Thinking about your online presence
Kirsten Thompson
@_KirstenT | K.Thompson@adm.leeds.ac.uk | Digital Dates Programme | U...
By the end of the session you will be better able to:
1. Manage your online presence
2. Recognise the benefits and challen...
1. Digital identity is…
2. Personal VS Professional
3. Managing your identity
Outline
1. Digital identity is…
„Digital identity can
be defined as all
the online
information and
data specifically
about an
individual.‟
(Last accessed ...
Creating an account on
the social web is a
choice.
Having a digital identity
is not.
We all have a digital
footprint.
Your digital identity =
everything about you
on the web
Verified / non-verified
– both important
What else are you
sharing?
WHOIS database
Location services
Social media privacy
Mobile device security
How do you verify who you are talking
to online? How do others verify you?
How easy is it to steal
your online identity?
Who
manages
your digital
identity?
This was posted on Twitter during a recent
conference presentation #NoEscape
Some companies
create profiles for
us using public
information on the
web – inaccurate
and merging
identities.
You can
manage your
digital
identity, you
cannot control
it
2. Personal VS Professional
“Don‟t say (or do)
anything you
wouldn‟t on 5
Live.”
Rory Cellan-Jones
Social media = public
Separate personal and
profess...
Email
Do you use the same e-mail address to
manage all your social media accounts?
Are you merging personal, professional ...
http://news.uk.msn.com/uk/twitter-trolls-u-turn-after-users-threaten-to-tell-his-mum
Case: Lord McAlpine falsely accused
Alleged offence: Libel
Case: Twitter users name victim of rape by
footballer Ched Evan...
Case: Juror Joanne Fraill contact defendant in trial by
Facebook
Offence: Contempt of Court
Case: Paul Chambers joked on T...
3. Managing your identity
University
Guidance
Click the website
images to visit each
site.
Are you feeling lucky?
Start thinking like a search engine –
be the top of your own search
results.
Use Google Alerts
to keep updated on
what others are
saying about you
(your work, project
etc) on the web. It
won‟t search...
accidentaloutlaw.knowthenet.org.uk
Existing laws apply online as they do offline – new Defamation
Act 2013 (good news). BBC Defamation article
Only share inf...
Think about security
1. Use official mobile apps and trusted third-party apps – check reviews.
2. Location services – what...
Keep
updated
about
online
safety
and the
law
www.socialmedialaw.co.uk
www.thatsnonsense.com/
Upcoming SlideShare
Loading in...5
×

Thinking about your online presence (Digital Dates, University of Leeds)

680

Published on

This presentation was used during the "Thinking about your online presence" Digital Dates event for staff and students at the University of Leeds on Thursday 20/03/14. It is based upon the "Your Digital Identity" session which I facilitate for colleagues at the University.

Published in: Education
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
680
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
6
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Thinking about your online presence (Digital Dates, University of Leeds)

  1. 1. Thinking about your online presence Kirsten Thompson @_KirstenT | K.Thompson@adm.leeds.ac.uk | Digital Dates Programme | University of Leeds
  2. 2. By the end of the session you will be better able to: 1. Manage your online presence 2. Recognise the benefits and challenges of managing personal and professional digital identities 3. Recognise the key issues relating to managing your online presence including public digital communications, online safety and privacy Outcomes Make informed choices about your digital identity and use of the web
  3. 3. 1. Digital identity is… 2. Personal VS Professional 3. Managing your identity Outline
  4. 4. 1. Digital identity is…
  5. 5. „Digital identity can be defined as all the online information and data specifically about an individual.‟ (Last accessed 26/06/13 at: http://distance.uvic.ca/students/identity.htm) Your Digital Identity
  6. 6. Creating an account on the social web is a choice. Having a digital identity is not. We all have a digital footprint.
  7. 7. Your digital identity = everything about you on the web Verified / non-verified – both important
  8. 8. What else are you sharing? WHOIS database Location services Social media privacy Mobile device security
  9. 9. How do you verify who you are talking to online? How do others verify you?
  10. 10. How easy is it to steal your online identity?
  11. 11. Who manages your digital identity?
  12. 12. This was posted on Twitter during a recent conference presentation #NoEscape
  13. 13. Some companies create profiles for us using public information on the web – inaccurate and merging identities.
  14. 14. You can manage your digital identity, you cannot control it
  15. 15. 2. Personal VS Professional
  16. 16. “Don‟t say (or do) anything you wouldn‟t on 5 Live.” Rory Cellan-Jones Social media = public Separate personal and professional, makes each presence more useful to your networks You‟re not anonymous on social media – dangerous to think you are Impact of liking, re-tweeting Click the video to watch
  17. 17. Email Do you use the same e-mail address to manage all your social media accounts? Are you merging personal, professional and institutional social profiles? Social media sites encourage us to integrate our email address book – your email contacts will find you, whether you want to be found or not.
  18. 18. http://news.uk.msn.com/uk/twitter-trolls-u-turn-after-users-threaten-to-tell-his-mum
  19. 19. Case: Lord McAlpine falsely accused Alleged offence: Libel Case: Twitter users name victim of rape by footballer Ched Evans Offence: The Sexual Offences (Amendment) Act 1992 Case: Social media users circulated alleged pictures of child killer Jon Venables Alleged offence: Contempt of Court http://www.bbc.co.uk/news/magazine-20782257
  20. 20. Case: Juror Joanne Fraill contact defendant in trial by Facebook Offence: Contempt of Court Case: Paul Chambers joked on Twitter that he would blow up Robin Hood Airport Offence: Sending a “menacing electronic communication” under the 2003 Communications Act Case: Reading man Sean Duff mocks dead children on social media sites Offence: Making “grossly offensive” comments under the Malicious Communications Act 1988 http://www.bbc.co.uk/news/magazine-20782257
  21. 21. 3. Managing your identity
  22. 22. University Guidance
  23. 23. Click the website images to visit each site.
  24. 24. Are you feeling lucky? Start thinking like a search engine – be the top of your own search results.
  25. 25. Use Google Alerts to keep updated on what others are saying about you (your work, project etc) on the web. It won‟t search everything, but can assist in managing your digital identity.
  26. 26. accidentaloutlaw.knowthenet.org.uk
  27. 27. Existing laws apply online as they do offline – new Defamation Act 2013 (good news). BBC Defamation article Only share information when you have permission and obtain permission to publish someone else‟s work Avoid making comments and being supportive of the comments or actions of others, if they could get you in trouble. Everything shared on social media, regardless of privacy settings can be captured. Educate your social network – your “private” Facebook Timeline is only as secure as the devices you/your Facebook “friends” use. Put simply…think first, share second
  28. 28. Think about security 1. Use official mobile apps and trusted third-party apps – check reviews. 2. Location services – what else are you sharing with the world? 3. Are your mobile devices secure? What information are you giving away if your device is lost/stolen? Is your device set up for remote wiping? 4. A service or App might be secure, your internet access might not be – think about what you do/where you do it – public Wi-Fi can be dangerous. 5. Do you need to remain logged into all apps at all times? Think about your web history too. 6. Be wary of hackers, account cloning, phishing scams, rogue links. 7. Unused accounts at risk – monitor or close | consider strong password security.
  29. 29. Keep updated about online safety and the law www.socialmedialaw.co.uk www.thatsnonsense.com/
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×