Summary
The objective of this chapter is not to bring the answer to the ultimate question ‘what is identity?’, — an almost impossible undertaking given the complexity and the constant evolution of the subject — but rather to present, more like on a journey, different angles that can be used to define this concept, in particular in the context of the Information Society. Starting first at describing how this conceptualisation can be conducted in the traditional way of theori-sation well known by the academics, this chapter then indicates how less formal approaches such as narratives can be used to help to understand the concept. It also introduces how the new ‘social tools’ originating from the Web 2.0 can be used to stir the intelligence of experts from different horizons so as to generated a meaningful and practical understanding of the subject. The second part of the chapter is used to illustrate how each of these approaches have been operationalised by presenting a series of models and scenarios presenting different perspectives and issues that are relevant to the subject, and a collaborative Web 2.0 knowledge infrastructure that was used in FIDIS to facilitate the conceptualisation of identity by a group of experts.
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
AAAI (2004), ‘Brief History of Artificial Intelligence’, AAAI AI Topics dynamic library of introductory information about Artificial Intelligence, url: http://www.aaai.org/AITopics/ bbhist.html
Agre, P. E. and Rotenberg, M. (ed.) (1998), Technology and Privacy: The New Landscape. Cambridge Massachussets: MIT Press.
ALRC (2008), For Your Information: Australian Privacy Law and Practice. ALRC (Australian Law Reform Commission) report 108, Canberra : Law Reform Commission.
Andrade, J., Ares, J., García, R., Pazos, J., Rodríguez, S., Silva, A. (2008), ‘Formal conceptualisation as a basis for a more procedural knowledge management’, Decision. Support System. 45 (1), pp. 164–179.
Ariely, D. (2008), Predictably Irrational: The Hidden Forces That Shape Our Decisions. HarperCollins.
Berners-Lee, T., Hendler, J., Lassila, O. (2001), ‘The Semantic Web’, Scientific American 284 (5), pp. 34–43.
Bjelland, T. K, (2004), ‘Classification: assumptions and implications for conceptual modeling’, doctoral dissertation, Department of Information Science and Media Studies, Faculty of Social Science, University of Bergen.
Boyd, D. and Ellison, N. (2007), ‘Social Network Sites: Definition, History, and Scholarship’, Journal of Computer-Mediated Communication 13 (1), article 11.
Brusilovsky, P. (2001), ‘Adaptive Hypermedia’, User Modeling and User-Adapted Interaction 11 (1–2), pp. 87–110.
Brzozowski, M., Hogg, T., Szabo, G. (2008), ‘Friends and foes: Ideological social networking’, Proceedings of the 26th annual SIGCHI Conference on Human Factors in Computing, ACM Press, pp. 817–820.
Chesney, T. (2006), ‘An empirical examination of Wikipedia's credibility’, First Monday 11 (11), url: http://firstmonday.org/issues/issue11_11/chesney/index.html.
Chi, E. H. and Mytkowicz, T. (2008), ‘Understanding the efficiency of social tagging systems using information theory’, Proceedings of the 19th ACM Conference on Hypertext and Hypermedia; NY: ACM, pp. 81–88, url: http://www.parc.com/research/publications/details.php?id=6294
Cialdini, R. B. (2001), Influence: Science and practice (4th ed.). Boston: Allyn & Bacon.
Claessens, J., Díaz, C., Nikova, S., De Win, B., Goemans, C., Loncke, M., Naessens, V., Seys, S., De Decker, B., Dumortier, J., Preneel, B. (2003), ‘Applications Requirements for Controlled Anonymity’, APES Deliverable D7.
Clark, H. H. and Brennan, S. E. (1991), ‘Grounding in communication’, in: Resnick, L. B., Levine, J., Behreno, S. D. (Eds.), Socially shared cognition.
Clauß, S. and Köhntopp, M. (2001), ‘Identity Managements and Its Support of Multilateral Security’, Computer Networks 37 (2), Special Issue on Electronic Business Systems, pp. 205–219.
Clynes, M. E. and Kline, N. S. (1960), ‘Cyborgs and Space’, Astronautics 14 (9), pp. 26–27 and 74–76.
Cunningham, W. and Leuf, B. (2001), The Wiki Way. Quick Collaboration on the Web, Addison-Wesley.
Davis, M. (2008), ‘Semantic Wave 2008: Industry Roadmap to Web 3.0 and Multibillion Dollar Market Opportunities — Executive Summary’, Project10X report January 2008. url: http://www.project10x.com/.
Denning, S. (2001), ‘The Springboard: How Storytelling Ignites Action in Knowledge-era Organizations’, Journal of Organizational Change Management 14 (6), pp. 609–614.
Diogene (2002), ‘Survey on Methods and Standards for Student Modelling’, Diogene project, url: http://www.diogene.org/archive.html.
Durand, A. (2002), ‘Three Tiers of Identity’, Digital Identity World, March 16, 2002.
Dutton, J., Dukerich, J., Harquail, C. (1994), ‘Organizational Images and Member Identification’, Administrative Science Quarterly, 39 (2), pp 239–263.
Epstein, R. (2007), ‘The Truth About Online Dating’, Scientific American Mind, February / March 2007, pp. 32–39.
Nabeth, T. (ed.) (2005b), FIDIS Deliverable D2.3: Models, Download: http://www.fidis.net/ resources/deliverables/.
Fink, J. and Kobsa, A., (2000), ‘A Review and Analysis of Commercial User Modeling Servers for Personalization on the World Wide Web’, User Modeling and User Adapted Interaction, 10 (2–3), pp. 209–249.
Fischer, G. (2001), ‘User Modeling in Human-Computer Interaction’, User Modeling and User Adaptive Interaction 11 (1–2), pp. 65–86.
Gill, K. E. (2005), ‘Blogging, RSS and the Information Landscape: A Look at Online News’, In Proceedings of the 14th international WWW conference: 2nd annual workshop on weblogging ecosystem: aggregation, analysis and dynamics, 10 May 2005, Chiba, Japan.
Golder, S. and Huberman, B. A. (2006), ‘Usage Patterns of Collaborative Tagging Systems’, Journal of Information Science 32 (2), pp. 198–208.
Granovetter, M. (1973), ‘The Strength of Weak Ties’, American Journal of Sociology 78 (6), pp. 1360–80.
Gruber, T. (2008), ‘Ontology’, in: Liu, L. and Özsu, M. T. (eds.), The Encyclopedia of Database Systems. Springer-Verlag.
Halpin, H., Robu, V., Shepherd, H. (2006), ‘The Dynamics and Semantics of Collaborative Tagging’, Proceedings of the 16th international conference on World Wide Web, pp.211 – 220.
Hammond, J. S. (1976), Learning by the case method. HBS Publishing Division, Harvard Business School, Boston, MA, Case ♯376–241.
Hammond, T., Hannay, T., Lund, B., Scott, J. (2005), ‘Social Bookmarking Tools’, D-Lib Magazine 11 (4), url: http://dlib.org/dlib/april05/hammond/04hammond.html.
Hansen, M. and Pfitzmann, A. (2008), ‘Anonymity, Unobservability, Pseudonymity, and Identity Management — A Proposal for Terminology’, Working document, url: http://dud. inf.tu-dresden.de/Anon_Terminology.shtml.
Hildebrandt, M. (2006), ‘Privacy and Identity’, in: Duff, A., Claes, E., Gutwirth, S. (eds.), Privacy and the criminal law, Antwerp/Oxford, Intersentia, pp. 43–57.
Holten, R. (2007), ‘Deriving an IS-Theory from an Epistemological Position’, Proceedings of the 18th Australasian Conference on Information Systems (ACIS 2007), Toowoomba, Australia.
ICPP (2003), ‘Independent Centre for Privacy Protection (ICPP) Schleswig-Holstein and Studio Notarile Genghini (SNG)’, Identity Management Systems (IMS): Identification and Comparison, study prepared under contract for Institute for Prospective Technological Studies, Joint Research Centre Seville, Spain, Sept. 2003, url: http://www.daten-schutzzentrum.de/idmanage/study/ICPP_SNG_IMS-Study.pdf.
ISO (1999), ISO IS 15408, 1999, url: http://www.commoncriteria.org/.
Jaquet-Chiffelle, D.-O., Benoist, E., Anrig, B. (eds.) (2006), FIDIS Deliverable 2.6: Identity in a Networked World — Use Cases and Scenarios, Download: http://www.fidis.net/ resources/networked-world/.
Kahney, L. (2004), ‘Social Nets Not Making Friends’, Wired magazine, January. 28, 2004, url: http://www.wired.com/culture/lifestyle/news/2004/01/62070.
Kay, J. (2000), ‘User modeling for adaptation’, in Constantine, S. (ed.), User Interfaces for All, Human Factors Series, Lawrence Erlbaum Associates, pp. 271–294.
Klamma, R., Y., Cao, M., Spaniol (2007), ‘Watching the Blogosphere: Knowledge Sharing in the Web 2.0’, Proceedings of the International Conference on Weblogs and Social Media, Boulder, Colorado, USA, pp. 105–112.
Kobsa, A., Koenemann, J., Pohl, W. (2000), ‘Personalized hypermedia presentation techniques for improving online customer relationships’, The Knowledge Engineering Review 16 (2), pp. 111–155.
Kogut, B. (2008), Knowledge, Options, and Institutions. Oxford University Press.
Korotov, K. (2004), ‘“Neither Here nor There” or “Both Here and There”: Experiencing Liminality and Playing with Identity’, Academy of Management Conference, New Or leans, August 6–11, 2004.
Lelic, S. (2002), ‘Fuel Your Imagination. KM and the Art of Storytelling’, Knowledge Management 5 (4).
Lessig, L. (1999), Code and Other Laws of Cyberspace. New York: Basic Books.
Lih, A. (2004), ‘Wikipedia as Participatory Journalism: Reliable Sources? Metrics for evaluating collaborative media as a news alternative’, 5th International Symposium on Online Journalism at the University of Texas at Austin.
Marlow, C., Naaman, M., Boyd, D., Davis, M. (2006), ‘Position Paper, Tagging, Taxonomy, Flickr, Article, ToRead’, Proceedings of Hypertext 2006, New York: ACM Press.
McAfee, A. P. (2006), ‘Enterprise 2.0: The Dawn of Emergent Collaboration’, Sloan Management Review 47 (3), pp. 21–28.
Millen, D., Feinberg, J., Kerr, B. (2005), ‘Social Bookmarking in the Enterprise’, ACM Queue 3 (9), pp. 28–35.
Mathes, A. (2004), ‘Folksonomies — Cooperative Classification and Communication Through Shared Metadata’, Graduate School of Library and Information Science, url: http://www. adammathes.com/academic/computer-mediated-communication/folksonomies.html.
McLellan, H. (2002), ‘Introduction to Corporate Storytelling’, url: http://tech-head.com/ cstory1.htm.
Mennecke, B.E., McNeill, D., Ganis, M., Roche, E., Konsynski, B., Bray, D., Lester, Townsend, A.M. (2008), ‘Second Life and other Virtual Worlds: A Roadmap for Research’, Communications of the Association for Information Systems 22 (article 20), pp. 371–388.
Modini (2005), ‘Modinis Study on Identity Management’, in eGovernment, Common Terminological Framework for Interoperable Electronic Identity Management — Consultation Paper, v2.01, 23 November 2005, url: https://www.cosic.esat.kuleuven.be/modinis- idm/twiki/bin/view.cgi/Main/GlossaryDoc.
Naaman, M. (2006), ‘Why Do Tagging Systems Work?’, Conference on Human Factors in Computing Systems (CHI 2006), Panel session, pp. 36–39.
Nabeth, T., Angehrn, A. A., Balakrishnan, R. (2004), ‘Integrating “Context” in e-Learning Systems Design’, Proceedings of IEEE International Conference on Advanced Learning Technologies (ICALT 2004), pp. 355–359.
Nabeth, T. (ed.) (2005), FIDIS Deliverable D2.3: Models, Download: http://www.fidis.net/ resources/deliverables/.
Nabeth, T. and Hildebrandt, M. (eds.) (2005), FIDIS Deliverable D2.1: Inventory of Topics and Clusters, Download: http://www.fidis.net/resources/deliverables/.
Nabeth, T., Karlsson, H., Angehrn, A. A., Maisonneuve, N. (2008), ‘A Social Network Platform for Vocational Learning in the ITM Worldwide Network’, Proceedings of IST Africa 2008.
Nardi, B. A., Schiano D. J., Gumbrecht, M. Swartz, L. (2004), ‘Why We Blog’, Communications of the ACM 47 (12), pp. 41–46.
Nisbett, R. (2003), The Geography of Thought: How Asians and Westerners Think Differently...and Why. Reed Business Information, Inc.
Nonaka, I. and Takeuchi, H. (1995), The Knowledge-Creating Company. New York: Oxford University Press.
O'Reilly, T. (2005), ‘What Is Web 2.0 Design Patterns and Business Models for the Next Generation of Software’, 30 September 2005, url: http://www.oreillynet.com/pub/a/ oreilly/tim/news/2005/09/30/what-is-web-20.html.
Perez, S. (2008), ‘Real People Don't Have Time for Social Media’, ReadWriteWeb, April 16, 2008, url: http://www.readwriteweb.com/archives/real_people_dont_have_time_for_social_media.php.
Pratt, M. G. (1998), ‘To Be Or Not To Be: Central Questions in Organizational Identification’, in: David A. W., Paul G. (eds.), Identity in Organizations, Thousand Oaks: Sage, pp. 171–207.
Rafaeli, S. and Ariel, Y. (2008), ‘Online motivational factors: Incentives for participation and contribution in Wikipedia’, in: Azy, B. (ed.), Psychological aspects of cyberspace: Theory, research, applications, Cambridge, UK: Cambridge University Press, pp. 243– 267, url: http://gsb.haifa.ac.il/~sheizaf/cyberpsych/11-RafaeliandAriel.pdf.
Razmerita, L., (2004), ‘User modeling and personalization of the Knowledge Management Systems’, Adaptable and Adaptive Hypermedia, Idea Group Publishing.
Resnick, P. and Zeckhauser, R. (2002), ‘Trust Among Strangers in Internet Transactions: Empirical Analysis of eBay's Reputation System’, The Economics of the Internet and E- Commerce, pp. 127–157.
Ricoeur, P. (1992), Oneself as another. Chicago and London: University of Chicago Press.
Rogers, E. (2003), Diffusion of Innovations (5th ed.). New York: Free Press.
Sen, S., Harper, F. M., LaPitz, A., Riedl, J. (2007), ‘The Quest for Quality Tags’, Proceedings of the 2007 international ACM conference on Supporting group work, pp. 361–370.
Snowden, D. (2001), ‘Narrative patterns: the perils and possibilities of using story in or ganisations’, Knowledge Management, 4 (10).
Snowden, D. (2002), ‘Narrative patterns: uses of story in the third age of knowledge management’, Journal of information and knowledge management, 1 (1), pp. 1–6.
Sole, D. and Wilson, D. (2002), ‘Storytelling in organizations: The power and traps of using stories to share knowledge in organizations’, Boston: LILA, Harvard Graduate School of Education, url: http://lila.pz.harvard.edu/_upload/lib/ACF14F3.pdf.
Sproule, S. and Archer, N. (2007), ‘Defining Identity Theft’, Eighth World Congress on the Management of eBusiness (WCMeB 2007), pp. 20–20.
Star, S. L. and Griesemer, J.R. (1989), ‘Institutional Ecology, “Translations” and Boundary Objects: Amateurs and Professionals in Berkeley's Museum of Vertebrate Zoology’, 1907–39; Social Studies of Science 19 (4), pp. 387–420.
Stephanidis, C. (2001), ‘Adaptive Techniques for Universal Access’, User Modeling and User-Adapted Interaction 11 (1–2), pp. 159–179.
Sveiby, K. E. and Simons, R. (2002), ‘Collaborative climate and effectiveness of knowledge work: an empirical study’, Journal of Knowledge Management 6 (5), pp. 420–433.
Thomas, J. C., Kellogg, W. A., Erickson, T. (2001), ‘The knowledge management puzzle: human and social factors in knowledge management’, IBM System Journal 40 (4), pp. 863–884.
Tumlin, M., Harris, S. R., Buchanan, H., Schmidt, K (2007), ‘Collectivism vs. individualism in a wiki world: librarians respond to Jaron Lanier's essay ‘digital Maoism: the hazards of the new online collectivism, (Johnson K., ed.)’, Serials Review 33 (1), pp. 45–53.
Wagner, C. (2006), ‘Breaking the Knowledge Acquisition Bottleneck through Conversational Knowledge Management’, Information Resources Management Journal, 19 (1), pp. 70–83.
Wilkinson, D. M. and Huberman B. A. (2007), ‘Assessing the Value of Cooperation in Wikipedia’, First Monday 12 (4), url: http://www.firstmonday.org/issues/issue12_4/ wilkinson/.
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Nabeth, T. (2009). Identity of Identity. In: Rannenberg, K., Royer, D., Deuker, A. (eds) The Future of Identity in the Information Society. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-01820-6_2
Download citation
DOI: https://doi.org/10.1007/978-3-642-01820-6_2
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-88480-4
Online ISBN: 978-3-642-01820-6
eBook Packages: Business and EconomicsBusiness and Management (R0)