{"id":132895,"date":"2014-03-02T12:14:00","date_gmt":"2014-03-02T12:14:00","guid":{"rendered":"https:\/\/blog.soton.ac.uk\/uosm2008\/?guid=8df6653d2981ed0fad843ba055df05db"},"modified":"2014-03-02T12:16:31","modified_gmt":"2014-03-02T12:16:31","slug":"uosm2008-topic-2-reflective-summary-373","status":"publish","type":"post","link":"https:\/\/blog.soton.ac.uk\/uosm2008\/2014\/topic-2-2014\/2014\/03\/uosm2008-topic-2-reflective-summary-373\/","title":{"rendered":"#UOSM2008 Topic 2 &#8211; Reflective Summary"},"content":{"rendered":"<div dir=\"ltr\" style=\"text-align: left;\" trbidi=\"on\">\n<div class=\"separator\" style=\"clear: both; text-align: center;\"><a href=\"http:\/\/4.bp.blogspot.com\/-8aLGzjnOUs4\/UxMf0K1RY3I\/AAAAAAAAAGg\/XyfoxvC86ZI\/s1600\/online-identity.png\" imageanchor=\"1\" style=\"margin-left: 1em; margin-right: 1em;\"><img loading=\"lazy\" decoding=\"async\" border=\"0\" src=\"http:\/\/4.bp.blogspot.com\/-8aLGzjnOUs4\/UxMf0K1RY3I\/AAAAAAAAAGg\/XyfoxvC86ZI\/s1600\/online-identity.png\" height=\"226\" width=\"320\" \/><\/a><\/div>\n<div class=\"MsoNormal\" style=\"text-align: justify;\"><span lang=\"EN-US\" style=\"font-family: &quot;Cambria&quot;,&quot;serif&quot;; font-size: 12.0pt; line-height: 115%; mso-ansi-language: EN-US; mso-ascii-theme-font: major-latin; mso-fareast-language: JA; mso-hansi-theme-font: major-latin;\"><\/span><\/div>\n<div align=\"center\" class=\"MsoNormal\" style=\"text-align: center;\"><b><span style=\"font-family: &quot;Cambria&quot;,&quot;serif&quot;; font-size: 12.0pt; line-height: 115%; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;\">Picture source<\/span><\/b><span style=\"font-family: &quot;Cambria&quot;,&quot;serif&quot;; font-size: 12.0pt; line-height: 115%; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;\">: <\/span><span style=\"font-family: &quot;Cambria&quot;,&quot;serif&quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;\"><span style=\"font-size: 12.0pt; line-height: 115%;\"><a href=\"http:\/\/brandconfessions.com\/profiles\/blogs\/5-tips-for-managing-your-social-media-identity\">http:\/\/brandconfessions.com\/profiles\/blogs\/5-tips-for-managing-your-social-media-identity<\/a><\/span><\/span><span style=\"font-family: &quot;Cambria&quot;,&quot;serif&quot;; font-size: 12.0pt; line-height: 115%; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;\"><o:p><\/o:p><\/span><\/div>\n<div align=\"center\" class=\"MsoNormal\" style=\"text-align: center;\"><span style=\"font-family: &quot;Cambria&quot;,&quot;serif&quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;\"><br \/><\/span><\/div>\n<div class=\"MsoNormal\" style=\"text-align: justify;\"><span lang=\"EN-US\" style=\"font-family: &quot;Cambria&quot;,&quot;serif&quot;; font-size: 12.0pt; line-height: 115%; mso-ansi-language: EN-US; mso-ascii-theme-font: major-latin; mso-fareast-language: JA; mso-hansi-theme-font: major-latin;\">It is time to summarize the second Topic of the module Living and Working on the Web. The first thing to be mentioned is my mistake of misunderstanding the topic\u2019s question (thanks to George Chiverton for pointing at it). The question was to describe the pros and cons of having more than one online identity, when I have gone a bit differently by explaining the pros and cons of just having an online identity. Having read others comments and blogs I have came up with the following notes:<o:p><\/o:p><\/span><br \/><span lang=\"EN-US\" style=\"font-family: &quot;Cambria&quot;,&quot;serif&quot;; font-size: 12.0pt; line-height: 115%; mso-ansi-language: EN-US; mso-ascii-theme-font: major-latin; mso-fareast-language: JA; mso-hansi-theme-font: major-latin;\"><br \/><\/span><\/div>\n<div class=\"MsoListParagraphCxSpFirst\" style=\"margin-left: 39.0pt; mso-add-space: auto; mso-list: l0 level1 lfo1; text-align: justify; text-indent: -18.0pt;\"><!--[if !supportLists]--><span lang=\"EN-US\" style=\"font-family: Symbol; font-size: 12.0pt; line-height: 115%; mso-ansi-language: EN-US; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol; mso-fareast-language: JA;\">\u00b7<span style=\"font-family: 'Times New Roman'; font-size: 7pt; line-height: normal;\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<\/span><\/span><span lang=\"EN-US\" style=\"font-family: &quot;Cambria&quot;,&quot;serif&quot;; font-size: 12.0pt; line-height: 115%; mso-ansi-language: EN-US; mso-ascii-theme-font: major-latin; mso-fareast-language: JA; mso-hansi-theme-font: major-latin;\">Online identities help you to communicate with others, share information in real time and helps to develop your personal employability <w:sdt citation=\"t\" id=\"-893735838\"><!--[if supportFields]><span style='mso-element:field-begin'><\/span><span  style='mso-spacerun:yes'>\u00a0<\/span>CITATION Don13 l 1033 <span  style='mso-element:field-separator'><\/span><![endif]-->(Cosmato, 2013)<!--[if supportFields]><span style='mso-element:  field-end'><\/span><![endif]--><\/w:sdt>.<o:p><\/o:p><\/span><br \/><span lang=\"EN-US\" style=\"font-family: &quot;Cambria&quot;,&quot;serif&quot;; font-size: 12.0pt; line-height: 115%; mso-ansi-language: EN-US; mso-ascii-theme-font: major-latin; mso-fareast-language: JA; mso-hansi-theme-font: major-latin;\"><br \/><\/span><\/div>\n<div class=\"MsoListParagraphCxSpMiddle\" style=\"margin-left: 39.0pt; mso-add-space: auto; mso-list: l0 level1 lfo1; text-align: justify; text-indent: -18.0pt;\"><!--[if !supportLists]--><span lang=\"EN-US\" style=\"font-family: Symbol; font-size: 12.0pt; line-height: 115%; mso-ansi-language: EN-US; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol; mso-fareast-language: JA;\">\u00b7<span style=\"font-family: 'Times New Roman'; font-size: 7pt; line-height: normal;\">&nbsp;&nbsp;&nbsp;&nbsp;<\/span><\/span><span lang=\"EN-US\" style=\"font-family: &quot;Cambria&quot;,&quot;serif&quot;; font-size: 12.0pt; line-height: 115%; mso-ansi-language: EN-US; mso-ascii-theme-font: major-latin; mso-fareast-language: JA; mso-hansi-theme-font: major-latin;\">However, it also reduces a very valuable face-to-face interaction between people, takes a significant amount of your personal time <w:sdt citation=\"t\" id=\"623971357\"><!--[if supportFields]><span style='mso-element:field-begin'><\/span><span  style='mso-spacerun:yes'>\u00a0<\/span>CITATION Don13 l 1033 <span  style='mso-element:field-separator'><\/span><![endif]-->(Cosmato, 2013)<!--[if supportFields]><span style='mso-element:  field-end'><\/span><![endif]--><\/w:sdt> and increases a possibility of identity fraud <w:sdt citation=\"t\" id=\"-1325812244\"><!--[if supportFields]><span  style='mso-element:field-begin'><\/span><span style='mso-spacerun:yes'>\u00a0<\/span>CITATION  Anu10 l 1033 <span style='mso-element:field-separator'><\/span><![endif]-->(Ibraz, 2010)<!--[if supportFields]><span  style='mso-element:field-end'><\/span><![endif]--><\/w:sdt>, which as I&#8217;ve later read from the blog of our classmate, Joy Isaac, it is referred as \u201cCatfishing\u201d.<\/span><\/div>\n<div class=\"MsoListParagraphCxSpMiddle\" style=\"margin-left: 39.0pt; mso-add-space: auto;\"><span lang=\"EN-US\" style=\"font-family: &quot;Cambria&quot;,&quot;serif&quot;; font-size: 12.0pt; line-height: 115%; mso-ansi-language: EN-US; mso-ascii-theme-font: major-latin; mso-fareast-language: JA; mso-hansi-theme-font: major-latin;\">(<\/span><span style=\"background: white; color: #242424; font-family: &quot;Cambria&quot;,&quot;serif&quot;; font-size: 10.5pt; line-height: 115%; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;\"><a href=\"http:\/\/joyisaac.wordpress.com\/2014\/02\/17\/online-identity-privacy-and-security\/\">http:\/\/joyisaac.wordpress.com\/2014\/02\/17\/online-identity-privacy-and-security\/<\/a><\/span><span lang=\"EN-US\" style=\"font-family: &quot;Cambria&quot;,&quot;serif&quot;; font-size: 12.0pt; line-height: 115%; mso-ansi-language: EN-US; mso-ascii-theme-font: major-latin; mso-fareast-language: JA; mso-hansi-theme-font: major-latin;\">).<o:p><\/o:p><\/span><br \/><span lang=\"EN-US\" style=\"font-family: &quot;Cambria&quot;,&quot;serif&quot;; font-size: 12.0pt; line-height: 115%; mso-ansi-language: EN-US; mso-ascii-theme-font: major-latin; mso-fareast-language: JA; mso-hansi-theme-font: major-latin;\"><br \/><\/span><\/div>\n<div class=\"MsoListParagraphCxSpLast\" style=\"margin-left: 39.0pt; mso-add-space: auto; mso-list: l0 level1 lfo1; text-align: justify; text-indent: -18.0pt;\"><!--[if !supportLists]--><span lang=\"EN-US\" style=\"font-family: Symbol; font-size: 12.0pt; line-height: 115%; mso-ansi-language: EN-US; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol; mso-fareast-language: JA;\">\u00b7<span style=\"font-family: 'Times New Roman'; font-size: 7pt; line-height: normal;\">&nbsp;&nbsp;<\/span><\/span><span lang=\"EN-US\" style=\"font-family: &quot;Cambria&quot;,&quot;serif&quot;; font-size: 12.0pt; line-height: 115%; mso-ansi-language: EN-US; mso-ascii-theme-font: major-latin; mso-fareast-language: JA; mso-hansi-theme-font: major-latin;\">Furthermore, quite interesting was the blog of our classmates, Alysia Wildman. The differentiation between Anonymity and Authenticity is quite important, as the former depends on a user and could be performed in various ways, via a specific software or just frauding your identity, and the latter \u201ccreates an online version of your life that relies on your true identity in order to function\u201d <w:sdt citation=\"t\" id=\"175323463\"><!--[if supportFields]><span  style='mso-element:field-begin'><\/span><span style='mso-spacerun:yes'>\u00a0<\/span>CITATION  Ale11 l 1033 <span style='mso-element:field-separator'><\/span><![endif]-->(Masters, 2011)<!--[if supportFields]><span  style='mso-element:field-end'><\/span><![endif]--><\/w:sdt>.<o:p><\/o:p><\/span><br \/><span lang=\"EN-US\" style=\"font-family: &quot;Cambria&quot;,&quot;serif&quot;; font-size: 12.0pt; line-height: 115%; mso-ansi-language: EN-US; mso-ascii-theme-font: major-latin; mso-fareast-language: JA; mso-hansi-theme-font: major-latin;\"><br \/><\/span><\/div>\n<div class=\"MsoNormal\" style=\"text-align: justify;\"><span lang=\"EN-US\" style=\"font-family: &quot;Cambria&quot;,&quot;serif&quot;; font-size: 12.0pt; line-height: 115%; mso-ansi-language: EN-US; mso-ascii-theme-font: major-latin; mso-fareast-language: JA; mso-hansi-theme-font: major-latin;\">To sum up, I just want to repeat that, despite disagreeing with this trend, I do have more than one online identity in order to be aware of all events and let others get in touch with me, especially when you are studying abroad. After the research on this topic both online and within myself, I have came to the opinion that it doesn&#8217;t matter at all how many online identities do you have and in which social networks. The thing that does matter is how wisely and purposefully you use it. &nbsp;<o:p><\/o:p><\/span><br \/><span lang=\"EN-US\" style=\"font-family: &quot;Cambria&quot;,&quot;serif&quot;; font-size: 12.0pt; line-height: 115%; mso-ansi-language: EN-US; mso-ascii-theme-font: major-latin; mso-fareast-language: JA; mso-hansi-theme-font: major-latin;\"><br \/><\/span><\/div>\n<div align=\"center\" class=\"MsoNormal\" style=\"text-align: center;\"><span style=\"font-family: &quot;Cambria&quot;,&quot;serif&quot;; font-size: 12.0pt; line-height: 115%; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;\">\u201cYour entire life is online, and it can be used against you. Be vigilant!\u201d<o:p><\/o:p><\/span><br \/><span style=\"font-family: &quot;Cambria&quot;,&quot;serif&quot;; font-size: 12.0pt; line-height: 115%; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;\"><br \/><\/span><\/div>\n<div align=\"center\" class=\"MsoNormal\" style=\"text-align: center;\"><b><span style=\"font-family: &quot;Cambria&quot;,&quot;serif&quot;; font-size: 12.0pt; line-height: 115%; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;\">Quote source:<\/span><\/b><span style=\"font-family: &quot;Cambria&quot;,&quot;serif&quot;; font-size: 12.0pt; line-height: 115%; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;\"><a href=\"http:\/\/www.youtube.com\/embed\/F7pYHN9iC9I\">www.youtube.com\/embed\/F7pYHN9iC9I<\/a><o:p><\/o:p><\/span><\/div>\n<div align=\"center\" class=\"MsoNormal\" style=\"text-align: center;\"><\/div>\n<div class=\"MsoNormal\" style=\"text-align: justify;\"><b><u>References<\/u><\/b><\/div>\n<div class=\"MsoNormal\" style=\"text-align: justify;\"><\/div>\n<div class=\"MsoBibliography\"><!--[if supportFields]><span style='font-size:12.0pt;   line-height:115%;font-family:\"Cambria\",\"serif\";mso-ascii-theme-font:major-latin;   mso-hansi-theme-font:major-latin'><span style='mso-element:field-begin'><\/span><span   style='mso-spacerun:yes'>\u00a0<\/span>BIBLIOGRAPHY <span style='mso-element:field-separator'><\/span><\/span><![endif]--><span style=\"font-family: &quot;Cambria&quot;,&quot;serif&quot;; font-size: 12.0pt; line-height: 115%; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;\">Cosmato, D., 2013. <i>Love to know social networking<\/i>.   [Online] Available at: <u><a href=\"http:\/\/socialnetworking.lovetoknow.com\/Advantages_and_Disadvantages_of_Social_Networking\">http:\/\/socialnetworking.lovetoknow.com\/Advantages_and_Disadvantages_of_Social_Networking<\/a><\/u>  [Accessed 22 February 2014].<o:p><\/o:p><\/span><span style=\"font-family: &quot;Cambria&quot;,&quot;serif&quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;\"><w:sdtpr><\/w:sdtpr><\/span><\/div>\n<div class=\"MsoBibliography\" xmlns=\"\"><span style=\"font-family: &quot;Cambria&quot;,&quot;serif&quot;; font-size: 12.0pt; line-height: 115%; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin; mso-no-proof: yes;\">Ibraz, A., 2010. <i>Fundamentals   of Computing<\/i>. [Online] Available at: <u><a href=\"http:\/\/mason.gmu.edu\/~aibraz\/disadvantages.html\">http:\/\/mason.gmu.edu\/~aibraz\/disadvantages.html<\/a><\/u>  [Accessed 22 February 2014].<o:p><\/o:p><\/span><\/div>\n<div class=\"MsoBibliography\" xmlns=\"\"><span style=\"font-family: &quot;Cambria&quot;,&quot;serif&quot;; font-size: 12.0pt; line-height: 115%; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin; mso-no-proof: yes;\">Masters, A., 2011. <i>The   Independent<\/i>. [Online] Available at: <u><a href=\"http:\/\/blogs.independent.co.uk\/2011\/09\/19\/identity-on-the-internet-the-pros-and-cons-of-anonymity\/\">http:\/\/blogs.independent.co.uk\/2011\/09\/19\/identity-on-the-internet-the-pros-and-cons-of-anonymity\/<\/a><\/u>  [Accessed 2 February 2014].<o:p><\/o:p><\/span><\/div>\n<p><w:sdt docparttype=\"Bibliographies\" docpartunique=\"t\" id=\"-594935578\" sdtdocpart=\"t\">   <w:sdt bibliography=\"t\" id=\"626281860\">           <\/w:sdt><\/w:sdt><\/p>\n<div class=\"MsoNormal\" xmlns=\"\"><\/div>\n<\/div>\n<!-- AddThis Advanced Settings generic via filter on the_content --><!-- AddThis Share Buttons generic via filter on the_content -->","protected":false},"excerpt":{"rendered":"<div dir=\"ltr\">\n<div><a href=\"http:\/\/4.bp.blogspot.com\/-8aLGzjnOUs4\/UxMf0K1RY3I\/AAAAAAAAAGg\/XyfoxvC86ZI\/s1600\/online-identity.png\"><img loading=\"lazy\" decoding=\"async\" border=\"0\" src=\"http:\/\/4.bp.blogspot.com\/-8aLGzjnOUs4\/UxMf0K1RY3I\/AAAAAAAAAGg\/XyfoxvC86ZI\/s1600\/online-identity.png\" height=\"226\" width=\"320\"><\/a><\/div>\n<div><span lang=\"EN-US\"><\/span><\/div>\n<div align=\"center\"><b><span>Picture source<\/span><\/b><span>: <\/span><span><span><a href=\"http:\/\/brandconfessions.com\/profiles\/blogs\/5-tips-for-managing-your-social-media-identity\">http:\/\/brandconfessions.com\/profiles\/blogs\/5-tips-for-managing-your-social-media-identity<\/a><\/span><\/span><span><\/p>\n<p><\/span><\/div>\n<div align=\"center\"><span><br \/><\/span><\/div>\n<div><span lang=\"EN-US\">It is time to summarize the second Topic of the module Living and Working on the Web. The first thing to be mentioned is my mistake of misunderstanding the topic&rsquo;s question (thanks to George Chiverton for pointing at it). The question was to describe the pros and cons of having more than one online identity, when I have gone a bit differently by explaining the pros and cons of just having an online identity. Having read others comments and blogs I have came up with the following notes:<\/p>\n<p><\/span><br \/><span lang=\"EN-US\"><br \/><\/span><\/div>\n<div><!--[if !supportLists]--><span lang=\"EN-US\">&middot;<span>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<\/span><\/span><span lang=\"EN-US\">Online identities help you to communicate with others, share information in real time and helps to develop your personal employability <!--[if supportFields]&gt;<span><\/span><span>&nbsp;<\/span>CITATION Don13 l 1033 <span><\/span>&lt;![endif]-->(Cosmato, 2013)<!--[if supportFields]&gt;<span><\/span>&lt;![endif]-->.<\/p>\n<p><\/span><br \/><span lang=\"EN-US\"><br \/><\/span><\/div>\n<div><!--[if !supportLists]--><span lang=\"EN-US\">&middot;<span>&nbsp;&nbsp;&nbsp;&nbsp;<\/span><\/span><span lang=\"EN-US\">However, it also reduces a very valuable face-to-face interaction between people, takes a significant amount of your personal time <!--[if supportFields]&gt;<span><\/span><span>&nbsp;<\/span>CITATION Don13 l 1033 <span><\/span>&lt;![endif]-->(Cosmato, 2013)<!--[if supportFields]&gt;<span><\/span>&lt;![endif]--> and increases a possibility of identity fraud <!--[if supportFields]&gt;<span><\/span><span>&nbsp;<\/span>CITATION  Anu10 l 1033 <span><\/span>&lt;![endif]-->(Ibraz, 2010)<!--[if supportFields]&gt;<span><\/span>&lt;![endif]-->, which as I&#8217;ve later read from the blog of our classmate, Joy Isaac, it is referred as &ldquo;Catfishing&rdquo;.<\/span><\/div>\n<div><span lang=\"EN-US\">(<\/span><span><a href=\"http:\/\/joyisaac.wordpress.com\/2014\/02\/17\/online-identity-privacy-and-security\/\">http:\/\/joyisaac.wordpress.com\/2014\/02\/17\/online-identity-privacy-and-security\/<\/a><\/span><span lang=\"EN-US\">).<\/p>\n<p><\/span><br \/><span lang=\"EN-US\"><br \/><\/span><\/div>\n<div><!--[if !supportLists]--><span lang=\"EN-US\">&middot;<span>&nbsp;&nbsp;<\/span><\/span><span lang=\"EN-US\">Furthermore, quite interesting was the blog of our classmates, Alysia Wildman. The differentiation between Anonymity and Authenticity is quite important, as the former depends on a user and could be performed in various ways, via a specific software or just frauding your identity, and the latter &ldquo;creates an online version of your life that relies on your true identity in order to function&rdquo; <!--[if supportFields]&gt;<span><\/span><span>&nbsp;<\/span>CITATION  Ale11 l 1033 <span><\/span>&lt;![endif]-->(Masters, 2011)<!--[if supportFields]&gt;<span><\/span>&lt;![endif]-->.<\/p>\n<p><\/span><br \/><span lang=\"EN-US\"><br \/><\/span><\/div>\n<div><span lang=\"EN-US\">To sum up, I just want to repeat that, despite disagreeing with this trend, I do have more than one online identity in order to be aware of all events and let others get in touch with me, especially when you are studying abroad. After the research on this topic both online and within myself, I have came to the opinion that it doesn&#8217;t matter at all how many online identities do you have and in which social networks. The thing that does matter is how wisely and purposefully you use it. &nbsp;<\/p>\n<p><\/span><br \/><span lang=\"EN-US\"><br \/><\/span><\/div>\n<div align=\"center\"><span>&ldquo;Your entire life is online, and it can be used against you. Be vigilant!&rdquo;<\/p>\n<p><\/span><br \/><span><br \/><\/span><\/div>\n<div align=\"center\"><b><span>Quote source:<\/span><\/b><span><a href=\"http:\/\/www.youtube.com\/embed\/F7pYHN9iC9I\">www.youtube.com\/embed\/F7pYHN9iC9I<\/a><\/p>\n<p><\/span><\/div>\n<div align=\"center\"><\/div>\n<div><b><u>References<\/u><\/b><\/div>\n<div><\/div>\n<div><!--[if supportFields]&gt;<span style='font-size:12.0pt;line-height:115%;font-family:\"Cambria\",\"serif\"'><span><\/span><span>&nbsp;<\/span>BIBLIOGRAPHY <span><\/span><\/span>&lt;![endif]--><span>Cosmato, D., 2013. <i>Love to know social networking<\/i>.   [Online] Available at: <u><a href=\"http:\/\/socialnetworking.lovetoknow.com\/Advantages_and_Disadvantages_of_Social_Networking\">http:\/\/socialnetworking.lovetoknow.com\/Advantages_and_Disadvantages_of_Social_Networking<\/a><\/u>  [Accessed 22 February 2014].<\/p>\n<p><\/span><span><\/span><\/div>\n<div><span>Ibraz, A., 2010. <i>Fundamentals   of Computing<\/i>. [Online] Available at: <u><a href=\"http:\/\/mason.gmu.edu\/~aibraz\/disadvantages.html\">http:\/\/mason.gmu.edu\/~aibraz\/disadvantages.html<\/a><\/u>  [Accessed 22 February 2014].<\/p>\n<p><\/span><\/div>\n<div><span>Masters, A., 2011. <i>The   Independent<\/i>. [Online] Available at: <u><a href=\"http:\/\/blogs.independent.co.uk\/2011\/09\/19\/identity-on-the-internet-the-pros-and-cons-of-anonymity\/\">http:\/\/blogs.independent.co.uk\/2011\/09\/19\/identity-on-the-internet-the-pros-and-cons-of-anonymity\/<\/a><\/u>  [Accessed 2 February 2014].<\/p>\n<p><\/span><\/div>\n<p><\/p>\n<div><\/div>\n<\/div>\n<p><!-- AddThis Advanced Settings generic via filter on wp_trim_excerpt --><!-- AddThis Share Buttons generic via filter on wp_trim_excerpt --><\/p>\n","protected":false},"author":93825,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1031947],"tags":[],"class_list":["post-132895","post","type-post","status-publish","format-standard","hentry","category-topic-2-2014","column","threecol"],"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/blog.soton.ac.uk\/uosm2008\/wp-json\/wp\/v2\/posts\/132895","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.soton.ac.uk\/uosm2008\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.soton.ac.uk\/uosm2008\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.soton.ac.uk\/uosm2008\/wp-json\/wp\/v2\/users\/93825"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.soton.ac.uk\/uosm2008\/wp-json\/wp\/v2\/comments?post=132895"}],"version-history":[{"count":1,"href":"https:\/\/blog.soton.ac.uk\/uosm2008\/wp-json\/wp\/v2\/posts\/132895\/revisions"}],"predecessor-version":[{"id":132896,"href":"https:\/\/blog.soton.ac.uk\/uosm2008\/wp-json\/wp\/v2\/posts\/132895\/revisions\/132896"}],"wp:attachment":[{"href":"https:\/\/blog.soton.ac.uk\/uosm2008\/wp-json\/wp\/v2\/media?parent=132895"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.soton.ac.uk\/uosm2008\/wp-json\/wp\/v2\/categories?post=132895"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.soton.ac.uk\/uosm2008\/wp-json\/wp\/v2\/tags?post=132895"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}