SlideShare a Scribd company logo
1 of 19
Lecture 6


Online identity
Building Your Online Identity
•   Have a plan
•   Think long-term
•   Be consistent
•   Your avatar
•   Site basics
•   Participate
•   Get inspired

             COMP113: Social Media & Online Communities   2
Next
• You find that you are having an account in
  one of the popular services, such
  as Twitter for micro blogging, YouTube for
  video sharing, Delicious for links, Last.fm for
  music, Flickr for images, Digg for news
  and Facebook for a profile.
• Funnel all those services through a life
  streaming tool such as FriendFeed and
  moderate the content sharing there for
  efficiency
• And may be more……….
             COMP113: Social Media & Online Communities   3
But your online identity can be easily
                 destroyed
Being online is like being in public. Nearly anything
that gets posted can come back to haunt you.
• Boring posts
• Disrespecting others
• Failing to promote others
• Not replying to comments
• Being tagged in questionable photos

                COMP113: Social Media & Online Communities   4
Protecting Your Online Identity


• Account / Password management
• Login often




           COMP113: Social Media & Online Communities   5
Online methods for stealing
   personal information
• Malware
• Spam
• Phishing




             COMP113: Social Media & Online Communities   6
What do people do to manage
          accounts?

Model1
• Use the same
  username/password
  for multiple sites




                       7
What do people do to manage
           accounts?
• Maintain a list of user IDs and
  passwords in an offline document
Or
• Store account details in a
  “password vault”:
   – On your PC (e.g., protected by
     fingerprint recognition)
   – In a portable USB
     device, protected by a strong
     pass phrase
   – On a trustworthy online
     service, e.g., mashedlife.com    8
9
What do people do to manage
         accounts?
Model 2

• Login using an OpenID
  account where possible
• Social login (e.g., Facebook
  Connect, Twitter OAuth, ...)




                COMP113: Social Media & Online Communities   10
OpenID
•   OpenIDs are URLs (i.e., your identities)
•   Find a provider (e.g., MyOpenID, Yahoo, ...)
•   Log into any site that supports OpenID
•   Not overly successful
Facebook Connect
• What happens?
  – Login into 3rd party websites
  – Approve level of data access
    between Facebook and website
  – See if your friends have also
    connected to the website
  – Publish content to Facebook
    through the website




                                    13
14
Social logins – survey-
• 86% respondents will change behaviour:
  – 54% might leave the site and not return
  – 26% would go to a different site if possible
  – 6% would just simply leave or avoid the site
  – 14% would not complete the registration
• 88% admitted to supplying incorrect
  information or not answering all fields
• 90% admitted to leaving a website if they
  couldn’t remember login details (was 45%)
COMP113: Social Media & Online Communities   16
COMP113: Social Media & Online Communities   17
COMP113: Social Media & Online Communities   18
The End

          19

More Related Content

What's hot

Facebook and security settings settings
Facebook and security settings settingsFacebook and security settings settings
Facebook and security settings settingsAbhishek Gupta
 
Social Media From a Security Point Of View - Telenor GoToSec and Telenor Peop...
Social Media From a Security Point Of View - Telenor GoToSec and Telenor Peop...Social Media From a Security Point Of View - Telenor GoToSec and Telenor Peop...
Social Media From a Security Point Of View - Telenor GoToSec and Telenor Peop...SpareBank 1 Gruppen AS
 
facebook secrets by SHASHI
facebook secrets by SHASHIfacebook secrets by SHASHI
facebook secrets by SHASHIshashi patel
 
Facebook and Security Settings Report
Facebook and Security Settings ReportFacebook and Security Settings Report
Facebook and Security Settings ReportAbhishek Gupta
 
Social Media and top 10 Social networking sites
Social Media and top 10 Social networking sites Social Media and top 10 Social networking sites
Social Media and top 10 Social networking sites Abdullah Mahboob
 
Social Media Safety Presentation
Social Media Safety PresentationSocial Media Safety Presentation
Social Media Safety PresentationLJ Henshell
 
Facebook Security
Facebook SecurityFacebook Security
Facebook Securitythaash95
 
Social Media - The Good, The Bad, and The Ugly
Social Media  - The Good, The Bad, and The UglySocial Media  - The Good, The Bad, and The Ugly
Social Media - The Good, The Bad, and The UglyDr. Joel Evans
 
Empowerment technology
Empowerment technologyEmpowerment technology
Empowerment technologypizonaim
 
Social Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social MediaSocial Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social MediaTyler Shields
 
21st Century Skills: Finding Useful Info Online & Controlling Info Flow
21st Century Skills: Finding Useful Info Online & Controlling Info Flow21st Century Skills: Finding Useful Info Online & Controlling Info Flow
21st Century Skills: Finding Useful Info Online & Controlling Info FlowBob Bertsch
 
Impact on social networks
Impact on social networksImpact on social networks
Impact on social networksBhargava Ganti
 
Social media dangers
Social media dangersSocial media dangers
Social media dangersSaman Sara
 
social networking sites
social networking sitessocial networking sites
social networking sitesAnant Agarwal
 
15 Security & Privacy Tips for Social Media Safety
15 Security & Privacy Tips for Social Media Safety15 Security & Privacy Tips for Social Media Safety
15 Security & Privacy Tips for Social Media SafetyChad Warner
 
PMICIC social media
PMICIC social mediaPMICIC social media
PMICIC social mediaBevill Edge
 
Rules of netiquette & cyber crimes
Rules of netiquette & cyber crimesRules of netiquette & cyber crimes
Rules of netiquette & cyber crimesmarkgernale24
 

What's hot (20)

Facebook and security settings settings
Facebook and security settings settingsFacebook and security settings settings
Facebook and security settings settings
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Social Media Safety Tips
Social Media Safety TipsSocial Media Safety Tips
Social Media Safety Tips
 
Social Media From a Security Point Of View - Telenor GoToSec and Telenor Peop...
Social Media From a Security Point Of View - Telenor GoToSec and Telenor Peop...Social Media From a Security Point Of View - Telenor GoToSec and Telenor Peop...
Social Media From a Security Point Of View - Telenor GoToSec and Telenor Peop...
 
facebook secrets by SHASHI
facebook secrets by SHASHIfacebook secrets by SHASHI
facebook secrets by SHASHI
 
Facebook and Security Settings Report
Facebook and Security Settings ReportFacebook and Security Settings Report
Facebook and Security Settings Report
 
Social Media and top 10 Social networking sites
Social Media and top 10 Social networking sites Social Media and top 10 Social networking sites
Social Media and top 10 Social networking sites
 
Social Media Safety Presentation
Social Media Safety PresentationSocial Media Safety Presentation
Social Media Safety Presentation
 
Facebook Security
Facebook SecurityFacebook Security
Facebook Security
 
Social Media - The Good, The Bad, and The Ugly
Social Media  - The Good, The Bad, and The UglySocial Media  - The Good, The Bad, and The Ugly
Social Media - The Good, The Bad, and The Ugly
 
Empowerment technology
Empowerment technologyEmpowerment technology
Empowerment technology
 
Social Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social MediaSocial Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social Media
 
21st Century Skills: Finding Useful Info Online & Controlling Info Flow
21st Century Skills: Finding Useful Info Online & Controlling Info Flow21st Century Skills: Finding Useful Info Online & Controlling Info Flow
21st Century Skills: Finding Useful Info Online & Controlling Info Flow
 
Impact on social networks
Impact on social networksImpact on social networks
Impact on social networks
 
Social media dangers
Social media dangersSocial media dangers
Social media dangers
 
social networking sites
social networking sitessocial networking sites
social networking sites
 
15 Security & Privacy Tips for Social Media Safety
15 Security & Privacy Tips for Social Media Safety15 Security & Privacy Tips for Social Media Safety
15 Security & Privacy Tips for Social Media Safety
 
PMICIC social media
PMICIC social mediaPMICIC social media
PMICIC social media
 
Integrating Social Media
Integrating Social MediaIntegrating Social Media
Integrating Social Media
 
Rules of netiquette & cyber crimes
Rules of netiquette & cyber crimesRules of netiquette & cyber crimes
Rules of netiquette & cyber crimes
 

Viewers also liked

7 Adopting & integrating SM in organisations
7 Adopting & integrating SM in organisations7 Adopting & integrating SM in organisations
7 Adopting & integrating SM in organisationsCOMP 113
 
Day 18: The end (for real)
Day 18: The end (for real)Day 18: The end (for real)
Day 18: The end (for real)COMP 113
 
Class 8b: Social marketing for web 2.0 projects
Class 8b: Social marketing for web 2.0 projectsClass 8b: Social marketing for web 2.0 projects
Class 8b: Social marketing for web 2.0 projectsCOMP 113
 
2 SM a closer look
2 SM a closer look2 SM a closer look
2 SM a closer lookCOMP 113
 
U otago the frew group webinar
U otago the frew group webinar U otago the frew group webinar
U otago the frew group webinar COMP 113
 
Miscellany
MiscellanyMiscellany
MiscellanyCOMP 113
 
9 mobile devices and geolocation
9  mobile devices and geolocation9  mobile devices and geolocation
9 mobile devices and geolocationCOMP 113
 
Cat graham Otago University 29th Jan 13
Cat graham Otago University 29th Jan 13Cat graham Otago University 29th Jan 13
Cat graham Otago University 29th Jan 13COMP 113
 

Viewers also liked (8)

7 Adopting & integrating SM in organisations
7 Adopting & integrating SM in organisations7 Adopting & integrating SM in organisations
7 Adopting & integrating SM in organisations
 
Day 18: The end (for real)
Day 18: The end (for real)Day 18: The end (for real)
Day 18: The end (for real)
 
Class 8b: Social marketing for web 2.0 projects
Class 8b: Social marketing for web 2.0 projectsClass 8b: Social marketing for web 2.0 projects
Class 8b: Social marketing for web 2.0 projects
 
2 SM a closer look
2 SM a closer look2 SM a closer look
2 SM a closer look
 
U otago the frew group webinar
U otago the frew group webinar U otago the frew group webinar
U otago the frew group webinar
 
Miscellany
MiscellanyMiscellany
Miscellany
 
9 mobile devices and geolocation
9  mobile devices and geolocation9  mobile devices and geolocation
9 mobile devices and geolocation
 
Cat graham Otago University 29th Jan 13
Cat graham Otago University 29th Jan 13Cat graham Otago University 29th Jan 13
Cat graham Otago University 29th Jan 13
 

Similar to 6 online identity

Presentation social networking service
Presentation social networking servicePresentation social networking service
Presentation social networking serviceManish S Thingalaya
 
VSCPA Board Retreat: Social Media Presentation
VSCPA Board Retreat: Social Media PresentationVSCPA Board Retreat: Social Media Presentation
VSCPA Board Retreat: Social Media PresentationTina Lambert
 
Social Media Webinar Handouts June 2010
Social Media Webinar Handouts June 2010Social Media Webinar Handouts June 2010
Social Media Webinar Handouts June 2010Tina Lambert
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awarenessKaran Veer Singh
 
2011: Using Social Media for Your Non-Profit
2011: Using Social Media for Your Non-Profit2011: Using Social Media for Your Non-Profit
2011: Using Social Media for Your Non-ProfitCarol Spencer
 
Social Technologies Presentation CPCU I Day 2010
Social Technologies Presentation CPCU I Day 2010Social Technologies Presentation CPCU I Day 2010
Social Technologies Presentation CPCU I Day 2010Sandra Masters
 
Social Networking and Your Library
Social Networking and Your LibrarySocial Networking and Your Library
Social Networking and Your LibraryEddie Byrne
 
Future world drug addicted
Future world drug addictedFuture world drug addicted
Future world drug addictedVimala Siravi
 
VSCPA Richmond Chapter: Social Media Presentation
VSCPA Richmond Chapter: Social Media PresentationVSCPA Richmond Chapter: Social Media Presentation
VSCPA Richmond Chapter: Social Media PresentationTina Lambert
 
Ppt of social networking sites
Ppt of social networking sitesPpt of social networking sites
Ppt of social networking sitesNidhi Vats
 
The Power of Social Media: Taking Your Networking Online
The Power of Social Media: Taking Your Networking OnlineThe Power of Social Media: Taking Your Networking Online
The Power of Social Media: Taking Your Networking OnlineTina Lambert
 

Similar to 6 online identity (20)

Presentation social networking service
Presentation social networking servicePresentation social networking service
Presentation social networking service
 
VSCPA Board Retreat: Social Media Presentation
VSCPA Board Retreat: Social Media PresentationVSCPA Board Retreat: Social Media Presentation
VSCPA Board Retreat: Social Media Presentation
 
Social Media Webinar Handouts June 2010
Social Media Webinar Handouts June 2010Social Media Webinar Handouts June 2010
Social Media Webinar Handouts June 2010
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awareness
 
eSmart Libraries social media presentation 2015
eSmart Libraries social media presentation 2015eSmart Libraries social media presentation 2015
eSmart Libraries social media presentation 2015
 
Social network
Social networkSocial network
Social network
 
Shockproofing Your Use of Social Media
Shockproofing Your Use of Social MediaShockproofing Your Use of Social Media
Shockproofing Your Use of Social Media
 
Social Network
Social NetworkSocial Network
Social Network
 
Social networking
Social networkingSocial networking
Social networking
 
2011: Using Social Media for Your Non-Profit
2011: Using Social Media for Your Non-Profit2011: Using Social Media for Your Non-Profit
2011: Using Social Media for Your Non-Profit
 
Social networking
Social networkingSocial networking
Social networking
 
Social Technologies Presentation CPCU I Day 2010
Social Technologies Presentation CPCU I Day 2010Social Technologies Presentation CPCU I Day 2010
Social Technologies Presentation CPCU I Day 2010
 
Bsm wk iii_march2013
Bsm wk iii_march2013Bsm wk iii_march2013
Bsm wk iii_march2013
 
Social Networking and Your Library
Social Networking and Your LibrarySocial Networking and Your Library
Social Networking and Your Library
 
Social Networks
Social NetworksSocial Networks
Social Networks
 
Ppt
PptPpt
Ppt
 
Future world drug addicted
Future world drug addictedFuture world drug addicted
Future world drug addicted
 
VSCPA Richmond Chapter: Social Media Presentation
VSCPA Richmond Chapter: Social Media PresentationVSCPA Richmond Chapter: Social Media Presentation
VSCPA Richmond Chapter: Social Media Presentation
 
Ppt of social networking sites
Ppt of social networking sitesPpt of social networking sites
Ppt of social networking sites
 
The Power of Social Media: Taking Your Networking Online
The Power of Social Media: Taking Your Networking OnlineThe Power of Social Media: Taking Your Networking Online
The Power of Social Media: Taking Your Networking Online
 

More from COMP 113

#eqnz: Sarah Gallagher
#eqnz: Sarah Gallagher#eqnz: Sarah Gallagher
#eqnz: Sarah GallagherCOMP 113
 
5 privacy terms
5 privacy terms5 privacy terms
5 privacy termsCOMP 113
 
4 growing and thriving online communities
4 growing and thriving online communities4 growing and thriving online communities
4 growing and thriving online communitiesCOMP 113
 
3 online community & social networks
3 online community & social networks3 online community & social networks
3 online community & social networksCOMP 113
 
2013: Comp113 lecture 1 part two
2013: Comp113 lecture 1 part two2013: Comp113 lecture 1 part two
2013: Comp113 lecture 1 part twoCOMP 113
 
2013: Comp113 lecture 1 part One
2013: Comp113 lecture 1 part One2013: Comp113 lecture 1 part One
2013: Comp113 lecture 1 part OneCOMP 113
 
12: End of everything
12: End of everything12: End of everything
12: End of everythingCOMP 113
 
11: Gamification
11: Gamification11: Gamification
11: GamificationCOMP 113
 
10: The pitch & cool tools
10: The pitch & cool tools10: The pitch & cool tools
10: The pitch & cool toolsCOMP 113
 
9: mobile technologies
9: mobile technologies9: mobile technologies
9: mobile technologiesCOMP 113
 
8: The Deep Web & Arab Spring
8: The Deep Web & Arab Spring8: The Deep Web & Arab Spring
8: The Deep Web & Arab SpringCOMP 113
 
7: Copyright and eqnz
7: Copyright and eqnz7: Copyright and eqnz
7: Copyright and eqnzCOMP 113
 
6: privacy terms
6: privacy terms6: privacy terms
6: privacy termsCOMP 113
 
5: Happy users
5: Happy users5: Happy users
5: Happy usersCOMP 113
 
4: SM case studies & online community
4: SM case studies & online community4: SM case studies & online community
4: SM case studies & online communityCOMP 113
 
3: web technologies
3: web technologies3: web technologies
3: web technologiesCOMP 113
 
2: Social media services and blogging
2: Social media services and blogging2: Social media services and blogging
2: Social media services and bloggingCOMP 113
 
1: Overview and context
1: Overview and context1: Overview and context
1: Overview and contextCOMP 113
 
Day 15: Pitch & mobile
Day 15: Pitch & mobileDay 15: Pitch & mobile
Day 15: Pitch & mobileCOMP 113
 
Day 13 (part 1): Virtual worlds
Day 13 (part 1): Virtual worldsDay 13 (part 1): Virtual worlds
Day 13 (part 1): Virtual worldsCOMP 113
 

More from COMP 113 (20)

#eqnz: Sarah Gallagher
#eqnz: Sarah Gallagher#eqnz: Sarah Gallagher
#eqnz: Sarah Gallagher
 
5 privacy terms
5 privacy terms5 privacy terms
5 privacy terms
 
4 growing and thriving online communities
4 growing and thriving online communities4 growing and thriving online communities
4 growing and thriving online communities
 
3 online community & social networks
3 online community & social networks3 online community & social networks
3 online community & social networks
 
2013: Comp113 lecture 1 part two
2013: Comp113 lecture 1 part two2013: Comp113 lecture 1 part two
2013: Comp113 lecture 1 part two
 
2013: Comp113 lecture 1 part One
2013: Comp113 lecture 1 part One2013: Comp113 lecture 1 part One
2013: Comp113 lecture 1 part One
 
12: End of everything
12: End of everything12: End of everything
12: End of everything
 
11: Gamification
11: Gamification11: Gamification
11: Gamification
 
10: The pitch & cool tools
10: The pitch & cool tools10: The pitch & cool tools
10: The pitch & cool tools
 
9: mobile technologies
9: mobile technologies9: mobile technologies
9: mobile technologies
 
8: The Deep Web & Arab Spring
8: The Deep Web & Arab Spring8: The Deep Web & Arab Spring
8: The Deep Web & Arab Spring
 
7: Copyright and eqnz
7: Copyright and eqnz7: Copyright and eqnz
7: Copyright and eqnz
 
6: privacy terms
6: privacy terms6: privacy terms
6: privacy terms
 
5: Happy users
5: Happy users5: Happy users
5: Happy users
 
4: SM case studies & online community
4: SM case studies & online community4: SM case studies & online community
4: SM case studies & online community
 
3: web technologies
3: web technologies3: web technologies
3: web technologies
 
2: Social media services and blogging
2: Social media services and blogging2: Social media services and blogging
2: Social media services and blogging
 
1: Overview and context
1: Overview and context1: Overview and context
1: Overview and context
 
Day 15: Pitch & mobile
Day 15: Pitch & mobileDay 15: Pitch & mobile
Day 15: Pitch & mobile
 
Day 13 (part 1): Virtual worlds
Day 13 (part 1): Virtual worldsDay 13 (part 1): Virtual worlds
Day 13 (part 1): Virtual worlds
 

6 online identity

  • 2. Building Your Online Identity • Have a plan • Think long-term • Be consistent • Your avatar • Site basics • Participate • Get inspired COMP113: Social Media & Online Communities 2
  • 3. Next • You find that you are having an account in one of the popular services, such as Twitter for micro blogging, YouTube for video sharing, Delicious for links, Last.fm for music, Flickr for images, Digg for news and Facebook for a profile. • Funnel all those services through a life streaming tool such as FriendFeed and moderate the content sharing there for efficiency • And may be more………. COMP113: Social Media & Online Communities 3
  • 4. But your online identity can be easily destroyed Being online is like being in public. Nearly anything that gets posted can come back to haunt you. • Boring posts • Disrespecting others • Failing to promote others • Not replying to comments • Being tagged in questionable photos COMP113: Social Media & Online Communities 4
  • 5. Protecting Your Online Identity • Account / Password management • Login often COMP113: Social Media & Online Communities 5
  • 6. Online methods for stealing personal information • Malware • Spam • Phishing COMP113: Social Media & Online Communities 6
  • 7. What do people do to manage accounts? Model1 • Use the same username/password for multiple sites 7
  • 8. What do people do to manage accounts? • Maintain a list of user IDs and passwords in an offline document Or • Store account details in a “password vault”: – On your PC (e.g., protected by fingerprint recognition) – In a portable USB device, protected by a strong pass phrase – On a trustworthy online service, e.g., mashedlife.com 8
  • 9. 9
  • 10. What do people do to manage accounts? Model 2 • Login using an OpenID account where possible • Social login (e.g., Facebook Connect, Twitter OAuth, ...) COMP113: Social Media & Online Communities 10
  • 11. OpenID • OpenIDs are URLs (i.e., your identities) • Find a provider (e.g., MyOpenID, Yahoo, ...) • Log into any site that supports OpenID • Not overly successful
  • 12.
  • 13. Facebook Connect • What happens? – Login into 3rd party websites – Approve level of data access between Facebook and website – See if your friends have also connected to the website – Publish content to Facebook through the website 13
  • 14. 14
  • 15. Social logins – survey- • 86% respondents will change behaviour: – 54% might leave the site and not return – 26% would go to a different site if possible – 6% would just simply leave or avoid the site – 14% would not complete the registration • 88% admitted to supplying incorrect information or not answering all fields • 90% admitted to leaving a website if they couldn’t remember login details (was 45%)
  • 16. COMP113: Social Media & Online Communities 16
  • 17. COMP113: Social Media & Online Communities 17
  • 18. COMP113: Social Media & Online Communities 18
  • 19. The End 19

Editor's Notes

  1. Manage your password: The more complicated the password, the less likely it will be hacked.Login often: This will help to make sure your account isn’t being hacked and it’s good to look active on your social media accounts.
  2. The days of having a separate login and password for each online service we use are behind us. Now, you can log into most sites and services using your social network's ID.
  3. http://openidexplained.com/http://openid.net/what/http://en.wikipedia.org/wiki/OpenID
  4. Social Login reduces the barriers to register and sign-in to your site, allowing users to authenticate their identities using a preferred social network account. It’s proven to increase registration rates by 20-40% and provides permission-based access to rich, first-party user data so you can create a completely personalized user experience.
  5. http://dev.twitter.com/pages/auth#introhttp://www.slideshare.net/episod/linkedin-oauth-zero-to-hero
  6. The most popular social identities are Facebook, Google, Yahoo, and Twitter, but are they always being used in the same way? The infographic below, courtesy of social optimization platform Gigya, shows that users trust different identities on different services. For example, users are most likely to log on to entertainment sites via Facebook, but when it comes to news sites, the login of choice is Twitter. Furthermore, the infographic shows what profile data is available to services after users log in using various online identities.
  7. . For example, users are most likely to log on to entertainment sites via Facebook, but when it comes to news sites, the login of choice is Twitter.
  8. Furthermore, the infographic shows what profile data is available to services after users log in using various online identities.