{"id":190,"date":"2015-02-22T19:33:58","date_gmt":"2015-02-22T19:33:58","guid":{"rendered":"http:\/\/tatianasieff.wordpress.com\/?p=27"},"modified":"2015-02-22T19:33:58","modified_gmt":"2015-02-22T19:33:58","slug":"seeing-double-multiple-online-identities","status":"publish","type":"post","link":"https:\/\/blog.soton.ac.uk\/uosm2008-2015\/2015\/02\/22\/seeing-double-multiple-online-identities\/","title":{"rendered":"Seeing Double: Multiple Online Identities"},"content":{"rendered":"<p><a href=\"https:\/\/www.tumblr.com\/search\/online+identity\"><img decoding=\"async\" class=\" aligncenter\" src=\"https:\/\/41.media.tumblr.com\/301e53db2896925c6acb3656dbf87223\/tumblr_n9172o5oCH1qcwohzo1_1280.jpg\" alt=\"\" \/><\/a><\/p>\n<p>The concept isn&#8217;t a tricky one, but having<em><strong> multiple online identities<\/strong><\/em> could almost be described as a phenomenon. People are encouraged to work on their personal development, and building multiple online profiles facilitates this so well. We can create blogs and profile pages which showcase our personalities, talents and expertise. But is the person online really coherent with their offline puppeteer?<\/p>\n<p>It\u2019s safe to say that we all get much braver online. The screens of our computers are letting us hide behind a digital fa\u00e7ade. Endless personal information is divulged on all platforms of the internet \u2013 the cities we live in, phone numbers and relationship statuses, to name a few. The constant handing over of all this personal information, more so than just turning off cookies, acts as a breeding ground for privacy concerns (Kierkegaard, 2005), identity theft and fraud. An experience I\u2019ve had myself when the popstar Ellie Goulding \u2018stole\u2019 a photo I took and it suddenly made it to UK tabloids with little reference to me! I learnt my lesson the hard way regarding the blurred lines between privacy settings and intellectual property\u2026<\/p>\n<p><a href=\"https:\/\/tatianasieff.files.wordpress.com\/2015\/02\/image1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"  wp-image-40 alignright\" src=\"https:\/\/tatianasieff.files.wordpress.com\/2015\/02\/image1.png?w=212&#038;h=378\" alt=\"image1\" width=\"212\" height=\"378\" \/><\/a><a href=\"https:\/\/tatianasieff.files.wordpress.com\/2015\/02\/image1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"  wp-image-43 alignleft\" src=\"https:\/\/tatianasieff.files.wordpress.com\/2015\/02\/image2.png?w=213&#038;h=380\" alt=\"image2\" width=\"213\" height=\"380\" \/><\/a><\/p>\n<p><a href=\"https:\/\/tatianasieff.files.wordpress.com\/2015\/02\/image3.png\"><img loading=\"lazy\" decoding=\"async\" class=\"  wp-image-46 aligncenter\" src=\"https:\/\/tatianasieff.files.wordpress.com\/2015\/02\/image3.png?w=272&#038;h=485\" alt=\"image3\" width=\"272\" height=\"485\" \/><\/a><\/p>\n<p>Personally, I choose to use my full name to keep consistent online, embracing its uniqueness on sites such as <a href=\"https:\/\/twitter.com\/tatsieff\">Twitter<\/a>, <a href=\"https:\/\/instagram.com\/tatsieff\/\">Instagram<\/a> and <a href=\"https:\/\/uk.linkedin.com\/pub\/tatiana-sieff\/85\/40b\/4b5\">LinkedIn<\/a>. This consistency allows me to maintain a lucid image from site to site in this increasingly networked society (Costa &amp; Torres, 2011). However, many choose to adopt nicknames or quirky usernames to maintain an element of privacy. Moreover, the option for anonymity on the web can be seen as the main attraction. On <a href=\"http:\/\/secondlife.com\/\">Second Life<\/a>, for example, users can build an entirely new persona \u2013 building social networks that they don\u2019t necessarily have the confidence for offline. In many cases, unfortunately, users can abuse this feature and become a <a href=\"http:\/\/www.adweek.com\/socialtimes\/a-teen-speaks-keyboard-warriors-and-how-to-deal-with-them\/123668\">\u2018keyboard warrior\u2019<\/a> (Summers, 2013), consequently leading cyberbullying.<\/p>\n<p>Additionally,\u00a0it seems as if the media is almost glamorising the darker side of multiple online identities, particularly in programmes such as Catfish aired on the ever-popular MTV. However, in most cases, the \u2018catfisher\u2019 is often demonised, which enhances the severity of hosting multiple online identities to the viewer on a more personal level.<\/p>\n<p><img decoding=\"async\" class=\" aligncenter\" src=\"https:\/\/pmcvariety.files.wordpress.com\/2012\/12\/6a00d8341bfc7553ef017ee5e99414970d-pi.jpg?w=656\" alt=\"\" \/><\/p>\n<p>Overall, it seems that the negatives may outweigh the positives of multiple online identities; however I believe that this will change with a growing awareness surrounding privacy and a drive to appear as professional as possible. But, for now, click <a href=\"http:\/\/www.takethislollipop.com\/\">here<\/a>.<\/p>\n<p style=\"text-align:right;\">(398)<\/p>\n<p style=\"text-align:left;\">References:<\/p>\n<p>Costa, C. &amp; Torres, R., 2011. To be or not to be, the importance of Digital Identity in the networked society, <em>Educacao, Formacao% Tecnologias<\/em>, No\u00b0 Extra, p.47-53.<\/p>\n<p>Kierkegaard, S. M., 2005. How the cookies (almost) crumbled: Privacy &amp; lobbyism, <em>Computer Law and Security Report<\/em>, 21(4), p.310-322.<\/p>\n<p>Summer, A., 2013. A Teen Speaks: &#8216;Keyboard Warriors&#8217; and How to Deal With Them,\u00a0<em>Social Times\u00a0<\/em>[online] Available at: &lt;<a href=\"http:\/\/www.adweek.com\/socialtimes\/a-teen-speaks-keyboard-warriors-and-how-to-deal-with-them\/123668&#038;gt\" rel=\"nofollow\">http:\/\/www.adweek.com\/socialtimes\/a-teen-speaks-keyboard-warriors-and-how-to-deal-with-them\/123668&#038;gt<\/a>; [Accessed 22nd February 2015]<\/p>\n<p>  <a rel=\"nofollow\" href=\"http:\/\/feeds.wordpress.com\/1.0\/gocomments\/tatianasieff.wordpress.com\/27\/\"><img decoding=\"async\" alt=\"\" border=\"0\" src=\"http:\/\/feeds.wordpress.com\/1.0\/comments\/tatianasieff.wordpress.com\/27\/\" \/><\/a> <img loading=\"lazy\" decoding=\"async\" alt=\"\" border=\"0\" src=\"https:\/\/pixel.wp.com\/b.gif?host=tatianasieff.wordpress.com&#038;blog=83794515&#038;%23038;post=27&#038;%23038;subd=tatianasieff&#038;%23038;ref=&#038;%23038;feed=1\" width=\"1\" height=\"1\" \/><\/p>\n<!-- AddThis Advanced Settings generic via filter on the_content --><!-- AddThis Share Buttons generic via filter on the_content -->","protected":false},"excerpt":{"rendered":"<p>The concept isn&rsquo;t a tricky one, but having multiple online identities could almost be described as a phenomenon. People are encouraged to work on their personal development, and building multiple online profiles facilitates this so well. We can create blogs and profile pages which showcase our personalities, talents and expertise. But is the person online [&hellip;]<img loading=\"lazy\" decoding=\"async\" alt=\"\" border=\"0\" src=\"https:\/\/pixel.wp.com\/b.gif?host=tatianasieff.wordpress.com&amp;blog=83794515&amp;post=27&amp;subd=tatianasieff&amp;ref=&amp;feed=1\" width=\"1\" height=\"1\"><!-- AddThis Advanced Settings generic via filter on wp_trim_excerpt --><!-- AddThis Share Buttons generic via filter on wp_trim_excerpt --><\/p>\n","protected":false},"author":97374,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1031484],"tags":[264216],"class_list":["post-190","post","type-post","status-publish","format-standard","hentry","category-topic-2-2015","tag-uosm2008","column","threecol"],"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/blog.soton.ac.uk\/uosm2008-2015\/wp-json\/wp\/v2\/posts\/190","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.soton.ac.uk\/uosm2008-2015\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.soton.ac.uk\/uosm2008-2015\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.soton.ac.uk\/uosm2008-2015\/wp-json\/wp\/v2\/users\/97374"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.soton.ac.uk\/uosm2008-2015\/wp-json\/wp\/v2\/comments?post=190"}],"version-history":[{"count":1,"href":"https:\/\/blog.soton.ac.uk\/uosm2008-2015\/wp-json\/wp\/v2\/posts\/190\/revisions"}],"predecessor-version":[{"id":191,"href":"https:\/\/blog.soton.ac.uk\/uosm2008-2015\/wp-json\/wp\/v2\/posts\/190\/revisions\/191"}],"wp:attachment":[{"href":"https:\/\/blog.soton.ac.uk\/uosm2008-2015\/wp-json\/wp\/v2\/media?parent=190"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.soton.ac.uk\/uosm2008-2015\/wp-json\/wp\/v2\/categories?post=190"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.soton.ac.uk\/uosm2008-2015\/wp-json\/wp\/v2\/tags?post=190"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}