Digital Identity and Security. Auditory Summation: Week 2


(Roksolana, n.d.).

Follow the link to the Moovly presentation focusing on digital identity and security:


Also view the following presentation on digital tattoo’s and identity:

Click the link: This website gives practical information about achieving Digital Security

Following is the script for my Moovly audio summation:

Digital identity is your online persona and is linked to your digital footprint. This is what we leave behind, a virtual trail of where we have been in the digital world. These behaviors and interactions form one’s digital identity. Our digital identity comprises of usernames/passwords, online search history, purchasing behaviors and online interactions (Techopedia, n.d.). Tranberg (2013), argues that your online identity is your online reputation and we should implement strategies that ensure our online behaviors are not transparent in order to protect our privacy and personal data.


(Pinterest, n.d.).

We live in an electronic era where we are constantly exposed to digital devices and their usage (Howell, 2012). This contact enables the development and establishment of an knowledge-based society where participants are able to interact and connect with the wider global community sharing their thoughts and ideas and build knowledge (Howell, 2012).

There is a certain education expectation that students will develop digital skills during their school years. Digital expectancy is driven by stakeholders including; students, schools, parents, employers, government and the wider community with the desired outcome that students will become digital fluent through positive engagements with digital technologies and will successfully contribute to society as lifelong learners (Howell, 2012). Digital expectancy will shift the classroom environment to a more technological-centered focus. To achieve this, classrooms can use electronic devices for communication between students and parents, teaching can focus more on collaboration between teachers and students aided by digital technologies and interactive whiteboards and information can be electronically sourced (Howell, 2012).

Digital security is a very serious issue. Students need to be aware that digital security strategies can be used to prevent personal data and information from being compromised (Techopedia, n.d.). Safe internet practices include; strong passwords, staying up to date with security measures, selecting strong privacy settings and never disclosing personal information to anyone.

A security system with several layers is difficult to hack. So, even if your data is targeted, getting through the many tiers of security will be a hassle. The simplest of programs, such as free online email accounts, have multi-layered security, too. Even if accessing your accounts takes a few extra steps, it is still worth the effort, certainly better than losing your data. Using a firewall, making sure your antivirus software is updated, running antivirus checks frequently and updating your programs regularly are all part of maintaining your personal data security.” – Doug Theis, Innovative Integration, Inc. (3 Simple Tips for Protecting Personal Data) Twitter: @InnovativeII”


Howell, J. (2012). Teaching with ICT: Digital Pedagogies for Collaboration and Creativity. South Melbourne: Oxford University Press.

iKeepSafe Generation Safe. (n.d.) Achieving Digital Security. Retrieved from

Pinterest. (n.d.). What digital identity are you manifesting [Image]. Retrieved from,d.dGo&psig=AFQjCNFVEnwBibBWZF_F_OIMLKiWxsYlYw&ust=1475930076789474

Roksolana Productions. (n.d.). Digital Identity [Image]. Retrieved from

Techopedia. (n.d.). Digital Identity. Retrieved from

TED. (2013). Your online life, permanent as a tattoo. Retrieved from

Theis, D. (n.d.). Innovative Integration, Inc (3 Simple Tips for Protecting Personal Data). Retrieved from Twitter: @InnovativeII

Tranberg, P. (2013). Fake It- to control your digital identity: Pernille Tranberg at TEDxOxford. Retrieved from


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s