{"id":175,"date":"2015-02-22T13:26:44","date_gmt":"2015-02-22T13:26:44","guid":{"rendered":"http:\/\/hhayleymatthews.wordpress.com\/?p=49"},"modified":"2015-02-22T13:26:44","modified_gmt":"2015-02-22T13:26:44","slug":"topic-2-the-intrinsic-link-between-identity-and-privacy","status":"publish","type":"post","link":"https:\/\/blog.soton.ac.uk\/uosm2008-2015\/2015\/02\/22\/topic-2-the-intrinsic-link-between-identity-and-privacy\/","title":{"rendered":"Topic 2: The Intrinsic Link Between Identity and Privacy"},"content":{"rendered":"<p>Whilst on the Web today, it is very likely that at least one of the websites you visit will ask you to register. This allows web-based businesses to index personal information and over time add to it in order to build an online profile (Internet Society, 2015). Though this sounds very intrusive: having personal information collected and stored without your knowing, it can benefit you. It provides a personalised experience, offers product recommendations and helps to prevent fraud. However, understandably having any form of online identity results is speculation over privacy and security.<\/p>\n<p>Maintaining one online identity is relatively easy, it simply reflects who I say I am. However, it is often argued that having multiple online identities allows for anonymity and creativity (Krotoski, 2012). These identities tend to be split into private and public, as this allows you to present yourself differently depending on your audience. For example, a recent survey by Acas found that 45% of employees today are screened through social media (Landau, 2013). In this case, having a public identity to present yourself to employers and a private identity for you friends, could help you retain your reputation.<\/p>\n<p><a href=\"https:\/\/hhayleymatthews.files.wordpress.com\/2015\/02\/topic2.png\"><img loading=\"lazy\" decoding=\"async\" class=\"  wp-image-50 aligncenter\" src=\"https:\/\/hhayleymatthews.files.wordpress.com\/2015\/02\/topic2.png?w=708&#038;h=288\" alt=\"TOPIC2\" width=\"708\" height=\"288\" \/><\/a><\/p>\n<blockquote>\n<p style=\"text-align:center;\">Zuckerberg claims that Facebook is &#8220;built on real relationships, with real people, in real life\u201d (Jarvis, 2011).<\/p>\n<\/blockquote>\n<p>This is somewhat true in my case, as all my personal information is accurate and I know everyone I\u2019m friends with. However, up until recently I hadn\u2019t updated my Facebook identity since I created it, my details were minimal and out of date. Does this mean that its not entirely based on reality? What if I am involuntarily tagged in things or someone invites me to something \u2013 this suggests that other people can affect my identity.<\/p>\n<p>Often individuals who lack confidence and self-esteem will create identities based on their \u2018real\u2019 self and their \u2018ideal\u2019 self (Jarvis, 2011). These individuals are more aware of the possible social and cultural judgements that may follow, depending on the characteristics they disclose (Costa and Torres, 2011). However, in creating multiple identities do we lack integrity? Conceivably, developing multiple personae encourages an irresponsible environment, in which cyber bullying can take place as a faceless crime. With this in mind, how much can we trust others online, if we ourselves aren\u2019t being honest? Once again this comes back to the intrinsic link between privacy and identity.<\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>References:<\/strong><\/p>\n<p>Costa, C. and Torres, R. (2011) <a href=\"http:\/\/eft.educom.pt\/index.php\/eft\/article\/view\/216\/126\"><em>To Be or Not To Be? The Importance of Digital Identity in the Networked Society<\/em><\/a>, University of Salford, UK.<\/p>\n<p>Internet Society (2015) <em><a href=\"http:\/\/www.internetsociety.org\/what-we-do\/internet-technology-matters\/privacy-identity\">Privacy and Identity<\/a><\/em>, Accessed: February 2015.<\/p>\n<p>Jarvis, J. (2011) <em><a href=\"http:\/\/buzzmachine.com\/2011\/03\/08\/one-identity-or-more\/\">One Identity or More?<\/a>\u00a0<\/em>Accessed: February 2015.<\/p>\n<p>Krotoski, A. (2012) <a href=\"http:\/\/www.theguardian.com\/technology\/2012\/apr\/19\/online-identity-authenticity-anonymity\"><em>Online Identity: Is Authenticity or Anonymity More Important?<\/em><\/a> The Guardian, Accessed: February 2015.<\/p>\n<p>Landau, P. (2013) <em><a href=\"http:\/\/www.theguardian.com\/money\/work-blog\/2013\/dec\/11\/job-applications-social-media-profiles-scrutiny\">Job Applications: Social Media Profiles Under Scrutiny<\/a>,\u00a0<\/em>Accessed: February 2015.<\/p>\n<p>  <a rel=\"nofollow\" href=\"http:\/\/feeds.wordpress.com\/1.0\/gocomments\/hhayleymatthews.wordpress.com\/49\/\"><img decoding=\"async\" alt=\"\" border=\"0\" src=\"http:\/\/feeds.wordpress.com\/1.0\/comments\/hhayleymatthews.wordpress.com\/49\/\" \/><\/a> <img loading=\"lazy\" decoding=\"async\" alt=\"\" border=\"0\" src=\"https:\/\/pixel.wp.com\/b.gif?host=hhayleymatthews.wordpress.com&#038;blog=84265697&#038;%23038;post=49&#038;%23038;subd=hhayleymatthews&#038;%23038;ref=&#038;%23038;feed=1\" width=\"1\" height=\"1\" \/><\/p>\n<!-- AddThis Advanced Settings generic via filter on the_content --><!-- AddThis Share Buttons generic via filter on the_content -->","protected":false},"excerpt":{"rendered":"<p>Whilst on the Web today, it is very likely that at least one of the websites you visit will ask you to register. This allows web-based businesses to index personal information and over time add to it in order to build an online profile (Internet Society, 2015). Though this sounds very intrusive: having personal information [&hellip;]<img loading=\"lazy\" decoding=\"async\" alt=\"\" border=\"0\" src=\"https:\/\/pixel.wp.com\/b.gif?host=hhayleymatthews.wordpress.com&amp;blog=84265697&amp;post=49&amp;subd=hhayleymatthews&amp;ref=&amp;feed=1\" width=\"1\" height=\"1\"><!-- AddThis Advanced Settings generic via filter on wp_trim_excerpt --><!-- AddThis Share Buttons generic via filter on wp_trim_excerpt --><\/p>\n","protected":false},"author":97359,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1031484],"tags":[],"class_list":["post-175","post","type-post","status-publish","format-standard","hentry","category-topic-2-2015","column","threecol"],"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/blog.soton.ac.uk\/uosm2008-2015\/wp-json\/wp\/v2\/posts\/175","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.soton.ac.uk\/uosm2008-2015\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.soton.ac.uk\/uosm2008-2015\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.soton.ac.uk\/uosm2008-2015\/wp-json\/wp\/v2\/users\/97359"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.soton.ac.uk\/uosm2008-2015\/wp-json\/wp\/v2\/comments?post=175"}],"version-history":[{"count":1,"href":"https:\/\/blog.soton.ac.uk\/uosm2008-2015\/wp-json\/wp\/v2\/posts\/175\/revisions"}],"predecessor-version":[{"id":176,"href":"https:\/\/blog.soton.ac.uk\/uosm2008-2015\/wp-json\/wp\/v2\/posts\/175\/revisions\/176"}],"wp:attachment":[{"href":"https:\/\/blog.soton.ac.uk\/uosm2008-2015\/wp-json\/wp\/v2\/media?parent=175"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.soton.ac.uk\/uosm2008-2015\/wp-json\/wp\/v2\/categories?post=175"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.soton.ac.uk\/uosm2008-2015\/wp-json\/wp\/v2\/tags?post=175"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}