{"id":259,"date":"2014-11-29T14:52:18","date_gmt":"2014-11-29T14:52:18","guid":{"rendered":"http:\/\/blog.soton.ac.uk\/mang2049\/?p=259"},"modified":"2014-12-03T13:56:03","modified_gmt":"2014-12-03T13:56:03","slug":"notes-topic-2","status":"publish","type":"post","link":"https:\/\/blog.soton.ac.uk\/mang2049\/2014\/11\/29\/notes-topic-2\/","title":{"rendered":"Topic 2: online identity, privacy and security"},"content":{"rendered":"<p>Please read these brief notes and check out the links, before preparing and posting your answer to the set question. This document should be regarded as just the start of the discussions, which are then developed through the conversations themselves and the sharing of further relevant links.<\/p>\n<p>These articles are intended to give you a flavour of the challenges and opportunities in managing your online identity, and get you started on answering the Topic 2 set question below.<\/p>\n<p><strong>Relevant articles\/videos<\/strong><\/p>\n<p>3 short videos explaining the topic of online identity: <a href=\"http:\/\/www.internetsociety.org\/what-we-do\/internet-technology-matters\/privacy-identity\">http:\/\/www.internetsociety.org\/what-we-do\/internet-technology-matters\/privacy-identity<\/a><\/p>\n<p><a href=\"http:\/\/youtu.be\/2UlcOX1fZW4\">http:\/\/youtu.be\/2UlcOX1fZW4<\/a> \u2013 Building your online identity in 7 steps<\/p>\n<p><a href=\"http:\/\/www.guardian.co.uk\/technology\/2012\/apr\/19\/online-identity-authenticity-anonymity\">http:\/\/www.guardian.co.uk\/technology\/2012\/apr\/19\/online-identity-authenticity-anonymity<\/a> \u2013 (by Alex Krotoski)<\/p>\n<p>\u201cTo be or not to be? The importance of digital identity in the networked society\u201d by Cristina Costa and Ricardo Torres \u00a0<a href=\"http:\/\/eft.educom.pt\/index.php\/eft\/article\/view\/216\/126\">http:\/\/eft.educom.pt\/index.php\/eft\/article\/view\/216\/126<\/a><\/p>\n<p>Rhizome \u2013 Digital Identity <a href=\"http:\/\/digitaldisruptions.org\/rhizome\/wp-content\/uploads\/2010\/06\/rhiz08_DigitalIdentityMatters.pdf\">http:\/\/digitaldisruptions.org\/rhizome\/wp-content\/uploads\/2010\/06\/rhiz08_DigitalIdentityMatters.pdf<\/a><\/p>\n<p>Reputation bankruptcy by Jonathan Zittrain <a href=\"http:\/\/futureoftheinternet.org\/reputation-bankruptcy\">http:\/\/futureoftheinternet.org\/reputation-bankruptcy<\/a><\/p>\n<p>Module Scoopit for online safety and security <a href=\"http:\/\/www.scoop.it\/t\/online-identity-safety-and-security\">http:\/\/www.scoop.it\/t\/online-identity-safety-and-security<\/a><\/p>\n<p><strong>Question for Topic 2: Discuss the arguments for and against having more than one online identity. <\/strong><\/p>\n<p>Deadline for posting your answer to the set question is midnight (Singapore time)1\/12<\/p>\n<p>Deadline for posting your comments and reflective summaries is midnight (Singapore time) 2\/12<\/p>\n<p>Remember that for topics 2-5 <em>marks all count towards your final assessment and marks will be deducted for late posts<\/em>. The assessment criteria are detailed in the module Study Guide.<\/p>\n<p>If you have any questions, please ask us. And if you find useful additional resources on this topic to share with the group, please do so on Twitter using #MANG2049<\/p>\n<!-- AddThis Advanced Settings generic via filter on the_content --><!-- AddThis Share Buttons generic via filter on the_content -->","protected":false},"excerpt":{"rendered":"<p>Please read these brief notes and check out the links, before preparing and posting your answer to the set question. This document should be regarded as just the start of the discussions, which are then developed through the conversations themselves and the sharing of further relevant links. These articles are intended to give you a flavour of the challenges and &#8230;<!-- AddThis Advanced Settings generic via filter on wp_trim_excerpt --><!-- AddThis Share Buttons generic via filter on wp_trim_excerpt --><\/p>\n","protected":false},"author":73492,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ngg_post_thumbnail":0,"footnotes":""},"categories":[1034090,1031947],"tags":[4671],"class_list":["post-259","post","type-post","status-publish","format-standard","hentry","category-important-announcements-2014","category-topic-2-2014","tag-mang2049","column","threecol"],"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/blog.soton.ac.uk\/mang2049\/wp-json\/wp\/v2\/posts\/259","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.soton.ac.uk\/mang2049\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.soton.ac.uk\/mang2049\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.soton.ac.uk\/mang2049\/wp-json\/wp\/v2\/users\/73492"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.soton.ac.uk\/mang2049\/wp-json\/wp\/v2\/comments?post=259"}],"version-history":[{"count":4,"href":"https:\/\/blog.soton.ac.uk\/mang2049\/wp-json\/wp\/v2\/posts\/259\/revisions"}],"predecessor-version":[{"id":333,"href":"https:\/\/blog.soton.ac.uk\/mang2049\/wp-json\/wp\/v2\/posts\/259\/revisions\/333"}],"wp:attachment":[{"href":"https:\/\/blog.soton.ac.uk\/mang2049\/wp-json\/wp\/v2\/media?parent=259"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.soton.ac.uk\/mang2049\/wp-json\/wp\/v2\/categories?post=259"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.soton.ac.uk\/mang2049\/wp-json\/wp\/v2\/tags?post=259"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}