SlideShare a Scribd company logo
1 of 71
Social Media
&
Security @brianhonan
Who Am I?
@brianhonan
What
is
Social Media?
Websites and applications that
enable users to create and share
content or to participate in social
networking.
- Oxford English Dictionary
Forms of electronic communication
(as Web sites for social networking
and microblogging) through which
users create online communities to
share information, ideas, personal
messages, and other content (as
videos) .
- Mirriam-Webster Dictionary
“A group of Internet-based
applications that build on the
ideological and technological
foundations of Web 2.0, and that
allow the creation and exchange of
user-generated content."
- Wikipedia
Courtesy of Instantcheckmate.com
Government Official Sacked
Forgot Boss was Facebook Friend
Posting They Are Not at Home
Yes, 53%
No, 47%
Courtesy of Legal & General Group PLC
Yes, 60%
No, 40%
Post About Nights Out
Courtesy of Legal & General Group PLC
Shared Images of Expensive Items
Yes, 24%
No, 76%
Courtesy of Legal & General Group PLC
Courtesy of Instantcheckmate.com
Courtesy of Instantcheckmate.com
Social Media Scams
Competition Winners ??
Click on This Link …
Twitter Threats
Koobface
Courtesy TrendMicro
Zeus?
Do You Trust That App?
CourtesyofBitrebels.com
Courtesy of Instantcheckmate.com
Courtesy of Instantcheckmate.com
Courtesy of Instantcheckmate.com
Anthony Stancl
Secure Passwords?
Common Passwords
Password Reset
My Name is Marie
How Did I Steal Her ID?
Corporate Issues
Password Reuse
81%
61%
19%
39%
0% 20% 40% 60% 80% 100%
IT Pros
General
Courtesy Darkreading.com & welivesecurity.com
Social Media Treasure Trove
The Gift That Keeps on Giving
Social Engineering
Emily Williams & Robin Page
http://www.thesecurityblogger.com/?p=1903
Misinformation
Manipulation?
How To Defend
Establish Policies
Awareness
Be Careful
What You
Share
Update Privacy Settings
Twitterfall
Handling Security Breaches
Bad News
 Use All Channels.
 Use Social Media to Direct
People to More Information
 Update Regularly (Timezones,
etc.)
 Keep Webpage Updated
 Have Staff Trained
 Trust Employees
 Get Senior Representative to
Talk Early and Often
 Engage With Others
Use Social Media in IR
Monitor & Respond
Brian.honan@bhconsulting.ie
@brianhonan

More Related Content

What's hot

KCB207 ASSIGNMENT 2 n7556608
KCB207 ASSIGNMENT 2 n7556608KCB207 ASSIGNMENT 2 n7556608
KCB207 ASSIGNMENT 2 n7556608ckeating_0110
 
effect of internet on today's generation
effect of internet on today's generationeffect of internet on today's generation
effect of internet on today's generationNupendra Verma
 
Internet Sehat dan Literasi Digital
Internet Sehat dan Literasi DigitalInternet Sehat dan Literasi Digital
Internet Sehat dan Literasi DigitalICT Watch
 
Effects of social media on youth.
Effects of social media on youth.Effects of social media on youth.
Effects of social media on youth.ALI IRFAN ASHRAF
 
Social networking sites.
Social networking sites.Social networking sites.
Social networking sites.Jagdeep Gill
 
What The Hell
What The HellWhat The Hell
What The Hellnick tadd
 
Effects of social media on youth
Effects of social media on youthEffects of social media on youth
Effects of social media on youthSukriti Singh
 
The effects of Social Networking upon society
The effects of Social Networking upon societyThe effects of Social Networking upon society
The effects of Social Networking upon societyBishrul Haq
 
Introduction to Social Media for Journalists
Introduction to Social Media for JournalistsIntroduction to Social Media for Journalists
Introduction to Social Media for JournalistsRabab Khan
 
John Blue - Social Media 101, 2017 University of Scouting, Indianapolis, IN, USA
John Blue - Social Media 101, 2017 University of Scouting, Indianapolis, IN, USAJohn Blue - Social Media 101, 2017 University of Scouting, Indianapolis, IN, USA
John Blue - Social Media 101, 2017 University of Scouting, Indianapolis, IN, USAJohn Blue
 
Social Media for Law Enforcement Agencies
Social Media for Law Enforcement AgenciesSocial Media for Law Enforcement Agencies
Social Media for Law Enforcement AgenciesSmall World Social
 
John Blue - Social Media 101, 2018 University of Scouting, Indianapolis, IN, USA
John Blue - Social Media 101, 2018 University of Scouting, Indianapolis, IN, USAJohn Blue - Social Media 101, 2018 University of Scouting, Indianapolis, IN, USA
John Blue - Social Media 101, 2018 University of Scouting, Indianapolis, IN, USAJohn Blue
 
English presentation 1 (social media)
English presentation 1 (social media)English presentation 1 (social media)
English presentation 1 (social media)Usama Khan
 
Data Science for Teens
Data Science for TeensData Science for Teens
Data Science for TeensIsmail Fahmi
 
Social media (sanju)
Social media (sanju)Social media (sanju)
Social media (sanju)sanju prasad
 
76 s201907
76 s20190776 s201907
76 s201907IJRAT
 
The effect-of-social-networking-sites
The effect-of-social-networking-sitesThe effect-of-social-networking-sites
The effect-of-social-networking-sitesRam Patil
 
Social media and impact on economy and society
Social media and impact on economy and societySocial media and impact on economy and society
Social media and impact on economy and societyBhaswati Guha Majumder
 

What's hot (20)

KCB207 ASSIGNMENT 2 n7556608
KCB207 ASSIGNMENT 2 n7556608KCB207 ASSIGNMENT 2 n7556608
KCB207 ASSIGNMENT 2 n7556608
 
effect of internet on today's generation
effect of internet on today's generationeffect of internet on today's generation
effect of internet on today's generation
 
Internet Sehat dan Literasi Digital
Internet Sehat dan Literasi DigitalInternet Sehat dan Literasi Digital
Internet Sehat dan Literasi Digital
 
Effects of social media on youth.
Effects of social media on youth.Effects of social media on youth.
Effects of social media on youth.
 
Social networking sites.
Social networking sites.Social networking sites.
Social networking sites.
 
What The Hell
What The HellWhat The Hell
What The Hell
 
Effects of social media on youth
Effects of social media on youthEffects of social media on youth
Effects of social media on youth
 
The power of social media
The power of social mediaThe power of social media
The power of social media
 
The effects of Social Networking upon society
The effects of Social Networking upon societyThe effects of Social Networking upon society
The effects of Social Networking upon society
 
Introduction to Social Media for Journalists
Introduction to Social Media for JournalistsIntroduction to Social Media for Journalists
Introduction to Social Media for Journalists
 
John Blue - Social Media 101, 2017 University of Scouting, Indianapolis, IN, USA
John Blue - Social Media 101, 2017 University of Scouting, Indianapolis, IN, USAJohn Blue - Social Media 101, 2017 University of Scouting, Indianapolis, IN, USA
John Blue - Social Media 101, 2017 University of Scouting, Indianapolis, IN, USA
 
Social Media for Law Enforcement Agencies
Social Media for Law Enforcement AgenciesSocial Media for Law Enforcement Agencies
Social Media for Law Enforcement Agencies
 
John Blue - Social Media 101, 2018 University of Scouting, Indianapolis, IN, USA
John Blue - Social Media 101, 2018 University of Scouting, Indianapolis, IN, USAJohn Blue - Social Media 101, 2018 University of Scouting, Indianapolis, IN, USA
John Blue - Social Media 101, 2018 University of Scouting, Indianapolis, IN, USA
 
English presentation 1 (social media)
English presentation 1 (social media)English presentation 1 (social media)
English presentation 1 (social media)
 
The social dilemma
The social dilemmaThe social dilemma
The social dilemma
 
Data Science for Teens
Data Science for TeensData Science for Teens
Data Science for Teens
 
Social media (sanju)
Social media (sanju)Social media (sanju)
Social media (sanju)
 
76 s201907
76 s20190776 s201907
76 s201907
 
The effect-of-social-networking-sites
The effect-of-social-networking-sitesThe effect-of-social-networking-sites
The effect-of-social-networking-sites
 
Social media and impact on economy and society
Social media and impact on economy and societySocial media and impact on economy and society
Social media and impact on economy and society
 

Viewers also liked

Extracting Forensic Information From Zeus Derivatives
Extracting Forensic Information From Zeus DerivativesExtracting Forensic Information From Zeus Derivatives
Extracting Forensic Information From Zeus DerivativesSource Conference
 
I want the next generation web here SPDY QUIC
I want the next generation web here SPDY QUICI want the next generation web here SPDY QUIC
I want the next generation web here SPDY QUICSource Conference
 
From DNA Sequence Variation to .NET Bits and Bobs
From DNA Sequence Variation to .NET Bits and BobsFrom DNA Sequence Variation to .NET Bits and Bobs
From DNA Sequence Variation to .NET Bits and BobsSource Conference
 
iBanking - a botnet on Android
iBanking - a botnet on AndroidiBanking - a botnet on Android
iBanking - a botnet on AndroidSource Conference
 
White Paper: Tokenization, Credit Card Fraud Prevention, Beyond PCI Measures
White Paper: Tokenization, Credit Card Fraud Prevention, Beyond PCI MeasuresWhite Paper: Tokenization, Credit Card Fraud Prevention, Beyond PCI Measures
White Paper: Tokenization, Credit Card Fraud Prevention, Beyond PCI MeasuresNisum
 

Viewers also liked (6)

Ken Smith - Tokenization
Ken Smith - TokenizationKen Smith - Tokenization
Ken Smith - Tokenization
 
Extracting Forensic Information From Zeus Derivatives
Extracting Forensic Information From Zeus DerivativesExtracting Forensic Information From Zeus Derivatives
Extracting Forensic Information From Zeus Derivatives
 
I want the next generation web here SPDY QUIC
I want the next generation web here SPDY QUICI want the next generation web here SPDY QUIC
I want the next generation web here SPDY QUIC
 
From DNA Sequence Variation to .NET Bits and Bobs
From DNA Sequence Variation to .NET Bits and BobsFrom DNA Sequence Variation to .NET Bits and Bobs
From DNA Sequence Variation to .NET Bits and Bobs
 
iBanking - a botnet on Android
iBanking - a botnet on AndroidiBanking - a botnet on Android
iBanking - a botnet on Android
 
White Paper: Tokenization, Credit Card Fraud Prevention, Beyond PCI Measures
White Paper: Tokenization, Credit Card Fraud Prevention, Beyond PCI MeasuresWhite Paper: Tokenization, Credit Card Fraud Prevention, Beyond PCI Measures
White Paper: Tokenization, Credit Card Fraud Prevention, Beyond PCI Measures
 

Similar to How to Like Social Media Network Security

Nonprofit Congress: Innovation
Nonprofit Congress:  InnovationNonprofit Congress:  Innovation
Nonprofit Congress: InnovationBarbaraKelly
 
Social media in hospitality
Social media in hospitalitySocial media in hospitality
Social media in hospitalityAnil Bilgihan
 
The State of Social Media (and How to Use It and Not Lose Your Job)
The State of Social Media (and How to Use It and Not Lose Your Job)The State of Social Media (and How to Use It and Not Lose Your Job)
The State of Social Media (and How to Use It and Not Lose Your Job)Andrew Krzmarzick
 
AYN Brand : T3 Workshop - Social Media & Web 2.0 Primer
AYN Brand : T3 Workshop - Social Media & Web 2.0 PrimerAYN Brand : T3 Workshop - Social Media & Web 2.0 Primer
AYN Brand : T3 Workshop - Social Media & Web 2.0 PrimerGrace Rodriguez
 
Web 2.0 Presentation
Web 2.0 PresentationWeb 2.0 Presentation
Web 2.0 PresentationSteve Rath
 
CNCS Web 2.0
CNCS Web 2.0CNCS Web 2.0
CNCS Web 2.0jmproulx
 
Social Media For Social Change
Social Media For Social ChangeSocial Media For Social Change
Social Media For Social ChangeJason Scott
 
social media for social change
social media for social changesocial media for social change
social media for social changeJoely Ross
 
Social Media & Civic Engagement
Social Media & Civic EngagementSocial Media & Civic Engagement
Social Media & Civic EngagementMA Campus Compact
 
Social media colleges- t seymour
Social media   colleges- t seymourSocial media   colleges- t seymour
Social media colleges- t seymourTom Seymour, PhD
 
Accelerating Social Innovation: NGOs, Open Networks & Developing Marketplaces
Accelerating Social Innovation: NGOs, Open Networks & Developing MarketplacesAccelerating Social Innovation: NGOs, Open Networks & Developing Marketplaces
Accelerating Social Innovation: NGOs, Open Networks & Developing MarketplacesAyelet Baron
 
Social Media Forensics for Investigators
Social Media Forensics for InvestigatorsSocial Media Forensics for Investigators
Social Media Forensics for InvestigatorsCase IQ
 
Merged may 19 webinar
Merged may 19 webinarMerged may 19 webinar
Merged may 19 webinarsslesperance
 
Online Marketing to Seniors via Social Media - Alpro Marketing Forum
Online Marketing to Seniors via Social Media - Alpro Marketing ForumOnline Marketing to Seniors via Social Media - Alpro Marketing Forum
Online Marketing to Seniors via Social Media - Alpro Marketing ForumLode Broekman
 
Social Media Marketing - Social Media Indian Usage
Social Media Marketing - Social Media Indian UsageSocial Media Marketing - Social Media Indian Usage
Social Media Marketing - Social Media Indian UsageMoksh Juneja
 
Social Media Marketing - Introduction
Social Media Marketing - IntroductionSocial Media Marketing - Introduction
Social Media Marketing - IntroductionMoksh Juneja
 

Similar to How to Like Social Media Network Security (20)

Nonprofit Congress: Innovation
Nonprofit Congress:  InnovationNonprofit Congress:  Innovation
Nonprofit Congress: Innovation
 
Working with New Media
Working with New MediaWorking with New Media
Working with New Media
 
Social media in hospitality
Social media in hospitalitySocial media in hospitality
Social media in hospitality
 
The State of Social Media (and How to Use It and Not Lose Your Job)
The State of Social Media (and How to Use It and Not Lose Your Job)The State of Social Media (and How to Use It and Not Lose Your Job)
The State of Social Media (and How to Use It and Not Lose Your Job)
 
AYN Brand : T3 Workshop - Social Media & Web 2.0 Primer
AYN Brand : T3 Workshop - Social Media & Web 2.0 PrimerAYN Brand : T3 Workshop - Social Media & Web 2.0 Primer
AYN Brand : T3 Workshop - Social Media & Web 2.0 Primer
 
Web 2.0 Presentation
Web 2.0 PresentationWeb 2.0 Presentation
Web 2.0 Presentation
 
Social Media101
Social Media101Social Media101
Social Media101
 
CNCS Web 2.0
CNCS Web 2.0CNCS Web 2.0
CNCS Web 2.0
 
Social Media For Social Change
Social Media For Social ChangeSocial Media For Social Change
Social Media For Social Change
 
social media for social change
social media for social changesocial media for social change
social media for social change
 
Social Media & Civic Engagement
Social Media & Civic EngagementSocial Media & Civic Engagement
Social Media & Civic Engagement
 
Social media colleges- t seymour
Social media   colleges- t seymourSocial media   colleges- t seymour
Social media colleges- t seymour
 
Accelerating Social Innovation: NGOs, Open Networks & Developing Marketplaces
Accelerating Social Innovation: NGOs, Open Networks & Developing MarketplacesAccelerating Social Innovation: NGOs, Open Networks & Developing Marketplaces
Accelerating Social Innovation: NGOs, Open Networks & Developing Marketplaces
 
Ppt2
Ppt2Ppt2
Ppt2
 
Social Media Forensics for Investigators
Social Media Forensics for InvestigatorsSocial Media Forensics for Investigators
Social Media Forensics for Investigators
 
Abjs 2008 Veillette Web 20
Abjs 2008 Veillette Web 20Abjs 2008 Veillette Web 20
Abjs 2008 Veillette Web 20
 
Merged may 19 webinar
Merged may 19 webinarMerged may 19 webinar
Merged may 19 webinar
 
Online Marketing to Seniors via Social Media - Alpro Marketing Forum
Online Marketing to Seniors via Social Media - Alpro Marketing ForumOnline Marketing to Seniors via Social Media - Alpro Marketing Forum
Online Marketing to Seniors via Social Media - Alpro Marketing Forum
 
Social Media Marketing - Social Media Indian Usage
Social Media Marketing - Social Media Indian UsageSocial Media Marketing - Social Media Indian Usage
Social Media Marketing - Social Media Indian Usage
 
Social Media Marketing - Introduction
Social Media Marketing - IntroductionSocial Media Marketing - Introduction
Social Media Marketing - Introduction
 

More from Source Conference

Wfuzz para Penetration Testers
Wfuzz para Penetration TestersWfuzz para Penetration Testers
Wfuzz para Penetration TestersSource Conference
 
Security Goodness with Ruby on Rails
Security Goodness with Ruby on RailsSecurity Goodness with Ruby on Rails
Security Goodness with Ruby on RailsSource Conference
 
Securty Testing For RESTful Applications
Securty Testing For RESTful ApplicationsSecurty Testing For RESTful Applications
Securty Testing For RESTful ApplicationsSource Conference
 
Men in the Server Meet the Man in the Browser
Men in the Server Meet the Man in the BrowserMen in the Server Meet the Man in the Browser
Men in the Server Meet the Man in the BrowserSource Conference
 
Advanced Data Exfiltration The Way Q Would Have Done It
Advanced Data Exfiltration The Way Q Would Have Done ItAdvanced Data Exfiltration The Way Q Would Have Done It
Advanced Data Exfiltration The Way Q Would Have Done ItSource Conference
 
Adapting To The Age Of Anonymous
Adapting To The Age Of AnonymousAdapting To The Age Of Anonymous
Adapting To The Age Of AnonymousSource Conference
 
Are Agile And Secure Development Mutually Exclusive?
Are Agile And Secure Development Mutually Exclusive?Are Agile And Secure Development Mutually Exclusive?
Are Agile And Secure Development Mutually Exclusive?Source Conference
 
Advanced (persistent) binary planting
Advanced (persistent) binary plantingAdvanced (persistent) binary planting
Advanced (persistent) binary plantingSource Conference
 
Legal/technical strategies addressing data risks as perimeter shifts to Cloud
Legal/technical strategies addressing data risks as perimeter shifts to CloudLegal/technical strategies addressing data risks as perimeter shifts to Cloud
Legal/technical strategies addressing data risks as perimeter shifts to CloudSource Conference
 
Who should the security team hire next?
Who should the security team hire next?Who should the security team hire next?
Who should the security team hire next?Source Conference
 
The Latest Developments in Computer Crime Law
The Latest Developments in Computer Crime LawThe Latest Developments in Computer Crime Law
The Latest Developments in Computer Crime LawSource Conference
 
How To: Find The Right Amount Of Security Spend
How To: Find The Right Amount Of Security SpendHow To: Find The Right Amount Of Security Spend
How To: Find The Right Amount Of Security SpendSource Conference
 
Everything you should already know about MS-SQL post-exploitation
Everything you should already know about MS-SQL post-exploitationEverything you should already know about MS-SQL post-exploitation
Everything you should already know about MS-SQL post-exploitationSource Conference
 
Reputation Digital Vaccine: Reinventing Internet Blacklists
Reputation Digital Vaccine: Reinventing Internet BlacklistsReputation Digital Vaccine: Reinventing Internet Blacklists
Reputation Digital Vaccine: Reinventing Internet BlacklistsSource Conference
 
Threat Modeling: Best Practices
Threat Modeling: Best PracticesThreat Modeling: Best Practices
Threat Modeling: Best PracticesSource Conference
 
Forensic Memory Analysis of Android's Dalvik Virtual Machine
Forensic Memory Analysis of Android's Dalvik Virtual MachineForensic Memory Analysis of Android's Dalvik Virtual Machine
Forensic Memory Analysis of Android's Dalvik Virtual MachineSource Conference
 

More from Source Conference (20)

Million Browser Botnet
Million Browser BotnetMillion Browser Botnet
Million Browser Botnet
 
Wfuzz para Penetration Testers
Wfuzz para Penetration TestersWfuzz para Penetration Testers
Wfuzz para Penetration Testers
 
Security Goodness with Ruby on Rails
Security Goodness with Ruby on RailsSecurity Goodness with Ruby on Rails
Security Goodness with Ruby on Rails
 
Securty Testing For RESTful Applications
Securty Testing For RESTful ApplicationsSecurty Testing For RESTful Applications
Securty Testing For RESTful Applications
 
Esteganografia
EsteganografiaEsteganografia
Esteganografia
 
Men in the Server Meet the Man in the Browser
Men in the Server Meet the Man in the BrowserMen in the Server Meet the Man in the Browser
Men in the Server Meet the Man in the Browser
 
Advanced Data Exfiltration The Way Q Would Have Done It
Advanced Data Exfiltration The Way Q Would Have Done ItAdvanced Data Exfiltration The Way Q Would Have Done It
Advanced Data Exfiltration The Way Q Would Have Done It
 
Adapting To The Age Of Anonymous
Adapting To The Age Of AnonymousAdapting To The Age Of Anonymous
Adapting To The Age Of Anonymous
 
Are Agile And Secure Development Mutually Exclusive?
Are Agile And Secure Development Mutually Exclusive?Are Agile And Secure Development Mutually Exclusive?
Are Agile And Secure Development Mutually Exclusive?
 
Advanced (persistent) binary planting
Advanced (persistent) binary plantingAdvanced (persistent) binary planting
Advanced (persistent) binary planting
 
Legal/technical strategies addressing data risks as perimeter shifts to Cloud
Legal/technical strategies addressing data risks as perimeter shifts to CloudLegal/technical strategies addressing data risks as perimeter shifts to Cloud
Legal/technical strategies addressing data risks as perimeter shifts to Cloud
 
Who should the security team hire next?
Who should the security team hire next?Who should the security team hire next?
Who should the security team hire next?
 
The Latest Developments in Computer Crime Law
The Latest Developments in Computer Crime LawThe Latest Developments in Computer Crime Law
The Latest Developments in Computer Crime Law
 
JSF Security
JSF SecurityJSF Security
JSF Security
 
How To: Find The Right Amount Of Security Spend
How To: Find The Right Amount Of Security SpendHow To: Find The Right Amount Of Security Spend
How To: Find The Right Amount Of Security Spend
 
Everything you should already know about MS-SQL post-exploitation
Everything you should already know about MS-SQL post-exploitationEverything you should already know about MS-SQL post-exploitation
Everything you should already know about MS-SQL post-exploitation
 
Keynote
KeynoteKeynote
Keynote
 
Reputation Digital Vaccine: Reinventing Internet Blacklists
Reputation Digital Vaccine: Reinventing Internet BlacklistsReputation Digital Vaccine: Reinventing Internet Blacklists
Reputation Digital Vaccine: Reinventing Internet Blacklists
 
Threat Modeling: Best Practices
Threat Modeling: Best PracticesThreat Modeling: Best Practices
Threat Modeling: Best Practices
 
Forensic Memory Analysis of Android's Dalvik Virtual Machine
Forensic Memory Analysis of Android's Dalvik Virtual MachineForensic Memory Analysis of Android's Dalvik Virtual Machine
Forensic Memory Analysis of Android's Dalvik Virtual Machine
 

Recently uploaded

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)Samir Dash
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024Lorenzo Miniero
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMKumar Satyam
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsLeah Henrickson
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...caitlingebhard1
 
Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceDecarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceIES VE
 
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2
 
Navigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseNavigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseWSO2
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfdanishmna97
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctBrainSell Technologies
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuidePixlogix Infotech
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data SciencePaolo Missier
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptxFIDO Alliance
 
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...SOFTTECHHUB
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringWSO2
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaWSO2
 

Recently uploaded (20)

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
 
Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceDecarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational Performance
 
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
 
Navigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseNavigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern Enterprise
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software Engineering
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using Ballerina
 

How to Like Social Media Network Security