Establish reputations?
The chosen identity helps you establish your own unique ‘voice’ Yet language markers are deliberately deceptive. They seem to provide safety but may be loopholes. (Donath 1996). There are distinctions between pseudonyms and anonymity.
Is he someone else or a pervert?
In the example of trolling, Ultimatego changed from one façade to another. She was discovered because of inconsistency. If you are consistently polite or the same, then your persona will be safe. Few identity cues help one to get away with a false identity (Donath 1996). For irritating spammers, you can delete them off the Friend’s list in Runescape. I had two or three people constantly bombarding my account. One of them had a doubtful character, because he was domineering, then nice. He conned me to a dangerous area and my character almost died! In gaming, the way to steal an identity is to use the person’s alias and scam others.
How do people exactly identity- theft? Anyone can track down your login password and keys by cookies. When someone loads a freeware, shareware , the computer can be hacked in and personal information will be stolen. Some thieves give bogus emails to make you cough up personal information like your social security numbers(Blake 2006). In MMORPGs, there are options to join as members, which means you have more privileges. There is additional danger that people will steal your information which you have logged in. In RS, the Jagex security warns players not to give away personal information and to use nicknames.
Safety!
No guarantee but the best is not to use our own IC numbers, birthdates or real names on websites. Besides it is way more creative to use pseudonyms. Your ‘voice’ is determined by your reputation and what you write and do on the gaming sites. Same for blogs and chatrooms
References:
Blake. M W. (Dec 2006) They've Got Your Numbers, Baby: Protecting Yourself from Identity Theft Rural Telecommunications. 25 ( 6).
Retrieved Feb 20,2007 from Proquest Direct database
Donath. J S.(1996). Identity and deception in the virtual community.
Retrieved Feb 20,2007 from http://smg.media.mit.edu/people/Judith/Identity/IdentityDeception.html
Goffman, E. (1959). The Presentation of Self in Everyday Life. New York :Doubleday
Retrieved Feb 20,2007 fromhttp://smg.media.mit.edu/people/Judith/Identity/IdentityDeception.html
Low, I. (2007).Phishing, Pharming,and the latest potholes on the Information Highway .
Retrieved Feb 20,2007 from com125.wordpress.com
Pictures retrieved Feb 20,2007 from images.google.com and Runescape.com
1 comment:
Could have been interesting if you elaborated more on the gender identity issue you brought up in the beginning. Also, you've cited from the readings, but touched on the points superficially. I know you can do better, but for now your grade is 2/3.
Post a Comment