StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Digital Identity Concept - Essay Example

Cite this document
Summary
The paper "Digital Identity Concept" highlights that generally, an online identity is normally a type of identity that persons wishing to access the internet normally make. This implies that with an online identity, one is capable of accessing the internet…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.2% of users find it useful
Digital Identity Concept
Read Text Preview

Extract of sample "Digital Identity Concept"

Digital identity Introduction Unlike the previous generation whereby most of the communications were in a face-to-face MODE, this is no longer the case in the current generation. This is because the current generation came alongside a number of technological advancements, whose main objective was to ease communication (Claypoole & Payton 10). Of all the inventions, one of the biggest was the introduction of the internet. It was after the internet invention that websites came into existence, whereby through them communication was eased. This is because it was easy to communicate with a person residing in another nation in real time due to social sites such as Facebook, whereby the only requirement was an online identity that was quite easy to obtain (Claypoole & Payton 10). Although invention of the internet was quite a success, it was short lived, this is because crime also transformed into digital. Apart from analyzing the comparisons between online identities and real ones, the study also argues some of the effects that come alongside one accessing the internet. What is one responsible for online? When one is online, be it social media or blog sites, cautiousness ought to be the main consideration (Gellman & Dickson 11). This is because the internet is quite vast and just like the globe, too has different types of persons who are online with the intention of achieving certain objectives, whether good or bad. Hence it is normally of great importance for one to put into consideration what he or she posts online, this is because once the information is online, many people can access it. Thus what one posts can easily be used against him or her (Bernal 255). What is an online identity? Online identity, also known as internet persona is normally an identity that internet users come up with in a move to communicate online, for instance, in websites. Online identities are normally optional, that is, whereas some can opt to use their actual names, others prefer anonymity, hence only identifying themselves through pseudonyms (Claypoole & Payton 12). Online identity normally revolves around two major areas; presentation as well as reputation. In presentation, the identity not only does it aid in showcasing the manner in which one participates while online but also how he or she interacts especially in shared spaces. Similarly, in the case of reputation, online identity displays how one wants other people to think of him or her (Claypoole & Payton 20). According to studies, one of the most common forms of online identity is the use of E-mail addresses. One reason as to why E-mail addresses top the list in types of online identities is that E-mails, unlike other social sites, are not only direct but also the easiest from of contact as far as cyber space communication is concerned (Bernal 180). When it comes to the matter of cyber space, one’s online identity normally plays a critical role; this is because for one to access many social sites as well as blogs, one requires an online identity. Due to the high rate of online fraud and cybercrime, one’s online identity normally comes alongside a password, whereby by it is only after entering the correct password that internet sites allow one to accessibility (Boyer 81). Where might someone have an online identity? Online identities are normally essential in many online sites, especially social sites as well as commercial. Apart from E-mail addresses, other sites that require ones identity include Facebook, Linked In as well as Twitter and Skype (Claypoole & Payton 10). Apart from social sites, online identities are vital in the field of E-Commerce. This field is normally strict when it comes to determining one’s identity hence in most cases one ought to use his or her real names. The reason as to why e-commerce sites require one to use real names is that these sites deal with money transactions hence cautiousness is mandatory. One of the most common e-commerce sites is PayPal as well online shopping companies such as Amazon and EBay (Claypoole & Payton 146). Unlike social sites where one only confirms his identity by entering the right passwords, this is not the case for e-commerce sites. This is because in these sites, apart from entering passwords, one also ought to enter his or her credit card numbers (Claypoole & Payton 101). This is because according to these companies, passwords can be shared hence entering a correct password does not necessarily prove one’s identity. For what purpose might someone have an online identity? Online identities normally act as gateway into many social sites. Many online sites require that their members have identities, normally in a move to prove their loyalty. Similarly, most sites normally have a list of terms and conditions, whereby before one gets an online identity, he or she has to accept to adhere with the sites’ terms, thereby, being in possession of an online identity is normally a sign that one has agreed with the terms and conditions of the online sites (Gellman & Dixon 45). Apart from the terms and conditions, many social sites normally have an age limit for its accessibility. For instance, most sites normally require that its members be aged 18 and above years, which is a move meant to bar accessibility by underage persons, hence one ought to have an online identity proving that he or she is above 18 years hence has the right to access the sites (Gellman & Dixon 24). In the case of electronic commerce, online identity is vital; this is because through it one is in a position to conduct online transactions. For instance, apart from purchasing items online, one is also capable of depositing as well as withdrawing funds from his or her bank account online. Although many people have online identities for good intentions, some acquire them for committing online atrocities. One such group comprise of hackers, these are normally persons who go online with the intention of committing cybercrime, the most common being hacking into people’s online accounts, both social as well as commercial (Claypoole & Payton 110). Hence causing loses both in terms of capital as well as ruining one’s reputation (Claypoole & Payton 110). In what ways is an online identity different than ones "real" one? When it comes to the issue of online as well as real identities, there is normally a difference between the two; this is normally in relation to the environmental differences. Unlike in real environments, in a virtual environment one normally has the option of using a real identity or not (Sutcu, Akyaz & Dilmen 1). While using online identities, one normally behaves differently compared to his or her behavior in the reality. This is because while online, one is capable of moving from one site to another without the fear of being identified by someone who knows him or her. This is because most online identities, apart from being discreet, majority are anonymous (Sutcu, Akyaz & Dilmen 4). In most online identities, for instance, E-mail addresses, communication is normally asynchronous in nature. Relationships between Online identities and real ones are normally handled in a different manner. This is usually due to interface decisions constructed inside the system technology. Although some systems harden the possibilities of tracing a person’s real name, others do not (Sutcu, Akyaz & Dilmen 5). What consequences or benefits might one face/gain with regard to possessing an online identity? Owning an online identity normally comes with a number of benefits, for instance, when one is in possession of an online identity, this normally increases his or her accessibility to multiple online sites. Apart from social sites such as Facebook, Twitter and Skype, an online identity also enables one to do business virtually through commercial sites such as Amazon as well as PayPal (Claypoole & Payton 146). Having an online identity for a company such as Amazon normally eases one when it comes to the issue of shopping, this is because through it one no longer has to go to the shopping mall, instead he or she just purchases all the items online then has the goods delivered at his or her doorstep. In the case of social sites, online identities enable one to meet new friends and in so doing broaden the aspect of international relations (Claypoole & Payton 22). Apart from benefits, possessing an online identity also comes with a number of consequences, for instance one normally faces the risk of having his or her account interfered by fraudsters as well as hackers. Some online identities normally enable one to access illegal sites such as child pornography (Gellman & Dixon 40). Despite these sites being of bad influence especially to under age children who could easily access them, they also act as recruitment centers whereby they lure minors into pornography by promising them goodies such as money in return. Besides pornography, other illegal sites that one can access with the aid of on an online identity embrace gambling websites (Claypoole & Payton 36). These are sites where one is lured into taking part in fake gambling competitions hence resulting to loss of large amount of cash to fraudsters (Claypoole & Payton 36). Online identities are also the reason behind the numerous cases of cyber bullying, some are so vital to the extent that the affected ends up committing suicide. How was Kiki Kannibal affected by her online presence? Since Kiki Kannibal was not aware of the dangers that come alongside improper use of online identities, it resulted to her being a subject of cyber bullying; an incident that was quite catastrophic not only to her but her family as well(Erdley). Since she was yearning for media attention, Kiki signed up for a MySpace account and once she got her online identity, she began posting all sorts of photos, believing that there would be no effect since the world knew little of her true identity. This was not the case since after a short period, her E-mail as well as blogs started filling with abuses and threats (Erdley). After online threats and abuses, this moved to the next level whereby she started getting prank calls whereby people would just call to make fun of her. Aside from prank calls, there was also the drive-bys late at night whereby teenagers would drive close to Kiki’s home and scream out her name (Erdley). In one incident, Kiki went out of their home only to find the entire house painted with eggs as well as ketchup and chocolate syrup in addition to the word “SLUT” scrawled on the garage door. Prior to that, Kiki was at a punk show when a group of teenage girls spotted her. Despite her being in the midst of a crowd, the girls began mocking her and even went to the extent of cramming her blond hair with gum (Erdley). This was quite a blow to Kiki who was only 14 years by then. How was Kikis (and her familys) privacy affected by the presence of an online audience? Kiki’s cyber bullying incident was quite a blow because not only did it affect her but own parents as well. This is because their privacy was no longer there since apart from being the talk of most social media, they also attracted the attention of television crews and newspaper personnel who were always on their pursuit asking them on numerous occasions how they are copying with the incident (Erdley). Since Kiki was the most affected, this meant that the family had to take care of her in a move to control the trauma, which was taking toll on her. The family also had a number of sleepless nights because of by passes majority being teenagers who would come and start shouting Kiki’s names in addition to all sorts of insults. The vandalism of their home was the biggest blow since it meant that the family now had to hire professionals to come and clean up the mess, whereby due to these expenses that later on the family became bankrupt (Erdley). What kinds of responsibility must one hold when online--as the user, or as an audience member? While online, one ought to put into consideration the fact that not everybody who is there is doing legal business. This is because apart from hackers and fraudsters, online sites are also full of predators, stalkers as well as profiteers whose objectives are to take advantage of persons that are illiterate on issues related to cyber security (Claypoole & Payton 40). Whether one is online as a user or audience, one ought to make sure that he or she does not post too much information concerning his or her real identity (Claypoole & Payton 177). This is because in most cases, results that come alongside one combining his or her online identities with real ones are normally fatal. For instance, apart from them resulting to trauma, they also increase chances of one committing suicide. How might ethics and morals argue or defend some of these concerns? In relation to ethics as well as moral perceptions, the internet is quite vast with all sorts of persons who come online with the aim of achieving different objectives; most of them are normally bad. Therefore, to be on the safe side one ought to take extreme caution on some of the sites that one registers for online identities (Gellman & Dixon 16). This is because unlike in the real world whereby it is easy to identify a person, this is not the case when one is online. This is because unlike the real world, in the virtual world, people tend to interact with persons who are anonymous, although many have names, most of these names are not real (Bernal 255). Conclusion Studies so far conducted contend the internet is vast, hence comprises of a number of materials, both good as well as bad whereby it is normally imperative for one to be extremely cautious while online. An online identity is normally a type of identity that persons wishing to access the internet normally make. This implies that with an online identity, one is capable of accessing the internet. Apart from social sites such as Facebook, Twitter and Skype, online identities are also importance in electronic commerce sites like Amazon and PayPal. According to studies, although being in possession of online identities are beneficial, they also emerge with a number of consequences, for instance, apart from fraudsters hackers, one also risks the attention of stalkers, as well as profiteers and predators. Work Cited Bernal, Paul. Internet Privacy Rights: Rights to Protect Autonomy.Cambridge, England: Cambridge University press, 2014. Print. Boyer, Alison. The Online Identity Theft Prevention Kit: Stop Scammers, Hackers, and Identity Thieves from Ruining Your Life. Ocala, Fla: Atlantic Pub. Group, 2008. Print. Claypoole, Ted, and Theresa Payton. Protecting Your Internet Identity: Are You Naked Online?Lanham, Md: Rowman & Littlefield Publishers, 2012. Print. Erdley, Sabrina, R. “Kiki Kannibal: The Girl Who Played With Fire.” Rolling Stone. 2011. Web. 18 July 2014. < http://www.rollingstone.com/culture/news/kiki-kannibal-the-girl-who- played-with-fire-20110415> Gellman, Robert, and Pam Dixon. Online Privacy: A Reference Handbook. Santa Barbara, Calif: ABC-CLIO, 2011. Print. Sutcu, Cem. Akyaz, Erhan & Dilmen, Emel. “Real and Virtual Identities Considered.” Marmara University. n.d. web. 18 July 2014. < http://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&cad=rja&uact =8&ved=0CCEQFjAA&url=http%3A%2F%2Fnewmedia.yeditepe.edu.tr%2Fpdfs%2Fisi md_06%2F22.pdf&ei=cC7JU_vyJcrY0QXo84HABg&usg=AFQjCNGYxmHEj5wmyvu eOziYkJ4iZh0DfA&sig2=jf-bGx1VOVlZ6WJBSbvJ2w&bvm=bv.71198958,d.d2k> Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Kiki Kannibal: The Girl Who Played With Fire Essay”, n.d.)
Retrieved from https://studentshare.org/english/1652982-kiki-kannibal-the-girl-who-played-with-fire
(Kiki Kannibal: The Girl Who Played With Fire Essay)
https://studentshare.org/english/1652982-kiki-kannibal-the-girl-who-played-with-fire.
“Kiki Kannibal: The Girl Who Played With Fire Essay”, n.d. https://studentshare.org/english/1652982-kiki-kannibal-the-girl-who-played-with-fire.
  • Cited: 1 times

CHECK THESE SAMPLES OF Digital Identity Concept

Global Marketing Operations

The company is suffering from identity crisis.... But this brand has identity problems in other countries.... is Korea based global leader in electronic products, digital convergence technologies, telecommunication, digital media and semiconductor....
3 Pages (750 words) Case Study

Implementing Digital Signature Technology

Thus, digital signature is a suitable technique for saving customers from identity theft and various others frauds.... This report presents a detailed analysis of digital signature.... The aim of this research is to analyze the role of digital signature in forming e-commerce security....
22 Pages (5500 words) Essay

Digital Aesthetics

From the paper "Digital Aesthetics" it is clear that the ghost in the machine is the lost soul of its creator, disassociated and cut off from self-concept by the media hypnosis induced by McLuhan's Narcissus' narcosis, and it is through the glitch that it reappears.... The individual self-expression is reduced to an ironic defect within the greater matrix of social programming and control but is experienced heroically as overcome by the person through creative self-identity....
8 Pages (2000 words) Coursework

Choosing an Appropriate E-learning Tool

The paper "Choosing an Appropriate E-learning Tool" highlights that the unit terminates with a cooperative project in which scholars select a large information set of interest, examine a problem, validate their choice of computational gears, and generate a digital relic to report their outcomes.... s technology incorporation continues to surge in our society, teachers must retain the skills and comportments of digital age specialists....
6 Pages (1500 words) Assignment

Digital Media and Society

This essay considers digital media and society.... Technically, digital media entails video, audio and even photo content, which has been digitally pressed or encoded.... In most cases, encoding contents entails video and audio input conversion into digital media files like the Window Media file.... Alternatively, digital media is the technical storage and transmission aspect of information.... In this case, the transmission of data takes place in the computer networking or the hard disk drives whereas the end-product of digital media can be a digital signage, digital video, digital art or a digital audio (Liestol, 2004)....
6 Pages (1500 words) Case Study

The Digital Age in Posthumanism

This paper tells that the concept of 'posthuman' seems to have penetrated current critical analyses in the social sciences and humanities in the 1990s, although its origins can be traced to the 1960s and declarations of it popularised by Foucault in the conclusion of The Order of Things: An Archaeology of the Human Sciences.... Second, the posthuman view considers consciousness, regarded as the seat of human identity in the Western tradition long before Descartes thought he was a mind thinking, as an epiphenomenon, as an evolutionary upstart trying to claim that it is the whole show when in actuality it is only a minor sideshow....
12 Pages (3000 words) Essay

Information Security, Identity Theft and Identity Fraud

This assignment "Information Security, identity Theft and identity Fraud" presents information security that refers to the means of ways of safeguarding information and information systems from being from unauthorized or unlawful access, perusal, inspection, destruction, or recording.... on-Repudiation: This refers to the assurance that a particular sender is supplied with proof of delivery and that the respective recipient of the transaction is equally provided with proof of the identity of the sender, therefore, making it impossible for any of them to deny having processed the information....
8 Pages (2000 words) Assignment

Influence of ICT on Children's Identity and Wellbeing

This essay "Influence of ICT on Children's identity and Wellbeing" discusses the development of information communication technology that has had a major influence in shaping the identities and wellbeing of children in the contemporary modern world in ways that were not experienced in 20 years.... Therefore, it is important to identify the real problem that influences the development of children's identity and wellbeing as a result of ICT developments.... These types of communication mechanisms have affected adolescent development, and this concerns communication theorists in trying to analyze to what extent ICT can influence identity development and the wellbeing of children....
18 Pages (4500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us