Cyber-Community And Cyber-Identity

Academic Anxiety?

Get an original paper within hours and nail the task

156 experts online

Free Samples

Cyber-Community And Cyber-Identity

.cms-body-content table{width:100%!important;} #subhidecontent{ position: relative;
overflow-x: auto;
width: 100%;}

Cyber-Community And Cyber-Identity

0 Download5 Pages / 1,170 Words

Discuss about the Cyber-Community and Cyber-Identity.

Undoubtedly one of the greatest inventions in the history of Mankind has been the internet as the ease through which any regular person is able to access it. The way in which people interacted and communicated has been indeed radically changed by the introduction of internet where even telecommunication is possible. The internet which had initially been invented for military used has in the contemporary world become became a general feature of almost all computer devices around the world. As the internet can be easily and widely accessed it has become a significant influence on the society and its individuals. I did not have much knowledge about the significance of cyberidentity and cybercommunity in the contemporary world. In had a perception that cyberidentity and cybercommunity are moderate in nature and do not possess any significant harm to the society. People have been provided a new platform through which they can express their views and find people who have similar perspectives as it would be difficult for them to do such activities easily without the use of the internet.
According to Roberts Indermaur and Spiranovic (2013) cyber identity or Internet identity is a sort of social identity which uses of the Internet create an established in online websites and communities. Nakamura and Chow (2013) define cyber identity as the actively portrait presentation of one’s personality. I thought that people always choose their real names to establish their Internet identity however in reality Internet users also prefer to be using different names and be anonymous through identifying themselves using pseudonyms unrevealing only certain kind of information through which personality can be identified. The relationship of the user with certain social group which they are a part of online can also be used to identify the server identity of a person. Through detailed study on cyber identity I got the knowledge that some people can also be deceptive in relation to their identity on the Internet. In few online context such as online chats massive multiplayer online games Internet forums Internet users Virtually represent themselves by selecting an avatar which is a graphical image size of icon. Choosing search avatars maybe a certain kind of way through which the Internet identity is established. Whether or not The Identity established over the Internet can be trusted is derived from the interaction of such identity with other users. The association of Cyber identity and community is mostly through authentication which generally needs login and registration. Tracking cookies and IP address are also used by a few websites to identify users. The principles in relation to Cyber identity and how emerging Technology influences it is a subject area of research in feels like psychology Sociology and education. One of the notable examples is the online this inhibition effect which refers to the concept of uninhibited and advise behavior over the Internet which establishes through audience gratification and anonymity.
The Internet provides a space to the users through which they have the possibility of exposing and expressing their identities in a social context. For instance identity is defined by people through creation of user profiles in social networking sites like Twitter LinkedIn or Facebook. More tactic identities are defined when the individuals by providing opinions and blogs over search social networking sites. There may be a certain issues related to privacy with the disclosure of cyber identity. Strategies are adopted by many people through which they can control the disclosure of their personal identity over the Internet. Some of these strategies require significant investment of efforts. Carpenter, Steeves and Abzarian (2016) states that many questions have been raised among academic after the emergence of online identity concept. The concept of Identity have been complicated by online avatars and social networking services. A domain of scholarly research have been created by academy for responding to such emerging trends such as technoself studies which emphasizes on technological societies and human identity.
In the book building virtual communities Druckenmiller and Mittleman (2015) have explored online identity emphasizing on the concept of masking identity. It has been pointed out by then that a Mask of their identity is portrayed by individuals when way interact in social space. The situation is of no difference in online sites and become increasingly pronounced because of decisions Di mistake in relation to their online profiles. They have to answer specific questions in relation to user name address gender age and so on. In addition where once online identity has accrued The Mask of such person is defined by the way in which they write choose topic and vocabulary. The type of mass which is elected by a person over the Internet reviews little about the subject who has selected the mask. This might be called buy one as a metaphor of the mask. The actual identity of the person is not revealed by the online mask. However some hints of what actually lies behind the mask are revealed by it. For instance weather person selects to act like a cricketer the metaphor would you be an interest in cricket. Where a person refers to hide behind the cyber identity it reveals about that lack of self-esteem and fear behind the false mask (Nakamura 2013).
By studying the above literature my perspective about cyber community and cyber identity significantly changed. There is a deep study in relation to the identification of human beings which have recently emphasized on Internet identity. Just like people use a mask in the society they also do it over the Internet to portray themselves as one which they are not. Some people also use Internet identity to indulge in criminal activities and hide the real identity so that they can avoid being caught. I also got to know that the mask which people use with respect to Cyber identity and community they will something about the actual personality. Strategies are adopted by many people through which they can control the disclosure of their personal identity  over the Internet. Some of these strategies require significant investment of efforts. A domain of scholarly research have been created by academy for responding to such emerging trends such as technoself studies which emphasizes on technological societies and human identity. I got to know that internet identity is rapidly penetrating the Australian society and taking over the concept of social identity at a great pace.
Roberts, L.D., Indermaur, D. and Spiranovic, C., 2013. Fear of cyber-identity theft and related fraudulent activity. Psychiatry, Psychology and Law, 20(3), pp.315-328.
Druckenmiller, D.A. and Mittleman, D., 2015, January. A Design Theory for Digital Habitats: Building Virtual Communities of Practice. In System Sciences (HICSS), 2015 48th Hawaii International Conference on (pp. 571-580). IEEE.
Nakamura, L. and Chow-White, P. eds., 2013. Race after the Internet. Routledge.
Nakamura, L., 2013. Cybertypes: Race, ethnicity, and identity on the Internet. Routledge.
Carpenter, T.L., Steeves, D. and Abzarian, D., Microsoft Technology Licensing, Llc, 2016. Trusted internet identity. U.S. Patent 9,325,705.

Free Membership to World’s Largest Sample Bank

To View this & another 50000+ free samples. Please put
your valid email id.


Yes, alert me for offers and important updates


Download Sample Now

Earn back the money you have spent on the downloaded sample by uploading a unique assignment/study material/research material you have. After we assess the authenticity of the uploaded content, you will get 100% money back in your wallet within 7 days.

UploadUnique Document

DocumentUnder Evaluation

Get Moneyinto Your Wallet

Total 5 pages


*The content must not be available online or in our existing Database to qualify as

Cite This Work
To export a reference to this article please select a referencing stye below:


My Assignment Help. (2018). Cyber-Community And Cyber-Identity. Retrieved from https://myassignmenthelp.com/free-samples/cyber-community-and-cyber-identity.

“Cyber-Community And Cyber-Identity.” My Assignment Help, 2018, https://myassignmenthelp.com/free-samples/cyber-community-and-cyber-identity.

My Assignment Help (2018) Cyber-Community And Cyber-Identity [Online]. Available from: https://myassignmenthelp.com/free-samples/cyber-community-and-cyber-identity[Accessed 19 December 2021].

My Assignment Help. ‘Cyber-Community And Cyber-Identity’ (My Assignment Help, 2018) accessed 19 December 2021.

My Assignment Help. Cyber-Community And Cyber-Identity [Internet]. My Assignment Help. 2018 [cited 19 December 2021]. Available from: https://myassignmenthelp.com/free-samples/cyber-community-and-cyber-identity.

.close{position: absolute;right: 5px;z-index: 999;opacity: 1;color: #ff8b00;}


Thank you for your interest
The respective sample has been mail to your register email id


$20 Credited
successfully in your wallet.
* $5 to be used on order value more than $50. Valid for
only 1

Account created successfully!
We have sent login details on your registered email.



MyAssignmenthelp.com has appointed best assignment experts who are wizards of words. Our writers know every trick of crafting high quality write-ups within a short period. With years of experiences, we have become one of the most prolific assignment help services in the USA. We deliver custom-made help to students with writing different types of assignments. We guarantee total need-based and timely service, and this is why increasing numbers of students prefer to buy assignment online.

Latest Business Law Samples

div#loaddata .card img {max-width: 100%;

BU1112 Business Law
Download :
0 | Pages :

Course Code: BU1112
University: James Cook University

MyAssignmentHelp.com is not sponsored or endorsed by this college or university

Country: Australia

Part A
Whether Stella is considered as an employee of PRX?
The main difference between employee and independent contractor is stated below:
Employee entered into contract of service, but contractor entered into contract for services.
Employer exercise control over the employee but no control was exercised by employer on contractor. It is considered as traditional test which was developed in Zuijs v Wirth Bros(Zuijs…
Australia South Lake Management health finance management  University of New South Wales 

BSBWHS605 Develop Implement And Maintain WHS Management Systems
Download :
0 | Pages :

Course Code: BSBWHS605
University: Swinburne University Of Technology

MyAssignmentHelp.com is not sponsored or endorsed by this college or university

Country: Australia

Work Health and Safety Management System (WHSMS) is a collection of plans, tools, activities and processes. List 3 of these plans, tools, activities or processes and explain what they are,
The means, nitty gritty beneath, can be utilized whether the arranging procedure is straightforward or complex. They are:
Evaluating the current word related to wellbeing and security status including the ‘administration framework’ Lussier, R. N…
Australia Brisbane Management Work Health and Safety Management System (WHSMS University of Brisbane MBA 

BUSN331 Business Law
Download :
0 | Pages :

Course Code: BUSN331
University: Centennial College

MyAssignmentHelp.com is not sponsored or endorsed by this college or university

Country: Canada

In Alberta, the Residential Tenancies Act applies to all the people in this jurisdiction, who rent their space out (Alberta Queen’s Printer, 2016). Through this act, the rights and responsibilities of the landlords and tenants are brought forward (Landlord and Tenant, 2015).
Question 1
Before a tenant can move in the rented accommodation, the tenant and the landlord have to reach an agreement, with regards to the…
Australia Edmonton Humanities Management University of New South Wales Masters in Business Administration 

LA1040 Contract Law
Download :
0 | Pages :

Course Code: LA1040
University: University Of London

MyAssignmentHelp.com is not sponsored or endorsed by this college or university

Country: United Kingdom

A contract is an agreement between the parties which is enforceable legally in the courts. There are several provisions of law which governs how the terms related to the contract would operate. A contract consists of a set of provisions which are known as contractual terms. The weightage of such terms are not equal as one term may have a more significant consequence as compared to the other in relation to their brea…
United Kingdom London Economics Management University of London 

TLAW202 Corporations Law
Download :
0 | Pages :

Course Code: TLAW202
University: Top Education Institute

MyAssignmentHelp.com is not sponsored or endorsed by this college or university

Country: Australia

If any person wants to carry out his business in the form of a company, then, it is necessary that the registration or incorporation requirements of such country must be met. In Australia, the Corporation Act 2001 and the guidelines laid down by ASIC provides with the steps that must be accomplish in order to establish a corporate entity.  (Malbon & Bishop, 2006).
A company is of great significance as it is treated as a …


Need an essay written specifically to meet your requirements?

Choose skilled experts on your subject and get an original paper within your deadline

156 experts online

Your time is important. Let us write you an essay from scratch

Tips and Tricks from our Blog

11174 Introduction To Management

Free Samples 11174 Introduction To Management .cms-body-content table{width:100%!important;} #subhidecontent{ position: relative; overflow-x: auto; width: 100%;} 11174 Introduction

Read More »