Benefiting with Internet & Social Media Investigations

Total Page:16

File Type:pdf, Size:1020Kb

Benefiting with Internet & Social Media Investigations Advanced Online Investigations Cynthia Hetherington, CFE, CII President Hetherington Group 1 of 35 © 2017 Association of Certified Fraud Examiners, Inc. Advanced Online Investigations Cynthia Hetherington, CFE, CII Hetherington Group © 2017, all rights reserved. Cynthia is a… • ACFE faculty • OSMOSIS conference host • ASIS educator • Global OSINT presenter • Author & publisher • Analyst • Security practitioner • Investigator • Tech • Librarian Objective • This exercise will help asset protectors focus their attention and sharpen their skills on utilizing social media and open-source searches effectively. Poll #1 • How do you feel about your social media and open-source monitoring programs in place? A. Confident B. Better than the rest of them! C. I silently worry that we are not doing enough. D. What monitoring program? Middle of the Road Is OK • Being in the MIDDLE here means you’re aware that something needs to be done and you are thinking about this! A. Confident B. Better than the rest of them! C. I silently worry that we are not doing enough. D. What monitoring program? • Social media is ever changing, and you can’t afford to be confident. Nimble is the only way to stay on top! “Five-Finger Discount” • Echosec popped 472 matches. Poll #2 • What is your monitoring plan? A. We have in-house analysts/security pros monitoring our assets. B. We sub this work out. C. Public relations/communications does this and alerts us. D. We don’t need a monitoring program. Monitoring Awareness Is Now Necessary • Answers A to C are excellent to OK. A. We have in-house analysts/security pros monitoring our assets. B. We sub this work out. C. Public relations/communications does this and alerts us. D. We don’t need monitoring program. • Beyond keeping your assets safe, this is also a tool for first response to incidents, a track record for compliance, and a management tool for fraud and reputation. Alert Services: Free or Fee FREE FEE • Google.com/alerts – Varied • Enterprise.Echosec.net – S.M. • free.Echosec.net – S.M. • Snaptrends – Social media • Socialmention – S.M. • Liferaft – Social media • Biznar – Varied • Cision Vocus – Social media • Searchtempest – Auction • Factiva – News • Claz.org – Auction • Nexis – News • ProQuest – News Google.com/Alerts * Auction and For-Sale Sites • Amazon • Craigslist • eBay • oodle • Backpage • Dark Web onion sites Amazon eBay • Go to “Advanced Search” from the homepage, in upper right-hand corner. • Choose “Find a Member” from the left-hand column. Type in the first half of the person’s personal email address. For example: [email protected] Type in “crazybird” Check HR for the person’s resume for old email addresses. eBay • Multiple results to explore! eBay User ID History Check out the new and exciting names! Craigslist.com • Ultimately, you will need to hunt and peck. • Craig Newmark is one of the last hold-outs. • Search strategy through Google.com: • Searchtempest.com * • Site:craigslist.com <expression> SearchTempest * Precious Nuggets for Sale Hit Me Up! • OUTER LIMIT EXTRACTIONS TEXT OR CALL ONLY 909-450-7405 Donations King OG kush 45.00 A gram Crumble PLATINUM BLUE DREAM MASTER KUSH 40.00 A GRAM CRUMBLE PLATINUM MASTER KUSH 40.00 A GRAM CRUMBLE CHERRY PRIVATE STOCK 30.00 A GRAM CRUMBLE NO WHOLESALE MUST HAVE REC AND VALID ID TEXT OR CALL ONLY 909-450-7405 HIT ME UP 909-450-7405 TEXT OR CALL Google That Number! • 909-450-7405 = “909 450 7405” • No dashes, parenthesis, backslashes, etc. • Just spaces • Scrutinize the results Bingo! Key Items Address Search on maps.google.com Address Search on maps.google.com Address Age Progression 2011 2007 2008 2012 Back to SearchTempest • You can add or minimize eBay and Amazon. • Expand your search area by a local area or the world. • Set up alerts for things you really want to know about in your area. • Third-row seats • Drugs and contraband • Human trafficking • Terrorism, drug trade, or other nasty things SearchTempest Get the RSS Feed as an Alert • You save your search as an OPML. • File on your desktop. Open Google Reader or Microsoft Outlook and • Import that OPML File. Claz.org for All Others Backpage.com Dark Web • Start with Tor, or another anonymizing search engine. • Search with torhiddenwiki.com or onion.city. • Not a place to dabble. • Don’t download or open files without having a virtual machine (separate cold computer) to view them. • Have a strong stomach. Onion.city : Puppies Search Poll #3 • Can you friend individuals in closed accounts to see what they are up to? A. Yes B. No C. I don’t know Friending and Linking • You’ve done your homework. A. Yes, who is going to catch us? B. No, aren’t we breaking some law? C. Best answer: When in doubt, don’t! Hunting USER Profiles • Finding profiles is straightforward if you follow these steps. • Do you know their nickname already? • Check email addresses. • Start with Google. • Search by “first last name,” and you will locate popular social media accounts. • Use the following list of social media platforms, and add the username to the end. • Pinterest.com/animal. Looking for Matches Here: /username 43 Things DailyStrength Fotolog Ibibo Meettheboss PokemanGo Streetlife We Heart It About.me DeviantArt Foursquare Identi.ca Meetup (website) Poolwo Students Circle Network WeeWorld Academia.edu Diaspora* Friendica Indaba Music MillatFacebook Qapacity StudiVZ Wellwer Advogato Disaboom Friends Reunited Influenster MocoSpace Quechup StumbleUpon Wepolls.com AsianAvenue Dol2day Friendster Instagram MouthShut.com Qzone Tagged Wer-kennt-wen Athlinks DontStayIn Fuelmyblog Itsmy Mubi Raptr Talkbiznow Wooxie Audimated.com Doximity Gaia Online Jaiku My Opera Ravelry Taltopia WriteAPrisoner.com Bebo Draugiem.lv GamerDNA Jiepang MyHeritage Renren Taringa! XING Biip.no Dreamwidth Gapyear.com Kaixin001 MyLife ReverbNation.com TeachStreet Xanga BlackPlanet Elftown Gather.com Kiwibox Myspace Ryze TermWiki Xt3 Bolt.com Elixio Gays.com Lafango Nasza-klasa.pl ScienceStage The Sphere Yammer Busuu Ello Geni.com LaiBhaari Netlog Sgrouples TravBuddy.com Yelp, Inc. Buzznet English, baby! Gentlemint Last.fm Nexopia ShareTheMusic Travellerspoint Yookos CafeMom Eons.com GetGlue Late Night Shots Ning Shelfari Trombi.com Younow Care2 Epernicus GirlsAskGuys LibraryThing OUTeverywhere Sina Weibo Tsu Zoo.gr CaringBridge Experience Project Gogoyoko Lifeknot Odnoklassniki Skoob Tuenti Zooppa Classmates.com Exploroo Goodreads LinkExpats Open Diary Skyrock Tumblr aNobii Cloob Facebook Goodwizz Linkagoal Orkut Smartican Twitter aSmallWorld ClusterFlunk Faceparty Google+ LinkedIn Partyflock SocialVibe Tylted delicious CouchSurfing Fetlife GovLoop Listography PatientsLikeMe Sonico.com Uplike douban CozyCot FilmAffinity Grono.net LiveJournal Periscope SoundCloud VK eToro Cross.tv Filmow HR.com Livemocha Pingsta Spaces Vampirefreaks.com hi5 Crunchyroll FledgeWing Habbo MEETin Pinterest Spot.IM Viadeo italki.com Cucumbertown Flickr Hospitality Club MOG Plaxo Spring.me Virb mixi Cyworld Flixster Hotlist Makeoutclub Playfire Stage 32 Vox tribe.net DXY.cn Focus.com Hub Culture Meerkat Playlist.com Stickam WAYN weRead DailyBooth Fotki IRC-Galleria Plurk Wattpad Sum Up • There are only penalties for avoiding social media and open-source investigations. • Stay abreast of changes in the social media world. • Work with your policy makers to address what is permissible for your investigators. • Many vendors offer excellent products, but constantly question their abilities. • Even more free resources and techniques that are equally efficient for asset protectors. Questions? #whoknew! Cynthia Hetherington www.hetheringtongroup.com Thank you [email protected] Cynthiahetherington HetheringtonGroup @HetheringtonGrp Email [email protected] for the latest deck slides & handouts Hetherington Group © 2017, all rights reserved. Advanced Online Investigations Cynthia Hetherington, CFE, CII President Hetherington Group 42 of 35 © 2017 Association of Certified Fraud Examiners, Inc..
Recommended publications
  • Uila Supported Apps
    Uila Supported Applications and Protocols updated Oct 2020 Application/Protocol Name Full Description 01net.com 01net website, a French high-tech news site. 050 plus is a Japanese embedded smartphone application dedicated to 050 plus audio-conferencing. 0zz0.com 0zz0 is an online solution to store, send and share files 10050.net China Railcom group web portal. This protocol plug-in classifies the http traffic to the host 10086.cn. It also 10086.cn classifies the ssl traffic to the Common Name 10086.cn. 104.com Web site dedicated to job research. 1111.com.tw Website dedicated to job research in Taiwan. 114la.com Chinese web portal operated by YLMF Computer Technology Co. Chinese cloud storing system of the 115 website. It is operated by YLMF 115.com Computer Technology Co. 118114.cn Chinese booking and reservation portal. 11st.co.kr Korean shopping website 11st. It is operated by SK Planet Co. 1337x.org Bittorrent tracker search engine 139mail 139mail is a chinese webmail powered by China Mobile. 15min.lt Lithuanian news portal Chinese web portal 163. It is operated by NetEase, a company which 163.com pioneered the development of Internet in China. 17173.com Website distributing Chinese games. 17u.com Chinese online travel booking website. 20 minutes is a free, daily newspaper available in France, Spain and 20minutes Switzerland. This plugin classifies websites. 24h.com.vn Vietnamese news portal 24ora.com Aruban news portal 24sata.hr Croatian news portal 24SevenOffice 24SevenOffice is a web-based Enterprise resource planning (ERP) systems. 24ur.com Slovenian news portal 2ch.net Japanese adult videos web site 2Shared 2shared is an online space for sharing and storage.
    [Show full text]
  • Social Media Tool Analysis
    Social Media Tool Analysis John Saxon TCO 691 10 JUNE 2013 1. Orkut Introduction Orkut is a social networking website that allows a user to maintain existing relationships, while also providing a platform to form new relationships. The site is open to anyone over the age of 13, with no obvious bent toward one group, but is primarily used in Brazil and India, and dominated by the 18-25 demographic. Users can set up a profile, add friends, post status updates, share pictures and video, and comment on their friend’s profiles in “scraps.” Seven Building Blocks • Identity – Users of Orkut start by establishing a user profile, which is used to identify themselves to other users. • Conversations – Orkut users can start conversations with each other in a number of way, including an integrated instant messaging functionality and through “scraps,” which allows users to post on each other’s “scrapbooks” – pages tied to the user profile. • Sharing – Users can share pictures, videos, and status updates with other users, who can share feedback through commenting and/or “liking” a user’s post. • Presence – Presence on Orkut is limited to time-stamping of posts, providing other users an idea of how frequently a user is posting. • Relationships – Orkut’s main emphasis is on relationships, allowing users to friend each other as well as providing a number of methods for communication between users. • Reputation – Reputation on Orkut is limited to tracking the number of friends a user has, providing other users an idea of how connected that user is. • Groups – Users of Orkut can form “communities” where they can discuss and comment on shared interests with other users.
    [Show full text]
  • A Survey Study on Uses and Gratification of Social Networking Sites in China
    A Survey Study on Uses and Gratification of Social Networking Sites in China A thesis presented to the faculty of the Scripps College of Communication of Ohio University In partial fulfillment of the requirements for the degree Master of Science Yacong Yuan June 2011 © 2011 Yacong Yuan. All Rights Reserved. This thesis titled A Survey Study on Uses and Gratifications of Social Networking Sites in China by YACONG YUAN has been approved for the E. W. Scripps School of Journalism and the Scripps College of Communication by Hugh J. Martin Associate Professor of Journalism Gregory J. Shepherd Dean, Scripps College of Communication ii ABSTRACT YUAN, YACONG, M.S., June 2011, Journalism A Survey Study on Uses and Gratifications of Social Networking Sites in China Director of Thesis: Hugh J. Martin This study is a test of the uses and gratifications theory on Social Networking Sites in China. An online survey of 353 subjects on two major SNS in China showed socio-integrative needs were the strongest motivation for all users who participated in SNS. However, some gender differences were also found. Males were more interested in finding news than female users. Males were also more likely than females to talk about their problems. Female users were more likely than males to facilitate social interactions on SNS. Other results showed low frequency SNS users participated in more activities than high frequency users. The number of friends each user had was not significantly associated with participation in different activities. Approved: _____________________________________________________________ Hugh J. Martin Associate Professor of Journalism iii ACKNOWLEDGMENTS I would like to express special gratitude to my thesis chair, Professor Hugh J.
    [Show full text]
  • ADL Report to Global Forum on Cyberhate 2015
    Report of the Anti-Defamation League on Confronting Cyberhate 5th Global Forum for Combating Anti-Semitism May, 2015 ANTI-DEFAMATION LEAGUE Barry Curtiss-Lusher National Chair Abraham H. Foxman National Director Kenneth Jacobson Deputy National Director Milton S. Schneider President, Anti-Defamation League Foundation CIVIL RIGHTS DIVISION Christopher Wolf Chair Deborah M. Lauter Director Steven M. Freeman Associate Director Eva Vega-Olds Assistant Director Jonathan Vick Assistant Director, Cyberhate Response CENTER ON EXTREMISM Mitch Markow Chair Oren Segal Director Lauren Steinberg Terrorism Analyst For additional and updated resources please see: www.adl.org Copies of this publication are available in the Rita and Leo Greenland Library and Research Center. ©2015 Anti-Defamation League | Printed in the United States of America | All Rights Reserved Anti-Defamation League 605 Third Avenue, New York, NY 10158-3560 www.adl.org Table of Contents PREFACE .........................................................................................................................................................4 INTRODUCTION ..............................................................................................................................................5 CHARTING PROGRESS ....................................................................................................................................6 A NEW CHALLENGE: TERRORIST USE OF SOCIAL MEDIA ............................................................................11 RECOMMENDATIONS
    [Show full text]
  • Los Angeles Lawyer June 2010 June2010 Issuemaster.Qxp 5/13/10 12:26 PM Page 5
    June2010_IssueMaster.qxp 5/13/10 12:25 PM Page c1 2010 Lawyer-to-Lawyer Referral Guide June 2010 /$4 EARN MCLE CREDIT PLUS Protecting Divorce Web Site Look and Estate and Feel Planning page 40 page 34 Limitations of Privacy Rights page 12 Revoking Family Trusts page 16 The Lilly Ledbetter Fair Pay Act Strength of page 21 Character Los Angeles lawyers Michael D. Schwartz and Phillip R. Maltin explain the effective use of character evidence in civil trials page 26 June2010_IssueMaster.qxp 5/13/10 12:42 PM Page c2 Every Legal Issue. One Legal Source. June2010_IssueMaster.qxp 5/13/10 12:25 PM Page 1 Interim Dean Scott Howe and former Dean John Eastman at the Top 100 celebration. CHAPMAN UNIVERSITY SCHOOL OF LAW PROUDLY ANNOUNCES OUR RANKING AMONG THE TOP 100 OF ONE UNIVERSITY DRIVE, ORANGE, CA 92866 www.chapman.edu/law June2010_IssueMaster.qxp 5/13/10 12:25 PM Page 2 0/&'*3. ."/:40-65*0/4 Foepstfe!Qspufdujpo Q -"8'*3.$-*&/54 Q"$$&445007&3130'&44*0/"- -*"#*-*5:1307*%&34 Q0/-*/&"11-*$"5*0/4'03 &"4:$0.1-&5*0/ &/%034&%130'&44*0/"--*"#*-*5:*/463"/$&#30,&3 Call 1-800-282-9786 today to speak to a specialist. 5 ' -*$&/4&$ 4"/%*&(003"/(&$06/5:-04"/(&-&44"/'3"/$*4$0 888")&3/*/463"/$&$0. June2010_IssueMaster.qxp 5/13/10 12:26 PM Page 3 FEATURES 26 Strength of Character BY MICHAEL D. SCHWARTZ AND PHILLIP R. MALTIN Stringent rules for the admission of character evidence in civil trials are designed to prevent jurors from deciding a case on the basis of which party is more likeable 34 Parting of the Ways BY HOWARD S.
    [Show full text]
  • Seamless Interoperability and Data Portability in the Social Web for Facilitating an Open and Heterogeneous Online Social Network Federation
    Seamless Interoperability and Data Portability in the Social Web for Facilitating an Open and Heterogeneous Online Social Network Federation vorgelegt von Dipl.-Inform. Sebastian Jürg Göndör geb. in Duisburg von der Fakultät IV – Elektrotechnik und Informatik der Technischen Universität Berlin zur Erlangung des akademischen Grades Doktor der Ingenieurwissenschaften - Dr.-Ing. - genehmigte Dissertation Promotionsausschuss: Vorsitzender: Prof. Dr. Thomas Magedanz Gutachter: Prof. Dr. Axel Küpper Gutachter: Prof. Dr. Ulrik Schroeder Gutachter: Prof. Dr. Maurizio Marchese Tag der wissenschaftlichen Aussprache: 6. Juni 2018 Berlin 2018 iii A Bill of Rights for Users of the Social Web Authored by Joseph Smarr, Marc Canter, Robert Scoble, and Michael Arrington1 September 4, 2007 Preamble: There are already many who support the ideas laid out in this Bill of Rights, but we are actively seeking to grow the roster of those publicly backing the principles and approaches it outlines. That said, this Bill of Rights is not a document “carved in stone” (or written on paper). It is a blog post, and it is intended to spur conversation and debate, which will naturally lead to tweaks of the language. So, let’s get the dialogue going and get as many of the major stakeholders on board as we can! A Bill of Rights for Users of the Social Web We publicly assert that all users of the social web are entitled to certain fundamental rights, specifically: Ownership of their own personal information, including: • their own profile data • the list of people they are connected to • the activity stream of content they create; • Control of whether and how such personal information is shared with others; and • Freedom to grant persistent access to their personal information to trusted external sites.
    [Show full text]
  • International Guide to Social Media China
    International Guide to Social Media China Overview “China’s famous one-child policy More than one in five internet users are Chinese. The nation’s has resulted in youngsters looking for the companionship of others 500 million internet users are just behind Japan on time their own age online” spent online per day at an average of 2.7 hours. Internet connectivity is not expected to reach the majority of the one billion strong population until 2015. In this report: Although China blocks western social networks, domestic • China’s most popular Social Media sites • Video sites & Location-based apps social networking sites are immensely popular. Half of • Influencers in Chinese Social Media internet users are on more than one domestic social network • Chinese Language & Culture • Online Censorship and 30 per cent log on to at least one network every day. China blocks foreign social networking sites, and censors In this series: posts on domestic social networks, yet social networking remains hugely popular amongst young urbanites. • United States • Mexico • India China’s famous one child policy has resulted in youngsters • Brazil • Latin America looking for the companionship of others their own age online. • Scandinavia This combined with the general mistrust of government- • France • Germany controlled media has resulted in social networking becoming the quickest, cheapest and most trusted way to communicate Further reports due Q3 2012 over long distances. International Guide to Social Media China Social Networks China has a thriving social networking scene with dozens of popular networks. QZone is currently the most popular social networking site used in China.
    [Show full text]
  • Applications Log Viewer
    4/1/2017 Sophos Applications Log Viewer MONITOR & ANALYZE Control Center Application List Application Filter Traffic Shaping Default Current Activities Reports Diagnostics Name * Mike App Filter PROTECT Description Based on Block filter avoidance apps Firewall Intrusion Prevention Web Enable Micro App Discovery Applications Wireless Email Web Server Advanced Threat CONFIGURE Application Application Filter Criteria Schedule Action VPN Network Category = Infrastructure, Netw... Routing Risk = 1-Very Low, 2- FTPS-Data, FTP-DataTransfer, FTP-Control, FTP Delete Request, FTP Upload Request, FTP Base, Low, 4... All the Allow Authentication FTPS, FTP Download Request Characteristics = Prone Time to misuse, Tra... System Services Technology = Client Server, Netwo... SYSTEM Profiles Category = File Transfer, Hosts and Services Confe... Risk = 3-Medium Administration All the TeamViewer Conferencing, TeamViewer FileTransfer Characteristics = Time Allow Excessive Bandwidth,... Backup & Firmware Technology = Client Server Certificates Save Cancel https://192.168.110.3:4444/webconsole/webpages/index.jsp#71826 1/4 4/1/2017 Sophos Application Application Filter Criteria Schedule Action Applications Log Viewer Facebook Applications, Docstoc Website, Facebook Plugin, MySpace Website, MySpace.cn Website, Twitter Website, Facebook Website, Bebo Website, Classmates Website, LinkedIN Compose Webmail, Digg Web Login, Flickr Website, Flickr Web Upload, Friendfeed Web Login, MONITOR & ANALYZE Hootsuite Web Login, Friendster Web Login, Hi5 Website, Facebook Video
    [Show full text]
  • Examples of Online Social Network Analysis Social Networks
    Examples of online social network analysis Social networks • Huge field of research • Data: mostly small samples, surveys • Multiplexity Issue of data mining • Longitudinal data McPherson et al, Annu. Rev. Sociol. (2001) New technologies • Email networks • Cellphone call networks • Real-world interactions • Online networks/ social web NEW (large-scale) DATASETS, longitudinal data New laboratories • Social network properties – homophily – selection vs influence • Triadic closure, preferential attachment • Social balance • Dunbar number • Experiments at large scale... 4 Another social science lab: crowdsourcing, e.g. Amazon Mechanical Turk Text http://experimentalturk.wordpress.com/ New laboratories Caveats: • online links can differ from real social links • population sampling biases? • “big” data does not automatically mean “good” data 7 The social web • social networking sites • blogs + comments + aggregators • community-edited news sites, participatory journalism • content-sharing sites • discussion forums, newsgroups • wikis, Wikipedia • services that allow sharing of bookmarks/favorites • ...and mashups of the above services An example: Dunbar number on twitter Fraction of reciprocated connections as a function of in- degree Gonçalves et al, PLoS One 6, e22656 (2011) Sharing and annotating Examples: • Flickr: sharing of photos • Last.fm: music • aNobii: books • Del.icio.us: social bookmarking • Bibsonomy: publications and bookmarks • … •“Social” networks •“specialized” content-sharing sites •Users expose profiles (content) and links
    [Show full text]
  • Obtaining and Using Evidence from Social Networking Sites
    U.S. Department of Justice Criminal Division Washington, D.C. 20530 CRM-200900732F MAR 3 2010 Mr. James Tucker Mr. Shane Witnov Electronic Frontier Foundation 454 Shotwell Street San Francisco, CA 94110 Dear Messrs Tucker and Witnov: This is an interim response to your request dated October 6, 2009 for access to records concerning "use of social networking websites (including, but not limited to Facebook, MySpace, Twitter, Flickr and other online social media) for investigative (criminal or otherwise) or data gathering purposes created since January 2003, including, but not limited to: 1) documents that contain information on the use of "fake identities" to "trick" users "into accepting a [government] official as friend" or otherwise provide information to he government as described in the Boston Globe article quoted above; 2) guides, manuals, policy statements, memoranda, presentations, or other materials explaining how government agents should collect information on social networking websites: 3) guides, manuals, policy statements, memoranda, presentations, or other materials, detailing how or when government agents may collect information through social networking websites; 4) guides, manuals, policy statements, memoranda, presentations and other materials detailing what procedures government agents must follow to collect information through social- networking websites; 5) guides, manuals, policy statements, memorandum, presentations, agreements (both formal and informal) with social-networking companies, or other materials relating to privileged user access by the Criminal Division to the social networking websites; 6) guides, manuals, memoranda, presentations or other materials for using any visualization programs, data analysis programs or tools used to analyze data gathered from social networks; 7) contracts, requests for proposals, or purchase orders for any visualization programs, data analysis programs or tools used to analyze data gathered from social networks.
    [Show full text]
  • Auswertung Onlinebefragung Social Media
    HSD Auswertung Onlinebefragung Social Media Impressum Herausgeber Dezernat Kommunikation & Marketing Redaktion Rebecca Juwick M.A. Dezernat Kommunikation & Marketing Stand Februar 2016 2 Inhalt 1 Einleitung 4 2 Methode 5 3 Ergebnisse 6 Nutzung Social Networks 9 Zielgruppen 15 Funktionen & Inhalte 16 4 Fazit 22 3 Auswertung Social- Media-Umfrage 1 Einleitung Im Rahmen der Social-Media-Projektgruppe sollten die Anforderungen der unterschiedlichen Ziel- gruppen an das Social-Media-Angebot der Hochschule erhoben werden. Um dies möglichst effektiv umsetzen zu können, wurde eine Onlinebefragung für Studierende und Beschäftigte der Hochschule Düsseldorf durchgeführt. Diese liefen in zeitlichem Abstand zueinander jeweils 4 Wochen lang. Im Folgenden wird zuerst das methodische Vorgehen zur Befragung kurz erläutert, bevor die Ergeb- nisse vorgestellt werden. Alle Ergebnisse können den Datei-Anhängen „Auswertung_Studie- rende.xlsx“ und „Auswertung_Beschäftigte.xlsx“ entnommen werden. 4 Auswertung Social-Media-Umfrage 2 Methode Damit möglichst viele Studierende aus allen Fachbereichen und die Beschäftigten der Hochschule, unabhängig vom Standort, an der Erhebung teilnehmen konnten, wurde die Befragung als reine On- linebefragung durchgeführt. Aufgrund der Ähnlichkeit in Bezug auf die avisierten Zielgruppen, sowie der inhaltlichen Fragestellung wurde die Befragung in Kooperation mit der Campus IT, dem Daten- schutzbeauftragten und dem Fachbereich Sozial- und Kulturwissenschaften realisiert. Der Fragebogen wurde mithilfe der Software Unipark umgesetzt und über den entsprechenden Uni- park-Server für mehrere Wochen zur Beantwortung verfügbar gehalten. Der Umfang des Fragebo- gens wurde dabei so gewählt, dass eine Bearbeitungsdauer von 10 bis 15 Minuten – inklusive Brie- fing und Debriefing – nicht überschritten wurde. Zur Gewinnung von Teilnehmenden wurden diese über diverse Kanäle angesprochen. Auf der Start- seite des Internetauftritts der HSD wurde beispielsweise eine Meldung von der Pressestelle einge- stellt.
    [Show full text]
  • NAS 232 Using Aifoto on Your Mobile Devices
    NAS 232 Using AiFoto on Your Mobile Devices Manage photos on your NAS using your mobile device ASUSTOR COLLEGE NAS 232: Using AiFoto on Your Mobile Devices Devices COURSE OBJECTIVES Upon completion of this course you should be able to: 1. Use AiFoto to manage photos and albums on your NAS and mobile device. PREREQUISITES Course Prerequisites: NAS 137: Introduction to Photo Gallery Students are expected to have a working knowledge of: N/A OUTLINE 1. Introduction to AiFoto 1.1 Introduction to AiFoto 2. Basic Functions 2.1 Settings and instructions 2.2 Connecting to your NAS with AiFoto 2.3 Browsing photos with AiFoto 3. Managing albums and photos 3.1 Album management 3.1.1 Creating albums 3.1.2 Editing album information 3.1.3 Deleting albums 3.1.4 Uploading and downloading albums 3.2 Photo management ASUSTOR COLLEGE / 2 NAS 232: Using AiFoto on Your Mobile Devices Devices 3.3 Using Camera Mode 3.4 Uploading your local camera roll to your NAS 3.5 Privacy settings 4. Notes ASUSTOR COLLEGE / 3 NAS 232: Using AiFoto on Your Mobile Devices Devices 1. Introduction to AiFoto 1.1 Introduction to AiFoto AiFoto lets you access Photo Gallery from your ASUSTOR NAS on your mobile device! With AiFoto you can user your mobile device to browse and manage your NAS web photo albums and instantly upload photos from your mobile device camera roll to your NAS. AiFoto also provides you with a Camera Mode allowing you to specify an album and then have any photos you take automatically uploaded to the album.
    [Show full text]