Currently browsing author

It’s A Wrap! – My Online Journey

(Source: Picture created by myself) It’s the end of this module that we have worked on for 2 and a half weeks. It has been a fulfilling and insightful journey on how we live and work on the internet. Self-Test At the start of this module, many components as reflected in the self-test above were foreign or useless to me in my opinion as I did not feel the necessity to draw the boundaries in my personal life. Continue reading →

Topic 5: Reflective Summary

(Source: Picture created by me) Be it in which industry, content producers will always contemplate the same issue in their minds: Should I let my work be accessible to all? There is no right or wrong answer in this scenario as there will always be two sides to the picture. But it boils down to whether users abuse the system that leads to further arguments on whether materials should be made online freely. Continue reading →

Topic 4: Reflective Summary

(Source: ILM) Everyone will go through an ethical dilemma between an apparent mental conflict moral imperatives before they reach a decision to be ethical or not in that specific issue. As much as social media has its perks for being engaging, interactive and easily accessible any where, the downfalls of it can be severe, leading to unethical methods through educational or business usage. Continue reading →

Topic 4: Real or fake identity on social media?

(Source: Wallet Hub) Identity theft isn’t a new criminal activity; in fact, it’s been around for years. What’s new is the method criminals are using to part people from their sensitive information. In the recent years, business identity theft (also known as corporate or commercial identity theft) is a new development in the criminal enterprise of identity theft. Continue reading →

Topic 2: Reflective Summary

(Source: Presto) To be completely honest, there will always be a constant debate on whether online identity should reflect authenticity or anonymity. Whether to stay authentic or be anonymous, the most crucial focus would be for every one to play their part to keep the internet a safe place against internet threats like cyber-bullying, phishing and identity theft, which are majorly on the rise in the current era due to the advancement of technology. Continue reading →

Topic 2: Which is the real me?

(Source: Wikipedia) Before Facebook and Google became the megaliths of the internet, the famous online adage was, “on the internet, no one knows you’re a dog” by Peter Steiner in 1993. The cartoon hit home with the wariness about the facile facade that could be thrown up by anyone with a rudimentary knowledge of html. Continue reading →

Topic 2: Which is the real me?

(Source: Wikipedia) Before Facebook and Google became the megaliths of the internet, the famous online adage was, “on the internet, no one knows you’re a dog” by Peter Steiner in 1993. The cartoon hit home with the wariness about the facile facade that could be thrown up by anyone with a rudimentary knowledge of html. Continue reading →