SlideShare ist ein Scribd-Unternehmen logo
1 von 8
Facelessness
Katharina Urlbauer
Assignment 4- Social Media in Marketing
Agenda
definition 1&2
elements & uses
prevention
pesonal opinion

sources
Defintion 1
facelessness ≈noun 

faceless≈ adjective

3 different meanings
having no face
remote and impersonal
anonymous

anonymous(≈adj.) made or done by someone
whose name is not know or not made public
Definiton 2
In social media use anonymity basically means that
users and companies can be anonymous. On one
hand many ‚users‘ don‘t have pictures or a real
name added to their account on the other hand
many other ‚users‘ do.

But you can not be 100 % sure that the name given
or the picture added to the profile is a real one or
not. (e.g. invented or belonging to someone else.)
Special elements & uses of
facelessness
insult/ offence
cyber –mobbing
cyber – bullying
stalking
disparagement

fraud

BUT: Not all people who want to stay anonymous are bad
and as we all know, telling ‚everything‘ online is not the
best thing you should do and fake accounts can also be an
advantage if you don‘t want everyone to find your profiles
and information.
Prevention
vertification
email
ID
police clearance certificate (tutoria)
bank account (e.g. Paypal)
company information/details (e.g. foursquare)
Personal opinion
In my opinion this is a real threat but can also be an advantage for the
users who want to stay anonymus. But even if you use an fake account
there is almost no chance to stay anonymous because with nowadys
technology you can still find out a lot (e.g. from where you logged, which
device etc. (IP address)).
You can never be 100 % sure if the profile/ account is real or fake.
Now I have 2 short examples:
-

You are chatting with someone and the person ‚behind the other
account‘ is not your age but 40 sth. and is not the person he/she
poses to be.

-

You are buying sth. via the internet and you don‘t get your product at
all or it is damaged and the person who sold it can‘t be caught
because he/she used e.g. a fake account.
Sources
Cambridge Advanced Learner‘s Dictionry (3rd
edition)

http://www.oxforddictionaries.com/definition/engli
sh/faceless?q=facelessness#faceless__5
http://schulesocialmedia.com/tag/anonymitat/

http://sicherheitskultur.at/privacy_soc_networking
.htm

Weitere ähnliche Inhalte

Andere mochten auch

Awodele toxicidad moringa
Awodele toxicidad moringaAwodele toxicidad moringa
Awodele toxicidad moringaFausto Dutan
 
Spy Programs
Spy ProgramsSpy Programs
Spy ProgramsHHSome
 
Dumb ways to ruin a meeting
Dumb ways to ruin a meetingDumb ways to ruin a meeting
Dumb ways to ruin a meetingSegla Segla
 
Threaths and risks
Threaths and risksThreaths and risks
Threaths and risksHHSome
 
การให้คำปรึกษาวิทยานิพนธ์ โดย ผศ. ดร. อดิศร เนาวนนท์ คณบดีบัณฑิตวิทยาลัย
การให้คำปรึกษาวิทยานิพนธ์  โดย ผศ. ดร. อดิศร  เนาวนนท์  คณบดีบัณฑิตวิทยาลัยการให้คำปรึกษาวิทยานิพนธ์  โดย ผศ. ดร. อดิศร  เนาวนนท์  คณบดีบัณฑิตวิทยาลัย
การให้คำปรึกษาวิทยานิพนธ์ โดย ผศ. ดร. อดิศร เนาวนนท์ คณบดีบัณฑิตวิทยาลัยSorapong Premwiriyanon
 
Mdp 511 2012 organizations in development - session 1
Mdp 511 2012 organizations in development - session 1Mdp 511 2012 organizations in development - session 1
Mdp 511 2012 organizations in development - session 1ANDREA_BEAR
 
ยุทธวิธีสู่ความสำเร็จในการจัดการเรียนการสอนระดับบัณฑิตศึกษา โดย ศ.ดร.ไพฑูรย์ ...
ยุทธวิธีสู่ความสำเร็จในการจัดการเรียนการสอนระดับบัณฑิตศึกษา โดย ศ.ดร.ไพฑูรย์ ...ยุทธวิธีสู่ความสำเร็จในการจัดการเรียนการสอนระดับบัณฑิตศึกษา โดย ศ.ดร.ไพฑูรย์ ...
ยุทธวิธีสู่ความสำเร็จในการจัดการเรียนการสอนระดับบัณฑิตศึกษา โดย ศ.ดร.ไพฑูรย์ ...Sorapong Premwiriyanon
 
แนวปฏิบัติที่ดี การประกันคุณภาพบัณฑิต
แนวปฏิบัติที่ดี การประกันคุณภาพบัณฑิตแนวปฏิบัติที่ดี การประกันคุณภาพบัณฑิต
แนวปฏิบัติที่ดี การประกันคุณภาพบัณฑิตSorapong Premwiriyanon
 
Como insertar videos e hipervinculos en una pagina web
Como insertar videos e hipervinculos en una pagina webComo insertar videos e hipervinculos en una pagina web
Como insertar videos e hipervinculos en una pagina webArturo Arcela
 
trabajo 2 Datos
trabajo 2 Datostrabajo 2 Datos
trabajo 2 Datoscesar82703
 

Andere mochten auch (19)

Rural Minnesota Journal: Reshaping Pelican Rapids
Rural Minnesota Journal: Reshaping Pelican RapidsRural Minnesota Journal: Reshaping Pelican Rapids
Rural Minnesota Journal: Reshaping Pelican Rapids
 
Imc presentation
Imc presentationImc presentation
Imc presentation
 
Awodele toxicidad moringa
Awodele toxicidad moringaAwodele toxicidad moringa
Awodele toxicidad moringa
 
Fdlp presentation
Fdlp presentationFdlp presentation
Fdlp presentation
 
Spy Programs
Spy ProgramsSpy Programs
Spy Programs
 
Dumb ways to ruin a meeting
Dumb ways to ruin a meetingDumb ways to ruin a meeting
Dumb ways to ruin a meeting
 
Threaths and risks
Threaths and risksThreaths and risks
Threaths and risks
 
การให้คำปรึกษาวิทยานิพนธ์ โดย ผศ. ดร. อดิศร เนาวนนท์ คณบดีบัณฑิตวิทยาลัย
การให้คำปรึกษาวิทยานิพนธ์  โดย ผศ. ดร. อดิศร  เนาวนนท์  คณบดีบัณฑิตวิทยาลัยการให้คำปรึกษาวิทยานิพนธ์  โดย ผศ. ดร. อดิศร  เนาวนนท์  คณบดีบัณฑิตวิทยาลัย
การให้คำปรึกษาวิทยานิพนธ์ โดย ผศ. ดร. อดิศร เนาวนนท์ คณบดีบัณฑิตวิทยาลัย
 
Mdp 511 2012 organizations in development - session 1
Mdp 511 2012 organizations in development - session 1Mdp 511 2012 organizations in development - session 1
Mdp 511 2012 organizations in development - session 1
 
Sot 2008 revisi
Sot 2008 revisiSot 2008 revisi
Sot 2008 revisi
 
Facebook
FacebookFacebook
Facebook
 
ยุทธวิธีสู่ความสำเร็จในการจัดการเรียนการสอนระดับบัณฑิตศึกษา โดย ศ.ดร.ไพฑูรย์ ...
ยุทธวิธีสู่ความสำเร็จในการจัดการเรียนการสอนระดับบัณฑิตศึกษา โดย ศ.ดร.ไพฑูรย์ ...ยุทธวิธีสู่ความสำเร็จในการจัดการเรียนการสอนระดับบัณฑิตศึกษา โดย ศ.ดร.ไพฑูรย์ ...
ยุทธวิธีสู่ความสำเร็จในการจัดการเรียนการสอนระดับบัณฑิตศึกษา โดย ศ.ดร.ไพฑูรย์ ...
 
Security wp 101
Security wp 101Security wp 101
Security wp 101
 
Fungi
FungiFungi
Fungi
 
American Karma
American KarmaAmerican Karma
American Karma
 
แนวปฏิบัติที่ดี การประกันคุณภาพบัณฑิต
แนวปฏิบัติที่ดี การประกันคุณภาพบัณฑิตแนวปฏิบัติที่ดี การประกันคุณภาพบัณฑิต
แนวปฏิบัติที่ดี การประกันคุณภาพบัณฑิต
 
Invt ques
Invt quesInvt ques
Invt ques
 
Como insertar videos e hipervinculos en una pagina web
Como insertar videos e hipervinculos en una pagina webComo insertar videos e hipervinculos en una pagina web
Como insertar videos e hipervinculos en una pagina web
 
trabajo 2 Datos
trabajo 2 Datostrabajo 2 Datos
trabajo 2 Datos
 

Ähnlich wie Katharina Urlbauer- SMM A4 Facelessness

media safety .pptx
media safety .pptxmedia safety .pptx
media safety .pptxGAmarioarei
 
advantagesanddisadvantagesofsocialmedia-151211192046.pdf
advantagesanddisadvantagesofsocialmedia-151211192046.pdfadvantagesanddisadvantagesofsocialmedia-151211192046.pdf
advantagesanddisadvantagesofsocialmedia-151211192046.pdfRinkiSharma51
 
advantagesanddisadvantagesofsocialmedia-151211192046.pptx
advantagesanddisadvantagesofsocialmedia-151211192046.pptxadvantagesanddisadvantagesofsocialmedia-151211192046.pptx
advantagesanddisadvantagesofsocialmedia-151211192046.pptxHimabindu905359
 
Advantages and disadvantages of social media
Advantages and disadvantages of social mediaAdvantages and disadvantages of social media
Advantages and disadvantages of social mediaAlan Raj
 
Advantages and disadvantages of social media
Advantages and disadvantages of social mediaAdvantages and disadvantages of social media
Advantages and disadvantages of social mediaAlan Raj
 
Student book key unit3
Student book key unit3Student book key unit3
Student book key unit3jesusmlaz
 
Social Media Safety Presentation
Social Media Safety PresentationSocial Media Safety Presentation
Social Media Safety PresentationLJ Henshell
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationJamie Proctor-Brassard
 
Digital Leaders e-safety presentation 2015
Digital Leaders e-safety presentation 2015Digital Leaders e-safety presentation 2015
Digital Leaders e-safety presentation 2015Jamie Edmondson
 
Information Technology and EthicsSocial Networking and Business.docx
Information Technology and EthicsSocial Networking and Business.docxInformation Technology and EthicsSocial Networking and Business.docx
Information Technology and EthicsSocial Networking and Business.docxjaggernaoma
 
Internet 2.0 Conference Reviews Ways To Spot Scam Offenses In The Digital Com...
Internet 2.0 Conference Reviews Ways To Spot Scam Offenses In The Digital Com...Internet 2.0 Conference Reviews Ways To Spot Scam Offenses In The Digital Com...
Internet 2.0 Conference Reviews Ways To Spot Scam Offenses In The Digital Com...Internet 2Conf
 
Lecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxLecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxDominicCaling
 
6 Ways to Protect Yourself From Online Catfishing Scams.pdf
6 Ways to Protect  Yourself  From Online  Catfishing Scams.pdf6 Ways to Protect  Yourself  From Online  Catfishing Scams.pdf
6 Ways to Protect Yourself From Online Catfishing Scams.pdfSysvoot Antivirus
 
Social media Challenges and Advantage
Social media Challenges and AdvantageSocial media Challenges and Advantage
Social media Challenges and AdvantageTechno World 4 U
 
disscussion reply to the question asked from students minimum words .docx
disscussion reply to the question asked from students minimum words .docxdisscussion reply to the question asked from students minimum words .docx
disscussion reply to the question asked from students minimum words .docxjameywaughj
 

Ähnlich wie Katharina Urlbauer- SMM A4 Facelessness (20)

media safety .pptx
media safety .pptxmedia safety .pptx
media safety .pptx
 
advantagesanddisadvantagesofsocialmedia-151211192046.pdf
advantagesanddisadvantagesofsocialmedia-151211192046.pdfadvantagesanddisadvantagesofsocialmedia-151211192046.pdf
advantagesanddisadvantagesofsocialmedia-151211192046.pdf
 
advantagesanddisadvantagesofsocialmedia-151211192046.pptx
advantagesanddisadvantagesofsocialmedia-151211192046.pptxadvantagesanddisadvantagesofsocialmedia-151211192046.pptx
advantagesanddisadvantagesofsocialmedia-151211192046.pptx
 
Advantages and disadvantages of social media
Advantages and disadvantages of social mediaAdvantages and disadvantages of social media
Advantages and disadvantages of social media
 
Advantages and disadvantages of social media
Advantages and disadvantages of social mediaAdvantages and disadvantages of social media
Advantages and disadvantages of social media
 
Student book key unit3
Student book key unit3Student book key unit3
Student book key unit3
 
Users guide
Users guideUsers guide
Users guide
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Social Media Safety Presentation
Social Media Safety PresentationSocial Media Safety Presentation
Social Media Safety Presentation
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness Presentation
 
Digital Leaders e-safety presentation 2015
Digital Leaders e-safety presentation 2015Digital Leaders e-safety presentation 2015
Digital Leaders e-safety presentation 2015
 
risks associated with using social Media
 risks associated with using social Media  risks associated with using social Media
risks associated with using social Media
 
Information Technology and EthicsSocial Networking and Business.docx
Information Technology and EthicsSocial Networking and Business.docxInformation Technology and EthicsSocial Networking and Business.docx
Information Technology and EthicsSocial Networking and Business.docx
 
INTERNET SECUIRTY TIPS
INTERNET SECUIRTY TIPSINTERNET SECUIRTY TIPS
INTERNET SECUIRTY TIPS
 
Internet 2.0 Conference Reviews Ways To Spot Scam Offenses In The Digital Com...
Internet 2.0 Conference Reviews Ways To Spot Scam Offenses In The Digital Com...Internet 2.0 Conference Reviews Ways To Spot Scam Offenses In The Digital Com...
Internet 2.0 Conference Reviews Ways To Spot Scam Offenses In The Digital Com...
 
Lecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxLecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptx
 
6 Ways to Protect Yourself From Online Catfishing Scams.pdf
6 Ways to Protect  Yourself  From Online  Catfishing Scams.pdf6 Ways to Protect  Yourself  From Online  Catfishing Scams.pdf
6 Ways to Protect Yourself From Online Catfishing Scams.pdf
 
Social media Challenges and Advantage
Social media Challenges and AdvantageSocial media Challenges and Advantage
Social media Challenges and Advantage
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
disscussion reply to the question asked from students minimum words .docx
disscussion reply to the question asked from students minimum words .docxdisscussion reply to the question asked from students minimum words .docx
disscussion reply to the question asked from students minimum words .docx
 

Mehr von HHSome

Assignment4
Assignment4Assignment4
Assignment4HHSome
 
Reputational risk on social media
Reputational risk on social mediaReputational risk on social media
Reputational risk on social mediaHHSome
 
Social media threats and risks: corporate espionage
Social media threats and risks: corporate espionageSocial media threats and risks: corporate espionage
Social media threats and risks: corporate espionageHHSome
 
Assignment 4 Netiquette Kalle Andersson
Assignment 4 Netiquette Kalle AnderssonAssignment 4 Netiquette Kalle Andersson
Assignment 4 Netiquette Kalle AnderssonHHSome
 
Over posting
Over postingOver posting
Over postingHHSome
 
Censorship
CensorshipCensorship
CensorshipHHSome
 
Piracy and infringement
Piracy and infringement Piracy and infringement
Piracy and infringement HHSome
 
Threaths and risks
Threaths and risksThreaths and risks
Threaths and risksHHSome
 
Assigment 4 link to prezi
Assigment 4 link to preziAssigment 4 link to prezi
Assigment 4 link to preziHHSome
 
Lisa Koivunen, Risks and Threats in over promoting
Lisa Koivunen, Risks and Threats in over promotingLisa Koivunen, Risks and Threats in over promoting
Lisa Koivunen, Risks and Threats in over promotingHHSome
 
Phishing
PhishingPhishing
PhishingHHSome
 
Identity thefts
Identity theftsIdentity thefts
Identity theftsHHSome
 
Personal information
Personal informationPersonal information
Personal informationHHSome
 
Risks and Threats in SoMe: Payments
Risks and Threats in SoMe: PaymentsRisks and Threats in SoMe: Payments
Risks and Threats in SoMe: PaymentsHHSome
 
Malware
MalwareMalware
MalwareHHSome
 
Assignment4 yannick kramm
Assignment4 yannick krammAssignment4 yannick kramm
Assignment4 yannick krammHHSome
 

Mehr von HHSome (16)

Assignment4
Assignment4Assignment4
Assignment4
 
Reputational risk on social media
Reputational risk on social mediaReputational risk on social media
Reputational risk on social media
 
Social media threats and risks: corporate espionage
Social media threats and risks: corporate espionageSocial media threats and risks: corporate espionage
Social media threats and risks: corporate espionage
 
Assignment 4 Netiquette Kalle Andersson
Assignment 4 Netiquette Kalle AnderssonAssignment 4 Netiquette Kalle Andersson
Assignment 4 Netiquette Kalle Andersson
 
Over posting
Over postingOver posting
Over posting
 
Censorship
CensorshipCensorship
Censorship
 
Piracy and infringement
Piracy and infringement Piracy and infringement
Piracy and infringement
 
Threaths and risks
Threaths and risksThreaths and risks
Threaths and risks
 
Assigment 4 link to prezi
Assigment 4 link to preziAssigment 4 link to prezi
Assigment 4 link to prezi
 
Lisa Koivunen, Risks and Threats in over promoting
Lisa Koivunen, Risks and Threats in over promotingLisa Koivunen, Risks and Threats in over promoting
Lisa Koivunen, Risks and Threats in over promoting
 
Phishing
PhishingPhishing
Phishing
 
Identity thefts
Identity theftsIdentity thefts
Identity thefts
 
Personal information
Personal informationPersonal information
Personal information
 
Risks and Threats in SoMe: Payments
Risks and Threats in SoMe: PaymentsRisks and Threats in SoMe: Payments
Risks and Threats in SoMe: Payments
 
Malware
MalwareMalware
Malware
 
Assignment4 yannick kramm
Assignment4 yannick krammAssignment4 yannick kramm
Assignment4 yannick kramm
 

Kürzlich hochgeladen

Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 

Kürzlich hochgeladen (20)

Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 

Katharina Urlbauer- SMM A4 Facelessness

  • 2. Agenda definition 1&2 elements & uses prevention pesonal opinion sources
  • 3. Defintion 1 facelessness ≈noun  faceless≈ adjective 3 different meanings having no face remote and impersonal anonymous anonymous(≈adj.) made or done by someone whose name is not know or not made public
  • 4. Definiton 2 In social media use anonymity basically means that users and companies can be anonymous. On one hand many ‚users‘ don‘t have pictures or a real name added to their account on the other hand many other ‚users‘ do. But you can not be 100 % sure that the name given or the picture added to the profile is a real one or not. (e.g. invented or belonging to someone else.)
  • 5. Special elements & uses of facelessness insult/ offence cyber –mobbing cyber – bullying stalking disparagement fraud BUT: Not all people who want to stay anonymous are bad and as we all know, telling ‚everything‘ online is not the best thing you should do and fake accounts can also be an advantage if you don‘t want everyone to find your profiles and information.
  • 6. Prevention vertification email ID police clearance certificate (tutoria) bank account (e.g. Paypal) company information/details (e.g. foursquare)
  • 7. Personal opinion In my opinion this is a real threat but can also be an advantage for the users who want to stay anonymus. But even if you use an fake account there is almost no chance to stay anonymous because with nowadys technology you can still find out a lot (e.g. from where you logged, which device etc. (IP address)). You can never be 100 % sure if the profile/ account is real or fake. Now I have 2 short examples: - You are chatting with someone and the person ‚behind the other account‘ is not your age but 40 sth. and is not the person he/she poses to be. - You are buying sth. via the internet and you don‘t get your product at all or it is damaged and the person who sold it can‘t be caught because he/she used e.g. a fake account.
  • 8. Sources Cambridge Advanced Learner‘s Dictionry (3rd edition) http://www.oxforddictionaries.com/definition/engli sh/faceless?q=facelessness#faceless__5 http://schulesocialmedia.com/tag/anonymitat/ http://sicherheitskultur.at/privacy_soc_networking .htm