SlideShare une entreprise Scribd logo
“Without social media, I don’t know
who steal my foods.” said an African.
Facebook creation
Facebook security
Presented: Ngeth Moses
Facebook Users in Cambodia
Facebook users in Cambodia
Facebook in Cambodia
What you GIVE Facebook when you SIGN UP?
What does Facebook GIVE you?
Statement of Rights and
Responsibilities
What happened when people post?
hina, according to media freedom watchdog Reporters Without Borders, is the
“world’s biggest prison for netizens”, with 78 individuals still imprisoned for
Internet-related activities as of March 2012
ietnam currently holds the dubious record of being home to the second largest
number of imprisoned netizens in the world, with 18 individuals remaining in
prison for their online activities as of April 2012.
hailand has been put under the international spotlight for its use of the
Computer Crime Act59 against persons who violate the lese majeste law (Article
112 of the Criminal Code).
urma, numerous activists and bloggers have in recent years been detained and
prosecuted under laws like the Electronic Transactions Act for the use of the
Internet and social media in their activism.
alaysia, six persons were charged under the Communications and Multimedia Act
in March 2009 for insulting the Sultan of Perak on blogs or other Internet
postings.
What happened in The Kingdom of Wonder?
eacher’s case
elebrity’s case
obitel guy’s case
Tips to be safe on Social Media posting
lways remember what you post is NEVER deleted. It is searchable.
f information is NOT yours, then you have to tell/link where your
“SOURCE” is
hink before you post: Is it a right time? Does it serve the public
purpose? Who is/are my trusted people/network help to pass on my
message? What is/are my backfire?
ess using bad ADJECTIVEs to describe people
ost what you SAW and HEARD not by people TOLD you
Ti   facebook security 150314

Contenu connexe

Tendances

3 ways cops are catching crooks
3 ways cops are catching crooks3 ways cops are catching crooks
3 ways cops are catching crooks
hunterfithen
 
Disadvantage of using internet
Disadvantage of using internetDisadvantage of using internet
Disadvantage of using internet
Muhammad Nazarith
 
The Internet Presentation
The Internet Presentation The Internet Presentation
The Internet Presentation
guestc2627d
 
Online journalism
Online journalismOnline journalism
Online journalism
yanie
 

Tendances (20)

3 ways cops are catching crooks
3 ways cops are catching crooks3 ways cops are catching crooks
3 ways cops are catching crooks
 
Introduction to-internet-n-emails
Introduction to-internet-n-emailsIntroduction to-internet-n-emails
Introduction to-internet-n-emails
 
Internet theory and practical
Internet theory and practicalInternet theory and practical
Internet theory and practical
 
Disadvantage of using internet
Disadvantage of using internetDisadvantage of using internet
Disadvantage of using internet
 
Digital Rights and Responsibilities
Digital Rights and ResponsibilitiesDigital Rights and Responsibilities
Digital Rights and Responsibilities
 
Advantage and disadvantage of the internet
Advantage and disadvantage of the internetAdvantage and disadvantage of the internet
Advantage and disadvantage of the internet
 
Internet presentation
Internet presentationInternet presentation
Internet presentation
 
The Internet Presentation
The Internet Presentation The Internet Presentation
The Internet Presentation
 
The Social Media Bait - Fraud & Cybercrime
The Social Media Bait - Fraud & CybercrimeThe Social Media Bait - Fraud & Cybercrime
The Social Media Bait - Fraud & Cybercrime
 
Advantages and Disadvantages of internet
Advantages and Disadvantages of internetAdvantages and Disadvantages of internet
Advantages and Disadvantages of internet
 
6204399 privacy on the internet
6204399 privacy on the internet6204399 privacy on the internet
6204399 privacy on the internet
 
The Revolution of the Internet
The Revolution of the InternetThe Revolution of the Internet
The Revolution of the Internet
 
Advantages and disadvantages of internet
Advantages and disadvantages of internetAdvantages and disadvantages of internet
Advantages and disadvantages of internet
 
Intellectual Property in Social Networking
Intellectual Property in Social NetworkingIntellectual Property in Social Networking
Intellectual Property in Social Networking
 
CDA 230 in the Age of Cyber Civil Rights and Terrorism
CDA 230 in the Age of Cyber Civil Rights and TerrorismCDA 230 in the Age of Cyber Civil Rights and Terrorism
CDA 230 in the Age of Cyber Civil Rights and Terrorism
 
Internet surfing
Internet surfingInternet surfing
Internet surfing
 
Online journalism
Online journalismOnline journalism
Online journalism
 
Internet advantages and disadvantages
Internet advantages and disadvantagesInternet advantages and disadvantages
Internet advantages and disadvantages
 
Mao p.cs.102.01
Mao p.cs.102.01Mao p.cs.102.01
Mao p.cs.102.01
 
Internet
InternetInternet
Internet
 

Similaire à Ti facebook security 150314

Journal online sexual abuse of children ecpat indonesia
Journal online sexual abuse of children   ecpat indonesiaJournal online sexual abuse of children   ecpat indonesia
Journal online sexual abuse of children ecpat indonesia
ECPAT Indonesia
 
Do not put too much information
Do not put too much informationDo not put too much information
Do not put too much information
Shangli Jiang
 
Freedom-and-Responsibility-Dan-Lohrmann (3)
Freedom-and-Responsibility-Dan-Lohrmann (3)Freedom-and-Responsibility-Dan-Lohrmann (3)
Freedom-and-Responsibility-Dan-Lohrmann (3)
Dan Lohrmann
 
Cyberwellness Refers To The Positive Well Being Of Internet
Cyberwellness Refers To The Positive Well Being Of InternetCyberwellness Refers To The Positive Well Being Of Internet
Cyberwellness Refers To The Positive Well Being Of Internet
beh yong hua
 
Draft for prezi and poster
Draft for prezi and posterDraft for prezi and poster
Draft for prezi and poster
victoriahoo
 

Similaire à Ti facebook security 150314 (18)

Journal online sexual abuse of children ecpat indonesia
Journal online sexual abuse of children   ecpat indonesiaJournal online sexual abuse of children   ecpat indonesia
Journal online sexual abuse of children ecpat indonesia
 
Social Justice & Black Twitter
Social Justice & Black TwitterSocial Justice & Black Twitter
Social Justice & Black Twitter
 
Do not put too much information
Do not put too much informationDo not put too much information
Do not put too much information
 
Week 1. Opportunities, Challenges and Power of Media and Information [Autosav...
Week 1. Opportunities, Challenges and Power of Media and Information [Autosav...Week 1. Opportunities, Challenges and Power of Media and Information [Autosav...
Week 1. Opportunities, Challenges and Power of Media and Information [Autosav...
 
Lis580 seminargroup3
Lis580 seminargroup3Lis580 seminargroup3
Lis580 seminargroup3
 
Cyber Crime Essays
Cyber Crime EssaysCyber Crime Essays
Cyber Crime Essays
 
Freedom-and-Responsibility-Dan-Lohrmann (3)
Freedom-and-Responsibility-Dan-Lohrmann (3)Freedom-and-Responsibility-Dan-Lohrmann (3)
Freedom-and-Responsibility-Dan-Lohrmann (3)
 
Cyberwellness Refers To The Positive Well Being Of Internet
Cyberwellness Refers To The Positive Well Being Of InternetCyberwellness Refers To The Positive Well Being Of Internet
Cyberwellness Refers To The Positive Well Being Of Internet
 
Draft for prezi and poster
Draft for prezi and posterDraft for prezi and poster
Draft for prezi and poster
 
SASIG Workshop on “Improving the digital landscape for our children”
SASIG Workshop on “Improving the digital landscape for our children”SASIG Workshop on “Improving the digital landscape for our children”
SASIG Workshop on “Improving the digital landscape for our children”
 
SocailMaedia
SocailMaediaSocailMaedia
SocailMaedia
 
A Case Study On Facebook Data Theft In Indonesia
A Case Study On Facebook Data Theft In IndonesiaA Case Study On Facebook Data Theft In Indonesia
A Case Study On Facebook Data Theft In Indonesia
 
Facebook
FacebookFacebook
Facebook
 
Indah sari publikasi artikel ilmiah
Indah sari   publikasi artikel ilmiahIndah sari   publikasi artikel ilmiah
Indah sari publikasi artikel ilmiah
 
Internet Privacy Essay
Internet Privacy EssayInternet Privacy Essay
Internet Privacy Essay
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
 
ethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdf
 
Privacy, social networks and EU policy
Privacy, social networks and EU policyPrivacy, social networks and EU policy
Privacy, social networks and EU policy
 

Dernier

Neurulation and the formation of the neural tube
Neurulation and the formation of the neural tubeNeurulation and the formation of the neural tube
Neurulation and the formation of the neural tube
SaadHumayun7
 

Dernier (20)

2024_Student Session 2_ Set Plan Preparation.pptx
2024_Student Session 2_ Set Plan Preparation.pptx2024_Student Session 2_ Set Plan Preparation.pptx
2024_Student Session 2_ Set Plan Preparation.pptx
 
size separation d pharm 1st year pharmaceutics
size separation d pharm 1st year pharmaceuticssize separation d pharm 1st year pharmaceutics
size separation d pharm 1st year pharmaceutics
 
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdfDanh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
 
[GDSC YCCE] Build with AI Online Presentation
[GDSC YCCE] Build with AI Online Presentation[GDSC YCCE] Build with AI Online Presentation
[GDSC YCCE] Build with AI Online Presentation
 
....................Muslim-Law notes.pdf
....................Muslim-Law notes.pdf....................Muslim-Law notes.pdf
....................Muslim-Law notes.pdf
 
Salient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptxSalient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptx
 
Advances in production technology of Grapes.pdf
Advances in production technology of Grapes.pdfAdvances in production technology of Grapes.pdf
Advances in production technology of Grapes.pdf
 
Neurulation and the formation of the neural tube
Neurulation and the formation of the neural tubeNeurulation and the formation of the neural tube
Neurulation and the formation of the neural tube
 
Benefits and Challenges of Using Open Educational Resources
Benefits and Challenges of Using Open Educational ResourcesBenefits and Challenges of Using Open Educational Resources
Benefits and Challenges of Using Open Educational Resources
 
Telling Your Story_ Simple Steps to Build Your Nonprofit's Brand Webinar.pdf
Telling Your Story_ Simple Steps to Build Your Nonprofit's Brand Webinar.pdfTelling Your Story_ Simple Steps to Build Your Nonprofit's Brand Webinar.pdf
Telling Your Story_ Simple Steps to Build Your Nonprofit's Brand Webinar.pdf
 
The Benefits and Challenges of Open Educational Resources
The Benefits and Challenges of Open Educational ResourcesThe Benefits and Challenges of Open Educational Resources
The Benefits and Challenges of Open Educational Resources
 
Basic Civil Engg Notes_Chapter-6_Environment Pollution & Engineering
Basic Civil Engg Notes_Chapter-6_Environment Pollution & EngineeringBasic Civil Engg Notes_Chapter-6_Environment Pollution & Engineering
Basic Civil Engg Notes_Chapter-6_Environment Pollution & Engineering
 
“O BEIJO” EM ARTE .
“O BEIJO” EM ARTE                       .“O BEIJO” EM ARTE                       .
“O BEIJO” EM ARTE .
 
An Overview of the Odoo 17 Discuss App.pptx
An Overview of the Odoo 17 Discuss App.pptxAn Overview of the Odoo 17 Discuss App.pptx
An Overview of the Odoo 17 Discuss App.pptx
 
Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17
 
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdfINU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
 
Morse OER Some Benefits and Challenges.pptx
Morse OER Some Benefits and Challenges.pptxMorse OER Some Benefits and Challenges.pptx
Morse OER Some Benefits and Challenges.pptx
 
B.ed spl. HI pdusu exam paper-2023-24.pdf
B.ed spl. HI pdusu exam paper-2023-24.pdfB.ed spl. HI pdusu exam paper-2023-24.pdf
B.ed spl. HI pdusu exam paper-2023-24.pdf
 
Word Stress rules esl .pptx
Word Stress rules esl               .pptxWord Stress rules esl               .pptx
Word Stress rules esl .pptx
 
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
 

Ti facebook security 150314

  • 1. “Without social media, I don’t know who steal my foods.” said an African. Facebook creation Facebook security Presented: Ngeth Moses
  • 2. Facebook Users in Cambodia
  • 3. Facebook users in Cambodia
  • 5. What you GIVE Facebook when you SIGN UP?
  • 6. What does Facebook GIVE you? Statement of Rights and Responsibilities
  • 7. What happened when people post? hina, according to media freedom watchdog Reporters Without Borders, is the “world’s biggest prison for netizens”, with 78 individuals still imprisoned for Internet-related activities as of March 2012 ietnam currently holds the dubious record of being home to the second largest number of imprisoned netizens in the world, with 18 individuals remaining in prison for their online activities as of April 2012. hailand has been put under the international spotlight for its use of the Computer Crime Act59 against persons who violate the lese majeste law (Article 112 of the Criminal Code). urma, numerous activists and bloggers have in recent years been detained and prosecuted under laws like the Electronic Transactions Act for the use of the Internet and social media in their activism. alaysia, six persons were charged under the Communications and Multimedia Act in March 2009 for insulting the Sultan of Perak on blogs or other Internet postings.
  • 8. What happened in The Kingdom of Wonder? eacher’s case elebrity’s case obitel guy’s case
  • 9. Tips to be safe on Social Media posting lways remember what you post is NEVER deleted. It is searchable. f information is NOT yours, then you have to tell/link where your “SOURCE” is hink before you post: Is it a right time? Does it serve the public purpose? Who is/are my trusted people/network help to pass on my message? What is/are my backfire? ess using bad ADJECTIVEs to describe people ost what you SAW and HEARD not by people TOLD you