0% found this document useful (0 votes)
22 views25 pages

Wwwwmodule 12D - Your Digital Life

Uploaded by

Kaisura
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views25 pages

Wwwwmodule 12D - Your Digital Life

Uploaded by

Kaisura
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 25

Module 9D

G-LITE1 – Living in the IT Era


1ST Semester, SY 2022 - 2023

YOUR DIGITAL LIFE


Lesson Objectives
• Describe the purpose of blogs, forums, and wikis
• Understand the function of social media networks and how
they work
• Understand the difference between open and closed social
networks
• Describe how to use LinkedIn
• Describe what constitutes your digital identity
• Understand the importance of maintaining a good digital
identity
• Explain how to avoid cyber bullying
• Understand the health risks that arise from prolonged
computing

2
We Are Social Beings

• How Do We Share Information?


• Computer bulletin board systems (BBS) were the pre-cursors of
modern posting platforms, including
• Blogs
• Forums
• Wikis

3
Social Media Networks

• A social media network is a dedicated web site that enables


users to communicate with one another
• Users can post information,
comment on other people’s
posts, upload pictures and
videos, play games, send email
messages or engage in online
chats with one another
• You join a social media site to
connect with people

4
Social Media Networks

• Building the Network


• Once you create a profile and personal page, you go about
the task of inviting other people to connect with you (on your
page)
• These people may be called friends, or contacts, or connections
• A social network is a network of people – people you know,
and people who know people that you know
• The power of a social networking is that your current friends
can lead you to new friends

5
Social Media Networks

• Friends and Friend Requests


• You invite people you know to be your “friends” on the site
• Anything you post on your page can be seen by all your
friends, unless you take extra steps to share certain items with
only selected friends
• A friend request is an invitation to become online friends
• When you accept a friend request, you can then visit your friends’
pages
• You can also see all of their friends, and send friend requests to these
people
• As a matter of personal safety, you should accept friend requests only
from people you know

6
Social Media Networks

• Why Do People Join Social Networks?


• Expand your list of business contacts
• Promote yourself and advertise your skill sets
• Look for job leads or to find people to fill open positions
• Advertise upcoming events
• Post job openings
• Promote brand awareness

7
Social Media Networks
• Popular Social Media Networks
• Facebook
• LinkedIn
• Twitter
• Instagram
• Snapchat
• YouTube
• Vine

8
Open vs Closed Social Media
Networks
• Open social networks are open to the public
• Closed social networks are private and internal to a
company or organization or school
• To participate on a closed social network, you must have an
account associated with your organization and usually use
your work email address to sign in
• Closed social networking services can be used for
private communication and collaboration

9
Open vs Closed Social Media
Networks
• Advantages of Closed Networks
• Enable businesses to harness and leverage the power of social networking
• They include message boards, news feeds, shared file locations, search capability
• They provide a central location for discussions, announcements, wikis, and file
storage
• They provide an opportunity and a platform for all employees to participate in
company “happenings” and conversations
• Examples of closed social networks include:
• Neo
• Yammer
• Slack

10
Taking a Look at LinkedIn

• A social network of professional connections


• The purpose of LinkedIn is to be visible, searchable, and
findable
• Connection hierarchy:
• 1st degree – these are people you're directly connected to
• 2nd degree – these are people who are connected to your 1st
degree connections; you can send them an invitation to
connect.
• 3rd degree – these are people who are connected to your
2nd degree connections

11
Taking a Look at LinkedIn

• Creating Your LinkedIn Profile

12
Managing Your Digital Identity

• Your digital identity is a collection of data about you


that is available online
• Usually it is a combination of your online profile(s) and all
your postings, and all your uploads, and all your images,
and all your “likes,” and all of the people you follow
• It includes a history of all your digital activity

13
Managing Your Digital Identity

• Digital Footprints
• Any time you perform an action online, you leave a trace of
information about your character
• These traces of information are digital footprints
• Because they are online, they are searchable

14
Managing Your Digital Identity

• Online is Forever
• Once you post something online, you are no longer in control
of that information
• Anyone who can see your post or picture or video can
download it (and keep it) or share it
• This is what gives social media its power – information is shared
and the number of people who see it grows exponentially
• This same power gives permanence to postings – both the
ones that you are proud of and the ones that you might prefer
to forget

15
Managing Your Digital Identity

• Why Is Your Digital Identity Important?


• Your digital identify is your personal brand
• Your personal brand distinguishes you from
other people and creates an impression in
the minds of others

16
Managing Your Digital Identity

• Creating a Positive Online Identity


• Create and manage your LinkedIn account – take the time to
create a well-written professional profile
• Manage your Facebook profile and remove any photos that
do not show you in a professional light
• Create a Twitter a ccount and use it to share information that
others may find valuable
• Create and post to a blog that shares positive and professional
ideas
• Never post (or send a communication) in anger

17
Managing Your Digital Identity

• Personal Identity and Professional Identity


• Some people prefer to maintain separate online identities
• One for personal pursuits
• One for professional pursuits
• Aliases
• An alias is an assumed name
• Some people use their real name and an alias to create and maintain
separate online identities
• In some profiles, you are encouraged or even required to use an alias
• People with common names are often forced to use aliases as well

18
Managing Your Digital Identity

• Managing Your Online Identity


• Take a proactive role in creating and maintaining a positive online
identity
• Be careful about what you share
• Take the time to create and share material that shows you are
intelligent, thoughtful, responsible
• Find articles about issues you care about and comment on them,
and share them with others
• Try to remove any posts that show you in an unfavorable light
• If necessary, seek help from a company that provides identity
services

19
Online Behavior

• Remember that not everyone is who they say they are


• Online anonymity can make people feel free to behave
in ways they normally wouldn’t in face to face
communications.
• Some are less shy online
• Some more readily express anger
• We all have a moral and ethical responsibility to treat
others with respect

20
Online Behavior

• Cyber Bullying
• Bullying is not a harmless electronic action aimed at no one in
particular
• Bullying is targeted at real people, and can cause real
damage
• Victims of cyber bullying are more likely to suffer from low self-
esteem and to consider suic ide
• Cyber bullying can have serious consequences

21
Computers and Your Health

• Coping with Change


• If you refuse to change, you may be left behind
• Try to approach new technology as a new opportunity rather
than as an obstacle
• Achieving digital literacy is important for everyone

22
Computers and Your Health

• Disengaging
• For how many hours every day are you “connected” and
engaged with others online?
• Do you receive and examine notifications all day long?
• Do you take time to be alone?
• Human beings need time to disengage from external stimuli

23
Computers and Your Health

• Internet Addiction
• The warning signs:
• Thinking continually about online activity
• Losing interest in other hobbies or pastimes
• Spending more and more time online
• Suffering fatigue or experiencing a change in sleep habits
• Risking significant relationships, job, educational or career opportunities
because of Internet use
• Lying to family members, therapists, or others about how much time you
spend on the Internet

24
Computers and Your Health

• Ergonomic Best Practices


• Sit in a chair that provides lower back support, armrests and
 adjustable height
• Use an ergonomic keyboard and position the monitor
correctly
• Never work at the computer without taking regular breaks
• Keep your feet flat on the floor and your thighs and
forearms
 parallel to the floor

25

You might also like