0% found this document useful (0 votes)
730 views

Learning Objectives: Understanding The Self Module 1 - The Digital Self: Self and Other in Cyberspace

This document discusses how technology and the internet impact the formation of identity and self in cyberspace. It explores concepts of socio-digital identity and how people present themselves online. Factors that can influence online behavior are identified, including selective self-presentation and impression management. The document also discusses boundaries between private and public identities online as well as cyberbullying and different types.

Uploaded by

Cherry Bobier
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
730 views

Learning Objectives: Understanding The Self Module 1 - The Digital Self: Self and Other in Cyberspace

This document discusses how technology and the internet impact the formation of identity and self in cyberspace. It explores concepts of socio-digital identity and how people present themselves online. Factors that can influence online behavior are identified, including selective self-presentation and impression management. The document also discusses boundaries between private and public identities online as well as cyberbullying and different types.

Uploaded by

Cherry Bobier
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

Understanding the Self

Module 1 – The Digital Self: Self and other in cyberspace


Welcome once again, in this module we will be
exploring how technology and internet affecting the
LEARNING formation of self and identity, as well as the social
OBJECTIVES
After studying this module, you should be able to:

a. Discuss different concepts of socio-digital


self and about online identity and their “self”
in cyberspace and user id
aspect of an individual with focus on the use of
b. Identify factors that influence one’s online social media platform and membership in cyber
behaviour community.

c. Expound selective self-presentation and Your journey starts with some concepts of socio-
impression management digital self and continues with an exploration of
factors that may influence one’s online behaviour.
d. Evaluate the impact of online interaction on
the self This module serves as a springboard to the other
critical theories and approaches that will be
e. Analyze one’s socio-digital behaviour and discussed in other modules of this course. Before
identify ways to manage them effectively proceeding, let us first see what the journey entails.

f. Understand Cyberbullying, Identify and


discuss the different types.
ACTIVATING
g. Establish boundaries of the online self: PRIOR KNOWLEDGE
private vs. public, personal vs. social identity
online; gender and sexuality online Activity: MYTH BUSTER

Read the following statements below and


TOPIC distinguish FACTS from FICTION.

OUTLINE 1. One’s personality can be manifested through


1. Online Identity and Self in Cyberspace social media.
2. Extended Self in Digital World 2. Social Media allows self-expression
3. Cyberbullying, Definition and Types 3. How one presents himself or herself on
4. Boundaries of the Online Self: Private vs. social media is the same with how he or she
Public; Personal vs. Social Identity online; presents himself or herself to the real world.
Gender and Sexuality Online 4. Technology influences how people relate
with one another
5. People can develop a digital identity.
OVERVIEW 6. Aggression can happen anywhere including
on social media

Module 1 – Digital Self | Page 1 of 6


7. The internet is a safe place. personality. Then the false self is created to protect
8. Sharing a viral photo or video of another’s true self from danger and insult.
crime or loss in order to ask for justice is
Since no physical presence required, individuals
cyberbullying
become prone to create false self, their online
9. Keeping an account set to “contacts only” is
identities- an extension of who they are in cyber
safest
communities. Online
10. Tech savvy people are free from identity
identities, is the person’s sum
thefts.
of total of all features and
relations, as they mingle
differently with each website
ONLINE IDENTITY they visit. Every website they interact
AND SELF IN with has its own idea of their identity
partially since each of it sees them and their
CYBERSPACE
characteristics differently. However, it enable them
to participate and be part of the virtual communities
Social Media is one of the novelty of technology that beyond physical and geographical limits. As they
advance the way we network and mingle with others interact, they are able to leave online footprints –
remotely. digital traces that may remain indefinitely for others
to see
In the advent of
technology, the Most research on online identity are focused on
means of users self-presentation since they are required to
socializing has self-consciously create their own virtual
been altered, representation in every cyber communities they
before, interaction interact with. One way of understanding it is looking
can only be done personally, however things have through the materials, information, and the manner
been changed, people can intermingle with each of interaction they made online, and based on these,
other even not substantially present. others made conclusions about them.
1
Social media, according to Merriam –Webster Online disembodiment or the ability of the individual
dictionary, is a forms of electronic communication to redefine themselves, act
such as websites for social networking and differently, and conceal true
microblogging through which users create online selves to others in
communities to share information, ideas, personal cyberspace are bound to
messages, and other content (such as videos). It happen. These created role
allows people to create virtual representation of their identities are ranked by
self and at the same time influence thoughts and importance. Hence, the greater commitment an
behaviour of others. individual has to a particular identity, the more
important it is for them, through which it impacts the
According to Donald Winnicot, he theorized that self
behavioural choices the individual makes in a
has both true self and false self. True self is often
particular circumstances and consequently affect a
complex and fragile, hence must be realized and
person’s sense of self.
nurtured since this the instinctive core of our
1
https://www.merriam-webster.com/dictionary/social%20media

Module 1 – Digital Self | Page 2 of 6


Online disinhibition according to Suler, is when a  Actualized possible daydreams, fantasies
person opt to adopt false self or fake identities, they through enactment and even facilitates
are likely to engage in behaviours that they aren’t crimes on video games
capable of in real world. This behaviour has two
2. Reembodiment – Characterized as “ breakout of
categories: benign disinhibition which occurs when
visuals”, leading to construction and
people tend to self-disclosure more on the internet deconstruction of self in cyber world. Individual
than they would in real life or go out of their way to can employ mysterious and fictitious identities
help someone or show kindness, and enact wild imaginations.
whilst and toxic inhibition is when
they use rude languages, bully or 3. Sharing – web provide free access of various
information’s online. Diaries that are once
threaten others on online
private are now being shared on blogs.
platforms, and go to website with
contents of violence, crimes & 4. Co-construction of Self – Digital involvement
pornography. are social in nature. Friends comments and our
social interactions help in constructing sense of
There are several reasons why people take part in self.
online disinhibition, it may be due to the advantage
of anonymity, virtual invisibility, asynchronous Click this link to watch Cooley’s Looking Glass
communication, and personal introjection Self Theory: https://youtu.be/bU0BQUa11ek

To better understand it, watch this YouTube video, 5. Distributed Memory – digital world offers new
click this link: https://youtu.be/Qf6HAZlUkts ways of recording and sharing photos, however
this does not give accurate account of
memories because individual has the option to
preselect whatever s/he wants to share.
EXTENDED SELF IN A
DIGITAL WORLD
Open this link to access Russell W. Belk “Extended
2
According to Russel W. Belk, there are five Self in a Digital World: https://bit.ly/33sKh34
modifications evolving from current digital age:

1. Dematerialization - The manner information’s CYBERBULLYING


are presented varies from printed sources to
digital version where written words are unseen
and irrelevant, composed of digital streams Before we proceed with the discussion, click this link
stowed in devices in locations no one knows.
and watch a short video clip relating to
cyberbullying: https://youtu.be/YyDJafzuUK4
Belk proposed four functions of virtual
consumptions towards the enhancement of 3
Cyberbullying is characterized by sending hurtful or
sense of self from virtual possession
 Motivates consumer’s desire for both threatening e-mails or instant messages, spreading
material and virtual good. rumors or posting embarrassing videos or photos of
others. There are various types of cyberbullying such
as:
2
Belk, Russell W. Chicago Journals – “Extended Self in a Digital World”,
3
- Journal of Consumer Research, Vol.40, No.3 (October 2013),pp.477- American Psychological Association
478, University of Chicago Press. https://www.apa.org/topics/bullying/online

Module 1 – Digital Self | Page 3 of 6


1. Flaming - Online fights using electronic https://youtu.be/asTti6y39xI
messages with angry and vulgar language;
teasing to elicit negative reaction Other Social Media Phenomena

1. Scam - Distorted or non-truth about anything to


2. Harassment - Repeatedly sending offensive,
deceive or exploit (gossip, 419, healthcare, IQ,
rude, and insulting messages
etc)

3. Cyberstalking - Engaging in another’s online


2. Social Engineering - Psychological manipulation
activities that make a person afraid for his or her
or art of exploiting people into giving info
own safety
(baiting, phishing, fishing, etc)

4. Denigration / Dissing - Spreading cruel gossip or


3. Catfishing - Deceptive activity using sockpuppet
rumors about a person to damage his or her
social networking presence usually targeting a
reputation or friendships
victim for abuse, deception or fraud

5. Impersonation / Masquerading - Pretending to


4. Sexting - The exchange of messages, images or
be someone else and sending or posting
videos leading to sex.
material online that damages that person’s
reputation or friendships
5. Cybermobbing - Cyber-cruelty that involves a
group sharing the same malicious mind-set.
6. Exclusion - Intentionally excluding someone
from an online group, like a ‘buddy list Boundaries of the Online Self: Private vs. Public;
Personal vs. Social Identity online; Gender and
7. Outing / Doxing - Exposing secrets or Sexuality Online
embarrassing information online
It is important to control behaviour and take extra
care with full sense of liability in using social media
8. Trickery - Befriending someone then abuse the
to protect the self. In doing so, you will be able to
trust by sharing public information to others
foster and project a healthy digital identity that
positively impact your social self.
9. Fraping - Using someone’s account to share
sensitive issues to ruin reputation The following are great suggestions to keep in mind:

10. Trolling - Intentionally upsetting others by 1. Think before you click!


posting inflammatory comments online 2. Stick to safer site
3. Guard your password
11. Happy Slapping - Publishing embarrassing or 4. Be choosy about your online friends, do not
damaging photos or videos hang out with wrong crowd online and offline
5. Remember that anything you put online or post
12. Self-Harming - A person anonymously sends is there forever, even if you try deleting it
him/herself instructions to self-injure 6. Don’t be mean and embarrass other people
online. Respect other people in the online
Click and watch this video to understand the effects community.
of cyberbullying to a person.
Cyber Bullying (UNICEF)

Module 1 – Digital Self | Page 4 of 6


7. Limit what you share and avoid oversharing, SUMMARY
specially confidential information that may be
Let us see if you can remember the main points
used irresponsibly
raised in this lesson. Below is a summary of these
8. Avoid posting anything when experiencing any
points:
strong emotions

• Social media, according to Merriam –Webster


LEARNING
dictionary, is a forms of electronic
ACTIVITY 1 communication such as websites for social
networking and microblogging through which
Objective: Analyze one’s socio-digital behaviour and users create online communities to share
the factors impacting the behaviour. Identify ways to information, ideas, personal messages, and
manage the behaviour effectively and mitigate the other content (such as videos)Classicism is
negative impact of social media to self generally concerned with promoting values—in
the mind of Plato, literature should teach that
Task: Working with 3 other classmates, create a 5-
which is true, good and beautiful.
to 10 minute short video clip promoting healthy self-
presentation and online interaction vs. unhealthy • True self is often complex and fragile, hence
digital self and its possible effects on social self must be realized and nurtured since this the
instinctive core of our personality. Then the
Tools and resources: laptop or mobile, video apps,
false self is created to protect true self from
props, script
danger and insult.
Procedure:
• Online identities, is the person’s sum of total of
1. Form a group with three other members of all features and relations, as they mingle
the class. As a group, discuss the theme of differently with each website they visit.
your story. Agree on the Title of your video
• online footprints – digital traces that may
clip, create the plot as well as the script
remain indefinitely for others to see
2. Agree on how you would go about it as a
• Online disembodiment or the ability of the
group.
individual to redefine themselves, act
3. Record output differently, and conceal true selves to others in
cyberspace
4. Post individual your output on your own
Google site then the leader of your group will • Online disinhibition is when a person opt to
upload it on our FB Group page. Link will be adopt false self or fake identities
provided with a date yet to be confirmed.
• benign disinhibition which occurs when people
tend to self-disclosure more on the internet
than they would in real life or go out of their way
Congratulations! You can now proceed to the next to help someone or show kindness, whilst and
module and continue your self-discovery. toxic inhibition is when they use rude
languages, bully or threaten others on online
platforms, and go to website with contents of
violence, crimes & pornography.

Module 1 – Digital Self | Page 5 of 6


• There are several reasons why people take part Merriam-Webster Dictionary
in online disinhibition, it may be due to the https://www.merriamwebster.com/dictionary/social
advantage of anonymity, virtual invisibility, %20media
asynchronous communication, and personal
introjection Cooley’s Looking Glass Self Theory
https://youtu.be/bU0BQUa11ek

Prepared by:

ABIGAIL C. INTERNO
REFERENCES Faculty, Psychology Department
College of Human Sciences

Walther (2007) , Selective Self Presentation in


Computer Mediated Communication:
Hyperpersonal dimensions of technology,
language and cognition. Computers in Human
Behavior. 23. 2538-2557

Wolfson (2010), Chemistry and Chimera of Desire


http://www.healthline.com/health/what-sis-
desire

Belk, Russell W. Chicago Journals – “Extended Self


in a Digital World”, - Journal of Consumer
Research, Vol.40, No.3 (October 2013),pp.477-
478, University of Chicago Press.

Online /Video/ Picture Resources:

Pictures credit to:


Alleli Jill T. Barberan, RGC,RPm

Anti Bullying Animated Short Film Project by


Mission CISD
https://youtu.be/YyDJafzuUK4

Digital Self : University of Cavite


https://youtu.be/Qf6HAZlUkts

Module 1 – Digital Self | Page 6 of 6

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy