My Online Identity “In my own words” -Ashley Goldsmith.

Slides:



Advertisements
Similar presentations
Developed by Technology Services 1:1 Laptop Initiative
Advertisements

How to be safe in the digital world. How many ways can we communicate with other people and find out information about people?
P1 - Explain how multimedia is used to meet business objectives
National Network of Libraries of Medicine MidContinental Region Social Media & Privacy: Take Control Rebecca Brown: Dykes Health Sciences Library AND Sharon.
E-safety Quiz. Which one of these is not safe to share on your profile? Question 1.
Evelyn Stiller and Cathie LeBlanc Department of Computer Science and Technology Plymouth State University.
High School Safe Environment “Cyberbullying” Resources and Assessment Materials.
1 Cyber Safety Constable Maire Froud. 2 Overview Cyberspace Contract Setting Rules Using Social networking sites Cyber bullying.
The key aim for the week is: To ensure children are able to recognise and challenge bullying behaviour wherever it happens - whether face to face or in.
Cyber Bullying BEAT BULLYING.
Cyber Stalking By Samantha Brooks What Is Cyber Stalking? The simple definition: “the repeated use of electronic communications to harass or frighten.
Social Media 101 How to use it for the benefit of Rotary! Created by: Marc Durocher
Safeguarding. Your responsibility Your responsibility.
Social Media Tools Project Group #2: Shanaveia Banks, Katie Callahan, James Hamilton, Hannah Hocutt, Danielle Ivy, Tracey Kendrick.
CrossTour Fair "The Danubian Al-TOUR-native" January 2012 Innovations in E-marketing with a specific focus on SMEs Pieter Piket, Wesley Put- van.
Social Networking Vocabulary Cycle 2. Blog Vocabulary  blog – a personal or professional website which is updated on a regular basis with an individual’s.
 Social Networking  Posting and watching videos on YouTube  Blogging  Chat Rooms  Visiting Wikis  Googeling virtually ANY subject.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
Cyber Bullying Cyber bullying can happen in many different ways. The mains ways are either texting on a phone or ing. Cyber bullying is a criminal.
Cyber Bullying By Sarah Chaouk and Astede Woldegebriel.
WHAT DO WE USE COMPUTERS FOR? NEXT-. SOCIAL NETWORKING- ENTERTAINMENT- RESEARCH - WORK- SHOPPING - MEDIA-
Panther Forum Activity Week 9. Things to remember when you are using social media to communicate with others.
Cyber bullying is a type of abuse and harassment through media such as cell phone, internet, social network (e.g. Facebook, Twitter, My Spaces) MSN and.
“It’s More Than a Game, It’s Your Life” How to protect your digital footprint.
Social Media: a real example Samanta Bullock Brazilian Former No 1 Wheelchair Tennis Player in Brazil Doubles Silver Medal 2007 ParaPanAm Games Best ITF.
28 th January 2008 The Jitty. Why do we use the Internet? Communication Information Entertainment Escapism Attention seeking Genuinely seeking help Showcasing/promoting.
Ethical Issues in Computer Science CSCI 328, Fall 2013 Session 8 Ethics in IT Societies II.
INTERNET SAFETY Thornell Road Library Let’s Discuss: Information Privacy Social Networking CyberbullyingNetiquette.
EL CIVICS VIA TECHNOLOGY ORIENTATION AND SURVEY. Welcome to our orientation!
Text Stephanie Ciccarelli Marketing on Social Networks.
The social impacts of IT: Spending more time on the computer, laptop, phone, tab etc. than going outside. Negative effect on health. Negative effect on.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
 It is the use of technology such as a computer or cell phone to harm someone.  It occurs when someone is threatening, making fun of, or humiliating.
Tasting Mindfulness Convergence Capstone Presentation May 10, 2012 Kelly Hagen, Ashley Fleming, Michelle Ward, and Alaina Zermeño.
Parenting the “Net Generation.” What makes our kids “click”? Brentwood Preschool November 19, 2013,
Technology. Technology these days is improving a lot It can helps when you need help Quote.
DIGITAL ETIQUETTE Teachers Students Quiz What is Digital Etiquette? What is Digital Etiquette? Social Networking Social Networking Cyber Bullying Cyber.
CCJS e-Safety Questionnaire Q3: What Class are you in?
Patti Fowler Internet Safety Education Coordinator SC ICAC Task Force Office of the Attorney General Internet Safety.
94% of teens aged 12 – 17 use the Internet. 84% of online teens have a social networking profile. 84% of teens have cell phones; more than 88% are texting.
FEBRUARY 2016 E-Safety Assembly. HANDS UP IF YOU... Use the Internet everyday Play games online Watch videos on You Tube Post videos on You Tube Have.
Sarah Manuel Final Presentation MCO435-Social Media.
Cyberbullying. What is Cyberbullying? Cyberbullying is is bullying that takes place using electronic technology such as cell phones, computers, and tablets.
“Doing the Right thing online” Online Safety. Socializing Communicating Creating Playing Exploring Learning.
Mass Media – the Internet  Role of media  Types of media  What is the Internet  www  Information on the Internet  Usage of the Internet  Favourite.
Digital Citizenship.  I can…. What is digital citizenship?  Think.Pair.Share.
Chapter 9 social networking
How to be safe on the internet By Blake
Digital Citizenship.
Discussion – what kind of bullying is taking place in the images
What Is Bullying? Bullying is defined as the repetitive, intentional hurting of one person or group by another person or group where the relationship.
Pupil eSafety Survey Results
Social Media Plan For the Classroom
Avatars.
Digital Citizenship.
Online Chatting With Strangers - Dopoxy.com
CYBER- BULLYING.
P1 – Understand how Multimedia is Used To Meet Business Objectives
R E A D What is cyber bullying? Hall
SOCIAL MEDIA: ARE YOU PLAYING IT SAFE?.
Digital Citizenship Module 3: Social networking
Cyber Bullying.
SAFER INTERNET DAY 2016.
Facebook Social networking.
ICT CyberSecurity Lesson 2:
Digital Citizenship.
Mass Media – the Internet
Bullying, Cyber-Bullying, Internet Safety
Digital Citizenship.
Negative effects that modern society has on teens
Presentation transcript:

My Online Identity “In my own words” -Ashley Goldsmith

Online Identity * Online Identities are a new form of creating new personalities in this world of new media. Some people use these identities to voice out political opinion with the power of anonymity of the Internet. While some others may use it as a way of cyber bullying other in secret so they will not face the wrath of authorities and their victims. One of the other types of people who create online identities are those who use it not to hide themselves but use these new social networking tools such as Facebook, Twitter and all the others to help promote themselves on the new medias. Entertainers and celebrities are especially in need of this service in order to get their image out to more area of their fan’s lives. Though in their case they have a unique problem of their own that it comes with.

Ashley In Second Life * Lets take a tour with avatar PrincessAshley1212 * PrincessAshley1212 = Ashley Goldsmith

A day in Second Life How I present myself in virtual computer games * Rutgers College Student *Gender: Female *Personality

Ashley on Facebook Lets take a tour of Ashley’s home page *Ashley’s photos *Ashley on chat *Ashley profile

THE END…..

PAPERINPDFPAPERINPDF