Danah boyd IS208BApril 12, 2004 Identity and Deception April 12, 2004 IS 208B.

Slides:



Advertisements
Similar presentations
Seeing and Organizing Identity Online thoughts on digital context, perception of self and identity management.
Advertisements

High School Program Safe Touch Material for this presentation was attained from West County Psychological Associates© Powerpoint presentation designed.
DR. BO BRINKMAN MIAMI UNIVERSITY COMP. SCIENCE Using SL in Teaching Social Impact of Technology.
Key Stage Three Resources
 Met with my groups face to face, presented a topic and had open time for questions  ed the information once a week to Moms that attended the.
Sharing Personal Information
Social Networking Websites BENATUIL, Eduardo KIM, Na Hyun WELMOND, Benjamin.
May 16, “I have been through some terrible things in my life, some of which actually happened.” - Mark Twain.
Social Media for Nonprofits HOW AND WHY OF SOCIAL MEDIA FOR NONPROFITS.
DIVERSITY & HARASSMENT CYCLE 5 Connect the Dots.
Cyberbullying When good technology goes bad…….. Stay safe in cyberspace.
CYBER BULLYING…. What Is Cyber Bullying??? 0 "Cyber bullying" is when a child, preteen or teen is tormented, threatened, harassed, humiliated, embarrassed.
Mathematical Sciences Promoting a Respectful Environment “The secret of education lies in respecting the student.” Ralph Waldo Emerson Heather Jackson.
Dramaturgical metaphors as information theories April 7, 2004 IS 208B.
Cyber Bullying By Elizabeth Ward. What is Cyber Bullying? Cyber Bullying is when one minor is targeted by another minor through threats, torments, harassment,
PARENTING YOUR TEENAGER UNDERSTANDING TEENAGE DEVELOPMENT 1. Physical Development 2. Intellectual Development 3. Social Development 4. Emotional Development.
Emotional Intelligence: Self-Control and Empathy
Social Graphing Doug Curling New Kent Capital April 2011 Beyond.
Incorporating Topics of Culture and New Media Technologies into Introduction to Communication Course Judith N. Martin, 2011.
Social Network Fragments danah boyd :: V-Day/UC-Berkeley Jeff Potter :: Atof Inc. An Interactive Tool for Exploring Digital Social Connections.
Digital Citizenship and Media Literacy
Personal Safety Unit - Level 7. The Internet is not anonymous. Your address, screen name, and password serve as barriers between you and others.
Chap 2 Hanging Out with Friends Social Network Sites for Socializing, Developing Support Networks, and Sharing Cultural Artifacts. MySpace, (banned) EggMilker.
Do they perceive the risks? TEENS AND SOCIAL NETWORKING.
Chapter 7 Vive La Difference?. Gender Role Stereotyping….
Digital Citizenship Literacy
Moral, Social and Ethical issues associated with the Internet
Vizster: Visualizing Online Social Networks Authors: Jeffrey Heer and Danah Boyd Presented by: Jeanne Kramer-Smyth Machon Gregory.
STRANGER AWARENESS. CONCEPT : Think critically about developing relationships with people online EXPECTATIONS: You should be able to...  compare and.
Wolfpack Advocacy Hour January 17, 2012 Grade 9 Objective: Students will 1. Understand the concept of online ethics as it applies to four key areas 2.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
SESSION 17 (1) Pew Internet and American Life Project – explore this resource (2) Deception, Reputation, Community.
Online Safety Objective8: Practice safe uses of social networking and electronic communication such as recognizing dangers of online predators and protecting.
Intimacy Among Friends and changing Concepts of Love and Companionship Gerontology 410 Feb 2008.
The prevention of sexual abuse of children in our communities Practical ideas to empower parents and others Social Services Providers’ Aotearoa Conference.
1: Inter-Act, 13th Edition Orientation.
BYOD: Bring Your Own Device
Overall Health Physical Mental/Emotional Sexual Social So while some may be uncomfortable with taking about sexual health it is one area where we need.
1 Becoming more like friends: the significance of personal media in social networking processes Article is intended to be part of my thesis: Young people.
Dating Violence Awareness PowerPoint Slideshow #1 A workshop for individuals with disabilities and low English literacy.
Digital Citizenship Unit 1 Review True/Not True. The agreement that’s students and parent’s sign that describes the school district’s online policy is.
 Cyber Bullying is the use of technology to either bully, embarrass, harass or threaten another.  Some example of technology include:  Instant Messaging.
Helping Keep Kids Safe in a Digital World. G-K Tech / Safety Efforts at School  “Regular” Machines  Filtering at School  iPads  Computers  Chromebooks.
Welcome!! CyberBullying SkyCast. CyberBullying Today’s Aims: To create a therapeutic ‘online space’ during the SkyCast! To understand more about cyberbullying:
Social Networking Technologies for Learning June 14, 2010 Reading Revolution.
Interpersonal Communication
What’s Cyberbullying?. Today’s Objective: To be able to empathize with the targets of cyberbullying, recognize some of the key similarities and differences.
Values. What are Values? Qualities, Characteristic or ideas about which we feel very strongly. Value define what is of worth. Our values affect our decisions,
English We will be learning about the story and the characters from the Gruffalo. We will be learning to write simple and compound sentences with the correct.
Continuous Improvement Project Destination What is the desired outcome? My students will always check the validity of information they find on the internet.
Alexis McGillivray All gifs from giphy.com. How Might Your Digital Footprint Effect Your Future Opportunities? You have ticked the Box that says “seen.
DIGITAL ETIQUETTE Teachers Students Quiz What is Digital Etiquette? What is Digital Etiquette? Social Networking Social Networking Cyber Bullying Cyber.
Languaging for Leadership Choosing words that work better.
Overview People are engaged in on-going work of constructing shared understanding of the task Understanding of one another Group identity, behavior, norms.
Awareness raising session for Parents and Carers June Todd Awareness raising session for Parents and Carers June Todd.
1. When was the first selfie taken? a) 2002b) 1839c) When was the first sent? a)1991b) 1982c) Can you name the popular apps/websites.
E-safety Helping your children stay safe on-line A presentation for Parents.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Aristotle, a great thinker, once said: “We are what we repeatedly do.”
1. Read the following presentation and watch the videos for your grade level. 2. Write your name on your index card and answer the “Bob” questions at the.
Christian Citizenship in a Digital World Lesson 4:Digital Etiquette.
Measuring Attitudes A person’s attitude towards an attitude object may be measured in two ways. Obseravtion of behavioural signals Highly positive or.
Digital Citizenship Scaffold
Respectful Relationships within the Victorian Curriculum F-10
Safe Online Dating – Tips Every Women Should Know
K-3 Student Reflection and Self-Assessment
Respectful Relationships within the Victorian Curriculum F-10
Sex and Relationships Education workshop
:: SecureId :: Security of Identity Through Knowledge
Welcome to the E Safety Workshop
Presentation transcript:

danah boyd IS208BApril 12, 2004 Identity and Deception April 12, 2004 IS 208B

danah boyd IS208BApril 12, 2004 Today’s Topic Identity Deception Issues of Trust, Reputation

danah boyd IS208BApril 12, 2004 Identity - The “body” Representation: Profiles, handles, blog URL, addresses –Lacks known characteristics of the body Process of projecting self into container –Affected by personal experiences –“The Turing Game” Maximizes given, minimizes given off

danah boyd IS208BApril 12, 2004 Negotiating Identity Projecting self to an unknown audience –Lurkers –Future visitors (persistence) –No context/reaction cues Collapsing of faceted self –What norms are appropriate? –Deja search, Google

danah boyd IS208BApril 12, 2004 Why does identity matter? Build up reputation, trust Interact in a socially appropriate way Bring online relations into everyday life Anonymity fails in all accounts Pseudonymous identity sometimes appropriate

danah boyd IS208BApril 12, 2004 Identity and Friendster Context derived by invitee –Maximizes apparent clusters –Maximizes understood norms Profile shifts when broader context realized –Vulnerability, collapsing of facets –Teacher anecdote

danah boyd IS208BApril 12, 2004 Deception Morality issue? Culturally determined? What is to be gained/lost? –Protection of self -> honor –Protection of situation/context -> respect Often poorly constructed as protection of other Consequence: embarrassment or feeling of deceit? –Opportunity to try something new Keys: context, consequences

danah boyd IS208BApril 12, 2004 Deception Signaling Assessment signals –Follows handicapped principle –Large muscles to show strength Conventional signals –“Gold’s Gym Powerlifter” T-shirt –Loses value based on inaccuracy of signal

danah boyd IS208BApril 12, 2004 Everyday Deception How are you? -> I’m fine –You say it when it’s not true –Maintain social appropriateness Walking briskly at night or around panhandlers –Signal: being in a hurry –Self-protection (from physical and/or emotional issues)

danah boyd IS208BApril 12, 2004 Digital Deception Few assessment signals, only conventional –Problems with coarse descriptors Failure to read assessment signals –What is “written on the body”? Conventional deception that was not previously possible –Gender, race, age

danah boyd IS208BApril 12, 2004 Is identity deception problematic? Exploring different demographics, different configurations of life Acting out dysfunctional home life in SIMS (Turkle) Access to “privileged” information –Women, minorities & cars in the Valley –Tech bulletin boards

danah boyd IS208BApril 12, 2004 Technology permits deception Mobile phone: “I’m going under the bridge.. i’m going to break up!” “Sorry, my spam filter must have eaten it” IM: “It’s not accurate about my away time”

danah boyd IS208BApril 12, 2004 Increasing Accuracy May Not Be Desired Polaroids and Dalai Lama Dots –Constructing the story as appropriate –Ephermality was becoming more precise… Do we really want location information? Vulnerability management

danah boyd IS208BApril 12, 2004 Accuracy and YASNS “Are you my Friend? Yes or no!?!?” –Social appropriateness of saying no… Fakesters Social network models all wrong –Lacking strength of ties –Structural differences