{"id":3464,"date":"2024-08-31T19:01:19","date_gmt":"2024-08-31T19:01:19","guid":{"rendered":"https:\/\/academicwritersbay.com\/solutions\/sdworld-d2\/"},"modified":"2024-08-31T19:01:19","modified_gmt":"2024-08-31T19:01:19","slug":"sdworld-d2","status":"publish","type":"post","link":"https:\/\/academicwritersbay.com\/solutions\/sdworld-d2\/","title":{"rendered":"sDWorld D2"},"content":{"rendered":"<p>Sociology in a Digital World<br \/> Module 02 \u2013 Cyber Identities: Impact and Real-life Cases<br \/> Top of Form<br \/> Bottom of Form<br \/> Assessments\u00a0Content<br \/> 1.<br \/> Top of Form<br \/> Scenario<br \/> In today\u2019s digital age, Ross and Kristina have fully embraced the convenience of online shopping. From groceries to clothing, bedding to mattresses, they eagerly sign up for reward programs at every online store, relishing the discounts offered. What Kristina doesn\u2019t fully grasp is the significance of her cyber identity\u2014those usernames and passwords that have become her digital persona in the vast online realm. The reliance on digital platforms has intricately woven a complex web of cyber identities, bringing forth both new realities and consequences.\u00a0<br \/> Recently, Kristina encountered a significant hurdle when her computer malfunctioned. She struggled to recall the numerous usernames and passwords associated with different websites. Fortunately, with the help of each site\u2019s login assistance feature and occasional support from customer service, she managed to retrieve her credentials. This process often entailed verifying her identity through personal details such as her date of birth and social security number. Thus, the digital world not only shapes but also confines the identity of individuals like Kristina, encapsulating it within an intricate digital fingerprint.\u00a0<br \/> Instructions<br \/> In this assignment, you will explore the concept of Cyber Identity, encompassing advancements such as virtual reality, augmented reality, and advanced artificial intelligence within online identities. These technologies blur the lines between the physical and digital worlds, potentially creating more immersive and lifelike online experiences.\u00a0<br \/> Your task is to research a real-life case study where cyber identities were forged to mislead individuals or institutions, ultimately impacting societal structures and individuals significantly.\u00a0<br \/> In a Word document, provide an elaborated analysis of your chosen case study. Begin by detailing the case study, including its timeline and location. Then, explain how these cyber identities were constructed to deceive, examining the impacts on both individuals and institutions. Explore how these identities transcend various aspects of a person\u2019s life, including social interactions, professional networks, and personal interests.\u00a0<br \/> Important: Before starting, be sure to review this assignment\u2019s rubric as it will help you narrow the scope of your work.<br \/> Submission<br \/> Submit your assignment via the designated drop box after researching a case of cyber identity theft or a related incident. Analyze how cyber identities were manipulated to deceive people or institutions, and assess the resulting impacts on individuals or organizations. Make sure to adhere to the guidelines outlined in the rubric provided.<br \/> Bottom of Form<br \/> Rubric Details<br \/> \u00b7 Case study<br \/> 10 possible points (25%)<br \/> Mastery<br \/> Elaborated on real and authentic case study with the timeline and location explained.<br \/> 10<br \/> Proficiency<br \/> Real and authentic case study with the timeline and location explained<br \/> 8<br \/> Competence<br \/> Not clear about the timeline or the case study is not real and authentic.<br \/> 7<br \/> Emerging<br \/> Lacks clarity in the timeline of case study.<br \/> 5<br \/> Not Submitted<br \/> Did not submit.<br \/> 0<br \/> \u00b7 Identities<br \/> 10 possible points (25%)<br \/> Mastery<br \/> Thorough explanation of the cyber identity which was created.<br \/> 10<br \/> Proficiency<br \/> Explanation of the cyber identities created<br \/> 8<br \/> Competence<br \/> Gaps in explaining how cyber identity was created.<br \/> 7<br \/> Emerging<br \/> Lacks explanation on how cyber identity was created.<br \/> 5<br \/> Not Submitted<br \/> Did not submit.<br \/> 0<br \/> \u00b7 Impacts Society and Individual<br \/> 10 possible points (25%)<br \/> Mastery<br \/> The learner effectively analyzes the impact of the cyber identity on society and individual.<br \/> 10<br \/> Proficiency<br \/> The learner provides good analysis of cyber identity on society and individual.<br \/> 8<br \/> Competence<br \/> The learner provides analysis of cyber identity on society and individual with some key points missing.<br \/> 7<br \/> Emerging<br \/> Lacks a comprehensive analysis of cyber identity on society and individual with some key points missing as well.<br \/> 5<br \/> Not Submitted<br \/> Did not submit.<br \/> 0<br \/> \u00b7 Conclusion<br \/> 10 possible points (25%)<br \/> Mastery<br \/> The conclusion effectively summarizes how cyber identity impacted society and individual thereby changing online experience in the digital world.<br \/> 10<br \/> Proficiency<br \/> The conclusion summarizes how cyber identity impacted society and individual thereby changing online experience in the digital world<br \/> 8<br \/> Competence<br \/> The conclusion may not effectively summarize how cyber identity impacted society and individual thereby changing online experience in the digital world<br \/> 7<br \/> Emerging<br \/> The conclusion is unclear and fails to provide summarize how cyber identity impacted society and individual thereby changing online experience in the digital world<br \/> 5<br \/> Not Submitted<br \/> Did not submit.<br \/> 0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Sociology in a Digital World Module 02 \u2013 Cyber Identities: Impact and Real-life Cases Top of Form Bottom of Form Assessments\u00a0Content 1. Top of Form Scenario In today\u2019s digital age, Ross and Kristina have fully embraced the convenience of online shopping. From groceries to clothing, bedding to mattresses, they eagerly sign up for reward programs [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-3464","post","type-post","status-publish","format-standard","hentry","category-solutions"],"_links":{"self":[{"href":"https:\/\/academicwritersbay.com\/solutions\/wp-json\/wp\/v2\/posts\/3464","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/academicwritersbay.com\/solutions\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/academicwritersbay.com\/solutions\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/academicwritersbay.com\/solutions\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/academicwritersbay.com\/solutions\/wp-json\/wp\/v2\/comments?post=3464"}],"version-history":[{"count":0,"href":"https:\/\/academicwritersbay.com\/solutions\/wp-json\/wp\/v2\/posts\/3464\/revisions"}],"wp:attachment":[{"href":"https:\/\/academicwritersbay.com\/solutions\/wp-json\/wp\/v2\/media?parent=3464"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/academicwritersbay.com\/solutions\/wp-json\/wp\/v2\/categories?post=3464"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/academicwritersbay.com\/solutions\/wp-json\/wp\/v2\/tags?post=3464"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}