Digital Identities and Keeping Them Safe.

Each and every one of us has our own unique identity, so it shouldn’t come as a surprise to learn that we also have our own digital presence online, typically referred to as our digital identity. Everything we do online acts as a piece of the jigsaw that is, simply, us. To come at it in a more technical angle, our digital identity is the collection of personal information that we store online. Everything, from our interactions with social media to our email addresses, usernames and passwords to our more sensitive information such as our credit card numbers and tax file numbers, makes up our digital identity. (“Techopedia Explains Digital Identity” n.d.)

social-media-3

(Fig. 1. Social Media. Softlooms it Solutions. 2017)

Just as we, as adults, have our own digital identities, so too do our children and students.
Children have an expectation that their education will be rich in digital learning. Indeed, it is not just children who desire digital learning, but their parents and future employers do too. (Howell J. 2013).

As children are becoming more digitally fluent, the risk of addiction, bullying, and unsafe practices increase; it is therefore our responsibility to monitor and teach safe practices. As Devishobha Ramanan illustrates in her article on the subject, there are many ways to help protect our children whilst using their digital identities.

digital security

(Fig. 2. Digital Security.)

The responsibility factor falls to us then, as we assist children navigating across the digital divide as not all children are born equal in our technology rich world.  (Howell J. 2013). It is our duty to impart upon our students how to build and maintain safe digital identities and how to engage in the digital world in such a way as to enrich their lives and education. (Ramanan D. 2017). And if we become concerned, there are people who can help. The people at Binary Tattoo work to track our digital identities so we can see if we’re accidentally sharing too much information and how to shut it down if we are.

References.

 

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s