1 / 24

Social Media

Social Media. Creating your online identity. Cyber Dilemmas: What Would You Do?. Get into 8 groups Each group should have an equal number of students within it. Within your group, read the 3 different cyber dilemmas and decide what would you do in each situation

mulan
Download Presentation

Social Media

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Social Media Creating your online identity

  2. Cyber Dilemmas:What Would You Do? • Get into 8 groups • Each group should have an equal number of students within it. • Within your group, read the 3 different cyber dilemmas and decide what would you do in each situation • Record your answers on the worksheet and be prepared to discuss with the class • Worksheets will be collected at the end of the class. • Make sure all group members’ names are on the worksheet

  3. Which Me Should I Be?Examining Your Online Identity • What does the term Identity mean? • Identity:who you are; the qualities, beliefs, etc. that make a particular person or group different from others • Merriam-Webster definition

  4. Which Me Should I Be?Examining Your Online Identity • What does the term Online/Virtual Identity mean? • Online/Virtual Identity:a social identity that an internet user establishes in online communities and websites; ones self in a digital world • Federalnewsradio.org

  5. Which Me Should I Be?Examining Your Online Identity • Watch Henry’s Story as he discusses his online identity.

  6. Which Me Should I Be?Examining Your Online Identity • Get into 10 groups • Your group members should be different today than yesterday. • Within your group, read the 2 situations, determine how harmful they are, and answer the questions on the lines provided. • Record your answers on the worksheet and be prepared to share your responses. • Worksheets will be collected at the end of class. • Make sure all group members’ names are on the worksheet.

  7. Debate: Are Online Friends Real Friends? • Watch the Science of Friendship

  8. Debate: Are Online Friends Real Friends? • On the Debate Organizer worksheet, answer question 1 individually • Get with a partner • Just 1 other person • Read the article, “Are Online Friends Real Friends?” in Choices Magazine • Complete the debate organizer chart and star which side you feel strongest about. • Be prepared to debate for your side. • The debate organizer worksheet will be collected at the end of class. • Each of you will turn in your worksheet, not 1/group.

  9. What is Social Networking? • The use of dedicated websites and applications to interact with other users, or to find people with similar interests to oneself. • Facebook • Instagram • Snapchat • Vine • VSCO • Twitter • Etc.

  10. Four major dangers of using social networking websites • Over-sharing • False identity • Location-based services • Posting photos

  11. Over-Sharing • When creating a new profile page, most sites ask for home address, phone number, birthday, etc. • Dangerous because others can then see where you live and your phone number, especially if privacy settings aren’t set correctly. • Even if secure, hackers can steal your information. Example: If they see you like the color green, maybe they try that as your password. • Never give out personal information such as social security number to someone who asks for it online. • Never click an unknown link. The link can allow a hacker to download all of your personal information from your computer remotely.

  12. False Identity • They may not be who they say they are. • Social networking makes it easy to pretend to be someone else. • Even if the person has mutual friends, someone could know their password and be using their profile. • That person may then ask for banking information or say they need money for a family member. • You may think you're talking o a relative but may be talking to someone unknown who hacked into their account.

  13. Posting Photos • A lot of people like to post photos on social media sites but there are harms in doing so. • The internet makes it easy for anyone to obtain your photos and use any way they choose. • Posting inappropriate photos that you may think are fun or cute can end up where you least expect it or in the hands of people the picture wasn’t intended for. • Photo editing tools allows people to manipulate online images in any way they choose, whether it’s good or bad.

  14. Your Pictures Aren’t Safe

  15. Location-Based Services • One of the most dangerous features offered by social networking sites. • Exposes the profile user’s location and whereabouts. • Allows users to tag who they are with. • May be fun to share your location with friends & family but also potentially increases your vulnerability by: • Opening you up to being robbed or physically harmed. • Allows predators to track your movements and determine when your are alone or when you are not home.

  16. Three Simple Steps To Increase Safety • Don’t Give Optional Information • Third level of privacy • Accept Only People You Know

  17. Don’t Give Optional Information • When creating a profile, you DO NOT need to enter all of the information requested. • Set-up page usually only needs your name and email, mostly everything else is optional. • Do not feel obligated to add your address or telephone number.

  18. Third level of privacy • Three basic levels of privacy settings • “open to everyone” • “open to friends of friends” • “friends only” • The best setting is “friends only” or “protect my tweets”, etc. This is the strictest level of security. • Usually only allows confirmed friends or someone you accepted to view your profile.

  19. Accept Only People You Know • Accept only people you know and trust. • Great way to ensure safety when using social networking sites. • Doing this can protect you from spammers, pedophiles, and other people who use social networking sites to commit crimes.

  20. Think Before You Post! • Before you post anything on social media, ask yourself the following: • Should I share this? • Do people really need to know where I am and who I am with? • Am I selecting friends online that I can trust?  • Is the information I am sharing transparent?

  21. Think Before You Post! • Should I share this? • Will the information you share put yourself or someone else in danger? • Do people really need to know where I am and who I am with? • Is it a good idea to let everyone know my exact location?

  22. Think Before You Post! • Am I selecting friends online that I can trust? • Always keep in mind that it's not just about what you post, but how others may use that content and/or perceive it. • Is the information I am sharing transparent? • Before sharing information to the public, does your post give out too much personal information?   

  23. Social Media Affecting Jobs

More Related