SlideShare a Scribd company logo
1 of 86
Digital Persona Management for IBMers Joshua Scribner Social Software Advocate IBM SWG, BlueIQ [email_address] @joshscribner Version 2.3, Updated: 8 February 2012
Enterprise Benefits of a Social Network ,[object Object],[object Object],[object Object],[object Object]
Personal Benefits of a Social Network ,[object Object],[object Object],[object Object],[object Object],[object Object]
A Facebook dramatization… … I apologize in advance for the crude language. http://www.youtube.com/v/LrFdOz1Mj8Q This video gives you an idea of the Facebook dilemma:
Risks of a Social Network ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Risks of a Social Network: Business ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Scary! Should I still use Social Networks? ,[object Object],[object Object],[object Object]
Personas ,[object Object],[object Object]
Objectives ,[object Object],[object Object],[object Object]
The rest of this presentation: ,[object Object],[object Object],Slide 11 Slide 52  Slide 74  - coming soon Slide 77  - coming soon Slide 80
Social Network:  Facebook
Social Network:  Facebook ,[object Object],[object Object],[object Object],[object Object]
Create Groups ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Facebook: Objective 1
Create Friend Lists from your Groups ,[object Object],Facebook: Objective 1 https://www.facebook.com/bookmarks/lists
Create Friend Lists for your Groups ,[object Object],[object Object],[object Object],[object Object],[object Object],Facebook: Objective 1
Create Groups: Assign contacts ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Facebook: Objective 1
Create Groups: Assign contacts ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Facebook: Objective 1 Alternative
Control Access - Basics ,[object Object],[object Object],[object Object],Facebook: Objective 2 TIP:  Don’t trust a “Network” -- you can’t control it and it doesn’t offer the safety of IBM’s intranet.  Create a Friend List to parallel each Network, add/accept friends selectively, and then Customize the access for each Friend List.
Control Access - Your Data ,[object Object],[object Object],[object Object],Facebook: Objective 2 Timeline users, and all users after 1 Feb 2012: From  your profile page ,  go to " About " and click  on the sections of your profile you wish to change. Non-Timeline users: From  your profile page , click  Edit Profile .  You can also use the links at the top of the next few slides as shortcuts to get to Profile Editing controls. Example: I have customized my employer information so that it is only visible to some people in my network.  When I select Custom, I can decide who sees this data.
Control Access - Your Data ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Edit Profile >  Basic Information These are my recommendations for these settings.  It is up to you to decide if the advice fits the way you want to use Facebook and if it complies with IBM’s Business Conduct Guidelines as they apply to you. Facebook: Objective 2
Control Access - Your Data ,[object Object],[object Object],[object Object],[object Object],Edit Profile >  Profile Picture These are my recommendations for these settings.  It is up to you to decide if the advice fits the way you want to use Facebook and if it complies with IBM’s Business Conduct Guidelines as they apply to you. Facebook: Objective 2
Control Access - Your Data ,[object Object],[object Object],[object Object],Edit Profile >  Friends and Family These are my recommendations for these settings.  It is up to you to decide if the advice fits the way you want to use Facebook and if it complies with IBM’s Business Conduct Guidelines as they apply to you. Facebook: Objective 2
Control Access - Your Data ,[object Object],[object Object],[object Object],Edit Profile >  Education and Work These are my recommendations for these settings.  It is up to you to decide if the advice fits the way you want to use Facebook and if it complies with IBM’s Business Conduct Guidelines as they apply to you. Facebook: Objective 2
Control Access - Your Data ,[object Object],[object Object],[object Object],[object Object],Edit Profile >  Philosophy These are my recommendations for these settings.  It is up to you to decide if the advice fits the way you want to use Facebook and if it complies with IBM’s Business Conduct Guidelines as they apply to you. Facebook: Objective 2
Control Access - Your Data ,[object Object],[object Object],[object Object],[object Object],Edit Profile >  Arts and Entertainment  and  Sports These are my recommendations for these settings.  It is up to you to decide if the advice fits the way you want to use Facebook and if it complies with IBM’s Business Conduct Guidelines as they apply to you. Facebook: Objective 2
Control Access - Your Data ,[object Object],[object Object],[object Object],Edit Profile >  Activities and Interests These are my recommendations for these settings.  It is up to you to decide if the advice fits the way you want to use Facebook and if it complies with IBM’s Business Conduct Guidelines as they apply to you. An example of how Facebook displays  Activities ,  Interests , and  Other Pages You Like . Facebook: Objective 2
Control Access - Your Data ,[object Object],[object Object],[object Object],[object Object],[object Object],Edit Profile >  Contact Information These are my recommendations for these settings.  It is up to you to decide if the advice fits the way you want to use Facebook and if it complies with IBM’s Business Conduct Guidelines as they apply to you. Facebook: Objective 2
Control Access - Your Data ,[object Object],[object Object],[object Object],Edit  Timeline  Profile >  Map These are my recommendations for these settings.  It is up to you to decide if the advice fits the way you want to use Facebook and if it complies with IBM’s Business Conduct Guidelines as they apply to you. Facebook: Objective 2
Control Access - Don't appear in ads ,[object Object],[object Object],[object Object],Account Settings >  Facebook Ads Facebook: Objective 2
Control Access - Your Data ,[object Object],[object Object],[object Object],View As Facebook: Objective 2
Control Access - Your Timeline ,[object Object],[object Object],[object Object],[object Object],[object Object],Facebook: Objective 2
3 - Retain Control ,[object Object],[object Object],[object Object],[object Object],Facebook: Objective 3
Share Smart – Photos and Videos Me! ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Facebook: Objective 3 These are my recommendations for these settings.  It is up to you to decide if the advice fits the way you want to use Facebook and if it complies with IBM’s Business Conduct Guidelines as they apply to you.
Share Smart – Your Wall When you post to your wall, or cause a status message to appear on your wall, you will usually have the option to decide which Friend Lists can see it. You should always check to see who you are sharing with.  This is an important control point in maintaining your privacy and control of your information.  If you do not want your friends to share what you have posted, either explicitly inform them (or reconsider sharing it on the internet). On the next slide, we'll discuss setting default Friend Lists for these posts. Facebook: Objective 3 These are my recommendations for these settings.  It is up to you to decide if the advice fits the way you want to use Facebook and if it complies with IBM’s Business Conduct Guidelines as they apply to you.
Lock it down - Basics ,[object Object],[object Object],[object Object],[object Object],Next Slide:  Which Friend Lists should I add? Facebook: Objective 3
Lock it down - Basics ,[object Object],[object Object],[object Object],[object Object],Facebook: Objective 3
Lock it down - Privacy Settings ,[object Object],[object Object],[object Object],[object Object],Your Home >  Privacy Settings Facebook: Objective 3
Lock it down – “How You Connect” ,[object Object],These are my recommendations for these settings.  It is up to you to decide if the advice fits the way you want to use Facebook and if it complies with IBM’s Business Conduct Guidelines as they apply to you. This only determines how  easily  you can be found on Facebook, it doesn’t prevent people from finding you. This enables people to request to join your network.  Since you will be granularly controlling what people in your network can see (via Friend Lists), there’s no harm in letting people request to join. If you wanted to keep out spam, you could prevent anyone from messaging you, but this is in many ways no different than your email inbox. Don’t allow people to post on your main wall.  Let friends contact you privately, or install secondary “Wall” programs (SuperWall, etc) and make each secondary Wall visible only to a specific set of Friend Lists. Though you’ve prevented your friends from posting on your wall, this ensures that only you can see it. Why prevent Wall posts by others:  We aren’t going to let people see who is in our networks, we’re going to keep them as separated as possible.  As such, we are restricting the ability of people in any of those networks from sharing our personal information with other networks by restricting their ability to communicate.  Create separate walls to give them the ability to talk about you within the confines of that network of friends. Facebook: Objective 3
Lock it down – “How Tags Work” ,[object Object],When others “Tag” you in a photo or post, it is added to a list of content on your profile. You cannot control the fact that others added your name to a photo or post, but you can make them hard to find and disavow the connection. When someone says they are posting about you, and that they want that post linked to your profile, you should review the content to decide if you want to endorse it as accurate about you.  By allowing it to be linked from your profile, you are tacitly implying it is accurate.  When someone adds a Tag to your post, saying that it is also about them (or someone else), you want to be able to confirm this is true and that your network should also see that linkage. If you do allow a post or photo on your profile, restrict who can see it When a friend uploads a photo about you, Facebook’s internal face-recognition software can suggest that it’s your face in the photo, to make Tagging easier.  Since we’re reviewing photos anyway, you could leave this on or off. Don't allow people to track your movements; your location is sensitive data about where you are (and aren't), it shouldn't be available to competitors, jealous friends, or lurking burglars. These are my recommendations for these settings.  It is up to you to decide if the advice fits the way you want to use Facebook and if it complies with IBM’s Business Conduct Guidelines as they apply to you. Facebook: Objective 3
Lock it down – “Apps and Websites” ,[object Object],Apps and Websites is split into several different areas: These are my recommendations for these settings.  It is up to you to decide if the advice fits the way you want to use Facebook and if it complies with IBM’s Business Conduct Guidelines as they apply to you. Do these three, first. Facebook: Objective 3
Lock it down – Other people's Apps ,[object Object],We're now going to increase the restrictions on your friends' apps, in order to reduce the information they can gather about you. These are my settings, you might want something similar.  Do not checkmark your birthday. When you are done, click "Save Changes." These are my recommendations for these settings.  It is up to you to decide if the advice fits the way you want to use Facebook and if it complies with IBM’s Business Conduct Guidelines as they apply to you. Facebook: Objective 3
Lock it down – Third Party Websites ,[object Object],When you click Edit Settings, a video will appear.  Below the video, click  In the Instant Personalization configuration that appears, uncheck the checkbox, so that it looks like this: Finally, toward the top-left corner, click  to return to your privacy settings. The feature we have turned off by unchecking that box tells Facebook that when you are on other (non-Facebook) websites, you do not want it to share your personal information with that third-party site. These are my recommendations for these settings.  It is up to you to decide if the advice fits the way you want to use Facebook and if it complies with IBM’s Business Conduct Guidelines as they apply to you. Facebook: Objective 3
Lock it down – Being found by Search ,[object Object],I do not mind that it is easy for my profile to be found through a search; I assume that someone will link to it, somewhere, and it will be found anyway so I might as well make myself visible.  If you want to make yourself a little harder to find, uncheck this box: Finally, toward the top-left corner, click  to return to your privacy settings. These are my recommendations for these settings.  It is up to you to decide if the advice fits the way you want to use Facebook and if it complies with IBM’s Business Conduct Guidelines as they apply to you. Facebook: Objective 3
Lock it down – "App Settings" ,[object Object],This will display a listing of the applications you have added to your profile.  Do you really need all those Apps?  Do you know what they do? Are they from a reliable source?  Some applications have been known to spam friend-lists, others are quite useful.  Know what it does before you accept a hug/drink/teddybear/etc from someone. To the right of each App is an "Edit" link and an X.  Press the X to delete any app you aren't familiar with or don't use.  On the next slide, we'll talk about editing. These are my recommendations for these settings.  It is up to you to decide if the advice fits the way you want to use Facebook and if it complies with IBM’s Business Conduct Guidelines as they apply to you. Facebook: Objective 3
Lock it down – Restricting an App  ,[object Object],Click "Edit," to the right of an App you wish to manage. These are my recommendations for these settings.  It is up to you to decide if the advice fits the way you want to use Facebook and if it complies with IBM’s Business Conduct Guidelines as they apply to you. Does this App require you give it too much access to your personal data? Click "Remove app" to delete it. Does this App request access for content that you do not want it to access, and which is optional?  You can remove that access by clicking Remove. Most Apps post content to your profile/wall, possibly sharing your private information. Restrict who can see those posts, using Custom and specifying Friend Lists (as we have done elsewhere). Facebook: Objective 3
Lock it down - App private info access Look carefully at the Required items from an App.  Click "See More" to examine exactly what content it wants to be able to see -- and share -- outside of your control.  Here are the categories it may ask for: This refers to content I've made public, not information I've restricted.  It's generally OK. This item is very worrisome; for example I do not want my birthday, religion, or politics shared.  Consider removing Apps that require this; remove this item if it is optional. An App should not require this information, and you should not be required to share it.  Consider removing Apps that require this; remove this item if it is optional. Facebook: Objective 3 These are my recommendations for these settings.  It is up to you to decide if the advice fits the way you want to use Facebook and if it complies with IBM’s Business Conduct Guidelines as they apply to you.
Lock it down - App private info access (continued - part 2) Categories an App may ask for: Your photos and videos may say a lot about you, and should not be accessed by an App as it may not adhere to the visibility restrictions you've set for the content. You don't need an App that reports on your whereabouts and Online Presence.  It's not good for IBM, nor for your personal security. Many Apps want to see information about the people in your network.  While unappealing that Apps do this, members of your network can restrict the shared information by editing "How people bring their info into apps you use" in the "Apps and Websites" are of their Privacy Settings.  It is up to you if you want to expose your network to this potential information gathering activity. Facebook: Objective 3 These are my recommendations for these settings.  It is up to you to decide if the advice fits the way you want to use Facebook and if it complies with IBM’s Business Conduct Guidelines as they apply to you.
Lock it down - App private info access (continued - part 3) Advice on making App privacy decisions Tip:  If an App on your list requires a lot of personal information, remove it and re-add it.  Beyond your Basic Information, an app must request to access each additional category of content.  This will remove any data for the App, but may be worth it if the private information it accesses has quietly been increased. Advice:  Most Apps will require a few of those information items that you deem too sensitive.  You can remove them all, if you like.  Alternatively, you should consider the risk of that information getting out with the trustworthiness of the App's creator.  You should also consider whether you think a well intentioned App function will accidentally share your information (i.e. " Find your birthday buddies!"  or  "See who else visits this coffee shop") Limitation:  Friend Lists do not apply to an Apps' level of access to your personal information.  While you can restrict who can see the posts an App makes, you can't granularly restrict an App's access to data within a category. Facebook: Objective 3 These are my recommendations for these settings.  It is up to you to decide if the advice fits the way you want to use Facebook and if it complies with IBM’s Business Conduct Guidelines as they apply to you.
Retain Control – Stay Aware ,[object Object],[object Object],[object Object],[object Object],Stay Aware – and be pro-active Facebook: Objective 3
Retain Control – Wandering information ,[object Object],[object Object],[object Object],[object Object],[object Object],Facebook: Objective 3
Your Facebook tasks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Facebook: Summary
Social Network:  LinkedIn
Social Network:  LinkedIn ,[object Object],[object Object],[object Object],[object Object]
Your LinkedIn Persona(s) ,[object Object],[object Object],[object Object],[object Object],[object Object],LinkedIn: Objective 1 LinkedIn offers no representation for your groups
Adding people to your network ,[object Object],[object Object],[object Object],[object Object],LinkedIn: Objective 1
Control Access -- Basics ,[object Object],[object Object],[object Object],LinkedIn: Objective 2 LinkedIn describes your extended network in the following manner: Your connections   -- people you are directly connected to Your network  -- your connections, plus everyone connected to them, and to them, etc. etc.  Your entire extended network.
Control Access -- Your Data ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],LinkedIn: Objective 2 Basic Information When you are finished, click "Save Changes"
Control Access -- Your Data ,[object Object],[object Object],[object Object],[object Object],LinkedIn: Objective 2 Edit Profile Picture When you are finished, click "Save Settings"
Control Access -- Your Data ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],LinkedIn: Objective 2 Add or Edit a current or past position When you are finished, click "Save Changes"
Control Access -- Your Data ,[object Object],[object Object],[object Object],[object Object],LinkedIn: Objective 2 Additional Information When you are finished, click "Save Changes"
Control Access -- Twitter ,[object Object],[object Object],[object Object],[object Object],LinkedIn: Objective 2 Twitter Settings When you are finished, click "Save Changes"
Control Access -- Your Data ,[object Object],[object Object],[object Object],[object Object],LinkedIn: Objective 2 Add or edit Education When you are finished, click "Save Changes"
Control Access -- Your Data ,[object Object],[object Object],[object Object],[object Object],[object Object],LinkedIn: Objective 2 Personal Information When you are finished, click "Save Changes"
Control Access - Contact settings ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],LinkedIn: Objective 2 Edit Contact Settings When you are finished, click "Save Changes"
Control Access -- Your privacy Settings ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],LinkedIn: Objective 3 Personal Settings
Control Access -- Your privacy Settings ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],LinkedIn: Objective 3 Personal Settings
Groups ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],LinkedIn: Objective 3 Group Sorting
Groups ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],LinkedIn: Objective 3 Privacy practices
Applications ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],LinkedIn: Objective 3 Application Directory  and  Your Applications
Control Access -- Your privacy Settings ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],LinkedIn: Objective 3 Personal Settings
How you appear ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],LinkedIn: Objective 3 Your Public Profile Settings
Retain Control – Wandering information ,[object Object],[object Object],[object Object],[object Object],[object Object],LinkedIn: Objective 3
Your LinkedIn tasks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],LinkedIn: Summary
Social Network:  Google+
Social Network:  Google+ ,[object Object],[object Object],[object Object],[object Object]
Coming Soon... ,[object Object],Google+: Objective 1
Social Network/Microblog:  Twitter
Social Network/Microblog:  Twitter ,[object Object],[object Object],[object Object],[object Object]
Coming Soon... ,[object Object],Twitter: Objective 1
Summary: Be smart ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Best Practice – Your Passwords ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Facebook: Objective 3
FYI – Owning your information ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Facebook: Objective 3
In summary… ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Sources, Additional Reading ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Sources, Additional Reading  (continued) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Extras

More Related Content

What's hot

How law Firms can utilize Social Media
How law Firms can utilize Social MediaHow law Firms can utilize Social Media
How law Firms can utilize Social Media
Brayman Construction
 
How to-generate-leads-using-linkedin
How to-generate-leads-using-linkedinHow to-generate-leads-using-linkedin
How to-generate-leads-using-linkedin
Bertrand Lejeune
 
Finding A Job Or Internship Using Social Media
Finding A Job Or Internship Using Social MediaFinding A Job Or Internship Using Social Media
Finding A Job Or Internship Using Social Media
Brayman Construction
 
Benefits Communiucation Using Social Media
Benefits Communiucation Using Social MediaBenefits Communiucation Using Social Media
Benefits Communiucation Using Social Media
Brayman Construction
 

What's hot (18)

Linked in
Linked inLinked in
Linked in
 
Linked In for Penn Mutual
Linked In for Penn MutualLinked In for Penn Mutual
Linked In for Penn Mutual
 
Google me
Google meGoogle me
Google me
 
Linkedin presentation
Linkedin presentationLinkedin presentation
Linkedin presentation
 
Cim Social Media Kendal Jan 11
Cim Social Media Kendal Jan 11Cim Social Media Kendal Jan 11
Cim Social Media Kendal Jan 11
 
Social Media for Manufacturers
Social Media for ManufacturersSocial Media for Manufacturers
Social Media for Manufacturers
 
12 easy steps to becoming a Lead Legend!
12 easy steps to becoming a Lead Legend!12 easy steps to becoming a Lead Legend!
12 easy steps to becoming a Lead Legend!
 
How law Firms can utilize Social Media
How law Firms can utilize Social MediaHow law Firms can utilize Social Media
How law Firms can utilize Social Media
 
Social Networking and the Job Search
Social Networking and the Job SearchSocial Networking and the Job Search
Social Networking and the Job Search
 
How to-generate-leads-using-linkedin
How to-generate-leads-using-linkedinHow to-generate-leads-using-linkedin
How to-generate-leads-using-linkedin
 
Branding and Social Media
Branding and Social MediaBranding and Social Media
Branding and Social Media
 
JustCo Lunch & Learn Session with LinkedIn: 7 Steps to improve your LinkedIn ...
JustCo Lunch & Learn Session with LinkedIn: 7 Steps to improve your LinkedIn ...JustCo Lunch & Learn Session with LinkedIn: 7 Steps to improve your LinkedIn ...
JustCo Lunch & Learn Session with LinkedIn: 7 Steps to improve your LinkedIn ...
 
Kurtosys LinkedIn Training for Advisors
Kurtosys LinkedIn Training for AdvisorsKurtosys LinkedIn Training for Advisors
Kurtosys LinkedIn Training for Advisors
 
LinkedIn: Networking, generating leads and building authority
LinkedIn: Networking, generating leads and building authorityLinkedIn: Networking, generating leads and building authority
LinkedIn: Networking, generating leads and building authority
 
Finding A Job Or Internship Using Social Media
Finding A Job Or Internship Using Social MediaFinding A Job Or Internship Using Social Media
Finding A Job Or Internship Using Social Media
 
Benefits Communiucation Using Social Media
Benefits Communiucation Using Social MediaBenefits Communiucation Using Social Media
Benefits Communiucation Using Social Media
 
Linkedin to Build a Referral Business
Linkedin to Build a Referral BusinessLinkedin to Build a Referral Business
Linkedin to Build a Referral Business
 
21st Century Networking via Linkedin
21st Century Networking via Linkedin21st Century Networking via Linkedin
21st Century Networking via Linkedin
 

Viewers also liked

Implications of educational technology changes for adult learners
Implications of educational technology changes for adult learnersImplications of educational technology changes for adult learners
Implications of educational technology changes for adult learners
English TVTC
 
ORIC Digital literacy and curriculum design
ORIC Digital literacy and curriculum designORIC Digital literacy and curriculum design
ORIC Digital literacy and curriculum design
oricproject
 
Digital literacy in practise
Digital literacy in practiseDigital literacy in practise
Digital literacy in practise
SpecialK13
 
Technology changes
Technology changesTechnology changes
Technology changes
geepatty
 
Digital Literacy
Digital LiteracyDigital Literacy
Digital Literacy
kellihoward
 

Viewers also liked (19)

Implications of educational technology changes for adult learners
Implications of educational technology changes for adult learnersImplications of educational technology changes for adult learners
Implications of educational technology changes for adult learners
 
Deeper understanding as the key to deepening digital literacy
Deeper understanding as the key to deepening digital literacyDeeper understanding as the key to deepening digital literacy
Deeper understanding as the key to deepening digital literacy
 
ORIC Digital literacy and curriculum design
ORIC Digital literacy and curriculum designORIC Digital literacy and curriculum design
ORIC Digital literacy and curriculum design
 
Digital literacy for teachers and students
Digital literacy for teachers and studentsDigital literacy for teachers and students
Digital literacy for teachers and students
 
How has technology made changes in different sectors?
How has technology made changes in different sectors?How has technology made changes in different sectors?
How has technology made changes in different sectors?
 
Breaking the Mould - or how technology changes the way we learn
Breaking the Mould - or how technology changes the way we learnBreaking the Mould - or how technology changes the way we learn
Breaking the Mould - or how technology changes the way we learn
 
Digital literacy in practise
Digital literacy in practiseDigital literacy in practise
Digital literacy in practise
 
Teaching Digital Literacy
Teaching Digital LiteracyTeaching Digital Literacy
Teaching Digital Literacy
 
Technology changes
Technology changesTechnology changes
Technology changes
 
Digital Literacy - Basic Technical Concepts (Session 1)
Digital Literacy - Basic Technical Concepts (Session 1)Digital Literacy - Basic Technical Concepts (Session 1)
Digital Literacy - Basic Technical Concepts (Session 1)
 
Young Entrepreneur Challenge: 21st Century Skills Map
Young Entrepreneur Challenge: 21st Century Skills MapYoung Entrepreneur Challenge: 21st Century Skills Map
Young Entrepreneur Challenge: 21st Century Skills Map
 
Meeting #1
Meeting #1Meeting #1
Meeting #1
 
Digital Literacy Skills
Digital Literacy SkillsDigital Literacy Skills
Digital Literacy Skills
 
Digital Literacy | Why it matters
Digital Literacy | Why it mattersDigital Literacy | Why it matters
Digital Literacy | Why it matters
 
Introduction to digital literacy for adult education esol
Introduction to digital literacy for adult education esolIntroduction to digital literacy for adult education esol
Introduction to digital literacy for adult education esol
 
Digital Literacy
Digital LiteracyDigital Literacy
Digital Literacy
 
Top 10 Benefits of Digital Literacy
Top 10 Benefits of Digital LiteracyTop 10 Benefits of Digital Literacy
Top 10 Benefits of Digital Literacy
 
Learning2learn
Learning2learnLearning2learn
Learning2learn
 
Digital literacy - a new language for disruption
Digital literacy - a new language for disruptionDigital literacy - a new language for disruption
Digital literacy - a new language for disruption
 

Similar to Digital Persona Management For IBMers

Embracing Social Media - Presentation and Notes
Embracing Social Media - Presentation and NotesEmbracing Social Media - Presentation and Notes
Embracing Social Media - Presentation and Notes
Deirdre Reid
 
Social media
Social mediaSocial media
Social media
calee1
 

Similar to Digital Persona Management For IBMers (20)

Manage your identity - building your reputation & brand while keeping your pr...
Manage your identity - building your reputation & brand while keeping your pr...Manage your identity - building your reputation & brand while keeping your pr...
Manage your identity - building your reputation & brand while keeping your pr...
 
Socialmediaexaminer.Com Facebook 101 Business Guide | Social Media Exam...
Socialmediaexaminer.Com  Facebook 101  Business  Guide |  Social  Media  Exam...Socialmediaexaminer.Com  Facebook 101  Business  Guide |  Social  Media  Exam...
Socialmediaexaminer.Com Facebook 101 Business Guide | Social Media Exam...
 
Sns2
Sns2Sns2
Sns2
 
9criticalsteps protectingyourselfonfacebook
9criticalsteps protectingyourselfonfacebook9criticalsteps protectingyourselfonfacebook
9criticalsteps protectingyourselfonfacebook
 
Facebook Privacy and Security Guide
Facebook Privacy and Security GuideFacebook Privacy and Security Guide
Facebook Privacy and Security Guide
 
Embracing Social Media - Presentation and Notes
Embracing Social Media - Presentation and NotesEmbracing Social Media - Presentation and Notes
Embracing Social Media - Presentation and Notes
 
Social media
Social mediaSocial media
Social media
 
6 ways to stay safe on Facebook: Managing your privacy to thwart identity theft
6 ways to stay safe on Facebook: Managing your privacy to thwart identity theft6 ways to stay safe on Facebook: Managing your privacy to thwart identity theft
6 ways to stay safe on Facebook: Managing your privacy to thwart identity theft
 
Social media: Bacon and you
Social media: Bacon and youSocial media: Bacon and you
Social media: Bacon and you
 
H.essers linkedin usage guidelines
H.essers   linkedin usage guidelinesH.essers   linkedin usage guidelines
H.essers linkedin usage guidelines
 
Facebook: Career Webinar - The New Way to Network
Facebook: Career Webinar - The New Way to NetworkFacebook: Career Webinar - The New Way to Network
Facebook: Career Webinar - The New Way to Network
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awareness
 
LinkedIn Training for Employees: Building Relationships with Influencers and ...
LinkedIn Training for Employees: Building Relationships with Influencers and ...LinkedIn Training for Employees: Building Relationships with Influencers and ...
LinkedIn Training for Employees: Building Relationships with Influencers and ...
 
How To Be Facebook Friends With The Boss & Keep Your Job
How To Be Facebook Friends With The Boss & Keep Your JobHow To Be Facebook Friends With The Boss & Keep Your Job
How To Be Facebook Friends With The Boss & Keep Your Job
 
Guide to developing social media plan- Ishwar Jha
Guide to developing social media plan- Ishwar JhaGuide to developing social media plan- Ishwar Jha
Guide to developing social media plan- Ishwar Jha
 
Social Media Insight
Social Media InsightSocial Media Insight
Social Media Insight
 
Taming Facebook
Taming FacebookTaming Facebook
Taming Facebook
 
Networking Considerations for Soldiers and Families
Networking Considerations for Soldiers and FamiliesNetworking Considerations for Soldiers and Families
Networking Considerations for Soldiers and Families
 
Facebook 101 personal usage
Facebook 101 personal usageFacebook 101 personal usage
Facebook 101 personal usage
 
Facebook
FacebookFacebook
Facebook
 

Recently uploaded

Recently uploaded (20)

Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
Your enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jYour enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4j
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 

Digital Persona Management For IBMers

  • 1. Digital Persona Management for IBMers Joshua Scribner Social Software Advocate IBM SWG, BlueIQ [email_address] @joshscribner Version 2.3, Updated: 8 February 2012
  • 2.
  • 3.
  • 4. A Facebook dramatization… … I apologize in advance for the crude language. http://www.youtube.com/v/LrFdOz1Mj8Q This video gives you an idea of the Facebook dilemma:
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11. Social Network: Facebook
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34. Share Smart – Your Wall When you post to your wall, or cause a status message to appear on your wall, you will usually have the option to decide which Friend Lists can see it. You should always check to see who you are sharing with. This is an important control point in maintaining your privacy and control of your information. If you do not want your friends to share what you have posted, either explicitly inform them (or reconsider sharing it on the internet). On the next slide, we'll discuss setting default Friend Lists for these posts. Facebook: Objective 3 These are my recommendations for these settings. It is up to you to decide if the advice fits the way you want to use Facebook and if it complies with IBM’s Business Conduct Guidelines as they apply to you.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46. Lock it down - App private info access Look carefully at the Required items from an App. Click "See More" to examine exactly what content it wants to be able to see -- and share -- outside of your control. Here are the categories it may ask for: This refers to content I've made public, not information I've restricted. It's generally OK. This item is very worrisome; for example I do not want my birthday, religion, or politics shared. Consider removing Apps that require this; remove this item if it is optional. An App should not require this information, and you should not be required to share it. Consider removing Apps that require this; remove this item if it is optional. Facebook: Objective 3 These are my recommendations for these settings. It is up to you to decide if the advice fits the way you want to use Facebook and if it complies with IBM’s Business Conduct Guidelines as they apply to you.
  • 47. Lock it down - App private info access (continued - part 2) Categories an App may ask for: Your photos and videos may say a lot about you, and should not be accessed by an App as it may not adhere to the visibility restrictions you've set for the content. You don't need an App that reports on your whereabouts and Online Presence. It's not good for IBM, nor for your personal security. Many Apps want to see information about the people in your network. While unappealing that Apps do this, members of your network can restrict the shared information by editing "How people bring their info into apps you use" in the "Apps and Websites" are of their Privacy Settings. It is up to you if you want to expose your network to this potential information gathering activity. Facebook: Objective 3 These are my recommendations for these settings. It is up to you to decide if the advice fits the way you want to use Facebook and if it complies with IBM’s Business Conduct Guidelines as they apply to you.
  • 48. Lock it down - App private info access (continued - part 3) Advice on making App privacy decisions Tip: If an App on your list requires a lot of personal information, remove it and re-add it. Beyond your Basic Information, an app must request to access each additional category of content. This will remove any data for the App, but may be worth it if the private information it accesses has quietly been increased. Advice: Most Apps will require a few of those information items that you deem too sensitive. You can remove them all, if you like. Alternatively, you should consider the risk of that information getting out with the trustworthiness of the App's creator. You should also consider whether you think a well intentioned App function will accidentally share your information (i.e. " Find your birthday buddies!" or "See who else visits this coffee shop") Limitation: Friend Lists do not apply to an Apps' level of access to your personal information. While you can restrict who can see the posts an App makes, you can't granularly restrict an App's access to data within a category. Facebook: Objective 3 These are my recommendations for these settings. It is up to you to decide if the advice fits the way you want to use Facebook and if it complies with IBM’s Business Conduct Guidelines as they apply to you.
  • 49.
  • 50.
  • 51.
  • 52. Social Network: LinkedIn
  • 53.
  • 54.
  • 55.
  • 56.
  • 57.
  • 58.
  • 59.
  • 60.
  • 61.
  • 62.
  • 63.
  • 64.
  • 65.
  • 66.
  • 67.
  • 68.
  • 69.
  • 70.
  • 71.
  • 72.
  • 73.
  • 74. Social Network: Google+
  • 75.
  • 76.
  • 78.
  • 79.
  • 80.
  • 81.
  • 82.
  • 83.
  • 84.
  • 85.

Editor's Notes

  1. Presenter: Slide 4 contains a link to a video with some inappropriate, albeit humorous, language. Consider whether it should be included in your presentation. 10 Jan 2012 -- entirely reworked the Facebook section, added a new Summary section, content for LinkedIn, Google+ and Twitter are coming shortly.
  2. Your “Networks” are groups of people whom you may not have friended, but are associated with you because of where you live, whom you work for, or the schools you went to (for example).