Results for 'User-centric identity'

983 found
Order:
  1.  58
    A persistent data tracking mechanism for user-centric identity governance.Hidehito Gomi - 2010 - Identity in the Information Society 3 (3):639-656.
    Identity governance is an emerging concept for fine-grained conditional disclosure of identity information and enforcement of corresponding data handling policies. Although numerous technologies underlying identity management have been developed, people still have difficulty obtaining a clear picture of how their identity information is maintained, used, and propagated. An identity management framework is described for tracking the history of how a person’s identity information is handled after it is transferred across domains of control and for (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark  
  2.  12
    A client-side approach for privacy-preserving identity federation.Sébastien Canard, Eric Malville & Jacques Traoré - 2009 - Identity in the Information Society 2 (3):269-295.
    Providing Single Sign-On (SSO) between service providers and enabling service providers to share user personal attributes are critical for both users to benefit from a seamless access to their services, and service providers to realize new business opportunities. Today, however, the users have several independent, partial identities spread over different service providers. Providing SSO and attribute sharing requires that links (federations) are established between (partial) identities. In SAML 2.0 (Maler et al. 2003), the links between identities are stored and (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  3.  42
    Privacy in the clouds.Ann Cavoukian - 2008 - Identity in the Information Society 1 (1):89-108.
    Informational self-determination refers to the right or ability of individuals to exercise personal control over the collection, use and disclosure of their personal data by others. The basis of modern privacy laws and practices around the world, informational privacy has become a challenging concept to protect and promote in a world of ubiquitous and unlimited data sharing and storage among organizations. The paper advocates a “user-centric” approach to managing personal data online. However, user-centricity can be problematic when (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  4. A framework for the lived experience of identity.Adrian Rahaman & Martina Angela Sasse - 2010 - Identity in the Information Society 3 (3):605-638.
    This paper presents a framework for the design of human-centric identity management systems. Whilst many identity systems over the past few years have been labelled as _human-centred,_ we argue that the term has been appropriated by technologists to claim moral superiority of their products, and by system owners who confuse administrative convenience with benefits for users. The framework for human-centred identity presented here identifies a set of design properties that can impact the lived experience of the (...)
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  5.  69
    PETs and their users: a critical review of the potentials and limitations of the privacy as confidentiality paradigm. [REVIEW]Seda Gürses - 2010 - Identity in the Information Society 3 (3):539-563.
    “Privacy as confidentiality” has been the dominant paradigm in computer science privacy research. Privacy Enhancing Technologies (PETs) that guarantee confidentiality of personal data or anonymous communication have resulted from such research. The objective of this paper is to show that such PETs are indispensable but are short of being the privacy solutions they sometimes claim to be given current day circumstances. Using perspectives from surveillance studies we will argue that the computer scientists’ conception of privacy through data or communication confidentiality (...)
    Direct download (11 more)  
     
    Export citation  
     
    Bookmark  
  6.  10
    Power Control Algorithm Based on a Cooperative Game in User-Centric Unmanned Aerial Vehicle Group.Yuexia Zhang & Pengfei Zhang - 2021 - Complexity 2021:1-6.
    The quality of service of a user in user-centric unmanned aerial vehicle group is degraded by complex cochannel interference; hence, a cooperative game power control algorithm in UUAVG is proposed. The algorithm helps to establish a downlink power control model of the UUAVG, construct a product of the signal to interference noise ratio function of each user as a utility function of the cooperative game, and deduce the optimal power control scheme using the Lagrange function. This (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  7. An object-centric solution to Edelberg's puzzles of intentional identity.Eugene Ho - 2022 - Synthese 200 (5):364.
    My belief that Socrates was wise, and your belief that Socrates was mortal can be said to have a common focus, insofar as both these thoughts are about Socrates. In Peter Geach’s terminology, the objects of our beliefs bear the feature of intentional identity, because our beliefs share the same putative target. But what if it turned out that Socrates never existed? Can a pair of thoughts share a common focus if the object both thoughts are about, does not (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  8.  56
    Being a body or having one: automated domestic technologies and corporeality. [REVIEW]Michele Rapoport - 2013 - AI and Society 28 (2):209-218.
    New, “smart,” automated technologies for the home are playing a growing role in the construction and refurbishment of many new middle and upper class homes and assisted living facilities in the developed world, promising the improved performance of domestic tasks, as well as enhanced safety, convenience, and efficiency. Expanding the growing automatization of many activities in daily life, automated technologies in the home are interactive, ubiquitous, and often invisible. Their installation, in what is understood to be the locus of personal (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  9.  40
    Challenges to the modernist identity of psychiatry! User empowerment and recovery.Pat Bracken & Philip Thomas - 2013 - In K. W. M. Fulford, Martin Davies, Richard Gipps, George Graham, John Sadler, Giovanni Stanghellini & Tim Thornton (eds.), The Oxford handbook of philosophy and psychiatry. Oxford: Oxford University Press. pp. 123.
    This chapter argues that the modernist agenda, currently dominant in mainstream psychiatry, serves as a disempowering force for service users. By structuring the world of mental health according to a technological logic, this agenda is usually seen as promoting a liberation from "myths" about mental illness that led to stigma and oppression in the past. However, it is argued that this approach systematically separates mental distress from background contextual issues and sidelines non-technological aspects of mental health such as relationships, values, (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  10.  53
    Mobile-centric ambient intelligence in health- and homecare—anticipating ethical and legal challenges.Eleni Kosta, Olli Pitkänen, Marketta Niemelä & Eija Kaasinen - 2010 - Science and Engineering Ethics 16 (2):303-323.
    Ambient Intelligence provides the potential for vast and varied applications, bringing with it both promise and peril. The development of Ambient Intelligence applications poses a number of ethical and legal concerns. Mobile devices are increasingly evolving into tools to orientate in and interact with the environment, thus introducing a user-centric approach to Ambient Intelligence. The MINAmI (Micro-Nano integrated platform for transverse Ambient Intelligence applications) FP6 research project aims at creating core technologies for mobile device based Ambient Intelligence services. (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  11.  30
    Facebook’s emotional contagion study and the ethical problem of co-opted identity in mediated environments where users lack control.Evan Selinger & Woodrow Hartzog - 2016 - Research Ethics 12 (1):35-43.
    We argue a main but underappreciated reason why the Facebook emotional contagion experiment is ethically problematic is that it co-opted user data in a way that violated identity-based norms and exploited the vulnerability of those disclosing on social media who are unable to control how personal information is presented in this technologically mediated environment.
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  12. Protein-centric connection of biomedical knowledge: Protein Ontology research and annotation tools.Cecilia N. Arighi, Darren A. Natale, Judith A. Blake, Carol J. Bult, Michael Caudy, Alexander D. Diehl, Harold J. Drabkin, Peter D'Eustachio, Alexei Evsikov, Hongzhan Huang, Barry Smith & Others - 2011 - In Proceedings of the 2nd International Conference on Biomedical Ontology. Buffalo, NY: NCOR. pp. 285-287.
    The Protein Ontology (PRO) web resource provides an integrative framework for protein-centric exploration and enables specific and precise annotation of proteins and protein complexes based on PRO. Functionalities include: browsing, searching and retrieving, terms, displaying selected terms in OBO or OWL format, and supporting URIs. In addition, the PRO website offers multiple ways for the user to request, submit, or modify terms and/or annotation. We will demonstrate the use of these tools for protein research and annotation.
    Direct download  
     
    Export citation  
     
    Bookmark  
  13.  4
    Do Electrons Have Politics? Constructing User Identities in Swedish Electricity.Jane Summerton - 2004 - Science, Technology, and Human Values 29 (4):486-511.
    Electricity systems in many parts of Europe and the United States are currently undergoing transformations that have potentially profound implications for managerial practice and the politics of user identities within these systems. After more than a century of “universal service” that provided technical goods and services to all users on essentially equal terms, utility managers are now constructing and exploiting heterogeneity and difference among users. This article explores local managerial practices within Swedish electricity in the mid-1990s, where managers promoted (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  14. Proceedings of the Workshop WWW2007 Workshop i3: Identity, Identifiers, Identification (Workshop on Entity-Centric Approaches to Information and Knowledge Management on the Web), Banff, Canada.Werner Ceusters & Barry Smith (eds.) - 2007 - CEUR.
    No categories
     
    Export citation  
     
    Bookmark  
  15.  5
    “You Don’t Know Me so Don’t Try to Judge Me”: Gender and Identity Performance on Social Media Among Young Indian Users.Sramana Majumdar, Maanya Tewatia, Devika Jamkhedkar & Khushi Bhatia - 2022 - Frontiers in Psychology 13.
    Social media is the preferred communication platform for today’s youth, yet little is known of how online intergender communication is shaped by social identity norms. Drawing from the Social Identity and Deindividuation Effects approach, we argue that through depersonalization, online interactions are marked by the salience of social identities and identity performance conforming to perceived norms of behavior. We specifically look at discursive terms and their meaning-making as a strategic performance of gender in uncontrolled social media interactions. (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  16.  37
    Conceptualising a Child-Centric Paradigm: Do We Have Freedom of Choice in Donor Conception Reproduction?Damian H. Adams - 2013 - Journal of Bioethical Inquiry 10 (3):369-381.
    Since its inception, donor conception practices have been a reproductive choice for the infertile. Past and current practices have the potential to cause significant and lifelong harm to the offspring through loss of kinship, heritage, identity, and family health history, and possibly through introducing physical problems. Legislation and regulation in Australia that specifies that the welfare of the child born as a consequence of donor conception is paramount may therefore be in conflict with the outcomes. Altering the paradigm to (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  17. Addiction, Identity, Morality.Brian D. Earp, Joshua August Skorburg, Jim A. C. Everett & Julian Savulescu - 2019 - AJOB Empirical Bioethics 10 (2):136-153.
    Background: Recent literature on addiction and judgments about the characteristics of agents has focused on the implications of adopting a ‘brain disease’ versus ‘moral weakness’ model of addiction. Typically, such judgments have to do with what capacities an agent has (e.g., the ability to abstain from substance use). Much less work, however, has been conducted on the relationship between addiction and judgments about an agent’s identity, including whether or to what extent an individual is seen as the same person (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   12 citations  
  18.  16
    African Philosophy-Based Ecology-Centric Decolonised Design Thinking: A Declarative Mapping Sentence Exploration.Ava Gordley-Smith & Paul M. W. Hackett - 2023 - Filosofia Theoretica: Journal of African Philosophy, Culture and Religions 12 (2):1-18.
    This paper uses a declarative mapping sentence approach to explore and amend design thinking - a project development and management technique recently disseminated in Africa. We contend that there are problems in the manner in which design thinking has been exported to Africa, namely, that design thinking is rooted in the linear, binary, human-centric systems present in Western philosophy and that the exportation of design thinking is potentially neo-colonial. We, therefore, attempt to ameliorate these difficulties by decoupling design thinking (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  19. Corporatised Identities ≠ Digital Identities: Algorithmic Filtering on Social Media and the Commercialisation of Presentations of Self.Charlie Harry Smith - 2020 - In Christopher Burr & Luciano Floridi (eds.), Ethics of digital well-being: a multidisciplinary approach. Springer.
    Goffman’s (1959) dramaturgical identity theory requires modification when theorising about presentations of self on social media. This chapter contributes to these efforts, refining a conception of digital identities by differentiating them from ‘corporatised identities’. Armed with this new distinction, I ultimately argue that social media platforms’ production of corporatised identities undermines their users’ autonomy and digital well-being. This follows from the disentanglement of several commonly conflated concepts. Firstly, I distinguish two kinds of presentation of self that I collectively refer (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  20.  8
    Avatar-User Bond as Meta-Cognitive Experience: Explicating Identification and Embodiment as Cognitive Fluency.Young June Sah, Minjin Rheu & Rabindra Ratan - 2021 - Frontiers in Psychology 12.
    Scholars have not reached an agreement on a theoretical foundation that underlies the psychological effects of avatar use on users. One group of scholars focuses on the perceptual nature of avatar use, proposing that perceiving the self-being represented by a virtual representation leads to the effects. Another group suggests that social traits in avatars prime users causing them to behave in accordance with the social traits. We combine these two theoretical explanations and present an alternative approach, hinging on a concept (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  21.  67
    Online users’ donation behavior to medical crowdfunding projects: Mediating analysis of social presence and perceived differences in trust.Tao Zhang, Qianyu Zhang, Rong Jiang, Tilei Gao & Ming Yang - 2022 - Frontiers in Psychology 13.
    Perceived trust is a key factor affecting the behavior to donate online. In order to further explore the factors and influencing mechanisms that affect the success of medical crowdfunding projects, this paper, combined with the Stimulus-Organism-Response theory, introduces the mediating variable of social presence and perceived differences in trust, and constructs a model of online users’ donation behavior to medical crowdfunding projects. We collected 437 valid samples through a questionnaire survey, and processed the data with SPSS and Amos software to (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  22.  36
    Towards including end-users in the design of prosthetic hands: Ethical analysis of survey of Australians with upper-limb difference.Mary Jean Walker, Eliza Goddard, Benjamin Stephens-Fripp & Gursel Alici - 2019 - Science and Engineering Ethics (2):1-27.
    Advances in prosthetic design should benefit people with limb difference. But empirical evidence demonstrates a lack of uptake of prosthetics among those with limb difference, including of advanced designs. Non-use is often framed as a problem of prosthetic design or a user’s response to prosthetics. Few studies investigate user experience and preferences, and those that do tend to address satisfaction or dissatisfaction with functional aspects of particular designs. This results in limited data to improve designs and, we argue, (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  23.  11
    User-generated reality enforcement: Framing violence against black trans feminine people on a video sharing site.Valo Vähäpassi - 2019 - European Journal of Women's Studies 26 (1):85-98.
    While some scholars have addressed the common cultural tropes about trans people, the way media might sometimes legitimate violence against trans people, and even take part in forms of violence, has not been analysed. This is what this article sets out to do, through an examination of how a verbal and physical attack against black trans women, videotaped and uploaded on a platform for user-generated entertainment, was framed in a way which repeated the symbolic violence already at play in (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  24.  3
    User Engagement and User Loyalty Under Different Online Healthcare Community Incentives: An Experimental Study.Mingxing Shao, Xinjie Zhao & Yafang Li - 2022 - Frontiers in Psychology 13.
    The online healthcare community has attained rapid development in recent years in which users are facilitated to exchange disease information and seek medical treatment. However, users’ motivation of participation in OHCs is still under investigation. Taking the perspective of user perceived value, this paper examined the impacts of different incentive levels including identity incentive, privilege incentive, and material incentive on user perceived value, user engagement, and user loyalty. To test the proposed hypotheses, the study adopted (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  25.  12
    Toward children-centric AI: a case for a growth model in children-AI interactions.Karolina La Fors - forthcoming - AI and Society:1-13.
    This article advocates for a hermeneutic model for children-AI interactions in which the desirable purpose of children’s interaction with artificial intelligence systems is children's growth. The article perceives AI systems with machine-learning components as having a recursive element when interacting with children. They can learn from an encounter with children and incorporate data from interaction, not only from prior programming. Given the purpose of growth and this recursive element of AI, the article argues for distinguishing the interpretation of bias within (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  26. Identity, profiling algorithms and a world of ambient intelligence.Katja de Vries - 2010 - Ethics and Information Technology 12 (1):71-85.
    The tendency towards an increasing integration of the informational web into our daily physical world (in particular in so-called Ambient Intelligent technologies which combine ideas derived from the field of Ubiquitous Computing, Intelligent User Interfaces and Ubiquitous Communication) is likely to make the development of successful profiling and personalization algorithms, like the ones currently used by internet companies such as Amazon , even more important than it is today. I argue that the way in which we experience ourselves necessarily (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  27.  51
    Identity, profiling algorithms and a world of ambient intelligence.Katja Vries - 2010 - Ethics and Information Technology 12 (1):71-85.
    The tendency towards an increasing integration of the informational web into our daily physical world (in particular in so-called Ambient Intelligent technologies which combine ideas derived from the field of Ubiquitous Computing, Intelligent User Interfaces and Ubiquitous Communication) is likely to make the development of successful profiling and personalization algorithms, like the ones currently used by internet companies such as Amazon, even more important than it is today. I argue that the way in which we experience ourselves necessarily goes (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  28.  10
    Configuring the User as Everybody: Gender and Design Cultures in Information and Communication Technologies.Marcelle Stienstra, Els Rommes & Nelly Oudshoorn - 2004 - Science, Technology and Human Values 29 (1):30-63.
    Based on two case studies of the design of electronic communication networks developed in the public and private sector, this article explores the barriers within current design cultures to account for the needs and diversity of users. Whereas the constraints on user-centered design are usually described in macrosociological terms, in which the user–technology relation is merely understood as a process of the inclusion or exclusion of users in design, the authors suggest that it is important to adopt a (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   21 citations  
  29.  8
    Interpellating Patients as Users: Patient Associations and the Project-Ness of Stem Cell Research.Henriette Langstrup - 2011 - Science, Technology, and Human Values 36 (4):573-594.
    The author traces the ways in which various patients and collective associations of patients come to regard themselves as the users of future stem cell technologies. The author uses Althusser’s notion of interpellation, whereby an identity is the result of the situated encounter of a subject and an authority, to analyze the ways in which patient associations’ current involvement with basic research is related to the enactment of science as a series of technology development projects. The author argues that (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   6 citations  
  30.  10
    A phenomenological account of users' experiences of assertive community treatment.Jay Watts & Stefan Priebe - 2002 - Bioethics 16 (5):439–454.
    Assertive community treatment (ACT) is a widely propagated team approach to community mental health care that ‘assertively’ engages a subgroup of individuals with severe mental illness who continuously disengage from mental health services. It involves a number of interested parties – including clients, carers, clinicians and managers. Each operates according to perceived ethical principles related to their values, mores and principles. ACT condenses a dilemma that is common in psychiatry. ACT proffers social control whilst simultaneously holding therapeutic aspiration. The clients’ (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  31.  51
    Federated identity management in mobile dynamic virtual organizations.Matteo Gaeta, Juergen Jaehnert, Kleopatra Konstanteli, Sergio Miranda, Pierluigi Ritrovato & Theodora Varvarigou - 2009 - Identity in the Information Society 2 (2):115-136.
    Over the past few years, the Virtual Organization (VO) paradigm has been emerging as an ideal solution to support collaboration among globally distributed entities (individuals and/or organizations). However, due to rapid technological and societal changes, there has also been an astonishing growth in technologies and services for mobile users. This has opened up new collaborative scenarios where the same participant can access the VO from different locations and mobility becomes a key issue for users and services. The nomadicity and mobility (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  32.  22
    Enacting identity in microblogging through ambient affiliation.Michele Zappavigna - 2014 - Discourse and Communication 8 (2):209-228.
    This article explores how we use social media to construe identities and align with others into communities of shared values. The focus is on how ‘users of language perform their identities within uses of language’: How do personae using the microblogging service Twitter perform relational identities as they enact discourse fellowships? Addressing this question means understanding how personae enter into ambient affiliation. Such affiliation is ambient in the sense that social media users may not be interacting directly, but instead participating (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  33.  26
    Reasons Without Persons: Rationality, Identity, and Time.Brian Hedden - 2015 - Oxford, United Kingdom: Oxford University Press UK.
    Brian Hedden defends a radical view about the relationship between rationality, personal identity, and time. On the standard view, personal identity over time plays a central role in thinking about rationality, because there are rational norms for how a person's attitudes and actions at one time should fit with her attitudes and actions at other times. But these norms are problematic. They make what you rationally ought to believe or do depend on facts about your past that aren't (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   50 citations  
  34.  16
    Promotion of Internet Users’ Aggressive Participation via the Mediators of Flow Experience and Identification.Kuei-Feng Chang, Yu-Huang Huang, Wei-Chin Li, Shunjun Luo & Dong-Jenn Yang - 2022 - Frontiers in Psychology 13.
    Social media users have increased rapidly in recent years; however, most are “silent users” who rarely share information online. To maintain social media companies’ stable operation and development, this research explored the effects of flow experience and identity formation on users’ intrinsic motivation to facilitate aggressive, spontaneous, and habitual participation in virtual communities. A total of 487 valid questionnaires were collected and underwent regression analysis. The results revealed that all three intrinsic motivations had a significant impact on social media (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  35.  5
    Two-Stage User Identification Based on User Topology Dynamic Community Clustering.Jiajing Zhang, Zhenhua Yuan, Neng Xu, Jinlan Chen & Juxiang Wang - 2021 - Complexity 2021:1-10.
    In order to solve the problem of node information loss during user matching in the existing user identification method of fixed community across the social network based on user topological relationship, Two-Stage User Identification Based on User Topology Dynamic Community Clustering algorithm is proposed. Firstly, we perform community clustering on different social networks, calculate the similarity between different network communities, and screen out community pairs with greater similarity. Secondly, two-way marriage matching is carried out for (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  36. From Language Users to Semantics.Marian Zouhar - 2009 - Filozofia 64 (4):297-311.
    The paper shows that certain well established arguments widely used in the philosophy of language to discredit some semantic theories are, in fact, defective . In particular, the direct reference theory is usually rejected, because it is impossible to substitute co-referential proper names for each other in epistemic contexts and true identity sentences of the form “a = b”, where a and b are proper names, have to be both necessary and a posteriori. Both arguments are based on what (...)
     
    Export citation  
     
    Bookmark  
  37.  19
    Personal identity in the space of virtual culture: on the example of geek and glam subcultures.L. V. Osadcha - 2022 - Anthropological Measurements of Philosophical Research 22:90-98.
    _Purpose._ The article presents exploring the cultural and anthropological traits of consumers and producers of cultural services and products in the digital epoch. There have been singled out two types of cultural subjectivity according to the aim of a person’s activity in the virtual net: either production of things, services, and technologies or the consumption and creative use of all mentioned innovations. So these sociocultural formations are called "geek" and "chic" subcultures. _Theoretical basis._ The historical genealogy of the definitions was (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  38. Psychopharmaceutical enhancers: Enhancing identity?Ineke Bolt & Maartje Schermer - 2009 - Neuroethics 2 (2):103-111.
    The use of psychopharmaceuticals to enhance human mental functioning such as cognition and mood has raised a debate on questions regarding identity and authenticity. While some hold that psychopharmaceutical substances can help users to ‘become who they really are’ and thus strengthen their identity and authenticity, others believe that the substances will lead to inauthenticity, normalization, and socially-enforced adaptation of behaviour and personality. In light of this debate, we studied how persons who actually have experience with the use (...)
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   16 citations  
  39.  42
    Identity and distinctness in online interaction: encountering a problem for narrative accounts of self.Alexander D. Carruth & David W. Hill - 2015 - Ethics and Information Technology 17 (2):103-112.
    This paper examines the prevalent assumption that when people interact online via proxies—avatars—they encounter each other. Through an exploration of the ontology of users and their avatars we argue that, contrary to the trend within current discussions of interaction online, this cannot be unproblematically assumed. If users could be considered in some sense identical to their avatars, then it would be clear how an encounter with an avatar could ground an encounter with another user. We therefore engage in a (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  40.  34
    Online Identity Crisis Identity Issues in Online Communities.Selene Arfini, Lorenzo Botta Parandera, Camilla Gazzaniga, Nicolò Maggioni & Alessandro Tacchino - 2021 - Minds and Machines 31 (1):193-212.
    How have online communities affected the ways their users construct, view, and define their identity? In this paper, we will approach this issue by considering two philosophical sets of problems related to personal identity: the “Characterization Question” and the “Self-Other Relations Question.” Since these queries have traditionally brought out different problems around the concept of identity, here we aim at rethinking them in the framework of online communities. To do so, we will adopt an externalist and cognitive (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  41.  8
    Memory, Identity and Cognition: Explorations in Culture and Communication.Jacek Mianowski, Michał Borodo & Paweł Schreiber (eds.) - 2019 - Cham: Imprint: Springer.
    The book analyses a variety of topics and current issues in linguistics and literary studies, focusing especially on such aspects as memory, identity and cognition. Firstly, it discusses the notion of memory and the idea of reimagining, as well as coming to terms with the past. Secondly, it studies the relationship between perception, cognition and language use. It then investigates a variety of practices of language users, language learners and translators, such as the use of borrowings from hip-hop and (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  42. A New Algorithmic Identity.John Cheney-Lippold - 2011 - Theory, Culture and Society 28 (6):164-181.
    Marketing and web analytic companies have implemented sophisticated algorithms to observe, analyze, and identify users through large surveillance networks online. These computer algorithms have the capacity to infer categories of identity upon users based largely on their web-surfing habits. In this article I will first discuss the conceptual and theoretical work around code, outlining its use in an analysis of online categorization practices. The article will then approach the function of code at the level of the category, arguing that (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   40 citations  
  43. Privacy concerns and identity in online social networks.Hanna Krasnova, Oliver Günther, Sarah Spiekermann & Ksenia Koroleva - 2009 - Identity in the Information Society 2 (1):39-63.
    Driven by privacy-related fears, users of Online Social Networks may start to reduce their network activities. This trend can have a negative impact on network sustainability and its business value. Nevertheless, very little is understood about the privacy-related concerns of users and the impact of those concerns on identity performance. To close this gap, we take a systematic view of user privacy concerns on such platforms. Based on insights from focus groups and an empirical study with 210 subjects, (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  44.  17
    Toward a Theory of Marginalized Stakeholder-Centric Entrepreneurship.Rashedur Chowdhury, Saras D. Sarasvathy & R. Edward Freeman - 2024 - Business Ethics Quarterly 34 (1):1-34.
    The neglect of marginalized stakeholders is a colossal problem in both stakeholder and entrepreneurship streams of literature. To address this problem, we offer a theory of marginalized stakeholder-centric entrepreneurship. We conceptualize how firms can utilize marginalized stakeholder input actualization through which firms should process a variety of ideas, resources, and interactions with marginalized stakeholders and then filter, internalize, and, finally, realize important elements that improve a variety of related socioeconomic, ethical, racial, contextual, political, and identity issues. This input (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  45.  18
    Virtualization of identity in the context of self-realization of a personality.Y. V. Lyubiviy & R. V. Samchuk - 2020 - Anthropological Measurements of Philosophical Research 18:102-112.
    Purpose. The research is aimed at clarifying the essence of virtual reality and its productive role in the self-realization of the individual, as well as the importance in the process of self-realization of the individual to expand the dimensions of his identity by including virtual dimensions. To do this, the process of formation of the phenomenon of virtual identity in the environment of virtual reality is revealed and the influence of productive human activity in virtual reality on the (...)
    No categories
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  46.  14
    Technology, Personal Information, and Identity.Muriel Leuenberger - 2024 - Techné: Research in Philosophy and Technology 28 (1):22-48.
    Novel and emerging technologies can provide users with new kinds and unprecedented amounts of information about themselves, such as autobiographical information, neurodata, health information, or characteristics inferred from online behavior. Technology providing extensive personal information (PI technology) can impact who we take ourselves to be, how we constitute ourselves, and indeed who we are. This paper analyzes how the external, quantified perspective on us offered by PI technology affects identity based on a narrative identity theory. Disclosing the intimate (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  47.  43
    What is it like to use a BCI? – insights from an interview study with brain-computer interface users.Johannes Kögel, Ralf J. Jox & Orsolya Friedrich - 2020 - BMC Medical Ethics 21 (1):1-14.
    BackgroundThe neurotechnology behind brain-computer interfaces (BCIs) raises various ethical questions. The ethical literature has pinpointed several issues concerning safety, autonomy, responsibility and accountability, psychosocial identity, consent, privacy and data security. This study aims to assess BCI users’ experiences, self-observations and attitudes in their own right and looks for social and ethical implications.MethodsWe conducted nine semi-structured interviews with BCI users, who used the technology for medical reasons. The transcribed interviews were analyzed according to the Grounded Theory coding method.ResultsBCI users perceive (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  48.  67
    Identity management in GRID computing and Service Oriented Architectures: research and practice. [REVIEW]Theodora Varvarigou & Vassiliki Andronikou - 2009 - Identity in the Information Society 2 (2):95-98.
    Today, Service-Oriented Architecture (SOA) and Grid and Cloud computing comprise the key technologies in distributed systems. In systems following the SOA approach, functionalities are delivered and consumed as services. Given the variety of resources (i.e. data, computing capabilities, applications, etc) as well as the variation of user-requested Quality of Service (e.g., high performance, fast access, low cost, high media resolution, etc), there is a need for advanced user management, trust establishment and service management mechanisms which adjust, monitor and (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  49.  3
    Winning wars before they emerge: from kinetic warfare to strategic communications as a proactive and mind-centric paradigm of the art of war.Torsti Sirén - 2013 - Boca Raton: Universal-Publishers.
    To avoid preparing to wage battles against our opponents in future wars, we should proactively and continuously influence the narrative identity structures of our potential opponents by using Strategic Communications (StratCom). This book argues that nations and societies of tolerance and pluralism (the so-called wonderful societies) should utilize StratCom to seduce their enemies, opponents, and potential opponents not only to behave in more tolerant ways, but above all to internalize peace, tolerance, and pluralism as essential values and guiding mental (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  50.  15
    Culture and religion creolisation impact on digital advertisement of Muslim users of Instagram.Majid Mirvaisi & Azar Kaffashpoor - 2023 - HTS Theological Studies 79 (3):7.
    Over the last decade, digitalisation has been a subject of increasing attention among scholars and practitioners. The effect of culture and religion on advertisements, consumerism and marketing, is deniable. The main goal of this research is to present a comprehensive conceptual model based on cultural and religious diversity in digital marketing. This research mainly includes introduction creolisation concept and the elements (religion, music, clothes and custom) as the most important factor in digital advertisement and branding. In this regard, this study (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
1 — 50 / 983