TIMELINE. 5:15- 5:45 EAT 5:45-6:45 Your Digital Tattoo- Presented by CJ ROWE (Access and Diversity) and TLELL ELVISS (Student Development) 6:45 Announcements, etc. your digital tattoo. Peer Program Presentation November 7 th , 2007. Before we begin…. Some caveats…
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
5:15- 5:45 EAT
5:45-6:45 Your Digital Tattoo-Presented by CJ ROWE (Access and Diversity) and TLELL ELVISS (Student Development)
6:45 Announcements, etc.
Peer Program Presentation
November 7th, 2007
Who is confident (or perhaps just curious) about their own digital dirt and would be willing to share?
What is Web 2.0? Any guesses?
A short summary:
Often, one of the most influential and impactful ways of conveying information is through stories. Following are a few examples we have used to explore the digital tattoo idea through real stories.
To keep in mind just how personal and yet very public the internet can be we came across these examples of cases where information shared on social networking sites or personal blogs that had big consequences.
At a 2005 Pennsylvania State University vs. Ohio State football game, Penn U. students stormed the field after their victory, causing a riot. Police officers scanned Facebook and accessed a student group titled “I rushed the field after the OSU game (and I lived!)” to analyze photos and identify approximately 50 students involved (Read, 2006).
In China an intimate blog written by a 25-year-old who also wrote a magazine sex column attracted 10 million daily visitors to the Sina.com server. Her blog initiated a “raging debate” on the internet, and the Chinese censors banned her forthcoming book. Although she defended her right to write about her sex life, the blogger said that she never realized her blog would be read so widely or that it would create such controversy. She quit her job at the magazine and has shut down her blog. (Yardley, 2003)
A blogger from Utah harshly criticized her Mormon upbringing, her job and co-workers online, assuming that her technophobic parents and her boss would never find out. But they did, and “All hell broke loose,” as she put it. She alienated her parents and lost her job. “It was shocking for everyone,” she said; “I was extremely naïve.” (St. John, 2003).
Students at many universities can now use facebook as a tool to select their roommate. Students are encouraged to login, explore profiles and find someone they would like to live with in residence.
Sort yourself into small groups of 4-5 and share:
Before you post information online ask yourself…
Using facebook while maintaing privacy
Dealing with your Digital Dirt
BC Rural Women’s Online Safety Toolkit
Stalking meets the Internet
Digital Voyeurism: A New Age for Peeping Toms
“Cultivating Violence Through Technology? Exploring the Connections between Internet Communication Technologies (ICT) and Violence Against Women (VAW)
University of Wisconsin: Living in Online Communities: A User’s Guide
We are not experts…but feel free to contact us if you have any questions
Access and Diversity