SCM 501 Coursework

Managing your online identity

Network security is holistic rather than fragmented; it is dynamic rather than static; it is open rather than closed; it is relative rather than absolute; it is common rather than isolated.

Internet information security has gradually attracted people’s attention, and countries are attaching great importance to the field of network trusted identity authentication.

As long as your usernames are the same, you can find all of your information by searching for keywords in the search bar.

I think to establish your own online identity, you must first make clear what you want to express. Many websites that can make their own web pages provide content layout for the user’s personal homepage or personal BLOG, so that you can freely arrange your homepage after selecting the template.

But to do user experience is to invest, such as technology investment. You have to develop your own personalized features, plagiarism is not acceptable. The content that users are interested in when using the website has a distinctly different tendency: any design of the website cannot meet the needs of all interest orientations at the same time. At this time, the user needs are generated, and the user’s habits of tracking the survey are required to subdivide the personalized functions.

The difference between providing personalized web pages and non-personalized web pages suggests that this is a detail, and it should be implied that it should be implied. Don’t over-confidently reason about user preferences, and pay attention to protecting the privacy of personal information in the process of personalization.

Creative Commons License
This work is licensed under a Creative Commons Attribution-NoDerivatives 4.0 International License.

Leave a comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.