• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Social Media and Online Identity

Social Media and Online Identity



Tips and tools to manage one's online identity. ...

Tips and tools to manage one's online identity.
Lecture given to MBA students at HEC Paris on October the 28st 2011.
The presentation covers personal branding (how to build a professional profile and a personal page, how to keep one's privacy), social media monitoring (how to monitor conversation, publications and search using Netvibes) and social networking (how to expand one's network using tools like Branchout and Klout).
The presentation ends with some security recommendation in order to avoid brandjacking.



Total Views
Views on SlideShare
Embed Views



0 Embeds 0

No embeds


Upload Details

Uploaded via as Adobe PDF

Usage Rights

CC Attribution-ShareAlike LicenseCC Attribution-ShareAlike License

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
Post Comment
Edit your comment

    Social Media and Online Identity Social Media and Online Identity Presentation Transcript

    • Social Media & Online IdentityLecture given to HEC PARIS MBA Students
    • WelcomeHEC MBA – 28/10/2011
    • HelloLet me introduce myself
    • How to ask questions during the class? Mention @albanlv in your tweet
    • How to post comments during the class? Use the hashtag #hecmba in your tweet
    • IntroductionWhat is a technology?What does it changes to society?What about social media?
    • DEFINITIONWhat is a technology?
    • Delegate
    • Breakthrough technologiescome with a change in society
    • DEFINITIONWhat do we call social media?
    • 750 millions users30 millions shares/day300 millions users200 millions tweets/day48h of video uploaded/mn3 billions video watched/day
    • What are we going to talk about?
    • BE THERE
    • Part IBE THERE
    • Your personal page Your professional profileProtect your privacy
    • WorkshopGoogle your neighbor
    • Workshop : search your neighbor Is it easy to find your neighbor? Is the information relevant? Is the information coherent? What should be removed? What should be added/more visible? Can we contact him easily?
    • Don’t let the others speak for you
    • Tools Facebook, Google profiles (Google+),Twitter, Quora, About.me, Flavors.me,Chi.mp, UnHub, Card.ly, Twitter…
    • What should you put on your personal page? A picture Pitch yourself (short description - 160 characters) Choose your keywords and use them in your description Link: to your other profiles, slideshare account, the papers you published Show the communities you belong to (HEC…) Be reachable (a mail or anything) Talk (link to your contribution on Twitter, Quora or other forums)
    • WorkshopSet up your own personal page with About.meGet inspiration :http://about.me/thewmatthttp://about.me/jessicaluciahttp://about.me/laurindelhttp://about.me/brianwong
    • Make it appear 1st on
    • PROFESSIONAL PROFILEDo you know Linkedin?
    • Should you use LinkedIn?HireBe hiredFind clientsAdvertise your businessKnow your networkExpand your networkEnhance your influence as an expert
    • How to pimp your profile?
    • Add former experiencesAdd skillsAsk for recommendationsExpand your network (connect with the people in the class)Add languages and translate your profileJoin groupsLink to your other profiles (About.me, Twitter, blog…)Link to your online contributions (articles, blogposts, answers on forums)Use applications (vizualize.me, slideshare, tweets, wordpress)Stay up to date (update your profile regularly)
    • How to protectYour privacy?
    • Behave
    • WorkshopCheck your Facebook privacy settings
    • Part 2MONITOR
    • PublicationConversationSearch
    • WorkshopSet up your monitoring arsenal
    • Preliminary task Define 5 keywords corresponding to your field Example : social media, internet, web, technology, start-up
    • Task 1 : create a netvibes account http://netvibes.com
    • Task 2 Find 3 blogs/websites related to your field
    • Find their RSS feed
    • Add the RSS feed to your Netvibes
    • Task 3 : create a dashboard for each keyword
    • Task 4 : synchronise with your Twitter account
    • Task 5 : insert a Gmail account Set up Google alerts Use newletters
    • Should youShare?
    • Twitter dictionnaryTweetFollowerUnfollowRT or retweetFloodTL or Timeline@ or mentionSpamDM or direct messageHashtagNSFW or not safe for workTT or trending topicFF or follow Friday
    • Twitter etiquetteMind your spellingQuote your sourcesInteract and mentionDo not flood your readers (instead schedule your publications)Ban capital lettersBe reliable (check before tweeting)Be appropriate
    • Tool
    • Which tool should I use?
    • What about #hecmba ?
    • Tool
    • Best practicesUpon meeting someone interesting, connect to himSync with your emailSpend some time looking at the suggestions,Use iPhone/Android applications on the goContribute to the groups and Q&AMake lists/circles
    • How to find interesting profiles on Twitter?Search new profilesLook at Twitter suggestionsUse the listsListen to the peer reviews (follow Friday)Use your monitoring tools
    • Tool
    • RulesBeware of fake profiles. If you have a doubt when seeing a profile picture, try Tinyeye.Don’t add everybodyThink before accepting a requestRemember who is in your network when you post an updateBe careful : identity theft and “cybersquatters”
    • SecurityWhat is a good password?Why you should not ask your browser to remember your passwordsWhy you should always use https (firesheep & likes)Secure your laptop : PreySecure your profiles : double step verification, location or devicebased verificationMonitor what is being said about you
    • “Brandjacking is one way in which social mediacan turn ugly. […] it happens when a person ororganization loses control of their presence ormessage, and that it doesn’t have to involveany form of technological theft, just orchestratedword-of-mouth attacks.” (Mashable)
    • ConclusionAND THEN WHAT?
    • Don’t panic
    • Take time http://pear.ly/2v75
    • Be curious
    • Ask questions @albanlv alban@leveau-vallier.com
    • Thank you!
    • Credits Surfer by Hani Hamir Don’t ring again by Jox Binoculars by Bethan Closed for business by Maistora Boombox in Montreal by Mikey G Ottawa 100621-F-6350L-395 by Expertinfantry First Ostrich by M Kuhn Second Ostrich by Kicki Icons and symbols by The Noun Project Gag by CHRISSPdotCOM Google by ConnorTreacy Is dinner ready yet? By Ernst Vikne