Talk:Cooper Stevens

From SI410
Jump to: navigation, search

Soumya Tejam’s Comments:

Cooper — I really enjoyed reading your data identity statement and at many instances found myself relating to your experiences and conclusions. I particularly appreciated the discussion surrounding your intentions behind curating your online persona. It provided context for the specific anecdotes and evidence that you examined when you approached the websites and links that were associated with your name.

In your future revisions, I would encourage you to restructure your argument so that the question that you probe in the conclusion might be posed earlier. Your wiki discussion can showcase your discovery process into this question and lead us to your conclusion and suggestion that online identities might better serve as a verification mechanism. I think you touch lightly on this idea, and I would encourage you to probe further, perhaps ask the question: How verifiable is our identity if we can control its presentation online?

Finally, I think you maintained great clarity and succinctness throughout your statement. I found your language to be analytical yet accessible and was able to follow your train of thought throughout the wiki. My only suggestion would be to rethink the headers and their formatting in the ‘Googling Myself’ section and creating a more pronounced connection between the headings. Overall, great work and I look forward to reading your final wiki!

Response from Cooper Stevens

Thank you for your feedback!

Per your advice, I did a total overhaul to make clear the implications of each of my pieces of evidence and how they pertain to my thesis. This seemed to make my wiki flow better and be more clear in its direction and argument. Also, echoing the question I consider in my conclusion throughout my analysis and in the Preface was really great advice!

The question of "How verifiable is our identity if we can control its presentation online?" is a great one to consider in future papers, but I feel that I do not have the space to adequately address that question in this wiki while still addressing my original thesis. Thanks for the good idea!

Lastly, that is very good advice on the headers, formatting, and drawing logical connections to transition to subsequent sections: After my changes, I feel that it flows much more easily and logically, making it easier to read and understand the direction of the argument.

Thanks again!

Jack Hessinger's Comments:

Hello Cooper, your data identity was a very interesting read. One theme throughout your profile was the idea that the "curated info" was the most prominent amongst your online profile. This is something that I also wrote about and I found your take on it especially interesting. I especially liked they way you showed that you can compare the "curated info" with the digital footprint to assess if someone is phishing.

One suggestion I have would be to explore the gaps in your curated info a little more. As you said this information is deliberately picked, which leads to believe that this could be a view of you with "rose colored glasses". It would be interesting to hear how your overall online presence may vary from your true personality in real life. This could also lead into talking about the imperfection of learning about someone from just their online profile. Much of what you talk about pertains to facts about you but doesn't talk about stuff like your personality or character. It might be interesting to talk about how your online profile does or doesn't capture these things. Overall, you did a great job of formatting this piece and it helped us as readers understand your full profile easily.

Response from Cooper Stevens

Thank you for taking the time to leave feedback for me!

Before reading your comment, I thought I had made clear how my deliberate identity is representative of my personality. Obviously, I had not been clear enough. Thank you for bringing this to my attention!

Also, your ideas on how to further my analysis by investigating the extent to which someone's personally curated online identity is truly representative of their personality is a great topic to tackle in-depth in another paper. And while I feel that I start to touch on those ideas with the concept of phishing, I certainly do not do them justice here; instead, I choose to focus on the flip-side where someone's curated online identity is made of largely false information with malintent (as opposed to just through "rose-colored glasses"). This is a great potential topic for a future investigation. Thanks!