{"id":216,"date":"2015-02-25T17:38:31","date_gmt":"2015-02-25T17:38:31","guid":{"rendered":"http:\/\/sarahkyle27.wordpress.com\/?p=108"},"modified":"2015-02-25T17:38:31","modified_gmt":"2015-02-25T17:38:31","slug":"topic-2-reflective-summary","status":"publish","type":"post","link":"https:\/\/blog.soton.ac.uk\/uosm2008-2015\/2015\/02\/25\/topic-2-reflective-summary\/","title":{"rendered":"Topic 2: Reflective Summary"},"content":{"rendered":"<p>This week\u2019s background reading covered a variety of issues relating to online identity: anonymity and authenticity, presentation and reputation, our online and offline identity, privacy and security, and finally, identity protection.\u00a0 Initially, I found myself trying to cover all of these topics but I quickly realised this was not realistic \u2013 it was never going to fit under the word count!<\/p>\n<p>Instead, I tried to limit myself to the areas that took my interest: online personas and anonymity.\u00a0 Where I was unable to\u00a0write about certain topics, I tried to read about them in other UOSM2008 blogs and\/or leave a comment.<\/p>\n<p><a href=\"https:\/\/paszcza.wordpress.com\/2015\/02\/21\/34\/#comments\">Bartosz Paszcza\u2019s<\/a> post had a great point about digital privacy. \u00a0The embed video strengthened his argument and I found myself wanting to share one similar that I had seen.\u00a0 Another thing that struck me about his blog was how it looked forward &#8211; he included a theory about potential changes in digital advertising of the future, whereas, in contrast, my blog related back to existing arguments\u00a0on digital \u2018residents\u2019 and \u2018visitors\u2019 (topic 1). \u00a0I thought this was a good way\u00a0to conclude a blog post and one which I will myself consider in upcoming topics.<\/p>\n<p><a href=\"https:\/\/cherriesun1.wordpress.com\/2015\/02\/21\/topic-2-having-multiple-online-identities\/\">Cheuk Sun\u2019s<\/a> post was also visually engaging.\u00a0 The structure and approach was different to others I read in providing both sides of the argument (for and against multiple online identities) and then concluding with her thoughts. \u00a0At the beginning, I was initially disorientated by the structure and her argument, but I liked how strongly the post incorporated the blogger\u2019s voice, something I am still working on myself.<\/p>\n<p>Overall, a challenging but really interesting topic this week, and I look forward to the next.<\/p>\n<p>  <a rel=\"nofollow\" href=\"http:\/\/feeds.wordpress.com\/1.0\/gocomments\/sarahkyle27.wordpress.com\/108\/\"><img decoding=\"async\" alt=\"\" border=\"0\" src=\"http:\/\/feeds.wordpress.com\/1.0\/comments\/sarahkyle27.wordpress.com\/108\/\" \/><\/a> <img loading=\"lazy\" decoding=\"async\" alt=\"\" border=\"0\" src=\"https:\/\/pixel.wp.com\/b.gif?host=sarahkyle27.wordpress.com&#038;blog=70254599&#038;%23038;post=108&#038;%23038;subd=sarahkyle27&#038;%23038;ref=&#038;%23038;feed=1\" width=\"1\" height=\"1\" \/><\/p>\n<!-- AddThis Advanced Settings generic via filter on the_content --><!-- AddThis Share Buttons generic via filter on the_content -->","protected":false},"excerpt":{"rendered":"<p>This week&rsquo;s background reading covered a variety of issues relating to online identity: anonymity and authenticity, presentation and reputation, our online and offline identity, privacy and security, and finally, identity protection.&nbsp; Initially, I found myself trying to cover all of these topics but I quickly realised this was not realistic &ndash; it was never going [&hellip;]<img loading=\"lazy\" decoding=\"async\" alt=\"\" border=\"0\" src=\"https:\/\/pixel.wp.com\/b.gif?host=sarahkyle27.wordpress.com&amp;blog=70254599&amp;post=108&amp;subd=sarahkyle27&amp;ref=&amp;feed=1\" width=\"1\" height=\"1\"><!-- AddThis Advanced Settings generic via filter on wp_trim_excerpt --><!-- AddThis Share Buttons generic via filter on wp_trim_excerpt --><\/p>\n","protected":false},"author":97367,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1031484],"tags":[264216],"class_list":["post-216","post","type-post","status-publish","format-standard","hentry","category-topic-2-2015","tag-uosm2008","column","threecol"],"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/blog.soton.ac.uk\/uosm2008-2015\/wp-json\/wp\/v2\/posts\/216","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.soton.ac.uk\/uosm2008-2015\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.soton.ac.uk\/uosm2008-2015\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.soton.ac.uk\/uosm2008-2015\/wp-json\/wp\/v2\/users\/97367"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.soton.ac.uk\/uosm2008-2015\/wp-json\/wp\/v2\/comments?post=216"}],"version-history":[{"count":1,"href":"https:\/\/blog.soton.ac.uk\/uosm2008-2015\/wp-json\/wp\/v2\/posts\/216\/revisions"}],"predecessor-version":[{"id":217,"href":"https:\/\/blog.soton.ac.uk\/uosm2008-2015\/wp-json\/wp\/v2\/posts\/216\/revisions\/217"}],"wp:attachment":[{"href":"https:\/\/blog.soton.ac.uk\/uosm2008-2015\/wp-json\/wp\/v2\/media?parent=216"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.soton.ac.uk\/uosm2008-2015\/wp-json\/wp\/v2\/categories?post=216"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.soton.ac.uk\/uosm2008-2015\/wp-json\/wp\/v2\/tags?post=216"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}