Professional Documents
Culture Documents
ENCO 4105
SEM 1 2017/2018
INSTRUCTOR:
TITLE:
1423740
TABLE OF CONTENT
Abstract
1.0 Introduction
2.2 Cyberbully
2.3 Over-sharing
4.0 Discussion
5.0 Conclusion
References
ABSTRACT
Internet has become the most preferred way of communication and an influential tool of
constructing identity. This online identity is how a person would present himself to diverse
other users. Exchanging and sharing information, pictures, videos, and others on websites help
to establish an identity as well. However, there are two sides to every coin. This paper
highlights the negative effects of mispresenting oneself online which can result to threats like
identity theft, cyberbully, and so on. The paper also provides the Islamic perspectives on how
Keywords: social media, online identity, self-presentation, virtual world, identity theft,
cyberbully, privacy
1.0 INTRODUCTION
In this digital age, the usage of internet has become a part and parcel of peoples
communication and interaction. The social media specifically, has grown into a new
phenomenon and somehow addiction among the users today. As mentioned by Urista et al
(2009), the main reason the U.S citizen use the Internet is to keep in touch and interact with
others via social media like Facebook, Twitter, Instagram, and others. This is evident by the
percentage published by The Statistics Portal (2017) where in 2017, 71% of Internet users were
social network users and this number is more likely to increase in the future. Through these
social media or social networking sites (SNS), users would have to establish an online identity
to reach out to other users. Online identity is the identity that the users construct to present
themselves online.
Since there is no specific rules and guidelines in constructing their online identities,
some may choose to use their real information online while others are more comfortable with
being anonymous or even create fake identities. Most of the websites available would usually
require the users to provide their background information such as names, birthdays, addresses,
preferences and interests, and so on. On the surface, it can seem like there is nothing wrong in
allowing this information to be posted online, however without we realize, we are automatically
risking our privacy in exchange for this connectedness. Apart from displaying our basic
information, how we handle these social accounts too shows how we are presenting ourselves
in the virtual world. For example, when we drop negative comments on someone elses post,
Now, with the addition of smartphones and other types of gadgets with their abilities to
upload and post everything instantaneously, the issues derived from mispresenting yourselves
online are impossible to be avoided. What some users may not realize however is that the
Internet is like a spider web; it catches everything. What they put out there, they cannot take
them back; it may be out on the Internet forever. Even though they have proved themselves to
be technology and Internet-savvies, these skills alone are not enough to hinder the various
Apart from privacy issue, other concerns such as credit card and identity fraud,
cyberbullying and defamation too are common and can happen to just about everyone.
Identity theft and identity fraud as defined by US Identity Theft and Assumption
Deterrence Act (title 18, s. 1028(a)(7) U.S.C.), is s/he who knowingly transfers, possesses, or
uses, without lawful authority, a means of identification of another person with the intent to
commit, or to aid or abet, or in connection with, any unlawful activity that constitutes a
violation of Federal law, or that constitutes a felony under any applicable State or local law
(Legal Information Institute LII, n.d.). Basically, it means using other peoples identity to
commit a crime. In 2014, 7% of U.S residents were known to be the victims of identity theft,
this was based on the statistics published by the U.S. Department of Justice (Harrel, 2015).
Identity theft is done when a fraudster gains access to online users personal information
such as their birth dates, credit card numbers, and Social Security numbers and inappropriately
use this information to do something that could bring satisfaction to him like transferring
money from the victims bank account. It is one of the most invasive cybercrimes not only in
U.S but also globally since it can bring financial rewards to the perpetrators as well as cause
Online anonymity gives the opportunity for some people to cross the boundaries and
act in ways that they would not act in real life. This is when cyberbully usually happens
(Heirman & Walrave, 2008; Shariff, 2009). According to the National Crime Prevention
Council (2010), cyberbullying is much the same as other types of bullying, the difference is
that its done by means of information and communication technologies (Belsey, 2004). In a
poll issued by the Fight Crime: Invest in Kids, one-third of teens and one-sixth of primary
school-aged children had reported of being the victims of cyberbully (Cook, Williams, Guerra,
& Tuthill, 2007). Forms of cyberbullying include spreading false rumors about someone,
attacking someone with harsh or vulgar languages, leaking someone elses private matter and
others. This sense of anonymity makes some people feel superior and think its okay to hide
behind their screen names and engage in cyberbullying without being worried about getting
caught.
One of the famous cyberbullying stories was the Brandy Vela case. Brandy had endured
being bullied about her weight for years but not until 2016 when the harassment started to
escalate. A fake Facebook account was made using her information. The perpetrator even left
her contact number, saying that she wanted sex. After a few months of being stalked and
harassed, she committed suicide by shooting herself in front of her family. It was later found
that her ex-boyfriend, Andres Arturo Villagomez and his girlfriend, Karinthya Sanchez
Romero were the people responsible for the cyberbullying. Andres was charged with unlawful
disclosure of intimate visual material while Karinthya faced even stricter charges for stalking
On top of that, over-sharing their information is one of the mistakes that people tend to
do when presenting themselves online. It has become far too easy to post any personal
information in the heat of a moment that you may regret down the road. Generally, younger
users are more prone to share this kind of information as theyre less experienced and
eventually risking the data from being misused (Zukowski & Brown, 2007). Apart from that,
another consequence of over-sharing is jeopardizing your job or risk to be expelled from your
educational institution. Few actions of over-sharing that may put your future or current career
at stake include posting inappropriate pictures of yourself like partying and drinking, involving
One case that could show the implication of sharing unnecessary information online
was in 2007 where an intern, Kevin Colvin told his employer that he could not go to work on
one particular day, claiming he had a family emergency. He then posted a picture of himself at
a Halloween party. The picture eventually got to the hand of his employer who then CCd the
picture to the whole company and fired him (Daniloff, 2011). Another case was in 2009 where
an office administrator, Kimberley Swann lost her job at Ivell Marketing & Logistics after
posting a status on Facebook saying the job was boring. She was called into her employers
office and was asked to leave the job on the spot (Levy, 2009).
3.0 ISLAMIC PERSPECTIVES
Abu Hurairah r.a reported: I heard the Prophet S.A.W saying, "A person utters a word
thoughtlessly (i.e., without thinking about its being good or not) and, as a result of this, he will
fall down into the fire of Hell deeper than the distance between the east and the west." [Al-
It is easy to be lured and become so engrossed in a social media bubble, therefore its
crucial to remain courteous and attentive every time we are out there venturing into the cyber
world. Internet is a world full of people with different beliefs and ideas, hence disagreement
may happen anytime. However, this clash of opinions must not be the reason to engage in
hurtful debates. Its better not to involve in any discussion that you know can easily slips into
Abu Huraira reported: The Prophet, peace and blessings be upon him, said, Faith
consists of sixty to seventy branches, the best of which is to declare there is no God but Allah
and the least of which is to remove something harmful from the road, and modesty is a branch
In regard to this hadith, we are advised to keep our modesty in check even when using
social media. Whatever we share online reflects who we are. Intentionally sharing your
personal information, revealing pictures of yourselves and so on will lure people into becoming
unabashedly immodest. Thus, it is best to avoid from posting all those inappropriate or
unnecessary information and replace them with something beneficial to all. Remember that
modesty is part of faith and without it, one might be comfortable in committing sinful
behaviour.
All mankind is from Adam and Eve, an Arab has no superiority over a non-Arab nor
a non-Arab has any superiority over an Arab; also a white has no superiority over a black nor
a black has any superiority over white except by piety and good action. [Prophet Muhammad
These bits and pieces of Prophet Muhammad S.A.Ws last sermon truly emphasize the
equality among mankind. There are differences in wealth, abilities, and so on but that doesnt
make one superior than the other. Hence, we must be respectful towards each other and
remember that were all the same in the sight of Allah S.W.T.
4.0 DISCUSSION
It all comes down to one simple solution; think. Before posting about anything online,
think twice and think ahead of any consequences it may bring you later on. Ask yourselves
these questions; what kind of things are you going to post? Would your act hurt other users?
How much thought have you given in selecting or forming your post? How do you think you
are perceived online? These questions can act as the rules of thumb in presenting yourselves to
social media. A variation of techniques must be taken to put a stop to these negative issues. In
particular, online users need to have a deep or real understanding of interacting in online world.
5.0 CONCLUSION
Internet has prompted people to share personal information online, and social network
users often participate in the sharing of information about themselves. This paper has examined
the many ways that misappropriate presentations of yourselves online can bring about lot of
consequences. While there are various ways to react to this crime, the most important thing to
acknowledge is to increase the awareness of the risks associated with how one presents himself
in the virtual world. It is hoped that more interest in this topic will be generated by raising
18 The Book of the Prohibited actions. Sunnah.com. Retrieved November 18, 2017 from
https://sunnah.com/riyadussaliheen/18
18 U.S. Code 1028 - Fraud and Related Activity in Connection with Identification
Documents, Authentication Features, and Information. Legal Information
Institute LII. Retrieved November 15, 2017 from
https://www.law.cornell.edu/uscode/text/18/1028
Abu, A. E.. (2012). Hadith on Faith: True faith has seventy branches including modesty. Daily
Hadith Online. Retrieved November 18, 2017, from
http://dailyhadith.abuaminaelias.com/2012/09/12/hadith-on faith-true-belief-has
seventy-branches-including-modesty/
Amatullah, A. (2007). The last sermon of Prophet Muhammad which he delivered at Hajj, the
annual pilgrimage made to Mecca by Muslims all over. Prophet Muhammads Last
Sermon: A Final Admonition. Retrieved November 18, 2017 from
https://www.islamreligion.com/articles/523/prophet-muhammad-last-sermon/
Brennan, C. (2017, March 16). Ex-boyfriend arrested for sharing nude photos of Texas teen
who killed self after cyberbullying. NY Daily News. Retrieved November 18, 2017 from
http://www.nydailynews.com/news/national/ex-boyfriend-arrested-suicide
cyberbullied texas-teenager-article-1.3000186
Cook, C.R., Williams, KR., Guerra, N.G., & Tuthill, L. (2007, September). Cyberbullying:
What it is and what we can do about it. NASP Communique, 36(1), n.p.
Daniloff, C. (2011, November). Facebook Got Me Fired. Boston University Today. Retrieved
November 8, 2017 from https://www.bu.edu/today/2011/facebook-got-me-fired/
Harrel, E. (2015, September). Victims of Identity Theft, 2014. U.S. Department of Justice.
Retrieved November 15, 2017 from https://www.bjs.gov/content/pub/pdf/vit14.pdf
Heirman, W. & Walrave, M. (2008). Assessing concerns and issues about the mediation of
technology in cyberbullying. Cyberpsychology: Journal of Psychosocial Research on
Cyberspace, 2, (2), article 1. Retrieved November 17, 2017 from
http://cyberpsychology.eulview.php?cisloclanku=2008111401&article=1\
Levy, A. (2009, February). Teenage office worker sacked for moaning on Facebook about her
'totally boring' job. The Daily Mail. Retrieved November 8, 2017 from
http://www.dailymail.co.uk/news/article-1155971/Teenage-office-worker-sacked
moaning-Facebook-totally-boring-job.html
Number of Social Media Users Worldwide from 2010 to 2021 (in billions). The Statistics
Portal. Retrieved November 15, 2017 from
https://www.statista.com/statistics/278414/number-of-worldwide-social-network
users/
Urista, M.A., Dong, Q., & Day, K.D. (2009). Explaining why young adults use Myspace
and Facebook through uses and gratifications theory. Human Communication, 12(2),
215- 229.
Zukowski, T. & Brown, I. (2007). Examining the influence of demographic factors on internet
users' information privacy concerns. Proceedings of the 2007 Annual Research
Conference of the South African Institute of Computer Scientists and Information
Technologists on IT Research in Developing Countries (SAICSIT '07). ACM, New
York, NY, USA, 2007, pp. 197-204.