Digital Identities and Digital Security

Digital Identity = Internet equivalent of your physical identity.

Digital Security = Protection of your digital identity.

(JustAskGemalto, n.d.)

According to Techopedia (2016),  digital identity is “an online or networked identity adopted or claimed in cyberspace by an individual, organization or electronic device.” When it comes to the management of digital identity, digital security and privacy are the key areas of concern as once you log onto a device, you leave part of your digital identity – your digital footprint.

Digital Identity

(OISTE Foundation, 2014)

During my research, every time I logged onto my devise I was aware that I had very little control over the information that I share about myself. Once it is “out there”, I cannot control what other “users” might do with it. I may be able to delete a picture, post or message of myself but it’s never completely removed from the internal data bank of the almighty “internet cloud” and unfortunately can always be found by someone that has the power and the means. By using different identities as a source of digital security, as suggested by Tranberg (2013), I am able to have more control over what I post, on which identity I use, who I connect with and how I do it.

Within the classroom, it is important that as an educator I teach my students to protect their digital identities with digital security knowledge. Some examples of this are:

(NYCF, 2016)

  • Not sharing personal information with people they do not know (Belvery & Ivanoff, 2013)
  • Creating strong passwords to protect themselves from identity fraud and theft, cyberbulling and tracking (Digital-identity, 2013).
  • Installing virus and malware protection on their devices to keep them safe from people stealing their personal information or phishing to access sensitive information such as passwords and credit card details which is a persons digital citizenship (Belvery & Ivanoff, 2013).
  • Adding surge protectors to ensure your hardware are not damaged from outside influences (Belvery & Ivanoff, 2013).

By ensuring we have digital securities in place, we can protect our digital identities and be empowered to share what we want and when we want (Internet Society, 2016).


The Internet Society has developed 3 interactive tutorials to help educate and inform people who would like to protect their privacy and identity. 

– These would make for excellent classroom viewing-

Tutorial 1:
Tutorial 2:
Tutorial 3:
screenshot of online identity training module screenshot of protecting your privacy training module screenshot of protecting your identity training module
This tutorial will explain some of the key differences between your online and “real life” identity, recognize the nature of digital identities, and understand the difference between online identity and personal privacy. Watch the tutorial now. This tutorial will explain the key concerns related to online identity and privacy, recognize what kind of user information is collected and why, identify the ways of controlling the privacy of your online identity. Watch the tutorial now. This tutorial will explain the challenges in protecting online identities and help you recognize the ways you can protect your online identity. Watch the tutorial now.



Belvery, J & Ivanoff, K. (2013, February 12). Digital security. Retrieved from

Digital-identity. (2013, February 20). Disadvantages of Digital Identity [Video file]. Retrieved from

JustAskGemalto. (n.d.). What is digital security? Retrieved from

OISTE Foundation. (2014). What is digital identity?  [Image]. Retrieved from

Techopedia. (2016). Digital Identity. Retrieved from

Tranberg, P. (2013, April 10). Fake it – to control your digital identity [Video file]. Retrieved from

Internet Society. (2016). Manage your identity. Retrieved from

NYCF. (2016). Computer and Digital Security [Image]. Retrieved from


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s