My personal stand on internet users possessing multiple online identities remains stagnant: there are several pros and cons which can potentially translate into advantages for digital marketing. My aim for exploring other blog posts was to keep a lookout for potential research areas related to online identities and methods to improve my post’s layout and presentations.
Among the blogs which I had read up on, I found Jamie’s from #UOSM2033 post particularly intriguing by presenting the concept of “capitalist success” from Todd. Our posts had a lot in common in the area of data mining but he expressed his thoughts with more fluidity and ease of understanding. I would take into account of the way he structured his post and attempt to think in the shoes of my readers. On top of that, he attempted to move into areas such as the rise of trolling and hackers which is closely tied to our generation, which I could had included.
Source from: https://www.youtube.com/watch?v=umd3RBk-aIU
(Credits to: Veritasium 2014, February 10)
On the other hand, Stephanie’s views towards online retailing credentials had triggered my curiosity in exploring the negative impacts of unethical practices arisen from possession of multiple online identities such as purchasing likes and fake reviews for certain products or businesses online. An example of a website selling social platform likes would be here.
Upon reviewing her blog, it reminded me that business is a broad view of subjects such as Human Resource, Economics and Retailing. Perhaps for my next assignment, I could look into other subjects under strategic business decisions as well.
Both blog posts disagree with Mark Zukerberg’s stand that for an individual to possess multiple identities equates to low integrity and is generally unacceptable. However, we need leading organisations to strike a balance between authenticity and anonymity as the optimal scenario would be to focus on the positives it brings and attempting to minimize the negatives.
Here are some notable point of views expressed by our classmates associating with strategic business decisions:
Easter – Risk of security breaches for a firm due to impersonation
Nicholas – Implications for a firm’s hiring and selection process (SHRM)
Read my comments on their blogs by clicking on the link below: