Internet Safety

31
Social Networks, Digital Breadcrumbs & Privacy [email protected] Geektoid Mangala www.linkedin.com/in/sureshsood twitter.com/soody www.facebook.com/sureshsood ssood www.bravenewtalent.com/talent/suresh_sood Hero5! scuzzy55 sood y GreatMystery14

description

Cybersafety talk given to parents at William Clark College:How can I be sure my child will be safe when using the Internet?What are the new social networking sites?How can I learn more about protecting my child? Internet Safety - Parent A wareness EveningCome to an interactive workshop where these issues will be addressed to help you learn how to best protect your children when using the Internet. The evening will include a 30 minute demonstration session followed by Q&A. All are welcome to attend free of charge; tea/coffee will be available.Facilitator: Suresh Sood (Researcher with the School of Marketing in the Faculty of Business, University of Technology Sydney)Monday 22" , March 2010, 7 pm William Clarke College, Library Conference RoomEnquiries: Liz Nix Ph 8882 2100 (extension 182) [email protected] highly recommend this workshop to all College parents and encourage you to attend and invite others who may be interested: David Raphael

Transcript of Internet Safety

Page 1: Internet Safety

Social Networks, Digital Breadcrumbs & Privacy

[email protected]

Geektoid Mangala

www.linkedin.com/in/sureshsood

twitter.com/soody

www.facebook.com/sureshsood

ssood

www.bravenewtalent.com/talent/suresh_sood

Hero5!

scuzzy55

soody

GreatMystery14

Page 2: Internet Safety
Page 3: Internet Safety
Page 4: Internet Safety

Agenda

0. Inappropriate Content and Contact 1. Online Social Networks 101, “FaceBook to Dogster” 2. TV 3.0 - The Future of Social Networks3. How should I organise my security settings?4. Where does Twitter Fit?5. Digital Breadcrumbs6. Steps to Avoid Social Engineering Attacks 7. The Australian Government Resources for Safety on the Internet8. Parents – What Should We Do?

Page 5: Internet Safety

5

Inappropriate Content

Page 6: Internet Safety

6

Linguistic Inquiry & Word Count : “junk words” in content http://www.liwc.net/liwcresearch07.php

Cognitive complexity = zexcl + ztentat + znegate + zdiscrep zinclDepression = zI + zphyscal + znegemo – zposemoLiar = – zself – zother – zexcl + znegemo or Honesty = zself + zother + zexcl - znegemo - zmotionFemale = zself – zsixltr +z other + znegate – zarticle – zpreps + zcertain + zsocial + zpresent – zspace – zoccup + zhome – zmoneyAging = zposemo – zI + zsixltr + zcogmech + zexcl + zfuture – zpast – ztimePresidential = zsixltr – zwps – zunique – zpronoun – zself – zyou – zother – znegate + zarticle + zprep

Slatcher, R.B., Chung, C.K., Pennebaker, J.W., & Stone, L.D. (2007), Winning words: Individual differences in linguistic style among U.S. presidential and vice presidential candidates, Journal of Research in Personality, 41, 63-75.

Page 7: Internet Safety

95

5

0.1

99.8

0.2

0.003

99

1

0

Lurking A Fact of Life Online

Page 8: Internet Safety

http://namechk.com/

Page 9: Internet Safety

Social Media

• Blog

– reflect, read, write and comment e.g. WordPress, LiveJournal,

• Microblogging

– brief notes, messages, comments e.g. Twitter, Tumblr

• Social Network– connect, communicate, and sharee.g. Facebook, Ning, MySpace, etc

• Generate content – upload content to share with others, comment or tag or reuse the

content e.g. YouTube, Vimeo, Flickr, Slideshare

Page 10: Internet Safety

Social Networking Sites

• Parse through friends activities forwards & reverse as well as own social gestures

• Allow users to:

– Create personal profiles inclusive of location information – Write status updates (postings to friends) c.f. blog entries– Friends specify updates they like – Post photographs, videos, and audio clips– Send and receive private messages – Link to the pages of friends

Page 11: Internet Safety

Share with friends.Boxee makes it easy for friends to share their favorite movies, TV Shows, and songs with each other, on Boxee or on social networks like Facebook and Twitter.

Livestation

All your channels in one placeSurf and email while you watchInstant, live chat with others watching LivestationDesktop alerts bring you breaking news and Livestation updates

TV 3.0

Page 12: Internet Safety

World Map of Social Networkswww.incos.it

Page 13: Internet Safety

Facebook is My Newspaper(Susie Wilkening, http://reachadvisors.typepad.com/

OneRiot.com: Search the realtime web

Page 14: Internet Safety
Page 15: Internet Safety

16 million people in the UK accessed Internet via mobile phones in December 2009. Total of 6.7 billion pages and 4.8 billion minutes online during the month. Top 10 sites accounted for 70 per cent of both total pages viewed and total time spent online

Page 16: Internet Safety

Australia Leads Average Time Spent per Person on Social Media Sites in December 2009

Page 17: Internet Safety

Facebook• Founded in 2004, primarily catering to students

• Over 400M active members worldwide with 2011 predictions for 1 billion users (Gartner)

• Facebook has communities,users,applications & albums

• Over 10 Billion photos in Oct 2008 and adds over 3Billion monthly

• Australian 8.1 M users in October2009 had uploaded 80 million pictures and written 32 million "wall posts" and 45 million "status updates". (Nielsen Online)

• Australians are spending 29% of all time browsing the internet on Facebook alone (Nielsen)

• Applications run on Facebook platform

• True names encouraged but not guaranteed

• Privacy model is highly granular

– present different information to different groups or individual users

• Messaging includes mail, real-time chat, "wall"

• Now used in private background checks

Page 18: Internet Safety
Page 19: Internet Safety
Page 20: Internet Safety

20

Inappropriate Contact with Strangers and Bullies

Public info: Name, Profile Picture, Current City, Gender, Networks,Friend List and Pages.

Page 21: Internet Safety

Facebook Tips - Privacy

• Friends Lists

• Facebook Search & Google

• Photo Tag Mishaps

• Relationship Changes

• Contact Info

• Wall Postings

Page 22: Internet Safety
Page 23: Internet Safety

TWITTER

• Market leader in "micro-blogging" • Began in mid-2006 as "status message" service• Ubiquity and ease of updating, but limited space • Breaking news, real-time updates: USAir, Iran • Most multimedia handled by 3d party links • Simplified privacy model: updates public or private • Most Twitter content is public • Private messages kept until user deletes them• Direct messages are private; sender can delete • Short URLs used to serve malicious links and code

Page 24: Internet Safety
Page 25: Internet Safety
Page 26: Internet Safety

Digital Breadcrumbs

Page 27: Internet Safety

Social Engineering Attacks

• Malicious software (malware) is installed into a computer fixed or mobile − to collect personal information over time.

• Computers or mobile devices are hacked for personal data.

• Phishing – criminals use deceptive e-mails to get users to divulge personal information, includes luring them to fake bank and credit-cards

websites.

“Pharming”: using deceptive e-mail messages to redirect users from an authentic website to a fraudulent one, which replicates the original in appearance.

– “SMiShing”: sending text messages (“SMS”) to cell phone users that trick them into going to a website operated by the thieves. Messages typically say that unless users go to the website and cancel, they will be charged for services they never actually ordered.

– “Spear-phishing”: impersonating a company employee/employer via e- mail in order to steal colleagues’ passwords/usernames and gain access the company’s computer system. ID thieves misuse victims’ personal info.

Page 28: Internet Safety
Page 29: Internet Safety
Page 30: Internet Safety

What to Do – Elements of Strategy

Page 31: Internet Safety

Caution!

“Children never put off till tomorrow what will keep them from going to bed tonight”

(Anonymous)