SlideShare a Scribd company logo
1 of 6
Hiring and Online Identity

   THE DARK SIDE OF THE INTERNET
Online Identity

 Did we talk about this
  before?
 Posting certain things
  may harm your online
  identity.
 What can hurt you:
    Offensive pictures
    Degrading interaction
     with other
    Etc.
 Do you know how you
 portray yourself?
Who sees what you post?

 Anyone can see things
 you post.
    Twitter protected tweets
        Others can retweet your
         protected tweets
    Facebook privacy settings
      Are a joke
      Various ways to bypass
       them
 Once you post something
 it is out there forever
    Someone somwhere will
     save it
How does this relate to getting hired?

   Do people really use
      social media to “check
      out” potential hires?
         89% of companies will use
          social media networks for
          recruiting
         96% of recruiters look at
          your social networking
          site at some point of the
          hiring process
         69% of companies have
          rejected candidates due to
          social media.
http://mashable.com/2011/08/28/social-media-recruiting-infographic/
http://mashable.com/2011/10/23/how-recruiters-use-social-networks-to-screen-candidates-infographic/
What would stop you from getting hired?

   Inappropriate photos or
    comments
   Content about you drinking
         Can be hard for college
          students
   Content about using drugs
   Negative comments about
    previous employer
   Poor communication skills
   Lying about your
    qualifications


http://mashable.com/2011/10/23/how-recruiters-use-social-networks-to-screen-candidates-infographic/
Keeping your job

   Posting offensive
      material can get you
      removed from your job.
          Inappropriate photos
          Bad mouthing boss, co-
           workers, clients
          Discriminatory comments
          Sharing confidential info
   Easy to find if you are
      lying
          Ex) Facebook Fairy


http://www.daily-tribune.com/view/full_story/16144698/article-Social-media-sites-gain-ground-in-hiring-practices?instance=homefirstleft

More Related Content

What's hot

Full seminar report on ethical hacking
Full seminar report on ethical hackingFull seminar report on ethical hacking
Full seminar report on ethical hackingGeorgekutty Francis
 
ASSIGNMENT CYBER SECURITY ppt.pptx
ASSIGNMENT CYBER SECURITY ppt.pptxASSIGNMENT CYBER SECURITY ppt.pptx
ASSIGNMENT CYBER SECURITY ppt.pptxtumainjoseph
 
Computer ethics & copyright
Computer ethics & copyrightComputer ethics & copyright
Computer ethics & copyrightAdyns
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks ShellyAdeel Khurram
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in SocietyRubal Sagwal
 
Importance of computer literacy
Importance of computer literacyImportance of computer literacy
Importance of computer literacyJoannemarie Urbano
 
LESSON 1 introduction to media and information Literacy.pptx
LESSON 1 introduction to media and information Literacy.pptxLESSON 1 introduction to media and information Literacy.pptx
LESSON 1 introduction to media and information Literacy.pptxTeacherRen
 
What is cyberbullying presentation
What is cyberbullying presentationWhat is cyberbullying presentation
What is cyberbullying presentationSally Garza
 
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONSE-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONSrausdeen anfas
 
Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An IntroductionJayaseelan Vejayon
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issuesRoshan Mastana
 
Seminar on Cyber Crime
Seminar on Cyber CrimeSeminar on Cyber Crime
Seminar on Cyber CrimeLikan Patra
 
Information Security- Threats and Attacks presentation by DHEERAJ KATARIA
Information Security- Threats and Attacks presentation by DHEERAJ KATARIAInformation Security- Threats and Attacks presentation by DHEERAJ KATARIA
Information Security- Threats and Attacks presentation by DHEERAJ KATARIADheeraj Kataria
 

What's hot (20)

Full seminar report on ethical hacking
Full seminar report on ethical hackingFull seminar report on ethical hacking
Full seminar report on ethical hacking
 
Cyber security
Cyber securityCyber security
Cyber security
 
ASSIGNMENT CYBER SECURITY ppt.pptx
ASSIGNMENT CYBER SECURITY ppt.pptxASSIGNMENT CYBER SECURITY ppt.pptx
ASSIGNMENT CYBER SECURITY ppt.pptx
 
Computer ethics & copyright
Computer ethics & copyrightComputer ethics & copyright
Computer ethics & copyright
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks Shelly
 
cyber ethics
 cyber ethics cyber ethics
cyber ethics
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 
Importance of computer literacy
Importance of computer literacyImportance of computer literacy
Importance of computer literacy
 
LESSON 1 introduction to media and information Literacy.pptx
LESSON 1 introduction to media and information Literacy.pptxLESSON 1 introduction to media and information Literacy.pptx
LESSON 1 introduction to media and information Literacy.pptx
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
What is cyberbullying presentation
What is cyberbullying presentationWhat is cyberbullying presentation
What is cyberbullying presentation
 
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONSE-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
 
Types of cyber attacks
Types of cyber attacksTypes of cyber attacks
Types of cyber attacks
 
Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An Introduction
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
Seminar on Cyber Crime
Seminar on Cyber CrimeSeminar on Cyber Crime
Seminar on Cyber Crime
 
Massive Open Online Course (MOOC)
Massive Open Online Course (MOOC)Massive Open Online Course (MOOC)
Massive Open Online Course (MOOC)
 
Information Security- Threats and Attacks presentation by DHEERAJ KATARIA
Information Security- Threats and Attacks presentation by DHEERAJ KATARIAInformation Security- Threats and Attacks presentation by DHEERAJ KATARIA
Information Security- Threats and Attacks presentation by DHEERAJ KATARIA
 
Computer misuse
Computer misuse Computer misuse
Computer misuse
 

Viewers also liked

The town mouse and the country mouse
The town mouse and the country mouseThe town mouse and the country mouse
The town mouse and the country mousemarocaba
 
3 Cheap Tools for Fast, Actionable Insights
3 Cheap Tools for Fast, Actionable Insights3 Cheap Tools for Fast, Actionable Insights
3 Cheap Tools for Fast, Actionable InsightsMelanie Phung
 
ExactTarget - Node On The Road
ExactTarget - Node On The RoadExactTarget - Node On The Road
ExactTarget - Node On The RoadAlex Vernacchia
 
Terapi warna
Terapi warna Terapi warna
Terapi warna adzliana
 
Guião de leitura "Principezinho"
Guião de leitura  "Principezinho" Guião de leitura  "Principezinho"
Guião de leitura "Principezinho" marocaba
 
CONFAB2012 - SEO at Large Organizations
CONFAB2012 - SEO at Large OrganizationsCONFAB2012 - SEO at Large Organizations
CONFAB2012 - SEO at Large OrganizationsMelanie Phung
 
Education prototype
Education prototypeEducation prototype
Education prototypecurlybecca
 
Modern cataract surgery
Modern cataract surgeryModern cataract surgery
Modern cataract surgeryUbaid Guttigar
 
Differences present perfect and past simple upperintermediate
Differences present perfect and past simple upperintermediateDifferences present perfect and past simple upperintermediate
Differences present perfect and past simple upperintermediateramiro cebreiros alvarez
 
Present perfect simple and continuous upper intermediate
Present perfect simple and continuous upper intermediatePresent perfect simple and continuous upper intermediate
Present perfect simple and continuous upper intermediateramiro cebreiros alvarez
 

Viewers also liked (17)

The town mouse and the country mouse
The town mouse and the country mouseThe town mouse and the country mouse
The town mouse and the country mouse
 
3 Cheap Tools for Fast, Actionable Insights
3 Cheap Tools for Fast, Actionable Insights3 Cheap Tools for Fast, Actionable Insights
3 Cheap Tools for Fast, Actionable Insights
 
ExactTarget - Node On The Road
ExactTarget - Node On The RoadExactTarget - Node On The Road
ExactTarget - Node On The Road
 
Terapi warna
Terapi warna Terapi warna
Terapi warna
 
Guião de leitura "Principezinho"
Guião de leitura  "Principezinho" Guião de leitura  "Principezinho"
Guião de leitura "Principezinho"
 
List
ListList
List
 
CONFAB2012 - SEO at Large Organizations
CONFAB2012 - SEO at Large OrganizationsCONFAB2012 - SEO at Large Organizations
CONFAB2012 - SEO at Large Organizations
 
El bloc
El bloc El bloc
El bloc
 
Danea ana
Danea anaDanea ana
Danea ana
 
Education prototype
Education prototypeEducation prototype
Education prototype
 
Law of Sines ppt
Law of Sines pptLaw of Sines ppt
Law of Sines ppt
 
The passive avanzado 1
The passive avanzado 1The passive avanzado 1
The passive avanzado 1
 
Presentation Avanzado1
Presentation Avanzado1Presentation Avanzado1
Presentation Avanzado1
 
Modern cataract surgery
Modern cataract surgeryModern cataract surgery
Modern cataract surgery
 
question formation upper intermediate
question formation upper intermediatequestion formation upper intermediate
question formation upper intermediate
 
Differences present perfect and past simple upperintermediate
Differences present perfect and past simple upperintermediateDifferences present perfect and past simple upperintermediate
Differences present perfect and past simple upperintermediate
 
Present perfect simple and continuous upper intermediate
Present perfect simple and continuous upper intermediatePresent perfect simple and continuous upper intermediate
Present perfect simple and continuous upper intermediate
 

Similar to Dark side of the internet

Digitalfootprints 10 08
Digitalfootprints 10 08Digitalfootprints 10 08
Digitalfootprints 10 08elizkeren
 
Digitalfootprints 10 08
Digitalfootprints 10 08Digitalfootprints 10 08
Digitalfootprints 10 08elizkeren
 
Your Digital Stomping Ground
Your Digital Stomping GroundYour Digital Stomping Ground
Your Digital Stomping GroundKristin Bittner
 
Information Technology and EthicsSocial Networking and Business.docx
Information Technology and EthicsSocial Networking and Business.docxInformation Technology and EthicsSocial Networking and Business.docx
Information Technology and EthicsSocial Networking and Business.docxjaggernaoma
 
Social Media Project Microsoft Word
Social Media Project Microsoft Word  Social Media Project Microsoft Word
Social Media Project Microsoft Word Sarah McDowell
 
Social Media for Students
Social Media for StudentsSocial Media for Students
Social Media for StudentsKevin Manne
 
Job-Applications.com Social Media Lesson Plan
Job-Applications.com Social Media Lesson PlanJob-Applications.com Social Media Lesson Plan
Job-Applications.com Social Media Lesson PlanMrJobApplications
 
Media Issues: Facebook and Job Opportunities
Media Issues: Facebook and Job OpportunitiesMedia Issues: Facebook and Job Opportunities
Media Issues: Facebook and Job OpportunitiesLaura Heying
 
Class 2 social media and communication
Class 2   social media and communicationClass 2   social media and communication
Class 2 social media and communicationUttaraChattopadhyay
 
Social Media Career Development & Job Search
Social Media Career Development & Job SearchSocial Media Career Development & Job Search
Social Media Career Development & Job SearchJoel Postman
 
Social Networking Presentation
Social Networking PresentationSocial Networking Presentation
Social Networking PresentationDonna Spear
 
Digitalfootprints
DigitalfootprintsDigitalfootprints
Digitalfootprintselizkeren
 
Business Impact of Online Social Networking
Business Impact of Online Social NetworkingBusiness Impact of Online Social Networking
Business Impact of Online Social NetworkingMicheal Axelsen
 
Social Networking and Chilton
Social Networking and ChiltonSocial Networking and Chilton
Social Networking and Chiltonelizkeren
 
Mo zen inc_getting_a_job_using_social media
Mo zen inc_getting_a_job_using_social media Mo zen inc_getting_a_job_using_social media
Mo zen inc_getting_a_job_using_social media rwitherly
 
media safety .pptx
media safety .pptxmedia safety .pptx
media safety .pptxGAmarioarei
 
Digital Disguise1
Digital Disguise1Digital Disguise1
Digital Disguise1cocopopz
 
Tina Myles Presentation from YouToo 2010 at Kent State
Tina Myles Presentation from YouToo 2010 at Kent State Tina Myles Presentation from YouToo 2010 at Kent State
Tina Myles Presentation from YouToo 2010 at Kent State YouToo Social Media
 

Similar to Dark side of the internet (20)

Digitalfootprints 10 08
Digitalfootprints 10 08Digitalfootprints 10 08
Digitalfootprints 10 08
 
Digitalfootprints 10 08
Digitalfootprints 10 08Digitalfootprints 10 08
Digitalfootprints 10 08
 
Your Digital Stomping Ground
Your Digital Stomping GroundYour Digital Stomping Ground
Your Digital Stomping Ground
 
Information Technology and EthicsSocial Networking and Business.docx
Information Technology and EthicsSocial Networking and Business.docxInformation Technology and EthicsSocial Networking and Business.docx
Information Technology and EthicsSocial Networking and Business.docx
 
Social Media Project Microsoft Word
Social Media Project Microsoft Word  Social Media Project Microsoft Word
Social Media Project Microsoft Word
 
Social Media for Students
Social Media for StudentsSocial Media for Students
Social Media for Students
 
Job-Applications.com Social Media Lesson Plan
Job-Applications.com Social Media Lesson PlanJob-Applications.com Social Media Lesson Plan
Job-Applications.com Social Media Lesson Plan
 
Media Issues: Facebook and Job Opportunities
Media Issues: Facebook and Job OpportunitiesMedia Issues: Facebook and Job Opportunities
Media Issues: Facebook and Job Opportunities
 
Digital stomping ground
Digital stomping groundDigital stomping ground
Digital stomping ground
 
Class 2 social media and communication
Class 2   social media and communicationClass 2   social media and communication
Class 2 social media and communication
 
Social Media Career Development & Job Search
Social Media Career Development & Job SearchSocial Media Career Development & Job Search
Social Media Career Development & Job Search
 
The Now Generation Internet Safety
The Now Generation   Internet SafetyThe Now Generation   Internet Safety
The Now Generation Internet Safety
 
Social Networking Presentation
Social Networking PresentationSocial Networking Presentation
Social Networking Presentation
 
Digitalfootprints
DigitalfootprintsDigitalfootprints
Digitalfootprints
 
Business Impact of Online Social Networking
Business Impact of Online Social NetworkingBusiness Impact of Online Social Networking
Business Impact of Online Social Networking
 
Social Networking and Chilton
Social Networking and ChiltonSocial Networking and Chilton
Social Networking and Chilton
 
Mo zen inc_getting_a_job_using_social media
Mo zen inc_getting_a_job_using_social media Mo zen inc_getting_a_job_using_social media
Mo zen inc_getting_a_job_using_social media
 
media safety .pptx
media safety .pptxmedia safety .pptx
media safety .pptx
 
Digital Disguise1
Digital Disguise1Digital Disguise1
Digital Disguise1
 
Tina Myles Presentation from YouToo 2010 at Kent State
Tina Myles Presentation from YouToo 2010 at Kent State Tina Myles Presentation from YouToo 2010 at Kent State
Tina Myles Presentation from YouToo 2010 at Kent State
 

Recently uploaded

UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 

Recently uploaded (20)

UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 

Dark side of the internet

  • 1. Hiring and Online Identity THE DARK SIDE OF THE INTERNET
  • 2. Online Identity  Did we talk about this before?  Posting certain things may harm your online identity.  What can hurt you:  Offensive pictures  Degrading interaction with other  Etc.  Do you know how you portray yourself?
  • 3. Who sees what you post?  Anyone can see things you post.  Twitter protected tweets  Others can retweet your protected tweets  Facebook privacy settings  Are a joke  Various ways to bypass them  Once you post something it is out there forever  Someone somwhere will save it
  • 4. How does this relate to getting hired?  Do people really use social media to “check out” potential hires?  89% of companies will use social media networks for recruiting  96% of recruiters look at your social networking site at some point of the hiring process  69% of companies have rejected candidates due to social media. http://mashable.com/2011/08/28/social-media-recruiting-infographic/ http://mashable.com/2011/10/23/how-recruiters-use-social-networks-to-screen-candidates-infographic/
  • 5. What would stop you from getting hired?  Inappropriate photos or comments  Content about you drinking  Can be hard for college students  Content about using drugs  Negative comments about previous employer  Poor communication skills  Lying about your qualifications http://mashable.com/2011/10/23/how-recruiters-use-social-networks-to-screen-candidates-infographic/
  • 6. Keeping your job  Posting offensive material can get you removed from your job.  Inappropriate photos  Bad mouthing boss, co- workers, clients  Discriminatory comments  Sharing confidential info  Easy to find if you are lying  Ex) Facebook Fairy http://www.daily-tribune.com/view/full_story/16144698/article-Social-media-sites-gain-ground-in-hiring-practices?instance=homefirstleft