SlideShare una empresa de Scribd logo
1 de 7
How Can We Protect Ourselves?
What is social networking?
o A social network is social structure that is made up of
 individuals and or organizations.

o Online social networks has internet applications that
 allow individuals to connect.

o Online social networks allow and have options of
 instant messaging and blogging.
The different
                            types of social
                            networks




 Social networks connect
  people
Why Should I be Concerned using a
social network site?
o Social networking sites can often have a default
 security settings, which will allow others to view your
 personal information up loaded.

o With our personal information out in the open, can
 cause personal security problems or become a victim
 of identity fraud.
How Do I Protect Myself?
 Research and investigate carefully on any site you may want to join.
 Read and clearly understand the sites terms of use.
 Understand the privacy policies and avoid sharing information with
    other companies.
   Create an account without providing any personal information, like:
    date of birth, full name, social insurance number or address.
   Protect profile account with security settings.
   For every piece of information you add, ask yourself :“Can a financial or
    sexual predator benefit from this information?”
   Do not give strangers to view your profile.
   Protect your friends personal security by what you post about them.
Resources and Links
 www.commonsense.org
 http://www.thinkuknow.co.uk/8_10/cybercafe/Cyber-
  Cafe-Base/
 https://protectchildren.ca/app/en/
 http://www.rcmp-grc.gc.ca/scams-fraudes/student-
  etudiant-guide-eng.htm#social

Más contenido relacionado

La actualidad más candente

Disadvantages of Digital Identity
Disadvantages of Digital IdentityDisadvantages of Digital Identity
Disadvantages of Digital Identity
Digital-identity
 
Advantages of Digital Identity
Advantages of Digital IdentityAdvantages of Digital Identity
Advantages of Digital Identity
Digital-identity
 
Social media and security essentials.pptx
Social media and security essentials.pptxSocial media and security essentials.pptx
Social media and security essentials.pptx
Pink Elephant
 

La actualidad más candente (20)

Cyber security and antivirus software
Cyber security and antivirus softwareCyber security and antivirus software
Cyber security and antivirus software
 
Digital Safety, Data Privacy, and Online Netiquette
Digital Safety, Data Privacy, and Online NetiquetteDigital Safety, Data Privacy, and Online Netiquette
Digital Safety, Data Privacy, and Online Netiquette
 
Social media privacy and safety
Social media privacy and safetySocial media privacy and safety
Social media privacy and safety
 
Are you safe enough on Social Media?
Are you safe enough on Social Media?Are you safe enough on Social Media?
Are you safe enough on Social Media?
 
Misuse of social media
Misuse of social mediaMisuse of social media
Misuse of social media
 
How to Like Social Media Network Security
How to Like Social Media Network SecurityHow to Like Social Media Network Security
How to Like Social Media Network Security
 
Misuse of personal information
Misuse of personal informationMisuse of personal information
Misuse of personal information
 
Social Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social MediaSocial Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social Media
 
What You Need To Know About Social Networking
What You Need To Know About Social NetworkingWhat You Need To Know About Social Networking
What You Need To Know About Social Networking
 
Disadvantages of Digital Identity
Disadvantages of Digital IdentityDisadvantages of Digital Identity
Disadvantages of Digital Identity
 
Digital Identity
Digital IdentityDigital Identity
Digital Identity
 
Misuse of social media
Misuse of social mediaMisuse of social media
Misuse of social media
 
Social media & cyber crime
Social media & cyber crimeSocial media & cyber crime
Social media & cyber crime
 
Advantages of Digital Identity
Advantages of Digital IdentityAdvantages of Digital Identity
Advantages of Digital Identity
 
Social Media Security
Social Media SecuritySocial Media Security
Social Media Security
 
Social Networking and Internet Safety
Social Networking and Internet SafetySocial Networking and Internet Safety
Social Networking and Internet Safety
 
Social media and security essentials.pptx
Social media and security essentials.pptxSocial media and security essentials.pptx
Social media and security essentials.pptx
 
Social Media and Media Abuse for Parents
Social Media and Media Abuse for ParentsSocial Media and Media Abuse for Parents
Social Media and Media Abuse for Parents
 
Social Media Safety Teens - From NetSmartz
Social Media Safety Teens - From NetSmartzSocial Media Safety Teens - From NetSmartz
Social Media Safety Teens - From NetSmartz
 
A Privacy Primer
A Privacy PrimerA Privacy Primer
A Privacy Primer
 

Destacado

Gbi slides - pato 2013
Gbi   slides - pato 2013Gbi   slides - pato 2013
Gbi slides - pato 2013
neydapiamba
 
Aula 05 design gráfico na publicidade leis da gestalt
Aula 05   design gráfico na publicidade leis da gestaltAula 05   design gráfico na publicidade leis da gestalt
Aula 05 design gráfico na publicidade leis da gestalt
Elizeu Nascimento Silva
 
Ecologia
EcologiaEcologia
Ecologia
Yarih
 
Aula 04 design gráfico na publicidade princípios de design
Aula 04   design gráfico na publicidade princípios de designAula 04   design gráfico na publicidade princípios de design
Aula 04 design gráfico na publicidade princípios de design
Elizeu Nascimento Silva
 
Presentación guia de juguetes
Presentación guia de juguetesPresentación guia de juguetes
Presentación guia de juguetes
Ireneal87
 
2. publicação março
2. publicação março2. publicação março
2. publicação março
Leigos
 
Good luck getting into these golf clubs
Good luck getting into these golf clubsGood luck getting into these golf clubs
Good luck getting into these golf clubs
Justin Perich
 
Tarento presentacion
Tarento presentacionTarento presentacion
Tarento presentacion
URIELITRO
 
Aula 06 design gráfico na publicidade leis da gestalt02
Aula 06   design gráfico na publicidade leis da gestalt02Aula 06   design gráfico na publicidade leis da gestalt02
Aula 06 design gráfico na publicidade leis da gestalt02
Elizeu Nascimento Silva
 

Destacado (20)

UNC Sustainability Symposium: Michael Mehling 2082013
UNC Sustainability Symposium: Michael Mehling 2082013UNC Sustainability Symposium: Michael Mehling 2082013
UNC Sustainability Symposium: Michael Mehling 2082013
 
Gbi slides - pato 2013
Gbi   slides - pato 2013Gbi   slides - pato 2013
Gbi slides - pato 2013
 
Aula 05 design gráfico na publicidade leis da gestalt
Aula 05   design gráfico na publicidade leis da gestaltAula 05   design gráfico na publicidade leis da gestalt
Aula 05 design gráfico na publicidade leis da gestalt
 
Ecologia
EcologiaEcologia
Ecologia
 
Aula 04 design gráfico na publicidade princípios de design
Aula 04   design gráfico na publicidade princípios de designAula 04   design gráfico na publicidade princípios de design
Aula 04 design gráfico na publicidade princípios de design
 
01 presentación elfid 7 feb
01 presentación elfid 7 feb01 presentación elfid 7 feb
01 presentación elfid 7 feb
 
UNC Sustainability Symposium: Jennifer Turner 2082013
UNC Sustainability Symposium: Jennifer Turner 2082013UNC Sustainability Symposium: Jennifer Turner 2082013
UNC Sustainability Symposium: Jennifer Turner 2082013
 
Viajes
ViajesViajes
Viajes
 
Presentación guia de juguetes
Presentación guia de juguetesPresentación guia de juguetes
Presentación guia de juguetes
 
2. publicação março
2. publicação março2. publicação março
2. publicação março
 
Good luck getting into these golf clubs
Good luck getting into these golf clubsGood luck getting into these golf clubs
Good luck getting into these golf clubs
 
Practica 2
Practica 2Practica 2
Practica 2
 
Sam
SamSam
Sam
 
Tarento presentacion
Tarento presentacionTarento presentacion
Tarento presentacion
 
Aula 06 design gráfico na publicidade leis da gestalt02
Aula 06   design gráfico na publicidade leis da gestalt02Aula 06   design gráfico na publicidade leis da gestalt02
Aula 06 design gráfico na publicidade leis da gestalt02
 
Op art
Op artOp art
Op art
 
Théo inf
Théo infThéo inf
Théo inf
 
Diário 01-03-13
Diário   01-03-13Diário   01-03-13
Diário 01-03-13
 
Brasil
BrasilBrasil
Brasil
 
Secundaria sexta sesion vf
Secundaria sexta sesion vfSecundaria sexta sesion vf
Secundaria sexta sesion vf
 

Similar a Social Networking

Security and Privacy in Social Networks.pptx
Security and Privacy in Social Networks.pptxSecurity and Privacy in Social Networks.pptx
Security and Privacy in Social Networks.pptx
SIMNchannel
 
Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235
brendaylo
 
Mark Rogers' Social Network Presentation
Mark Rogers' Social Network PresentationMark Rogers' Social Network Presentation
Mark Rogers' Social Network Presentation
Mark Rogers
 
Cybersafety Version1
Cybersafety Version1Cybersafety Version1
Cybersafety Version1
sabrinacotta
 
advantagesanddisadvantagesofsocialmedia-151211192046.pptx
advantagesanddisadvantagesofsocialmedia-151211192046.pptxadvantagesanddisadvantagesofsocialmedia-151211192046.pptx
advantagesanddisadvantagesofsocialmedia-151211192046.pptx
Himabindu905359
 
Security in social network araceli&arlethe
Security in social network araceli&arletheSecurity in social network araceli&arlethe
Security in social network araceli&arlethe
tecnologico de tuxtepec
 
Future of social networking group project
Future of social networking   group projectFuture of social networking   group project
Future of social networking group project
bulgarej
 

Similar a Social Networking (20)

Security and Privacy in Social Networks.pptx
Security and Privacy in Social Networks.pptxSecurity and Privacy in Social Networks.pptx
Security and Privacy in Social Networks.pptx
 
IS SOCIAL PRIVACY POSSIBLE?
IS SOCIAL PRIVACY POSSIBLE?IS SOCIAL PRIVACY POSSIBLE?
IS SOCIAL PRIVACY POSSIBLE?
 
Social Media Awareness
Social Media AwarenessSocial Media Awareness
Social Media Awareness
 
Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235
 
Mark Rogers' Social Network Presentation
Mark Rogers' Social Network PresentationMark Rogers' Social Network Presentation
Mark Rogers' Social Network Presentation
 
Sclnwk
SclnwkSclnwk
Sclnwk
 
Cybersafety Version1
Cybersafety Version1Cybersafety Version1
Cybersafety Version1
 
Cyber Awareness.pptx
Cyber Awareness.pptxCyber Awareness.pptx
Cyber Awareness.pptx
 
advantagesanddisadvantagesofsocialmedia-151211192046.pdf
advantagesanddisadvantagesofsocialmedia-151211192046.pdfadvantagesanddisadvantagesofsocialmedia-151211192046.pdf
advantagesanddisadvantagesofsocialmedia-151211192046.pdf
 
advantagesanddisadvantagesofsocialmedia-151211192046.pptx
advantagesanddisadvantagesofsocialmedia-151211192046.pptxadvantagesanddisadvantagesofsocialmedia-151211192046.pptx
advantagesanddisadvantagesofsocialmedia-151211192046.pptx
 
Digital citizenship@
Digital citizenship@Digital citizenship@
Digital citizenship@
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Advantages and disadvantages of social media
Advantages and disadvantages of social mediaAdvantages and disadvantages of social media
Advantages and disadvantages of social media
 
Advantages and disadvantages of social media
Advantages and disadvantages of social mediaAdvantages and disadvantages of social media
Advantages and disadvantages of social media
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Security in social network araceli&arlethe
Security in social network araceli&arletheSecurity in social network araceli&arlethe
Security in social network araceli&arlethe
 
Future of social networking group project
Future of social networking   group projectFuture of social networking   group project
Future of social networking group project
 
Social– isms
Social– ismsSocial– isms
Social– isms
 
Social Network: Good or Bad
Social Network: Good or BadSocial Network: Good or Bad
Social Network: Good or Bad
 

Social Networking

  • 1. How Can We Protect Ourselves?
  • 2. What is social networking? o A social network is social structure that is made up of individuals and or organizations. o Online social networks has internet applications that allow individuals to connect. o Online social networks allow and have options of instant messaging and blogging.
  • 3. The different types of social networks  Social networks connect people
  • 4. Why Should I be Concerned using a social network site? o Social networking sites can often have a default security settings, which will allow others to view your personal information up loaded. o With our personal information out in the open, can cause personal security problems or become a victim of identity fraud.
  • 5.
  • 6. How Do I Protect Myself?  Research and investigate carefully on any site you may want to join.  Read and clearly understand the sites terms of use.  Understand the privacy policies and avoid sharing information with other companies.  Create an account without providing any personal information, like: date of birth, full name, social insurance number or address.  Protect profile account with security settings.  For every piece of information you add, ask yourself :“Can a financial or sexual predator benefit from this information?”  Do not give strangers to view your profile.  Protect your friends personal security by what you post about them.
  • 7. Resources and Links  www.commonsense.org  http://www.thinkuknow.co.uk/8_10/cybercafe/Cyber- Cafe-Base/  https://protectchildren.ca/app/en/  http://www.rcmp-grc.gc.ca/scams-fraudes/student- etudiant-guide-eng.htm#social