Final Assessed Posts, MANG 2049

Final Assessment | Reviewing My Online Profile

Presenting you my first video collaboration with my peers!!

(Ws, 2014)

Prior to undertaking the module Living and Working on the Web, my knowledge of managing my employability through the use of the web was limited. I didn’t use twitter account often, I had never had a blog and I didn’t have a LinkedIn profile. Now, my personal online presence has improved greatly over the course of this module, as my development on this module is quite clearly evident in my self-test!

Screen Shot 2014-12-17 at 3.25.30 am

One of my largest developments will be my Twitter account. Prior to this module, I had never considered how a ‘professional’ twitter would be of use to me. I have really enjoyed interacting with my peers, being able to use hashtags to find (and be found) by people who are interested in similar topics to me, and keeping up to date with businesses and areas which interest me. I was elated to know my Topic 5 post on Open Access was featured by Richard Poynder an independent journalist and blogger specialising in information technology, scholarly communication, open access and open science. Thus increasing my Blog readers and follower on Twitter.

Screen Shot 2014-12-17 at 2.10.54 am Screen Shot 2014-12-17 at 2.04.21 amScreen Shot 2014-12-17 at 2.04.36 am

unnamed

(Evidence of my active use of Twitter)

Following that, I went on to create a linkedIn profile to increase my online presence in the marketing world. Constantly updating my profile and connecting to various influencers and groups has allow me to achieve a profile strength of ‘Expert’. I am attempting to reach out to my previous employee for recommendations to contribute to my profile authenticity.

Screen Shot 2014-12-17 at 2.12.10 am

Screen Shot 2014-12-17 at 2.12.38 am

(Example from my LinkedIn)

I have also come to understand the importance in building and authentic profile. Coming up with plans to sync all my online profiles (Social and professional) together in create a single identity in near future. Creating an authentic profile means I will have to be more careful with what I will be uploading and posting in future having understand the potential problem I will face such as ethical issue.

Lastly, to wrap it up. I believed the peer-learning element of the course has greatly aided my learning throughout the five topics we have covered on the course. Similarly outside school context, this could achieve by connecting and interacting with more people online in the same field of study and interest. Therefore, it is important to remember the importance to actively reach out to more people and partaking in discussion to build on our knowledge and network. This module certainly help me to feel more confidence in landing an internship offer by June :))

Want to stay connected with me? Why not? See the footer at the top of my blog? You can find various icon that will navigate you to the rest of my professional accounts!!

(Word Count: 450)

Reference

ws, T. (2014). Final Presentation Mang2049. [online] Youtube.com. Available at: https://www.youtube.com/watch?v=jm0hLuD6Gzg [Accessed 16 Dec. 2014].

Standard
MANG 2049, Topic 5

Types of Paywall | Inevitable

giphy

Image from Giphy

After reading most of my peers’ posts, there was a unanimous decision that online material would benefit society and users if it were free online. However, taking this into consideration, whether it is the public or individuals, there will most likely be a party, which has to pay for the materials in order for it to be available. For instance, under new proposals, the government will pay publishers a fee each time a paper is published and in return, the research will be available to those who wish to see it. This will allow academics and businesses to develop and commercialise their research more easily and herald a new era of academic discovery (Ghosh, 2012). This is perhaps the most important point to keep access to online materials free, as it contributes to further research and the economy. I believe that it is right for the government to make public taxpayer-funded research accessible.

Many of the posts this week, including mine, centered on academic journals. I did find Isaac’s post interesting regarding his focus on Newspaper introducing paywall, something I did not consider in the open access debate. We are indeed entering a period of subscription culture with many varying newspaper and magazine publications implementing paywall at a fast speed. It brings me relief to know that some choose to remain free.

While the chances of facing a paywall in near future seems inevitable, I thought perhaps I could research a little on it and understand how it works. I managed to come across this article that explains the 5 types of paywall and how they actually help the respective companies in gaining revenue (Jackson, 2014).

In conclusion, the ideology of using the Internet to promote global learning will suffer, if the struggle for open access continues. As people around the world may not have access to potentially beneficial resources, which could have sparked new ideas and give birth to new innovations from which we can all benefit.

I vote for Open Access.

(Word Count: 330)

References

Gov.uk, (2012). Making published taxpayer-funded research accessible – Investing in research, development and innovation – Policies – GOV.UK. [online] Available at: https://www.gov.uk/government/policies/investing-in-research-development-and-innovation/supporting-pages/making-taxpayer-funded-research-accessible [Accessed 10 Dec. 2014].

Ghosh, P. (2012). UK science to be freely available. [online] BBC News. Available at: http://www.bbc.com/news/science-environment-18860276 [Accessed 10 Dec. 2014].

Indvik, L. (2013). ‘The Guardian’: We’re Not Planning on a Paywall. [online] Mashable. Available at: http://mashable.com/2013/04/17/the-guardian-no-paywall/ [Accessed 10 Dec. 2014].

Jackson, J. (2014). As Telegraph joins paywall bandwagon, here’s five leading approaches to gated access and user revenues. [online] Themediabriefing.com. Available at: http://www.themediabriefing.com/article/paywall-approaches-gated-access [Accessed 10 Dec. 2014].

Lim, I. (2014). Paid Vs Free Content. [online] isaaclye. Available at: http://isaaclye.wordpress.com/2014/12/09/paid-vs-free-content/ [Accessed 10 Dec. 2014].

Commented on:

Zoie Lim Ming Ru

Sherdale Goh

Standard
MANG 2049, Topic 5

Open Access | Paywall

Check Out My Video/ Slide Show 🙂

The Internet has become an indispensable tool for communication and coordination, yet the debate of Open Access (OA), free for all and holding back innovation is ever rife. While the purposes OA is to allow one to read a publication over the Internet, print it and further develop and/or distrbute the findings without any restrictions (Björk, 2004). We often find ourselves spending hours researching an academic essay, searching through online journals to find that perfect article on the topic, only to discover seconds later that the online material doesn’t comes with free access.

Why do researchers bother researching if the costs are made so high that only a handful in the society can benefit from it?

According to global pricing consultancy Simon-Kucher & Partners, days where we enjoy free OA materials will not last much longer. Their recently conducted survey has found that in the coming years as much as 90% of online content will find itself behind a paywall (Lepitak, 2013). This is however, contrary to a article reported by the BBC News that the government are developing plans to make publicly funded research results freely available to all (Ghosh, 2012). This video will clearly explained the importance of OA to you.

(Shockey and Eisen, 2012)

What are the advantages and disadvantages to consider?

Advantages

Access to materials and learning. Promotes the sharing of knowledge, development of established ideas, and to enhance future materials.

Increased Readership / Circulation Speed. Widen the readership of the author’s work as the research is more discoverable online. Online information are also made available more readily ensuring the latest research is always available as compared to published journals.

Cost Saving / Convenient for Students. Beneficial to students who are self finance and most students now would prefer to access information online than heading down to the library for the hardcopy.

Disadvantages

Author’s Fear. Risk of information, research being misused, misinterpreted and/or plagiarism.

Recognition of Research. If not approved and published by a third party (journal publisher) it may lack reliability and lose trust by academics. As there is a myth that OA journals are much lower in term of quality as compared to paywall journal. However, this has been shown to be untrue as reported by The Guardian.

As a student, I am in strong favour of OA, as we can all relate to the frustration of having to read an interesting abstract to a journal, only to find that we get denied access to the full content unless we pay up to a certain sum and you have no idea if its actually useful until you purchase it. While OA also ensures greater accessibility to allow the progression and improvement of important research.

As digitization continues, I cannot envisage anything but a higher demand for OA materials and a greater resistance to pay-based restrictions.

(Word Count: 440)

References

Björk, B. (2004). Open access to scientific publications – an analysis of the barriers to change?. [online] Information Research. Available at: https://helda.helsinki.fi/bitstream/handle/10227/647/bjork.pdf?sequence=1 [Accessed 9 Dec. 2014].

Ghosh, P. (2012). UK science to be freely available. [online] BBC News. Available at: http://www.bbc.com/news/science-environment-18860276 [Accessed 9 Dec. 2014].

Lepitak, S. (2013). 90% of online content to be held behind paywalls in three years media company survey suggests. [online] The Drum. Available at: http://www.thedrum.com/news/2013/04/12/90-online-content-be-held-behind-paywalls-three-years-media-company-survey-suggests [Accessed 9 Dec. 2014].

Shockey, N. and Eisen, J. (2012). Open Access Explained!. [online] YouTube. Available at: http://www.youtube.com/watch?v=L5rVH1KGBCY [Accessed 9 Dec. 2014].

Suber, P. (2013). Open access: six myths to put to rest. [online] the Guardian. Available at: http://www.theguardian.com/higher-education-network/blog/2013/oct/21/open-access-myths-peter-suber-harvard [Accessed 9 Dec. 2014].

Standard
MANG 2049, Topic 4

Advert Battle | Fake Reviews | Unethical

This has arguably been the broadest topic so far and personally, it is the most challenging. The reason being is because there is a wealth of information regarding the ethical issues presented by social media within the workplace, and some decided to explore the issues raised in businesses like myself, while others focused on education.

Both Khairul and Jeanne shared pretty much the same idea about companies leveraging on incidences of others (usually misfortunate) to gain publicity, while some would call this ‘Social Bashing’. Perhaps, the best example of this will be the ongoing advertisements war between Apple and Samsung.

As mentioned in my previous post that many companies are now trying to relate with customers on a personal term through platform such as Facebook and Twitter. However, they will need to understand the potential backlash, which they may face with a misjudged remark. Here are some examples highlighted by BuzzFeed.

I have also came across a shocking post that has given me further insight on how unethical the industry could be. This example that I came across was on Trip Advisor. Showing on how the Hotel industry is often hit by fake and poor reviews from people (potentially other hotel owners) who claims that they have stayed there, which they never did, thus affecting their business. This has made me reconsider the point I brought up in Topic 2 on how anonymity allows people to give honest feedback.

In conclusion, I maintain my argument that a company should impose guidelines and train their staff on best practises on how to make better use of social media and to gain a comprehensive understanding of what it means to be a brand ambassador. However, this should not be limited to just the employees, companies also need to be aware of posting content which could be deemed offensive and remain cautious whilst trying to promote an event or product.

(Word Count: 315)

Reference

Allsopp, A. (2014). Watch Samsung’s terrible Apple-bashing anti-iPhone 6 ads. [online] Macworld UK. Available at: http://www.macworld.co.uk/news/iphone/samsungs-latest-apple-bashing-ads-10-other-ads-that-mock-apple-3502961/ [Accessed 8 Dec. 2014].

Calderon, A. (2013). 19 Companies That Made Huge Social Media Fails. [online] BuzzFeed. Available at: http://www.buzzfeed.com/ariellecalderon/19-companies-that-made-huge-social-media-fails [Accessed 8 Dec. 2014].

TripAdvisorWatch: Hotel Reviews in Focus, (2014). TripAdvisorWatch: Hotel Reviews in Focus. [online] Available at: http://tripadvisorwatch.wordpress.com/ [Accessed 8 Dec. 2014].

Commented On:

Evan Tang

Rachel Lim

Standard
MANG 2049

Freedom of Speech | Ethical Issues

freedom-of-speech-megaphone

(Hawking, 2014)

Evolving social attitudes along with the advancement of technology have since transform social media original intention for ‘social’ use into a multi-use tool for individuals, businesses and educational purposes. In today’s post, I will be focusing on the ethical issues raised by business use of social media.

There is a plethora of ethical concerns for businesses when it comes to social media. Arguably one of the greatest causes of ethical issues in the business use of social media is the use of it in recruitment practices. As mentioned before in Topic 2 and 3 on how employers today use social media channel to screen applicants. This use of social media by businesses raises ethical considerations around privacy and fairness.

Is it ethical to judge an employee’s ability to conduct their job based on information about their personal life?

Further to this, a research study by DLA Piper reported that one third of employers have disciplined staff for inappropriate comments on a social media site about the company (DLA Piper, 2011), but do companies have the right to do this, especially if it is in the employees’ personal domain?

This will bring us to my next point on reputation risk. Since companies can be liable for material published by their employees on blogs and social networks either on behalf of the company or through their own personal account, any adverse content can be seen as an integrity risk for the company. One business example which received wide media attention was the case of Justine Sacco #HasJustineLandedYet. Shortly before boarding a flight to Africa, Justine posted an incredibly controversial tweet which later gained a huge amount of attention through multiple retweets. Inevitably she ended up being fired from her job after damaging not only her own integrity, but the reputation of the company. Same could be apply for education as mention about Stacy Snyder in my previous post.

From these example, it is important to put in place clear cut guidelines to ensure ethical standards are met. This suggestion could be supported with this article by Institute of Business Ethics, where they mention the need for companies to invoke a social media policy that provides guidance to employees when using social media in the context of using a company account and a personal account (Institute of Business Ethics, 2011).

I believe that if there is a proper managing of social media accounts, this platform could truly be a powerful tool to market the company or their campaign. Not convinced? Check out this interesting pun exchange between @TeaAndCopy and Sainsbury’s on Twitter.

(Word Count: 414)

Reference

DLA Piper, (2011). KNOWING YOUR TWEET FROM YOUR TREND: KEEPING PACE WITH SOCIAL MEDIA IN THE WORKPLACE. [online] Available at: http://www.dlapipershiftinglandscapes.com/export/sites/shifting-landscapes/downloads/Shifting_Landscapes_-_Social_Media.pdf [Accessed 5 Dec. 2014].

Hawking, T. (2014). No, the Internet Isn’t Killing Free Speech. [online] Flavorwire. Available at: http://flavorwire.files.wordpress.com/2014/04/freedom-of-speech-megaphone.jpg [Accessed 5 Dec. 2014].

Institute of Business Ethics, (2011). Business Ethics Briefing. [online] Available at: http://www.ibe.org.uk/userassets/briefings/ibe_briefing_22_the_ethical_challenges_of_social_media.pdf [Accessed 5 Dec. 2014].

Kaufman, G. (2007). Woman Denied Degree Over ‘Drunken Pirate’ MySpace Photo Sues School. [online] MTV News. Available at: http://www.mtv.com/news/1558467/woman-denied-degree-over-drunken-pirate-myspace-photo-sues-school/ [Accessed 5 Dec. 2014].

Nisen, M. (2013). IAC PR Director Lands In South Africa After Racist Tweet, And It’s A Mess. [online] Business Insider. Available at: http://www.businessinsider.com/justine-sacco-landing-live-tweeting-2013-12?IR=T& [Accessed 5 Dec. 2014].

Stainthorpe, C. (2014). Sainsbury’s Fish Jokes: Don’t Mis-Hake them for Good Customer Service – being CustomerSure – Proven advice from Business Rockstars. [online] being CustomerSure – Proven advice from Business Rockstars. Available at: http://www.customersure.com/blog/sainsburys-social-media-jokes-customer-service/ [Accessed 5 Dec. 2014].

Standard
MANG 2049, Topic 3

LindekIn vs Blog?

giphy (4)

Image from Giphy 

Further exploring into the topic, after reading my peers’ thoughts and comments, I feel like I have gotten a broader insight on the topic and some new ideas on other ways to create an authentic professional online profile. Similarly from the research that i had done and like many other of my peers’, LinkedIn came out as the top platform to portray your professional profile online, as it is the biggest business networking platform. Whilst in my post on Topic 3, I may have focused a lot more on developing a professional online profile than focusing on the authentic aspect. However, Jeanne did summarise this perfectly in her blog post, sharing tips on how to ace an authentic online professional profile. (Check out her post!)

Perhaps the most thought-provoking blog post this week was by Yiming, where he mentioned that “Blog posts allow potential employers to know your true self and participate in conversations, and the interest or liking you might have”. After having done more research, I will have to say that he does have a point on this. Blogs can direct you to other platforms such as your Twitter and LinkedIn, but it gives you a lot more information on the particular individual in question. However, the problem face here is that, even though all the information is there for people to access, recruiters may not have the time to read through as they may have thousands of applications pending each day.

This will bring us back to what I highlighted in my previous post on using LinkedIn instead of Blogs as the hub providing links to your online asset.

Authentic online professional profiles have to be developed overtime. I feel the key takeaway here is to grow your network and actively engage on the platforms which you are using by actively contributing in conversations, voicing your opinions, adding value to the discussions in the industry which you are interested to work in.

(Word Count: 320)

Commented on:

Jeanne

Yiming

Standard
MANG 2049, Topic 3

The Brand Called ‘You”

Image from Adweek

“Too many people overvalue what they are not and undervalue what they are.” – Malcolm Forbes

With the impact of digital world, even recruitment is making a shift towards the online network. This could be supported with evidence as shown in this infographic by Staff that 92% of companies use or plan to use social media in their employee search. Having to understand that an authentic online professional presence is vital for enhancing an individual’s employability prospects. So what can you do to make your online profile both authentic and professional?

The first step is ensuring potentially off-putting photos, posts and videos are out of reach of future bosses. As mention in my earlier post (Digital Profile) that even for the non-‘tech savvy’ employers of the world, Googling potential prospects has become an easy way of delving into the person behind a paper CV. Do make sure your past activities are of clean record too, unless you wish to end up like Stacy Snyder. Hence, it is very crucial for an online professional profile to keep potentially embarrassing items off the net entirely or at very least, set your privacy settings within the safe zone.

Perhaps you are one of those who have the tendency to type or upload something on the net on impulse or without serious thinking? I would then strongly recommend you to check out Internet Shame Insurance, this useful Google Chrome extension adds privacy reminders to Facebook, Twitter and Gmail.

The second step is to cultivate a positive professional online presence. I believed like most people, the first thing that comes to mind will be LinkedIn. It will serve as both the administration of a professional online profile and as a hub for the rest of it by providing links to twitter, blogs and any other online asset. A good LinkedIn page should be accurate, precise and to the point that it gives a fast first impression to your potential employers. Employers who are interested can later navigated away from LinkedIn to get a full impression of their respective candidate. (Guiding them to where you want them to)

Lastly, one also need use social media to find a way to stand out from the crowd.

(Emprego, 2014)

Finally, on the idea of making a profile authentic, being truthful and original in thought are the two key aspects. Like we discussed in Topic 2, you can never be sure of how private the Internet is, lie will eventually come unfold, so being truthful really is the best option.   

(Word Count: 397)

Reference

Beese, J. (2013). 92% of Companies Use Social Media for Recruiting [Infographic] | Sprout Social. [online] Sprout Social. Available at: http://sproutsocial.com/insights/social-media-recruiting-infographic/ [Accessed 3 Dec. 2014].

Emprego, A. (2014). CV Criativo – Twitter Job Hustle. [online] YouTube. Available at: https://www.youtube.com/watch?v=EiDCiLVJGnw [Accessed 3 Dec. 2014].

Giang, V. and Lockhart, J. (2012). BUSTED: This Is What Happened To 10 Executives Who Lied About Their Resumes. [online] Business Insider. Available at: http://www.businessinsider.com/9-people-who-were-publicly-shamed-for-lying-on-their-resumes-2012-5?IR=T&op=1 [Accessed 3 Dec. 2014].

Kaufman, G. (2007). Woman Denied Degree Over ‘Drunken Pirate’ MySpace Photo Sues School. [online] MTV News. Available at: http://www.mtv.com/news/1558467/woman-denied-degree-over-drunken-pirate-myspace-photo-sues-school/ [Accessed 3 Dec. 2014].

Pash, A. (2011). Save Yourself from Weiner-Caliber Online Embarrassment with Internet Shame Insurance. [online] Lifehacker. Available at: http://lifehacker.com/5810453/save-yourself-from-weiner-calibre-online-embarrassment-with-internet-shame-insurance [Accessed 3 Dec. 2014].

Standard
MANG 2049, Topic 2

Go Forth and Multiply

In my previous post for topic 2, I briefly explored the positive and negative aspects of anonymity online and concluded that multiple identities was necessary for one who wishes to pursue a career whilst maintaining a personal social online presence. Further exploring into the topic, after reading my peers’ thoughts and comments, I should learn to be more open with the sharing of information and allowing my employer to have a glimpse of my personal life too.

Facebook Days from Giphy

I choose to remain firm with my stance on having multiple identities and would argue, that both anonymity and authenticity can be used effectively to serve our different personal purposes and goals whilst living and working on the web. For example, on one hand it is true that anonymity can bring about problem such as identity theft and cyber bullying, however, on the other I have also discovered that there are also positives associated with the use of pseudonyms in the commercial sectors as reported in an article by Adweek.

With some luck, I also chance upon this interesting video where the founder of 4chan and Canvas Chris Poole’s share his idea of prismatic identity. Further evidence to supports my conclusion and my feelings on the subject.

“We all have multiple identities, it’s part of being human. We’re all multi-faceted people. – Chris Poole”

While there are arguments for and against anonymity online, I do believe that the pros outweigh the cons as long as everyone is well-informed about the risks of those abusing the system and takes the necessary measures to protect themselves online.

Lastly, I would like to end off with an interesting article on the idea of “Reputation Bankruptcy” brought up by Sara. I wonder what future will bring us, if given an option for a “fresh start” in our digital spaces.

(Word Count: 300)

Reference

Heussner, K. (2012). The Internet Identity Crisis. [online] AdWeek. Available at: http://www.adweek.com/news/technology/internet-identity-crisis-137991?page=3 [Accessed 2 Dec. 2014].

Reilly, O. (2011). Chris Poole, “High Order Bit” Talk – Web 2.0 Summit 2011. [online] YouTube. Available at: https://www.youtube.com/watch?v=e3Zs74IH0mc [Accessed 2 Dec. 2014].

Zittrain, J. (2010). Reputation bankruptcy. [online] Future of the Internet – And how to stop it. Available at: http://blogs.law.harvard.edu/futureoftheinternet/2010/09/07/reputation-bankruptcy/ [Accessed 2 Dec. 2014].

Commented on:

Sara

Corinne

Standard
MANG 2049, Topic 2

Multiple Online Identities | Good or Bad?

The term “Online Identity” refers to a broad spectrum of online behaviours that stretches from online transaction which requires your authentication of your identity (e.g. Internet banking), to our online persona that are made visible through selective acts of self-disclosure, such as writing a blog or sharing our Facebook profile. (Warburton, 2010)

Multiple online identities allow one to effectively target their intended audience. An instance of such will be that I created a new twitter account for this current module instead of continuing with my existing account. This allows me to keep my professional updates such as new articles which I have written or a marketing post which I have retweeted, so as to make sure that my circle of friends will not be bored by those posts and at the same time, refraining my professional contacts from seeing irrelevant details of my personal life. (Henry, 2012)

Separating online presence into professional and personal spaces have become an important issue in today context. (The Reppler Effect, 2011)

“A Research conducted by Reppler in 2011 found that 91% of recruiters uses social media sites to screen prospective employees.”

Since the introduction of this module MANG 2049, I have understand the importance of online presence by limiting my Blog, Twitter and LinkedIn accounts for professional purposes and Facebook for my private social interactions.

This separation of social media platforms allows me to filter my online presence by using privacy settings to make sure that my private interactions are kept private. However, as someone who falls more on the “Digital Resident” bookend as mentioned in my previous post, I find it difficult to keep these two entities separated, a point which (Costa and Torres, 2011) have noted as well.

(Miicard’s Channel, 2012)

The main purpose of having multiple online identities is to offer a layer of anonymity. The use of invented personas allows people to discuss sensitive topics they might otherwise not be able to. For example, someone who is suffering from illness, might use an anonymous persona to seek advice or help. However, this also brings about problem on whether we really know which online identities are genuine or fake. Unfortunately, there is a minority who uses and abuses the power of the internet such as cyber bullying, identity theft and even extreme cases like “catfishing“.

Mark Zuckerberg, CEO of Facebook, who once famously said:

“Having two identities for yourself is an example of a lack of integrity.”

Have also backtracked in this guiding principle by allowing people to log into third-party mobile apps anonymously (Bort, 2014). In my opinion, I believe having multiple online identities is a “must” for anyone who wishes to pursue a career whilst maintaining a personal social online presence.

(Word Count: 430)

References

Bort, J. (2014). Mark Zuckerberg Just Backtracked On Two Of Facebook’s Guiding Principals, But That’s A Good Thing – Business Insider. [online] Business Insider. Available at: http://www.businessinsider.sg/mark-zuckerberg-backtracks-on-principals-2014-4/#.VHxsYWSUfpA [Accessed 1 Dec. 2014].

Costa, C. and Torres, R. (2011). To be or not to be, the importance of Digital Identity in the networked society. Educação, Formação & Tecnologias – ISSN 1646-933X, [online] 0(0), pp.47-53. Available at: http://eft.educom.pt/index.php/eft/article/view/216/126 [Accessed 1 Dec. 2014].

Henry, A. (2012). Should I Keep My Personal and Professional Identities Completely Separate Online?. [online] Lifehacker. Available at: http://lifehacker.com/5898370/should-i-keep-my-personal-and-professional-identities-completely-separate-online [Accessed 1 Dec. 2014].

Miicard’s channel, (2012). On the Internet, nobody knows you’re a …. [online] YouTube. Available at: https://www.youtube.com/watch?v=_hNZ8LFE5DA [Accessed 1 Dec. 2014].

Peterson, H. (2013). ‘Catfishing:’ The phenomenon of Internet scammers who fabricate online identities and entire social circles to trick people into romantic relationships. [online] Mail Online. Available at: http://www.dailymail.co.uk/news/article-2264053/Catfishing-The-phenomenon-Internet-scammers-fabricate-online-identities-entire-social-circles-trick-people-romantic-relationships.html [Accessed 1 Dec. 2014].

The Reppler Effect, (2011). Managing Your Online Image Across Social Networks. [online] Available at: http://blog.reppler.com/2011/09/27/managing-your-online-image-across-social-networks/ [Accessed 1 Dec. 2014].

Warburton, S. (2010). Digital Identity. [online] Digital Identity Matters. Available at: http://digitaldisruptions.org/rhizome/wp-content/uploads/2010/06/rhiz08_DigitalIdentityMatters.pdf [Accessed 1 Dec. 2014].

Standard
MANG 2049, Topic 1

Alternate Option for Grouping Digital Users

After blogging for the past three days, I find myself slowly adapting to the difference in learning style for this particular module. I never thought that learning from a group of people with their own different views towards different topics would be so effective and interesting at the same time.

At the start of this topic, my views from my own research were that individuals could be both a “digital resident'”and “digital visitor” depending on which area of their lifestyle falls on. Take me for example, where I could be a “digital resident” in my personal life and yet remain a “digital visitor” in my professional life. After reading most of the topic 1 post, this seemed to be a reoccuring theme.

It is important to keep in mind that the ‘digital visitors’ and ‘digital residents’ is a continuum and are not mutually exclusive in any sense.

While searching for more answer on possible way to grouping digital users, I thought I come across an interesting and a different way to look at the concept of “digital residents” and “digital visitors” is the Typology of Internet users (Horrigan, 2007). Horrigan sorts web users into 10 distinct groups that fit broadly into a “high end,” “medium users,” and “low-level adopters” framework. Reflecting on this typology I would identify myself as being between a Mobile Centrics and a Productivity Enhancers.

Screen Shot 2014-11-28 at 6.23.53 pm

Another interesting point that I observed from Aetiiqcaz’s and Yuting’s post is that both mentioned about the habits of constantly checking or refreshing their newsfeed on social media platform for entertainment purposes, but does this actually make them a “digital resident”? Do we still considered one to be a “digital resident” when they appear to be actively using the platform solely for “stalking” or updating themselves with their friends’ life.

Lastly, I personally find (White and Le Corneau, 2011) theory to be lacking of one thing, as I believe there is space within the spectrum for a middle tier to better classifies the user.

Black Friday. Let’s Go!!!

(Word Counts: 321)

References

A Typology of Information and Communication Technology Users. (2007). PEW Internet and American Life Project, [online] p.3. Available at: http://A Typology of Information and Communication Technology Users [Accessed 28 Nov. 2014].

permanent resident citizen visitor resident what. (2014). [Blog] aetiiqcaz. Available at: https://aetiiqcaz.wordpress.com/2014/11/27/permanent-resident-citizen-visitor-resident-what/ [Accessed 28 Nov. 2014].

White, D. and Le Cornu, A. (2011). Visitors and Residents: A new typology for online engagement.First Monday, 16(9).

Yuting, K. (2014). What Am I. [Blog] ytsouth. Available at: http://ytsouth.wordpress.com/2014/11/27/what-am-i/ [Accessed 28 Nov. 2014].

Standard