{"id":598313,"date":"2023-01-17T05:50:51","date_gmt":"2023-01-17T11:50:51","guid":{"rendered":"https:\/\/news.sellorbuyhomefast.com\/index.php\/2023\/01\/17\/the-security-interviews-protecting-your-digital-self\/"},"modified":"2023-01-17T05:50:51","modified_gmt":"2023-01-17T11:50:51","slug":"the-security-interviews-protecting-your-digital-self","status":"publish","type":"post","link":"https:\/\/newsycanuse.com\/index.php\/2023\/01\/17\/the-security-interviews-protecting-your-digital-self\/","title":{"rendered":"The Security Interviews: Protecting your digital self"},"content":{"rendered":"<div id=\"content-header\">\n<h2>Our digital self \u2013 the virtual presence of who we are online \u2013 has a pervasive influence in the real world. People make judgements based on these digital depictions, so what can be done to ensure positive representation?<\/h2>\n<\/div>\n<div id=\"content-center\">\n<ul>\n<li><i data-icon=\"1\"><\/i><\/li>\n<li><i data-icon=\"2\"><\/i><\/li>\n<\/ul>\n<div id=\"contributors-block\">\n<p><img decoding=\"async\" src=\"https:\/\/cdn.ttgtmedia.com\/rms\/onlineImages\/Allison_ Peter.JPG\" alt=\"Peter Ray Allison\">\n\t\t\t\t\t<\/p>\n<p><span>By<\/span><\/p>\n<ul>\n<li>\n\t\t\t\t\t<a href=\"https:\/\/www.techtarget.com\/contributor\/Peter-Ray-Allison\">Peter Ray Allison<\/a>\n\t\t\t\t\t\t<\/li>\n<\/ul>\n<p>\n\tPublished: <span>16 Jan 2023 14:30<\/span>\n<\/p>\n<\/div>\n<section id=\"content-body\">\n<p>With our lives becoming ever more interconnected, and both real-world and online activities being recorded, we are generating an increasingly sophisticated record of what we are like. This <a href=\"https:\/\/www.techtarget.com\/whatis\/definition\/digital-identity\">digital self<\/a> is a virtual representation of our lives, which people use as a basis for judgements, in lieu of meeting in person, and which algorithms use for informing their responses to that person.<\/p>\n<p>\u201cNobody\u2019s life is solely offline these days,\u201d says Ben Graville, founder of <a href=\"https:\/\/www.visible.cx\/\">Visible<\/a>. \u201cWhen we go about our daily lives, whether we like it or not, the side-effect of our conscious use of technology is an unconscious data trail that leaves a digital shadow \u2013 a detailed representation in data of who we are, how we think and the things we do. It\u2019s a manifestation of us, but one we didn\u2019t know we were leaving.\u201d<\/p>\n<p>Our digital self is a <a href=\"https:\/\/www.techtarget.com\/whatis\/definition\/digital-footprint\">virtual footprint<\/a> that acts as a digital trail of our online lives, existing long after we have logged off. It is comparable to physical body language, which comprises over half of how we communicate.<\/p>\n<p>A digital self is generated through social media and online activities, using content (what we post, such as social media, blog posts and playlists) and the associated metadata (where, when and how we post, as well as the frequency). In many cases, when creating a virtual profile, the metadata can be just as powerful as the content itself.<\/p>\n<p>\u201cSocial media is the tip of the iceberg,\u201d says Graville. \u201cIt\u2019s the most obvious, because that\u2019s where your human interactions are. There are probably more decisions being made about you by algorithms than there are by people.\u201d<\/p>\n<p>The internet never forgets, and it is this permanence that makes it so powerful in generating a complex representation of our lives. Even after a website or service has ended, internet archives ensure nothing is ever truly gone.<\/p>\n<p>Our digital self may not be a true representation of who we are. Due to the anonymising nature of the internet, there can be a temptation to share exaggerated or extreme posts, which may be intended in jest or to generate discussion. However, as these posts remain in perpetuity, the original context may be unclear and posts may not be taken as originally intended.<\/p>\n<p>The permanent nature of the internet means that, over time, we generate vast amounts of online data from which our digital self can be formed. As this virtual footprint is freely shared and distributed, it can be used by companies to assess job applicants for their suitability. Of course, digital selves can also be exploited by criminals, such as for identifying times when people are away from home. It may also be used for research purposes, for example investigative journalism.<\/p>\n<blockquote>\n<div>\n<figure>\n   Over time, we generate vast amounts of online data from which our digital self can be formed. As this virtual footprint is freely shared and distributed, it can be used by companies to assess job applicants for their suitability<br \/>\n  <\/figure>\n<\/p><\/div>\n<\/blockquote>\n<p>Organisations are also using machine learning algorithms to automate decision-making using publicly available data. For example, the <a href=\"https:\/\/www.gov.uk\/government\/organisations\/department-for-work-pensions\">Department for Work and Pensions<\/a> (DWP) is starting to use machine learning as a tool to help identify fraudulent applicants for Universal Credit.<\/p>\n<p>Social media algorithms also use the digital selves of their users to curate content, by identifying the content (posts, articles and advertisements) they will most likely engage with. This effectively creates echo chambers for their users, reinforcing their world views and political biases. As a result, it may not be the content they need to see to maintain their mental health or to make rational judgements.<\/p>\n<p>\u201cWe know algorithms are built to increase engagement and capture your attention and their bias towards confrontation,\u201d says Graville. \u201cOne of the main reasons why the centre of politics has disappeared online is because you\u2019ve essentially got algorithms deciding how to tailor your world view, based on your digital self, thinking they\u2019ve been helpful. But actually, for society as a whole, it is probably not that helpful.\u201d<\/p>\n<section data-menu-title=\"Own your digital self\">\n<h3><i data-icon=\"1\"><\/i>Own your digital self<\/h3>\n<p>By taking ownership of our digital selves, people can ensure they are not inadvertently mispresenting themselves online. Learning how they are represented in data enables them to understand the data driving the decisions about them. From there, people can manage how they appear in order to portray their qualities and enhance their online profile.<\/p>\n<p>\u201cUnderstanding how your digital body language is being interpreted is critical to one\u2019s well-being and success in the real world,\u201d says Graville. \u201cWe\u2019ve got more than one sense to be able to judge people, we\u2019ve got sight and sound, but when you\u2019re doing most of your business online, you don\u2019t have the luxury of those other senses to make these decisions in the human context.\u201d<\/p>\n<p>To properly manage a digital self, there first needs to be an understanding of how a person\u2019s virtual representation is currently viewed. This is ideally undertaken by an independent external viewer who does not have any existing preconceptions that may colour their perspective.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/cdn.ttgtmedia.com\/rms\/computerweekly\/Ben-Graville-Visible-140x180px.jpg\" alt>\n <\/p>\n<p><span><strong><span>\u201cWhen we go about our daily lives, whether we like it or not, the side-effect of our conscious use of technology is an unconscious data trail that leaves a digital shadow \u2013 a detailed representation in data of who we are, how we think and the things we do\u201d<\/span><\/strong><\/span><\/p>\n<p><em><span>Ben Graville, Visible<\/span><\/em><\/p>\n<p>There are already tools, such as Visible, being developed to provide an overview of a digital self. As these applications use data from the same publicly accessible algorithms that generate a profile, they can offer an unbiased representation.<\/p>\n<p>\u201cWe see ourselves as a deep tech firm, in that it is a completely decentralised and federated AI [artificial intelligence] approach,\u201d explains Graville. \u201cThe data on your devices doesn\u2019t leave your devices, other than to talk to the service you\u2019re trying to talk to. It doesn\u2019t come to us. Visible runs locally on your machine; there\u2019s no cloud infrastructure or sharing of personal information.\u201d<\/p>\n<p>An awareness of their digital self, and how it is perceived, enables people to recognise the drivers behind this perception. This helps them to become better able to modify their online behaviour to present a truer image of who they are. Online behaviour is seen not just in terms of content posted to social media, but also the times and frequency of interactions and the devices used.<\/p>\n<p>\u201cSeeing the underlying data that exists \u2013 which might be something around your demographic, where you live, your age, your online activity, the way you speak, the way you share things, what you say, the things other people say around you (guilt by association) and those concepts \u2013 enables people to understand how their digital self will have formed.\u201d<\/p>\n<p>There is also the option of taking steps to mitigate distortions in the digital self by deleting outlying historical social media posts. While the internet never forgets, the impact of these posts can nonetheless be lessened. All of this will modify the way algorithms perceive people and, in turn, present how they appear online.<\/p>\n<p>One technique that can be useful in managing our virtual representations is comparing a digital self to how others present themselves online. This is an inverse of peer pressure, whereby comparing a digital self to those of the peers will form a baseline expectation of what is to be expected, as well as how to stand out for the right reasons.<\/p>\n<p>The UK\u2019s data protection regulations are currently being reviewed to allow a greater use of user data and thereby enable the country to become <a href=\"https:\/\/www.computerweekly.com\/news\/252522850\/Government-proposes-pro-innovation-AI-framework\">a hub for AI and machine learning research<\/a>. \u201cAs we\u2019ve left the EU, the government is taking the chance to relook at our data protection law,\u201d says Graville. \u201cThey\u2019re thinking about removing some of the safeguards around data protection and machine decision-making, which would make it easier for AI to flourish within the UK.\u201d<\/p>\n<blockquote>\n<div>\n<figure>\n    By understanding how they are perceived online, people can take control of their digital selves to ensure that their virtual representation is a true reflection of who they are, which promotes the qualities they most want to exhibit<br \/>\n   <\/figure>\n<\/p><\/div>\n<\/blockquote>\n<p>This will enable a greater sharing of personal data and, in turn, mean people\u2019s digital shadows become an increasingly complex array of data networks.<\/p>\n<p>The <a href=\"https:\/\/www.computerweekly.com\/news\/252529091\/UK-Net-Neutrality-regulation-failing-all-stakeholders\">net neutrality principle<\/a> is a powerful foundation of the internet. However, the internet has evolved to become biased for businesses. Personal data can be freely shared, but also exploited. Just as we cannot avoid giving away body language in a physical situation, it is impossible to not share our digital self. However, the psychological ownership and knowing how their data is being used and monetised allows people to change their online behaviour to avoid exploitation of their data.<\/p>\n<p>\u201cTo stop us going into a dystopian world in the future, people need to feel empowered to own their identity and digital self, and use that to make the internet a fairer place, where people have as much to benefit from their digital self as businesses do,\u201d says Graville.<\/p>\n<p>The free and open nature of the internet means we cannot avoid sharing our data and still be online. As such, our digital selves will continue to offer a reflection of who we are, regardless of how inaccurate that image may be. By understanding how they are perceived online, people can take control of their digital selves to ensure that their virtual representation is a true reflection of who they are, which promotes the qualities they most want to exhibit.<\/p>\n<\/section>\n<\/section>\n<section id=\"DigDeeperSplash\">\n<h4>\n\t\t\t<i data-icon=\"m\"><\/i>Read more on Privacy and data protection<\/h4>\n<ul>\n<li><a id=\"DigDeeperItem-1\" href=\"https:\/\/www.computerweekly.com\/news\/252518353\/Deliveroo-accused-of-soft-union-busting-with-GMB-deal\"><br \/>\n\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/cdn.ttgtmedia.com\/visuals\/ComputerWeekly\/HeroImages\/Deliveroo-rider-Editorial-Use-Only-ifeelstock-adobe_searchsitetablet_520X173.jpg\" srcset=\"https:\/\/cdn.ttgtmedia.com\/visuals\/ComputerWeekly\/HeroImages\/Deliveroo-rider-Editorial-Use-Only-ifeelstock-adobe_searchsitetablet_520X173.jpg 960w,https:\/\/cdn.ttgtmedia.com\/visuals\/ComputerWeekly\/HeroImages\/Deliveroo-rider-Editorial-Use-Only-ifeelstock-adobe.jpg 1280w\" alt ><\/p>\n<h5>Deliveroo accused of \u2018soft union busting\u2019 with GMB deal<\/h5>\n<div>\n<p><img decoding=\"async\" src=\"https:\/\/cdn.ttgtmedia.com\/rms\/computerweekly\/Sebastian-Klovig-Skelton-CW-contributor.jpg\" alt=\"SebastianKlovig Skelton\">\n\t\t\t\t\t\t\t\t\t<\/p>\n<p><span>By: <span>Sebastian\u00a0Klovig Skelton<\/span><\/span>\n\t\t\t\t\t\t\t<\/p>\n<\/div>\n<p>\t\t\t\t<\/a><\/li>\n<li><a id=\"DigDeeperItem-2\" href=\"https:\/\/www.techtarget.com\/searchenterpriseai\/news\/252506702\/AI-hardware-and-software-The-key-to-eBays-marketplace\"><br \/>\n\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/cdn.ttgtmedia.com\/rms\/onlineimages\/ai_g1183318665_searchsitetablet_520X173.jpg\" srcset=\"https:\/\/cdn.ttgtmedia.com\/rms\/onlineimages\/ai_g1183318665_searchsitetablet_520X173.jpg 960w,https:\/\/cdn.ttgtmedia.com\/rms\/onlineimages\/ai_g1183318665.jpg 1280w\" alt ><\/p>\n<h5>AI hardware and software: The key to eBay&#8217;s marketplace<\/h5>\n<div>\n<p><img decoding=\"async\" src=\"https:\/\/cdn.ttgtmedia.com\/rms\/onlineimages\/ajao_esther.jpg\" alt=\"EstherAjao\">\n\t\t\t\t\t\t\t\t\t<\/p>\n<p><span>By: <span>Esther\u00a0Ajao<\/span><\/span>\n\t\t\t\t\t\t\t<\/p>\n<\/div>\n<p>\t\t\t\t<\/a><\/li>\n<li><a id=\"DigDeeperItem-3\" href=\"https:\/\/www.techtarget.com\/searchunifiedcommunications\/infographic\/Explore-12-virtual-whiteboard-software-options-for-group-work\"><br \/>\n\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/cdn.ttgtmedia.com\/visuals\/digdeeper\/3.jpg\" srcset=\"https:\/\/cdn.ttgtmedia.com\/visuals\/digdeeper\/3_searchsitetablet_520X173.jpg 960w,https:\/\/cdn.ttgtmedia.com\/visuals\/digdeeper\/3.jpg 1280w\" alt ><\/p>\n<h5>Explore 12 virtual whiteboard software options for group work<\/h5>\n<div>\n<p><img decoding=\"async\" src=\"https:\/\/cdn.ttgtmedia.com\/rms\/onlineImages\/lazar_irwin.jpg\" alt=\"IrwinLazar\">\n\t\t\t\t\t\t\t\t\t<\/p>\n<p><span>By: <span>Irwin\u00a0Lazar<\/span><\/span>\n\t\t\t\t\t\t\t<\/p>\n<\/div>\n<p>\t\t\t\t<\/a><\/li>\n<li><a id=\"DigDeeperItem-4\" href=\"https:\/\/www.computerweekly.com\/news\/252501137\/Pandemic-tech-use-heightens-consumer-privacy-fears\"><br \/>\n\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/cdn.ttgtmedia.com\/visuals\/LeMagIT\/hero_article\/remote-working-cafe-3-adobe_searchsitetablet_520X173.jpg\" srcset=\"https:\/\/cdn.ttgtmedia.com\/visuals\/LeMagIT\/hero_article\/remote-working-cafe-3-adobe_searchsitetablet_520X173.jpg 960w,https:\/\/cdn.ttgtmedia.com\/visuals\/LeMagIT\/hero_article\/remote-working-cafe-3-adobe.jpg 1280w\" alt ><\/p>\n<h5>Pandemic tech use heightens consumer privacy fears<\/h5>\n<div>\n<p><img decoding=\"async\" src=\"https:\/\/cdn.ttgtmedia.com\/rms\/computerweekly\/Alex-Scroxton-CW-Contributor-2022.jpg\" alt=\"AlexScroxton\">\n\t\t\t\t\t\t\t\t\t<\/p>\n<p><span>By: <span>Alex\u00a0Scroxton<\/span><\/span>\n\t\t\t\t\t\t\t<\/p>\n<\/div>\n<p>\t\t\t\t<\/a><\/li>\n<\/ul>\n<\/section>\n<\/div>\n<p><a href=\"https:\/\/www.computerweekly.com\/news\/252529121\/The-Security-Interviews-Protecting-your-digital-self\" class=\"button purchase\" rel=\"nofollow noopener\" target=\"_blank\">Read More<\/a><br \/>\n Stephania Latson<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Our digital self \u2013 the virtual presence of who we are online \u2013 has a pervasive influence in the real world. People make judgements based on these digital depictions, so what can be done to ensure positive representation? By Peter Ray Allison Published: 16 Jan 2023 14:30 With our lives becoming ever more interconnected, and<\/p>\n","protected":false},"author":1,"featured_media":598314,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[32659,20,46],"tags":[],"class_list":{"0":"post-598313","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-interviews","8":"category-security","9":"category-technology"},"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/posts\/598313","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/comments?post=598313"}],"version-history":[{"count":0,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/posts\/598313\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/media\/598314"}],"wp:attachment":[{"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/media?parent=598313"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/categories?post=598313"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/tags?post=598313"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}