Digital Identity

  • Majeed Mohamed Fareed Majeed English Department, Institute of Philology, Taras Shevchenko National University of Kiev
  • Abdurahman Adisaputera Universitas Negeri Medan, Indonesia
  • Muhammad Ridwan Universitas Islam Negeri Sumatera Utara, Indonesia
Keywords: digital identity; privacy; social network; violation; virtual world


With the penetration and spread of the Internet in our daily life, issues related to our identity on the Internet and their potential impacts on our lives, whether positive or negative, have become very important. We, as individuals, interact with a number of websites and services on the Internet that require an account (username and password) to access. These sites range from simple news sites that limit the number of articles that you can read anonymously in a certain period of time, to financial services or healthcare sites or others. Similar services on the Internet require that you know with certainty that you are definitely "you" before granting you access to any private information. Of course, we want them to confirm our identity before allowing access to this type of very sensitive information, which can be used to inflict harm. Take us in different ways if you fall into the wrong hands. The presence in the virtual world has formed the digital identity, and this digital identity has different effects on the morals and habits of the users in this virtual world. Because of the existence of a digital identity, you may also be exposed to some type of privacy crime. In this case, we must study and adapt to create patterns of coexistence and resilience in the digital environment.


Download data is not yet available.


Baren, D. 2004. The Network Society. Polity Press Ltd. UK. P. 146.
Bellman, S., E.J. Johnson, & G.L. Lohse, 2001, “On site: to opt-in or opt-out?: it depends on the question”, Communications of the ACM, 44(2): 25–27.
Deborah Gonzales, in Managing Online Risk: Apps, Mobile, and Social Media Security”. 2015. P.56. Elsevier. UK.
Dr.Jean-Marc Seigneur, Dr.Tewfiq El Maliki, in Computer and Information Security Handbook, 2009. p. 270.
Edwards, J. (2009). Language and identity: An introduction. Cambridge: Cambridge University Press.
Gee, J.P. and Hayes, E.R. (2011). Language and learning in the digital age. Abingdon: Routledge.
Giddens, A. 1976. New Rules of Sociological Method: A Positive Critique of Interpretative Sociologies, London: Hutchinson.
Kulthum Peepmon: Cultural Contexts Directed for Digital Identity, In Light of the Challenges of Networked Society from Virtual Circulation to Realistic Practice, Additions Magazine, Issues 33-34, 2016, p.7
Norton, B. (2013). Identity and language learning: extending the conversation. 2nd edn. Bristol: Multilingual Matters.
Schwartz, S. J. (2001). The evolution of Eriksonian and neo-Eriksonian identity theory and research: A review and integration. Identity: An International Journal of Theory and Research, 1, 7-58.
Sylvia Khatcherian et al. 2008. Digital identity: principles on collection and use of information. Report of IBA Legal Practice Division Working Group. p: 11
Vignoles, V. L. (2011). Identity motives. In S. J. Schwartz, K. Luyckx, & V. L. Vignoles (Eds.), Handbook of identity theory and research (pp. 403-432). New York: Springer.
Warriner, D.S. (2007). ‘Transnational literacies: Immigration, language learning and identity’, Linguistics and Education, 18(3): 201–214.
How to Cite
Majeed Mohamed Fareed Majeed, Abdurahman Adisaputera, & Muhammad Ridwan. (2020). Digital Identity . Konfrontasi: Jurnal Kultural, Ekonomi Dan Perubahan Sosial, 7(4), 246-252.