2. Building Your Online Identity
• Have a plan
• Think long-term
• Be consistent
• Your avatar
• Site basics
• Participate
• Get inspired
COMP113: Social Media & Online Communities 2
3. Next
• You find that you are having an account in
one of the popular services, such
as Twitter for micro blogging, YouTube for
video sharing, Delicious for links, Last.fm for
music, Flickr for images, Digg for news
and Facebook for a profile.
• Funnel all those services through a life
streaming tool such as FriendFeed and
moderate the content sharing there for
efficiency
• And may be more……….
COMP113: Social Media & Online Communities 3
4. But your online identity can be easily
destroyed
Being online is like being in public. Nearly anything
that gets posted can come back to haunt you.
• Boring posts
• Disrespecting others
• Failing to promote others
• Not replying to comments
• Being tagged in questionable photos
COMP113: Social Media & Online Communities 4
5. Protecting Your Online Identity
• Account / Password management
• Login often
COMP113: Social Media & Online Communities 5
6. Online methods for stealing
personal information
• Malware
• Spam
• Phishing
COMP113: Social Media & Online Communities 6
7. What do people do to manage
accounts?
Model1
• Use the same
username/password
for multiple sites
7
8. What do people do to manage
accounts?
• Maintain a list of user IDs and
passwords in an offline document
Or
• Store account details in a
“password vault”:
– On your PC (e.g., protected by
fingerprint recognition)
– In a portable USB
device, protected by a strong
pass phrase
– On a trustworthy online
service, e.g., mashedlife.com 8
10. What do people do to manage
accounts?
Model 2
• Login using an OpenID
account where possible
• Social login (e.g., Facebook
Connect, Twitter OAuth, ...)
COMP113: Social Media & Online Communities 10
11. OpenID
• OpenIDs are URLs (i.e., your identities)
• Find a provider (e.g., MyOpenID, Yahoo, ...)
• Log into any site that supports OpenID
• Not overly successful
12.
13. Facebook Connect
• What happens?
– Login into 3rd party websites
– Approve level of data access
between Facebook and website
– See if your friends have also
connected to the website
– Publish content to Facebook
through the website
13
15. Social logins – survey-
• 86% respondents will change behaviour:
– 54% might leave the site and not return
– 26% would go to a different site if possible
– 6% would just simply leave or avoid the site
– 14% would not complete the registration
• 88% admitted to supplying incorrect
information or not answering all fields
• 90% admitted to leaving a website if they
couldn’t remember login details (was 45%)
Manage your password: The more complicated the password, the less likely it will be hacked.Login often: This will help to make sure your account isn’t being hacked and it’s good to look active on your social media accounts.
The days of having a separate login and password for each online service we use are behind us. Now, you can log into most sites and services using your social network's ID.
Social Login reduces the barriers to register and sign-in to your site, allowing users to authenticate their identities using a preferred social network account. It’s proven to increase registration rates by 20-40% and provides permission-based access to rich, first-party user data so you can create a completely personalized user experience.
The most popular social identities are Facebook, Google, Yahoo, and Twitter, but are they always being used in the same way? The infographic below, courtesy of social optimization platform Gigya, shows that users trust different identities on different services. For example, users are most likely to log on to entertainment sites via Facebook, but when it comes to news sites, the login of choice is Twitter. Furthermore, the infographic shows what profile data is available to services after users log in using various online identities.
. For example, users are most likely to log on to entertainment sites via Facebook, but when it comes to news sites, the login of choice is Twitter.
Furthermore, the infographic shows what profile data is available to services after users log in using various online identities.