GA_Dig_FP_Cyber_Safet_139S

Download Report

Transcript GA_Dig_FP_Cyber_Safet_139S

Keep Your E-Image Clean
Digital Footprints
Promoting Responsible and Ethical Online
Behavior with Students
Howie DiBlasi
Emerging Technologies Evangelist
Digital Journey
[email protected]
www.drhowie.com
Presentation : 2010
•
•
•
•
•
•
Guidelines of computer ethics
Ethical online behavior
Online resources for teaching ethics
Internet safety
Examples on digital footprints
Better understand our online
interactions
• Tips for establishing a culture of proper
use of technology in the classroom.
• How teachers model ethical behavior
online
(Thanks to Arlene Salyards, Director of Technology & Data
Northeast Colorado, > BOCES, 970-774-6152
http://www.neboces.com for the six links below)
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
My digital footprint
http://dancallahan.net/2009/08/05/my-digital-footprint
The most comprehensive people search on the web
http://www.pipl.com/
Digital Footprints- Your New First Impression
http://edupln.ning.com/video/digital-footprints-your-new
Download the Digital Footprint Calculator
http://www.emc.com/digital_universe/downloads/web/personal-ticker.htm
Your Digital Footprint
http://www.slideshare.net/shareski/your-digital-footprint
Digital Footprints
Flat Classroom Conference Building bridges today that society tomorrow will walk
across
http://flatclassroomconference.ning.com/forum/topics/digitalfootprints?page=1&commentId=2410443%3AComment%3A8234&x=1#2410443Commen
t8234
Help Students Understand Their Web 2.0 Footprint
http://www.educatorsroyaltreatment.com/2009/10/help-students-understand-their-web-20footprint.html
What does that really mean?
• Students should understand how
to be safe and responsible online
and how to create a digital
footprint to be proud of today and
tomorrow.
Promoting Responsible and
Ethical Online Behavior
with Students
…..where to start
Tech Savvy Kids + Computers =
BIG TROUBLE
• http://drdwiki.wikispaces.com
Poll Reveals Kids Think Hacking Is OK!
Nearly half the elementary and middle
school students who responded to a recent
poll conducted by Scholastic, Inc., said
they don't believe hacking is a crime.
High School Student Arrested for
Online Investment Fraud
• A 14-year-old recently purchased
inexpensive stocks, lied about their
potential value in an investment chat
room, and reaped hundreds of
thousands of dollars when other
investors bought his lies -- and the
stocks!
Police arrest Cybercrime forum teenagers
• Scotland Yard... “largest international English speaking online cyber
criminal forum”, has 8,000 members and offers online
instructions on how to steal money.
•
• Pair arrested are 17 and 18 years old
•
• Suspected of encouraging or assisting crime, conspiracy to commit
fraud, and breaking the Misuse of Computer Act.
•
• Police recovered over 65,000 credit card numbers that
have been compromised
•
• Compromised cards could have led to the theft of £7.9 million, it was
estimated. ( UK£ 7.9 million = $12.61235 million U.S. dollars )
• A 17-year-old high school student who lives at
his parents' California home defrauded
unwitting investors of more than $1 million in
an online scam, according to the U.S.
Securities Exchange Commission (SEC).
• They claim he ran a business called Invest
Better 2001 online and stockpiled some
$900,000 of his gains in an account at a
Costa Rica-based casino which he has agreed
to turn over.
Makaveli and Too Short
(high school students)
• Cloverdale, California
• Federal official called it the most organized
and systematic attack ever discovered.
• Linking them to break-ins of at least eleven
military computer systems
• During the day, Makaveli and Too Short
used their skills to build Cloverdale High's
computer network.
So why did they do it?
• In an interview with an online publication,
Makaveli said,
• "It's power dude. You know power."
Pentagon Seeks High School
Hackers
• Cyber Challenge - High school hackers- Uncle
Sam wants you
• Military program aimed at leveraging an untapped
resource
• National competitions for high school and college
students
• Foster a generation of Cyber security researchers.
• Contests will test skills applicable to both
government and private industry
Cyber Challenge - High school
hackers- Uncle Sam wants you
Attacking and defending digital targets, stealing
data, and tracing how others have stolen it.
• Air Force will run a Cyber Patriot competition
focused on network defense
• SANS Institute- will organize the Network
Attack Competition
• Find and exploit vulnerabilities in software,
compromise enemy systems and steal data.
How do I participate in
CyberPatriot, the High School
Cyber Defense Competition?
• http://www.nationalccdc.org/
• Student-Hacker Showdown at the
Collegiate Cyber Defense Competition
• http://www.informit.com/articles/article.asp
x?p=462526
Shall we play a game….?
• Memorable quotes from WarGames (1983)
• Guidelines of computer ethics
http://www.brainpop.com/technology/digitalcitizenship/
FBI Calls for Cyber Ethics Curriculum!
At the conclusion of the recent cyber
ethics conference, the FBI called on
educators to institute programs to
teach cyber ethics in schools.
Guidelines of computer ethics
•
Computer Ethics is a branch of practical philosophy
which deals with how computing professionals should
make decisions regarding professional and social
conduct
•
Ethics is a set of moral principles that govern the
behavior of a group or individual. Therefore, computer
ethics is set of moral principles that regulate the use of
computers. Some common issues of computer ethics
include intellectual property rights (such as copyrighted
electronic content), privacy concerns, and how computers
affect society.
State Law (Article 7.1 of Title 18.2 of the Code of Virginia)
classifies damage to computer hardware or software (18.2152.4), unauthorized examination….etc
•
Guidelines for developing Cyber Ethics
•
•
•
•
•
•
•
•
•
•
•
•
•
Definition
Guidelines
Enforcement Procedure
School AUP 2.0
Appropriate Use Policy
Terms of Agreement
Acceptable Uses
Failure to Follow Acceptable Use Policy
Internet Safety
Use of New Web Tools
Teacher Responsibilities
Principal Responsibilities
District Responsibilities
Ten Commandments of Computer Ethics-(K-5
Used with permission: Copyright: Computer Ethics Institute Author: Dr. Ramon C. Barquin
•
•
•
•
•
•
•
•
•
•
1. Thou shalt not use a computer to harm other people.
2. Thou shalt not interfere with other people's computer work.
3. Thou shalt not snoop around in other people's files.
4. Thou shalt not use a computer to steal.
5. Thou shalt not use a computer to bear false witness.
6. Thou shalt not copy or use proprietary software for which
you have not paid.
7. Thou shalt not use other people's computer resources
without authorization or proper compensation.
8. Thou shalt not appropriate other people's intellectual output.
9. Thou shalt think about the social consequences of the
program you write or the system you design.
10. Thou shalt use a computer in ways that show
consideration of and respect for your fellow humans.
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
The U-High/University Code of Ethics
1) I will not use the technology/communication system at U-High to harm, slander, injure or
ridicule others.
2) I will not interfere with others’ use of the technology, including opening the files of others
without their permission.
3) I will not use the computer to steal.
4) I will not use the computer to misrepresent my school or myself.
5) I will not copy software for which I have not paid.
6) I will not use equipment without authorization.
7) I will not copy text or ideas from the technology resources without permission from the
author or referencing source.
8) I will be responsible for any consequences that arise from or that are a result of my
computing activities.
9) I will use both the equipment and the programs in ways that show consideration, care, and
respect.
10) I will be financially responsible and liable for any damages to either hardware or software
resources that result from inappropriate or abusive behavior.
11) I will not allow another person to use my logon (ID) and password, nor will I use anyone
else's ID and password.
12) I will abide by all rules and regulations of the system as changed or added from time to
time by the
administration of U-High and/or Illinois State University.
13) I will address all concerns regarding the use of technology first to the supervising teacher
and/or school librarian and then to the U-High administration.
14) I will use the technology/computer system to further my education at University High
School and will share my growing knowledge with others at U-High.
15) I recognize that email accounts are Illinois State University accounts and will be disciplined
accordingly.
16) I recognize that all students deserve access as conditions permit.
17) I will not violate the terms and conditions of the Authorization for Internet Access as stated
below.
• Guidelines of computer ethics
• Ethical online behavior
•
•
•
•
•
Online resources for teaching ethics
Internet safety
Examples on digital footprints
Better understand our online interactions
Tips for establishing a culture of proper use of
technology in the classroom.
• How teachers model ethical behavior online
• I will not interfere with others’ use of the
technology, including opening the files of others
without their permission.
• I will not copy software for which I have not paid.
• I will not allow another person to use my logon
(ID) and password, nor will I use anyone else's ID
and password. I will not tamper with or change the
computer settings
• I will address all concerns regarding the use of
technology first to the supervising teacher and/or
school librarian and then to the U-High
administration.
Role play…Cyber Ethics..
• Group A
• I will
not interfere with others’
use of the technology, including
opening the files of others
without their permission.
Role play…Cyber Ethics..
• Group B
• I will not copy software for
which I have not paid.
•
Role play…Cyber Ethics..
Group C
•
I will not allow another person
to use my logon (ID) and
password, nor will I use anyone
else's ID and password. I will
not tamper with or change the
computer settings
Ethical online behavior
• LESSON SAMPLE:
• Promoting Ethical Behavior Online —
Our Values and Ethics
• Level: Grades 7 - 9
Duration: One hour per activity
• To open the lesson kit for printing, click
here.
•
Cyber Safety
Digital Citizenship
Cyberbullying
Learning Outcomes- Students will demonstrate:
• an understanding of their Web-based activities as
well as their perceptions of, and attitudes
towards, these activities
• an understanding of how to assess and measure
their vulnerability to cyberbullying
• an understanding of the importance of ethical
behavior and "virtual reputation" in various
Web environments
• an understanding of the importance of protecting
one's personal privacy online
• an understanding that on the Internet, individuals
are not always as anonymous as they believe
themselves to be
• Online resources for teaching ethics
• What are the cyber ethics issues teachers
must deal with?
• The most common problem isn't hacking
(illegally accessing Web sites) or cracking
(vandalizing Web sites)
• The unauthorized downloading of games
and software.
• The misuse of intellectual property, and
copyright violations.
ESTABLISHING A CULTURE OF
PROPER USE
• Establishing a culture of proper use
• Detailed universal plan for technology use
•
• Discuss the issues
•
• Ethical rules they live by also apply to
technology."
Online resources for teaching ethics
Reference material
• Digital Citizenship WIKI
• http://digicitizenship.wikispaces.com/
INCORPORATING CYBER
ETHICS INTO YOUR CULTURE
• Draw parallels between the real world and the
electronic world.
• Make direct comparisons between what
students do on the Internet and how they
behave in their daily lives.
• Involve students in constructive activities. Ask
them to develop ten rules for a classroom
acceptable use policy, for example.
• Post a written acceptable use policy in your
classroom, and include the consequences for
violating it.
Web sites -ethical use of technology.
• Surf Like a Hero, Not a Zero
• Cybercitizen Partnership site provides
information and a quiz about cyber ethics.
• The Internet: Know Before You Go Into
Cyberspace U.S. Department of Justice site
offers activities to teach kids how to be good
citizens of the Internet.
Related Articles from Education World
• Computer Rules Prevent Problems!
• Danger Online! Educating Kids and Parents
About Internet Safety
• How Can Schools Make Better Use of the
Internet?
•
Thank you to : Linda Starr - Education World®
Copyright © 2000 Education World
Internet safety
•
Rules of the Road for Kids
•
1. Guard your privacy. What people know about you is up to you.
•
2. Protect your reputation. Self-reflect before you self-reveal. What’s funny
or edgy today could cost you tomorrow.
3. Nothing is private online. Anything you say or do can be copied, pasted,
and sent to gazillions of people without your permission.
4. Assume everyone is watching. There’s a huge, vast audience out there.
If someone is your friend’s friend, they can see everything.
5. Apply the Golden Rule. If you don’t want it done to you, don’t do it to
someone else.
6. Watch the clock. A virtual hug never matches a real one. Balance your
life.
7. Choose wisely. Not all content is appropriate. You know what we mean.
8. Don't hide. Using anonymity to cloak your actions doesn’t turn you into a
trustworthy, responsible human being.
9. Think about what you see. Just because it’s online doesn’t make it true.
10. Be smart, be safe. Not everyone is who they say they are. But you know
that.
•
•
•
•
•
•
•
•
Tech Tip: Checking Browser
Histories
• Browser keeps a list of destinations from
most recent to oldest
• A history can be cleared by anyone
• Checking histories should be a regular
part of managing your family's online lives
• Can I friend you?
• 43% of teens are exposed to cyberbullying
in one form or another yet only 1 in 10 kids
told their parents, according to a 2008
report from the U.S. National Crime
Prevention Council
'Startling New Reality' of
Cybercrime Revealed in RIT
Research
Findings A Rochester Institute of
Technology study of more than
40,000 adolescents
http://www.rit.edu/news/?r=46201
RIT study - High School Students
• 21% admitted using a computer or electronic
device to cheat on a school assignment
• 12% admitted plagiarism
• 65% have illegally downloaded music in the
past year;
• 34% have illegally downloaded movies
RIT study - High School Students
• 12% of students in high school circumvented computer security systems
designed to filter or block their access to
Web sites
Internet Safety for High School
Kids Tips
• Can I friend you?
• 22% of all teen girls -- 11% of teen girls
ages 13-16 years old -- say they have
electronically sent, or posted online,
nude or semi-nude images of
themselves, according to the National
Campaign to Prevent Teen and Unplanned
Pregnancy and CosmoGirl.com
RIT study - 7th & 8th Grade
Students
• 34% reported that they were able to use
the Internet with no supervision
• 42% of the children asked reported that
they had spoken with at least one stranger
online within the past year.
RIT study - 7th & 8th Grade Students
• Sharing personal information•
• 39% of the children have posted photos of
themselves
• 36% have posted their real names
• 14% have posted their schedules and
personal contact information.
If those dangers aren't real enough
for you, maybe you would find it
interesting to know that
• 9% of the kids have accepted an online
invitation to meet someone in-person
• 10% have asked someone online to meet
them in-person - agreeing to physically
meet with people that they have never met
before.
Ethics of American Youth
Survey by the Josephson Institute of Ethics
• Survey findings-surveyed teens on
conduct and behavior every two years
since 1992.
• It also found that in the past 12 months:
• •52% of students have hit someone in
anger.
• •28% (37% of boys, 19% of girls) say it's
OK to hit or threaten a person who angers
them.
• Ssurveyed 43,321 teens ages 15 to 18
• 78 public and 22 private schools
• 50% said they had "bullied, teased or
taunted someone at least once
• 47% had been "bullied, teased or taunted
in a way that seriously upset me at least
once."
Cyber bullying - middle school
students
• 15% of the kids have reported being
embarrassed, bullied or threatened online
• online
• 4% admitted to harassing or threatening
another person online
RIT research on Cybercrimes
• 14% reported that they had communicated
with someone online about sexual things
• 11% of students reported that they had
been asked to talk about sexual things
online;
• 8% have been exposed to nude pictures
• 7% were also asked for nude pictures of
themselves online.
http://www.cyberbullying.us/
• New Summary Fact Sheet - Cyberbullying:
Identification, Prevention, and Response.
• New Resources! Sexting: A Brief Guide for Educators and
Parents, A Student's Guide to Personal Publishing (Offline and Online),
Ten Ideas for Youth to Educate their Community about Cyberbullying,
and A Summary of State Bullying and Cyberbullying Laws.
• Five new research-based fact sheets:
Cyberbullying and Self-Esteem, Cyberbullying and Suicide,
Cyberbullying and Strain, Trends in Adolescents' Social Networking
Use, and Changes in Social Networking Use from 2006 to 2009.
http://anniefox.com/
• Why are kids mean to each
other?
• Usually they’re trying to get back at
someone who hurt them. Or they’re trying
to embarrass someone they don’t like
even if that person hasn’t done anything.
• Annie is a respected educator, awardwinning author, and a trusted online
adviser. Her life’s work is helping teens
become more self-aware, self-confident
and better able to make choices that
reflect who they really are. She does it
through Q&A, events at schools, and
books like her Middle School
Confidential™ series.
What can you do to be safer on
line?
Sooooo...What is the answer to all
of these issues and problems?
• http://oldfortyfives.com/DYRT.htm
http://school.discoveryeducation.com/schrockguide/yp/iypsrch.html
Web
Of Trust
• WOT is a Free Internet
Security addon for Firefox
and IE that warns you about
online scams and risky
websites that try to deliver
malware or send spam.
• http://www.mywot.com/
Search Engines Are No Longer
Enough
• If what ever you do online can
be traced back to you and it
stays forever what should you
put online?
There is No Delete Button on
the Web
There is No Delete Button on the
Web
• The Internet Archive and its Way
Back Machine gives you a historical
snapshot of a site within seconds.
• http://www.readwriteweb.com/archives/soc
ial_web_unforeseen_consequences.php
The Wayback Machine
http://www.archive.org/web/web.php
Browse through over 150 billion web
pages archived from 1996 to a few
months ago. To start surfing the
Wayback, type in the web address of a
site or page where you would like to
start, and press enter. Then select from
the archived dates available. The
resulting pages point to other archived
pages at as close a date as possible.
Keyword searching is not currently
Tips for establishing a culture of
proper use of technology in the
classroom
• http://www.educationworld.com/a_tech/tech/tech055.shtml
How teachers model ethical
behavior online
• http://school-staff-issues.suite101.com/article.cfm/moraland-ethical-expectations-of-teachers-while-online
• Teachers are expected to maintain a
professional level of moral and ethical
behavior and model these expectations to
their students.
Read more at Suite101:
How Teachers Model Ethical
Behavior Online
• Teacher Tips for Maintaining Personal Social
Networking Sites
•
• Importance of Ethics in a Corporate Environment
• Creating Socially Responsible Students, Leaders
•
Read more at Suite101: Moral and Ethical Expectations of
Teachers While Online
•
http://school-staff-issues.suite101.com/article.cfm/moral-and-ethical-expectations-of-teachers-whileonline#ixzz0vmji3cN3
Free Resources
• Digital Citizenship Matrix:
• http://knowwheretheygo.org/c3matrix/cyber_safety
•
• Industry Contact Directory to Report Abuse
• http://www.scribd.com/doc/18404824/Cyber-Safety-andDigital-Literacy-Powerpoint-2009
•
• Draft Digital Citizenship State Standards
including Digital Literacy, safety, e-security
and responsible and ethical behavior . Other
resources:
• www.ikeepsafe.org
www.cybersmart.gov.au
Keep Your E-Image Clean
Digital Footprints
Howie DiBlasi
Emerging Technologies Evangelist
Digital Journey
[email protected]
www.drhowie.com
Presentation : 2010
What is your digital footprint most
like? By Tom Jackson
What is my “Digital Footprint”
• Examples on digital footprints
Think before you post- Watch
this video first....
• http://www.youtube.com/watch?v=SGlrAhtQC24&feature=player_embedded
Think before you post
• Watch this video first....
• http://www.youtube.com/watch?v=SGlrAht
QC24&feature=player_embedded
• Digital footprints are traces left by
someone’s activity in a digital
environment.
Digital footprints are…….
• traces left by someone’s activity in a digital
environment.
• two main classifications for digital footprints: passive
and active.
• passive digital footprint is created when data is
collected about an action without any client activation
• active digital footprints are created when personal
data is released deliberately by a user for the purpose
of sharing information about oneself
• social media, “digital footprint” can refer to the size of
one’s online presence as it relates to the number of
individuals he or she is interacting with.
• All of us, like it or not, are
creating these trails.
• There is all kinds of
information ABOUT YOU to be
found online.
What do you know ????
• Do you know how long what you put on lines
exists?
• Do you know what the standard is for
appropriate and inappropriate online behaviour?
• Do you know what a digital footprint means?
• Do you know how to take your steps to have a
digital footprint that you will be proud of today
and tomorrow too?
• Will it be insignificant
tomorrow, or in five years
when you need to apply for
college or seek new
employment ?.
Digital Dossier
April 9, 2015 | slide 94
You’re Not as Private as You Think
•
http://www.commonsensemedia.org/you%E2%80%99re-not-private-you-think
• 10 Ways You’re Not as Private as You Think
1. Allowing yourself to be publicly searchable on
Facebook.
• 2. Broadcasting your location.
• 3. Ignoring your YouTube Activity Sharing settings.
• 4. Using Chatroulette.
• 5. Not talking to your kids about online privacy
• 6. Giving your baby a Facebook page. Really?
• 7. Neglecting to read a company's privacy policy.
• 8. Using your real name as your user name in
virtual worlds and other online games.
• 9. Revealing your status. Instant messaging is the
easiest way to give yourself up,
• 10. Letting your kid sign up for anything before
you know the facts..
• Footprints in the Digital Age (Will
Richardson, Educause)
• You need to be "clickable". Are you
preparing your students to be Googled?
(Will
• The Less You Share, the Less Power
You Have (Will Richardson, Blog post)
• Who is Looking for You Online?
• College Students in Trouble at School
Tools to Track Your
Footprints on the Web !
• 22 Places to find your “Digital
Footprint” you never heard of…
22 Places to find your “Digital Footprint”
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
1. BlogPulse: Trends in the Blogosphere
2. Pipl: Searching the Invisible Web
3. Spy: Watching what Happens on the Web
4. Serph: The Social Web Right Now
5. Social Mention: Mentions of your Name on the Social Web
6. Monitter: Tracking Twitter
7. BoardTracker 2.0: The Ultimate Search Tool for Forums
8. Google Alerts: The big G
9. Web footprints using Spokeo people search.
10. ZapTxt beats google or yahoo alerts, follows you to email or phone if you are offline on IM
http://mashable.com/2008/06/19/zaptxt-version-two-im-sms/
11. http://tweetgrid.com, allow you to track up to 9 keywords or hashtags at the same time, and tweet
directly from their interface.
12. http://veryrecent.com Combines social media search, blog search and news search into one
compact interface.
13. http://whostalkin.com- track your activities on Plurk/Twitter/blogs
14. BrowserSpy - your online presence. http://browserspy.dk/
15. http://AskTwiTR.com searches Twitter in real time for Pic/Movie/Tags/Topic-display results on
Google Map.
16. FairShare: track where your content goes once you publish it. http://beta.fairshare.cc
https://fairshare.attributor.com/fairshare/
17. People Search: Search by Name. http://www.peoplefinders.com
18. Conversation Monitter-ing and Spy-ing. :tools maltego (desktop client), backtype, retweetradar
19. Wink, Pipl, Spoke, Spock- Silobreaker -focused on news.
20. PowerTwitter -search right from the twitter interface, keywords or people.
21. Boardtracker - searching forums. Feedmysearch to turn your Google web searches into RSS feeds.
22. http://www.123people.com - people search, social networking search, news and blog search.
1. Pipl: Searching the Invisible Web
• Pipl ($) claims to search the deep or
invisible Web to find documents, blog
entries, photos, publicly available
information that other search engines don't
serve up.
• http://www.pipl.com/
2. Best way to keep track of your
web footprints
• Spokeo people search. It will search
across all major social networks and the
Web to dig out your activities on them.
• http://www.spokeo.com/
3. Is this the best ?
• 123people is a real time people search service that looks
into nearly every corner of the Web.
• Using our proprietary search algorithm, you can find
comprehensive and name related information consisting of
images, videos, phone numbers, email addresses, social
networking and Wikipedia profiles plus much more.
• Content is pulled from an extensive list of international and
regional relevant sources in over 11 countries in multiple
languages.
• http://www.123people.com
Spy: Watching what Happens on
the Web
• According to the site, Spy can "listen in on
the social media conversations you're
interested in." This clean visualization
search tool watches Twitter, FriendFeed,
blog posts, Google reader shares and
Flickr
• http://spy.appspot.com/
Why is your digital footprint
important? Credit to Paul Vercher
Why is your digital footprint
important? Credit to Paul Vercher
• Recruiters look for methods to differentiate
between candidates
–Who’s a viable candidate…
–Who’s not a viable candidate
• Recruiters need evidence to validate their
decision
–Your digital footprint provides this
“evidence”
Can you “google” me ?
• What does it mean when a potential employer, college
recruiter or client googles your name and does not
find anything or much?
• What if a principal searches for a potential hire’s name and
work and does not find anything?
• What does it mean NOT to have a digital footprint in
these cases?
• Is it positive or does it shed a negative light on your
portfolio/resume?
• What does it say about you, if you do not have a blog, a
twitter account, nor other social network identities?
• What does it mean if you, as a teacher do not have a
Digital Teacher Portfolio?
Digital Footprint – Google Profile
Page 1 of Google
The more social networking sites and bloging/twittering you do – the more your name will be “relevant” on a
Google search or any search engine for that matter. However, if you have a common name (Tom Jackson) it
does not matter how hard you work it – you will be back paged on Google. The good news is, there is a work
around to have your name show up on page 1. The short cut is creating a “Google Profile”. This will put you
on Page 1, despite how common your name is.
Keep in mind that you must brand yourself. In other words link your name with your desired job title (Tom
Jackson / Sales). When recruiters search various sites for Sales my name and sites will pull along with that
key word.
Creating a Google Profile:
Google, in the search box type <ME>, hit return. This will take you to the Google profile page.
Other useful web tricks: www.obviousexpert.com
Digital Footprint – Google Profile (cont.)
Page 1 of Google
Adding your URL/Webpage to Google:
This is a great way to short cut Google again. Do not wait for Google to find your sites – load your sites directly
in to Google. -www.google.com/addurl/?continue=/addurl
Make sure if you have multiple sites (ie
LinkedIN, Facebook, Twitter, etc) that you
link each site to the other. This what they
call “nesting”. Nesting is very powerful
because you are linking yourself to
yourself multiple times. The search
engines not only pick up on your url it also
maps which urls are contained within your
page. In other words you look bigger than
you really are.
Note: Site or URL does not mean that you
have to have your own personal website
(but do get one). When you created your
linked in profile you were given a URL that
points to your profile page
(www.linkedin.com/in/thomasjacksonjr)
that is a URL and the same applies to
every social networking site on the
internet.
Digital Footprint – Google Resume Posting
Google Resume
How to upload your resume directly to Google:
You can upload your resume directly to Google. All you need to do is use Google Docs. http://docs.google.com/?hl=en&tab=wo#owned-by-me
Using either the URL above or just go to
Google, from the More drop down select
Documents.
From the Google Docs menu select NEW
Digital Footprint – Google Resume Posting (cont.)
Google Resume
How to upload your resume directly to Google:
From the NEW menu you can upload your
resume document to Google Docs.
Digital Footprint – Google Resume Posting (cont.)
Google Resume
How to upload your resume directly to Google:
Once your resume is pasted into Google Docs then it is time to SHARE it with the world – this is how it
becomes searchable.
NOTE:
You can go back and edit this document anytime
you want – AND – have multiple documents
posted at the same time.
Digital Footprint
- Getting your name out there
Digital Footprint
Social Networking Sites- market yourself, let friends find you,
recruiters find you, look for contacts and even look for jobs.
-www.linkedin.com (#1 Social Network for Professionals and #1 for candidate searches by HR)
-www.facebook.com (#2 for candidate searching by HR)
-www.twitter.com (#3 for candidate searching by HR)
-www.myspace.com
Blogs:- useful ways to get people to find you, follow you (and
listen to you) and want to network with you.
- www.wordpress.com is a free blog site that I use – it has a LinkedIN add in and one for the iPhone
- www.blogspot.com
Quicklook comparison chart of popular blogging software:
-www.ojr. org/ojr/images/ blog_software_ comparison. cfm
Digital Footprint - Twitter
Twitter:- #3 for HR/Recruiters when searching
for job candidates. There are a lot of links that will help you
manage twitter and find jobs on twitter – just takes a little
digging. Twitter works best when working with 3rd party
applications – many are web based.
Homepage--www.twitter.com create your twitter account here
Twitter Job Aggregator
-http://www.tweetmyjobs.com/ is a webpage that allows you to create a profile and search for job-types by
your geographical preference. Will send you a daily digest of jobs.
-http://www.twithire.com/ webpage for jobs
-www.Jobshouts.com
-www.Tweetcruit.com
- #jobangels
- Twitter Resume Format
-
http://www.twtjobs.com/ ****Twitter resume template**** fill this out, save the url and you can
re-tweet
-http://www.twtbizcard.com/ ****Twitter business card template****
Twitter Managaer for the Desk Top
-
www.twitterdeck.com is a twitter utility to help keep tweets organized – desktop app
Tweet Applications
-
http://twitter.pbworks.com/Apps Wiki page with listing of great apps to make twitter easier to
navigate
http://twitdom.com/ Page dedicated to Twitter Apps
http://www.squidoo.com/twitterapps another page of twitter apps
http://www.techcrunch.com/2009/02/19/the-top-20-twitter-applications/ more twitter apps
http://www.twoquick.com/ Search engine (no funny # marks required)
-http://www.twootles.com/ another search engine
Digital Footprint – Twitter (cont.)
Tweet Applications (cont.)
-http://www.twellow.com search directory
-http://wefollow.com/ list yourself on twitter
-http://nearbytweets.com/ find twitters near you
-http://tweetbeep.com/ twitter email alerts
-http://www.twilert.com/ another twitter email alert site
-http://www.twitterjobsearch.com/ twitter jobsite
-http://www.twithire.com/ twitter jobsite
-http://www.twitterjobsearch.com/ twitter jobsite
-http://twitter.com/microjobs twitter jobsite
-http://www.jobangels.org/ twitter jobsite
-http://jobshouts.com/ twitter jobsite
-http://www.tweetcruit.com/Default.aspx twitter jobsite
-http://bit.ly/ shortens URL for posting in Tweets
-http://tinyurl.com/ shortens URL for posting in Tweets
124
Establishing Your Digital Footprint
• LinkedIn http://www.linkedin.com/
–Populate your profile with keywords
• Enhance your chances of being “found” by
recruiters
–Write recommendations…include your
name/job title/contact info
• Demonstrates initiative, communication skills,
passion
125
Establishing Your Digital Footprint
• Twitter http://twitter.com/
–Secure your full name as a Twitter home
page (e.g. PaulVercher)
–Post information related to your field-ofinterest
• Demonstrates initiative, communication skills,
passion
126
Establishing Your Digital Footprint
• Facebook http://www.facebook.com/
–Presentable portrait
–Post resume
–Keep “Friend” comments and responses
upbeat and professional
• Recruiters source Facebook to determine
compatibility, communication skills,
professionalism
127
Establishing Your Digital Footprint
• Amazon.com http://www.amazon.com/
–Review books related to your job search
• Demonstrates initiative, communications skills,
passion
128
Establishing Your Digital Footprint
• Blogging
– Demonstrates initiative, communication skills,
passion for subject matter
– Positive (not phony), upbeat, value-add
 Blogger
 WordPress
 SQUARESPACE
Phishing and Spyware
April 9, 2015 | slide 129
Digital Identity
From Wikipedia: Digital identity refers to the aspect of
digital technology that is concerned with the mediation
of people's experience of their own identity and the
identity of other people and things.
How do you manage and make informed choices about
your digital identity? What does all of this mean in an
educational context? What are the questions YOU need
to ask of your learners to educate them about their
digital identities?
April 9, 2015 | slide 130
Identity Theft
April 9, 2015 | slide 131
Digital Identity
April 9, 2015 | slide 132
Digital Identity
http://thisisme.reading.ac.uk
April 9, 2015 | slide 133
Me and my (web) Shadow
April 9, 2015 | slide 134
Digital Reputation
http://www.agcas.org.uk
April 9, 2015 | slide 135
Digital Reputation
April 9, 2015 | slide 136
Digital Reputation
April 9, 2015 | slide 137
Digital Footprint Calculator
April 9, 2015 | slide 138
Garlik
April 9, 2015 | slide 139
Keep Your E-Image Clean
Digital Footprints
Promoting Responsible and Ethical Online
Behavior with Students
Howie DiBlasi
Emerging Technologies Evangelist
Digital Journey
[email protected]
www.drhowie.com
Presentation : 2010
Done to this POINT
• If what ever you do online can
be traced back to you and it
stays forever what should you
put online?
Digital Footprint
- Getting your name out there
Tips for Social Networking
• http://www.commonsensemedia.org/tips-social-networking
Social Networks: Facts of Life
• Facebook and MySpace have privacy
controls
• Some sites require kids to be older than 13 to
have a profile, but younger kids set up accounts
anyway
• There are no guarantees of privacy (even
with settings) since anything can be cut, pasted,
and sent
• Inappropriate pictures, posts, or messages can
result in damage to kids' reputations
• Kids can "tag" (or identify) their friends
which can violate their privacy
Tips for Social Networking
• http://www.commonsensemedia.org/tips-social-networking
•
•
•
•
•
•
It's all about hanging with friends -- online.
Why they matter
Parent tips for young kids
Parent tips for middle school kids
Parent tips for high school kids
Download resources in Spanish
Understand our online
interactions
• Digital Footprints
• Managing your digital footprint
• By conducting periodic searches of
your name, you'll always know what
information is out there and have the
opportunity to make corrections or
adjustments as needed.
Ensure there are plenty of positive
associations
• Build your own professional web page. Include your contact
information, specialty, and resume, as well as some work samples. You also
can feature articles of interest and links to your favorite websites.
• Stack the deck in your favor. Websites such as ZoomInfo.com
allow users to post information about themselves, so consider including details
about your professional involvement and qualifications on these types of
forums.
• Share your insights. Posting your comments on industry forums or
authoring online articles in your area of expertise is a smart way to reinforce
your professional reputation.
• Exercise discretion.