tag:blogger.com,1999:blog-5961787139022097568.post8478931287073101519..comments2014-03-12T23:06:02.919-04:00Comments on Liebling Realized: Social Media Self-Defense: Not just a war-time activityAnonymoushttp://www.blogger.com/profile/14064843292459851673noreply@blogger.comBlogger20125tag:blogger.com,1999:blog-5961787139022097568.post-81001553465199939892014-03-02T14:56:56.849-05:002014-03-02T14:56:56.849-05:00Thanks Kait. While I wish those poor folks with t...Thanks Kait. While I wish those poor folks with the rich prince who passed away in Africa were actually in a position to send me funds, I'm not willing to put my information at risk. Anonymoushttps://www.blogger.com/profile/14064843292459851673noreply@blogger.comtag:blogger.com,1999:blog-5961787139022097568.post-60891060405804765822014-03-02T14:53:59.541-05:002014-03-02T14:53:59.541-05:00Thanks for visiting over from the Team 6 neighborh...Thanks for visiting over from the Team 6 neighborhood!Anonymoushttps://www.blogger.com/profile/14064843292459851673noreply@blogger.comtag:blogger.com,1999:blog-5961787139022097568.post-89140193848122123542014-03-02T14:52:54.385-05:002014-03-02T14:52:54.385-05:00Thanks for posting Susan.
In terms of determining...Thanks for posting Susan.<br /><br />In terms of determining where to draw the line, I think it becomes a really personal thing, which I guess is apropos for social media which is a very personal tool.<br /><br />For me, I post what I believe is relevant and interesting to me and I hope that those who follow me have some interest in it as well. My most used form of social media is Twitter. I like it as an information source and, I think, it actually best reflects you when you use it. You can't hide in 140 characters. The real you comes out because you have to work to make your point.<br /><br />In that work, I think, is where we each draw our own line.<br /><br />MikeAnonymoushttps://www.blogger.com/profile/14064843292459851673noreply@blogger.comtag:blogger.com,1999:blog-5961787139022097568.post-277931564042145452014-03-02T13:49:44.248-05:002014-03-02T13:49:44.248-05:00That kind of 'geo-tagging' social networki...That kind of 'geo-tagging' social networking seems to be a widespread issue now, beyond Foursquare. You can't post anything from your phone anymore without it broadcasting where exactly you are posting from. Invasion of privacy has become the norm and its up to you what you want to share on Twitter, LinkedIn, etc. It just take a lot more elbow grease to protect yourself through your own personal privacy settings.Anonymoushttps://www.blogger.com/profile/00854723357114103685noreply@blogger.comtag:blogger.com,1999:blog-5961787139022097568.post-38203485776730626642014-03-02T08:52:17.194-05:002014-03-02T08:52:17.194-05:00Hi Mike-
I really like the images you chose for th...Hi Mike-<br />I really like the images you chose for this post. They certainly say it all. <br /><br />Do you think the risks you speak of will forever be inherent in social media, or do you think advances will be made to better protect us online? It becomes a full time task, ensuring that our security settings are updated on all sites. I wonder if there will someday be one site whereconsumers can go to manage security across all platforms. I agree that we will never fully reach the “state” of security, but there should be an easier way of coordinating the effort.<br /><br />Apparently, HootSuite already offers such a service to organizations. Their “Managed Security and Compliance Services create a secure, complete environment for policy management and enforcement across an enterprise’s entire organization, protecting its brand and data against a full spectrum of security and compliance threats” (“HootSuite,” 2014). This is even more important for organizations in industries such as finance, healthcare and insurance, as well as those that are publically traded and require persistent monitoring of their brand reputation.<br /><br />You mention the permanence of online posts. It is mind boggling to consider how quickly and easily we can make a post to Twitter, for example, and how long we may feel its repercussions afterwards. <br /><br />You mention the conveniences we may have to sacrifice in order to ensure our security. The problem lies in striking that balance. How do we determine where do draw the line? <br /><br /><br />(2014, February 26). Hootsuite launches managed social media security & compliance service for enterprises. Retrieved from HootSuite website: http://media.hootsuite.com/hootsuite-managed-services/<br />Anonymoushttps://www.blogger.com/profile/17531802818671607820noreply@blogger.comtag:blogger.com,1999:blog-5961787139022097568.post-55171160827983941182014-03-01T23:02:30.630-05:002014-03-01T23:02:30.630-05:00That link is pretty eye-opening. Maybe we should b...That link is pretty eye-opening. Maybe we should be paraphrasing the golden rule -- post for others that which you would like them to post about you. <br /><br />I like your use of the word responsibility. "Being responsible" is the best chance we each have to secure communications of any kind. There are also different ways we need to be responsible. For ourselves, yes, but <br /><a href="http://articles.chicagotribune.com/2012-11-08/features/ct-tribu-social-media-voice-power-20121108_1_amyguth-and-scottkleinberg-social-media-media-tips-column" rel="nofollow">this Chicago Tribune article</a> talks about how social media users have a responsibilities to those they post with and about. To me, it was a good look at another aspect of social media use that I hadn't yet considered.<br /><br />Reference:<br /><br />Kleinberg, S. (Nov 8 2012). With great social media power comes great responsibility. <i>Chicago Tribune</i>. Chicago, IL: Tribune Media.Anonymoushttps://www.blogger.com/profile/14064843292459851673noreply@blogger.comtag:blogger.com,1999:blog-5961787139022097568.post-32097987211191584202014-03-01T22:38:30.649-05:002014-03-01T22:38:30.649-05:00If there was a media I would drop, it would be Fou...If there was a media I would drop, it would be Foursquare, but I never joined it in the first place. I always had a concern over how easily it would allow people to track where you are, where you've been, etc.<br /><br />Since I was never there, I will still try to answer the question. Of the ones I currently use, I would probably drop Facebook. My reasoning is that I use it the least (having only come back recently after having disabled my account in 2009 after 3 years of use) and find that many people do very little "serious" communicating there. It's great for personal-social use.<br /><br />I love Twitter, chiefly as an information resource, and I like LinkedIn which is growing its features and strengthening its service, I think. I would be loathe to give those use.<br /><br />MikeAnonymoushttps://www.blogger.com/profile/14064843292459851673noreply@blogger.comtag:blogger.com,1999:blog-5961787139022097568.post-5284931712302724122014-03-01T21:10:52.877-05:002014-03-01T21:10:52.877-05:00Michael,
I thought you did a great job covering th...Michael,<br />I thought you did a great job covering this weeks topics in an entertaining an interesting way. Not only was it visually appealing with the images and videos, the way it was written kept me interested through its entirety. I really like how you related the United States WWII campaign and the idea that "Loose Lips Sink Ships". Even though this was over 50 years ago, the idea still remains the same. Social media for personal or business use comes with a responsibility. You should always remember to post appropriate materials knowing that someone could always be watching. I also had no idea that the library of congress is archiving all tweets that are made by a U.S based account. I really have to think twice about what I post now. <br /><br />I'd also like to jump in the conversation about relating social media privacy to real-world communications. You wouldn't ever proclaim embarrassing information loudly to the world, so why do it over social media? Or maybe, you would? Here is actually a funny story about a writer who "live tweeted" a breakup that he was listening to on the roof of his apartment ( http://www.buzzfeed.com/regajha/this-guys-live-tweets-of-his-neighbors-break-up-are-hilariou ). You always have to be aware that someone can be listening in real=life or even watching while on social media!Anonymoushttps://www.blogger.com/profile/14538842130423384810noreply@blogger.comtag:blogger.com,1999:blog-5961787139022097568.post-63621866549071586502014-03-01T20:21:27.769-05:002014-03-01T20:21:27.769-05:00Like Nashrid, I've also been wary of Foursquar...Like Nashrid, I've also been wary of Foursquare - I'm not "mayor" material anyway LOL!<br /><br />I'm still a bit cautious of Twitter as it seems more free-flowing. Maybe it's my perception, but I just have this weird feeling that I'm able to manage the security of my account much better on Facebook.<br /><br />After reviewing our security discussion, I somewhat wary of LinkedIn because it lists your job history. How easy is it for hackers to use this information to build false profiles for identity theft? Just a thought.Anonymoushttps://www.blogger.com/profile/13116655140000694966noreply@blogger.comtag:blogger.com,1999:blog-5961787139022097568.post-10595241211603072972014-03-01T18:18:00.386-05:002014-03-01T18:18:00.386-05:00Funnily enough, soon after posting this, I overhea...Funnily enough, soon after posting this, I overheard some quite loud, embarrassing conversations at Barnes & Noble while I was trying to do my homework. Needless to say, some people should learn how to exercise better caution, privacy, and security in their real life conversations as well.<br /><br />In regards to Kait's question, I have always been wary of Foursquare. I have never seen the appeal of letting people know where I am at any given moment. The very idea of that one makes me a little uncomfortable, especially after this week's readings and seeing how geo-tagging can really be dangerous.Anonymoushttps://www.blogger.com/profile/00854723357114103685noreply@blogger.comtag:blogger.com,1999:blog-5961787139022097568.post-86803138445045535402014-02-28T09:39:18.988-05:002014-02-28T09:39:18.988-05:00Nash - Your example of "when we meet someone ...Nash - Your example of "when we meet someone at a coffee shop" reminds me of a College Humor video that illustrates some of the things you mention in that paragraph. It's called <a href="https://www.youtube.com/watch?v=tTN9We8unmU" rel="nofollow">"Twitter in Real Life."</a> Slightly unrelated to the discussion of privacy, but a good way to illustrate how absurd our musings on social networks can sometimes seem.<br /><br />Mike - Interesting commentary on braggadocian behavior. When I speak to my students about this behavior (I call it the Humble Brag), I let them know that while we are quick to criticize the behavior of others we may neglect to realize we participate in the behavior ourselves. I'm certainly guilty of this from time to time.<br /><br />Keeping Tara's commentary in mind, I'll ask all three of you: Considering this week's discussion of privacy, are there any social networks you currently use that you are now thinking twice about using? Kaithttps://www.blogger.com/profile/06147047638462381748noreply@blogger.comtag:blogger.com,1999:blog-5961787139022097568.post-52608691076871872062014-02-28T09:25:15.436-05:002014-02-28T09:25:15.436-05:00Good point! Many of the spammy URLs that we receiv...Good point! Many of the spammy URLs that we receive have strange construction. They also sometimes try to use familiar words - like Google, for example - but break them up strangely (Goo.gle or some such). <br /><br />The Microsoft article has great advice. I'd add: <br /><br />-If an email seems too good to be true (Please give us your bank account information so we can send you this million dollar inheritance!) it probably is... so don't click the link.<br />-If the link looks strange but comes from a friend (like Twitter DM spam), ask them if they sent it before clicking.<br /><br />Great work, Mike!Kaithttps://www.blogger.com/profile/06147047638462381748noreply@blogger.comtag:blogger.com,1999:blog-5961787139022097568.post-11181769967836735222014-02-28T00:33:27.495-05:002014-02-28T00:33:27.495-05:00Nashrid - great point about comparing how people c...Nashrid - great point about comparing how people cage their privacy in face-to-face scenarios vs. how freely some are to share personal information via social media tools. I think as end uses we tend to put faith in our account settings and trust that it will be secure enough, but as Mike noted there is a history of our posted entries being stored in a repository. We have also all heard or read the headlines about the security of these tools being compromised. <br /><br />It's funny, but reading this week's assignment makes me want to use social networking tools less. I realize that nothing is secure-proof, but boy does this shine a big bright light on some "watch-outs" that we should be paying attention. Great points guys!Anonymoushttps://www.blogger.com/profile/13116655140000694966noreply@blogger.comtag:blogger.com,1999:blog-5961787139022097568.post-57608847482670886652014-02-27T23:24:19.665-05:002014-02-27T23:24:19.665-05:00The embedded video made a rather dull topic very e...The embedded video made a rather dull topic very entertaining. Thanks for sharing!Anonymoushttps://www.blogger.com/profile/02782952219010817701noreply@blogger.comtag:blogger.com,1999:blog-5961787139022097568.post-10046926827334345812014-02-27T22:33:30.387-05:002014-02-27T22:33:30.387-05:00I too found ways to be more secure. One problem I...I too found ways to be more secure. One problem I think I have is that I like to socialize, meet new people, etc. In some ways, I'm probably the (harmless I hope) friendly stranger that I told my kids not to talk to. I simply like to interact. In doing that, though, I open myself up to the possibility of sharing too much information. <br /><br />In the comments somewhere else this week, Kait mentioned the "Braggodician Behavior" idea Qualman wrote about. I think he is right and wrong. <br /><br />Sometimes, people are trying to put themselves at the forefront, showing off what they do or where they are. They want to be part of the "cool kid" crowd.<br /><br />However, I think most of us, initially at least, only think about who is directly seeing it because we actually don't believe we are that important or interesting to the rest of the world. It's when that person who we didn't consider brings up to us our "braggodocious" display that we realize "our world" is even bigger than we thought.<br /><br />Thanks for commenting.<br /><br />MikeAnonymoushttps://www.blogger.com/profile/14064843292459851673noreply@blogger.comtag:blogger.com,1999:blog-5961787139022097568.post-17967078252037642912014-02-27T21:19:06.519-05:002014-02-27T21:19:06.519-05:00Good question. I probably haven't thought thi...Good question. I probably haven't thought this through as much as I should, but I think source is the biggest factor for me. If it is a link embedded in an email or a document, the identity and extent of my relationship with the person from whom I've received it is key.<br /><br />Also, the link address itself. Have you ever noticed the odd formation and construction are of many of the spam links we receive? If they used bit.ly links or something, they'd be even more successful. I suppose they don't use services like that because they'd then have to identify themselves with the URL services which leaves more of a trail. <br /><br />Microsoft offers some good advice on how to spot the scammers <a href="http://www.microsoft.com/security/online-privacy/phishing-symptoms.aspx" rel="nofollow">at this site</a>.<br /><br />Mike<br /><br />Anonymoushttps://www.blogger.com/profile/14064843292459851673noreply@blogger.comtag:blogger.com,1999:blog-5961787139022097568.post-23113964998630144452014-02-27T21:11:41.551-05:002014-02-27T21:11:41.551-05:00Social media in the college environment is pretty ...Social media in the college environment is pretty interesting. First, we've not had any of our accounts hacked. While I know if could happen at any point, our protocol is to change social media passwords quarterly so at least I have comfort that it is a moving target.<br /><br />As you might expect, many of our students are pretty experienced with social media when they get to us. We don't have specific social media workshops for them. Instead, during both freshmen and transfer orientation, social media best practices are brought up during discussions of time management, personal security, classroom decorum and general civility towards others on campus. Our thinking has been that, with the traditional college-aged student, social media has been a part of everyday life throughout their teenage years. Rather than separating social media out as a stand alone subject, we raise those issues in a variety of subject areas to reflect and mindful of how pervasive it is in all different aspects of their life. <br /><br />I'd be interested to hear whether people think that approach is sound or whether it should stand alone so please feel free to comment.<br /><br />During the personal security discussion is when they are introduced to our social media policy so they have a sense of what our expectations are, etc.<br /><br />MikeAnonymoushttps://www.blogger.com/profile/14064843292459851673noreply@blogger.comtag:blogger.com,1999:blog-5961787139022097568.post-38800769184227202662014-02-27T19:57:54.129-05:002014-02-27T19:57:54.129-05:00Hey Michael,
Great post. I love how you brought ...Hey Michael,<br /><br />Great post. I love how you brought up quite an old example about security from World War II and tied it in with today’s current social media security concerns. As I look through many of our classmates’ blogs and ponder the various concerns about identity theft and other potential security risks surrounding social media, it does strike me that the things we should be looking out for have been things we always have been looking out for.<br /><br />By this, I mean to say, we should always be wary of how we share information and interact with people in the real world. When we meet someone at a local coffee shop, we will rarely say an incredibly loud, offensive joke that your friend might get but those sitting next to you would not. When making a purchase, we wouldn’t flagrantly pull out our social security number or credit card number so easily as to make it viewable to anybody who passes by. We are often wary of strangers that may be too interested in our business and tell our children not to talk to them. The Internet is basically structured the same way. Then, why are we more comfortable about sharing so much of ourselves on our social networks in ways that we wouldn’t have previously? Social media only heightens the dangers and makes it easier to make these ‘real world’ mistakes.<br /><br />I love that you bring up the fact that every one of our tweets are being archived by the Library of Congress. It certainly makes one think twice before tweeting that one dopey joke you have to get out there knowing it will sit beside some of the greatest classic pieces of American literature and art for all eternity. The social web is a strange kind of digital permanence that will save and take in any and all information and the person who put it there has no idea what forms and shapes it can take, even if they ‘delete’ it.<br /><br />Security and privacy have come to the forefront in the debate about social media and the way we use it. With all of these tips in mind, do you practice secure social web browsing? Even as I wrote up my blog, I discovered ways that I could improve and secure my information. Was there anything you found while doing research for your post that has made you change a certain behavior or way you post on your social network?Anonymoushttps://www.blogger.com/profile/00854723357114103685noreply@blogger.comtag:blogger.com,1999:blog-5961787139022097568.post-6925789293751159862014-02-26T15:02:34.984-05:002014-02-26T15:02:34.984-05:00Mike,
I'll be honest - I was not aware that t...Mike,<br /><br />I'll be honest - I was not aware that the Library of Congress is archiving tweets, so thanks for sharing!<br /><br />You suggest that readers be wary of URLs, which is a great tip; I've received several Direct Messages on Twitter that include URLs that are actually phishing scams. One of your suggestions is to only use hyperlinks you trust. What makes a hyperlink trustworthy, especially for people using social media for information discovery? <br /><br />KaitKaithttps://www.blogger.com/profile/06147047638462381748noreply@blogger.comtag:blogger.com,1999:blog-5961787139022097568.post-54746939614642000002014-02-26T13:14:55.745-05:002014-02-26T13:14:55.745-05:00Mike,
I like your ship metaphor - great summary ...Mike, <br /><br />I like your ship metaphor - great summary of privacy. I'm going to piggyback on two important points you brought to the forefront because you expanded my thought process on them:<br /><br />1. Use Bookmarks...or URL be sorry (nice play on URL by the way) - For this point you discussed phishing scams where you think you are logging into Facebook, but it's really a phony site. In addition to phony sites, it's important to keep in mind that using public wi-fi or computer stations (i.e. European internet cafes) can be another threat. So, while you may be logging into the real site, proceed with caution because users often allow the computer/site to remember their password by careless error. Programs such as cookies can be used by hackers to access your accounts. Me personally, I tend to not log into things like bank accounts or email when using someone's wi-fi because you just don't know what their security settings are or who is lurking.<br /><br />2. Be mindful of location preferences - To add on to your point, many of us have commented on refraining from using FourSquare or tagging ourselves at specific locations, but another thing to consider is turning off your location setting in your accounts and/or phone. Even if you are adding a post to Facebook and didn't check in to a location, it may stamp where you were when you posted and the time. That's enough information for lurkers to work with.<br /><br />You mentioned in prior posts that you work at a college and utilize social media to communicate with students. Besides providing best practices on what content to and not post, do you also provide education to your students about social media risks and safety? Also, have you experienced issues where the school's Facebook or Twitter account was compromised. If so, how did you mitigate the issue?<br /> Anonymoushttps://www.blogger.com/profile/13116655140000694966noreply@blogger.com