Wednesday, May 6, 2020
Cyber-Community and Cyber-Identity-Free-Samples for Students
Question: Discuss about the Cyber-Community and Cyber-Identity. Answer: Undoubtedly one of the greatest inventions in the history of Mankind has been the internet as the ease through which any regular person is able to access it. The way in which people interacted and communicated has been indeed radically changed by the introduction of internet where even telecommunication is possible. The internet which had initially been invented for military used has in the contemporary world become became a general feature of almost all computer devices around the world. As the internet can be easily and widely accessed it has become a significant influence on the society and its individuals. I did not have much knowledge about the significance of cyberidentity and cybercommunity in the contemporary world. In had a perception that cyberidentity and cybercommunity are moderate in nature and do not possess any significant harm to the society. People have been provided a new platform through which they can express their views and find people who have similar perspectiv es as it would be difficult for them to do such activities easily without the use of the internet. According to Roberts Indermaur and Spiranovic (2013) cyber identity or Internet identity is a sort of social identity which uses of the Internet create an established in online websites and communities. Nakamura and Chow (2013) define cyber identity as the actively portrait presentation of one's personality. I thought that people always choose their real names to establish their Internet identity however in reality Internet users also prefer to be using different names and be anonymous through identifying themselves using pseudonyms unrevealing only certain kind of information through which personality can be identified. The relationship of the user with certain social group which they are a part of online can also be used to identify the server identity of a person. Through detailed study on cyber identity I got the knowledge that some people can also be deceptive in relation to their identity on the Internet. In few online context such as online chats massive multiplayer online gam es Internet forums Internet users Virtually represent themselves by selecting an avatar which is a graphical image size of icon. Choosing search avatars maybe a certain kind of way through which the Internet identity is established. Whether or not The Identity established over the Internet can be trusted is derived from the interaction of such identity with other users. The association of Cyber identity and community is mostly through authentication which generally needs login and registration. Tracking cookies and IP address are also used by a few websites to identify users. The principles in relation to Cyber identity and how emerging Technology influences it is a subject area of research in feels like psychology Sociology and education. One of the notable examples is the online this inhibition effect which refers to the concept of uninhibited and advise behavior over the Internet which establishes through audience gratification and anonymity. The Internet provides a space to the users through which they have the possibility of exposing and expressing their identities in a social context. For instance identity is defined by people through creation of user profiles in social networking sites like Twitter LinkedIn or Facebook. More tactic identities are defined when the individuals by providing opinions and blogs over search social networking sites. There may be a certain issues related to privacy with the disclosure of cyber identity. Strategies are adopted by many people through which they can control the disclosure of their personal identity over the Internet. Some of these strategies require significant investment of efforts. Carpenter, Steeves and Abzarian (2016) states that many questions have been raised among academic after the emergence of online identity concept. The concept of Identity have been complicated by online avatars and social networking services. A domain of scholarly research have been created by academ y for responding to such emerging trends such as technoself studies which emphasizes on technological societies and human identity. In the book building virtual communities Druckenmiller and Mittleman (2015) have explored online identity emphasizing on the concept of masking identity. It has been pointed out by then that a Mask of their identity is portrayed by individuals when way interact in social space. The situation is of no difference in online sites and become increasingly pronounced because of decisions Di mistake in relation to their online profiles. They have to answer specific questions in relation to user name address gender age and so on. In addition where once online identity has accrued The Mask of such person is defined by the way in which they write choose topic and vocabulary. The type of mass which is elected by a person over the Internet reviews little about the subject who has selected the mask. This might be called buy one as a metaphor of the mask. The actual identity of the person is not revealed by the online mask. However some hints of what actually lies behind the mask are revealed by i t. For instance weather person selects to act like a cricketer the metaphor would you be an interest in cricket. Where a person refers to hide behind the cyber identity it reveals about that lack of self-esteem and fear behind the false mask (Nakamura 2013). By studying the above literature my perspective about cyber community and cyber identity significantly changed. There is a deep study in relation to the identification of human beings which have recently emphasized on Internet identity. Just like people use a mask in the society they also do it over the Internet to portray themselves as one which they are not. Some people also use Internet identity to indulge in criminal activities and hide the real identity so that they can avoid being caught. I also got to know that the mask which people use with respect to Cyber identity and community they will something about the actual personality. Strategies are adopted by many people through which they can control the disclosure of their personal identity over the Internet. Some of these strategies require significant investment of efforts. A domain of scholarly research have been created by academy for responding to such emerging trends such as technoself studies which emphasizes on technolog ical societies and human identity. I got to know that internet identity is rapidly penetrating the Australian society and taking over the concept of social identity at a great pace. References Roberts, L.D., Indermaur, D. and Spiranovic, C., 2013. Fear of cyber-identity theft and related fraudulent activity.Psychiatry, Psychology and Law,20(3), pp.315-328. Druckenmiller, D.A. and Mittleman, D., 2015, January. A Design Theory for Digital Habitats: Building Virtual Communities of Practice. InSystem Sciences (HICSS), 2015 48th Hawaii International Conference on(pp. 571-580). IEEE. Nakamura, L. and Chow-White, P. eds., 2013.Race after the Internet. Routledge. Nakamura, L., 2013.Cybertypes: Race, ethnicity, and identity on the Internet. Routledge. Carpenter, T.L., Steeves, D. and Abzarian, D., Microsoft Technology Licensing, Llc, 2016.Trusted internet identity. U.S. Patent 9,325,705.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.