Course of events.


76 views
Uploaded on:
Category: News / Events
Description
facebook is currently in the word reference as both a thing and a verb ... facebook has expanded the quantity of
Transcripts
Slide 1

Course of events 5:15-5:45 EAT 5:45-6:45 Your Digital Tattoo-Presented by CJ ROWE (Access and Diversity) and TLELL ELVISS (Student Development) 6:45 Announcements, etc.

Slide 2

your advanced tattoo Peer Program Presentation November 7 th , 2007

Slide 3

Before we start… Some admonitions… Your style will be diverse – investigate the substance and discover a way that is your own. Your WHAT and HOW change in light of your crowd. Like each movement, you should decide your targets before you can pick the right substance and technique.

Slide 4

Tonight\'s Objectives To give a chance to consider the idea, an advanced tattoo, the WHAT. To permit time for arranging HOW you would convey this sort of substance. To investigate your own particular predispositions, capacities, and understandings to reinforce your presentation aptitudes. To work on introducing a portion of the thoughts.

Slide 5

Session Overview Digging up your advanced earth What is a computerized tattoo? Web 2.0 Why we ♥ Web 2.0 Why we don\'t ♥ Web 2.0 Being bona fide and being protected Case in point Resources

Slide 6

A volunteer… Who is sure (or maybe only inquisitive) about their own particular advanced soil and would share? Let\'s… .google!

Slide 7

Why this first movement? What was vital about beginning with a movement? What different exercises may you utilize? What are a portion of the dangers required with this? By what method would you be able to "control" those dangers?

Slide 8

Web 2.0 What is Web 2.0? Any suppositions? A short synopsis: http://leap.ubc.ca/get_teched_up/

Slide 9

Web 2.0 Social Networking (ie. Friendster, myspace, Livejournal,facebook) Second Life Wikis(pedia) RSS channels Blogs Podcasts Rate Your Professor

Slide 10

facebook by numbers… In July 2006 facebook had 7.5 million clients. By February 2007, the quantity of enlisted clients surpassed 17 million. It now has more than 40 million dynamic clients – with at least 1-2 million clients online whenever 3% client development every week – 200 000 or more new clients every day sixth most well known website in US, number 1 in Canada, 1% of all web time spent there Growth over a year ago: 18-24 y/o 38%, 12-17 y/o 149%, 25-34 y/o 181%, 35+ 98% facebook is currently in the lexicon – as both a thing and a verb UBC: 30 000 individuals (understudies, personnel, staff, graduated class) + more outside system

Slide 11

facebook in late news… Google has joined forces with facebook to permit non-clients to hunt down profiles not assigned private without being joined. http://chronicle.com/wiredcampus/index.php?id=2387 facebook has expanded the quantity of "utilizations" accessible however clients regularly don\'t understand they have to upgrade their security settings each time they include another application. facebook has additionally reported that they are going to start permitting proficient systems administration through their site. http://money.cnn.com/2007/10/02/magazines/fortune/facelinkedin.fortune/index.htm?postversion=2007100210 Microsoft as of late consented to a $240 million dollar value speculation into advancement of facebook and secured selective rights to outsider publicizing by means of facebook. http://money.cnn.com/2007/10/24/magazines/fortune/fastforward_microsoft_facebook.fortune/index.htm

Slide 12

Why we ♥ Web 2.0 … Gives understudies a venue to meet each other and interface with individuals they may not typically have met. Beat – can let you know what is cool, well known, standard, or not standard. Publicizing occasions for understudies – VERY great reaction rates Creating a gathering for grounds gatherings to communicate and manufacture a feeling of group

Slide 13

Why we don\'t ♥ Web 2.0… Safety TMI: T oo M uch I nformation Cyber-stalking or fraud Dangerous practices embraced Used by people outside the organization to screen or screen understudy conduct The "advanced tattoo" impact: What data would you like to have drifting around about yourself a long time from now… quite a while from now… a long time from now? Sway on employment prospects. What does your site say in regards to you?

Slide 14

Information dump When is it great to give data? At the point when do you require another methodology? By what other method might you be able to investigate Web 2.0 and a portion of the realities connected with it?

Slide 15

Making the case… Often, a standout amongst the most powerful and impactful methods for passing on data is through stories. Taking after are a couple of cases we have used to investigate the advanced tattoo thought through genuine stories. Consider: what stories may you utilize? why may you utilize them? what vital contemplations would you make when sharing them? what will you should be watchful of?

Slide 16

Cases… To remember exactly how individual but extremely open the web can be we ran over these case of situations where data shared on long range interpersonal communication locales or individual sites that had enormous outcomes.

Slide 17

Case in point… At a 2005 Pennsylvania State University versus Ohio State football game, Penn U. understudies raged the field after their triumph, bringing about a mob. Cops examined Facebook and got to an understudy bunch titled "I surged the field after the OSU amusement (and I lived!)" to dissect photographs and recognize around 50 understudies included (Read, 2006). http://youtube.com/watch?v=PtWMl0Bkbuc

Slide 18

Case in point… In China a personal site composed by a 25-year-old who additionally composed a magazine sex section pulled in 10 million every day guests to the Sina.com server. Her website started a "seething level headed discussion" on the web, and the Chinese edits banned her expected book. Despite the fact that she safeguarded her entitlement to expound on her sexual coexistence, the blogger said that she never understood her web journal would be perused so generally or that it would make such discussion. She quit her employment at the magazine and has closed down her online journal. (Yardley, 2003) http://query.nytimes.com/gst/fullpage.html?res=9B0CE7DA133AF933A05752C1A9659C8B63

Slide 19

Case in point… A blogger from Utah cruelly censured her Mormon childhood, her occupation and collaborators web, expecting that her technophobic guardians and her manager could never discover. Be that as it may, they did, and "significant trouble come to the surface," as she put it. She estranged her folks and lost her employment. "It was stunning for everybody," she said; "I was to a great degree gullible." (St. John, 2003).

Slide 20

Case in point… Students at numerous colleges can now utilize facebook as an apparatus to choose their flat mate. Understudies are urged to login, investigate profiles and discover somebody they might want to live with in home. http://www.insidehighered.com/news/2007/08/24/flat mate

Slide 21

Other cases? Consider: What different cases have you experienced that would be valuable to include here? Why is showing some genuine stories vital? What will you should be watchful of?

Slide 22

Activity… Sort yourself into little gatherings of 4-5 and offer: What do you believe are the greatest security attentiveness toward informal communication destinations. What advanced earth "may" exist about you? In what capacity would you be able to adjust being real and being sheltered?

Slide 23

Tip #1: Personal Information Do exclude anything individual: where you live, your telephone number, address, or whatever other recognizing data. Because there is a field for certain data, does not mean you need to fill it in. On the off chance that you have to post any individual data on a site, ensure you read through (or possibly know to some degree) about the Privacy Statement on the site. In the event that you find that a site does not have a Privacy contract/proclamation/and so forth., the site is presumably not sufficiently reliable to post any individual data on.

Slide 24

Tip #2: Identifying Others Remember that posting data about your companions could put them at danger. Look for authorization from your companions before posting any of their own data. On the off chance that a companion requests that you bring data down do it. Try not to incorporate or examine your teacher or TA\'s name, your boss\' name, the name of the group you work, your organization\'s customers, and so on

Slide 25

Tip #3: Photos Do not post any photographs of you taking part in unlawful action, and/or acting unreliably, or that others may discover hostile. (i.e underage drinking could put you at danger for lawful outcomes) Employers may turn upward potential competitors on-line before settling on enlisting choices.

Slide 26

Tip #4: Selling your spirit Social Networks and different destinations may offer individual data about individuals who utilize their administration. In this way your profile can be seen by others without your insight. Sites may have security strategies however that does not anticipate individuals with access (different individuals from Facebook for instance) from redistributing your data somewhere else on the web.

Slide 27

Tip #5: Stalking Your own data can be utilized for the motivations behind stalking and/or fraud. Limit access to your profile, just add individuals as companions to your site on the off chance that you know them, all things considered. Abstain from posting any arrangements or exercises on your site. Making this data accessible could make you powerless to would be stalkers.

Slide 28

Tip #6: Internet Archives Information you post can chase after you for quite a long time to come. Regardless of the fact that you evacuate certain data, somebody may as of now have duplicates or may have conveyed that data on the web. The wayback machine: http://www.archive.org/web/web.php

Slide 29

Tip #7: Meeting online If you plan to meet somebody that you have met on the web, meet this individual in a bustling zone (ex: bistro). Tell somebody where you are going and when you hope to return. Have a companion call you on your PDA to check in with you.

Slide 30

Tip #8: Reporting harrassment Electronic correspondence that is undesirable, and that is steady, rehashed, foul or generally unwelcome might be badgering, and move might be made under University approach. On the off chance that you are worried about your own wellbeing and/or might want more data contact the University of British Columbia\'s Campus Security Office. On the off chance that the comme

Recommended
View more...