You are on page 1of 12

INTERNATIONAL ISLAMIC UNIVERSITY MALAYSIA

KULLIYYAH OF LANGUAGES AND MANAGEMENT

ENCO 4105

COMPUTER MEDIATED COMMUNICATION

SEM 1 2017/2018

INSTRUCTOR:

ASSOC. PROF. DR. MURNI BT. MAHMUD

TITLE:

THE NEGATIVE EFFECTS OF

MISPRESENTING ONESELF ONLINE

NUR LINA FARHANA BINTI YUSLI

1423740
TABLE OF CONTENT

Topic Page number

Abstract

1.0 Introduction

2.0 Literature Review

2.1 Identity theft

2.2 Cyberbully

2.3 Over-sharing

3.0 Islamic Perspectives

4.0 Discussion

5.0 Conclusion

References
ABSTRACT

Internet has become the most preferred way of communication and an influential tool of

constructing identity. This online identity is how a person would present himself to diverse

other users. Exchanging and sharing information, pictures, videos, and others on websites help

to establish an identity as well. However, there are two sides to every coin. This paper

highlights the negative effects of mispresenting oneself online which can result to threats like

identity theft, cyberbully, and so on. The paper also provides the Islamic perspectives on how

to curb these problems from escalating.

Keywords: social media, online identity, self-presentation, virtual world, identity theft,

cyberbully, privacy

1.0 INTRODUCTION

In this digital age, the usage of internet has become a part and parcel of peoples

communication and interaction. The social media specifically, has grown into a new

phenomenon and somehow addiction among the users today. As mentioned by Urista et al

(2009), the main reason the U.S citizen use the Internet is to keep in touch and interact with

others via social media like Facebook, Twitter, Instagram, and others. This is evident by the

percentage published by The Statistics Portal (2017) where in 2017, 71% of Internet users were

social network users and this number is more likely to increase in the future. Through these

social media or social networking sites (SNS), users would have to establish an online identity

to reach out to other users. Online identity is the identity that the users construct to present

themselves online.
Since there is no specific rules and guidelines in constructing their online identities,

some may choose to use their real information online while others are more comfortable with

being anonymous or even create fake identities. Most of the websites available would usually

require the users to provide their background information such as names, birthdays, addresses,

preferences and interests, and so on. On the surface, it can seem like there is nothing wrong in

allowing this information to be posted online, however without we realize, we are automatically

risking our privacy in exchange for this connectedness. Apart from displaying our basic

information, how we handle these social accounts too shows how we are presenting ourselves

in the virtual world. For example, when we drop negative comments on someone elses post,

it automatically reveals what kind of person we are.

Now, with the addition of smartphones and other types of gadgets with their abilities to

upload and post everything instantaneously, the issues derived from mispresenting yourselves

online are impossible to be avoided. What some users may not realize however is that the

Internet is like a spider web; it catches everything. What they put out there, they cannot take

them back; it may be out on the Internet forever. Even though they have proved themselves to

be technology and Internet-savvies, these skills alone are not enough to hinder the various

threats resulting from mispresenting yourselves online.


2.0 LITERATURE REVIEW

Apart from privacy issue, other concerns such as credit card and identity fraud,

cyberbullying and defamation too are common and can happen to just about everyone.

2.1 IDENTITY THEFT

Identity theft and identity fraud as defined by US Identity Theft and Assumption

Deterrence Act (title 18, s. 1028(a)(7) U.S.C.), is s/he who knowingly transfers, possesses, or

uses, without lawful authority, a means of identification of another person with the intent to

commit, or to aid or abet, or in connection with, any unlawful activity that constitutes a

violation of Federal law, or that constitutes a felony under any applicable State or local law

(Legal Information Institute LII, n.d.). Basically, it means using other peoples identity to

commit a crime. In 2014, 7% of U.S residents were known to be the victims of identity theft,

this was based on the statistics published by the U.S. Department of Justice (Harrel, 2015).

Identity theft is done when a fraudster gains access to online users personal information

such as their birth dates, credit card numbers, and Social Security numbers and inappropriately

use this information to do something that could bring satisfaction to him like transferring

money from the victims bank account. It is one of the most invasive cybercrimes not only in

U.S but also globally since it can bring financial rewards to the perpetrators as well as cause

reputational harms to the victims.


2.2 CYBERBULLY

Online anonymity gives the opportunity for some people to cross the boundaries and

act in ways that they would not act in real life. This is when cyberbully usually happens

(Heirman & Walrave, 2008; Shariff, 2009). According to the National Crime Prevention

Council (2010), cyberbullying is much the same as other types of bullying, the difference is

that its done by means of information and communication technologies (Belsey, 2004). In a

poll issued by the Fight Crime: Invest in Kids, one-third of teens and one-sixth of primary

school-aged children had reported of being the victims of cyberbully (Cook, Williams, Guerra,

& Tuthill, 2007). Forms of cyberbullying include spreading false rumors about someone,

attacking someone with harsh or vulgar languages, leaking someone elses private matter and

others. This sense of anonymity makes some people feel superior and think its okay to hide

behind their screen names and engage in cyberbullying without being worried about getting

caught.

One of the famous cyberbullying stories was the Brandy Vela case. Brandy had endured

being bullied about her weight for years but not until 2016 when the harassment started to

escalate. A fake Facebook account was made using her information. The perpetrator even left

her contact number, saying that she wanted sex. After a few months of being stalked and

harassed, she committed suicide by shooting herself in front of her family. It was later found

that her ex-boyfriend, Andres Arturo Villagomez and his girlfriend, Karinthya Sanchez

Romero were the people responsible for the cyberbullying. Andres was charged with unlawful

disclosure of intimate visual material while Karinthya faced even stricter charges for stalking

and committing online impersonation (Brennan, 2017).


2.3 OVER-SHARING

On top of that, over-sharing their information is one of the mistakes that people tend to

do when presenting themselves online. It has become far too easy to post any personal

information in the heat of a moment that you may regret down the road. Generally, younger

users are more prone to share this kind of information as theyre less experienced and

eventually risking the data from being misused (Zukowski & Brown, 2007). Apart from that,

another consequence of over-sharing is jeopardizing your job or risk to be expelled from your

educational institution. Few actions of over-sharing that may put your future or current career

at stake include posting inappropriate pictures of yourself like partying and drinking, involving

in controversial arguments or debates on the Internet, and others.

One case that could show the implication of sharing unnecessary information online

was in 2007 where an intern, Kevin Colvin told his employer that he could not go to work on

one particular day, claiming he had a family emergency. He then posted a picture of himself at

a Halloween party. The picture eventually got to the hand of his employer who then CCd the

picture to the whole company and fired him (Daniloff, 2011). Another case was in 2009 where

an office administrator, Kimberley Swann lost her job at Ivell Marketing & Logistics after

posting a status on Facebook saying the job was boring. She was called into her employers

office and was asked to leave the job on the spot (Levy, 2009).
3.0 ISLAMIC PERSPECTIVES

Abu Hurairah r.a reported: I heard the Prophet S.A.W saying, "A person utters a word

thoughtlessly (i.e., without thinking about its being good or not) and, as a result of this, he will

fall down into the fire of Hell deeper than the distance between the east and the west." [Al-

Bukhari and Muslim] (Sunnah.com, n.d.).

It is easy to be lured and become so engrossed in a social media bubble, therefore its

crucial to remain courteous and attentive every time we are out there venturing into the cyber

world. Internet is a world full of people with different beliefs and ideas, hence disagreement

may happen anytime. However, this clash of opinions must not be the reason to engage in

hurtful debates. Its better not to involve in any discussion that you know can easily slips into

an aggressive melee altogether.

Abu Huraira reported: The Prophet, peace and blessings be upon him, said, Faith

consists of sixty to seventy branches, the best of which is to declare there is no God but Allah

and the least of which is to remove something harmful from the road, and modesty is a branch

of faith. [Sahih al-Bukhari 9, Sahih Muslim 35] (Abu, 2012).

In regard to this hadith, we are advised to keep our modesty in check even when using

social media. Whatever we share online reflects who we are. Intentionally sharing your

personal information, revealing pictures of yourselves and so on will lure people into becoming

unabashedly immodest. Thus, it is best to avoid from posting all those inappropriate or

unnecessary information and replace them with something beneficial to all. Remember that
modesty is part of faith and without it, one might be comfortable in committing sinful

behaviour.

All mankind is from Adam and Eve, an Arab has no superiority over a non-Arab nor

a non-Arab has any superiority over an Arab; also a white has no superiority over a black nor

a black has any superiority over white except by piety and good action. [Prophet Muhammad

S.A.W] (Amatullah, 2007)

These bits and pieces of Prophet Muhammad S.A.Ws last sermon truly emphasize the

equality among mankind. There are differences in wealth, abilities, and so on but that doesnt

make one superior than the other. Hence, we must be respectful towards each other and

remember that were all the same in the sight of Allah S.W.T.
4.0 DISCUSSION

It all comes down to one simple solution; think. Before posting about anything online,

think twice and think ahead of any consequences it may bring you later on. Ask yourselves

these questions; what kind of things are you going to post? Would your act hurt other users?

How much thought have you given in selecting or forming your post? How do you think you

are perceived online? These questions can act as the rules of thumb in presenting yourselves to

others and how to interact with them.

Basically, online users must consider cautious approaches in presenting themselves on

social media. A variation of techniques must be taken to put a stop to these negative issues. In

particular, online users need to have a deep or real understanding of interacting in online world.

5.0 CONCLUSION

Internet has prompted people to share personal information online, and social network

users often participate in the sharing of information about themselves. This paper has examined

the many ways that misappropriate presentations of yourselves online can bring about lot of

consequences. While there are various ways to react to this crime, the most important thing to

acknowledge is to increase the awareness of the risks associated with how one presents himself

in the virtual world. It is hoped that more interest in this topic will be generated by raising

awareness of this issue.


REFERENCES

18 The Book of the Prohibited actions. Sunnah.com. Retrieved November 18, 2017 from
https://sunnah.com/riyadussaliheen/18

18 U.S. Code 1028 - Fraud and Related Activity in Connection with Identification
Documents, Authentication Features, and Information. Legal Information
Institute LII. Retrieved November 15, 2017 from
https://www.law.cornell.edu/uscode/text/18/1028

Abu, A. E.. (2012). Hadith on Faith: True faith has seventy branches including modesty. Daily
Hadith Online. Retrieved November 18, 2017, from
http://dailyhadith.abuaminaelias.com/2012/09/12/hadith-on faith-true-belief-has
seventy-branches-including-modesty/

Amatullah, A. (2007). The last sermon of Prophet Muhammad which he delivered at Hajj, the
annual pilgrimage made to Mecca by Muslims all over. Prophet Muhammads Last
Sermon: A Final Admonition. Retrieved November 18, 2017 from
https://www.islamreligion.com/articles/523/prophet-muhammad-last-sermon/

Belsey, B. (2004). What is cyberbullying? Retrieved April 4, 2009, from


https://www.bullying.org/external/documents/ACF6F8.pdf

Brennan, C. (2017, March 16). Ex-boyfriend arrested for sharing nude photos of Texas teen
who killed self after cyberbullying. NY Daily News. Retrieved November 18, 2017 from
http://www.nydailynews.com/news/national/ex-boyfriend-arrested-suicide
cyberbullied texas-teenager-article-1.3000186

Cook, C.R., Williams, KR., Guerra, N.G., & Tuthill, L. (2007, September). Cyberbullying:
What it is and what we can do about it. NASP Communique, 36(1), n.p.

Daniloff, C. (2011, November). Facebook Got Me Fired. Boston University Today. Retrieved
November 8, 2017 from https://www.bu.edu/today/2011/facebook-got-me-fired/

Harrel, E. (2015, September). Victims of Identity Theft, 2014. U.S. Department of Justice.
Retrieved November 15, 2017 from https://www.bjs.gov/content/pub/pdf/vit14.pdf

Heirman, W. & Walrave, M. (2008). Assessing concerns and issues about the mediation of
technology in cyberbullying. Cyberpsychology: Journal of Psychosocial Research on
Cyberspace, 2, (2), article 1. Retrieved November 17, 2017 from
http://cyberpsychology.eulview.php?cisloclanku=2008111401&article=1\

Levy, A. (2009, February). Teenage office worker sacked for moaning on Facebook about her
'totally boring' job. The Daily Mail. Retrieved November 8, 2017 from
http://www.dailymail.co.uk/news/article-1155971/Teenage-office-worker-sacked
moaning-Facebook-totally-boring-job.html
Number of Social Media Users Worldwide from 2010 to 2021 (in billions). The Statistics
Portal. Retrieved November 15, 2017 from
https://www.statista.com/statistics/278414/number-of-worldwide-social-network
users/

Shariff, S. (2009). Confronting cyber-bullying: What schools need to know to control


misconduct and avoid legal consequences. New York: Cambridge University Press.

Urista, M.A., Dong, Q., & Day, K.D. (2009). Explaining why young adults use Myspace
and Facebook through uses and gratifications theory. Human Communication, 12(2),
215- 229.

Zukowski, T. & Brown, I. (2007). Examining the influence of demographic factors on internet
users' information privacy concerns. Proceedings of the 2007 Annual Research
Conference of the South African Institute of Computer Scientists and Information
Technologists on IT Research in Developing Countries (SAICSIT '07). ACM, New
York, NY, USA, 2007, pp. 197-204.

You might also like