Month: January 2021

Digital Identities


A digital identity is a personā€™s entire ā€œpresence onlineā€ (Stoller, 2016). This consists of everything individuals post, how one interacts with others online, and how oneā€™s digital content affects how one is perceived by others. Some examples of what it could include are an individualā€™s social media profiles, oneā€™s ā€œbody of work, portfolio, blog, and tweetsā€ (Stoller, 2016). Also included would be to which groups or networks an individual belongs to online. Each person can be distinguished from another online via their unique digital identity.
Typically, a digital professional identity is only a component of oneā€™s entire digital identity. Oneā€™s social media use will differ greatly depending on whether one intends to use a platform for personal or professional uses. Typically, social media use for professional purposes is characterized by a greater level of restraint with which one generates content and interacts with content online. As well, a social media presence professionally is typically cultivated for a purpose. Personal usage of social media is typically for the purpose of leisure or to nurture personal interests (Spracklen, 2015). Both approaches to digital identity can contribute to helping form oneā€™s identity as an individual and to finding a sense of belonging online (Spracklen, 2015).

ā€œPeople have always found a sense of community and belonging through social networksā€ (Spracklen, 2015) which are typically ā€œorganized around a past that is imagined or constructed from myths of belonging or exclusionā€ (Spracklen, 2015). Each ā€˜imagined identityā€™ or the norms that are associated with each community of individuals influences those who wish to join that group.
Often the right sort of ā€œperformative behaviourā€ (Spracklen, 2015) needs to be displayed to allow for an individual to be permitted to join a certain group or community. In this way, digital identities can converge in networked publics. Aggregations of digital identity can be of use in the tracking of user habits online and this data is often of great interest and value to companies.

A digital wallet would also be considered part of oneā€™s digital identity. A digital wallet could consist of payment information, passwords, cards, passports, etc. A digital wallet essentially contains all the tools that one needs to participate in society. While digital wallets provide an easy way to verify identity, information, and complete transactions, they are precisely the reason that sometimes phones can be a greater target for theft than a wallet in recent times. As well, if someone has access to your phone or an account of yours that is logged into, that individual without having to verify their identity can essentially impersonate you for whatever purpose they desire.

With ā€œmore and more people, businesses and devices interacting onlineā€ (George et al., 2019), the benefits that come with having a digital identity are numerous. Much of our business is conducted online or has shifted to being conducted online in recent years. Having a digital identity in this type of environment means having greater access to a range of meaningful opportunities (George et al., 2019). For example, job recruitment is conducted almost exclusively online these days. Websites such as Indeed.com, craigslist and companyā€™s own websites have largely replaced the classified section of the newspaper. As well, digital identities allow us easier access to services such as banking, prescriptions, doctorā€™s appointments (George et al., 2019), etc. In such a way, it is faster than ever to complete transactions, sign and submit documents, and complete many other tasks. Hence why many telecommunication companies for example recommend you use their online help portal prior to calling or making an in-person visit.

However without access to a phone, computer, or the internet, many can become excluded (George et al., 2019) from participating in our increasingly technologically driven modern society. As laws, civil society, and professional spaces engage the accountability of digital identity, I feel that it is important to regulate what organizations are entitled to do with personal information, and for there to be some accountability in keeping our data safe. I think that Estoniaā€™s model of ā€œgiving information only onceā€ (George et al., 2019) and citizens owning their own data is a good example to follow. Something that I would like to see is more of is transparency with privacy related clauses as well as security audits and overall enhanced security.

References
Kilekani Nandan, Kubzansky Mike, Manju George, Ratas JĆ¼ri, Snapp Mary. ā€œPress Conference. The Value of Digital Identity for Global Economy and Societyā€. You Tube, uploaded by The World Economic Forum, 5 February 2019, https://www.youtube.com/watch?v=1-V7lyxrOmw&feature=youtu.be

Spracklen K. (2015) Identity-Making and Social Media. In: Digital Leisure, the Internet and Popular Culture. Leisure Studies in a Global Era. Palgrave Macmillan, London. https://doi.org/10.1057/9781137405876_6

Stoller, Eric. ā€œWhat is Digital Identity.ā€ You Tube, uploaded by University of Derby, 25 November 2016, https://www.youtube.com/watch?v=u0RryRbJza0&feature=youtu.be.& (0:05-0:06, 0:29-0:32)

Image Credits: Google

Blog Post #1

What does it mean to network using social media?
Ā  Ā  Ā  Ā  Ā  Networking using social media means that we are more well equipped than ever to build beneficial networks of connections for ourselves to serve our personal and professional interests. Social media allows us to easily maintain these connections and to then activate them as desired (Rajagopal, Joosten-ten Brinke and Van Bruggen). Being on the internet and on specific social media platforms however also means that we make informed decisions about what to post and share (Boyd) and that we understand what will ultimately happen to our online ā€˜dataā€™. To develop an engaging presence online and readership, however requires a great deal of active participation and vulnerability.

How are we motivated to participate in networked publics?
We are motivated to participate in networked publics by the advantages that being a part of such networks provide. Being situated amidst a well constructed PLN puts one in an advantageous position to keep up to date in oneā€™s professional industry and learn continuously. PLNs also provide ease of collaboration, allow for broader connection and collaboration as well as allow for opportunities and resources to be utilized that could not otherwise be accessed. An effective PLN is a resource we can turn to for information, advice, and answers (Gutierrez). Our connections should suit our personal and professional interests. Our interests can be dynamic, which can cause the structure of our PLNs to change overtime (Rajagopal, Joosten-ten Brinke and Van Bruggen).

What are the risks & rewards of public communications?
Ā  Ā  Ā  Ā  Ā  Some of the risks that come with being involved in public communication include privacy concerns as well as possible damage to oneā€™s reputation, if individuals are not cautious about the types of content that they are posting online. In a world that is more connected than ever thanks to social media and other networks, the ā€œimplications of privacyā€ (Boyd), can often extend ā€œbeyond the individualā€ (Boyd). Hence why it is now common practice for example that entire organizations as well as individual employees agree to abide by privacy acts such as FIPPA, PIPA for example, so that confidential information not to be distributed online is not accidentally shared with the public. Oneā€™s personal information and data however that does not fall under such legislation can be more difficult to protect. People do not always have the agency, knowledge, and skills to control information or to make informed decisions about what should be shared with whom (Boyd). As well, when individuals sign up to use a specific service, they may not be aware of what personal data they are signing away upon agreeing to the terms and conditions of website, which is why some have suggested it may be more prudent to move to a privacy ā€œmodel that focuses on [the] usage and interpretationā€ of data (Boyd).

Some of the rewards of being a part of public communications can include the ability to grow social capital by expanding oneā€™s network, the ability to learn from oneā€™s connections as well as the opportunities that may arise from being strategically connected. Such a network when it is used to support an individualā€™s learning and professional development can be referred to as a ā€˜Personal Learning Networkā€™ (PLN). The ability to construct an effective PLN is a skill to behold. A PLN can be made up of ā€œpeers, coworkers, supervisors, experts, and other professionalsā€ (Gutierrez). A PLN can also include websites, blogs and social media. The connections formed to others in a PLN can generally be characterized as being either strong, weak, or very weak. There is something valuable to be gained from every type of connection as such. Strong connections ā€œallow for active collaboration on knowledge creationā€ (Rajagopal, Joosten-ten Brinke and Van Bruggen), while weaker connections can act as ā€œsources for new information, knowledge and ideasā€ (Rajagopal, Joosten-ten Brinke and Van Bruggen). Our choice in who is to be a part of our PLN depend on a variety of factors. Some common deciding factors include commonality, benevolence, like-mindedness, real potential for collaboration and learning as well as factors relating to the professional environment one is situated within, such as trends.

References
Boyd, Danah. “Networked Privacy.” Surveillance & Society, 22nd December 2012. Web.

Gutierrez, Karla. What are Personal Learning Networks? 21st June 2016. 18th January 2021.

Rajagopal, Kamakshi, et al. “Understanding personal learning networks: Their structure, content and the networking skills needed to optimally use them.” First Monday (2012). Web.