0% found this document useful (0 votes)
24 views15 pages

Digital Self

Uploaded by

kaalaman
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views15 pages

Digital Self

Uploaded by

kaalaman
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 15

Unpacking the Self:

THE DIGITAL SELF


Presentation by: Shanaia-Shedri Tahil, RPm, CHRA
The Digital Self
It is the persona you use when you are online. A mask that we put on to
engage in the technological world.
Cyberspace
It refers to virtual computer world and more specifically, an
electronic medium that is used to facilitate online
communication.
Online
Identity
A social identity that network users establish in
online communities. Every website you interact with
has its own ideas of your identity because each one
you visit sees you and your characteristics
differently.
Through the internet, we are able to make multiple
on-line identity for different purposes that possible
suits us. It is an extension of our self-identity, one
facet of who we are.
How to Build an Online
Identity?

Impression Management Self Representation


The effort to control or influence other people’s It refers to how people attempt to present themselves
perceptions. This could be their perception of a to control or shape how others (audience) view them.
certain person, a material possession or an event. It involves expressing oneself and behaving in ways
An example of online impression management is that create a desired impression.
when people post happy moments about their family
and travels because they wanted others to think an to
present themselves as having a happy and contented
family life.
Self Presentation Strategies and
Impression Management
Trying to show that they are competent and makes people aware of
Self-Promotion their accomplisments. The expect respect by speaking proudly
about their expereince, education, or their achievements.

Desires to be likeable, and expects affection so they use flattery


Ingratiation and favors to make others like them. The goal is to influence or
manipulate the other person in thinking that they are likeable.

Tries to appear like a hardworking and dedicated employee to make


Exemplication others feel less worthy. I expects others to feel guilty by their
actions with the intention to acieve worth from others.

Tries to appear dangerous or ruthless and expects others to be


Intimidation afraid of them by showing others that they can make life difficult
for them if they are pushed too far.

They pretend to not understand something to gain someone’s help


Supplication so they appear helpless and act as if they know less than others so
people will help them out.
Extended Self in a Digital World
Five (5) Changes emerging from our current digital age

Our possessions are no longer produced physicaly such as our photos, information,
music, videos, etc. because it can already be stored in an electronic devices. This shift
1. Dematerialization from physical to digital enables new ways of interacting, manipulating, and storing
objects, blurring the boundaries between the physical and digital realms.
The “breakout of the visual” online leading to new “constructions” and definitions of
self in the virtual world. It is how in the age of social media, our faces are seen so
2. Reembodiment much that we have become online “avatars” and how with the use of photoshop, we
can change our appearance and create such a big leeway between our online self and
actual appearance.

Uploading, downloading, sharing, etc. provide free access of information through web
3. Sharing surfing. In facebook, social media friends know more than the immediate families
about our daily activities, connections, and thoughts.

We create ourselves through our collaborations and interactions with other people.
4. Co-Construction of Self Friends help the co-construct and reaffirm each other’s sense of self through their
postings, taggings, and comments.

Our identity is found in the narrative we post online about ourselves. We keep the
5. Distributed Memory narrative going, done by continually integrating events in the outside world into our
ongoing story about ourselves.
The Self and Others in
Cyberspace
Digital Literacy Online Disinhibition
It is the capabilities possessed by It is the lack of restraint one feels
individuals who are living, learning, and when communicating online in
working in a digital society. comparison to communicating in
In cyberspace, people are willing to person. They feel uncomfortable in
speak out and misbehave without fear expressing in real life, so they express
of disapproval and punishment. through anonymity or cyberspace.
Thus, many are deceived because of
anonymity.
Two Categories of Online
Disinhibition

Benign Toxic
Disinhibition Disinhibition
This is when a person opens up and share It is when people act more meanly online
more than they normally would. It is the than they would in real life. It can involve
attempt to understand and explore behaviors like using hostile language,
oneself, to work through problems and swearing, making threats, cyberbullying,
create a more positive online experience. and social loafing.
Managing Online Disinhibition

Don’t post or send anything you would Always consider your emotional state
1 be embarrased for certain others to
see.
4 before virtually posting or responding
to anything.

Always consider the reaction


2 Always be careful about oversharing.
5 individuals are expecting from toxic
disinhibition.

3 Don’t hangout with the “wrong crowd”


online. 6 Do search for yourself online.
Cyberbullying and Social Media
Cyberbullying is the electronic posting of mean-spirited messages about a person often done anonymously. It
seeks to control or harm others.
Some forms of cyberbullying can be in the form of exclusion, harassment, outing, cyberstalking, impersonation,
insulting, trolling, and catfishing

In order for harassment to be considered bullying, the following basis should be considered:

1. There must be an imbalance of 2. It is characterized by the 3. The imbalance and repetition of


power between the victim and the repetition of the abuser behavior. the harassment happens via any
perpetrator/s and occur over an It happens more than one or it has form of electronic communication,
extended period of time. the potential to happen again. such as texting online, on
websites, social networks, via
email, and others.
Effects of Cyberbullying
Effects on the Bullied Effects on the Bullies
1 Emotional Issues (Anxiety, Depression, etc.) Emotional Issues

2 Concentration Issues Concentration Issues

3 Behavioral Issues Behavioral Issues

4 Trouble getting along with peers More likely to be hyperactive

Experience physical symptoms such as headaches, More likely to abuse drugs or alcohol.
5
and stomach pains.
How to avoid or stop
cyberbullying

1 4
Never share and protect your password
Keep your profiles set to private. and prevent others from gaining access to
your profile and private photos.

2 Don’t friend or follow anyone who isn’t


a friend. 5 Educate yourself and others on the
negative impact of cyberbullying

3 Don’t accept requests or messages


from users you don’t know. 6 If you see it, report it.
General Social Media Ettiquette

1 Act like you would in real life. 5 Be curious but not nosy

2 Don’t Discriminate 6 Be extra polite and not spread hate

3 Be responsible and do not spread fake


news
7 Treat others the way you wanted to be
treated

4 Avoid Burnout 8 Remember that there are boundaries


That’s All
Thank You!

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy