background preloader

Reputation Management and Social Media

Reputation Management and Social Media
How people monitor their identity and search for others online Reputation management has now become a defining feature of online life for many internet users, especially the young. While some internet users are careful to project themselves online in a way that suits specific audiences, other internet users embrace an open approach to sharing information about themselves and do not take steps to restrict what they share. Search engines and social media sites play a central role in building one’s reputation online, and many users are learning and refining their approach as they go–changing privacy settings on profiles, customizing who can see certain updates and deleting unwanted information about them that appears online. Over time, several major trends have indicated growth in activities related to online reputation management: Young adults are the most active online reputation managers in several dimensions. Those ages 18-29 are more likely than older adults to say:

Digital Footprints The nature of personal information is changing in the age of Web 2.0. The vast array of data points that make up “personal information” in the age of online media are nearly impossible to quantify or neatly define. Name, address, and phone number are just the basics in a world where voluntarily posting self-authored content such as text, photos, and video has become a cornerstone of engagement in the era of the participatory Web. The more content we contribute voluntarily to the public or semi-public corners of the Web, the more we are not only findable, but also knowable. Internet users are becoming more aware of their digital footprint; 47% have searched for information about themselves online, up from just 22% five years ago. Unlike footprints left in the sand at the beach, our online data trails often stick around long after the tide has gone out. Few monitor their online presence with great regularity. Among adults who create social networking profiles, transparency is the norm.

Notre pire ami - - Philippe Boulet-Gercourt - Notre époque - nouvelobs.com Joseph Smarr at Web 2.0 on the New “Open Stack” « The Real McCrea Joseph Smarr, Plaxo’s chief platform architect, and de facto leader of the Portable Contacts initiative, gave a talk today at the Web 2.0 conference in New York. Entitled “Tying it all together; Implementing the Open Web,” it was a rallying cry for developers to jump in and get working on the new “open stack” of OpenID, OAuth, OpenSocial, XRDS-Simple, and Portable Contacts. See converage from attendees Kris Jordan and Steve Kuhn (who quips about Joseph, “Dude talks fast”)! Joseph asserted that the industry has now come together around a common vision for the future of the Social Web — a vision that abandons the walled garden model in favor of a new services layer that interconnects social hubs with the rest of the web. The service layer is comprised of Identity Providers, Social Graph Providers, and Content Aggregators: Like this: Like Loading...

List of Theories and Theorists—A First Look at Communication Theory Share: The list below contains theories that are or have been covered in A First Look at Communication TheoryFull = a chapter in the 7th edition is dedicated to this theory.Brief = the theory is discussed in the 7th edition, but not assigned a full chapter.Archive = the theory was covered in a full chapter in previous editions. A pdf from the last edition in which it appears is available.When a theory name is clickable, the link will take you to Theory Resouces for that theory or open the archived chapter. View/Sort by: Theories | Authors You can also view the 7th Edition Table of Contents to see supplementary material as well as theories. * New in the 7th Edition Back to top

Facebook to provide OpenID support for users (and financial support for OpenID) » VentureBeat Facebook, the world’s largest social network, has so far asked third-party developers to access its user data strictly through its own proprietary standards. But the company has said it intends, eventually, to make this data more openly accessible, and it’s taking a step in that direction today by announcing it’s joining the OpenID movement. OpenID lets you sign into a web site using your username from another site. So when somebody goes to a site they’ve never signed into before, and that uses OpenID, they’ll presumably be able to sign in using their Facebook identity. It’s not clear if Facebook will let users sign into Facebook using identities from other sites. For now, Facebook is just announcing that it will support OpenID — no more details on the implementation front for now. The social network has also joined OpenID’s board of directors and will provide financial support to the industry-backed foundation going forward.

Teens, Privacy and Online Social Networks Many teenagers avidly use social networking sites like MySpace and Facebook, and employ a variety of tools and techniques to manage their online identities. Online social networks are spaces on the internet where users can create a profile and connect that profile to others to create a personal network. Social network users post content to their profiles and use tools embedded within social networking websites to contact other users. Young adults and teenagers are among the most avid users of such websites. Much of the media coverage surrounding young people and online social networks has focused on the personal information teens make available on these networks. Most teenagers are taking steps to protect themselves online from the most obvious areas of risk. Still, the survey also suggests that today’s teens face potential risks associated with online life. Here is a general statistical snapshot of how teens use social network sites and the way they handle their privacy on them:

WSJ Breaking News: Information on the internet is not private | Anthony's Blog The Wall Street Journal published a breathtaking revelation (yes, the sarcasm is thick) that some information on Facebook is not private, even with the strictest privacy settings enabled: Many of the most popular applications, or “apps,” on the social-networking site Facebook Inc. have been transmitting identifying information—in effect, providing access to people’s names and, in some cases, their friends’ names—to dozens of advertising and Internet tracking companies, a Wall Street Journal investigation has found. Unfortunately, many legitimate news organizations including The Washington Post, The LA Times, Bloomberg News, and Forbes have propagated the fear that your information is not yours, and that Facebook is to blame. These news organizations are either attempting to drive traffic through fear mongering – or worse – they have no idea how the internet really works and are just simply trusting a “credible” source like the Wall Street Journal because they are uninformed and lazy.

Visualize your LinkedIn network with InMaps « If you’re a LinkedIn user, you already know the power of your professional network. What if you could visualize what your network looks like? Would your connections form clusters or groups? Now, you can! InMaps is an interactive visual representation of your professional universe that answers all of the above questions. Here’s how it works: your map is color-coded to represent different affiliations or groups from your professional career, such as your previous employer, college classmates, or industries you’ve worked in. Bigger names represent people who are the most connected within that specific cluster or group. Here’s where it gets interesting. Just like snowflakes, no two networks are the same. We hope you take some time visually exploring your network. To access your InMap, go to Ed. note: You must have 50 connections and 75 percent of your profile completed to access your InMap.

Twitter, Facebook, and social activism At four-thirty in the afternoon on Monday, February 1, 1960, four college students sat down at the lunch counter at the Woolworth’s in downtown Greensboro, North Carolina. They were freshmen at North Carolina A. & T., a black college a mile or so away. “I’d like a cup of coffee, please,” one of the four, Ezell Blair, said to the waitress. “We don’t serve Negroes here,” she replied. The Woolworth’s lunch counter was a long L-shaped bar that could seat sixty-six people, with a standup snack bar at one end. The seats were for whites. By next morning, the protest had grown to twenty-seven men and four women, most from the same dormitory as the original four. By the following Monday, sit-ins had spread to Winston-Salem, twenty-five miles away, and Durham, fifty miles away. The world, we are told, is in the midst of a revolution. These are strong, and puzzling, claims. Some of this grandiosity is to be expected. What makes people capable of this kind of activism?

Web 2.0 LMS Opportunities and Obstacles: Exploring OpenSocial, OpenID,and OpenCourseWare in NIXTY at e-Literate This is a guest post by Glen Moriarty, PsyD, for the On the Horizon series on distributed learning environments. Glen, who is CEO of NIXTY, has served in several executive and academic positions. He co-founded and led Scholar360 for several years. He is also a licensed psychologist and educator who has taught at the doctoral level. He has published and presented on eLearning, psychology, and technology, and is a member of the Society for the Scientific Study of Religion and the American Psychological Association. Glen lives in Norfolk, Virginia with his wife, Nicole, and their twins, Colin and Madeleine. “Don’t fight the Internet.” Learning management systems (LMS) have solved many problems by providing a way for people to learn in an online context. The above quote attributed to a CEO of a Major LMS company is not a real quote. My paper will explore the opportunities in moving to a Web 2.0 global learning environment. NIXTY is OpenSocial compliant. Google+ Comments

Related:  ignitedc