Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
Who and how am I online?<br />Personal identity management for professional development<br />19 May2011<br />
Who and how am I online?<br />From here to Facebook<br />19 May2011<br />
Who and how am I online?<br />From Facebook to Eternity<br />19 May2011<br />
Who and how am I online?<br />You are what you like<br />19 May2011<br />
Aim<br />Identify tools (mediational means) developed by the JISC Institutional Innovation Programme that have the capacit...
Objectives<br />Articulate y/our own understanding of the nature of human identity and how this is worked out in online/di...
Why? Symptomatic moments<br />Impacting on identity:<br />Digital Rights Management: Ian Kearns (2002), Code Red: iTunes, ...
DRM Code Red<br />Technology to manage rights precedes the social, legislative or philosophical establishment and/or prote...
Software sorting<br />… central role of computerized code in shaping the social and geographical politics of inequality in...
Amazon algorithms<br />People like you<br />"Algorithms are what make our site run, (and) such a unique place to shop. It'...
Neuromarketing<br />The EmSenseneuromarketing database, now the world’s largest, recently exceeded the 50,000 respondent m...
Facebook? Google?<br />… don’t even go there<br />
Wendy Hall warns…<br />Corporations, through loyalty cards and other sources of information already hold your portfolio.<b...
Applications in<br />Immigration and nationality<br />Education<br />Employment<br />Social order and control<br />Resilie...
Via Helen Keegan<br />
Identity as a topic<br />Social psychological<br />“Weak”<br />“Strong”<br />Economic actor<br />Habitus<br />
Weak identity constructs<br />Authentication, access, permissions<br />Permissions tied to a token<br />Log-in, access to ...
Strong identity constructs <br />Gender, age, nationality, social class, embodiment, sexuality, trade, profession, taste, ...
Economic actor<br />The problem of “identity theft”<br />Or misassignment<br />Can this apply to other agencies?<br />Poli...
Habitus<br />Concept associated with and developed by Bourdieu<br />Also largely responsible for social capital theory<br ...
Identity Projects<br />Identity projects are social and contextual: there is a formal relationship between identity and un...
Via Helen Keegan<br />
Hybridity<br />Identity components<br />Reconfigurable<br />Multiple identities<br />MPD?<br />Examples<br />Anglo-Welsh, ...
It is not just about logging in<br />I am a person with an institutional identity<br />I have an ATHENS/Shibboleth identit...
Conflated meanings at the institutional (and demonic) level<br />Weak and strong identity clash in institutions and policy...
Via Patsy Clarke<br />
Social/particpatory media<br />User-generated content<br />Profiles, semi-persistent public commentary on the profile, and...
Discussion<br />What on-line tools (mediational means) do you use in your personal professional development practice?<br /...
Discussion<br />What tools (mediational means) developed by the JISC Institutional Innovation Programme have the capacity ...
Feedback<br />
References<br />Kearns, Ian. 2002. Code Red: Progressive politics in the digital age. London: IPPR.<br />Graham, Steve. 20...
Personal identity Management
Upcoming SlideShare
Loading in …5
×

Personal identity Management

2,355 views

Published on

Published in: Education
  • Be the first to comment

  • Be the first to like this

Personal identity Management

  1. 1. Who and how am I online?<br />Personal identity management for professional development<br />19 May2011<br />
  2. 2. Who and how am I online?<br />From here to Facebook<br />19 May2011<br />
  3. 3. Who and how am I online?<br />From Facebook to Eternity<br />19 May2011<br />
  4. 4. Who and how am I online?<br />You are what you like<br />19 May2011<br />
  5. 5. Aim<br />Identify tools (mediational means) developed by the JISC Institutional Innovation Programme that have the capacity to be deployed in personal identity projects.<br />
  6. 6. Objectives<br />Articulate y/our own understanding of the nature of human identity and how this is worked out in online/digital environments<br />Explain y/our own online professional development practices in terms of identity projects<br />Explain steps that might be taken to better manage our online identity practice<br />Build on the concept of multiple hybrid identities in order to more effectively represent our self to different audiences in different spheres<br />
  7. 7. Why? Symptomatic moments<br />Impacting on identity:<br />Digital Rights Management: Ian Kearns (2002), Code Red: iTunes, Spotify<br />Software sorting: society (Graham 2005)<br />Algorithms: People like you…: Amazon market information<br />Neuromarketing: EmSense, the leader in quantitative neurometrics, …have made direct brain activity measurement easier and scalable<br />Associative, personalised links, …, are largely missing from both the theory and the practice of [the] Web Wendy Hall, Alt-C (2002)<br />
  8. 8. DRM Code Red<br />Technology to manage rights precedes the social, legislative or philosophical establishment and/or protection of those rights.<br />Asserted rights (privilege) are given shape in DRM technologies in advance of legislation and then either quietly grandfathered in or subsequently enacted.<br />In the case of DRM these rights are in respect to copyright material.<br />Embraces everything from Pirate Bay through Pirates of the Caribbean to academic publishing.<br />(Kearns 2002)<br />
  9. 9. Software sorting<br />… central role of computerized code in shaping the social and geographical politics of inequality in advanced societies. (Graham 2005)<br />In respect to market participation, the invisible hand gets a little help<br />[W]hen you interact with a service online or by phone there may be software in action that mediates how you experience the service: by sorting you.  Live in a high income postcode? Get routed to a sales person more quickly than if your IP address makes you look as if you come from a less promising area.  On record as an awkward customer or "time-waster"? Then wait in the queue. <br />(Schmoller 2007)<br />
  10. 10. Amazon algorithms<br />People like you<br />"Algorithms are what make our site run, (and) such a unique place to shop. It's through algorithms that we're able to do things like make recommendations and tell you what customers who bought this item also bought," said Amazon spokeswoman Patty Smith.Read more: http://news.cnet.com/2100-1017-965068.html#ixzz1MlptErEd<br />
  11. 11. Neuromarketing<br />The EmSenseneuromarketing database, now the world’s largest, recently exceeded the 50,000 respondent milestone.  These respondents draw from over 10 countries, including India and China.  EmSense also collected eye-tracking data from 12,000 respondents, while 3,000 more were studied in actual retail environments as they completed typical shopping journeys.<br />“The key advantage of a large database is that it provides rich norms, the element market researchers most desire. [my emphasis] [link]<br />
  12. 12. Facebook? Google?<br />… don’t even go there<br />
  13. 13. Wendy Hall warns…<br />Corporations, through loyalty cards and other sources of information already hold your portfolio.<br />Suggests that new web technologies can help us individuals to manage our digital identity.<br />But, can they?<br />
  14. 14. Applications in<br />Immigration and nationality<br />Education<br />Employment<br />Social order and control<br />Resilience<br />Health<br />Defence, war and security<br />
  15. 15. Via Helen Keegan<br />
  16. 16. Identity as a topic<br />Social psychological<br />“Weak”<br />“Strong”<br />Economic actor<br />Habitus<br />
  17. 17. Weak identity constructs<br />Authentication, access, permissions<br />Permissions tied to a token<br />Log-in, access to computer systems, credit cards<br />Permissions tied to a (token tied to a) body<br />Passport, Drivers Licence<br />To what extent is the token “tied” to the body?<br />
  18. 18. Strong identity constructs <br />Gender, age, nationality, social class, embodiment, sexuality, trade, profession, taste, domestic circumstances, parentage, offspring<br />To what extent are these individual “essentials” and to what extent are these social “ideals”<br />
  19. 19. Economic actor<br />The problem of “identity theft”<br />Or misassignment<br />Can this apply to other agencies?<br />Political actors? (Cyber war)<br />Domestic actors? (Cyber crimes and misdemeanours)<br />What it it about “us” that might be compromised?<br />
  20. 20. Habitus<br />Concept associated with and developed by Bourdieu<br />Also largely responsible for social capital theory<br />The human phenotype expressing genetic and cultural inheritance in social context(s)<br />Digital habitus<br />
  21. 21. Identity Projects<br />Identity projects are social and contextual: there is a formal relationship between identity and unity.<br />Identity projects do not just take place in the individual. National identity projects are entered into regularly in response to immigration, social order and other cultural entitlements. <br />Identity projects may “... involve efforts to acquire the attributes of an existing social identity...” Such an identity may be “real or mythical”. Or, conversely “There might very well be cases where an individual’s problem is to retain a given social identity against various destructive influences.” (Harre 1983)<br />Digital Identity Projects<br />
  22. 22. Via Helen Keegan<br />
  23. 23. Hybridity<br />Identity components<br />Reconfigurable<br />Multiple identities<br />MPD?<br />Examples<br />Anglo-Welsh, and any other hyphenated descriptor<br />Learner-Teacher<br />Benevolent-Oppressor (colonial/parental)<br />Identity politics<br />
  24. 24. It is not just about logging in<br />I am a person with an institutional identity<br />I have an ATHENS/Shibboleth identity<br />I have access to propositional knowledge<br />I can grant/subvert access controls<br />I belong!<br />I can have this “belonging” taken away<br />
  25. 25. Conflated meanings at the institutional (and demonic) level<br />Weak and strong identity clash in institutions and policy<br />Public discourses on:<br />National identity<br />Immigration<br />Participation and progression<br />Plagiarism<br />
  26. 26. Via Patsy Clarke<br />
  27. 27. Social/particpatory media<br />User-generated content<br />Profiles, semi-persistent public commentary on the profile, and a traversable publicly articulated social network displayed in relation to the profile (danahboyd)<br /><ul><li>“… a literacy of participation” (Mike Wesch)</li></li></ul><li>Discussion<br />What do you do online? <br />work, learn, shop, civic engagement, play, etc<br />What applications and/or websites do you use<br />Do you use multiple sites for any category of activity?<br />What of your online activity can be said to have an overt element of identity projection<br />Of those sites you use that do NOT have an overt element of identity projection, nevertheless, what might they “say about you”?<br />
  28. 28. Discussion<br />What on-line tools (mediational means) do you use in your personal professional development practice?<br />Why these?<br />What on-line tools (mediational means) do you use in the personal professional development practice, which you develop with others?<br />What are the barriers to adoption?<br />
  29. 29. Discussion<br />What tools (mediational means) developed by the JISC Institutional Innovation Programme have the capacity to be deployed in personal identity projects?<br />Why these?<br />Domains<br />Learning design<br />Mentoring<br />Assessment<br />Employment<br />Portfolios<br />
  30. 30. Feedback<br />
  31. 31. References<br />Kearns, Ian. 2002. Code Red: Progressive politics in the digital age. London: IPPR.<br />Graham, Steve. 2005. “Software-sorted geographies.” Progress in Human Geography 29 (5): 562-580. http://www.dur.ac.uk/geography/research/research_projects/?mode=pdetail&pdetail=39455<br />Schmoller, Seb. The software-sorted society. Fortnightly Mailing. http://fm.schmoller.net/2007/01/the_softwaresor.html .<br />

×