{"id":131,"date":"2014-10-23T10:53:58","date_gmt":"2014-10-23T10:53:58","guid":{"rendered":"http:\/\/annakentmuller.wordpress.com\/?p=117"},"modified":"2014-10-23T10:53:58","modified_gmt":"2014-10-23T10:53:58","slug":"topic-2-who-am-i-then","status":"publish","type":"post","link":"https:\/\/blog.soton.ac.uk\/uosm2033\/2014\/topic-2-2014\/2014\/10\/topic-2-who-am-i-then\/","title":{"rendered":"Topic 2: \u201cWho am I then?\u201d"},"content":{"rendered":"<p style=\"text-align:center;\"><strong>Online identity:<\/strong> <em>the sum of the characteristics and interactions you make online.<\/em> <em>These may be personal identities, created by you or profiles made for you.<\/em><\/p>\n<p>We always need to be careful with what we leave behind on the web, being conscious of our\u00a0<strong>digital footprint<\/strong>. We must pay attention to our online identity, and therefore be aware of how we display ourselves to others via the web. One comment can cause damage to our reputation, affecting\u00a0our everyday life. An example of this is <a href=\"http:\/\/www.theguardian.com\/world\/2013\/dec\/22\/pr-exec-fired-racist-tweet-aids-africa-apology\">Justine Sacco&#8217;s tweet<\/a>\u00a0in 2013 that <a href=\"http:\/\/www.buzzfeed.com\/alisonvingiano\/this-is-how-a-womans-offensive-tweet-became-the-worlds-top-s\">went viral<\/a>, concluding\u00a0with her losing her job.<\/p>\n<p>Bellow shows\u00a0how Justine&#8217;s tweet went worldwide (24 hours after the original post):<\/p>\n<blockquote class='twitter-tweet'><p>Some stats on who&#039;s talking about <a href=\"http:\/\/twitter.com\/search?q=%23JustineSacco\" title=\"#JustineSacco\">#JustineSacco<\/a> and <a href=\"http:\/\/twitter.com\/search?q=%23HasJustineLandedYet\" title=\"#HasJustineLandedYet\">#HasJustineLandedYet<\/a>.   Hint, the whole world. <a href=\"http:\/\/t.co\/fDqOrnkZA4\" rel=\"nofollow\">http:\/\/t.co\/fDqOrnkZA4<\/a>&mdash; <br \/>Jim Forrest (@todaysabacus) <a href='http:\/\/twitter.com\/#!\/todaysabacus\/status\/414272073981128704' data-datetime='2013-12-21T05:52:14+00:00'>December 21, 2013<\/a><\/p><\/blockquote>\n<p>This example shows us how we must keep our online identity professional, even if we believe it to be a &#8216;personal&#8217; account. This example shows an advantage of having both a professional and personal twitter profile meaning\u00a0you could keep one closed, \u00a0for private use.<\/p>\n<p>This study, done by BuzzFeed shows just how easy it is to search individuals digital footprint:<\/p>\n<span class='embed-youtube' style='text-align:center; display: block;'><iframe class='youtube-player' type='text\/html' width='560' height='315' src='http:\/\/www.youtube.com\/embed\/YLWmjpPoJHk?version=3&#038;rel=1&%23038;fs=1&%23038;showsearch=0&%23038;showinfo=1&%23038;iv_load_policy=1&%23038;wmode=transparent' frameborder='0' allowfullscreen='true'><\/iframe><\/span>\n<address><em>BuzzFeedVideo, Internet Privacy Prank<\/em><\/address>\n<p>Mark Zuckerburg (Facebook&#8217;s Chief Executive) believes we should all be virtually transparent:\u00a0<strong><em>&#8220;Having two identities for yourself is an example of a lack of integrity&#8221;<\/em><\/strong>\u00a0This lack of integrity\u00a0does not fit Facebook&#8217;s values. Anonymity online, means individuals can easily take up the persona of someone else.<a href=\"http:\/\/buzzmachine.com\/2011\/03\/08\/one-identity-or-more\/\"> &#8220;[A]nonymity is often the cloak of cowards.&#8221;<\/a> These individuals can attack people online, lobby abuse, spread rumours and lies. Mark Zuckerberg is frequently quoted saying that\u00a0Facebook was the &#8220;foundation of reality&#8221;, thus creating authenticity. Removing anonymity allows authors to receive\u00a0credit for what they say.<\/p>\n<p>Having multiple accounts, one private (closed)\u00a0and having one professional (open) would surely give you the benefit of both worlds?<\/p>\n<ul>\n<li>Protecting your reputation<\/li>\n<li>Deciding where and how your information is shared<\/li>\n<li>Maintaining your freedom<\/li>\n<li>Reducing vulnerability<\/li>\n<\/ul>\n<p>This resolution still does not help the creation of your personal identity. It still shows someone that is searching your digital footprint that you have something to hide. The solution would appear to be to publish\u00a0more about yourself- to help the &#8220;Google&#8221; search of you to\u00a0be positive. This will help keep your reputation and share more of your identity.<\/p>\n<blockquote><p><a href=\"http:\/\/buzzmachine.com\/2011\/03\/08\/one-identity-or-more\/\">&#8220;The best solution is to be yourself. If that makes you uneasy, talk with your shrink. Better yet, blog about it.&#8221;<\/a><\/p><\/blockquote>\n<h6><span style=\"text-decoration:underline;\"><em>References<\/em><\/span><\/h6>\n<p><em>A. Gauthier., H. Goldman., P. Ward\u00a0and\u00a0A. Bianchi, (2014) <a href=\"http:\/\/www.buzzfeed.com\/andrewgauthier\/online-privacy-facebook-prank-video\">&#8220;When These People Realized How Easily We Found Their Personal Info Online They Totally Freaked Out&#8221;\u00a0<\/a>Video of\u00a0experiment. Date Accessed: 23.10.14<\/em><\/p>\n<p><em>A. Krotoski, (2012) <a href=\"http:\/\/www.theguardian.com\/technology\/2012\/apr\/19\/online-identity-authenticity-anonymity\">Online Identity: is authenticity or anonymity more important?\u00a0<\/a>\u00a0The Guardian.\u00a0Date Accessed: 23.10.14<\/em><\/p>\n<p><em>A. Vingiano, \u00a0(2013) <a href=\"http:\/\/www.buzzfeed.com\/alisonvingiano\/this-is-how-a-womans-offensive-tweet-became-the-worlds-top-s\">&#8220;This Is How A Woman&#8217;s Offensive Tweet Became The World&#8217;s Top Story&#8221;<\/a>\u00a0BuzzFeed.\u00a0Date Accessed: 23.10.14<\/em><\/p>\n<p><em>C.Costa., R. Torres, (2011)<\/em>\u00a0<em><a href=\"http:\/\/eft.educom.pt\/index.php\/eft\/article\/view\/216\/126\">&#8220;To be or not to be, the importance of Digital Identity in the networked society&#8221;\u00a0<\/a>\u00a0University of Salford.\u00a0Date Accessed: 20.10.14<\/em><\/p>\n<p><em>F.Harvey, (2013) <a href=\"http:\/\/prezi.com\/ght0_ub5kbht\/identity-and-privacy\/\">&#8220;Identity and Privacy&#8221;<\/a>\u00a0Presentation.\u00a0Date Accessed: 23.10.14<\/em><\/p>\n<p><em>G. Jean-Malbuisson, (2014)<\/em> <em>\u00a0<a href=\"http:\/\/www.internetsociety.org\/what-we-do\/internet-technology-matters\/privacy-identity\">http:\/\/www.internetsociety.org\/what-we-do\/internet-technology-matters\/privacy-identity<\/a>, Internet Society.\u00a0Date Accessed: 23.10.14<\/em><\/p>\n<p><em>J. Jarvis, (2011)<a href=\"http:\/\/buzzmachine.com\/2011\/03\/08\/one-identity-or-more\/\"> &#8220;One identity or more?&#8221;<\/a>, BuzzMachine.\u00a0Date Accessed: 23.10.14<\/em><\/p>\n<p><em>jetsetshow, (2010) <a href=\"https:\/\/www.youtube.com\/watch?v=2UlcOX1fZW4&amp;feature=youtu.be\">7 Steps To Building Your Online Identity<\/a><a href=\"https:\/\/www.youtube.com\/watch?v=2UlcOX1fZW4&amp;feature=youtu.be%20\">,\u00a0<\/a>video presentation.\u00a0Date Accessed: 21.10.14<\/em><\/p>\n<p><em>M., Clear, (2014) <a href=\"http:\/\/www.theguardian.com\/commentisfree\/2014\/jan\/15\/reveal-real-identity-online-anonymity\">&#8220;Why should i reveal my &#8216;real identity&#8217; online? Anonymity isn&#8217;t so terrible&#8221;<\/a>\u00a0The Guardian.\u00a0Date Accessed: 23.10.14<\/em><\/p>\n<p><em>M. Helft, (2011) <a href=\"http:\/\/www.nytimes.com\/2011\/05\/14\/technology\/14facebook.html?_r=0&amp;adxnnl=1&amp;adxnnlx=1414070018-Ozd0vggXBmrg9J1KEON\/rA\">&#8220;Facebook, Foe of Anonymity, Is Forced to Explain a Secret&#8221;\u00a0<\/a>The New York Times.\u00a0Date Accessed: 23.10.14<\/em><\/p>\n<p><em>S. Warburton, (2010) <a href=\"http:\/\/digitaldisruptions.org\/rhizome\/wp-content\/uploads\/2010\/06\/rhiz08_DigitalIdentityMatters.pdf\">&#8220;Rhizone: digital identity matters&#8221;<\/a>\u00a0Kings College London.\u00a0Date Accessed: 22.10.14<\/em><\/p><br \/>  <a rel=\"nofollow\" href=\"http:\/\/feeds.wordpress.com\/1.0\/gocomments\/annakentmuller.wordpress.com\/117\/\"><img alt=\"\" border=\"0\" src=\"http:\/\/feeds.wordpress.com\/1.0\/comments\/annakentmuller.wordpress.com\/117\/\" \/><\/a> <img alt=\"\" border=\"0\" src=\"http:\/\/pixel.wp.com\/b.gif?host=annakentmuller.wordpress.com&#038;blog=75969788&%23038;post=117&%23038;subd=annakentmuller&%23038;ref=&%23038;feed=1\" width=\"1\" height=\"1\" \/>","protected":false},"excerpt":{"rendered":"<p>Online identity: the sum of the characteristics and interactions you make online. These may be personal identities, created by you or profiles made for you. We always need to be careful with what we leave behind on the web, being conscious of our&nbsp;digital footprint. We must pay attention to our online identity, and therefore be [&hellip;]<img loading=\"lazy\" decoding=\"async\" alt=\"\" border=\"0\" src=\"http:\/\/pixel.wp.com\/b.gif?host=annakentmuller.wordpress.com&amp;blog=75969788&amp;post=117&amp;subd=annakentmuller&amp;ref=&amp;feed=1\" width=\"1\" height=\"1\"><!-- AddThis Advanced Settings generic via filter on wp_trim_excerpt --><!-- AddThis Share Buttons generic via filter on wp_trim_excerpt --><\/p>\n","protected":false},"author":94706,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1031947],"tags":[],"class_list":["post-131","post","type-post","status-publish","format-standard","hentry","category-topic-2-2014","column","threecol"],"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/blog.soton.ac.uk\/uosm2033\/wp-json\/wp\/v2\/posts\/131","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.soton.ac.uk\/uosm2033\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.soton.ac.uk\/uosm2033\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.soton.ac.uk\/uosm2033\/wp-json\/wp\/v2\/users\/94706"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.soton.ac.uk\/uosm2033\/wp-json\/wp\/v2\/comments?post=131"}],"version-history":[{"count":2,"href":"https:\/\/blog.soton.ac.uk\/uosm2033\/wp-json\/wp\/v2\/posts\/131\/revisions"}],"predecessor-version":[{"id":535,"href":"https:\/\/blog.soton.ac.uk\/uosm2033\/wp-json\/wp\/v2\/posts\/131\/revisions\/535"}],"wp:attachment":[{"href":"https:\/\/blog.soton.ac.uk\/uosm2033\/wp-json\/wp\/v2\/media?parent=131"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.soton.ac.uk\/uosm2033\/wp-json\/wp\/v2\/categories?post=131"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.soton.ac.uk\/uosm2033\/wp-json\/wp\/v2\/tags?post=131"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}