{"id":141,"date":"2014-10-25T20:13:37","date_gmt":"2014-10-25T20:13:37","guid":{"rendered":"http:\/\/charliemasonblog.wordpress.com\/?p=29"},"modified":"2014-10-25T20:13:37","modified_gmt":"2014-10-25T20:13:37","slug":"different-identities-for-different-situations","status":"publish","type":"post","link":"https:\/\/blog.soton.ac.uk\/uosm2033\/2014\/topic-2-2014\/2014\/10\/different-identities-for-different-situations\/","title":{"rendered":"Different Identities for Different Situations?"},"content":{"rendered":"<p>As\u00a0soon to be graduates searching for jobs, we are advised to make our online presence expansive. Adding into this mix is that we\u00a0have spent our formative teenage years online in one sense or another and have posts from school and university <a href=\"http:\/\/www.davidmillen.com\/publications\/group2007-dimicco.pdf\">days<\/a> (DiMicco, 2007, p.384), therefore, we as young adults are likely to have developed and changed in the past 5 years. As such we can say whilst that in itself is a good argument for having multiple identities, it also show that\u00a0we talk about our <a href=\"http:\/\/digitaldisruptions.org\/rhizome\/wp-content\/uploads\/2010\/06\/rhiz08_DigitalIdentityMatters.pdf\">personas<\/a>\u00a0when discussing identities\u00a0(Warburton, 2010, p.11).<\/p>\n<p>It&#8217;s <a href=\"http:\/\/www.mediabistro.com\/alltwitter\/jobseekers-online-presence_b61115\">advised<\/a>\u00a0to have separate Twitter accounts (and thus identities), as private views and opinions are not compatible with job roles and opportunities. Though, it is important to ask why one needs\u00a0multiple identities, which could raise notes of suspicion. Much like airport security, why have that simmering anxiety (it could just be me&#8230;)\u00a0when there&#8217;s nothing to hide?<\/p>\n<div id=\"attachment_30\" style=\"width: 310px\" class=\"wp-caption alignnone\"><a href=\"http:\/\/www.businessinsider.com\/investigation-dallas-airport-security-2013-5\"><img class=\"wp-image-30 size-medium\" src=\"https:\/\/charliemasonblog.files.wordpress.com\/2014\/10\/investigation-reveals-that-most-airport-security-incidents-come-from-employees.jpg?w=300&#038;h=224\" alt=\"Kevork Djansezian \/ Getty Images\" width=\"300\" height=\"224\" \/><\/a><p class=\"wp-caption-text\">Kevork Djansezian \/ Getty Images<\/p><\/div>\n<p>With Twitter, it is known\u00a0that there is a need to remove doubt from readers minds as to what a tweet or retweet could suggest or endorse, in the form of a disclaimer.<\/p>\n<div class=\"embed-twitter\">\n<blockquote class=\"twitter-tweet\" width=\"550\">\n<p>Remember RTs not an endorsement.<\/p>\n<p>&mdash; Matthew Goldstein (@MattGoldstein26) <a href=\"https:\/\/twitter.com\/MattGoldstein26\/status\/526042784399372288\">October 25, 2014<\/a><\/p><\/blockquote>\n<p><script async src=\"http:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/div>\n<p>This shows that whilst Twitter has many\u00a0active users, people feel the need to add a disclaimer,\u00a0removing the inevitable liability of their identity. Additionally, whilst it\u2019s great to be expansive with your online presence it can be difficult to keep up with maintaining your online identities which could increase the risk of <a href=\"http:\/\/www.buzzfeed.com\/chrishamby\/government-says-federal-agents-can-impersonate-woman-online\">fraud<\/a>, which whilst unlikely, is an argument against having your identity on different networks.<\/p>\n<p>There many\u00a0arguments for having separate online identities. They stem from personal preference, convenience or for preparing for potential job opportunities. Whatever perspective you see it from, there are likely to be different answers. It does seem however, that the &#8220;just in case&#8221; argument prevails &#8211; the risk of bringing oneself or employer into disrepute is one that could force the use of having\u00a0separate online identities if you&#8217;re a heavy user as an exercise of risk reduction, or one professional identity if you&#8217;re a lighter user. As Neil Richards from the Washington University\u00a0<a href=\"http:\/\/www.buzzfeed.com\/chrishamby\/government-says-federal-agents-can-impersonate-woman-online\">says<\/a>\u00a0\u201c&#8230;technologies we have&#8230;are enabling all sorts of new uses, there are a whole bunch of&#8230;things that are possible&#8230;we don\u2019t have rules for them yet.\u201d Clearly, it is difficult to be conclusive, as users are not universally clear on what your online identity truly represents.<\/p>\n<hr \/>\n<div class=\"export__output ng-binding\">\n<div class=\"csl-entry\">DiMicco, J.M. &amp; Mullen, D.R., 2007. Identity Management: Multiple Presentations of Self in Facebook.\u00a0<i>GROUP \u201907 Proceedings of the 2007 international ACM conference on supporting group work<\/i>, pp.383\u2013386.<\/div>\n<div class=\"csl-entry\"><\/div>\n<div class=\"csl-entry\"><\/div>\n<div class=\"csl-entry\">Hamby, C., 2014. Government Set Up A Facebook Page In This Woman\u2019s Name.\u00a0<i>Buzzfeed.com<\/i>. Available at: buzzfeed.com\/chrishamby\/government-says-federal-agents-can-impersonate-woman-online [Accessed October 25, 2014].<\/div>\n<div class=\"csl-entry\"><\/div>\n<div class=\"csl-entry\"><\/div>\n<div class=\"csl-entry\">Single Source, 2014. The Job-Seekers Guide to a Squaky-Clean Online Presence.\u00a0<i>Single Source<\/i>. Available at: singlesourceuk.com\/job-seekers-guide-to-online\/ [Accessed October 23, 2014].<\/div>\n<div class=\"csl-entry\"><\/div>\n<div class=\"csl-entry\"><\/div>\n<div class=\"csl-entry\">Solzdra, P., 2013.\u00a0<i>Investigation Reveals That Most Airport Security Incidents Come From Employees\u00a0 Read more: <a href=\"http:\/\/www.businessinsider.com\/investigation-dallas-airport-security-2013-5#ixzz3HBf8yedx\" rel=\"nofollow\">http:\/\/www.businessinsider.com\/investigation-dallas-airport-security-2013-5#ixzz3HBf8yedx<\/a><\/i>, Available at: <a href=\"http:\/\/www.businessinsider.com\/investigation-dallas-airport-security-2013-5\" rel=\"nofollow\">http:\/\/www.businessinsider.com\/investigation-dallas-airport-security-2013-5<\/a> [Accessed October 25, 2014].<\/div>\n<div class=\"csl-entry\"><\/div>\n<div class=\"csl-entry\"><\/div>\n<div class=\"csl-entry\">Warburton , S., 2010.\u00a0<i>Digital Identity Matters<\/i>, London, UK: King\u2019s College London. Available at: <a href=\"http:\/\/digitaldisruptions.org\/rhizome\/wp-content\/uploads\/2010\/06\/rhiz08_DigitalIdentityMatters.pdf\" rel=\"nofollow\">http:\/\/digitaldisruptions.org\/rhizome\/wp-content\/uploads\/2010\/06\/rhiz08_DigitalIdentityMatters.pdf<\/a> [Accessed October 23, 2014].<\/div>\n<\/div><br \/>  <a rel=\"nofollow\" href=\"http:\/\/feeds.wordpress.com\/1.0\/gocomments\/charliemasonblog.wordpress.com\/29\/\"><img alt=\"\" border=\"0\" src=\"http:\/\/feeds.wordpress.com\/1.0\/comments\/charliemasonblog.wordpress.com\/29\/\" \/><\/a> <img alt=\"\" border=\"0\" src=\"http:\/\/pixel.wp.com\/b.gif?host=charliemasonblog.wordpress.com&#038;blog=76226339&%23038;post=29&%23038;subd=charliemasonblog&%23038;ref=&%23038;feed=1\" width=\"1\" height=\"1\" \/>","protected":false},"excerpt":{"rendered":"<p>As&nbsp;soon to be graduates searching for jobs, we are advised to make our online presence expansive. Adding into this mix is that we&nbsp;have spent our formative teenage years online in one sense or another and have posts from school and &hellip; <a href=\"http:\/\/charliemasonblog.wordpress.com\/2014\/10\/25\/different-identities-for-different-situations\/\">Continue reading <span>&rarr;<\/span><\/a><img loading=\"lazy\" decoding=\"async\" alt=\"\" border=\"0\" src=\"http:\/\/pixel.wp.com\/b.gif?host=charliemasonblog.wordpress.com&amp;blog=76226339&amp;post=29&amp;subd=charliemasonblog&amp;ref=&amp;feed=1\" width=\"1\" height=\"1\"><!-- AddThis Advanced Settings generic via filter on wp_trim_excerpt --><!-- AddThis Share Buttons generic via filter on wp_trim_excerpt --><\/p>\n","protected":false},"author":94708,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1031947],"tags":[],"class_list":["post-141","post","type-post","status-publish","format-standard","hentry","category-topic-2-2014","column","threecol"],"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/blog.soton.ac.uk\/uosm2033\/wp-json\/wp\/v2\/posts\/141","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.soton.ac.uk\/uosm2033\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.soton.ac.uk\/uosm2033\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.soton.ac.uk\/uosm2033\/wp-json\/wp\/v2\/users\/94708"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.soton.ac.uk\/uosm2033\/wp-json\/wp\/v2\/comments?post=141"}],"version-history":[{"count":2,"href":"https:\/\/blog.soton.ac.uk\/uosm2033\/wp-json\/wp\/v2\/posts\/141\/revisions"}],"predecessor-version":[{"id":332,"href":"https:\/\/blog.soton.ac.uk\/uosm2033\/wp-json\/wp\/v2\/posts\/141\/revisions\/332"}],"wp:attachment":[{"href":"https:\/\/blog.soton.ac.uk\/uosm2033\/wp-json\/wp\/v2\/media?parent=141"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.soton.ac.uk\/uosm2033\/wp-json\/wp\/v2\/categories?post=141"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.soton.ac.uk\/uosm2033\/wp-json\/wp\/v2\/tags?post=141"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}