SlideShare ist ein Scribd-Unternehmen logo
1 von 8
Facelessness
Katharina Urlbauer
Assignment 4- Social Media in Marketing
Agenda
definition 1&2
elements & uses
prevention
pesonal opinion

sources
Defintion 1
facelessness ≈noun 

faceless≈ adjective

3 different meanings
having no face
remote and impersonal
anonymous

anonymous(≈adj.) made or done by someone
whose name is not know or not made public
Definiton 2
In social media use anonymity basically means that
users and companies can be anonymous. On one
hand many ‚users‘ don‘t have pictures or a real
name added to their account on the other hand
many other ‚users‘ do.

But you can not be 100 % sure that the name given
or the picture added to the profile is a real one or
not. (e.g. invented or belonging to someone else.)
Special elements & uses of
facelessness
insult/ offence
cyber –mobbing
cyber – bullying
stalking
disparagement

fraud

BUT: Not all people who want to stay anonymous are bad
and as we all know, telling ‚everything‘ online is not the
best thing you should do and fake accounts can also be an
advantage if you don‘t want everyone to find your profiles
and information.
Prevention
vertification
email
ID
police clearance certificate (tutoria)
bank account (e.g. Paypal)
company information/details (e.g. foursquare)
Personal opinion
In my opinion this is a real threat but can also be an advantage for the
users who want to stay anonymus. But even if you use an fake account
there is almost no chance to stay anonymous because with nowadys
technology you can still find out a lot (e.g. from where you logged, which
device etc. (IP address)).
You can never be 100 % sure if the profile/ account is real or fake.
Now I have 2 short examples:
-

You are chatting with someone and the person ‚behind the other
account‘ is not your age but 40 sth. and is not the person he/she
poses to be.

-

You are buying sth. via the internet and you don‘t get your product at
all or it is damaged and the person who sold it can‘t be caught
because he/she used e.g. a fake account.
Sources
Cambridge Advanced Learner‘s Dictionry (3rd
edition)

http://www.oxforddictionaries.com/definition/engli
sh/faceless?q=facelessness#faceless__5
http://schulesocialmedia.com/tag/anonymitat/

http://sicherheitskultur.at/privacy_soc_networking
.htm

Weitere ähnliche Inhalte

Andere mochten auch

Awodele toxicidad moringa
Awodele toxicidad moringaAwodele toxicidad moringa
Awodele toxicidad moringaFausto Dutan
 
Spy Programs
Spy ProgramsSpy Programs
Spy ProgramsHHSome
 
Dumb ways to ruin a meeting
Dumb ways to ruin a meetingDumb ways to ruin a meeting
Dumb ways to ruin a meetingSegla Segla
 
Threaths and risks
Threaths and risksThreaths and risks
Threaths and risksHHSome
 
การให้คำปรึกษาวิทยานิพนธ์ โดย ผศ. ดร. อดิศร เนาวนนท์ คณบดีบัณฑิตวิทยาลัย
การให้คำปรึกษาวิทยานิพนธ์  โดย ผศ. ดร. อดิศร  เนาวนนท์  คณบดีบัณฑิตวิทยาลัยการให้คำปรึกษาวิทยานิพนธ์  โดย ผศ. ดร. อดิศร  เนาวนนท์  คณบดีบัณฑิตวิทยาลัย
การให้คำปรึกษาวิทยานิพนธ์ โดย ผศ. ดร. อดิศร เนาวนนท์ คณบดีบัณฑิตวิทยาลัยSorapong Premwiriyanon
 
Mdp 511 2012 organizations in development - session 1
Mdp 511 2012 organizations in development - session 1Mdp 511 2012 organizations in development - session 1
Mdp 511 2012 organizations in development - session 1ANDREA_BEAR
 
ยุทธวิธีสู่ความสำเร็จในการจัดการเรียนการสอนระดับบัณฑิตศึกษา โดย ศ.ดร.ไพฑูรย์ ...
ยุทธวิธีสู่ความสำเร็จในการจัดการเรียนการสอนระดับบัณฑิตศึกษา โดย ศ.ดร.ไพฑูรย์ ...ยุทธวิธีสู่ความสำเร็จในการจัดการเรียนการสอนระดับบัณฑิตศึกษา โดย ศ.ดร.ไพฑูรย์ ...
ยุทธวิธีสู่ความสำเร็จในการจัดการเรียนการสอนระดับบัณฑิตศึกษา โดย ศ.ดร.ไพฑูรย์ ...Sorapong Premwiriyanon
 
แนวปฏิบัติที่ดี การประกันคุณภาพบัณฑิต
แนวปฏิบัติที่ดี การประกันคุณภาพบัณฑิตแนวปฏิบัติที่ดี การประกันคุณภาพบัณฑิต
แนวปฏิบัติที่ดี การประกันคุณภาพบัณฑิตSorapong Premwiriyanon
 
Como insertar videos e hipervinculos en una pagina web
Como insertar videos e hipervinculos en una pagina webComo insertar videos e hipervinculos en una pagina web
Como insertar videos e hipervinculos en una pagina webArturo Arcela
 
trabajo 2 Datos
trabajo 2 Datostrabajo 2 Datos
trabajo 2 Datoscesar82703
 

Andere mochten auch (19)

Rural Minnesota Journal: Reshaping Pelican Rapids
Rural Minnesota Journal: Reshaping Pelican RapidsRural Minnesota Journal: Reshaping Pelican Rapids
Rural Minnesota Journal: Reshaping Pelican Rapids
 
Imc presentation
Imc presentationImc presentation
Imc presentation
 
Awodele toxicidad moringa
Awodele toxicidad moringaAwodele toxicidad moringa
Awodele toxicidad moringa
 
Fdlp presentation
Fdlp presentationFdlp presentation
Fdlp presentation
 
Spy Programs
Spy ProgramsSpy Programs
Spy Programs
 
Dumb ways to ruin a meeting
Dumb ways to ruin a meetingDumb ways to ruin a meeting
Dumb ways to ruin a meeting
 
Threaths and risks
Threaths and risksThreaths and risks
Threaths and risks
 
การให้คำปรึกษาวิทยานิพนธ์ โดย ผศ. ดร. อดิศร เนาวนนท์ คณบดีบัณฑิตวิทยาลัย
การให้คำปรึกษาวิทยานิพนธ์  โดย ผศ. ดร. อดิศร  เนาวนนท์  คณบดีบัณฑิตวิทยาลัยการให้คำปรึกษาวิทยานิพนธ์  โดย ผศ. ดร. อดิศร  เนาวนนท์  คณบดีบัณฑิตวิทยาลัย
การให้คำปรึกษาวิทยานิพนธ์ โดย ผศ. ดร. อดิศร เนาวนนท์ คณบดีบัณฑิตวิทยาลัย
 
Mdp 511 2012 organizations in development - session 1
Mdp 511 2012 organizations in development - session 1Mdp 511 2012 organizations in development - session 1
Mdp 511 2012 organizations in development - session 1
 
Sot 2008 revisi
Sot 2008 revisiSot 2008 revisi
Sot 2008 revisi
 
Facebook
FacebookFacebook
Facebook
 
ยุทธวิธีสู่ความสำเร็จในการจัดการเรียนการสอนระดับบัณฑิตศึกษา โดย ศ.ดร.ไพฑูรย์ ...
ยุทธวิธีสู่ความสำเร็จในการจัดการเรียนการสอนระดับบัณฑิตศึกษา โดย ศ.ดร.ไพฑูรย์ ...ยุทธวิธีสู่ความสำเร็จในการจัดการเรียนการสอนระดับบัณฑิตศึกษา โดย ศ.ดร.ไพฑูรย์ ...
ยุทธวิธีสู่ความสำเร็จในการจัดการเรียนการสอนระดับบัณฑิตศึกษา โดย ศ.ดร.ไพฑูรย์ ...
 
Security wp 101
Security wp 101Security wp 101
Security wp 101
 
Fungi
FungiFungi
Fungi
 
American Karma
American KarmaAmerican Karma
American Karma
 
แนวปฏิบัติที่ดี การประกันคุณภาพบัณฑิต
แนวปฏิบัติที่ดี การประกันคุณภาพบัณฑิตแนวปฏิบัติที่ดี การประกันคุณภาพบัณฑิต
แนวปฏิบัติที่ดี การประกันคุณภาพบัณฑิต
 
Invt ques
Invt quesInvt ques
Invt ques
 
Como insertar videos e hipervinculos en una pagina web
Como insertar videos e hipervinculos en una pagina webComo insertar videos e hipervinculos en una pagina web
Como insertar videos e hipervinculos en una pagina web
 
trabajo 2 Datos
trabajo 2 Datostrabajo 2 Datos
trabajo 2 Datos
 

Ähnlich wie Katharina Urlbauer- SMM A4 Facelessness

media safety .pptx
media safety .pptxmedia safety .pptx
media safety .pptxGAmarioarei
 
advantagesanddisadvantagesofsocialmedia-151211192046.pdf
advantagesanddisadvantagesofsocialmedia-151211192046.pdfadvantagesanddisadvantagesofsocialmedia-151211192046.pdf
advantagesanddisadvantagesofsocialmedia-151211192046.pdfRinkiSharma51
 
advantagesanddisadvantagesofsocialmedia-151211192046.pptx
advantagesanddisadvantagesofsocialmedia-151211192046.pptxadvantagesanddisadvantagesofsocialmedia-151211192046.pptx
advantagesanddisadvantagesofsocialmedia-151211192046.pptxHimabindu905359
 
Advantages and disadvantages of social media
Advantages and disadvantages of social mediaAdvantages and disadvantages of social media
Advantages and disadvantages of social mediaAlan Raj
 
Advantages and disadvantages of social media
Advantages and disadvantages of social mediaAdvantages and disadvantages of social media
Advantages and disadvantages of social mediaAlan Raj
 
Student book key unit3
Student book key unit3Student book key unit3
Student book key unit3jesusmlaz
 
Social Media Safety Presentation
Social Media Safety PresentationSocial Media Safety Presentation
Social Media Safety PresentationLJ Henshell
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationJamie Proctor-Brassard
 
Digital Leaders e-safety presentation 2015
Digital Leaders e-safety presentation 2015Digital Leaders e-safety presentation 2015
Digital Leaders e-safety presentation 2015Jamie Edmondson
 
Information Technology and EthicsSocial Networking and Business.docx
Information Technology and EthicsSocial Networking and Business.docxInformation Technology and EthicsSocial Networking and Business.docx
Information Technology and EthicsSocial Networking and Business.docxjaggernaoma
 
Internet 2.0 Conference Reviews Ways To Spot Scam Offenses In The Digital Com...
Internet 2.0 Conference Reviews Ways To Spot Scam Offenses In The Digital Com...Internet 2.0 Conference Reviews Ways To Spot Scam Offenses In The Digital Com...
Internet 2.0 Conference Reviews Ways To Spot Scam Offenses In The Digital Com...Internet 2Conf
 
Lecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxLecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxDominicCaling
 
6 Ways to Protect Yourself From Online Catfishing Scams.pdf
6 Ways to Protect  Yourself  From Online  Catfishing Scams.pdf6 Ways to Protect  Yourself  From Online  Catfishing Scams.pdf
6 Ways to Protect Yourself From Online Catfishing Scams.pdfSysvoot Antivirus
 
Social media Challenges and Advantage
Social media Challenges and AdvantageSocial media Challenges and Advantage
Social media Challenges and AdvantageTechno World 4 U
 
disscussion reply to the question asked from students minimum words .docx
disscussion reply to the question asked from students minimum words .docxdisscussion reply to the question asked from students minimum words .docx
disscussion reply to the question asked from students minimum words .docxjameywaughj
 

Ähnlich wie Katharina Urlbauer- SMM A4 Facelessness (20)

media safety .pptx
media safety .pptxmedia safety .pptx
media safety .pptx
 
advantagesanddisadvantagesofsocialmedia-151211192046.pdf
advantagesanddisadvantagesofsocialmedia-151211192046.pdfadvantagesanddisadvantagesofsocialmedia-151211192046.pdf
advantagesanddisadvantagesofsocialmedia-151211192046.pdf
 
advantagesanddisadvantagesofsocialmedia-151211192046.pptx
advantagesanddisadvantagesofsocialmedia-151211192046.pptxadvantagesanddisadvantagesofsocialmedia-151211192046.pptx
advantagesanddisadvantagesofsocialmedia-151211192046.pptx
 
Advantages and disadvantages of social media
Advantages and disadvantages of social mediaAdvantages and disadvantages of social media
Advantages and disadvantages of social media
 
Advantages and disadvantages of social media
Advantages and disadvantages of social mediaAdvantages and disadvantages of social media
Advantages and disadvantages of social media
 
Student book key unit3
Student book key unit3Student book key unit3
Student book key unit3
 
Users guide
Users guideUsers guide
Users guide
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Social Media Safety Presentation
Social Media Safety PresentationSocial Media Safety Presentation
Social Media Safety Presentation
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness Presentation
 
Digital Leaders e-safety presentation 2015
Digital Leaders e-safety presentation 2015Digital Leaders e-safety presentation 2015
Digital Leaders e-safety presentation 2015
 
risks associated with using social Media
 risks associated with using social Media  risks associated with using social Media
risks associated with using social Media
 
Information Technology and EthicsSocial Networking and Business.docx
Information Technology and EthicsSocial Networking and Business.docxInformation Technology and EthicsSocial Networking and Business.docx
Information Technology and EthicsSocial Networking and Business.docx
 
INTERNET SECUIRTY TIPS
INTERNET SECUIRTY TIPSINTERNET SECUIRTY TIPS
INTERNET SECUIRTY TIPS
 
Internet 2.0 Conference Reviews Ways To Spot Scam Offenses In The Digital Com...
Internet 2.0 Conference Reviews Ways To Spot Scam Offenses In The Digital Com...Internet 2.0 Conference Reviews Ways To Spot Scam Offenses In The Digital Com...
Internet 2.0 Conference Reviews Ways To Spot Scam Offenses In The Digital Com...
 
Lecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxLecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptx
 
6 Ways to Protect Yourself From Online Catfishing Scams.pdf
6 Ways to Protect  Yourself  From Online  Catfishing Scams.pdf6 Ways to Protect  Yourself  From Online  Catfishing Scams.pdf
6 Ways to Protect Yourself From Online Catfishing Scams.pdf
 
Social media Challenges and Advantage
Social media Challenges and AdvantageSocial media Challenges and Advantage
Social media Challenges and Advantage
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
disscussion reply to the question asked from students minimum words .docx
disscussion reply to the question asked from students minimum words .docxdisscussion reply to the question asked from students minimum words .docx
disscussion reply to the question asked from students minimum words .docx
 

Mehr von HHSome

Assignment4
Assignment4Assignment4
Assignment4HHSome
 
Reputational risk on social media
Reputational risk on social mediaReputational risk on social media
Reputational risk on social mediaHHSome
 
Social media threats and risks: corporate espionage
Social media threats and risks: corporate espionageSocial media threats and risks: corporate espionage
Social media threats and risks: corporate espionageHHSome
 
Assignment 4 Netiquette Kalle Andersson
Assignment 4 Netiquette Kalle AnderssonAssignment 4 Netiquette Kalle Andersson
Assignment 4 Netiquette Kalle AnderssonHHSome
 
Over posting
Over postingOver posting
Over postingHHSome
 
Censorship
CensorshipCensorship
CensorshipHHSome
 
Piracy and infringement
Piracy and infringement Piracy and infringement
Piracy and infringement HHSome
 
Threaths and risks
Threaths and risksThreaths and risks
Threaths and risksHHSome
 
Assigment 4 link to prezi
Assigment 4 link to preziAssigment 4 link to prezi
Assigment 4 link to preziHHSome
 
Lisa Koivunen, Risks and Threats in over promoting
Lisa Koivunen, Risks and Threats in over promotingLisa Koivunen, Risks and Threats in over promoting
Lisa Koivunen, Risks and Threats in over promotingHHSome
 
Phishing
PhishingPhishing
PhishingHHSome
 
Identity thefts
Identity theftsIdentity thefts
Identity theftsHHSome
 
Personal information
Personal informationPersonal information
Personal informationHHSome
 
Risks and Threats in SoMe: Payments
Risks and Threats in SoMe: PaymentsRisks and Threats in SoMe: Payments
Risks and Threats in SoMe: PaymentsHHSome
 
Malware
MalwareMalware
MalwareHHSome
 
Assignment4 yannick kramm
Assignment4 yannick krammAssignment4 yannick kramm
Assignment4 yannick krammHHSome
 

Mehr von HHSome (16)

Assignment4
Assignment4Assignment4
Assignment4
 
Reputational risk on social media
Reputational risk on social mediaReputational risk on social media
Reputational risk on social media
 
Social media threats and risks: corporate espionage
Social media threats and risks: corporate espionageSocial media threats and risks: corporate espionage
Social media threats and risks: corporate espionage
 
Assignment 4 Netiquette Kalle Andersson
Assignment 4 Netiquette Kalle AnderssonAssignment 4 Netiquette Kalle Andersson
Assignment 4 Netiquette Kalle Andersson
 
Over posting
Over postingOver posting
Over posting
 
Censorship
CensorshipCensorship
Censorship
 
Piracy and infringement
Piracy and infringement Piracy and infringement
Piracy and infringement
 
Threaths and risks
Threaths and risksThreaths and risks
Threaths and risks
 
Assigment 4 link to prezi
Assigment 4 link to preziAssigment 4 link to prezi
Assigment 4 link to prezi
 
Lisa Koivunen, Risks and Threats in over promoting
Lisa Koivunen, Risks and Threats in over promotingLisa Koivunen, Risks and Threats in over promoting
Lisa Koivunen, Risks and Threats in over promoting
 
Phishing
PhishingPhishing
Phishing
 
Identity thefts
Identity theftsIdentity thefts
Identity thefts
 
Personal information
Personal informationPersonal information
Personal information
 
Risks and Threats in SoMe: Payments
Risks and Threats in SoMe: PaymentsRisks and Threats in SoMe: Payments
Risks and Threats in SoMe: Payments
 
Malware
MalwareMalware
Malware
 
Assignment4 yannick kramm
Assignment4 yannick krammAssignment4 yannick kramm
Assignment4 yannick kramm
 

Kürzlich hochgeladen

Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 

Kürzlich hochgeladen (20)

Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 

Katharina Urlbauer- SMM A4 Facelessness

  • 2. Agenda definition 1&2 elements & uses prevention pesonal opinion sources
  • 3. Defintion 1 facelessness ≈noun  faceless≈ adjective 3 different meanings having no face remote and impersonal anonymous anonymous(≈adj.) made or done by someone whose name is not know or not made public
  • 4. Definiton 2 In social media use anonymity basically means that users and companies can be anonymous. On one hand many ‚users‘ don‘t have pictures or a real name added to their account on the other hand many other ‚users‘ do. But you can not be 100 % sure that the name given or the picture added to the profile is a real one or not. (e.g. invented or belonging to someone else.)
  • 5. Special elements & uses of facelessness insult/ offence cyber –mobbing cyber – bullying stalking disparagement fraud BUT: Not all people who want to stay anonymous are bad and as we all know, telling ‚everything‘ online is not the best thing you should do and fake accounts can also be an advantage if you don‘t want everyone to find your profiles and information.
  • 6. Prevention vertification email ID police clearance certificate (tutoria) bank account (e.g. Paypal) company information/details (e.g. foursquare)
  • 7. Personal opinion In my opinion this is a real threat but can also be an advantage for the users who want to stay anonymus. But even if you use an fake account there is almost no chance to stay anonymous because with nowadys technology you can still find out a lot (e.g. from where you logged, which device etc. (IP address)). You can never be 100 % sure if the profile/ account is real or fake. Now I have 2 short examples: - You are chatting with someone and the person ‚behind the other account‘ is not your age but 40 sth. and is not the person he/she poses to be. - You are buying sth. via the internet and you don‘t get your product at all or it is damaged and the person who sold it can‘t be caught because he/she used e.g. a fake account.
  • 8. Sources Cambridge Advanced Learner‘s Dictionry (3rd edition) http://www.oxforddictionaries.com/definition/engli sh/faceless?q=facelessness#faceless__5 http://schulesocialmedia.com/tag/anonymitat/ http://sicherheitskultur.at/privacy_soc_networking .htm