The comic “Identity theft” (Waterloo Regional Police Service, n.d.)
I believe that digital identity is significantly affected by almost all of our online activities. There are different types of activities on the internet such as buying an item, or paying a bill using a credit card, using social networks or communicating via email. Regardless of the type of activity, it is almost inevitable not to leave a footprint behind us. It’s alarming to think about the databases and social networks (e.g., Facebook and Twitter). It can tell any individual who we are and what we do, hence, there is more data accessible about us in the digital world.
The photo “Different online activities” (Communication Logistics Specialists, n.d.)
An interesting study by Microsoft in 2010 revealed that the average American user had 25 online records secured using 6.5 passwords only. When we use the same password for more than one record we increase the risk of digital identity theft and highlights the vulnerability of using passwords only for authentication. For example, 6.5 million LinkedIn client passwords were recently hacked which reveals the limits of passwords authentication techniques (Nxp, 2012, para. 2).
The photo “Information security” (CanStockPhoto, 2012)
I believe the key here is trust, which helps us to build secure, long-term relationships with our service providers. Let me ask you a question? “When was the last time any of us been to a bank branch?” That’s related to how we feel about the security of our data and our money which is all being maintained by our service providers.
Teachers need to equip students with the knowledge and awareness hence, they don’t fall victims of identity theft (Howell, 2014). Teachers can achieve this by planning lessons using videos such as ten tips on how to protect digital identity https://youtu.be/OjR80aY8Mj0 (Marks, 2014), and how to manage digital identity https://youtu.be/0mgBzOBpuxE by adjusting privacy settings on social networking (e.g., Facebook, Twitter, Linkedin) (MMU Library Services, 2013).
It is clear that digital security is crucial to the digital world, every time we use the internet it’s up to us to protect ourselves, remember there is always a threat.
CA Technologies. (2014, January 9). Identity and access management in 2014? a prediction of what?s ahead – highlight. Retrieved from
CanStockPhoto. (2012). Information security [Photo]. Retrieved from http://www.canstockphoto.com/fingerprint-and-information-security-on-10227139.html
Communication Logistics Specialists. (n.d.). Different online activities [Photo]. Retrieved from http://www.communication-logistics.com/postal-identity-management.html#.VTYWAyGqqko
Howell, J. (2012) Teaching with ICT – Digital pedagogies for collaboration and creativity. VIC, Australia: Oxford University Press.
Marks, M. (2014, July 3). 10 easy easy rules to follow to protect your digital identity [Video file]. Retrieved from https://www.youtube.com/watch?v=OjR80aY8Mj0&feature=youtu.be
MMU Library Services. (2013, August 28). Managing your digital identity [Video file]. Retrieved from
Nxp. (2012, December). Digital identity: toward more convenient, more secure online authentication. Retrieved from
Waterloo Regional Police Service. (n.d.). Identity theft [Comic]. Retrieved from http://www.wrps.on.ca/stay-safe/your-personal-safety/protecting-your-personal-information/preventing-identity-theft