Open vs Closed Social Media Networks • Advantages of Closed Networks • Enable businesses to harness and leverage the power of social networking • They include message boards, news feeds, shared file locations, search capability • They provide a central location for discussions, announcements, wikis, and file storage • They provide an opportunity and a platform for all employees to participate in company “happenings” and conversations • Examples of closed social networks include: • Neo • Yammer • Slack
Managing Your Digital Identity • Your digital identity is a collection of data about you that is available online • Usually it is a combination of your online profile(s) and all your postings, and all your uploads, and all your images, and all your “likes,” and all of the people you follow • It includes a history of all your digital activity
Managing Your Digital Identity • Digital Footprints • Any time you perform an action online, you leave a trace of information about your character • These traces of information are digital footprints • Because they are online, they are searchable
Managing Your Digital Identity • Online is Forever • Once you post something online, you are no longer in control of that information • Anyone who can see your post or picture or video can download it (and keep it) or share it • This is what gives social media its power – information is shared and the number of people who see it grows exponentially • This same power gives permanence to postings – both the ones that you are proud of and the ones that you might prefer to forget
Managing Your Digital Identity • Why Is Your Digital Identity Important? • Your digital identify is your personal brand • Your personal brand distinguishes you from other people and creates an impression in the minds of others
Managing Your Digital Identity • Managing Your Online Identity • Take a proactive role in creating and maintaining a positive online identity • Be careful about what you share • Take the time to create and share material that shows you are intelligent, thoughtful, responsible • Find articles about issues you care about and comment on them, and share them with others • Try to remove any posts that show you in an unfavorable light • If necessary, seek help from a company that provides identity services
Online Behavior • Remember that not everyone is who they say they are • Online anonymity can make people feel free to behave in ways they normally wouldn’t in face to face communications. • Some are less shy online • Some more readily express anger • We all have a moral and ethical responsibility to treat others with respect
Online Behavior • Cyber Bullying • Bullying is not a harmless electronic action aimed at no one in particular • Bullying is targeted at real people, and can cause real damage • Victims of cyber bullying are more likely to suffer from low self-esteem and to consider suicide • Cyber bullying can have serious consequences
Computers and Your Health • Coping with Change • If you refuse to change, you may be left behind • Try to approach new technology as a new opportunity rather than as an obstacle • Achieving digital literacy is important for everyone
Computers and Your Health • Disengaging • For how many hours every day are you “connected” and engaged with others online? • Do you receive and examine notifications all day long? • Do you take time to be alone? • Human beings need time to disengage from external stimuli
Computers and Your Health • Internet Addiction • The warning signs: • Thinking continually about online activity • Losing interest in other hobbies or pastimes • Spending more and more time online • Suffering fatigue or experiencing a change in sleep habits • Risking significant relationships, job, educational or career opportunities because of Internet use • Lying to family members, therapists, or others about how much time you spend on the Internet
Computers and Your Health • Ergonomic Best Practices • Sit in a chair that provides lower back support, armrests and adjustable height • Use an ergonomic keyboard and position the monitor correctly • Never work at the computer without taking regular breaks • Keep your feet flat on the floor and your thighs and forearms parallel to the floor
Review Questions 4. Which of the following social networks was created specifically for making and maintaining professional business connections? a. Facebook c. Instagram b. LinkedIn d. Twitter 5. The collection of data about you that is available online is your: a. Profile c. Blog b. Digital identity d. Facebook post history
Review Questions 10. Marissa tweeted for a week to advertise a mentoring project at the public library in which senior citizens were encouraged to mentor youth in specific job skills such as accounting, bookkeeping and filing. She also put this information on the library Facebook page. Although there is a large population of senior citizens within five blocks of the library, the turnout was disappointing. Which is a probable reason for the poor turnout? a. Senior citizens do not care about youth in their community. b. Seniors probably did not have transportation to the library. c. Seniors are not particularly active on Twitter and Facebook. d. All of these.
Review Questions 11. Which of the following is a sign of Internet addiction? a. Lying about how much time you spend online. b. Having a Facebook and a Twitter and an Instagram and a Vine account. c. Using an alias in one or more of your online accounts. d. Configuring your phone to alert you when someone messages you on Facebook.