Topic 3: Are you Real (Pt II)? Play safe…

 

Are we authentic? As mentioned in my previous post, having multiple identities results in a low authenticity. But, does having a single identity generally make users more authentic?

Through my discussion with Amoz, I learnt that even though profile experimentation(“more real” or “idealized” identities)exists – these profiles reflect the same digital breadcrumbs of the same persona – a different symptom for the same core self (The Guardian, 2017).

My discussion with Pearl, further reinforce my thoughts on how authenticity can be measured in online identities. She mentioned that it is crucial to evaluate the objectivity of the identities before making a decision on what is “authentic” or not – bringing us back to Topic 2.

Interestingly, Hine (2008) states that the authenticity of users is linked to trust -the “authenticity” of information given/ received depends on the trust between users and their audience (Hine, 2008). So, who is to say that multiple identities are “less authentic”?

Interesting take on trust as a factor in receiving authentic information on SNS:

Screen Shot 2017-11-22 at 9.22.05 PM.png

Fig 1.2 | Research model by Lo, Janice and Riemenschneider, Cindy, 2010

Back to online identities, Amoz’s post got me thinking about online privacy. He states that online privacy is the ability to personalised information to the different social scopes.

“Different sites, different audiences, different purposes.” she says. “Very simple.”

boyd, 2016

Online privacy concerns have been on the rise – especially true in the USA, where the NSA conducted a mass surveillance operation in 2013 (Harvard Gazette, 2017).

The information users put online can be exploited for social media tracking, political leanings, loyalty cards, in-store location and smartphone battery (to name a few) (Makeuseof, 2017). Below are some security measures internet users can take:

netprivacy_graphic.jpg

Fig 1.1 | Net Privacy graphics by Coleman/ Harvard Staff

What exactly is Online Security? Take a look at the video below:

Source: Self-produced using various sources

To sum up, the authenticity of online identities is dependent on the trust between users and audience. While users should take extra measures on privacy and security, regardless of their choice of online identity. Stay safe on the web!

Word Count: 299

Comments:

Pearl Ng

Amoz Kuang

 

References:

Hine, Christine, 2008. Virtual Ethnography: Modes, Varieties, Affordances. edited by Nigel G Fielding, Raymond M Lee, Grant Blank, I, 263-265.

amoz’s mind. 2017. Mask Off? | amoz’s mind. [ONLINE] Available at: https://amozk.wordpress.com/2017/11/20/mask-off/. [Accessed 22 November 2017].

The Guardian. 2017. How different are your online and offline personalities? | Media Network | The Guardian. [ONLINE] Available at: https://www.theguardian.com/media-network/2015/sep/24/online-offline-personality-digital-identity. [Accessed 22 November 2017].

Living on the Web with Pearl. 2017. Single or Multiple Online Identities: What’s the drawback and benefits? – Living on the Web with Pearl. [ONLINE] Available at: https://pearlnlt.wordpress.com/2017/11/20/single-or-multiple-online-identities-whats-the-drawback-and-benefits/. [Accessed 22 November 2017].

Engadget. 2017. Having multiple online identities is more normal than you think. [ONLINE] Available at: https://www.engadget.com/2016/03/04/multiple-online-identities/. [Accessed 22 November 2017].

Harvard Gazette. 2017. When it comes to internet privacy, be very afraid, analyst suggests | Harvard Gazette. [ONLINE] Available at: https://news.harvard.edu/gazette/story/2017/08/when-it-comes-to-internet-privacy-be-very-afraid-analyst-suggests/. [Accessed 22 November 2017].

Lifewire. 2017. What is an Internet Service Provider (ISP)?. [ONLINE] Available at: https://www.lifewire.com/internet-service-provider-isp-2625924. [Accessed 22 November 2017].

MakeUseOf. 2017. 5 Ways Your Information Is Being Exploited Every Day. [ONLINE] Available at: http://www.makeuseof.com/tag/your-information-exploited/. [Accessed 22 November 2017].

Security | Definition of Security by Merriam-Webster. 2017. Security | Definition of Security by Merriam-Webster. [ONLINE] Available at: https://www.merriam-webster.com/dictionary/security. [Accessed 22 November 2017].

YouTube. 2017. Online Security – YouTube. [ONLINE] Available at: https://www.youtube.com/watch?v=eQXC0cNWbw0. [Accessed 22 November 2017].

Lo, Janice and Riemenschneider, Cindy, “An Examination of Privacy Concerns and Trust Entities in Determining Willingness to Disclose Personal Information on a Social Networking Site” (2010). AMCIS 2010 Proceedings. 46. http://aisel.aisnet.org/amcis2010/46

 


Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s