An Introduction to Digital Identity

What is a Digital Identity?

So, what is digital identity? A great number of us often believe that digital identity is strictly about how we present ourselves online and to be quite honest, before reading the articles and watching the videos that have been provided, I believed exactly that. It’s clear to me now however, that our digital identities are much more sophisticated than that. In fact, our digital identities consist of everything that we do on the web (Stroller, 2016). Stroller (2016) discusses how our digital identity can essentially be a pre-interview for potential employers, which is extremely beneficial. That’s why it’s so crucial for us to think about what we’re posting before sending it off to the internet. Manju George (2019) reminds us that digital identities even play a big role in digital economies and society, which is another critical reason we must shape our online identities thoughtfully. To sum it up in the words of Stoller (2016), “digital identity is sort of your footprint on the web” (0:23). This can include anything such as your blogs, posts, comments, portfolio, work, or anything that you interact with online (Stoller, 2016). As we can see, digital identity is much more than how we present ourselves online!

 

How do Personal Versus Professional Approaches to Digital Identity Affect Social Media Use?

            Personal versus professional approaches to digital identity affect social media use by influencing the decision of what gets posted online and what does not. A user who is using social media for personal reasons might post things that they are not expecting potential employers to see. An example of this is how many individuals have a “finsta,” which is a slang word for a “fake” Instagram account. People use these secondary accounts to post things that they may not want their bigger following to see on their main account and they will often adjust the privacy settings to a private account, which means that only people who are following them can view their content. Although, it’s important to note that the posted material can easily be screenshotted or video recorded by others, and shared with people who were not meant to see it.

How do Digital Identities Converge in Networked Publics

There are a number of ways that digital identities can converge in networked publics. Social media is a great example of how this may happen. Specifically, social media platforms such as Instagram where we display our digital identities with one another. Simply following, liking, or commenting on someone else’s posts is a way in which our digital identities can converge. This can be beneficial for users because it can lead to opportunities that might have otherwise been missed. One example of this is the job searching website Indeed, where I happened to find my current job at Starbucks. When a user submits their resume onto the website, employers can easily find it and communicate with them about a job offer. Another benefit is one that I noticed many people discussing in our recent blogs, which is having access to constant support. Our digital identities provide endless support for an infinite amount of “things” that an individual may need help with or information about.

 

Can a Digital Wallet Provide Trust in Networked Publics?

            Digital wallets provide ease of access to an individual’s banking cards. They are beneficial because it allows users to access all of their money simply with their phone, prevents them from losing their cards, and it averts theft. There is always skepticism when putting your personal information online, but in this day and age, people have their entire lives posted on the web. Online banking is a relatively new thing for our world; however, with rapidly adapting technology and concern for one’s privacy, there are now more ways to keep certain personal information private, which builds trust between users and organizations. Trust comes from “control, privacy, agency, confidence for the data that you’ve signed up for is not going to be exploited” (Kubanzsky, 2019, 23:00). I agree with this statement, especially the idea of agency because people believe something to be more trustworthy if they have more power of it. A great example of this is how online applications need to ask for our permissions in order to send us notifications or access our location. Personally, I would feel very hesitant to trust an application that just began sending me notifications and accessing my location without my permission!

Stoller, Eric. “Eric Stoller – What is Digital Identity?” YouTube, uploaded by University of Derby, 25 November 2016, https://youtu.be/u0RryRbJza0

Schmitt, George. “Davos 2019 – Press Conference The Value of Digital Identity for the Global Economy and Society.” Presented by George, M., Kubzansky, M., Nilekani, N., Ratas, J., Snapp, M. YouTube, uploaded by World Economic Forum, 5 February 2019, https://youtu.be/1-V7lyxrOmw

You may also like...

4 responses

  1. brownsugar says:

    Hi Conrod! Great read! I like how you integrated the quote to highlight the importance of control, privacy, and agency in association with trust! However, do you see any specific manner where digital wallet, while ensuring these 3 things, can violate them? Perhaps, in the sense of making transactions? Digital wallets are designed to protect their user’s information however, during transactions, your data is shared with the seller and at times, that data can also be used/analyzed by brokers and other merchants. Imagine buying something on the internet from let’s say H&M. You enter your billing data, sharing it with H&M, who then employ another party to assess the transaction and carry it out, now sharing your data with 2 companies. Then this transaction is shared with your bank, so you can see how making a simple transaction, using a digital wallet which ensures control, privacy, and agency violates these things such that indirectly, your information was shared with 2 companies- with one being undirected and involuntary. This is just an example, perhaps you can find another example such as maybe something to do with tracking. Debit and credit cards, physical or digital, can be used as tracking…

    • conradw27 says:

      Thank you for the comment! You bring up a great point about the involuntary sharing of personal information. It’s interesting how much trust our society puts into things that most of us know so little about, such as sharing our full names, pictures, locations, and even our credit card information. Even using our credit card, physical or digital, adds to our digital footprint by tracking things we buy, where we buy them, and when we buy them.

  2. michellebannister says:

    I am intrigued by your comment, when you say it adverts theft….Have you ever had your identity or information compromised?

    • conradw27 says:

      Hi Michelle,

      Thank you for the comment! Luckily enough, I have not had my identity or information compromised, however, I know far too many people that have! I think many of us have misplaced our debit or credit cards and become terrified about who may get their hands on them, especially with card features such as tap to pay!

Leave a Reply

Your email address will not be published. Required fields are marked *