You are currently viewing a new version of our website. To view the old version click .
Future Internet
  • Article
  • Open Access

16 March 2021

Characterization of the Digital Identity of Chilean University Students Considering Their Personal Learning Environments

,
and
1
Dirección de Informática Educativa, Universidad Autónoma de Chile, Santiago 7500596, Chile
2
Programa de Magister en Docencia en Educación Superior, Facultad de Humanidades, Universidad Mayor, Santiago 7500994, Chile
3
Departamento de Pedagogía Aplicada y Psicología de Educación, Universidad de las Islas Baleares, Carretera de Valldemossa, km 7.5, 07122 Palma, Spain
4
Departament of Civil Engineering, Universidad Católica de la Santísima Concepción, Concepción 4090541, Chile

Abstract

At present, our online activity is almost constant, either producing information or consuming it, both for the social and academic fields. The spaces in which people move and travel every day, innocently divided between the face-to-face and the virtual, affect the way we communicate and perceive ourselves. In this document, a characterization of the academic digital identity of Chilean university students is proposed and an invitation to teachers to redefine learning spaces is made, allowing integrating all those technological tools that the student actually uses. This study was developed within the logic of pragmatism based on mixed methodology, non-experimental design, and a descriptive–quantitative cross-sectional approach. A non-probabilistic sample was made up of 509 students, who participated voluntarily with an online questionnaire. The Stata Version-14 program was used, applying the Mann–Whitney–Wilcoxon and Kruskal–Wallis U tests. To develop characterizations, a conglomerate analysis was performed with a hierarchical dissociative method. In general, Chilean university students are highly truthful on the Internet without making significant differences between face-to-face and digital interactions, with low awareness of their ID, being easily recognizable on the Web. Regarding their educational process, they manage it with analogical/face-to-face mixing formal and informal technological tools to optimize their learning process. These students manifest a hybrid academic digital identity, without gender difference in the deployment of their PLEs, but maintaining stereotypical gender behaviors in the construction of their digital identity on the Web, which shows a human-technological development similar to that of young Asians and Europeans.

1. Introduction

Technological advancement and digitization have been impacting humans for several years now. The impact was increased with the 2019 pandemic, which suggested that universities should inevitably align their work with information and communication technologies (ICT). This process had already been affecting teaching and how students were immersed within the globalized and hyper-connected scenario of which they are or should be part [1,2].
By existing and interacting on the Internet, the person uses tools and services that leave a series of fingerprints that will accompany them permanently [3,4,5]. This will affect both the configuration of the architecture of his/her learning environment, as well as the digital identity (ID) [6,7]. Our students do not escape this reality, where their technological behavior and their digital identity say a lot about themselves and the way they learn [7,8,9,10]. That is how “A generally held assumption of late modernity suggests that identity matters more now because we have more choice” [8] (p. 3).
In this document, a characterization of the displayed and manifest academic digital identity of a group of university students in Chile is proposed. This, to collect information that allows knowing the technological behavior and digital identity that must be considered as key information when integrating ICT in the educational process.
The remainder of this document is divided into: Section 2, where papers that introduce the key constructs addressed in the study are reviewed. In Section 3 the materials and method used in the investigation are presented. In Section 4 the main results are discussed, which are compared with other investigations in Section 5. Finally, in Section 6 the conclusions are summarized.

3. Materials and Methods

The study will be developed within the logic of pragmatism, an alternative way to post-positivism and constructivism. It will reinforce pluralism and synergy aiming at a flexible research model. The research followed a mixed research paradigm (quantitative–qualitative). Therefore, this research will present a mixed methodological approach, by enhancing the understanding of the phenomenon under study that addresses a subject related to complex characterizations that involve human beings and our diversity. In this way, it should be noted to the approaches that, from the quantitative point of view, it is possible to access statistical procedures, descriptions, and logical–quantitative arguments.
Meanwhile, from a qualitative point of view, although it does not resort to variables, it admits collecting information whose analysis establishes categories that become complementary and flexible throughout the investigation itself. It allows obtaining results from an interpretive synthetic methodology [34].
Also, non-experimental, cross-sectional, and descriptive design investigations provide a good perception of the functioning of a phenomenon [35], as well as the general characteristics of the distribution of the problem and how the variables and elements that compose it behave. It allows in the future to generate hypotheses serving planning, that is, decision-making [36]. The purpose is to describe the sample in the most complete and detailed way possible and thus identify the elements that characterize it, therefore, a hypothesis was not raised and a general objective was taken to work around. It would allow the inclusion of the greatest amount of information for effective description and characterization.

3.1. Participants

This research considered a non-probabilistic or directed sample made up of 509 students (185 men and 324 women) who participated voluntarily.
To determine the size of the sample to be studied, the population of infinite or unknown size was considered and the formula for a proportion was used [37], obtaining 384 subjects. It was the minimum number allowed for a representative sample of the population. The students were contacted directly by the coordinators of their careers, their teachers, or respective student centers. They received an invitation letter via email.
In addition, the inclusion criteria for this research were: 1. To be 18 years old or older (legal age in Chile), and 2. To pursue a degree in face-to-face mode and during the day shift. The students who participated in the research were distributed within 21 of the 55 existing universities in the country. The geographical distribution of the participating institutions included the northern, central and southern areas of the country.

3.2. Instruments

This is a research study with a mixed methodological approach and the scientific method is made up of three basic characteristics: in the first place, its goal is a generalization and, in the second instance, it is based on a theoretical corpus. It finally wants to seek objectivity [38], and it is why the procedure design was followed to collect nomothetic data from quantitative studies through a questionnaire.
To properly collect the information, the logical sequence for the process of design was followed, writing and validation of the instruments proposed by Soriano-Rodríguez [39].
Instruments from previous research were evaluated through the use of the Ebsco Host database and Dialnet Plus. The documentary review and analysis methodology (RAD) were followed, produced by the search, selection, organization, and analysis of primary sources [40]. After a review of the theoretical corpus and determining that they presented a different twist to the study in question, it was defined that the questionnaire would be the result of the fusion of two instruments.
An instrument made up of two parts was applied; the first one corresponded to a questionnaire developed by the research team, which allowed describing the digital identity of the students. The second corresponded to the CAPPLE questionnaire [41], which identified and described the PLE displayed by the students.
The “Digital Identity” questionnaire was made up of four dimensions. The first dimension, named “personal data”, addresses a series of contextualizing sociodemographic data.
The second dimension called “knowledge and attitudes towards digital identity” encompasses a set of indicators that give account from the theoretical handling of the basic constructs, linked to digital identity and reputation, as well as their perceptions and preferences regarding these. Meanwhile, the third dimension, “connectivity and use of devices”, is aimed at specifying the technological and technical scenario from which students access the Web.
Finally, the fourth dimension relative to the “definition of digital identity” expressed and manifested by students was taken as the theoretical substrate of the model proposed by Dr. Fanny Georges [16] on the construction of digital identity, considering the so-called declared identity, created and calculated.
The validation of the semantic and structural construction of the applied instrument was through expert judgment, using the nominal group technique [42]. This group was made up of 12 doctors belonging to European and Latin American universities, divided into two groups: (a) with publications on digital identity, and (b) with publications on educational technology in general.
All the experts spoke about the clarity, coherence, and relevance of the questions that made up the instrument, rating it from 1 to 4, with 1 means non-compliance with the criterion and 4, the highest level of compliance. Likewise, in front of each question a box was arranged in case, they required issuing a qualitative evaluation.
Based on the individual judgment reports, issued by each expert, a table of recommendations was prepared with the qualitative observations and the frequencies of the scores obtained. As a criterion to discard a question, two requirements should be met jointly:
  • That the frequency obtained was less than 0.75
  • That at least 0.75 of the observations of the panel experts indicate that it should be omitted.
According to the observations of the panel of experts and the elimination criteria, the questionnaire was affected by the reformulation of the wording of the headings and some questions, while others were merged.
For the psychometric validation of the instrument, the classical Test Theory establishes that Cronbach’s Alpha is an indicator of the internal consistency of the elaborated instruments that include items with a Likert scale and are validated by experts [43,44].
For the pilot test, the sample was defined according to the approach of Villarroel del Pino [45] and it was applied to 384 subjects, a number calculated considering an infinite study population size. The sample was taken at random using an online program to ensure the randomness of the data and the representativeness of the population.
As a result of its application, a Cronbach’s alpha of 0.872 was obtained for the questions associated with the declared digital identity, 0.913 for those associated with the created digital identity, and 0.916 for those associated with the calculated digital identity.
For the second part of the questionnaire, related to PLE, although the instrument on work and learning habits for future professionals—CAPPLE [41]—was used, it was also subjected to statistical validity; understanding that it was created for a population other than the Chilean context. Semantically, the term “colleague” had to be adjusted, being replaced by “companion” since the population under study does not correspond to a working force. As a result of its application, a Cronbach’s alpha of 0.768 fulfilling what is expected for a descriptive instrument.

3.3. Procedure

The application process of both instruments lasted 3 months (November 2018 to January 2019) and was carried out using the Survey Monkey interview platform in its paid version. Before the participants received the survey, they were sent an informed consent letter. The data were coded and organized in a Microsoft Excel (2016) spreadsheet which was reviewed by independent groups to avoid errors [46,47]. Subsequently, the statistical analysis of the data was carried out.

3.4. Data Analysis

The interpretation of the results was through the analysis of the percentage distribution of the response frequencies in each statement. Significant differences were sought, considering groupings by gender, type of funding received by the school where they completed secondary education, and the area of training in which the student is currently studying.
In the grouping by gender, the classic binary concept was considered: man and woman. The grouping according to the type of funding received by the school included three groups: private school (financing by the families or tutors of the students), subsidized school (financing shared between the State and families or tutors of students), and public school (financing provided entirely by the State). Finally, three training areas were established: Health Sciences, Humanities, and Engineering Sciences.
Since the data are ordinal, non-parametric tests were used. In this case, these were the Mann–Whitney–Wilcoxon U test (95%; 0.05) to look for differences by gender, and the Kruskal–Wallis test (95%; 0.05) to look for differences by type of school financing and by training area. Non-parametric tests have the advantage that they should not fit any distribution. Therefore, they can be applied even if the parametric validity conditions are not met; that is, the data do not need a normal distribution. Additionally, non-parametric tests are more robust than parametric ones. In other words, they are valid in a broader range of situations since they require fewer conditions of validity, so it adjusts to the needs of this research based on the large amount and diversity of data collected [45,48].
In all cases, it was considered that there were significant differences between groups when the calculated p-value was less than or equal to 0.05. All calculations were performed using the Stata Version-14 program in Spanish.

3.5. Ethical Considerations

Before answering the instruments, all participants received an informed consent letter indicating the details of the research and their participation. In this research, the information confidentiality criteria established in the Helsinki declaration and the recommendations made by the ethics committee of the University of the Balearic Islands for its investigations were considered.

4. Results

To carry out the characterization of the displayed and manifest digital identity, the first step was to determine the data grouping criterion that will present the greatest number of significant differences according to the variables studied. Thus in the analysis according to the area of training, significant differences were found in 21 of the 104 statements that constitute the instrument applied. Next, according to the school funding source, significant differences were found in five of the statements. In the case of the analysis by gender, significant differences were found in 53 of the statements.
Given these results, the gender grouping was considered the axis for the data analysis and the elaboration of the characterization of the manifest and displayed identity.
Next, the analysis of the data grouped by gender corresponding to the most relevant questions focused on the description of the sample and the characterization of the digital identity is presented.

4.1. Sample Description

The sample consisted of 185 men (36.35%) and 324 women (63.65%). Regarding the ages at which the sample participating in the study fluctuates, although it ranges from 18 years to those over 27, the participants are mostly concentrated between the ages of 19 and 23, which accumulates 69.35% of the total of the surveyed subjects.
The study participants presented the following behaviors and habits associated with their relationship with digital environments.
As shown in Table 1, face-to-face is the environment where students state that they feel greater freedom of expression of their identity, followed by a mixed environment, and virtuality is far below. From a behavioral perspective, the above shows a state of balance between the digital and face-to-face environment that the subjects live.
Table 1. Dimension or environment where you feel freer to express your identity.
Table 2 shows that the distribution in the responses of both men and women shows a marked inclination towards a high similarity between their “self” inside and outside social networks. In both cases, more than 50% of the answers accumulate between options 8 and 10. This similarity reinforces what was found in the results of Table 1 where, once again, a balance is evidenced without the presence of a personality dichotomy. The individual’s digital and face-to-face world are reconciled.
Table 2. Degree of similarity between their “I” inside and outside social networks.
The smartphone is the device with the highest preference for men and women in the sample studied. Both the tablet and the desktop PC are displaced by the laptop and the smartphone (Table 3). Thanks to its portability and versatility, the smartphone encompasses the most relevant characteristics of the other devices mentioned. Its high use shows that ubiquity is a predominant characteristic in the subjects studied.
Table 3. Preferred technological device for interaction on the Internet.
When analyzing Table 4, it can be established that the conversation method declared as preferred is face-to-face. However, this option has a distribution in the responses that shows a dichotomy in the study group. The responses were mainly distributed between options 5 (highest use) and 1 (least use), the same distribution, but with a lower intensity, in the cases of email and videoconferencing. Regarding the use of text messages and telephone, the result of the responses was close to a Gaussian bell distribution. Only in the case of the use of text messages were significant differences by gender, being women who presented a distribution in their responses with a tendency to greater use than men (p-value = 0.0137).
Table 4. Preferred method for conducting a conversation on a topic that is considered important.
Table 5 highlights the fact that the greatest interaction on the Internet occurs when they are alone and far below when they are with friends. However, women in all cases reported greater activity, with significant differences by sex when it is in classes or with the family, where women reported having a greater interaction on the Internet than men.
Table 5. Situations you are usually in when you interact on the Internet.

4.2. Characterization of Digital Identity

The digital identity that Chilean university students express and manifest was characterized by considering the theoretical model of Dr. Fanny Georges [14], which considers three dimensions: declared, created, and calculated.
Considering the above, the study participants presented the following characteristics associated with their relationship with the information delivered or generated on the platforms or websites.
In Table 6, it is possible to establish some relevant observations concerning the delivery of information requested on the Internet. When analyzing the data, in general terms, a distribution of the responses aims at values that imply a high frequency of action regarding each of the statements indicated there, except in the case of the declaration of geolocation and the use of avatars. Women are generally the ones with the highest values for the frequency of performing the actions consulted, but regarding the fact of declaring geolocation and the use of avatars, men show the greatest use. However, these two are less frequently performed by both men and women according to their statements.
Table 6. Frequency with which they usually deliver information when requested on a platform.
The distribution of the responses that are observed in Table 6, points to a monotypic behavior, which in this case implies high transparency with sharing personal information on the network when it is requested. While both genders are highly transparent when it comes to their personal information, women are still much more transparent than men.
According to Table 7, women show a greater tendency to update their profile image, accumulating 56.17% of preferences between levels 4, 5, and 6, while men at those same levels only reach 44.32 %. Men, on the other hand, have a greater tendency to accept friend requests from strangers and friends of friends, accumulating between levels 4, 5, and 6, 40.00% and 57.29% respectively. Women, accumulate 25.62% and 47.85% in the same items. Finally, it stands out that women have greater clarity of who sees their publications with a cumulative between levels 5 and 6 of 58.95%, while men reach 48.10%.
Table 7. Frequency with which they usually perform actions on the Web or social networks.
Regarding the actions carried out on the net and in social networks, it is clear that the gender factor is decisive, given the distribution of responses. When analyzing said distribution, behavioral trends are evidenced rather than monotypic behaviors, that is, they tend towards high or low activity, with no marked behaviors.
Table 8 established that the number of followers and the number of published photographs are the activities in which the students declare they have the most knowledge. Women have a greater tendency than men to know the number of published pictures (p-value = 0.0003). Regarding the knowledge of the metrics, the distribution of women points towards a low knowledge, and men present a distribution that is close to that of a Gaussian bell curve with a slight inclination towards the lowest values. This would imply that men, in general terms, have a greater knowledge of the metrics associated with their activities on the Internet.
Table 8. Degree of knowledge regarding activities carried out on the Internet.
Knowing the impact of the published pictures and the number of followers is two of the most motivating elements for the students surveyed according to Table 9. The same table also shows that women show greater motivation to the extent that they know the impact of their activity, compared to men, in almost all the situations raised, except to the metrics of their publications, which are not shown as a motivating factor for women.
Table 9. Degree of motivation generated by the knowledge of the impact according to the type of activity carried out on the Internet.
In almost all the cases, women declare a high use of social networks and consulting tools, higher than the use declared by men. In the case of Instagram, women present a response distribution with a greater inclination towards what would be understood as high use (p-value = 0.0004), compared to men. In the case of YouTube, although it is men who tend to use it more than women (p-value = 0.0403), the tendency is not as significant as the one observed in the case of Instagram, where the difference between men and women is higher.
The information that shows the distribution of responses in Table 10 shows us that the degree of use and the frequency of use are associated. When an application or tool has a high degree of use, the frequency of access to it is high, that is, if there is evidence of utility, access is increased.
Table 10. Degree and frecuency of use of social networks and tools available on the Internet.
The distribution of the responses according to Table 11 points towards a low frequency, both in men and women, in all cases. However, about the political and religious tendencies, men declare that they share this information more frequently than women (despite a trend towards a low frequency). The same happens when sharing the list of who is part of your custom groups within your networks.
Table 11. Frequency with which you usually define as “public” personal information on websites and/or social networks.
Table 12 allows us to find that the frequency with which information is usually shared does not differ by gender. Its distribution presents a varied trend according to the type of information and context. Thus, sharing videos with and without a subject line created by others presents similar frequency distributions. When the creator is the same as the one sharing, there are also no differences in the distribution of frequencies whether the created material follows a thematic line or not.
Table 12. Frequency with which you usually share information on websites and/or social networks.
In general terms, it is more frequent that they share information created by others than their own or from friends or colleagues, either with or without a defined thematic line.

4.3. Analysis of the PLE Dimensions

The results of the analysis of the CAPPLE instrument (PLE) are shown below. An interesting aspect to highlight is that in none of the dimensions analyzed were differences by gender found.
Regarding information management (Table 13), the distribution of the response shows us a clear trend towards behaviors that can be considered monotypic, where over 50% of the responses are concentrated in one or two levels of the Likert scale used in the instrument. This trend implies that, regardless of gender, the subject’s behavior in terms of information management is almost always the same both at the level of organization, decoding, and creation. In this case, the use of printed media for reading, and iconography (photographs and images) are the preferred and characteristic means of transmitting information for university students.
Table 13. Information management.
In this case (Table 14), we find ourselves towards monotypic behaviors again. The distribution of the responses indicates that, regardless of gender, peers and experts’ participation plays a fundamental role as a means of validating information about what the subject himself can confirm through the web.
Table 14. Managing the learning process.

5. Discussion

In this section, the main aspects that could be observed in the data presented and their implications within digital identity characterization will be discussed. A division into sections was made to facilitate the process of discussion and critical analysis.
The first aspect to discuss is related to the planes of expression of identity. Table 1 shows that students feel as free to be in presence as in virtuality, reinforcing the conception that for them the duality of the self is not necessary, since the fundamental thing for individuals is to inhabit a space, coinciding with what is stated by Belli et al. [49]. This aspect is consistent with the results of Table 2 on the fact that they do not make a difference between themselves in digital media and presence, being able to infer that the expression of their personality and their life from the available information on the Internet reflects their reality. This idea is consistent with the results obtained in Spanish university students, who state that they do believe that they are themselves on social networks, showing a correspondence between their real self and that of the Web [12].
So, those who are trained with the presence of the Internet in their lives, would not see the need to create a digital self that differs from their presence, that is, the subjects studied show in digital media what they are actually living. This coincides with the approaches of Çöteli [50].
Regarding attitudes towards digital identity concerning interactions, it is interesting to see in Table 3 and Table 4 that, despite declaring a high use of mobile phones, the preferred method for discussing relevant issues, according to the subject’s criteria is face-to-face communication.
At the communicative level, despite feeling comfortable in both the virtual space and in the presence, and the great development of digital communication media, videoconferences and emails are not a priority choice; although with the multiplicity of functions of cell phones, videoconferences and emails are gaining space and generating dependence [51,52].
Regarding the moment in which they intensify their interaction on the Internet, considering that the most used device is the cell phone, whose omnipresence urges to affect the quality of the communication process, Table 5 shows that Chilean university students selectively choose when to increase their actions.
Phubbing is understood as looking at and using a device to connect to the Internet while interacting with others. Although it is a behavior declared by the students of the sample, the data show that it is an action associated with the degree of intimacy, closeness, or importance assigned to the individual(s) with whom they are interacting. This action explains that when they are with their partners or family, they avoid interacting from their cell phone, unlike when alone, with friends and, even participating in classes. The greater the closeness or intimidation with whom is having a conversation, the less the phubbing intensity.
In the study by Vander-Abeele et al. [53] it was established that people perceive less intimacy in the conversation when the couple used the cell phone and that in 30% of the conversations where people did use the telephone, they included their interlocutor in the interaction through the action of sharing the screen.
This perception leads to thinking that this new generation has begun to see the non-use of telephones as a way of expressing to others the importance that they represent for them and, in the case of using their devices, using them as a means of interaction more than a form of isolation. That is to say, it could be considered in this new generation that belittlement is a form of violence by considering the rest of individuals not important or that they deserve full attention, rather than the result of an addiction.
This possible paradigm shift should make us rethink the level of trust regarding the information that was found from young people on the digital plane by manifesting this online–offline hybridization. In fact, Soomro et al. [54] in their study address the need that individuals present to be always connected, as a constant in university students, coinciding with the research of Hernández-Orellana et al. [55] whose sample does not make differences between their face-to-face self and their digital self. Neither is influence on the choice of type or connection time, and preferred device according to the training area. However, there is evidence in their concept of digital reputation and its management. Additionally, Oviedo-Trespalacios et al. [56] point out that such constant communication in digital media is given thanks to the omnipresence that mobile phones deliver
The second aspect to discuss leads to the characterization of digital identity (Table 6, Table 7, Table 8, Table 9, Table 10, Table 11 and Table 12). Regarding the first dimension that is activated when entering the digital sphere, giving life to an individual on the Web with their statement, high veracity of the information provided by Chilean university students is displayed, being easily identifiable on the Web (Table 6), which is consistent for the high correspondence which they make explicit between their self in networks and the real person (Table 2).
Although the identity authentication data delivery was considered personal or private information, the study reveals a substantial change and invites us to a more careful reflection regarding the public and private sphere. In this matter, the work carried out by Holicza et al. [57] concluded that people who have grown up with the Internet are more likely to share personal and confidential information online. This fact is consistent with the findings of this study where both men and women declared to authenticate with their real name, gender (male, female), sexual orientation, marital status, and date of birth regularly in digital media.
A possible explanation for this high preference to present and register on the Internet with real data is related to the argument that, just as online and offline lose meaning, the same would happen with public and private, generating a hybridization of the public/private [58], in which the social is privatized and the private is socialized [59]. This argument leads to the fact that Web 2.0, together with all the variants that it can take, allow breaking the border between the private and the public, giving life to the Spanish concept “éxtimo”. This term combines the words intimate and exposed, showing the paradox of exposing people’s privacy in the global showcases of the Internet [60].
Another possible explanation would be the technological advance, which allows geolocation and mobility in the network (mobile phones). University students have been compelled or, better said, invited to an omnipresence [13,16]. Now, to achieve this omnipresence, being truthful becomes very important since it facilitates their participation in multiple spaces.
Regarding the delivery of first-level classified information (Table 6), it is appreciated that women prefer using their full real name and share photos where they are identifiable, unlike men, so our research agrees with the study by Huang et al. [61] and Shepherd [62]. In short, men and women build their digital identity differently, pointing out that women, although they share more information and are more inclined to show themselves on social networks, are mostly concerned with configuring the privacy of their sites, by thinking that it may affect them, personally and professionally in the future.
The identity construction differentiated by gender, which is visualized in this research, is consistent with the study carried out by Qotb [30].
This also responds to the new social movements such as #Viajosola in 2015 and #NiUnaMenos in 2017. Women saw that being identifiable and traceable can be a useful tool for protection and support in a world that is often dangerous for them, enhancing their identity and ideological position of equality before society. In this scenario, the Network has become a safety zone and positive reinforcement for women [63,64,65,66].
According to what is stated regarding the identity construction differentiated by gender, it can be inferred that certain stereotypical this study indicates that in the construction of professional digital identity, the deployment of linguistic techno-discursive processes linked to a conversation is as important in networks as personal visual linguistic processes. Both processes favor the social identity of the professional, which is reinforced by what is stated in the responses of the women participating in the sample gender behaviors are maintained in digital media that reproduce or extend the social dynamics of the presential space [67]. Thus, in the case of men in the study, the use of nicknames or aliases and avatars is a common behavior among them, so if in the face-to-face world they are recognized with a certain nickname (alias), they usually lead that alias to digital media, especially, if they participate in online video games where their use is a requirement. Our study coincides with the trend manifested by Malaysian youth [68], who used an avatar and aliases to represent themselves; typical behavior of the world of online videogames [69].
It is interesting to note that stereotyped behaviors impact the social connection in such a way that they become so toxic for female gamers that they are forced, out of fear, to mask their gender [70]. The fact that women express a greater preference for being accompanied could be another stereotype associated with female profiles, which would be interesting to study, to determine if it is only associated with wanting to be sociable and popular or doing so for safety due to male harassment flax [71].
The use of animal photographs as a representation of the personal profile was the least used option, where no differences were found by gender, although men presented a slightly higher use. This probably has the same origins as that of an avatar, since certain networks or groups, such as environmental groups or animal lovers, showing photos of pets is a valid form of identification.
Regarding the created and calculated digital identities, it will be analyzed as a whole, since they are directly related and random, it is not necessary to divide digital identities because the identity is one and is not dissociated and is in these dimensions where it is highly perceived. Given that in this sphere there is a significant difference between how women and men express themselves, it is again suggested that stereotyped behaviors in the face-to-face environment are extensive to the digital level (Table 7, Table 8, Table 9, Table 10, Table 11 and Table 12).
It is seen that women have a greater tendency to update their profile image. They only accept friendships from well-known people, so they tend to tag their friends in their publications and to like, without commenting mostly, everything that calls their attention without a specific thematic line (Table 7 and Table 12). However, they take care of the visibility of what they publish so that they have greater clarity of who sees their publications. They also show a greater motivation to participate to the extent that they know the impact of their activity, expressed with special attention by the number of photographs published by them (Table 7, Table 8 and Table 9). Self-care and visibility protection behaviors coincide with the non-declaration of their geolocated location (Table 6), their political tendency, opinions about politics, or their religious beliefs (Table 11). Moreover, women state that they have a high use of social networks and Web tools, WhatsApp and Instagram being the greater inclination media for daily use (Table 10).
Women’s preferences and behaviors are explained because the use of social networks is associated with the fact that these sites allow finding social support and reconnection with real friends and face-to-face social networks [72], valuing the correspondence between the published images and their veracity [73]. Therefore, this research coincides with the studies carried out and shows that it is chosen to publish in a protected medium and where personal purposes are not freely exposed to public opinion [74]. This conception is also extended to the fact that they inform their marital status, gender (male, female), and age more explicitly, in contrast to their sexual orientation.
For their part, men are less likely to update their profile image but tend to accept friend requests from strangers and friends of friends. In contrast, they rarely tag friends or acquaintances on the Web or social networks (Table 7). They declare a high frequency of giving “likes” by sharing and commenting—without a specific thematic line—everything that is of interest to them, unlike women who only “like” and share without commenting. Men also show less interest in knowing the impact of the publication of their photographs, as well as the number of their followers.
However, men do pay more attention to the knowledge of the metrics of their publications, this is a factor that motivates their participation (Table 7, Table 8, Table 9 and Table 12); although this means declaring its geolocated location (Table 6) and disseminating its information, status and images publicly [12]. These results are consistent with the Israeli study on attitudes towards online privacy and anonymity, visualizing a digital separation between men and women regarding the protection of their digital identity, evidencing a lower level of self-efficacy in this sphere in men, despite the higher level of technological literacy they have compared to women [75].
Regarding the belief system, men, although they tend to declare their political tendency and religious conviction, are not as likely, to make their age, gender, and marital status explicit on websites and networks, as women (Table 11). These results are explained because men see participation in social networks as an instance that allows them to enhance their social capital, so they tend to have more friends, show achievements, and not worry so much about publishing photos with a recognizable face or managing their privacy [76], which makes their digital identity much more susceptible to being affected.
Regarding the use of social networks and Web tools, men, although they use WhatsApp and Instagram daily, just as women, show a lower degree of activity frequency. There is just a difference regarding Youtube since it is indicated to be men’s preferred participation channel.
Finally, from the perspective of the PLE configuration (last aspect to be discussed), it can be deduced from the data collected in Table 13 that to manage the information Chilean university students prefer to organize it hierarchically in folders, following an analog logic. This organization implies that to decode it, they download it, print it on paper, underline and take notes on paper, which are then transferred to a text document and saved on their PCs.
If the information comes from a video or audio of their interest, students frequently state that questions or doubts will arise and they will try to relate this information to what they already know, keeping the option of taking notes on paper [19].
To create information, the university students make explicit that they publish the information on the social network that they frequently use (Table 13), which would be focused on Instagram, Facebook, YouTube, WhatsApp, or Spotify (Table 10). It is interesting to note that 33.79% of the student’s state that they do not know how to share information and more than 50% state that they do not use tools or a specific tool according to the type of information, so the procedure will always be the same to create it.
Despite how they organize and decode the information (Table 13), it is most likely that their creations are mainly iconic productions linked to photographs or images for social networks and, to a lesser extent, videos for YouTube, which is the most visited website by young people according to what they declare (Table 10). Texts, although they are a product that requires less complex digital skills, are relegated to third place.
Regarding the management of the learning process linked to critical thinking (Table 14), the sample declares that the factors that add credibility to the information they receive are: (1) expert recommendations, (2) articles, books, or videos appearing in various resources on the Internet, and (3) colleagues, friends and family as a reliable source to consider valid information. The bibliographic managers who recommend information lack the attention of Chilean university students.
The most used medium to solve technical problems related to the learning process will be YouTube since they will see tutorials on the Internet (Table 10 and Table 14). Secondly, they will contact colleagues or friends by mail or private messages and, thirdly, they will consult the media on the network (Table 14).
To clarify doubts while developing a job, they will turn to their colleagues and friends with high frequency, first in-person and, secondly, by contacting them by email or private messages through WhatsApp or social networks such as Instagram or Facebook. Again, the third option to consult doubts will be YouTube to see tutorials (Table 10 and Table 14).
When relating the information in Table 13 and Table 14 with the information in Table 7, Table 8, Table 9, Table 10, Table 11 and Table 12, it is evident that the types of PLE displayed and manifested by Chilean university students, as well as the construction of their DI, reflect basic digital skills with a reduced repertoire of technological tools.
Young university students interact, given their precarious digital skills, in an unfavorable scenario in terms of producing valuable or complex content that implies a more elaborate digital treatment through web applications, which limits their participation in the network.
In this way, we find ourselves in front of lurkers, participants in the network who read and observe without making their own retribution, and posters, subjects that share information online beyond the “like” and a minimum comment but do not reach the level of a prosumer who produces and distributes, providing new information [24] and building a favorable digital identity and reputation.
This research coincides with the findings of the study carried out with Turkish students, where their PLEs were useful environments in easy access to content and interaction with other users, allowing learning. However, these students were not focused on managing or building more learning, becoming passive actors [20], and adjusting the study population to observers rather than to publishers and prosumers.
Therefore, it can be corroborated that production is closely related to the degree of awareness of the activity displayed and manifested by the user [5]. That is, Chilean university students show low awareness of social activity where the metrics, the number of people who will attend events or accept invitations to groups created by them is low, their production is likewise low and linked to basic digital skills, focusing on iconic productions (photographs and videos) and, to a lesser extent, text. Hence, some digital contents of the multimedia and hypermedia type are more frequent in those individuals who are highly aware of their activity and do not exceed 20% of the population under study. This result is linked to the fact that this type of information production requires both the management of digital tools and the deployment of higher-order thinking tasks. It implies that students process the information learned and can design, formulate, and create new information [77].
According to the findings in this research, it is possible to rethink the users and future professionals who are graduating and who will soon be inserted into the professional world, whose media literacy skills necessary to produce digital artifacts are precarious [17]. However, it also urges that we understand the phenomena of digital technologies from the individual and society since the opportunities and/or inequalities will be given by the capacity that people have as users to adapt to a society of accelerated changes, in which the media and digital culture are diversified and acquire a predominant role. So, each selfie, like, live broadcast, post, or other shared production on the Web will contribute to the construction of the global identity of cyberspace and, therefore, to the digital identity of each user [5,49,77].
The implications of this research from an academic point of view have allowed: (1) to carry out the integration of the literature regarding DI and PLE; (2) contrast the results with the Latin American, European and Asian realities; (3) to provide, from a theoretical and empirical point of view, a comprehensive look at the construction of DI and PLE and how they are interdependent, affecting each other.
The novelty of this research aims to show, from a comprehensive perspective, how web 2.0 tools affect not only the university students’ social and academic field but also in the construction of their DI. When only the construction of the DI is analyzed, differences by gender are evident, but when the analysis is extended to academics, these differences disappear, which marks a change concerning the studies published so far, where a gap in skills is declared between men and women, a situation that did not occur in this case. The crossing of information carried out in this research marks a new vision of the study in digital competencies and, especially, in managing the DI of individuals and its incidence in their professional training process from a new perspective where there is no gap between men and women.

6. Conclusions

The displayed and manifest digital identity of Chilean university students is characterized by being highly transparent in terms of the delivery of personal information without making differences between face-to-face and virtual identity with a unique “I”.
These Chilean university students manifest a low awareness of their digital identity linked to their “fingerprints” like other young people in Latin America and Europe. Although, they are characterized by being aware of the frequency of publication in the five networks/tools that they commonly use in their daily lives, showing a high awareness of activity relative to their calculated DI, they do not manage their created DI, neglecting visibility of their activities and availability of their personal data, making them easily identifiable and vulnerable on the Internet. From the educational aspect, they manage the information and the learning process according to an analog/face-to-face logic that, together with their low awareness of activity and digital competencies, implies a lower production of content, placing them rather as observers.
Finally, Chilean university students show a hybrid academic digital identity that combines the face-to-face-digital, public–private, formal–informal spheres, blurring the planes of action between them, but maintaining the stereotypical behaviors of gender. This could lead us to think that generation Z, to which young Chilean university students belong, is in an educational context where technologies 3.0 and 4.0 are the constant, allowing the existence of e-Learning and m-Learning training processes. However, the pandemic that began in 2019 showed that Chilean and Latin American teachers, in general, do not have the necessary digital skills and competencies to carry out teaching and learning processes in digital environments [78,79,80].
Chile, like other Latin American countries, is just laying the necessary foundations to move from e-learning 2.0 to d-Learning or digital learning. Due to this, during the pandemic, instead of talking about an e-Learning training process, the academic community preferred to talk about remote education or emergency remote education supported with technology. At this point, it could be affirmed that there is a digital divide that distances Latin American countries from the educational process with technology experienced by young North American, Asian, and European university students, whom this new generation of Latin American professionals will compete against at some point, within the globalized labor market.
To achieve an effective transition in digital skills, it is necessary to consider both the characteristics of digital identity and the shortcomings in the use of digital tools, to help students develop a digital identity more in line with the labor market global to which they must face. Likewise, as teachers, it is necessary that we re-signify the learning spaces, taking a look at what the student actually uses in their day-to-day life. Without limiting ourselves to one-dimensional areas: face-to-face vs. digital; public vs. private and formal vs. informal and re-considering the way we how digital tools are integrated and thought; opening ourselves to create new learning opportunities.
Also, some limitations of this research must be mentioned such as the fact that it was a cross-sectional study and the sample was intentional per volunteer subject and not at random, which implies that the results obtained are limited to the sample studied and describe their behavior in a given moment. Furthermore, it was impossible to achieve gender parity, so the number of women was greater than the number of men. Despite these limitations, the sample used can be considered as large, which improves its ability to represent reality [37,81], allowing these results to be considered as an approximation to those that could be obtained in a random sample study with gender parity coverage.
From a practical point of view, the conclusions of this research provide Higher Education Institutions with evidence that allows progress towards a comprehensive, solid, and coherent training with the digital skills required by a university professional who graduates in a highly digitized world, demystifying the idea that our university students, being digital natives, are skilled and handle a wide range of technological tools.
Given the above, it would be advisable to advance in future studies that consider knowing the protection measures that university students know and apply to protect their data and manage their digital identity or whether the PLEs and the way of constructing the digital identity Post-pandemic varied.

Author Contributions

Conceptualization, M.H.-O. and Á.R.-V.; methodology, M.H.-O. and Á.R.-V.; software, Á.R.-V.; validation, M.H.-O., A.P.-G. and Á.R.-V.; formal analysis, M.H.-O. and Á.R.-V.; investigation, M.H.-O.; resources, M.H.-O.; data curation, M.H.-O.; writing—original draft preparation, M.H.-O.; writing—review and editing, M.H.-O. and Á.R.-V.; visualization, M.H.-O. and Á.R.-V.; supervision, A.P.-G.; project administration. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

The study was conducted according to the guidelines of the Declaration of Helsinki, and approved by the Institutional Review Board.

Data Availability Statement

Not Applicable, the study does not report any data.

Acknowledgments

This research had the support of the Universidad Autónoma de Chile, especially the Directorate of Informatics and the Corporate Development Unit. We are grateful for the contribution to the experts of the Interuniversity Seminar for Research in Educational Technology (SIITE) of 2019 and 2020 who with their advice and guidance helped to improve this research.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Castro, P.; González-Palta, I. Percepción de Estudiantes de Psicología sobre el Uso de Facebook para Desarrollar Pensamiento Crítico. Form. Univ. 2016, 9, 45–56. [Google Scholar] [CrossRef]
  2. Basantes, A.; Naranjo, M.; Gallegos, M.; Benítez, N. Los Dispositivos Móviles en el Proceso de Aprendizaje de la Facultad de Educación Ciencia y Tecnología de la Universidad Técnica del Norte de Ecuador. Form. Univ. 2017, 10, 79–88. [Google Scholar] [CrossRef]
  3. Magro, C. Educación Conectada en Tiempos de Redes, 1st ed.; Ministerio de Educación, Cultura y Deporte: Madrid, Spain, 2016; p. 289. [Google Scholar]
  4. Sevillano-García, M.; Quicios-García, M.; González-García, J. Posibilidades Ubicuas del Ordenador portátil: Percepción de Estudiantes Universitarios Españoles. Comunicar 2016, 46, 87–95. [Google Scholar] [CrossRef]
  5. Abdallah, S. Digital Identity and Reputation in a Virtual Practice Network-Insights Using Linguistic Features. Int. J. Collab. 2018, 14, 1–23. [Google Scholar] [CrossRef]
  6. Dabbagh, N.; Castaneda, L. The PLE As a Framework for Developing Agency in Lifelong Learning. Educ. Technol. Res. Dev. 2020, 68, 3041–3055. [Google Scholar] [CrossRef]
  7. Núñez, J. Disponibilidad de los recursos tecnológicos e internet con fines educativos en tiempos de crisis: Caso asignatura “Histotecnología I”. Eduweb 2020, 14, 220–235. [Google Scholar]
  8. Livingstone, S. On the Mediation of Everything: Ica Presidential Address 2008. J. Commun. 2009, 59, 1–18. [Google Scholar] [CrossRef]
  9. Mendez, M.C. La construcción de la identidad lingüística de Santiago Abascal en Twitter. Rev. Estud. Discurso Digit. (REDD) 2020, 3, 52–79. [Google Scholar] [CrossRef]
  10. Pérez, M. Introducción. Identidad Digital. Telos Cuad. Comun. Innov. 2012, 91, 55–58. [Google Scholar]
  11. García, A. Identidades y Representaciones Sociales: La Construcción de las Minorías. Nómadas Crit. J. Soc. Jurid. Sci. 2008, 18, 1–12. [Google Scholar]
  12. Castañeda, L.; Camacho, M. Desvelando Nuestra Identidad Digital. Prof. Inf. 2012, 21, 354–360. [Google Scholar] [CrossRef][Green Version]
  13. Sixto, J.; Payo, M. El Millennial Cyborg: La Dicotomía de la Identidad. Telos: Cuadernos de Comunicación e Innovación. 2018. Available online: https://telos.fundaciontelefonica.com/milenial-ciborg-la-dicotomia-la-identidad/ (accessed on 1 March 2021).
  14. Georges, F. Who Are You Doing? Declarative Acting, and Calculated Identity in Web 2.0. In Proceedings of the Actes de la Conférence Internacional 2009, Laval, France, 22–26 April 2009; pp. 22–26. [Google Scholar]
  15. Georges, F. “A l’image de l’Homme”: Cyborgs, Avatars, Identités Numériques. Temps Média 2012, 18, 136–147. [Google Scholar] [CrossRef]
  16. Georges, F. Identités Virtuelles: Les Profils Utilisateur du Web 2.0; Questions Théoriques: París, Francia, 2010. [Google Scholar]
  17. Brandtzaeg, P.B.; Chaparro-Domínguez, M.-Á. From Youthful Experimentation to Professional Identity: Understanding Identity Transitions in Social Media. Young 2020, 28, 157–174. [Google Scholar] [CrossRef]
  18. Feher, K. Digital Identity and the Online Self: Footprint Strategies–An Exploratory and Comparative Research Study. J. Inf. Sci. 2019, 47, 1–14. [Google Scholar] [CrossRef]
  19. Torres, R.; Edirisingha, P.; Canaleta, X.; Alsina, M.; Monguet, J.M. Personal Learning Environments Based on Web 2.0 Services in Higher Education. Telemat. Inform. 2019, 38, 194–206. [Google Scholar] [CrossRef]
  20. Şahin, S.; Uluyol, Ç. Preservice Teachers’ Perception and Use of Personal Learning Environments (PLEs). Int. Rev. Res. Open Distance Learn. 2016, 17, 141–161. [Google Scholar] [CrossRef]
  21. Turgut, Y.E.; Aslan, A. Factors affecting ICT integration in TURKISH education: A systematic review. Educ. Inf. Technol. 2021, 1, 1–24. [Google Scholar] [CrossRef]
  22. Guodong, W.; Xinghua, S. Building a Personal Learning Environment with IFTTT Service. J. Softw. Eng. 2016, 10, 431–436. [Google Scholar] [CrossRef]
  23. Kietzmann, J.; Hermkens, K.; McCarthy, I.; Silvestre, B. Social media? Get serious! Understanding the functional building blocks of social media. Bus. Horiz. 2011, 54, 241–251. [Google Scholar] [CrossRef]
  24. Nguyen, T.M. Four-Dimensional Model: A Literature Review on Reasons Behind Lurking Behavior. Available online: https://www.emerald.com/insight/content/doi/10.1108/VJIKMS-10-2019-0168/full/html (accessed on 1 March 2021).
  25. Georgalou, M. I Make the Rules on My Wall’: Privacy and Identity Management Practices on Facebook. Discourse Commun. 2016, 10, 40–64. [Google Scholar] [CrossRef]
  26. Zurlinden, P.A. La Identidad y el Aprendizaje: Una Perspectiva Social. Multidisciplin 2010, 6, 5–13. [Google Scholar]
  27. Esteve-González, V.; González, J.; Gisbert, M.; Cela-Ranilla, J. La Presencia Social en Entornos Virtuales 3D: Reflexiones a Partir de una Experiencia en la Universidad. Pixel-Bit 2017, 50, 137–146. [Google Scholar] [CrossRef]
  28. Cela-Ranilla, J.; Esteve-González, V.; Esteve-Mon, F.; González-Martínez, J.; Gisbert-Cervera, M. El Docente en la Sociedad Digital: Una Propuesta Basada en la Pedagogía Transformativa y en la Tecnología Avanzada. Profesorado 2017, 21, 403–422. [Google Scholar]
  29. López-Hernández, F.; Silva-Pérez, M.M. Factores que Inciden en la Aceptación de los Dispositivos Móviles para el Aprendizaje en Educación Superior. Estud. Sobre Educ. Super. 2016, 30, 175–195. [Google Scholar]
  30. Qotb, H. L’identité Numérique du Locuteur Dans les Échanges Professionnels en Ligne: Le Cas du Forum Médical Infirmiers.com. Lang Société 2020, 170, 129–146. [Google Scholar] [CrossRef]
  31. Fernández-Marcial, V.; González-Solar, L. Promoción de la investigación e identidad digital: El caso de la Universidade da Coruña. Prof. Inf. 2015, 24, 656–664. [Google Scholar] [CrossRef][Green Version]
  32. Winocur, R. La Intimidad de Los Jóvenes en Las Redes Sociales: Transformaciones en el Espacio Público y Privado. Telos. Rev. Pensam. Sobre Comun. Tecnol. Soc. 2012, 91, 79–88. [Google Scholar]
  33. Goode, J. The digital identity divide: How technology knowledge impacts college students. New Media Soc. 2010, 3, 497–513. [Google Scholar] [CrossRef]
  34. Hernandez, R.; Fernández, C.; Batista, P. Metodología de la Investigación. Metodología de la Investigación; Mc Graw Hill: Santiago, Chile, 2010. [Google Scholar]
  35. Camarero Rioja, L. Estadística Para la Investigación Social; Garceta: Madrid, Spain, 2013. [Google Scholar]
  36. Díaz-Narváez, V.P.; Calzadilla-Núñez, A. Artículos científicos, tipos de investigación y productividad científica en las ciencias de la salud. Rev. Cienc. Salud 2016, 14, 115–121. [Google Scholar] [CrossRef]
  37. Garcia, J.; Reding, A.; López, J. Cálculo del tamaño de la muestra en investigación en educación médica. Investig. Educ. Média 2013, 2, 217–224. [Google Scholar] [CrossRef]
  38. Izcara Palacios, S. Manual de Investigación Cualitativa; Editorial Fontamara: Mexico City, Mexico, 2014. [Google Scholar]
  39. Soriano Rodríguez, A.M. Diseño y validación de instrumentos de medición. Diálogos 2014, 14, 19–40. [Google Scholar] [CrossRef]
  40. Barbosa-Chacón, J.; Barbosa-Herrera, J.C.; Rodríguez-Villabona, M. Revisión y análisis documental para estado del arte: Una propuesta metodológica desde el contexto de la sistematización de experiencias educativas. Investig. Bibl. 2013, 27, 83–105. [Google Scholar]
  41. Prendes-Espinosa, M.P.; Castañeda-Quintero, L.; Solano-Fernández, I.M.; Roig-Vila, R.; Aguiar-Perera, M.V.; Serrano-Sánchez, J.L. Validación de un Cuestionario sobre Hábitos de Trabajo y Aprendizaje para Futuros Profesionales: Explorar los Entornos personales de Aprendizaje. Relieve 2016, 22, 1–46. [Google Scholar] [CrossRef]
  42. Cabero-Almenara, J.; Barroso-Osuna, J. La Utilización del Juicio de Experto para la Evaluación de TIC: El Coeficiente de Competencia Experta. Bordón 2013, 65, 25–38. [Google Scholar] [CrossRef]
  43. Muñoz, F.; Becerra, S.; Riquelme, E. Elaboración y validación psicométrica del cuestionario de convivencia escolar para la no violencia (CENVI). Estud. Pedagóg. 2017, 43, 205–223. [Google Scholar] [CrossRef]
  44. Rodríguez, J.; Fernández, M. Diseño y validación de un instrumento de medida del clima en Centros de Educación Secundaria. Educación XX1 2015, 18, 71–98. [Google Scholar] [CrossRef]
  45. Villaroel, L. Métodos Bioestadísticos, 2nd ed.; Ediciones UC: Santiago, Chile, 2018. [Google Scholar]
  46. Abascal, E.; Grande, I. Análisis de Encuestas, 1st ed.; Esic Editorial: Madrid, Spain, 2005. [Google Scholar]
  47. Rojas, R. Guía para Realizar Investigaciones Sociales, 33rd ed.; Plaza y Valdés Editores: Mexico City, Mexico, 2006. [Google Scholar]
  48. Taucher, E. Bioestadística, 1st ed.; Ocho Libros Editores Ltda.: Santiago, Chile, 2014. [Google Scholar]
  49. Belli, S.; De Eugenio, G. Prácticas Emocionales y Procesos Subjetivadores en la Sociedad Digital: El Caso de los Suicidios Online. Quad. Psicol. 2014, 16, 57–72. [Google Scholar] [CrossRef][Green Version]
  50. Çöteli, S. The Impact of New Media on the Forms of Culture: Digital Identity and Digital Culture. Online J. Commun. Media Technol. 2019, 9, e201911. [Google Scholar] [CrossRef]
  51. Liu, R.-D.; Wang, J.; Gu, D.; Ding, Y.; Oei, T.P.; Hong, W.; Zhen, R.; Li, Y.-M. The Effect of Parental Phubbing on Teenager’s Mobile Phone Dependency Behaviors: The Mediation Role of Subjective Norm and Dependency Intention. Psychol. Res. Behav. Manag. 2019, 12, 1059–1069. [Google Scholar] [CrossRef]
  52. Li, L.; Lin, T.T.C. Over-Connected? A Qualitative Exploration of Smartphone Addiction among Working Adults in China. BMC Psychiatry 2019, 19, 1–10. [Google Scholar] [CrossRef]
  53. Vander-Abeele, M.; Hendrickson, A.; Pollman, M.H.; Ling, R. Phubbing Behavior in Conversations and its Relation to Perceived Conversation Intimacy and Distraction: An Exploratory Observation Study. Comput. Hum. Behav. 2019, 100, 35–47. [Google Scholar] [CrossRef]
  54. Soomro, K.; Zai, S.; Nasrullah, F.; Hina, Q. Investigating the Impact of University Students’ Smartphone Addiction on their Satisfaction with Classroom Connectedness. Educ. Inf. Technol. 2019, 24, 3523–3535. [Google Scholar] [CrossRef]
  55. Hernández-Orellana, M.; Pérez-García, A.; Roco-Videla, Á. Identidad Digital y Conectividad: Conocimiento y Actitudes en Estudiantes Universitarios Chilenos. Form. Univ. 2021, 14, 147–156. [Google Scholar] [CrossRef]
  56. Oviedo-Trespalacios, O.; Nandavar, S.; Newton, J.D.A.; Demant, D.; Phillips, J.G. Problematic Use of Mobile Phones in Australia… Is It Getting Worse? Front. Psychiatry 2019, 10, 105. [Google Scholar] [CrossRef]
  57. Holicza, P.; Kadëna, E. Smart and Secure? Millennials on Mobile Devices. Interdiscip. Descr. Complex Syst. 2018, 16, 376–383. [Google Scholar] [CrossRef]
  58. García, J. Identidad Híbrida en la Era “Post-PC”: Movilidad y Cambio Social. Telos. Rev. Pensam. Sobre Comun. Tecnol. Soc. 2012, 109, 89–95. [Google Scholar]
  59. Zafra, R. Un Cuarto Propio Conectado: (Ciber)espacio y (Auto)gestión del Yo; Fórcola: Madrid, Spain, 2010. [Google Scholar]
  60. Sibilia, P. La Intimidad como Espectáculo; Fondo de Cultura Económica de Argentina: Buenos Aires, Argentina, 2008. [Google Scholar]
  61. Huang, J.; Kumar, S.; Hu, C. Gender Differences in Motivations for Identity Reconstruction on Social Network Sites. Int. J. Hum. Comput. Interact. 2018, 34, 591–602. [Google Scholar] [CrossRef]
  62. Shepherd, R.P. Men, Women, and Web 2.0 Writing: Gender difference in Facebook Composing. Comput. Compos. 2016, 39, 14–26. [Google Scholar] [CrossRef]
  63. Piñeiro-Otero, T.; Martínez-Rolán, X. Los Memes en el Activismo Feminista en la Red. #ViajoSola como Ejemplo de Movilización Transnacional. Cuad. Inf. 2016, 39, 17–37. [Google Scholar] [CrossRef]
  64. Trott, V. Networked Feminism: Counterpublics and the Intersectional Issues of #MeToo. Fem. Media Stud. 2020, 1–18. [Google Scholar] [CrossRef]
  65. Rosales, M.B. Ciberactivismo: Praxis Feminista y Visibilidad Política en #NiUnaMenos. Pléyade 2018, 22, 63–85. [Google Scholar] [CrossRef]
  66. Sádaba, I.; Barranquero, A. Las redes Sociales del Ciberfeminismo en España: Identidad y Repertorios de Acción. Athenea Digit. 2019, 19, 2058. [Google Scholar] [CrossRef]
  67. Buffardi, A.; Calzone, S.; Mazza, C.; Taddeo, G. What Do Italian Students and Teachers Ask About Digital? Data and Reflections From Schools Participating in National Operational Programs. Ital. J. Sociol. Educ. 2021, 13, 95–133. [Google Scholar] [CrossRef]
  68. T’ng, S.T.; Pau, K. Identification of Avatar Mediates the Associations Between Motivations of Gaming and Internet Gaming Disorder Among the Malaysian Youth. Int. J. Menthal Health Addict. 2020, 18, 1–16. [Google Scholar] [CrossRef]
  69. Beranuy, M.; Fernández-Montalvo, J.; Carbonell, X.; Cova, F. Características del Uso de Internet en los Cibercafés. Ter. Psicol. 2016, 34, 5–14. [Google Scholar] [CrossRef]
  70. Vella, K.; Klarkowski, M.; Turkay, S.; Johnson, D. Making Friends in Online Games: Gender Differences and Designing for Greater Social Connectedness. Behavavior Inf. Technol. 2020, 39, 917–934. [Google Scholar] [CrossRef]
  71. Wiens, B.I.; MacDonald, S. Feminist Futures: #MeToo’s Possibilities as Poiesis, Techné, and Pharmakon. Fem. Media Stud. 2020, 21, 1–17. [Google Scholar] [CrossRef]
  72. Clark, J.L.; Algoe, S.B.; Green, M.C. Social Network Sites and Well-Being: The Role of Social Connection. Curr. Dir. Psychol. Sci. 2017, 27, 32–37. [Google Scholar] [CrossRef]
  73. Ahadzadeh, A.S.; Pahlevan Sharif, S.; Ong, F.S. Self-Schema and Self-Discrepancy Mediate the Influence of Instagram Usage on Body Image Satisfaction Among Youth. Comput. Hum. Behav. 2017, 68, 8–16. [Google Scholar] [CrossRef]
  74. Burrow, A.L.; Rainone, N.A. How Many Likes did I Get?: Purpose Moderates Links between Positive Social Media Feedback and Self-Esteem. J. Exp. Soc. Psychol. 2017, 69, 232–236. [Google Scholar] [CrossRef]
  75. Weinberger, M.; Zhitomirsky-Geffet, M.; Bouhnik, D. Sex Differences in Attitudes towards Online Privacy and Anonymity among Israeli Students with Different Technical Backgrounds. Inf. Res. Int. Electron. J. 2017, 22, n4. [Google Scholar]
  76. Huang, W.L.; Liang, J.C.; Tsai, C.C. Exploring the Relationship between University Students’ Conceptions of and Approaches to Learning Mass Communication in Taiwan. Asia Pac. Educ. Res. 2018, 27, 43–54. [Google Scholar] [CrossRef]
  77. Reyna, J.; Hanham, J.; Meier, P. A Taxonomy of Digital Media Types for Learner-Generated Digital Media Assignments. E-Learn. Digit. Media 2017, 14, 309–322. [Google Scholar] [CrossRef]
  78. Giannini, S. Covid-19 y Educación Superior: De Los Efectos Inmediatos al Día Después. Rev. Latinoam. Educ. Comp. 2020, 11, 1–57. [Google Scholar]
  79. Kumar Basak, S.; Wotto, M.; Bélanger, P. E-learning, M-learning and D-learning: Conceptual definition and comparative analysis. E-Learn. Digit. Media 2018, 15, 191–216. [Google Scholar] [CrossRef]
  80. Ruz-Fuenzalida, C. Educación virtual y enseñanza remota de emergencia en el contexto de la educación superior técnico-profesional: Posibilidades y barreras. Rev. Saberes Educ. 2021, 6, 128–143. [Google Scholar] [CrossRef]
  81. Alvarado-Martínez, H.; Retamal-Pérez, L. Dificultades de Comprensión del Teorema Central del Límite en Estudiantes Universitarios. Educ. Mat. 2012, 24, 151–171. [Google Scholar]
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.