{"version":"1.0","provider_name":"UOSM2008","provider_url":"https:\/\/blog.soton.ac.uk\/uosm2008","title":"#UOSM2008 Topic 2 - Reflective Summary - UOSM2008","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"dsPgfPTuIq\"><a href=\"https:\/\/blog.soton.ac.uk\/uosm2008\/2014\/topic-2-2014\/2014\/03\/uosm2008-topic-2-reflective-summary-85\/\">#UOSM2008 Topic 2 &#8211; Reflective Summary<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/blog.soton.ac.uk\/uosm2008\/2014\/topic-2-2014\/2014\/03\/uosm2008-topic-2-reflective-summary-85\/embed\/#?secret=dsPgfPTuIq\" width=\"600\" height=\"338\" title=\"&#8220;#UOSM2008 Topic 2 &#8211; Reflective Summary&#8221; &#8212; UOSM2008\" data-secret=\"dsPgfPTuIq\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/**\n * WordPress inline HTML embed\n *\n * @since 4.4.0\n * @output wp-includes\/js\/wp-embed.js\n *\n * Single line comments should not be used since they will break\n * the script when inlined in get_post_embed_html(), specifically\n * when the comments are not stripped out due to SCRIPT_DEBUG\n * being turned on.\n *\/\n(function ( window, document ) {\n\t'use strict';\n\n\t\/* Abort for ancient browsers. *\/\n\tif ( ! document.querySelector || ! window.addEventListener || typeof URL === 'undefined' ) {\n\t\treturn;\n\t}\n\n\t\/** @namespace wp *\/\n\twindow.wp = window.wp || {};\n\n\t\/* Abort if script was already executed. *\/\n\tif ( !! window.wp.receiveEmbedMessage ) {\n\t\treturn;\n\t}\n\n\t\/**\n\t * Receive embed message.\n\t *\n\t * @param {MessageEvent} e\n\t *\/\n\twindow.wp.receiveEmbedMessage = function( e ) {\n\t\tvar data = e.data;\n\n\t\t\/* Verify shape of message. *\/\n\t\tif (\n\t\t\t! ( data || data.secret || data.message || data.value ) ||\n\t\t\t\/[^a-zA-Z0-9]\/.test( data.secret )\n\t\t) {\n\t\t\treturn;\n\t\t}\n\n\t\tvar iframes = document.querySelectorAll( 'iframe[data-secret=\"' + data.secret + '\"]' ),\n\t\t\tblockquotes = document.querySelectorAll( 'blockquote[data-secret=\"' + data.secret + '\"]' ),\n\t\t\tallowedProtocols = new RegExp( '^https?:$', 'i' ),\n\t\t\ti, source, height, sourceURL, targetURL;\n\n\t\tfor ( i = 0; i < blockquotes.length; i++ ) {\n\t\t\tblockquotes[ i ].style.display = 'none';\n\t\t}\n\n\t\tfor ( i = 0; i < iframes.length; i++ ) {\n\t\t\tsource = iframes[ i ];\n\n\t\t\tif ( e.source !== source.contentWindow ) {\n\t\t\t\tcontinue;\n\t\t\t}\n\n\t\t\tsource.removeAttribute( 'style' );\n\n\t\t\tif ( 'height' === data.message ) {\n\t\t\t\t\/* Resize the iframe on request. *\/\n\t\t\t\theight = parseInt( data.value, 10 );\n\t\t\t\tif ( height > 1000 ) {\n\t\t\t\t\theight = 1000;\n\t\t\t\t} else if ( ~~height < 200 ) {\n\t\t\t\t\theight = 200;\n\t\t\t\t}\n\n\t\t\t\tsource.height = height;\n\t\t\t} else if ( 'link' === data.message ) {\n\t\t\t\t\/* Link to a specific URL on request. *\/\n\t\t\t\tsourceURL = new URL( source.getAttribute( 'src' ) );\n\t\t\t\ttargetURL = new URL( data.value );\n\n\t\t\t\tif (\n\t\t\t\t\tallowedProtocols.test( targetURL.protocol ) &&\n\t\t\t\t\ttargetURL.host === sourceURL.host &&\n\t\t\t\t\tdocument.activeElement === source\n\t\t\t\t) {\n\t\t\t\t\twindow.top.location.href = data.value;\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t};\n\n\tfunction onLoad() {\n\t\tvar iframes = document.querySelectorAll( 'iframe.wp-embedded-content' ),\n\t\t\ti, source, secret;\n\n\t\tfor ( i = 0; i < iframes.length; i++ ) {\n\t\t\t\/** @var {IframeElement} *\/\n\t\t\tsource = iframes[ i ];\n\n\t\t\tsecret = source.getAttribute( 'data-secret' );\n\t\t\tif ( ! secret ) {\n\t\t\t\t\/* Add secret to iframe *\/\n\t\t\t\tsecret = Math.random().toString( 36 ).substring( 2, 12 );\n\t\t\t\tsource.src += '#?secret=' + secret;\n\t\t\t\tsource.setAttribute( 'data-secret', secret );\n\t\t\t}\n\n\t\t\t\/*\n\t\t\t * Let post embed window know that the parent is ready for receiving the height message, in case the iframe\n\t\t\t * loaded before wp-embed.js was loaded. When the ready message is received by the post embed window, the\n\t\t\t * window will then (re-)send the height message right away.\n\t\t\t *\/\n\t\t\tsource.contentWindow.postMessage( {\n\t\t\t\tmessage: 'ready',\n\t\t\t\tsecret: secret\n\t\t\t}, '*' );\n\t\t}\n\t}\n\n\twindow.addEventListener( 'message', window.wp.receiveEmbedMessage, false );\n\tdocument.addEventListener( 'DOMContentLoaded', onLoad, false );\n})( window, document );\n\n\/* ]]> *\/\n<\/script>\n","description":"Picture source: http:\/\/brandconfessions.com\/profiles\/blogs\/5-tips-for-managing-your-social-media-identityIt is time to summarize the second Topic of the module Living and Working on the Web. The first thing to be mentioned is my mistake of misunderstanding the topic&rsquo;s question (thanks to George Chiverton for pointing at it). The question was to describe the pros and cons of having more than one online identity, when I have gone a bit differently by explaining the pros and cons of just having an online identity. Having read others comments and blogs I have came up with the following notes:&middot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Online identities help you to communicate with others, share information in real time and helps to develop your personal employability (Cosmato, 2013).&middot;&nbsp;&nbsp;&nbsp;&nbsp;However, it also reduces a very valuable face-to-face interaction between people, takes a significant amount of your personal time (Cosmato, 2013) and increases a possibility of identity fraud (Ibraz, 2010), which as I've later read from the blog of our classmate, Joy Isaac, it is referred as &ldquo;Catfishing&rdquo;.(http:\/\/joyisaac.wordpress.com\/2014\/02\/17\/online-identity-privacy-and-security\/).&middot;&nbsp;&nbsp;Furthermore, quite interesting was the blog of our classmates, Alysia Wildman. The differentiation between Anonymity and Authenticity is quite important, as the former depends on a user and could be performed in various ways, via a specific software or just frauding your identity, and the latter &ldquo;creates an online version of your life that relies on your true identity in order to function&rdquo; (Masters, 2011).To sum up, I just want to repeat that, despite disagreeing with this trend, I do have more than one online identity in order to be aware of all events and let others get in touch with me, especially when you are studying abroad. After the research on this topic both online and within myself, I have came to the opinion that it doesn't matter at all how many online identities do you have and in which social networks. The thing that does matter is how wisely and purposefully you use it. &nbsp;&ldquo;Your entire life is online, and it can be used against you. Be vigilant!&rdquo;Quote source:www.youtube.com\/embed\/F7pYHN9iC9IReferencesCosmato, D., 2013. Love to know social networking.  [Online] Available at: http:\/\/socialnetworking.lovetoknow.com\/Advantages_and_Disadvantages_of_Social_Networking [Accessed 22 February 2014].Ibraz, A., 2010. Fundamentals  of Computing. [Online] Available at: http:\/\/mason.gmu.edu\/~aibraz\/disadvantages.html [Accessed 22 February 2014].Masters, A., 2011. The  Independent. [Online] Available at: http:\/\/blogs.independent.co.uk\/2011\/09\/19\/identity-on-the-internet-the-pros-and-cons-of-anonymity\/ [Accessed 2 February 2014].","thumbnail_url":"http:\/\/4.bp.blogspot.com\/-8aLGzjnOUs4\/UxMf0K1RY3I\/AAAAAAAAAGg\/XyfoxvC86ZI\/s1600\/online-identity.png"}