SlideShare uma empresa Scribd logo
1 de 86
Digital Persona Management for IBMers Joshua Scribner Social Software Advocate IBM SWG, BlueIQ [email_address] @joshscribner Version 2.3, Updated: 8 February 2012
Enterprise Benefits of a Social Network ,[object Object],[object Object],[object Object],[object Object]
Personal Benefits of a Social Network ,[object Object],[object Object],[object Object],[object Object],[object Object]
A Facebook dramatization… … I apologize in advance for the crude language. http://www.youtube.com/v/LrFdOz1Mj8Q This video gives you an idea of the Facebook dilemma:
Risks of a Social Network ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Risks of a Social Network: Business ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Scary! Should I still use Social Networks? ,[object Object],[object Object],[object Object]
Personas ,[object Object],[object Object]
Objectives ,[object Object],[object Object],[object Object]
The rest of this presentation: ,[object Object],[object Object],Slide 11 Slide 52  Slide 74  - coming soon Slide 77  - coming soon Slide 80
Social Network:  Facebook
Social Network:  Facebook ,[object Object],[object Object],[object Object],[object Object]
Create Groups ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Facebook: Objective 1
Create Friend Lists from your Groups ,[object Object],Facebook: Objective 1 https://www.facebook.com/bookmarks/lists
Create Friend Lists for your Groups ,[object Object],[object Object],[object Object],[object Object],[object Object],Facebook: Objective 1
Create Groups: Assign contacts ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Facebook: Objective 1
Create Groups: Assign contacts ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Facebook: Objective 1 Alternative
Control Access - Basics ,[object Object],[object Object],[object Object],Facebook: Objective 2 TIP:  Don’t trust a “Network” -- you can’t control it and it doesn’t offer the safety of IBM’s intranet.  Create a Friend List to parallel each Network, add/accept friends selectively, and then Customize the access for each Friend List.
Control Access - Your Data ,[object Object],[object Object],[object Object],Facebook: Objective 2 Timeline users, and all users after 1 Feb 2012: From  your profile page ,  go to " About " and click  on the sections of your profile you wish to change. Non-Timeline users: From  your profile page , click  Edit Profile .  You can also use the links at the top of the next few slides as shortcuts to get to Profile Editing controls. Example: I have customized my employer information so that it is only visible to some people in my network.  When I select Custom, I can decide who sees this data.
Control Access - Your Data ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Edit Profile >  Basic Information These are my recommendations for these settings.  It is up to you to decide if the advice fits the way you want to use Facebook and if it complies with IBM’s Business Conduct Guidelines as they apply to you. Facebook: Objective 2
Control Access - Your Data ,[object Object],[object Object],[object Object],[object Object],Edit Profile >  Profile Picture These are my recommendations for these settings.  It is up to you to decide if the advice fits the way you want to use Facebook and if it complies with IBM’s Business Conduct Guidelines as they apply to you. Facebook: Objective 2
Control Access - Your Data ,[object Object],[object Object],[object Object],Edit Profile >  Friends and Family These are my recommendations for these settings.  It is up to you to decide if the advice fits the way you want to use Facebook and if it complies with IBM’s Business Conduct Guidelines as they apply to you. Facebook: Objective 2
Control Access - Your Data ,[object Object],[object Object],[object Object],Edit Profile >  Education and Work These are my recommendations for these settings.  It is up to you to decide if the advice fits the way you want to use Facebook and if it complies with IBM’s Business Conduct Guidelines as they apply to you. Facebook: Objective 2
Control Access - Your Data ,[object Object],[object Object],[object Object],[object Object],Edit Profile >  Philosophy These are my recommendations for these settings.  It is up to you to decide if the advice fits the way you want to use Facebook and if it complies with IBM’s Business Conduct Guidelines as they apply to you. Facebook: Objective 2
Control Access - Your Data ,[object Object],[object Object],[object Object],[object Object],Edit Profile >  Arts and Entertainment  and  Sports These are my recommendations for these settings.  It is up to you to decide if the advice fits the way you want to use Facebook and if it complies with IBM’s Business Conduct Guidelines as they apply to you. Facebook: Objective 2
Control Access - Your Data ,[object Object],[object Object],[object Object],Edit Profile >  Activities and Interests These are my recommendations for these settings.  It is up to you to decide if the advice fits the way you want to use Facebook and if it complies with IBM’s Business Conduct Guidelines as they apply to you. An example of how Facebook displays  Activities ,  Interests , and  Other Pages You Like . Facebook: Objective 2
Control Access - Your Data ,[object Object],[object Object],[object Object],[object Object],[object Object],Edit Profile >  Contact Information These are my recommendations for these settings.  It is up to you to decide if the advice fits the way you want to use Facebook and if it complies with IBM’s Business Conduct Guidelines as they apply to you. Facebook: Objective 2
Control Access - Your Data ,[object Object],[object Object],[object Object],Edit  Timeline  Profile >  Map These are my recommendations for these settings.  It is up to you to decide if the advice fits the way you want to use Facebook and if it complies with IBM’s Business Conduct Guidelines as they apply to you. Facebook: Objective 2
Control Access - Don't appear in ads ,[object Object],[object Object],[object Object],Account Settings >  Facebook Ads Facebook: Objective 2
Control Access - Your Data ,[object Object],[object Object],[object Object],View As Facebook: Objective 2
Control Access - Your Timeline ,[object Object],[object Object],[object Object],[object Object],[object Object],Facebook: Objective 2
3 - Retain Control ,[object Object],[object Object],[object Object],[object Object],Facebook: Objective 3
Share Smart – Photos and Videos Me! ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Facebook: Objective 3 These are my recommendations for these settings.  It is up to you to decide if the advice fits the way you want to use Facebook and if it complies with IBM’s Business Conduct Guidelines as they apply to you.
Share Smart – Your Wall When you post to your wall, or cause a status message to appear on your wall, you will usually have the option to decide which Friend Lists can see it. You should always check to see who you are sharing with.  This is an important control point in maintaining your privacy and control of your information.  If you do not want your friends to share what you have posted, either explicitly inform them (or reconsider sharing it on the internet). On the next slide, we'll discuss setting default Friend Lists for these posts. Facebook: Objective 3 These are my recommendations for these settings.  It is up to you to decide if the advice fits the way you want to use Facebook and if it complies with IBM’s Business Conduct Guidelines as they apply to you.
Lock it down - Basics ,[object Object],[object Object],[object Object],[object Object],Next Slide:  Which Friend Lists should I add? Facebook: Objective 3
Lock it down - Basics ,[object Object],[object Object],[object Object],[object Object],Facebook: Objective 3
Lock it down - Privacy Settings ,[object Object],[object Object],[object Object],[object Object],Your Home >  Privacy Settings Facebook: Objective 3
Lock it down – “How You Connect” ,[object Object],These are my recommendations for these settings.  It is up to you to decide if the advice fits the way you want to use Facebook and if it complies with IBM’s Business Conduct Guidelines as they apply to you. This only determines how  easily  you can be found on Facebook, it doesn’t prevent people from finding you. This enables people to request to join your network.  Since you will be granularly controlling what people in your network can see (via Friend Lists), there’s no harm in letting people request to join. If you wanted to keep out spam, you could prevent anyone from messaging you, but this is in many ways no different than your email inbox. Don’t allow people to post on your main wall.  Let friends contact you privately, or install secondary “Wall” programs (SuperWall, etc) and make each secondary Wall visible only to a specific set of Friend Lists. Though you’ve prevented your friends from posting on your wall, this ensures that only you can see it. Why prevent Wall posts by others:  We aren’t going to let people see who is in our networks, we’re going to keep them as separated as possible.  As such, we are restricting the ability of people in any of those networks from sharing our personal information with other networks by restricting their ability to communicate.  Create separate walls to give them the ability to talk about you within the confines of that network of friends. Facebook: Objective 3
Lock it down – “How Tags Work” ,[object Object],When others “Tag” you in a photo or post, it is added to a list of content on your profile. You cannot control the fact that others added your name to a photo or post, but you can make them hard to find and disavow the connection. When someone says they are posting about you, and that they want that post linked to your profile, you should review the content to decide if you want to endorse it as accurate about you.  By allowing it to be linked from your profile, you are tacitly implying it is accurate.  When someone adds a Tag to your post, saying that it is also about them (or someone else), you want to be able to confirm this is true and that your network should also see that linkage. If you do allow a post or photo on your profile, restrict who can see it When a friend uploads a photo about you, Facebook’s internal face-recognition software can suggest that it’s your face in the photo, to make Tagging easier.  Since we’re reviewing photos anyway, you could leave this on or off. Don't allow people to track your movements; your location is sensitive data about where you are (and aren't), it shouldn't be available to competitors, jealous friends, or lurking burglars. These are my recommendations for these settings.  It is up to you to decide if the advice fits the way you want to use Facebook and if it complies with IBM’s Business Conduct Guidelines as they apply to you. Facebook: Objective 3
Lock it down – “Apps and Websites” ,[object Object],Apps and Websites is split into several different areas: These are my recommendations for these settings.  It is up to you to decide if the advice fits the way you want to use Facebook and if it complies with IBM’s Business Conduct Guidelines as they apply to you. Do these three, first. Facebook: Objective 3
Lock it down – Other people's Apps ,[object Object],We're now going to increase the restrictions on your friends' apps, in order to reduce the information they can gather about you. These are my settings, you might want something similar.  Do not checkmark your birthday. When you are done, click "Save Changes." These are my recommendations for these settings.  It is up to you to decide if the advice fits the way you want to use Facebook and if it complies with IBM’s Business Conduct Guidelines as they apply to you. Facebook: Objective 3
Lock it down – Third Party Websites ,[object Object],When you click Edit Settings, a video will appear.  Below the video, click  In the Instant Personalization configuration that appears, uncheck the checkbox, so that it looks like this: Finally, toward the top-left corner, click  to return to your privacy settings. The feature we have turned off by unchecking that box tells Facebook that when you are on other (non-Facebook) websites, you do not want it to share your personal information with that third-party site. These are my recommendations for these settings.  It is up to you to decide if the advice fits the way you want to use Facebook and if it complies with IBM’s Business Conduct Guidelines as they apply to you. Facebook: Objective 3
Lock it down – Being found by Search ,[object Object],I do not mind that it is easy for my profile to be found through a search; I assume that someone will link to it, somewhere, and it will be found anyway so I might as well make myself visible.  If you want to make yourself a little harder to find, uncheck this box: Finally, toward the top-left corner, click  to return to your privacy settings. These are my recommendations for these settings.  It is up to you to decide if the advice fits the way you want to use Facebook and if it complies with IBM’s Business Conduct Guidelines as they apply to you. Facebook: Objective 3
Lock it down – "App Settings" ,[object Object],This will display a listing of the applications you have added to your profile.  Do you really need all those Apps?  Do you know what they do? Are they from a reliable source?  Some applications have been known to spam friend-lists, others are quite useful.  Know what it does before you accept a hug/drink/teddybear/etc from someone. To the right of each App is an "Edit" link and an X.  Press the X to delete any app you aren't familiar with or don't use.  On the next slide, we'll talk about editing. These are my recommendations for these settings.  It is up to you to decide if the advice fits the way you want to use Facebook and if it complies with IBM’s Business Conduct Guidelines as they apply to you. Facebook: Objective 3
Lock it down – Restricting an App  ,[object Object],Click "Edit," to the right of an App you wish to manage. These are my recommendations for these settings.  It is up to you to decide if the advice fits the way you want to use Facebook and if it complies with IBM’s Business Conduct Guidelines as they apply to you. Does this App require you give it too much access to your personal data? Click "Remove app" to delete it. Does this App request access for content that you do not want it to access, and which is optional?  You can remove that access by clicking Remove. Most Apps post content to your profile/wall, possibly sharing your private information. Restrict who can see those posts, using Custom and specifying Friend Lists (as we have done elsewhere). Facebook: Objective 3
Lock it down - App private info access Look carefully at the Required items from an App.  Click "See More" to examine exactly what content it wants to be able to see -- and share -- outside of your control.  Here are the categories it may ask for: This refers to content I've made public, not information I've restricted.  It's generally OK. This item is very worrisome; for example I do not want my birthday, religion, or politics shared.  Consider removing Apps that require this; remove this item if it is optional. An App should not require this information, and you should not be required to share it.  Consider removing Apps that require this; remove this item if it is optional. Facebook: Objective 3 These are my recommendations for these settings.  It is up to you to decide if the advice fits the way you want to use Facebook and if it complies with IBM’s Business Conduct Guidelines as they apply to you.
Lock it down - App private info access (continued - part 2) Categories an App may ask for: Your photos and videos may say a lot about you, and should not be accessed by an App as it may not adhere to the visibility restrictions you've set for the content. You don't need an App that reports on your whereabouts and Online Presence.  It's not good for IBM, nor for your personal security. Many Apps want to see information about the people in your network.  While unappealing that Apps do this, members of your network can restrict the shared information by editing "How people bring their info into apps you use" in the "Apps and Websites" are of their Privacy Settings.  It is up to you if you want to expose your network to this potential information gathering activity. Facebook: Objective 3 These are my recommendations for these settings.  It is up to you to decide if the advice fits the way you want to use Facebook and if it complies with IBM’s Business Conduct Guidelines as they apply to you.
Lock it down - App private info access (continued - part 3) Advice on making App privacy decisions Tip:  If an App on your list requires a lot of personal information, remove it and re-add it.  Beyond your Basic Information, an app must request to access each additional category of content.  This will remove any data for the App, but may be worth it if the private information it accesses has quietly been increased. Advice:  Most Apps will require a few of those information items that you deem too sensitive.  You can remove them all, if you like.  Alternatively, you should consider the risk of that information getting out with the trustworthiness of the App's creator.  You should also consider whether you think a well intentioned App function will accidentally share your information (i.e. " Find your birthday buddies!"  or  "See who else visits this coffee shop") Limitation:  Friend Lists do not apply to an Apps' level of access to your personal information.  While you can restrict who can see the posts an App makes, you can't granularly restrict an App's access to data within a category. Facebook: Objective 3 These are my recommendations for these settings.  It is up to you to decide if the advice fits the way you want to use Facebook and if it complies with IBM’s Business Conduct Guidelines as they apply to you.
Retain Control – Stay Aware ,[object Object],[object Object],[object Object],[object Object],Stay Aware – and be pro-active Facebook: Objective 3
Retain Control – Wandering information ,[object Object],[object Object],[object Object],[object Object],[object Object],Facebook: Objective 3
Your Facebook tasks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Facebook: Summary
Social Network:  LinkedIn
Social Network:  LinkedIn ,[object Object],[object Object],[object Object],[object Object]
Your LinkedIn Persona(s) ,[object Object],[object Object],[object Object],[object Object],[object Object],LinkedIn: Objective 1 LinkedIn offers no representation for your groups
Adding people to your network ,[object Object],[object Object],[object Object],[object Object],LinkedIn: Objective 1
Control Access -- Basics ,[object Object],[object Object],[object Object],LinkedIn: Objective 2 LinkedIn describes your extended network in the following manner: Your connections   -- people you are directly connected to Your network  -- your connections, plus everyone connected to them, and to them, etc. etc.  Your entire extended network.
Control Access -- Your Data ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],LinkedIn: Objective 2 Basic Information When you are finished, click "Save Changes"
Control Access -- Your Data ,[object Object],[object Object],[object Object],[object Object],LinkedIn: Objective 2 Edit Profile Picture When you are finished, click "Save Settings"
Control Access -- Your Data ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],LinkedIn: Objective 2 Add or Edit a current or past position When you are finished, click "Save Changes"
Control Access -- Your Data ,[object Object],[object Object],[object Object],[object Object],LinkedIn: Objective 2 Additional Information When you are finished, click "Save Changes"
Control Access -- Twitter ,[object Object],[object Object],[object Object],[object Object],LinkedIn: Objective 2 Twitter Settings When you are finished, click "Save Changes"
Control Access -- Your Data ,[object Object],[object Object],[object Object],[object Object],LinkedIn: Objective 2 Add or edit Education When you are finished, click "Save Changes"
Control Access -- Your Data ,[object Object],[object Object],[object Object],[object Object],[object Object],LinkedIn: Objective 2 Personal Information When you are finished, click "Save Changes"
Control Access - Contact settings ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],LinkedIn: Objective 2 Edit Contact Settings When you are finished, click "Save Changes"
Control Access -- Your privacy Settings ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],LinkedIn: Objective 3 Personal Settings
Control Access -- Your privacy Settings ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],LinkedIn: Objective 3 Personal Settings
Groups ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],LinkedIn: Objective 3 Group Sorting
Groups ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],LinkedIn: Objective 3 Privacy practices
Applications ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],LinkedIn: Objective 3 Application Directory  and  Your Applications
Control Access -- Your privacy Settings ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],LinkedIn: Objective 3 Personal Settings
How you appear ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],LinkedIn: Objective 3 Your Public Profile Settings
Retain Control – Wandering information ,[object Object],[object Object],[object Object],[object Object],[object Object],LinkedIn: Objective 3
Your LinkedIn tasks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],LinkedIn: Summary
Social Network:  Google+
Social Network:  Google+ ,[object Object],[object Object],[object Object],[object Object]
Coming Soon... ,[object Object],Google+: Objective 1
Social Network/Microblog:  Twitter
Social Network/Microblog:  Twitter ,[object Object],[object Object],[object Object],[object Object]
Coming Soon... ,[object Object],Twitter: Objective 1
Summary: Be smart ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Best Practice – Your Passwords ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Facebook: Objective 3
FYI – Owning your information ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Facebook: Objective 3
In summary… ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Sources, Additional Reading ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Sources, Additional Reading  (continued) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Extras

Mais conteúdo relacionado

Mais procurados

Cim Social Media Kendal Jan 11
Cim Social Media Kendal Jan 11Cim Social Media Kendal Jan 11
Cim Social Media Kendal Jan 11Jacky York
 
Social Media for Manufacturers
Social Media for ManufacturersSocial Media for Manufacturers
Social Media for ManufacturersWRIS Web Services
 
12 easy steps to becoming a Lead Legend!
12 easy steps to becoming a Lead Legend!12 easy steps to becoming a Lead Legend!
12 easy steps to becoming a Lead Legend!🔵 Ashlee Smith
 
How law Firms can utilize Social Media
How law Firms can utilize Social MediaHow law Firms can utilize Social Media
How law Firms can utilize Social MediaBrayman Construction
 
Social Networking and the Job Search
Social Networking and the Job SearchSocial Networking and the Job Search
Social Networking and the Job SearchDavid Swinney
 
How to-generate-leads-using-linkedin
How to-generate-leads-using-linkedinHow to-generate-leads-using-linkedin
How to-generate-leads-using-linkedinBertrand Lejeune
 
JustCo Lunch & Learn Session with LinkedIn: 7 Steps to improve your LinkedIn ...
JustCo Lunch & Learn Session with LinkedIn: 7 Steps to improve your LinkedIn ...JustCo Lunch & Learn Session with LinkedIn: 7 Steps to improve your LinkedIn ...
JustCo Lunch & Learn Session with LinkedIn: 7 Steps to improve your LinkedIn ...JustCo
 
Kurtosys LinkedIn Training for Advisors
Kurtosys LinkedIn Training for AdvisorsKurtosys LinkedIn Training for Advisors
Kurtosys LinkedIn Training for AdvisorsKurtosys Systems
 
LinkedIn: Networking, generating leads and building authority
LinkedIn: Networking, generating leads and building authorityLinkedIn: Networking, generating leads and building authority
LinkedIn: Networking, generating leads and building authorityRoy Harryman
 
Finding A Job Or Internship Using Social Media
Finding A Job Or Internship Using Social MediaFinding A Job Or Internship Using Social Media
Finding A Job Or Internship Using Social MediaBrayman Construction
 
Benefits Communiucation Using Social Media
Benefits Communiucation Using Social MediaBenefits Communiucation Using Social Media
Benefits Communiucation Using Social MediaBrayman Construction
 
Linkedin to Build a Referral Business
Linkedin to Build a Referral BusinessLinkedin to Build a Referral Business
Linkedin to Build a Referral BusinessBryan Daly
 

Mais procurados (18)

Linked in
Linked inLinked in
Linked in
 
Linked In for Penn Mutual
Linked In for Penn MutualLinked In for Penn Mutual
Linked In for Penn Mutual
 
Google me
Google meGoogle me
Google me
 
Linkedin presentation
Linkedin presentationLinkedin presentation
Linkedin presentation
 
Cim Social Media Kendal Jan 11
Cim Social Media Kendal Jan 11Cim Social Media Kendal Jan 11
Cim Social Media Kendal Jan 11
 
Social Media for Manufacturers
Social Media for ManufacturersSocial Media for Manufacturers
Social Media for Manufacturers
 
12 easy steps to becoming a Lead Legend!
12 easy steps to becoming a Lead Legend!12 easy steps to becoming a Lead Legend!
12 easy steps to becoming a Lead Legend!
 
How law Firms can utilize Social Media
How law Firms can utilize Social MediaHow law Firms can utilize Social Media
How law Firms can utilize Social Media
 
Social Networking and the Job Search
Social Networking and the Job SearchSocial Networking and the Job Search
Social Networking and the Job Search
 
How to-generate-leads-using-linkedin
How to-generate-leads-using-linkedinHow to-generate-leads-using-linkedin
How to-generate-leads-using-linkedin
 
Branding and Social Media
Branding and Social MediaBranding and Social Media
Branding and Social Media
 
JustCo Lunch & Learn Session with LinkedIn: 7 Steps to improve your LinkedIn ...
JustCo Lunch & Learn Session with LinkedIn: 7 Steps to improve your LinkedIn ...JustCo Lunch & Learn Session with LinkedIn: 7 Steps to improve your LinkedIn ...
JustCo Lunch & Learn Session with LinkedIn: 7 Steps to improve your LinkedIn ...
 
Kurtosys LinkedIn Training for Advisors
Kurtosys LinkedIn Training for AdvisorsKurtosys LinkedIn Training for Advisors
Kurtosys LinkedIn Training for Advisors
 
LinkedIn: Networking, generating leads and building authority
LinkedIn: Networking, generating leads and building authorityLinkedIn: Networking, generating leads and building authority
LinkedIn: Networking, generating leads and building authority
 
Finding A Job Or Internship Using Social Media
Finding A Job Or Internship Using Social MediaFinding A Job Or Internship Using Social Media
Finding A Job Or Internship Using Social Media
 
Benefits Communiucation Using Social Media
Benefits Communiucation Using Social MediaBenefits Communiucation Using Social Media
Benefits Communiucation Using Social Media
 
Linkedin to Build a Referral Business
Linkedin to Build a Referral BusinessLinkedin to Build a Referral Business
Linkedin to Build a Referral Business
 
21st Century Networking via Linkedin
21st Century Networking via Linkedin21st Century Networking via Linkedin
21st Century Networking via Linkedin
 

Destaque

Implications of educational technology changes for adult learners
Implications of educational technology changes for adult learnersImplications of educational technology changes for adult learners
Implications of educational technology changes for adult learnersEnglish TVTC
 
Deeper understanding as the key to deepening digital literacy
Deeper understanding as the key to deepening digital literacyDeeper understanding as the key to deepening digital literacy
Deeper understanding as the key to deepening digital literacySarah Horrigan-Fullard
 
ORIC Digital literacy and curriculum design
ORIC Digital literacy and curriculum designORIC Digital literacy and curriculum design
ORIC Digital literacy and curriculum designoricproject
 
Digital literacy for teachers and students
Digital literacy for teachers and studentsDigital literacy for teachers and students
Digital literacy for teachers and studentsAndy Petroski
 
How has technology made changes in different sectors?
How has technology made changes in different sectors?How has technology made changes in different sectors?
How has technology made changes in different sectors?Kristy Yim
 
Breaking the Mould - or how technology changes the way we learn
Breaking the Mould - or how technology changes the way we learnBreaking the Mould - or how technology changes the way we learn
Breaking the Mould - or how technology changes the way we learnHugh Davis
 
Digital literacy in practise
Digital literacy in practiseDigital literacy in practise
Digital literacy in practiseSpecialK13
 
Technology changes
Technology changesTechnology changes
Technology changesgeepatty
 
Digital Literacy - Basic Technical Concepts (Session 1)
Digital Literacy - Basic Technical Concepts (Session 1)Digital Literacy - Basic Technical Concepts (Session 1)
Digital Literacy - Basic Technical Concepts (Session 1)Bill Condo
 
Young Entrepreneur Challenge: 21st Century Skills Map
Young Entrepreneur Challenge: 21st Century Skills MapYoung Entrepreneur Challenge: 21st Century Skills Map
Young Entrepreneur Challenge: 21st Century Skills MapFrank E Pobutkiewicz
 
Digital Literacy | Why it matters
Digital Literacy | Why it mattersDigital Literacy | Why it matters
Digital Literacy | Why it mattersPaul Treadwell
 
Introduction to digital literacy for adult education esol
Introduction to digital literacy for adult education esolIntroduction to digital literacy for adult education esol
Introduction to digital literacy for adult education esolNell Eckersley
 
Digital Literacy
Digital LiteracyDigital Literacy
Digital Literacykellihoward
 
Top 10 Benefits of Digital Literacy
Top 10 Benefits of Digital LiteracyTop 10 Benefits of Digital Literacy
Top 10 Benefits of Digital Literacywebpercent
 
Digital literacy - a new language for disruption
Digital literacy - a new language for disruptionDigital literacy - a new language for disruption
Digital literacy - a new language for disruptionJoyce Hostyn
 

Destaque (19)

Implications of educational technology changes for adult learners
Implications of educational technology changes for adult learnersImplications of educational technology changes for adult learners
Implications of educational technology changes for adult learners
 
Deeper understanding as the key to deepening digital literacy
Deeper understanding as the key to deepening digital literacyDeeper understanding as the key to deepening digital literacy
Deeper understanding as the key to deepening digital literacy
 
ORIC Digital literacy and curriculum design
ORIC Digital literacy and curriculum designORIC Digital literacy and curriculum design
ORIC Digital literacy and curriculum design
 
Digital literacy for teachers and students
Digital literacy for teachers and studentsDigital literacy for teachers and students
Digital literacy for teachers and students
 
How has technology made changes in different sectors?
How has technology made changes in different sectors?How has technology made changes in different sectors?
How has technology made changes in different sectors?
 
Breaking the Mould - or how technology changes the way we learn
Breaking the Mould - or how technology changes the way we learnBreaking the Mould - or how technology changes the way we learn
Breaking the Mould - or how technology changes the way we learn
 
Digital literacy in practise
Digital literacy in practiseDigital literacy in practise
Digital literacy in practise
 
Teaching Digital Literacy
Teaching Digital LiteracyTeaching Digital Literacy
Teaching Digital Literacy
 
Technology changes
Technology changesTechnology changes
Technology changes
 
Digital Literacy - Basic Technical Concepts (Session 1)
Digital Literacy - Basic Technical Concepts (Session 1)Digital Literacy - Basic Technical Concepts (Session 1)
Digital Literacy - Basic Technical Concepts (Session 1)
 
Young Entrepreneur Challenge: 21st Century Skills Map
Young Entrepreneur Challenge: 21st Century Skills MapYoung Entrepreneur Challenge: 21st Century Skills Map
Young Entrepreneur Challenge: 21st Century Skills Map
 
Meeting #1
Meeting #1Meeting #1
Meeting #1
 
Digital Literacy Skills
Digital Literacy SkillsDigital Literacy Skills
Digital Literacy Skills
 
Digital Literacy | Why it matters
Digital Literacy | Why it mattersDigital Literacy | Why it matters
Digital Literacy | Why it matters
 
Introduction to digital literacy for adult education esol
Introduction to digital literacy for adult education esolIntroduction to digital literacy for adult education esol
Introduction to digital literacy for adult education esol
 
Digital Literacy
Digital LiteracyDigital Literacy
Digital Literacy
 
Top 10 Benefits of Digital Literacy
Top 10 Benefits of Digital LiteracyTop 10 Benefits of Digital Literacy
Top 10 Benefits of Digital Literacy
 
Learning2learn
Learning2learnLearning2learn
Learning2learn
 
Digital literacy - a new language for disruption
Digital literacy - a new language for disruptionDigital literacy - a new language for disruption
Digital literacy - a new language for disruption
 

Semelhante a Digital Persona Management For IBMers

Manage your identity - building your reputation & brand while keeping your pr...
Manage your identity - building your reputation & brand while keeping your pr...Manage your identity - building your reputation & brand while keeping your pr...
Manage your identity - building your reputation & brand while keeping your pr...robin fay
 
Socialmediaexaminer.Com Facebook 101 Business Guide | Social Media Exam...
Socialmediaexaminer.Com  Facebook 101  Business  Guide |  Social  Media  Exam...Socialmediaexaminer.Com  Facebook 101  Business  Guide |  Social  Media  Exam...
Socialmediaexaminer.Com Facebook 101 Business Guide | Social Media Exam...atetrainingexpo
 
9criticalsteps protectingyourselfonfacebook
9criticalsteps protectingyourselfonfacebook9criticalsteps protectingyourselfonfacebook
9criticalsteps protectingyourselfonfacebookKevin Sluss
 
Facebook Privacy and Security Guide
Facebook Privacy and Security GuideFacebook Privacy and Security Guide
Facebook Privacy and Security Guide- Mark - Fullbright
 
Embracing Social Media - Presentation and Notes
Embracing Social Media - Presentation and NotesEmbracing Social Media - Presentation and Notes
Embracing Social Media - Presentation and NotesDeirdre Reid
 
Social media
Social mediaSocial media
Social mediacalee1
 
6 ways to stay safe on Facebook: Managing your privacy to thwart identity theft
6 ways to stay safe on Facebook: Managing your privacy to thwart identity theft6 ways to stay safe on Facebook: Managing your privacy to thwart identity theft
6 ways to stay safe on Facebook: Managing your privacy to thwart identity theftSarah M. Smart
 
H.essers linkedin usage guidelines
H.essers   linkedin usage guidelinesH.essers   linkedin usage guidelines
H.essers linkedin usage guidelinesSupport H.Essers
 
Facebook: Career Webinar - The New Way to Network
Facebook: Career Webinar - The New Way to NetworkFacebook: Career Webinar - The New Way to Network
Facebook: Career Webinar - The New Way to NetworkNatascha Saunders
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awarenessKaran Veer Singh
 
LinkedIn Training for Employees: Building Relationships with Influencers and ...
LinkedIn Training for Employees: Building Relationships with Influencers and ...LinkedIn Training for Employees: Building Relationships with Influencers and ...
LinkedIn Training for Employees: Building Relationships with Influencers and ...Brian Crouch
 
How To Be Facebook Friends With The Boss & Keep Your Job
How To Be Facebook Friends With The Boss & Keep Your JobHow To Be Facebook Friends With The Boss & Keep Your Job
How To Be Facebook Friends With The Boss & Keep Your JobAVG Technologies AU
 
Guide to developing social media plan- Ishwar Jha
Guide to developing social media plan- Ishwar JhaGuide to developing social media plan- Ishwar Jha
Guide to developing social media plan- Ishwar JhaGetEvangelized
 
Networking Considerations for Soldiers and Families
Networking Considerations for Soldiers and FamiliesNetworking Considerations for Soldiers and Families
Networking Considerations for Soldiers and FamiliesKelly Anderson
 
Facebook 101 personal usage
Facebook 101 personal usageFacebook 101 personal usage
Facebook 101 personal usageKristi Kirkland
 

Semelhante a Digital Persona Management For IBMers (20)

Manage your identity - building your reputation & brand while keeping your pr...
Manage your identity - building your reputation & brand while keeping your pr...Manage your identity - building your reputation & brand while keeping your pr...
Manage your identity - building your reputation & brand while keeping your pr...
 
Socialmediaexaminer.Com Facebook 101 Business Guide | Social Media Exam...
Socialmediaexaminer.Com  Facebook 101  Business  Guide |  Social  Media  Exam...Socialmediaexaminer.Com  Facebook 101  Business  Guide |  Social  Media  Exam...
Socialmediaexaminer.Com Facebook 101 Business Guide | Social Media Exam...
 
Sns2
Sns2Sns2
Sns2
 
9criticalsteps protectingyourselfonfacebook
9criticalsteps protectingyourselfonfacebook9criticalsteps protectingyourselfonfacebook
9criticalsteps protectingyourselfonfacebook
 
Facebook Privacy and Security Guide
Facebook Privacy and Security GuideFacebook Privacy and Security Guide
Facebook Privacy and Security Guide
 
Embracing Social Media - Presentation and Notes
Embracing Social Media - Presentation and NotesEmbracing Social Media - Presentation and Notes
Embracing Social Media - Presentation and Notes
 
Social media
Social mediaSocial media
Social media
 
6 ways to stay safe on Facebook: Managing your privacy to thwart identity theft
6 ways to stay safe on Facebook: Managing your privacy to thwart identity theft6 ways to stay safe on Facebook: Managing your privacy to thwart identity theft
6 ways to stay safe on Facebook: Managing your privacy to thwart identity theft
 
Social media: Bacon and you
Social media: Bacon and youSocial media: Bacon and you
Social media: Bacon and you
 
H.essers linkedin usage guidelines
H.essers   linkedin usage guidelinesH.essers   linkedin usage guidelines
H.essers linkedin usage guidelines
 
Facebook: Career Webinar - The New Way to Network
Facebook: Career Webinar - The New Way to NetworkFacebook: Career Webinar - The New Way to Network
Facebook: Career Webinar - The New Way to Network
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awareness
 
LinkedIn Training for Employees: Building Relationships with Influencers and ...
LinkedIn Training for Employees: Building Relationships with Influencers and ...LinkedIn Training for Employees: Building Relationships with Influencers and ...
LinkedIn Training for Employees: Building Relationships with Influencers and ...
 
How To Be Facebook Friends With The Boss & Keep Your Job
How To Be Facebook Friends With The Boss & Keep Your JobHow To Be Facebook Friends With The Boss & Keep Your Job
How To Be Facebook Friends With The Boss & Keep Your Job
 
Guide to developing social media plan- Ishwar Jha
Guide to developing social media plan- Ishwar JhaGuide to developing social media plan- Ishwar Jha
Guide to developing social media plan- Ishwar Jha
 
Social Media Insight
Social Media InsightSocial Media Insight
Social Media Insight
 
Taming Facebook
Taming FacebookTaming Facebook
Taming Facebook
 
Networking Considerations for Soldiers and Families
Networking Considerations for Soldiers and FamiliesNetworking Considerations for Soldiers and Families
Networking Considerations for Soldiers and Families
 
Facebook 101 personal usage
Facebook 101 personal usageFacebook 101 personal usage
Facebook 101 personal usage
 
Facebook
FacebookFacebook
Facebook
 

Último

Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 

Último (20)

Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 

Digital Persona Management For IBMers

  • 1. Digital Persona Management for IBMers Joshua Scribner Social Software Advocate IBM SWG, BlueIQ [email_address] @joshscribner Version 2.3, Updated: 8 February 2012
  • 2.
  • 3.
  • 4. A Facebook dramatization… … I apologize in advance for the crude language. http://www.youtube.com/v/LrFdOz1Mj8Q This video gives you an idea of the Facebook dilemma:
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11. Social Network: Facebook
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34. Share Smart – Your Wall When you post to your wall, or cause a status message to appear on your wall, you will usually have the option to decide which Friend Lists can see it. You should always check to see who you are sharing with. This is an important control point in maintaining your privacy and control of your information. If you do not want your friends to share what you have posted, either explicitly inform them (or reconsider sharing it on the internet). On the next slide, we'll discuss setting default Friend Lists for these posts. Facebook: Objective 3 These are my recommendations for these settings. It is up to you to decide if the advice fits the way you want to use Facebook and if it complies with IBM’s Business Conduct Guidelines as they apply to you.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46. Lock it down - App private info access Look carefully at the Required items from an App. Click "See More" to examine exactly what content it wants to be able to see -- and share -- outside of your control. Here are the categories it may ask for: This refers to content I've made public, not information I've restricted. It's generally OK. This item is very worrisome; for example I do not want my birthday, religion, or politics shared. Consider removing Apps that require this; remove this item if it is optional. An App should not require this information, and you should not be required to share it. Consider removing Apps that require this; remove this item if it is optional. Facebook: Objective 3 These are my recommendations for these settings. It is up to you to decide if the advice fits the way you want to use Facebook and if it complies with IBM’s Business Conduct Guidelines as they apply to you.
  • 47. Lock it down - App private info access (continued - part 2) Categories an App may ask for: Your photos and videos may say a lot about you, and should not be accessed by an App as it may not adhere to the visibility restrictions you've set for the content. You don't need an App that reports on your whereabouts and Online Presence. It's not good for IBM, nor for your personal security. Many Apps want to see information about the people in your network. While unappealing that Apps do this, members of your network can restrict the shared information by editing "How people bring their info into apps you use" in the "Apps and Websites" are of their Privacy Settings. It is up to you if you want to expose your network to this potential information gathering activity. Facebook: Objective 3 These are my recommendations for these settings. It is up to you to decide if the advice fits the way you want to use Facebook and if it complies with IBM’s Business Conduct Guidelines as they apply to you.
  • 48. Lock it down - App private info access (continued - part 3) Advice on making App privacy decisions Tip: If an App on your list requires a lot of personal information, remove it and re-add it. Beyond your Basic Information, an app must request to access each additional category of content. This will remove any data for the App, but may be worth it if the private information it accesses has quietly been increased. Advice: Most Apps will require a few of those information items that you deem too sensitive. You can remove them all, if you like. Alternatively, you should consider the risk of that information getting out with the trustworthiness of the App's creator. You should also consider whether you think a well intentioned App function will accidentally share your information (i.e. " Find your birthday buddies!" or "See who else visits this coffee shop") Limitation: Friend Lists do not apply to an Apps' level of access to your personal information. While you can restrict who can see the posts an App makes, you can't granularly restrict an App's access to data within a category. Facebook: Objective 3 These are my recommendations for these settings. It is up to you to decide if the advice fits the way you want to use Facebook and if it complies with IBM’s Business Conduct Guidelines as they apply to you.
  • 49.
  • 50.
  • 51.
  • 52. Social Network: LinkedIn
  • 53.
  • 54.
  • 55.
  • 56.
  • 57.
  • 58.
  • 59.
  • 60.
  • 61.
  • 62.
  • 63.
  • 64.
  • 65.
  • 66.
  • 67.
  • 68.
  • 69.
  • 70.
  • 71.
  • 72.
  • 73.
  • 74. Social Network: Google+
  • 75.
  • 76.
  • 78.
  • 79.
  • 80.
  • 81.
  • 82.
  • 83.
  • 84.
  • 85.

Notas do Editor

  1. Presenter: Slide 4 contains a link to a video with some inappropriate, albeit humorous, language. Consider whether it should be included in your presentation. 10 Jan 2012 -- entirely reworked the Facebook section, added a new Summary section, content for LinkedIn, Google+ and Twitter are coming shortly.
  2. Your “Networks” are groups of people whom you may not have friended, but are associated with you because of where you live, whom you work for, or the schools you went to (for example).