Defensive: parody, spoofs, impersonation and digital hijacking Online reputation management Forward-looking: activate a social media presence when the time is right for you Over-sharing and the future of reputation Professional privacy Chapter summary