Portal:Digital Identity: Difference between revisions
No edit summary |
No edit summary |
||
(10 intermediate revisions by the same user not shown) | |||
Line 1: | Line 1: | ||
__NOTOC__ | __NOTOC__ | ||
<div style="background-color:#CCFFCC;border:solid 1px black;padding:8px 8px;margin-bottom: 20px"> | <div style="background-color:#CCFFCC;border:solid 1px black;padding:8px 8px;margin-bottom: 20px"> | ||
=What is Digital Identity? = | == What is Digital Identity? == | ||
{{:What is Digital Identity?}} | {{:What is Digital Identity?}} | ||
</div> | </div> | ||
Line 10: | Line 10: | ||
<div style="background-color:#FFFFFF;border:solid 1px black;padding:8px 8px;margin-bottom: 20px"> | <div style="background-color:#FFFFFF;border:solid 1px black;padding:8px 8px;margin-bottom: 20px"> | ||
=Technological Architectures= | == Technological Architectures == | ||
{{:Technological Architectures}} | {{:Technological Architectures}} | ||
<p align=right>[[Technological Architectures| '''Read More...''']]</p> | <p align=right>[[Technological Architectures| '''Read More...''']]</p> | ||
Line 16: | Line 16: | ||
<div style="background-color:#FFFFFF;border:solid 1px black;padding:8px 8px;margin-bottom: 20px"> | <div style="background-color:#FFFFFF;border:solid 1px black;padding:8px 8px;margin-bottom: 20px"> | ||
=Records of Identity = | == Records of Identity == | ||
{{:Records of Identity}} | {{:Records of Identity}} | ||
<p align=right>[[Records of Identity| '''Read More...''']]</p> | <p align=right>[[Records of Identity| '''Read More...''']]</p> | ||
Line 22: | Line 22: | ||
<div style="background-color:#FFFFFF;border:solid 1px black;padding:8px 8px;margin-bottom: 20px"> | <div style="background-color:#FFFFFF;border:solid 1px black;padding:8px 8px;margin-bottom: 20px"> | ||
=Sharing Secrets on the World Wide Web= | == Sharing Secrets on the World Wide Web == | ||
{{:Sharing Secrets on the World Wide Web}} | {{:Sharing Secrets on the World Wide Web}} | ||
<p align=right>[[Sharing Secrets on the World Wide Web| '''Read More...''']]</p> | <p align=right>[[Sharing Secrets on the World Wide Web| '''Read More...''']]</p> | ||
Line 28: | Line 28: | ||
<div style="background-color:#FFFFFF;border:solid 1px black;padding:8px 8px;margin-bottom: 20px"> | <div style="background-color:#FFFFFF;border:solid 1px black;padding:8px 8px;margin-bottom: 20px"> | ||
=Blogging: Finding Identity and the Courage to Share= | == Blogging: Finding Identity and the Courage to Share == | ||
{{:Blogging: Finding Identity and the Courage to Share}} | {{:Blogging: Finding Identity and the Courage to Share}} | ||
<p align=right>[[Blogging: Finding Identity and the Courage to Share| '''Read More...''']]</p> | <p align=right>[[Blogging: Finding Identity and the Courage to Share| '''Read More...''']]</p> | ||
Line 43: | Line 43: | ||
<div style="background-color:#FFFFFF;border:solid 1px black;padding:8px 8px;margin-bottom: 20px"> | <div style="background-color:#FFFFFF;border:solid 1px black;padding:8px 8px;margin-bottom: 20px"> | ||
=Narratives= | == Narratives == | ||
{{:Narratives - Digital Identity}} | {{:Narratives - Digital Identity}} | ||
<p align="right"> [[Narratives - Digital Identity| '''Read More...''']]</p> | <p align="right"> [[Narratives - Digital Identity| '''Read More...''']]</p> | ||
Line 49: | Line 49: | ||
<div style="background-color:#FFFFFF;border:solid 1px black;padding:8px 8px;margin-bottom: 20px"> | <div style="background-color:#FFFFFF;border:solid 1px black;padding:8px 8px;margin-bottom: 20px"> | ||
=Problems | == Problems == | ||
{{:Problems | {{:Problems of Digital Identity}} | ||
<p align=right>[[Problems | <p align=right>[[Problems of Digital Identity| '''Read More...''']]</p> | ||
</div> | </div> | ||
<div style="background-color:#FFFFFF;border:solid 1px black;padding:8px 8px;margin-bottom: 20px"> | <div style="background-color:#FFFFFF;border:solid 1px black;padding:8px 8px;margin-bottom: 20px"> | ||
=Relevant Research and Articles= | == Solutions == | ||
{{:Solutions for Digital Identity}} | |||
<p align=right>[[Solutions for Digital Identity| '''Read More...''']]</p> | |||
</div> | |||
<div style="background-color:#FFFFFF;border:solid 1px black;padding:8px 8px;margin-bottom: 20px"> | |||
== Relevant Research and Articles== | |||
{{:Relevant Research and Articles - Digital Identity}} | {{:Relevant Research and Articles - Digital Identity}} | ||
<p align=right>[[Relevant Research and Articles - Digital Identity| '''Read More...''']]</p> | <p align=right>[[Relevant Research and Articles - Digital Identity| '''Read More...''']]</p> |
Latest revision as of 10:58, 25 November 2007
What is Digital Identity?
Digital media affords individuals with new ways of expressing, exploring, and asserting their identity. For natives, who are immersed and fluent in these technologies, while finding themselves in a key stage of identity development, these new identity-forming activities present exciting possibilities. However, it is important to take a hard look at these activities, and how they are changing the ways people express and understand both themselves and others within the larger social context. There exist important issues for discussion in looking at how Digital Natives make use of emerging digital media tools available to them as they form identities both on and off line.
Technological ArchitecturesThe spaces in which individuals connect on the Internet, as well as through other technologies such as mobile phones and networked gaming consuls, each have their own particular architectures. They are built with specific allowances and capabilities, in attempt to dictate the forms and types of interactions that take place within those spaces. Like any space, these configurations can be re-interpreted and re-inscribed by creative users (who almost always find ways to bend - or break - the rules), but nevertheless, a particular mode of communication and connection evolves for each new technology that catches our attention, and enables connection. Records of IdentityIn the age of digital media, identity assertions are no longer purely transient, exploratory exercises. For the most part, digital expressions of identity are here to stay, as at least somewhat permanent markers that remain visible for both creators, and others, to see. Even the deleted blog, or photo posted on the social network, may be saved in cache, or downloaded on some hard drive out there. Sharing Secrets on the World Wide WebDigital Natives are at home on the Internet. Whether âhanging outâ on MySpace (see Danah Boyd's "Identity Production in a Networked Culture: Why Youth Heart MySpace" (2006)), organizing and discussing events on Facebook, commenting on each othersâ photos on Facebook, watching acquaintances football games, video diaries, or dance routines on YouTube, or spilling their heart out on countless blog services, Natives are expressing, sharing, talking â and shaping, presenting and developing personal identities â in all types of spaces online. How aware are Digital Natives that these spaces they often view as 'safe' are actually very public spaces? How aware are they of the potential consequences? Teens use communication channels on the internet to broaden their circle of friends to include both real and virtual friends. In creating blogs, they share in writing thoughts about themselves, as well as comments about others, and the world around them. Beyond strictly blogging, the page design and links they include are also indirect expressions of the self (Papacharissi 2002). This points to a digital opportunity - beyond the technical/ design skills being learned, teens are learning to express abstract ideas (in this case the self) through visual appearance, design, and affiliations. Asserting Identity with the Mobile MediaThe Digital Native is constantly connected. To be constantly connected is to have continual access to your friends, to your chosen information, to your creative outletâ¦it also means that âdigital information explosionâ (the ever-faster growing amount of published information available) and 'Digital Information Overload' (defined on wikipedia as âthe state of having too much information to make a decision or remained informed about a topic,â] is always in your face. The information explosion surrounds, shoving the native simultaneously in different directions, making it hard to stand ground as âyourselfâ â especially when at times itâs impossible to even hear yourself think. |
NarrativesOMG,â Elizabeth thumbs into her cell phoneâs miniature keyboard. âHeâs soooo cute.â Send. Perched in a windowsill high above the city, Elizabeth coos over her new nephew. âWhat a peanut!â Elizabethâs sister smiles from the hospital bed. Andyâs not even a day old, still wrapped tightly in the wardâs white-and-blue swaddling blanket, his tiny facing peeking out from his motherâs arms. Elizabeth points the cell at Andy and peers through the viewfinder. The baby screws up his already crinkled face. She clicks a photo with the built-in camera, which makes the sound of an old-fashioned camera shutter, for no good reason. Send. âMust already be the most photographed baby of all time,â her sister laughs. âYou should have seen mom. Youâd think sheâs never seen a baby before. Her poor friends. Theyâve probably all exceeded the quota on their AOL inboxes from all her endless e-mails. Sheâs never learned how to avoid sending pictures as enormo attachments.â Elizabeth takes Andyâs tiny hand. She runs her finger over the plastic bracelet he wears. âCohen, Baby Boy,â it reads, along with a bunch of other data that a nurse entered into a computer kiosk somewhere. Time of birth, momâs name, a unique identifier, and so forth. Problems
Consider, in the case of the Mp3 player, the comment of Keisha, a twenty-year-old college student: I use [my Mp3 player] everyday. I have the remote for it, so I lie in bed, and press play, and it comes on in the morning. And then when I walk to school, I use it to walk to school, and then, walking home, and I also have it on as background when Iâm cleaning or something⦠I fall asleep listening to it through my speakersâ¦I donât like silenceâ¦I like to have something going on constantly, I think I might just sit there and think, and if I think too much, ahh, I donât like it, I just like to get on with things. SolutionsRelevant Research and ArticlesSusan P. Crawford, "Who's in Charge of Who I Am? Identity and Law Online," December 8, 2004 Posting Your Resume on YouTube, The Wall Street Journal, December 6, 2006 Danah Boyd, 'Facebook's "Privacy Trainwreck": Exposure, Invasion, and Drama,' September 8, 2006 Chinese Web Site Rips Off Facebook, Harvard Crimson, February 15, 2007 Google and Your Health Information, eWeek.com, May 29, 2007 Identity and the virtual community (Donath) "Staying Connected via Cellphone (and Cellphone Bill)", 'NY Times', June 27, 2007 |