Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Identity Management in Social Media


Published on

Published in: Social Media, Technology, Business
  • Be the first to comment

Identity Management in Social Media

  1. 1. Identity Management in Social Media Presented by: Laura Visconti October 24, 2013
  2. 2. Who am I?
  3. 3. What am I?
  4. 4. How could I have been?
  5. 5. Tribes, clans, and lineage “Family Written in Kids Letters” - Image courtesy of Stuart Miles at Locations Clothing/costumes Locations “Eilean Donan Castle, Highland Scotland” - Image courtesy of Vichaya Kiatying Angsulee at
  6. 6. Religious Affiliations Uniforms Governments – monuments & art Languages Image courtesy: grietgriet at
  7. 7. As children Social activist groups As parents Arts & Through ethnicity entertainment Sports teams Religion Political parties World History for Us All: Theme Five
  8. 8. “Awareness of our identity is important because it helps us make our way through the world. Knowing who we are helps us know what we need to do, what is expected of us, and how others will react to us. It is intimately associated with our sense of well-being and self-respect.” World History for Us All is a project of San Diego State University in cooperation with the National Center for History in the Schools at UCLA
  9. 9. The information age is bombarding us with facts, figures, trivia, and more at an unprecedented rate. (King, 2011)
  10. 10. With the advent of the internet and today’s social media it is important to create an online identity. Yet, how do we protect it? Image courtesy of Stuart Miles at
  11. 11. “…a social identity that an internet user establishes in online communities and websites.” Wikipedia, 2013
  12. 12. Personal identity includes: If it gets in the wrong hands it can lead to: Who will search for your identity online: Online Identity and Reputation, 2008 and Outspoken Media Inc., 2013 An invisible online identity could be interpreted as:
  13. 13. For career advancement it is important not to be invisible. This will help you market yourself in your job search. (Henry, 2012) Remember, you are not the only one that will post information about yourself. Others will also post information about you. Managing all this information is key. Image courtesy of Sattva, 2012
  14. 14. “This is why I always maintain a level of professionalism on all of my social profiles. I learned a long time ago that the line between personal and professional doesn’t exist online.” ~Katie C. Kelley, 2013 Image: Slideshowmom, 2005
  15. 15. One aspect of online identity management is search engine optimization. The goal in this case is to increase the number of sites that reference a person’s name and get the highest ranking in as many sites as possible. Image courtesy of Image courtesy of Stuart Miles at, The other area online identity management tackles is the way in which people try to control the impressions others form of them. Take steps to ensure the online information available about you is favourable. Text: Wikipedia, 2013 Image courtesy of singhajay at, 2008
  16. 16. “Managing your online reputation isn’t shameless promotion, it’s a means of defense and best practice.” - Outspoken Media, 2013 Remember: Nothing is temporary. What happens online, stays online. (Kiisel, 2012) If you don’t control your online brand (business or personal) someone else will. (Outspoken Media, 2013) Image courtesy of Stuart Miles at
  17. 17. 91% of hiring managers screen job applicants’ social media profiles 54% of social media users have been the target of an identity threat 42% of companies have reconsidered job candidates based on the content of their social media profiles
  18. 18. Do’s Establish and maintain privacy settings on your social media personal profile accounts Search the web for your name and a better understanding of your current reputation status Clear your browser history and cookies regularly Remain professional in all your online communication Consider using social media monitoring tools and web suppression services to keep your name mentions out of unwanted websites Don’ts Do not post personal information online including •Address •Date of birth •Email address Do not accept friend requests from people you don’t know Do not give out your location as this will increase the potential of being a victim of fraud
  19. 19. Who are you? Gutteridge, 2006
  20. 20.              Slide #4, #5, #6 - Olson, Eric T., "Personal Identity", The Stanford Encyclopedia of Philosophy (Winter 2010 Edition), Edward N. Zalta (ed.), Retrieved from: Slides #7, #8, #9 – San Diego State University in cooperation with the National Center for History in the Schools, at UCLA; Key Theme 5: Expressing Identity. Retrieved from: Slide #10 – San Diego State University in cooperation with the National Center for History in the Schools, at UCLA; Key Theme 5: Expressing Identity. Retrieved from: Slide #13 – Brett King, 18/01/11; Too Much Content: A World of Exponential Information Growth. Retrieved from: Slide #15 – Wikipedia, October 14, 2013; Online Identity. Retrieved from: Slide #16 – (Online Identity and Reputation, 2008)Personal Identity vs. Professional Reputation. Retrieved from: Slide #17 - Alan Henry, 04/02/12; Should I Keep My Personal and Professional Identities Completely Separate Online? Retrieved from: Slide #18 - Katie C. Kelley, 24/04/13; Tips for Blending your Personal and Professional Online Identities. Retrieved from: Slide #19 - Wikipedia, 2013, Online Identity Management; Retrieved from: Slide #20 – Outspoken Media, The Online Reputation Management Guide. Retrieved from: Slide #20 – Ty Kiisel, 20/11/2012; 4 Tips to Manage Your Online Reputation. Retrieved from: Slide #21, #22 - CSID, Sept. 2013; Managing Online Reputation in a Digital World. Retrieved from: Slide #23 – Aaron Gutteridge, June 17, 2006; The Who, Live at Leeds. Retrieved from:
  21. 21.    Slide #2 - AcrylicArtist, “Conception.jpg” Image URI:; JPEG URI: Retrieved from: Slide #4, #5, #6 – Ajax Serix, 2005; “epothinker04.jpg”. Image URI: JPEG URI: Retrieved from:    Slide #7 - Stuart Miles, January 2012; “Family Written in Kids Letters”. Retrieved from: Slide #7 – Vichaya Kiatying Angsulee, June 2013; Eilean Donan Castle, Highland Scotland.  Slide #7 – Mi’kmaq Mi'kmaq Couple in Full Costume with Snow shoes. Retrieved from:  Slide #8 – (first three images) Microsoft Clipart; Retrieved from:     Slide #8 – Grietgriet, July 2010; griet87.jpg. Retrieved from: Slide #11 – Virginia Mol, April 2007; 1mes9. Retrieved from: Slide #14 – By Stuart Miles, Oct. 2013; Computer and Key Showing Internet Protection. Retrieved from:
  22. 22.      Slide #17 – By: Sattva, April 2012; The Age of Crystal. Retrieved from: Slide #19 – By: Stuart Miles; Pyramid Image: Online Marketing Pyramid Having Blogs Websites, Social Media And. Retrieved from: Slide #19 – By: Singhajay, 2008; Retrieved from: d#/?q=business%20card&sort=pop&photo_lib=morgueFile Slide #20 – Stuart Miles; Student Thinking. Retrieved from: Slide #23 – Aaron Gutteridge, June 17, 2006; The Who, Live at Leeds. Retrieved from: