6.1 Activity: Identity, privacy, security and trust

6.1

Social networks Ironically, despite many platforms appear to be the first to provide the opportunity to create and express themselves, and our best hope in Facebook profiles, posts on Twitter and photos on Instagram and other shared version, in fact, we offer more larger and smaller control digital world has become our digital footprint. “Once the creation and dissemination of digital traces they leave our direct control, the general land in the hands of others” ((nd) how much control we have in our data?). For this reason, it is important that we try to ensure that we effectively in the digital world of information gives the best opportunity to manage our online identity in a positive performance.

But there are, even if we do our best to our “digital shadow” ((n.d.) how much control we have in our data?) It can be misunderstood concerns. Difficulties in her online blog article “scholar, Google yourself,” Doctors Inge Mewburn  discuss and deliberate control online identity management profile is what will Google search, but even as she said, “This is a consistent presentation some ways very confusing numbers outside world “((11 August 2015) scholars, Google yourself).

In its decision to admit, even though we may provide personal information at any given time a small aspect, digitized it is recorded, is “exporting data” essentially ((n.d) how much control we have what we should share is very important in our data?) still can put them together to create a more comprehensive information than we would like. this also applies to the organization, and for this reason it is used according to the policy on behalf of the organization as well as monitoring and management social media participation is important.

Ways of retaining some privacy online are discussed in the article ‘Internet Privacy Laws Australia: 5 Ways to Better Protect Yourself Online’ (9 June 2015) these involve taking note of the types of platforms or webpages which ask for information, protecting passwords and privacy settings on accounts and mobile devices as well as being aware of credible websites and scams.

 

References
How Much Control Do We Have Over Our Data? (n.d.) In ‘Me and My Shadow’ Retrieved January 12, 2016  from https://myshadow.org/how-much-control-do-we-have-over-our-data

I, Mewburn. Scholar, google thyself (2015, August 11). In ‘The thesis Whisperer’, Retrieved January 13, 2016 from http://thesiswhisperer.com/2015/08/11/scholar-google-thyself/

Law Answers Australia Blog team. Internet Privacy Laws Australia: 5 Ways to Better Protect Yourself Online’ (2015, June 9 ) In Law Answers Australia.com.au Retrieved January 16,2016 from https://www.lawanswers.com.au/blog/internet-privacy-laws-australia-5-ways-to-better-protect-yourself-online/