Loading presentation...

Present Remotely

Send the link below via email or IM


Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.


Identity & Deception

No description

Brittany Mekelburg

on 16 July 2014

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Identity & Deception

By: Shelby, Brittany, & Taylor

COMM 102:Interpersonal Communication
Connect with social groups
Feel liked by others
Feel accepted by others
A “catfish” is a person who creates a false online identity in the hopes of luring people into romantic relationships.
There are Many Types of Catfish...
• The Revenge Catfish
The telltale signs
you’re being catfished...
A random, attractive person starts talking to you online in some capacity.
You can’t get this person to use Skype, or his or her phone is often out of commission.
When a breaking point is reached, then and only then does the catfish say he or she will visit you. This visit doesn’t usually pan out, it’s just used as leverage to keep you interested in the interim.
Getting a physical address from them is incredibly difficult.
You never hear people in the background during your phone calls because they are made with extreme caution.
What has the awareness of catfishing done?
The Slippery Slope of Catfishing
How to Detect A Fake Facebook Profile
1. Look for photos in the profile.
2. Look for status updates, wall posts, and comments.
3. Look at the recent activities.
4. Check out the friend list.
5. Check the info.
6. Check the birthdate.
7. Fake profiles of girls usually have a contact # in their info.
8. Look out for recent wall posts.
9. Look for common traits used in Facebook.
10. Try browsing google for some random profile pictures.
Often, the most common offenders of cyber bullying are the ones you would least expect.
Cyber bullying can be devastating to a child’s self-esteem and can have lasting consequences.
Children and teenagers aren’t the only victims of cyber bullying- adults have also been found to be victims as well as culprits of cyber bullying.
• The Bored Catfish
• The Secretly-in-love-with-you Catfish
• The Scary Catfish
• The Lonely Catfish
Signs of Cyberbullying
• signs of emotional distress during or after
using the internet or the phone
• being very protective or secretive of their
digital life
• withdrawal from friends and activities
• avoidance of school or group gatherings
• slipping grades and "acting out" in anger
at home
• changes in mood, behavior, sleep, or appetite
Side Effects of Cyber Bullying
Increased depression
Lack of interest or hobbies
Poor preformance in school or on the job
Increased anger and/or hostility
Low self-esteem
Alcohol and drug problems
Suicidal thoughts
How to Prevent Cyberbullying
Talk to your children about bullying
Be aware of what your kids are doing online
Educate your children about the internet
Check privacy settings of social media platforms your children use
Sharing pictures builds an online identity...
Sharing videos builds an online identity...
Example: "Dem White Boyz" are popular on Vine for sharing short videos of them dancing to rap songs
Sharing videos builds an online identity...
Example: Rosanna Pansino's YouTube channel regularly posts videos of what she calls "Nerdy Nummies" or baking tutorials for nerds.
Example: Creating collections of pictures on Pinterest boards identifies things your interested in or inspire you such as fashion, recipies, art, and quotes.
Sharing pictures builds an online identity...
Example: Sharing pictures on Instagram of people, places, and things that you value and want to remember.
Relationship Status

Names of Family Members

Sexual Orientation

Religious Views

Political Views
Full Name

Date of Birth

Current Location/ Residence

Job Title & Employer

Employment History
Sharing messages builds an online identity...
Example: Sharing personal thoughts on Twitter with a # that others can connect with like #MomConfessions show your opinions and beliefs.
Sharing messages builds an online identity...
Example: Sharing messages via Blogs allows you to express your interests, opinions, and views in more depth.
Commonly Shared Profile Information
Fellowship Face
Control Over Our Time
& Resources
Avoid Others Making
Decisions for Us
Follow Our Own Ideas
Autonomy Face
Example: SecondLife users can create a complete online identity for entertainment by customizing an avatar, editing a profile, and altering the interactive environment
Acknowledge Ability
& Intelligence
Respect from Others
Seek Activities We Are
Good At
Competence Face
Example: LinkedIn users create a professional online profile to connect with peers and potential employers or recruit employees.
Example: Facebook profiles contain hyperpersonal information that is shared among close friends and family. Users can like, comment, and share posts.
We Managing Multiple Identities...
... To Meet Our Face Needs
Face - a persons desired public image
Facework - the behaviors one uses to projecct one's desired public image to others
Face needs - components of one's desired public image
What is Cyberbullying Exactly?
Lack of face-to-face interation encourages self-disclosure
Computer-mediated communication is "hyperpersonal"
Hyperpersoal disclosure can accelerate feelings of closeness between people
How Technology Influences
Reasons Why People Deceive
McHugh, Molly. "It’s Catfishing Season! How to Tell Lovers from Liars Online, and More." Digital Trends. N.p., 23 Aug. 2013. Web. 2 July 2014.

STURGIS, INGRID. "High-Tech Bullies." Diverse: Issues in Higher Education (2014): 19- 23. Academic Search Premier. Web. 8 July 2014.

"All About What Is CyberBullying." No BullyingExpert Advice On Cyber Bullying School Bullying. N.p., n.d. Web. 08 July 2014

Floyd, Kory. Interpersonal Communication. 2 ed. New York: McGraw Hill, 2011.

Get revenge on someone
Avoid punishment
Hurt someone for no reason
For amusemt or entertainment
Make you look better
Help get to know someone
Full transcript