A user’s identity online reflects their online persona including the tone and character of the content that the user shares in online networks, but it also encompasses the unique data points that are used to authenticate that specific individual within a computer network.
See also: Pseudonymity
Commentary:
- For example, biometric data, email accounts, passwords, and two-factor authentication are all used to confirm an individual’s identity when using an online service.