The University's Director of Employability and Careers, Tom Banham, looks at some of the ways by which you can enhance your online reputation:
The web is a surprisingly indelible thing. Yes, webpages might die as the years go on, but morsels may still linger in web archives and search engine caches. Newspaper appearances, work staff profiles, publications, registries, social media activity… you will have left your mark in some small way or other: information about you is almost certainly on the internet, somewhere. It’s pretty inescapable.
That accepted, what can you do to make as benign or as positive as possible this ‘digital footprint’ that you (or others on your behalf) have left behind? Our Director of Employability and Careers, Tom Banham, looks at some of the ways by which you can enhance your online reputation.
The act of speaking your mind on the internet can lead you open to all manner of abuse, and this risk is increased for certain groups. Yes, you can ignore some of it. But you can only ignore so much. And let’s be clear: you shouldn’t have to ignore anything of this kind.
In her Guide to Internetting While Female, Feminist Frequency’s Anita Sarkeesian defines six forms of online trolling. Perhaps you’ve experienced some for yourself…
Feminist Frequency have produced a guide to protecting yourself from online harassment which offers best-practice for online privacy and safety, as well as advice for reporting harassment. It’s important to have the confidence to recognise problems as quickly as possible so that you can speak out against abusers, document their abuse and report them. It’s also important to remember that if someone harasses or threatens you online, it’s not you that is in the wrong.
Here, Dr David Beer explains how we live in an environment where the amount of data accumulated about us is huge, and contemplates how this might affect the way that we behave in ‘real life’.
The information trail we leave online isn’t just a reputational concern. We can give away a lot of personal details, and while for the most part this will be just noise in the internet, it is information that can be used against us, as IT expert Tom Smith explores:
The TV series Hunted provides an effective (and entertaining) illustration of how our online activity can betray our movements, our intentions and our personal networks. In some cases, confiscated devices, phishing attempts and hacked passwords are used as a means of gaining sensitive information, but all too regularly the clues hide in plain sight: on open social media accounts that any of us can see. If you're posting in an open forum, anybody can access that information.
Tweeting something like…
…is obviously a bad idea. But communicating even snippets of such information has risks, because snippets can build into a larger picture about you and your circumstances.
It isn't just what we post that poses a potential risk. Our accounts themselves may be sharing more than we might think. If you've ever seen your Facebook profile picture staring back at you from the comments section of a blog post, or if you've seen adverts targeting your interests, you'll have an idea of the kind of thing that can get passed around. It's a good idea to go through your social media security settings with a fine-toothed comb now and again, to lock down as much as you're able, but inevitably there is a tradeoff between security and functionality.
There are other measures you can take to stay private online. For more sensitive activity you could use the privacy mode on your web browser, and there are browser extensions like Privacy Badger, Ghostery and uBlock Origin (the latter installed on University instances of Chrome and Firefox) which can be used to block tracking activity and social media integration. But perhaps the simplest way of staying private on the internet is to not share personal information in the first place.
Whichever side you are positioning yourself on, it’s difficult to escape the evidence that, in the internet age, when we use free applications, platforms, and services, often the trade off is that we ‘pay’ the price of using these services by allowing them to harvest our personal data. In short:
You don’t have to do much searching to find examples of companies building enormous databases filled with billions of our interactions, searches, website visits, purchases and other personal information. Sometimes they will be trading this information to advertising and marketing agencies to ‘personalise’ our online experience and encourage sales based on our previous behaviours; at other times they will be using this information to inform the development of their products based on those behaviours. Even a privacy application may be making money out of your data in some way.
Forthcoming sessions on :
There's more training events at: