Skip to main content

Summary

The objective of this chapter is not to bring the answer to the ultimate question ‘what is identity?’, — an almost impossible undertaking given the complexity and the constant evolution of the subject — but rather to present, more like on a journey, different angles that can be used to define this concept, in particular in the context of the Information Society. Starting first at describing how this conceptualisation can be conducted in the traditional way of theori-sation well known by the academics, this chapter then indicates how less formal approaches such as narratives can be used to help to understand the concept. It also introduces how the new ‘social tools’ originating from the Web 2.0 can be used to stir the intelligence of experts from different horizons so as to generated a meaningful and practical understanding of the subject. The second part of the chapter is used to illustrate how each of these approaches have been operationalised by presenting a series of models and scenarios presenting different perspectives and issues that are relevant to the subject, and a collaborative Web 2.0 knowledge infrastructure that was used in FIDIS to facilitate the conceptualisation of identity by a group of experts.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  • AAAI (2004), ‘Brief History of Artificial Intelligence’, AAAI AI Topics dynamic library of introductory information about Artificial Intelligence, url: http://www.aaai.org/AITopics/ bbhist.html

  • Agre, P. E. and Rotenberg, M. (ed.) (1998), Technology and Privacy: The New Landscape. Cambridge Massachussets: MIT Press.

    Google Scholar 

  • ALRC (2008), For Your Information: Australian Privacy Law and Practice. ALRC (Australian Law Reform Commission) report 108, Canberra : Law Reform Commission.

    Google Scholar 

  • Andrade, J., Ares, J., García, R., Pazos, J., Rodríguez, S., Silva, A. (2008), ‘Formal conceptualisation as a basis for a more procedural knowledge management’, Decision. Support System. 45 (1), pp. 164–179.

    Article  Google Scholar 

  • Ariely, D. (2008), Predictably Irrational: The Hidden Forces That Shape Our Decisions. HarperCollins.

    Google Scholar 

  • Berners-Lee, T., Hendler, J., Lassila, O. (2001), ‘The Semantic Web’, Scientific American 284 (5), pp. 34–43.

    Article  Google Scholar 

  • Bjelland, T. K, (2004), ‘Classification: assumptions and implications for conceptual modeling’, doctoral dissertation, Department of Information Science and Media Studies, Faculty of Social Science, University of Bergen.

    Google Scholar 

  • Boyd, D. and Ellison, N. (2007), ‘Social Network Sites: Definition, History, and Scholarship’, Journal of Computer-Mediated Communication 13 (1), article 11.

    Google Scholar 

  • Brusilovsky, P. (2001), ‘Adaptive Hypermedia’, User Modeling and User-Adapted Interaction 11 (1–2), pp. 87–110.

    Article  Google Scholar 

  • Brzozowski, M., Hogg, T., Szabo, G. (2008), ‘Friends and foes: Ideological social networking’, Proceedings of the 26th annual SIGCHI Conference on Human Factors in Computing, ACM Press, pp. 817–820.

    Google Scholar 

  • Chesney, T. (2006), ‘An empirical examination of Wikipedia's credibility’, First Monday 11 (11), url: http://firstmonday.org/issues/issue11_11/chesney/index.html.

  • Chi, E. H. and Mytkowicz, T. (2008), ‘Understanding the efficiency of social tagging systems using information theory’, Proceedings of the 19th ACM Conference on Hypertext and Hypermedia; NY: ACM, pp. 81–88, url: http://www.parc.com/research/publications/details.php?id=6294

    Google Scholar 

  • Cialdini, R. B. (2001), Influence: Science and practice (4th ed.). Boston: Allyn & Bacon.

    Google Scholar 

  • Claessens, J., Díaz, C., Nikova, S., De Win, B., Goemans, C., Loncke, M., Naessens, V., Seys, S., De Decker, B., Dumortier, J., Preneel, B. (2003), ‘Applications Requirements for Controlled Anonymity’, APES Deliverable D7.

    Google Scholar 

  • Clark, H. H. and Brennan, S. E. (1991), ‘Grounding in communication’, in: Resnick, L. B., Levine, J., Behreno, S. D. (Eds.), Socially shared cognition.

    Google Scholar 

  • Clauß, S. and Köhntopp, M. (2001), ‘Identity Managements and Its Support of Multilateral Security’, Computer Networks 37 (2), Special Issue on Electronic Business Systems, pp. 205–219.

    Article  Google Scholar 

  • Clynes, M. E. and Kline, N. S. (1960), ‘Cyborgs and Space’, Astronautics 14 (9), pp. 26–27 and 74–76.

    Google Scholar 

  • Cunningham, W. and Leuf, B. (2001), The Wiki Way. Quick Collaboration on the Web, Addison-Wesley.

    Google Scholar 

  • Davis, M. (2008), ‘Semantic Wave 2008: Industry Roadmap to Web 3.0 and Multibillion Dollar Market Opportunities — Executive Summary’, Project10X report January 2008. url: http://www.project10x.com/.

  • Denning, S. (2001), ‘The Springboard: How Storytelling Ignites Action in Knowledge-era Organizations’, Journal of Organizational Change Management 14 (6), pp. 609–614.

    Google Scholar 

  • Diogene (2002), ‘Survey on Methods and Standards for Student Modelling’, Diogene project, url: http://www.diogene.org/archive.html.

  • Durand, A. (2002), ‘Three Tiers of Identity’, Digital Identity World, March 16, 2002.

    Google Scholar 

  • Dutton, J., Dukerich, J., Harquail, C. (1994), ‘Organizational Images and Member Identification’, Administrative Science Quarterly, 39 (2), pp 239–263.

    Article  Google Scholar 

  • Epstein, R. (2007), ‘The Truth About Online Dating’, Scientific American Mind, February / March 2007, pp. 32–39.

    Google Scholar 

  • Nabeth, T. (ed.) (2005b), FIDIS Deliverable D2.3: Models, Download: http://www.fidis.net/ resources/deliverables/.

  • Fink, J. and Kobsa, A., (2000), ‘A Review and Analysis of Commercial User Modeling Servers for Personalization on the World Wide Web’, User Modeling and User Adapted Interaction, 10 (2–3), pp. 209–249.

    Article  Google Scholar 

  • Fischer, G. (2001), ‘User Modeling in Human-Computer Interaction’, User Modeling and User Adaptive Interaction 11 (1–2), pp. 65–86.

    Article  Google Scholar 

  • Gill, K. E. (2005), ‘Blogging, RSS and the Information Landscape: A Look at Online News’, In Proceedings of the 14th international WWW conference: 2nd annual workshop on weblogging ecosystem: aggregation, analysis and dynamics, 10 May 2005, Chiba, Japan.

    Google Scholar 

  • Golder, S. and Huberman, B. A. (2006), ‘Usage Patterns of Collaborative Tagging Systems’, Journal of Information Science 32 (2), pp. 198–208.

    Article  Google Scholar 

  • Granovetter, M. (1973), ‘The Strength of Weak Ties’, American Journal of Sociology 78 (6), pp. 1360–80.

    Article  Google Scholar 

  • Gruber, T. (2008), ‘Ontology’, in: Liu, L. and Özsu, M. T. (eds.), The Encyclopedia of Database Systems. Springer-Verlag.

    Google Scholar 

  • Halpin, H., Robu, V., Shepherd, H. (2006), ‘The Dynamics and Semantics of Collaborative Tagging’, Proceedings of the 16th international conference on World Wide Web, pp.211 – 220.

    Google Scholar 

  • Hammond, J. S. (1976), Learning by the case method. HBS Publishing Division, Harvard Business School, Boston, MA, Case ♯376–241.

    Google Scholar 

  • Hammond, T., Hannay, T., Lund, B., Scott, J. (2005), ‘Social Bookmarking Tools’, D-Lib Magazine 11 (4), url: http://dlib.org/dlib/april05/hammond/04hammond.html.

  • Hansen, M. and Pfitzmann, A. (2008), ‘Anonymity, Unobservability, Pseudonymity, and Identity Management — A Proposal for Terminology’, Working document, url: http://dud. inf.tu-dresden.de/Anon_Terminology.shtml.

  • Hildebrandt, M. (2006), ‘Privacy and Identity’, in: Duff, A., Claes, E., Gutwirth, S. (eds.), Privacy and the criminal law, Antwerp/Oxford, Intersentia, pp. 43–57.

    Google Scholar 

  • Holten, R. (2007), ‘Deriving an IS-Theory from an Epistemological Position’, Proceedings of the 18th Australasian Conference on Information Systems (ACIS 2007), Toowoomba, Australia.

    Google Scholar 

  • ICPP (2003), ‘Independent Centre for Privacy Protection (ICPP) Schleswig-Holstein and Studio Notarile Genghini (SNG)’, Identity Management Systems (IMS): Identification and Comparison, study prepared under contract for Institute for Prospective Technological Studies, Joint Research Centre Seville, Spain, Sept. 2003, url: http://www.daten-schutzzentrum.de/idmanage/study/ICPP_SNG_IMS-Study.pdf.

  • ISO (1999), ISO IS 15408, 1999, url: http://www.commoncriteria.org/.

  • Jaquet-Chiffelle, D.-O., Benoist, E., Anrig, B. (eds.) (2006), FIDIS Deliverable 2.6: Identity in a Networked World — Use Cases and Scenarios, Download: http://www.fidis.net/ resources/networked-world/.

  • Kahney, L. (2004), ‘Social Nets Not Making Friends’, Wired magazine, January. 28, 2004, url: http://www.wired.com/culture/lifestyle/news/2004/01/62070.

  • Kay, J. (2000), ‘User modeling for adaptation’, in Constantine, S. (ed.), User Interfaces for All, Human Factors Series, Lawrence Erlbaum Associates, pp. 271–294.

    Google Scholar 

  • Klamma, R., Y., Cao, M., Spaniol (2007), ‘Watching the Blogosphere: Knowledge Sharing in the Web 2.0’, Proceedings of the International Conference on Weblogs and Social Media, Boulder, Colorado, USA, pp. 105–112.

    Google Scholar 

  • Kobsa, A., Koenemann, J., Pohl, W. (2000), ‘Personalized hypermedia presentation techniques for improving online customer relationships’, The Knowledge Engineering Review 16 (2), pp. 111–155.

    Article  Google Scholar 

  • Kogut, B. (2008), Knowledge, Options, and Institutions. Oxford University Press.

    Google Scholar 

  • Korotov, K. (2004), ‘“Neither Here nor There” or “Both Here and There”: Experiencing Liminality and Playing with Identity’, Academy of Management Conference, New Or leans, August 6–11, 2004.

    Google Scholar 

  • Lelic, S. (2002), ‘Fuel Your Imagination. KM and the Art of Storytelling’, Knowledge Management 5 (4).

    Google Scholar 

  • Lessig, L. (1999), Code and Other Laws of Cyberspace. New York: Basic Books.

    Google Scholar 

  • Lih, A. (2004), ‘Wikipedia as Participatory Journalism: Reliable Sources? Metrics for evaluating collaborative media as a news alternative’, 5th International Symposium on Online Journalism at the University of Texas at Austin.

    Google Scholar 

  • Marlow, C., Naaman, M., Boyd, D., Davis, M. (2006), ‘Position Paper, Tagging, Taxonomy, Flickr, Article, ToRead’, Proceedings of Hypertext 2006, New York: ACM Press.

    Google Scholar 

  • McAfee, A. P. (2006), ‘Enterprise 2.0: The Dawn of Emergent Collaboration’, Sloan Management Review 47 (3), pp. 21–28.

    Google Scholar 

  • Millen, D., Feinberg, J., Kerr, B. (2005), ‘Social Bookmarking in the Enterprise’, ACM Queue 3 (9), pp. 28–35.

    Article  Google Scholar 

  • Mathes, A. (2004), ‘Folksonomies — Cooperative Classification and Communication Through Shared Metadata’, Graduate School of Library and Information Science, url: http://www. adammathes.com/academic/computer-mediated-communication/folksonomies.html.

  • McLellan, H. (2002), ‘Introduction to Corporate Storytelling’, url: http://tech-head.com/ cstory1.htm.

  • Mennecke, B.E., McNeill, D., Ganis, M., Roche, E., Konsynski, B., Bray, D., Lester, Townsend, A.M. (2008), ‘Second Life and other Virtual Worlds: A Roadmap for Research’, Communications of the Association for Information Systems 22 (article 20), pp. 371–388.

    Google Scholar 

  • Modini (2005), ‘Modinis Study on Identity Management’, in eGovernment, Common Terminological Framework for Interoperable Electronic Identity Management — Consultation Paper, v2.01, 23 November 2005, url: https://www.cosic.esat.kuleuven.be/modinis- idm/twiki/bin/view.cgi/Main/GlossaryDoc.

  • Naaman, M. (2006), ‘Why Do Tagging Systems Work?’, Conference on Human Factors in Computing Systems (CHI 2006), Panel session, pp. 36–39.

    Google Scholar 

  • Nabeth, T., Angehrn, A. A., Balakrishnan, R. (2004), ‘Integrating “Context” in e-Learning Systems Design’, Proceedings of IEEE International Conference on Advanced Learning Technologies (ICALT 2004), pp. 355–359.

    Google Scholar 

  • Nabeth, T. (ed.) (2005), FIDIS Deliverable D2.3: Models, Download: http://www.fidis.net/ resources/deliverables/.

  • Nabeth, T. and Hildebrandt, M. (eds.) (2005), FIDIS Deliverable D2.1: Inventory of Topics and Clusters, Download: http://www.fidis.net/resources/deliverables/.

  • Nabeth, T., Karlsson, H., Angehrn, A. A., Maisonneuve, N. (2008), ‘A Social Network Platform for Vocational Learning in the ITM Worldwide Network’, Proceedings of IST Africa 2008.

    Google Scholar 

  • Nardi, B. A., Schiano D. J., Gumbrecht, M. Swartz, L. (2004), ‘Why We Blog’, Communications of the ACM 47 (12), pp. 41–46.

    Article  Google Scholar 

  • Nisbett, R. (2003), The Geography of Thought: How Asians and Westerners Think Differently...and Why. Reed Business Information, Inc.

    Google Scholar 

  • Nonaka, I. and Takeuchi, H. (1995), The Knowledge-Creating Company. New York: Oxford University Press.

    Google Scholar 

  • O'Reilly, T. (2005), ‘What Is Web 2.0 Design Patterns and Business Models for the Next Generation of Software’, 30 September 2005, url: http://www.oreillynet.com/pub/a/ oreilly/tim/news/2005/09/30/what-is-web-20.html.

  • Perez, S. (2008), ‘Real People Don't Have Time for Social Media’, ReadWriteWeb, April 16, 2008, url: http://www.readwriteweb.com/archives/real_people_dont_have_time_for_social_media.php.

  • Pratt, M. G. (1998), ‘To Be Or Not To Be: Central Questions in Organizational Identification’, in: David A. W., Paul G. (eds.), Identity in Organizations, Thousand Oaks: Sage, pp. 171–207.

    Google Scholar 

  • Rafaeli, S. and Ariel, Y. (2008), ‘Online motivational factors: Incentives for participation and contribution in Wikipedia’, in: Azy, B. (ed.), Psychological aspects of cyberspace: Theory, research, applications, Cambridge, UK: Cambridge University Press, pp. 243– 267, url: http://gsb.haifa.ac.il/~sheizaf/cyberpsych/11-RafaeliandAriel.pdf.

    Google Scholar 

  • Razmerita, L., (2004), ‘User modeling and personalization of the Knowledge Management Systems’, Adaptable and Adaptive Hypermedia, Idea Group Publishing.

    Google Scholar 

  • Resnick, P. and Zeckhauser, R. (2002), ‘Trust Among Strangers in Internet Transactions: Empirical Analysis of eBay's Reputation System’, The Economics of the Internet and E- Commerce, pp. 127–157.

    Google Scholar 

  • Ricoeur, P. (1992), Oneself as another. Chicago and London: University of Chicago Press.

    Google Scholar 

  • Rogers, E. (2003), Diffusion of Innovations (5th ed.). New York: Free Press.

    Google Scholar 

  • Sen, S., Harper, F. M., LaPitz, A., Riedl, J. (2007), ‘The Quest for Quality Tags’, Proceedings of the 2007 international ACM conference on Supporting group work, pp. 361–370.

    Google Scholar 

  • Snowden, D. (2001), ‘Narrative patterns: the perils and possibilities of using story in or ganisations’, Knowledge Management, 4 (10).

    Google Scholar 

  • Snowden, D. (2002), ‘Narrative patterns: uses of story in the third age of knowledge management’, Journal of information and knowledge management, 1 (1), pp. 1–6.

    Article  Google Scholar 

  • Sole, D. and Wilson, D. (2002), ‘Storytelling in organizations: The power and traps of using stories to share knowledge in organizations’, Boston: LILA, Harvard Graduate School of Education, url: http://lila.pz.harvard.edu/_upload/lib/ACF14F3.pdf.

  • Sproule, S. and Archer, N. (2007), ‘Defining Identity Theft’, Eighth World Congress on the Management of eBusiness (WCMeB 2007), pp. 20–20.

    Google Scholar 

  • Star, S. L. and Griesemer, J.R. (1989), ‘Institutional Ecology, “Translations” and Boundary Objects: Amateurs and Professionals in Berkeley's Museum of Vertebrate Zoology’, 1907–39; Social Studies of Science 19 (4), pp. 387–420.

    Article  Google Scholar 

  • Stephanidis, C. (2001), ‘Adaptive Techniques for Universal Access’, User Modeling and User-Adapted Interaction 11 (1–2), pp. 159–179.

    Article  Google Scholar 

  • Sveiby, K. E. and Simons, R. (2002), ‘Collaborative climate and effectiveness of knowledge work: an empirical study’, Journal of Knowledge Management 6 (5), pp. 420–433.

    Article  Google Scholar 

  • Thomas, J. C., Kellogg, W. A., Erickson, T. (2001), ‘The knowledge management puzzle: human and social factors in knowledge management’, IBM System Journal 40 (4), pp. 863–884.

    Article  Google Scholar 

  • Tumlin, M., Harris, S. R., Buchanan, H., Schmidt, K (2007), ‘Collectivism vs. individualism in a wiki world: librarians respond to Jaron Lanier's essay ‘digital Maoism: the hazards of the new online collectivism, (Johnson K., ed.)’, Serials Review 33 (1), pp. 45–53.

    Article  Google Scholar 

  • Wagner, C. (2006), ‘Breaking the Knowledge Acquisition Bottleneck through Conversational Knowledge Management’, Information Resources Management Journal, 19 (1), pp. 70–83.

    Google Scholar 

  • Wilkinson, D. M. and Huberman B. A. (2007), ‘Assessing the Value of Cooperation in Wikipedia’, First Monday 12 (4), url: http://www.firstmonday.org/issues/issue12_4/ wilkinson/.

Download references

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Nabeth, T. (2009). Identity of Identity. In: Rannenberg, K., Royer, D., Deuker, A. (eds) The Future of Identity in the Information Society. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-01820-6_2

Download citation

Publish with us

Policies and ethics