Presentation is loading. Please wait.

Presentation is loading. Please wait.

TECHNO-TONOMY Privacy & Autonomy in a Networked World Learning Module 3: Protecting Privacy: Name or Nym.

Similar presentations


Presentation on theme: "TECHNO-TONOMY Privacy & Autonomy in a Networked World Learning Module 3: Protecting Privacy: Name or Nym."— Presentation transcript:

1 TECHNO-TONOMY Privacy & Autonomy in a Networked World Learning Module 3: Protecting Privacy: Name or Nym

2 Learning Module 3: Name or Nym?

3 Celebrity Factor What is a “celebrity”? Celebrities play a significant role in shaping our values. Technology has provided a means through which the public can learn more about the private lives of celebrities.

4 Celebrity Factor The desire to be “known” and to be popular is one of the benefits that you can experience online. When you disclose your personal information, you risk losing control of your privacy. How do you determine which information is OK to disclose to others and which you should keep private?

5 Pseudonymity Creating a “new” identity to avoid identification; masking your “true” identity. “NYM” – alternate identity, email address, screen name.

6 Pseudonymity Pseudonymity allows you to maintain a sense of control over which parts of your identity are expressed to the public, while at the same time, allowing you to “try-on” new identities. Individuals using the Internet are vulnerable to losing control of their personal information. Creating an “Internet identity” might be one way to keep your personal information private.

7 Pseudonymity there are circumstances when the law requires that individuals identify themselves accurately. (ie. Contracts) Impersonating another person or providing false information in an agreement, contract, or even shopping online is against the law.

8 Privacy Policies Reading privacy policies can tell us for what purposes our personal information will be used.

9 Name or Nym: Summary Pseudonymity is a method of protecting privacy by creating a “new identity” through which to engage in online activities.

10 Name or Nym Summary It is important to distinguish between circumstances when it is permissible to use a pseudonym and times when it might be illegal. Privacy policies on websites outline the ways in which personal information will be used.

11 Name or Nym: Questions How does technology enable us to invade the private lives of celebrities? Do you think this is fair? What are some of the ways that new technologies can enable users to become “cyber-celebrities? What are the benefits of having a personal webpage, chatting online, or having a blog? What are the problems?

12 Name or Nym: Questions How can users protect their privacy while still enjoying many of the opportunities that the internet offers? How often do you read privacy policies on websites? What information on privacy would you like to see on websites?


Download ppt "TECHNO-TONOMY Privacy & Autonomy in a Networked World Learning Module 3: Protecting Privacy: Name or Nym."

Similar presentations


Ads by Google