SlideShare a Scribd company logo
Facelessness
Katharina Urlbauer
Assignment 4- Social Media in Marketing
Agenda
definition 1&2
elements & uses
prevention
pesonal opinion

sources
Defintion 1
facelessness ≈noun 

faceless≈ adjective

3 different meanings
having no face
remote and impersonal
anonymous

anonymous(≈adj.) made or done by someone
whose name is not know or not made public
Definiton 2
In social media use anonymity basically means that
users and companies can be anonymous. On one
hand many ‚users‘ don‘t have pictures or a real
name added to their account on the other hand
many other ‚users‘ do.

But you can not be 100 % sure that the name given
or the picture added to the profile is a real one or
not. (e.g. invented or belonging to someone else.)
Special elements & uses of
facelessness
insult/ offence
cyber –mobbing
cyber – bullying
stalking
disparagement

fraud

BUT: Not all people who want to stay anonymous are bad
and as we all know, telling ‚everything‘ online is not the
best thing you should do and fake accounts can also be an
advantage if you don‘t want everyone to find your profiles
and information.
Prevention
vertification
email
ID
police clearance certificate (tutoria)
bank account (e.g. Paypal)
company information/details (e.g. foursquare)
Personal opinion
In my opinion this is a real threat but can also be an advantage for the
users who want to stay anonymus. But even if you use an fake account
there is almost no chance to stay anonymous because with nowadys
technology you can still find out a lot (e.g. from where you logged, which
device etc. (IP address)).
You can never be 100 % sure if the profile/ account is real or fake.
Now I have 2 short examples:
-

You are chatting with someone and the person ‚behind the other
account‘ is not your age but 40 sth. and is not the person he/she
poses to be.

-

You are buying sth. via the internet and you don‘t get your product at
all or it is damaged and the person who sold it can‘t be caught
because he/she used e.g. a fake account.
Sources
Cambridge Advanced Learner‘s Dictionry (3rd
edition)

http://www.oxforddictionaries.com/definition/engli
sh/faceless?q=facelessness#faceless__5
http://schulesocialmedia.com/tag/anonymitat/

http://sicherheitskultur.at/privacy_soc_networking
.htm

More Related Content

Viewers also liked

Rural Minnesota Journal: Reshaping Pelican Rapids
Rural Minnesota Journal: Reshaping Pelican RapidsRural Minnesota Journal: Reshaping Pelican Rapids
Rural Minnesota Journal: Reshaping Pelican Rapids
Center for Rural Policy & Development
 
Awodele toxicidad moringa
Awodele toxicidad moringaAwodele toxicidad moringa
Awodele toxicidad moringaFausto Dutan
 
Spy Programs
Spy ProgramsSpy Programs
Spy ProgramsHHSome
 
Dumb ways to ruin a meeting
Dumb ways to ruin a meetingDumb ways to ruin a meeting
Dumb ways to ruin a meeting
Segla Segla
 
Threaths and risks
Threaths and risksThreaths and risks
Threaths and risksHHSome
 
การให้คำปรึกษาวิทยานิพนธ์ โดย ผศ. ดร. อดิศร เนาวนนท์ คณบดีบัณฑิตวิทยาลัย
การให้คำปรึกษาวิทยานิพนธ์  โดย ผศ. ดร. อดิศร  เนาวนนท์  คณบดีบัณฑิตวิทยาลัยการให้คำปรึกษาวิทยานิพนธ์  โดย ผศ. ดร. อดิศร  เนาวนนท์  คณบดีบัณฑิตวิทยาลัย
การให้คำปรึกษาวิทยานิพนธ์ โดย ผศ. ดร. อดิศร เนาวนนท์ คณบดีบัณฑิตวิทยาลัย
Sorapong Premwiriyanon
 
Mdp 511 2012 organizations in development - session 1
Mdp 511 2012 organizations in development - session 1Mdp 511 2012 organizations in development - session 1
Mdp 511 2012 organizations in development - session 1
ANDREA_BEAR
 
ยุทธวิธีสู่ความสำเร็จในการจัดการเรียนการสอนระดับบัณฑิตศึกษา โดย ศ.ดร.ไพฑูรย์ ...
ยุทธวิธีสู่ความสำเร็จในการจัดการเรียนการสอนระดับบัณฑิตศึกษา โดย ศ.ดร.ไพฑูรย์ ...ยุทธวิธีสู่ความสำเร็จในการจัดการเรียนการสอนระดับบัณฑิตศึกษา โดย ศ.ดร.ไพฑูรย์ ...
ยุทธวิธีสู่ความสำเร็จในการจัดการเรียนการสอนระดับบัณฑิตศึกษา โดย ศ.ดร.ไพฑูรย์ ...
Sorapong Premwiriyanon
 
Security wp 101
Security wp 101Security wp 101
Security wp 101
Farnedi ICT srl
 
American Karma
American KarmaAmerican Karma
American Karma
Bob Silverstein
 
แนวปฏิบัติที่ดี การประกันคุณภาพบัณฑิต
แนวปฏิบัติที่ดี การประกันคุณภาพบัณฑิตแนวปฏิบัติที่ดี การประกันคุณภาพบัณฑิต
แนวปฏิบัติที่ดี การประกันคุณภาพบัณฑิตSorapong Premwiriyanon
 
Como insertar videos e hipervinculos en una pagina web
Como insertar videos e hipervinculos en una pagina webComo insertar videos e hipervinculos en una pagina web
Como insertar videos e hipervinculos en una pagina webArturo Arcela
 
trabajo 2 Datos
trabajo 2 Datostrabajo 2 Datos
trabajo 2 Datoscesar82703
 

Viewers also liked (19)

Rural Minnesota Journal: Reshaping Pelican Rapids
Rural Minnesota Journal: Reshaping Pelican RapidsRural Minnesota Journal: Reshaping Pelican Rapids
Rural Minnesota Journal: Reshaping Pelican Rapids
 
Imc presentation
Imc presentationImc presentation
Imc presentation
 
Awodele toxicidad moringa
Awodele toxicidad moringaAwodele toxicidad moringa
Awodele toxicidad moringa
 
Fdlp presentation
Fdlp presentationFdlp presentation
Fdlp presentation
 
Spy Programs
Spy ProgramsSpy Programs
Spy Programs
 
Dumb ways to ruin a meeting
Dumb ways to ruin a meetingDumb ways to ruin a meeting
Dumb ways to ruin a meeting
 
Threaths and risks
Threaths and risksThreaths and risks
Threaths and risks
 
การให้คำปรึกษาวิทยานิพนธ์ โดย ผศ. ดร. อดิศร เนาวนนท์ คณบดีบัณฑิตวิทยาลัย
การให้คำปรึกษาวิทยานิพนธ์  โดย ผศ. ดร. อดิศร  เนาวนนท์  คณบดีบัณฑิตวิทยาลัยการให้คำปรึกษาวิทยานิพนธ์  โดย ผศ. ดร. อดิศร  เนาวนนท์  คณบดีบัณฑิตวิทยาลัย
การให้คำปรึกษาวิทยานิพนธ์ โดย ผศ. ดร. อดิศร เนาวนนท์ คณบดีบัณฑิตวิทยาลัย
 
Mdp 511 2012 organizations in development - session 1
Mdp 511 2012 organizations in development - session 1Mdp 511 2012 organizations in development - session 1
Mdp 511 2012 organizations in development - session 1
 
Sot 2008 revisi
Sot 2008 revisiSot 2008 revisi
Sot 2008 revisi
 
Facebook
FacebookFacebook
Facebook
 
ยุทธวิธีสู่ความสำเร็จในการจัดการเรียนการสอนระดับบัณฑิตศึกษา โดย ศ.ดร.ไพฑูรย์ ...
ยุทธวิธีสู่ความสำเร็จในการจัดการเรียนการสอนระดับบัณฑิตศึกษา โดย ศ.ดร.ไพฑูรย์ ...ยุทธวิธีสู่ความสำเร็จในการจัดการเรียนการสอนระดับบัณฑิตศึกษา โดย ศ.ดร.ไพฑูรย์ ...
ยุทธวิธีสู่ความสำเร็จในการจัดการเรียนการสอนระดับบัณฑิตศึกษา โดย ศ.ดร.ไพฑูรย์ ...
 
Security wp 101
Security wp 101Security wp 101
Security wp 101
 
Fungi
FungiFungi
Fungi
 
American Karma
American KarmaAmerican Karma
American Karma
 
แนวปฏิบัติที่ดี การประกันคุณภาพบัณฑิต
แนวปฏิบัติที่ดี การประกันคุณภาพบัณฑิตแนวปฏิบัติที่ดี การประกันคุณภาพบัณฑิต
แนวปฏิบัติที่ดี การประกันคุณภาพบัณฑิต
 
Invt ques
Invt quesInvt ques
Invt ques
 
Como insertar videos e hipervinculos en una pagina web
Como insertar videos e hipervinculos en una pagina webComo insertar videos e hipervinculos en una pagina web
Como insertar videos e hipervinculos en una pagina web
 
trabajo 2 Datos
trabajo 2 Datostrabajo 2 Datos
trabajo 2 Datos
 

Similar to Katharina Urlbauer- SMM A4 Facelessness

media safety .pptx
media safety .pptxmedia safety .pptx
media safety .pptx
GAmarioarei
 
advantagesanddisadvantagesofsocialmedia-151211192046.pdf
advantagesanddisadvantagesofsocialmedia-151211192046.pdfadvantagesanddisadvantagesofsocialmedia-151211192046.pdf
advantagesanddisadvantagesofsocialmedia-151211192046.pdf
RinkiSharma51
 
advantagesanddisadvantagesofsocialmedia-151211192046.pptx
advantagesanddisadvantagesofsocialmedia-151211192046.pptxadvantagesanddisadvantagesofsocialmedia-151211192046.pptx
advantagesanddisadvantagesofsocialmedia-151211192046.pptx
Himabindu905359
 
Advantages and disadvantages of social media
Advantages and disadvantages of social mediaAdvantages and disadvantages of social media
Advantages and disadvantages of social media
Alan Raj
 
Advantages and disadvantages of social media
Advantages and disadvantages of social mediaAdvantages and disadvantages of social media
Advantages and disadvantages of social media
Alan Raj
 
Student book key unit3
Student book key unit3Student book key unit3
Student book key unit3
jesusmlaz
 
Users guide
Users guideUsers guide
Users guide
Darren Thomas
 
Social Media Safety Presentation
Social Media Safety PresentationSocial Media Safety Presentation
Social Media Safety Presentation
LJ Henshell
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness Presentation
Jamie Proctor-Brassard
 
Digital Leaders e-safety presentation 2015
Digital Leaders e-safety presentation 2015Digital Leaders e-safety presentation 2015
Digital Leaders e-safety presentation 2015
Jamie Edmondson
 
risks associated with using social Media
 risks associated with using social Media  risks associated with using social Media
risks associated with using social Media
Oxford University - learning technologist
 
Information Technology and EthicsSocial Networking and Business.docx
Information Technology and EthicsSocial Networking and Business.docxInformation Technology and EthicsSocial Networking and Business.docx
Information Technology and EthicsSocial Networking and Business.docx
jaggernaoma
 
INTERNET SECUIRTY TIPS
INTERNET SECUIRTY TIPSINTERNET SECUIRTY TIPS
INTERNET SECUIRTY TIPS
Santosh Khadsare
 
Internet 2.0 Conference Reviews Ways To Spot Scam Offenses In The Digital Com...
Internet 2.0 Conference Reviews Ways To Spot Scam Offenses In The Digital Com...Internet 2.0 Conference Reviews Ways To Spot Scam Offenses In The Digital Com...
Internet 2.0 Conference Reviews Ways To Spot Scam Offenses In The Digital Com...
Internet 2Conf
 
Lecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxLecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptx
DominicCaling
 
6 Ways to Protect Yourself From Online Catfishing Scams.pdf
6 Ways to Protect  Yourself  From Online  Catfishing Scams.pdf6 Ways to Protect  Yourself  From Online  Catfishing Scams.pdf
6 Ways to Protect Yourself From Online Catfishing Scams.pdf
Sysvoot Antivirus
 
Social media Challenges and Advantage
Social media Challenges and AdvantageSocial media Challenges and Advantage
Social media Challenges and Advantage
Techno World 4 U
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
srishtig993
 
disscussion reply to the question asked from students minimum words .docx
disscussion reply to the question asked from students minimum words .docxdisscussion reply to the question asked from students minimum words .docx
disscussion reply to the question asked from students minimum words .docx
jameywaughj
 

Similar to Katharina Urlbauer- SMM A4 Facelessness (20)

media safety .pptx
media safety .pptxmedia safety .pptx
media safety .pptx
 
advantagesanddisadvantagesofsocialmedia-151211192046.pdf
advantagesanddisadvantagesofsocialmedia-151211192046.pdfadvantagesanddisadvantagesofsocialmedia-151211192046.pdf
advantagesanddisadvantagesofsocialmedia-151211192046.pdf
 
advantagesanddisadvantagesofsocialmedia-151211192046.pptx
advantagesanddisadvantagesofsocialmedia-151211192046.pptxadvantagesanddisadvantagesofsocialmedia-151211192046.pptx
advantagesanddisadvantagesofsocialmedia-151211192046.pptx
 
Advantages and disadvantages of social media
Advantages and disadvantages of social mediaAdvantages and disadvantages of social media
Advantages and disadvantages of social media
 
Advantages and disadvantages of social media
Advantages and disadvantages of social mediaAdvantages and disadvantages of social media
Advantages and disadvantages of social media
 
Student book key unit3
Student book key unit3Student book key unit3
Student book key unit3
 
Users guide
Users guideUsers guide
Users guide
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Social Media Safety Presentation
Social Media Safety PresentationSocial Media Safety Presentation
Social Media Safety Presentation
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness Presentation
 
Digital Leaders e-safety presentation 2015
Digital Leaders e-safety presentation 2015Digital Leaders e-safety presentation 2015
Digital Leaders e-safety presentation 2015
 
risks associated with using social Media
 risks associated with using social Media  risks associated with using social Media
risks associated with using social Media
 
Information Technology and EthicsSocial Networking and Business.docx
Information Technology and EthicsSocial Networking and Business.docxInformation Technology and EthicsSocial Networking and Business.docx
Information Technology and EthicsSocial Networking and Business.docx
 
INTERNET SECUIRTY TIPS
INTERNET SECUIRTY TIPSINTERNET SECUIRTY TIPS
INTERNET SECUIRTY TIPS
 
Internet 2.0 Conference Reviews Ways To Spot Scam Offenses In The Digital Com...
Internet 2.0 Conference Reviews Ways To Spot Scam Offenses In The Digital Com...Internet 2.0 Conference Reviews Ways To Spot Scam Offenses In The Digital Com...
Internet 2.0 Conference Reviews Ways To Spot Scam Offenses In The Digital Com...
 
Lecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxLecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptx
 
6 Ways to Protect Yourself From Online Catfishing Scams.pdf
6 Ways to Protect  Yourself  From Online  Catfishing Scams.pdf6 Ways to Protect  Yourself  From Online  Catfishing Scams.pdf
6 Ways to Protect Yourself From Online Catfishing Scams.pdf
 
Social media Challenges and Advantage
Social media Challenges and AdvantageSocial media Challenges and Advantage
Social media Challenges and Advantage
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
disscussion reply to the question asked from students minimum words .docx
disscussion reply to the question asked from students minimum words .docxdisscussion reply to the question asked from students minimum words .docx
disscussion reply to the question asked from students minimum words .docx
 

More from HHSome

Assignment4
Assignment4Assignment4
Assignment4
HHSome
 
Reputational risk on social media
Reputational risk on social mediaReputational risk on social media
Reputational risk on social mediaHHSome
 
Social media threats and risks: corporate espionage
Social media threats and risks: corporate espionageSocial media threats and risks: corporate espionage
Social media threats and risks: corporate espionage
HHSome
 
Assignment 4 Netiquette Kalle Andersson
Assignment 4 Netiquette Kalle AnderssonAssignment 4 Netiquette Kalle Andersson
Assignment 4 Netiquette Kalle Andersson
HHSome
 
Over posting
Over postingOver posting
Over postingHHSome
 
Censorship
CensorshipCensorship
CensorshipHHSome
 
Piracy and infringement
Piracy and infringement Piracy and infringement
Piracy and infringement HHSome
 
Threaths and risks
Threaths and risksThreaths and risks
Threaths and risksHHSome
 
Assigment 4 link to prezi
Assigment 4 link to preziAssigment 4 link to prezi
Assigment 4 link to preziHHSome
 
Lisa Koivunen, Risks and Threats in over promoting
Lisa Koivunen, Risks and Threats in over promotingLisa Koivunen, Risks and Threats in over promoting
Lisa Koivunen, Risks and Threats in over promoting
HHSome
 
Phishing
PhishingPhishing
Phishing
HHSome
 
Identity thefts
Identity theftsIdentity thefts
Identity thefts
HHSome
 
Personal information
Personal informationPersonal information
Personal informationHHSome
 
Risks and Threats in SoMe: Payments
Risks and Threats in SoMe: PaymentsRisks and Threats in SoMe: Payments
Risks and Threats in SoMe: Payments
HHSome
 
Malware
MalwareMalware
Malware
HHSome
 
Assignment4 yannick kramm
Assignment4 yannick krammAssignment4 yannick kramm
Assignment4 yannick kramm
HHSome
 

More from HHSome (16)

Assignment4
Assignment4Assignment4
Assignment4
 
Reputational risk on social media
Reputational risk on social mediaReputational risk on social media
Reputational risk on social media
 
Social media threats and risks: corporate espionage
Social media threats and risks: corporate espionageSocial media threats and risks: corporate espionage
Social media threats and risks: corporate espionage
 
Assignment 4 Netiquette Kalle Andersson
Assignment 4 Netiquette Kalle AnderssonAssignment 4 Netiquette Kalle Andersson
Assignment 4 Netiquette Kalle Andersson
 
Over posting
Over postingOver posting
Over posting
 
Censorship
CensorshipCensorship
Censorship
 
Piracy and infringement
Piracy and infringement Piracy and infringement
Piracy and infringement
 
Threaths and risks
Threaths and risksThreaths and risks
Threaths and risks
 
Assigment 4 link to prezi
Assigment 4 link to preziAssigment 4 link to prezi
Assigment 4 link to prezi
 
Lisa Koivunen, Risks and Threats in over promoting
Lisa Koivunen, Risks and Threats in over promotingLisa Koivunen, Risks and Threats in over promoting
Lisa Koivunen, Risks and Threats in over promoting
 
Phishing
PhishingPhishing
Phishing
 
Identity thefts
Identity theftsIdentity thefts
Identity thefts
 
Personal information
Personal informationPersonal information
Personal information
 
Risks and Threats in SoMe: Payments
Risks and Threats in SoMe: PaymentsRisks and Threats in SoMe: Payments
Risks and Threats in SoMe: Payments
 
Malware
MalwareMalware
Malware
 
Assignment4 yannick kramm
Assignment4 yannick krammAssignment4 yannick kramm
Assignment4 yannick kramm
 

Recently uploaded

Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 

Recently uploaded (20)

Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 

Katharina Urlbauer- SMM A4 Facelessness

  • 2. Agenda definition 1&2 elements & uses prevention pesonal opinion sources
  • 3. Defintion 1 facelessness ≈noun  faceless≈ adjective 3 different meanings having no face remote and impersonal anonymous anonymous(≈adj.) made or done by someone whose name is not know or not made public
  • 4. Definiton 2 In social media use anonymity basically means that users and companies can be anonymous. On one hand many ‚users‘ don‘t have pictures or a real name added to their account on the other hand many other ‚users‘ do. But you can not be 100 % sure that the name given or the picture added to the profile is a real one or not. (e.g. invented or belonging to someone else.)
  • 5. Special elements & uses of facelessness insult/ offence cyber –mobbing cyber – bullying stalking disparagement fraud BUT: Not all people who want to stay anonymous are bad and as we all know, telling ‚everything‘ online is not the best thing you should do and fake accounts can also be an advantage if you don‘t want everyone to find your profiles and information.
  • 6. Prevention vertification email ID police clearance certificate (tutoria) bank account (e.g. Paypal) company information/details (e.g. foursquare)
  • 7. Personal opinion In my opinion this is a real threat but can also be an advantage for the users who want to stay anonymus. But even if you use an fake account there is almost no chance to stay anonymous because with nowadys technology you can still find out a lot (e.g. from where you logged, which device etc. (IP address)). You can never be 100 % sure if the profile/ account is real or fake. Now I have 2 short examples: - You are chatting with someone and the person ‚behind the other account‘ is not your age but 40 sth. and is not the person he/she poses to be. - You are buying sth. via the internet and you don‘t get your product at all or it is damaged and the person who sold it can‘t be caught because he/she used e.g. a fake account.
  • 8. Sources Cambridge Advanced Learner‘s Dictionry (3rd edition) http://www.oxforddictionaries.com/definition/engli sh/faceless?q=facelessness#faceless__5 http://schulesocialmedia.com/tag/anonymitat/ http://sicherheitskultur.at/privacy_soc_networking .htm