From the Justine Sacco episode, it dawned on me that the receivers’ interpretation of the message plays a significant role, since human interaction constitute a huge part of the Web (Communication Processes, 2017). It also got me thinking – one does not have to hold an online profile to garner a reputation for him/herself (Jon Ronson, 2015). The problem with identifying anonymity is it’s lack of “compassion”; disregarding people who want a clean slate (divorcees or ex-convicts) (The Guardian, 2012).
I concur with Helena that digital visitors should favorably adopt a single identity, due to their low footprints, as it would seek to maintain usage integrity, running little risk of falling prey to/being convicted of Internet crimes. Prior to chancing upon her blog, I did not the consider the true value of our virtual data, hence the magnitude of (not) securing it.
Evelyn, while maintaining an egalitarian stance on identity approach, dished out an overlooked terminology – Contextual Collapse. Her blog brought about thought-provoking insights, such as the proneness of children to falling into dissociative behaviors and digital “schizophrenia”.
Of the many hats I wear, as a marketer, balancing authenticity with sales, is indeed trying. In the business world, where ‘face’ is the name of the game, it’s important to fit into the mold. It also got me thinking, the reason why many parent companies have a subset of brands (selling different products or services), this avoids dilution of the child brand, likewise with their online identities (WIRED, 2014). As a regular internet user, the many profiles have elevated my literacy. But within that is a harmony of the identities.
Ultimately, it boils down to one’s choice of being ethically responsible. As Singapore aims to bring our national registered identity to the Web, data security is further warranted (THAM, 2017). Could this be the coming of age?
Count: 300 words
Communication Process . 2017. Communication Process . [ONLINE] Available at: https://web.njit.edu/~lipuma/352comproc/comproc.htm. [Accessed 22 November 2017].
Jon Ronson. 2015. How One Stupid Tweet Blew Up Justine Saccoâs Life – The New York Times. [ONLINE] Available at: https://www.nytimes.com/2015/02/15/magazine/how-one-stupid-tweet-ruined-justine-saccos-life.html?_r=1. [Accessed 22 November 2017].
The Guardian. 2012. Aleks Krotoski talks to Andrew Lewman on Tor and anonymity online | Technology | The Guardian. [ONLINE] Available at: https://www.theguardian.com/technology/audio/2012/apr/24/tech-weekly-podcast-tor-anonymity. [Accessed 22 November 2017].
The Guardian. 2012. Online identity: is authenticity or anonymity more important? | Technology | The Guardian. [ONLINE] Available at: https://www.theguardian.com/technology/2012/apr/19/online-identity-authenticity-anonymity. [Accessed 22 November 2017].
WIRED: WIRED. 2014. The Online Identity Crisis | WIRED. [ONLINE] Available at: https://www.wired.com/insights/2014/11/the-online-identity-crisis/. [Accessed 22 November 2017].
Help Net Security. 2010. The importance of identity in the digital age – Help Net Security. [ONLINE] Available at: https://www.helpnetsecurity.com/2010/12/20/the-importance-of-identity-in-the-digital-age/. [Accessed 22 November 2017].
Forbes.com. 2015. Forbes Welcome. [online] Available at: https://www.forbes.com/sites/metabrown/2015/09/30/when-and-where-to-buy-consumer-data-and-12-companies-who-sell-it/#3f7afa463285 [Accessed 22 November 2017].
THAM, I. 2017. Coming your way: An NRIC – but in digital form on your smartphone. [online] The Straits Times. Available at: http://www.straitstimes.com/tech/new-digital-identity-system-in-the-works [Accessed 22 November 2017].