2. Facts available about you
What picture those facts create
How to craft that picture into an identity
with which you’re happy
Protecting your identity through
reputation & privacy management
3. Discovering
Google yourself
Set search alerts for your name
Controlling
Establishing yourself on the “best fit” social
media/websites
ORCID, LinkedIn, Twitter
Managing
Check your social media privacy settings once/month
Schedule social media updates
4. Overview: Raise your hand
mentally!
•Facebook
• LinkedIn
•Landline
•Email address
•Monetary
donations
•Own a home
•Workplace
website
•Mentioned in an
article
•Published
5. My full name is Kimberley Rene Barker, but my friends and
colleagues call me Kimberley. I use Kimberley R. Barker
professionally.
I’ve worked here in the Health Sciences Library for over five
years.
I have a bachelor’s degree in English from Furman University
and a Masters of Library & Information Science from the
University of South Carolina.
I live in Crozet.
I am 42 years old
I am married, and have one child
Hobbies include herb lore, reading, and anime
6. SS#
Criminal record
Performance record
Current salary
What grade I got in my freshman English class
Boy or girl?
How long I’ve been married
Political views
Purchase price/ current value of my home
Birthday
Medical history
7. In order to remain relevant,
engaged, and competitive, we
need to have a fully-established
online presence, but at the same
time we value our privacy.
8. 1. Not concerned
2. Usually not concerned unless I come
across a concern or if something is
brought to my attention
3. Concerned and actively take steps to
protect my privacy
4. I don’t use the Internet because I am
very concerned about privacy
9. Be aware of privacy policies/issues
Actively build and maintain online
identity
Separate personal from business, as best
you can (Facebook vs. Twitter vs.
about.me)
Think before you post
-or-
Don’t post
-or-
Don’t care
10. Anonymity vs authenticity
Who wants our information
How information about us appears
on the internet
Surface web
Deep/dark web
Steps for managing your online
identity
11. Identity of the institution (library, hospital,
etc)
The Health System’s Social Media
Guidelines:
http://www.uvabrand.com/social-media-
guidelines.html
Identity of the individual
patient, doctor, medical student, YOU, etc
12.
13. Major Players in Online Identity in the West
*Both companies force ―authenticity‖, sometimes to
their detriment (e.g., Native American names)
17. What are some of the good things about
anonymity and authenticity?
Over the past few years, have you found
yourself caring more about your online
self?
20. Facebook
Location info
Foursquare
Where we eat
What we like to eat
What visually
interests us
(Pinterest)
Twitter
Web searches
Music
Pandora
Spotify
YouTube
Netflix
Photo sharing sites
email
*Data Broadcasting
22. … data is not only about the original content stored or being
consumed but also about the information around its consumption.
Smartphones are a great illustration of how our mobile devices
produce additional data sources that are being captured and that
include geographic location, text messages, browsing history, and
(thanks to the addition of accelerometers and GPS) even motion or
direction. – IDC Digital Universe Study
23. Supreme Court: Police need
warrant to search cell phones
http://www.cnn.com/2014/06/
25/justice/supreme-court-cell-
phones/
24. “Big data is a broad term for data sets so large
or complex that traditional data processing
applications are inadequate. Challenges
include analysis, capture, data curation,
search, sharing, storage, transfer,
visualization, querying and information
privacy.”
https://en.wikipedia.org/wiki/Big_data
25. Businesses
Government
Health researchers
School districts
Others
*Again, this is a whole
presentation in and of
itself.
33. .
Acad Med. 2013 Jun;88(6):893-901. doi:
10.1097/ACM.0b013e31828ffc23.
Social media use in medical education: a
systematic review.
Cheston CC1, Flickinger TE, Chisolm MS.
34.
35. Pew Internet & American Life
Project
•As of October 2014, 64% of American adults own
a smartphone.
•As of May 2013, 63% of adult cell owners use their
phones to go online.
•34% of cell internet users go online mostly using their
phones, and not using some other device such as a
desktop or laptop computer.
•As of 2013,19 percent of adults have downloaded a health
and fitness app – who owns their information?
37. Some docs, worried about their reputations, are trying to fight back against
negative reviews, requiring patients to sign contracts — critics call them ―gag
orders‖ — promising not to post comments to public sites. Others ask patients to
sign over copyright to future comments, hoping for leverage to have any nasty
tags removed. – MSNBC 1/13/2010
38. Michael Fertik said doctors are the fastest-
growing client group at his company,
Reputation.com, which helps its customers
investigate their online reputations and
suppress negative comments. Fertik said his
firm does not remove reviews. But it provides
doctors with tools to solicit and post
comments from real patients.
39. Anonymity vs authenticity
Information we provide
Information from others about us
40. Criminal record
Salary info
Value of our houses
(purchase price)
Credit history
Employment history
Educational history
Good thing or bad
thing?
41.
42.
43.
44.
45. Below is a list of companies who make your info
available. To have your information removed,
follow the links and follow the directions.
Public Records Now http://bit.ly/fIF1yZ
Ameridex http://bit.ly/hszkFl
Intelius http://bit.ly/cNyMW5
Pipl http://bit.ly/frflWh
For a more exhaustive list: http://bit.ly/hNlnEb
Controlling
46. • Take a more active role towards controlling the information
that people can/will find about you with a service like
Reputation.com
Control:
reputation management services
*I teach an entire class about Reputation Management
47. What about HIPAA?
Should a doctor be ‘friends’ with a patient?
Should you be friends with your boss?
Should a clinical department have a Fan page?
Should a tenured researcher be friends with a
colleague? With a graduate assistant? With a student?
http://www.uvabrand.com/social-media-
guidelines.html
48. Five areas of which to be aware:
1. Facial recognition
2. Geo-location
3. Contact information
4. Apps & websites
5. Info available for public searches
* All of the above are enabled by default; users
must disable them
Facebook
52. By any reckoning, FB is the world’s largest
biometric database: 75 billion photos, in which
450 million people are tagged
Violates European data protection laws-
complaints have been filed
Turned on by default- users must disable the
function
Facebook & facial recognition
53. Geo-location allows users to share their
location via Facebook
Allows you to “add a location” to your
posts.
Pew Foundation report: “4% of all adults…
use their phones to check in to locations
using geosocial services…”
Facebook & geo-location
56. You can control some of what gets shared with apps
& websites
Your name, profile picture, gender, networks,
username, and user id are always available.
By default, apps have access to your Friends list and
info you make public.
Facebook and apps & websites
61. “Getting people to check in helps you identify people
who are coming to your hospital, who may be
commenting on your service or treatment, and who
may be recommending your hospital to friends and
family--or maybe not. It's a way to build yet another
relationship with someone in your community. The
light bulb over my head finally went on.”
From HospitalImpact.org
Foursquare
62. There’s no avoiding having an online
identity
Understand online privacy policies/ issues
Understand what data we are
broadcasting and shut down anything we
are not comfortable with sharing
Manage and maintain online places
Avoid unprofessional conduct
Always think twice
63. 1. Regularly inventory and update your “places” on
the internet and what appears about you
• Look for evil/famous twins.
• Apply SEO (Search Engine Optimization) to
raise good content and lower bad content.
• Set up an alerts search on your name.
2. Tighten up your security settings and clean up
what you can control and ask other content
owners to do the same
3. Set up profiles on sites appropriate to your field
(ResearchGate, Doximity, LinkedIn)
64. Develop an information control strategy
Know what information is out there
monitor your identity the same way that
you monitor your credit
Manage that information (think carefully
about what you post, removing info, etc)
Carefully manage your social networking
contacts
Seek professional help if necessary
In conclusion…
65. Extracting Value from Chaos, Gantz and Reinsel. IDC
iView, June 2011.
http://www.emc.com/collateral/analyst-reports/idc-
extracting-value-from-chaos-ar.pdf
Social Networking Websites, Personality Ratings, and the
Organizational Context: More Than Meets the Eye?
Kluemper, Rosen, Mossholder. Journal of Applied Social
Psychology, February 2012.
http://onlinelibrary.wiley.com/doi/10.1111/j.1559-
1816.2011.00881.x/pdf
Online Posting of Unprofessional Content by Medical
Students. Chretien, Greysen, Chretien, and Kind. JAMA,
302 (121), 2009.