SlideShare a Scribd company logo
1 of 20
Disadvantages of
 Digital Identity
Privacy
Privacy is personal, private and confidential
information about us. Personal information
could be our financial, medical, relationship
status, activities, opinions or any information
relating to us. We give our privacy easily on
the internet especially on social networks.
E.g. In real life, if a stranger asks for our
phone number, most of will refuse to give it
to them. However, on Facebook contact
details such as email address, phone
numbers, etc are given easily.
 Moreover, other personal data i.e. date of
 birth, who our parents/sibling are, where we
 study, where we work, relationship status are
 also most common information we provide
 giving our privacy less importance.

 Things  which are private should be kept that
 way; the whole world doesn‟t need to know
 sensitive information about us. If we
 accommodate too many facts about us online
 this can help criminals commit cyber crimes
 such identity fraud, identity theft or other
 illegal acts.
Hacking
A hacker is someone who has
knowledge, skills and understands
weakness of security system. Hacking
refers to gaining unauthorized access to
system or breaking into computer
system. Hacking can be used for various
reasons good and bad. The most
common reason for hacking is to access
valuable data without a person‟s
permission.
 e.g.Christopher Weatherhead was a student of
  Northampton University who hacked into PayPal
  account along with other anonymous hacking group.
  Due to this hacking, PayPal lost £3.5m. Offences as
  such against the law happen frequently, there are
  many examples of hacking.
 “A hacker stole £35,000 from his neighbours'
  online bank accounts after working out the
  answers to their security questions from
  information they posted on Facebook and
  Friends Reunited2”, this example shows how
  careful we need to be online.
Identity Fraud/Theft
 Moreover,  identify theft or fraud is another
 concern we need to consider. Just like how we
 can create false account on websites, others can
 do the same. They can take our personal
 information from various websites. And create
 a profile they can use but with our data. They
 can use websites existing under our name
 without our knowledge which is called identity
 theft. They would want to hide their true
 identity for their own safety, security and legal
 reasons when performing something illegal or
 unethical.
 They  can use it do malicious acts such as
 cyber bullying, harassing, hacking other
 people accounts, etc. Credit card fraud refers
 to thieves using your credit card information
 to purchase whatever they desire. They have
 an access to your bank details by
 hacking, creating false merchant
 sites, tracking you while you do online
 shopping, Triangulation (a merchant asks
 customer to pay for their purchase by email
 sending their card details, who then uses
 consumer‟s card to buy the product for
 consumer and then use the card for their own
 personal gain), etc.
Privacy Invasion
        Another disadvantage of involvement in
    Digital Identity is tracking, nowadays websites can
    track, monitor and store information about us i.e.
    our online behaviour; websites we visit(browsing
    habits), our online shopping history, activities. Not
    only, it is morally wrong to track us without our
    permission and invading our privacy but also
    illegal to use cookies without our consent.
    However, many of us are not familiar with cookies
    as they are difficult to notice, hard to control and
    not aware of the impacts being monitored. Email
    mass marketing, targeted adverting, etc can be
    achieved from this.
Privacy Policy
Also, many website have privacy policy
which we “just agree” without actually
reading it, most of the website mentions
they might sell our data to third parties.
They can also get our email address form
our social network profiles, if we have
provided one and our profile is public.
Cyber bullying
 While  anonymity has its advantages, it also has
 disadvantages, as people can use internet with fake
 identity, it also increases cyber crimes such as
 cyber bullying. Cyber bullying is when someone is
 being harassed, threatened, insulted, humiliated
 and discriminated online such as on
 facebook, discussions forums, emails, gaming
 sites, chats, instant messaging or any websites on
 the internet. Cyber bullying can have impact in an
 individual‟s life i.e. depression, lack of
 confidence, anxiety, etc. As bullies can disguise
 themselves by suppressing their own identity its
 easier for them to commit crimes.
Let‟s look at an example; Taylor and McKenzie
were arrested for cyber bullying (aggravated
stalking of a minor under 16.) their friend by
creating a fake profile in Facebook (under their
friend‟s name). They also uploaded indecent
pictures of her, wrote very offensive comments
and added 189 people as friends from their
school. When detectives “alerted the alleged
victim, she was not even aware the fake profile
existed but she later told teachers she had been
subjected to „numerous incidents of teasing and
ridicule because of it”.
Control of information
One of the disadvantages of having Digital
Identity is how we do not have control over our
own information. E.g. once someone has
uploaded a picture on Facebook, others can copy
the image and „do anything with it‟. Also, what
other say, write or post about us is uncontrollable.
Therefore we need to manage our Digital Identity
properly to avoid any inaccurate, irrelevant and
reputation damaging information being
represented on the web about us.
References
 http://s2.cdn.memeburn.com/wp-
  content/uploads/online-privacy.png
 http://www.dedoimedo.com/images/life/movie-
  hacking-leet-terminal.png
 http://blog.budgetpulse.com/wp-
  content/uploads/2009/05/steal-cc.jpg
 http://www.puretravel.com/uploadedresources/
  adminimage/PrivacyPolicy.jpg
 http://info.uknowkids.com/Portals/176530/imag
  es/cyberbullying.jpg
 http://www.p2pnet.net/images/fbrebel.jpg
 http://www.hollywoodisburning.com/wp-
  content/uploads/2012/10/Jpalardy-
  TakingControlOfTheCommandline9971.jpg

More Related Content

What's hot

Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy IntroductionG Prachi
 
Data protection ppt
Data protection pptData protection ppt
Data protection pptgrahamwell
 
Assignment on windows firewall
Assignment on windows firewallAssignment on windows firewall
Assignment on windows firewallMd Shihab
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & SecurityAnchit Rajawat
 
Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Mohammad Ahmed
 
Social Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingSocial Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingDepartment of Defense
 
CYBER CRIME( DU PRESENTATION FOR FYUP)
CYBER CRIME( DU PRESENTATION FOR FYUP)CYBER CRIME( DU PRESENTATION FOR FYUP)
CYBER CRIME( DU PRESENTATION FOR FYUP)Siddharth Anand
 
Online privacy & security
Online privacy & securityOnline privacy & security
Online privacy & securityPriyab Satoshi
 
Living in the IT Era - Lesson 5.pptx
Living in the IT Era - Lesson 5.pptxLiving in the IT Era - Lesson 5.pptx
Living in the IT Era - Lesson 5.pptxFroilan Cantillo
 
Theft in information security
Theft in information securityTheft in information security
Theft in information securitysvm
 
Cyber crime
Cyber crimeCyber crime
Cyber crimedixitas
 

What's hot (20)

Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy Introduction
 
Computer crime
 Computer crime Computer crime
Computer crime
 
Data protection ppt
Data protection pptData protection ppt
Data protection ppt
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
Assignment on windows firewall
Assignment on windows firewallAssignment on windows firewall
Assignment on windows firewall
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)
 
Social Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingSocial Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness Briefing
 
CYBER CRIME( DU PRESENTATION FOR FYUP)
CYBER CRIME( DU PRESENTATION FOR FYUP)CYBER CRIME( DU PRESENTATION FOR FYUP)
CYBER CRIME( DU PRESENTATION FOR FYUP)
 
Phishing
PhishingPhishing
Phishing
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Online privacy & security
Online privacy & securityOnline privacy & security
Online privacy & security
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Living in the IT Era - Lesson 5.pptx
Living in the IT Era - Lesson 5.pptxLiving in the IT Era - Lesson 5.pptx
Living in the IT Era - Lesson 5.pptx
 
Theft in information security
Theft in information securityTheft in information security
Theft in information security
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Cyber security
Cyber securityCyber security
Cyber security
 

Similar to Disadvantages of Digital Identity

Lecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxLecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxDominicCaling
 
Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptxAchu69
 
Cyberstalking
CyberstalkingCyberstalking
CyberstalkingTrevschic
 
Identity Theft: Evolving with Technology
Identity Theft: Evolving with TechnologyIdentity Theft: Evolving with Technology
Identity Theft: Evolving with Technology- Mark - Fullbright
 
Cyber crime social media &; family
Cyber crime social media &; familyCyber crime social media &; family
Cyber crime social media &; familyDr.Keshav Sathaye
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime12698
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime12698
 
Multimedia12 by aparajeeta
Multimedia12 by aparajeetaMultimedia12 by aparajeeta
Multimedia12 by aparajeetaAparajeeta Salu
 
Identity theft in the internet
Identity theft in the internetIdentity theft in the internet
Identity theft in the internetmohmd-kutbi
 
Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...Shreedeep Rayamajhi
 
Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...Shreedeep Rayamajhi
 

Similar to Disadvantages of Digital Identity (20)

123.pptx
123.pptx123.pptx
123.pptx
 
THE CYBER WORLD.pptx
THE CYBER WORLD.pptxTHE CYBER WORLD.pptx
THE CYBER WORLD.pptx
 
Lecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxLecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptx
 
CYBER SAFETY.pptx
CYBER SAFETY.pptxCYBER SAFETY.pptx
CYBER SAFETY.pptx
 
Facebook
FacebookFacebook
Facebook
 
Oula 9 a
Oula   9 aOula   9 a
Oula 9 a
 
Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptx
 
Cyberstalking
CyberstalkingCyberstalking
Cyberstalking
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Identity Theft: Evolving with Technology
Identity Theft: Evolving with TechnologyIdentity Theft: Evolving with Technology
Identity Theft: Evolving with Technology
 
Cyber crime social media &; family
Cyber crime social media &; familyCyber crime social media &; family
Cyber crime social media &; family
 
Boushrat 9 a
Boushrat   9 aBoushrat   9 a
Boushrat 9 a
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 
Multimedia12 by aparajeeta
Multimedia12 by aparajeetaMultimedia12 by aparajeeta
Multimedia12 by aparajeeta
 
Identity theft in the internet
Identity theft in the internetIdentity theft in the internet
Identity theft in the internet
 
Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...
 
Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...
 
Cyberbullying and Cybercrime
Cyberbullying and CybercrimeCyberbullying and Cybercrime
Cyberbullying and Cybercrime
 
E-Tech_Lesson2.pptx
E-Tech_Lesson2.pptxE-Tech_Lesson2.pptx
E-Tech_Lesson2.pptx
 

More from Digital-identity

More from Digital-identity (6)

Ethical issues in Digital Identity
Ethical issues in Digital Identity Ethical issues in Digital Identity
Ethical issues in Digital Identity
 
Safety
SafetySafety
Safety
 
Professional
ProfessionalProfessional
Professional
 
Privacy settings
Privacy settingsPrivacy settings
Privacy settings
 
Personal
PersonalPersonal
Personal
 
Educational
EducationalEducational
Educational
 

Recently uploaded

How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Association for Project Management
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxcallscotland1987
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 

Recently uploaded (20)

How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 

Disadvantages of Digital Identity

  • 2. Privacy Privacy is personal, private and confidential information about us. Personal information could be our financial, medical, relationship status, activities, opinions or any information relating to us. We give our privacy easily on the internet especially on social networks. E.g. In real life, if a stranger asks for our phone number, most of will refuse to give it to them. However, on Facebook contact details such as email address, phone numbers, etc are given easily.
  • 3.
  • 4.  Moreover, other personal data i.e. date of birth, who our parents/sibling are, where we study, where we work, relationship status are also most common information we provide giving our privacy less importance.  Things which are private should be kept that way; the whole world doesn‟t need to know sensitive information about us. If we accommodate too many facts about us online this can help criminals commit cyber crimes such identity fraud, identity theft or other illegal acts.
  • 5. Hacking A hacker is someone who has knowledge, skills and understands weakness of security system. Hacking refers to gaining unauthorized access to system or breaking into computer system. Hacking can be used for various reasons good and bad. The most common reason for hacking is to access valuable data without a person‟s permission.
  • 6.
  • 7.  e.g.Christopher Weatherhead was a student of Northampton University who hacked into PayPal account along with other anonymous hacking group. Due to this hacking, PayPal lost £3.5m. Offences as such against the law happen frequently, there are many examples of hacking.  “A hacker stole £35,000 from his neighbours' online bank accounts after working out the answers to their security questions from information they posted on Facebook and Friends Reunited2”, this example shows how careful we need to be online.
  • 8. Identity Fraud/Theft  Moreover, identify theft or fraud is another concern we need to consider. Just like how we can create false account on websites, others can do the same. They can take our personal information from various websites. And create a profile they can use but with our data. They can use websites existing under our name without our knowledge which is called identity theft. They would want to hide their true identity for their own safety, security and legal reasons when performing something illegal or unethical.
  • 9.
  • 10.  They can use it do malicious acts such as cyber bullying, harassing, hacking other people accounts, etc. Credit card fraud refers to thieves using your credit card information to purchase whatever they desire. They have an access to your bank details by hacking, creating false merchant sites, tracking you while you do online shopping, Triangulation (a merchant asks customer to pay for their purchase by email sending their card details, who then uses consumer‟s card to buy the product for consumer and then use the card for their own personal gain), etc.
  • 11. Privacy Invasion  Another disadvantage of involvement in Digital Identity is tracking, nowadays websites can track, monitor and store information about us i.e. our online behaviour; websites we visit(browsing habits), our online shopping history, activities. Not only, it is morally wrong to track us without our permission and invading our privacy but also illegal to use cookies without our consent. However, many of us are not familiar with cookies as they are difficult to notice, hard to control and not aware of the impacts being monitored. Email mass marketing, targeted adverting, etc can be achieved from this.
  • 12.
  • 13. Privacy Policy Also, many website have privacy policy which we “just agree” without actually reading it, most of the website mentions they might sell our data to third parties. They can also get our email address form our social network profiles, if we have provided one and our profile is public.
  • 14.
  • 15. Cyber bullying  While anonymity has its advantages, it also has disadvantages, as people can use internet with fake identity, it also increases cyber crimes such as cyber bullying. Cyber bullying is when someone is being harassed, threatened, insulted, humiliated and discriminated online such as on facebook, discussions forums, emails, gaming sites, chats, instant messaging or any websites on the internet. Cyber bullying can have impact in an individual‟s life i.e. depression, lack of confidence, anxiety, etc. As bullies can disguise themselves by suppressing their own identity its easier for them to commit crimes.
  • 16.
  • 17. Let‟s look at an example; Taylor and McKenzie were arrested for cyber bullying (aggravated stalking of a minor under 16.) their friend by creating a fake profile in Facebook (under their friend‟s name). They also uploaded indecent pictures of her, wrote very offensive comments and added 189 people as friends from their school. When detectives “alerted the alleged victim, she was not even aware the fake profile existed but she later told teachers she had been subjected to „numerous incidents of teasing and ridicule because of it”.
  • 18. Control of information One of the disadvantages of having Digital Identity is how we do not have control over our own information. E.g. once someone has uploaded a picture on Facebook, others can copy the image and „do anything with it‟. Also, what other say, write or post about us is uncontrollable. Therefore we need to manage our Digital Identity properly to avoid any inaccurate, irrelevant and reputation damaging information being represented on the web about us.
  • 19.
  • 20. References  http://s2.cdn.memeburn.com/wp- content/uploads/online-privacy.png  http://www.dedoimedo.com/images/life/movie- hacking-leet-terminal.png  http://blog.budgetpulse.com/wp- content/uploads/2009/05/steal-cc.jpg  http://www.puretravel.com/uploadedresources/ adminimage/PrivacyPolicy.jpg  http://info.uknowkids.com/Portals/176530/imag es/cyberbullying.jpg  http://www.p2pnet.net/images/fbrebel.jpg  http://www.hollywoodisburning.com/wp- content/uploads/2012/10/Jpalardy- TakingControlOfTheCommandline9971.jpg