Archive for May, 2012

An interesting week discussing the Digital Shadow and content being published on the web that we cannot always control.

There was discussion about Facebook on the Discussion board, where other students mostly agreed and felt the same way about publishing their personal information.  Many students are now removing content and not using Facebook to broadcast their day to day lives.

Another student comment that she had deleted emails from her inbox to find that after deleting them  the emails were still there regardless of deleting them.  Also, another student commented that your copies of our information has probably been backed up and could be accessed on a database somewhere even after deleting the information.

This highlighted the systems that we use as being important, in particular being able to control what information you publish about yourself, such as turning off a profile picture or your name. Especially in the instance of employers, privacy is of paramount in preventing colliding worlds online.

I conducted a search in Google to search the web for information linked to my name “Cherie Saunders”.  The results returned my blog, linkedin, facebook and genealogy website.

Another website that returns results including images of the search criteria is, enter your name and see what appears.  Its in our best interest we can try control what images are posted of ourselves online.

Discussed in the lecturer was Google street view, where all over the world, a google car drove around every street and took photos of houses.  A friend of mine told me her father in law had been photographed out of the front of his house in his jocks, and then saved onto Google street view. Is this a envasion of privacy?  Apparently it is not breaking the law although in Germany laws have been passed to allow people to request their photos be removed from Google street view and Google has set measured to adhere to this.

In the above example where the father in law was standing out the front of his house with only his undewear showing, Boyd states “An opt-out dynamic means that users have to consciously choose what it is that they wish to hide and then remember their choices as they are navigating the system. When the default is hyper- public, individuals are not simply able to choose what they wish to expose – they have to choose what they wish to hide.” (Boyd, 2008).  People are being forced to hide rather than having the option to opt-out and is putting pressure on individuals to police their own online identity.

As part of this learning reflection I found it interesting that other students including myself and a tutor had discussed Facebook and privacy on the discussion board  and recently started to delete and reduce participation online because of potential issues. People are being forced to hide rather than having the option to opt-out and is putting pressure on individuals to police their own online identity and making others suspicious of what they are trying to hide.  Once again this has provided me with an opportunity to relate conceptual understandings to practical implementation of communication and collaboration tools online and use various Internet applications for communication and collaboration.

Privacy and reputation.

The links below are provided that outline the problems with posting video, photos and content of people on the web, and where worlds have collided resulting in bad outcomes and dimishing their reputation, such as loss of employment, being bullied at school, and even changing name and leaving to live in another country.

The ‘Star Wars Kid’ Sued The People Who Made Him Famous – Business Insider

Fuck you, Google _ Fugitivus

Dog Poop Girl – FamousPictures

About _ dooce®


boyd, danah (2008). “Facebook’s Privacy Trainwreck: Exposure, Invasion, and Social Convergence.” Convergence, 14 (1),

Solove, D., (2007). How the Free Flow of Information Liberates and Constrains Us, in The Future of Reputation: Gossip, Rumor and Privacy on the Internet.   Available:

Angwin, J. (2011). How Much Should People Worry About the Loss of Online Privacy? Wall Street Journal. Retrieved from   (You can also find the full reponses online from Jeff Jarvis and danah boyd.)


An interesting lecture about what we want others to perceive to be our identity which is self-mediated throughout our online interactions, how we interact online, what we post about ourselves, if we have an avatar or hidden identity, and so forth.

As I know from my own experience with social newtorking sites what people post about themselves is a performance, mainly computer-mediated but somestimes people forget the boundaries and worlds collide.

Computer-mediated communication (CMC) has long drawn the interest of academics from a variety of fields, such as Donna Harroway in Cyborgs Manifesto where she discusses how technology and how it has integrated with humans in every day life.

People have the capacity to express and strengthen a unique identity and this allows for fluid identity and interaction in virtual communities to release individuals from the rigidity associated with social identity in everyday life  “reverse some of the social structures, touting virtual experience and virtual community as ways for people to widen their horizons.” (Shafi 2005) such as exploring and expressing themselves as Phil a woman at night or Phyllis a man during the day, if they want remain anonymous.

However, personal or conflict interactions online can sometimes define relationships that interprets to real-life. The public nature of mediated breakups by Boyd provides detailed examples where public display of “in a relationship with”, and “no longer in a relationship” after the break-up and every action, so it’s only natural that people merge online and offline behaviour (Pascoe 2011).

Whether different types of relationships are real or just heightened by the online experience and could be misinterpreted by lack of physical cues without the real body and as less authentic as people perform and mask particular identities for particular audiences other than their own identity. This could result in misinterpretation of reality “an omnipresent danger that our mental maps will not match current reality.” (Harvey 1990)

For the community and patients, people with a health condition can use official (government or non-government organisations) and unofficial online websites anonymously for advice and shared experiences.  For instance, people with HIV use HIV/aidstribe in a virtual community where people with HIV aids are provided with health information and a forum for “self representation by individuals who are excluded from the public sphere.” (Nettleton, Burrows and O’Malley 2005). In contrast, the internet can aid vices with people who have addictive problems like Gambling where online gambling communities can provide anonymous use of gambling without interference from other people, government and legislative controls.  This ignores what is socially and morally acceptable in society. People can hide their identities so there is no judgement to their actions and belong to online gambling communities engaging online gambling and advice in such as Gambling Mojo Community and unrestricted by legislative controls of the Australian Communications and Media Authority.

Music consumers can access digitally created music like MP3’s for purchasing, downloading, sharing and listening online.  It often intermingles public and privately through social networking forums where people can share their music tastes at any time of the day or night regardless of geographical placement like in the comfort of your own home or in public using smart devices like an IPhone to set the scene and provide empowerment and quickly depending on the speed of your internet connection.

Social networking forums like Youtube and Facebook enable sharing between people who belong to virtual communities as part of a group or particular artist or genre. “Message boards like Myspace empowers fans to exchange news, information and recommendations – word of mouth is an important part of online communication.” (Laughey 2007)

Further to this, people can perform a particular identity and in virtual communities to suit the attitude of the music, for instance may dress and talk in a particular way. This empowers them to represent their tastes with “Music of different styles and on different formats is able to “get into” people’s thoughts and feelings to such an extent that it aids identity formation.”  (Laughey 2007)



Harvey, D, 1990. The Condition of the Post Modernity. 1st ed. London: Routledge.

Laughey, D. 2007. Music Media in Young People’s Everyday Lives. In Music, Sound and Multimedia: From the Live to the Virtual. Retrieved from

Nettleton S, Burrows R and O’Malley L, 2005. The mundane realities of the everyday use of the internet for health, and their consequences for media convergence. Sociology of Health & Illness 2005, ISSN 0141-9889, pp. 972-992.

Pacoe, C. 2011. Digital Youth Research: Kids’ Informal Learning with Digital Media: Final Report: Intimacy. Berkeley

Shafi. 2005. Can a virtual community be any different from the experience of a real community, WordPress

Flickr is an interesting tool which we investigate further as part of our activites in this weeks tutorial. I particulary enjoyed searching for photos that I could reuse under the creative commons licensing criteria. It learn’t how to navigate and investigate photographs, and have a better under of the creative commons licensing criteria also.

The Australian Creative Commons organisation, as stated on their website ” Creative Commons is an international non-profit organisation that provides free licences and tools that copyright owners can use to allow others to share, reuse and remix their material, legally.

Creative Commons Australia is the affiliate that supports Creative Commons in Australia and administers the Australian Creative Commons licences. ”

The license terms are outlined on this page Anyone involved in online media, should participate and familiarise themselve on the use of the creative commons licensing.

Under creative commons you should

• credit the creator;

• provide the title of the work;

• provide the URL where the work is hosted;

• indicate the type of licence it is available under and provide a link to the licence (so others can find out the licence terms); and

• keep intact any copyright notice associated with the work.

For more information see

The SA government website on its Copyright page states that ”

Copyright The Government of South Australia supports and encourages the dissemination and exchange of public sector information, and endorses the use of the Australian Governments Open Access and Licensing Framework by its agencies.

With the exception of the Piping Shrike emblem, images, and other material or devices protected by a trademark and subject to review by the Government of South Australia at all times, the content of this website is licensed under the Creative Commons Australia Attribution 3.0 Licence .

The Government of South Australia requests attribution as ‘Government of South Australia 2011’. All other rights are reserved. The Government of South Australia has undertaken reasonable enquiries to identify material owned by third parties and secure permission for its reproduction. Permission may need to be obtained from third parties to re-use their material.” (SA Government 2012)