Digital identity and digital security

 Featured image

The comic “Identity theft” (Waterloo Regional Police Service, n.d.)

I believe that digital identity is significantly affected by almost all of our online activities. There are different types of activities on the internet such as buying an item, or paying a bill using a credit card, using social networks or communicating via email. Regardless of the type of activity, it is almost inevitable not to leave a footprint behind us. It’s alarming to think about the databases and social networks (e.g., Facebook and Twitter). It can tell any individual who we are and what we do, hence, there is more data accessible about us in the digital world.

Featured image

The photo “Different online activities” (Communication Logistics Specialists, n.d.)

An interesting study by Microsoft in 2010 revealed that the average American user had 25 online records secured using 6.5 passwords only. When we use the same password for more than one record we increase the risk of digital identity theft and highlights the vulnerability of using passwords only for authentication. For example, 6.5 million LinkedIn client passwords were recently hacked which reveals the limits of passwords authentication techniques (Nxp, 2012, para. 2).

Featured image

The photo “Information security” (CanStockPhoto, 2012)

I believe the key here is trust, which helps us to build secure, long-term relationships with our service providers. Let me ask you a question? “When was the last time any of us been to a bank branch?” That’s related to how we feel about the security of our data and our money which is all being maintained by our service providers.

Teachers need to equip students with the knowledge and awareness hence, they don’t fall victims of identity theft (Howell, 2014). Teachers can achieve this by planning lessons using videos such as ten tips on how to protect digital identity (Marks, 2014), and how to manage digital identity by adjusting privacy settings on social networking (e.g., Facebook, Twitter, Linkedin) (MMU Library Services, 2013).

It is clear that digital security is crucial to the digital world, every time we use the internet it’s up to us to protect ourselves, remember there is always a threat.


CA Technologies. (2014, January 9). Identity and access management in 2014? a prediction of what?s ahead – highlight. Retrieved from

CanStockPhoto. (2012). Information security [Photo]. Retrieved from

Communication Logistics Specialists. (n.d.). Different online activities [Photo]. Retrieved from

Howell, J. (2012) Teaching with ICT – Digital pedagogies for collaboration and creativity. VIC, Australia: Oxford University Press.

Marks, M. (2014, July 3). 10 easy easy rules to follow to protect your digital identity [Video file]. Retrieved from

MMU Library Services. (2013, August 28). Managing your digital identity [Video file]. Retrieved from

Nxp. (2012, December). Digital identity: toward more convenient, more secure online authentication. Retrieved from

Waterloo Regional Police Service. (n.d.). Identity theft [Comic]. Retrieved from


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s