Online identities forming the “Semantic Web”

The argument for and against multiple online identities is inevitable. As I took on a very skeptical approach towards the topic, I was drawn into mostly the negative aspects that overshadow the real value of the argument. However, after gathering much insight from the various works of my peers, it was clear to me that I have been missing out on the constructive aspect of the argument.

I was very much drawn by Jeanne’s post on how our online identities may impact our employability. As she was discussing this from a view of having a distinct separation between personal and professional sphere, I realized that it was merely impossible to draw this line. After the Hangout#6 with Cristina Costa, I was intrigued by her view on “personal branding” of our online identity. I supported her stand on having a single identity, which we would be in much control of, rather than having multiple identities to draw the line.

Another work that I was pretty fascinated even though the point was briefly mentioned was Angie’s post. She mentioned about how it is a “marketers’ dream come true” when we “sign off” our personal data upon engaging in social media activities. This is prominent, as we have embarked on Web 2.0, where the primary focus is on “interactivity”. This is evident even on sites that require the use of cookies to collect data about our online engagement. As users, we have to be aware of the privacy issues that may be questionable. From a marketing perspective, this is simply astonishing.

The Web is slowly learning our identities, how we behave, who we are. I do strongly believe that with the existence of the “Semantic Web” in the not too distant future, our online identities will play a huge role both in the marketing perspective and our professional lives.

References:

Chu, J., 2014. Who are you, exactly? Available at: https://jeannechucy.wordpress.com/2014/12/01/who-are-you-online-identity/#respond [Accessed December 2, 2014].

Costa, C. & Torres, R., 2011. To be or not to be , the importance of Digital Identity in the networked society. Available at: http://eft.educom.pt/index.php/eft/article/view/216/126.

Ng, A., 2014. Is your digital footprint within your control? Available at: http://yjangie.wordpress.com/2014/12/01/is-your-digital-footprint-within-your-control/comment-page-1/#comment-9 [Accessed December 2, 2014].

TED, 2013. What will a future without secrets look like? TED. Available at: http://www.ted.com/talks/alessandro_acquisti_why_privacy_matters [Accessed December 1, 2014].

Wired, 2014. From E-Commerce to Web 3.0: Let the bots do the shopping. Wired. Available at: http://www.wired.com/2014/09/e-commerce-to-web-3-0/ [Accessed December 1, 2014].

Comments made on:

Chu, J., 2014. Who are you, exactly? Available at: https://jeannechucy.wordpress.com/2014/12/01/who-are-you-online-identity/#respond [Accessed December 2, 2014].

Ng, A., 2014. Is your digital footprint within your control? Available at: http://yjangie.wordpress.com/2014/12/01/is-your-digital-footprint-within-your-control/comment-page-1/#comment-9 [Accessed December 2, 2014].

An online identity, merely an illusion?

medium_13334048894Before embarking on the argument for and against having more than one online identity, a proper definition of “online identity” is imperative.

As defined by Internet Society (2014), an online identity is made up of partial identities that represent “you” upon visiting various websites. This may be both voluntary upon leaving your details to create an account or even involuntary where someone who knows you, leave any details about you.

As how this term is defined, it automatically triggers an argument, whether is it really within our control to have an online identity. What more to have more than one online identity? Costa & Torres (2011) argued that while the dilemma of having a separate identity between personal and work is inevitable, the credibility is questioned when the two is separated. I do believe that there is some validity in the argument. While I myself have separate accounts to deal with personal and work, I have to say that it is merely an illusion. I am pretty sure most of us have tried “searching” ourselves on Google. The results are quite staggering and some of us have no idea what we are really in control of.

This control of our online identity may be questioned as we embarked on the Web 2.0, where the primary focus was on interactivity. Where the web was once a “static and passive” tool for the users, “anonymity” was a luxury for the users of the Web 1.0. Convenience has led a move towards the “interactive” web where our online identities are created. While the question whether one should have multiple identities online is merely an illusion: that we have created a “private account” that can only be accessed by those granted permission. But to what extent is this control within our hands.

The argument for and against multiple identities was not evaded on purpose in this post. However, it is imperative to understand that as we are slowly moving into the Web 3.0 also known as the “Semantic Web”, we are sacrificing our online identities for convenience once again. The question is whether it is worth it. As more details about us are being captured, the more valuable it is to organizations. Commercialization has created the Web this way and makes our identities even so much vulnerable. So will the argument for and against multiple identities still exist when we lack control in the first place?

References:

Costa, C. & Torres, R., 2011. To be or not to be , the importance of Digital Identity in the networked society. Available at: http://eft.educom.pt/index.php/eft/article/view/216/126.

PCWorld, 2012. Data Snatchers! The booming market for your online identity. PCWorld. Available at: http://www.pcworld.com/article/258034/data_snatchers_the_booming_market_for_your_online_identity.html [Accessed December 1, 2014].

Society, I., 2014. Online Identity: An Overview. Internet Society. Available at: http://www.internetsociety.org/online-identity-overview [Accessed December 1, 2014].

TED, 2013a. Everyday cybercime – and what you can do about it. TED. Available at: http://www.ted.com/talks/james_lyne_everyday_cybercrime_and_what_you_can_do_about_it?awesm=on.ted.com_b07kc [Accessed December 1, 2014].

TED, 2013b. What will a future without secrets look like? TED. Available at: http://www.ted.com/talks/alessandro_acquisti_why_privacy_matters [Accessed December 1, 2014].

Wired, 2014. From E-Commerce to Web 3.0: Let the bots do the shopping. Wired. Available at: http://www.wired.com/2014/09/e-commerce-to-web-3-0/ [Accessed December 1, 2014].

photo credit: Yuri Yu. Samoilov via photopin cc