SlideShare a Scribd company logo
F.A.C.E.S
A guide to digital identity
What is a Digital Identity
• A digital identity is an online or networked identity adopted or claimed in
cyberspace by an individual, organization or electronic device
(Techopedia.com, 2017).
How many Digital Identity
should you have?
- How good is your digital literacies?
- Are you a digital resident or digital
visitor?
- What do you use the Web for? (Based on
digital differences)
Freedom
• Degree to which your digital identity(ies) gives you
freedom in what you do online. (Cserni and Talmud,
2017)
• Freedom refers to the behavior you portray online and
the content you share and create.
Freedom
Single
• Overall, not much freedom is felt.
• Individuals have to be wary of their
actions as what they post on social
media is seen by family, friends,
colleagues, business partners etc.
• Leading to ‘unintended’ negative
effects.
Multiple
• There is freedom to do anything you
want.
• Various digital identities are segmented
to target specific group of interest. Eg.
A separate Instagram account just to
post pictures of your own pet or food.
• Removes the risk of an ‘unintended’
negative effect.
Authenticity
• Degree to which your digital identity(ies) portrays integrity, trustworthiness
and authenticity.
• How similar are your digital identity is to yourself in the real world?
• Do you have anything to hide? Especially from an employer point of view
Authenticity
Single
• Has high authenticity.
• One account means all the
information about an individual is
all there.
• He/she as nothing to hide.
Multiple
• Low in authenticity.
• Having multiple identity will dilute
an individual’s own image.
• One Instagram account used for
food, another used for cat photos.
Has no real meaning to the identity.
Cyber Crimes
• Degree to which your digital identity(ies) enables you to perform illegal
activities.
• Based on whether your account is anonymous or not
• Not that everyone will do such illegal activities, but there are some who will
misuse the internet.
• Such activities include, cyber bullying, trolling, online fraud/scams.
Cyber Crimes
Single
• Less likely to enable cyber crimes
• If an individual does perform such
crimes, as the digital footprint is
very obvious and is easily traced
back to you.
Multiple
• More likely to enable cyber crimes
• Having multiple accounts reduces
the risk of having the crime traced
back to you.
• Especially if your digital identity is
anonymous
Effort
• Degree of effort needed to manage your digital identity(ies)
• Effort meaning to develop and build on your digital network for a respective
digital identity.
Effort
Single
• Very easy to manage the digital identity.
• Everything happens in one place
Multiple
• Very exhausting to manage multiple digital
identities
• Young adults who use seven to 11
different platforms are more than three
times more likely to report depressive
symptoms (Liberatore, 2016)
Security
• Degree of security and privacy experienced from your digital identity(ies)
• Is your digital identity prone to identity theft?
• Do you leave behind a substantial amount of digital footprint?
Security
Single
• Highly unsecure
• Prone to identity theft
• Activities online are easily traced
back to you
Multiple
• Very Secure
• Not prone to identity theft
• Nearly untraceable digital footprint

More Related Content

What's hot

Filters and monitoring: Panacea or band-aid
Filters and monitoring: Panacea or band-aidFilters and monitoring: Panacea or band-aid
Filters and monitoring: Panacea or band-aid
ConnectSafely
 
Online Ethics and Etiquette
Online Ethics and Etiquette Online Ethics and Etiquette
Online Ethics and Etiquette
JessamenTino21
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
stephensc
 
Digital Citizenship Redefined
Digital Citizenship RedefinedDigital Citizenship Redefined
Digital Citizenship Redefined
ConnectSafely
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
stephensc
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
stephensc
 
Misuse of personal information
Misuse of personal informationMisuse of personal information
Misuse of personal information
Zev Aidikoff
 
parent_teacher_tutorial
parent_teacher_tutorialparent_teacher_tutorial
parent_teacher_tutorial
tutorialsruby
 
Digital Citizenship & Media Literacy
Digital Citizenship & Media LiteracyDigital Citizenship & Media Literacy
Digital Citizenship & Media Literacy
Alec Couros
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
ShyamalPatra
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
ShyamalPatra
 
Online Security and How to Make Money Online
Online Security and How to Make Money Online Online Security and How to Make Money Online
Online Security and How to Make Money Online
Nader Alkeinay
 
Digital Citizenship Initiative1
Digital Citizenship Initiative1Digital Citizenship Initiative1
Digital Citizenship Initiative1
kathyschmo
 
Social Media Security
Social Media SecuritySocial Media Security
Social Media Security
Del Belcher
 
Digital Safety, Data Privacy, and Online Netiquette
Digital Safety, Data Privacy, and Online NetiquetteDigital Safety, Data Privacy, and Online Netiquette
Digital Safety, Data Privacy, and Online Netiquette
Gab Billones
 
Cyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena MishraCyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena Mishra
Devsena Mishra
 
Lesson 1 maintaining internet safety(unit 1)
Lesson 1    maintaining internet safety(unit 1)Lesson 1    maintaining internet safety(unit 1)
Lesson 1 maintaining internet safety(unit 1)
FRANCISANGELOBANTAT
 
Privacy Primer
Privacy PrimerPrivacy Primer
Privacy Primer
ConnectSafely
 
Social Networking
Social NetworkingSocial Networking
Social Networking
Marthamcameron
 
Wk4 project
Wk4 projectWk4 project
Wk4 project
Toby Edwards
 

What's hot (20)

Filters and monitoring: Panacea or band-aid
Filters and monitoring: Panacea or band-aidFilters and monitoring: Panacea or band-aid
Filters and monitoring: Panacea or band-aid
 
Online Ethics and Etiquette
Online Ethics and Etiquette Online Ethics and Etiquette
Online Ethics and Etiquette
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Digital Citizenship Redefined
Digital Citizenship RedefinedDigital Citizenship Redefined
Digital Citizenship Redefined
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Misuse of personal information
Misuse of personal informationMisuse of personal information
Misuse of personal information
 
parent_teacher_tutorial
parent_teacher_tutorialparent_teacher_tutorial
parent_teacher_tutorial
 
Digital Citizenship & Media Literacy
Digital Citizenship & Media LiteracyDigital Citizenship & Media Literacy
Digital Citizenship & Media Literacy
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Online Security and How to Make Money Online
Online Security and How to Make Money Online Online Security and How to Make Money Online
Online Security and How to Make Money Online
 
Digital Citizenship Initiative1
Digital Citizenship Initiative1Digital Citizenship Initiative1
Digital Citizenship Initiative1
 
Social Media Security
Social Media SecuritySocial Media Security
Social Media Security
 
Digital Safety, Data Privacy, and Online Netiquette
Digital Safety, Data Privacy, and Online NetiquetteDigital Safety, Data Privacy, and Online Netiquette
Digital Safety, Data Privacy, and Online Netiquette
 
Cyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena MishraCyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena Mishra
 
Lesson 1 maintaining internet safety(unit 1)
Lesson 1    maintaining internet safety(unit 1)Lesson 1    maintaining internet safety(unit 1)
Lesson 1 maintaining internet safety(unit 1)
 
Privacy Primer
Privacy PrimerPrivacy Primer
Privacy Primer
 
Social Networking
Social NetworkingSocial Networking
Social Networking
 
Wk4 project
Wk4 projectWk4 project
Wk4 project
 

Similar to Digital Identity

[r]evolution Digital Literacy Workshop Slides
[r]evolution Digital Literacy Workshop Slides[r]evolution Digital Literacy Workshop Slides
[r]evolution Digital Literacy Workshop Slides
NathanielCarlson2
 
Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...
Justin Denton
 
Tot edu eng.
Tot edu eng.Tot edu eng.
Tot edu eng.
Mohamed ElGabry
 
Cyber Awareness.pptx
Cyber Awareness.pptxCyber Awareness.pptx
Cyber Awareness.pptx
adblue2017
 
2. ETECH Module 2 - Internet Safety and Security.pptx
2. ETECH Module 2 - Internet Safety and Security.pptx2. ETECH Module 2 - Internet Safety and Security.pptx
2. ETECH Module 2 - Internet Safety and Security.pptx
Karmel7
 
Building a safer presence on the web
Building a safer presence on the webBuilding a safer presence on the web
Building a safer presence on the web
jhollatz
 
Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?
Kirsten Thompson
 
Digital Self
Digital SelfDigital Self
Digital Self
AngeloMirabel
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awareness
Karan Veer Singh
 
protecting your digital personal life
protecting your digital personal lifeprotecting your digital personal life
protecting your digital personal life
Nathan Lesser
 
Digital citizenship pp
Digital citizenship ppDigital citizenship pp
Digital citizenship pp
Katie Ward
 
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
Commonwealth Telecommunications Organisation
 
Digital Identity (Digital ATL)
Digital Identity (Digital ATL)Digital Identity (Digital ATL)
Digital Identity (Digital ATL)
Deborah Gonzalez, Esq.
 
Cyber Security Awareness October 2014
Cyber Security Awareness October 2014Cyber Security Awareness October 2014
Cyber Security Awareness October 2014
Donald E. Hester
 
Reining in the Data ITAG tech360 Penn State Great Valley 2015
Reining in the Data   ITAG tech360 Penn State Great Valley 2015 Reining in the Data   ITAG tech360 Penn State Great Valley 2015
Reining in the Data ITAG tech360 Penn State Great Valley 2015
Andrew Schwabe
 
INTERNET SAFER DAY-2021.pptx
INTERNET SAFER DAY-2021.pptxINTERNET SAFER DAY-2021.pptx
INTERNET SAFER DAY-2021.pptx
Triveni Prabaakar
 
Digital Literacy Fundamentals.pptx
Digital Literacy Fundamentals.pptxDigital Literacy Fundamentals.pptx
Digital Literacy Fundamentals.pptx
Excellence Foundation for South Sudan
 
Online Safety, Security, Ethics and Netiquette.pptx
Online Safety, Security, Ethics  and Netiquette.pptxOnline Safety, Security, Ethics  and Netiquette.pptx
Online Safety, Security, Ethics and Netiquette.pptx
Bobby Dait
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
shubham ghimire
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
Rayanehaz
 

Similar to Digital Identity (20)

[r]evolution Digital Literacy Workshop Slides
[r]evolution Digital Literacy Workshop Slides[r]evolution Digital Literacy Workshop Slides
[r]evolution Digital Literacy Workshop Slides
 
Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...
 
Tot edu eng.
Tot edu eng.Tot edu eng.
Tot edu eng.
 
Cyber Awareness.pptx
Cyber Awareness.pptxCyber Awareness.pptx
Cyber Awareness.pptx
 
2. ETECH Module 2 - Internet Safety and Security.pptx
2. ETECH Module 2 - Internet Safety and Security.pptx2. ETECH Module 2 - Internet Safety and Security.pptx
2. ETECH Module 2 - Internet Safety and Security.pptx
 
Building a safer presence on the web
Building a safer presence on the webBuilding a safer presence on the web
Building a safer presence on the web
 
Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?
 
Digital Self
Digital SelfDigital Self
Digital Self
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awareness
 
protecting your digital personal life
protecting your digital personal lifeprotecting your digital personal life
protecting your digital personal life
 
Digital citizenship pp
Digital citizenship ppDigital citizenship pp
Digital citizenship pp
 
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
 
Digital Identity (Digital ATL)
Digital Identity (Digital ATL)Digital Identity (Digital ATL)
Digital Identity (Digital ATL)
 
Cyber Security Awareness October 2014
Cyber Security Awareness October 2014Cyber Security Awareness October 2014
Cyber Security Awareness October 2014
 
Reining in the Data ITAG tech360 Penn State Great Valley 2015
Reining in the Data   ITAG tech360 Penn State Great Valley 2015 Reining in the Data   ITAG tech360 Penn State Great Valley 2015
Reining in the Data ITAG tech360 Penn State Great Valley 2015
 
INTERNET SAFER DAY-2021.pptx
INTERNET SAFER DAY-2021.pptxINTERNET SAFER DAY-2021.pptx
INTERNET SAFER DAY-2021.pptx
 
Digital Literacy Fundamentals.pptx
Digital Literacy Fundamentals.pptxDigital Literacy Fundamentals.pptx
Digital Literacy Fundamentals.pptx
 
Online Safety, Security, Ethics and Netiquette.pptx
Online Safety, Security, Ethics  and Netiquette.pptxOnline Safety, Security, Ethics  and Netiquette.pptx
Online Safety, Security, Ethics and Netiquette.pptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 

Recently uploaded

Assignment 2 Task 1: Digital Marketing Course
Assignment 2 Task 1: Digital Marketing CourseAssignment 2 Task 1: Digital Marketing Course
Assignment 2 Task 1: Digital Marketing Course
klaudiadgmkt
 
What Software is Used in Marketing in 2024.
What Software is Used in Marketing in 2024.What Software is Used in Marketing in 2024.
What Software is Used in Marketing in 2024.
Ishaaq6
 
Lily Ray - Optimize the Forest, Not the Trees: Move Beyond SEO Checklist - Mo...
Lily Ray - Optimize the Forest, Not the Trees: Move Beyond SEO Checklist - Mo...Lily Ray - Optimize the Forest, Not the Trees: Move Beyond SEO Checklist - Mo...
Lily Ray - Optimize the Forest, Not the Trees: Move Beyond SEO Checklist - Mo...
Amsive
 
Mastering SEO for Google in the AI Era - Dennis Yu
Mastering SEO for Google in the AI Era - Dennis YuMastering SEO for Google in the AI Era - Dennis Yu
Luxury Hanloom Saree Brand ,Capstone Project_Kiran Bansal.pdf
Luxury Hanloom Saree Brand ,Capstone Project_Kiran Bansal.pdfLuxury Hanloom Saree Brand ,Capstone Project_Kiran Bansal.pdf
Luxury Hanloom Saree Brand ,Capstone Project_Kiran Bansal.pdf
KiranRai75
 
Story Telling Master Class - Jennifer Morilla
Story Telling Master Class - Jennifer MorillaStory Telling Master Class - Jennifer Morilla
From Hope to Despair The Top 10 Reasons Businesses Ditch SEO Tactics.pptx
From Hope to Despair The Top 10 Reasons Businesses Ditch SEO Tactics.pptxFrom Hope to Despair The Top 10 Reasons Businesses Ditch SEO Tactics.pptx
From Hope to Despair The Top 10 Reasons Businesses Ditch SEO Tactics.pptx
Boston SEO Services
 
Top Strategies for Building High-Quality Backlinks in 2024 PPT.pdf
Top Strategies for Building High-Quality Backlinks in 2024 PPT.pdfTop Strategies for Building High-Quality Backlinks in 2024 PPT.pdf
Top Strategies for Building High-Quality Backlinks in 2024 PPT.pdf
1Solutions Pvt. Ltd.
 
Boost Your Instagram Views Instantly Proven Free Strategies.
Boost Your Instagram Views Instantly Proven Free Strategies.Boost Your Instagram Views Instantly Proven Free Strategies.
Boost Your Instagram Views Instantly Proven Free Strategies.
InstBlast Marketing
 
Crafting Seamless B2B Customer Journeys - Strategies for Exceptional Experien...
Crafting Seamless B2B Customer Journeys - Strategies for Exceptional Experien...Crafting Seamless B2B Customer Journeys - Strategies for Exceptional Experien...
Crafting Seamless B2B Customer Journeys - Strategies for Exceptional Experien...
DigiMarCon - Digital Marketing, Media and Advertising Conferences & Exhibitions
 
Evaluating the Effectiveness of Women-Focused Marketing
Evaluating the Effectiveness of Women-Focused MarketingEvaluating the Effectiveness of Women-Focused Marketing
Evaluating the Effectiveness of Women-Focused Marketing
HighViz PR
 
janani Digital Marketer|Digital Marketing consultant|Marketing Promotion|Coim...
janani Digital Marketer|Digital Marketing consultant|Marketing Promotion|Coim...janani Digital Marketer|Digital Marketing consultant|Marketing Promotion|Coim...
janani Digital Marketer|Digital Marketing consultant|Marketing Promotion|Coim...
janudm24
 
SEO in the AI Era - Trust, Quality and Content Discovery - Andy Crestodina
SEO in the AI Era - Trust, Quality and Content Discovery - Andy CrestodinaSEO in the AI Era - Trust, Quality and Content Discovery - Andy Crestodina
SEO in the AI Era - Trust, Quality and Content Discovery - Andy Crestodina
DigiMarCon - Digital Marketing, Media and Advertising Conferences & Exhibitions
 
DCC Technology Intro Slides June 2024.pptx
DCC Technology Intro Slides June 2024.pptxDCC Technology Intro Slides June 2024.pptx
DCC Technology Intro Slides June 2024.pptx
vishc81
 
Spotify: Revolutionizing the Music Streaming Industry
Spotify: Revolutionizing the Music  Streaming IndustrySpotify: Revolutionizing the Music  Streaming Industry
Spotify: Revolutionizing the Music Streaming Industry
TMR Infra
 
Efficient Website Management for Digital Marketing Pros
Efficient Website Management for Digital Marketing ProsEfficient Website Management for Digital Marketing Pros
Efficient Website Management for Digital Marketing Pros
Lauren Polinsky
 
Data-Driven Personalization - Build a Competitive Advantage by Knowing Your C...
Data-Driven Personalization - Build a Competitive Advantage by Knowing Your C...Data-Driven Personalization - Build a Competitive Advantage by Knowing Your C...
Data-Driven Personalization - Build a Competitive Advantage by Knowing Your C...
DigiMarCon - Digital Marketing, Media and Advertising Conferences & Exhibitions
 
PickUp_conversational AI_Capex, Inc._20240611
PickUp_conversational AI_Capex, Inc._20240611PickUp_conversational AI_Capex, Inc._20240611
PickUp_conversational AI_Capex, Inc._20240611
Shuntaro Kogame
 
How to Start Affiliate Marketing with ChatGPT- A Step-by-Step Guide (1).pdf
How to Start Affiliate Marketing with ChatGPT- A Step-by-Step Guide (1).pdfHow to Start Affiliate Marketing with ChatGPT- A Step-by-Step Guide (1).pdf
How to Start Affiliate Marketing with ChatGPT- A Step-by-Step Guide (1).pdf
SimpleMoneyMaker
 

Recently uploaded (20)

Assignment 2 Task 1: Digital Marketing Course
Assignment 2 Task 1: Digital Marketing CourseAssignment 2 Task 1: Digital Marketing Course
Assignment 2 Task 1: Digital Marketing Course
 
What Software is Used in Marketing in 2024.
What Software is Used in Marketing in 2024.What Software is Used in Marketing in 2024.
What Software is Used in Marketing in 2024.
 
Lily Ray - Optimize the Forest, Not the Trees: Move Beyond SEO Checklist - Mo...
Lily Ray - Optimize the Forest, Not the Trees: Move Beyond SEO Checklist - Mo...Lily Ray - Optimize the Forest, Not the Trees: Move Beyond SEO Checklist - Mo...
Lily Ray - Optimize the Forest, Not the Trees: Move Beyond SEO Checklist - Mo...
 
Mastering SEO for Google in the AI Era - Dennis Yu
Mastering SEO for Google in the AI Era - Dennis YuMastering SEO for Google in the AI Era - Dennis Yu
Mastering SEO for Google in the AI Era - Dennis Yu
 
Luxury Hanloom Saree Brand ,Capstone Project_Kiran Bansal.pdf
Luxury Hanloom Saree Brand ,Capstone Project_Kiran Bansal.pdfLuxury Hanloom Saree Brand ,Capstone Project_Kiran Bansal.pdf
Luxury Hanloom Saree Brand ,Capstone Project_Kiran Bansal.pdf
 
Story Telling Master Class - Jennifer Morilla
Story Telling Master Class - Jennifer MorillaStory Telling Master Class - Jennifer Morilla
Story Telling Master Class - Jennifer Morilla
 
From Hope to Despair The Top 10 Reasons Businesses Ditch SEO Tactics.pptx
From Hope to Despair The Top 10 Reasons Businesses Ditch SEO Tactics.pptxFrom Hope to Despair The Top 10 Reasons Businesses Ditch SEO Tactics.pptx
From Hope to Despair The Top 10 Reasons Businesses Ditch SEO Tactics.pptx
 
Top Strategies for Building High-Quality Backlinks in 2024 PPT.pdf
Top Strategies for Building High-Quality Backlinks in 2024 PPT.pdfTop Strategies for Building High-Quality Backlinks in 2024 PPT.pdf
Top Strategies for Building High-Quality Backlinks in 2024 PPT.pdf
 
Boost Your Instagram Views Instantly Proven Free Strategies.
Boost Your Instagram Views Instantly Proven Free Strategies.Boost Your Instagram Views Instantly Proven Free Strategies.
Boost Your Instagram Views Instantly Proven Free Strategies.
 
Crafting Seamless B2B Customer Journeys - Strategies for Exceptional Experien...
Crafting Seamless B2B Customer Journeys - Strategies for Exceptional Experien...Crafting Seamless B2B Customer Journeys - Strategies for Exceptional Experien...
Crafting Seamless B2B Customer Journeys - Strategies for Exceptional Experien...
 
Evaluating the Effectiveness of Women-Focused Marketing
Evaluating the Effectiveness of Women-Focused MarketingEvaluating the Effectiveness of Women-Focused Marketing
Evaluating the Effectiveness of Women-Focused Marketing
 
janani Digital Marketer|Digital Marketing consultant|Marketing Promotion|Coim...
janani Digital Marketer|Digital Marketing consultant|Marketing Promotion|Coim...janani Digital Marketer|Digital Marketing consultant|Marketing Promotion|Coim...
janani Digital Marketer|Digital Marketing consultant|Marketing Promotion|Coim...
 
SEO in the AI Era - Trust, Quality and Content Discovery - Andy Crestodina
SEO in the AI Era - Trust, Quality and Content Discovery - Andy CrestodinaSEO in the AI Era - Trust, Quality and Content Discovery - Andy Crestodina
SEO in the AI Era - Trust, Quality and Content Discovery - Andy Crestodina
 
DCC Technology Intro Slides June 2024.pptx
DCC Technology Intro Slides June 2024.pptxDCC Technology Intro Slides June 2024.pptx
DCC Technology Intro Slides June 2024.pptx
 
Spotify: Revolutionizing the Music Streaming Industry
Spotify: Revolutionizing the Music  Streaming IndustrySpotify: Revolutionizing the Music  Streaming Industry
Spotify: Revolutionizing the Music Streaming Industry
 
Efficient Website Management for Digital Marketing Pros
Efficient Website Management for Digital Marketing ProsEfficient Website Management for Digital Marketing Pros
Efficient Website Management for Digital Marketing Pros
 
Data-Driven Personalization - Build a Competitive Advantage by Knowing Your C...
Data-Driven Personalization - Build a Competitive Advantage by Knowing Your C...Data-Driven Personalization - Build a Competitive Advantage by Knowing Your C...
Data-Driven Personalization - Build a Competitive Advantage by Knowing Your C...
 
Unleash the Power of Storytelling - Win Hearts, Change Minds, Get Results - R...
Unleash the Power of Storytelling - Win Hearts, Change Minds, Get Results - R...Unleash the Power of Storytelling - Win Hearts, Change Minds, Get Results - R...
Unleash the Power of Storytelling - Win Hearts, Change Minds, Get Results - R...
 
PickUp_conversational AI_Capex, Inc._20240611
PickUp_conversational AI_Capex, Inc._20240611PickUp_conversational AI_Capex, Inc._20240611
PickUp_conversational AI_Capex, Inc._20240611
 
How to Start Affiliate Marketing with ChatGPT- A Step-by-Step Guide (1).pdf
How to Start Affiliate Marketing with ChatGPT- A Step-by-Step Guide (1).pdfHow to Start Affiliate Marketing with ChatGPT- A Step-by-Step Guide (1).pdf
How to Start Affiliate Marketing with ChatGPT- A Step-by-Step Guide (1).pdf
 

Digital Identity

  • 1. F.A.C.E.S A guide to digital identity
  • 2. What is a Digital Identity • A digital identity is an online or networked identity adopted or claimed in cyberspace by an individual, organization or electronic device (Techopedia.com, 2017).
  • 3. How many Digital Identity should you have? - How good is your digital literacies? - Are you a digital resident or digital visitor? - What do you use the Web for? (Based on digital differences)
  • 4. Freedom • Degree to which your digital identity(ies) gives you freedom in what you do online. (Cserni and Talmud, 2017) • Freedom refers to the behavior you portray online and the content you share and create.
  • 5. Freedom Single • Overall, not much freedom is felt. • Individuals have to be wary of their actions as what they post on social media is seen by family, friends, colleagues, business partners etc. • Leading to ‘unintended’ negative effects. Multiple • There is freedom to do anything you want. • Various digital identities are segmented to target specific group of interest. Eg. A separate Instagram account just to post pictures of your own pet or food. • Removes the risk of an ‘unintended’ negative effect.
  • 6. Authenticity • Degree to which your digital identity(ies) portrays integrity, trustworthiness and authenticity. • How similar are your digital identity is to yourself in the real world? • Do you have anything to hide? Especially from an employer point of view
  • 7. Authenticity Single • Has high authenticity. • One account means all the information about an individual is all there. • He/she as nothing to hide. Multiple • Low in authenticity. • Having multiple identity will dilute an individual’s own image. • One Instagram account used for food, another used for cat photos. Has no real meaning to the identity.
  • 8. Cyber Crimes • Degree to which your digital identity(ies) enables you to perform illegal activities. • Based on whether your account is anonymous or not • Not that everyone will do such illegal activities, but there are some who will misuse the internet. • Such activities include, cyber bullying, trolling, online fraud/scams.
  • 9. Cyber Crimes Single • Less likely to enable cyber crimes • If an individual does perform such crimes, as the digital footprint is very obvious and is easily traced back to you. Multiple • More likely to enable cyber crimes • Having multiple accounts reduces the risk of having the crime traced back to you. • Especially if your digital identity is anonymous
  • 10. Effort • Degree of effort needed to manage your digital identity(ies) • Effort meaning to develop and build on your digital network for a respective digital identity.
  • 11. Effort Single • Very easy to manage the digital identity. • Everything happens in one place Multiple • Very exhausting to manage multiple digital identities • Young adults who use seven to 11 different platforms are more than three times more likely to report depressive symptoms (Liberatore, 2016)
  • 12. Security • Degree of security and privacy experienced from your digital identity(ies) • Is your digital identity prone to identity theft? • Do you leave behind a substantial amount of digital footprint?
  • 13. Security Single • Highly unsecure • Prone to identity theft • Activities online are easily traced back to you Multiple • Very Secure • Not prone to identity theft • Nearly untraceable digital footprint