What is a digital identity?

As defined in Stoller’s video, a digital identity can be thought of as one’s presence and footprint upon the internet; the ways in which one interacts with networked publics. This digital identity may be comprised of general activity, one’s posted content, or a combination of the two across both personal and professional domains. In terms of social media, the user’s digital identity is often a culmination of their posts, followers, likes, and accounts they follow. One’s digital identity on social media is often a reflection of reality, allowing others to view a snapshot of their true identity. However, social media is one of many networks which utilize digital identities. For example, even on Brightspace, we each have a digital identity that uses our personal information as well as university information to create a comprehensive and personalized page.

– How do personal versus professional approaches to digital identity affect social media use?

In the personal sphere, one’s digital identity can become increasingly unfiltered, allowing one to present a realistic version of the self through social media. For example, for personal use, an individual could post images of them at a bar, in their pajamas, or eating lunch. The personal use of media allows the user to decide what to post, like or comment; providing increased opportunity to engage with others in self-disclosure and open communication. Moreover, personal social media use is a key tool for social relationship building; as many of us today rely on social media as a way of maintaining and contributing to our relationships. However, in the professional sphere, one’s digital identity must be carefully curated to present a certain image within social media.  For example, the social media of someone who runs a small business must curate a different digital identity than their personal account. This professional identity must facilitate consumer engagement through marketing and advertisement tools. This account may provide valuable opportunities for financial gain, expanding the product range or collaboration with other brands, and thus should be specifically created for these purposes.

– How do digital identities converge in networked publics – what are the impacts and benefits?

Just as with the general use of networks, digital identities share in both the benefits and drawbacks of privacy, communication, knowledge sharing, and misuse. Digital identities, particularly on social media, present ample opportunity for scams and fraud to occur. For example, on Instagram, I personally know many people who have had their accounts hacked or their images used to create fake identities masquerading as them. As our world today seems to revolve around social media, any one person can discover nearly everything about a person’s identity from their social media page. So, not only can individuals use other’s photos and names to create fake identities, but they can also use location and activity to stalk them. As a young woman, I personally never allow my location to be turned on or post a photo until after I have left the area. However, despite the potential risks, the creation and use of a digital identity can be quite beneficial. One’s digital identity is somewhat like a portfolio of who one is, or aspires to be, or wants to be seen as. It can be a way to creatively express one’s identity and facilitate social relationships based on mutual likeness. Sharing identities promotes open communication, self-disclosure, and knowledge sharing across domains. For example, sharing photos of myself can lead to comments from friends and businesses that provide the basis for further communication and collaboration. This is also one way that professional and personal digital identities can converge in networked publics. Professional accounts often use social media to find people who they feel represent their brand or product, leading to collaboration. Essentially, this is how influencer culture was created and maintained. Influencers are the epitome of merging professional and personal digital identities, as they use their pre-established identity to sell products. Overall, digital identities on social media have become a significant aspect of who we are, and thus present equal opportunity for risk and benefit.

– Can a digital wallet provide trust in networked publics?

This is an interesting question, because it depends upon to whom trust is provided. In the video showing the World Economic Forum’s conference on digital identity, the use of digital ID was heavily applauded by several members. The use of digital identification, and thus a digital wallet provides increased trust for both institutions and individuals; as a prevention for identity fraud. In particular, India’s government has rapidly increased the use of a digital ID, allowing vast numbers of people to obtain an identification, bank account, financial security and travel opportunities. This use of a digital wallet allows trust to grow between the government and its citizens, as they have been able protect against fraud and increase financial inclusion across sectors of the population. However, digital identities and wallets may not always be so protected. Digital wallets may not provide adequate trust within the community as they present a heightened risk for cyber criminals to hack into secure accounts and access personal and financial information. On the other hand, when ignoring the implications for potential fraud, the digital wallet can be a useful tool within networks and real world activities. For example, in my life, I feel secure knowing that as long as I have my phone with me, I am able to pay for anything easily. As a server, I have trust in my customers that even if they forget their physical wallet, they will still be able to pay with their digital wallet. During the COVID-19 pandemic, digital wallets and identification allowed trust that the people I interacted with were vaccinated. With any digital activity, the benefits and risks of use are inherently present, allowing the user to weigh utility against potential fraud.

Thank you for reading!

References:

https://link.springer.com/chapter/10.1057/9781137405876_6


https://search.library.uvic.ca/permalink/01VIC_INST/1ohem39/cdi_proquest_miscellaneous_2289573754