User:Hrbardee/sandbox

Article Evaluation:

Evaluating Content:

All the content is relevant as it all pertains to the NFL and the teams included.

Could be organized better, guiding the reader down the page rather than an ambush of information.

Evaluating Tone:

The article is neutral and unbiased, simply educates the reader on the NFL and structure of the organization.

Evaluating Sources:

All the sources are correct.

Checking Talk Page:

There are wiki projects.

They are talking about updating player rosters/ HOF inductees etc.

This topic and style is less formal compared to class.

Week 3 Article: Digital Identity

After reading the article on Digital Identity, the information is relevant, however it lacks a purpose. It is too broad and never throughout the article narrows in on a main topic or issue regarding digital identity. The article is neutrally written, but may lack a wikipedia tone, which is also discussed about on the talk page. The information is not digestible for all readers. Real life examples should be used so that the reader can relate and comprehend the information being presented. Each claim made throughout the article is cited, however not all of the sources are credible. Some sources may be deemed out dated, especially for a topic on digital identity.

Article Evaluation:
This source can be used to educate the audience on what is at risk when it comes to your digital identity. By simply browsing or shopping on the internet third parties are collecting information and data about you. The information used to mold your digital identity is not private and available to whatever third party wanting to access it.

Regarding all of this information, many of it is stored on a cloud. How is this information protected? This article discusses how and what the government should do to protect each user in the digital space. Regarding digital identity how much is one protected legally? Ethically? How far is too far when gathering information on a user?

With data breaches and identity fraud occurring more and more, a solution is to remove the idea of a whole identity from users. This article argues that we should rethink what our digital identity should be in hopes to alleviate the growing number of breaches and fraud. This is one solution to the growing digital environment we are now living in.

Bibliography:
Beck, E. N. (2015). The invisible digital identity: Assemblages in digital networks.Computers and Composition, 35, 125-140. doi:10.1016/j.compcom.2015.01.005 https://ac-els-cdn-com.gate.lib.buffalo.edu/S8755461515000092/1-s2.0-S8755461515000092-main.pdf?_tid=f06b94dc-f198-4c76-8045-b2a970a93349&acdnat=1539265573_8f407863f92bd203151774eb87e66b80

Holt, J., & Malčić, S. (2015). The Privacy Ecosystem: Regulating Digital Identity in the United States and European Union. Journal of Information Policy, 5, 155-178. doi:10.5325/jinfopoli.5.2015.0155 https://www-jstor-org.gate.lib.buffalo.edu/stable/pdf/10.5325/jinfopoli.5.2015.0155.pdf?refreqid=excelsior%3Ae82245f69a52385c11ee11e502f868e0

Salmony, M. (2018). Rethinking digital identity. Journal of Payments Strategy & Systems, 12(1), 40–57. http://www.ingentaconnect.com/content/hsp/jpss/2018/00000012/00000001/art00006