Category Archives: Topic 2

A Reflection: Am I really “NOBUSATO” or hiding behind a mask, in the Virtual World (#MANG2049)

apcnews2012protecting-your-online-identity-thumb_mainimage1-jpg1

Photo Reference: http://apcmag.com/protecting-your-online-identity.htm/

Before this topic was covered, I was not aware that my presence presented on various social media accounts are actually different personas and that this could lead to an integrity issue

I perceived the various social media sites as no more than competitors trying to provide users with a differential advantage. For instance, I perceived LinkedIn and Facebook to be somewhat on equal standing but the contents are drastically different in that while LinkedIn is a professional site, Facebook is a fun, social networking site

After reading my friends blog posts and reading mine once again, I realised that the issue of having a single or multiple online identity is a controversial one. Kaye (https://kayemcarter.wordpress.com/2016/11/07/authenticity-or-anonymity/) quoted Mark Zuckerberg as saying that “having two identities for yourself is a lack of integrity.”

While this could be true to some extent, do we then, in the name of integrity, present a 100% authentic self, only to be a victim of our own doing online ?

It was reported in Singapore that single ladies who went to a supposedly SAFE online dating site, were scammed by a group of Nigerians because they were transparent and honest

(Video Reference: Singapore Police Force)

In the Video “Cyber Piracy Parable” (in my blog post), information we post in public sites can be accessed by ANYONE who finds it, and our private communications might even be intercepted and read by ANYONE, including criminals [Nova PBS Official].  It was reported that in America, 15 million people[Douglas, 2007] have their identities stolen each year

The above highlights that the internet can indeed be a dangerous platform when we post information online. Onus is therefore on us to carefully analyse how to share our personal data (whether through a single or multiple online identity ) in a manner that is ethical and with integrity.

(302 words)

References:

Carter, K. (2016) ‘Authenticity or anonymity?’, 7 November. Available at: https://kayemcarter.wordpress.com/2016/11/07/authenticity-or-anonymity/ (Accessed: 8 November 2016)

Douglas, R. (2007) Identity theft statistics: 15 million victims a year. Available at: http://www.identitytheft.info/victims.aspx (Accessed: 7 November 2016).

NOVA PBS Official (2014) A Cyber privacy parable. Available at: https://www.youtube.com/watch?v=H0I7jQb37bo (Accessed: 7 November 2016).

Singapore Police Force (2011) Crimewatch 2010 episode 10 – Cyber Love Trap. Available at: https://www.youtube.com/watch?v=7XUmBeG-Ln4 (Accessed: 7 November 2016).

Teresa, Y. (2016) ‘Category: Topic 2’, 7 November. Available at: https://onefivethreem.wordpress.com/category/topic-2/ (Accessed: 8 November 2016).

(No Date) Available at: https://shapeshed.com/images/articles/indentity_new.png (Accessed: 7 November 2016).

Comments:

Kaye Carter’s blog

Teresa Yepa’s Blog

 

Advertisements

Topic 2: Should I be “NOBUSATO” online ? (#MANG2049)

Photo Reference:https://shapeshed.com/images/articles/indentity_new.png
Photo Reference:https://shapeshed.com/images/articles/indentity_new.png

 

 

 

 

 

 

 

 

 

Before I address the question, there are 2 terms that I would like to highlight which are significant to our discussion:

  1. “Online identity or internet persona is a social identity that an Internet user establishes in online communities and websites. It can also be considered as an actively constructed presentation of oneself. “(Wikipedia)
  2. Phishing, on the other hand, is the act of sending an email to a user falsely claiming to be someone prominent in an attempt to scam him into voluntarily giving his personal data that will be used for identity theft. (http://www.webopedia.com/TERM/P/phishing.html)

In this Video “Cyber Piracy Parable” we can see that information we post publicly can be accessed by ANYONE who finds it, and our private communications might even be intercepted and read by ANYONE, including criminals [Nova PBS Official].  It was reported that in America, 15 million people[Douglas, 2007] have their identities stolen each year.

(Video Ref: Nova PBS Official)

From the above, it is clear that we cannot have ONE true identity throughout the social media sites we participate in. We should only present our Persona online, ie, a PARTIAL identity we CREATE to represent us in specific situations.  This is to say, the information submitted online should be evaluated with much care, knowing it is a social platform where friends, strangers or scammers, all alike, can read us like an open book and target us when we least expect.

The creation of different Persona for different websites would therefore enable us to be who we want to be in different situations

For my LinkedIn account, I want to showcase my credentials (eg, being awarded top 10% best photographer worldwide…) to attract potential employers. For my Facebook account, I would rather not highlight this attribute but stay low profile so that people who are drawn to me did not do so because of my gifting.

However, there is one downside to adopting different personas in the different online sites we participate in. A head hunter who wishes to dig deeper into one’s background and who goes to the different social media sites that the person is in, might conclude that he is not trustworthy and give him a pass. This is especially so, if the person is not only creating a partial identity in each site he is in, but where the identities are also conflicting and confusing.

In summary, it is fine to have more than one identity online given the pitfalls mentioned. Yet, we must also ensure that the different personas we create are not conflicting to uphold integrity and honesty.

(429 words)

References:

2016, S. (2016) Facebook users worldwide 2016. Available at: https://www.statista.com/statistics/264810/number-of-monthly-active-facebook-users-worldwide/ (Accessed: 7 November 2016).

Beal, V. (no date) What is Phishing? Webopedia definition. Available at: http://www.webopedia.com/TERM/P/phishing.html (Accessed: 7 November 2016).

Cisco (2015) How does the Internet actually work? Available at: https://www.youtube.com/watch?v=ZonvMhT5c_Q (Accessed: 7 November 2016).

Dangers of identity theft: Protect your finances, health & freedom (2016) Available at: https://www.freescoresandmore.com/dangers-identity-theft.html (Accessed: 7 November 2016).

Douglas, R. (2007) Identity theft statistics: 15 million victims a year. Available at: http://www.identitytheft.info/victims.aspx (Accessed: 7 November 2016).

Internet society (2011) Understanding your Online Identity : An Overview of Identity. Available at: http://www.internetsociety.org/sites/default/files/Understanding%20your%20Online%20Identity%20An%20Overview%20of%20Identity.pdf (Accessed: 7 November 2016).

Singapore Police Force. (2016) News release. Available at: http://www.police.gov.sg/news-and-publications/media-releases/20160921_others_advisory_fake_spf_website (Accessed: 7 November 2016).

jetsetshow (2010) 7 steps to building your online identity. Available at: https://www.youtube.com/watch?v=2UlcOX1fZW4&feature=youtu.be (Accessed: 7 November 2016).

NOVA PBS Official (2014) A Cyber privacy parable. Available at: https://www.youtube.com/watch?v=H0I7jQb37bo (Accessed: 7 November 2016).

Online identity (2016) in Wikipedia. Available at: https://en.wikipedia.org/wiki/Online_identity (Accessed: 7 November 2016).

Singapore Police Force (2011) Crimewatch 2010 episode 10 – Cyber Love Trap. Available at: https://www.youtube.com/watch?v=7XUmBeG-Ln4 (Accessed: 7 November 2016).

Internet society (2011) Understanding your Online Identity : An Overview of Identity. Available at: http://www.internetsociety.org/sites/default/files/Understanding%20your%20Online%20Identity%20An%20Overview%20of%20Identity.pdf (Accessed: 7 November 2016).

(No Date) Available at: https://shapeshed.com/images/articles/indentity_new.png (Accessed: 7 November 2016).