Currently browsing author

Reflection: What the heck! Access denied!?

‘Open access’ – we couldn’t seem to appreciate thisĀ idea until we actually understand how it works.Ā It is believed that most students would haveĀ taken advantage of the tremendous variety of free resources available online, whether it is a relevant journal article or a random YouTube video. The current trend predicts that most online content will eventually be held behind a paywall. Continue reading →

Reflection: Prison in Mindā€¦

This week’s topic’s given me a very good opportunity to gain more knowledge from different perspectives regarding ethical issues raised by the educational and business use of social media – everyone’s had their go and lots of novel ideas came up. This week, I wrote on my blog about how public shaming via social media emerged as a result of a judgemental society that built up based on panopticon-institutional systems. Continue reading →

Prison in Mind

Out of all the thoughts from last weekā€™s topic, the idea of public shaming demonstrated by the case of Justine Sacco stood out to me the most. Apparently, as indicated by Glenn Greenwald in his TED talk, it all started when 18th- century philosopher Jeremy Bentham devised an architectural design called the panopticon to resolve the problem of not being able to monitor and control each one of the members of constantly growing large institutions (a.k.a. prisons). Continue reading →

Developing an online professional profile: Marketing yourself!

While a typical work place in the past was dominated by the one-way method, which goes top bottom from boss to employees, todayā€™s work place should look more like a jazz band, as suggested by Don Tapscott (2014). It is believed that a two-way street is more in favour of todayā€™s constantly changeable work environment. Besides, as indicated by Nyk Nyman, with the rise in use of the social media, the job search process today should work the same way. Continue reading →

Reflective Summary: Having more than one identity online: More authentic or more vulnerable?

This topic was a thought-provoking one. New online identities are created by us everyday, with just a few clicks and a few pieces of information provided, we can create an account on any website almost unconsciously ā€“ we are so used to these processes that we donā€™t even need a second think to do it. I personally would register different accounts for different purposes. Continue reading →

Reflective Summary: Having more than one identity online: More authentic or more vulnerable?

This topic was a thought-provoking one. New online identities are created by us everyday, with just a few clicks and a few pieces of information provided, we can create an account on any website almost unconsciously ā€“ we are so used to these processes that we donā€™t even need a second think to do it. I personally would register different accounts for different purposes. Continue reading →

Having more than one online identity: More authentic or more vulnerable?

When searching for sources under the broad topic of ā€˜digital identityā€™, I came across an interesting metaphor ā€“ it was suggested that our digital identity is theĀ permanentĀ collection of data about us that is available online, that is, a digital ā€˜tattooā€™ (Binary Tattoo). And it is striking to note that almost all activities that are based on using web tools and applications are actually ways of creating our digital identities, even when they are not intended (Torres and Costa, 2011). Continue reading →