Written Report Digital Self
Written Report Digital Self
Written Report Digital Self
Submitted by:
Asis, Ma. Reina Alvea V.
Dela Rosa, Mark Angelo D.V.
Maliwat, Antonio Jose J.
Padilla, Jensel Marie G.
OBTEC 1-15
People generally have role identities. These are the characters an individual creates as a member
of a particular social group. In an online environment, one’s role identity is vitally important in
order for an entity to project its desired character. Your digital self is your persona when you are
online and it may be different and nonreflective from the persona that you have in the real world.
Usually people create their digital self to be someone they are not in real life due to the fact that
there is much more sense of freedom virtually- generating a facade of digital identity to meet the
expectations of others by sharing the proudest moments online exhibiting their ideal selves.
Digital Identity is a representation of an entity in a specific context, its existence can be
perceived inside the realm of Digital World where the collective construction of digital systems
and technology in the contemporary society resides. In an online setting Digital Literacy is
exercised, it includes a wide variety of ethical, social and reflective practices that are embedded
in work, learning, leisure and daily life, in line with this are online disinhibitions. Benign
Disinhibition (indicates an attempt to understand and explore oneself) and Toxic Disinhibition
(the use of rude language, bully or threaten others on online platforms, and access to websites
with contents of violence, crime, and pornography). That’s why the existence of notions and
properties of Digital Identity are crucial in terms of the individual’s privacy and security. There
are 7 known notions and properties (Identifier, Uniqueness, Authentication, Anonymity,
Unlinkability, Linkability and Pseudonymity) respectively having their fair contribution with
your digital blueprint. Along with the concept of digital self is Digital Citizenship and it refers to
the responsible technology usage, it’s essential to efficiently practice digital literacy; Nine
themes of Digital Citizenship (Access, Commerce, Communication and Collaboration, Etiquette,
Fluency, Health and Welfare, Law, Responsibility, Security and Privacy). The S3
FRAMEWORK (Safety, Savvy, Social) is imposed and abided to maintain peace and order for a
safer digital space experience.
Introduction
Digital Self
At our most modern and challenging level of technologically led social changes lies the internet,
a global network of individual selves that find expression comparably transcending all cultural
restrictions. This can be witnessed in the notions of ‘profiles’ or ‘avatars’, and are found from
professional networks to social networks to recreational networks. Here then the individual
seems offered a clean sheet, and given the opportunity to transfer their sense of self into an
environment without restrictions. With your digital self you might choose to appear as living a
life of constant joy and success, again regardless of the reality of your life. Yet greater still lies
the notion of any sense of self not common between the ‘natural’ world and the digital, namely
the genetic chains of the body itself.
As such it appears the idea of a definable consistent singular ‘self’, far from being obviously
knowable, is in fact a tremendously difficult task that increases its complexity as our technology
expands. In the face of the question of responsibility, of taking responsibility for your true ‘self’
and then living true to that ‘self’, the lack of definition might scare us into allowing others
control over us. That’s why the full understanding of the importance of your Digital Self is
important.
Digital World
Digital Self
Digital Literacy
Online Disinhibitions
Digital Identity
Notions and Properties Associated with Digital Identity
Identifier
Uniqueness
Authentication
Anonymity
Unlinkabality
Linkability
Pseudonymity
Nine Themes of Digital Citizenship
Digital Access
Digital Commerce
Digital Communication and Collaboration
Digital Etiquette
Digital Fluency
Digital Health and Welfare
Digital Law
Digital Rights and Responsibility
Digital Security and Privacy
S3 Framework
Safety
Savvy
Social
Body
The Digital World is a place of digital technology where we can find our digital selves in.
Digital self is our persona when we use to interact with others online, most of the time it is
different from our real-world self. But why do we have this digital self? It is because we tend to
wear a mask online for the reason of blending in, we want to belong in the crowd and we desire
to boost our self-esteem. We are longing for the approval of others by gaining their likes and
positive feedbacks about ourselves. Resulting to the pretentious concealment of our real-life
identities.
The scope of Digital Literacy is not only about how knowledgeable we are with exercising
varieties of technology but also on how we act as a digital entity inside the digital world.
Meanwhile in Online Disinhibition, it is more of how people behave online in general. This
could have both and negative effects namely Benign Disinhibition which indicates an attempt to
comprehend and discover oneself and find a new way of being and Toxic Inhibition which can
go ugly. This is where people see foul languages, hate comments, anger, hatred or even death
threats online. This space shouldn’t be explored but people still choose to.
Identifiers- In the digital world identifiers are list of personal information acting as a foundation
for an individual to be digitally verified. It is a set of attributes that enables a software to connect
an identity to a digital entity.
Digital attributes: Date of Birth, Email Address, ID Numbers (SSN, driver’s license) and
Government Issued ID (passport, driver’s license, etc.) There are instances where even
biometrics (fingerprint, eye scan, 3D face map) are used to verify an individual’s identity.
Uniqueness- Individuality and exclusiveness of identifiers are highly observed within the naming
space of an application domain (PNU email inbox, ePNU, etc.) consequently giving permission
to the linkage of a single digital entity in the domain.
Authentication- Digital authentication is the process of verifying that the users or devices are
who or what they claim to be in order to enable access to sensitive applications, data and services
within the application domain. It is accomplished by stating their identifier and digital proof of
identity (credential) that they are truly the declared identity.
Digital authentication methods: Unique passwords, Preshared key (PSK), Biometric
authentication, Two-factor authentication, Device recognition
Anonymity- It is a condition of being anonymous and unidentifiable within the bounds of a
software domain. Presented as an alchemic event of the internet age. It can be a transformative,
disembodied state offering unprecedented freedoms for marginalized and dissenting voices. It
can also shelter malicious operators from discovery and consequence.
Applications related with anonymity: Curious Cat, Ask.fm, Hawaar, Twell.me
Linkability- this is the contrary of unlinkability, it is a crucial factor when tracing the identity of
someone or something who committed a cybercrime and is considered as a cybercriminal.
Pseudonymity- People post and share using pseudonyms, or pen names online, for variety of
reasons. Most pseudonym holders use an alternative name because they wish to remain
anonymous. Pseudonymity are digital information which is linked with a pseudonym.
Pseudonyms however can be exploited to reference an existing digital identity in an application
domain without knowing their authentic identification hence, linkability is possible.
Digital Citizenship refers to the appropriate and responsible use of technology to communicate
and engage with society on any level. Mark Ribble pointed out nine themes of Digital
Citizenship:
1. Digital Access is the accessibility of technology and internet to all.
Example:
The teacher asks her students to watch a 25-minute video about Globalization as their homework
and they have one week to finish the task and answer online quiz. For those who do not have
internet access at home, he offers them to:
a. come to his classroom during break
b. come to his classroom after class
c. take home a CD containing the video and printed quiz.
2. Digital Commerce is the buying and selling of goods online.
Example:
Cristy saw a post of a limited-edition book on a “Buy and Sell” group that costs almost half of its
original price, she checked first the account and noticed that he has no profile picture so Cristy
decided not to purchase since the seller asks for information related to bank account.
3. Digital Communication and collaboration is the exchange of information through any
digital platform.
Example:
There was a fire started at the canteen and since then, the parents directed their children
to bring cellphones to contact them in case of emergency. The students use their cellphones for
emergency purposes only.
4. Digital Etiquette is the standard conduct a digital user must have.
Example:
There was an error during the online quiz so the student sent an email to his professor in a formal
and appropriate way.
5. Digital Fluency is the process of understanding technology on how and when it is used.
Example:
A student has read a post about the cancellation of class on Monday but before sending to it their
group chat, he checked first the source and confirmed it through other news site.
6. Digital Health and Welfare is the physical and psychological well-being related to
technology use.
Example:
Gelo limits his screen time by setting his phone alarm every 2 hours.
7. Digital Law is the rules and policy made to manage the technology use.
Example:
I-15 has received files for their online class. They must follow the rules of their professors to not
share it with others unless part of the class.
8. Digital Rights and Responsibility is the freedom and responsibility extended to all
technology users.
Example:
A student has report and creates a PowerPoint presentation in which contains pictures of famous
celebrities. He searched images from Google and cited its resources in his slides.
9. Digital Security and Privacy is the precautions that users must take to assure safety.
Example:
A student received an email from a stranger containing a link that says he won a
jackpot. He ignored the file because he realized it might have virus that can attack his device.
S3 Framework
Digital Citizenship classifies nine foundational elements in the following three guiding
principles: Safe, Savvy and Social or what we call the S3. The principle of S3 are a way to
support, as well as reinforce the framework of the themes of a digital citizenship. Each
theme/element encompasses three levels of support (Safe, Savvy and Social) which could or
should be taught as soon as the users (children, teenagers, adults) can first pick up a device and
start to interact with it.
• The First Guiding Principle is Safety which focuses on protecting yourself and protecting
others and creates the base of digital citizenship.
• The Second Guiding Principle is Savvy which focuses on the concepts around educating
yourself and connecting with others.
• The Third Guiding Principle is Social which focuses on understanding each other and
helping everyone make decisions exemplifying our commitment to respect ourselves and respect
others.
Discussion
Sample Objective Test
1. Following the volleyball game, the team was in the locker room gathering their belongings.
Julie decided to take a quick shower since she was heading to a friend's house to study for an
exam, she had the following day. Annie, the team captain, thought it would be funny to use
her camera phone to take a photo of Julie in the shower. She quietly entered the shower area,
and took a quick photo of Julie. Annie runs back to the team bellowing with laughter. What
will you do if you witnessed the scenario?
A. Follow Annie along with the other girls on the team and rush home to post the photo on
their social networking site
B. You’ll intervene and delete the photo from Annie's camera phone and explains how
inappropriate it is to photograph someone without their permission.
C. You’ll take another photo with a different angle and create an album full of Julie’s photos
in the shower
D. Wait for Annie to go to the shower area and take photo of her to avenge what she did to
your teammate Julie.
2. Mika is pretending to be someone else online. She’s trying to stop it but she enjoys the likes
and comments she receives. How can she stop this?
A. Wait inside the computer shop and observe if the hacker will come back and sue him.
B. Refrain from using public desktops specially when checking your personal emails
containing private information.
C. Refuse from creating another email account forever and do all of her transactions
personally.
D. Wait for karma to do the trick and hope for the worst-case scenario to happen.
4. A grade 9 student feels frustrated by the comments of his classmates on his posted pictures
online about his sexuality. How can he address this problem?
5. Maria Mercedes received a text message stating that she won 10,000 dollars from an online
contest but for her to claim the prize she needs to provide the anonymous sender her full
bank account information. How should Maria respond with the given situation?
A. Give the necessary information to the anonymous sender and patiently wait for 10,000
dollars.
B. Tweet and let everybody know that she won the contest and will be rich next week.
C. Throw a party in celebration for her suspicious win from an online contest.
D. Ignore and block the anonymous number.
6. Hansel and Fita are viral online couples but an unfortunate event took place yesterday.
They’ve decided to end everything and publicly announce their breakup. The fans went wild
and the split backlashed resulting to bullying and hurtful comments towards Hansel the other
half of the couple. If you’re under the same juncture how will you deal with the problem?
A. Take a break from social media if it’s continuously taking its toll on your mental health
and wellness.
B. Pull a public stunt, propose and announce that you’ll be married the following year and l
log your fans are invited
C. Find someone new like Miss Rebisco to divert the attention of online spectators
D. Spread a rumor that Fita has a bad breath and only bathes once a week.
7. A personal information of a friend has been leaked out. How would you take action and Help
your friend?
8. A younger brother of yours accidentally opened an “age-restricted site’ in his phone. What
should you do to prevent situations like that to not happen again?
10. Angelie created a Facebook account providing all herpersonal information. What problem
could arise?
References