SlideShare une entreprise Scribd logo
1  sur  7
Digital Identity
What is it?
Thouraya.daouas@ihec.rnu.tn
Dr. Thouraya Daouas
Digital identity
• The set of activities you do on Internet contributes in
defining your digital identity.
• It’s constructed by many elements:
– Personal data associated with your profile.
– Information you publish on Internet.
– Information about you that others publish.
– Tracks you leave consciously or not.
• User can have three types of identifier:
– Professional or institutional related to a professional activity.
– Private identifiers for personal use (social network, online selling,
mail, online banking, etc.)
Dr. Thouraya Daouas 2Digital Identity
Digital identity
• How to master it?
– User should choose sensibly its identifier to be used
according to his activity;
– User limits the access to the information which he
publishes;
– User checks regularly his image on Web or e-
reputation.
Dr. Thouraya Daouas 3Digital Identity
Authentification
• Procedure which checks that the information
about connection supplied is correct (identifier
and password, fingerprints, etc.).
• Some rules are important to respect:
– Keep secret the password.
– Choose a complex password (Combining necessarily
small letters, capital letters, numbers and symbols).
Should not have evident meaning.
– Should not usurp an identity.
Dr. Thouraya Daouas 4Digital Identity
Configuration of profile
• Connection identifier can be associated to a profile
containing photos, personal information and
preferences.
• It is possible to configure information access:
– Public: accessible for everyone and referenced in search
engines.
– Restricted: accessible for authorized community and not
referenced.
• In case of emails, a signature could be put at the end of the
email body or a visit card could be joint to the email.
Dr. Thouraya Daouas 5Digital Identity
Digital tracks
• What could we find in the file properties?
– Date, Time, Author name, Revision number, Camera model, etc.
• What can we know about the user identity?
– Each connected computer has an IP address given to user by the
Internet service provider which has to keep during one year the list of
connections and the information allowing to identify the Internet
user.
– When we consult a web page, the browser sends a request to the
server to get back the data (texts, images, etc.) to download. Server
can keep track and follow so the browsing on the site.
– In email header are stored a series of IP addresses describing servers
which can supply indications on sender geographical localization.
Dr. Thouraya Daouas 6Digital Identity
e-Reputation
• e-Reputation or digital reputation is the image can be made
of a person through the Web.
• We must be aware that:
– Everybody can publish on Web without any control: on a blog or a
social network, by participating in a discussion forum, by publishing a
site to a host, etc.
– We loose the control of an information published with a " public
access ": from the moment where an information is public, it can be
indexed by search engines and copied out in their mask memory. It
can put several months disappearing.
Dr. Thouraya Daouas 7Digital Identity

Contenu connexe

Tendances

Your digital identity
Your digital identityYour digital identity
Your digital identityTC Techies
 
Digital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy DetectionDigital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy Detectionncct
 
Presentation on Internet Cookies
Presentation on Internet CookiesPresentation on Internet Cookies
Presentation on Internet CookiesRitika Barethia
 
Open Source Learning Management System - Canvas
Open Source Learning Management System - CanvasOpen Source Learning Management System - Canvas
Open Source Learning Management System - CanvasEbizon
 
E-Signature Vs. Digital Signature
E-Signature Vs. Digital Signature E-Signature Vs. Digital Signature
E-Signature Vs. Digital Signature Mahmoud Ezzat
 
Data Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsData Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsAT Internet
 
Cyber law & Intellectual property issues
Cyber law & Intellectual property issuesCyber law & Intellectual property issues
Cyber law & Intellectual property issuesatuljaybhaye
 
Digital Evidence by Raghu Khimani
Digital Evidence by Raghu KhimaniDigital Evidence by Raghu Khimani
Digital Evidence by Raghu KhimaniDr Raghu Khimani
 
Emerging trends in it technology
Emerging trends in it technologyEmerging trends in it technology
Emerging trends in it technologyChetan Sagar
 
YouTube Presentation
YouTube PresentationYouTube Presentation
YouTube Presentationguest786f62
 
Data protection ppt
Data protection pptData protection ppt
Data protection pptgrahamwell
 
“Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation “Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation tomasztopa
 

Tendances (20)

Your digital identity
Your digital identityYour digital identity
Your digital identity
 
Digital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy DetectionDigital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy Detection
 
Presentation on Internet Cookies
Presentation on Internet CookiesPresentation on Internet Cookies
Presentation on Internet Cookies
 
Instant messaging
Instant messaging Instant messaging
Instant messaging
 
Open Source Learning Management System - Canvas
Open Source Learning Management System - CanvasOpen Source Learning Management System - Canvas
Open Source Learning Management System - Canvas
 
E-Signature Vs. Digital Signature
E-Signature Vs. Digital Signature E-Signature Vs. Digital Signature
E-Signature Vs. Digital Signature
 
Facebook privacy and security
Facebook privacy and securityFacebook privacy and security
Facebook privacy and security
 
Data Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsData Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethics
 
Cyber law & Intellectual property issues
Cyber law & Intellectual property issuesCyber law & Intellectual property issues
Cyber law & Intellectual property issues
 
Digital Evidence by Raghu Khimani
Digital Evidence by Raghu KhimaniDigital Evidence by Raghu Khimani
Digital Evidence by Raghu Khimani
 
Data and software privacy
Data and software privacyData and software privacy
Data and software privacy
 
Whatsapp
WhatsappWhatsapp
Whatsapp
 
Data privacy & social media
Data privacy & social mediaData privacy & social media
Data privacy & social media
 
Twitter Analytics
Twitter AnalyticsTwitter Analytics
Twitter Analytics
 
Emerging trends in it technology
Emerging trends in it technologyEmerging trends in it technology
Emerging trends in it technology
 
Digital Piracy
Digital PiracyDigital Piracy
Digital Piracy
 
YouTube Presentation
YouTube PresentationYouTube Presentation
YouTube Presentation
 
Data protection ppt
Data protection pptData protection ppt
Data protection ppt
 
“Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation “Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation
 
Steganography
SteganographySteganography
Steganography
 

Similaire à Digital identity

DIGITAL FOOTPRINT-WPS Office.pptx
DIGITAL FOOTPRINT-WPS Office.pptxDIGITAL FOOTPRINT-WPS Office.pptx
DIGITAL FOOTPRINT-WPS Office.pptxT Tanujha
 
How you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNsHow you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNsIulia Porneala
 
CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024Brian Pichman
 
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter StyleCybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter StyleBrian Pichman
 
4.2.1 Network Issues and Communication.pptx
4.2.1 Network Issues and Communication.pptx4.2.1 Network Issues and Communication.pptx
4.2.1 Network Issues and Communication.pptxTeenaSharma73
 
4.2.1 Network Issues and Communication [Autosaved].pptx
4.2.1 Network Issues and Communication [Autosaved].pptx4.2.1 Network Issues and Communication [Autosaved].pptx
4.2.1 Network Issues and Communication [Autosaved].pptxTeenaSharma73
 
Computer Science – societal impact.pptx
Computer Science – societal impact.pptxComputer Science – societal impact.pptx
Computer Science – societal impact.pptxNano894860
 
Ethics,security and privacy control
Ethics,security and privacy controlEthics,security and privacy control
Ethics,security and privacy controlSifat Hossain
 
Security issues in E-commerce
Security issues in E-commerceSecurity issues in E-commerce
Security issues in E-commercenikitaTahilyani1
 
BCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptxBCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptxKirti Verma
 
20131030 hkpasea presentation[1]
20131030 hkpasea presentation[1]20131030 hkpasea presentation[1]
20131030 hkpasea presentation[1]Alex Hung
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information PrivacyPerry Slack
 
Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Kirsten Thompson
 
Community IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best PracticesCommunity IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best PracticesCommunity IT Innovators
 
Securing and Safeguarding Your Library Setup
Securing and Safeguarding Your Library SetupSecuring and Safeguarding Your Library Setup
Securing and Safeguarding Your Library SetupBrian Pichman
 
Eds user authenticationuser authentication methods
Eds user authenticationuser authentication methodsEds user authenticationuser authentication methods
Eds user authenticationuser authentication methodslapao2014
 
SERVICES ON THE INTERNET
SERVICES ON THE INTERNETSERVICES ON THE INTERNET
SERVICES ON THE INTERNETRiya Gupta
 

Similaire à Digital identity (20)

DIGITAL FOOTPRINT-WPS Office.pptx
DIGITAL FOOTPRINT-WPS Office.pptxDIGITAL FOOTPRINT-WPS Office.pptx
DIGITAL FOOTPRINT-WPS Office.pptx
 
How you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNsHow you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNs
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Web services
Web servicesWeb services
Web services
 
CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024
 
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter StyleCybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
 
4.2.1 Network Issues and Communication.pptx
4.2.1 Network Issues and Communication.pptx4.2.1 Network Issues and Communication.pptx
4.2.1 Network Issues and Communication.pptx
 
4.2.1 Network Issues and Communication [Autosaved].pptx
4.2.1 Network Issues and Communication [Autosaved].pptx4.2.1 Network Issues and Communication [Autosaved].pptx
4.2.1 Network Issues and Communication [Autosaved].pptx
 
Computer Science – societal impact.pptx
Computer Science – societal impact.pptxComputer Science – societal impact.pptx
Computer Science – societal impact.pptx
 
Unit 3B.pdf
Unit 3B.pdfUnit 3B.pdf
Unit 3B.pdf
 
Ethics,security and privacy control
Ethics,security and privacy controlEthics,security and privacy control
Ethics,security and privacy control
 
Security issues in E-commerce
Security issues in E-commerceSecurity issues in E-commerce
Security issues in E-commerce
 
BCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptxBCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptx
 
20131030 hkpasea presentation[1]
20131030 hkpasea presentation[1]20131030 hkpasea presentation[1]
20131030 hkpasea presentation[1]
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information Privacy
 
Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?
 
Community IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best PracticesCommunity IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best Practices
 
Securing and Safeguarding Your Library Setup
Securing and Safeguarding Your Library SetupSecuring and Safeguarding Your Library Setup
Securing and Safeguarding Your Library Setup
 
Eds user authenticationuser authentication methods
Eds user authenticationuser authentication methodsEds user authenticationuser authentication methods
Eds user authenticationuser authentication methods
 
SERVICES ON THE INTERNET
SERVICES ON THE INTERNETSERVICES ON THE INTERNET
SERVICES ON THE INTERNET
 

Plus de Thouraya Daouas

Pich aux LUDOVIALES 2020
Pich aux LUDOVIALES 2020Pich aux LUDOVIALES 2020
Pich aux LUDOVIALES 2020Thouraya Daouas
 
Présentation d'une communication acceptée dans ICERI2018.
Présentation d'une communication acceptée dans ICERI2018.Présentation d'une communication acceptée dans ICERI2018.
Présentation d'une communication acceptée dans ICERI2018.Thouraya Daouas
 
Présentation d'une communication acceptée dans Iceri2019
Présentation d'une communication acceptée dans Iceri2019Présentation d'une communication acceptée dans Iceri2019
Présentation d'une communication acceptée dans Iceri2019Thouraya Daouas
 
La place de la technologie dans l'enseignement: Le changement a eu lieu.
La place de la technologie dans l'enseignement: Le changement a eu lieu.La place de la technologie dans l'enseignement: Le changement a eu lieu.
La place de la technologie dans l'enseignement: Le changement a eu lieu.Thouraya Daouas
 
Le virtuel dans l’enseignement exploiter le ‘e’ pour améliorer l’apprentissage
Le virtuel dans l’enseignement exploiter le ‘e’ pour améliorer l’apprentissageLe virtuel dans l’enseignement exploiter le ‘e’ pour améliorer l’apprentissage
Le virtuel dans l’enseignement exploiter le ‘e’ pour améliorer l’apprentissageThouraya Daouas
 

Plus de Thouraya Daouas (10)

Fish philosophie
Fish philosophieFish philosophie
Fish philosophie
 
Pich aux LUDOVIALES 2020
Pich aux LUDOVIALES 2020Pich aux LUDOVIALES 2020
Pich aux LUDOVIALES 2020
 
Présentation d'une communication acceptée dans ICERI2018.
Présentation d'une communication acceptée dans ICERI2018.Présentation d'une communication acceptée dans ICERI2018.
Présentation d'une communication acceptée dans ICERI2018.
 
Présentation d'une communication acceptée dans Iceri2019
Présentation d'une communication acceptée dans Iceri2019Présentation d'une communication acceptée dans Iceri2019
Présentation d'une communication acceptée dans Iceri2019
 
De la craie au virtuel
De la craie au virtuelDe la craie au virtuel
De la craie au virtuel
 
La place de la technologie dans l'enseignement: Le changement a eu lieu.
La place de la technologie dans l'enseignement: Le changement a eu lieu.La place de la technologie dans l'enseignement: Le changement a eu lieu.
La place de la technologie dans l'enseignement: Le changement a eu lieu.
 
Work flow
Work flowWork flow
Work flow
 
Le virtuel dans l’enseignement exploiter le ‘e’ pour améliorer l’apprentissage
Le virtuel dans l’enseignement exploiter le ‘e’ pour améliorer l’apprentissageLe virtuel dans l’enseignement exploiter le ‘e’ pour améliorer l’apprentissage
Le virtuel dans l’enseignement exploiter le ‘e’ pour améliorer l’apprentissage
 
Plateforme uvt c2i
Plateforme uvt c2iPlateforme uvt c2i
Plateforme uvt c2i
 
Plateforme e circle
Plateforme e circlePlateforme e circle
Plateforme e circle
 

Dernier

Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...
Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...
Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...ZurliaSoop
 
Hire↠Young Call Girls in Hari Nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esco...
Hire↠Young Call Girls in Hari Nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esco...Hire↠Young Call Girls in Hari Nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esco...
Hire↠Young Call Girls in Hari Nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esco...Delhi Call girls
 
Production diary Film the city powerpoint
Production diary Film the city powerpointProduction diary Film the city powerpoint
Production diary Film the city powerpointAshtonCains
 
Social media marketing/Seo expert and digital marketing
Social media marketing/Seo expert and digital marketingSocial media marketing/Seo expert and digital marketing
Social media marketing/Seo expert and digital marketingSheikhSaifAli1
 
Film show pre-production powerpoint for site
Film show pre-production powerpoint for siteFilm show pre-production powerpoint for site
Film show pre-production powerpoint for siteAshtonCains
 
Craft Your Legacy: Invest in YouTube Presence from Sociocosmos"
Craft Your Legacy: Invest in YouTube Presence from Sociocosmos"Craft Your Legacy: Invest in YouTube Presence from Sociocosmos"
Craft Your Legacy: Invest in YouTube Presence from Sociocosmos"SocioCosmos
 
Ready to get noticed? Partner with Sociocosmos
Ready to get noticed? Partner with SociocosmosReady to get noticed? Partner with Sociocosmos
Ready to get noticed? Partner with SociocosmosSocioCosmos
 
Ignite Your Online Influence: Sociocosmos - Where Social Media Magic Happens
Ignite Your Online Influence: Sociocosmos - Where Social Media Magic HappensIgnite Your Online Influence: Sociocosmos - Where Social Media Magic Happens
Ignite Your Online Influence: Sociocosmos - Where Social Media Magic HappensSocioCosmos
 
BDSM⚡Call Girls in Sector 76 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 76 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 76 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 76 Noida Escorts >༒8448380779 Escort ServiceDelhi Call girls
 
+971565801893>> ORIGINAL CYTOTEC ABORTION PILLS FOR SALE IN DUBAI AND ABUDHABI<<
+971565801893>> ORIGINAL CYTOTEC ABORTION PILLS FOR SALE IN DUBAI AND ABUDHABI<<+971565801893>> ORIGINAL CYTOTEC ABORTION PILLS FOR SALE IN DUBAI AND ABUDHABI<<
+971565801893>> ORIGINAL CYTOTEC ABORTION PILLS FOR SALE IN DUBAI AND ABUDHABI<<Health
 
Pondicherry Call Girls Book Now 8617697112 Top Class Pondicherry Escort Servi...
Pondicherry Call Girls Book Now 8617697112 Top Class Pondicherry Escort Servi...Pondicherry Call Girls Book Now 8617697112 Top Class Pondicherry Escort Servi...
Pondicherry Call Girls Book Now 8617697112 Top Class Pondicherry Escort Servi...Nitya salvi
 
Film show production powerpoint for site
Film show production powerpoint for siteFilm show production powerpoint for site
Film show production powerpoint for siteAshtonCains
 
SEO Expert in USA - 5 Ways to Improve Your Local Ranking - Macaw Digital.pdf
SEO Expert in USA - 5 Ways to Improve Your Local Ranking - Macaw Digital.pdfSEO Expert in USA - 5 Ways to Improve Your Local Ranking - Macaw Digital.pdf
SEO Expert in USA - 5 Ways to Improve Your Local Ranking - Macaw Digital.pdfmacawdigitalseo2023
 
Capstone slide deck on the TikTok revolution
Capstone slide deck on the TikTok revolutionCapstone slide deck on the TikTok revolution
Capstone slide deck on the TikTok revolutioneliklein8
 
Call Girls In South Ex. Delhi O9654467111 Women Seeking Men
Call Girls In South Ex. Delhi O9654467111 Women Seeking MenCall Girls In South Ex. Delhi O9654467111 Women Seeking Men
Call Girls In South Ex. Delhi O9654467111 Women Seeking MenSapana Sha
 
College & House wife Call Girls in Paharganj 9634446618 -Best Escort call gi...
College & House wife  Call Girls in Paharganj 9634446618 -Best Escort call gi...College & House wife  Call Girls in Paharganj 9634446618 -Best Escort call gi...
College & House wife Call Girls in Paharganj 9634446618 -Best Escort call gi...Heena Escort Service
 
Unlock the power of Instagram with SocioCosmos. Start your journey towards so...
Unlock the power of Instagram with SocioCosmos. Start your journey towards so...Unlock the power of Instagram with SocioCosmos. Start your journey towards so...
Unlock the power of Instagram with SocioCosmos. Start your journey towards so...SocioCosmos
 
CASH PAYMENT ON GIRL HAND TO HAND HOUSEWIFE
CASH PAYMENT ON GIRL HAND TO HAND HOUSEWIFECASH PAYMENT ON GIRL HAND TO HAND HOUSEWIFE
CASH PAYMENT ON GIRL HAND TO HAND HOUSEWIFECall girl Jaipur
 

Dernier (20)

Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...
Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...
Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...
 
Hire↠Young Call Girls in Hari Nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esco...
Hire↠Young Call Girls in Hari Nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esco...Hire↠Young Call Girls in Hari Nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esco...
Hire↠Young Call Girls in Hari Nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esco...
 
Production diary Film the city powerpoint
Production diary Film the city powerpointProduction diary Film the city powerpoint
Production diary Film the city powerpoint
 
Social media marketing/Seo expert and digital marketing
Social media marketing/Seo expert and digital marketingSocial media marketing/Seo expert and digital marketing
Social media marketing/Seo expert and digital marketing
 
Film show pre-production powerpoint for site
Film show pre-production powerpoint for siteFilm show pre-production powerpoint for site
Film show pre-production powerpoint for site
 
Craft Your Legacy: Invest in YouTube Presence from Sociocosmos"
Craft Your Legacy: Invest in YouTube Presence from Sociocosmos"Craft Your Legacy: Invest in YouTube Presence from Sociocosmos"
Craft Your Legacy: Invest in YouTube Presence from Sociocosmos"
 
The Butterfly Effect
The Butterfly EffectThe Butterfly Effect
The Butterfly Effect
 
Call Girls in Chattarpur (delhi) call me [9953056974] escort service 24X7
Call Girls in Chattarpur (delhi) call me [9953056974] escort service 24X7Call Girls in Chattarpur (delhi) call me [9953056974] escort service 24X7
Call Girls in Chattarpur (delhi) call me [9953056974] escort service 24X7
 
Ready to get noticed? Partner with Sociocosmos
Ready to get noticed? Partner with SociocosmosReady to get noticed? Partner with Sociocosmos
Ready to get noticed? Partner with Sociocosmos
 
Ignite Your Online Influence: Sociocosmos - Where Social Media Magic Happens
Ignite Your Online Influence: Sociocosmos - Where Social Media Magic HappensIgnite Your Online Influence: Sociocosmos - Where Social Media Magic Happens
Ignite Your Online Influence: Sociocosmos - Where Social Media Magic Happens
 
BDSM⚡Call Girls in Sector 76 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 76 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 76 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 76 Noida Escorts >༒8448380779 Escort Service
 
+971565801893>> ORIGINAL CYTOTEC ABORTION PILLS FOR SALE IN DUBAI AND ABUDHABI<<
+971565801893>> ORIGINAL CYTOTEC ABORTION PILLS FOR SALE IN DUBAI AND ABUDHABI<<+971565801893>> ORIGINAL CYTOTEC ABORTION PILLS FOR SALE IN DUBAI AND ABUDHABI<<
+971565801893>> ORIGINAL CYTOTEC ABORTION PILLS FOR SALE IN DUBAI AND ABUDHABI<<
 
Pondicherry Call Girls Book Now 8617697112 Top Class Pondicherry Escort Servi...
Pondicherry Call Girls Book Now 8617697112 Top Class Pondicherry Escort Servi...Pondicherry Call Girls Book Now 8617697112 Top Class Pondicherry Escort Servi...
Pondicherry Call Girls Book Now 8617697112 Top Class Pondicherry Escort Servi...
 
Film show production powerpoint for site
Film show production powerpoint for siteFilm show production powerpoint for site
Film show production powerpoint for site
 
SEO Expert in USA - 5 Ways to Improve Your Local Ranking - Macaw Digital.pdf
SEO Expert in USA - 5 Ways to Improve Your Local Ranking - Macaw Digital.pdfSEO Expert in USA - 5 Ways to Improve Your Local Ranking - Macaw Digital.pdf
SEO Expert in USA - 5 Ways to Improve Your Local Ranking - Macaw Digital.pdf
 
Capstone slide deck on the TikTok revolution
Capstone slide deck on the TikTok revolutionCapstone slide deck on the TikTok revolution
Capstone slide deck on the TikTok revolution
 
Call Girls In South Ex. Delhi O9654467111 Women Seeking Men
Call Girls In South Ex. Delhi O9654467111 Women Seeking MenCall Girls In South Ex. Delhi O9654467111 Women Seeking Men
Call Girls In South Ex. Delhi O9654467111 Women Seeking Men
 
College & House wife Call Girls in Paharganj 9634446618 -Best Escort call gi...
College & House wife  Call Girls in Paharganj 9634446618 -Best Escort call gi...College & House wife  Call Girls in Paharganj 9634446618 -Best Escort call gi...
College & House wife Call Girls in Paharganj 9634446618 -Best Escort call gi...
 
Unlock the power of Instagram with SocioCosmos. Start your journey towards so...
Unlock the power of Instagram with SocioCosmos. Start your journey towards so...Unlock the power of Instagram with SocioCosmos. Start your journey towards so...
Unlock the power of Instagram with SocioCosmos. Start your journey towards so...
 
CASH PAYMENT ON GIRL HAND TO HAND HOUSEWIFE
CASH PAYMENT ON GIRL HAND TO HAND HOUSEWIFECASH PAYMENT ON GIRL HAND TO HAND HOUSEWIFE
CASH PAYMENT ON GIRL HAND TO HAND HOUSEWIFE
 

Digital identity

  • 1. Digital Identity What is it? Thouraya.daouas@ihec.rnu.tn Dr. Thouraya Daouas
  • 2. Digital identity • The set of activities you do on Internet contributes in defining your digital identity. • It’s constructed by many elements: – Personal data associated with your profile. – Information you publish on Internet. – Information about you that others publish. – Tracks you leave consciously or not. • User can have three types of identifier: – Professional or institutional related to a professional activity. – Private identifiers for personal use (social network, online selling, mail, online banking, etc.) Dr. Thouraya Daouas 2Digital Identity
  • 3. Digital identity • How to master it? – User should choose sensibly its identifier to be used according to his activity; – User limits the access to the information which he publishes; – User checks regularly his image on Web or e- reputation. Dr. Thouraya Daouas 3Digital Identity
  • 4. Authentification • Procedure which checks that the information about connection supplied is correct (identifier and password, fingerprints, etc.). • Some rules are important to respect: – Keep secret the password. – Choose a complex password (Combining necessarily small letters, capital letters, numbers and symbols). Should not have evident meaning. – Should not usurp an identity. Dr. Thouraya Daouas 4Digital Identity
  • 5. Configuration of profile • Connection identifier can be associated to a profile containing photos, personal information and preferences. • It is possible to configure information access: – Public: accessible for everyone and referenced in search engines. – Restricted: accessible for authorized community and not referenced. • In case of emails, a signature could be put at the end of the email body or a visit card could be joint to the email. Dr. Thouraya Daouas 5Digital Identity
  • 6. Digital tracks • What could we find in the file properties? – Date, Time, Author name, Revision number, Camera model, etc. • What can we know about the user identity? – Each connected computer has an IP address given to user by the Internet service provider which has to keep during one year the list of connections and the information allowing to identify the Internet user. – When we consult a web page, the browser sends a request to the server to get back the data (texts, images, etc.) to download. Server can keep track and follow so the browsing on the site. – In email header are stored a series of IP addresses describing servers which can supply indications on sender geographical localization. Dr. Thouraya Daouas 6Digital Identity
  • 7. e-Reputation • e-Reputation or digital reputation is the image can be made of a person through the Web. • We must be aware that: – Everybody can publish on Web without any control: on a blog or a social network, by participating in a discussion forum, by publishing a site to a host, etc. – We loose the control of an information published with a " public access ": from the moment where an information is public, it can be indexed by search engines and copied out in their mask memory. It can put several months disappearing. Dr. Thouraya Daouas 7Digital Identity