Chapter 3 Forming Online Identities Online Communication.

Slides:



Advertisements
Similar presentations
Seeing and Organizing Identity Online thoughts on digital context, perception of self and identity management.
Advertisements

Creating the Ultimate Online Customer-Service Experience Stefan Beeli, Vice President ESP Computer Services Choosing the proper level of Technology A look.
Cyber Law & Islamic Ethics CICT3523 COMPUTER CRIMES.
MARKETPLACE FRAUD How the Assistance Network can Prevent, Detect, and Report suspected fraud.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
1 Identity Theft and Phishing: What You Need to Know.
Computer Security Fundamentals by Chuck Easttom Chapter 3 Cyber Stalking, Fraud, and Abuse.
Identity Theft By: Tory Childs, Lucas Doyle, Kaitlyn Davidson, Trevor Godwin and Chad Sponseller.
Theories of CMC.
Unit 1 By Oscar Ramsden. Contents This power point will be about the social impact of ICT on society, this power point will be on the subjects below on.
The Mixed Blessings of Non- Face-to-face Interactions in Online Courses Nicholas C. Burbules University of Illinois.
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
Cyber X-Force-SMS alert system for threats.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Outline of presentation Brief introduction of Facebook as a social networking tool Research questions Methods Findings and Results Some Experimentation.
1 of 2 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
Copyright © 2002 Pearson Education, Inc. Slide 5-1 PERTEMUAN 8.
CSC101 FINAL PROJECT by Sally Fletcher & Nicole Seguin December 11 th, 2003.
CmpE 25 10/25/2011 – 10/27/2011. Identity and Privacy How important is identity online? How important is identity online? Can you connect identity online.
IDENTITY THEFT BY: Victoria Jeffcoat CSCI 101 Lecture Tuesday 2pm.
“Ethics Online” Shaping social behavior online takes more than new laws and modified edicts. Deborah G. Johnson Communications of the ACM Vol. 40, No.
“Electronic Payment System”
COMPUTING AT CARNEGIE MELLON SECTION I2 Privacy. Introduction Lauren Milisits.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
Chapter 10 E-Commerce Security.
PART THREE E-commerce in Action Norton University E-commerce in Action.
6.2.1 Computer Applications How the use of technology affects humans CYBERBULLYING Slide Show created by Mae Thomas Sep 2009.
ANTI-BULLYING AT KNIGHTLOW CYBER BULLYING. Cyber bullying: fact or fiction? 1. There are at least 7 forms of bullying that happen using technology True.
Workshop: Critique of Writing The Art Institute of Pittsburgh Online Division Web Design Interactive Media Greg O'Toole,
Product Stewardship: Putting It into Practice GCWellon, Manager, Responsible Care Methanex Corporation June 2010.
Do you believe in this? Due to its very nature, the Internet is NOT a safe or secure environment. It is an ever-changing medium where anyone and everyone.
Behavior in Second Life: Redefining Fantasy in the Metaverse.
Privacy in computing Material/text on the slides from Chapter 10 Textbook: Pfleeger.
Identity DeeAnna Frazier, Sara Omlor, Anissa Ferrer, Emmalee Barr.
PRIVACYRELIABILIT Y SECURITY Secures against attacks Protects confidentiality, integrity, and availability of data and systems Helps manage risk Protects.
Section 12.1 Discuss the functions of a Web site Create a feedback form Compare and contrast option buttons and check boxes Section 12.2 Explain the use.
Chapter 4 Relating Online Online Communication. In this chapter, you will learn: The theoretical perspectives on online relationships; How limited nonverbal.
Modes of Education. Dialogue Lecture/Instruction Facilitation.
 Make a list of things you did today. From the time you got up until now.  Who you talked to? How you communicated?  What you did before you came to.
Designing Online Communities Melissa Koch SRI International January 29, 2002.
Managing Your Money Chapter 23.
International Security Management Standards. BS ISO/IEC 17799:2005 BS ISO/IEC 27001:2005 First edition – ISO/IEC 17799:2000 Second edition ISO/IEC 17799:2005.
Copyright © 2007 Pearson Education, Inc. Slide 8-1 E-commerce Kenneth C. Laudon Carol Guercio Traver business. technology. society. Third Edition.
© 2008 i-SAFE Inc. an i-SAFE presentation. © 2008 i-SAFE Inc. Learning Goals YOU WILL: Understand that an online stranger is anyone met exclusively online.
Computer crimes.
Chapter 11 CYBERLAW. 2 Cyberlaw is not a new body of laws. Cyberlaw is not a new body of laws. Cyberlaw is the application of existing laws and legal.
Groups Chapter 9 Shedletsky & Aitken Human Communication on the Internet.
PRIVACYRELIABILIT Y SECURITY Secures against attacks Protects confidentiality, integrity, and availability of data and systems Helps manage risk Protects.
Chichester School District is providing students access to the district’s electronic network. This network includes Internet access, computer services,
Credit and debt management. Student Learning Objective Compare and contrast the financial benefits of different products and services offered by a variety.
Unit 2- Privacy and Cyberspace Kaizen MIDTERM Definition of Terms How is Technology eroding our privacy and anonymity? Protecting privacy online.
Chapter One Copyright © 2016 Thomas J. Holt. All rights reserved.
BY CONOR DALY Public Trust Online. What is E-commerce? The buying and selling of products and services by businesses and consumers through an electronic.
1 Intimacy and Distance in Relational Communication Looking Out, Looking In 12 th Edition  Chapter Summary Intimacy in Relationships Self-Disclosure in.
Information Security and Privacy in HRIS
Computer Security Fundamentals
Creating your online identity
Identity on the Internet
PAYMENT GATEWAY Presented by SHUJA ASHRAF SHAH ENROLL: 4471
Security.
Chapter 5 Electronic Commerce | Security
When you get caught for Identity Theft
Chapter 5 Electronic Commerce | Security
Chapter 3: Collaboration
Presentation transcript:

Chapter 3 Forming Online Identities Online Communication

In this chapter, you will learn: Factors that guide our perceptions of telepresence; The rewards of experimenting with identity; Three perspectives on identity manipulation; Threats to identity posed by new technologies; and Ways you can protect your own identity. Online Communication

Telepresence is the degree to which one feels involved in a mediated environment. depends in part on our perceptions of vividness, or the amount of sensory information the medium offers. also depends on the amount of interactivity, or the ability to manipulate the environment of the medium. Online Communication

Measures of Interactivity Speed of manipulating the environment Range, or amount of the environment affected Mapping, or the response of the environment to the actions of the user Online Communication

Multiple Identities Sherry Turkle suggests that people experiment with multiple identities online. In this way they can see the familiar through unfamiliar eyes and can exercise greater control over their identities than in real life. Online Communication

avatar: an incarnation of oneself in a virtual environment

Online Communication gender-swapping: the adopting of a gender other than one’s own in presenting oneself in mediated contexts

Honesty in Representing Self Online Online Communication Buten, J. (1996). The personal home page institute..

Identity, Pseudonymity, & Anonymity identity: a construct formed by the interaction of the self with the social environment pseudonymity: the use of a “false name” or alias that a person adopts to identify him or herself anonymity: communicating without one’s identity being apparent Online Communication

Threats to Identity identity fraud a criminal’s misuse of another individual’s personal information to make unauthorized purchases or other crimes shadow pages a page on the Web established to attack the reputation of a person, corporation, or another site Online Communication

Protecting Against Identity Fraud Confirm that anyone to whom you give your personal information isn’t selling it to a third party Shred sensitive documents when disposing of them Share your Social Security number only when absolutely necessary Monitor billing cycles for regularity Online Communication

A Brief Review 1. What two qualities contribute to telepresence? 2. What are the benefits to experimenting with identity? 3. What three terms are used to discuss the degree to which someone is known? 4. What are two threats to identity made more important because of new technology? 5. How can you protect your identity? Online Communication