{"id":117,"date":"2015-02-14T13:07:21","date_gmt":"2015-02-14T13:07:21","guid":{"rendered":"http:\/\/blog.soton.ac.uk\/uosm2008-2015\/?p=117"},"modified":"2015-02-18T14:00:10","modified_gmt":"2015-02-18T14:00:10","slug":"getting-started-topic-2-online-identity-privacy","status":"publish","type":"post","link":"https:\/\/blog.soton.ac.uk\/uosm2008-2015\/2015\/02\/14\/getting-started-topic-2-online-identity-privacy\/","title":{"rendered":"Getting started with Topic 2: online identity and privacy"},"content":{"rendered":"<p>Please read these brief notes and check out the links, before preparing and posting your answer to the set question. This document should be regarded as just the start of the discussions, which are then developed over the next two weeks through the conversations themselves and the sharing of further relevant links.<\/p>\n<p>These articles are intended to give you a flavour of the challenges and opportunities in managing your online identity, and get you started on answering the Topic 2 set question below.<\/p>\n<p><strong>Relevant articles\/videos<\/strong><\/p>\n<p>3 short videos explaining the topic of online identity: <a href=\"http:\/\/www.internetsociety.org\/what-we-do\/internet-technology-matters\/privacy-identity\">http:\/\/www.internetsociety.org\/what-we-do\/internet-technology-matters\/privacy-identity<\/a><\/p>\n<p><a href=\"http:\/\/youtu.be\/2UlcOX1fZW4\">http:\/\/youtu.be\/2UlcOX1fZW4<\/a> &#8211; Building your online identity in 7 steps<\/p>\n<p><a href=\"http:\/\/www.guardian.co.uk\/technology\/2012\/apr\/19\/online-identity-authenticity-anonymity\">http:\/\/www.guardian.co.uk\/technology\/2012\/apr\/19\/online-identity-authenticity-anonymity<\/a> &#8211; (by Alex Krotoski)<\/p>\n<p>\u201cTo be or not to be? The importance of digital identity in the networked society\u201d by Cristina Costa and Ricardo Torres \u00a0<a href=\"http:\/\/eft.educom.pt\/index.php\/eft\/article\/view\/216\/126\">http:\/\/eft.educom.pt\/index.php\/eft\/article\/view\/216\/126<\/a><\/p>\n<p>Reputation bankruptcy by Jonathan Zittrain <a href=\"http:\/\/futureoftheinternet.org\/reputation-bankruptcy\">http:\/\/futureoftheinternet.org\/reputation-bankruptcy<\/a><\/p>\n<p>Module Scoopit for online identity <a href=\"http:\/\/www.scoop.it\/t\/online-identity-safety-and-security\">http:\/\/www.scoop.it\/t\/online-identity-safety-and-security<\/a><\/p>\n<p><strong>Question for Topic 2: Discuss the arguments for and against having more than one online identity. <\/strong><\/p>\n<p>Deadline for posting your answer to the set question is 23.59 on 22\/2<br \/>\nDeadline for your comments on the work of others is 23.59 on 25\/2<br \/>\nDeadline for posting your reflective summaries is 23.59 on 1\/3<\/p>\n<p>Remember that for topics 2-5 <em>marks all count towards your final assessment and marks will be deducted for late posts<\/em>. The assessment criteria are detailed in the module Study Guide.<\/p>\n<p>If you have any questions, please ask us. And if you find useful additional resources on this topic to share with the group, please do so on Twitter using #UOSM2008<\/p>\n<!-- AddThis Advanced Settings generic via filter on the_content --><!-- AddThis Share Buttons generic via filter on the_content -->","protected":false},"excerpt":{"rendered":"<p>Please read these brief notes and check out the links, before preparing and posting your answer to the set question. This document should be regarded as just the start of the discussions, which are then developed over the next two weeks through the conversations themselves and the sharing of further relevant links. These articles are intended to give you a &#8230;<!-- AddThis Advanced Settings generic via filter on wp_trim_excerpt --><!-- AddThis Share Buttons generic via filter on wp_trim_excerpt --><\/p>\n","protected":false},"author":73492,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1031484],"tags":[264216],"class_list":["post-117","post","type-post","status-publish","format-standard","hentry","category-topic-2-2015","tag-uosm2008","column","threecol"],"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/blog.soton.ac.uk\/uosm2008-2015\/wp-json\/wp\/v2\/posts\/117","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.soton.ac.uk\/uosm2008-2015\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.soton.ac.uk\/uosm2008-2015\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.soton.ac.uk\/uosm2008-2015\/wp-json\/wp\/v2\/users\/73492"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.soton.ac.uk\/uosm2008-2015\/wp-json\/wp\/v2\/comments?post=117"}],"version-history":[{"count":2,"href":"https:\/\/blog.soton.ac.uk\/uosm2008-2015\/wp-json\/wp\/v2\/posts\/117\/revisions"}],"predecessor-version":[{"id":154,"href":"https:\/\/blog.soton.ac.uk\/uosm2008-2015\/wp-json\/wp\/v2\/posts\/117\/revisions\/154"}],"wp:attachment":[{"href":"https:\/\/blog.soton.ac.uk\/uosm2008-2015\/wp-json\/wp\/v2\/media?parent=117"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.soton.ac.uk\/uosm2008-2015\/wp-json\/wp\/v2\/categories?post=117"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.soton.ac.uk\/uosm2008-2015\/wp-json\/wp\/v2\/tags?post=117"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}