So who am I really? Personal identity in the age of the Internet

AI and Society 28 (1):15-20 (2013)
Abstract
The Internet has become a field of dragon teeth for a person’s identity. It has made it possible for your identity to be mistaken by a credit agency, spied on by the government, foolishly exposed by yourself, pilloried by an enemy, pounded by a bully, or stolen by a criminal. These harms to one’s integrity could be inflicted in the past, but information technology has multiplied and aggravated such injuries. They have not gone unnoticed and are widely bemoaned and discussed. The government and private watchdogs are working to protect the identity of citizens though at least in the United States both the government and individuals all too often side with prosperity when it conflicts with privacy. Still, these information-technological threats to identity have been recognized and can be reasonably met through legislation, regulation, and discretion. There is another kind of danger to our identity that is more difficult to define and to meet, for it has no familiar predecessors, has no criminal aspects, and exhibits no sharp moral or cultural contours. Still that threat to our identity haunts us constantly and surfaces occasionally in conversations and the media. It makes us feel displaced, distracted, and fragmented at the very times when to all appearances we seem to be connected, busy, and energetic. At the same time, the culture of technology, and of information technology particularly, has opened up fields of diversity and contingency that invite us to comprehend our identities in newly responsible, intricate, and open-minded ways.
Keywords Internet  Personal identity  Suger of St. Denis  European Enlightenment  Kantian autonomy  Cyber space
Categories (categorize this paper)
Options
 Save to my reading list
Follow the author(s)
My bibliography
Export citation
Find it on Scholar
Edit this record
Mark as duplicate
Revision history Request removal from index
 
Download options
PhilPapers Archive


Upload a copy of this paper     Check publisher's policy on self-archival     Papers currently archived: 11,018
External links
Setup an account with your affiliations in order to access resources via your University's proxy server
Configure custom proxy (use this if your affiliation does not provide a proxy)
Through your library
References found in this work BETA

No references found.

Citations of this work BETA

No citations found.

Similar books and articles
Raffaele Rodogno (2012). Personal Identity Online. Philosophy and Technology 25 (3):309-328.
Steve Matthews (2008). Identity and Information Technology. In Jeroen den Hoven John Weckervant (ed.), Moral Philosophy and Information Technology. Cambridge University Press. 142.
Amartya Sen (2009). The Fog of Identity. Politics, Philosophy and Economics 8 (3):285-288.
Marya Schechtman (2010). Memory and Identity. Philosophical Studies 153 (1):65-79.
Jean-Yves Beziau (1996). Identity, Structure and Logic. Bulletin of the Section of Logic 25:89-9.
R. G. Swinburne (1973). Personal Identity. Proceedings of the Aristotelian Society 74:231 - 247.
Analytics

Monthly downloads

Added to index

2012-02-10

Total downloads

60 ( #25,238 of 1,100,912 )

Recent downloads (6 months)

14 ( #12,310 of 1,100,912 )

How can I increase my downloads?

My notes
Sign in to use this feature


Discussion
Start a new thread
Order:
There  are no threads in this forum
Nothing in this forum yet.