Digital Identity Considerations

As I consider my digital identity, I reflect on how much I did NOT know about digital identity or haven’t thought much about. As a teacher and a mother, I try to consider what I put on social media. I only started adding my personally created identity in the early 2000’s when I was in my 30’s – I feel grateful that social media was not a thing for me as a teenager or young adult. I don’t really think I have a lot of regrets when it comes to what I have shared on social media. But this prompted me to do an internet search on my name. There are other Brenda Frederiksens in the world – fortunately they all seem like upstanding (digital) citizens. (Please let me know if you discover something to the contrary!) I reviewed my social media platforms like Facebook, Twitter and Instagram and feel as though I share things that are important to me and use these platforms for different parts of my life.

Facebook is used to keep in contact with family and friends both near and far. Twitter is primarily used for news and educational purposes. Instagram is used for a combination of both personal and professional. My biggest regret or reflection is asking permission of the people (namely my children) whose photos I have posted without permission. My own children have been very thoughtful when it comes to their online identity. They have been made aware of personal security measures by myself, my spouse and their teachers. As an educator I believe it is important to work alongside parents to help keep our children safe – both online and offline.

  Businessman holding a cloud of social media network icon

These applications (and a few more) are things I have created – different from the credential digital identity that has been created for me. Reading the article that Kate-Lyn Weisbrod posted on the concept of identity in a digital and networked world in week 6 on February 15th, really got me thinking about the categories of identity and the challenges that come with digital identity. The article goes on to describe streamlining identity so you don’t have to have an infinite number of usernames and passwords – something I seem to have a hard time with. Another perk to a streamlined digital identity development is the added security – making it more difficult for hackers to compromise personal information. But at what cost would this streamlining be – as Metcalfe (2019) concludes, “the development and use of digital identities always requires a discussion of the appropriate balance between privacy and utility”. Phishing, mobile phone hacker or cyber scam concept. Password and login pass code in smartphone. Online security threat and fraud. Female scammer with cellphone and laptop. Bank account security.


Add a Comment

Your email address will not be published. Required fields are marked *