Keeping up with the state of technology is not easy. New social media services such as Twitter, Facebook, Google+, Pinterest, Diigo, YouTube , Tumblr, Instagram, and AudioBoo continue to emerge and users sign-up and setup profiles without considering the full ramifications of sharing personal information. Clif Mims shares practical tips for helping you and your students thoughtfully setup and maintain your online identities.
4. Others add their own opinions
(good or bad), which contribute
to your reputation.
(Source: http://www.microsoft.com/security/online-privacy/reputation.aspx)
Source: http://terrypetrovick.com/socialmedia/are-you-an-unknown-commenter
On the Internet, you create an
image of yourself through the
information
you
share
in
blogs, comments, tweets, snapsh
ots, videos, and links.
5. Our Digital Footprints
Consist of Electronic Data
• Websites, blogs, and wikis
• Online social networks:
Twitter, Facebook, Google+, LinkedIn, Edmodo
• Social media sites: YouTube, Flickr, AudioBoo
• Mashup and authoring tools:
Glogster, VoiceThread, Storybird
• Location-based services: Foursqare, Yelp
• Virtual worlds and gaming sites: Second Life, World of
Warcraft
• IM and teleconference: AOL Instant
Messenger, iChat, Skype
• Text messages
6. Our Digital Footprints
Consist of Electronic Data
• Websites, blogs, and wikis
• Online social networks:
Twitter, Facebook, Google+, LinkedIn, Edmodo
• Social media sites: YouTube, Flickr, AudioBoo
• Mashup and authoring tools:
Glogster, VoiceThread, Storybird
• Location-based services: Foursqare, Yelp
• Virtual worlds and gaming sites: Second Life, World of
Warcraft
• IM and teleconference: AOL Instant
Messenger, iChat, Skype
• Text messages
7. Our Digital Footprints
Consist of Electronic Data
• Websites, blogs, and wikis
• Online social networks:
Twitter, Facebook, Google+, LinkedIn, Edmodo
• Social media sites: YouTube, Flickr, AudioBoo
• Mashup and authoring tools:
Glogster, VoiceThread, Storybird
• Location-based services: Foursqare, Yelp
• Virtual worlds and gaming sites: Second Life, World of
Warcraft
• IM and teleconference: AOL Instant
Messenger, iChat, Skype
• Text messages
8. Our Digital Footprints
Consist of Electronic Data
• Websites, blogs, and wikis
• Online social networks: Twitter, Facebook, Google+,
LinkedIn, Edmodo
• Social media sites: YouTube, Flickr, AudioBoo
• Mashup and authoring tools: Glogster, VoiceThread,
Storybird
• Location-based services: Foursqare, Yelp
• Virtual worlds and gaming sites: Second Life, World of
Warcraft
• IM and teleconference: AOL Instant Messenger, iChat,
Skype
• Text messages
10. Developing Your Plan
What will be shared online?
• Name: full name, nickname
• Age
• Birthday
• Family connections
11. Developing Your Plan
What will be shared online?
• Name: full name, nickname
• Age - not recommended
• Birthday - not recommended
• Family connections
12. Developing Your Plan
Referring to students and your children
• Name: full name, nickname, descriptive
information
• Grade or age
• Show faces in photos and videos?
13. Developing Your Plan
Referring to students and your children
• Name: full name, nickname, descriptive
information
• Grade or age - not recommended
• Show faces in photos and videos?
16. Developing Your Plan
What will be shared online?
• Writing, papers, journaling
• Audio
• Photos
• Videos
• Check-ins
What can and should not be included?
17.
18. Developing Your Plan
Content Considerations
•
•
•
•
•
•
House
Front door
Mailbox
Automobile
License plate
Travel plans
19. Developing Your Plan
Content Considerations
• Family routines (basketball games, band
practice, piano lessons)
• Checking-in at children’s school
20. General Tips
• Review privacy policies when you sign-up and
when they are updated
• Follow your district’s/school’s policies
21. General Tips
• Keep user names, passwords, PINs, and
account numbers private
– 75% 8-9 yr. olds shared passwords with
someone else (Source: WiredSafety.org)
– 66% of girls, grades 7-12, said they shared
their password with someone else (Source:
WiredSafety.org)
22. Treat passwords like your
toothbrush. Don’t share it with
anyone and change it often.
23. General Tips
• Hackers search for answers to security
questions, such as your birthday, home
town, high school class, or mother's maiden
name
24. General Tips
• Consider public vs. private profiles
• Consider using multiple identities:
professional, personal
– Consider having a “rubbish” email account
– Try things out with your rubbish ID
– Sign-up again with your preferred ID
• Be purposeful about your privacy settings
26. General Tips
• Think before you post
• Would you say or do “this” in the real world?
• Would you like for this to be seen by your
mom, spouse, children?
• Would you put it on a shirt and wear it?
• Practice the Golden Rule
• Consider how others might perceive the
information and media that you post
27. General Tips
• Consider how others might perceive the
information and media that you post
• Examples of things that can be interpreted
multiple ways.
• Think about the tone.
• All caps = SHOUTING = ANGER
28. General Tips
• Be mindful of what you post about others
– Courteous
– Respect their privacy
30. General Tips
• Some services and sites allow you to organize
your friends into lists/groups so that you can
customize with whom you share each post
31. General Tips
• Know that it is difficult and sometimes
impossible to truly delete online data
33. Developing Your Plan
Talk with your students and children:
• Discuss their experiences
• Set online rules for your classroom and home
• Determine which sites and services they can
use
• Follow age requirements with your students
and children
34. Developing Your Plan
Talk with your students and children:
• Become familiar with the websites and social
networks they use
• Emphasize that they should never meet their
online friends in the real-world (IRW)
• Encourage them to report cyberbullying
35. Parents
• Will you monitor your children’s time online?
Physical and virtual components
• Claim identities and domain names for your
children ahead of time
• Domain names can be good gifts
36. The Mims Family
My wife and I have purposefully made decisions
about our children’s online identities.
• Use nicknames or identifying information that
only trusted ones know.
– Example: First Day of Preschool
• Use stand-ins in photos via stuffed animals, a ball
cap, or other meaningful items
– Example: Kids’ Pics from Today’s Photo Hike
37. Be Vigilant
• Google yourself, your children, organizations you lead
• Search all variations of your name
• Search your name and previous city names in which
you have lived
• Setup personal alerts: Google search, Twitter and
Facebook texts, etc.
• Repeat the search process using other search engines
• Periodically repeat the entire search process
38. Be Vigilant
• Many social media and online networking sites are
inaccessible to search engines.
• Review what others comment, tweet, and post about
you
• Monitor photos in which you are tagged
• Talk with your friends and family about what you do
and don’t want shared about you and your family
• Ask friends and family to edit or remove information
about you and your family
39. Be Vigilant
• Be mindful of how you use “public” computers
• Be careful about the add-ons and plugins you
install to your site and social networks
• Be careful about using third-party applications
• Ask websites to remove information about
you