Reflection – Topic 4

In my last blog post, I discussed the ethicality of personal data collection via social media, and the impacts this has on our privacy; as this was quite a while ago, I have created a quick summary to refresh your memory!


Having explored these factors, I reached the conclusion that perhaps this matter is neither completely ethical or unethical. As Sharon rightfully states, one of the Internet’s main functions is to share and access data online; which does not exclude our own private information. But, after our discussion, we concluded that despite her point made above, comments from Sir Tim Burners-Lee allow us to safely assume that whilst privacy wasn’t a main objective, it was an implied notion that was arguably, completely ignored by the greed of capitalist society.

Despite acknowledging the breach of privacy created by tools such as cookies used on social media, these devices can be helpful to both the consumer and businesses, especially at a marketing point of view. Therefore, as discussed with Patricia; we should be able to opt in or out of where our data is collected, and despite Sharon’s acknowledgment of new EU regulations which force companies to tell users their cookies are being used; there is still not enough overt choice in the matter, nor is there consideration or education on these issues. Thus, this issue is in a ‘grey’ un-defined area regarding its ethical nature.

Whilst we should continue applying pressure to the higher powers to protect our private data; there are some steps we can take to smartly avoid the prying consumerist eyes. Hence, I have taken the liberty of creating an infograph which explains how to avoid unwanted data collection:


This is an issue that will continue to grow in importance, and where it is a grey area in the discussion of ethicality now, if this growth of information collection continues; the unethical, dangerous aspects will certainly outweigh its advantages.

Word Count: 321


Ashraf, F. (2017). Big Brother is Watching You… [online] Living and Working on the Web. Available at: [Accessed 10 Apr. 2017]

Buergin, S. (2017). Privacy – A luxury the Internet cannot provide. [online] Living and Working on the Web. Available at: [Accessed 15 Apr. 2017].

Cellan-Jones, R. (2016). ‘Snoopers law creates security nightmare’ – BBC News. [online] BBC News. Available at: [Accessed 23 Mar. 2017].

Charlton, G. (2012). Just 23% of web users would say yes to cookies. [online] Econsultancy. Available at: [Accessed 22 Apr. 2017]. (2017). The Cookie Law Explained. [online] Available at: [Accessed 26 Apr. 2017]

Durante, J. (2016). Do Pop-up Ads Actually Work? Here’s the Data You Need. [online] Available at: [Accessed 22 Apr. 2017]

Hinds, A. (2017). What Are Computer Cookies And How To Protect Yourself From Them. [online] Available at: [Accessed 23 Apr. 2017]. (2011). Cookie Definition. [online] Available at: [Accessed 23 Mar. 2017].

Reflection – Topic 4

Topic Three – Reflection

When I first started my reading for this fortnight’s post, I presumed it would be rather simple. We are the digital age after all, we know everything there is to know about the web and creating a professional profile – everything is fine and dandy, right?

Well… no. 

Whilst I was halfway in to my research, I found Branham and Farrar’s blog post, and this is where it really hit me; we really do ‘think less and less about what we write online’. We as the digital generation are so dependent on social media as a tool for communication, that we forget these online actions are not limited to our social groups, and can in fact be seen by everyone – including our future employers.

At first, I was convinced that employers ‘vetting’ our social profile was a breach of privacy; that we had to limit our thoughts and opinions out of fear that it would come back to harm our employment prospects. However, having read Cherie’s post, most notably her pros and cons list, I realised that my view was rather cynical. We should use our online profiles to enhance our credibility, and give employers a flavour of who we are. Mary’s comment on my post also helpfully brought to my attention the advice from Chris Smith (2017).  Smith sheds light on how we can maintain control of our content through privacy settings. I found this especially helpful, not because I wasn’t aware of these settings (as seen below); but that these settings can be used in our favour to maintain control over our ‘personal brand’.

Privacy settings copy

As a marketing student, I shouldn’t be afraid of such of a platform to shine! Carolina’s post really cemented this idea; having an authentic professional online profile will allow me to strengthen my own brand and differentiate myself.

Considering the interaction with my peers’ posts, I have created a new checklist which include additional steps that were not included in my original ‘step by step’ guide. This will help me further improve on my own authentic professional profile:


Who knew developing an authentic professional online profile could be so intricate?!

Word Count: 353

My comments can be found here:


Facebook, (2017). Facebook Privacy Settings. Available at: [Accessed 18 Mar. 2017].

Farrar, D. and Branham, C. (2017). Negotiating Virtual Spaces: Public Writing. Available at: [Accessed 9 Mar. 2017].

Knight, C. (2017). Discuss the ways in which an authentic online professional profile can be developed…. Available at: [Accessed 15 Mar. 2017].

Poveda-Ocampo, C. (2017). LinkedWin: Developing your online profile. Available at: [Accessed 15 Mar. 2017].

Smith, C. (2017). Facebook Privacy Settings: A complete guide to keeping control. Available at: [Accessed 16 Mar. 2017].

Topic Three – Reflection

Topic Two – Reflection

Having got the trial run out of the way with Topic One, there was much to improve when addressing Topic Two.  After analysing the marking criteria and engaging with other blog posts, I realised that my first post especially lackedpicture1 the presence of visual elements; this was an area I was determined improve. I saw that many of my peers used ‘Piktochart’ to create infographs so I attempted to make some of my own for my second post. The website was rather easy to use, I quickly and effectively created some informative visual media that helped to get around our limited word count. I will be using this again in my future posts, but having seen Sharon’s nifty use of Photoshop, I aim to explore with other creative sites too.

I also realised that my first post lacked a range of original sources. However, I found this week’s topic to be incredibly interesting, I must admit I was surprised how engaged I became with the research! Identity is a vastly discussed topic, so I was able to take a sociological approach, focussing particularly on Postmodern Ideas to discuss the arguments for having multiple online identities. This slant on the task helped me to think outside of the box and achieve a rich range of sources, differing from other people’s posts.

I really appreciated Mary’s addition of her personal experience with internet fraudsters, it certainly provided strength to her argument and led me to research further. Now knowing the severity of online crimes enabled by the access to multiple online identities – nearly 6 million cases in the UK in 2015 (BBC, 2016), I’d have given this more attention in my own piece.

Over the past week, I have found myself referring to this topic in everyday conversation, I hope that the next topic is just as relevant and interesting.

Word count: 308


BBC (2016) Nearly six million fraud and cyber crimes last year, ONS says. Available at: (Accessed: 4 March 2017).

Buergin, S. (2017) Topic 2: Discuss the arguments for and against having more than one online identity. Available at: (Accessed: 4 March 2017).

Schofield, M. (2017) Topic 2 – is there a benefit to having multiple digital identities? Available at: (Accessed: 4 March 2017).

Topic Two – Reflection

Topic One – Reflection

When choosing this module, I was unsure what I was getting myself in to. The terms ‘flexible learning style’ and ‘all on the web’ instantly appealed to me; I am after all a digital ‘native’ thus learning online seemed easy and natural. However, I had no idea how much work I was going to need to put in and how challenging this module would be; so much so, that setting up my blog was enough to push me out of my comfort zone! At that moment, I suddenly I realised that this module is going to be harder than I thought.

Once I had finally set up my blog, I got stuck in to my very first blog post. I realised that not only was I going to need to do a lot more reading than I anticipated, but also realised that this reading was going to be interesting than I first thought. For the first time in a while, I felt in control of my own education and was actually stimulated to learn more. As well as this, the topic task at hand forced me to draw upon my own online experience, I felt like this really allowed me to acknowledge the relevance of these typologies in real life, which really helped me to appreciate Prensky and White and Cornu’s views.

I found sticking to a low word count especially hard. Having done all this reading and engaging with the topic on a personal level, it was incredibly difficult to limit my words. This difficulty is certainly something that I will continue to battle with throughout the course; but I believe it is helping me to maintain consistent and concise. I also found that the limitation on word count made reading my peers work easier, and helped to keep me engaged to be able to provide constructive feedback. Eloane’s blog post really highlighted the fact that clearly sectioning your work using subtitles can further help consistent clarity.

Finally, receiving feedback, engaging in discussions, and extra questioning from Raziya has helped me to critically analyse my own work; which is a skill which I hope will improve my writing for the next blog post!

My comments can be seen via:

Topic One – Reflection