AI and Society 28 (1):15-20 (2013)
|Abstract||The Internet has become a field of dragon teeth for a person’s identity. It has made it possible for your identity to be mistaken by a credit agency, spied on by the government, foolishly exposed by yourself, pilloried by an enemy, pounded by a bully, or stolen by a criminal. These harms to one’s integrity could be inflicted in the past, but information technology has multiplied and aggravated such injuries. They have not gone unnoticed and are widely bemoaned and discussed. The government and private watchdogs are working to protect the identity of citizens though at least in the United States both the government and individuals all too often side with prosperity when it conflicts with privacy. Still, these information-technological threats to identity have been recognized and can be reasonably met through legislation, regulation, and discretion. There is another kind of danger to our identity that is more difficult to define and to meet, for it has no familiar predecessors, has no criminal aspects, and exhibits no sharp moral or cultural contours. Still that threat to our identity haunts us constantly and surfaces occasionally in conversations and the media. It makes us feel displaced, distracted, and fragmented at the very times when to all appearances we seem to be connected, busy, and energetic. At the same time, the culture of technology, and of information technology particularly, has opened up fields of diversity and contingency that invite us to comprehend our identities in newly responsible, intricate, and open-minded ways.|
|Keywords||No keywords specified (fix it)|
|Through your library||Configure|
Similar books and articles
Noëmi Manders-Huits (2010). Practical Versus Moral Identities in Identity Management. Ethics and Information Technology 12 (1).
Hidehito Gomi (2010). A Persistent Data Tracking Mechanism for User-Centric Identity Governance. Identity in the Information Society 3 (3):639-656.
Jennifer Radden (2004). Identity: Personal Identity, Characterization Identity, and Mental Disorder. In The Philosophy of Psychiatry: A Companion. Oxford: Oxford University Press.
Eric Olson (2006). Is There a Bodily Criterion of Personal Identity? In Fraser MacBride (ed.), Identity and Modality. Oxford University Press.
Raffaele Rodogno (2012). Personal Identity Online. Philosophy and Technology 25 (3):309-328.
Steve Matthews (2008). Identity and Information Technology. In Jeroen den Hoven John Weckervant (ed.), Moral Philosophy and Information Technology. Cambridge University Press.
Amartya Sen (2009). The Fog of Identity. Politics, Philosophy and Economics 8 (3):285-288.
D. Barnard-Wills & D. Ashenden (2010). Public Sector Engagement with Online Identity Management. Identity in the Information Society 3 (3):657-674.
Stan Klein & Shaun Nichols (2012). Memory and the Sense of Personal Identity. Mind 121 (483):677-702.
Christoph Baumberger & Georg Brun (2012). Identities of Artefacts. Theoria 78 (1):47-74.
Marya Schechtman (2010). Memory and Identity. Philosophical Studies 153 (1):65-79.
Raymond Tallis (2010). Machine Generated Contents Note: Introduction; 1. Identity of Meaning / Adrian Poole; 2. Identity and the Law / Lionel Bently; 3. Species-Identity / Peter Crane; 4. Mathematical Identity / Marcus Du Sautoy; 5. Immunological Identity / Philippa Marrack; 6. Visualizing Identity / Ludmilla Jordanova; 7. Musical Identity / Christopher Hogwood; 8. Identity and the Mind. [REVIEW] In Giselle Walker & E. S. Leedham-Green (eds.), Identity. Cambridge University Press.
R. G. Swinburne (1973). Personal Identity. Proceedings of the Aristotelian Society 74:231 - 247.
Added to index2012-02-10
Total downloads40 ( #29,458 of 556,803 )
Recent downloads (6 months)6 ( #13,107 of 556,803 )
How can I increase my downloads?