Digital Natives Part 1

Are you a digital native? No one has agreed on a definite point on where the digital native generation began and where it ended, but in general it describes people who came in regular contact with computers at a young age sometime in the late 80’s and into the 90’s. They are now in the late 20’s to mid-30’s, and they are the pioneers of today’s social media trends.

So what characteristics do all digital natives share? The most important aspect is openness and an enthusiastic reception to new technologies, both hardware and software. While the older generations may view developing tech and trends with suspicion, frustration, and even fear, the digital native cannot wait to take it for a spin, check out its bells and whistles, and in some cases, find out how it can be broken! This behavior comes from their exposure to emerging software that don’t come with safeguards or pop-up warnings that tell them when their actions might be detrimental to the efficiency of their computer. They logged on to the Internet at a time when getting a virus was very nearly the worst possible thing that could happen! Everything was new, and they were thrust into open waters and allowed to make mistakes and learn from them.

The Unsafe Internet

Internet services like AOL encouraged online interaction with chatrooms, instant messaging, and fun-sounding e-mail alerts.  Online predators and scammers took advantage of this anonymity, and from there the first chat bots were born. They had simple functions: find a username, send them an instant message with a link, and hope an unwary target clicks it. They often led to pornographic sites promising free access or downloads, and from there a vicious virus called a “Trojan” would be installed on your computer. This program scours your system for personal information, including IP addresses, usernames, and passwords, and it would send them back to the person who programmed the bot. Getting rid of the Trojan was more difficult in the 90’s than it is today because anti-virus programs were still building up their databases. Firewalls did not exist yet. If you wanted to keep your information and computer safe, you had to be vigilant and wary of anything and everything that pops up on your screen. If you find yourself staring at a link and wondering if it’s really your friend who sent it to you, then you might be a digital native.

The Internet and scammers are in a constant state of evolutionary warfare. Software that help protect you become more comprehensive and autonomous every day, and scammers find ways to step up their game to find cracks in the system. Before HTTPS existed, scammers would copy all the HTML on common and popular log in pages and create identical pages to trick unwary users into entering their usernames and passwords. The only way to tell for sure is to check the URL bar. Ingenious, really, and quite effective at the time. If you still check the URL of a log in page before logging in, you might be a digital native.

Personal Responsibility and Problem Solving

One defining characteristic of digital natives is the practice of personal responsibility when it comes to maintaining the optimal functionality of a computer. When something goes wrong, it’s not the computer that’s broken. It’s not a failure on the part of the software and hardware, it was something you did! And it’s up to you to find a fix. After you’ve exhausted every possible idea, that’s when you call tech support. Quite honestly it’s one of the most frustrating and satisfying aspects of being a digital native – frustrating when problems occur (and it’s most likely your fault), and satisfying when you fix it.

They younger generation tends to rely more on tech support or, in most computers today, the ability to fix itself by searching the Internet for a solution. But the moment the internet connection is severed, they’re at a loss. Like Marc Scott of said in his recent article, kids say things like “The Internet is not working”, rather than “I’ve lost my internet connection” or “I can’t access the Internet”. Chances are the Internet is always working and there’s something going on with a) the computer and b) the user. If you check your network or browser settings today, there’s a fancy option of automatically detecting proxy settings and establishing an internet connection without you having to do anything. Back in the 90’s we had to configure these settings manually.

It’s not a matter of intelligence, but rather the baseline habits you’ve developed while using different technologies. Nearly everything comes prepackaged today: your operating system (that’s either Windows [Version Here], OSX, Linux, etc.,  young folks), the default anti-virus software, plug-and-play devices, etc. Think about it. When was the last time you inserted a CD to install a program that isn’t a video game? What about a 3.5″ floppy disk? Do you even know what a 3.5″ floppy disk looks like? Everything can be done with just a few clicks of the mouse, and for the digital native, these features are conveniences, not standards.

I realize this is a huge topic, and it’s going to take more than a single post to get this message across. Stay tuned for the next chapters on Digital Natives!

Anonymity – How to Keep Yourself Safe

Most people act on convenience and habit when it comes to matters of the internet, and that common but flawed philosophy holds true for some of their most vital information. This includes usernames. Sure, it seems harmless enough at first; it’s not your real name, and there’s nothing about it that indicates who you really are or where you live, right? Not necessarily. Taking on a pseudonym does not guarantee anonymity. In fact, it can be used to track you down with great efficiency.

Why did you choose your username? Some will say that they like it, or that it’s easy to remember. Others will say that it’s the username they’ve always used, and they see no reason to add a new bit of information to remember along with passwords and the websites to which they belong. And there you have your first misstep. People often reuse usernames, give or a take a few letters or numbers depending on the availability of the name, and when that username becomes associated with your “main accounts,” your information becomes available to whomever has an interest in finding you. Let’s look at a hypothetical situation:

Say name is Susie Michaels, and your username is kittybird999. It’s a name you’ve always had, and you’ve used it in multiple places. Nobody has to know Susie is kittybird999, and she’s never told anyone, so her information is safe…or so you can assume. What if Susie Michaels has a Facebook account, and listed as her Skype name is kittybird999? Or that she went for a custom FB URL that ended in kittybird999? If Susie never thought to set her profile on Private, any and all information on her Facebook account, including pictures and wall posts, would be available for anyone to see. It doesn’t end there. What if Susie has been on the internet for many years, and her accounts and username date trail back to that long-forgotten Myspace page? How about Livejournal? Yes, they still exist and will continue to exist, and their contents are searchable on Google. Any place you’ve ever shared private or intimate details about yourself and your life becomes an open book, and that’s a very scary thought. Can you imagine anyone looking back at what you were like as a teenager?

Always be wary about where you want different aspects of your life mix. Personally I have at least three personae: work, personal, and internet. The second two sometimes intersect – an inevitable part of our evolving social structure – but my work life is completely separate. This allows me to control what I want potential employers to see; in essence, it allows me to create a work/personal persona: one that highlights my strengths as a candidate while keeping possible “red flags” from my personal life hidden.

First, it helps to have a nickname by which your friends know you. That way you can keep your personal online accounts open and candid while your real name can stay immaculate. It’s understandable that you may not want to maintain more than just a single account for convenience’s sake, but it’s a very small price to pay to keep your identity safe from prying eyes. Next, keep your usernames and account information separate. Duplicate data will practically destroy any attempt to stay hidden. And finally, Privacy Settings are your best friend. Keep your personal accounts private and viewable only by those who have your permission. It takes 10 minutes to change and customize your settings, so you have no excuse not to do it.