際際滷

際際滷Share a Scribd company logo
The  Karma  of Sharing Information over the Web! Sankaranand www.sankaranand.com
Information! What is it ? is specific and organized for a purpose. has been verified to be accurate and timely lead to an increase in understanding and decrease in uncertainty.
Information Technology ? the branch of engineering that deals with the use of computers and telecommunications to retrieve and store and transmit information
Social Media A platform that allows the creation and exchange of user-generated content Mostly Web-based applications Wikis, Forums, Blogs, Micro blogs, Social Network Aggregation
The Evolution
Web one point zero  (web 1.0) Information Portal Directories HTML, GIF, Framesets, Html Forms Eg. Geocities, First version of Hotmail, Static Company pages
Web two point zero  (web 2.0) Platform Rich Internet Applications Service Oriented Architecture Introduction of Social Web Eg. Facebook, Gmail, Youtube, Flickr
Web three point zero  (web3.0) The Semantic Web Computer understand the Web Artificial Intelligence Personalization We track you and give you want ever you want!
Information Sharing One-to-one exchanges of data between a sender and receiver is past Standing Sharing Protocols Data harmonization Improved Privacy and Security XML, SOAP, WDSL
Our  Karma  over Information Sharing Revealing personal information Unclean Email Address Strangers-Just Met Acquaintances  Not aware of Monitoring Falling in Pits of Scam, Phising Not Conscious of Web Security Not Deciding what to reveal Not using Encryption Home Security Not Monitoring your Cookies Digital Rights
Revealing  personal  information
Best Example is  Facebook
Private  Photos Made  Public
Adding  Strangers I got  5000  Friends in Facebook , what about you ? Take Social Networking serious and add friends like in your real life. Create and Manage Friend lists
Managing Friend lists in Facebook
Dont fall for that  girly  profile! Boys  using Fake Girl profile are more appealing than an average girls profile Dont fall over their Pit, Be a Man ! Girls  be protective and secure your photos! Tweak around Facebook settings
Fake Profile   they are not who they are!
Facebook Link Scam
Clean  Em @ il  Address Two Email Address One for Newsletters and Commercial signups One for Personal / Work Use short-term disposable mails  eg. Mailnator.com
Wow, You are a  millionaire  $$$  There is no lottery announcement in Emails Phishing Scams Dont even expect a penny for free from Web Ignore the SMS Scams too There is no victoria who wants to transfer her funds to your account Just Ignore them All!!!!!
HSBC Bank Phising Mail
Be Conscious of Web Security Submitting Financial Information Use Secure Connection   https:// Latest Browser Update your Antivirus & use a Firewall Monitor Network Connections Strong password  -> upper + lowercase + symbols + numbers !
Best Practices  Public Computer Dont use it for Financial Transaction Use a secure and latest browser Be aware of any keyloggers / Monitoring Apps Stay away from the prey eyes Keep a checklist of Things Clear cookies and Cache
Best Practices  Personal Computer Clear your Internet History Update your OS, Anti-virus Use Legit Software Stop Downloading Pirates & Torrents Use Linux  Its completely Free, Secure and Powerful. You have a wide flavors to choose from.
Recommend Apps CCleaner- Clear junk files from system Avast, Microsoft Security Essentials, Avg  Free Antivirus Hotspot  Privacy and Proxy Browsing Lastpass  One Ultimate tool for Password Management.
油
Digital Content Copyright Understanding Creative Commons  A tool for Creators, Content Sharing, Publishers Standardized way to keep their copyright simple Provides various kind of License which you can obtain at  http://creativecommons.org
Which is my flavor ?
Attribution CC BY  to Share   to copy, distribute and transmit the work to Remix   to adapt the work to make commercial use of the work Attribution   You must attribute the work in the manner specified by the author or licensor
Attribution-ShareAlike to Share   to copy, distribute and transmit the work to Remix   to adapt the work to make commercial use of the work Attribution   You must attribute the work in the manner specified by the author or licensor (but not in any way that suggests that they endorse you or your use of the work). Share Alike   If you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one .
Attribution-ShareAlike to Share   to copy, distribute and transmit the work to make   commercial use of the work Attribution   You must attribute the work in the manner specified by the author or licensor (but not in any way that suggests that they endorse you or your use of the work). No Derivative Works   You may not alter, transform, or build upon this work
Attribution-NonCommercial to Share 油 to copy, distribute and transmit the work to Remix 油 to adapt the work Attribution   You must attribute the work in the manner specified by the author or licensor (but not in any way that suggests that they endorse you or your use of the work). Noncommercia l   You may not use this work for commercial purposes.
Attribution-NonCommercial-ShareAlike to Share 油 to copy, distribute and transmit the work to Remix 油 to adapt the work Attribution    You must attribute the work in the manner specified by the author or licensor (but not in any way that suggests that they endorse you or your use of the work). Noncommercia l   You may not use this work for commercial purposes. Share Alike   If you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.
Attribution-NonCommercial-NoDerivs 2.5 to Share 油 to copy, distribute and transmit the work Attribution 油油You must attribute the work in the manner specified by the author or licensor (but not in any way that suggests that they endorse you or your use of the work). Noncommercial 油油You may not use this work for commercial purposes. No Derivative Works 油油You may not alter, transform, or build upon this work.
Public Domain Free to use You can learn more about Creative Commons License by reading Copy Right & Left by Kiruba Shankar www.copyrightandleft.org
The Three Layers of Code
[email_address] http://facebook.com/ sankaranand http://twitter.com/ sankaranand http://linkedin.com/in/ sankaranand http://profiles.google.com/ smartjean4u www. sankaranand .com Connect ME
Ad

Recommended

Get More Links to Your Site With the Skyscraper Technique
Get More Links to Your Site With the Skyscraper Technique
Rachel Fredrickson
Tips for Social Media Supplement
Tips for Social Media Supplement
Carmen Saunders, MSN, FNP-BC
Coordinating a geographically dispersed research project using social
Coordinating a geographically dispersed research project using social
Michael Paskevicius
How to break the internet
How to break the internet
Paul Johnston
Do-Follow Blogs
Do-Follow Blogs
Mike Gates
Riann salandanan howtouse_stayfocusd
Riann salandanan howtouse_stayfocusd
Riann Salandanan
Riann salandanan howtouse_hootsuite
Riann salandanan howtouse_hootsuite
Riann Salandanan
Taking Advantage of Semantic Web
Taking Advantage of Semantic Web
Sankaranand Balaradjou
Social Media 101 - Optimizing Facebook and Twitter for your Nonprofit
Social Media 101 - Optimizing Facebook and Twitter for your Nonprofit
MagnifyGood
Test slideshow
Test slideshow
legacye
Test slideshow
Test slideshow
legacye
Test slideshow
Test slideshow
legacye
Test slideshow
Test slideshow
legacye
Empowerment technology
Empowerment technology
pizonaim
Architecture of RIA from JAOO
Architecture of RIA from JAOO
Josh Holmes
Social Networking Tools for Novices
Social Networking Tools for Novices
US Environmental Protection Agency (EPA), Center for Computational Toxicology and Exposure
Empowerment technology
Empowerment technology
jonaspalen1
Basics of web
Basics of web
Rounak Samdadia
Hacking For Innovation
Hacking For Innovation
Christian Heilmann
2008 10 21 Top Ten Tech Tools Agents E Xtension
2008 10 21 Top Ten Tech Tools Agents E Xtension
dkp205
Open Source Microblogging With Laconica
Open Source Microblogging With Laconica
Evan Prodromou
E-commerce Lab work
E-commerce Lab work
Pragya Bisht
Commercial Break: Linked Data for Business
Commercial Break: Linked Data for Business
zbeauvais
Why Portability matters (full presentation)
Why Portability matters (full presentation)
Ian Forrester
Web engineering lecture 3
Web engineering lecture 3
University of Swat
Web spoofing (1)
Web spoofing (1)
Khushboo Taneja
Must have open source applications
Must have open source applications
BrianJamison
Make Me A Web 2.0 Geek!
Make Me A Web 2.0 Geek!
BALTIC centre for contemporary art, BALTIC, Gateshead
Smarter Aviation Data Management: Lessons from Swedavia Airports and Sweco
Smarter Aviation Data Management: Lessons from Swedavia Airports and Sweco
Safe Software
"How to survive Black Friday: preparing e-commerce for a peak season", Yurii ...
"How to survive Black Friday: preparing e-commerce for a peak season", Yurii ...
Fwdays

More Related Content

Similar to The karma of sharing information over the web (20)

Social Media 101 - Optimizing Facebook and Twitter for your Nonprofit
Social Media 101 - Optimizing Facebook and Twitter for your Nonprofit
MagnifyGood
Test slideshow
Test slideshow
legacye
Test slideshow
Test slideshow
legacye
Test slideshow
Test slideshow
legacye
Test slideshow
Test slideshow
legacye
Empowerment technology
Empowerment technology
pizonaim
Architecture of RIA from JAOO
Architecture of RIA from JAOO
Josh Holmes
Social Networking Tools for Novices
Social Networking Tools for Novices
US Environmental Protection Agency (EPA), Center for Computational Toxicology and Exposure
Empowerment technology
Empowerment technology
jonaspalen1
Basics of web
Basics of web
Rounak Samdadia
Hacking For Innovation
Hacking For Innovation
Christian Heilmann
2008 10 21 Top Ten Tech Tools Agents E Xtension
2008 10 21 Top Ten Tech Tools Agents E Xtension
dkp205
Open Source Microblogging With Laconica
Open Source Microblogging With Laconica
Evan Prodromou
E-commerce Lab work
E-commerce Lab work
Pragya Bisht
Commercial Break: Linked Data for Business
Commercial Break: Linked Data for Business
zbeauvais
Why Portability matters (full presentation)
Why Portability matters (full presentation)
Ian Forrester
Web engineering lecture 3
Web engineering lecture 3
University of Swat
Web spoofing (1)
Web spoofing (1)
Khushboo Taneja
Must have open source applications
Must have open source applications
BrianJamison
Make Me A Web 2.0 Geek!
Make Me A Web 2.0 Geek!
BALTIC centre for contemporary art, BALTIC, Gateshead
Social Media 101 - Optimizing Facebook and Twitter for your Nonprofit
Social Media 101 - Optimizing Facebook and Twitter for your Nonprofit
MagnifyGood
Test slideshow
Test slideshow
legacye
Test slideshow
Test slideshow
legacye
Test slideshow
Test slideshow
legacye
Test slideshow
Test slideshow
legacye
Empowerment technology
Empowerment technology
pizonaim
Architecture of RIA from JAOO
Architecture of RIA from JAOO
Josh Holmes
Empowerment technology
Empowerment technology
jonaspalen1
2008 10 21 Top Ten Tech Tools Agents E Xtension
2008 10 21 Top Ten Tech Tools Agents E Xtension
dkp205
Open Source Microblogging With Laconica
Open Source Microblogging With Laconica
Evan Prodromou
E-commerce Lab work
E-commerce Lab work
Pragya Bisht
Commercial Break: Linked Data for Business
Commercial Break: Linked Data for Business
zbeauvais
Why Portability matters (full presentation)
Why Portability matters (full presentation)
Ian Forrester
Must have open source applications
Must have open source applications
BrianJamison

Recently uploaded (20)

Smarter Aviation Data Management: Lessons from Swedavia Airports and Sweco
Smarter Aviation Data Management: Lessons from Swedavia Airports and Sweco
Safe Software
"How to survive Black Friday: preparing e-commerce for a peak season", Yurii ...
"How to survive Black Friday: preparing e-commerce for a peak season", Yurii ...
Fwdays
OpenPOWER Foundation & Open-Source Core Innovations
OpenPOWER Foundation & Open-Source Core Innovations
IBM
Cyber Defense Matrix Workshop - RSA Conference
Cyber Defense Matrix Workshop - RSA Conference
Priyanka Aash
ReSTIR [DI]: Spatiotemporal reservoir resampling for real-time ray tracing ...
ReSTIR [DI]: Spatiotemporal reservoir resampling for real-time ray tracing ...
revolcs10
Connecting Data and Intelligence: The Role of FME in Machine Learning
Connecting Data and Intelligence: The Role of FME in Machine Learning
Safe Software
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
Priyanka Aash
Information Security Response Team Nepal_npCERT_Vice_President_Sudan_Jha.pdf
Information Security Response Team Nepal_npCERT_Vice_President_Sudan_Jha.pdf
ICT Frame Magazine Pvt. Ltd.
"Database isolation: how we deal with hundreds of direct connections to the d...
"Database isolation: how we deal with hundreds of direct connections to the d...
Fwdays
Lessons Learned from Developing Secure AI Workflows.pdf
Lessons Learned from Developing Secure AI Workflows.pdf
Priyanka Aash
AI vs Human Writing: Can You Tell the Difference?
AI vs Human Writing: Can You Tell the Difference?
Shashi Sathyanarayana, Ph.D
Python Conference Singapore - 19 Jun 2025
Python Conference Singapore - 19 Jun 2025
ninefyi
Tech-ASan: Two-stage check for Address Sanitizer - Yixuan Cao.pdf
Tech-ASan: Two-stage check for Address Sanitizer - Yixuan Cao.pdf
caoyixuan2019
Security Tips for Enterprise Azure Solutions
Security Tips for Enterprise Azure Solutions
Michele Leroux Bustamante
FIDO Seminar: Authentication for a Billion Consumers - Amazon.pptx
FIDO Seminar: Authentication for a Billion Consumers - Amazon.pptx
FIDO Alliance
The Future of AI Agent Development Trends to Watch.pptx
The Future of AI Agent Development Trends to Watch.pptx
Lisa ward
FIDO Seminar: Perspectives on Passkeys & Consumer Adoption.pptx
FIDO Seminar: Perspectives on Passkeys & Consumer Adoption.pptx
FIDO Alliance
MuleSoft for AgentForce : Topic Center and API Catalog
MuleSoft for AgentForce : Topic Center and API Catalog
shyamraj55
Enhance GitHub Copilot using MCP - Enterprise version.pdf
Enhance GitHub Copilot using MCP - Enterprise version.pdf
Nilesh Gule
Improving Data Integrity: Synchronization between EAM and ArcGIS Utility Netw...
Improving Data Integrity: Synchronization between EAM and ArcGIS Utility Netw...
Safe Software
Smarter Aviation Data Management: Lessons from Swedavia Airports and Sweco
Smarter Aviation Data Management: Lessons from Swedavia Airports and Sweco
Safe Software
"How to survive Black Friday: preparing e-commerce for a peak season", Yurii ...
"How to survive Black Friday: preparing e-commerce for a peak season", Yurii ...
Fwdays
OpenPOWER Foundation & Open-Source Core Innovations
OpenPOWER Foundation & Open-Source Core Innovations
IBM
Cyber Defense Matrix Workshop - RSA Conference
Cyber Defense Matrix Workshop - RSA Conference
Priyanka Aash
ReSTIR [DI]: Spatiotemporal reservoir resampling for real-time ray tracing ...
ReSTIR [DI]: Spatiotemporal reservoir resampling for real-time ray tracing ...
revolcs10
Connecting Data and Intelligence: The Role of FME in Machine Learning
Connecting Data and Intelligence: The Role of FME in Machine Learning
Safe Software
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
Priyanka Aash
Information Security Response Team Nepal_npCERT_Vice_President_Sudan_Jha.pdf
Information Security Response Team Nepal_npCERT_Vice_President_Sudan_Jha.pdf
ICT Frame Magazine Pvt. Ltd.
"Database isolation: how we deal with hundreds of direct connections to the d...
"Database isolation: how we deal with hundreds of direct connections to the d...
Fwdays
Lessons Learned from Developing Secure AI Workflows.pdf
Lessons Learned from Developing Secure AI Workflows.pdf
Priyanka Aash
AI vs Human Writing: Can You Tell the Difference?
AI vs Human Writing: Can You Tell the Difference?
Shashi Sathyanarayana, Ph.D
Python Conference Singapore - 19 Jun 2025
Python Conference Singapore - 19 Jun 2025
ninefyi
Tech-ASan: Two-stage check for Address Sanitizer - Yixuan Cao.pdf
Tech-ASan: Two-stage check for Address Sanitizer - Yixuan Cao.pdf
caoyixuan2019
Security Tips for Enterprise Azure Solutions
Security Tips for Enterprise Azure Solutions
Michele Leroux Bustamante
FIDO Seminar: Authentication for a Billion Consumers - Amazon.pptx
FIDO Seminar: Authentication for a Billion Consumers - Amazon.pptx
FIDO Alliance
The Future of AI Agent Development Trends to Watch.pptx
The Future of AI Agent Development Trends to Watch.pptx
Lisa ward
FIDO Seminar: Perspectives on Passkeys & Consumer Adoption.pptx
FIDO Seminar: Perspectives on Passkeys & Consumer Adoption.pptx
FIDO Alliance
MuleSoft for AgentForce : Topic Center and API Catalog
MuleSoft for AgentForce : Topic Center and API Catalog
shyamraj55
Enhance GitHub Copilot using MCP - Enterprise version.pdf
Enhance GitHub Copilot using MCP - Enterprise version.pdf
Nilesh Gule
Improving Data Integrity: Synchronization between EAM and ArcGIS Utility Netw...
Improving Data Integrity: Synchronization between EAM and ArcGIS Utility Netw...
Safe Software
Ad

The karma of sharing information over the web

  • 1. The Karma of Sharing Information over the Web! Sankaranand www.sankaranand.com
  • 2. Information! What is it ? is specific and organized for a purpose. has been verified to be accurate and timely lead to an increase in understanding and decrease in uncertainty.
  • 3. Information Technology ? the branch of engineering that deals with the use of computers and telecommunications to retrieve and store and transmit information
  • 4. Social Media A platform that allows the creation and exchange of user-generated content Mostly Web-based applications Wikis, Forums, Blogs, Micro blogs, Social Network Aggregation
  • 6. Web one point zero (web 1.0) Information Portal Directories HTML, GIF, Framesets, Html Forms Eg. Geocities, First version of Hotmail, Static Company pages
  • 7. Web two point zero (web 2.0) Platform Rich Internet Applications Service Oriented Architecture Introduction of Social Web Eg. Facebook, Gmail, Youtube, Flickr
  • 8. Web three point zero (web3.0) The Semantic Web Computer understand the Web Artificial Intelligence Personalization We track you and give you want ever you want!
  • 9. Information Sharing One-to-one exchanges of data between a sender and receiver is past Standing Sharing Protocols Data harmonization Improved Privacy and Security XML, SOAP, WDSL
  • 10. Our Karma over Information Sharing Revealing personal information Unclean Email Address Strangers-Just Met Acquaintances Not aware of Monitoring Falling in Pits of Scam, Phising Not Conscious of Web Security Not Deciding what to reveal Not using Encryption Home Security Not Monitoring your Cookies Digital Rights
  • 11. Revealing personal information
  • 12. Best Example is Facebook
  • 13. Private Photos Made Public
  • 14. Adding Strangers I got 5000 Friends in Facebook , what about you ? Take Social Networking serious and add friends like in your real life. Create and Manage Friend lists
  • 15. Managing Friend lists in Facebook
  • 16. Dont fall for that girly profile! Boys using Fake Girl profile are more appealing than an average girls profile Dont fall over their Pit, Be a Man ! Girls be protective and secure your photos! Tweak around Facebook settings
  • 17. Fake Profile they are not who they are!
  • 19. Clean Em @ il Address Two Email Address One for Newsletters and Commercial signups One for Personal / Work Use short-term disposable mails eg. Mailnator.com
  • 20. Wow, You are a millionaire $$$ There is no lottery announcement in Emails Phishing Scams Dont even expect a penny for free from Web Ignore the SMS Scams too There is no victoria who wants to transfer her funds to your account Just Ignore them All!!!!!
  • 22. Be Conscious of Web Security Submitting Financial Information Use Secure Connection https:// Latest Browser Update your Antivirus & use a Firewall Monitor Network Connections Strong password -> upper + lowercase + symbols + numbers !
  • 23. Best Practices Public Computer Dont use it for Financial Transaction Use a secure and latest browser Be aware of any keyloggers / Monitoring Apps Stay away from the prey eyes Keep a checklist of Things Clear cookies and Cache
  • 24. Best Practices Personal Computer Clear your Internet History Update your OS, Anti-virus Use Legit Software Stop Downloading Pirates & Torrents Use Linux Its completely Free, Secure and Powerful. You have a wide flavors to choose from.
  • 25. Recommend Apps CCleaner- Clear junk files from system Avast, Microsoft Security Essentials, Avg Free Antivirus Hotspot Privacy and Proxy Browsing Lastpass One Ultimate tool for Password Management.
  • 26.
  • 27. Digital Content Copyright Understanding Creative Commons A tool for Creators, Content Sharing, Publishers Standardized way to keep their copyright simple Provides various kind of License which you can obtain at http://creativecommons.org
  • 28. Which is my flavor ?
  • 29. Attribution CC BY to Share to copy, distribute and transmit the work to Remix to adapt the work to make commercial use of the work Attribution You must attribute the work in the manner specified by the author or licensor
  • 30. Attribution-ShareAlike to Share to copy, distribute and transmit the work to Remix to adapt the work to make commercial use of the work Attribution You must attribute the work in the manner specified by the author or licensor (but not in any way that suggests that they endorse you or your use of the work). Share Alike If you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one .
  • 31. Attribution-ShareAlike to Share to copy, distribute and transmit the work to make commercial use of the work Attribution You must attribute the work in the manner specified by the author or licensor (but not in any way that suggests that they endorse you or your use of the work). No Derivative Works You may not alter, transform, or build upon this work
  • 32. Attribution-NonCommercial to Share 油 to copy, distribute and transmit the work to Remix 油 to adapt the work Attribution You must attribute the work in the manner specified by the author or licensor (but not in any way that suggests that they endorse you or your use of the work). Noncommercia l You may not use this work for commercial purposes.
  • 33. Attribution-NonCommercial-ShareAlike to Share 油 to copy, distribute and transmit the work to Remix 油 to adapt the work Attribution You must attribute the work in the manner specified by the author or licensor (but not in any way that suggests that they endorse you or your use of the work). Noncommercia l You may not use this work for commercial purposes. Share Alike If you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.
  • 34. Attribution-NonCommercial-NoDerivs 2.5 to Share 油 to copy, distribute and transmit the work Attribution 油油You must attribute the work in the manner specified by the author or licensor (but not in any way that suggests that they endorse you or your use of the work). Noncommercial 油油You may not use this work for commercial purposes. No Derivative Works 油油You may not alter, transform, or build upon this work.
  • 35. Public Domain Free to use You can learn more about Creative Commons License by reading Copy Right & Left by Kiruba Shankar www.copyrightandleft.org
  • 36. The Three Layers of Code
  • 37. [email_address] http://facebook.com/ sankaranand http://twitter.com/ sankaranand http://linkedin.com/in/ sankaranand http://profiles.google.com/ smartjean4u www. sankaranand .com Connect ME