SlideShare une entreprise Scribd logo
1  sur  21
SOCIAL MEDIA
AWARENESS
RAGHU KHIMANI
CYBER CRIME EXPERT/ADVISOR
BAHAUDDIN SCIENCE COLLEGE, JUNAGADH
What comes to your mind when you
hear Social Media?
Objectives of the Presentation
 Introduction of Social Media
 Types of Social Media
 Professional Uses of Social Media
 Impact of Social Media
 Negative side of Social Media
 Cyber Bullying
Safety Tips
Introduction of Social Media
 “Social media facilitate the development of online social networks
by connecting a user's profile with those of other individuals and/or
groups”.
 Social Media use Web Based Technologies, Desktop computers and
Mobile Technologies (Smartphones) to create highly interactive
platforms through which individuals, communities and organization
can Share, Create, Discuss and Modify user generated content
posted online.
 Some of the most popular social media websites are Facebook
(and its associated Facebook Messenger), WhatsApp, Tumblr,
Instagram, Twitter, Pinterest, LinkedIn, Google+, YouTube, Viber,
Snapchat, Weibo and WeChat. These social media websites have
more than 100,000,000 registered users.
Types of Social Media
Professional Uses of Social Media
Impact of Social Media
 On March 12, 2016, the World Wide Web turned 27.
 76% people think felt that it has been positive for society as whole.
 Although many people enjoy the freedom and connection they feel from
social media, it has also had a negative impact on the number of hours
you spend in face-to-face relationships and has created a platform where
sharing negative thoughts and feelings can be done in a nameless, faceless
fashion.
Social media networking has also had an amazingly positive impact on
the distribution of information and acquiring help and support during
natural disasters around the globe.
 In 2014, Prime Minister Shri Narendra Modi successfully used
social media to communicate his platform to the voting public. Since
then, many Indian Politicians used social media platforms to
communicate with their constituents and get feedback on their
performance.
Negative Side of Social Media
One of the negative effect of social media or network is it leads to
addiction. Spending countless hours on the social sites can divert the
focus and attention from a particular task.
Another downside of the social media is that the user shares too
much information which may pose threats to them. Even with the
tight security settings, your personal information may leak on the
social sites. Downloading your videos or pictures and copying your
status is an easy task and can be done within few clicks.
Sometimes social media is time consuming too. Time we spend on
social media is more then the time we spend for our family.
Cyber Bullying
Cyber Bullying or Cyber Harassment is a form of bullying or
harassment using electronic forms of contact.
Harmful bullying behaviour can include posting rumours about a
person, threats, negative remarks, disclose victims' personal
information etc..
Example of Anonymous bullying
In India there are several strict bullying in the workplace laws and
regulations levied by the legal system.
These laws are supposed to address all types of workplace harassment
including discrimination (ભેદભાવ), sexual nuisance and psychological
irritation caused by the employer.
Section 66 A of The Information Technology Amendment Act 2008, deals
with the actions done through a computer or mobile device that are
grossly offensive, insult, inconvenience, injure or ill will against the person
it is directed at.
Punishment for sending offensive messages through communication
service - shall be punishable with imprisonment for a term which may
extend to three years and with fine.
Safety Tips
Use a strong password: The longer it is, the more secure it will be. The strong
password contains a minimum of 12 characters. (Incl. Capital Alphabets, Small
Alphabets, Numerical & Symbols).
Unique account, Unique password: Use a different password for each of your
social media accounts. (For ex. Different for Facebook, Twitter, LinkedIn,
Google+, Pinterest, G-Mail, etc…)
Set up your security answers. The two factor authentication is available for
most social media sites.
If you have social media apps on your phone, be sure to password protect your
device.
Be selective with friend requests. If you don’t know the person, don’t accept
their request. It could be a fake account.
Click links with caution. Social media accounts are regularly hacked. Look out
for language or content that does not sound like something your friend would
post.
Beware of TMI (Too Much Information): Be careful about what you share.
Don’t reveal sensitive personal information i.e.: birth date, home address,
financial information, phone number, etc. The more you post, the easier it is to
have your identity stolen.
Once posted, always posted: Protect your reputation on social networks. What
you post online stays online. Think twice before posting pictures you wouldn’t
want your parents or future employers to see.
Become familiar with the privacy policies of the social media channels you use
and customize your privacy settings to control who sees what.
Protect your computer by installing antivirus software to safeguard. Also
ensure that your browser, operating system, and software are kept up to date.
Remember to log off when you’re done.
Sites can use your Information: Social network sites are typically free to use
which means they are making their money by advertising to you. And that
means they are collecting information about you. Is your information shared
with outside companies and partners? What information can third-party plug-in
software, such as Facebook Applications, use from your profile or page content?
Review the site’s privacy policy and watch closely the privacy settings you can
control.
Search yourself: It is a good idea to search your name on Google and check out
your profile as others see it on social networking sites.
Know what action to take: If someone is harassing or threatening you, remove
them from your friends list, block them and report them to the Police or Cyber
Crime Cell.
Social Media Awareness

Contenu connexe

Tendances

Effects of social networking
Effects of social networkingEffects of social networking
Effects of social networkingSandipan Samaddar
 
Negative side of Social meadia
Negative side of Social meadia Negative side of Social meadia
Negative side of Social meadia Sarath Mathew
 
impact of social media on youth m.com ppt
impact of social media on youth m.com ppt impact of social media on youth m.com ppt
impact of social media on youth m.com ppt Sudhanshu Sandhir
 
Effects of social media on youth
Effects of social media on youthEffects of social media on youth
Effects of social media on youthSukriti Singh
 
The influence media on young generation ppt
The influence media on young generation pptThe influence media on young generation ppt
The influence media on young generation pptDharaba Gohil
 
EFFECTS OF SOCIAL NETWORKING
EFFECTS OF SOCIAL NETWORKINGEFFECTS OF SOCIAL NETWORKING
EFFECTS OF SOCIAL NETWORKINGNITIN BASANTWANI
 
impact of social media on youth
impact of social media on youthimpact of social media on youth
impact of social media on youthSu Kee
 
What Is Social Media?
What Is Social Media?What Is Social Media?
What Is Social Media?AlexLowe
 
Social Media
Social MediaSocial Media
Social MediaDarshit
 
A presentation on social networking sites
A presentation on social networking sitesA presentation on social networking sites
A presentation on social networking sitesAmit Kundu
 
Impact of social media on teenagers- Presentation
Impact of social media on teenagers- PresentationImpact of social media on teenagers- Presentation
Impact of social media on teenagers- PresentationMiss Perfect
 
Advantages and Disadvantages Of Social Media
 Advantages and Disadvantages Of Social Media Advantages and Disadvantages Of Social Media
Advantages and Disadvantages Of Social MediaDilna DV
 

Tendances (20)

Effects of social networking
Effects of social networkingEffects of social networking
Effects of social networking
 
Negative side of Social meadia
Negative side of Social meadia Negative side of Social meadia
Negative side of Social meadia
 
impact of social media on youth m.com ppt
impact of social media on youth m.com ppt impact of social media on youth m.com ppt
impact of social media on youth m.com ppt
 
Effects of social media on youth
Effects of social media on youthEffects of social media on youth
Effects of social media on youth
 
The influence media on young generation ppt
The influence media on young generation pptThe influence media on young generation ppt
The influence media on young generation ppt
 
EFFECTS OF SOCIAL NETWORKING
EFFECTS OF SOCIAL NETWORKINGEFFECTS OF SOCIAL NETWORKING
EFFECTS OF SOCIAL NETWORKING
 
impact of social media on youth
impact of social media on youthimpact of social media on youth
impact of social media on youth
 
What Is Social Media?
What Is Social Media?What Is Social Media?
What Is Social Media?
 
Social networking
Social networkingSocial networking
Social networking
 
Social Media
Social MediaSocial Media
Social Media
 
social network
social networksocial network
social network
 
Social media
Social mediaSocial media
Social media
 
Social Media
Social MediaSocial Media
Social Media
 
Social Media
Social MediaSocial Media
Social Media
 
A presentation on social networking sites
A presentation on social networking sitesA presentation on social networking sites
A presentation on social networking sites
 
social media
social mediasocial media
social media
 
Impact of social media on teenagers- Presentation
Impact of social media on teenagers- PresentationImpact of social media on teenagers- Presentation
Impact of social media on teenagers- Presentation
 
Social networking ppt
Social networking pptSocial networking ppt
Social networking ppt
 
Advantages and Disadvantages Of Social Media
 Advantages and Disadvantages Of Social Media Advantages and Disadvantages Of Social Media
Advantages and Disadvantages Of Social Media
 
Social media
Social mediaSocial media
Social media
 

Similaire à Social Media Awareness

EFFECTS OF SOCIAL MEDIA ON YOUTH
EFFECTS OF SOCIAL MEDIA ON YOUTHEFFECTS OF SOCIAL MEDIA ON YOUTH
EFFECTS OF SOCIAL MEDIA ON YOUTHYaman Singhania
 
week 1 Day 2 Power of Media and Information Literacy.pptx
week 1 Day 2 Power of Media and Information Literacy.pptxweek 1 Day 2 Power of Media and Information Literacy.pptx
week 1 Day 2 Power of Media and Information Literacy.pptxdanielloberiz1
 
social media presentation.pptx
social media presentation.pptxsocial media presentation.pptx
social media presentation.pptxRACHANAB18
 
Social media Risk Management Presentation Sample (Animations don't work in sl...
Social media Risk Management Presentation Sample (Animations don't work in sl...Social media Risk Management Presentation Sample (Animations don't work in sl...
Social media Risk Management Presentation Sample (Animations don't work in sl...Alexander Larsen
 
Security and Privacy in Social Networks.pptx
Security and Privacy in Social Networks.pptxSecurity and Privacy in Social Networks.pptx
Security and Privacy in Social Networks.pptxSIMNchannel
 
Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235brendaylo
 
Safeguarding Your Online Presence_ Social Media Cybersecurity Tips.pdf
Safeguarding Your Online Presence_ Social Media Cybersecurity Tips.pdfSafeguarding Your Online Presence_ Social Media Cybersecurity Tips.pdf
Safeguarding Your Online Presence_ Social Media Cybersecurity Tips.pdfCIOWomenMagazine
 
Social media privacy threats that you need to keep an eye on in 2021
Social media privacy threats that you need to keep an eye on in 2021Social media privacy threats that you need to keep an eye on in 2021
Social media privacy threats that you need to keep an eye on in 2021Impulse Digital
 
Social Media Safety Presentation
Social Media Safety PresentationSocial Media Safety Presentation
Social Media Safety PresentationLJ Henshell
 
Social Media & Enterprise Security Whitepaper
Social Media & Enterprise Security WhitepaperSocial Media & Enterprise Security Whitepaper
Social Media & Enterprise Security WhitepaperSchleighS
 
Security in social network araceli&arlethe
Security in social network araceli&arletheSecurity in social network araceli&arlethe
Security in social network araceli&arlethetecnologico de tuxtepec
 
By Sandeep Rotte(545081).Praveen Komma( 544549).Management I.docx
By Sandeep Rotte(545081).Praveen Komma( 544549).Management I.docxBy Sandeep Rotte(545081).Praveen Komma( 544549).Management I.docx
By Sandeep Rotte(545081).Praveen Komma( 544549).Management I.docxRAHUL126667
 
Privacy and social media
Privacy and social mediaPrivacy and social media
Privacy and social mediaAbirAhmed48
 
Social media ppt
Social media pptSocial media ppt
Social media pptLeadMillion
 
advantagesanddisadvantagesofsocialmedia-151211192046.pdf
advantagesanddisadvantagesofsocialmedia-151211192046.pdfadvantagesanddisadvantagesofsocialmedia-151211192046.pdf
advantagesanddisadvantagesofsocialmedia-151211192046.pdfRinkiSharma51
 
advantagesanddisadvantagesofsocialmedia-151211192046.pptx
advantagesanddisadvantagesofsocialmedia-151211192046.pptxadvantagesanddisadvantagesofsocialmedia-151211192046.pptx
advantagesanddisadvantagesofsocialmedia-151211192046.pptxHimabindu905359
 
Social networking boon or a bane
Social networking boon or a baneSocial networking boon or a bane
Social networking boon or a baneAbhishek Sharma
 

Similaire à Social Media Awareness (20)

Social media: Issues
Social media: Issues Social media: Issues
Social media: Issues
 
EFFECTS OF SOCIAL MEDIA ON YOUTH
EFFECTS OF SOCIAL MEDIA ON YOUTHEFFECTS OF SOCIAL MEDIA ON YOUTH
EFFECTS OF SOCIAL MEDIA ON YOUTH
 
week 1 Day 2 Power of Media and Information Literacy.pptx
week 1 Day 2 Power of Media and Information Literacy.pptxweek 1 Day 2 Power of Media and Information Literacy.pptx
week 1 Day 2 Power of Media and Information Literacy.pptx
 
social media presentation.pptx
social media presentation.pptxsocial media presentation.pptx
social media presentation.pptx
 
Social media Risk Management Presentation Sample (Animations don't work in sl...
Social media Risk Management Presentation Sample (Animations don't work in sl...Social media Risk Management Presentation Sample (Animations don't work in sl...
Social media Risk Management Presentation Sample (Animations don't work in sl...
 
Social Networking
Social NetworkingSocial Networking
Social Networking
 
Security and Privacy in Social Networks.pptx
Security and Privacy in Social Networks.pptxSecurity and Privacy in Social Networks.pptx
Security and Privacy in Social Networks.pptx
 
Sociial media
Sociial media Sociial media
Sociial media
 
Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235
 
Safeguarding Your Online Presence_ Social Media Cybersecurity Tips.pdf
Safeguarding Your Online Presence_ Social Media Cybersecurity Tips.pdfSafeguarding Your Online Presence_ Social Media Cybersecurity Tips.pdf
Safeguarding Your Online Presence_ Social Media Cybersecurity Tips.pdf
 
Social media privacy threats that you need to keep an eye on in 2021
Social media privacy threats that you need to keep an eye on in 2021Social media privacy threats that you need to keep an eye on in 2021
Social media privacy threats that you need to keep an eye on in 2021
 
Social Media Safety Presentation
Social Media Safety PresentationSocial Media Safety Presentation
Social Media Safety Presentation
 
Social Media & Enterprise Security Whitepaper
Social Media & Enterprise Security WhitepaperSocial Media & Enterprise Security Whitepaper
Social Media & Enterprise Security Whitepaper
 
Security in social network araceli&arlethe
Security in social network araceli&arletheSecurity in social network araceli&arlethe
Security in social network araceli&arlethe
 
By Sandeep Rotte(545081).Praveen Komma( 544549).Management I.docx
By Sandeep Rotte(545081).Praveen Komma( 544549).Management I.docxBy Sandeep Rotte(545081).Praveen Komma( 544549).Management I.docx
By Sandeep Rotte(545081).Praveen Komma( 544549).Management I.docx
 
Privacy and social media
Privacy and social mediaPrivacy and social media
Privacy and social media
 
Social media ppt
Social media pptSocial media ppt
Social media ppt
 
advantagesanddisadvantagesofsocialmedia-151211192046.pdf
advantagesanddisadvantagesofsocialmedia-151211192046.pdfadvantagesanddisadvantagesofsocialmedia-151211192046.pdf
advantagesanddisadvantagesofsocialmedia-151211192046.pdf
 
advantagesanddisadvantagesofsocialmedia-151211192046.pptx
advantagesanddisadvantagesofsocialmedia-151211192046.pptxadvantagesanddisadvantagesofsocialmedia-151211192046.pptx
advantagesanddisadvantagesofsocialmedia-151211192046.pptx
 
Social networking boon or a bane
Social networking boon or a baneSocial networking boon or a bane
Social networking boon or a bane
 

Plus de Dr Raghu Khimani

Tracing An IP Address or Domain Name by Raghu Khimani
Tracing An IP Address or Domain Name by Raghu KhimaniTracing An IP Address or Domain Name by Raghu Khimani
Tracing An IP Address or Domain Name by Raghu KhimaniDr Raghu Khimani
 
Mobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu KhimaniMobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu KhimaniDr Raghu Khimani
 
Guideline for Call Data Record Analysis by Raghu Khimani
Guideline for Call Data Record Analysis by Raghu KhimaniGuideline for Call Data Record Analysis by Raghu Khimani
Guideline for Call Data Record Analysis by Raghu KhimaniDr Raghu Khimani
 
Investigative Tools and Equipments for Cyber Crime by Raghu Khimani
Investigative Tools and Equipments for Cyber Crime by Raghu KhimaniInvestigative Tools and Equipments for Cyber Crime by Raghu Khimani
Investigative Tools and Equipments for Cyber Crime by Raghu KhimaniDr Raghu Khimani
 
Digital Evidence by Raghu Khimani
Digital Evidence by Raghu KhimaniDigital Evidence by Raghu Khimani
Digital Evidence by Raghu KhimaniDr Raghu Khimani
 
Introduction to Cyber Crime
Introduction to Cyber CrimeIntroduction to Cyber Crime
Introduction to Cyber CrimeDr Raghu Khimani
 
Introduction to Toxicology and Forensic Toxilogical Examination and it's sign...
Introduction to Toxicology and Forensic Toxilogical Examination and it's sign...Introduction to Toxicology and Forensic Toxilogical Examination and it's sign...
Introduction to Toxicology and Forensic Toxilogical Examination and it's sign...Dr Raghu Khimani
 
Narcotic Drugs & Psychotropic Subtances
Narcotic Drugs & Psychotropic SubtancesNarcotic Drugs & Psychotropic Subtances
Narcotic Drugs & Psychotropic SubtancesDr Raghu Khimani
 
Analysis of illicit liquor including methyl & ethyl alcohol
Analysis of illicit liquor including methyl & ethyl alcoholAnalysis of illicit liquor including methyl & ethyl alcohol
Analysis of illicit liquor including methyl & ethyl alcoholDr Raghu Khimani
 
Examination of chemicals in trap cases
Examination of chemicals in trap casesExamination of chemicals in trap cases
Examination of chemicals in trap casesDr Raghu Khimani
 

Plus de Dr Raghu Khimani (14)

Tracing An IP Address or Domain Name by Raghu Khimani
Tracing An IP Address or Domain Name by Raghu KhimaniTracing An IP Address or Domain Name by Raghu Khimani
Tracing An IP Address or Domain Name by Raghu Khimani
 
Mobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu KhimaniMobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu Khimani
 
Guideline for Call Data Record Analysis by Raghu Khimani
Guideline for Call Data Record Analysis by Raghu KhimaniGuideline for Call Data Record Analysis by Raghu Khimani
Guideline for Call Data Record Analysis by Raghu Khimani
 
E mail Investigation
E mail InvestigationE mail Investigation
E mail Investigation
 
Investigative Tools and Equipments for Cyber Crime by Raghu Khimani
Investigative Tools and Equipments for Cyber Crime by Raghu KhimaniInvestigative Tools and Equipments for Cyber Crime by Raghu Khimani
Investigative Tools and Equipments for Cyber Crime by Raghu Khimani
 
Digital Evidence by Raghu Khimani
Digital Evidence by Raghu KhimaniDigital Evidence by Raghu Khimani
Digital Evidence by Raghu Khimani
 
Introduction to Cyber Crime
Introduction to Cyber CrimeIntroduction to Cyber Crime
Introduction to Cyber Crime
 
Precursor chemicals
Precursor chemicalsPrecursor chemicals
Precursor chemicals
 
Poisons
PoisonsPoisons
Poisons
 
Introduction to Toxicology and Forensic Toxilogical Examination and it's sign...
Introduction to Toxicology and Forensic Toxilogical Examination and it's sign...Introduction to Toxicology and Forensic Toxilogical Examination and it's sign...
Introduction to Toxicology and Forensic Toxilogical Examination and it's sign...
 
Narcotic Drugs & Psychotropic Subtances
Narcotic Drugs & Psychotropic SubtancesNarcotic Drugs & Psychotropic Subtances
Narcotic Drugs & Psychotropic Subtances
 
Analysis of illicit liquor including methyl & ethyl alcohol
Analysis of illicit liquor including methyl & ethyl alcoholAnalysis of illicit liquor including methyl & ethyl alcohol
Analysis of illicit liquor including methyl & ethyl alcohol
 
Examination of chemicals in trap cases
Examination of chemicals in trap casesExamination of chemicals in trap cases
Examination of chemicals in trap cases
 
Analysis of jaggery
Analysis of jaggeryAnalysis of jaggery
Analysis of jaggery
 

Dernier

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 

Dernier (20)

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 

Social Media Awareness

  • 1. SOCIAL MEDIA AWARENESS RAGHU KHIMANI CYBER CRIME EXPERT/ADVISOR BAHAUDDIN SCIENCE COLLEGE, JUNAGADH
  • 2. What comes to your mind when you hear Social Media?
  • 3.
  • 4. Objectives of the Presentation  Introduction of Social Media  Types of Social Media  Professional Uses of Social Media  Impact of Social Media  Negative side of Social Media  Cyber Bullying Safety Tips
  • 5. Introduction of Social Media  “Social media facilitate the development of online social networks by connecting a user's profile with those of other individuals and/or groups”.  Social Media use Web Based Technologies, Desktop computers and Mobile Technologies (Smartphones) to create highly interactive platforms through which individuals, communities and organization can Share, Create, Discuss and Modify user generated content posted online.
  • 6.  Some of the most popular social media websites are Facebook (and its associated Facebook Messenger), WhatsApp, Tumblr, Instagram, Twitter, Pinterest, LinkedIn, Google+, YouTube, Viber, Snapchat, Weibo and WeChat. These social media websites have more than 100,000,000 registered users.
  • 8. Professional Uses of Social Media
  • 9. Impact of Social Media  On March 12, 2016, the World Wide Web turned 27.  76% people think felt that it has been positive for society as whole.  Although many people enjoy the freedom and connection they feel from social media, it has also had a negative impact on the number of hours you spend in face-to-face relationships and has created a platform where sharing negative thoughts and feelings can be done in a nameless, faceless fashion. Social media networking has also had an amazingly positive impact on the distribution of information and acquiring help and support during natural disasters around the globe.
  • 10.  In 2014, Prime Minister Shri Narendra Modi successfully used social media to communicate his platform to the voting public. Since then, many Indian Politicians used social media platforms to communicate with their constituents and get feedback on their performance.
  • 11. Negative Side of Social Media
  • 12. One of the negative effect of social media or network is it leads to addiction. Spending countless hours on the social sites can divert the focus and attention from a particular task. Another downside of the social media is that the user shares too much information which may pose threats to them. Even with the tight security settings, your personal information may leak on the social sites. Downloading your videos or pictures and copying your status is an easy task and can be done within few clicks. Sometimes social media is time consuming too. Time we spend on social media is more then the time we spend for our family.
  • 13.
  • 14. Cyber Bullying Cyber Bullying or Cyber Harassment is a form of bullying or harassment using electronic forms of contact. Harmful bullying behaviour can include posting rumours about a person, threats, negative remarks, disclose victims' personal information etc..
  • 16. In India there are several strict bullying in the workplace laws and regulations levied by the legal system. These laws are supposed to address all types of workplace harassment including discrimination (ભેદભાવ), sexual nuisance and psychological irritation caused by the employer. Section 66 A of The Information Technology Amendment Act 2008, deals with the actions done through a computer or mobile device that are grossly offensive, insult, inconvenience, injure or ill will against the person it is directed at. Punishment for sending offensive messages through communication service - shall be punishable with imprisonment for a term which may extend to three years and with fine.
  • 17. Safety Tips Use a strong password: The longer it is, the more secure it will be. The strong password contains a minimum of 12 characters. (Incl. Capital Alphabets, Small Alphabets, Numerical & Symbols). Unique account, Unique password: Use a different password for each of your social media accounts. (For ex. Different for Facebook, Twitter, LinkedIn, Google+, Pinterest, G-Mail, etc…) Set up your security answers. The two factor authentication is available for most social media sites. If you have social media apps on your phone, be sure to password protect your device.
  • 18. Be selective with friend requests. If you don’t know the person, don’t accept their request. It could be a fake account. Click links with caution. Social media accounts are regularly hacked. Look out for language or content that does not sound like something your friend would post. Beware of TMI (Too Much Information): Be careful about what you share. Don’t reveal sensitive personal information i.e.: birth date, home address, financial information, phone number, etc. The more you post, the easier it is to have your identity stolen. Once posted, always posted: Protect your reputation on social networks. What you post online stays online. Think twice before posting pictures you wouldn’t want your parents or future employers to see.
  • 19. Become familiar with the privacy policies of the social media channels you use and customize your privacy settings to control who sees what. Protect your computer by installing antivirus software to safeguard. Also ensure that your browser, operating system, and software are kept up to date. Remember to log off when you’re done. Sites can use your Information: Social network sites are typically free to use which means they are making their money by advertising to you. And that means they are collecting information about you. Is your information shared with outside companies and partners? What information can third-party plug-in software, such as Facebook Applications, use from your profile or page content? Review the site’s privacy policy and watch closely the privacy settings you can control.
  • 20. Search yourself: It is a good idea to search your name on Google and check out your profile as others see it on social networking sites. Know what action to take: If someone is harassing or threatening you, remove them from your friends list, block them and report them to the Police or Cyber Crime Cell.