SlideShare una empresa de Scribd logo
1 de 46
Are you feeling lucky?
Your digital Identity
Kirsten Thompson
Twitter @iamKirstenT | K.Thompson@adm.leeds.ac.uk
Going Social
This workshop provides an introduction to
managing your digital identity, taking account of
University guidance. It is not intended that the
workshop will focus on how to use any specific
platforms or websites; instead the focus will
concentrate on evaluating current practice,
reflecting and planning.
About
By the end of the session you should be better able to:
1. Identify what contributes to your digital identity
2. Recognise the key issues relating to digital identity
management and public digital communications
including; conduct, privacy, security and personal safety
3. Recognise the benefits and challenges of managing
personal and professional digital identities
4. Review and manage your digital identity
Outcomes
1. Digital identities
2. Risks
3. Review + manage your digital identity
Outline
1. Digital Identities
Digital identity is…
…the network or Internet
equivalent to the real identity
of a person or entity (like a
business or government
agency) when used for
identification in connections or
transactions from PCs, cell
phones or other personal
devices.
(Last accessed 11/09/17 at: https://www.justaskgemalto.com/en/what-is-
digital-identity/)
Some more definitions…
Digital footprint
Everything you post about yourself online.
Digital shadows
The items other people post about you.
Digital legacy / Digital stamp
A permanent collection and culmination of your
digital footprints and digital shadows.
Erik Qualman, What Happens In Vegas Stays On YouTube – PRIVACY is DEAD.
The NEW rules for business, personal, and family reputation.
Your digital identity =
everything about you
on the web
Verified / non-verified
– both important
Creating an
account on the
social web is a
choice.
Having a digital
identity is not.
We all have a
digital footprint /
stamp.
Who
manages
your digital
identity?
Some
examples…
This was posted on Twitter during a
conference presentation #NoEscape
Your connections…
I ended up on
Snapchat during
a conference…so
I put it on
Facebook, to
make a point.
You?
Some companies
create profiles for
us using public
information on the
web (web
harvesting/
scraping) =
inaccurate and
merging identities.
Businesses…
Gov’t…
Hackers…
Last accessed 11/09/17 at: http://www.npr.org/sections/thetwo-
way/2017/09/07/549296359/hackers-accessed-the-personal-data-
of-143-million-people-equifax-says
The Wayback Machine
- archived over 332 billion web pages
from 1996 – think about the
implications for your digital footprint
How could you use the Wayback
Machine?
http://archive.org/web/web.php
What will you find?
Are you feeling lucky?
You can
manage your
digital identity,
you cannot
control it
2. Risks
What else are you +
your connections
sharing?
1. Over-sharing personal information
2. Location services
3. Social media privacy
4. Facebook ‘friends’?
5. Mobile contacts: are you
unknowingly sharing your
online/active time? e.g. WhatsApp
6. Mobile + email contacts: sharing
THEIR data with third parties?
7. Mobile + device security
8. Internet activity
9. WHOIS database
Using Email
Do you use the same e-mail address to manage all
your social media + other accounts (utilities,
subscription services, shopping etc.)?
Are you merging personal, professional + institutional
social profiles?
Follow-up activity
Start collating your online + social media A/Cs + the
email addresses associated with them. Consider
using a password manager to securely store the data.
"Insta-bragging“
28 July 2017
…posting boastful images of your
holiday on photograph app Instagram
[or any other platform] –
could invalidate a contents insurance
policy.
…insurers include a "reasonable care"
clause which, although generally
related to making sure windows and
doors are locked, could in future extend
to being responsible with what you
share on social media.
Last accessed 09/11/17 at: http://www.telegraph.co.uk/money/consumer-
affairs/insta-bragging-could-soon-invalidate-insurance
Fraud / ID theft
Performance crime
IP / copyright theft +
license breaches
Data breaches
Hacking, malware,
ransomware, viruses
Phishing
Harassment:
Impersonation
Cyberstalking
Trolling
Revenge porn
Sextortion
Doxing (collating +
elevating your
personal info)
Dogpiling
(organised group
attack to
encourage you to
retract your
opinion)
Hate speech
Catfishing
Cyberbullying
Who do you trust?
https://youtu.be/1xp4M0IjzcQ
How easy is it to steal your ID?
https://youtu.be/Rn4Rupla11M
Sextortion
https://youtu.be/kgKIZjzoLLQ
http://nationalcrimeagency.gov.uk/sextortion
Fraud
With almost 1 in every 2
crimes a fraud or
cybercrime*, individuals are
more likely to be a victim of
this crime than any other.
* The Office of National Statistics (ONS)
Crime Survey of England and Wales now
estimates that fraud and cybercrime
now account for almost six million
offences.
https://cifas.org.uk/insight/reports-trends/fraudscape-report-2018
Fraudscape 2018 report findings
https://youtu.be/2y6FS-nnzVI
When things
go wrong on
social media…
some
examples
All the compromised accounts were attacked through their use
of a popular third-party analytics service, Twitter Counter.
https://www.theguardian.com/technology/2017/mar/15/twitter-
turkey-accounts-hack-tweet-swastikas-pro-erdogan
Case: Lord McAlpine falsely accused
Alleged offence: Libel
Case: Twitter users name victim of (alleged) rape
by footballer Ched Evans (later found not guilty)
Offence: The Sexual Offences (Amendment) Act
1992
Case: Social media users circulated alleged
pictures of child killer Jon Venables
Alleged offence: Contempt of Court
http://www.bbc.co.uk/news/magazine-20782257
3. Review +
manage
your digital
identity
What can YOU do to
manage + protect
yourself online?
Start thinking like a search engine –
be the top of your own search
results.
Use Google Alerts
to keep updated on
what others are
saying about you
(personally, your
work, project etc.)
on the web. It won’t
search everything,
but can assist in
managing your
digital identity.
Consider…
• Fragment your digital ID: use multiple email A/Cs
• Consciously share online
• Review + cull existing online accounts (email, social + other)
• Cull your Facebook friends or limit their access
• Beef up your security: strong + unique passwords (+ change
them), 2 factor authentication + use a password manager
• Unsolicited communications + links (if in doubt, don’t click it)
• Know how to get help (info in the handout I will email you)
Also consider…
• Check + monitor your privacy settings, browser settings,
online data, terms + privacy of apps + platforms
• Internet security: use private networks + VPNs
• Device security: automatic updates, anti-virus, anti-malware,
back-ups, remote wipe lost/stolen devices, lock screens,
take care of data + belongings in offices
• Report + block offensive behaviour (Paladin advise against
blocking stalkers - electronic communications = evidence)
• Get advice from IT, police + specialist orgs if you’re a victim
of cybercrime
https://actionfraud.police.uk/report_phishing
Report scams…
https://haveibeenpwned.com
Have you been pwned?
https://www.friendsagainstscams.org.uk
Join Friends Against Scams
http://it.leeds.ac.uk/security
Keep updated
http://it.leeds.ac.uk
https://www.sdduonline.leeds.ac.
uk/socialmedia
http://www.legislation.gov.uk
www.thatsnonsense.com
https://www.getsafeonline.org
http://www.hoax-slayer.net

Más contenido relacionado

La actualidad más candente

Online Privacy in the Year of the Dragon
Online Privacy in the Year of the DragonOnline Privacy in the Year of the Dragon
Online Privacy in the Year of the DragonPhil Cryer
 
20110427 ARMA Houston Keynote Records Management 2.0
20110427 ARMA Houston Keynote Records Management 2.020110427 ARMA Houston Keynote Records Management 2.0
20110427 ARMA Houston Keynote Records Management 2.0Jesse Wilkins
 
2013 april boston marathon fraud advisory wp 2 x
2013 april boston marathon fraud advisory wp  2 x2013 april boston marathon fraud advisory wp  2 x
2013 april boston marathon fraud advisory wp 2 xLiberteks
 
Chapter 8 big data and privacy - social media 3533
Chapter 8  big data and privacy - social media 3533Chapter 8  big data and privacy - social media 3533
Chapter 8 big data and privacy - social media 3533Hubbamar
 
Safe use of cloud - alternative cloud
Safe use of cloud - alternative cloudSafe use of cloud - alternative cloud
Safe use of cloud - alternative cloudTomppa Järvinen
 
Ip issues in social media
Ip issues in social mediaIp issues in social media
Ip issues in social mediaAltacit Global
 
What if Petraeus Was a Hacker?
What if Petraeus Was a Hacker?What if Petraeus Was a Hacker?
What if Petraeus Was a Hacker?Phil Cryer
 
Breakfast Briefings - February 2018
Breakfast Briefings - February 2018Breakfast Briefings - February 2018
Breakfast Briefings - February 2018PKF Francis Clark
 
Is your data secure? privacy and trust in the social web
Is your data secure?  privacy and trust in the social webIs your data secure?  privacy and trust in the social web
Is your data secure? privacy and trust in the social webPhil Cryer
 
finance and accounting
finance and accountingfinance and accounting
finance and accountingHamza Cheema
 
Online Privacy
Online PrivacyOnline Privacy
Online PrivacyIWMW
 
Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentationmlw32785
 
Crowdsourcing & ethics: a few thoughts and refences.
Crowdsourcing & ethics: a few thoughts and refences. Crowdsourcing & ethics: a few thoughts and refences.
Crowdsourcing & ethics: a few thoughts and refences. Matthew Lease
 
Social Media and the Law: #SMI12
Social Media and the Law: #SMI12 Social Media and the Law: #SMI12
Social Media and the Law: #SMI12 Sustainly
 
Social network privacy.
Social network privacy.Social network privacy.
Social network privacy.Yury Chemerkin
 
CSUN - Youth Driven Information Privacy Education Campaign
CSUN - Youth Driven Information Privacy Education CampaignCSUN - Youth Driven Information Privacy Education Campaign
CSUN - Youth Driven Information Privacy Education CampaignKimberly Gonzalez
 

La actualidad más candente (20)

Online Privacy in the Year of the Dragon
Online Privacy in the Year of the DragonOnline Privacy in the Year of the Dragon
Online Privacy in the Year of the Dragon
 
20110427 ARMA Houston Keynote Records Management 2.0
20110427 ARMA Houston Keynote Records Management 2.020110427 ARMA Houston Keynote Records Management 2.0
20110427 ARMA Houston Keynote Records Management 2.0
 
2013 april boston marathon fraud advisory wp 2 x
2013 april boston marathon fraud advisory wp  2 x2013 april boston marathon fraud advisory wp  2 x
2013 april boston marathon fraud advisory wp 2 x
 
Chapter 8 big data and privacy - social media 3533
Chapter 8  big data and privacy - social media 3533Chapter 8  big data and privacy - social media 3533
Chapter 8 big data and privacy - social media 3533
 
Safe use of cloud - alternative cloud
Safe use of cloud - alternative cloudSafe use of cloud - alternative cloud
Safe use of cloud - alternative cloud
 
Ip issues in social media
Ip issues in social mediaIp issues in social media
Ip issues in social media
 
What if Petraeus Was a Hacker?
What if Petraeus Was a Hacker?What if Petraeus Was a Hacker?
What if Petraeus Was a Hacker?
 
Breakfast Briefings - February 2018
Breakfast Briefings - February 2018Breakfast Briefings - February 2018
Breakfast Briefings - February 2018
 
Is your data secure? privacy and trust in the social web
Is your data secure?  privacy and trust in the social webIs your data secure?  privacy and trust in the social web
Is your data secure? privacy and trust in the social web
 
finance and accounting
finance and accountingfinance and accounting
finance and accounting
 
Online Privacy
Online PrivacyOnline Privacy
Online Privacy
 
Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentation
 
Crowdsourcing & ethics: a few thoughts and refences.
Crowdsourcing & ethics: a few thoughts and refences. Crowdsourcing & ethics: a few thoughts and refences.
Crowdsourcing & ethics: a few thoughts and refences.
 
Social Media and the Law: #SMI12
Social Media and the Law: #SMI12 Social Media and the Law: #SMI12
Social Media and the Law: #SMI12
 
Social network privacy.
Social network privacy.Social network privacy.
Social network privacy.
 
CSUN - Youth Driven Information Privacy Education Campaign
CSUN - Youth Driven Information Privacy Education CampaignCSUN - Youth Driven Information Privacy Education Campaign
CSUN - Youth Driven Information Privacy Education Campaign
 
Cie 2 cyber law
Cie 2  cyber lawCie 2  cyber law
Cie 2 cyber law
 
Cybercrime blog
Cybercrime blogCybercrime blog
Cybercrime blog
 
Cybercriminals Are Lurking
Cybercriminals Are LurkingCybercriminals Are Lurking
Cybercriminals Are Lurking
 
Exposing the Hidden Web
Exposing the Hidden WebExposing the Hidden Web
Exposing the Hidden Web
 

Similar a Manage Your Digital Identity

Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Kirsten Thompson
 
The downfall to_computers_in_the_21st_century
The downfall to_computers_in_the_21st_centuryThe downfall to_computers_in_the_21st_century
The downfall to_computers_in_the_21st_centurygracestearns
 
The downfall to_computers_in_the_21st_century
The downfall to_computers_in_the_21st_centuryThe downfall to_computers_in_the_21st_century
The downfall to_computers_in_the_21st_centurygracestearns
 
How to safe online (presented by abhinav pathak)
How to safe online (presented by  abhinav pathak)How to safe online (presented by  abhinav pathak)
How to safe online (presented by abhinav pathak)Abhinav Pathak
 
week 1 Day 2 Power of Media and Information Literacy.pptx
week 1 Day 2 Power of Media and Information Literacy.pptxweek 1 Day 2 Power of Media and Information Literacy.pptx
week 1 Day 2 Power of Media and Information Literacy.pptxdanielloberiz1
 
The Web We Want: Dealing with the dark side of social media (work in progress)
The Web We Want: Dealing with the dark side of social media (work in progress)The Web We Want: Dealing with the dark side of social media (work in progress)
The Web We Want: Dealing with the dark side of social media (work in progress)Michael Edson
 
Presentation networking
Presentation networkingPresentation networking
Presentation networkingAmmara Malik
 
A research of software vulnerabilities
A research of software vulnerabilitiesA research of software vulnerabilities
A research of software vulnerabilitiesAlireza Aghamohammadi
 
Ict information communication technology
Ict  information communication technologyIct  information communication technology
Ict information communication technologyniniogolo
 
The Privacy Illusion
The Privacy IllusionThe Privacy Illusion
The Privacy IllusionMary Aviles
 
Data privacy over internet
Data privacy over internetData privacy over internet
Data privacy over internetdevashishicai
 
Privacy in the digital era
Privacy in the digital eraPrivacy in the digital era
Privacy in the digital eraCHEMISTRY AGENCY
 
Social Media And The Law 2 23 10
Social Media And The Law 2 23 10Social Media And The Law 2 23 10
Social Media And The Law 2 23 10lindseymgift
 
CORMA-FW REPRINT-APR2015
CORMA-FW REPRINT-APR2015CORMA-FW REPRINT-APR2015
CORMA-FW REPRINT-APR2015Jörn Weber
 
proofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paperproofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paperKen Spencer Brown
 

Similar a Manage Your Digital Identity (20)

Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?
 
What is cyber fraud?
What is cyber fraud?What is cyber fraud?
What is cyber fraud?
 
The downfall to_computers_in_the_21st_century
The downfall to_computers_in_the_21st_centuryThe downfall to_computers_in_the_21st_century
The downfall to_computers_in_the_21st_century
 
The downfall to_computers_in_the_21st_century
The downfall to_computers_in_the_21st_centuryThe downfall to_computers_in_the_21st_century
The downfall to_computers_in_the_21st_century
 
How to safe online (presented by abhinav pathak)
How to safe online (presented by  abhinav pathak)How to safe online (presented by  abhinav pathak)
How to safe online (presented by abhinav pathak)
 
Users guide
Users guideUsers guide
Users guide
 
week 1 Day 2 Power of Media and Information Literacy.pptx
week 1 Day 2 Power of Media and Information Literacy.pptxweek 1 Day 2 Power of Media and Information Literacy.pptx
week 1 Day 2 Power of Media and Information Literacy.pptx
 
The Web We Want: Dealing with the dark side of social media (work in progress)
The Web We Want: Dealing with the dark side of social media (work in progress)The Web We Want: Dealing with the dark side of social media (work in progress)
The Web We Want: Dealing with the dark side of social media (work in progress)
 
Presentation networking
Presentation networkingPresentation networking
Presentation networking
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
A research of software vulnerabilities
A research of software vulnerabilitiesA research of software vulnerabilities
A research of software vulnerabilities
 
Ict information communication technology
Ict  information communication technologyIct  information communication technology
Ict information communication technology
 
The Privacy Illusion
The Privacy IllusionThe Privacy Illusion
The Privacy Illusion
 
Data privacy over internet
Data privacy over internetData privacy over internet
Data privacy over internet
 
Privacy in the digital era
Privacy in the digital eraPrivacy in the digital era
Privacy in the digital era
 
Social Media And The Law 2 23 10
Social Media And The Law 2 23 10Social Media And The Law 2 23 10
Social Media And The Law 2 23 10
 
CORMA-FW REPRINT-APR2015
CORMA-FW REPRINT-APR2015CORMA-FW REPRINT-APR2015
CORMA-FW REPRINT-APR2015
 
PP Lec9n10 Sp2020.pptx
PP Lec9n10 Sp2020.pptxPP Lec9n10 Sp2020.pptx
PP Lec9n10 Sp2020.pptx
 
proofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paperproofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paper
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacy
 

Más de Kirsten Thompson

Your Social Media Strategy
Your Social Media Strategy Your Social Media Strategy
Your Social Media Strategy Kirsten Thompson
 
Learning Technologists' Network Re-launch Nov 2019
Learning Technologists' Network Re-launch Nov 2019Learning Technologists' Network Re-launch Nov 2019
Learning Technologists' Network Re-launch Nov 2019Kirsten Thompson
 
Inclusive Teaching @ Leeds
Inclusive Teaching @ LeedsInclusive Teaching @ Leeds
Inclusive Teaching @ LeedsKirsten Thompson
 
Collaborating with services outside the Library: Enhancing experience and bui...
Collaborating with services outside the Library: Enhancing experience and bui...Collaborating with services outside the Library: Enhancing experience and bui...
Collaborating with services outside the Library: Enhancing experience and bui...Kirsten Thompson
 
Everyday Inclusion in Everyday Teaching (TELFest edition)
Everyday Inclusion in Everyday Teaching (TELFest edition)Everyday Inclusion in Everyday Teaching (TELFest edition)
Everyday Inclusion in Everyday Teaching (TELFest edition)Kirsten Thompson
 
Using Social Media to Promote Your Research (Translate MedTech edition)
Using Social Media to Promote Your Research (Translate MedTech edition)Using Social Media to Promote Your Research (Translate MedTech edition)
Using Social Media to Promote Your Research (Translate MedTech edition)Kirsten Thompson
 
7 steps: social media strategy for Innovation Lab Schools' Ambassadors
7 steps: social media strategy for Innovation Lab Schools' Ambassadors7 steps: social media strategy for Innovation Lab Schools' Ambassadors
7 steps: social media strategy for Innovation Lab Schools' AmbassadorsKirsten Thompson
 
The role of the Patient Research Ambassador
The role of the Patient Research AmbassadorThe role of the Patient Research Ambassador
The role of the Patient Research AmbassadorKirsten Thompson
 
The challenges and benefits of using digital to engage people in research
The challenges and benefits of using digital to engage people in researchThe challenges and benefits of using digital to engage people in research
The challenges and benefits of using digital to engage people in researchKirsten Thompson
 
Quick wins for designing and teaching inclusively - helping you meet the Base...
Quick wins for designing and teaching inclusively - helping you meet the Base...Quick wins for designing and teaching inclusively - helping you meet the Base...
Quick wins for designing and teaching inclusively - helping you meet the Base...Kirsten Thompson
 
Public engagement while you sleep
Public engagement while you sleep Public engagement while you sleep
Public engagement while you sleep Kirsten Thompson
 
Social media for researchers #OpenResLeeds2018
Social media for researchers #OpenResLeeds2018Social media for researchers #OpenResLeeds2018
Social media for researchers #OpenResLeeds2018Kirsten Thompson
 
Introduction to Tests, Surveys and Pools
Introduction to Tests, Surveys and PoolsIntroduction to Tests, Surveys and Pools
Introduction to Tests, Surveys and PoolsKirsten Thompson
 
Introduction to setting up the Discussion Board
Introduction to setting up the Discussion BoardIntroduction to setting up the Discussion Board
Introduction to setting up the Discussion BoardKirsten Thompson
 
Introduction to Sending Email
Introduction to Sending EmailIntroduction to Sending Email
Introduction to Sending EmailKirsten Thompson
 
Introduction to Communicating with Announcements
Introduction to Communicating with AnnouncementsIntroduction to Communicating with Announcements
Introduction to Communicating with AnnouncementsKirsten Thompson
 
Introduction to Copying and Moving Content
Introduction to Copying and Moving ContentIntroduction to Copying and Moving Content
Introduction to Copying and Moving ContentKirsten Thompson
 
Introduction to Embedding Content
Introduction to Embedding ContentIntroduction to Embedding Content
Introduction to Embedding ContentKirsten Thompson
 
Introduction to Adding Content
Introduction to Adding ContentIntroduction to Adding Content
Introduction to Adding ContentKirsten Thompson
 

Más de Kirsten Thompson (20)

Your Social Media Strategy
Your Social Media Strategy Your Social Media Strategy
Your Social Media Strategy
 
Learning Technologists' Network Re-launch Nov 2019
Learning Technologists' Network Re-launch Nov 2019Learning Technologists' Network Re-launch Nov 2019
Learning Technologists' Network Re-launch Nov 2019
 
Inclusive Teaching @ Leeds
Inclusive Teaching @ LeedsInclusive Teaching @ Leeds
Inclusive Teaching @ Leeds
 
Collaborating with services outside the Library: Enhancing experience and bui...
Collaborating with services outside the Library: Enhancing experience and bui...Collaborating with services outside the Library: Enhancing experience and bui...
Collaborating with services outside the Library: Enhancing experience and bui...
 
Everyday Inclusion in Everyday Teaching (TELFest edition)
Everyday Inclusion in Everyday Teaching (TELFest edition)Everyday Inclusion in Everyday Teaching (TELFest edition)
Everyday Inclusion in Everyday Teaching (TELFest edition)
 
Using Social Media to Promote Your Research (Translate MedTech edition)
Using Social Media to Promote Your Research (Translate MedTech edition)Using Social Media to Promote Your Research (Translate MedTech edition)
Using Social Media to Promote Your Research (Translate MedTech edition)
 
Creating Digital Content
Creating Digital ContentCreating Digital Content
Creating Digital Content
 
7 steps: social media strategy for Innovation Lab Schools' Ambassadors
7 steps: social media strategy for Innovation Lab Schools' Ambassadors7 steps: social media strategy for Innovation Lab Schools' Ambassadors
7 steps: social media strategy for Innovation Lab Schools' Ambassadors
 
The role of the Patient Research Ambassador
The role of the Patient Research AmbassadorThe role of the Patient Research Ambassador
The role of the Patient Research Ambassador
 
The challenges and benefits of using digital to engage people in research
The challenges and benefits of using digital to engage people in researchThe challenges and benefits of using digital to engage people in research
The challenges and benefits of using digital to engage people in research
 
Quick wins for designing and teaching inclusively - helping you meet the Base...
Quick wins for designing and teaching inclusively - helping you meet the Base...Quick wins for designing and teaching inclusively - helping you meet the Base...
Quick wins for designing and teaching inclusively - helping you meet the Base...
 
Public engagement while you sleep
Public engagement while you sleep Public engagement while you sleep
Public engagement while you sleep
 
Social media for researchers #OpenResLeeds2018
Social media for researchers #OpenResLeeds2018Social media for researchers #OpenResLeeds2018
Social media for researchers #OpenResLeeds2018
 
Introduction to Tests, Surveys and Pools
Introduction to Tests, Surveys and PoolsIntroduction to Tests, Surveys and Pools
Introduction to Tests, Surveys and Pools
 
Introduction to setting up the Discussion Board
Introduction to setting up the Discussion BoardIntroduction to setting up the Discussion Board
Introduction to setting up the Discussion Board
 
Introduction to Sending Email
Introduction to Sending EmailIntroduction to Sending Email
Introduction to Sending Email
 
Introduction to Communicating with Announcements
Introduction to Communicating with AnnouncementsIntroduction to Communicating with Announcements
Introduction to Communicating with Announcements
 
Introduction to Copying and Moving Content
Introduction to Copying and Moving ContentIntroduction to Copying and Moving Content
Introduction to Copying and Moving Content
 
Introduction to Embedding Content
Introduction to Embedding ContentIntroduction to Embedding Content
Introduction to Embedding Content
 
Introduction to Adding Content
Introduction to Adding ContentIntroduction to Adding Content
Introduction to Adding Content
 

Último

Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)cama23
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxPoojaSen20
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
FILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinoFILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinojohnmickonozaleda
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 

Último (20)

LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
FILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinoFILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipino
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 

Manage Your Digital Identity

  • 1. Are you feeling lucky? Your digital Identity Kirsten Thompson Twitter @iamKirstenT | K.Thompson@adm.leeds.ac.uk Going Social
  • 2. This workshop provides an introduction to managing your digital identity, taking account of University guidance. It is not intended that the workshop will focus on how to use any specific platforms or websites; instead the focus will concentrate on evaluating current practice, reflecting and planning. About
  • 3. By the end of the session you should be better able to: 1. Identify what contributes to your digital identity 2. Recognise the key issues relating to digital identity management and public digital communications including; conduct, privacy, security and personal safety 3. Recognise the benefits and challenges of managing personal and professional digital identities 4. Review and manage your digital identity Outcomes
  • 4. 1. Digital identities 2. Risks 3. Review + manage your digital identity Outline
  • 6. Digital identity is… …the network or Internet equivalent to the real identity of a person or entity (like a business or government agency) when used for identification in connections or transactions from PCs, cell phones or other personal devices. (Last accessed 11/09/17 at: https://www.justaskgemalto.com/en/what-is- digital-identity/)
  • 7. Some more definitions… Digital footprint Everything you post about yourself online. Digital shadows The items other people post about you. Digital legacy / Digital stamp A permanent collection and culmination of your digital footprints and digital shadows. Erik Qualman, What Happens In Vegas Stays On YouTube – PRIVACY is DEAD. The NEW rules for business, personal, and family reputation.
  • 8. Your digital identity = everything about you on the web Verified / non-verified – both important
  • 9. Creating an account on the social web is a choice. Having a digital identity is not. We all have a digital footprint / stamp.
  • 11. This was posted on Twitter during a conference presentation #NoEscape Your connections…
  • 12. I ended up on Snapchat during a conference…so I put it on Facebook, to make a point. You?
  • 13. Some companies create profiles for us using public information on the web (web harvesting/ scraping) = inaccurate and merging identities. Businesses…
  • 15. Hackers… Last accessed 11/09/17 at: http://www.npr.org/sections/thetwo- way/2017/09/07/549296359/hackers-accessed-the-personal-data- of-143-million-people-equifax-says
  • 16. The Wayback Machine - archived over 332 billion web pages from 1996 – think about the implications for your digital footprint How could you use the Wayback Machine? http://archive.org/web/web.php
  • 17. What will you find?
  • 18. Are you feeling lucky?
  • 19. You can manage your digital identity, you cannot control it
  • 21. What else are you + your connections sharing? 1. Over-sharing personal information 2. Location services 3. Social media privacy 4. Facebook ‘friends’? 5. Mobile contacts: are you unknowingly sharing your online/active time? e.g. WhatsApp 6. Mobile + email contacts: sharing THEIR data with third parties? 7. Mobile + device security 8. Internet activity 9. WHOIS database
  • 22. Using Email Do you use the same e-mail address to manage all your social media + other accounts (utilities, subscription services, shopping etc.)? Are you merging personal, professional + institutional social profiles? Follow-up activity Start collating your online + social media A/Cs + the email addresses associated with them. Consider using a password manager to securely store the data.
  • 23. "Insta-bragging“ 28 July 2017 …posting boastful images of your holiday on photograph app Instagram [or any other platform] – could invalidate a contents insurance policy. …insurers include a "reasonable care" clause which, although generally related to making sure windows and doors are locked, could in future extend to being responsible with what you share on social media. Last accessed 09/11/17 at: http://www.telegraph.co.uk/money/consumer- affairs/insta-bragging-could-soon-invalidate-insurance
  • 24. Fraud / ID theft Performance crime IP / copyright theft + license breaches Data breaches Hacking, malware, ransomware, viruses Phishing Harassment: Impersonation Cyberstalking Trolling Revenge porn Sextortion Doxing (collating + elevating your personal info) Dogpiling (organised group attack to encourage you to retract your opinion) Hate speech Catfishing Cyberbullying
  • 25. Who do you trust? https://youtu.be/1xp4M0IjzcQ
  • 26. How easy is it to steal your ID? https://youtu.be/Rn4Rupla11M
  • 28. Fraud With almost 1 in every 2 crimes a fraud or cybercrime*, individuals are more likely to be a victim of this crime than any other. * The Office of National Statistics (ONS) Crime Survey of England and Wales now estimates that fraud and cybercrime now account for almost six million offences. https://cifas.org.uk/insight/reports-trends/fraudscape-report-2018
  • 29. Fraudscape 2018 report findings https://youtu.be/2y6FS-nnzVI
  • 30. When things go wrong on social media… some examples
  • 31.
  • 32.
  • 33.
  • 34. All the compromised accounts were attacked through their use of a popular third-party analytics service, Twitter Counter. https://www.theguardian.com/technology/2017/mar/15/twitter- turkey-accounts-hack-tweet-swastikas-pro-erdogan
  • 35. Case: Lord McAlpine falsely accused Alleged offence: Libel Case: Twitter users name victim of (alleged) rape by footballer Ched Evans (later found not guilty) Offence: The Sexual Offences (Amendment) Act 1992 Case: Social media users circulated alleged pictures of child killer Jon Venables Alleged offence: Contempt of Court http://www.bbc.co.uk/news/magazine-20782257
  • 36. 3. Review + manage your digital identity
  • 37. What can YOU do to manage + protect yourself online?
  • 38. Start thinking like a search engine – be the top of your own search results.
  • 39. Use Google Alerts to keep updated on what others are saying about you (personally, your work, project etc.) on the web. It won’t search everything, but can assist in managing your digital identity.
  • 40. Consider… • Fragment your digital ID: use multiple email A/Cs • Consciously share online • Review + cull existing online accounts (email, social + other) • Cull your Facebook friends or limit their access • Beef up your security: strong + unique passwords (+ change them), 2 factor authentication + use a password manager • Unsolicited communications + links (if in doubt, don’t click it) • Know how to get help (info in the handout I will email you)
  • 41. Also consider… • Check + monitor your privacy settings, browser settings, online data, terms + privacy of apps + platforms • Internet security: use private networks + VPNs • Device security: automatic updates, anti-virus, anti-malware, back-ups, remote wipe lost/stolen devices, lock screens, take care of data + belongings in offices • Report + block offensive behaviour (Paladin advise against blocking stalkers - electronic communications = evidence) • Get advice from IT, police + specialist orgs if you’re a victim of cybercrime