The Digital Age

49
The Digital Age Social Networking, Social Bookmarking, Validating Websites...

description

The Digital Age. Social Networking, Social Bookmarking, Validating Websites. Presentation Content. Social Networking Twitter Blogs Skype Facebook, MySpace, Bebo, LinkedIn… Social Bookmarking Delicious.com Validating Websites www.archive.com www.easywhois.com Internet Safety - PowerPoint PPT Presentation

Transcript of The Digital Age

Page 1: The Digital Age

The Digital AgeSocial Networking, Social Bookmarking, Validating Websites...

Page 2: The Digital Age

Presentation Content• Social Networking

– Twitter– Blogs– Skype– Facebook, MySpace, Bebo, Linke

dIn…• Social Bookmarking

– Delicious.com• Validating Websites

– www.archive.com– www.easywhois.com

• Internet Safety– Cyberbullying

Page 4: The Digital Age

Social Networking Facts

• In 2010, Gen Y will outnumber Baby Boomers– 96% of Gen Y are members of social

networks• Social Networking is now the #1

activity on the Web.• One out of eight couples married in the

U.S. last year met via social media• If Facebook were a country, it would be

the 4th largest between the U.S. and Indonesia.

• About 80% of companies use LinkedIn as a primary tool to find future employees.

Page 5: The Digital Age

Social Networking Facts

• The fastest growing segment on Facebook is women between the ages 55 and 65.

• Both Gen Y and Gen Z consider e-mail passé.

• The 2nd largest search engine in the world is YouTube.

• There are more than 200 billion blogs and more than half of bloggers post content or tweet daily.

• More than 3.5 million pieces of content (including Web links, new stories, blog posts, notes, and photos) are shared on Facebook every day.

Page 6: The Digital Age

Facts About Twitter• Helps people communicate and stay

connected through the exchange of quick, frequent messages.

• Choose whose messages you want to receive and how you want to receive them.

• Search all Twitter updates to see what people are talking about.

• The biggest Twitter users are adults. • Anyone can Twitter -- there's no age

restriction --- and, those who do, have to set up a personal profile.– Profile can be public or private.

• Twitter was founded in San Francisco, CA in 2006.

Page 7: The Digital Age

Facts About TwitterOnly have 140 characters to say something -- and you have to say it to someone who has already asked to “follow” you (this isn’t as creepy as it sounds!)

– Following someone on Twitter means getting their updates in your personal timeline.

– When you post an update to your Twitter account, your followers will get it on their home page and/or phone.

– You don't have to follow everyone who follows you, and unless an account is private, you can follow and un-follow whoever you want without them following back.

– Mutual followers can send each other private messages

– Protecting you profile-- which means that everyone who wants to follow you must submit a request for your approval

– To Stop Following - Click the "following" button to expose the drop-down box, and click "remove." Twitter doesn't notify you when someone has stopped following you.

Page 8: The Digital Age

Facts About Twitter

• When all else fails, you can block someone. Look for the block link at the bottom of the profile page under the friends icons

• www.twitter.com

Page 9: The Digital Age

Remember…

If you don’t want

the WORLD to see it,

you better not post it or send

it!

Page 10: The Digital Age

Blogging

• A blog (a contraction of the term "web log“) is a type of website, usually maintained by an individual with regular entries of commentary, descriptions of events, or other material such as graphics or video.

• Many blogs provide commentary or news on a particular subject; others function as more personal online diaries.

• The ability of readers to leave comments in an interactive format is an important part of many blogs.

• Blog usage spread during 1999 and continues to grow.

Page 11: The Digital Age

Types of Blogs

• Personal Blogs– Ongoing Diary– Commentary

• Corporate & Organizational Blogs– Enhance Communication– Marketing– Public Relations

• By Genre– Political– Travel– Fashion– Education

Page 12: The Digital Age

Types of Blogs

• By Media Type– Video (vlog)– Links (linklog)– Sketches (sketchblog)– Photo (photoblog)– Mix and match (tumblelog)

• By Device– Mobile (moblog)– Computer (blog)

Page 13: The Digital Age

Legal/Social Consequences

• Defamation or Liability• Employment• Political Dangers• Personal Safety

Page 14: The Digital Age

Blogging Sites

• Blog.com• Blogger.com• Blogr.com• Blogster.com• Netcipia.com• Open Diary.com• Squarespace.com• Tumblr.com• Xanga.com• Zoomshare.com• And the list goes on and on…

Page 15: The Digital Age

Remember…

If you don’t want

the WORLD to see it,

you better not post it or send

it!

Page 16: The Digital Age

Skype• Initial release was August 2003.• What is Skype?

– Skype is a software application that allows users to make voice/video calls over the Internet.

• Calls to other users within the Skype service are free, while calls to both traditional phones and mobile phones can be made for a fee.

• Skype has also become popular for their additional features which include instant messaging, file transfer, and video conferencing.

Page 17: The Digital Age

Is Skype Secure?

"We provide a safe communication option. I will not tell you whether we can listen or not.“

– Kurt Sauer, Chief Security Officer Skype

(Things that make you go hmmm?)

Page 18: The Digital Age

Skype

You will need headphones with

microphone for the best quality. (Webcams, if planning on using video.)

www.skype.com

Page 19: The Digital Age

Remember…

If you don’t want

the WORLD to see it,

you better not post it or send

it!

Page 20: The Digital Age

Facebook, MySpace, Bebo, LinkedIn…• Sites like Facebook and MySpace have

privacy controls • Some sites require kids to be older

than 13 to have a profile, but younger kids set up accounts anyway

• Social networks keep kids connected to friends, provide a space for self-expression

• There are no guarantees of privacy (even with settings) since anything can be cut, pasted, and sent

• Inappropriate pictures, posts, or messages can result in damage to kids' reputations

• Kids can "tag" (or identify) their friends which can violate their privacy

Page 21: The Digital Age

Facebook, MySpace, Bebo, LinkedIn…

• They range from Club Penguin and Webkinz (for young kids) to MySpace and Facebook

• Social networks are major communication hubs providing ways for kids to use instant messaging, “friend” one another, and write on walls to share public and private thoughts and comments. 

• Unless your child uses privacy controls, everything he says about himself in pictures or words will be available for all the world to see

• People do see these pages – strangers, college admissions officers, even potential employers.

Page 22: The Digital Age

Facebook, MySpace, Bebo, LinkedIn…

• Remind them that everything can be seen by a vast, invisible audience (otherwise known as friends of friends of friends).

• Make sure they set their privacy settings. They aren’t foolproof, but they’re important.

• Posts with drug taking, drinking, sexual posing or activity will come back to haunt them.

• Kindness counts. Lots of sites have anonymous applications like "bathroom wall" or "honesty boxes" that allow users to tell their friends what they think of them. Rule of thumb: If your child wouldn't say it to someone's face, they shouldn't post it. 

Page 23: The Digital Age

Facebook, MySpace, Bebo, LinkedIn…

• Anyone can see what’s on your pages—even if you think no one will. Potential employers and college admissions people can easily surface these sites.

• Anything you create or communicate can be cut, altered, pasted, and sent around. Once you put something on your page, it’s out of your control and can be taken out of context and used to hurt you or someone else. 

• Online stuff can last forever. If you wouldn't put something on the hallway in school, you shouldn’t post it on your pages.

Page 24: The Digital Age

Facebook, MySpace, Bebo, LinkedIn…

• Remember the golden rule: If you wouldn’t want someone saying it you, you shouldn’t say it to anyone else.

• If you meet someone, it better be in a public place, preferably with a friend. We would all like to think that kids wouldn’t meet strangers – but sometimes they do--THIS IS NOT A SAFE OR SMART IDEA!

• Watch the clock--Social network sites can be real time suckers. Hours and hours can go by – Balance your life!

Page 25: The Digital Age

Remember…

If you don’t want

the WORLD to see it,

you better not post it or send

it!

Page 26: The Digital Age

SOCIAL BOOKMARKING

Page 27: The Digital Age

What is social bookmarking?• Social bookmarking is a

method for Internet users to share, organize, search, and manage bookmarks of web resources.

• Unlike file sharing, the resources themselves aren't shared, merely bookmarks that reference them.

Page 28: The Digital Age

Social Bookmarking

• Users save links to web pages that they want to remember and/or share.

• These bookmarks are usually public, and can be saved privately, shared only with specified people or groups, shared only inside certain networks, or another combination of public and private domains.

• The allowed people can usually view these bookmarks chronologically, by category or tags, or via a search engine.

• Many social bookmarking services provide web feeds that allow subscribers to become aware of new bookmarks as they are saved, shared, and tagged by other users.

Page 29: The Digital Age

Social Bookmarking

• They have added extra features such as – ratings and comments on bookmarks– the ability to import and export

bookmarks from browsers– emailing of bookmarks– Web annotation– groups or other social network features

• The concept of shared online bookmarks dates back to April 1996 with the launch of itList, the features of which included public and private bookmarks.

Page 30: The Digital Age

Social Bookmarking Sites

• AddThis• BookmarkSync• Delicious• Digg• Diigo• Faves• My Web• Mixx• Reddit• ShareThis• SiteBar• TechNet• Twine• Yattle

Page 31: The Digital Age

Social Bookmarking

• delicious.com

Page 32: The Digital Age

VALIDATING WEBSITES

Page 33: The Digital Age

Top Level Domains

• Currently 20 and more are added regularly

• Examples– .com (Commercial/Business)– .edu (Education)– .gov (Government)– .org (Nonprofit Organizations)– .mil (Military)– .net (Expansion of Business)

Page 34: The Digital Age

Country Domains

• Currently 248 host country domains

• Most Prevalent Country Domains– .au (Australia)– .hk (Hong Kong)– .jp (Japan)– .uk (United Kingdom)– .us (United States)

Page 35: The Digital Age

Risks of Dangerous Domains

• Viruses that disable your computer or use your computer’s resources maliciously.

• Spyware that captures you personal information for identity theft purposes.

• Adware that inappropriately delivers ads to your computer

• E-mail address capture that leads to significant increases in spam

• Exposure to vulgar websites

Page 36: The Digital Age

Watch What You Type

“Typosquatting has emerged as a significant threat to Internet users. Malicious websites are developed with addresses that are very common to real websites. The malicious site addresses are based on common typing errors like .cm instead of .com. The .cm domain has recently been identified as the riskiest domain in the world because of this practice.”

-Website Compass, Spring 2010

Page 37: The Digital Age

Watch What You Type• Other examples of typosquatting:

– Plural words• Possible Authentic site – creditcard.com• Possible Malicious site – creditcards.com

– Common misspellings• Possible Authentic site – Firstbank.net• Possible Malicious site - 1stbank.net

• To Protect Against Typosquatting– Double-check addresses for errors– Verify addresses– Use bookmarks for regularly visited

sites, instead of typing

Page 38: The Digital Age

Riskiest Domains to Visit• cm

– Cameroon, Africa – 36.7% with this domain and are found to conduct risky activity

• .com– Commercial domain – 32.2% with

this domain were found with malicious intent

• .cn– People’s Republic of China—

23.4% of the sites with this domain are unsafe

Page 39: The Digital Age

Riskiest Domains to Visit• .ws

– Samoa – 17.8% of this domain identified as risky sites

• .info– Information domain – 15.8%

were identified as risky • .ph

– Republic of the Philippines – 13.1% with this domain are unsafe

Page 40: The Digital Age

Top Five Safest Domains

• The following are the safest domains with malicious site percentages of less than .001%:– .gov – Government– .jp – Japan– .edu – Education– .ie – Ireland– .hr - Croatia

Page 41: The Digital Age

What Can You Do?

• Use protection tools in Web browsers

• Use Internet Security software (Norton, McAfee, etc)

• Use common sense– Don’t download files from

unfamiliar sites– Don’t leave information at

unfamiliar sites

Page 42: The Digital Age

What Can You Do?

• Use sites like the following to verify and see the history of the site

– www.easywhois.com

– www.archive.org

Page 43: The Digital Age

INTERNET SAFETY

Page 44: The Digital Age

Facts About Cyberbullying

• The facts: 43% of teens have been victims

• Cyberbullying begins as early as the 2nd grade for some children

• 53% of teens admit sending a hurtful message

• Most victims know the person bothering them

• Only 10% of bullying victims tell their parents

Page 45: The Digital Age

• Repeatedly sending hurtful text messages and images, or posting cruel comments on the Internet.

• Spread widely through instant messaging (IM) or phone texting, and by posts on social networking sites.

• It can happen anytime -- at school or home --and can involve large groups of kids.

• Being “anonymous” and the desire to be seen as “cool” can cause a kid who normally wouldn’t say anything mean face-to-face to show off for other kids.

Facts About Cyberbullying

Page 46: The Digital Age

What Can YOU Do!

• If you wouldn’t say something to someone’s face, you shouldn’t text it, IM it, or post it.

• Do you know someone who has been cyberbullied? Think about how it affects them.

• Shouldn’t respond or retaliate• Should block bullies immediately• Should tell an adult they trust • Do not delete the messages because in

persistent cases, the content should be reported to a cell or Internet Service Provider.

Page 47: The Digital Age

What Can YOU Do!

• Think before you reveal.• Anything you post can be misused by

someone else.• Remember you aren’t too old to ask for

help.• Going to a trusted adult isn’t

baby-ish, it’s safe! • Remind them that all private

information can be made public. – Posts on friends’ walls, private IMs, intimate

photos, little in-jokes can all be cut, pasted, and sent around.

Page 48: The Digital Age

What Can YOU Do!

If you don’t want

the WORLD to see it,

you better not post it or send

it!

Page 49: The Digital Age

Thanks to….

• Common Sense Media– www.commonsensemedia.org

• Wikipedia– www.wikipedia.org

• Website Compass Magazine– Spring 2010– Avoiding Dangerous Domains