{"id":466,"date":"2015-02-22T16:13:19","date_gmt":"2015-02-22T16:13:19","guid":{"rendered":"http:\/\/leighravenhill.wordpress.com\/?p=35"},"modified":"2015-02-22T16:13:19","modified_gmt":"2015-02-22T16:13:19","slug":"identity-crisis-me-myself-and-i-3","status":"publish","type":"post","link":"https:\/\/blog.soton.ac.uk\/uosm2008-2015\/2015\/02\/22\/identity-crisis-me-myself-and-i-3\/","title":{"rendered":"Identity Crisis: Me, Myself and I."},"content":{"rendered":"<h4><strong>\u201cHaving two identities for yourself is an example of a lack of integrity.\u201d \u00a0<\/strong><span style=\"color:#808080;\">Mark Zuckerberg<\/span><\/h4>\n<p>Your online identity is a collection of your characteristics and your interactions on the web (Internet Society, 2015) . We are now in an age where we are more concerned than ever with real identities (Krotoski, 2012) and anonymity is perhaps an ageing concept. A single online identity is advantageous if you want people to be able to connect to all aspect of your identity, old or new, with ease online. A single identity links your past and present, it\u2019s no longer as easy as it used to be to have segmented identities. The argument for a single identity is that any other options raise doubts of your openness, uniqueness and honesty (Costa and Torres, 2011). Since it\u2019s seen as a dishonest practice to hold multiple online identities and there are various companies that can manage your <a href=\"http:\/\/uk.reputation.com\/\">online reputation.<\/a>Is there any reason to hold multiple online identities?<\/p>\n<p>Multiple online identities are created for varying reasons and not all of them are to dupe the unsuspecting victim. Often they are created for security reasons and with the lack of legal protection online it seems this can often be a wise choice. Andrew Lewman argues for anonymity on the web to promote creativity. His\u00a0<a href=\"http:\/\/www.theguardian.com\/technology\/audio\/2012\/apr\/24\/tech-weekly-podcast-tor-anonymity\">podcast<\/a>\u00a0on the relationship between identity and privacy discusses the application of <a href=\"https:\/\/www.torproject.org\/\">Tor software <\/a>as a way of improving security and privacy and enabling users \u2018selective invisibility\u2019 (Krotoski, 2012). Lewman understand that the software can be misused and often the darker side of anonymity is evident. Whilst Zittrain (2010) discusses how eBay could use a little less anonymity and that multiple identities can easily be linked to criminal activity.<\/p>\n<p><a href=\"https:\/\/leighravenhill.files.wordpress.com\/2015\/02\/snewspaper.png\"><img loading=\"lazy\" decoding=\"async\" class=\"  wp-image-38 aligncenter\" src=\"https:\/\/leighravenhill.files.wordpress.com\/2015\/02\/snewspaper.png?w=502&#038;h=422\" alt=\"snewspaper\" width=\"502\" height=\"422\" \/><\/a><\/p>\n<p>Rosen (2010) highlights another argument for multiple identities: if our identities offline change in different contexts (social, professional or academic) why should this not be the case online? The success of\u00a0<a href=\"https:\/\/www.yammer.com\/\">Yammer<\/a>\u00a0as social network used solely by business suggest that some employers promote multiple identities and the clear separation of professional and social identities online.<\/p>\n<div class=\"jetpack-video-wrapper\"><span class='embed-youtube' style='text-align:center; display: block;'><iframe class='youtube-player' type='text\/html' width='676' height='411' src='https:\/\/www.youtube.com\/embed\/hIGRFGPnhL4?version=3&#038;rel=1&#038;%23038;fs=1&#038;%23038;showsearch=0&#038;%23038;showinfo=1&#038;%23038;iv_load_policy=1&#038;%23038;wmode=transparent' frameborder='0' allowfullscreen='true'><\/iframe><\/span><\/div>\n<p>Projects like <a href=\"http:\/\/stage-idm.weebly.com\/\">STAGE<\/a> (though still in development) are emerging with the aim of catering for legitimate users of multiple online identities as shown in the video above. Figure 1 shows why people need to manage their online identities.<\/p>\n<p><a href=\"https:\/\/leighravenhill.files.wordpress.com\/2015\/02\/stage.png\"><img loading=\"lazy\" decoding=\"async\" class=\"  wp-image-37 aligncenter\" src=\"https:\/\/leighravenhill.files.wordpress.com\/2015\/02\/stage.png?w=899&#038;h=415\" alt=\"STAgE\" width=\"899\" height=\"415\" \/><\/a><span style=\"color:#808080;\">Source: STAGE 2013<\/span><\/p>\n<p><a href=\"http:\/\/buzzmachine.com\/2011\/03\/08\/one-identity-or-more\/\">Jarvis (2011)<\/a> believes that we should be less concerned with identities and focus more on the societal norms online so that risks associated with single identities are reduced. This topic is multifaceted and though not discussed here has links to research in sociology, psychology and education but to name a few. Watch the TED<sup>X<\/sup> lecture below for an \u00a0overview on the psychology of multiple online identities.<\/p>\n<div class=\"jetpack-video-wrapper\"><span class='embed-youtube' style='text-align:center; display: block;'><iframe class='youtube-player' type='text\/html' width='676' height='411' src='https:\/\/www.youtube.com\/embed\/bgEA4iM8CHc?version=3&#038;rel=1&#038;%23038;fs=1&#038;%23038;showsearch=0&#038;%23038;showinfo=1&#038;%23038;iv_load_policy=1&#038;%23038;wmode=transparent' frameborder='0' allowfullscreen='true'><\/iframe><\/span><\/div>\n<hr \/>\n<p style=\"padding-left:900px;text-align:justify;\">\n<p>Costa, C. and Torres, R. (2011).\u00a0<a href=\"http:\/\/eft.educom.pt\/index.php\/eft\/article\/view\/216\/126\">To be or not to be, the importance of Digital Identity in the networked society.<\/a>\u00a0<em>Educa\u00e7\u00e3o, Forma\u00e7\u00e3o &amp; Tecnologias,\u00a0<\/em>University of Salford.<\/p>\n<p>Internet Society (2015).\u00a0<a href=\"http:\/\/www.internetsociety.org\/manage-your-identity\">Manage Your Identity.<\/a>\u00a0<em>Accessed on: 20\/02\/2015<\/em><\/p>\n<p>Jarvis, J. (2011) <a href=\"http:\/\/buzzmachine.com\/2011\/03\/08\/one-identity-or-more\/\">One identity or more?<\/a> Accessed on: 19\/02\/2015<\/p>\n<p>Krotoski, A. (2012).\u00a0<a href=\"http:\/\/www.theguardian.com\/technology\/2012\/apr\/19\/online-identity-authenticity-anonymity\">Online identity: is authenticity or anonymity more important?<\/a>\u00a0<em>The Guardian.<\/em><\/p>\n<p>Rosen, J. (2010) <a href=\"http:\/\/www.nytimes.com\/2010\/07\/25\/magazine\/25privacy-t2.html?pagewanted=all&amp;_r=1&amp;\">The web means the end of forgetting<\/a>. <em>The New York Times Magazine.<\/em><\/p>\n<p>STAGE (2013) <a href=\"http:\/\/stage-idm.weebly.com\/\">Digital service system for online identity management. <\/a>\u00a0Accessed on: 19\/02\/2015<\/p>\n<p>Zittrain, J. (2010).\u00a0<a href=\"http:\/\/blogs.law.harvard.edu\/futureoftheinternet\/2010\/09\/07\/reputation-bankruptcy\/\">Reputation Bankruptcy.<\/a>\u00a0<em>The Future of the Internet and How to Stop It,\u00a0<\/em>Harvard Law School.<\/p>\n<p>  <a rel=\"nofollow\" href=\"http:\/\/feeds.wordpress.com\/1.0\/gocomments\/leighravenhill.wordpress.com\/35\/\"><img decoding=\"async\" alt=\"\" border=\"0\" src=\"http:\/\/feeds.wordpress.com\/1.0\/comments\/leighravenhill.wordpress.com\/35\/\" \/><\/a> <img loading=\"lazy\" decoding=\"async\" alt=\"\" border=\"0\" src=\"https:\/\/pixel.wp.com\/b.gif?host=leighravenhill.wordpress.com&#038;blog=84413381&#038;%23038;post=35&#038;%23038;subd=leighravenhill&#038;%23038;ref=&#038;%23038;feed=1\" width=\"1\" height=\"1\" \/><\/p>\n<!-- AddThis Advanced Settings generic via filter on the_content --><!-- AddThis Share Buttons generic via filter on the_content -->","protected":false},"excerpt":{"rendered":"<p>&ldquo;Having two identities for yourself is an example of a lack of integrity.&rdquo; &nbsp;Mark Zuckerberg Your online identity is a collection of your characteristics and your interactions on the web (Internet Society, 2015) . We are now in an age where we are more concerned than ever with real identities (Krotoski, 2012) and anonymity is [&hellip;]<img loading=\"lazy\" decoding=\"async\" alt=\"\" border=\"0\" src=\"https:\/\/pixel.wp.com\/b.gif?host=leighravenhill.wordpress.com&amp;blog=84413381&amp;post=35&amp;subd=leighravenhill&amp;ref=&amp;feed=1\" width=\"1\" height=\"1\"><!-- AddThis Advanced Settings generic via filter on wp_trim_excerpt --><!-- AddThis Share Buttons generic via filter on wp_trim_excerpt --><\/p>\n","protected":false},"author":97368,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1031484],"tags":[],"class_list":["post-466","post","type-post","status-publish","format-standard","hentry","category-topic-2-2015","column","threecol"],"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/blog.soton.ac.uk\/uosm2008-2015\/wp-json\/wp\/v2\/posts\/466","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.soton.ac.uk\/uosm2008-2015\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.soton.ac.uk\/uosm2008-2015\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.soton.ac.uk\/uosm2008-2015\/wp-json\/wp\/v2\/users\/97368"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.soton.ac.uk\/uosm2008-2015\/wp-json\/wp\/v2\/comments?post=466"}],"version-history":[{"count":0,"href":"https:\/\/blog.soton.ac.uk\/uosm2008-2015\/wp-json\/wp\/v2\/posts\/466\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.soton.ac.uk\/uosm2008-2015\/wp-json\/wp\/v2\/media?parent=466"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.soton.ac.uk\/uosm2008-2015\/wp-json\/wp\/v2\/categories?post=466"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.soton.ac.uk\/uosm2008-2015\/wp-json\/wp\/v2\/tags?post=466"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}