Lecture 6


Online identity
Building Your Online Identity
•   Have a plan
•   Think long-term
•   Be consistent
•   Your avatar
•   Site basics
•   Participate
•   Get inspired

             COMP113: Social Media & Online Communities   2
Next
• You find that you are having an account in
  one of the popular services, such
  as Twitter for micro blogging, YouTube for
  video sharing, Delicious for links, Last.fm for
  music, Flickr for images, Digg for news
  and Facebook for a profile.
• Funnel all those services through a life
  streaming tool such as FriendFeed and
  moderate the content sharing there for
  efficiency
• And may be more……….
             COMP113: Social Media & Online Communities   3
But your online identity can be easily
                 destroyed
Being online is like being in public. Nearly anything
that gets posted can come back to haunt you.
• Boring posts
• Disrespecting others
• Failing to promote others
• Not replying to comments
• Being tagged in questionable photos

                COMP113: Social Media & Online Communities   4
Protecting Your Online Identity


• Account / Password management
• Login often




           COMP113: Social Media & Online Communities   5
Online methods for stealing
   personal information
• Malware
• Spam
• Phishing




             COMP113: Social Media & Online Communities   6
What do people do to manage
          accounts?

Model1
• Use the same
  username/password
  for multiple sites




                       7
What do people do to manage
           accounts?
• Maintain a list of user IDs and
  passwords in an offline document
Or
• Store account details in a
  “password vault”:
   – On your PC (e.g., protected by
     fingerprint recognition)
   – In a portable USB device,
     protected by a strong pass
     phrase
   – On a trustworthy online service,
     e.g., mashedlife.com               8
9
What do people do to manage
         accounts?
Model 2

• Login using an OpenID
  account where possible
• Social login (e.g., Facebook
  Connect, Twitter OAuth, ...)




                COMP113: Social Media & Online Communities   10
OpenID
•   OpenIDs are URLs (i.e., your identities)
•   Find a provider (e.g., MyOpenID, Yahoo, ...)
•   Log into any site that supports OpenID
•   Not overly successful
Facebook Connect
• What happens?
  – Login into 3rd party websites
  – Approve level of data access
    between Facebook and website
  – See if your friends have also
    connected to the website
  – Publish content to Facebook
    through the website




                                    13
14
Social logins – survey-
• 86% respondents will change behaviour:
  – 54% might leave the site and not return
  – 26% would go to a different site if possible
  – 6% would just simply leave or avoid the site
  – 14% would not complete the registration
• 88% admitted to supplying incorrect
  information or not answering all fields
• 90% admitted to leaving a website if they
  couldn’t remember login details (was 45%)
COMP113: Social Media & Online Communities   16
COMP113: Social Media & Online Communities   17
COMP113: Social Media & Online Communities   18
The End

          19

6 online identity

  • 1.
  • 2.
    Building Your OnlineIdentity • Have a plan • Think long-term • Be consistent • Your avatar • Site basics • Participate • Get inspired COMP113: Social Media & Online Communities 2
  • 3.
    Next • You findthat you are having an account in one of the popular services, such as Twitter for micro blogging, YouTube for video sharing, Delicious for links, Last.fm for music, Flickr for images, Digg for news and Facebook for a profile. • Funnel all those services through a life streaming tool such as FriendFeed and moderate the content sharing there for efficiency • And may be more………. COMP113: Social Media & Online Communities 3
  • 4.
    But your onlineidentity can be easily destroyed Being online is like being in public. Nearly anything that gets posted can come back to haunt you. • Boring posts • Disrespecting others • Failing to promote others • Not replying to comments • Being tagged in questionable photos COMP113: Social Media & Online Communities 4
  • 5.
    Protecting Your OnlineIdentity • Account / Password management • Login often COMP113: Social Media & Online Communities 5
  • 6.
    Online methods forstealing personal information • Malware • Spam • Phishing COMP113: Social Media & Online Communities 6
  • 7.
    What do peopledo to manage accounts? Model1 • Use the same username/password for multiple sites 7
  • 8.
    What do peopledo to manage accounts? • Maintain a list of user IDs and passwords in an offline document Or • Store account details in a “password vault”: – On your PC (e.g., protected by fingerprint recognition) – In a portable USB device, protected by a strong pass phrase – On a trustworthy online service, e.g., mashedlife.com 8
  • 9.
  • 10.
    What do peopledo to manage accounts? Model 2 • Login using an OpenID account where possible • Social login (e.g., Facebook Connect, Twitter OAuth, ...) COMP113: Social Media & Online Communities 10
  • 11.
    OpenID • OpenIDs are URLs (i.e., your identities) • Find a provider (e.g., MyOpenID, Yahoo, ...) • Log into any site that supports OpenID • Not overly successful
  • 13.
    Facebook Connect • Whathappens? – Login into 3rd party websites – Approve level of data access between Facebook and website – See if your friends have also connected to the website – Publish content to Facebook through the website 13
  • 14.
  • 15.
    Social logins –survey- • 86% respondents will change behaviour: – 54% might leave the site and not return – 26% would go to a different site if possible – 6% would just simply leave or avoid the site – 14% would not complete the registration • 88% admitted to supplying incorrect information or not answering all fields • 90% admitted to leaving a website if they couldn’t remember login details (was 45%)
  • 16.
    COMP113: Social Media& Online Communities 16
  • 17.
    COMP113: Social Media& Online Communities 17
  • 18.
    COMP113: Social Media& Online Communities 18
  • 19.

Editor's Notes

  • #6 Manage your password: The more complicated the password, the less likely it will be hacked.Login often: This will help to make sure your account isn’t being hacked and it’s good to look active on your social media accounts.
  • #11 The days of having a separate login and password for each online service we use are behind us. Now, you can log into most sites and services using your social network's ID.
  • #12 http://openidexplained.com/http://openid.net/what/http://en.wikipedia.org/wiki/OpenID
  • #13 Social Login reduces the barriers to register and sign-in to your site, allowing users to authenticate their identities using a preferred social network account. It’s proven to increase registration rates by 20-40% and provides permission-based access to rich, first-party user data so you can create a completely personalized user experience.
  • #15 http://dev.twitter.com/pages/auth#introhttp://www.slideshare.net/episod/linkedin-oauth-zero-to-hero
  • #17 The most popular social identities are Facebook, Google, Yahoo, and Twitter, but are they always being used in the same way? The infographic below, courtesy of social optimization platform Gigya, shows that users trust different identities on different services. For example, users are most likely to log on to entertainment sites via Facebook, but when it comes to news sites, the login of choice is Twitter. Furthermore, the infographic shows what profile data is available to services after users log in using various online identities.
  • #18 . For example, users are most likely to log on to entertainment sites via Facebook, but when it comes to news sites, the login of choice is Twitter.
  • #19 Furthermore, the infographic shows what profile data is available to services after users log in using various online identities.