6 online identity
Upcoming SlideShare
Loading in...5
×
 

6 online identity

on

  • 170 views

 

Statistics

Views

Total Views
170
Views on SlideShare
170
Embed Views
0

Actions

Likes
0
Downloads
0
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment
  • Manage your password: The more complicated the password, the less likely it will be hacked.Login often: This will help to make sure your account isn’t being hacked and it’s good to look active on your social media accounts.
  • The days of having a separate login and password for each online service we use are behind us. Now, you can log into most sites and services using your social network's ID.
  • http://openidexplained.com/http://openid.net/what/http://en.wikipedia.org/wiki/OpenID
  • Social Login reduces the barriers to register and sign-in to your site, allowing users to authenticate their identities using a preferred social network account. It’s proven to increase registration rates by 20-40% and provides permission-based access to rich, first-party user data so you can create a completely personalized user experience.
  • http://dev.twitter.com/pages/auth#introhttp://www.slideshare.net/episod/linkedin-oauth-zero-to-hero
  • The most popular social identities are Facebook, Google, Yahoo, and Twitter, but are they always being used in the same way? The infographic below, courtesy of social optimization platform Gigya, shows that users trust different identities on different services. For example, users are most likely to log on to entertainment sites via Facebook, but when it comes to news sites, the login of choice is Twitter. Furthermore, the infographic shows what profile data is available to services after users log in using various online identities.
  • . For example, users are most likely to log on to entertainment sites via Facebook, but when it comes to news sites, the login of choice is Twitter.
  • Furthermore, the infographic shows what profile data is available to services after users log in using various online identities.

6 online identity 6 online identity Presentation Transcript

  • Lecture 6Online identity
  • Building Your Online Identity• Have a plan• Think long-term• Be consistent• Your avatar• Site basics• Participate• Get inspired COMP113: Social Media & Online Communities 2
  • Next• You find that you are having an account in one of the popular services, such as Twitter for micro blogging, YouTube for video sharing, Delicious for links, Last.fm for music, Flickr for images, Digg for news and Facebook for a profile.• Funnel all those services through a life streaming tool such as FriendFeed and moderate the content sharing there for efficiency• And may be more………. COMP113: Social Media & Online Communities 3
  • But your online identity can be easily destroyedBeing online is like being in public. Nearly anythingthat gets posted can come back to haunt you.• Boring posts• Disrespecting others• Failing to promote others• Not replying to comments• Being tagged in questionable photos COMP113: Social Media & Online Communities 4
  • Protecting Your Online Identity• Account / Password management• Login often COMP113: Social Media & Online Communities 5
  • Online methods for stealing personal information• Malware• Spam• Phishing COMP113: Social Media & Online Communities 6
  • What do people do to manage accounts?Model1• Use the same username/password for multiple sites 7
  • What do people do to manage accounts?• Maintain a list of user IDs and passwords in an offline documentOr• Store account details in a “password vault”: – On your PC (e.g., protected by fingerprint recognition) – In a portable USB device, protected by a strong pass phrase – On a trustworthy online service, e.g., mashedlife.com 8
  • 9
  • What do people do to manage accounts?Model 2• Login using an OpenID account where possible• Social login (e.g., Facebook Connect, Twitter OAuth, ...) COMP113: Social Media & Online Communities 10
  • OpenID• OpenIDs are URLs (i.e., your identities)• Find a provider (e.g., MyOpenID, Yahoo, ...)• Log into any site that supports OpenID• Not overly successful
  • Facebook Connect• What happens? – Login into 3rd party websites – Approve level of data access between Facebook and website – See if your friends have also connected to the website – Publish content to Facebook through the website 13
  • 14
  • Social logins – survey-• 86% respondents will change behaviour: – 54% might leave the site and not return – 26% would go to a different site if possible – 6% would just simply leave or avoid the site – 14% would not complete the registration• 88% admitted to supplying incorrect information or not answering all fields• 90% admitted to leaving a website if they couldn’t remember login details (was 45%)
  • COMP113: Social Media & Online Communities 16
  • COMP113: Social Media & Online Communities 17
  • COMP113: Social Media & Online Communities 18
  • The End 19