SlideShare una empresa de Scribd logo
1 de 67
By: Rachel Brock, Alyssa Budhoo,
Claire Keating & Yuxing Zeng












Why Do People Use Social Media?
Legal Issues With Social Media
Facebook – Privacy Issues
Twitter – Privacy Issues
YouTube – Privacy Issues
LinkedIn – Privacy Issues
Protecting Your Privacy
Online Threats
Steps To Ensuring Online Privacy
National Privacy Day






Social Interaction- allows people to be social.
They meet new people and keep in touch with
family, friends, and acquaintances.
Seek Information- used to find information
about products/services, keeping up with
real-world social events, and learning new
things.
Pass Time- great tool to kill time and when
you’re bored.

Connor, O. (2013, July 5). 10 reasons people use social media. Retrieved from
https://www.onepoll.com/10-reasons-people-use-social-media/

Alyssa Budhoo








Entertainment-social media gives access to
games, music and videos.
Relaxation- social media helps relieve stress
and escape reality.
Expression of Opinions- people express
thoughts and opinions through social media.
Things to Talk About- social media provides
topics for people to talk and gossip about
with others.

Connor, O. (2013, July 5). 10 reasons people use social media. Retrieved from
https://www.onepoll.com/10-reasons-people-use-social-media/

Alyssa Budhoo






Convenience- social media is easily
accessible anywhere at any time. People can
talk to numerous people at the same time.
Sharing Information- people market their
own image through social media by
broadcasting things about themselves
through publishing updates, videos and
pictures.

Know about others- social media gives
people a display into the lives of others, by
being able to check out other profiles.

Connor, O. (2013, July 5). 10 reasons people use social media. Retrieved from
https://www.onepoll.com/10-reasons-people-use-social-media/

Alyssa Budhoo
Why Use Social Media in Business?

The video states facts about social media networks
and how much popularity they are gaining due to the
fact that there are more users and people joining
these sites. Therefore, giving businesses an effective
reason to use social media in their business
practices.

Alyssa Budhoo






Branding- creates a noticeable identity for the
product/service.
Creates a Buzz- word gets out about the
products/services through online
conversation.
Online Reputation Management- Easy to see
what other people and sites are saying about
the name, company, or brand online.
Albert, S. (n.d.). 20 reasons your small business should use social media . Retrieved
from http://blissfullydomestic.com/life-bliss/20-reasons-small-businessesshould-use-social-media/7414/

Alyssa Budhoo






Established as an Expert- using forums and
message boards to answer questions
professionally, honestly, and correctly will earn
businesses respect as an expert.
Word of Mouth- market products through word
of mouth virtually. Customers trust friends and
family; they need to trust before
purchasing, therefore hearing about the product
from someone trustworthy, will insist them to
buy.

Builds relationships and Becomes More Personalusing a variety of social media will build
relationships with customers and potential
customers.
Albert, S. (n.d.). 20 reasons your small business should use social media . Retrieved
from http://blissfullydomestic.com/life-bliss/20-reasons-small-businessesshould-use-social-media/7414/

Alyssa Budhoo






Open up the line of communication between
business owner and millions of potential
customers- Millions of people use social media
everyday and can become potential customers,
this does not come so easily in the offline world.
Small businesses can compete with large
companies- with the right type of viral social
media, an immense amount of traffic can grow
quickly with natural links, and keep traffic
coming for a long time.
Social networking with potential clients and
customers from all over the globe- with all the
social networking sites available, businesses can
hold personal conversations with each of their
customers.
Albert, S. (n.d.). 20 reasons your small business should use social media . Retrieved
from http://blissfullydomestic.com/life-bliss/20-reasons-small-businessesshould-use-social-media/7414/

Alyssa Budhoo






Generates Traffic- If an item becomes viral and
makes it to the front page of a big social news
site, the viewership can grow tremendously.
Increased link-ability- in order to move up in
search engines, having links from other sites
pointed to the business site is essential. Natural
links-or links that come from a great post, video,
or picture, are best for the business.
Cheaper than traditional Marketing and
Advertising- social media is a portion of the cost
of traditional marketing and advertising.
Albert, S. (n.d.). 20 reasons your small business should use social media . Retrieved
from http://blissfullydomestic.com/life-bliss/20-reasons-small-businessesshould-use-social-media/7414/

Alyssa Budhoo






The company is more accessible- everyone
can access online interaction anywhere at any
time.
Direct conversation to a specific niche- many
social networking, social bookmarking, and
social news site are directed to specific
niches. Business’ have the ability to speak
directly to them.

Another way for potential customers to find
you- if the business is not high enough in
search engines, customers can still find the
business through social media.
Albert, S. (n.d.). 20 reasons your small business should use social media . Retrieved
from http://blissfullydomestic.com/life-bliss/20-reasons-small-businessesshould-use-social-media/7414/

Alyssa Budhoo




A way to explain yourself- it’s always going
to be possible to receive negative comments.
Social media provides a platform to
explain, and fix things to make them right.
Shows your stuff- Universal search is now
accessible through Google, meaning
everything appears on Google Search. So
product images can rank like the business
site, making it easier for customers to see
your product right on the Google search.
Albert, S. (n.d.). 20 reasons your small business should use social media . Retrieved
from http://blissfullydomestic.com/life-bliss/20-reasons-small-businessesshould-use-social-media/7414/

Alyssa Budhoo




Find out what customers want- social media
allows you to ask customers exactly what
they want.

Customers can play an active role in the
business- customers can offer
suggestions, share their likes and dislikes all
on social media. Therefore, ideas for new
products and services can develop.

Albert, S. (n.d.). 20 reasons your small business should use social media . Retrieved
from http://blissfullydomestic.com/life-bliss/20-reasons-small-businessesshould-use-social-media/7414/

Alyssa Budhoo
1.

2.
3.
4.
5.

6.
7.
8.
9.
10.

Disclosure of Confidential Information
Unauthorized Use of Trademarks
Unauthorized Use of Copyright-Protected Works
Defamation Issues
Electronic Discovery
Dynamic Information
Human Resources Issues
Securities
Privacy/Publicity
Endorsements

Neal & McDevitt. (2010). Top 10 legal issues in social media. Retrieved from
http://www.bartonchicago.com/pdf/socialmedia.pdf

Alyssa Budhoo
Posting videos and photos without proper releases
may infringe the privacy or publicity rights of
individuals. Companies must make sure that their
employees are not violating specific privacy
regulations in their activities on social media sites.

Neal & McDevitt. (2010). Top 10 legal issues in social media. Retrieved from
http://www.bartonchicago.com/pdf/socialmedia.pdf

Alyssa Budhoo
Top 10 Legal Issues in Social Media
Social networking and Social media is becoming the
“next big thing” for both small and large businesses.
With advertisers, marketers, HR departments, job
seekers, and employees using these tools, they need
to be aware of potential consequences in order to
avoid legal problems. The article lists the top 10
legal problems companies may face when using
social media in their business practices.

Alyssa Budhoo
As you have read, social media sites come with
great advantages and opportunities for people
both in their personal and business world.
They do, however, come with issues and
threats specifically aimed towards our privacy.
The following slides will examine privacy issues
with the most popular social media sites:
Facebook, Twitter, YouTube and LinkedIn.

Rachel Brock
Privacy App Pinpoints Your Exact Location Using
Social Media
With the ongoing popularity among high school
students using Twitter and Instagram, they are not
aware of the amount of information being posted
from their social media updates. In the article,
researchers at the International Computer Science
Institute and UC Berkeley present findings about
geo-tags and the threats they can impose on high
school students who update regularly on social
media.

Alyssa Budhoo


Launched February 2004

"Facebook to offer TV data to networks Comments."
Digital TV Europe . N.p., n.d. Web. 28 Nov. 2013.
<http://www.digitaltveurope.net/106962/facebook-tooffer-tv-data-to-networks/>.



Created by Mark Zuckerberg
Facebook allows you to connect with
friends, upload photos, and share links and videos



The most popular online Social networking site





In 2013, Facebook reached 750 million unique
visits per month
"Facebook." Answers.com. Answers, n.d. Web. 28 Nov. 2013. <http://www.answers.com/topic/facebook>.
"Visual.Ly." Top 10 Most Popular Social Networks 2013. N.p., n.d. Web. 28 Nov. 2013.
<http://visual.ly/top-10-most-popular-social-networks-2013>.

Yuxing Zeng




News feed: angered many users by not giving them control
of who could see their updates, or the ability to opt out
◦ Launched in 2006
Beacon (2007)
◦ a Facebook ad system that tracked what users did and
what they purchased on partner websites, even for users
who were not Facebook members
◦ Adding to the privacy concerns, information about
Facebook users' purchases were published without their
explicit consent on their friends' news feeds

"8 Facebook privacy flaps - Technology & Science - CBC News." CBCnews. CBC/Radio Canada, n.d. Web. 28
Nov. 2013. <http://www.cbc.ca/news/technology/8-facebook-privacy-flaps-1.1140969>.

Yuxing Zeng




Privacy settings
◦ Facebook changed their privacy settings, sharing
information with everyone became the default setting
◦ Terrible guide for the privacy settings of Facebook
Private messages
◦ A glitch in February 2010 caused some private
messages on Facebook to be sent to unintended
recipients
◦ A coding error opened Facebook chats, which are
supposed to be private, for others to see

"8 Facebook privacy flaps - Technology & Science - CBC News." CBCnews. CBC/Radio Canada, n.d. Web. 28
Nov. 2013. <http://www.cbc.ca/news/technology/8-facebook-privacy-flaps-1.1140969>.

Yuxing Zeng




The anti-Google campaign (2011):
◦ Facebook wanted it kept private that they were behind
the anti-Google campaign in 2011. Once
exposed, Facebook admitted that they should have
behaved "in a serious and transparent way.”
Timeline:
◦ Users could decide who could see that information
but not if it was on their friends' Facebook pages.

"8 Facebook privacy flaps - Technology & Science - CBC News." CBCnews. CBC/Radio Canada, n.d. Web. 28
Nov. 2013. <http://www.cbc.ca/news/technology/8-facebook-privacy-flaps-1.1140969>.

Yuxing Zeng






Tech Yeah! Facebook privacy issues
This video shows that Facebook is relaxing its
rules such as “Follow” button puts posts in
News feeds which will cause more privacy
issues among teenagers.
http://video.cnbc.com/gallery/?video=30002
08666

Yuxing Zeng
"Twitter Now Covered by Analysts at Wells Fargo & Co.
(TWTR)." WKRB News RSS. N.p., n.d. Web. 28 Nov.
2013.
<http://www.wkrb13.com/markets/232262/twitternow-covered-by-analysts-at-wells-fargo-co-twtr/>.



Created in 2006



Global real-time communications platform



400 million monthly visitors



One billion tweets every 2.5 days

"Twitter." CrunchBase, The Free Tech Company Database. N.p., n.d. Web. 27 Nov. 2013.
<http://www.crunchbase.com/company/twitter>.

Yuxing Zeng




Design
◦ Mostly dodged privacy concerns
◦ Anyone can see your tweets

Twitter collects data
(tweets, retweets, location, people who you follow)
◦ Twitter than promotes “Promoted Tweets” on your
timeline that relates to your profile

"Here&apos;s How Twitter Can Track You on All of Your Devices." Mother Jones. N.p., n.d. Web. 26 Nov. 2013.
<http://www.motherjones.com/politics/2013/09/twitter-could-threaten-your-privacy-more-facebook>.

Yuxing Zeng




Judge Napolitano on Twitter Privacy Ruling in
Occupy Wall Street Case
This video shows that the tweet isn’t your
own anymore and they even can be the
evidence that are against yourself at the
court.

http://www.youtube.com/watch?v=2JRxoXqVix
g
Yuxing Zeng
"Buy YouTube Views." Buy Likes and Followers.
N.p., n.d. Web. 27 Nov. 2013.
<http://www.buylikesandfollowers.net/buyyoutube-views.html>.







A platform for users to create, connect and
discover the world’s videos
Was founded in 2005 by Chad Hurley, Steve
Chen and Jawed Karim
Received funding from Sequoia Capital, and
was acquired by Google Inc. in 2006

"YouTube." CrunchBase, The Free Tech Company Database. N.p., n.d. Web. 28 Nov.
2013. <http://www.crunchbase.com/company/youtube>.

Yuxing Zeng




Creating people’s YouTube channels without
their permissions
YouTube put web banners or rich media by
collecting your search history

"Laura Bruno&apos;s Blog Medical Intuition, Soul Readings, Intuitive Coaching, Tarot, Reiki: Inspiring and
Empowering Visionaries and Healers." Laura Brunos Blog. N.p., n.d. Web. 28 Nov. 2013.
<http://laurabruno.wordpress.com/tag/youtube-privacy-issues/>.

Yuxing Zeng


YouTube's video privacy and sharing options:
◦ If a YouTube user doesn't want to offend anyone
but also happens to be popular (having a
substantial amount of subscribers), this user will
want to reach more than 25 people. This situation
renders the entire option of privatizing videos
pointless.

"Google Groups." Google Groups. N.p., n.d. Web. 28 Nov. 2013.
<http://productforums.google.com/forum/#!topic/youtube/aFLbzsGU66w>.

Yuxing Zeng




New Google/YouTube Privacy Issues
This video shows that Google announced
privacy settings that will affect YouTube on
January 24,2012. Google will require users to
follow by the companies for their activates on
YouTube.

http://www.youtube.com/watch?v=jm8J9OHCv
iM
Yuxing Zeng
"How Can Agencies Step Beyond LinkedIn to Gain a Competitive
Edge?." Blog FireFish Software. N.p., n.d. Web. 28 Nov. 2013.
<http://blog.firefishsoftware.com/bid/101435/How-CanAgencies-Step-Beyond-LinkedIn-to-Gain-a-Competitive-Edge>.



The Social network for work professionals



Created by Reid Hoffman in 2002



4.2 billions “ professionally-oriented
searches” in 2011

"Mashable." Mashable. N.p., n.d. Web. 25 Nov. 2013. <http://mashable.com/category/linkedin/>.

Yuxing Zeng




Managed to lose millions of users' email and
password combinations
A LinkedIn user who indicates they want their
profile to remain anonymous to the person
whose profile they've viewed, that
occasionally the searcher's profile comes up
on the said viewed member's page as
someone who they might like to connect
with.

"LinkedIn (LNKD) Has Major Privacy Issues." Insider Monkey Free Hedge Fund and Insider Trading Data RSS. N.p., n.d.
Web. 28 Nov. 2013. <http://www.insidermonkey.com/blog/linkedin-lnkd-has-major-privacy-issues23328/#3HEy13RT35rpjrB2.99>.

Yuxing Zeng




Not taking the measures it needs to acquire
the support of individuals who want to be as
private as possible on the Internet
Exposing users’ Google searches

"privacy issue? linkedin exposing my google searches???." - LinkedIn Help Center. N.p., n.d. Web.
28 Nov. 2013. <http://community.linkedin.com/questions/73446/privacy-issue-linkedinexposing-my-google-searches.html>.
"LinkedIn (LNKD) Has Major Privacy Issues." Insider Monkey Free Hedge Fund and Insider Trading Data RSS. N.p., n.d.
Web. 28 Nov. 2013. <http://www.insidermonkey.com/blog/linkedin-lnkd-has-major-privacy-issues23328/#3HEy13RT35rpjrB2.99>.

Yuxing Zeng




Protecting your privacy on LinkedIn
This video shows that how to protect your
LinkedIn profile by disenable the activities
broadcasts. It already became a privacy issues
for the LinkedIn that other people can see
your own news feed.

http://www.youtube.com/watch?v=vnJ4Tv_4p
Mk
Yuxing Zeng


Consumers using online social networking
sites need to remember that once you post
something online it is there FOREVER. You
can erase, delete, backspace what ever you
want, but the fact of the matter is that once
posted online, NOTHING IS DELETABLE.

Rachel Brock










Because there are a number of dishonest people
online who aim to steal your personal information
for financial gain, personal gain, or just plain fun.
Types of Online Threats:
Fraudsters
Hackers
Hoaxsters
Cyber-Bullies
Online Predators
Cyber Stalkers
Rachel Brock


People who use the internet to take advantage of
victims, usually involving theft of personal or
financial information. These people may use the
internet to present fraudulent
solicitations, fraudulent transactions, or transmit
the proceeds of fraud to institutions or other
individuals connected with the scheme.

"Internet Fraud." TheFreeDictionary.com. N.p., n.d. Web. 27 Nov. 2013.
http://legal-dictionary.thefreedictionary.com/Internet+Fraud

Claire Keating


15 People Arrested in RCMP Raids On Alleged
Fraudsters in Montreal
•

Fifteen people working at a call center in
Montreal were arrested on charges of massmarket fraud that spanned Canada and the
U.S., targeting thousands of victims and
robbing approximately $20 million.

"680News." 680News Fifteen people arrested in RCMP raids on alleged fraudsters in Montreal
Comments. N.p., n.d. Web. 28 Nov. 2013. <http://www.680news.com/2013/11/19/fifteenpeople-arrested-in-rcmp-raids-on-alleged-fraudsters-in-montreal/>.

Claire Keating


An individual with extensive computer programming
knowledge, that seeks and exploits weaknesses in a
computer system or computer network (ex – social media
sites). Through these software weaknesses they may gain
access to personal files and information, and the lengths to
which they may use this information is endless. They may be
motivated by a number of reasons including profit, protest, or
challenge.

"hacker." hacker. N.p., n.d. Web. 28 Nov. 2013. <http://www.catb.org/jargon/html/H/hacker.html>.

Rachel Brock
Recent Hacker Attacks in Canada
This article discusses the hacker software titles
“Citadel” and how it was discovered by the RCMP in
Burnaby. The software is estimated to have effected
more that 5 million people in over 90
countries, stealing over $500 million dollars from
victims bank accounts.

"B.C. Computer Servers Linked to $500M Global Theft Ring - British Columbia - CBC News." CBCnews.
CBC/Radio Canada, n.d. Web. 27 Nov. 2013.

Rachel Brock
Top 10 Infamous Computer Hackers

This video shows the top 10 most infamous
computer hackers, and the effect they had on
people and businesses around the world.

Rachel Brock


Hoax: Noun

1. to trick into believing or accepting as genuine something
false and often preposterous.
2. something accepted or established by fraud or fabrication


Hoaxsters are people who deliberately fabricate
false information and spread it virally. This
information is heard and seen by others, and
passed around because it is perceived to be
factual.

"Hoax." Merriam-Webster. Merriam-Webster, n.d. Web. 27 Nov. 2013.

Rachel Brock


Hacked Fox News Twitter Account Declares
Obama Died

This article released to the public through the
online press "The Free Library," states how Fox
News' Twitter account was hacked by a hoaxer
group called "The Script Kiddies." They
released false information that went viral
stating that Obama had been assassinated.

"Hacked Fox News Twitter Account Declares Obama Died." - Free Online Library. N.p., n.d. Web. 27 Nov. 2013.

Rachel Brock


The use of technology, specifically the internet and
social media websites, to harass or harm people in
a deliberate and hostile manner. It can involve
anything from gossiping, to spreading false
rumours, to making harmful threats to people.
Cyber-bullying has become common among young
social media users.

"Category Archives: Cyberbullying." Cyberbullying. N.p., n.d. Web. 26 Nov. 2013.
<http://definetheline.ca/dtl/category/cyberbullying/>.

Claire Keating




95% of social media-using teens who have
witnessed cruel behavior on social
networking sites say they have seen others
ignoring the mean behavior; 55% witness this
frequently
66% of teens who have witnessed online
cruelty have also witnessed others joining;
21% say they have also joined in the
harassment
"Cyberbullying Statistics." InternetSafety101.org: Statistics. N.p., n.d. Web. 27 Nov. 2013.
http://www.internetsafety101.org/cyberbullyingstatistics.htm

Claire Keating




Only 7% of U.S. parents are worried about
cyberbullying, even though 33% of teenagers
have been victims of cyberbullying

One million children were
harassed, threatened or subjected to other
forms of cyberbullying on Facebook during
the past year

"Cyberbullying Statistics." InternetSafety101.org: Statistics. N.p., n.d. Web. 27 Nov. 2013.
http://www.internetsafety101.org/cyberbullyingstatistics.htm

Claire Keating




68% of teens agree that cyberbullying is a serious
problem with today’s youth.[6]Reasons cyberbullies said
they engaged in cyberbullying:
◦ To show off to friends (11%)
◦ To be mean (14%)
◦ Something else (16%)
◦ To embarrass them (21%)
◦ For fun or entertainment (28%)
◦ They deserved it (58%)
◦ To get back at someone (58%)
81% of youth agree that bullying online is easier to get
away with than bullying in person
"Cyberbullying Statistics." InternetSafety101.org: Statistics. N.p., n.d. Web. 27 Nov. 2013.
http://www.internetsafety101.org/cyberbullyingstatistics.htm

Claire Keating


Delete Cyber Bullying

This YouTube video explains what cyber-bullying
really is and describes the characteristics of a cyberbully. They believe they have an advantage online
because they are secured online and there actions
have no consequences. Cyber-bullying is a monster
that we as consumers of social media have created
ourselves. The YouTube video encourages online
consumer to “Be The Change” and spread positive
thoughts, messages, images and videos online.

Claire Keating


The Case of Tyler Clementi

Attention to the issue of cyber-bullying was first brought to the
public eye through the case of the suicide of Tyler Clementi.
Tyler Cementi’s roommate set up a web-cam and recorded
Tyler having homosexual intercourse with another man, and
broadcasted it on the internet. After Tyler’s suicide, his
roommate, Dharun Ravi, was sentenced to 30 days in jail.

"Tyler Clementi." Times Topics. N.p., n.d. Web. 27 Nov. 2013.

Claire Keating


Online predators are arguably the most dangerous
internet users. Online predators are people who
look for weakness in others online, and intend to
inflict harm on them. The most common type of
online predators are mature men and females
using open chat sites to lure in minors and commit
lewd and perverse acts with them. These people
are often pedophiles, and attack young naïve
children who agree to meet with them in person.

"The Facts About Online Predators." Family Safe Computers. N.p., n.d. Web. 28 Nov. 2013.
<http://www.familysafecomputers.org/predators.htm>.

Rachel Brock
Child Internet Safety PSA – Online Predators

This video shows how easily a child can be
manipulated into giving out personal
information to predators.

Rachel Brock






In 82% of online sex crimes against minors, the
offender used the victim's social networking site to
gain information about the victim's likes and
dislikes
65% of online sex offenders used the victim's social
networking site to gain home and school
information about the victim
Only 1 in 3 people will report sexual crimes to a
trusted adult

"InternetSafety101.org: Statistics." InternetSafety101.org: Statistics. N.p., n.d. Web. 27 Nov. 2013.

Rachel Brock






26% of online sex offenders used the victim's social
networking site to gain information about the victim's
whereabouts at a specific time
There are over 747,408 registered sex offenders in the
United States, and over 100,000 are lost in the system

Four percent of all youth Internet users received aggressive
sexual solicitations, which threatened to spill over into “real
life”. These solicitors asked to meet the youth in
person, called them on the telephone or sent offline
mail, money or gifts. Also, four percent of youth had
distressing sexual solicitations that left them feeling upset of
extremely afraid.
"InternetSafety101.org: Statistics." InternetSafety101.org: Statistics. N.p., n.d. Web. 27 Nov. 2013.

Rachel Brock




Virtual Girl "Sweetie" Helps Track Thousands
of Online Sexual Predators
Another example is the virtual girl “Sweetie,”
a 10 year old Pilipino girl designed through
computer software, who helps to track online
predators.

Rachel Brock
THE NUMBER ONE RULE!:


The only way to ensure your information is safe
online, is to be careful of and responsible for
everything that you post. Since nothing can ever
be removed from the online world, you must
make sure you don’t post personal
information, reputation damaging
pictures, blogs, ANYTHING that may come back
to haunt you. Future employers may access your
social networking sites and choose not to hire
you based on pictures and posts they find.
Rachel Brock
2. Do not trust strangers you meet online


People you meet online should not be trusted with
your personal information. People are able to
create multiple cyber identities, and may not really
be the trustworthy person you think you are talking
to behind the computer screen.

Rachel Brock
3. Do not share personal information over the
Internet or through social networking sites.


Sharing your banking information, your
whereabouts, our address, phone number, or
contact information on social networking sites or
with people you talk to online can be a threat to
your privacy and safety.

Rachel Brock
4. Have multiple passwords and security
questions.


Many people make the mistake of having one
simple password for all of their online accounts. If
this password were to be compromised, this could
have devastating results.

Claire Keating
5. Report online abuse.


If you are a witness to cyber bullying, fraud, or any
other illegal online activity it is important to report
it immediately. The failure to report could have
devastating effects for not only you, but others
around you. If someone is cyber-bullying you, the
odd are high that they are doing it to others as
well.

Claire Keating
6. Format Your Privacy Settings


Make sure your privacy settings are limited to the
public. Allowing only your friends and family to
have access to your profiles prevents strangers
from viewing your personal information.

Claire Keating


Online Privacy

Online privacy animation video, that makes us
wonder “what if online actions were set in the
physical, tangible world?” The YouTube video shares
with consumers that we have to be aware of what we
are posting online and who we are sharing it with
because there could be consequences. Remember…
Think before you click!

Claire Keating
Protecting Your Privacy On The Internet

This page posts tips on how to protect personal
privacy on the Internet, through Microsoft’s Safety &
Security Center. It details topics such as thinking
before sharing personal information, monitoring
what others post, guarding personal
information, and protecting yourself from fraud.

Alyssa Budhoo
“Data Privacy Day, held annually on January
28, encourages everyone to make protecting
privacy and data a greater priority. DPD is an effort
to empower and educate people to protect their
privacy and control their digital footprint.
Contribute to the success of Data Privacy Day by
sharing resources and advice on social
media, hosting an event, or having your
organization become a DPD Champion. You can
make a difference in just a few minutes Jan. 28!”
"Overview | StaySafeOnline.org." Overview | StaySafeOnline.org. N.p., n.d. Web. 28 Nov. 2013

Claire Keating


Privacy and Social Networks

Social networking sites are a commercial operation
where they focus on making money by collecting
user data. By knowing what we like, where we
live, and what are interest
are, companies, advertisers, marketers and
employers make money. The data that we post
online on social networking sites such as Facebook
and Twitter make decisions about you.

Claire Keating
The Future of Online Privacy

This video discovers how digital footprints are
everywhere through facial recognition software, for
example, among all online personal users. The video
features the speaker, Jonathan Stickland, who
investigates the future of online privacy and what to
expect.

Alyssa Budhoo
“Once conversations that should be private are
undertaken in a public forum, they become
theater – meant for the onlookers more than
the participants.”
-ANNONYMOUS

Claire Keating

Más contenido relacionado

La actualidad más candente

Syracuse Public
Syracuse PublicSyracuse Public
Syracuse PublicMatt Hames
 
Being Your Own Best Publicist
Being Your Own Best PublicistBeing Your Own Best Publicist
Being Your Own Best Publicistjosephhansen
 
What the F**K is Social Media: One Year Later
What the F**K is Social Media: One Year LaterWhat the F**K is Social Media: One Year Later
What the F**K is Social Media: One Year LaterMartafy!
 
Social Media & Ethical Concerns for the Credit Grantor
Social Media & Ethical Concerns for the Credit GrantorSocial Media & Ethical Concerns for the Credit Grantor
Social Media & Ethical Concerns for the Credit GrantorArielMcCurdy
 
Social Media, Employment, and Disability
Social Media, Employment, and DisabilitySocial Media, Employment, and Disability
Social Media, Employment, and DisabilityPaul Smith
 
Social Media Camp Workshop - Victoria, paul Holmes
Social Media Camp Workshop - Victoria, paul HolmesSocial Media Camp Workshop - Victoria, paul Holmes
Social Media Camp Workshop - Victoria, paul HolmesSocial Media Camp
 
Social Media Rocket Matter
Social Media Rocket MatterSocial Media Rocket Matter
Social Media Rocket MatterSamantha Collier
 
Navigating Ethical Problems Social Media
Navigating Ethical Problems Social MediaNavigating Ethical Problems Social Media
Navigating Ethical Problems Social MediaLisa Borodkin
 
NAELA Summit "Navigating Ethical and Legal Issues in Social Media"
NAELA Summit "Navigating Ethical and Legal Issues in Social Media"NAELA Summit "Navigating Ethical and Legal Issues in Social Media"
NAELA Summit "Navigating Ethical and Legal Issues in Social Media"Lisa Borodkin
 
Legal issues of social media 2016
Legal issues of social media 2016Legal issues of social media 2016
Legal issues of social media 2016Brian Huonker
 
Social Media: Implications for Intellectual Property Law
Social Media: Implications for Intellectual Property LawSocial Media: Implications for Intellectual Property Law
Social Media: Implications for Intellectual Property Lawblaine_5
 
Social Media hosted by RocketMatter
Social Media hosted by RocketMatterSocial Media hosted by RocketMatter
Social Media hosted by RocketMatterNatalie Alesi
 
Social Networking Presentation
Social Networking PresentationSocial Networking Presentation
Social Networking PresentationWobbeMassage
 
Your voice on the Web
Your voice on the Web Your voice on the Web
Your voice on the Web robin fay
 
Using Social Media Tools To Leverage Your Job Search
Using Social Media Tools To Leverage Your Job SearchUsing Social Media Tools To Leverage Your Job Search
Using Social Media Tools To Leverage Your Job SearchReinfranck
 

La actualidad más candente (20)

Syracuse Public
Syracuse PublicSyracuse Public
Syracuse Public
 
Being Your Own Best Publicist
Being Your Own Best PublicistBeing Your Own Best Publicist
Being Your Own Best Publicist
 
What the F**K is Social Media: One Year Later
What the F**K is Social Media: One Year LaterWhat the F**K is Social Media: One Year Later
What the F**K is Social Media: One Year Later
 
Social Media & Ethical Concerns for the Credit Grantor
Social Media & Ethical Concerns for the Credit GrantorSocial Media & Ethical Concerns for the Credit Grantor
Social Media & Ethical Concerns for the Credit Grantor
 
Social Media, Employment, and Disability
Social Media, Employment, and DisabilitySocial Media, Employment, and Disability
Social Media, Employment, and Disability
 
Social Media Camp Workshop - Victoria, paul Holmes
Social Media Camp Workshop - Victoria, paul HolmesSocial Media Camp Workshop - Victoria, paul Holmes
Social Media Camp Workshop - Victoria, paul Holmes
 
Unit 35
Unit 35Unit 35
Unit 35
 
Social Media Rocket Matter
Social Media Rocket MatterSocial Media Rocket Matter
Social Media Rocket Matter
 
Navigating Ethical Problems Social Media
Navigating Ethical Problems Social MediaNavigating Ethical Problems Social Media
Navigating Ethical Problems Social Media
 
NAELA Summit "Navigating Ethical and Legal Issues in Social Media"
NAELA Summit "Navigating Ethical and Legal Issues in Social Media"NAELA Summit "Navigating Ethical and Legal Issues in Social Media"
NAELA Summit "Navigating Ethical and Legal Issues in Social Media"
 
Rochester
RochesterRochester
Rochester
 
Who is watching facebook
Who is watching facebookWho is watching facebook
Who is watching facebook
 
Legal issues of social media 2016
Legal issues of social media 2016Legal issues of social media 2016
Legal issues of social media 2016
 
Web pp
Web ppWeb pp
Web pp
 
Social Media: Implications for Intellectual Property Law
Social Media: Implications for Intellectual Property LawSocial Media: Implications for Intellectual Property Law
Social Media: Implications for Intellectual Property Law
 
Albany
AlbanyAlbany
Albany
 
Social Media hosted by RocketMatter
Social Media hosted by RocketMatterSocial Media hosted by RocketMatter
Social Media hosted by RocketMatter
 
Social Networking Presentation
Social Networking PresentationSocial Networking Presentation
Social Networking Presentation
 
Your voice on the Web
Your voice on the Web Your voice on the Web
Your voice on the Web
 
Using Social Media Tools To Leverage Your Job Search
Using Social Media Tools To Leverage Your Job SearchUsing Social Media Tools To Leverage Your Job Search
Using Social Media Tools To Leverage Your Job Search
 

Similar a Social media and the future of privacy

Personal Branding Online
Personal Branding OnlinePersonal Branding Online
Personal Branding OnlineLisa Harris
 
Social media for employement and personal brand
Social media for employement and personal brandSocial media for employement and personal brand
Social media for employement and personal brandKatie Fellenz
 
Social Media For Employement And Personal Brand
Social Media For Employement And Personal BrandSocial Media For Employement And Personal Brand
Social Media For Employement And Personal BrandMelonie Gallegos
 
Trade brookln presentation social media seminar
Trade brookln presentation social media seminarTrade brookln presentation social media seminar
Trade brookln presentation social media seminarBasil Puglisi
 
Social Media Presentation2
Social Media Presentation2Social Media Presentation2
Social Media Presentation2Jasmeet Nagra
 
Social Media For Employment
Social Media For EmploymentSocial Media For Employment
Social Media For EmploymentKatie Fellenz
 
Utilizing Social Media To Promote Your Nonprofit Cna Fall 09
Utilizing Social Media To Promote Your Nonprofit Cna Fall 09Utilizing Social Media To Promote Your Nonprofit Cna Fall 09
Utilizing Social Media To Promote Your Nonprofit Cna Fall 09Dawn Crawford
 
Social Media Introduction
Social Media IntroductionSocial Media Introduction
Social Media IntroductionRobin Low
 
From Apps To Tweets Insurance Agents and the Social Web 040310
From Apps To Tweets  Insurance Agents and the Social Web 040310From Apps To Tweets  Insurance Agents and the Social Web 040310
From Apps To Tweets Insurance Agents and the Social Web 040310Rick Morgan
 
Social Media Disruption B2B IBM Seminar October 2009
Social Media Disruption B2B IBM Seminar October 2009Social Media Disruption B2B IBM Seminar October 2009
Social Media Disruption B2B IBM Seminar October 2009Team Eleven
 
Trade nassau presentation social media seminar
Trade nassau presentation social media seminarTrade nassau presentation social media seminar
Trade nassau presentation social media seminarBasil Puglisi
 
Social Media & Investor Relations: It’s NOT Oil and Water
Social Media & Investor Relations: It’s NOT Oil and WaterSocial Media & Investor Relations: It’s NOT Oil and Water
Social Media & Investor Relations: It’s NOT Oil and WaterMichael Pranikoff
 
Social media ethics
Social media ethicsSocial media ethics
Social media ethicsAndy Huckaba
 
CCSAD - Social Media for BH Professionals
CCSAD - Social Media for BH ProfessionalsCCSAD - Social Media for BH Professionals
CCSAD - Social Media for BH ProfessionalsAlpha 180
 
Baby Boomers and Social Media Success
Baby Boomers and Social Media SuccessBaby Boomers and Social Media Success
Baby Boomers and Social Media SuccessNancy Cavanaugh
 
Intermediate social media business march 2011
Intermediate social media business march 2011Intermediate social media business march 2011
Intermediate social media business march 2011HubSpot
 
Social media success strategies June 2010 by CEO Hillary Bressler
Social media success strategies June 2010 by CEO Hillary BresslerSocial media success strategies June 2010 by CEO Hillary Bressler
Social media success strategies June 2010 by CEO Hillary Bresslerhillarybressler
 
Social Media Strategies - Social3i - School of Visual Concepts - April 2011
Social Media Strategies - Social3i - School of Visual Concepts - April 2011Social Media Strategies - Social3i - School of Visual Concepts - April 2011
Social Media Strategies - Social3i - School of Visual Concepts - April 2011social3i
 
Quadruplicity Presentation
Quadruplicity PresentationQuadruplicity Presentation
Quadruplicity Presentationjhull
 

Similar a Social media and the future of privacy (20)

Personal Branding Online
Personal Branding OnlinePersonal Branding Online
Personal Branding Online
 
Social media for employement and personal brand
Social media for employement and personal brandSocial media for employement and personal brand
Social media for employement and personal brand
 
Social Media For Employement And Personal Brand
Social Media For Employement And Personal BrandSocial Media For Employement And Personal Brand
Social Media For Employement And Personal Brand
 
Trade brookln presentation social media seminar
Trade brookln presentation social media seminarTrade brookln presentation social media seminar
Trade brookln presentation social media seminar
 
Social Media Presentation2
Social Media Presentation2Social Media Presentation2
Social Media Presentation2
 
Social Media For Employment
Social Media For EmploymentSocial Media For Employment
Social Media For Employment
 
Utilizing Social Media To Promote Your Nonprofit Cna Fall 09
Utilizing Social Media To Promote Your Nonprofit Cna Fall 09Utilizing Social Media To Promote Your Nonprofit Cna Fall 09
Utilizing Social Media To Promote Your Nonprofit Cna Fall 09
 
Social Media Introduction
Social Media IntroductionSocial Media Introduction
Social Media Introduction
 
From Apps To Tweets Insurance Agents and the Social Web 040310
From Apps To Tweets  Insurance Agents and the Social Web 040310From Apps To Tweets  Insurance Agents and the Social Web 040310
From Apps To Tweets Insurance Agents and the Social Web 040310
 
Social Media Disruption B2B IBM Seminar October 2009
Social Media Disruption B2B IBM Seminar October 2009Social Media Disruption B2B IBM Seminar October 2009
Social Media Disruption B2B IBM Seminar October 2009
 
Trade nassau presentation social media seminar
Trade nassau presentation social media seminarTrade nassau presentation social media seminar
Trade nassau presentation social media seminar
 
Social Media & Investor Relations: It’s NOT Oil and Water
Social Media & Investor Relations: It’s NOT Oil and WaterSocial Media & Investor Relations: It’s NOT Oil and Water
Social Media & Investor Relations: It’s NOT Oil and Water
 
Social media ethics
Social media ethicsSocial media ethics
Social media ethics
 
CCSAD - Social Media for BH Professionals
CCSAD - Social Media for BH ProfessionalsCCSAD - Social Media for BH Professionals
CCSAD - Social Media for BH Professionals
 
Baby Boomers and Social Media Success
Baby Boomers and Social Media SuccessBaby Boomers and Social Media Success
Baby Boomers and Social Media Success
 
Intermediate social media business march 2011
Intermediate social media business march 2011Intermediate social media business march 2011
Intermediate social media business march 2011
 
Social media success strategies June 2010 by CEO Hillary Bressler
Social media success strategies June 2010 by CEO Hillary BresslerSocial media success strategies June 2010 by CEO Hillary Bressler
Social media success strategies June 2010 by CEO Hillary Bressler
 
Social Media Strategies - Social3i - School of Visual Concepts - April 2011
Social Media Strategies - Social3i - School of Visual Concepts - April 2011Social Media Strategies - Social3i - School of Visual Concepts - April 2011
Social Media Strategies - Social3i - School of Visual Concepts - April 2011
 
Quadruplicity Presentation
Quadruplicity PresentationQuadruplicity Presentation
Quadruplicity Presentation
 
Driving Social Media PR
Driving Social Media PRDriving Social Media PR
Driving Social Media PR
 

Último

Production diary Film the city powerpoint
Production diary Film the city powerpointProduction diary Film the city powerpoint
Production diary Film the city powerpointAshtonCains
 
Website research Powerpoint for Bauer magazine
Website research Powerpoint for Bauer magazineWebsite research Powerpoint for Bauer magazine
Website research Powerpoint for Bauer magazinesamuelcoulson30
 
DickinsonSlides teeeeeeeeeeessssssssssst.pptx
DickinsonSlides teeeeeeeeeeessssssssssst.pptxDickinsonSlides teeeeeeeeeeessssssssssst.pptx
DickinsonSlides teeeeeeeeeeessssssssssst.pptxednyonat
 
Film the city investagation powerpoint :)
Film the city investagation powerpoint :)Film the city investagation powerpoint :)
Film the city investagation powerpoint :)AshtonCains
 
VIP Chandigarh Call Girls Service 7001035870 Enjoy Call Girls With Our Escorts
VIP Chandigarh Call Girls Service 7001035870 Enjoy Call Girls With Our EscortsVIP Chandigarh Call Girls Service 7001035870 Enjoy Call Girls With Our Escorts
VIP Chandigarh Call Girls Service 7001035870 Enjoy Call Girls With Our Escortssonatiwari757
 
9990611130 Find & Book Russian Call Girls In Crossings Republik
9990611130 Find & Book Russian Call Girls In Crossings Republik9990611130 Find & Book Russian Call Girls In Crossings Republik
9990611130 Find & Book Russian Call Girls In Crossings RepublikGenuineGirls
 
Night 7k Call Girls Pari Chowk Escorts Call Me: 8448380779
Night 7k Call Girls Pari Chowk Escorts Call Me: 8448380779Night 7k Call Girls Pari Chowk Escorts Call Me: 8448380779
Night 7k Call Girls Pari Chowk Escorts Call Me: 8448380779Delhi Call girls
 
Improve Your Brand in Waco with a Professional Social Media Marketing Company
Improve Your Brand in Waco with a Professional Social Media Marketing CompanyImprove Your Brand in Waco with a Professional Social Media Marketing Company
Improve Your Brand in Waco with a Professional Social Media Marketing CompanyWSI INTERNET PARTNER
 
Ready to get noticed? Partner with Sociocosmos
Ready to get noticed? Partner with SociocosmosReady to get noticed? Partner with Sociocosmos
Ready to get noticed? Partner with SociocosmosSocioCosmos
 
CASH PAYMENT ON GIRL HAND TO HAND HOUSEWIFE
CASH PAYMENT ON GIRL HAND TO HAND HOUSEWIFECASH PAYMENT ON GIRL HAND TO HAND HOUSEWIFE
CASH PAYMENT ON GIRL HAND TO HAND HOUSEWIFECall girl Jaipur
 
Film show production powerpoint for site
Film show production powerpoint for siteFilm show production powerpoint for site
Film show production powerpoint for siteAshtonCains
 
CALL ON ➥8923113531 🔝Call Girls Takrohi Lucknow best Female service 👖
CALL ON ➥8923113531 🔝Call Girls Takrohi Lucknow best Female service  👖CALL ON ➥8923113531 🔝Call Girls Takrohi Lucknow best Female service  👖
CALL ON ➥8923113531 🔝Call Girls Takrohi Lucknow best Female service 👖anilsa9823
 
Night 7k Call Girls Noida New Ashok Nagar Escorts Call Me: 8448380779
Night 7k Call Girls Noida New Ashok Nagar Escorts Call Me: 8448380779Night 7k Call Girls Noida New Ashok Nagar Escorts Call Me: 8448380779
Night 7k Call Girls Noida New Ashok Nagar Escorts Call Me: 8448380779Delhi Call girls
 
Interpreting the brief for the media IDY
Interpreting the brief for the media IDYInterpreting the brief for the media IDY
Interpreting the brief for the media IDYgalaxypingy
 
Call Girls In Andheri East Call 9167673311 Book Hot And Sexy Girls
Call Girls In Andheri East Call 9167673311 Book Hot And Sexy GirlsCall Girls In Andheri East Call 9167673311 Book Hot And Sexy Girls
Call Girls In Andheri East Call 9167673311 Book Hot And Sexy GirlsPooja Nehwal
 
Social media marketing/Seo expert and digital marketing
Social media marketing/Seo expert and digital marketingSocial media marketing/Seo expert and digital marketing
Social media marketing/Seo expert and digital marketingSheikhSaifAli1
 

Último (20)

9953056974 Young Call Girls In Kirti Nagar Indian Quality Escort service
9953056974 Young Call Girls In  Kirti Nagar Indian Quality Escort service9953056974 Young Call Girls In  Kirti Nagar Indian Quality Escort service
9953056974 Young Call Girls In Kirti Nagar Indian Quality Escort service
 
Production diary Film the city powerpoint
Production diary Film the city powerpointProduction diary Film the city powerpoint
Production diary Film the city powerpoint
 
Website research Powerpoint for Bauer magazine
Website research Powerpoint for Bauer magazineWebsite research Powerpoint for Bauer magazine
Website research Powerpoint for Bauer magazine
 
Russian Call Girls Rohini Sector 35 💓 Delhi 9999965857 @Sabina Modi VVIP MODE...
Russian Call Girls Rohini Sector 35 💓 Delhi 9999965857 @Sabina Modi VVIP MODE...Russian Call Girls Rohini Sector 35 💓 Delhi 9999965857 @Sabina Modi VVIP MODE...
Russian Call Girls Rohini Sector 35 💓 Delhi 9999965857 @Sabina Modi VVIP MODE...
 
🔝9953056974 🔝Call Girls In Mehrauli Escort Service Delhi NCR
🔝9953056974 🔝Call Girls In Mehrauli  Escort Service Delhi NCR🔝9953056974 🔝Call Girls In Mehrauli  Escort Service Delhi NCR
🔝9953056974 🔝Call Girls In Mehrauli Escort Service Delhi NCR
 
DickinsonSlides teeeeeeeeeeessssssssssst.pptx
DickinsonSlides teeeeeeeeeeessssssssssst.pptxDickinsonSlides teeeeeeeeeeessssssssssst.pptx
DickinsonSlides teeeeeeeeeeessssssssssst.pptx
 
Film the city investagation powerpoint :)
Film the city investagation powerpoint :)Film the city investagation powerpoint :)
Film the city investagation powerpoint :)
 
VIP Chandigarh Call Girls Service 7001035870 Enjoy Call Girls With Our Escorts
VIP Chandigarh Call Girls Service 7001035870 Enjoy Call Girls With Our EscortsVIP Chandigarh Call Girls Service 7001035870 Enjoy Call Girls With Our Escorts
VIP Chandigarh Call Girls Service 7001035870 Enjoy Call Girls With Our Escorts
 
9990611130 Find & Book Russian Call Girls In Crossings Republik
9990611130 Find & Book Russian Call Girls In Crossings Republik9990611130 Find & Book Russian Call Girls In Crossings Republik
9990611130 Find & Book Russian Call Girls In Crossings Republik
 
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Masudpur
Delhi  99530 vip 56974  Genuine Escort Service Call Girls in MasudpurDelhi  99530 vip 56974  Genuine Escort Service Call Girls in Masudpur
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Masudpur
 
Night 7k Call Girls Pari Chowk Escorts Call Me: 8448380779
Night 7k Call Girls Pari Chowk Escorts Call Me: 8448380779Night 7k Call Girls Pari Chowk Escorts Call Me: 8448380779
Night 7k Call Girls Pari Chowk Escorts Call Me: 8448380779
 
Improve Your Brand in Waco with a Professional Social Media Marketing Company
Improve Your Brand in Waco with a Professional Social Media Marketing CompanyImprove Your Brand in Waco with a Professional Social Media Marketing Company
Improve Your Brand in Waco with a Professional Social Media Marketing Company
 
Ready to get noticed? Partner with Sociocosmos
Ready to get noticed? Partner with SociocosmosReady to get noticed? Partner with Sociocosmos
Ready to get noticed? Partner with Sociocosmos
 
CASH PAYMENT ON GIRL HAND TO HAND HOUSEWIFE
CASH PAYMENT ON GIRL HAND TO HAND HOUSEWIFECASH PAYMENT ON GIRL HAND TO HAND HOUSEWIFE
CASH PAYMENT ON GIRL HAND TO HAND HOUSEWIFE
 
Film show production powerpoint for site
Film show production powerpoint for siteFilm show production powerpoint for site
Film show production powerpoint for site
 
CALL ON ➥8923113531 🔝Call Girls Takrohi Lucknow best Female service 👖
CALL ON ➥8923113531 🔝Call Girls Takrohi Lucknow best Female service  👖CALL ON ➥8923113531 🔝Call Girls Takrohi Lucknow best Female service  👖
CALL ON ➥8923113531 🔝Call Girls Takrohi Lucknow best Female service 👖
 
Night 7k Call Girls Noida New Ashok Nagar Escorts Call Me: 8448380779
Night 7k Call Girls Noida New Ashok Nagar Escorts Call Me: 8448380779Night 7k Call Girls Noida New Ashok Nagar Escorts Call Me: 8448380779
Night 7k Call Girls Noida New Ashok Nagar Escorts Call Me: 8448380779
 
Interpreting the brief for the media IDY
Interpreting the brief for the media IDYInterpreting the brief for the media IDY
Interpreting the brief for the media IDY
 
Call Girls In Andheri East Call 9167673311 Book Hot And Sexy Girls
Call Girls In Andheri East Call 9167673311 Book Hot And Sexy GirlsCall Girls In Andheri East Call 9167673311 Book Hot And Sexy Girls
Call Girls In Andheri East Call 9167673311 Book Hot And Sexy Girls
 
Social media marketing/Seo expert and digital marketing
Social media marketing/Seo expert and digital marketingSocial media marketing/Seo expert and digital marketing
Social media marketing/Seo expert and digital marketing
 

Social media and the future of privacy

  • 1. By: Rachel Brock, Alyssa Budhoo, Claire Keating & Yuxing Zeng
  • 2.
  • 3.           Why Do People Use Social Media? Legal Issues With Social Media Facebook – Privacy Issues Twitter – Privacy Issues YouTube – Privacy Issues LinkedIn – Privacy Issues Protecting Your Privacy Online Threats Steps To Ensuring Online Privacy National Privacy Day
  • 4.    Social Interaction- allows people to be social. They meet new people and keep in touch with family, friends, and acquaintances. Seek Information- used to find information about products/services, keeping up with real-world social events, and learning new things. Pass Time- great tool to kill time and when you’re bored. Connor, O. (2013, July 5). 10 reasons people use social media. Retrieved from https://www.onepoll.com/10-reasons-people-use-social-media/ Alyssa Budhoo
  • 5.     Entertainment-social media gives access to games, music and videos. Relaxation- social media helps relieve stress and escape reality. Expression of Opinions- people express thoughts and opinions through social media. Things to Talk About- social media provides topics for people to talk and gossip about with others. Connor, O. (2013, July 5). 10 reasons people use social media. Retrieved from https://www.onepoll.com/10-reasons-people-use-social-media/ Alyssa Budhoo
  • 6.    Convenience- social media is easily accessible anywhere at any time. People can talk to numerous people at the same time. Sharing Information- people market their own image through social media by broadcasting things about themselves through publishing updates, videos and pictures. Know about others- social media gives people a display into the lives of others, by being able to check out other profiles. Connor, O. (2013, July 5). 10 reasons people use social media. Retrieved from https://www.onepoll.com/10-reasons-people-use-social-media/ Alyssa Budhoo
  • 7. Why Use Social Media in Business? The video states facts about social media networks and how much popularity they are gaining due to the fact that there are more users and people joining these sites. Therefore, giving businesses an effective reason to use social media in their business practices. Alyssa Budhoo
  • 8.    Branding- creates a noticeable identity for the product/service. Creates a Buzz- word gets out about the products/services through online conversation. Online Reputation Management- Easy to see what other people and sites are saying about the name, company, or brand online. Albert, S. (n.d.). 20 reasons your small business should use social media . Retrieved from http://blissfullydomestic.com/life-bliss/20-reasons-small-businessesshould-use-social-media/7414/ Alyssa Budhoo
  • 9.    Established as an Expert- using forums and message boards to answer questions professionally, honestly, and correctly will earn businesses respect as an expert. Word of Mouth- market products through word of mouth virtually. Customers trust friends and family; they need to trust before purchasing, therefore hearing about the product from someone trustworthy, will insist them to buy. Builds relationships and Becomes More Personalusing a variety of social media will build relationships with customers and potential customers. Albert, S. (n.d.). 20 reasons your small business should use social media . Retrieved from http://blissfullydomestic.com/life-bliss/20-reasons-small-businessesshould-use-social-media/7414/ Alyssa Budhoo
  • 10.    Open up the line of communication between business owner and millions of potential customers- Millions of people use social media everyday and can become potential customers, this does not come so easily in the offline world. Small businesses can compete with large companies- with the right type of viral social media, an immense amount of traffic can grow quickly with natural links, and keep traffic coming for a long time. Social networking with potential clients and customers from all over the globe- with all the social networking sites available, businesses can hold personal conversations with each of their customers. Albert, S. (n.d.). 20 reasons your small business should use social media . Retrieved from http://blissfullydomestic.com/life-bliss/20-reasons-small-businessesshould-use-social-media/7414/ Alyssa Budhoo
  • 11.    Generates Traffic- If an item becomes viral and makes it to the front page of a big social news site, the viewership can grow tremendously. Increased link-ability- in order to move up in search engines, having links from other sites pointed to the business site is essential. Natural links-or links that come from a great post, video, or picture, are best for the business. Cheaper than traditional Marketing and Advertising- social media is a portion of the cost of traditional marketing and advertising. Albert, S. (n.d.). 20 reasons your small business should use social media . Retrieved from http://blissfullydomestic.com/life-bliss/20-reasons-small-businessesshould-use-social-media/7414/ Alyssa Budhoo
  • 12.    The company is more accessible- everyone can access online interaction anywhere at any time. Direct conversation to a specific niche- many social networking, social bookmarking, and social news site are directed to specific niches. Business’ have the ability to speak directly to them. Another way for potential customers to find you- if the business is not high enough in search engines, customers can still find the business through social media. Albert, S. (n.d.). 20 reasons your small business should use social media . Retrieved from http://blissfullydomestic.com/life-bliss/20-reasons-small-businessesshould-use-social-media/7414/ Alyssa Budhoo
  • 13.   A way to explain yourself- it’s always going to be possible to receive negative comments. Social media provides a platform to explain, and fix things to make them right. Shows your stuff- Universal search is now accessible through Google, meaning everything appears on Google Search. So product images can rank like the business site, making it easier for customers to see your product right on the Google search. Albert, S. (n.d.). 20 reasons your small business should use social media . Retrieved from http://blissfullydomestic.com/life-bliss/20-reasons-small-businessesshould-use-social-media/7414/ Alyssa Budhoo
  • 14.   Find out what customers want- social media allows you to ask customers exactly what they want. Customers can play an active role in the business- customers can offer suggestions, share their likes and dislikes all on social media. Therefore, ideas for new products and services can develop. Albert, S. (n.d.). 20 reasons your small business should use social media . Retrieved from http://blissfullydomestic.com/life-bliss/20-reasons-small-businessesshould-use-social-media/7414/ Alyssa Budhoo
  • 15. 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. Disclosure of Confidential Information Unauthorized Use of Trademarks Unauthorized Use of Copyright-Protected Works Defamation Issues Electronic Discovery Dynamic Information Human Resources Issues Securities Privacy/Publicity Endorsements Neal & McDevitt. (2010). Top 10 legal issues in social media. Retrieved from http://www.bartonchicago.com/pdf/socialmedia.pdf Alyssa Budhoo
  • 16. Posting videos and photos without proper releases may infringe the privacy or publicity rights of individuals. Companies must make sure that their employees are not violating specific privacy regulations in their activities on social media sites. Neal & McDevitt. (2010). Top 10 legal issues in social media. Retrieved from http://www.bartonchicago.com/pdf/socialmedia.pdf Alyssa Budhoo
  • 17. Top 10 Legal Issues in Social Media Social networking and Social media is becoming the “next big thing” for both small and large businesses. With advertisers, marketers, HR departments, job seekers, and employees using these tools, they need to be aware of potential consequences in order to avoid legal problems. The article lists the top 10 legal problems companies may face when using social media in their business practices. Alyssa Budhoo
  • 18. As you have read, social media sites come with great advantages and opportunities for people both in their personal and business world. They do, however, come with issues and threats specifically aimed towards our privacy. The following slides will examine privacy issues with the most popular social media sites: Facebook, Twitter, YouTube and LinkedIn. Rachel Brock
  • 19. Privacy App Pinpoints Your Exact Location Using Social Media With the ongoing popularity among high school students using Twitter and Instagram, they are not aware of the amount of information being posted from their social media updates. In the article, researchers at the International Computer Science Institute and UC Berkeley present findings about geo-tags and the threats they can impose on high school students who update regularly on social media. Alyssa Budhoo
  • 20.  Launched February 2004 "Facebook to offer TV data to networks Comments." Digital TV Europe . N.p., n.d. Web. 28 Nov. 2013. <http://www.digitaltveurope.net/106962/facebook-tooffer-tv-data-to-networks/>.  Created by Mark Zuckerberg Facebook allows you to connect with friends, upload photos, and share links and videos  The most popular online Social networking site   In 2013, Facebook reached 750 million unique visits per month "Facebook." Answers.com. Answers, n.d. Web. 28 Nov. 2013. <http://www.answers.com/topic/facebook>. "Visual.Ly." Top 10 Most Popular Social Networks 2013. N.p., n.d. Web. 28 Nov. 2013. <http://visual.ly/top-10-most-popular-social-networks-2013>. Yuxing Zeng
  • 21.   News feed: angered many users by not giving them control of who could see their updates, or the ability to opt out ◦ Launched in 2006 Beacon (2007) ◦ a Facebook ad system that tracked what users did and what they purchased on partner websites, even for users who were not Facebook members ◦ Adding to the privacy concerns, information about Facebook users' purchases were published without their explicit consent on their friends' news feeds "8 Facebook privacy flaps - Technology & Science - CBC News." CBCnews. CBC/Radio Canada, n.d. Web. 28 Nov. 2013. <http://www.cbc.ca/news/technology/8-facebook-privacy-flaps-1.1140969>. Yuxing Zeng
  • 22.   Privacy settings ◦ Facebook changed their privacy settings, sharing information with everyone became the default setting ◦ Terrible guide for the privacy settings of Facebook Private messages ◦ A glitch in February 2010 caused some private messages on Facebook to be sent to unintended recipients ◦ A coding error opened Facebook chats, which are supposed to be private, for others to see "8 Facebook privacy flaps - Technology & Science - CBC News." CBCnews. CBC/Radio Canada, n.d. Web. 28 Nov. 2013. <http://www.cbc.ca/news/technology/8-facebook-privacy-flaps-1.1140969>. Yuxing Zeng
  • 23.   The anti-Google campaign (2011): ◦ Facebook wanted it kept private that they were behind the anti-Google campaign in 2011. Once exposed, Facebook admitted that they should have behaved "in a serious and transparent way.” Timeline: ◦ Users could decide who could see that information but not if it was on their friends' Facebook pages. "8 Facebook privacy flaps - Technology & Science - CBC News." CBCnews. CBC/Radio Canada, n.d. Web. 28 Nov. 2013. <http://www.cbc.ca/news/technology/8-facebook-privacy-flaps-1.1140969>. Yuxing Zeng
  • 24.    Tech Yeah! Facebook privacy issues This video shows that Facebook is relaxing its rules such as “Follow” button puts posts in News feeds which will cause more privacy issues among teenagers. http://video.cnbc.com/gallery/?video=30002 08666 Yuxing Zeng
  • 25. "Twitter Now Covered by Analysts at Wells Fargo & Co. (TWTR)." WKRB News RSS. N.p., n.d. Web. 28 Nov. 2013. <http://www.wkrb13.com/markets/232262/twitternow-covered-by-analysts-at-wells-fargo-co-twtr/>.  Created in 2006  Global real-time communications platform  400 million monthly visitors  One billion tweets every 2.5 days "Twitter." CrunchBase, The Free Tech Company Database. N.p., n.d. Web. 27 Nov. 2013. <http://www.crunchbase.com/company/twitter>. Yuxing Zeng
  • 26.   Design ◦ Mostly dodged privacy concerns ◦ Anyone can see your tweets Twitter collects data (tweets, retweets, location, people who you follow) ◦ Twitter than promotes “Promoted Tweets” on your timeline that relates to your profile "Here&apos;s How Twitter Can Track You on All of Your Devices." Mother Jones. N.p., n.d. Web. 26 Nov. 2013. <http://www.motherjones.com/politics/2013/09/twitter-could-threaten-your-privacy-more-facebook>. Yuxing Zeng
  • 27.   Judge Napolitano on Twitter Privacy Ruling in Occupy Wall Street Case This video shows that the tweet isn’t your own anymore and they even can be the evidence that are against yourself at the court. http://www.youtube.com/watch?v=2JRxoXqVix g Yuxing Zeng
  • 28. "Buy YouTube Views." Buy Likes and Followers. N.p., n.d. Web. 27 Nov. 2013. <http://www.buylikesandfollowers.net/buyyoutube-views.html>.    A platform for users to create, connect and discover the world’s videos Was founded in 2005 by Chad Hurley, Steve Chen and Jawed Karim Received funding from Sequoia Capital, and was acquired by Google Inc. in 2006 "YouTube." CrunchBase, The Free Tech Company Database. N.p., n.d. Web. 28 Nov. 2013. <http://www.crunchbase.com/company/youtube>. Yuxing Zeng
  • 29.   Creating people’s YouTube channels without their permissions YouTube put web banners or rich media by collecting your search history "Laura Bruno&apos;s Blog Medical Intuition, Soul Readings, Intuitive Coaching, Tarot, Reiki: Inspiring and Empowering Visionaries and Healers." Laura Brunos Blog. N.p., n.d. Web. 28 Nov. 2013. <http://laurabruno.wordpress.com/tag/youtube-privacy-issues/>. Yuxing Zeng
  • 30.  YouTube's video privacy and sharing options: ◦ If a YouTube user doesn't want to offend anyone but also happens to be popular (having a substantial amount of subscribers), this user will want to reach more than 25 people. This situation renders the entire option of privatizing videos pointless. "Google Groups." Google Groups. N.p., n.d. Web. 28 Nov. 2013. <http://productforums.google.com/forum/#!topic/youtube/aFLbzsGU66w>. Yuxing Zeng
  • 31.   New Google/YouTube Privacy Issues This video shows that Google announced privacy settings that will affect YouTube on January 24,2012. Google will require users to follow by the companies for their activates on YouTube. http://www.youtube.com/watch?v=jm8J9OHCv iM Yuxing Zeng
  • 32. "How Can Agencies Step Beyond LinkedIn to Gain a Competitive Edge?." Blog FireFish Software. N.p., n.d. Web. 28 Nov. 2013. <http://blog.firefishsoftware.com/bid/101435/How-CanAgencies-Step-Beyond-LinkedIn-to-Gain-a-Competitive-Edge>.  The Social network for work professionals  Created by Reid Hoffman in 2002  4.2 billions “ professionally-oriented searches” in 2011 "Mashable." Mashable. N.p., n.d. Web. 25 Nov. 2013. <http://mashable.com/category/linkedin/>. Yuxing Zeng
  • 33.   Managed to lose millions of users' email and password combinations A LinkedIn user who indicates they want their profile to remain anonymous to the person whose profile they've viewed, that occasionally the searcher's profile comes up on the said viewed member's page as someone who they might like to connect with. "LinkedIn (LNKD) Has Major Privacy Issues." Insider Monkey Free Hedge Fund and Insider Trading Data RSS. N.p., n.d. Web. 28 Nov. 2013. <http://www.insidermonkey.com/blog/linkedin-lnkd-has-major-privacy-issues23328/#3HEy13RT35rpjrB2.99>. Yuxing Zeng
  • 34.   Not taking the measures it needs to acquire the support of individuals who want to be as private as possible on the Internet Exposing users’ Google searches "privacy issue? linkedin exposing my google searches???." - LinkedIn Help Center. N.p., n.d. Web. 28 Nov. 2013. <http://community.linkedin.com/questions/73446/privacy-issue-linkedinexposing-my-google-searches.html>. "LinkedIn (LNKD) Has Major Privacy Issues." Insider Monkey Free Hedge Fund and Insider Trading Data RSS. N.p., n.d. Web. 28 Nov. 2013. <http://www.insidermonkey.com/blog/linkedin-lnkd-has-major-privacy-issues23328/#3HEy13RT35rpjrB2.99>. Yuxing Zeng
  • 35.   Protecting your privacy on LinkedIn This video shows that how to protect your LinkedIn profile by disenable the activities broadcasts. It already became a privacy issues for the LinkedIn that other people can see your own news feed. http://www.youtube.com/watch?v=vnJ4Tv_4p Mk Yuxing Zeng
  • 36.  Consumers using online social networking sites need to remember that once you post something online it is there FOREVER. You can erase, delete, backspace what ever you want, but the fact of the matter is that once posted online, NOTHING IS DELETABLE. Rachel Brock
  • 37.         Because there are a number of dishonest people online who aim to steal your personal information for financial gain, personal gain, or just plain fun. Types of Online Threats: Fraudsters Hackers Hoaxsters Cyber-Bullies Online Predators Cyber Stalkers Rachel Brock
  • 38.  People who use the internet to take advantage of victims, usually involving theft of personal or financial information. These people may use the internet to present fraudulent solicitations, fraudulent transactions, or transmit the proceeds of fraud to institutions or other individuals connected with the scheme. "Internet Fraud." TheFreeDictionary.com. N.p., n.d. Web. 27 Nov. 2013. http://legal-dictionary.thefreedictionary.com/Internet+Fraud Claire Keating
  • 39.  15 People Arrested in RCMP Raids On Alleged Fraudsters in Montreal • Fifteen people working at a call center in Montreal were arrested on charges of massmarket fraud that spanned Canada and the U.S., targeting thousands of victims and robbing approximately $20 million. "680News." 680News Fifteen people arrested in RCMP raids on alleged fraudsters in Montreal Comments. N.p., n.d. Web. 28 Nov. 2013. <http://www.680news.com/2013/11/19/fifteenpeople-arrested-in-rcmp-raids-on-alleged-fraudsters-in-montreal/>. Claire Keating
  • 40.  An individual with extensive computer programming knowledge, that seeks and exploits weaknesses in a computer system or computer network (ex – social media sites). Through these software weaknesses they may gain access to personal files and information, and the lengths to which they may use this information is endless. They may be motivated by a number of reasons including profit, protest, or challenge. "hacker." hacker. N.p., n.d. Web. 28 Nov. 2013. <http://www.catb.org/jargon/html/H/hacker.html>. Rachel Brock
  • 41. Recent Hacker Attacks in Canada This article discusses the hacker software titles “Citadel” and how it was discovered by the RCMP in Burnaby. The software is estimated to have effected more that 5 million people in over 90 countries, stealing over $500 million dollars from victims bank accounts. "B.C. Computer Servers Linked to $500M Global Theft Ring - British Columbia - CBC News." CBCnews. CBC/Radio Canada, n.d. Web. 27 Nov. 2013. Rachel Brock
  • 42. Top 10 Infamous Computer Hackers This video shows the top 10 most infamous computer hackers, and the effect they had on people and businesses around the world. Rachel Brock
  • 43.  Hoax: Noun 1. to trick into believing or accepting as genuine something false and often preposterous. 2. something accepted or established by fraud or fabrication  Hoaxsters are people who deliberately fabricate false information and spread it virally. This information is heard and seen by others, and passed around because it is perceived to be factual. "Hoax." Merriam-Webster. Merriam-Webster, n.d. Web. 27 Nov. 2013. Rachel Brock
  • 44.  Hacked Fox News Twitter Account Declares Obama Died This article released to the public through the online press "The Free Library," states how Fox News' Twitter account was hacked by a hoaxer group called "The Script Kiddies." They released false information that went viral stating that Obama had been assassinated. "Hacked Fox News Twitter Account Declares Obama Died." - Free Online Library. N.p., n.d. Web. 27 Nov. 2013. Rachel Brock
  • 45.  The use of technology, specifically the internet and social media websites, to harass or harm people in a deliberate and hostile manner. It can involve anything from gossiping, to spreading false rumours, to making harmful threats to people. Cyber-bullying has become common among young social media users. "Category Archives: Cyberbullying." Cyberbullying. N.p., n.d. Web. 26 Nov. 2013. <http://definetheline.ca/dtl/category/cyberbullying/>. Claire Keating
  • 46.   95% of social media-using teens who have witnessed cruel behavior on social networking sites say they have seen others ignoring the mean behavior; 55% witness this frequently 66% of teens who have witnessed online cruelty have also witnessed others joining; 21% say they have also joined in the harassment "Cyberbullying Statistics." InternetSafety101.org: Statistics. N.p., n.d. Web. 27 Nov. 2013. http://www.internetsafety101.org/cyberbullyingstatistics.htm Claire Keating
  • 47.   Only 7% of U.S. parents are worried about cyberbullying, even though 33% of teenagers have been victims of cyberbullying One million children were harassed, threatened or subjected to other forms of cyberbullying on Facebook during the past year "Cyberbullying Statistics." InternetSafety101.org: Statistics. N.p., n.d. Web. 27 Nov. 2013. http://www.internetsafety101.org/cyberbullyingstatistics.htm Claire Keating
  • 48.   68% of teens agree that cyberbullying is a serious problem with today’s youth.[6]Reasons cyberbullies said they engaged in cyberbullying: ◦ To show off to friends (11%) ◦ To be mean (14%) ◦ Something else (16%) ◦ To embarrass them (21%) ◦ For fun or entertainment (28%) ◦ They deserved it (58%) ◦ To get back at someone (58%) 81% of youth agree that bullying online is easier to get away with than bullying in person "Cyberbullying Statistics." InternetSafety101.org: Statistics. N.p., n.d. Web. 27 Nov. 2013. http://www.internetsafety101.org/cyberbullyingstatistics.htm Claire Keating
  • 49.  Delete Cyber Bullying This YouTube video explains what cyber-bullying really is and describes the characteristics of a cyberbully. They believe they have an advantage online because they are secured online and there actions have no consequences. Cyber-bullying is a monster that we as consumers of social media have created ourselves. The YouTube video encourages online consumer to “Be The Change” and spread positive thoughts, messages, images and videos online. Claire Keating
  • 50.  The Case of Tyler Clementi Attention to the issue of cyber-bullying was first brought to the public eye through the case of the suicide of Tyler Clementi. Tyler Cementi’s roommate set up a web-cam and recorded Tyler having homosexual intercourse with another man, and broadcasted it on the internet. After Tyler’s suicide, his roommate, Dharun Ravi, was sentenced to 30 days in jail. "Tyler Clementi." Times Topics. N.p., n.d. Web. 27 Nov. 2013. Claire Keating
  • 51.  Online predators are arguably the most dangerous internet users. Online predators are people who look for weakness in others online, and intend to inflict harm on them. The most common type of online predators are mature men and females using open chat sites to lure in minors and commit lewd and perverse acts with them. These people are often pedophiles, and attack young naïve children who agree to meet with them in person. "The Facts About Online Predators." Family Safe Computers. N.p., n.d. Web. 28 Nov. 2013. <http://www.familysafecomputers.org/predators.htm>. Rachel Brock
  • 52. Child Internet Safety PSA – Online Predators This video shows how easily a child can be manipulated into giving out personal information to predators. Rachel Brock
  • 53.    In 82% of online sex crimes against minors, the offender used the victim's social networking site to gain information about the victim's likes and dislikes 65% of online sex offenders used the victim's social networking site to gain home and school information about the victim Only 1 in 3 people will report sexual crimes to a trusted adult "InternetSafety101.org: Statistics." InternetSafety101.org: Statistics. N.p., n.d. Web. 27 Nov. 2013. Rachel Brock
  • 54.    26% of online sex offenders used the victim's social networking site to gain information about the victim's whereabouts at a specific time There are over 747,408 registered sex offenders in the United States, and over 100,000 are lost in the system Four percent of all youth Internet users received aggressive sexual solicitations, which threatened to spill over into “real life”. These solicitors asked to meet the youth in person, called them on the telephone or sent offline mail, money or gifts. Also, four percent of youth had distressing sexual solicitations that left them feeling upset of extremely afraid. "InternetSafety101.org: Statistics." InternetSafety101.org: Statistics. N.p., n.d. Web. 27 Nov. 2013. Rachel Brock
  • 55.   Virtual Girl "Sweetie" Helps Track Thousands of Online Sexual Predators Another example is the virtual girl “Sweetie,” a 10 year old Pilipino girl designed through computer software, who helps to track online predators. Rachel Brock
  • 56. THE NUMBER ONE RULE!:  The only way to ensure your information is safe online, is to be careful of and responsible for everything that you post. Since nothing can ever be removed from the online world, you must make sure you don’t post personal information, reputation damaging pictures, blogs, ANYTHING that may come back to haunt you. Future employers may access your social networking sites and choose not to hire you based on pictures and posts they find. Rachel Brock
  • 57. 2. Do not trust strangers you meet online  People you meet online should not be trusted with your personal information. People are able to create multiple cyber identities, and may not really be the trustworthy person you think you are talking to behind the computer screen. Rachel Brock
  • 58. 3. Do not share personal information over the Internet or through social networking sites.  Sharing your banking information, your whereabouts, our address, phone number, or contact information on social networking sites or with people you talk to online can be a threat to your privacy and safety. Rachel Brock
  • 59. 4. Have multiple passwords and security questions.  Many people make the mistake of having one simple password for all of their online accounts. If this password were to be compromised, this could have devastating results. Claire Keating
  • 60. 5. Report online abuse.  If you are a witness to cyber bullying, fraud, or any other illegal online activity it is important to report it immediately. The failure to report could have devastating effects for not only you, but others around you. If someone is cyber-bullying you, the odd are high that they are doing it to others as well. Claire Keating
  • 61. 6. Format Your Privacy Settings  Make sure your privacy settings are limited to the public. Allowing only your friends and family to have access to your profiles prevents strangers from viewing your personal information. Claire Keating
  • 62.  Online Privacy Online privacy animation video, that makes us wonder “what if online actions were set in the physical, tangible world?” The YouTube video shares with consumers that we have to be aware of what we are posting online and who we are sharing it with because there could be consequences. Remember… Think before you click! Claire Keating
  • 63. Protecting Your Privacy On The Internet This page posts tips on how to protect personal privacy on the Internet, through Microsoft’s Safety & Security Center. It details topics such as thinking before sharing personal information, monitoring what others post, guarding personal information, and protecting yourself from fraud. Alyssa Budhoo
  • 64. “Data Privacy Day, held annually on January 28, encourages everyone to make protecting privacy and data a greater priority. DPD is an effort to empower and educate people to protect their privacy and control their digital footprint. Contribute to the success of Data Privacy Day by sharing resources and advice on social media, hosting an event, or having your organization become a DPD Champion. You can make a difference in just a few minutes Jan. 28!” "Overview | StaySafeOnline.org." Overview | StaySafeOnline.org. N.p., n.d. Web. 28 Nov. 2013 Claire Keating
  • 65.  Privacy and Social Networks Social networking sites are a commercial operation where they focus on making money by collecting user data. By knowing what we like, where we live, and what are interest are, companies, advertisers, marketers and employers make money. The data that we post online on social networking sites such as Facebook and Twitter make decisions about you. Claire Keating
  • 66. The Future of Online Privacy This video discovers how digital footprints are everywhere through facial recognition software, for example, among all online personal users. The video features the speaker, Jonathan Stickland, who investigates the future of online privacy and what to expect. Alyssa Budhoo
  • 67. “Once conversations that should be private are undertaken in a public forum, they become theater – meant for the onlookers more than the participants.” -ANNONYMOUS Claire Keating

Notas del editor

  1. * SOURCE
  2. **ADDED****
  3. *** ADDED
  4. ***ADDED STUFF*****