preview

How To Build A False Identity

Decent Essays

Hiding in Plain Sight In a twenty-four-hour day, internet users will have communicated online at least once whether it is writing to a classmate on a message board, posting pictures on Instagram, or responding to colleges via email. It is possible that a different username and identity are used for each of these online communications, each username constituting, in effect, a separate “personality.” These online personalities may be a part of one’s authentic self or a separate identity altogether. In The Times article, "Internet 'trolls' ignore social rules: Expert: Online disinhibition effect means many people feel invincible online," the anonymous author states, “This is your brain in cyberspace: while in warp-speed from forum to …show more content…

Many social media users, for example, have felt the blow of a very hurtful comment from strangers or friends hidden behind a false identity. For example, Twitter has become a venue where anyone from famous politicians, Hollywood elite, to one’s immediate family may spew out inflammatory and bombastic comments that they would never utter in a face to face encounter. This kind of startling exchange is just a sample of how toxic the Internet can be when the users are not accountable and can hide behind the screen of the internet. Due to the loss of face-to-face contact while online, some people obviously feel free to say whatever they want, and with the lack of initial personal reaction from the recipient of these remarks, the online troll feels no remorse. In the article, "Hiding Behind the Screen," Roger Scruton states, "In human relations, risk avoidance means the avoidance of accountability, the refusal to stand judged in another’s eyes, the refusal to come face to face with another person…to run the risk of rejection. Accountability is not something should avoid; it is something we need to learn.” (59). This statement makes one wonder if the cultural shift to online communication and the inevitable lack of

Get Access