Digital identity and digital security

 Featured image

The comic “Identity theft” (Waterloo Regional Police Service, n.d.)

I believe that digital identity is significantly affected by almost all of our online activities. There are different types of activities on the internet such as buying an item, or paying a bill using a credit card, using social networks or communicating via email. Regardless of the type of activity, it is almost inevitable not to leave a footprint behind us. It’s alarming to think about the databases and social networks (e.g., Facebook and Twitter). It can tell any individual who we are and what we do, hence, there is more data accessible about us in the digital world.

Featured image

The photo “Different online activities” (Communication Logistics Specialists, n.d.)

An interesting study by Microsoft in 2010 revealed that the average American user had 25 online records secured using 6.5 passwords only. When we use the same password for more than one record we increase the risk of digital identity theft and highlights the vulnerability of using passwords only for authentication. For example, 6.5 million LinkedIn client passwords were recently hacked which reveals the limits of passwords authentication techniques (Nxp, 2012, para. 2).

Featured image

The photo “Information security” (CanStockPhoto, 2012)

I believe the key here is trust, which helps us to build secure, long-term relationships with our service providers. Let me ask you a question? “When was the last time any of us been to a bank branch?” That’s related to how we feel about the security of our data and our money which is all being maintained by our service providers.

Teachers need to equip students with the knowledge and awareness hence, they don’t fall victims of identity theft (Howell, 2014). Teachers can achieve this by planning lessons using videos such as ten tips on how to protect digital identity https://youtu.be/OjR80aY8Mj0 (Marks, 2014), and how to manage digital identity https://youtu.be/0mgBzOBpuxE by adjusting privacy settings on social networking (e.g., Facebook, Twitter, Linkedin) (MMU Library Services, 2013).

It is clear that digital security is crucial to the digital world, every time we use the internet it’s up to us to protect ourselves, remember there is always a threat.

References

CA Technologies. (2014, January 9). Identity and access management in 2014? a prediction of what?s ahead – highlight. Retrieved from

http://54.85.17.110/2014/01/09/identity-and-access-management-in-2014-a-prediction-of-whats-ahead/

CanStockPhoto. (2012). Information security [Photo]. Retrieved from http://www.canstockphoto.com/fingerprint-and-information-security-on-10227139.html

Communication Logistics Specialists. (n.d.). Different online activities [Photo]. Retrieved from http://www.communication-logistics.com/postal-identity-management.html#.VTYWAyGqqko

Howell, J. (2012) Teaching with ICT – Digital pedagogies for collaboration and creativity. VIC, Australia: Oxford University Press.

Marks, M. (2014, July 3). 10 easy easy rules to follow to protect your digital identity [Video file]. Retrieved from https://www.youtube.com/watch?v=OjR80aY8Mj0&feature=youtu.be

MMU Library Services. (2013, August 28). Managing your digital identity [Video file]. Retrieved from

https://www.youtube.com/watch?v=0mgBzOBpuxE

Nxp. (2012, December). Digital identity: toward more convenient, more secure online authentication. Retrieved from

http://www.nxp.com/documents/other/75017362.pdf

Waterloo Regional Police Service. (n.d.). Identity theft [Comic]. Retrieved from http://www.wrps.on.ca/stay-safe/your-personal-safety/protecting-your-personal-information/preventing-identity-theft

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s