{"id":28063,"date":"2014-03-02T23:27:45","date_gmt":"2014-03-02T23:27:45","guid":{"rendered":"http:\/\/kayastefferud.wordpress.com\/?p=57"},"modified":"2014-03-02T23:27:45","modified_gmt":"2014-03-02T23:27:45","slug":"topic-2-reflective-summary-of-the-topic-21","status":"publish","type":"post","link":"https:\/\/blog.soton.ac.uk\/uosm2008\/2014\/topic-2-2014\/2014\/03\/topic-2-reflective-summary-of-the-topic-21\/","title":{"rendered":"Topic 2; Reflective summary of the topic"},"content":{"rendered":"<p>In the end of the topic we were given Monday two weeks ago, I am reflecting back on the past two weeks I have been working on the topic &#8216;online identities &#8211; security and privacy&#8217;.<\/p>\n<p>When writing my own blog post about this topic the first week, I had many thoughts and no idea which one to choose. I read a book on social media that made me want to do my blog post about straight forward &#8216;Multiple online identities &#8211; good or bad?&#8217; My main focus were on your online and offline identity and how the interactions between these could change your &#8216;online identity&#8217; and whether or not it made it a trustable\/real one.<\/p>\n<p>After doing some further research from peers&#8217; blog posts and discussions on each other&#8217;s blogs, I have a little bit of a different view on this than when I wrote my own post. I still believe it is possible to create and maintain several online identities, but this is perhaps not that common as having multiple &#8216;partial online identities&#8217;. Some other blog posts focused on the security and privacy threats when using the internet with your identity out there, and other posts about anonymity vs. authenticity online.<\/p>\n<p>Now, I believe that separating having one or multiple online identities is not a black and white definition. I believe there are some grey sones in between &#8216;possible&#8217; and &#8216;not possible&#8217; spectrum. I say this, because everyone is using the internet in different amounts and for different purposes.<\/p>\n<p>I believe if you use social media and the internet for different purposes you might have created many &#8216;partial online identities&#8217;.<\/p>\n<p>If you have two completely different sides\/versions of yourself out on the internet, I would say you have &#8216;multiple online identities&#8217;, however; in order to achieve this, all of your &#8216;versions&#8217; should consist of (some of) the different elements\/characteristics that creates an online identity.<\/p>\n<p>If you want to become a trustable person online, your online and offline identity should match up if they interact online somehow. If you achieve a match in these, you would most likely have created an &#8216;authentic&#8217; online identity.<\/p>\n<p>  <a rel=\"nofollow\" href=\"http:\/\/feeds.wordpress.com\/1.0\/gocomments\/kayastefferud.wordpress.com\/57\/\"><img decoding=\"async\" alt=\"\" border=\"0\" src=\"http:\/\/feeds.wordpress.com\/1.0\/comments\/kayastefferud.wordpress.com\/57\/\" \/><\/a> <img loading=\"lazy\" decoding=\"async\" alt=\"\" border=\"0\" src=\"https:\/\/pixel.wp.com\/b.gif?host=kayastefferud.wordpress.com&#038;blog=63556741&#038;%23038;post=57&#038;%23038;subd=kayastefferud&#038;%23038;ref=&#038;%23038;feed=1\" width=\"1\" height=\"1\" \/><\/p>\n<!-- AddThis Advanced Settings generic via filter on the_content --><!-- AddThis Share Buttons generic via filter on the_content -->","protected":false},"excerpt":{"rendered":"<p>In the end of the topic we were given Monday two weeks ago, I am reflecting back on the past two weeks I have been working on the topic &lsquo;online identities &ndash; security and privacy&rsquo;. When writing my own blog &hellip; <a href=\"https:\/\/kayastefferud.wordpress.com\/2014\/03\/02\/topic-2-reflective-summary-of-the-topic\/\">Continue reading <span>&rarr;<\/span><\/a><img loading=\"lazy\" decoding=\"async\" alt=\"\" border=\"0\" src=\"https:\/\/pixel.wp.com\/b.gif?host=kayastefferud.wordpress.com&amp;blog=63556741&amp;post=57&amp;subd=kayastefferud&amp;ref=&amp;feed=1\" width=\"1\" height=\"1\"><!-- AddThis Advanced Settings generic via filter on wp_trim_excerpt --><!-- AddThis Share Buttons generic via filter on wp_trim_excerpt --><\/p>\n","protected":false},"author":93813,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1031947],"tags":[],"class_list":["post-28063","post","type-post","status-publish","format-standard","hentry","category-topic-2-2014","column","threecol"],"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/blog.soton.ac.uk\/uosm2008\/wp-json\/wp\/v2\/posts\/28063","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.soton.ac.uk\/uosm2008\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.soton.ac.uk\/uosm2008\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.soton.ac.uk\/uosm2008\/wp-json\/wp\/v2\/users\/93813"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.soton.ac.uk\/uosm2008\/wp-json\/wp\/v2\/comments?post=28063"}],"version-history":[{"count":1,"href":"https:\/\/blog.soton.ac.uk\/uosm2008\/wp-json\/wp\/v2\/posts\/28063\/revisions"}],"predecessor-version":[{"id":28064,"href":"https:\/\/blog.soton.ac.uk\/uosm2008\/wp-json\/wp\/v2\/posts\/28063\/revisions\/28064"}],"wp:attachment":[{"href":"https:\/\/blog.soton.ac.uk\/uosm2008\/wp-json\/wp\/v2\/media?parent=28063"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.soton.ac.uk\/uosm2008\/wp-json\/wp\/v2\/categories?post=28063"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.soton.ac.uk\/uosm2008\/wp-json\/wp\/v2\/tags?post=28063"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}