SlideShare una empresa de Scribd logo
1 de 12
Safe Social Media for Positive Social Change
Contents
• Introduction: Did you know?
• What do you give when you register?
• What do I need to know to stay safe on
  Facebook?
• Twitter: Keeping Your Account Secure
• Blogging: Introduce other NOT BlogSpot or
  Wordpress and Online Petition: Change.org
• Tips for Geeks
Introduction: Did you know?
• Internet usage has risen around 1,500% bwt 2007 –
  end of 2011.
• By December 2011 the country had 755,000 Internet
  users = 5%
• Licensed 37 ISPs (a license costs $25,000)
• Most Cambodian have access to a mobile phone
  (93%), and around half own a phone.
• Draft of Internet Law (Cyber law)
• No research of Cambodia online internet users
  behavior
• Password with 20 digits can be cracked only 24hs
What do you give when you register?
•   Your full names
•   Addresses
•   DOB
•   Location
•   Occupation
•   Marriage Statue
•   Age
•   Credit card number
•   Gender
•   School/University
What do I need to know to stay safe on
             Facebook?
•   Privacy Setting
•   Intellectual Property
•   Statement of Rights and Responsibilities
•   Reporting a Violation
What do I need to know to stay safe on
             Facebook?
• Never share your password.
• Think before you post. Each comment and
  photo builds your online presence.
• Adjust your privacy settings and review them
  often.
• Accept friend requests only from people you
  know personally.
• Report content and timelines that look
  suspicious.
Twitter: Keeping Your Account Secure
•    Safe Tweeting: The Basics
       We want Twitter to be a safe and open community. This
       help page provides some information and tips to help you
       practice safe Tweeting and keep your account secure.
       Here are some basics:
a.     Use a strong password.
b.     Watch out for suspicious links, and always make sure
       you’re on Twitter.com before you enter your login
       information.
c.     Use HTTPS for improved security.
d.     Don't give your username and password out to untrusted
       third-parties, especially those promising to get you
       followers or make you money.
e.     Make sure your computer and operating system is up-to-
       date with the most recent patches, upgrades, and anti-
       virus software.
•    Use a Strong and Unique Password
•    Use HTTPS for Improved Security
Blogging and Online Campaign
• Favorite Blog in Cambodia:
  Wordpress; Blogspot
• Introduce to http://storify.com/
• Posterous.com
• Change.org
• Visit:
  – http://freethe15.wordpress.com
  – http://sahrika.wordpress.com
Tips for Geeks
• See who are using your
  Gmail
• iPhone and iPad app (Your
  own morning newspaper)
• HideMyAssDotCom (Open
  restricted website)
• Using http and https
• PiPl.com (See your post
  online)
• Live Stream Tweet on your
  blog
STAY SAFE. BUT DON’T BE AFRAID!




         Thank You!
Safety social media for positive social change
Safety social media for positive social change

Más contenido relacionado

La actualidad más candente

Internet security tips that every parent should know
Internet security tips that every parent should knowInternet security tips that every parent should know
Internet security tips that every parent should knowkanika sharma
 
Digital citizenship.pptx
Digital citizenship.pptxDigital citizenship.pptx
Digital citizenship.pptxKnepperE
 
Online privacy
Online privacyOnline privacy
Online privacyjo-jo23
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquetterowenick
 
Cyber Safety Month summary
 Cyber Safety Month summary Cyber Safety Month summary
Cyber Safety Month summaryicts-uct
 
Formative Task - Safe Internet Usage
Formative Task - Safe Internet UsageFormative Task - Safe Internet Usage
Formative Task - Safe Internet Usagealigi
 
Basic Digital Security
Basic Digital SecurityBasic Digital Security
Basic Digital SecurityUjjwal Acharya
 
E-Safety and Kite Info
E-Safety and Kite InfoE-Safety and Kite Info
E-Safety and Kite Infooneill74
 
For schoolchildren1
For schoolchildren1For schoolchildren1
For schoolchildren1Vinay Kumar
 
Current issues
Current issuesCurrent issues
Current issuesmsunorm
 
Phishing-Email-Fraud-General
Phishing-Email-Fraud-GeneralPhishing-Email-Fraud-General
Phishing-Email-Fraud-GeneralAndrew Voorhies
 

La actualidad más candente (19)

Internet security tips that every parent should know
Internet security tips that every parent should knowInternet security tips that every parent should know
Internet security tips that every parent should know
 
CYBER SAFETY BY YOGESH
CYBER SAFETY BY YOGESHCYBER SAFETY BY YOGESH
CYBER SAFETY BY YOGESH
 
Netiquette
NetiquetteNetiquette
Netiquette
 
Digital citizenship.pptx
Digital citizenship.pptxDigital citizenship.pptx
Digital citizenship.pptx
 
Online privacy
Online privacyOnline privacy
Online privacy
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
 
Cyber Safety Month summary
 Cyber Safety Month summary Cyber Safety Month summary
Cyber Safety Month summary
 
Formative Task - Safe Internet Usage
Formative Task - Safe Internet UsageFormative Task - Safe Internet Usage
Formative Task - Safe Internet Usage
 
Basic Digital Security
Basic Digital SecurityBasic Digital Security
Basic Digital Security
 
Computer Ethics
Computer  EthicsComputer  Ethics
Computer Ethics
 
E-Safety and Kite Info
E-Safety and Kite InfoE-Safety and Kite Info
E-Safety and Kite Info
 
For schoolchildren1
For schoolchildren1For schoolchildren1
For schoolchildren1
 
International Data Privacy Day 2017
International Data Privacy Day 2017International Data Privacy Day 2017
International Data Privacy Day 2017
 
Current issues
Current issuesCurrent issues
Current issues
 
Phishing-Email-Fraud-General
Phishing-Email-Fraud-GeneralPhishing-Email-Fraud-General
Phishing-Email-Fraud-General
 
Ass3 Sum
Ass3 SumAss3 Sum
Ass3 Sum
 
The internet websites
The internet websitesThe internet websites
The internet websites
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Internet safety
Internet safetyInternet safety
Internet safety
 

Destacado

Cool facebook tricks and hacks
Cool facebook tricks and hacksCool facebook tricks and hacks
Cool facebook tricks and hacksRussell Com
 
Facebook and security settings settings
Facebook and security settings settingsFacebook and security settings settings
Facebook and security settings settingsAbhishek Gupta
 
Facebook Policy Primer by Prasanth Kandeepan
Facebook Policy Primer by Prasanth KandeepanFacebook Policy Primer by Prasanth Kandeepan
Facebook Policy Primer by Prasanth Kandeepanprasanthkandeepan
 
Assessing learning via social bookmarking using diigo
Assessing learning via social bookmarking using diigoAssessing learning via social bookmarking using diigo
Assessing learning via social bookmarking using diigoThomas Ho
 
Basic mobile and internet security
Basic mobile and internet securityBasic mobile and internet security
Basic mobile and internet securityMoses Ngeth
 
Facebook Privacy Issues
Facebook Privacy IssuesFacebook Privacy Issues
Facebook Privacy IssuesBusinessOnline
 
Facebook privacy presentation
Facebook privacy presentationFacebook privacy presentation
Facebook privacy presentationDianne McKenzie
 
Facebook privacy.
Facebook privacy.Facebook privacy.
Facebook privacy.Martin965
 
2017 Call Erasmus+ Information Sessions UK: Adult Education
2017 Call Erasmus+ Information Sessions UK: Adult Education2017 Call Erasmus+ Information Sessions UK: Adult Education
2017 Call Erasmus+ Information Sessions UK: Adult EducationErasmus+ UK National Agency
 
Facebook Powerpoint
Facebook PowerpointFacebook Powerpoint
Facebook Powerpointmyra14
 
The Top Skills That Can Get You Hired in 2017
The Top Skills That Can Get You Hired in 2017The Top Skills That Can Get You Hired in 2017
The Top Skills That Can Get You Hired in 2017LinkedIn
 

Destacado (11)

Cool facebook tricks and hacks
Cool facebook tricks and hacksCool facebook tricks and hacks
Cool facebook tricks and hacks
 
Facebook and security settings settings
Facebook and security settings settingsFacebook and security settings settings
Facebook and security settings settings
 
Facebook Policy Primer by Prasanth Kandeepan
Facebook Policy Primer by Prasanth KandeepanFacebook Policy Primer by Prasanth Kandeepan
Facebook Policy Primer by Prasanth Kandeepan
 
Assessing learning via social bookmarking using diigo
Assessing learning via social bookmarking using diigoAssessing learning via social bookmarking using diigo
Assessing learning via social bookmarking using diigo
 
Basic mobile and internet security
Basic mobile and internet securityBasic mobile and internet security
Basic mobile and internet security
 
Facebook Privacy Issues
Facebook Privacy IssuesFacebook Privacy Issues
Facebook Privacy Issues
 
Facebook privacy presentation
Facebook privacy presentationFacebook privacy presentation
Facebook privacy presentation
 
Facebook privacy.
Facebook privacy.Facebook privacy.
Facebook privacy.
 
2017 Call Erasmus+ Information Sessions UK: Adult Education
2017 Call Erasmus+ Information Sessions UK: Adult Education2017 Call Erasmus+ Information Sessions UK: Adult Education
2017 Call Erasmus+ Information Sessions UK: Adult Education
 
Facebook Powerpoint
Facebook PowerpointFacebook Powerpoint
Facebook Powerpoint
 
The Top Skills That Can Get You Hired in 2017
The Top Skills That Can Get You Hired in 2017The Top Skills That Can Get You Hired in 2017
The Top Skills That Can Get You Hired in 2017
 

Similar a Safety social media for positive social change

Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...Justin Denton
 
Internet Safety & Privacy
Internet Safety & PrivacyInternet Safety & Privacy
Internet Safety & PrivacyAlexine Marier
 
Securing & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptxSecuring & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptxBrian Pichman
 
How To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber MondayHow To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber MondayMichele Chubirka
 
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter StyleCybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter StyleBrian Pichman
 
CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024Brian Pichman
 
Corporate Counsel: How To Use Social Media To Find Jobs
Corporate Counsel: How To Use Social Media To Find JobsCorporate Counsel: How To Use Social Media To Find Jobs
Corporate Counsel: How To Use Social Media To Find JobsInflow
 
Building Donor Engagement through Social Media
Building Donor Engagement through Social MediaBuilding Donor Engagement through Social Media
Building Donor Engagement through Social MediaKyle Lacy
 
Securing and Safeguarding Your Library Setup
Securing and Safeguarding Your Library SetupSecuring and Safeguarding Your Library Setup
Securing and Safeguarding Your Library SetupBrian Pichman
 
PROTECTION PERSONAL PRIVACY
PROTECTION PERSONAL PRIVACYPROTECTION PERSONAL PRIVACY
PROTECTION PERSONAL PRIVACYDoubleXDS
 
Protecting Personal Privacy
Protecting Personal PrivacyProtecting Personal Privacy
Protecting Personal PrivacyDoubleXDS
 
Personal Internet Security Practice
Personal Internet Security PracticePersonal Internet Security Practice
Personal Internet Security PracticeBrian Pichman
 
Online Self Defense
Online Self DefenseOnline Self Defense
Online Self DefenseBarry Caplin
 
Security and Privacy Brown Bag
Security and Privacy Brown BagSecurity and Privacy Brown Bag
Security and Privacy Brown Bag501 Commons
 
Social media and the internet evolution
Social media and the internet evolutionSocial media and the internet evolution
Social media and the internet evolutionKarlton Utter
 
How Real Estate Businesses use Twitter
How Real Estate Businesses use TwitterHow Real Estate Businesses use Twitter
How Real Estate Businesses use TwitterWebTech Dezine
 
twitter hacking causes and protection
twitter hacking causes and protectiontwitter hacking causes and protection
twitter hacking causes and protectionFahd Allebdi
 

Similar a Safety social media for positive social change (20)

Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...
 
Tweet tweet 12 (1)
Tweet tweet 12 (1)Tweet tweet 12 (1)
Tweet tweet 12 (1)
 
Internet Safety & Privacy
Internet Safety & PrivacyInternet Safety & Privacy
Internet Safety & Privacy
 
Securing & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptxSecuring & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptx
 
How To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber MondayHow To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber Monday
 
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter StyleCybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
 
CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024
 
Corporate Counsel: How To Use Social Media To Find Jobs
Corporate Counsel: How To Use Social Media To Find JobsCorporate Counsel: How To Use Social Media To Find Jobs
Corporate Counsel: How To Use Social Media To Find Jobs
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Building Donor Engagement through Social Media
Building Donor Engagement through Social MediaBuilding Donor Engagement through Social Media
Building Donor Engagement through Social Media
 
Securing and Safeguarding Your Library Setup
Securing and Safeguarding Your Library SetupSecuring and Safeguarding Your Library Setup
Securing and Safeguarding Your Library Setup
 
PROTECTION PERSONAL PRIVACY
PROTECTION PERSONAL PRIVACYPROTECTION PERSONAL PRIVACY
PROTECTION PERSONAL PRIVACY
 
Protecting Personal Privacy
Protecting Personal PrivacyProtecting Personal Privacy
Protecting Personal Privacy
 
Personal Internet Security Practice
Personal Internet Security PracticePersonal Internet Security Practice
Personal Internet Security Practice
 
Online Self Defense
Online Self DefenseOnline Self Defense
Online Self Defense
 
Security and Privacy Brown Bag
Security and Privacy Brown BagSecurity and Privacy Brown Bag
Security and Privacy Brown Bag
 
Social media and the internet evolution
Social media and the internet evolutionSocial media and the internet evolution
Social media and the internet evolution
 
How Real Estate Businesses use Twitter
How Real Estate Businesses use TwitterHow Real Estate Businesses use Twitter
How Real Estate Businesses use Twitter
 
twitter hacking causes and protection
twitter hacking causes and protectiontwitter hacking causes and protection
twitter hacking causes and protection
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 

Último

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 

Último (20)

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 

Safety social media for positive social change

  • 1. Safe Social Media for Positive Social Change
  • 2. Contents • Introduction: Did you know? • What do you give when you register? • What do I need to know to stay safe on Facebook? • Twitter: Keeping Your Account Secure • Blogging: Introduce other NOT BlogSpot or Wordpress and Online Petition: Change.org • Tips for Geeks
  • 3. Introduction: Did you know? • Internet usage has risen around 1,500% bwt 2007 – end of 2011. • By December 2011 the country had 755,000 Internet users = 5% • Licensed 37 ISPs (a license costs $25,000) • Most Cambodian have access to a mobile phone (93%), and around half own a phone. • Draft of Internet Law (Cyber law) • No research of Cambodia online internet users behavior • Password with 20 digits can be cracked only 24hs
  • 4. What do you give when you register? • Your full names • Addresses • DOB • Location • Occupation • Marriage Statue • Age • Credit card number • Gender • School/University
  • 5. What do I need to know to stay safe on Facebook? • Privacy Setting • Intellectual Property • Statement of Rights and Responsibilities • Reporting a Violation
  • 6. What do I need to know to stay safe on Facebook? • Never share your password. • Think before you post. Each comment and photo builds your online presence. • Adjust your privacy settings and review them often. • Accept friend requests only from people you know personally. • Report content and timelines that look suspicious.
  • 7. Twitter: Keeping Your Account Secure • Safe Tweeting: The Basics We want Twitter to be a safe and open community. This help page provides some information and tips to help you practice safe Tweeting and keep your account secure. Here are some basics: a. Use a strong password. b. Watch out for suspicious links, and always make sure you’re on Twitter.com before you enter your login information. c. Use HTTPS for improved security. d. Don't give your username and password out to untrusted third-parties, especially those promising to get you followers or make you money. e. Make sure your computer and operating system is up-to- date with the most recent patches, upgrades, and anti- virus software. • Use a Strong and Unique Password • Use HTTPS for Improved Security
  • 8. Blogging and Online Campaign • Favorite Blog in Cambodia: Wordpress; Blogspot • Introduce to http://storify.com/ • Posterous.com • Change.org • Visit: – http://freethe15.wordpress.com – http://sahrika.wordpress.com
  • 9. Tips for Geeks • See who are using your Gmail • iPhone and iPad app (Your own morning newspaper) • HideMyAssDotCom (Open restricted website) • Using http and https • PiPl.com (See your post online) • Live Stream Tweet on your blog
  • 10. STAY SAFE. BUT DON’T BE AFRAID! Thank You!