SlideShare uma empresa Scribd logo
1 de 36
Are you feeling lucky?
Your digital Identity
Kirsten Thompson
@_KirstenT | K.Thompson@adm.leeds.ac.uk
1. Digital identities
2. Personal VS Professional
3. Managing your identity
Outline
1. Digital identities
‘Digital identity can
be defined as all
the online
information and
data specifically
about an
individual.’
(Last accessed 26/06/13 at:
http://distance.uvic.ca/students/identity.htm)
Your
Digital
Identity
Creating an account on
the social web is a
choice.
Having a digital identity
is not.
We all have a digital
footprint.
Your digital identity =
everything about you
on the web
Verified / non-verified
– both important
What else are you
sharing?
WHOIS database
Location services
Social media privacy
Mobile device security
How do you verify who you are talking
to online? How do others verify you?
How easy is it to steal
your online identity?
Who
manages
your digital
identity?
This was posted on Twitter during a recent
conference presentation #NoEscape
Definition of a meme:
‘noun
1 an element of a culture or
system of behaviour
passed from one individual
to another by imitation or
other non-genetic means.
2 an image, video, piece of
text, etc., typically
humorous in nature, that is
copied and spread rapidly
by Internet users, often with
slight variations.’
(Oxford Dictionaries, online, last accessed 09/07/13 at:
http://oxforddictionaries.com/definition/english/meme)
Grumpy Cat meme
Some companies
create profiles for
us using public
information on the
web – inaccurate
and merging
identities.
.com
What will you
find?
The Wayback Machine has archived
over 240 billion web pages from
1996 – think about your digital
footprint
http://archive.org/web/web.php
Are you feeling lucky?
You can
manage your
digital identity,
you cannot
control it
2. Personal VS Professional
How do you currently
use social media?
1. Finding and using
content on the social
web
2. Joining and building
networks
3. Creating, curating
and sharing content
4. Improving
productivity
5. Managing reputation
Activity
Challenges idea of digital natives and immigrants
“Our Visitors and Residents typology should be understood as a
continuum and not a binary opposition. Individuals may be able to place
themselves at a particular point along this continuum rather than in one of
two boxes.
Nor is a predominantly Visitor approach necessarily any less effective or of
less value than a predominantly
Resident approach since the value of either has to be set against a given
context and set of goals. Similarly, we do not consider the Visitor to be
necessarily any less technically adept than the Resident.”
(White and Le Cornu, 2011, http://firstmonday.org/ojs/index.php/fm/article/viewArticle/3171/3049)
Visitors and Residents
• See web as untidy garden tool
shed
• Defined goal or task
• Select most appropriate tool for
task
• Need to see concrete benefit from
use of a platform
• Relatively anonymous
• Try to avoid the creation of digital
identity
• Caution: identity theft, privacy
• Sense that online social networking
is banal and potentially a time waster
• Will use technology to maintain
relationships
• Web offers set of tools to deliver or
manipulate content (including
conversations)
• Tendency to respect (and seek out)
authoritative sources
• Thinking often takes place offline
• Users, not members, of the web
• See no value in ‘belonging‘ online
• See web as place (park, building) where clusters
of friends and colleagues meet
• Live out a proportion of their life online
• Distinction between online and offline increasingly
blurred
• Sense of belonging to a community
• Have a profile in social networking platforms
• Comfortable expressing their identity online
• Web is a place to express opinions, to form and
extend relationships, maintain and develop a
digital identity
• Aspect of their persona remains once logged off
• See web as networks or clusters of individuals
who generate content/opinion
• No clear distinction between concepts of persona
and content
Visitors Residents
(White and Le Cornu 2011)
How do you see and
use the web?
Map your online activity e.g.
Personal
Professional
Visitor Resident
(@DaveOWhite, Talking About Teaching
Event, University of Leeds, 2013)
“Don’t say (or do)
anything you
wouldn’t on 5
Live.”
Rory Cellan-Jones
Social media = public
Separate personal and
professional, makes each
presence more useful to
your networks
You’re not anonymous on
social media – dangerous to
think you are
Impact of liking, re-tweeting
Click the video to watch
Email
Do you use the same e-mail address to
manage all your social media accounts?
Are you merging personal, professional and
institutional social profiles?
Social media sites encourage us to integrate
our email address book – your email contacts
will find you, whether you want to be found or
not.
When
things go
wrong…
http://news.uk.msn.com/uk/twitter-trolls-u-turn-after-users-threaten-to-tell-his-mum
Case: Lord McAlpine falsely accused
Alleged offence: Libel
Case: Twitter users name victim of rape by
footballer Ched Evans
Offence: The Sexual Offences (Amendment)
Act 1992
Case: Social media users circulated alleged
pictures of child killer Jon Venables
Alleged offence: Contempt of Court
http://www.bbc.co.uk/news/magazine-20782257
Case: Juror Joanne Fraill contact defendant in trial by
Facebook
Offence: Contempt of Court
Case: Paul Chambers joked on Twitter that he would
blow up Robin Hood Airport
Offence: Sending a “menacing electronic
communication” under the 2003 Communications Act
Case: Reading man Sean Duff mocks dead children
on social media sites
Offence: Making “grossley offensive” comments under
the Malicious Communications Act 1988
http://www.bbc.co.uk/news/magazine-20782257
653 people faced criminal charges in England and
Wales in 2012 in connection with comments on Twitter
or Facebook.
These divided into offences committed on the two
sites, such as posting abusive messages, and those
which had been provoked by messages, including
violent attacks.
Many of the offences, such as harassment or threats
to kill would have been committed, albeit in a different
way, before social media was invented.
http://www.bbc.co.uk/news/magazine-20782257
3. Managing
your identity
Are you feeling lucky?
Start thinking like a search engine –
be the top of your own search
results.
Use Google Alerts
to keep updated on
what others are
saying about you
(your work, project
etc) on the web. It
won’t search
everything, but can
assist in managing
your digital identity.
accidentaloutlaw.knowthenet.org.uk
Existing laws apply online as they do offline – new Defamation
Act 2013 (good news). BBC Defamation article
Only share information when you have permission and obtain
permission to publish someone else’s work
Avoid making comments and being supportive of the comments
or actions of others, if they could get you in trouble.
Everything shared on social media, regardless of privacy
settings can be captured.
Educate your social network – your “private” Facebook Timeline
is only as secure as the devices you/your Facebook “friends”
use.
Put simply…think first, share second
Think about security and privacy
1. Use official mobile apps and trusted third-party apps – check reviews.
2. Location services – what else are you sharing with the world?
3. Are your mobile devices secure? What information are you giving away if
your device is lost/stolen? Is your device set up for remote wiping?
4. A service or App might be secure, your internet access might not be –
think about what you do/where you do it – public Wi-Fi can be dangerous.
5. Do you need to remain logged into all apps at all times? Think about your
web history too.
6. Be wary of hackers, account cloning, phishing scams, rogue links.
7. Unused accounts at risk – monitor or close | consider strong password
security.
Keep
updated
about
online
safety
and the
law
www.socialmedialaw.co.uk
www.thatsnonsense.com/

Mais conteúdo relacionado

Mais procurados

Advantages and disadvantages of internet
Advantages and disadvantages of internetAdvantages and disadvantages of internet
Advantages and disadvantages of internet
Carlos Diclear Hijo
 
Social network privacy & security
Social network privacy & securitySocial network privacy & security
Social network privacy & security
nadikari123
 

Mais procurados (20)

Ethics On The Internet
Ethics On The InternetEthics On The Internet
Ethics On The Internet
 
Empowerment technology
Empowerment technologyEmpowerment technology
Empowerment technology
 
Empowerment Technologies - Module 1
Empowerment Technologies - Module 1Empowerment Technologies - Module 1
Empowerment Technologies - Module 1
 
Social Media Security 2011
Social Media Security 2011Social Media Security 2011
Social Media Security 2011
 
Online ethics
Online ethicsOnline ethics
Online ethics
 
Advantages and disadvantages of internet
Advantages and disadvantages of internetAdvantages and disadvantages of internet
Advantages and disadvantages of internet
 
Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)
 
Media and Information Literacy 104
Media and Information Literacy 104Media and Information Literacy 104
Media and Information Literacy 104
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2
 
Casiappt
CasiapptCasiappt
Casiappt
 
Social network privacy & security
Social network privacy & securitySocial network privacy & security
Social network privacy & security
 
Semantic web approach towards interoperability and privacy issues in social n...
Semantic web approach towards interoperability and privacy issues in social n...Semantic web approach towards interoperability and privacy issues in social n...
Semantic web approach towards interoperability and privacy issues in social n...
 
Empowerment Technologies Lecture 2 (Philippines SHS)
Empowerment Technologies Lecture 2 (Philippines SHS)Empowerment Technologies Lecture 2 (Philippines SHS)
Empowerment Technologies Lecture 2 (Philippines SHS)
 
Internet and Social Media
Internet and Social MediaInternet and Social Media
Internet and Social Media
 
Social Networking (Ethics in Information Technology)
Social Networking (Ethics in Information Technology)Social Networking (Ethics in Information Technology)
Social Networking (Ethics in Information Technology)
 
Etech activity
Etech activityEtech activity
Etech activity
 
Empowerment technology Group 7
Empowerment technology Group 7Empowerment technology Group 7
Empowerment technology Group 7
 
advantages and disadvantages of using internet
advantages and disadvantages of using internetadvantages and disadvantages of using internet
advantages and disadvantages of using internet
 
Online Systems, Functions, and Platforms
Online Systems, Functions, and PlatformsOnline Systems, Functions, and Platforms
Online Systems, Functions, and Platforms
 
Lesson 1 2 Edited
Lesson 1 2 EditedLesson 1 2 Edited
Lesson 1 2 Edited
 

Semelhante a Your digital identity - are you feeling lucky?

Security and Privacy in Social Networks.pptx
Security and Privacy in Social Networks.pptxSecurity and Privacy in Social Networks.pptx
Security and Privacy in Social Networks.pptx
SIMNchannel
 
Social network privacy.
Social network privacy.Social network privacy.
Social network privacy.
STO STRATEGY
 
Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235
brendaylo
 
Social network privacy
Social network privacySocial network privacy
Social network privacy
STO STRATEGY
 
Your e image presentation
Your e image presentationYour e image presentation
Your e image presentation
lahill16
 

Semelhante a Your digital identity - are you feeling lucky? (20)

REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docx
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
REVIEWER ETECH
REVIEWER ETECHREVIEWER ETECH
REVIEWER ETECH
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docx
 
Empowerment Technology
Empowerment Technology Empowerment Technology
Empowerment Technology
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
Security and Privacy in Social Networks.pptx
Security and Privacy in Social Networks.pptxSecurity and Privacy in Social Networks.pptx
Security and Privacy in Social Networks.pptx
 
L1b Trends in ICT - Online Safety and Security.pdf
L1b Trends in ICT - Online Safety and Security.pdfL1b Trends in ICT - Online Safety and Security.pdf
L1b Trends in ICT - Online Safety and Security.pdf
 
Your Digital Identity - are you feeling lucky?
Your Digital Identity - are you feeling lucky?Your Digital Identity - are you feeling lucky?
Your Digital Identity - are you feeling lucky?
 
Social network privacy.
Social network privacy.Social network privacy.
Social network privacy.
 
IS SOCIAL PRIVACY POSSIBLE?
IS SOCIAL PRIVACY POSSIBLE?IS SOCIAL PRIVACY POSSIBLE?
IS SOCIAL PRIVACY POSSIBLE?
 
Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235
 
Web Science Session 2: Social Media
Web Science Session 2: Social MediaWeb Science Session 2: Social Media
Web Science Session 2: Social Media
 
Cultural heritage collections in a web 2
Cultural heritage collections in a web 2Cultural heritage collections in a web 2
Cultural heritage collections in a web 2
 
Social network privacy
Social network privacySocial network privacy
Social network privacy
 
Your e image presentation
Your e image presentationYour e image presentation
Your e image presentation
 
Group 4 discussion leading
Group 4 discussion leadingGroup 4 discussion leading
Group 4 discussion leading
 
[r]evolution Digital Literacy Workshop Slides
[r]evolution Digital Literacy Workshop Slides[r]evolution Digital Literacy Workshop Slides
[r]evolution Digital Literacy Workshop Slides
 

Mais de Kirsten Thompson

Mais de Kirsten Thompson (20)

Your Social Media Strategy
Your Social Media Strategy Your Social Media Strategy
Your Social Media Strategy
 
Learning Technologists' Network Re-launch Nov 2019
Learning Technologists' Network Re-launch Nov 2019Learning Technologists' Network Re-launch Nov 2019
Learning Technologists' Network Re-launch Nov 2019
 
Inclusive Teaching @ Leeds
Inclusive Teaching @ LeedsInclusive Teaching @ Leeds
Inclusive Teaching @ Leeds
 
Collaborating with services outside the Library: Enhancing experience and bui...
Collaborating with services outside the Library: Enhancing experience and bui...Collaborating with services outside the Library: Enhancing experience and bui...
Collaborating with services outside the Library: Enhancing experience and bui...
 
Everyday Inclusion in Everyday Teaching (TELFest edition)
Everyday Inclusion in Everyday Teaching (TELFest edition)Everyday Inclusion in Everyday Teaching (TELFest edition)
Everyday Inclusion in Everyday Teaching (TELFest edition)
 
Using Social Media to Promote Your Research (Translate MedTech edition)
Using Social Media to Promote Your Research (Translate MedTech edition)Using Social Media to Promote Your Research (Translate MedTech edition)
Using Social Media to Promote Your Research (Translate MedTech edition)
 
Creating Digital Content
Creating Digital ContentCreating Digital Content
Creating Digital Content
 
7 steps: social media strategy for Innovation Lab Schools' Ambassadors
7 steps: social media strategy for Innovation Lab Schools' Ambassadors7 steps: social media strategy for Innovation Lab Schools' Ambassadors
7 steps: social media strategy for Innovation Lab Schools' Ambassadors
 
The role of the Patient Research Ambassador
The role of the Patient Research AmbassadorThe role of the Patient Research Ambassador
The role of the Patient Research Ambassador
 
The challenges and benefits of using digital to engage people in research
The challenges and benefits of using digital to engage people in researchThe challenges and benefits of using digital to engage people in research
The challenges and benefits of using digital to engage people in research
 
Quick wins for designing and teaching inclusively - helping you meet the Base...
Quick wins for designing and teaching inclusively - helping you meet the Base...Quick wins for designing and teaching inclusively - helping you meet the Base...
Quick wins for designing and teaching inclusively - helping you meet the Base...
 
Public engagement while you sleep
Public engagement while you sleep Public engagement while you sleep
Public engagement while you sleep
 
Social media for researchers #OpenResLeeds2018
Social media for researchers #OpenResLeeds2018Social media for researchers #OpenResLeeds2018
Social media for researchers #OpenResLeeds2018
 
Introduction to Tests, Surveys and Pools
Introduction to Tests, Surveys and PoolsIntroduction to Tests, Surveys and Pools
Introduction to Tests, Surveys and Pools
 
Introduction to setting up the Discussion Board
Introduction to setting up the Discussion BoardIntroduction to setting up the Discussion Board
Introduction to setting up the Discussion Board
 
Introduction to Sending Email
Introduction to Sending EmailIntroduction to Sending Email
Introduction to Sending Email
 
Introduction to Communicating with Announcements
Introduction to Communicating with AnnouncementsIntroduction to Communicating with Announcements
Introduction to Communicating with Announcements
 
Introduction to Copying and Moving Content
Introduction to Copying and Moving ContentIntroduction to Copying and Moving Content
Introduction to Copying and Moving Content
 
Introduction to Embedding Content
Introduction to Embedding ContentIntroduction to Embedding Content
Introduction to Embedding Content
 
Introduction to Adding Content
Introduction to Adding ContentIntroduction to Adding Content
Introduction to Adding Content
 

Último

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Último (20)

Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 

Your digital identity - are you feeling lucky?

  • 1. Are you feeling lucky? Your digital Identity Kirsten Thompson @_KirstenT | K.Thompson@adm.leeds.ac.uk
  • 2. 1. Digital identities 2. Personal VS Professional 3. Managing your identity Outline
  • 4. ‘Digital identity can be defined as all the online information and data specifically about an individual.’ (Last accessed 26/06/13 at: http://distance.uvic.ca/students/identity.htm) Your Digital Identity
  • 5. Creating an account on the social web is a choice. Having a digital identity is not. We all have a digital footprint.
  • 6. Your digital identity = everything about you on the web Verified / non-verified – both important
  • 7. What else are you sharing? WHOIS database Location services Social media privacy Mobile device security
  • 8. How do you verify who you are talking to online? How do others verify you?
  • 9. How easy is it to steal your online identity?
  • 11. This was posted on Twitter during a recent conference presentation #NoEscape
  • 12. Definition of a meme: ‘noun 1 an element of a culture or system of behaviour passed from one individual to another by imitation or other non-genetic means. 2 an image, video, piece of text, etc., typically humorous in nature, that is copied and spread rapidly by Internet users, often with slight variations.’ (Oxford Dictionaries, online, last accessed 09/07/13 at: http://oxforddictionaries.com/definition/english/meme) Grumpy Cat meme
  • 13. Some companies create profiles for us using public information on the web – inaccurate and merging identities.
  • 15. The Wayback Machine has archived over 240 billion web pages from 1996 – think about your digital footprint http://archive.org/web/web.php
  • 16. Are you feeling lucky?
  • 17. You can manage your digital identity, you cannot control it
  • 18. 2. Personal VS Professional
  • 19. How do you currently use social media? 1. Finding and using content on the social web 2. Joining and building networks 3. Creating, curating and sharing content 4. Improving productivity 5. Managing reputation Activity
  • 20. Challenges idea of digital natives and immigrants “Our Visitors and Residents typology should be understood as a continuum and not a binary opposition. Individuals may be able to place themselves at a particular point along this continuum rather than in one of two boxes. Nor is a predominantly Visitor approach necessarily any less effective or of less value than a predominantly Resident approach since the value of either has to be set against a given context and set of goals. Similarly, we do not consider the Visitor to be necessarily any less technically adept than the Resident.” (White and Le Cornu, 2011, http://firstmonday.org/ojs/index.php/fm/article/viewArticle/3171/3049) Visitors and Residents
  • 21. • See web as untidy garden tool shed • Defined goal or task • Select most appropriate tool for task • Need to see concrete benefit from use of a platform • Relatively anonymous • Try to avoid the creation of digital identity • Caution: identity theft, privacy • Sense that online social networking is banal and potentially a time waster • Will use technology to maintain relationships • Web offers set of tools to deliver or manipulate content (including conversations) • Tendency to respect (and seek out) authoritative sources • Thinking often takes place offline • Users, not members, of the web • See no value in ‘belonging‘ online • See web as place (park, building) where clusters of friends and colleagues meet • Live out a proportion of their life online • Distinction between online and offline increasingly blurred • Sense of belonging to a community • Have a profile in social networking platforms • Comfortable expressing their identity online • Web is a place to express opinions, to form and extend relationships, maintain and develop a digital identity • Aspect of their persona remains once logged off • See web as networks or clusters of individuals who generate content/opinion • No clear distinction between concepts of persona and content Visitors Residents (White and Le Cornu 2011) How do you see and use the web?
  • 22. Map your online activity e.g. Personal Professional Visitor Resident (@DaveOWhite, Talking About Teaching Event, University of Leeds, 2013)
  • 23. “Don’t say (or do) anything you wouldn’t on 5 Live.” Rory Cellan-Jones Social media = public Separate personal and professional, makes each presence more useful to your networks You’re not anonymous on social media – dangerous to think you are Impact of liking, re-tweeting Click the video to watch
  • 24. Email Do you use the same e-mail address to manage all your social media accounts? Are you merging personal, professional and institutional social profiles? Social media sites encourage us to integrate our email address book – your email contacts will find you, whether you want to be found or not.
  • 27. Case: Lord McAlpine falsely accused Alleged offence: Libel Case: Twitter users name victim of rape by footballer Ched Evans Offence: The Sexual Offences (Amendment) Act 1992 Case: Social media users circulated alleged pictures of child killer Jon Venables Alleged offence: Contempt of Court http://www.bbc.co.uk/news/magazine-20782257
  • 28. Case: Juror Joanne Fraill contact defendant in trial by Facebook Offence: Contempt of Court Case: Paul Chambers joked on Twitter that he would blow up Robin Hood Airport Offence: Sending a “menacing electronic communication” under the 2003 Communications Act Case: Reading man Sean Duff mocks dead children on social media sites Offence: Making “grossley offensive” comments under the Malicious Communications Act 1988 http://www.bbc.co.uk/news/magazine-20782257
  • 29. 653 people faced criminal charges in England and Wales in 2012 in connection with comments on Twitter or Facebook. These divided into offences committed on the two sites, such as posting abusive messages, and those which had been provoked by messages, including violent attacks. Many of the offences, such as harassment or threats to kill would have been committed, albeit in a different way, before social media was invented. http://www.bbc.co.uk/news/magazine-20782257
  • 31. Are you feeling lucky? Start thinking like a search engine – be the top of your own search results.
  • 32. Use Google Alerts to keep updated on what others are saying about you (your work, project etc) on the web. It won’t search everything, but can assist in managing your digital identity.
  • 34. Existing laws apply online as they do offline – new Defamation Act 2013 (good news). BBC Defamation article Only share information when you have permission and obtain permission to publish someone else’s work Avoid making comments and being supportive of the comments or actions of others, if they could get you in trouble. Everything shared on social media, regardless of privacy settings can be captured. Educate your social network – your “private” Facebook Timeline is only as secure as the devices you/your Facebook “friends” use. Put simply…think first, share second
  • 35. Think about security and privacy 1. Use official mobile apps and trusted third-party apps – check reviews. 2. Location services – what else are you sharing with the world? 3. Are your mobile devices secure? What information are you giving away if your device is lost/stolen? Is your device set up for remote wiping? 4. A service or App might be secure, your internet access might not be – think about what you do/where you do it – public Wi-Fi can be dangerous. 5. Do you need to remain logged into all apps at all times? Think about your web history too. 6. Be wary of hackers, account cloning, phishing scams, rogue links. 7. Unused accounts at risk – monitor or close | consider strong password security.

Notas do Editor

  1. White, David S., and Alison Le Cornu. 2011. Visitors and residents: Towards a new typology for online engagement. First Monday 16(9). http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/viewArticle/3171/3049 Last accessed 30/05/13
  2. White, David S., and Alison Le Cornu. 2011. Visitors and residents: Towards a new typology for online engagement. First Monday 16(9). http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/viewArticle/3171/3049 Last accessed 30/05/13