SOCIAL RESPONSIBILITY

Slides:



Advertisements
Similar presentations
So much alike! What is Personal Branding? 1. Make a clear, specific, and consistent image of yourself on the internet that reflects who YOU are. 2. Make.
Advertisements

NHnetWORKS December 14,  Facebook is a global Social Networking website that is operated and privately owned by Facebook, Inc.  Users can add.
Social Media Intro to Business & Marketing. The most three most trusted forms of advertising are: Recommendations from people I know - 90% Consumer opinions.
The popularity of the social networks. The most popular social networks.
Web 2.0: Concepts and Applications 5 Connecting People.
Web 2.0: Concepts and Applications 5 Connecting People.
Social Media Networking Sites Charlotte Jenkins Designing the Social Web
How To Protect Your Privacy and Avoid Identity Theft Online.
GETTING BUTTS INTO THE SEATS. SOCIAL MEDIA FACTS As of tomorrow Facebook will be 10 years old and has an estimated 1.3 BILLION users Facebook StatisticsData.
GROUP 3: APRIL, DELICIA, LISA, SHEILAH.  Your child spends large amounts of time on-line, especially at night.  You find pornography on your child's.
MANAGING YOUR ONLINE PROFILE WHAT DOES THIS MEAN AND WHY SHOULD YOU CARE? Sarah Morris UT Libraries.
+ The Future of Social Media By Abigail Boghurst.
How To Manage Your Social Media Presence in Just 10 Minutes A Day! And be more popular than the local news guy!
JMU GenCyber Boot Camp Summer, Cyberspace Risks and Defenses Facebook Snapchat P2P filesharing Apps Craigslist Scams JMU GenCyber Boot Camp© 2015.
Online Social Networking. Agenda Survey Results What is Online Social Networking? Popular Online Social Networking Sites Privacy Settings for Facebook.
Social Media & The Chaplain. Social Media Social Media Is Consumer generated media it is media that is designed to be shared, sharing means that it is.
Welcome to E.L. Wright iPad Safety Night I. Using Technology and Protecting Your Child E.L. Wright Technology Department and Richland County Sheriff's.
Suggested grade levels 7-12 Students will explore strategies that promote personal safety when using the texting-based social network, Twitter.
Controlling Your Social Networking Privacy Settings Stay safe online!
Unit 2 Lesson 2.05 Social Networking Ethics & Responsibility.
Social Media 101 An Overview of Social Media Basics.
DIGITAL FOOTPRINT Everything you do is online. How you can protect yourself and your info.
FaceBook…. Really?? FaceBook…. Really?? Social networking & Facebook Pam Krambeck, ESU#3
Protecting Yourself on Social Media – Friend Requests And Messages.
Four or More: The New Demographic Mary Madden Pew Internet & American Life Project LITA President’s Program ALA – June 27, 2010 (and a bunch of other really.
Cyberbullying What does it mean? What can we do?.
“How do I keep my child safe online?” Miss Johnstone Computing Co-ordinator “Parents / Carers are the one important factor in the home environment to keep.
Aristotle, a great thinker, once said: “We are what we repeatedly do.”
Technology Tips and Safety for Teens. Social Networks Social Networks are internet applications which are used to facilitate communication between users.
E-Safety Parent Talk Helping to keep your children safe online.
Victor PTSA Fall Forum Don’t Lose Touch With Your Teen Tuesday, October 22, 2013 – 7PM Social media is now an integral part of our every day lives. For.
This presentation deals with any kind of information you put online. It relates to e- mails, texts, social networking and the sharing of pictures and.
Get Secure! Facebook Privacy Tutorial Becky Benishek | November 2013.
Objectives  Encourage education through a new format of utilizing social media within a primary care residency program.  Lead discussions through multiple.
Digital Footprints By Erik Borge September 29, 2015.
Judith Davis – Community Safety Officer Northumberland County Council.
Welcome.
How to stay safe using the internet & App’s
Creating your online identity
How to stay safe using the internet and app’s?
Social Media Security: Understanding how to keep yourself safe.
How to use the internet safely and How to protect my personal data?
Social Media & You Let’s take a look at your social media use.
How to use the internet safely and How to protect my personal data?
Discussion – what kind of bullying is taking place in the images
Social Media from our point of view!
10 Tips on Internet Safety
Social Media.
Social Media Basics for Parents
SOCIAL MEDIA MARKETING
Overview Social media applications inform, educate, and entertain people through online (multi-)media A social networking application allows users to create.
My Digital Footprint BY:CHRISTINA SATO.
What is Twitter? An online social networking service that enables it users to send and read text-based characters, informally known as “tweets.” Created.
E-safety and what you need to know!
CYBER- BULLYING.
Social Media Safety Freshman Seminar.
Anti bullying Week VMG What does bullying mean to you?
Social Interactions In The Digital Age:
SOCIAL MEDIA: ARE YOU PLAYING IT SAFE?.
How to Protect your Privacy on Facebook Facebook Privacy.
Your Online Identity 2018 College Night Jamie McConnell
SOCIAL RESPONSIBILITY:
Online Safety! Created by Educational Technology Network
INTERNET SAFETY.
My Name is Chrysta Let’s look at the difference in social media throughout my life and beyond.
Internet Safety – Social Media
Advertising, Branding, and social media
Social Media Safety.
Online Safety; Privacy and Sharing
Online Safety; Privacy and Sharing
Presentation transcript:

SOCIAL RESPONSIBILITY MODULE 3 SUMAN MUDUNURI http://content.time.com/time/video/player/0,32068,710921182001_2037224,00.html

WHAT IS SOCIAL RESPONSIBILITY Is an ethical framework which suggests an obligation to act for the benefit of society at large. 

RISE IN POPULARITY Percentage of adults using online SNS (Social Networking Sites) 2005 8% 2008 – 2010 40% 2011 65% 2015 67% of Adults 92% of teens Almost a quarter of those 92% were online constantly because of FOMO (Fear of Missing Out). According to PEW Research

SPEED An event that never made the news ten years ago can become a full blown crisis in a matter of hours today

THE GOOD, THE BAD, THE UGLY Humans of New York http://www.humansofnewyork.com/ Change Campaigns Feeding the Hungry TOMS – one for one Protect the Oceans Emergency Response Fighting Cyberbullying Excess of Information Cyberbullying Child Predators Dangerous Challenges Geotagging Company Bashing

TOP 10 MOST DANGEROUS SOCIAL MEDIA CHALLENGES

PRIVACY

PRIVACY Facebook alone has over one billion active monthly users and 13 million of them have never touched their privacy settings, according to research done by Marketo. Pew Research on sharing/posting by teens 2006 to 2013 Posting Photos 79% to 91% School Name 49% to 71% Where they live 71% Email Address 29% to 53% Phone Numbers 2% to 20% According to the latest Pew Internet research (May 2013) on teen online privacy, teens are sharing more personal information on social media today than they were when the first Pew privacy study was done in 2006. Either they do not value privacy or we are failing to educate them, or both.

PRIVACY CATEGORIES Public Friends/Followers-only Locked or Private Accounts Public: Most or all privacy settings are open to public view and are searchable either on Google (depending on the channel) or on Facebook Graph Search. Facebook pages can now be set to public (update since 2013) as well. This enables people who have had private Facebook pages to open them up to anyone (like Twitter) instead of having to approve every “friend” request. Friends/Followers-only: On Facebook and many other channels (not Twitter), this means that you have set your private information to be viewed only by those you approve as friends or followers. Twitter does not have an approval feature for followers other than a private account. Locked or Private Accounts: All privacy settings are shut down, and permission to follow or friend is managed on a case-bycase basis by the user. On Twitter, this means that no one can see your tweets except approved followers, and your tweets cannot be retweeted. However, screenshots are always in the mix

PRIVACY – GUARD IT Know your privacy rights. Create your own private groups and lists. Turn off geolocation settings on apps Get rid of followers you don’t really know. Set your social profiles to non-searchable. Search yourself. Use two-factor authentication when available. CH3 (23-42) Pg.29-32 1. Know your privacy rights. The group encourages people to understand the terms of service on the social media channels they use. Privacy has different meanings on different channels. Some companies will not let you make private certain pieces of information (Facebook is one) because they want to retain the right to sell that information to marketers. Make sure you know what you can and can’t protect before you set up a profile. 2. Create your own private groups and lists. Many social media providers give you a way to set up private groups so that your conversations and sharing cannot be searched or seen by everyone. 3. Turn off geolocation settings on apps. It is especially important for younger students. Predators and bullies can find unsupervised young people easily in public places if they are constantly checking in or using public geo-apps for messaging in public spaces.4. Get rid of followers you don’t really know. Remember that high school friend or media person you friended several years ago? They are still seeing everything you post. Go through and delete old stale (or dangerous) contacts. Many people mistakenly think that this is what blocking is. But blocking only eliminates their content from your feeds. They can still see what you have posted. 5. Set your social profiles to non-searchable. Most sites give you the option to make your data unavailable to search engines. Facebook has its own search engine, and they don’t allow others to scrape their data. It’s all about the money. 6. Search yourself. I recommend that if you have a history of over sharing on social media, it would be a good idea to “Google yourself” to see what’s out there. I recommend getting a copy of Do It Yourself Online Reputation Management by Herbert Tabin and Craig Agranoff to help mediate the bad stuff you find. Most of us cannot afford to hire Reputation.com. If you do need professional help, I would recommend looking at the review sites of online reputation products. Some of them charge a lot of money for what you can do yourself. 7. Use two-factor authentication when available. I recommend using two-factor authentication on Twitter and LinkedIn. Although it takes a little more time to login by getting a text by phone, it strengthens your account against hackers.

ARE YOU ETHICAL? Entertainment Software Identity Music Movies Consumer Data Mining Digital Signature Relationships Dangers http://www.relevantmagazine.com/culture/tec h/8-dangers-social-media-were-not-willing- admit

SOCIAL NETWORKING SITE ETHICS TERMS OF SERVICE (TOS) https://www.scu.edu/ethics/focus-areas/internet-ethics/resources/clicking-through-to-the-ethics-of-social-media/

TWITTER DATABASE MANAGER

IS THIS LIVING?