Identity Management in communication
Your OFFLINE identity is the real you, the one your family and friends at school know, your personal information, like your name, age, and where you live. When you're in cyberspace, your offline identity should remain a secret.
Instead, you need to create an ONLINE identity for yourself. This is who you are when you are in cyberspace, the limited amount of safe information you do reveal while still protecting your offline identity. Your online identity can include an alias or screenname, an online profile, an avatar and your status updates.
If someone starts asking you questions about your offline identity, the best response is to just ignore them or tell them you don't share that information in cyberspace. If they continue to bother, tell a trusted adult. You can also block people to stop them from sending you emails and messages.
Take care when choosing your alias because you want it to be something that you like and that suits you, but you also want it to be safe and give people the right impression. An unsafe alias can make cyber criminals and weirdo strangers think you are an easy target, and you might get more attention than you'd like.
You have control over what you put in your online profile, so be sure to give it some serious thought. It can be very tempting to provide as much information as possible, but even the smallest facts can be risky. Just entering your birthday and zip code when signing up reveals your age and what city you live in.
Check that everything you are going to post passes your personal information filter first. Don't post anything you don't want your parents, teacher, or a weirdo stranger seeing or that you're not prepared to have in Cyberspace ten years from now, it will still be there when you're applying to college or your first job and they will look for it!
Chatting programs and social networks allow you to post updates or away messages that say what your current status is and can be a fun way to let your friends know what you're up to. As you do with all online communications, you have to be careful that you don't reveal anything dangerous. While it's tempting to say you're going to the ice cream shop in case your friends see it and want to join you, by doing that you're also letting every weirdo stranger in Cyberspace know exactly where you are in real life!
Many blogs and social networking sites have built-in privacy features to help you protect yourself. You can limit access to your posts and profile information by protecting it with a password or by only giving certain groups, like people on your friends list, permission to see it.
You might also like
ENGINEERS NEEDED URGENTLY!!!by natland
From The Desk Of
NATLAND ENGINEERING SERVICES
132, NEW BOND STREET , LONDON , W1S2UD. ENGLAND
We are contacting you due the fact that we acknowledge you as one of our candidate that has been succesful for the job you applied for, Cv/Resume has been view and reviewed and show that you are qualify for the job. because the interview the company normally conduct depend on your Cv/Resume. so all you have to do right now is to send in a document that will be used as a form of identification of you eg, drivers Licence, International Passport, Identity Card etc
WSO2 CTO to Present Keynote on Open Standards for Identity Management at .. — Virtual-Strategy Magazine
In his keynote presentation, “Open Standards for Identity: Understanding the Landscape,” Paul will look at identity management best practices and how open standards are evolving to handle the complexities of identity management and assurance.