_BRIEF_ArchiveSocial_VBronlea Mishler
 
64The Empire Strikes Back Social Media Uprisings and .docx
64The Empire Strikes Back Social Media Uprisings and .docx64The Empire Strikes Back Social Media Uprisings and .docx
64The Empire Strikes Back Social Media Uprisings and .docxevonnehoggarth79783
 
Social Media & Emergencies for the National Capital Region
Social Media & Emergencies for the National Capital RegionSocial Media & Emergencies for the National Capital Region
Social Media & Emergencies for the National Capital RegionGreg Licamele
 
Technology & Society#SocialChangeA preeminent form of social.docx
Technology & Society#SocialChangeA preeminent form of social.docxTechnology & Society#SocialChangeA preeminent form of social.docx
Technology & Society#SocialChangeA preeminent form of social.docxmattinsonjanel
 
Social Media's New Role in Disaster Response
Social Media's New Role in Disaster ResponseSocial Media's New Role in Disaster Response
Social Media's New Role in Disaster ResponseMeredith Binns
 
Twitter And Social Justice
Twitter And Social JusticeTwitter And Social Justice
Twitter And Social JusticeJodi Sperber
 
Amend Section 230 Now
Amend Section 230 NowAmend Section 230 Now
Amend Section 230 NowCady11
 
How information spreads on social networks when unexpected events occur
How information spreads on social networks when unexpected events occurHow information spreads on social networks when unexpected events occur
How information spreads on social networks when unexpected events occurFarida Vis
 
Cyber Security in the Age of Globalization
Cyber Security in the Age of GlobalizationCyber Security in the Age of Globalization
Cyber Security in the Age of GlobalizationBenjamin Morley
 
Shaping Social Media as a Crisis Communication Tool - Nicholas Tancredi
Shaping Social Media as a Crisis Communication Tool  - Nicholas TancrediShaping Social Media as a Crisis Communication Tool  - Nicholas Tancredi
Shaping Social Media as a Crisis Communication Tool - Nicholas TancrediNicholas Tancredi
 
Capstone Lessons Learned
Capstone Lessons LearnedCapstone Lessons Learned
Capstone Lessons LearnedGuy DeMarco
 
Fake news for the masses: evaluating news sources through active learning - L...
Fake news for the masses: evaluating news sources through active learning - L...Fake news for the masses: evaluating news sources through active learning - L...
Fake news for the masses: evaluating news sources through active learning - L...IL Group (CILIP Information Literacy Group)
 
Communication Theories - Knowledge Gap & Modernization Theory
Communication Theories - Knowledge Gap & Modernization Theory Communication Theories - Knowledge Gap & Modernization Theory
Communication Theories - Knowledge Gap & Modernization Theory Alyssa G. Lobo
 
Weapons of-mass-distraction-foreign-state-sponsored-disinformation-in-the-dig...
Weapons of-mass-distraction-foreign-state-sponsored-disinformation-in-the-dig...Weapons of-mass-distraction-foreign-state-sponsored-disinformation-in-the-dig...
Weapons of-mass-distraction-foreign-state-sponsored-disinformation-in-the-dig...archiejones4
 
What social media is doing to the world
What social media is doing to the worldWhat social media is doing to the world
What social media is doing to the worldJulieCarn
 
Invasion Of Privacy In Canadian Media
Invasion Of Privacy In Canadian MediaInvasion Of Privacy In Canadian Media
Invasion Of Privacy In Canadian MediaKelly Ratkovic
 
Respond to 2 students and professor. 150 words each student no word
Respond to 2 students and professor. 150 words each student no word Respond to 2 students and professor. 150 words each student no word
Respond to 2 students and professor. 150 words each student no word mickietanger
 
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...Maurice Dawson
 
Digital Keepers: Ethics of Saving Online Data About Latin American Social Mo...
Digital Keepers:  Ethics of Saving Online Data About Latin American Social Mo...Digital Keepers:  Ethics of Saving Online Data About Latin American Social Mo...
Digital Keepers: Ethics of Saving Online Data About Latin American Social Mo...Itza Carbajal
 

Similar a Com 427 final presentation (20)

CDG14_BRIEF_ArchiveSocial_V
CDG14_BRIEF_ArchiveSocial_VCDG14_BRIEF_ArchiveSocial_V
CDG14_BRIEF_ArchiveSocial_V
 
64The Empire Strikes Back Social Media Uprisings and .docx
64The Empire Strikes Back Social Media Uprisings and .docx64The Empire Strikes Back Social Media Uprisings and .docx
64The Empire Strikes Back Social Media Uprisings and .docx
 
Social Media & Emergencies for the National Capital Region
Social Media & Emergencies for the National Capital RegionSocial Media & Emergencies for the National Capital Region
Social Media & Emergencies for the National Capital Region
 
Technology & Society#SocialChangeA preeminent form of social.docx
Technology & Society#SocialChangeA preeminent form of social.docxTechnology & Society#SocialChangeA preeminent form of social.docx
Technology & Society#SocialChangeA preeminent form of social.docx
 
Social Media's New Role in Disaster Response
Social Media's New Role in Disaster ResponseSocial Media's New Role in Disaster Response
Social Media's New Role in Disaster Response
 
Twitter And Social Justice
Twitter And Social JusticeTwitter And Social Justice
Twitter And Social Justice
 
Amend Section 230 Now
Amend Section 230 NowAmend Section 230 Now
Amend Section 230 Now
 
How information spreads on social networks when unexpected events occur
How information spreads on social networks when unexpected events occurHow information spreads on social networks when unexpected events occur
How information spreads on social networks when unexpected events occur
 
Cyber Security in the Age of Globalization
Cyber Security in the Age of GlobalizationCyber Security in the Age of Globalization
Cyber Security in the Age of Globalization
 
Shaping Social Media as a Crisis Communication Tool - Nicholas Tancredi
Shaping Social Media as a Crisis Communication Tool  - Nicholas TancrediShaping Social Media as a Crisis Communication Tool  - Nicholas Tancredi
Shaping Social Media as a Crisis Communication Tool - Nicholas Tancredi
 
Capstone Lessons Learned
Capstone Lessons LearnedCapstone Lessons Learned
Capstone Lessons Learned
 
Fake news for the masses: evaluating news sources through active learning - L...
Fake news for the masses: evaluating news sources through active learning - L...Fake news for the masses: evaluating news sources through active learning - L...
Fake news for the masses: evaluating news sources through active learning - L...
 
Communication Theories - Knowledge Gap & Modernization Theory
Communication Theories - Knowledge Gap & Modernization Theory Communication Theories - Knowledge Gap & Modernization Theory
Communication Theories - Knowledge Gap & Modernization Theory
 
Weapons of-mass-distraction-foreign-state-sponsored-disinformation-in-the-dig...
Weapons of-mass-distraction-foreign-state-sponsored-disinformation-in-the-dig...Weapons of-mass-distraction-foreign-state-sponsored-disinformation-in-the-dig...
Weapons of-mass-distraction-foreign-state-sponsored-disinformation-in-the-dig...
 
What social media is doing to the world
What social media is doing to the worldWhat social media is doing to the world
What social media is doing to the world
 
Invasion Of Privacy In Canadian Media
Invasion Of Privacy In Canadian MediaInvasion Of Privacy In Canadian Media
Invasion Of Privacy In Canadian Media
 
Respond to 2 students and professor. 150 words each student no word
Respond to 2 students and professor. 150 words each student no word Respond to 2 students and professor. 150 words each student no word
Respond to 2 students and professor. 150 words each student no word
 
Presentation
PresentationPresentation
Presentation
 
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
 
Digital Keepers: Ethics of Saving Online Data About Latin American Social Mo...
Digital Keepers:  Ethics of Saving Online Data About Latin American Social Mo...Digital Keepers:  Ethics of Saving Online Data About Latin American Social Mo...
Digital Keepers: Ethics of Saving Online Data About Latin American Social Mo...
 

Com 427 final presentation

  • 2. Introduction ● A majority of the time, social media creates a community ● Issues begin to arise during times of crisis/emergency when social media users endanger themselves and others ● Certain social media platforms are more vulnerable to safety threats than others (Twitter vs. LinkedIn) ● Two main issues involving personal safety/security: Identifying locations and targeted threats
  • 5. ParisAttacks #porteouverte Parisians used the hashtag to signal that they needed a safe place to go, or have a safe place to offer (McHugh, 2015) The hashtag became inundated with inspirational messages, pushing down the tweets citizens could actually use to the bottom of the stream
  • 7. Screeningsocialmediaaccounts Should the government be allowed access to the public's social media platforms for background checks upon entering the U.S.? → In early 2015 the secret policy that prohibited immigration officials to utilize social media platforms for all immigrants applying for U.S. visas was renewed by Homeland Security Secretary Jeh Johnson despite controversy. (Apuzzo,Schmidt,Preston, NYT) → Some may argue that it is an invasion of privacy for the government to hack into our social media accounts.
  • 8. → On July 27th 2014, Tashfeen Malik and her husband entered the U.S. (Figure 1, 2015. CNN Headline.) → San Bernardino attacks occurred on Dec. 2, 2015 → Years before entering the U.S., Tashfeen Malik direct messaged people over social media saying how she wanted to commit jihad and martyrdom.(Evan Bleier, Daily Mail)
  • 9. → None of the messages were discovered in the screening process. → The Immigration department has no program that is known to screen social media platforms. → Time concerns are not an issue because our advanced technology has the ability to identify these “red flags” for the immigration department. (Apuzzo,Schmidt,Preston, NYT) → National security has become a major concern
  • 10. → Former SU Student posts anonymous tip on Yik Yak about harming others. → DPS and Syracuse police were able to stop the individual and locate them because of his social media post. (Samantha House, Syracuse.com) Another Example... → Two students were arrested at the University of Missouri after posting anonymously on Yik Yak about shooting black students on campus.(Alcindor and Stanglin. USA TODAY)
  • 11. → What would it be like if a social media screening program existed during the immigration process to the U.S.? Would these red flags have been found? → Where do you draw the line? → What is the threshold of people's comments that would allow suspicion and call for further investigation?
  • 13. PossibleSolutions ➔ It comes down to a question of ethics ◆ How far should the government be able to go? Once the access is granted, it would be very difficult to get back ◆ How much do they have access to already? ➔ Should they be granted access, there must be guidelines ◆ Protection of freedom of speech ➔ More location based services (like Facebook check-ins) ◆ Separate streams by location ◆ City based apps
  • 14. References 1) Figure 1, 2015. CNN Headline. http://www.cnn.com/2015/12/14/us/san-bernardino-shooting/ 2) Visa Process Missed San Bernardino Wife’s Zealotry on Social Media, The New York Times. http://www.nytimes.com/2015/12/13/us/san-bernardino-attacks- us-visa-process-tashfeen-maliks-remarks-on-social-media-about-jihad-were-missed.html?_r=0. 3) Tashfeen Malik reportedly passed background checks despite questionable social media posts, Fox News, http://www.foxnews.com/us/2015/12/13/tashfeen- malik-reportedly-passed-background-checks-despite-questionable-social/. 4) Evan Bleier, REVEALED: San Bernardino terrorist Tashfeen Malik openly supported violent jihad on social media yet still passed THREE background checks to gain entry into America, Daily Mail, http://www.dailymail.co.uk/news/article-3357799/Tashfeen-Malik-discussed-jihad-social-media-getting-visa-carrying-San- Bernardino-shooting.html 5) Samantha House. Syracuse University officers charge former student with making threat.Syracuse.com. http://www.syracuse.com/crime/index.ssf/2015/11/syracuse_university_officers_charge_former_student_with_making_threat.html 6) Yamiche Alcindor and Doug Stanglin, 2 suspects arrested in social media threats at Missouri campuses. USA TODAY, http://www.usatoday.com/story/news/2015/11/11/some-at-u-of-missouri-on-edge-after-social-media-threats-of-violence/75559034/ 7) Aryeh Savir, Tazpit. ynetnews App helps Israelis seek bomb shelters. http://www.ynetnews.com/articles/0,7340,L-4353723,00.html 8) Molly McHugh. After Paris Attacks, Parisians Use Hashtag to Offer Shelter. Wired.com http://www.wired.com/2015/11/paris-attacks-parisians-use-porteouverte- hashtag-to-seek-offer-safe-shelter/

Notas del editor

  1. -What is this picture? -Local outlets were tweeting out updates, but what’s the issue with tweeting out your real-time location?