42
Security and Social Media Jean-Paul Rains & Matthew Melnyk Rains Media 1

Security and social media

Embed Size (px)

DESCRIPTION

This is a presentation delivered by Rains Media. The focus is on social media within the realm of campus security.

Citation preview

Page 1: Security and social media

Security and Social MediaJean-Paul Rains & Matthew Melnyk

Rain

s M

edia

1

Page 2: Security and social media

Presentation Overview

• The 17-30 year old quagmire that is your students• How to communicate in an emergency•Why social media is the new Sherlock

Holmes• The inherent risk in participating

Rain

s M

edia

2

Page 3: Security and social media

Key Takeaways

• Better understand your population• Have a multi-channel approach to

communicating information across Social Media channels• Online resources that will aid in the

investigation process• Understand the dangers faced by users

Rain

s M

edia

3

Page 4: Security and social media

Understanding the student populationAn anthropological/technological dichotomy – Where they are coming from and who they are.

Rain

s M

edia

4

Page 5: Security and social media

Millennials – Generation Y • Born from 1980-2000• The children of the boomers • The most educated generation • Impacted by technology• Grown up digital

Rain

s M

edia

5

Page 6: Security and social media

Millennials Explored• The most connected generation• 83% will sleep next to their cell phones₁• 90% use the internet occasionally (79% of Boomers)• 75% have a social networking profile₂• 62% use wireless internet away from home• 20% post videos of themselves online• Visit a social networking site 3 times more than Boomers Ra

ins

Med

ia

6

Page 7: Security and social media

Millennials Explored• 88% use cell to text• 80% texted in last 24 hours₁• 64% text while driving• 41% do not have a landline• 59% of news comes from Internet • 14% are on Twitter

Rain

s M

edia

7

Page 8: Security and social media

The high school class of 2011

•More than phones• 90+% of teens carry cell phones• 57% of teens claim that cell phones actually improve their lives

• Cell phones are second only to clothes when it comes to presenting social status

• 80% carry a phone for security• Teens text 5x more than adults, and 47% can text with their eyes

closed Rain

s M

edia

8

Page 9: Security and social media

Within higher education• Professors and Teachers

• Gloria Gadsden - East Stroudsburg University • "Does anyone know where I can find a very discrete hitman? Yes,

it's been that kind of day..."• "had a good day today, DIDN'T want to kill even one student :-).

Now Friday was a different story." • Only had 32 friends on facebook, none of which were students

• June Talvitie-Siple• Described students as"germ bags" and school parents as "snobby"

and "arrogant." • Only 50 friends on facebook, none of which were students

• Ashley Payne – High school teacher• Asked to resign over facebook pictures of her drinking alcohol on

vacation

Rain

s M

edia

9

Page 10: Security and social media

Within higher education• Students

• Chris Avenir – Ryerson Student• Faced 147 counts of academic misconduct for creating facebook

study groups, and was expelled.• Avenir sued Ryerson for $10million in response • Ruling overturned, and Avenir received a passing grade and was not

expelled.• Keith and Steven Pridgen – University of Calgary students

• Were punished for making disparaging remarks about a professor on their facebook statuses

• Went to the supreme court and won, under the Charter of Rights and Freedoms.

• Tony Harris – Calvin College Student• Allegedly made disparaging remarks about an ex-girlfriend on

facebook and was reprimanded under the technology and conduct codes.

Rain

s M

edia

10

Page 11: Security and social media

Communicating in an emergencyThe shotgun approach.

Rain

s M

edia

11

Page 12: Security and social media

Communicating in an emergency• Existing and past strategies• Handling the social panic• Evolving Best Practices• Multichannel approach to messaging• Recommendations

12

Rain

s M

edia

Page 13: Security and social media

Strategies to communicate• Audience question: how do you typically communicate

emergency information• E-Mail BLAST • Text Message• Website update• Radio and Television updates• Broadcast telephone message• The bat signal• The telephone game

13

Rain

s M

edia

Page 14: Security and social media

The social panic• “There will be a live photo shoot in the cafeteria”• “Live photo shoot in cafeteria”

• “Live shoot in café”

• How quickly bad news can spread• Herding cats• The importance of a simple unified message

14

Rain

s M

edia

Page 15: Security and social media

Evolving best practices• uWestern’s Experience • YorkU’s Experience

15

Rain

s M

edia

Page 17: Security and social media

Multi-channel communication• How do you reach your diverse audiences?

17

Rain

s M

edia

Land

Sea

Air

Page 18: Security and social media

Multi-channel communication

18

Rain

s M

edia

Page 19: Security and social media

Multi-channel communication

19

Rain

s M

edia

Page 20: Security and social media

Multi-channel communication

20

Rain

s M

edia

• Brock U’s Labour Negotiations

Page 21: Security and social media

Multi-channel communication

21

Rain

s M

edia

• Brock U’s Labour Negotiations

Page 22: Security and social media

Recommendations• Identify the kind of message• Emergency• Informational• Awareness campaign

• Identify the messenger• Marketing & communications• Facilities management• Residence, Student Services, Parking, etc…

• Automate where possible• Scheduled e-mails• Tweetdeck, Hootsuite, etc.

• Cross promote 22

Rain

s M

edia

Page 23: Security and social media

Recommendations• Social media may be a great way to get the message out, but

more importantly it is the BEST way to steer the discussion after the initial information.• Brock University Student Union’s #nostrike hash tag• Information void can lead to speculation and misinformation

• One communication tool (internet, phone lines, etc.) being down, does not mean all are.• Japan Earthquake:

• Twitter used to located loved ones• Cell Towers operational in places where nothing else was• News spread faster than traditional media by hours

23

Rain

s M

edia

Page 24: Security and social media

The new Sherlock Holmes.Even more elementary, Watson.

Rain

s M

edia

24

Page 25: Security and social media

Using Social Media to investigate• Tools of the trade• Legal implications• Perceived privacy differentials• Policy Generation

25

Rain

s M

edia

Page 26: Security and social media

Tools of the trade• www.youropenbook.com

26

Rain

s M

edia

Page 27: Security and social media

Tools of the trade• Public Facebook Listings

27

Rain

s M

edia

Page 28: Security and social media

Tools of the trade• Twitter

28

Rain

s M

edia

Page 29: Security and social media

Tools of the trade• www.icerocket.com

29

Rain

s M

edia

Page 30: Security and social media

Tools of the trade• www.icerocket.com

30

Rain

s M

edia

Page 31: Security and social media

Legal Implications• Anything posted to the internet is a legal document• Even under privacy settings or posted anonymously

• You can never take back a post• These posts can be deleted after being posted, but they are not

gone• Multiple insurance companies list Facebook evidence • Growing trend in education to use social media to investigate• No more need for testimonials, just their news feed

31

Rain

s M

edia

Page 32: Security and social media

Perceived privacy• Facebook privacy• Living in a Twitter bubble• Unprotected Tweets• Retweets

• Anonymous names • IP addresses don’t lie, generally.

• You may not think you are on the web…• Picasa’s Facial Recognition software• http://Face.com

32

Rain

s M

edia

Page 33: Security and social media

Policy Generation• What goes into a good policy• Driven through guidelines and best practices• Created in part by the community (ad-hoc committee)• Buy-in from administration is key• Open and honest

33

Rain

s M

edia

Page 34: Security and social media

External Policy• Laurentian University will remove comments that:

Rain

s M

edia

34

Page 35: Security and social media

The dangers abound.Perceived dangers and apparent dangers.

Rain

s M

edia

35

Page 36: Security and social media

Safety Risks and Hazards• Online Bullying• Sexual Harassment• Identity Theft

36

Rain

s M

edia

Page 37: Security and social media

Online Bullying• Facebook’s increasing role• Increasing presence in France • Vancouver Sun article

• The power of annonymous posts

• What can we do about it? • Reporting structure increasingly changing• Largely routed in younger students

37

Rain

s M

edia

Page 38: Security and social media

Sexual Harassment• Sexual Harassment• What if I ALWAYS like your photos?• Poking, messaging, and creeping.• Releasing/posting private content.

• Power of anonymity • www.likealittle.com • Students across North America• Anonymous flirting and invitations

38

Rain

s M

edia

Page 39: Security and social media

Constant information gathering• Stalking• Facial recognition software• Please Rob Me

39

Rain

s M

edia

Page 40: Security and social media

Information gathering

• Geo-tagged Photos• Any camera with a gps may tag photos with EXIF data• Hidden files on Iphones and others• Programs like ‘Creepy’

40

Rain

s M

edia

Page 41: Security and social media

Identity Theft• Ability to gather information• Birthdate• Mother’s maiden name

• Search pictures, mother appears tagged with maiden name• Last four digits of home phone number• Secret question

• Pet’s name• Hometown• High school

41

Rain

s M

edia

Page 42: Security and social media

Scenarios, Discussion, and Questions Ra

ins

Med

ia

42