SlideShare una empresa de Scribd logo
1 de 46
Descargar para leer sin conexión
Who are your friends really?
   Is there a positive side to social media?
   Who is reaching out to market to kids and
    teens?
   What are the risks that all social network
    users face?
   How do you separate your workplace from
    your personal on-line activities?
   How can you help to protect children and
    young adults?
Is there a
positive side to
social media?
     (Yes)
   Services like these do add value to our lives

     •   Facebook        •   Foursquare
     •   MySpace         •   Yelp
     •   Twitter         •   Google Buzz
     •   Blogging        •   YouTube
     •   LinkedIn        •   Flickr
                         •   Tumblr
http://fanpagelist.com
   Vkontakte
    Social network service in Russia, Ukraine,
    Belarus, and Kazakhstan. Has features like
    YouTube, Pandora, and MySpace all rolled
    into one, with an interface highly reminiscent
    of Facebook
   Orkut
    In Brazil and India, Google's Orkut ranks as
    the most visited social networking destination
    out-pacing Facebook
   Happy Farm
    China and Taiwan's Farmville, 23 million daily
    active users
   QQ
    Popular free IM program in Mainland China,
    number of simultaneous online QQ accounts
    exceeds 100 million
   Randall Munroe of the webcomic XKCD
   2007 version
    http://xkcd.com/256
   2010 version
    http://xkcd.com/802
    http://xkcd.com/802_large
Who is reaching
out to market to
kids and teens?
   hi5 delivers a fun, expressive, and interactive
    entertainment experience to millions of users
    around the world.
   Available in over 50 languages, the site
    features localized games, virtual goods
   Uses hi5 Coins, a global virtual currency
    supporting over 60 payment methods and 30
    currencies worldwide.
   http://www.hi5networks.com/
   SocioPath Launch Wraps Up at GDC Online
    2010 (Oct 12, 2010)
   Presentation to social media game developers
    and publishers
   SocioPath is the "Anti-Social Networking
    Platform for Social Games"
   See 'Secrets Revealed: Exploring the Next
    Generation Online Gaming Platform'
   Nobody knows the youth market better
   Connects with millions of young consumers
    online through highly trafficked websites and
    premium original web programming.
   Broadcasts Gossip Girl, Vampire Diaries,
    Sisterhood of the Traveling Pants, and Private
   In June 2010 Alloy Digital Network had 16.9
    million unique visitors
   http://www.alloydigital.com/
   http://www.alloytv.com/index.vm
   The world's largest online ad sales rep firm.
   We exclusively represent over 300 leading
    web publishers and offer integrated media
    and promotional programs to Fortune 500
    brand advertisers
   GN Kids
    Representing many of industry’s well known,
    online brands for reaching boys and girls
    ages 3-14, incld Disney Channel, Nick.com,
    Cartoon Network and Yahoo! Kids
   Summer Recreation Drives Millions to Gaming
    and Teens Sites (July 28, 2010)
   Social Networking Ranks as Fastest-Growing
    Mobile Content Category (June 2, 2010)
   Internet Users Age 6-14 in Brazil Spend 60
    Percent of their Online Time on Entertainment
    and Communication Sites (June 30, 2010)
   92% of U.S. 2-year-olds have Online Record
    (Oct 2010)
What are the
 risks that all
social network
  users face?
(and there are
    many)
   Twitter Phishing Attack Spreading via Direct
    Message (Feb 20, 2010)
   Facebook Accounts Hacked; 1.5 Million Login
    IDs For Sale? (April 23, 2010)
   Google Asking Buzz Users to Confirm
    Contacts (April 6, 2010)
   Foursquare's privacy loopholes (March 25,
    2010)
   Koobface (Facebook anagram) is a worm
    targeting Windows users of social networking
    sites like Facebook, MySpace, and Twitter
   Koobface attempts to gather sensitive
    information from the victims such as credit
    card numbers
   Let’s watch ...

    http://www.youtube.com/watch?v=q7xzsHLHSfc
   “Don't be surprised if a criminal compromises
    your or one of your colleague's personal
    social networking accounts to retrieve the
    E-mail addresses of some of your friends,
    and then uses that information to spoof an
    E-mail to you or your colleague at work. ”

    Steven R. Chabinsky
    Deputy Assistant Director, Cyber Division
    Federal Bureau of Investigation in speech March 23, 2010
   My pet peeve
   Do you post on Twitter or Facebook where
    you are ... or plan to go
   Foursquare’s business model
   Facebook's "Places" Geo-tagging Service
    raising serious privacy concerns; Could show
    strangers where you are ... and your Kids
   Keep it quiet and post later or turn off
    services like Facebook Places
What about the
 separation of
workplace and
 personal on-
line activities?
   Password Security – don't share between work
    accounts and Social Media sites
   Web Publishing – if you blog, have both a
    work blog and personal blog
   Computer Use – do you keep the churches
    checkbook on your work machine, do you use
    a work email to send out mass mailings for
    "non-official" use
   Relationships with vendors – don't use for
    personal gain
   Student-Teacher-Coaches Relations On-line
    ◦ Should you "friend" students on Facebook
    ◦ Use online classrooms on sites such as Blackboard
      or forums within a school district’s website rather
      than public SM sites
    ◦ Follow policy from Administration or School Board
    ◦ Create Friend Lists, then customize privacy levels
      for different information and content you include
      on your Profile. See Back to School: Tips for
      Teachers on Facebook (Sept 2009)
How can you
help to protect
 children and
young adults?
   Free ebook for Online Teens (Sept 2010)
   Own Your Space - Keep Yourself and Your
    Stuff Safe Online is written for computer and
    Internet savvy "tweens" and teens and their
    parents or educators
   250 PAGES
   To download either the entire book or
    individual chapters, go here:
    http://goo.gl/hW5u
Chapter List for Own Your Space
Chapter 01 - Protect Your Turf      Chapter 09 - Browsers Bite Back
Chapter 02 - Know Your Villains     Chapter 10 - Private Blogs and Public
                                                 Spaces
Chapter 03 - Nasty Ware             Chapter 11 - Going Social
Chapter 04 - Hackers and Crackers   Chapter 12 - Friends, Creeps, and
                                                 Pirates
Chapter 05 - Taking SPAM Off the    Chapter 13 - Any Port in a Storm
             Menu
Chapter 06 - Cyberbullies           Chapter 14 - Look Pa, No Strings
Chapter 07 - Phishing for Dollars   Chapter 15 - Getting Help
Chapter 08 - Safe Cyber Shopping    Chapter 16 - Tweaks
   8 tips for Explaining to Your Children How To
    Protect Themselves on Internet (Aug 2010)
    "you can’t protect them against all Internet
    dangers, but you can certainly teach them
    how to protect themselves."
   Beware These Social Networking Pitfalls For
    Kids (Sept 2010)
    "Quick: What's the legal age required for
    someone to create a Facebook account?"
   8 tips for Explaining to Your Children How To
    Protect Themselves on Internet (Aug 2010)
    "you can’t protect them against all Internet
    dangers, but you can certainly teach them
    how to protect themselves."
   Beware These Social Networking Pitfalls For
    Kids (Sept 2010)
    "Quick: What's the legal age required for
    someone to create a Facebook account?"

                       It's 13!
   Facebook Safety Center
   Sophos's recommendations for Facebook
    settings
   Facebook Newbie | Good Practices
    ◦ Be careful of stuff sent to you, even by people you
      respect (their Facebook account may have been
      hacked)
    ◦ Limit or eliminate access to games and plugins
    ◦ Think before you click
   Phishing
    ◦ Tried and True – but new for them
   Used Console Sales
    ◦ Selling banned consoles is a popular on EBay
   'Free' Programs
    ◦ Asked to fill in a survey (handing over personal
      information) in return for a non functional program.
   Big name, Big target
    ◦ When hot programs come out (Halo Reach)
      scammers will be using it as bait
                 http://sunbeltblog.blogspot.com/2010/10/popular-
                 gaming-scams-you-should-warn.html
   "Stop Think Connect" - public education
    campaign
   Campaign spearheaded by the National Cyber
    Security Alliance, the Anti-Phishing Working
    Group (APWG), countless government
    agencies (including the Department of
    Homeland Security), and companies such as
    Microsoft, Google, PayPal and Facebook.
   Music video PSA (starring Jay Wise and local
    Massachusetts school kids)
   SANS Internet Storm Center is focusing on ways
    to Secure the Human
   Children, schools, and young friends (Week 2)
    10 -Safe browsing for pre-teens
    11 -Safe browsing for teens
    12 -Social media usage
    13 -Online bullying
    14 -Securing a public computer
    15 -What teachers need to know about students
    16 -Securing a donated computer
   Co-workers (Week 4)
    24 - Using work computers at home
    25 - Using home computers for work
    26 - Sharing office files
    27 - Use of social media in the office
    28 - Role of the employee
    29 - Role of the office geek
    30 - Role of the network team
    31 - Tying it all together
What to do if someone cyberbullys your child:
 ◦ Act immediately by letting them know you can and
   will help
 ◦ Acknowledge the pain. Affirm what happened isn’t
   right and that they’re not at fault
 ◦ Tell your kids not to respond or retaliate, but save
   any evidence for authorities
 ◦ Block anyone whose behavior is inappropriate or
   threatening
 ◦ Report the problem. Consider reporting fellow
   students to the school. Report bullying on a website
   where the abuse occurred
                      Parents and Educators Cyberbullying
                      Survey - Executive Summary
   Develop and implement a formal policy for
    the school
   Provide training on how to address
    cyberbullying for faculty and staff
   Provide education for students and parents
    on:
    ◦ What cyberbullying is and how it works
    ◦ How to help kids avoid cyberbullying
    ◦ What to do if a child is a cyberbully or is being
      cyberbullied

                          Parents and Educators Cyberbullying
                          Survey - Executive Summary
   Va. may limit student-teacher contact on web
    (Jan 2011)
   Virginia Board of Education votes in Feb 2001
    to establish the state's policy for how
    students and teachers can interact via text-
    messaging, social networking, and online
    gaming. In a nutshell: they can't.
   28 page proposal - Proposed Guidelines for
    the Prevention of Sexual Misconduct & Abuse
    in Virginia Public Schools
   Girl Posts Birthday Invitation on Facebook,
    Gets 21000 RSVP’s (Sept 2010)
   Like any other tech savvy 14-year-old girl,
    Rebecca J. decided that the best way to get
    the word out about her 15th birthday party
    was to put out an invite on Facebook
   Except, Rebecca didn’t just send out the
    invitation to her friends, she accidentally sent
    it to the entire Facebook community
   Within a short time, more than 21,000 people
    RSVP’d to the event
   New “OMG Guy” Clickjacking Attack Spreads
    on Facebook (Sept 2010)
   Facebook scam involves a status update
    containing a link with the words: “OMG This
    GUY Went A Little To Far WITH His Revenge
    On His EX Girlfriend”
   When you click the link, you are taken to a
    fake captcha mechanism that tricks you into
    “liking” the content and spreading it on your
    profile
   Sydney Dalton, Bieber Fever And The New
    Cyber Bullying (Aug 2010)
   Teenage girl who had a crush on teen pop
    sensation Justin Bieber
   Posted YouTube video she was "over" him
   Video went viral, Dalton became Public Enemy
    #1 to the Bieber Army
   Criticism quickly turned to threats
   Long term, Dalton must deal with fact that
    her name and reputation is attached to story
   Target to Sell Facebook Credits as Gift Cards
    in Stores (Sept 2010)
   Facebook extends tentacles into the physical
    world
   Facebook Credits gift cards are sold in Target
    stores in $15, $25, and $50 denominations
   Cards allow purchase of virtual goods on
    Facebook, including popular games such as
    Farmville
   The Internet is fun but also dangerous
   People don’t know what they do and can
    easily be duped
   The more cool stuff, the more risks
   Updates should be applied religiously.
   Browsing to a site (ANY site) can infect your
    computer

Source: Safe Computing Tips For All
   You need to review and look at your various
    social media account settings
   Be aware that what you post is there for
    everyone to see
    ◦ bad folks to gather and sell
    ◦ Google to cache
    ◦ Library of Congress to archive (April 28, 2010)
   Adults need to help educate and raise
    awareness for our youth
   If needed, just WALK AWAY from Social Media
   Get this presentation online:
    ◦ http://www.slideshare.net/vcv1/
   Reputation Defender Blog
    ◦ http://www.reputationdefender.com/blog/
   Krebs on Security
    ◦ http://krebsonsecurity.com/
   Ag IT eNews
    ◦ http://agsci.psu.edu/it/news/latest/RSS
    ◦ or send a blank email to
      l-agit-enews-subscribe-request@lists.psu.edu

Más contenido relacionado

Último

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusZilliz
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...apidays
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 

Último (20)

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

Destacado

Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at WorkGetSmarter
 

Destacado (20)

Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 

Webinar impact of social networking on ece community

  • 1. Who are your friends really?
  • 2. Is there a positive side to social media?  Who is reaching out to market to kids and teens?  What are the risks that all social network users face?  How do you separate your workplace from your personal on-line activities?  How can you help to protect children and young adults?
  • 3. Is there a positive side to social media? (Yes)
  • 4. Services like these do add value to our lives • Facebook • Foursquare • MySpace • Yelp • Twitter • Google Buzz • Blogging • YouTube • LinkedIn • Flickr • Tumblr
  • 5.
  • 7. Vkontakte Social network service in Russia, Ukraine, Belarus, and Kazakhstan. Has features like YouTube, Pandora, and MySpace all rolled into one, with an interface highly reminiscent of Facebook  Orkut In Brazil and India, Google's Orkut ranks as the most visited social networking destination out-pacing Facebook
  • 8. Happy Farm China and Taiwan's Farmville, 23 million daily active users  QQ Popular free IM program in Mainland China, number of simultaneous online QQ accounts exceeds 100 million
  • 9. Randall Munroe of the webcomic XKCD  2007 version http://xkcd.com/256  2010 version http://xkcd.com/802 http://xkcd.com/802_large
  • 10.
  • 11.
  • 12. Who is reaching out to market to kids and teens?
  • 13. hi5 delivers a fun, expressive, and interactive entertainment experience to millions of users around the world.  Available in over 50 languages, the site features localized games, virtual goods  Uses hi5 Coins, a global virtual currency supporting over 60 payment methods and 30 currencies worldwide.  http://www.hi5networks.com/
  • 14. SocioPath Launch Wraps Up at GDC Online 2010 (Oct 12, 2010)  Presentation to social media game developers and publishers  SocioPath is the "Anti-Social Networking Platform for Social Games"  See 'Secrets Revealed: Exploring the Next Generation Online Gaming Platform'
  • 15. Nobody knows the youth market better  Connects with millions of young consumers online through highly trafficked websites and premium original web programming.  Broadcasts Gossip Girl, Vampire Diaries, Sisterhood of the Traveling Pants, and Private  In June 2010 Alloy Digital Network had 16.9 million unique visitors  http://www.alloydigital.com/  http://www.alloytv.com/index.vm
  • 16. The world's largest online ad sales rep firm.  We exclusively represent over 300 leading web publishers and offer integrated media and promotional programs to Fortune 500 brand advertisers  GN Kids Representing many of industry’s well known, online brands for reaching boys and girls ages 3-14, incld Disney Channel, Nick.com, Cartoon Network and Yahoo! Kids
  • 17. Summer Recreation Drives Millions to Gaming and Teens Sites (July 28, 2010)  Social Networking Ranks as Fastest-Growing Mobile Content Category (June 2, 2010)  Internet Users Age 6-14 in Brazil Spend 60 Percent of their Online Time on Entertainment and Communication Sites (June 30, 2010)  92% of U.S. 2-year-olds have Online Record (Oct 2010)
  • 18. What are the risks that all social network users face? (and there are many)
  • 19. Twitter Phishing Attack Spreading via Direct Message (Feb 20, 2010)  Facebook Accounts Hacked; 1.5 Million Login IDs For Sale? (April 23, 2010)  Google Asking Buzz Users to Confirm Contacts (April 6, 2010)  Foursquare's privacy loopholes (March 25, 2010)
  • 20. Koobface (Facebook anagram) is a worm targeting Windows users of social networking sites like Facebook, MySpace, and Twitter  Koobface attempts to gather sensitive information from the victims such as credit card numbers  Let’s watch ... http://www.youtube.com/watch?v=q7xzsHLHSfc
  • 21.
  • 22. “Don't be surprised if a criminal compromises your or one of your colleague's personal social networking accounts to retrieve the E-mail addresses of some of your friends, and then uses that information to spoof an E-mail to you or your colleague at work. ” Steven R. Chabinsky Deputy Assistant Director, Cyber Division Federal Bureau of Investigation in speech March 23, 2010
  • 23. My pet peeve  Do you post on Twitter or Facebook where you are ... or plan to go  Foursquare’s business model  Facebook's "Places" Geo-tagging Service raising serious privacy concerns; Could show strangers where you are ... and your Kids  Keep it quiet and post later or turn off services like Facebook Places
  • 24. What about the separation of workplace and personal on- line activities?
  • 25. Password Security – don't share between work accounts and Social Media sites  Web Publishing – if you blog, have both a work blog and personal blog  Computer Use – do you keep the churches checkbook on your work machine, do you use a work email to send out mass mailings for "non-official" use  Relationships with vendors – don't use for personal gain
  • 26. Student-Teacher-Coaches Relations On-line ◦ Should you "friend" students on Facebook ◦ Use online classrooms on sites such as Blackboard or forums within a school district’s website rather than public SM sites ◦ Follow policy from Administration or School Board ◦ Create Friend Lists, then customize privacy levels for different information and content you include on your Profile. See Back to School: Tips for Teachers on Facebook (Sept 2009)
  • 27. How can you help to protect children and young adults?
  • 28. Free ebook for Online Teens (Sept 2010)  Own Your Space - Keep Yourself and Your Stuff Safe Online is written for computer and Internet savvy "tweens" and teens and their parents or educators  250 PAGES  To download either the entire book or individual chapters, go here: http://goo.gl/hW5u
  • 29. Chapter List for Own Your Space Chapter 01 - Protect Your Turf Chapter 09 - Browsers Bite Back Chapter 02 - Know Your Villains Chapter 10 - Private Blogs and Public Spaces Chapter 03 - Nasty Ware Chapter 11 - Going Social Chapter 04 - Hackers and Crackers Chapter 12 - Friends, Creeps, and Pirates Chapter 05 - Taking SPAM Off the Chapter 13 - Any Port in a Storm Menu Chapter 06 - Cyberbullies Chapter 14 - Look Pa, No Strings Chapter 07 - Phishing for Dollars Chapter 15 - Getting Help Chapter 08 - Safe Cyber Shopping Chapter 16 - Tweaks
  • 30. 8 tips for Explaining to Your Children How To Protect Themselves on Internet (Aug 2010) "you can’t protect them against all Internet dangers, but you can certainly teach them how to protect themselves."  Beware These Social Networking Pitfalls For Kids (Sept 2010) "Quick: What's the legal age required for someone to create a Facebook account?"
  • 31. 8 tips for Explaining to Your Children How To Protect Themselves on Internet (Aug 2010) "you can’t protect them against all Internet dangers, but you can certainly teach them how to protect themselves."  Beware These Social Networking Pitfalls For Kids (Sept 2010) "Quick: What's the legal age required for someone to create a Facebook account?" It's 13!
  • 32. Facebook Safety Center  Sophos's recommendations for Facebook settings  Facebook Newbie | Good Practices ◦ Be careful of stuff sent to you, even by people you respect (their Facebook account may have been hacked) ◦ Limit or eliminate access to games and plugins ◦ Think before you click
  • 33. Phishing ◦ Tried and True – but new for them  Used Console Sales ◦ Selling banned consoles is a popular on EBay  'Free' Programs ◦ Asked to fill in a survey (handing over personal information) in return for a non functional program.  Big name, Big target ◦ When hot programs come out (Halo Reach) scammers will be using it as bait http://sunbeltblog.blogspot.com/2010/10/popular- gaming-scams-you-should-warn.html
  • 34. "Stop Think Connect" - public education campaign  Campaign spearheaded by the National Cyber Security Alliance, the Anti-Phishing Working Group (APWG), countless government agencies (including the Department of Homeland Security), and companies such as Microsoft, Google, PayPal and Facebook.  Music video PSA (starring Jay Wise and local Massachusetts school kids)
  • 35. SANS Internet Storm Center is focusing on ways to Secure the Human  Children, schools, and young friends (Week 2) 10 -Safe browsing for pre-teens 11 -Safe browsing for teens 12 -Social media usage 13 -Online bullying 14 -Securing a public computer 15 -What teachers need to know about students 16 -Securing a donated computer
  • 36. Co-workers (Week 4) 24 - Using work computers at home 25 - Using home computers for work 26 - Sharing office files 27 - Use of social media in the office 28 - Role of the employee 29 - Role of the office geek 30 - Role of the network team 31 - Tying it all together
  • 37. What to do if someone cyberbullys your child: ◦ Act immediately by letting them know you can and will help ◦ Acknowledge the pain. Affirm what happened isn’t right and that they’re not at fault ◦ Tell your kids not to respond or retaliate, but save any evidence for authorities ◦ Block anyone whose behavior is inappropriate or threatening ◦ Report the problem. Consider reporting fellow students to the school. Report bullying on a website where the abuse occurred Parents and Educators Cyberbullying Survey - Executive Summary
  • 38. Develop and implement a formal policy for the school  Provide training on how to address cyberbullying for faculty and staff  Provide education for students and parents on: ◦ What cyberbullying is and how it works ◦ How to help kids avoid cyberbullying ◦ What to do if a child is a cyberbully or is being cyberbullied Parents and Educators Cyberbullying Survey - Executive Summary
  • 39. Va. may limit student-teacher contact on web (Jan 2011)  Virginia Board of Education votes in Feb 2001 to establish the state's policy for how students and teachers can interact via text- messaging, social networking, and online gaming. In a nutshell: they can't.  28 page proposal - Proposed Guidelines for the Prevention of Sexual Misconduct & Abuse in Virginia Public Schools
  • 40. Girl Posts Birthday Invitation on Facebook, Gets 21000 RSVP’s (Sept 2010)  Like any other tech savvy 14-year-old girl, Rebecca J. decided that the best way to get the word out about her 15th birthday party was to put out an invite on Facebook  Except, Rebecca didn’t just send out the invitation to her friends, she accidentally sent it to the entire Facebook community  Within a short time, more than 21,000 people RSVP’d to the event
  • 41. New “OMG Guy” Clickjacking Attack Spreads on Facebook (Sept 2010)  Facebook scam involves a status update containing a link with the words: “OMG This GUY Went A Little To Far WITH His Revenge On His EX Girlfriend”  When you click the link, you are taken to a fake captcha mechanism that tricks you into “liking” the content and spreading it on your profile
  • 42. Sydney Dalton, Bieber Fever And The New Cyber Bullying (Aug 2010)  Teenage girl who had a crush on teen pop sensation Justin Bieber  Posted YouTube video she was "over" him  Video went viral, Dalton became Public Enemy #1 to the Bieber Army  Criticism quickly turned to threats  Long term, Dalton must deal with fact that her name and reputation is attached to story
  • 43. Target to Sell Facebook Credits as Gift Cards in Stores (Sept 2010)  Facebook extends tentacles into the physical world  Facebook Credits gift cards are sold in Target stores in $15, $25, and $50 denominations  Cards allow purchase of virtual goods on Facebook, including popular games such as Farmville
  • 44. The Internet is fun but also dangerous  People don’t know what they do and can easily be duped  The more cool stuff, the more risks  Updates should be applied religiously.  Browsing to a site (ANY site) can infect your computer Source: Safe Computing Tips For All
  • 45. You need to review and look at your various social media account settings  Be aware that what you post is there for everyone to see ◦ bad folks to gather and sell ◦ Google to cache ◦ Library of Congress to archive (April 28, 2010)  Adults need to help educate and raise awareness for our youth  If needed, just WALK AWAY from Social Media
  • 46. Get this presentation online: ◦ http://www.slideshare.net/vcv1/  Reputation Defender Blog ◦ http://www.reputationdefender.com/blog/  Krebs on Security ◦ http://krebsonsecurity.com/  Ag IT eNews ◦ http://agsci.psu.edu/it/news/latest/RSS ◦ or send a blank email to l-agit-enews-subscribe-request@lists.psu.edu