So who am I really? Personal identity in the age of the Internet

AI and Society 28 (1):15-20 (2013)
  Copy   BIBTEX

Abstract

The Internet has become a field of dragon teeth for a person’s identity. It has made it possible for your identity to be mistaken by a credit agency, spied on by the government, foolishly exposed by yourself, pilloried by an enemy, pounded by a bully, or stolen by a criminal. These harms to one’s integrity could be inflicted in the past, but information technology has multiplied and aggravated such injuries. They have not gone unnoticed and are widely bemoaned and discussed. The government and private watchdogs are working to protect the identity of citizens though at least in the United States both the government and individuals all too often side with prosperity when it conflicts with privacy. Still, these information-technological threats to identity have been recognized and can be reasonably met through legislation, regulation, and discretion. There is another kind of danger to our identity that is more difficult to define and to meet, for it has no familiar predecessors, has no criminal aspects, and exhibits no sharp moral or cultural contours. Still that threat to our identity haunts us constantly and surfaces occasionally in conversations and the media. It makes us feel displaced, distracted, and fragmented at the very times when to all appearances we seem to be connected, busy, and energetic. At the same time, the culture of technology, and of information technology particularly, has opened up fields of diversity and contingency that invite us to comprehend our identities in newly responsible, intricate, and open-minded ways.

Links

PhilArchive



    Upload a copy of this work     Papers currently archived: 92,758

External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

Practical versus moral identities in identity management.Noëmi Manders-Huits - 2010 - Ethics and Information Technology 12 (1):43-55.
A persistent data tracking mechanism for user-centric identity governance.Hidehito Gomi - 2010 - Identity in the Information Society 3 (3):639-656.
Personal Identity Online.Raffaele Rodogno - 2012 - Philosophy and Technology 25 (3):309-328.
Identity and Information Technology.Steve Matthews - 2008 - In Jeroen den Hoven John Weckervant (ed.), Moral Philosophy and Information Technology. Cambridge University Press. pp. 142.
Public sector engagement with online identity management.D. Barnard-Wills & D. Ashenden - 2010 - Identity in the Information Society 3 (3):657-674.
Memory and identity.Marya Schechtman - 2011 - Philosophical Studies 153 (1):65-79.
Identity, Structure and Logic.Jean-Yves Beziau - 1996 - Bulletin of the Section of Logic 25:89-9.
Personal identity.R. G. Swinburne - 1974 - Proceedings of the Aristotelian Society 74:231 - 247.

Analytics

Added to PP
2012-02-10

Downloads
218 (#94,725)

6 months
10 (#304,547)

Historical graph of downloads
How can I increase my downloads?

References found in this work

No references found.

Add more references