SlideShare una empresa de Scribd logo
1 de 14
( Photo by mikael altemark: http://www.flickr.com/photos/altemark/39593706/   Rights: CC BY 2.0)
via CNN.com:  http://www.cnn.com/2009/LIVING/worklife/10/12/cb.digital.trail.job.search
via The Charlotte Observer:  http://www.charlotteobserver.com/2010/05/17/1440447/facebook-post-costs-waitress-her.html
Your friends are *not* the only people who are on Facebook (/MySpace/Twitter/the internet.) Chances are, so are your co-workers, your parents and even your prospective bosses. via Valleywag:  http://gawker.com/tech/your-privacy-is-an-illusion/bank-intern-busted-by-facebook-321802.php
via MTV.com:  http://www.mtv.com/news/articles/1558467/20070501/id_0.jhtml
via I’m Not Actually a Geek:  http://bhc3.wordpress.com/2009/03/17/how-to-tweet-your-way-out-of-a-job/ The internet is forever:  screenshots, Google cache and the Internet Archive, oh my!
via PopCrunch:  http://www.popcrunch.com/miley-cyrus-shower-wet-t-shirt-picture-hacked/ Pictures on your phone are not necessarily private (just ask Miley Cyrus or Paris Hilton.) And just because you ask someone to keep a pic you sent them to themselves, doesn’t mean they will…
via Mashable:  http://mashable.com/2009/06/01/twitter-related-burglary/
Get to know your privacy settings and options. ,[object Object],[object Object],[object Object]
via Wired:  http://www.wired.com/threatlevel/2008/09/palin-e-mail-ha/ Don’t make it easy for hackers, learn to create strong passwords:  http://www.microsoft.com/protect/fraud
Avoid scams that hurt your finances  and  your reputation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],via LifeHacker:  http://lifehacker.com/5420356/the-complete-guide-to-avoiding-online-scams-for-your-less-savvy-friends-and-relatives
Don’t believe everything you read on the internet. Please?! ,[object Object],[object Object],[object Object],[object Object]
Search yourself. ,[object Object],[object Object],[object Object],[object Object]
You can find this presentation online @: www.slideshare.net/val_forrestal All the links mentioned in this presentation can be found @: delicio.us/vforrestal/InternetLiteracy For more information, contact: Valerie Forrestal (valerie . forrestal @ stevens . edu)

Más contenido relacionado

Más de Valerie Forrestal

Discovery bookmarklet - Metro Science Librarians SIG
Discovery bookmarklet - Metro Science Librarians SIGDiscovery bookmarklet - Metro Science Librarians SIG
Discovery bookmarklet - Metro Science Librarians SIGValerie Forrestal
 
The Future of Digital Libraries
The Future of Digital LibrariesThe Future of Digital Libraries
The Future of Digital LibrariesValerie Forrestal
 
Bridging the Gap from Wikipedia to Scholarly Resources
Bridging the Gap from Wikipedia to Scholarly ResourcesBridging the Gap from Wikipedia to Scholarly Resources
Bridging the Gap from Wikipedia to Scholarly ResourcesValerie Forrestal
 
Bridging the gap from Wikipedia to scholarly resources: a simple JavaScript s...
Bridging the gap from Wikipedia to scholarly resources: a simple JavaScript s...Bridging the gap from Wikipedia to scholarly resources: a simple JavaScript s...
Bridging the gap from Wikipedia to scholarly resources: a simple JavaScript s...Valerie Forrestal
 
Twitter for Libraries - Handheld Librarian Redux @ Yale, 12-09
Twitter for Libraries - Handheld Librarian Redux @ Yale, 12-09Twitter for Libraries - Handheld Librarian Redux @ Yale, 12-09
Twitter for Libraries - Handheld Librarian Redux @ Yale, 12-09Valerie Forrestal
 
Citation Searching Presentation
Citation Searching PresentationCitation Searching Presentation
Citation Searching PresentationValerie Forrestal
 

Más de Valerie Forrestal (7)

Discovery bookmarklet - Metro Science Librarians SIG
Discovery bookmarklet - Metro Science Librarians SIGDiscovery bookmarklet - Metro Science Librarians SIG
Discovery bookmarklet - Metro Science Librarians SIG
 
The Future of Digital Libraries
The Future of Digital LibrariesThe Future of Digital Libraries
The Future of Digital Libraries
 
Bridging the Gap from Wikipedia to Scholarly Resources
Bridging the Gap from Wikipedia to Scholarly ResourcesBridging the Gap from Wikipedia to Scholarly Resources
Bridging the Gap from Wikipedia to Scholarly Resources
 
Bridging the gap from Wikipedia to scholarly resources: a simple JavaScript s...
Bridging the gap from Wikipedia to scholarly resources: a simple JavaScript s...Bridging the gap from Wikipedia to scholarly resources: a simple JavaScript s...
Bridging the gap from Wikipedia to scholarly resources: a simple JavaScript s...
 
Twitter for Libraries - Handheld Librarian Redux @ Yale, 12-09
Twitter for Libraries - Handheld Librarian Redux @ Yale, 12-09Twitter for Libraries - Handheld Librarian Redux @ Yale, 12-09
Twitter for Libraries - Handheld Librarian Redux @ Yale, 12-09
 
Citation Searching Presentation
Citation Searching PresentationCitation Searching Presentation
Citation Searching Presentation
 
Website Redesign
Website RedesignWebsite Redesign
Website Redesign
 

Último

Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptxFIDO Alliance
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxFIDO Alliance
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FIDO Alliance
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024Stephen Perrenod
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfFIDO Alliance
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimaginedpanagenda
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxFIDO Alliance
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...FIDO Alliance
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfFIDO Alliance
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...ScyllaDB
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfFIDO Alliance
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentationyogeshlabana357357
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...FIDO Alliance
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingScyllaDB
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGDSC PJATK
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessUXDXConf
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch TuesdayIvanti
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxFIDO Alliance
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftshyamraj55
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe中 央社
 

Último (20)

Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 

Digital Literacy

  • 1. ( Photo by mikael altemark: http://www.flickr.com/photos/altemark/39593706/ Rights: CC BY 2.0)
  • 2. via CNN.com: http://www.cnn.com/2009/LIVING/worklife/10/12/cb.digital.trail.job.search
  • 3. via The Charlotte Observer: http://www.charlotteobserver.com/2010/05/17/1440447/facebook-post-costs-waitress-her.html
  • 4. Your friends are *not* the only people who are on Facebook (/MySpace/Twitter/the internet.) Chances are, so are your co-workers, your parents and even your prospective bosses. via Valleywag: http://gawker.com/tech/your-privacy-is-an-illusion/bank-intern-busted-by-facebook-321802.php
  • 5. via MTV.com: http://www.mtv.com/news/articles/1558467/20070501/id_0.jhtml
  • 6. via I’m Not Actually a Geek: http://bhc3.wordpress.com/2009/03/17/how-to-tweet-your-way-out-of-a-job/ The internet is forever: screenshots, Google cache and the Internet Archive, oh my!
  • 7. via PopCrunch: http://www.popcrunch.com/miley-cyrus-shower-wet-t-shirt-picture-hacked/ Pictures on your phone are not necessarily private (just ask Miley Cyrus or Paris Hilton.) And just because you ask someone to keep a pic you sent them to themselves, doesn’t mean they will…
  • 8. via Mashable: http://mashable.com/2009/06/01/twitter-related-burglary/
  • 9.
  • 10. via Wired: http://www.wired.com/threatlevel/2008/09/palin-e-mail-ha/ Don’t make it easy for hackers, learn to create strong passwords: http://www.microsoft.com/protect/fraud
  • 11.
  • 12.
  • 13.
  • 14. You can find this presentation online @: www.slideshare.net/val_forrestal All the links mentioned in this presentation can be found @: delicio.us/vforrestal/InternetLiteracy For more information, contact: Valerie Forrestal (valerie . forrestal @ stevens . edu)