SlideShare ist ein Scribd-Unternehmen logo
1 von 36
Are you feeling lucky?
Your digital Identity
Kirsten Thompson
@_KirstenT | K.Thompson@adm.leeds.ac.uk
1. Digital identities
2. Personal VS Professional
3. Managing your identity
Outline
1. Digital identities
‘Digital identity can
be defined as all
the online
information and
data specifically
about an
individual.’
(Last accessed 26/06/13 at:
http://distance.uvic.ca/students/identity.htm)
Your
Digital
Identity
Creating an account on
the social web is a
choice.
Having a digital identity
is not.
We all have a digital
footprint.
Your digital identity =
everything about you
on the web
Verified / non-verified
– both important
What else are you
sharing?
WHOIS database
Location services
Social media privacy
Mobile device security
How do you verify who you are talking
to online? How do others verify you?
How easy is it to steal
your online identity?
Who
manages
your digital
identity?
This was posted on Twitter during a recent
conference presentation #NoEscape
Definition of a meme:
‘noun
1 an element of a culture or
system of behaviour
passed from one individual
to another by imitation or
other non-genetic means.
2 an image, video, piece of
text, etc., typically
humorous in nature, that is
copied and spread rapidly
by Internet users, often with
slight variations.’
(Oxford Dictionaries, online, last accessed 09/07/13 at:
http://oxforddictionaries.com/definition/english/meme)
Grumpy Cat meme
Some companies
create profiles for
us using public
information on the
web – inaccurate
and merging
identities.
.com
What will you
find?
The Wayback Machine has archived
over 240 billion web pages from
1996 – think about your digital
footprint
http://archive.org/web/web.php
Are you feeling lucky?
You can
manage your
digital identity,
you cannot
control it
2. Personal VS Professional
How do you currently
use social media?
1. Finding and using
content on the social
web
2. Joining and building
networks
3. Creating, curating
and sharing content
4. Improving
productivity
5. Managing reputation
Activity
Challenges idea of digital natives and immigrants
“Our Visitors and Residents typology should be understood as a
continuum and not a binary opposition. Individuals may be able to place
themselves at a particular point along this continuum rather than in one of
two boxes.
Nor is a predominantly Visitor approach necessarily any less effective or of
less value than a predominantly
Resident approach since the value of either has to be set against a given
context and set of goals. Similarly, we do not consider the Visitor to be
necessarily any less technically adept than the Resident.”
(White and Le Cornu, 2011, http://firstmonday.org/ojs/index.php/fm/article/viewArticle/3171/3049)
Visitors and Residents
• See web as untidy garden tool
shed
• Defined goal or task
• Select most appropriate tool for
task
• Need to see concrete benefit from
use of a platform
• Relatively anonymous
• Try to avoid the creation of digital
identity
• Caution: identity theft, privacy
• Sense that online social networking
is banal and potentially a time waster
• Will use technology to maintain
relationships
• Web offers set of tools to deliver or
manipulate content (including
conversations)
• Tendency to respect (and seek out)
authoritative sources
• Thinking often takes place offline
• Users, not members, of the web
• See no value in ‘belonging‘ online
• See web as place (park, building) where clusters
of friends and colleagues meet
• Live out a proportion of their life online
• Distinction between online and offline increasingly
blurred
• Sense of belonging to a community
• Have a profile in social networking platforms
• Comfortable expressing their identity online
• Web is a place to express opinions, to form and
extend relationships, maintain and develop a
digital identity
• Aspect of their persona remains once logged off
• See web as networks or clusters of individuals
who generate content/opinion
• No clear distinction between concepts of persona
and content
Visitors Residents
(White and Le Cornu 2011)
How do you see and
use the web?
Map your online activity e.g.
Personal
Professional
Visitor Resident
(@DaveOWhite, Talking About Teaching
Event, University of Leeds, 2013)
“Don’t say (or do)
anything you
wouldn’t on 5
Live.”
Rory Cellan-Jones
Social media = public
Separate personal and
professional, makes each
presence more useful to
your networks
You’re not anonymous on
social media – dangerous to
think you are
Impact of liking, re-tweeting
Click the video to watch
Email
Do you use the same e-mail address to
manage all your social media accounts?
Are you merging personal, professional and
institutional social profiles?
Social media sites encourage us to integrate
our email address book – your email contacts
will find you, whether you want to be found or
not.
When
things go
wrong…
http://news.uk.msn.com/uk/twitter-trolls-u-turn-after-users-threaten-to-tell-his-mum
Case: Lord McAlpine falsely accused
Alleged offence: Libel
Case: Twitter users name victim of rape by
footballer Ched Evans
Offence: The Sexual Offences (Amendment)
Act 1992
Case: Social media users circulated alleged
pictures of child killer Jon Venables
Alleged offence: Contempt of Court
http://www.bbc.co.uk/news/magazine-20782257
Case: Juror Joanne Fraill contact defendant in trial by
Facebook
Offence: Contempt of Court
Case: Paul Chambers joked on Twitter that he would
blow up Robin Hood Airport
Offence: Sending a “menacing electronic
communication” under the 2003 Communications Act
Case: Reading man Sean Duff mocks dead children
on social media sites
Offence: Making “grossley offensive” comments under
the Malicious Communications Act 1988
http://www.bbc.co.uk/news/magazine-20782257
653 people faced criminal charges in England and
Wales in 2012 in connection with comments on Twitter
or Facebook.
These divided into offences committed on the two
sites, such as posting abusive messages, and those
which had been provoked by messages, including
violent attacks.
Many of the offences, such as harassment or threats
to kill would have been committed, albeit in a different
way, before social media was invented.
http://www.bbc.co.uk/news/magazine-20782257
3. Managing
your identity
Are you feeling lucky?
Start thinking like a search engine –
be the top of your own search
results.
Use Google Alerts
to keep updated on
what others are
saying about you
(your work, project
etc) on the web. It
won’t search
everything, but can
assist in managing
your digital identity.
accidentaloutlaw.knowthenet.org.uk
Existing laws apply online as they do offline – new Defamation
Act 2013 (good news). BBC Defamation article
Only share information when you have permission and obtain
permission to publish someone else’s work
Avoid making comments and being supportive of the comments
or actions of others, if they could get you in trouble.
Everything shared on social media, regardless of privacy
settings can be captured.
Educate your social network – your “private” Facebook Timeline
is only as secure as the devices you/your Facebook “friends”
use.
Put simply…think first, share second
Think about security and privacy
1. Use official mobile apps and trusted third-party apps – check reviews.
2. Location services – what else are you sharing with the world?
3. Are your mobile devices secure? What information are you giving away if
your device is lost/stolen? Is your device set up for remote wiping?
4. A service or App might be secure, your internet access might not be –
think about what you do/where you do it – public Wi-Fi can be dangerous.
5. Do you need to remain logged into all apps at all times? Think about your
web history too.
6. Be wary of hackers, account cloning, phishing scams, rogue links.
7. Unused accounts at risk – monitor or close | consider strong password
security.
Keep
updated
about
online
safety
and the
law
www.socialmedialaw.co.uk
www.thatsnonsense.com/

Weitere ähnliche Inhalte

Was ist angesagt?

Ethics On The Internet
Ethics On The InternetEthics On The Internet
Ethics On The InternetDebra Boardman
 
Empowerment technology
Empowerment technologyEmpowerment technology
Empowerment technologypizonaim
 
Empowerment Technologies - Module 1
Empowerment Technologies - Module 1Empowerment Technologies - Module 1
Empowerment Technologies - Module 1Jesus Rances
 
Social Media Security 2011
Social Media Security 2011Social Media Security 2011
Social Media Security 2011Donald E. Hester
 
Advantages and disadvantages of internet
Advantages and disadvantages of internetAdvantages and disadvantages of internet
Advantages and disadvantages of internetCarlos Diclear Hijo
 
Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)John Bosco Javellana, MAEd.
 
Media and Information Literacy 104
Media and Information Literacy 104Media and Information Literacy 104
Media and Information Literacy 104Marvin Broñoso
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Jesus Rances
 
Social network privacy & security
Social network privacy & securitySocial network privacy & security
Social network privacy & securitynadikari123
 
Semantic web approach towards interoperability and privacy issues in social n...
Semantic web approach towards interoperability and privacy issues in social n...Semantic web approach towards interoperability and privacy issues in social n...
Semantic web approach towards interoperability and privacy issues in social n...ijwscjournal
 
Empowerment Technologies Lecture 2 (Philippines SHS)
Empowerment Technologies Lecture 2 (Philippines SHS)Empowerment Technologies Lecture 2 (Philippines SHS)
Empowerment Technologies Lecture 2 (Philippines SHS)John Bosco Javellana, MAEd.
 
Social Networking (Ethics in Information Technology)
Social Networking (Ethics in Information Technology)Social Networking (Ethics in Information Technology)
Social Networking (Ethics in Information Technology)Anirudhya Reevu
 
Empowerment technology Group 7
Empowerment technology Group 7Empowerment technology Group 7
Empowerment technology Group 7FrancisJuanson1
 
advantages and disadvantages of using internet
advantages and disadvantages of using internetadvantages and disadvantages of using internet
advantages and disadvantages of using internetgulsheramjad
 
Online Systems, Functions, and Platforms
Online Systems, Functions, and PlatformsOnline Systems, Functions, and Platforms
Online Systems, Functions, and PlatformsMaria Eloisa Blanza
 
Lesson 1 2 Edited
Lesson 1 2 EditedLesson 1 2 Edited
Lesson 1 2 EditedJuvywen
 

Was ist angesagt? (20)

Ethics On The Internet
Ethics On The InternetEthics On The Internet
Ethics On The Internet
 
Empowerment technology
Empowerment technologyEmpowerment technology
Empowerment technology
 
Empowerment Technologies - Module 1
Empowerment Technologies - Module 1Empowerment Technologies - Module 1
Empowerment Technologies - Module 1
 
Social Media Security 2011
Social Media Security 2011Social Media Security 2011
Social Media Security 2011
 
Online ethics
Online ethicsOnline ethics
Online ethics
 
Advantages and disadvantages of internet
Advantages and disadvantages of internetAdvantages and disadvantages of internet
Advantages and disadvantages of internet
 
Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)
 
Media and Information Literacy 104
Media and Information Literacy 104Media and Information Literacy 104
Media and Information Literacy 104
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2
 
Casiappt
CasiapptCasiappt
Casiappt
 
Social network privacy & security
Social network privacy & securitySocial network privacy & security
Social network privacy & security
 
Semantic web approach towards interoperability and privacy issues in social n...
Semantic web approach towards interoperability and privacy issues in social n...Semantic web approach towards interoperability and privacy issues in social n...
Semantic web approach towards interoperability and privacy issues in social n...
 
Empowerment Technologies Lecture 2 (Philippines SHS)
Empowerment Technologies Lecture 2 (Philippines SHS)Empowerment Technologies Lecture 2 (Philippines SHS)
Empowerment Technologies Lecture 2 (Philippines SHS)
 
Internet and Social Media
Internet and Social MediaInternet and Social Media
Internet and Social Media
 
Social Networking (Ethics in Information Technology)
Social Networking (Ethics in Information Technology)Social Networking (Ethics in Information Technology)
Social Networking (Ethics in Information Technology)
 
Etech activity
Etech activityEtech activity
Etech activity
 
Empowerment technology Group 7
Empowerment technology Group 7Empowerment technology Group 7
Empowerment technology Group 7
 
advantages and disadvantages of using internet
advantages and disadvantages of using internetadvantages and disadvantages of using internet
advantages and disadvantages of using internet
 
Online Systems, Functions, and Platforms
Online Systems, Functions, and PlatformsOnline Systems, Functions, and Platforms
Online Systems, Functions, and Platforms
 
Lesson 1 2 Edited
Lesson 1 2 EditedLesson 1 2 Edited
Lesson 1 2 Edited
 

Ähnlich wie Digital Identity: Manage Your Online Reputation

REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxRheamaeLiwan
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxJakeTorio1
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxEhraicaSaquing
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxDineLiwan
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxLiberty Aquino
 
Security and Privacy in Social Networks.pptx
Security and Privacy in Social Networks.pptxSecurity and Privacy in Social Networks.pptx
Security and Privacy in Social Networks.pptxSIMNchannel
 
L1b Trends in ICT - Online Safety and Security.pdf
L1b Trends in ICT - Online Safety and Security.pdfL1b Trends in ICT - Online Safety and Security.pdf
L1b Trends in ICT - Online Safety and Security.pdfJeth Cuenco
 
Your Digital Identity - are you feeling lucky?
Your Digital Identity - are you feeling lucky?Your Digital Identity - are you feeling lucky?
Your Digital Identity - are you feeling lucky?Kirsten Thompson
 
Social network privacy.
Social network privacy.Social network privacy.
Social network privacy.STO STRATEGY
 
Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235brendaylo
 
Web Science Session 2: Social Media
Web Science Session 2: Social MediaWeb Science Session 2: Social Media
Web Science Session 2: Social MediaStefanie Panke
 
Cultural heritage collections in a web 2
Cultural heritage collections in a web 2Cultural heritage collections in a web 2
Cultural heritage collections in a web 2Lynne Thomas
 
Social network privacy
Social network privacySocial network privacy
Social network privacySTO STRATEGY
 
Your e image presentation
Your e image presentationYour e image presentation
Your e image presentationlahill16
 
Group 4 discussion leading
Group 4 discussion leadingGroup 4 discussion leading
Group 4 discussion leadingHsuan-Ting Chen
 
[r]evolution Digital Literacy Workshop Slides
[r]evolution Digital Literacy Workshop Slides[r]evolution Digital Literacy Workshop Slides
[r]evolution Digital Literacy Workshop SlidesNathanielCarlson2
 

Ähnlich wie Digital Identity: Manage Your Online Reputation (20)

REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docx
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
REVIEWER ETECH
REVIEWER ETECHREVIEWER ETECH
REVIEWER ETECH
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docx
 
Empowerment Technology
Empowerment Technology Empowerment Technology
Empowerment Technology
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
Security and Privacy in Social Networks.pptx
Security and Privacy in Social Networks.pptxSecurity and Privacy in Social Networks.pptx
Security and Privacy in Social Networks.pptx
 
L1b Trends in ICT - Online Safety and Security.pdf
L1b Trends in ICT - Online Safety and Security.pdfL1b Trends in ICT - Online Safety and Security.pdf
L1b Trends in ICT - Online Safety and Security.pdf
 
Your Digital Identity - are you feeling lucky?
Your Digital Identity - are you feeling lucky?Your Digital Identity - are you feeling lucky?
Your Digital Identity - are you feeling lucky?
 
Social network privacy.
Social network privacy.Social network privacy.
Social network privacy.
 
IS SOCIAL PRIVACY POSSIBLE?
IS SOCIAL PRIVACY POSSIBLE?IS SOCIAL PRIVACY POSSIBLE?
IS SOCIAL PRIVACY POSSIBLE?
 
Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235
 
Web Science Session 2: Social Media
Web Science Session 2: Social MediaWeb Science Session 2: Social Media
Web Science Session 2: Social Media
 
Cultural heritage collections in a web 2
Cultural heritage collections in a web 2Cultural heritage collections in a web 2
Cultural heritage collections in a web 2
 
Social network privacy
Social network privacySocial network privacy
Social network privacy
 
Your e image presentation
Your e image presentationYour e image presentation
Your e image presentation
 
Group 4 discussion leading
Group 4 discussion leadingGroup 4 discussion leading
Group 4 discussion leading
 
[r]evolution Digital Literacy Workshop Slides
[r]evolution Digital Literacy Workshop Slides[r]evolution Digital Literacy Workshop Slides
[r]evolution Digital Literacy Workshop Slides
 

Mehr von Kirsten Thompson

Your Social Media Strategy
Your Social Media Strategy Your Social Media Strategy
Your Social Media Strategy Kirsten Thompson
 
Learning Technologists' Network Re-launch Nov 2019
Learning Technologists' Network Re-launch Nov 2019Learning Technologists' Network Re-launch Nov 2019
Learning Technologists' Network Re-launch Nov 2019Kirsten Thompson
 
Inclusive Teaching @ Leeds
Inclusive Teaching @ LeedsInclusive Teaching @ Leeds
Inclusive Teaching @ LeedsKirsten Thompson
 
Collaborating with services outside the Library: Enhancing experience and bui...
Collaborating with services outside the Library: Enhancing experience and bui...Collaborating with services outside the Library: Enhancing experience and bui...
Collaborating with services outside the Library: Enhancing experience and bui...Kirsten Thompson
 
Everyday Inclusion in Everyday Teaching (TELFest edition)
Everyday Inclusion in Everyday Teaching (TELFest edition)Everyday Inclusion in Everyday Teaching (TELFest edition)
Everyday Inclusion in Everyday Teaching (TELFest edition)Kirsten Thompson
 
Using Social Media to Promote Your Research (Translate MedTech edition)
Using Social Media to Promote Your Research (Translate MedTech edition)Using Social Media to Promote Your Research (Translate MedTech edition)
Using Social Media to Promote Your Research (Translate MedTech edition)Kirsten Thompson
 
7 steps: social media strategy for Innovation Lab Schools' Ambassadors
7 steps: social media strategy for Innovation Lab Schools' Ambassadors7 steps: social media strategy for Innovation Lab Schools' Ambassadors
7 steps: social media strategy for Innovation Lab Schools' AmbassadorsKirsten Thompson
 
The role of the Patient Research Ambassador
The role of the Patient Research AmbassadorThe role of the Patient Research Ambassador
The role of the Patient Research AmbassadorKirsten Thompson
 
The challenges and benefits of using digital to engage people in research
The challenges and benefits of using digital to engage people in researchThe challenges and benefits of using digital to engage people in research
The challenges and benefits of using digital to engage people in researchKirsten Thompson
 
Quick wins for designing and teaching inclusively - helping you meet the Base...
Quick wins for designing and teaching inclusively - helping you meet the Base...Quick wins for designing and teaching inclusively - helping you meet the Base...
Quick wins for designing and teaching inclusively - helping you meet the Base...Kirsten Thompson
 
Public engagement while you sleep
Public engagement while you sleep Public engagement while you sleep
Public engagement while you sleep Kirsten Thompson
 
Social media for researchers #OpenResLeeds2018
Social media for researchers #OpenResLeeds2018Social media for researchers #OpenResLeeds2018
Social media for researchers #OpenResLeeds2018Kirsten Thompson
 
Introduction to Tests, Surveys and Pools
Introduction to Tests, Surveys and PoolsIntroduction to Tests, Surveys and Pools
Introduction to Tests, Surveys and PoolsKirsten Thompson
 
Introduction to setting up the Discussion Board
Introduction to setting up the Discussion BoardIntroduction to setting up the Discussion Board
Introduction to setting up the Discussion BoardKirsten Thompson
 
Introduction to Sending Email
Introduction to Sending EmailIntroduction to Sending Email
Introduction to Sending EmailKirsten Thompson
 
Introduction to Communicating with Announcements
Introduction to Communicating with AnnouncementsIntroduction to Communicating with Announcements
Introduction to Communicating with AnnouncementsKirsten Thompson
 
Introduction to Copying and Moving Content
Introduction to Copying and Moving ContentIntroduction to Copying and Moving Content
Introduction to Copying and Moving ContentKirsten Thompson
 
Introduction to Embedding Content
Introduction to Embedding ContentIntroduction to Embedding Content
Introduction to Embedding ContentKirsten Thompson
 
Introduction to Adding Content
Introduction to Adding ContentIntroduction to Adding Content
Introduction to Adding ContentKirsten Thompson
 

Mehr von Kirsten Thompson (20)

Your Social Media Strategy
Your Social Media Strategy Your Social Media Strategy
Your Social Media Strategy
 
Learning Technologists' Network Re-launch Nov 2019
Learning Technologists' Network Re-launch Nov 2019Learning Technologists' Network Re-launch Nov 2019
Learning Technologists' Network Re-launch Nov 2019
 
Inclusive Teaching @ Leeds
Inclusive Teaching @ LeedsInclusive Teaching @ Leeds
Inclusive Teaching @ Leeds
 
Collaborating with services outside the Library: Enhancing experience and bui...
Collaborating with services outside the Library: Enhancing experience and bui...Collaborating with services outside the Library: Enhancing experience and bui...
Collaborating with services outside the Library: Enhancing experience and bui...
 
Everyday Inclusion in Everyday Teaching (TELFest edition)
Everyday Inclusion in Everyday Teaching (TELFest edition)Everyday Inclusion in Everyday Teaching (TELFest edition)
Everyday Inclusion in Everyday Teaching (TELFest edition)
 
Using Social Media to Promote Your Research (Translate MedTech edition)
Using Social Media to Promote Your Research (Translate MedTech edition)Using Social Media to Promote Your Research (Translate MedTech edition)
Using Social Media to Promote Your Research (Translate MedTech edition)
 
Creating Digital Content
Creating Digital ContentCreating Digital Content
Creating Digital Content
 
7 steps: social media strategy for Innovation Lab Schools' Ambassadors
7 steps: social media strategy for Innovation Lab Schools' Ambassadors7 steps: social media strategy for Innovation Lab Schools' Ambassadors
7 steps: social media strategy for Innovation Lab Schools' Ambassadors
 
The role of the Patient Research Ambassador
The role of the Patient Research AmbassadorThe role of the Patient Research Ambassador
The role of the Patient Research Ambassador
 
The challenges and benefits of using digital to engage people in research
The challenges and benefits of using digital to engage people in researchThe challenges and benefits of using digital to engage people in research
The challenges and benefits of using digital to engage people in research
 
Quick wins for designing and teaching inclusively - helping you meet the Base...
Quick wins for designing and teaching inclusively - helping you meet the Base...Quick wins for designing and teaching inclusively - helping you meet the Base...
Quick wins for designing and teaching inclusively - helping you meet the Base...
 
Public engagement while you sleep
Public engagement while you sleep Public engagement while you sleep
Public engagement while you sleep
 
Social media for researchers #OpenResLeeds2018
Social media for researchers #OpenResLeeds2018Social media for researchers #OpenResLeeds2018
Social media for researchers #OpenResLeeds2018
 
Introduction to Tests, Surveys and Pools
Introduction to Tests, Surveys and PoolsIntroduction to Tests, Surveys and Pools
Introduction to Tests, Surveys and Pools
 
Introduction to setting up the Discussion Board
Introduction to setting up the Discussion BoardIntroduction to setting up the Discussion Board
Introduction to setting up the Discussion Board
 
Introduction to Sending Email
Introduction to Sending EmailIntroduction to Sending Email
Introduction to Sending Email
 
Introduction to Communicating with Announcements
Introduction to Communicating with AnnouncementsIntroduction to Communicating with Announcements
Introduction to Communicating with Announcements
 
Introduction to Copying and Moving Content
Introduction to Copying and Moving ContentIntroduction to Copying and Moving Content
Introduction to Copying and Moving Content
 
Introduction to Embedding Content
Introduction to Embedding ContentIntroduction to Embedding Content
Introduction to Embedding Content
 
Introduction to Adding Content
Introduction to Adding ContentIntroduction to Adding Content
Introduction to Adding Content
 

Kürzlich hochgeladen

Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 

Kürzlich hochgeladen (20)

Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 

Digital Identity: Manage Your Online Reputation

  • 1. Are you feeling lucky? Your digital Identity Kirsten Thompson @_KirstenT | K.Thompson@adm.leeds.ac.uk
  • 2. 1. Digital identities 2. Personal VS Professional 3. Managing your identity Outline
  • 4. ‘Digital identity can be defined as all the online information and data specifically about an individual.’ (Last accessed 26/06/13 at: http://distance.uvic.ca/students/identity.htm) Your Digital Identity
  • 5. Creating an account on the social web is a choice. Having a digital identity is not. We all have a digital footprint.
  • 6. Your digital identity = everything about you on the web Verified / non-verified – both important
  • 7. What else are you sharing? WHOIS database Location services Social media privacy Mobile device security
  • 8. How do you verify who you are talking to online? How do others verify you?
  • 9. How easy is it to steal your online identity?
  • 11. This was posted on Twitter during a recent conference presentation #NoEscape
  • 12. Definition of a meme: ‘noun 1 an element of a culture or system of behaviour passed from one individual to another by imitation or other non-genetic means. 2 an image, video, piece of text, etc., typically humorous in nature, that is copied and spread rapidly by Internet users, often with slight variations.’ (Oxford Dictionaries, online, last accessed 09/07/13 at: http://oxforddictionaries.com/definition/english/meme) Grumpy Cat meme
  • 13. Some companies create profiles for us using public information on the web – inaccurate and merging identities.
  • 15. The Wayback Machine has archived over 240 billion web pages from 1996 – think about your digital footprint http://archive.org/web/web.php
  • 16. Are you feeling lucky?
  • 17. You can manage your digital identity, you cannot control it
  • 18. 2. Personal VS Professional
  • 19. How do you currently use social media? 1. Finding and using content on the social web 2. Joining and building networks 3. Creating, curating and sharing content 4. Improving productivity 5. Managing reputation Activity
  • 20. Challenges idea of digital natives and immigrants “Our Visitors and Residents typology should be understood as a continuum and not a binary opposition. Individuals may be able to place themselves at a particular point along this continuum rather than in one of two boxes. Nor is a predominantly Visitor approach necessarily any less effective or of less value than a predominantly Resident approach since the value of either has to be set against a given context and set of goals. Similarly, we do not consider the Visitor to be necessarily any less technically adept than the Resident.” (White and Le Cornu, 2011, http://firstmonday.org/ojs/index.php/fm/article/viewArticle/3171/3049) Visitors and Residents
  • 21. • See web as untidy garden tool shed • Defined goal or task • Select most appropriate tool for task • Need to see concrete benefit from use of a platform • Relatively anonymous • Try to avoid the creation of digital identity • Caution: identity theft, privacy • Sense that online social networking is banal and potentially a time waster • Will use technology to maintain relationships • Web offers set of tools to deliver or manipulate content (including conversations) • Tendency to respect (and seek out) authoritative sources • Thinking often takes place offline • Users, not members, of the web • See no value in ‘belonging‘ online • See web as place (park, building) where clusters of friends and colleagues meet • Live out a proportion of their life online • Distinction between online and offline increasingly blurred • Sense of belonging to a community • Have a profile in social networking platforms • Comfortable expressing their identity online • Web is a place to express opinions, to form and extend relationships, maintain and develop a digital identity • Aspect of their persona remains once logged off • See web as networks or clusters of individuals who generate content/opinion • No clear distinction between concepts of persona and content Visitors Residents (White and Le Cornu 2011) How do you see and use the web?
  • 22. Map your online activity e.g. Personal Professional Visitor Resident (@DaveOWhite, Talking About Teaching Event, University of Leeds, 2013)
  • 23. “Don’t say (or do) anything you wouldn’t on 5 Live.” Rory Cellan-Jones Social media = public Separate personal and professional, makes each presence more useful to your networks You’re not anonymous on social media – dangerous to think you are Impact of liking, re-tweeting Click the video to watch
  • 24. Email Do you use the same e-mail address to manage all your social media accounts? Are you merging personal, professional and institutional social profiles? Social media sites encourage us to integrate our email address book – your email contacts will find you, whether you want to be found or not.
  • 27. Case: Lord McAlpine falsely accused Alleged offence: Libel Case: Twitter users name victim of rape by footballer Ched Evans Offence: The Sexual Offences (Amendment) Act 1992 Case: Social media users circulated alleged pictures of child killer Jon Venables Alleged offence: Contempt of Court http://www.bbc.co.uk/news/magazine-20782257
  • 28. Case: Juror Joanne Fraill contact defendant in trial by Facebook Offence: Contempt of Court Case: Paul Chambers joked on Twitter that he would blow up Robin Hood Airport Offence: Sending a “menacing electronic communication” under the 2003 Communications Act Case: Reading man Sean Duff mocks dead children on social media sites Offence: Making “grossley offensive” comments under the Malicious Communications Act 1988 http://www.bbc.co.uk/news/magazine-20782257
  • 29. 653 people faced criminal charges in England and Wales in 2012 in connection with comments on Twitter or Facebook. These divided into offences committed on the two sites, such as posting abusive messages, and those which had been provoked by messages, including violent attacks. Many of the offences, such as harassment or threats to kill would have been committed, albeit in a different way, before social media was invented. http://www.bbc.co.uk/news/magazine-20782257
  • 31. Are you feeling lucky? Start thinking like a search engine – be the top of your own search results.
  • 32. Use Google Alerts to keep updated on what others are saying about you (your work, project etc) on the web. It won’t search everything, but can assist in managing your digital identity.
  • 34. Existing laws apply online as they do offline – new Defamation Act 2013 (good news). BBC Defamation article Only share information when you have permission and obtain permission to publish someone else’s work Avoid making comments and being supportive of the comments or actions of others, if they could get you in trouble. Everything shared on social media, regardless of privacy settings can be captured. Educate your social network – your “private” Facebook Timeline is only as secure as the devices you/your Facebook “friends” use. Put simply…think first, share second
  • 35. Think about security and privacy 1. Use official mobile apps and trusted third-party apps – check reviews. 2. Location services – what else are you sharing with the world? 3. Are your mobile devices secure? What information are you giving away if your device is lost/stolen? Is your device set up for remote wiping? 4. A service or App might be secure, your internet access might not be – think about what you do/where you do it – public Wi-Fi can be dangerous. 5. Do you need to remain logged into all apps at all times? Think about your web history too. 6. Be wary of hackers, account cloning, phishing scams, rogue links. 7. Unused accounts at risk – monitor or close | consider strong password security.

Hinweis der Redaktion

  1. White, David S., and Alison Le Cornu. 2011. Visitors and residents: Towards a new typology for online engagement. First Monday 16(9). http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/viewArticle/3171/3049 Last accessed 30/05/13
  2. White, David S., and Alison Le Cornu. 2011. Visitors and residents: Towards a new typology for online engagement. First Monday 16(9). http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/viewArticle/3171/3049 Last accessed 30/05/13