Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Online Professionalism for International Student Scholars

572 views

Published on

An interactive presentation for students in UBC's International Scholar Program on online professionalism and the complexity of an online environment.

Published in: Social Media
  • Be the first to comment

  • Be the first to like this

Online Professionalism for International Student Scholars

  1. 1. Think Before You Ink Marga Heras Katie Kalk
  2. 2. Outline  Complexity of the Online Environment  What is a “Digital Identity”  How to protect yourself online  Strategies for building a career after graduation.
  3. 3. Discussion Activity  Think about your digital footprint.  Which online communities do you belong?  What do you enjoy doing online?  Who do you interact with?  If someone was to look you up online what would they learn about you?
  4. 4. Complexity of Online Environment  Dynamics that influence what we do online – Persistence – Replicability – Searchability – Scalability From: boyd, danah. 2009. "Social Media is Here to Stay... Now What?"
  5. 5. The audience can be invisible and anonymous
  6. 6. Online Environment | Persistence what you (or others) put on the internet stays there The good The bad The ugly
  7. 7. Online Environment |Replicability Content can be taken out of context
  8. 8. Online Environment |Scalability Scalability: what’s intended for one reaches many
  9. 9. Online Environment | Searchability
  10. 10. Online Environment | Searchability
  11. 11. Blurred Boundaries  How do you balance your personal and professional identities, particularly while participating online?
  12. 12. Protect  Mobile Safety  Online Banking  Geotagging
  13. 13. Wi-Fi Networks  Free ≠ safe  Hacker tactics: – Man In the Middle Attack – Evil Twin Attack  Strategies: – Know your networks/use password protected networks – Use HTTPS when available – Run Firewall/antivirus program – Do not use public Wi-Fi for sensitive material
  14. 14. Wi-Fi Networks  Free ≠ safe  Hacker tactics: – Man In the Middle Attack – Evil Twin Attack  Strategies: – Know your networks/use password protected networks – Use HTTPS when available – Run Firewall/antivirus program – Do not use public Wi-Fi for sensitive material
  15. 15. Geotagging  What is it? – GPS coordinates linked onto pictures, social media, messages, etc  So what? – Who can see my location? How can they see my location?
  16. 16. Protecting your Digital Identity  Discussion  Why is protecting you Digital Identity important? – What could be the consequences? – Benefits?
  17. 17. Activity  Break into small groups of between three and five.  Discuss the scenarios with your group. – Would this impact your online identity positively? Negatively? – Would you do anything differently? – Is it anyone else's business?
  18. 18. Why Bother?
  19. 19. Strategies  LinkedIn – Professional networking – Invest time creating your profile • Career aspirations, links to examples with your work, links to employers, summary of qualifications – Endorsements and references – Be a follower!  Vizify – Platform that helps you easily create a graphical biography that represents your resume, education, interests, social media accounts, etc.
  20. 20. Strategies  Restricting sharing settings – Remove or restrict access to any pictures, messages or videos you would not want the public to see from your online profile.  Asking friends not to tag photos of you  Quality > Quantity  Search your name frequently & delete unwanted content – Google (or Google images) – Google Alert
  21. 21. Final thoughts  What is one new thing that you learned about your digital identity?  Did this presentation create any concerns about your online privacy?  How can your professional enhance your online presence?
  22. 22. TR Design your digital tattoo...

×