{"id":126979,"date":"2014-03-02T16:59:49","date_gmt":"2014-03-02T16:59:49","guid":{"rendered":"http:\/\/kimberlyfenton.wordpress.com\/?p=341"},"modified":"2014-03-02T16:59:49","modified_gmt":"2014-03-02T16:59:49","slug":"reflective-summary-topic-2-uosm2008-139","status":"publish","type":"post","link":"https:\/\/blog.soton.ac.uk\/uosm2008\/2014\/topic-2-2014\/2014\/03\/reflective-summary-topic-2-uosm2008-139\/","title":{"rendered":"Reflective Summary, Topic 2, #UOSM2008"},"content":{"rendered":"<p>The two week allocation for the development of Topic 2 has seen the progression of my thoughts and understanding regarding the question of multiple online identities, due to the breadth and variety of the discussion presented by my peers.<\/p>\n<p>A point which I raised in my post, the use of pseudonyms, has also\u00a0been focused on by others and I particularly liked the layout of <a href=\"http:\/\/alysiawildmanuosm2008.wordpress.com\/2014\/02\/23\/discuss-the-arguments-for-and-against-having-more-than-one-online-identity\/\" ><strong>Alysia Wildman&#8217;s<\/strong> <\/a>blog where she separated the debate into two fundamental questions, critically evaluating the positives and negatives: which\u00a0do you find more valuable on the web, authenticity or anonymity? Additionally, throughout the week, many articles were\u00a0further shared through\u00a0#UOSM2008\u00a0which I found very useful to read other people&#8217;s opinions and experiences.<\/p>\n<p>In my blog post, I explained my personal choice\u00a0of anonymity during my teenage years, and\u00a0focused slightly more on the negative side of anonymity, in terms of possible\u00a0security risks,\u00a0but a comment from my peer <a href=\"http:\/\/managingmydigitallife.wordpress.com\/\" ><strong>Francesca Gerard<\/strong><\/a>, brought to light the positives, with the support of a very interesting article, please see <a href=\"https:\/\/kimberlyfenton.wordpress.com\/2014\/02\/21\/multiple-online-identities-good-or-bad\/\" ><strong>here<\/strong><\/a> in the comments section. I still believe, and would argue, that both anonymity and authenticity\u00a0can be used effectively\u00a0to\u00a0serve our different personal purposes and goals whilst living and working on the web. For example on one hand it is true that anoynmity can allow cyberbullys to roam the internet hiding behind an online persona, however, on the other hand like Francesca mentioned, anonymous profiles also allows one to truly express themselves and for example, provide valuable honest feedback to companies. Nevertheless, the important point of security issues still remains, and we should focus on ensuring that we are in full control of our privacy, as well as using our own better judgement and common sense to avoid any risk of connecting with somebody we might later regret.<\/p>\n<p>The week started off fairly quietly as people understandably took their time to produce a well-written blog post, however, my personal learning experience took on\u00a0a life of its own shortly after I clicked <em>Publish<\/em> on Friday! I valued the comment from Module Leader Lisa Harris, as it opened up new areas to explore. In doing so, I was able to further\u00a0develop my understanding of the topic and, in particular,\u00a0focus on the growth of &#8216;anonymous&#8217; social networks.\u00a0In my response, I referenced <a href=\"http:\/\/www.huffingtonpost.com\/jeanette-cajide\/anonymous-messaging-makes_b_4697525.html\" rel=\"nofollow\"><b>Jeanette Cajide<\/b><\/a>, cofounder of Blurtt (an anonymous social network) and from there my Saturday morning was filled with excitement, as she subsequently retweeted my tweet sharing my blog post to her followers, and we were able to start a little discussion. Even though she was only passing the time whilst locked out of her apartment talking to me, I really appreciated the encouragement and the sharing of her wealth of knowledge surrounding the topic. Through the interaction I was introduced to different points from an insider&#8217;s perspective, such as, what happens when one gets married? Do you change your online identity in that case? It was an invaluable experience, and I hope I will be able to have similar interactions with professionals throughout this course, as it really does aid the learning experience and gives it a little bit of added excitement!<\/p>\n<p><a href=\"https:\/\/kimberlyfenton.files.wordpress.com\/2014\/02\/jeanettec_zpsfa462420.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-346\" alt=\"JeanetteC_zpsfa462420\" src=\"https:\/\/kimberlyfenton.files.wordpress.com\/2014\/02\/jeanettec_zpsfa462420.png?w=590&#038;h=705\" width=\"590\" height=\"705\" \/><\/a><\/p>\n<p>I recently read this <strong><a href=\"http:\/\/www.forbes.com\/sites\/tarunwadhwa\/2014\/02\/03\/zuckerbergs-embrace-of-anonymity-marks-shift-in-tech-industry-attitudes-toward-privacy\/\" >article<\/a>\u00a0<\/strong>focusing on how the &#8220;King of Social Media himself&#8221; i.e. Mark Zuckerburg, seems to have done a U-turn last month talking with Bloomberg Business Week. Zuckerburg had previously stated that having &#8220;two identities was a lack of integrity.&#8221; A quote which was also picked up by my fellow peers, and so his latest statement is somewhat of a surprise.\u00a0Facebook&#8217;s CEO has now admitted that\u00a0it was \u201csomewhat of a burden\u201d if you are \u201calways under the pressure of a real identity.\u201d I feel like <a href=\"https:\/\/twitter.com\/twadhwa\" ><strong>Tarun Wadwha<\/strong><\/a> has summed it up perfectly: &#8220;The king of social media is finally recognizing that privacy is not just some cultural relic to be engineered away.&#8221;<\/p>\n<p>Or is it wishful thinking that Facebook would make such significant changes on it&#8217;s 10th birthday?<\/p>\n<div data-shortcode=\"caption\" id=\"attachment_348\" style=\"width: 370px\" class=\"wp-caption alignleft\"><a href=\"https:\/\/kimberlyfenton.files.wordpress.com\/2014\/03\/surf.gif\"><img decoding=\"async\" class=\"size-full wp-image-348 \" alt=\"www.hawaiiandays.com\" src=\"https:\/\/kimberlyfenton.files.wordpress.com\/2014\/03\/surf.gif?w=590\"   \/><\/a><\/p>\n<p class=\"wp-caption-text\"><a href=\"http:\/\/www.hawaiiandays.com\/\" rel=\"nofollow\">http:\/\/www.hawaiiandays.com<\/a><\/p>\n<\/div>\n<p><span style=\"line-height:1.625;\">As the power of the internet continues to grow, with more organisations having access to personal details and Google searches for example, one hopes that privacy and security issues will soon be addressed.<\/span><\/p>\n<p><span style=\"line-height:1.625;\"> For now, surf with caution.<\/span><\/p>\n<p>  <a rel=\"nofollow\" href=\"http:\/\/feeds.wordpress.com\/1.0\/gocomments\/kimberlyfenton.wordpress.com\/341\/\"><img decoding=\"async\" alt=\"\" border=\"0\" src=\"http:\/\/feeds.wordpress.com\/1.0\/comments\/kimberlyfenton.wordpress.com\/341\/\" \/><\/a> <img loading=\"lazy\" decoding=\"async\" alt=\"\" border=\"0\" src=\"https:\/\/pixel.wp.com\/b.gif?host=kimberlyfenton.wordpress.com&#038;blog=63476673&#038;%23038;post=341&#038;%23038;subd=kimberlyfenton&#038;%23038;ref=&#038;%23038;feed=1\" width=\"1\" height=\"1\" \/><\/p>\n<!-- AddThis Advanced Settings generic via filter on the_content --><!-- AddThis Share Buttons generic via filter on the_content -->","protected":false},"excerpt":{"rendered":"<p>The two week allocation for the development of Topic 2 has seen the progression of my thoughts and understanding regarding &#8230; <br \/><a href=\"https:\/\/kimberlyfenton.wordpress.com\/2014\/03\/02\/reflective-summary-topic-2-uosm2008\/\">Continue reading<\/a><img loading=\"lazy\" decoding=\"async\" alt=\"\" border=\"0\" src=\"https:\/\/pixel.wp.com\/b.gif?host=kimberlyfenton.wordpress.com&amp;blog=63476673&amp;post=341&amp;subd=kimberlyfenton&amp;ref=&amp;feed=1\" width=\"1\" height=\"1\"><!-- AddThis Advanced Settings generic via filter on wp_trim_excerpt --><!-- AddThis Share Buttons generic via filter on wp_trim_excerpt --><\/p>\n","protected":false},"author":93799,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1031947],"tags":[],"class_list":["post-126979","post","type-post","status-publish","format-standard","hentry","category-topic-2-2014","column","threecol"],"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/blog.soton.ac.uk\/uosm2008\/wp-json\/wp\/v2\/posts\/126979","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.soton.ac.uk\/uosm2008\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.soton.ac.uk\/uosm2008\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.soton.ac.uk\/uosm2008\/wp-json\/wp\/v2\/users\/93799"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.soton.ac.uk\/uosm2008\/wp-json\/wp\/v2\/comments?post=126979"}],"version-history":[{"count":1,"href":"https:\/\/blog.soton.ac.uk\/uosm2008\/wp-json\/wp\/v2\/posts\/126979\/revisions"}],"predecessor-version":[{"id":126980,"href":"https:\/\/blog.soton.ac.uk\/uosm2008\/wp-json\/wp\/v2\/posts\/126979\/revisions\/126980"}],"wp:attachment":[{"href":"https:\/\/blog.soton.ac.uk\/uosm2008\/wp-json\/wp\/v2\/media?parent=126979"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.soton.ac.uk\/uosm2008\/wp-json\/wp\/v2\/categories?post=126979"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.soton.ac.uk\/uosm2008\/wp-json\/wp\/v2\/tags?post=126979"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}