Email this Article Email   

CHIPS Articles: Social Networking & Cyberbullying Tips

Social Networking & Cyberbullying Tips
By CHIPS Magazine - October 24, 2014
Social networks are a great way to stay connected with others, but you should be wary about how much personal information you post and take basic precautions before going online.

The first step is to STOP. THINK. CONNECT. Take security precautions, understand the consequences of your actions and behaviors and enjoy the benefits of the Internet. Always remember to Keep a Clean Machine. Having the latest security software, web browser, and operating system are the best defenses against viruses, malware, and other online threats, according to the STOP.THINK.CONNECT. campaign.

Social Networking Tips:

  • Own your Online Presence: Privacy and security settings exist for a reason. When available, set the privacy and security settings on websites to your comfort level for information sharing. It’s OK to limit how and with whom you share information.
  • Once Posted, Always Posted: Protect your reputation on social networks. What you post online stays online. Think twice before posting pictures you wouldn’t want your parents or future employers to see. Research by Microsoft found that 70 percent of job recruiters rejected candidates based on information they found online.
  • Post Only about Others as You Have Them Post about You. It’s the golden rule online.
  • When in Doubt, Throw it Out: Links in email, tweets, posts and online advertising are often the way cybercriminals compromise your computer by getting you to click on something or share information when you shouldn’t. If it looks suspicious, asks you to act immediately or offers something that’s too good to be true — even if you know the source — it’s best to delete or if appropriate, mark as junk email.
  • Make Passwords Long, Strong and Unique: Combine capital and lowercase letters with numbers and symbols to create a more secure password. Passwords are private information and not to be shared with friends.
  • Your Online Reputation: Research by Microsoft also found that recruiters respond to a strong, positive personal brand online. So show your smarts, thoughtfulness, and mastery of the environment.
  • Be Honest if you’re Uncomfortable: If a friend posts something about you that makes you uncomfortable or you think is inappropriate, let them know. Likewise, share with care. People have different tolerances for how much the world knows about them — respect those differences.
  • Keep Personal Information Personal: Be cautious about how much personal information you provide on social networking sites. The more information you post, the easier it may be for a hacker or someone else to use that information against you by stealing your identity, accessing your data, or committing other crimes such as stalking.
  • Know and Manage your Friends: Friends are people you know and trust. Some of the fun of social networks is creating a large pool of friends from many aspects of your life. In general, a smaller group of known people is better. Use tools to manage the information you share with friends in different groups or even have multiple online pages. If you’re trying to create a public persona and want to share ideas, photos or other information with the larger public, create an open profile or a “fan” page that encourages broad participation and where you limit the posting of any personal information. Use your personal profile to keep your real friends up-to-date with your daily life.

What you do online has the potential to affect everyone — at home, at work and around the world. Practicing good online habits benefits the global digital community.

Cyberbullying Tips:

  • Know what Actions to Take: If someone is harassing or threatening you, remove them from your friends list, block them, and report them to the site administrator.
  • Avoid Escalating the Situation: Responding with hostility is likely to provoke a bully. Depending on the circumstances, consider ignoring the issue. Often, bullies thrive on the reaction of their victims. If you or your child receives unwanted email messages, consider changing your email address. The problem may stop. If you continue to get messages at the new account, you may have a strong case for legal action.
  • Document Cyberbullying (or other Unwanted Contact): Keep a record of any online activity emails, web pages, social media posts, etc.), including relevant dates and times. Keep both an electronic version and a printed copy.
  • Be an Upstander: Speak up if someone is bullying your friend. Stop untrue or harmful messages from spreading. Report the situation to a trusted adult and on social networks. Refuse to be a passive bystander.

For more resources, visit STOP. THINK. CONNECT.

The Anti-Phishing Working Group (APWG) and National Cyber Security Alliance (NCSA) led the development of the STOP. THINK. CONNECT. campaign. The U.S. Department of Homeland Security provides the federal government's leadership for STOP. THINK. CONNECT.

Related CHIPS Articles
Related DON CIO News
Related DON CIO Policy
CHIPS is an official U.S. Navy website sponsored by the Department of the Navy (DON) Chief Information Officer, the Department of Defense Enterprise Software Initiative (ESI) and the DON's ESI Software Product Manager Team at Space and Naval Warfare Systems Center Pacific.

Online ISSN 2154-1779; Print ISSN 1047-9988