SlideShare a Scribd company logo
Digital Literacies: An
Introduction
By Tom Rowledge and Tom Davidson,
Digichamps and Web Science Students
Digital
Literacies
Info
Management
Creating
Materials
Effective
Communication
Identity
Digital Literacies are
the way people use
digital technology, to
achieve any
objective.
Can be broken down
into 4 parts as shown.
 Many people have perceptions of how they use
technology, or how “tech-savvy” they might be. We are
interested to hear your perceptions, and why you might
think that way.
 So please can you navigate to: http://bit.ly/20CTctP
and complete the survey.
 At the end you will be given a grade reflecting various
aspects of your own digital literacy
Digital Health-Check
Online Identity
Arguably the most important part of Digital
Literacies, so here we’re going to do something
a bit different.
We’re going to show you how information might
be gathered about you online.
Video!
Nothing to do with me…
It is easy to think that this doesn’t matter to you,
for a number of reasons:
 Since all privacy settings are set to “Only friends”
or equivalent. But, many don’t know that every
time Facebook updates its terms and conditions
(even just changing one word), and you accept,
they may change back to public
 Many people believe that Facebook and others
don’t know that much about them…
Find Out What They Know About You
Facebook Google (Only really works if you use lots of
Google services)
1. Log onto Facebook on a computer
2. Go to Facebook Settings.
3. Click at the bottom of the first page;
“Download a Copy”
4. Wait for the email to arrive
You can use a combination of Websites to
explore Google’s data.
1. aboutme.google.com – to see Google+
information, or if you don’t use this, other
information you have given Google
2. www.google.com/settings/dashboard - to
see everything about your Google account,
including “Location History” which tracks
your phone!
3. www.google.com/settings/ads - to see what
information Google thinks it knows about
you, from your browsing habits – fun to see
what they have guessed at
Google Maps History Instructions
1. Visit www.google.com/settings/dashboard
2. Scroll down to “Location History”
3. Then press “View Location History”
4. Now you can navigate along the timeline
Apple iPhone Location Tracking
1. Go To Settings
2. Privacy
3. Location Services
4. Scroll down to the Bottom where you should see “System Services”
5. Then Press Frequent Locations
6. You have a history now come up…you can click on them to see visits, a map, and
the time spent at these locations!
This data is not sent to Apple however, we’re merely showing you just so you can see
quite how much data exists on you.
https://youtu.be/hZiuUg3I74M
Online Identity
It should therefore be very clear that it is best to be
careful about what you post online for:
 Security – there is a wealth of information that can
fall into the wrong hands.
 Image – employers are now more and more (we’re
sure you’ve heard this as many times as us) checking
up on prospects on Facebook. This is most important
us, as we are both the group who needs jobs, and
who are also most likely to be photographed on the
floor of Jesters drenched in last nights Jesticle…
What Lack of an Online Identity Is Doing
 https://www.youtube.com/watch?v=A2bniFJigI0
Activity
Please fill in these surveys depending on
what personal data you were able to access:
• Facebook: https://www.surveyface.com/l/facebook-collection
• Google Search History: https://www.surveyface.com/l/google-
collection
• Apple Location History: https://www.surveyface.com/l/apple-
location-collection
• Google Maps Location: https://www.surveyface.com/l/google-
location-collection
Lecture and Follow Up
 Lecture will include:
 Data Analysis on what you’ve provided today
 How to generate a positive online identity
 Information on resources to improve your skills and employability
Further Reading:
 The internet Society Digital Literacy Tutorials:
https://www.internetsociety.org/tutorials/digital-footprint-matters/module-1-
digital-footprint/
Complete our Survey
We also ask you to please
complete our survey:
Link:
https://www.surveyface.
com/l/session-evaluation
Thanks again.

More Related Content

What's hot

Social media 101 Class
Social media 101 ClassSocial media 101 Class
Social media 101 ClassDave Shockley
 
Blogging tweeting - Getting started with blogger and twitter
Blogging tweeting - Getting started with blogger and twitterBlogging tweeting - Getting started with blogger and twitter
Blogging tweeting - Getting started with blogger and twitter
robin fay
 
How to break the internet
How to break the internetHow to break the internet
How to break the internet
Paul Johnston
 
Accounts
AccountsAccounts
Accountsmhaque
 
My Accounts For Computer Class
My Accounts For Computer ClassMy Accounts For Computer Class
My Accounts For Computer Classmhaque
 
A HillyBilly's Guide to Staying Anonymous Online - SecureWV
A HillyBilly's Guide to Staying Anonymous Online - SecureWVA HillyBilly's Guide to Staying Anonymous Online - SecureWV
A HillyBilly's Guide to Staying Anonymous Online - SecureWV
Adam Compton
 
What if Petraeus Was a Hacker?
What if Petraeus Was a Hacker?What if Petraeus Was a Hacker?
What if Petraeus Was a Hacker?
Phil Cryer
 
The Internet And Our Children
The Internet And Our ChildrenThe Internet And Our Children
The Internet And Our Children
dlmarion
 
Parent workshop - Social Networks
Parent workshop - Social NetworksParent workshop - Social Networks
Parent workshop - Social Networks
Clint Hamada
 
Ten ways for booksellers to leverage social media
Ten ways for booksellers to leverage social mediaTen ways for booksellers to leverage social media
Ten ways for booksellers to leverage social media
Clayton Wehner
 
The Social Media Phenomenon: How to leverage it to best effect
The Social Media Phenomenon: How to leverage it to best effectThe Social Media Phenomenon: How to leverage it to best effect
The Social Media Phenomenon: How to leverage it to best effect
Clayton Wehner
 
Jrw Wk2 Blogs
Jrw Wk2  BlogsJrw Wk2  Blogs
Jrw Wk2 Blogs
Jerry Whaley
 
Judging Websites
Judging WebsitesJudging Websites
Judging Websites
guest96755
 
Introduction to Email Marketing by Alexander Zagoumenov
Introduction to Email Marketing by Alexander ZagoumenovIntroduction to Email Marketing by Alexander Zagoumenov
Introduction to Email Marketing by Alexander Zagoumenov
Alex Zagoumenov
 
Tricks of the Trade: Social Media Management
Tricks of the Trade:  Social Media ManagementTricks of the Trade:  Social Media Management
Tricks of the Trade: Social Media Management
Joseph Stabb, ABD
 
Avram ODonovan Blogtalk2008
Avram ODonovan Blogtalk2008Avram ODonovan Blogtalk2008
Avram ODonovan Blogtalk2008coniecto
 
How to use blogging for an allergist's practice
How to use blogging for an allergist's practiceHow to use blogging for an allergist's practice
How to use blogging for an allergist's practice
Nathaniel Hare
 
Engaging with Readers in the Web 2.0 era – social media, mobile devices & eBooks
Engaging with Readers in the Web 2.0 era – social media, mobile devices & eBooksEngaging with Readers in the Web 2.0 era – social media, mobile devices & eBooks
Engaging with Readers in the Web 2.0 era – social media, mobile devices & eBooks
Clayton Wehner
 

What's hot (19)

Social media 101 Class
Social media 101 ClassSocial media 101 Class
Social media 101 Class
 
Blogging tweeting - Getting started with blogger and twitter
Blogging tweeting - Getting started with blogger and twitterBlogging tweeting - Getting started with blogger and twitter
Blogging tweeting - Getting started with blogger and twitter
 
How to break the internet
How to break the internetHow to break the internet
How to break the internet
 
Accounts
AccountsAccounts
Accounts
 
My Accounts For Computer Class
My Accounts For Computer ClassMy Accounts For Computer Class
My Accounts For Computer Class
 
A HillyBilly's Guide to Staying Anonymous Online - SecureWV
A HillyBilly's Guide to Staying Anonymous Online - SecureWVA HillyBilly's Guide to Staying Anonymous Online - SecureWV
A HillyBilly's Guide to Staying Anonymous Online - SecureWV
 
What if Petraeus Was a Hacker?
What if Petraeus Was a Hacker?What if Petraeus Was a Hacker?
What if Petraeus Was a Hacker?
 
The Internet And Our Children
The Internet And Our ChildrenThe Internet And Our Children
The Internet And Our Children
 
Parent workshop - Social Networks
Parent workshop - Social NetworksParent workshop - Social Networks
Parent workshop - Social Networks
 
Ten ways for booksellers to leverage social media
Ten ways for booksellers to leverage social mediaTen ways for booksellers to leverage social media
Ten ways for booksellers to leverage social media
 
The Social Media Phenomenon: How to leverage it to best effect
The Social Media Phenomenon: How to leverage it to best effectThe Social Media Phenomenon: How to leverage it to best effect
The Social Media Phenomenon: How to leverage it to best effect
 
Adv410 Quiz4
Adv410 Quiz4Adv410 Quiz4
Adv410 Quiz4
 
Jrw Wk2 Blogs
Jrw Wk2  BlogsJrw Wk2  Blogs
Jrw Wk2 Blogs
 
Judging Websites
Judging WebsitesJudging Websites
Judging Websites
 
Introduction to Email Marketing by Alexander Zagoumenov
Introduction to Email Marketing by Alexander ZagoumenovIntroduction to Email Marketing by Alexander Zagoumenov
Introduction to Email Marketing by Alexander Zagoumenov
 
Tricks of the Trade: Social Media Management
Tricks of the Trade:  Social Media ManagementTricks of the Trade:  Social Media Management
Tricks of the Trade: Social Media Management
 
Avram ODonovan Blogtalk2008
Avram ODonovan Blogtalk2008Avram ODonovan Blogtalk2008
Avram ODonovan Blogtalk2008
 
How to use blogging for an allergist's practice
How to use blogging for an allergist's practiceHow to use blogging for an allergist's practice
How to use blogging for an allergist's practice
 
Engaging with Readers in the Web 2.0 era – social media, mobile devices & eBooks
Engaging with Readers in the Web 2.0 era – social media, mobile devices & eBooksEngaging with Readers in the Web 2.0 era – social media, mobile devices & eBooks
Engaging with Readers in the Web 2.0 era – social media, mobile devices & eBooks
 

Similar to Digital Literacy presentation

The price of free
The price of freeThe price of free
The price of free
James Brennan
 
Online Privacy in the Year of the Dragon
Online Privacy in the Year of the DragonOnline Privacy in the Year of the Dragon
Online Privacy in the Year of the Dragon
Phil Cryer
 
Online privacy concerns (and what we can do about it)
Online privacy concerns (and what we can do about it)Online privacy concerns (and what we can do about it)
Online privacy concerns (and what we can do about it)
Phil Cryer
 
Introduction to basic internet
Introduction to basic internetIntroduction to basic internet
Introduction to basic internet
Davies Isaac
 
Final%20 presentation
Final%20 presentationFinal%20 presentation
Final%20 presentationPuravida925
 
Privacy on the Internet
Privacy on the InternetPrivacy on the Internet
Privacy on the Internet
Phil Bradley
 
Digital Footprint
Digital Footprint  Digital Footprint
Digital Footprint
Dr. Michael England
 
Digital footprints& datamining
Digital footprints& dataminingDigital footprints& datamining
Digital footprints& datamining
Paige Jaeger
 
Lecture 10 Inferential Data Analysis, Personality Quizes and Fake News...
Lecture 10 Inferential Data Analysis, Personality Quizes and Fake News...Lecture 10 Inferential Data Analysis, Personality Quizes and Fake News...
Lecture 10 Inferential Data Analysis, Personality Quizes and Fake News...
Marcus Leaning
 
10 Ways to Leverage Facebook for Startups: Part 1
10 Ways to Leverage Facebook for Startups: Part 110 Ways to Leverage Facebook for Startups: Part 1
10 Ways to Leverage Facebook for Startups: Part 1
Ryan Spoon
 
Internet privacy presentation
Internet privacy presentationInternet privacy presentation
Internet privacy presentationMatthew Momney
 
Pod camp boston 2011 locking up yourself online
Pod camp boston 2011 locking up yourself onlinePod camp boston 2011 locking up yourself online
Pod camp boston 2011 locking up yourself onlineLane Sutton
 
TADA - Internet for Business
TADA - Internet for BusinessTADA - Internet for Business
TADA - Internet for Business
aussiehome.com
 
Dwe m3 digital footprint netiquette and reputation
Dwe m3   digital footprint  netiquette and reputation Dwe m3   digital footprint  netiquette and reputation
Dwe m3 digital footprint netiquette and reputation
Data-Set
 
Social media (test drive) training 23 10-2010 by Oliver and Salmaan
Social media (test drive) training 23 10-2010 by Oliver and SalmaanSocial media (test drive) training 23 10-2010 by Oliver and Salmaan
Social media (test drive) training 23 10-2010 by Oliver and Salmaan
Oliver de Leeuw
 
NPA Worldwide Social Media Presentation
NPA Worldwide Social Media PresentationNPA Worldwide Social Media Presentation
NPA Worldwide Social Media PresentationJeff McGraw
 
Do not track me
Do not track meDo not track me
Do not track me
Vikrant Kamble
 
Digital Sobriety - How tech companies are controlling you and what to do abou...
Digital Sobriety - How tech companies are controlling you and what to do abou...Digital Sobriety - How tech companies are controlling you and what to do abou...
Digital Sobriety - How tech companies are controlling you and what to do abou...
Ida Olsson
 
An Internet All About You
An Internet All About YouAn Internet All About You
An Internet All About You
Daylan Pearce
 

Similar to Digital Literacy presentation (20)

The price of free
The price of freeThe price of free
The price of free
 
Online Privacy in the Year of the Dragon
Online Privacy in the Year of the DragonOnline Privacy in the Year of the Dragon
Online Privacy in the Year of the Dragon
 
Digital footprints fetc13
Digital footprints fetc13Digital footprints fetc13
Digital footprints fetc13
 
Online privacy concerns (and what we can do about it)
Online privacy concerns (and what we can do about it)Online privacy concerns (and what we can do about it)
Online privacy concerns (and what we can do about it)
 
Introduction to basic internet
Introduction to basic internetIntroduction to basic internet
Introduction to basic internet
 
Final%20 presentation
Final%20 presentationFinal%20 presentation
Final%20 presentation
 
Privacy on the Internet
Privacy on the InternetPrivacy on the Internet
Privacy on the Internet
 
Digital Footprint
Digital Footprint  Digital Footprint
Digital Footprint
 
Digital footprints& datamining
Digital footprints& dataminingDigital footprints& datamining
Digital footprints& datamining
 
Lecture 10 Inferential Data Analysis, Personality Quizes and Fake News...
Lecture 10 Inferential Data Analysis, Personality Quizes and Fake News...Lecture 10 Inferential Data Analysis, Personality Quizes and Fake News...
Lecture 10 Inferential Data Analysis, Personality Quizes and Fake News...
 
10 Ways to Leverage Facebook for Startups: Part 1
10 Ways to Leverage Facebook for Startups: Part 110 Ways to Leverage Facebook for Startups: Part 1
10 Ways to Leverage Facebook for Startups: Part 1
 
Internet privacy presentation
Internet privacy presentationInternet privacy presentation
Internet privacy presentation
 
Pod camp boston 2011 locking up yourself online
Pod camp boston 2011 locking up yourself onlinePod camp boston 2011 locking up yourself online
Pod camp boston 2011 locking up yourself online
 
TADA - Internet for Business
TADA - Internet for BusinessTADA - Internet for Business
TADA - Internet for Business
 
Dwe m3 digital footprint netiquette and reputation
Dwe m3   digital footprint  netiquette and reputation Dwe m3   digital footprint  netiquette and reputation
Dwe m3 digital footprint netiquette and reputation
 
Social media (test drive) training 23 10-2010 by Oliver and Salmaan
Social media (test drive) training 23 10-2010 by Oliver and SalmaanSocial media (test drive) training 23 10-2010 by Oliver and Salmaan
Social media (test drive) training 23 10-2010 by Oliver and Salmaan
 
NPA Worldwide Social Media Presentation
NPA Worldwide Social Media PresentationNPA Worldwide Social Media Presentation
NPA Worldwide Social Media Presentation
 
Do not track me
Do not track meDo not track me
Do not track me
 
Digital Sobriety - How tech companies are controlling you and what to do abou...
Digital Sobriety - How tech companies are controlling you and what to do abou...Digital Sobriety - How tech companies are controlling you and what to do abou...
Digital Sobriety - How tech companies are controlling you and what to do abou...
 
An Internet All About You
An Internet All About YouAn Internet All About You
An Internet All About You
 

Recently uploaded

GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 

Recently uploaded (20)

GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 

Digital Literacy presentation

  • 1. Digital Literacies: An Introduction By Tom Rowledge and Tom Davidson, Digichamps and Web Science Students
  • 2. Digital Literacies Info Management Creating Materials Effective Communication Identity Digital Literacies are the way people use digital technology, to achieve any objective. Can be broken down into 4 parts as shown.
  • 3.  Many people have perceptions of how they use technology, or how “tech-savvy” they might be. We are interested to hear your perceptions, and why you might think that way.  So please can you navigate to: http://bit.ly/20CTctP and complete the survey.  At the end you will be given a grade reflecting various aspects of your own digital literacy Digital Health-Check
  • 4. Online Identity Arguably the most important part of Digital Literacies, so here we’re going to do something a bit different. We’re going to show you how information might be gathered about you online. Video!
  • 5. Nothing to do with me… It is easy to think that this doesn’t matter to you, for a number of reasons:  Since all privacy settings are set to “Only friends” or equivalent. But, many don’t know that every time Facebook updates its terms and conditions (even just changing one word), and you accept, they may change back to public  Many people believe that Facebook and others don’t know that much about them…
  • 6. Find Out What They Know About You Facebook Google (Only really works if you use lots of Google services) 1. Log onto Facebook on a computer 2. Go to Facebook Settings. 3. Click at the bottom of the first page; “Download a Copy” 4. Wait for the email to arrive You can use a combination of Websites to explore Google’s data. 1. aboutme.google.com – to see Google+ information, or if you don’t use this, other information you have given Google 2. www.google.com/settings/dashboard - to see everything about your Google account, including “Location History” which tracks your phone! 3. www.google.com/settings/ads - to see what information Google thinks it knows about you, from your browsing habits – fun to see what they have guessed at
  • 7. Google Maps History Instructions 1. Visit www.google.com/settings/dashboard 2. Scroll down to “Location History” 3. Then press “View Location History” 4. Now you can navigate along the timeline
  • 8. Apple iPhone Location Tracking 1. Go To Settings 2. Privacy 3. Location Services 4. Scroll down to the Bottom where you should see “System Services” 5. Then Press Frequent Locations 6. You have a history now come up…you can click on them to see visits, a map, and the time spent at these locations! This data is not sent to Apple however, we’re merely showing you just so you can see quite how much data exists on you. https://youtu.be/hZiuUg3I74M
  • 9. Online Identity It should therefore be very clear that it is best to be careful about what you post online for:  Security – there is a wealth of information that can fall into the wrong hands.  Image – employers are now more and more (we’re sure you’ve heard this as many times as us) checking up on prospects on Facebook. This is most important us, as we are both the group who needs jobs, and who are also most likely to be photographed on the floor of Jesters drenched in last nights Jesticle…
  • 10. What Lack of an Online Identity Is Doing  https://www.youtube.com/watch?v=A2bniFJigI0
  • 11. Activity Please fill in these surveys depending on what personal data you were able to access: • Facebook: https://www.surveyface.com/l/facebook-collection • Google Search History: https://www.surveyface.com/l/google- collection • Apple Location History: https://www.surveyface.com/l/apple- location-collection • Google Maps Location: https://www.surveyface.com/l/google- location-collection
  • 12. Lecture and Follow Up  Lecture will include:  Data Analysis on what you’ve provided today  How to generate a positive online identity  Information on resources to improve your skills and employability Further Reading:  The internet Society Digital Literacy Tutorials: https://www.internetsociety.org/tutorials/digital-footprint-matters/module-1- digital-footprint/
  • 13. Complete our Survey We also ask you to please complete our survey: Link: https://www.surveyface. com/l/session-evaluation Thanks again.

Editor's Notes

  1. Information Management - evaluating sources, searching google, (online courses ?)  Creating Materials - build portfolio online, use of services different to “powerpoint” etc. (Prezi, H5P, Canvas….) Effective Communication - use digital services to collaborate, communicate and work together. Identity and Communication - password use, material available about you online.