{"id":17675,"date":"2014-02-22T02:20:00","date_gmt":"2014-02-22T02:20:00","guid":{"rendered":"https:\/\/blog.soton.ac.uk\/uosm2008\/?guid=3cd380af9e864049ddc28fe6df6566f9"},"modified":"2014-02-22T02:22:22","modified_gmt":"2014-02-22T02:22:22","slug":"uosm2008-topic-2-online-identities-pros-and-cons-17","status":"publish","type":"post","link":"https:\/\/blog.soton.ac.uk\/uosm2008\/2014\/topic-2-2014\/2014\/02\/uosm2008-topic-2-online-identities-pros-and-cons-17\/","title":{"rendered":"#UOSM2008 Topic 2: Online identities, Pros and Cons."},"content":{"rendered":"<div dir=\"ltr\" style=\"text-align: left;\" trbidi=\"on\">\n<div style=\"background-color: white; margin: 0cm 0cm 0.0001pt; text-align: center; vertical-align: baseline;\">\n<div style=\"line-height: 18.2pt;\"><strong><span style=\"border: none windowtext 1.0pt; color: #333333; font-family: &quot;Cambria&quot;,&quot;serif&quot;; mso-ascii-theme-font: major-latin; mso-border-alt: none windowtext 0cm; mso-hansi-theme-font: major-latin; padding: 0cm;\">Question: &#8220;Discuss the arguments for and against having more than one online identity&#8221;.<o:p><\/o:p><\/span><\/strong><\/div>\n<div style=\"line-height: 18.2pt;\"><strong><span style=\"border: none windowtext 1.0pt; color: #333333; font-family: &quot;Cambria&quot;,&quot;serif&quot;; mso-ascii-theme-font: major-latin; mso-border-alt: none windowtext 0cm; mso-hansi-theme-font: major-latin; padding: 0cm;\"><br \/><\/span><\/strong><\/div>\n<div class=\"separator\" style=\"clear: both; line-height: 18.2pt; text-align: center;\"><a href=\"http:\/\/2.bp.blogspot.com\/-APCB6MfGE6U\/UwgIO08jrmI\/AAAAAAAAAGQ\/z_pmm0y0v4k\/s1600\/online-identity.png\" imageanchor=\"1\" style=\"margin-left: 1em; margin-right: 1em;\"><img loading=\"lazy\" decoding=\"async\" border=\"0\" src=\"http:\/\/2.bp.blogspot.com\/-APCB6MfGE6U\/UwgIO08jrmI\/AAAAAAAAAGQ\/z_pmm0y0v4k\/s1600\/online-identity.png\" height=\"226\" width=\"320\" \/><\/a><\/div>\n<div style=\"line-height: 18.2pt;\"><strong><span style=\"border: none windowtext 1.0pt; color: #333333; font-family: &quot;Cambria&quot;,&quot;serif&quot;; mso-ascii-theme-font: major-latin; mso-border-alt: none windowtext 0cm; mso-hansi-theme-font: major-latin; padding: 0cm;\"><br \/><\/span><\/strong><\/div>\n<div align=\"center\" class=\"MsoNormal\" style=\"line-height: 18.2pt;\"><b><span style=\"font-family: &quot;Cambria&quot;,&quot;serif&quot;; font-size: 12.0pt; line-height: 115%; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;\">Picture source<\/span><\/b><span style=\"font-family: &quot;Cambria&quot;,&quot;serif&quot;; font-size: 12.0pt; line-height: 115%; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;\">: <a href=\"http:\/\/brandconfessions.com\/profiles\/blogs\/5-tips-for-managing-your-social-media-identity\">http:\/\/brandconfessions.com\/profiles\/blogs\/5-tips-for-managing-your-social-media-identity<\/a><o:p><\/o:p><\/span><\/p>\n<\/div>\n<div class=\"MsoNormal\" style=\"line-height: 18.2pt; text-align: justify;\"><span style=\"font-family: &quot;Cambria&quot;,&quot;serif&quot;; font-size: 12.0pt; line-height: 115%; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;\">I personally don\u2019t think that Licklider (1963) could imagine that his idea for connecting several computers to make it easier to pass scientific and military information will grow later into this enormous network called the Internet. Demanding grows in popularity of online activities has lead people to create their \u201cdigital identities\u201d. However, what is this \u201cDigital identity\u201d? This term is used to describe personas that individuals use across social networks in which they are represented <w:sdt citation=\"t\" id=\"1869176888\"><!--[if supportFields]><span style='mso-element:field-begin'><\/span><span  style='mso-ansi-language:EN-US'><span style='mso-spacerun:yes'>\u00a0<\/span><span  lang=EN-US>CITATION Shi10 l 1033 <\/span><\/span><span style='mso-element:field-separator'><\/span><![endif]--><span lang=\"EN-US\">(Williams et al.,  2010)<\/span><!--[if supportFields]><span style='mso-element:field-end'><\/span><![endif]--><\/w:sdt>. &nbsp;However, how smart is it to have your information be constantly available online and what are the pros and cons of this situation? Below you can find a list of both, my personal and public opinions on this question:<o:p><\/o:p><\/span><br \/><span style=\"font-family: &quot;Cambria&quot;,&quot;serif&quot;; font-size: 12.0pt; line-height: 115%; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;\"><br \/><\/span><\/div>\n<div class=\"MsoNormal\" style=\"line-height: 18.2pt; text-align: justify;\"><b><span style=\"font-family: &quot;Cambria&quot;,&quot;serif&quot;; font-size: 12.0pt; line-height: 115%; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;\">Pros:<\/span><\/b><\/div>\n<div class=\"MsoNormal\" style=\"line-height: 18.2pt; text-align: justify;\"><\/div>\n<ul style=\"line-height: 18.2pt;\">\n<li style=\"text-align: justify;\"><span style=\"font-family: Cambria, serif; font-size: 12pt; line-height: 115%; text-indent: -18pt;\">The first and the most important one is obviously the communication. Social networks allow people to communicate from anywhere to anyone, in any numbers.<\/span><\/li>\n<li style=\"text-align: justify;\"><span style=\"font-family: Cambria, serif; font-size: 12pt; line-height: 115%; text-indent: -18pt;\">Let\u2019s not forget about online identities created in LinkedIn, which helps a lot people find jobs, share knowledge and companies to advertise and promote themselves. One of my friends got his job offer via LinkedIn, the company found him itself.<\/span><\/li>\n<li style=\"text-align: justify;\"><span style=\"font-family: Cambria, serif; font-size: 12pt; line-height: 115%; text-indent: -18pt;\">Real-time information sharing and News cycle speed have increased, you get news about others and the events much faster <\/span><w:sdt citation=\"t\" id=\"150647687\" style=\"font-family: Cambria, serif; font-size: 12pt; line-height: 115%; text-indent: -18pt;\"><span lang=\"EN-US\">(Cosmato, 2013)<\/span><\/w:sdt><span style=\"font-family: Cambria, serif; font-size: 12pt; line-height: 115%; text-indent: -18pt;\">.<\/span><\/li>\n<\/ul>\n<div style=\"line-height: 18.2pt;\"><\/div>\n<div class=\"MsoListParagraphCxSpMiddle\" style=\"line-height: 18.2pt; text-align: justify;\"><\/div>\n<div class=\"separator\" style=\"clear: both; line-height: 18.2pt; text-align: center;\"><a href=\"http:\/\/4.bp.blogspot.com\/-dXul8Im_VIU\/UwgIHXhl9TI\/AAAAAAAAAGA\/I9vpewoYMzo\/s1600\/manage-your-online-identity.jpg\" imageanchor=\"1\" style=\"margin-left: 1em; margin-right: 1em;\"><img loading=\"lazy\" decoding=\"async\" border=\"0\" src=\"http:\/\/4.bp.blogspot.com\/-dXul8Im_VIU\/UwgIHXhl9TI\/AAAAAAAAAGA\/I9vpewoYMzo\/s1600\/manage-your-online-identity.jpg\" height=\"203\" width=\"320\" \/><\/a><\/div>\n<div style=\"line-height: 18.2pt;\"><\/div>\n<div class=\"MsoListParagraphCxSpLast\" style=\"line-height: 18.2pt;\"><\/div>\n<div align=\"center\" class=\"MsoNormal\" style=\"line-height: 18.2pt;\"><b><span style=\"font-family: &quot;Cambria&quot;,&quot;serif&quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;\">Picture source: <\/span><\/b><span style=\"font-family: &quot;Cambria&quot;,&quot;serif&quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;\"><a href=\"http:\/\/gearpatrol.com\/2009\/06\/17\/be-a-better-man-in-30-days-day-16-know-how-to-manage-your-online-identity-image\/\">http:\/\/gearpatrol.com\/2009\/06\/17\/be-a-better-man-in-30-days-day-16-know-how-to-manage-your-online-identity-image\/<\/a><b><o:p><\/o:p><\/b><\/span><\/p>\n<\/div>\n<div class=\"MsoNormal\" style=\"line-height: 18.2pt; text-align: justify;\"><b><span style=\"font-family: &quot;Cambria&quot;,&quot;serif&quot;; font-size: 12.0pt; line-height: 115%; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;\">Cons:<\/span><\/b><\/div>\n<div class=\"MsoNormal\" style=\"line-height: 18.2pt; text-align: justify;\"><\/div>\n<ul style=\"line-height: 18.2pt;\">\n<li style=\"text-align: justify;\"><span style=\"font-family: Cambria, serif; font-size: 12pt; line-height: 115%; text-indent: -18pt;\">The face-to-face connection is losing its weight. I still do remember my first day in the UK, when I was coming back to my accommodation and there were two teenage girls in front of me, and they were going to say goodbye to each other. I was quite surprised to hear: \u201cSee you on Facebook\u201d instead of \u201cSee you tomorrow\/later\u201d.<\/span><\/li>\n<li style=\"text-align: justify;\"><span style=\"font-family: Cambria, serif; font-size: 12pt; line-height: 115%; text-indent: -18pt;\">Time-waster. As it can be understood from the name, the vast majority of people do use social networks wisely <\/span><w:sdt citation=\"t\" id=\"-1457168678\" style=\"font-family: Cambria, serif; font-size: 12pt; line-height: 115%; text-indent: -18pt;\"><span lang=\"EN-US\">(Cosmato, 2013)<\/span><\/w:sdt><span style=\"font-family: Cambria, serif; font-size: 12pt; line-height: 115%; text-indent: -18pt;\">.<\/span><\/li>\n<li style=\"text-align: justify;\"><span style=\"font-family: Cambria, serif; font-size: 12pt; line-height: 115%; text-indent: -18pt;\">Identity fraud. This can happen as anyone can create a false identity and pose as someone else <\/span><w:sdt citation=\"t\" id=\"820471829\" style=\"font-family: Cambria, serif; font-size: 12pt; line-height: 115%; text-indent: -18pt;\"><span lang=\"EN-US\">(Ibraz, 2010)<\/span><\/w:sdt><span style=\"font-family: Cambria, serif; font-size: 12pt; line-height: 115%; text-indent: -18pt;\">.<\/span><\/li>\n<\/ul>\n<div style=\"line-height: 18.2pt;\"><\/div>\n<div class=\"separator\" style=\"clear: both; line-height: 18.2pt; text-align: center;\"><a href=\"http:\/\/3.bp.blogspot.com\/-1g_azB3OiuQ\/UwgIKz_f3iI\/AAAAAAAAAGI\/P_ei-pptadQ\/s1600\/socialmedialogos.jpg\" imageanchor=\"1\" style=\"margin-left: 1em; margin-right: 1em;\"><img loading=\"lazy\" decoding=\"async\" border=\"0\" src=\"http:\/\/3.bp.blogspot.com\/-1g_azB3OiuQ\/UwgIKz_f3iI\/AAAAAAAAAGI\/P_ei-pptadQ\/s1600\/socialmedialogos.jpg\" height=\"199\" width=\"320\" \/><\/a><\/div>\n<div class=\"MsoNormal\" style=\"line-height: 18.2pt; text-align: justify;\"><\/div>\n<div align=\"center\" class=\"MsoNormal\" style=\"line-height: 18.2pt;\"><b><span style=\"font-family: &quot;Cambria&quot;,&quot;serif&quot;; font-size: 12.0pt; line-height: 115%; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;\">Picture source: <\/span><\/b><span style=\"font-family: &quot;Cambria&quot;,&quot;serif&quot;; font-size: 12.0pt; line-height: 115%; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;\"><a href=\"http:\/\/brandconfessions.com\/profiles\/blogs\/5-tips-for-managing-your-social-media-identity\">http:\/\/brandconfessions.com\/profiles\/blogs\/5-tips-for-managing-your-social-media-identity<\/a><b> <o:p><\/o:p><\/b><\/span><\/p>\n<\/div>\n<div class=\"MsoNormal\" style=\"line-height: 18.2pt; text-align: justify;\"><b><span style=\"font-family: &quot;Cambria&quot;,&quot;serif&quot;; font-size: 12.0pt; line-height: 115%; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;\">What is my opinion? <\/span><\/b><span style=\"font-family: &quot;Cambria&quot;,&quot;serif&quot;; font-size: 12.0pt; line-height: 115%; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;\">This might sound strange to hear this from a young person who considers himself a \u201cDigital Resident\u201d of the Web and a person whose major is in Information Technology in Organisation, but I will be honest and say that I\u2019m quite against putting your entire life online to be visible by others. Yes, online communication is good, it removes borders between countries and nations; Yes, it allows people to share their happiness and pain with others and Yes, those who are afraid to speak in public can have their freedom online to express their opinions as they want. However, all of these, and more, must be to some extend!<o:p><\/o:p><\/span><\/div>\n<div class=\"MsoNormal\" style=\"line-height: 18.2pt; text-align: justify;\"><span style=\"font-family: &quot;Cambria&quot;,&quot;serif&quot;; font-size: 12.0pt; line-height: 115%; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;\"><br \/><\/span><\/div>\n<div class=\"MsoNormal\" style=\"text-align: justify;\"><span style=\"font-family: Cambria, serif; font-size: small;\"><span style=\"line-height: 115%;\">If my young cousin spends his whole time online and&nbsp;<\/span><\/span><span style=\"font-family: Cambria, serif;\"><span style=\"line-height: 18.399999618530273px;\">doesn&#8217;t<\/span><\/span><span style=\"font-family: Cambria, serif; font-size: small;\"><span style=\"line-height: 115%;\">&nbsp;know who is Martin Luther King, Nelson&nbsp;Mandela, George Washington, Shakespeare, etc., this is not acceptable; if people spend more time online rather than with those who dedicated their lives to you (relatives, parents, etc.), this is not acceptable; if people know more about you than they should and can use this against you, this is not acceptable. <o:p><\/o:p><\/span><\/span><\/div>\n<div class=\"MsoNormal\" style=\"line-height: 18.2pt; text-align: justify;\"><span style=\"font-family: &quot;Cambria&quot;,&quot;serif&quot;; font-size: 12.0pt; line-height: 115%; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;\"><br \/><\/span><\/div>\n<div class=\"MsoNormal\" style=\"line-height: 18.2pt; text-align: justify;\"><span style=\"font-family: &quot;Cambria&quot;,&quot;serif&quot;; font-size: 12.0pt; line-height: 115%; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;\">I saw this video below nearly one year ago and always used it as an argument when we debate with my friends on this topic. It does worth watching it. And I will just summarize with the last words from this video: \u201cYour entire life is online, and it can be used against you. Be vigilant!\u201d<o:p><\/o:p><\/span><\/div>\n<div class=\"MsoNormal\" style=\"line-height: 18.2pt; text-align: justify;\"><span style=\"font-family: &quot;Cambria&quot;,&quot;serif&quot;; font-size: 12.0pt; line-height: 115%; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;\"><br \/><\/span><\/div>\n<div class=\"MsoNormal\" style=\"line-height: 18.2pt; text-align: justify;\"><span style=\"font-family: &quot;Cambria&quot;,&quot;serif&quot;; font-size: 12.0pt; line-height: 115%; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;\"><iframe loading=\"lazy\" allowfullscreen=\"\" frameborder=\"0\" height=\"315\" src=\"http:\/\/www.youtube.com\/embed\/F7pYHN9iC9I\" width=\"560\"><\/iframe><o:p><\/o:p><\/span><\/div>\n<div class=\"MsoNormal\" style=\"line-height: 18.2pt; text-align: justify;\"><span style=\"font-family: &quot;Cambria&quot;,&quot;serif&quot;; font-size: 12.0pt; line-height: 115%; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;\"><br \/><\/span><\/div>\n<div class=\"MsoNormal\" style=\"line-height: 18.2pt; text-align: justify;\"><span style=\"font-family: &quot;Cambria&quot;,&quot;serif&quot;; font-size: 12.0pt; line-height: 115%; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;\">And last but not least, as an IT person I would be happy to share information about some useful and free softwares and techniques that can help you remain anonymous on the Internet:<\/span><\/div>\n<div class=\"MsoNormal\" style=\"line-height: 18.2pt; text-align: justify;\"><\/div>\n<ul>\n<li style=\"text-align: justify;\"><b style=\"line-height: 18.2pt; text-indent: -18pt;\"><span style=\"font-family: &quot;Cambria&quot;,&quot;serif&quot;; font-size: 12.0pt; line-height: 115%; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;\">ToR \u2013 The Union Router (<\/span><\/b><span style=\"font-family: Cambria, serif; font-size: 12pt; line-height: 115%; text-indent: -18pt;\">https:\/\/www.torproject.org\/),<b> <\/b>is basically a free software network that uses a set of relay nodes to hide the original source of the traffic <w:sdt citation=\"t\" id=\"-594396652\"><span lang=\"EN-US\">(Murdoch &amp; Danezis, 2005)<\/span><\/w:sdt>.<\/span><\/li>\n<li style=\"text-align: justify;\"><b style=\"line-height: 18.2pt; text-indent: -18pt;\"><span style=\"font-family: &quot;Cambria&quot;,&quot;serif&quot;; font-size: 12.0pt; line-height: 115%; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;\">Use anonymous VPN\/Proxy service (<\/span><\/b><span style=\"font-family: Cambria, serif; font-size: 12pt; line-height: 115%; text-indent: -18pt;\">http:\/\/www.hidemyass.com\/),<b> <\/b>such as <b>HideMyAss, <\/b>which similarly to ToR will hide the source of the incoming data <w:sdt citation=\"t\" id=\"728271745\"><span lang=\"EN-US\">(Joel &amp; Charlotta, 2010)<\/span><\/w:sdt>.<\/span><\/li>\n<li style=\"text-align: justify;\"><span style=\"font-family: Cambria, serif; font-size: 12pt; line-height: 115%; text-align: center;\">And finally, <\/span><b style=\"font-family: Cambria, serif; font-size: 12pt; line-height: 115%; text-align: center;\">spoof your IP source address, <\/b><span style=\"font-family: Cambria, serif; font-size: 12pt; line-height: 115%; text-align: center;\">which in a more understandable way means changing your IP address .<\/span><\/li>\n<\/ul>\n<p><\/p>\n<div style=\"line-height: 18.2pt; text-align: left;\"><span style=\"font-family: &quot;Cambria&quot;,&quot;serif&quot;; font-size: 12.0pt; line-height: 115%; mso-ansi-language: EN-GB; mso-ascii-theme-font: major-latin; mso-bidi-font-family: &quot;Times New Roman&quot;; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin; mso-hansi-theme-font: major-latin;\"><b><!--[if !supportLineBreakNewLine]--><br \/><!--[endif]--><\/b><\/span><\/div>\n<div style=\"text-align: left;\"><span style=\"font-family: Cambria, serif;\"><span style=\"line-height: 18.399999618530273px;\"><b>REFERENCES<\/b><\/span><\/span><\/div>\n<div class=\"MsoBibliography\" style=\"text-align: left;\"><\/div>\n<ul style=\"text-align: left;\">\n<li><span style=\"font-family: Cambria, serif;\">Cosmato, D.,  2013. <\/span><i style=\"font-family: Cambria, serif;\">Love to know social networking<\/i><span style=\"font-family: Cambria, serif;\">. [Online] Available at: <\/span><u style=\"font-family: Cambria, serif;\"><a href=\"http:\/\/socialnetworking.lovetoknow.com\/Advantages_and_Disadvantages_of_Social_Networking\">http:\/\/socialnetworking.lovetoknow.com\/Advantages_and_Disadvantages_of_Social_Networking<\/a><\/u><span style=\"font-family: Cambria, serif;\"> [Accessed 22 February 2014].<\/span><\/li>\n<li><span style=\"font-family: Cambria, serif;\">Ibraz, A., 2010. <\/span><i style=\"font-family: Cambria, serif;\">Fundamentals of Computing<\/i><span style=\"font-family: Cambria, serif;\">. [Online] Available at:  <\/span><u style=\"font-family: Cambria, serif;\"><a href=\"http:\/\/mason.gmu.edu\/~aibraz\/disadvantages.html\">http:\/\/mason.gmu.edu\/~aibraz\/disadvantages.html<\/a><\/u><span style=\"font-family: Cambria, serif;\"> [Accessed 22 February 2014].<\/span><\/li>\n<li><span style=\"font-family: Cambria, serif;\">Joel, P. &amp; Charlotta, W., 20010. <\/span><i style=\"font-family: Cambria, serif;\">Network anonymity<\/i><span style=\"font-family: Cambria, serif;\">. Project.  Sweden: Information Security Course Link\u00f6pings universitet.<\/span><\/li>\n<li><span style=\"font-family: Cambria, serif;\">Murdoch, S.J. &amp; Danezis, G., 2005. Low-cost traffic analysis of ToR. <\/span><i style=\"font-family: Cambria, serif;\">Security  and Privacy<\/i><span style=\"font-family: Cambria, serif;\">, 1(1), pp.183-95.<\/span><\/li>\n<li><span style=\"font-family: Cambria, serif;\">Williams, S., Fleming, S., Lundqvist, K. &amp; Parslow, P., 2010.  Understanding your digital identity. <\/span><i style=\"font-family: Cambria, serif;\">Learning Exchange<\/i><span style=\"font-family: Cambria, serif;\">, 1(1), pp.1-6.<\/span><\/li>\n<\/ul>\n<p><!--[if supportFields]><span style='font-family:\"Cambria\",\"serif\";  mso-ascii-theme-font:major-latin;mso-hansi-theme-font:major-latin'><span  style='mso-element:field-begin'><\/span><span  style='mso-spacerun:yes'>\u00a0<\/span>BIBLIOGRAPHY <span style='mso-element:field-separator'><\/span><\/span><![endif]--><\/p>\n<div style=\"text-align: left;\"><w:sdt bibliography=\"t\" id=\"111145805\">           <\/w:sdt><\/div>\n<div class=\"MsoNormal\"><\/div>\n<\/div>\n<\/div>\n<!-- AddThis Advanced Settings generic via filter on the_content --><!-- AddThis Share Buttons generic via filter on the_content -->","protected":false},"excerpt":{"rendered":"<div dir=\"ltr\">\n<div>\n<div><strong><span>Question: &#8220;Discuss the arguments for and against having more than one online identity&#8221;.<\/p>\n<p><\/span><\/strong><\/div>\n<div><strong><span><br \/><\/span><\/strong><\/div>\n<div><a href=\"http:\/\/2.bp.blogspot.com\/-APCB6MfGE6U\/UwgIO08jrmI\/AAAAAAAAAGQ\/z_pmm0y0v4k\/s1600\/online-identity.png\"><img loading=\"lazy\" decoding=\"async\" border=\"0\" src=\"http:\/\/2.bp.blogspot.com\/-APCB6MfGE6U\/UwgIO08jrmI\/AAAAAAAAAGQ\/z_pmm0y0v4k\/s1600\/online-identity.png\" height=\"226\" width=\"320\"><\/a><\/div>\n<div><strong><span><br \/><\/span><\/strong><\/div>\n<div align=\"center\"><b><span>Picture source<\/span><\/b><span>: <a href=\"http:\/\/brandconfessions.com\/profiles\/blogs\/5-tips-for-managing-your-social-media-identity\">http:\/\/brandconfessions.com\/profiles\/blogs\/5-tips-for-managing-your-social-media-identity<\/a><\/p>\n<p><\/span><\/p>\n<\/div>\n<div><span>I personally don&rsquo;t think that Licklider (1963) could imagine that his idea for connecting several computers to make it easier to pass scientific and military information will grow later into this enormous network called the Internet. Demanding grows in popularity of online activities has lead people to create their &ldquo;digital identities&rdquo;. However, what is this &ldquo;Digital identity&rdquo;? This term is used to describe personas that individuals use across social networks in which they are represented <!--[if supportFields]&gt;<span><\/span><span><span>&nbsp;<\/span><span lang=\"EN-US\">CITATION Shi10 l 1033 <\/span><\/span><span><\/span>&lt;![endif]--><span lang=\"EN-US\">(Williams et al.,  2010)<\/span><!--[if supportFields]&gt;<span><\/span>&lt;![endif]-->. &nbsp;However, how smart is it to have your information be constantly available online and what are the pros and cons of this situation? Below you can find a list of both, my personal and public opinions on this question:<\/p>\n<p><\/span><br \/><span><br \/><\/span><\/div>\n<div><b><span>Pros:<\/span><\/b><\/div>\n<div><\/div>\n<ul>\n<li><span>The first and the most important one is obviously the communication. Social networks allow people to communicate from anywhere to anyone, in any numbers.<\/span><\/li>\n<li><span>Let&rsquo;s not forget about online identities created in LinkedIn, which helps a lot people find jobs, share knowledge and companies to advertise and promote themselves. One of my friends got his job offer via LinkedIn, the company found him itself.<\/span><\/li>\n<li><span>Real-time information sharing and News cycle speed have increased, you get news about others and the events much faster <\/span><span lang=\"EN-US\">(Cosmato, 2013)<\/span><span>.<\/span><\/li>\n<\/ul>\n<div><\/div>\n<div><\/div>\n<div><a href=\"http:\/\/4.bp.blogspot.com\/-dXul8Im_VIU\/UwgIHXhl9TI\/AAAAAAAAAGA\/I9vpewoYMzo\/s1600\/manage-your-online-identity.jpg\"><img loading=\"lazy\" decoding=\"async\" border=\"0\" src=\"http:\/\/4.bp.blogspot.com\/-dXul8Im_VIU\/UwgIHXhl9TI\/AAAAAAAAAGA\/I9vpewoYMzo\/s1600\/manage-your-online-identity.jpg\" height=\"203\" width=\"320\"><\/a><\/div>\n<div><\/div>\n<div><\/div>\n<div align=\"center\"><b><span>Picture source: <\/span><\/b><span><a href=\"http:\/\/gearpatrol.com\/2009\/06\/17\/be-a-better-man-in-30-days-day-16-know-how-to-manage-your-online-identity-image\/\">http:\/\/gearpatrol.com\/2009\/06\/17\/be-a-better-man-in-30-days-day-16-know-how-to-manage-your-online-identity-image\/<\/a><b><\/p>\n<p><\/b><\/span><\/p>\n<\/div>\n<div><b><span>Cons:<\/span><\/b><\/div>\n<div><\/div>\n<ul>\n<li><span>The face-to-face connection is losing its weight. I still do remember my first day in the UK, when I was coming back to my accommodation and there were two teenage girls in front of me, and they were going to say goodbye to each other. I was quite surprised to hear: &ldquo;See you on Facebook&rdquo; instead of &ldquo;See you tomorrow\/later&rdquo;.<\/span><\/li>\n<li><span>Time-waster. As it can be understood from the name, the vast majority of people do use social networks wisely <\/span><span lang=\"EN-US\">(Cosmato, 2013)<\/span><span>.<\/span><\/li>\n<li><span>Identity fraud. This can happen as anyone can create a false identity and pose as someone else <\/span><span lang=\"EN-US\">(Ibraz, 2010)<\/span><span>.<\/span><\/li>\n<\/ul>\n<div><\/div>\n<div><a href=\"http:\/\/3.bp.blogspot.com\/-1g_azB3OiuQ\/UwgIKz_f3iI\/AAAAAAAAAGI\/P_ei-pptadQ\/s1600\/socialmedialogos.jpg\"><img loading=\"lazy\" decoding=\"async\" border=\"0\" src=\"http:\/\/3.bp.blogspot.com\/-1g_azB3OiuQ\/UwgIKz_f3iI\/AAAAAAAAAGI\/P_ei-pptadQ\/s1600\/socialmedialogos.jpg\" height=\"199\" width=\"320\"><\/a><\/div>\n<div><\/div>\n<div align=\"center\"><b><span>Picture source: <\/span><\/b><span><a href=\"http:\/\/brandconfessions.com\/profiles\/blogs\/5-tips-for-managing-your-social-media-identity\">http:\/\/brandconfessions.com\/profiles\/blogs\/5-tips-for-managing-your-social-media-identity<\/a><b> <\/p>\n<p><\/b><\/span><\/p>\n<\/div>\n<div><b><span>What is my opinion? <\/span><\/b><span>This might sound strange to hear this from a young person who considers himself a &ldquo;Digital Resident&rdquo; of the Web and a person whose major is in Information Technology in Organisation, but I will be honest and say that I&rsquo;m quite against putting your entire life online to be visible by others. Yes, online communication is good, it removes borders between countries and nations; Yes, it allows people to share their happiness and pain with others and Yes, those who are afraid to speak in public can have their freedom online to express their opinions as they want. However, all of these, and more, must be to some extend!<\/p>\n<p><\/span><\/div>\n<div><span><br \/><\/span><\/div>\n<div><span><span>If my young cousin spends his whole time online and&nbsp;<\/span><\/span><span><span>doesn&#8217;t<\/span><\/span><span><span>&nbsp;know who is Martin Luther King, Nelson&nbsp;Mandela, George Washington, Shakespeare, etc., this is not acceptable; if people spend more time online rather than with those who dedicated their lives to you (relatives, parents, etc.), this is not acceptable; if people know more about you than they should and can use this against you, this is not acceptable. <\/p>\n<p><\/span><\/span><\/div>\n<div><span><br \/><\/span><\/div>\n<div><span>I saw this video below nearly one year ago and always used it as an argument when we debate with my friends on this topic. It does worth watching it. And I will just summarize with the last words from this video: &ldquo;Your entire life is online, and it can be used against you. Be vigilant!&rdquo;<\/p>\n<p><\/span><\/div>\n<div><span><br \/><\/span><\/div>\n<div><span><\/p>\n<p><\/span><\/div>\n<div><span><br \/><\/span><\/div>\n<div><span>And last but not least, as an IT person I would be happy to share information about some useful and free softwares and techniques that can help you remain anonymous on the Internet:<\/span><\/div>\n<div><\/div>\n<ul>\n<li><b><span>ToR &ndash; The Union Router (<\/span><\/b><span>https:\/\/www.torproject.org\/),<b> <\/b>is basically a free software network that uses a set of relay nodes to hide the original source of the traffic <span lang=\"EN-US\">(Murdoch &amp; Danezis, 2005)<\/span>.<\/span><\/li>\n<li><b><span>Use anonymous VPN\/Proxy service (<\/span><\/b><span>http:\/\/www.hidemyass.com\/),<b> <\/b>such as <b>HideMyAss, <\/b>which similarly to ToR will hide the source of the incoming data <span lang=\"EN-US\">(Joel &amp; Charlotta, 2010)<\/span>.<\/span><\/li>\n<li><span>And finally, <\/span><b>spoof your IP source address, <\/b><span>which in a more understandable way means changing your IP address .<\/span><\/li>\n<\/ul>\n<p><\/p>\n<div><span><b><!--[if !supportLineBreakNewLine]--><br \/><!--[endif]--><\/b><\/span><\/div>\n<div><span><span><b>REFERENCES<\/b><\/span><\/span><\/div>\n<div><\/div>\n<ul>\n<li><span>Cosmato, D.,  2013. <\/span><i>Love to know social networking<\/i><span>. [Online] Available at: <\/span><u><a href=\"http:\/\/socialnetworking.lovetoknow.com\/Advantages_and_Disadvantages_of_Social_Networking\">http:\/\/socialnetworking.lovetoknow.com\/Advantages_and_Disadvantages_of_Social_Networking<\/a><\/u><span> [Accessed 22 February 2014].<\/span><\/li>\n<li><span>Ibraz, A., 2010. <\/span><i>Fundamentals of Computing<\/i><span>. [Online] Available at:  <\/span><u><a href=\"http:\/\/mason.gmu.edu\/~aibraz\/disadvantages.html\">http:\/\/mason.gmu.edu\/~aibraz\/disadvantages.html<\/a><\/u><span> [Accessed 22 February 2014].<\/span><\/li>\n<li><span>Joel, P. &amp; Charlotta, W., 20010. <\/span><i>Network anonymity<\/i><span>. Project.  Sweden: Information Security Course Link&ouml;pings universitet.<\/span><\/li>\n<li><span>Murdoch, S.J. &amp; Danezis, G., 2005. Low-cost traffic analysis of ToR. <\/span><i>Security  and Privacy<\/i><span>, 1(1), pp.183-95.<\/span><\/li>\n<li><span>Williams, S., Fleming, S., Lundqvist, K. &amp; Parslow, P., 2010.  Understanding your digital identity. <\/span><i>Learning Exchange<\/i><span>, 1(1), pp.1-6.<\/span><\/li>\n<\/ul>\n<p><!--[if supportFields]&gt;<span style='font-family:\"Cambria\",\"serif\"'><span><\/span><span>&nbsp;<\/span>BIBLIOGRAPHY <span><\/span><\/span>&lt;![endif]--><\/p>\n<div><\/div>\n<div><\/div>\n<\/div>\n<\/div>\n<p><!-- AddThis Advanced Settings generic via filter on wp_trim_excerpt --><!-- AddThis Share Buttons generic via filter on wp_trim_excerpt --><\/p>\n","protected":false},"author":93825,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1031947],"tags":[],"class_list":["post-17675","post","type-post","status-publish","format-standard","hentry","category-topic-2-2014","column","threecol"],"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/blog.soton.ac.uk\/uosm2008\/wp-json\/wp\/v2\/posts\/17675","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.soton.ac.uk\/uosm2008\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.soton.ac.uk\/uosm2008\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.soton.ac.uk\/uosm2008\/wp-json\/wp\/v2\/users\/93825"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.soton.ac.uk\/uosm2008\/wp-json\/wp\/v2\/comments?post=17675"}],"version-history":[{"count":1,"href":"https:\/\/blog.soton.ac.uk\/uosm2008\/wp-json\/wp\/v2\/posts\/17675\/revisions"}],"predecessor-version":[{"id":17676,"href":"https:\/\/blog.soton.ac.uk\/uosm2008\/wp-json\/wp\/v2\/posts\/17675\/revisions\/17676"}],"wp:attachment":[{"href":"https:\/\/blog.soton.ac.uk\/uosm2008\/wp-json\/wp\/v2\/media?parent=17675"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.soton.ac.uk\/uosm2008\/wp-json\/wp\/v2\/categories?post=17675"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.soton.ac.uk\/uosm2008\/wp-json\/wp\/v2\/tags?post=17675"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}