Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

ARELLANO UNIVERSITY

JUAN SUMULONG CAMPUS

James Simon V. Rozul 03/04/2022

1st Year BSIT Understanding the Self

I. The Digital Self


- Today’s adolescences are exposed to a technology revolution with the prevalence of
computer uses and accessibility, the internet and sophisticated mobile phones. The social
environment of present-day adolescents has increasingly become digitally mediated.

II. What Statistics say


- According to the article of Medinilla (2016), the Philippines is the fastest growing market of
smartphones in the Association of southeast Asian nations (ASEAN) based on the report of a
market research company, International Data Corporation (IDC)

III. Self and other in Cyberspace


- Digital Literacy is defined as those capabilities possessed by individuals who are living,
learning and working in a digital society. In the Real-world authority and status may be
expressed by clothing and body language.

- Online Disinhibition is the lack of restraint one feels when communicating online in
comparison to communicating in-person. This could have both positive and negative effects.

IV. Two Categories of Online Disinhibition


- Benign Disinhibition – Not all disinhibition is a bad thing. Sometimes people share very
personal things about themselves. It could be a cathartic experience which gives
opportunity to reveal secret emotion, fear and wishes.

- Toxic Disinhibition – Can be also be ugly. People have witnessed rude language, harsh
criticism, anger, hatred, even threats online. Others may even go to the dark side of the
internet where they can access pornography, crimes, and other forms of violence.

a) Cyberbullying is bullying that takes places using electronic technology. Electronic


technology includes devices and equipment such as cell phones, computers, and
tables as well as communication tools including social media sites, text
messages, chats, and websites.
b) Cyber Harassment is the use of Information and Communication Technology
(ICT) to harass, control, manipulate or habitually disparage a child, adult,
business or group without a direct or implied threat of physical harm.

V. I, Me, Myself and My user ID online identity


- The term digital identity (DI) refers to anything that describes a persona an individual
presents across all the digital spaces that he/she is represented in. Symbolic market express
one’s identity to others and helps them make sense of it themselves.

- User ID lets a person associate a persistent ID for a single user with that user’s engagement
data from one or more sessions initiated from one or more devices. Username is also called
login name, logon name, sign-in name, sign-on name which is a unique sequence of
characters used to identify a user and allow access to a computer system, computer
network, or online account.

VI. Self-Presentation Strategies and Impression Management


1. Self-promotion – The person who is using self-promotion is trying to show that he/she is
competent, effective or a winner. This person expects respect.

2. Ingratiation – The person using ingratiation in presenting oneself to others has a desire
to be likeable. They expect affection.

3. Exemplification – This person who is using exemplification has intention to achieve


worth from others. He/she expects others to feel guilty by their actions.

4. Intimidation – The person who is using intimidation tries to appear dangerous or


ruthless. He/she expects others to be afraid of them.

5. Supplication – The person using supplication, would like to appear helpless. He/she
aims to achieve nurturance from others.

Self-enhancement – refers to the tendency to think of oneself in a favorable light, whereas impression
management refers to a deliberate attempt to distort one’s responses in order to create a favorable
impression with others.
VII. Conclusion
- In my conclusion about digital self, is all around us humans are now facing the modern
world of technology. It can be good or it can be a bad thing to use because of some people.
Because technology have a positive side and some negative side that we need to proceed
with caution. We need to prioritize ourself from safety of technology because sometimes we
can be hacked and we will never use our accounts again.

You might also like