Topic 2 Relfection

I found topic 2: the exploration of multiple digital identities, very interesting to explore. I started this topic by evaluating my own stance on my digital identity and conveyed by thoughts through the post.

Following the feedback given to me from the completion of the primary task as well as my own desired achievement, I developed 3 main aims:

1) To include more/most of the course sources in the body of my assignment.

2) To include more argument in my development of the topic.

3) To increase the number of visual elements in all areas of the topic.

In the video below you can see the collection of materials I used to develop the post.

In terms of aim number two, I felt as though I spent a clear majority of my argument covering the issue of privacy and its relationship to the creation of multiple identities. However, reviewing my work for the reflection I feel as though it may have been beneficial to me and the reader had I had a more balanced and clear argument. Therefore, I will set this aim as an ongoing development for myself as I explore the module.

In the collage below I have displayed the different visual elements that I embedded into the post. Additionally, I enjoyed being able to discuss image development through the comment sections on Harriet’s and Charley’s posts.


For the reflection post, I would like to take the opportunity to set myself a target for the following week’s project. My target for topic 3 is to advance my arguments using images and theory to expand on my exploration of the topic.

Word Count: 272


Multimedia material from – Schofield, M. (2017) Topic 2 – is there a benefit to having multiple digital identities? Available at: (Accessed: 5 March 2017).

Original Sources:

Topic 2 – Is there a Benefit to having Multiple Digital Identities?

To understand the arguments surrounding identity, one must understand the meaning and the process of its development. According to Techopedia (n.d.), a digital identity is comprised of key data attributes – username, date of birth, online search activity, etc. – and digital identifiers – email address, domain name, etc.- claimed in cyberspace to reflect an individual or organisation.


The graphic above demonstrates “7 Steps To Building Your Digital Identity”. These factors can be adapted to a single or multiple personas to reflect an individual’s social character, professional position, or desire to be anonymous.

Cristina Costa and Ricardo Torres (2011, p.g.49) highlight that the development of a digital identity provides “exposure and new forms of community engagement”, such engagement can be on either a professional or social level. This open conversation platform positively enables users to develop knowledge and their network.

On the flipside, one of the biggest issues with a known digital identity is the potential for invasion of privacy. (n.d.) state that the risk of identity theft has “grown with the rapid changes in information sharing brought on by the internet”. Data protection has become a publically debated topic following data leaks of public figures and bodies. The clip below is captured from Snowden (2016), a film based on true events describing the illegal surveillance techniques that Edward Snowden revealed whilst working for NSA.

Recently I, along with many others in the UK, suffered a breach of my personal account whilst using a fast food delivery service. In my case several hundred pounds was removed via orders that I did not place.

Danish journalist Pernille Tranberg in her TedTalk, suggested methods to protect identities. She highlighted a site called fakenamegenerator which generated her a persona – much like the one I have created below – which she could use on sites where she did not want the information to affect her professional persona.

This slideshow requires JavaScript.

She claimed that 7 out of 10 recruiters reject people because of their profiles. Yet suggested that, the problem with fake identities is that Big Data can figure out which fake accounts belong to whom by correlating preferences and activities.

Privacy online has become of an increased concern to me due to my personal experiences, and I have noted that this has changed how I present myself online. With this I have become more restrictive on what information I give out however, I consider that I still maintain a single online identity.

Word Count: 402