rachaelsullivan + identity   88

Digital Identities: Six Key Selves of Networked Publics | the theoryblog
I am interested in what we do that makes us who we are in social media spaces, thus my concept of digital identity is practice-based. At the same time, I see identity as a lens through which we can examine the potentialities specific to social networks. I use the concept of identity to explore what it is that social software makes possible in practice.
identity  self  socialmedia  rheingold 
may 2017 by rachaelsullivan
Tower of Song | the theoryblog
Junior scholars and grad students and contingent academics can create forms of visibility and legitimacy within the blurred space between media and institutional scholarship that do not match their institutional status, or lack thereof.
profession  twitter  academia  identity 
may 2017 by rachaelsullivan
The Real Name Fallacy – The Coral Project (1/17)
Our concerns about anonymity are overly-simplistic; system design can’t solve social problems without actual social change.
harassment  twitter  facebook  anonymous  design  virtualcommunity  identity 
january 2017 by rachaelsullivan
Partial transcript: Moot on 4chan and why it works as a meme factory | digiom. studienblog über das leben in und mit digitalen onlinemedien
The emphasis on anonymity is a large factor in it because again it allows you to express things that normally you wouldn’t if you had an identity. The lack of retention is also important because, on a site where you can just bump up all content, the way kind of threads work on 4chan is that if you post something and it’s crap, it’s washed away. The site has no memory and it’s just washed away by all of these new posts. And if it’s a genuinely good idea or something that people identify with then either somebody will save it and repost it and that’s how we get memes, and we’ll get into that in just a second.”
4chan  socialmedia  memory  identity  memes 
october 2015 by rachaelsullivan
Assignment Idea: Creating a Digital Autoethnography | Theories of Texts and Technology
The major assignment for the class was to write an autoethnography after examining many examples of memoirs. The autoethnography is similar to a memoir except that it examines a specific moment, event, or memory with a specific subject position in mind. The main question asked is how does one examine oneself through the lens of one’s race, gender, political or religious affiliation, place (where one is located in the world; where one grew up), or ethnicity? How do we define ourselves through those subject positions? An autoethnography, like a memoir or other piece of writing, is written; in print. I propose to move the autoethnography to an electronic format. What story would a student present about him/herself and what electronic medium would he/she choose to present the story?
teaching  assignments  self  identity  autoethnography 
september 2015 by rachaelsullivan
CyberDemocracy: Internet and the Public Sphere Mark Poster (1995)
While there is no doubt that the Internet folds into existing social functions and extends them in new ways, translating the act of shopping, for example, into an electronic form, what are far more cogent as possible long term political effects of the Internet are the ways in which it institutes new social functions, ones that do not fit easily within those of characteristicallymodern organizations. The problem is that these new functions can only become intelligible if a framework is adopted that does not limit the discussion from the outset to modern patterns of interpretation. To ask then about the relation of the Internet to democracy is to challenge or to risk challenging our existing theoretical approaches and concepts as they concern these questions.
democracy  publicsphere  habermas  internet  identity 
july 2015 by rachaelsullivan
Facebook Isn't A Social Network. And Stop Trying to Make New Friends There | TechCrunch
Please note that Facebook accounts are meant for authentic usage only. This means that we expect accounts to reflect mainly “real-world” contacts (i.e. your family, schoolmates, co-workers, etc.), rather than mainly “internet-only” contacts. As stated on our home page, Facebook is a social utility that connects you with the people around you, not a “social networking site”. It is meant to help reinforce pre-existing social connections, not build large groups of new ones. If this is in direct contrast to what you expected as legitimate Facebook usage, I apologize for any confusion. This is simply the intention behind the site.
facebook  identity 
march 2015 by rachaelsullivan
Facebook has totally reinvented human identity: Why it’s even worse than you think - Salon.com
Will the young people of the future question social values if they are trained from a young age by technological demands to express their person in a corporately constructed template?
feminism  facebook  facebookworldtakeover  identity  lgbt  self  selfpresentation 
october 2014 by rachaelsullivan
Facebook custom gender options: Here are all 56 custom options. (Feb 2014)
The site does not seem to allow users to simply leave the field blank, or to type in a gender identifier that is not among the preset options.
gender  facebook  interface  facebookworldtakeover  lgbt  identity 
october 2014 by rachaelsullivan
YouAreWhatYouLike: Find out what algorithms can tell about you based on your Facebook account.
What happens if an algorithm discovers you are single and pregnant and you work for a company with religious management who will fire you for acting out of line with their beliefs?
algorithm  facebook  identity  tracking  socialmedia  data 
october 2014 by rachaelsullivan
Why Facebook Is Deleting Drag Queen Profile Pages | TechCrunch
“As part of our overall standards, we ask that people who use Facebook provide their real name on their profile,” stated an email from a Facebook spokesperson. The real-names policy has been in place for a while, but it’s not entirely clear why drag queens have been suddenly targeted en masse. Heklina was told by Facebook reps that it was just an algorithm that discovered the drag queens and started asking them to change their names.
identity  lgbt  facebookworldtakeover  facebook  from delicious
september 2014 by rachaelsullivan
ghostwords/chameleon · GitHub
Since Tor users are supposed to all look alike, Chameleon attempts to blend in by altering request headers and JavaScript properties to match Tor Browser's values.
identity  privacy  tor  browsers  chrome  resistance  security  tracking  javascript  from delicious
may 2014 by rachaelsullivan
The Political Power of Play - Hybrid Pedagogy (Adeline Koh)
Games and play thus offer some of the most interesting and underutilized ways of creating political thought and action.
gaming  games  race  identity  pedagogy  from delicious
may 2014 by rachaelsullivan
april 4, 2014 - Mark Zuckerberg’s views on anonymity seem to be evolving, and that’s a good thing — Tech News and Analysis
“I don’t know if the balance has swung too far, but I definitely think we’re at the point where we don’t need to keep on only doing real identity things. If you’re always under the pressure of real identity, I think that is somewhat of a burden. [Our view on anonymity] is definitely, I think, a little bit more balanced now 10 years later.”
privacy  facebook  identity  virtuality  boyd  from delicious
april 2014 by rachaelsullivan
Secret - Speak Freely
Secret is a space to openly share what you're thinking and feeling with your friends. Speak freely, share anything.
identity  socialmedia  socialnetworking  writingspaces  digitaltext  apps  from delicious
march 2014 by rachaelsullivan
Investigating the style of self-portraits (selfies) in five cities across the world. Selfiecity investigates selfies using a mix of theoretic, artistic and quantitative methods
selfie  photography  instagram  socialmedia  identity  from delicious
february 2014 by rachaelsullivan
Don’t Give Me the Numbers – an interview with Ben Grosser about Facebook Demetricator
What’s going on here is that these quantifications of social connection play right into my (capitalism-inspired) innate desire for more. This isn’t surprising as we’re living in a time when our collective obsession with metrics plays out as an insatiable desire to make every number go higher. How much money did I earn? How many choices do I have? Perhaps the most destructive example of this is the recent financial crisis, when a constant desire for more led the global economy into financial ruin. Along the way Demetricator explores how the designs of software prescribe certain behaviors, and questions the motivations behind those designs. What purpose does this enumeration serve for a system (and a corporation) that depends on its user’s continued free labor to produce the information that fills its databases? Where does it lead when quantity, not quality is foremost?
software  algorithm  criticalcode  facebook  facebookworldtakeover  identity  data  interface  database  from delicious
december 2013 by rachaelsullivan
In our living space, a wallpaper is omnipresent, it surrounds us day and night... #processing #facebook
fbFaces is an attempt to visualize the incredible amount of data and images that we are daily overwhelmed by, so that we can neither realize our own selectivity nor consider the amount of data perceived. The wallpaper transforms the room itself into a flood of information. It surrounds us, cannot be estimated from distance; details can only be caught through determined selection.…..What is normal, what is exaggerated? How are we dealing with that flood of information and in which way is it changing us? How important is image cultivation on the Internet and how important becomes my “facebook-me”?
facebook  facebookworldtakeover  privacy  identity  overload  virtuality  paper  from delicious
december 2013 by rachaelsullivan
What names are allowed on Facebook? | Facebook Help Center
Facebook is a community where people use their real identities. We require everyone to provide their real names, so you always know who you're connecting with. This helps keep our community safe. ... Pretending to be anything or anyone is not allowed.
identity  foreigner  facebook  facebookworldtakeover  from delicious
october 2013 by rachaelsullivan
(9) Facebook
On Facebook people connect using their real names and identities. We ask that you refrain from publishing the personal information of others without their consent. Claiming to be another person, creating a false presence for an organization, or creating multiple accounts undermines community and violates Facebook¹s terms.
identity  facebookworldtakeover  facebook  community  self  from delicious
october 2013 by rachaelsullivan
N.S.A. Gathers Data on Social Connections of U.S. Citizens - NYTimes.com
The agency can augment the communications data with material from public, commercial and other sources, including bank codes, insurance information, Facebook profiles, passenger manifests, voter registration rolls and GPS location information, as well as property records and unspecified tax data, according to the documents. They do not indicate any restrictions on the use of such “enrichment” data, and several former senior Obama administration officials said the agency drew on it for both Americans and foreigners. “All of N.S.A.’s work has a foreign intelligence purpose,” the spokeswoman added. “Our activities are centered on counterterrorism, counterproliferation and cybersecurity.”
NSA  identity  surveillance  data  security  cybersecurity  from delicious
september 2013 by rachaelsullivan
Information Processing and Pleasure | PopMatters
Either way, our internal filters are winnowing, such that we start to choke on anything more substantial than a tweet, become restless at the thought of assimilating larger, holistic hunks of culture. This seems to be a conceptual shift in how we approach experience, not as something overwhelming to lose ourselves in but as something to collect and integrate within ourselves as a series of discrete, manipulatable objects.
identity  hypermediation  information  immediacy  carr  data  overload  archive  attention  from delicious
june 2013 by rachaelsullivan
Turkle: Who Am We? 1996
The imperative to self-knowledge has always been at the heart of philosophical inquiry. In the 20th century, it found expression in the psychoanalytic culture as well. One might say that it constitutes the ethic of psychoanalysis. From the perspective of this ethic, we work to know ourselves in order to improve not only our own lives, but those of our families and society. Psychoanalysis is a survivor discourse. Born of a modernist worldview, it has evolved into forms relevant to postmodern times. With mechanistic roots in the culture of calculation, psychoanalytic ideas become newly relevant in the culture of simulation. Some believe that we are at the end of the Freudian century. But the reality is more complex. Our need for a practical philosophy of self-knowledge has never been greater as we struggle to make meaning from our lives on the screen.
identity  postmodern  psychology  turkle  interaction  virtuality  self  virtualworlds  from delicious
april 2013 by rachaelsullivan
Delete This When You're Done: Snapchat and the Power of Deletion : The New Yorker
Snapchat highlights the power of deletion in resisting the gentle totalitarianism of endless sharing. Deletion pokes holes in these records; it is a destabilizing force that calls into question their authority, particularly as complete documentation of a person’s online identity, which Facebook and Twitter increasingly purport to be. It is the only way to be selective, to make choices, when everything is shared. I delete tweets frequently from Twitter, for instance. (I have jokingly called it “snaptweeting.”) There is a general expectation that a tweet will stick around, particularly if it is somehow embedded in the greater Twitter infrastructure, for example when somebody favorites or retweets it. Its disappearance shortly thereafter breaks the system in a tiny way, generating a hairline crack in that model of who I am.
twitter  identity  facebook  photosharing  archive  memory  from delicious
april 2013 by rachaelsullivan
Poetry Makes You Weird - The Chronicle Review - The Chronicle of Higher Education
Shelley articulates literature's invigorating disorientation: "Poetry lifts the veil from the hidden beauty of the world, and makes familiar objects be as if they were not familiar." But the result of that alienation is not only an aesthetic rush; it is also a moral life. In shocking us into awareness, poetry urges us to relate to the world in fresh ways. The problem is, How do I connect my own mind, relatively familiar, with what is before me, enticingly bizarre?

Shelley answers: Imagine what it's like to be what you perceive. To accomplish that connection requires "a going out of our nature, and an identification of ourselves with the beautiful which exists in thought, action, or person, not our own." I take that to mean that the more distinctly we imagine the plight of another, the more empathy we feel, and the more beauty we appreciate.
shelley  keats  nonhuman  identity  queer  poetry 
december 2012 by rachaelsullivan
Prisoner Letters Offer Glimpses of Life in Solitary Confinement - NYTimes.com
Having been held captive to their imaginations for weeks, months or, occasionally, years on end, the men — many already struggling with mental illness — brought their paranoia, rage, anxiety and hope to life on the page, with descriptions that were sometimes literary and other times nearly impossible to decipher. More than anything, they conveyed a grisly awareness that their identities were unraveling, a feeling so disconcerting for some that they tried to take their own lives.
prison  identity  narrative  letters 
october 2012 by rachaelsullivan
We Feel Fine / mission
Since August 2005, We Feel Fine has been harvesting human feelings from a large number of weblogs. Every few minutes, the system searches the world's newly posted blog entries for occurrences of the phrases "I feel" and "I am feeling". When it finds such a phrase, it records the full sentence, up to the period, and identifies the "feeling" expressed in that sentence (e.g. sad, happy, depressed, etc.). Because blogs are structured in largely standard ways, the age, gender, and geographical location of the author can often be extracted and saved along with the sentence, as can the local weather conditions at the time the sentence was written. All of this information is saved.
archive  emotion  identity  visualization  blogging  affect 
september 2012 by rachaelsullivan
If Your Kids Are Awake, They’re Probably Online - NYTimes.com
The average young American now spends practically every waking minute — except for the time in school — using a smart phone, computer, television or other electronic device, according to a new study from the Kaiser Family Foundation.
identity  digitalculture  statistics  youth 
july 2012 by rachaelsullivan
Magazine - Is Facebook Making Us Lonely? - The Atlantic
LONELINESS IS CERTAINLY not something that Facebook or Twitter or any of the lesser forms of social media is doing to us. We are doing it to ourselves. Casting technology as some vague, impersonal spirit of history forcing our actions is a weak excuse. We make decisions about how we use our machines, not the other way around.
digitalculture  mcluhan  agency  identity  psychology  twitter  facebook 
july 2012 by rachaelsullivan
If We Are What We Read, Who Are We, Exactly? - Entertainment - The Atlantic Wire
Books have the power to change us—but not just in our minds, apparently. According to research recently published in the Journal of Personality and Social Psychology by Geoff Kaufman of Tiltfactor Laboratories at Dartmouth College and Lisa Libby of Ohio State, the act of reading of and identifying with a fictional character means also that we tend to subconsciously adopt their behavior. In reading about our favorite characters, we may actually become more like them.
fiction  identity  reading  books 
may 2012 by rachaelsullivan
Local News | A mystery man awakes in Discovery Park | Seattle Times Newspaper
"I find myself in tears that I don't know if I want the memories," he said. "But if you don't have an identity, it's very difficult to survive."
loss  identity  amnesia  memory 
may 2012 by rachaelsullivan
BBC News - India launches biometric census
april 2010 - India is launching a new census in which every person aged over 15 will be photographed and fingerprinted to create a biometric national database.
The government will then use the information to issue identity cards.
Officials will spend a year classifying India's population of around 1.2 billion people according to gender, religion, occupation and education.
The exercise, conducted every 10 years, faces big challenges, not least India's vast area and diversity of cultures.
Census officials must also contend with high levels of illiteracy and millions of homeless people - as well as insurgencies by Maoists and other rebels which have left large parts of the country unsafe.
President Pratibha Patil was the first person to be listed, and appealed to fellow Indians to follow her example "for the good of the nation".
"Everyone must participate and make it successful," she said in Delhi.
biometrics  india  privacy  data  panopticon  identity 
november 2011 by rachaelsullivan
The Facebook Project
Of all the different and perplexing social conundrums sociologists have tackled over the years, the notion of identity is perhaps among the most elusive and emergent.  

Identities are fluid, and often times difficult to fit into a simple definition.  Two people might share defining characteristics, such as being blond or female and knowing how to fly an airplane, but in practice their identities are never the same.  Identity evolves over time and therefore remains in some state of constant change.  You may always be identified as human, but go from young to old and naive to wise.  This paper does not seek to postulate an all-inclusive definition of identity, but instead situate an understanding of it within two main contexts: the digital environment and gender.
facebook  identity 
april 2011 by rachaelsullivan
A history erased - Abkhazia's archive: fire of war, ashes of history
..The Mission obtained sufficient evidence to conclude that gross and systematic violations of human rights had occurred at the hands of Georgian troops in Abkhazia throughout the period since August 14, 1992; that these included serious violations committed against Abkhazian and other ethnic population groups in cities and villages; that Georgian attacks were directed against persons identifiable as Abkhazian, and that particular attack was directed against Abkhazian political, cultural, intellectual and community leaders; and that removal or destruction of the principal materials and buildings of important historical and cultural importance to Abkhazians has taken place in what appears to be an organized attempt to destroy Abkhazian culture and national identity. (UNPO: November 1992 Mission to Abkhazia Report)
history  archive  identity  abkhazia  unarchive 
april 2011 by rachaelsullivan
Are Universities Digitally Tracking Students? - TIME
Northern Arizona University recently received $85,000 to fund a new tracking initiative that revolves around a series of scanners stationed outside lecture halls. According to NPR, students must scan their ID cards in order to be counted in the day's roll call, effectively replacing a chorus of sleepy "here's" with a hailstorm of chirpy beeps.
surveillance  identity  highered  panopticon 
september 2010 by rachaelsullivan
Delete: The Virtue of Forgetting in the Digital Age
Delete looks at the surprising phenomenon of perfect remembering in the digital age, and reveals why we must reintroduce our capacity to forget. Digital technology empowers us as never before, yet it has unforeseen consequences as well. Potentially humiliating content on Facebook is enshrined in cyberspace for future employers to see. Google remembers everything we've searched for and when. The digital realm remembers what is sometimes better forgotten, and this has profound implications for us all.
memory  identity  books  archive 
july 2010 by rachaelsullivan
Not addiction. Dependency.
By dismissing talk of "Internet addiction" as rhetorical overkill, which it is, we also avoid undertaking an honest examination of how deeply our media devices have been woven into our lives and how they are shaping those lives in far-reaching ways, for better and for worse. In the course of just a decade, we have become profoundly dependent on a new and increasingly pervasive technology. What happens to the human self as it comes to experience more and more of the world, and of life, through the mediation of the screen?
carr  addiction  screens  self  identity  youth  internet 
may 2010 by rachaelsullivan
Andrey Ternovskiy's Web site, Chatroulette : The New Yorker
Ternovskiy says that he sees the computer as "one hundred percent my window into the world." He doesn't seek much else. "I always believed that computer might be that thing that I only need, that I only need that thing to survive," he says. "It might replace everything."
identity  screens  generations  youth  self  internet 
may 2010 by rachaelsullivan
Is a biometric, national ID card an immigration game changer?
The Democrats' immigration-reform proposal (pdf) is 26 pages long. Pages 8 through 18 are devoted to "ending illegal employment through biometric employment verification." I don't think the Democrats are going to like me calling this a biometric national ID card, as they go to great lengths to say that it is not a national ID card, and make it "unlawful for any person, corporation; organization local, state, or federal law enforcement officer; local or state government; or any other entity to require or even ask an individual cardholder to produce their social security card for any purpose other than electronic verification of employment eligibility and verification of identity for Social Security Administration purposes."
biometrics  identity  immigration  security  nationalism 
may 2010 by rachaelsullivan
AZ Truck driver forced to show birth certificate claims racial-profiling
Abdon was told he did not have enough paperwork on him when he pulled into a weigh station to have his commercial truck checked. He provided his commercial driver’s license and a social security number but ended up handcuffed. An agent called his wife and she had to leave work to drive home and grab other documents like his birth certificate.

Jackie explains, “I have his social security card as well and mine. He's legit. It's the first time it's ever happened.” Both were born in the United States and say they are now both infuriated that keeping important documents safely at home is no longer an option
identity  paper  derrida  race 
april 2010 by rachaelsullivan
facial recognition tools
Last week's Picasa software update from Google brought with it a neat trick--facial recognition. But it wasn't the first free consumer photo-editing software to find faces. In January, Apple unveiled the latest version of iLife, which included an updated version of iPhoto that could detect and recognize faces in your photos. And this time last year, Microsoft released an updated version of its Windows Live Photo Gallery desktop software that could find faces inside of photos, though it couldn't (and still can't) recognize who's in them.
security  biometrics  identity  photography  face  google  apple  microsoft 
april 2010 by rachaelsullivan
Great Wall of Facebook: The Social Network's Plan to Dominate the Internet
By linking Web activity to Facebook accounts, they begin to replace the largely anonymous "no one knows you're a dog" version of online identity with one in which every action is tied to who users really are.
facebook  identity  socialmedia 
april 2010 by rachaelsullivan
The Dawning of the Biometric Age - BusinessWeek
Say goodbye to PINs and photo IDs. Say hello to digital fingerprints and iris scans—and to new opportunities for security businesses
biometrics  identity 
march 2010 by rachaelsullivan
The Self-Googling Phenomenon
This paper investigates self–Googling through the monitoring of search engine activities of users and adds to the few quantitative studies on this topic already in existence. We explore this phenomenon by answering the following questions: To what extent is the self–Googling visible in the usage of search engines; is any significant difference measurable between queries related to self–Googling and generic search queries; to what extent do self–Googling search requests match the selected personalised Web pages? To address these questions we explore the theory of narcissism in order to help define self–Googling and present the results from a 14–month online experiment using Google search engine usage data.
google  identity  self  narcissism  search 
march 2010 by rachaelsullivan
digital nation: interviews: sherry turkle
I've been here for 20 years; I've seen the losses. There's no one who's been teaching for 25 years and doesn't think that our students aren't different now than they were then. They need to be stimulated in ways that they didn't need to be stimulated before. No, that's not good. You want them to think about hard things. You want them to think about complicated things. You don't want to be, literally, professors. I mean, if you look at changes in styles of teaching, it is driven by PowerPoint.
turkle  identity  education  powerpoint  teaching  technology  interview 
february 2010 by rachaelsullivan
The Visible Man: An FBI Target Puts His Whole Life Online
So it dawned on him: If being candid about his flights could clear his name, why not be open about everything? "I've discovered that the best way to protect your privacy is to give it away," he says, grinning as he sips his venti Black Eye. Elahi relishes upending the received wisdom about surveillance. The government monitors your movements, but it gets things wrong. You can monitor yourself much more accurately. Plus, no ambitious agent is going to score a big intelligence triumph by snooping into your movements when there's a Web page broadcasting the Big Mac you ate four minutes ago in Boise, Idaho.
identity  internet  surveillance  privacy 
october 2009 by rachaelsullivan
How to Come Out on Facebook - TIME
there's a radical empowerment that comes from declaring your identity in the public sphere.
facebook  identity  socialmedia  gender  lgbt 
june 2009 by rachaelsullivan
Why Do They Do It? Portrayals of Alcohol on Facebook and MySpace « Neuroanthropology
Facebook/MySpace allows for the creation of new or altered identity and the presentation of this identity to others. Individuals can portray themselves as social, attractive, and popular by posting pictures of themselves surrounded by friends at a party. In theory, this makes them more desirable to the other sex and ‘cooler’ to their peers.
facebook  identity  myspace  self  socialmedia  youth 
june 2009 by rachaelsullivan
Twitter Lowers The Bar For Blogging | The Blog Herald
Twitter is just the next step in the evolution towards the complete fragmentation and disintegration of attention.
blogging  identity  self  twitter 
may 2009 by rachaelsullivan
Twitter dot dash (reissue)
As the physical world takes on more of the characteristics of a simulation, we seek reality in the simulated world. At least there we can be confident that the simulation is real. At least there we can be freed from the anxiety of not knowing where the edge between real and unreal lies. At least there we find something to hold onto, even if it's nothing.
carr  identity  self  twitter 
may 2009 by rachaelsullivan
Roman Society
Primarily the census served to count the number of citizens and to assess the potential military strength and future tax revenue. Most important, the census transformed the city into a political and military community.
But the census performed a highly symbolical function. To the Romans the census made them more than a mere crowd, or barbarian rabble. It made them a populus, a people, capable of collective action.
census  identity 
may 2009 by rachaelsullivan
"Against the Machine," Lee Siegel, Internet culture, blogs | Salon Books
I see a double latte; Lee Siegel sees end time. "The old-fashioned café," as he recalls it, "provided a way to both share and abandon solitude, a fluid, intermediary experience that humans are always trying to create and perfect." And now? Thanks to our laptops, we are "socially and psychologically cut off from [our] fellow caffeine addicts," deprived of "the concrete, undeniable, immutable fact of our being in the world."
identity  postmodern  self  siegal 
may 2009 by rachaelsullivan
Biometrics is more personal than a passport photo or Pin, using traits such as fingerprints, face or eye "maps" as key identifying features.

Uses range from building access and laptop security to identity cards and passports.

However, there are concerns about the storing of biometric data and its possible misuse.
biometrics  identity  security 
april 2009 by rachaelsullivan
Identity Production in a Networked Culture: Why Youth Heart MySpace
Youth are not creating digital publics to scare parents - they are doing so because they need youth space, a place to gather and see and be seen by peers. Publics are critical to the coming-of-age narrative because they provide the framework for building cultural knowledge. Restricting youth to controlled spaces typically results in rebellion and the destruction of trust. Of course, for a parent, letting go and allowing youth to navigate risks is terrifying. Unfortunately, it's necessary for youth to mature.

What we're seeing right now is a cultural shift due to the introduction of a new medium and the emergence of greater restrictions on youth mobility and access. The long-term implications of this are unclear. Regardless of what will come, youth are doing what they've always done - repurposing new mediums in order to learn about social culture.
identity  socialnetworking  youth  boyd  myspace 
april 2009 by rachaelsullivan
Use "Avatar" rather than "Picture" consistently in code | drupal.org
I feel strongly that we should use the term "Avatar" instead of "Picture":

"Avatar" is the correct word - it exactly describes what we want to say.

We need to have an explanation next to "Picture" anyway because picture is too general for anyone to understand
avatar  identity 
april 2009 by rachaelsullivan
Harsh Words Die Hard on the Web - washingtonpost.com
"I want it to be a place where people can express themselves freely, just as if they were to go to a town square and say whatever brilliant or foolish thoughts they have," Cohen said.
... The trend has even spawned a new service, ReputationDefender, whose mission is to search for damaging content online and destroy it on behalf of clients...."I felt completely objectified... like they had stolen my character," she said.
identity  internet  privacy 
april 2009 by rachaelsullivan
Biometrics - Wikipedia, the free encyclopedia
Biometrics refers to methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. In information technology, in particular, biometrics is used as a form of identity access management and access control. It is also used to identify individuals in groups that are under surveillance.
biometrics  identity  privacy  security  surveillance 
april 2009 by rachaelsullivan
‘Fakeproof’ e-passport is cloned in minutes - Times Online
The ability to clone chips leaves travellers vulnerable to identity theft when they surrender their passports at hotels or car rental companies. Criminals in the back office could read the chips and clone them. The original passport holder’s name and date of birth could be left on the fake chip, with the picture, fingerprints and other biometric data of a criminal client added. The criminal could then travel the world using the stolen identity and the original passport holder would be none the wiser.
identity  passport  privacy  security  clone 
april 2009 by rachaelsullivan
« earlier      
per page:    204080120160

related tags

4chan  abkhazia  academia  addiction  advertising  affect  agency  algorithm  amnesia  anonymous  apple  apps  archive  assignments  attention  autoethnography  autography  avatar  biometrics  blogging  books  boyd  browsers  business  carr  census  chrome  clone  com200  communication  community  criticalcode  culture  curmudgeonlit  cybersecurity  data  database  debate  democracy  derrida  design  digitalculture  digitaltext  dystopia  education  emotion  face  facebook  facebookworldtakeover  fbresistance  feminism  fiction  foreigner  games  gaming  gender  generations  glitch  google  habermas  harassment  helmond  highered  history  hypermediation  identity  immediacy  immigration  india  information  instagram  interaction  interface  internet  internet-culture  interview  javascript  keats  letters  lgbt  literacy  loss  mcluhan  memes  memory  microsoft  myspace  narcissism  narrative  nationalism  nonhuman  NSA  ong  overload  panopticon  paper  passivity  passport  pedagogy  performativity  photography  photosharing  poetry  popculture  posthuman  postmodern  powerpoint  prison  privacy  profession  psychology  publicsphere  queer  race  reading  reputation  resistance  rheingold  rhetoric  roles  screens  search  security  self  selfie  selfpresentation  shelley  siegal  snapchat  socialmedia  socialnetworking  software  statistics  storytelling  surveillance  teaching  technodeterminism  technology  tools  tor  to_read  tracking  transgender  turkle  twitter  unarchive  users  video  virtualcommunity  virtuality  virtualworlds  visualization  webtext  Weizenbaum  wesch  women  writing  writingspaces  youth  youtube 

Copy this bookmark: