{"id":459,"date":"2015-02-21T17:06:46","date_gmt":"2015-02-21T17:06:46","guid":{"rendered":"http:\/\/tamaramanton.wordpress.com\/?p=44"},"modified":"2015-02-21T17:06:46","modified_gmt":"2015-02-21T17:06:46","slug":"topic-2-me-myself-and-i-multiple-online-identities-3","status":"publish","type":"post","link":"https:\/\/blog.soton.ac.uk\/uosm2008-2015\/2015\/02\/21\/topic-2-me-myself-and-i-multiple-online-identities-3\/","title":{"rendered":"Topic 2: Me, Myself and I \u2013 Multiple Online Identities"},"content":{"rendered":"<p>When we go online we leave behind a digital footprint; information about what we have accessed and posted. This can be used by individuals, organisations and governments, to assemble a picture of the persona we adopt on the web and, potentially, what we are like in the real world.<\/p>\n<p>So, to what extent should we be concerned \u2013 and should we create different online identities to protect ourselves?<\/p>\n<p>If a shop assistant remembers me, and recommends something that I might be interested in, then I\u2019d regard this as good customer service. But when a computer does the same, people argue that it\u2019s an invasion of their privacy.<\/p>\n<p>Further, if a computer scans my e-mails looking for key words, such as names of chemicals used to make a bomb, then I don\u2019t object because I know that this is done as a form of crime prevention but many see this as a perceived erosion of our freedoms.<\/p>\n<figure id=\"attachment_45\" style=\"width: 660px;\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/tamaramanton.files.wordpress.com\/2015\/02\/eben-moglen.jpg\"><img decoding=\"async\" class=\"wp-image-45 size-large\" src=\"https:\/\/tamaramanton.files.wordpress.com\/2015\/02\/eben-moglen.jpg?w=656&#038;h=438\" alt=\"Eben Moglen\"   \/><\/a><figcaption class=\"wp-caption-text\">Scull image from Fotolia, Artweaver used to add text.<\/figcaption><\/figure>\n<p>So what are the threats that might persuade me to create duplicate online identies?<\/p>\n<ul>\n<li>Identity theft \u2013 where criminals use spam, guess passwords and use computer viruses to access your bank accounts, or clone your identity. <a href=\"http:\/\/www.financialfraudaction.org.uk\/cms\/assets\/1\/2014%20h1%20fraud%20figures%20-%20final.pdf\" >The FFA<\/a> estimates that in the UK alone \u00a3247.6 million was lost to credit card fraud in the first six months of 2014.<\/li>\n<li>Loss of privacy \u2013 where the information you post is used for purposes other than that you intended. However, work is being done to protect our privacy online, for example, <a href=\"http:\/\/www.bbc.co.uk\/news\/uk-31429026\" >new laws<\/a> are imminent outlawing posting &#8220;revenge porn&#8221;.<\/li>\n<li>Loss of religious and political freedoms \u2013 when authoritarian states track electronic communication to curtail protest.<\/li>\n<\/ul>\n<p>The last point, while not a concern in the UK is emphasised in this <a href=\"http:\/\/www.amnesty.org\/en\/campaigns\/irrepressible-info.\" >Amnesty International posting<\/a>.\u00a0Also a number of Iranians were arrested for recording and posting a version of Pharrell Williams&#8217;s &#8220;Happy&#8221;:<\/p>\n<div class=\"jetpack-video-wrapper\"><span class='embed-youtube' style='text-align:center; display: block;'><iframe class='youtube-player' type='text\/html' width='656' height='399' src='https:\/\/www.youtube.com\/embed\/tg5qdIxVcz8?version=3&#038;rel=1&#038;%23038;fs=1&#038;%23038;showsearch=0&#038;%23038;showinfo=1&#038;%23038;iv_load_policy=1&#038;%23038;wmode=transparent' frameborder='0' allowfullscreen='true'><\/iframe><\/span><\/div>\n<p>Of course, in reality we can\u2019t avoid creating different online identities; the persona you present on LinkdIn will be different from that on Facebook.\u00a0 But should you go further and deliberately create separate, fragmented persona?<\/p>\n<p>I have explored the advantages and disadvantages of having multiple online identities in a Slideshare\u00a0presentation:<\/p>\n<p style=\"text-align:center;\">\n<div class=\"jetpack-video-wrapper\">\n<div class=\"embed-slideshare\"><iframe loading=\"lazy\" src=\"https:\/\/www.slideshare.net\/slideshow\/embed_code\/44987306\" width=\"427\" height=\"356\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" style=\"border:1px solid #CCC; border-width:1px; margin-bottom:5px; max-width: 100%;\" allowfullscreen> <\/iframe><\/p>\n<div style=\"margin-bottom:5px\"> <strong> <a href=\"https:\/\/www.slideshare.net\/TamaraEManton\/multiple-online-identities-44987306\" title=\"Multiple online identities\" >Multiple online identities<\/a> <\/strong> from <strong><a href=\"http:\/\/www.slideshare.net\/TamaraEManton\" >TamaraEManton<\/a><\/strong> <\/div>\n<\/div>\n<\/div>\n<p>So, living the UK, should you deliberately fabricate separate online identities? Personally, I don\u2019t think so, but I do follow these tips:<\/p>\n<div class=\"jetpack-video-wrapper\"><span class='embed-youtube' style='text-align:center; display: block;'><iframe class='youtube-player' type='text\/html' width='656' height='399' src='https:\/\/www.youtube.com\/embed\/23BKMDGzZyI?version=3&#038;rel=1&#038;%23038;fs=1&#038;%23038;showsearch=0&#038;%23038;showinfo=1&#038;%23038;iv_load_policy=1&#038;%23038;wmode=transparent' frameborder='0' allowfullscreen='true'><\/iframe><\/span><\/div>\n<p>I agree with Costa and Torres: \u201cIf we are to encourage people to develop several personas, are we encouraging a responsible environment, or are we creating new playgrounds? Furthermore, how much can we trust a person who \u2018owns\u2019 different characters online?\u201d\u00a0Emphasising these concerns, <a href=\"http:\/\/theconversation.com\/with-the-right-tech-online-bullies-can-be-outsmarted-16981\" >this article<\/a> by Awais Rashid talks about internet bullies hiding behind false online identities.<\/p>\n<p>In a sense this is nothing new, we have always had the opportunity change the way that we behave to suit the situation. But pretending to be someone you\u2019re not \u2013 online or in the real world \u2013 is, in my opinion,\u00a0not genuine and therefore should not be condoned.<\/p>\n<p>An interesting topic \u2013 I suspect we will see very different views.<\/p>\n<hr \/>\n<p>References:<\/p>\n<p><a href=\"http:\/\/www.internetsociety.org\/what-we-do\/internet-technology-matters\/privacy-identity\">http:\/\/www.internetsociety.org\/what-we-do\/internet-technology-matters\/privacy-identity<\/a><\/p>\n<p><a href=\"http:\/\/www.guardian.co.uk\/technology\/2012\/apr\/19\/online-identity-authenticity-anonymity\" rel=\"nofollow\">http:\/\/www.guardian.co.uk\/technology\/2012\/apr\/19\/online-identity-authenticity-anonymity<\/a><\/p>\n<p>Christopher Soghoian: Government surveillance \u2014 this is just the beginning <a href=\"https:\/\/www.youtube.com\/watch?v=FrxDrpi1XNU\">https:\/\/www.youtube.com\/watch?v=FrxDrpi1XNU<\/a><\/p>\n<p>Cristina Costa and Ricardo Torres, <em>To be or not to be, the importance of Digital Identity in the networked society<\/em>, Revista Educa\u00e7\u00e3o, Forma\u00e7\u00e3o &amp; Tecnologias, n.\u00ba extra (Abril, 2011): pp. 47\u201053.p, (p. 51)<\/p>\n<p>FFA, Customers Urged to be Vigilant as Fraudsters Increase Spam Attacks,\u00a0<a href=\"http:\/\/www.financialfraudaction.org.uk\/cms\/assets\/1\/2014%20h1%20fraud%20figures%20-%20final.pdf\">http:\/\/www.financialfraudaction.org.uk\/cms\/assets\/1\/2014%20h1%20fraud%20figures%20-%20final.pdf<\/a><\/p>\n<p>Awais Rashid, Director of Security, Lancaster Research Centre at Lancaster University, <em>With the Right Tech, Online Bullies can be Outsmarted<\/em><\/p>\n<p><a href=\"http:\/\/theconversation.com\/with-the-right-tech-online-bullies-can-be-outsmarted-16981\">http:\/\/theconversation.com\/with-the-right-tech-online-bullies-can-be-outsmarted-16981<\/a><\/p>\n<p>Amnesty International, <em>The Internet and Human Rights, <\/em><a href=\"http:\/\/www.amnesty.org\/en\/campaigns\/irrepressible-info\">http:\/\/www.amnesty.org\/en\/campaigns\/irrepressible-info<\/a><\/p>\n<p>  <a rel=\"nofollow\" href=\"http:\/\/feeds.wordpress.com\/1.0\/gocomments\/tamaramanton.wordpress.com\/44\/\"><img decoding=\"async\" alt=\"\" border=\"0\" src=\"http:\/\/feeds.wordpress.com\/1.0\/comments\/tamaramanton.wordpress.com\/44\/\" \/><\/a> <img loading=\"lazy\" decoding=\"async\" alt=\"\" border=\"0\" src=\"https:\/\/pixel.wp.com\/b.gif?host=tamaramanton.wordpress.com&#038;blog=84549585&#038;%23038;post=44&#038;%23038;subd=tamaramanton&#038;%23038;ref=&#038;%23038;feed=1\" width=\"1\" height=\"1\" \/><\/p>\n<!-- AddThis Advanced Settings generic via filter on the_content --><!-- AddThis Share Buttons generic via filter on the_content -->","protected":false},"excerpt":{"rendered":"<p>When we go online we leave behind a digital footprint; information about what we have accessed and posted. This can be used by individuals, organisations and governments, to assemble a picture of the persona we adopt on the web and, potentially, what we are like in the real world. So, to what extent should we [&hellip;]<img loading=\"lazy\" decoding=\"async\" alt=\"\" border=\"0\" src=\"https:\/\/pixel.wp.com\/b.gif?host=tamaramanton.wordpress.com&amp;blog=84549585&amp;post=44&amp;subd=tamaramanton&amp;ref=&amp;feed=1\" width=\"1\" height=\"1\"><!-- AddThis Advanced Settings generic via filter on wp_trim_excerpt --><!-- AddThis Share Buttons generic via filter on wp_trim_excerpt --><\/p>\n","protected":false},"author":97373,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1031484],"tags":[264216],"class_list":["post-459","post","type-post","status-publish","format-standard","hentry","category-topic-2-2015","tag-uosm2008","column","threecol"],"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/blog.soton.ac.uk\/uosm2008-2015\/wp-json\/wp\/v2\/posts\/459","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.soton.ac.uk\/uosm2008-2015\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.soton.ac.uk\/uosm2008-2015\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.soton.ac.uk\/uosm2008-2015\/wp-json\/wp\/v2\/users\/97373"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.soton.ac.uk\/uosm2008-2015\/wp-json\/wp\/v2\/comments?post=459"}],"version-history":[{"count":3,"href":"https:\/\/blog.soton.ac.uk\/uosm2008-2015\/wp-json\/wp\/v2\/posts\/459\/revisions"}],"predecessor-version":[{"id":1650,"href":"https:\/\/blog.soton.ac.uk\/uosm2008-2015\/wp-json\/wp\/v2\/posts\/459\/revisions\/1650"}],"wp:attachment":[{"href":"https:\/\/blog.soton.ac.uk\/uosm2008-2015\/wp-json\/wp\/v2\/media?parent=459"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.soton.ac.uk\/uosm2008-2015\/wp-json\/wp\/v2\/categories?post=459"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.soton.ac.uk\/uosm2008-2015\/wp-json\/wp\/v2\/tags?post=459"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}