Topic 2 – Managing Multiple Online Identities

Online identity is the digital persona that is built based on the user characteristics and interaction online. Multiple identities can be created in specific circumstances such as credit card transactions and the uploading of a photo.

These information could be valuable to the service provider whereby the staff could provide the customers with a personalized experience. However it will be dangerous if these information fall into illegitimate user control and they could take over our life in a few seconds.

After watching the video, I believe everyone will understand the importance of online privacy and also the methods of protecting your online identity. Therefore it is important to introduce legal regulations to improve the user control over their personal information and make sure that the improvisation in technologies, transfer personal data in a more secure manner such as the inclusion of the chip in the credit card.

Multiple Identities
Multiple Identities

Photo Credit: Multiple Identity Memes via google

Proceeding to the main topic, in which should individual have a single or multiple online identities? Single identity allows individual to have a credible trustworthiness as they are not hiding anything from its social networking circles.

On the contrary, multiple identities offers privacy whereby an employee could keep a professional lifestyle completely separate from his personal lifestyle. Personally for me, I use my Twitter account for daily interaction with colleagues and clients and Facebook for the social interaction with friends.

Moreover there is a less likely chance of the online identity being cloned as the information of the particular user will be separated and placed in several detached places. This will reinforce the concept of online privacy.

Regardless of the adoption of single or multiple online identities, users should change their password periodically and embrace the practice of 2 factor authentication which is a multi-layered security process to protect the online identity.

Commercial Crime Excel
Commercial crimes cases in Singapore

Photo Credit: Commercial Crimes via Singstat

Based on the statistics, there had been an increase of 1,668 cases of commercial crimes from the year 2013 to 2014 and the fraud of online identity is one of the types of crimes inclusion under commercial crimes and further signify the importance of online privacy.

To conclude, it would be sensible to adopt the multiple online identities as this allows me to market myself and conduct the segmentation of appropriate information to the respective personnel. Moreover individual should place more effort in the management of their online identities as behaviour is socially and culturally modelled while socially and culturally judged.

(400 Words)

References:

Alexander, B. (2008). Web 2.0 and Emergent Multiliteracies. Theory into Practice, 47(2), 150 – Alexander Statement

See how easily freaks can take over your life. (n.d.). Retrieved November 3, 2015, from https://www.youtube.com/watch?v=Rn4Rupla11M

7 Steps to Building Your Online Identity. (n.d.). Retrieved November 3, 2015, from https://www.youtube.com/watch?v=2UlcOX1fZW4&feature=youtu.be

Internet Society. (n.d.). Retrieved November 3, 2015, from http://www.internetsociety.org/manage-your-identity

Multiple Online Identities: The pros and cons! #UOSM2008. (n.d.). Retrieved November 3, 2015, from http://www.alexhovden.com/node/87

Multiple Online Identities. (n.d.). Retrieved November 3, 2015, from https://www.haikudeck.com/multiple-online-identities-education-presentation-y8XXLox0g7#

Should I Keep My Personal and Professional Identities Completely Separate Online? (n.d.). Retrieved November 3, 2015, from http://lifehacker.com/5898370/should-i-keep-my-personal-and-professional-identities-completely-separate-online

To be or not to be, the importance of Digital Identity in the networked society | Costa | Educação, Formação & Tecnologias – ISSN 1646-933X. (n.d.). Retrieved November 3, 2015, from http://eft.educom.pt/index.php/eft/article/view/216/126

Selection of Variables | SingStat Table Builder. (n.d.). Retrieved November 3, 2015, from http://www.tablebuilder.singstat.gov.sg/publicfacing/createDataTable.action?refId=1886

Deconstructing Everyday Identities. (n.d.). Retrieved November 3, 2015, from http://amandaandsarahlaum.blogspot.sg/2014/04/multiple-identity-memes.html

9 thoughts on “Topic 2 – Managing Multiple Online Identities

  1. Pingback: Reflection on Topic 2 + 2 comments |

  2. Hi Wei Jie,
    The video that you share on your blog post has definitely illustrated the importance of online privacy and how easily anyone can just mimic the identities we set up for ourselves. I believe online privacy issue has been taken into much importance now given the fact that there has been an increase in commercial crimes cases based on the statistics you shared. You may want to take a look at this:
    http://www.independent.co.uk/news/world/young-people-going-to-increasing-lengths-to-protect-online-privacy-10108955.html

    Also, you mentioned that multiple identities offers privacy whereby an employee could keep their personal lifestyle separate from their professional side, which I agree with you. But have you consider the consequences of having your employer to find out about your private lifestyle online identity and actually feels that you’re not as credible of the way you portray yourself?
    I look forward to your valuable opinions!

    Cheers!

    Liked by 1 person

    1. Hi Jun Ning,

      Thanks for the valuable feedback. The link which you share with me was definitely insightful and it is great to know that teenagers are now taking more preventive measures to increase their online privacy.

      However do note that, there are still many people in this world that does not have the knowledge of online privacy and some doesn’t even have the luxury to access the knowledge of online privacy.

      In addition, I do agree that there could be serious consequences if the employer actually find out about some of the misdoings of the employee private life if their actions is wrong and illegal.

      However, from another perspective if the employers were to find out about the employee private life, the boss of the organization might be tempted to join the employee private lifestyle and activities if they are encouraging healthy lifestyle and incorporating the right moral values.

      Lastly, thanks for taking your valuable time in commenting on my blog post and I wish you all the best for Topic 3. Let’s take on this exciting challenge ahead of us together as a class.

      Liked by 1 person

  3. Pingback: Topic 2: Summary & Comments | YJunNing

  4. Pingback: Topic 2: Reflective Summary of Assuming Multiple Online Identities | jastypes

  5. Pingback: Reflective Summary for Topic 2 | junwai

  6. Pingback: Topic 3 – “Me” the Genuine Branding | Believe you can and you’re halfway there. –Theodore Roosevelt

  7. Pingback: Topic 4 – Utilization of Catastrophe | Believe you can and you’re halfway there. –Theodore Roosevelt

  8. Pingback: Reflective Summary | Believe you can and you’re halfway there. –Theodore Roosevelt

Leave a comment