Free Essay

Identity Management

In:

Submitted By kwazijr
Words 1203
Pages 5
KWASI BOATENG
PROF. HAMILTON
COMM 11
23 November 2015
Reasoning and Analysis: Identity Management "All the world’s a stage, And all the men and women merely players; They have their exits and their entrances, And one man in his time plays many parts." This quote by Shakespeare sums up impression management pretty well, it is the controlling or regulation of information in order to guide or influence other's opinions of us for social or personal reasons. People can manage almost anything, but the most common is the impressions that we make on others, which is more specifically termed self-presentation. Impression management online and in person isn't always intentional and-or duplicitous because people often engage in it even when they are not actively attempting to do so. In this age of information and technology it's not surprising that the use and control of information plays a central role in our lives, and that’s exactly what social media is. There are any number of reason why people engage in impression management online and in articles by authors Rosenbloom Stephanie, Safronova Valeriya and Jacquelyn Smith, they each talk, to some degree, about the importance of and a few reasons why people use impression management on social media sites and apps.
There are people that use social media as a way to reinvent themselves, they create personas that are in no way similar to who they are in person, but that rarely happens, more often than not, people just create a persona that emphasizes a trait or personality that they are proud of. In "Putting Your Best Cyberface Forward" the author writes, "photographs people post on the sites are about more than showing what individuals look like. Rather, members carefully choose photos to display aspects of their personalities" (Rosenbloom 2). In this same article the author quotes a 44 year old actor, “I use photos that describe me...“Photos of me in the kitchen, photos of me with friends. I use it to describe my personality: friendly, outgoing, nothing very explicit. I’m a pretty conservative person. I was raised in a Roman Catholic family” (Rosenbloom 2). So basically what's happening is that people pick and choose parts of their personality or lifestyle and build an online identity around it. Another example that the author talks about is when people on dating sites use pictures that are a few years old or when they fudge their weight, height or age.
Social media has become an integral part of society, so much so that Facebook could be the deciding factor in your job consideration. Because of this a lot of job-seeking social network users build online identities that are generally appealing to employers or at least not appalling to them. In "How Social Media Can Help or Hurt You in Your Job Search" by Jacquelyn Smith, she quotes research done by careerbuilder.com to give job seekers a better understanding of the role social media plays in their job search. She states, "First they found that 37% of employers use social networks to screen potential job candidates"(Jacquelyn Par.8) That means that two out of five employers are looking at your profiles for reasons not to hire...or hire you, it's no wonder that people are engaging in impression management. She wraps up her article by giving readers and potential job seekers advice on what employers look for and the things to avoid posting when on the prowl for a job.
The kind of identity people create online differs based on the medium, people tend to be professional on LinkedIn while also being a party animal on Facebook, and a gaming geek on youtube. In her article "Millennials and the Age of Tumblr Activism" Valeriya Safronova talks about how people are more politically and socially conscious on twitter than the other social media sites. She says, "Because of the anonymity it allows and the variety of media it can host, Tumblr gives young people a chance to experiment with different personas, many of which might not match the ones their friends and family are familiar with" (Safronova par.5). On other sites like Facebook and Twitter users usually engage with friends, family and acquaintances, but on Tumblr they connect through themes and interest. But what happens when the persona or identity you create online doesn’t match who you truly are, does passion on twitter or Tumblr translate to passion and participation in real life? The author quotes Ms. Katwiwa, who described a time when she organized a protest on tumbler with about a thousand people, of which only 400 showed up. Users on Tumblr create these identities of perhaps what they hoped they were, and they start to think that’s all they have to do, so when it's time for their real world counterpart to jump in they flake out.
I know this guy called Steve, like me he is a Ghanaian and an avid social media user. He is a very good friend of mine and we hangout very often, but when we do, we do nothing, but whenever we actually does something he floods all his social media accounts with information and pictures. He has hundreds of followers and he always has some pretty girl with him. He Meets all of his girls through Facebook and Instagram and he doesn’t keep them around for more than a few week because in real life he is a shitty person. He sleeps all day, and is very apathetic. But on his social media he has all these trendy outfits, cool rap videos that I help him film and he is always posting something cool. But he literally does nothing with his life, If his older brother or I don’t take him somewhere, he doesn’t go anywhere. But he is more known in the Ghanaian community than both of us combined. He is basically managing the best parts of his life: his rap talent, sense of humor and fashion. But none of the bad: like his sloth like lifestyle or the fact that he has no pride in who he is.
Technology and social media makes it easy to get to know people and to communicate, but also to engage in impression management. This isn't something new and it isn't something that’s restricted to the internet, we do it everyday, sometimes without even realizing it. Online, people will build profiles that highlight a favorable trait that they have or one that acts as a second resume for future employers or even create identities as a way to further a cause. But engaging in highly deceptive forms of identity management runs the risk of people seeing through your act. So as with everything else in life worth doing, we must be careful not to overdo it, because it is and integral part of maintaining relationships.

Work cited
Rosenbloom, Stephanie. "Putting Your Best Cyberface Forward." The New York Times.3
January 2008. Web. 7 October 2012.
Safronova, Valeriya. "Millennials and the Age of Tumblr Activism." The New York Times. 19
December 2014. Web.21 December 2014
Smith, Jacquelyn. "How Social Media Can Help (or Hurt) You in Your Job Search" Forbes,16
April 2013. Web. 15 October 2013

Similar Documents

Free Essay

Identity Management

...Charlene Vazquez Comm11 4-16-18 How online identities are influenced by online anonymity Social media is considered an interaction between groups or individuals that share common or new ideas amongst people worldwide. There is a significant impact of social networks on young people. Children are being manipulated by networking sites such as Facebook, accessing them through via cellphones that has become the most important thing in their lives. By this method this form of communicating is wildly spread amongst peers, parents and others. There is less utilization on a face to face conversation which lacks interpersonal skills. So now that we know what social media is, Do you know who you are? Do you want to be someone your not? Do live a life that is not yours? Are you a person who shares your reality? If you have answers for these questions then you should become aware of what identity management is. Identity management according to article (putting your best cyber face forward by Stephanie Rosenbloom Jan. 3, 2008) is more like impression management where people either pick the image they want to be or have a certain audience they feel the need to entertain. Where young adults and even teenagers are getting the wrong message. It’s really not about all fun and games and just looking good or better than your friend it is more deep as it impacting your future such as getting a job or just maintenance of your image, Since you still are held up to a conservativeness for...

Words: 1064 - Pages: 5

Premium Essay

Strenghts of Us Healthcare Sys

...Huge problem, no identity management in healthcare “When you’ve seen one hospital, you’ve seen one hospital.” Little standardization between hospitals. Healthcare information is all personal. Information known about you regarding health does not change over time for employment, insurance, etc. Once disclosed, it is gone forever. Your reputation can be fundamentally affected. Economics of Personal Healthcare » All I want – full access » Others should pay for it – Insurance » I’m not paying for others – Medicare The healthcare triangle is the relationship between the provider, the patient, and the payor (insurer). This leads to complexity in the way the information systems are constructed. We all outsource healthcare which means information must be shared in order to get good care. Information must be shared for exams, diagnostics, etc. All this information exists in paper but paper tends not to move around: (Lab, Doctor’s office, hospital, nursing home) – Labs tend to do the best job. Electronic in the healthcare industry means you faxed something. 30 years ago you had a family doctor, only hospital when near death. But today there are specialists, distributed care, and much more sophisticated information. (Static X-Ray vs. 64-slice CT) Healthcare is desperately in need of tools to manage this info. Rand did a big study: “Healthcare is the nation’s largest, most inefficient information enterprise.” Access, Errors, Quality, Efficiency Access: ...

Words: 936 - Pages: 4

Premium Essay

Netw 230 Week 6 Quiz

...NETW 230 Week 6 quiz Click Link Below To Buy: http://hwaid.com/shop/netw-230-week-6-quiz/ 1. Question : (TCO 9) For servers that need to offer services to the Internet, consider using a _____ zone (DMZ), where computers can exist and communicate with the Internet while staying separated from the internal network by a firewall. demilitarized militarized dynamic militarized data modularized Question 2. Question : (TCO 9) _____, which is part of digital identity management services (DIMS), allows certificates and private keys to be stored in AD, so no matter where a user logs on, the certificate and private key information is downloaded to the user’s session from AD. Roaming authentication Profile roaming Credential roaming Local credentials Question 3. Question : (TCO 9) The _____ command-line utility allows you to configure and analyze security from the command line, including performing analysis of a server compared to a template and applying the settings in a security template. regedt secedit confsec secedt Question 4. Question : (TCO 9) _____, which maps to the second layer of the OSI model, provides all the same features as PPTP but it can also work on networks other than IP. IP L2TP IPsec SSL Question 5. Question : (TCO 9) When using _____, you can configure the Windows 2008 server to act as a router or a VPN server. RRAS a firewall Server Manager IPsec Question 6. Question : (TCO 9) The DHCP _____ passes...

Words: 329 - Pages: 2

Premium Essay

Isom

...“The more you buy, the more you earn” – this is the logic each company sells to customers when introducing their loyalty programmes. Loyalty programmes offer gift redemptions, cash backs, discounts and privileges to customers who make frequent purchases. What is less known is that for every purchase, the data is recorded and used for unknown purposes, leading to privacy related issues. The benefits of loyalty programmes versus the related privacy issues have always been an item of debate. Benefits including customer satisfaction brought by customization, higher earnings for the company and savings for customers bring about higher welfare to both the company and the consumer, and therefore outweigh the privacy issues of data manipulation and information leak which will rarely happen. People often complain about receiving promotions and discounts on items that are worthless to them. Reward programmes address this issue by providing product customization thereby increasing customer satisfaction. Through in-depth analysis of consumer data and customer preferences, spending patterns that signal changes in shopping trends and customer behavior allow companies to customize products for their customers. The United Kingdom based retailer, Tesco PLC, employs this strategy by sending their members tailor-made coupons. This leads to 5 million different versions of mail promotions being sent to 12 million customers. Though customer habits are exposed in the process of determining suitable...

Words: 786 - Pages: 4

Premium Essay

Advocay of Position

...An advocate is a person who pleads for another person case to argue a point or justify something against or in accordance with the ruling of that case (John A. Daly (2012). As a Physiatrist, you are knowledgeable of the needs of patients with disabilities and the practice of Physical Medicine and Rehabilitation. As a physician, you bring credibility to the issues and are most often seen as working on behalf of others. No one else may be advocating for our field or our particular patients. Decide on 1 or 2 issues that particularly interest (or bother) you. Become an expert by really get to know the issue(s) (Curia.europa.eu, 2015). Identify all “players” involved in the issue those that support and those that oppose The case I have chosen is the data protection case in US. The united states intelligence system is able to access personal data of persons without their knowledge. According to the rule of law, People should be protected against the infringement of privacy rights unless they have indicated their willingness to release such information An Australian citizen “Maximillian Schrems” lodged complains to Irish data Protection Authority that United States Intelligence service is accessing his personal data. He is not the only with such problem but it is a common behavior and the Irish Authority rejected his complain on the ground that US intelligence service offers maximum protection to persons data. The access enjoyed by Intelligence services Authorities in US constitutes...

Words: 384 - Pages: 2

Premium Essay

Kudler Foods

...Kudler Fine Foods Frequent Shopper Program Kudler Fine Foods is a grocery store located throughout California. The primary goal of the store is maximize profit by providing quality products at suitable prices in comparison to the competition. Through this goal, the store desires to have substantial growth. The company presently wants to increase its amenities by improving the productivity of its operations. It also wants to escalate the loyalty and profitability of its customers by growing the customer purchase parameters. Kudler Fine Foods wants to increase its business through the use of a Frequent Shopper Program. The Frequent Shopper program is presently in design with a functioning high-level model up for suggestion. Business/Systems Requirements Kudler Fine foods wants to implement a Customer Loyalty Program, to follow through with this program Kudler will need to track the sales of customers at the register. One such system is called a Transaction Processing System (TPS). The TPS will keep track of all transactions at the time of the sale, how much each customer spent, and if the customer is a loyalty member or not. In order for this system to work it will need be installed in every one of Kudler Fine foods stores and be used at all their stores. User Requirements A customer must fill out a form at the store in order for the customer to be considered for the loyalty program. Technical Requirements If Kudler Fine Foods wants their program to be successful the...

Words: 558 - Pages: 3

Premium Essay

Advocay of Position

...An advocate is a person who pleads for another person case to argue a point or justify something against or in accordance with the ruling of that case (John A. Daly (2012). As a Physiatrist, you are knowledgeable of the needs of patients with disabilities and the practice of Physical Medicine and Rehabilitation. As a physician, you bring credibility to the issues and are most often seen as working on behalf of others. No one else may be advocating for our field or our particular patients. Decide on 1 or 2 issues that particularly interest (or bother) you. Become an expert by really get to know the issue(s) (Curia.europa.eu, 2015). Identify all “players” involved in the issue those that support and those that oppose The case I have chosen is the data protection case in US. The united states intelligence system is able to access personal data of persons without their knowledge. According to the rule of law, People should be protected against the infringement of privacy rights unless they have indicated their willingness to release such information An Australian citizen “Maximillian Schrems” lodged complains to Irish data Protection Authority that United States Intelligence service is accessing his personal data. He is not the only with such problem but it is a common behavior and the Irish Authority rejected his complain on the ground that US intelligence service offers maximum protection to persons data. The access enjoyed by Intelligence services Authorities in US constitutes...

Words: 384 - Pages: 2

Premium Essay

Advocacy of Position

...As a Physiatrist, you are knowledgeable of the needs of patients with disabilities and the practice of Physical Medicine and Rehabilitation. As a physician, you bring credibility to the issues and are most often seen as working on behalf of others. No one else may be advocating for our field or our particular patients.  An advocate is a person who pleads for another person case to argue a point or justify something against or in accordance with the ruling of that case (John A. Daly (2012). Decide on 1 or 2 issues that particularly interest (or bother) you. Become an expert by really get to know the issue(s) (Curia.europa.eu, 2015). Identify all “players” involved in the issue those that support and those that oppose. The case I have chosen is the data protection case in US. The united states intelligence system is able to access personal data of persons without their knowledge. According to the rule of law, People should be protected against the infringement of privacy rights unless they have indicated their willingness to release such information An Australian citizen “Maximillian Schrems” lodged complains to Irish data Protection Authority that United States Intelligence service is accessing his personal data. He is not the only with such problem but it is a common behavior and the Irish Authority rejected his complain on the ground that US intelligence service offers maximum protection to persons data. The access enjoyed by Intelligence services Authorities in...

Words: 383 - Pages: 2

Premium Essay

Bsa310

...Kudler Fine Foods - Service Request SR-kf-013 Brittany O'Neil BSA/310 – Business Systems Instructor: Paul Cooper June 30, 2013 Kudler Fine Foods - Service Request SR-kf-013 Kudler Fine Foods (KFF) is a thriving business specializing in bakery and pastry products, fresh meat, fresh seafood, and specialty dairy products. KFF has decided to incorporate a frequent shopper program to award loyalty points for redemption in order to increase their revenue. Kudler Fine Foods is planning to track purchase behavior at the individual customer level, and will provide incentives through a partnership with a loyalty point program. Partnering with a loyalty point program company, customers will be able to redeem points for gifts such as, five cents off each gallon of gas purchased, ten dollars towards next grocery shopping trip, or perhaps tickets to local shows in order to keep the community involved. By using the customer data KFF plans to compile customer purchase behavior patterns, which will help them refine company processes and offerings to best satisfy their customers’ needs. (Apollo, 2009) There are several security issues that must be addressed prior to executing any plans for the loyalty point program. Information security concerns such as confidential customer information needs to be protected from unauthorized access and use, legal concerns regarding privacy rights, and ethical concerns when it comes to what a customer would want to give, and how they might like to be...

Words: 1123 - Pages: 5

Premium Essay

Service Request Sr-Kf-013 Paper

...Service Request SR-kf-013 Paper Kudler Fine Foods is a gourmet food shop design to be a one stop shop for cooking ingredients and tools. The company is interested in developing a system to track customer purchases through a frequent shopper program. Customers will be awarded points toward free item and discounts. The program will provide data gathered from purchasing behaviors to help streamline processes, satisfy customers, develop a closer relationship with each member, and foster a stable platform for efficiency in operations. In this paper I will discuss the potential legal, ethical, and specific costs related to the issues of developing a frequent shopper program. Finally, I will discuss how this information system has an effect on the organizational structure. The loyalty rewards program has many benefits to both the customer and the company; however, there are legal concerns that must be addressed. Membership will begin on a sign-up basis. Customers who want a membership will provide personal information and be subjected to legal terms, privacy agreements, and security policies. Sensitive data is collected at different times in conjunction with loyalty programs. The first instance is created during the loyalty card application. The second instance develops when purchases are recorded, and finally when the spending histories are recorded; creating a consumer profile. Kudler has illustrated what information it will collect in the Database Diagram – PNG under customer...

Words: 732 - Pages: 3

Free Essay

Dbtextworkstheorypaper.Doc

...Why link Textbases? The main reason that you link textbases together is to avoid having to replicate information that is common to many records or to more than one textbase. By storing the common information in one textbase, you can reference it from other textbases. Deciding which textbases to link is an important, but not difficult, decision. Typically, you use linking to model a many-to-one relationship between different types of records. In the simplest case, a many-to-one relationship can be accomplished with multiple entries in a field. For example, many phone calls to a particular customer can be logged in a single field in the customer record. However, if you need to track separately the date of the call, the person initiating the call, and a summary of the discussion, you should use linking instead. Create a record in a separate textbase for each call, and link these records back to the customer. Then it is easy to track how many call were made in a particular week, how many were made by a particular staff member, and so forth. You can link a textbase to one or more other textbases to access the combination of information that you need. By linking textbases, you can conserve disk space and reduce or eliminate duplication of effort. You can access information from several textbases at once, but you only have to maintain the information in the textbase from which it originates. For example, a patron’s name and address can be stored in one textbase, but can be...

Words: 761 - Pages: 4

Free Essay

Information Technology

...needed directory data from the seller’s forest or domains to one or more of the buyer's domains. The target for such a migration may be an entirely new forest or one or more existing domains that are already deployed in the buyer's forest. We recommend that you migrate the directory data without security identifier (SID) history. If you migrate the directory data with SID history, information about the seller's forest will be retained in the new forest of the buyer. For more information about migrating directory data without SID history, see Migrating Accounts Without Using SID History (http://go.microsoft.com/fwlink/?LinkId=113694). This support limitation exists because: • Each domain in an Active Directory forest is assigned a unique identity during the creation of the forest. Copying domain controllers from an original domain to a cloned domain compromises the security of both the domains and the forest. Threats to the original domain and the cloned domain include the following ◦ Sharing of passwords that can be used to gain access to resources ◦ Insight regarding privileged user accounts and groups ◦ Mapping of IP addresses to computer names ◦ Additions, deletions, and modifications of directory...

Words: 549 - Pages: 3

Free Essay

Security and Privacy

...Is it possible to secure our data? It is if you know what you want to secure and what data you want to protect. It is also important a professional secure your entire IT infrastructure such as computers, networks and mobile devices. Its also important to have a complicated password with numbers. Many of the password are simple passwords. Don’t write down a password ever cause anyone can see if you have got it written down. It is also important to know that if you don’t back up your data you will lose it. http://eval.symantec.com/mktginfo/enterprise/other_resources/b-8_tips_protect_your_business_secure_data.en-us.pdf Do individuals have any privacy anymore, no. Once we started putting our information out on the internet for millions to see we don’t really have privacy anymore. If we wanted privacy then we never should have gotten a Facebook. Facebook keeps all your personal information once you sign up and even when you delete your account. After 9/11 has shown us that there are still threats out there. And the government feels the need to make sure that something like 9/11 doesn’t happen again. https://ca.answers.yahoo.com/question/index?qid=20120522182359AAqKmNF With more security it would cost more money because companies would have to invest more in this services. Not only would it cost money for the company it would increase cost for the consumer. Increasing security would also draw away customers for they would find it inconvenient....

Words: 258 - Pages: 2

Premium Essay

Bill Mclaren, Jr. V. Microsoft Corporation

...Bill Mclaren, Jr. v. Microsoft Corporation The United States is know for its freedom by many people.This came from all of the country's founding fathers. That was created to make it a place where you can be free. Using the amendments in the constitution for the guidelines to be based off of. One of the know brainers that people expect is the right to privacy. This is not unreasonable, due to most of the fourteenth amendment is saying that you have that right. At the end the right to privacy has mainly been provided for procreation right. Some people feeling entitled to a right to privacy, is it almost inevitable that differences of opinions would occur in the workplace, and court cases would be raised dealing with an employee's right to privacy. The question that needs to be answered is where a corporation's rights and employee's rights are differentiated. Should employees have a reasonable expectation to privacy? Should companies have a reasonable right to access their employees various tools in the workplace? In the privacy court case, Bill McLaren Jr. v. Microsoft Corporation, the most fought over is whether a business has the right to intrude on a worker's privacy as it relates to personal emails. Privacy rights can be violated under common law if the intrusion into the private life would be found offensive by a average person. Bill McLaren Jr. was an employee of Microsoft who was under accusation of sexual harassment. As the accusations were looked into, McLaren...

Words: 827 - Pages: 4

Premium Essay

Jacket-X Paper

... and other safety-related clothing applications. The Chief Information Officer (CIO) at Jacket-X is concerned with the current Information Technology (IT) security implementations and procedures. He has valid concerns due to reports from Human Resources (HR) stating financial issues with last year’s payrolls. There are also concerns with external network vulnerabilities that possibly can give hackers unauthorized access to company data and information. The CIO has internal IT security concerns due to a recent incident with an executive employee infecting the company’s network with malicious software from a company issued laptop. To help stay current with technology and compliant with federal laws Jacket-X decided to install a new Identity Management (IdM) system with Single Sign On (SSO) features. Several employees and customers do not like the new IdM system due to having privacy and data access concerns. This paper will analyze and discuss potential threats and vulnerabilities within the Jacket-X Corporation enterprise network. The paper will identify various IT security measures that will address the known threats and vulnerabilities. There will be discussions and recommendations made for choosing the best IdM system for Jacket-X. These discussions will also consist of the company addressing SSO privacy concerns, SOX compliance, inadequacies of current company IT security, and possible implementation issues with the new IdM system. Vulnerability Assessment for Jacket-X...

Words: 6831 - Pages: 28