Category Archives: Uncategorized

  • 5

Parenting in the Cyber Age: A Parents’ Guide to Safer Social Networking

Category:Cyberstalking,Facebook,Infosec Communicator,Internet Safety,Privacy,Risk,Social Networking,Uncategorized Tags : 

At the computer
Are you as a parent worried about what your kids may encounter online? Are you unsure of how they or you can stay safe online when using social networking sites?  Although our kids are now college grads, we had the same concerns about the dangers our kids faced online as most of you do.

In my professional life, I’m a technical communicator at a large private technology university. I am responsible for making staff and students aware of information security issues—a role which has probably made me even more paranoid about the dangers out there on the Internet!

I’ve also had the opportunity to take part in a few K-12 Cyber Security Awareness initiative that gave me an opportunity to talk to teachers and parents about online issues and listen to their questions and concerns. I’ll address some of these concerns in this post. I am also interested in what you would like to know about security issues, so please comment on this post.

Oh…one other thing…my goal is to make this topic understandable for the average layperson. You do not need to be a technology expert to learn how to stay safe online and to keep your kids safe!

Social Networking Concerns

In the last several years, teens and young adults have flocked to social networking sites or blogging sites, such as MySpace and Facebook. This has given them opportunities to meet and communicate with people of similar interests, share information, gather numerous “friends,” share pictures and videos, and even discuss important issues. (Most of these social networking sites are inappropriate for preteens. Although most social networking sites require members to be at least 13, enforcement is next to impossible.)

Risks and Preventive Measures

Sharing Private information—It is extremely easy for unscrupulous people to gain access to you and your children’s private information. When your kids use social networking sites, read the site’s privacy policy. It tells you what information the owners of the web site collect, and how they intend to use it. Make sure that you and your kids understand how that information may be shared.

Profiles—Encourage your kids to guard their information. Keep private information private. Ask them to restrict access to their profiles, when possible, to “friends only.”

You may find that it’s hard for teenagers to take this seriously and understand the risks. Help them choose screen names carefully. Help them choose a reasonably “complex” password—at least 8 characters using a combination of upper and lower case letters, numbers, and symbols (when allowed).

Blogs—Encourage your kids to not share personal information, including their ages, schools, addresses, phone numbers, and parent and sibling names. Make sure they’re not posting information about their social plans. (Don’t give someone who is cyber stalking them information about where they’ll be at a given time.)

Moderating Comments—Ask your kids to approve comments by their friends before they allow them to be posted. Their friends may be less than careful with both their own and your kids’ information.

Inappropriate language and pictures—College admissions offices and potential employers search online to see what kind of information prospective students and employees post online, especially in social networking sites. If they see what appear to be “character issues” portrayed, your teens may not be accepted for their college or job of choice.

Making themselves a target—People can pose as anybody online. That 15-year-old friend might be a 45-year-old male looking for “company.” Sexual predators use social networking sites to identify and engage potential victims. Identity thieves look for private information to use to gain access to victim’s bank accounts or credit.

It’s forever—There is another big problem most of us do not think about. Information we post online NEVER really goes away. Even when you delete a blog entry or a picture, it is “cached” somewhere on the Internet. There are sites on the Internet that specialize in archiving other Web sites.

What you can do

  1. Talk to your kids.
  2. Ask them to help you set up your own profile and page on the same sites they use.
  3. Subscribe to their blogs and read what they are posting.
  4. Respond to their posts.
  5. Look at the pictures they have chosen to share.
  6. Find out who their friends are and see what kind of information they share.
  7. If you have a family computer, try to put it in an open area where you can see your kids’ online activities.
  8. If your family has multiple computers sharing an internet connection through a router, you may want to consider restricting the times their computers can connect to the Internet. Restricting access to reasonable hours helps ensure that they (or you) are not spending all night online.

My philosophy as a parent has been to teach my children how to interact with the world while maintaining their spiritual values. Despite your best efforts, your children are going to encounter these dangers at some time. In my experience, you cannot prevent them from doing something they are intent on doing.

Let’s make sure they know how to protect themselves now, before they’re in an environment where we aren’t there to supervise or teach these lessons.

An earlier version of this article was published previously in Christian Computing Magazine.
Enhanced by Zemanta

  • 11

Unpacking My Takeaways from #STC11

Category:Infosec Communicator,STC,STC Rochester,Summit,techcomm,Uncategorized Tags : 

Open SuitcaseIt’s been a little less than two weeks since the Society for Technical Communication Summit in Sacramento ended. Summit was an intensive four day immersion in the multifaceted profession of technical communications. I wanted to share what I found really important about the event, before the memories fade. I’ll start unpacking my takeaways here and in future posts.

I hope you’ll take the opportunity to discuss what I’m unpacking and share what you unpacked when you got home by commenting on this post!

Here’s my Top Ten list of takeways:

  1. The strength (and pride) of STC lies in its communities. Over the last few years there have been questions about the value that geographic chapters provide in an era when people are increasingly connected online. The Pacesetter Awards show that innovation comes from the grassroots level, whether from a geographic chapter or SIG. Some of the communities have done outstanding work in building and documenting solutions that can be applied across STC. For example, the Carolina chapter broke new ground in providing webinars for their geographically diverse membership and in partnering with Southeastern Michigan and Rochester to co-deliver online content.
  2. Relationships between communities bear fruit. STC recognized several chapters and SIGs with Community Achievement Awards and Pacesetter Awards. What I found interesting about the communities receiving the awards was that key leaders of these communities consulted with, counseled, mentored, and exchanged ideas with each  other. These awards aren’t a competition. The recipients found ways to build each other up during the year. My conversations with community leaders during the year sparked much of what the Rochester chapter accomplished and helped us move forward in unanticipated ways.
  3. STC will continue to move forward as it provides value, although with an increasingly new base. Although I believe membership is down slightly from last year, STC is operating in the black and is continuing to add new members. (Personally, I believe the tide has turned.) The launch of key initiatives such as certification and MySTC should have a continuing impact as we move forward.
  4. Twitter played (and will continue to play) a key role at Summit. Twitter was used in two chief ways at Summit: to tweet and retweet session content and to facilitate face-to-face networking opportunities. The Twitter stream using the #stc11 hashtag provided an easy way to find out what was happening. There were more than 5000 tweets associated with the #stc11 hashtag in less than a week. That’s a lot of communication.
  5. There are some really committed and capable people in and moving into community leadership. I’m very impressed with the earnestness and ability of the people I had the pleasure of meeting and talking with during Leadership Day and afterwards. I’ve only gotten to know the leadership of Toronto, Philadelphia, Carolina, and Southeastern Michigan at all well. What I’m seeing in those chapters is encouraging and demonstrates a desire to serve their members and to  strengthen STC as a whole. They’re not in it for their own glory. They’re in it to make us better.
  6. Leadership Day provides a foundation of knowledge and, more importantly, connections for new community leaders. I can’t overstress the importance of Leadership Day for the new and current leaders. Last year, I found the sessions explaining the intricacies of community leadership for new leaders absolutely critical to moving our chapter forward. This year I was able to participate in the progressions where community leaders shared their insights for success (and their struggles), providing sparks for new ideas and solutions for overcoming common, but vexing issues we face. Although I didn’t know it at the time, the connections I made at Leadership Day last year became my chief contacts in discussing issues and opportunities at the community level.
  7. MySTC can play a key role in strengthening community. MySTC provides a social networking platform on which members (and invitees) can share ideas, “friend” each other, create discussion and task groups, share photos and videos, and CONNECT with other members. We’re still figuring out how to use it. It’s not perfect, but it’s really great to have an easy way to connect with members outside and inside our current communities. The innovators among us will jump in and determine ways for us to work collaboratively.
  8. The vote on student membership rights at the business meeting was profound. Student members of STC were never enfranchised to vote in international elections, although their rights varied at the community level. The business meeting saw discussion and a vote on a proposed amendment to give them the vote. The proponents for student voting rights spoke passionately when presenting their arguments for passage of the student voting amendment. Opponents, although fewer, were articulate in their defense of the status quo. The amendment required a two-thirds vote of the members present. The amendment passed handily and the atmosphere in the room was charged. I did not expect the feeling of accomplishment we had when the amendment was approved.
  9. Certification may help the profession, especially by providing credentials for technical communicators who do not have degrees that relate clearly to the profession. I have degrees in anthropology, church history, and am ABD on my PhD in early modern European history. This is not obvious preparation for a career in technical communications. I was concerned about credentials so that I could get past initial screenings. Certification can provide credentials for those of us who have “non-standard” educational backgrounds.
  10. The content of the sessions at Summit was great. Isn’t it interesting that the content at Summit was the last thing I listed in my top ten? I enjoyed (and learned something in) almost all of the sessions I attended. However, for me the chief benefit of the conference was establishing and strengthening connections. These people are my techcomm tribe. They get it.
Enhanced by Zemanta

[twitter-follow screen_name=’benwoelk’ show_count=’yes’]


  • 2

How Much Does Facebook Know About You? The Two Facebook Dogs Revisited

Category:Facebook,Information Security,Infosec Communicator,Internet Safety,Privacy,techcomm,Uncategorized Tags : 
I attended RIT’s Faculty Institute for Teaching and Learning this week. Mark Greenfield, SUNY Buffalo, delivered a keynote on “Born to be Wired: Technology, Communication, and the Millennial Generation.” There was a lot of useful content, and I encourage you to follow Mark Greenfield on Twitter (@markgr) and check out his resources posted on Delicious.
Among the many things Mark discussed was the ongoing issue of Facebook privacy settings and how difficulty they are to administer properly. He shared Rob Cottingham’s recent Noise to Signal Cartoon with us.


Noise to Signal Cartoon

Rob Cottingham had done an earlier cartoon on the subject as well:

Rob Cottingham was inspired by the famous Peter Steiner cartoon.

Does any of this matter to you?

How much do you worry about how Facebook handles your information? When you post on Facebook, do you think about who might have access to your information? Have you given up on protecting your privacy online?

I can only wonder what the next cartoon will be.

Related Links



  • 9

Ten Ways to Shockproof Your Use of Social Networking Lightning Talk

Category:Cyberstalking,Facebook,Information Security,Infosec Communicator,Internet Safety,Presentations,Privacy,Risk,Social Networking,STC,Summit,Uncategorized Tags : 

I had the privilege of presenting my 25-minute presentation on Shockproofing Your Use of Social Media as a five-minute Lightning Talk at the STC Summit in Sacramento on May 18th.

Lightning talks introduce an additional element of stress for the presenters: the slides advance every 15 seconds whether they’re ready or not. Our audience was ~150 Summit attendees, so we were presenting to our peers as well.

It’s quite the experience sharing the stage with eight other presenters with totally different styles. Would I do it again? In a heartbeat!

Other STC Summit 2011 Lightning Talks

Enhanced by Zemanta

  • 20

Twitter Use at #STC11 Summit

Category:Infosec Communicator,Social Networking,STC,Summit,Uncategorized Tags : 

Last year, I kicked off this blog by posting about Twitter Use at the #STC10 Summit in Dallas. I thought it would be interesting to look at Twitter use at #STC11 as well.

Methodology

I’ve only analyzed results from May 13-21, 2011. However, use of the #STC11 hashtag occurred for months preceding this year’s Summit conference. (This is a departure from last year, when the use of tweets with the #STC10 hashtag started much later.) Because my Google RSS feed for #stc11 was unable to handle the volume of tweets this year, I relied on three sources for this post:

Graphical Portrayals of #STC11 Information

Wordle: #STC11 Summitb

Here’s a Wordle of the tweets containing the hashtag #stc11 from 5/13 through 5/21/11. If you’re unfamiliar with Wordle, it produces a wordcloud where the frequency of word usage determines the size of the words in the graphic.

Karen Mardahl*(@kmdk) began curating the #STC11 tweets in late April. The two graphics and lists below are taken from her archive.

#STC11 Tweets by User

#STC11 Tweets by User (from Karen Mardahl)

Top Twelve Twitter Handles (% Total Tweets)

  1. 9.55 % by torridence (Roger R.)
  2. 8.23% by techcom (Tony Chung)
  3. 7.88% by sushiblu (Jamie Gillenwater)
  4. 7.77% by bwoelk (Ben Woelk)
  5. 5.28% bytechcommdood (Bill Swallow)
  6. 4.89% by mojoguzzi (Joe Sokohl)
  7. 4.5% by rjhoughton (Rachel Houghton)
  8. 4.47% by stc_rochester (STC Rochester)
  9. 4.43% by RayGallon (Ray Gallon)
  10. 4.31% by willsansbury (Will Sansbury)
  11. 4.31% by afox98 (Alyssa Fox)
  12. 3.42% by ninjawritermama (Sarah Baca)

Selected Keywords (Occurrences)

Most-Commonly-Used-Words

Most Commonly Used Words (from Karen Mardahl)

  1. STCorg
  2. Techcomm
  3. STC11LD
  4. STC
  5. Summit
  6. &
  7. Session
  8. Content
  9. I’m
  10. Thanks

Observations

Again, contrary to some expectations, “beer” was not the most commonly used word in the tweets appearing only 13 times. (This was the same number of occurences as #stc10, but a much lower frequency.)

I’m not sure if there’s any correlation, but “karaoke” also appeared 14 times. The last two years have seen almost equal occurrences of beer and karaoke. Coincidence? I don’t think so!

Conclusions

Just like last year, Twitter provided a sense of community and a “conference within a conference.” Most tweets were positive, implying that many of the Twitter users enjoyed the conference.

I spent much of the conference meeting F2F with Tweeps gained from #stc10. If you’re not using Twitter at conference, I urge you to do so. You’ll find that it will create a new sense of comraderie with other Tweeters, and besides, that’s where all of the really cool STC people hang out!

I’ve curated the tweets into a 341-page MSWord document. This “raw” data is available upon request.

What are your thoughts and observations?

Ben

Postscript (5/28/11)

Vanessa Wilburn put together a more detailed analysis of the Twitter usage at #STC10. Her work focuses on the subject matter of the tweets. She found that after removing the “chitchat,” the twitter streams paralleled the key topics of the conference and that many of the tweets relayed content from or observations about specific sessions.


Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 2,235 other subscribers

Categories

Support Introverted Leadership on Patreon

Blubrry affiliate banner