Search results for 'Lesbians Identity' (try it on Scholar)

1000+ found
Sort by:
  1. Wendy Lynne Lee & Laura M. Dow (2001). Queering Ecological Feminism: Erotophobia, Commodification, Art, and Lesbian Identity. Ethics and the Environment 6 (2):1-21.score: 76.0
    : Utilizing examples from recent art, we critique Greta Gaard's argument that an inclusive ecofeminism must account for the role played by erotophobia in oppression. We suggest that while Gaard offers valuable insight into how fear of the erotic contributes to maintaining heteropatriarchal institutions, it fails to account for forms of oppression specific to lesbians. Moreover, Gaard's analysis unwittingly reinforces the conceptual, hence political, economic, and social invisibility of lesbians that, following Marilyn Frye, we argue is not merely (...)
    Direct download (5 more)  
     
    My bibliography  
     
    Export citation  
  2. Annamarie Jagose (1996). Queer Theory: An Introduction. New York University Press.score: 72.0
    "Annamarie Jagose knows that queer theory did not spring full-blown from the head of any contemporary theorist. It is the outcome of many different influences and sources, including the homophile movement, gay liberation, and lesbian feminism. In pointing to the history of queer theory-a history that all too often is ignored or elided-Jagose performs a valuable service." -Henry Abelove, co-editor of The Lesbian and Gay Studies Reader The political and academic appropriation of the term queer over the last several years (...)
     
    My bibliography  
     
    Export citation  
  3. Shane Phelan (ed.) (1997). Playing with Fire: Queer Politics, Queer Theories. Routledge.score: 72.0
    The last five years have witnessed the birth of a vibrant new group of young scholars who are writing about queer law, politics, and policy--topics which are no longer treated as of interest only to lesbians and gay men, but which now garner the attention of political theorists of all stripes. Playing With Fire --the first scholarly collection on queer politics by US political theorists--opens the intersection of lesbian and gay studies and political theory to a wide audience. It (...)
     
    My bibliography  
     
    Export citation  
  4. Barry O'Leary (2008). “We Cannot Claim Any Particular Knowledge of the Ways of Homosexuals, Still Less of Iranian Homosexuals …”: The Particular Problems Facing Those Who Seek Asylum on the Basis of Their Sexual Identity. [REVIEW] Feminist Legal Studies 16 (1):87-95.score: 66.0
    Many lesbians and gay men apply for asylum in the U.K. each year on the basis that they fear persecution in their home country because of their sexual orientation. The legal basis for claiming asylum on the ground of sexual identity is now well established. Nevertheless, making these claims remains very difficult for applicants. Western cultural expectations around sexual identity often mix with homophobic assumptions about sexual behaviour to present applicants as “not sufficiently gay”. Furthermore, applicants may (...)
    No categories
    Direct download (3 more)  
     
    My bibliography  
     
    Export citation  
  5. William B. Turner (2000). A Genealogy of Queer Theory. Temple University Press.score: 62.0
    As such, the book will interest readers of gay/lesbian/bisexual/transgender studies, intellectual history, political theory, and the history of gender/sexuality ...
    Direct download  
     
    My bibliography  
     
    Export citation  
  6. Wendy Lee-Lampshire (1999). Spilling All Over the "Wide Fields of Our Passions": Frye, Butler, Wittgenstein and the Context(s) of Attention, Intention and Identity (Or: From Arm Wrestling Duck to Abject Being to Lesbian Feminist). Hypatia 14 (3):1-16.score: 62.0
    : I argue for a Wittgensteinian reading of Judith Butler's performative conception of identity in light of Marilyn Frye's analysis of lesbian as nonexistent and Butler's analysis of abject. I suggest that the attempt to articulate a performative lesbian identity must take seriously the contexts within which abjection is vital to maintaining gender, exposing the intimate link between context and the formulation of intention, and shedding light on possible lesbian identities irreducible to abjection.
    Direct download (8 more)  
     
    My bibliography  
     
    Export citation  
  7. Steven Seidman (ed.) (1996). Queer Theory/Sociology. Blackwell.score: 60.0
    This book aims to productively engage the pioneering work of Queer theorists and point toe way towards a new sociological Queer studies.
    Direct download  
     
    My bibliography  
     
    Export citation  
  8. Lynne Alice & Lynne Star (eds.) (2004). Queer in Aotearoa New Zealand. Dunmore Press.score: 60.0
  9. Annamarie Jagose (1996). Queer Theory. Melbourne University Press.score: 60.0
  10. Jacquelyn N. Zita (1992). Male Lesbians and the Postmodernist Body. Hypatia 7 (4):106 - 127.score: 56.0
    This essay explores the criteria for lesbian identity attribution through the case study of "male lesbians": biological males who claim to be lesbians. I analyze such sex/gender identity attribution through the lens of postmodernism, which provides a workable theoretical framework for "male lesbian" identities. My conclusions explore the historicity and cultural constructedness of the body's sex/gender identities, revealing the limitations of both "the postmodernized body" and "the essentialized modernist body.".
    Direct download (5 more)  
     
    My bibliography  
     
    Export citation  
  11. A. Ferguson, Lesbian Identity - Beauvoir and History.score: 50.0
  12. Kristin G. Esterberg (1996). A Certain Swagger When I Walk: Performing Lesbian Identity. In Steven Seidman (ed.), Queer Theory/Sociology. Blackwell. 259--79.score: 50.0
    No categories
     
    My bibliography  
     
    Export citation  
  13. Biddy Martin (1992). Sexual Practice and Changing Lesbian Identities. In Michèle Barrett & Anne Phillips (eds.), Destabilizing Theory: Contemporary Feminist Debates. Stanford University Press. 93--119.score: 50.0
    No categories
     
    My bibliography  
     
    Export citation  
  14. Martha Vicinus (forthcoming). " They Wonder to Which Sex I Belong": The Historical Roots of the Modern Lesbian Identity. Feminist Studies.score: 50.0
    No categories
    Direct download  
     
    My bibliography  
     
    Export citation  
  15. Lois Pineau (1990). Shane Phelan, Identity Politics: Lesbian Feminism and the Limits of Community Reviewed By. Philosophy in Review 10 (10):423-427.score: 40.0
    No categories
    Direct download  
     
    My bibliography  
     
    Export citation  
  16. Andrea Kleinhuber (2000). The Politics of Identity in Lesbian and Gay Anthropology. Nexus 14 (1):5.score: 40.0
    No categories
    Direct download  
     
    My bibliography  
     
    Export citation  
  17. Anna Carastathis (2013). Identity Categories as Potential Coalitions. Signs 38 (4):941-965.score: 38.0
    Kimberlé Williams Crenshaw ends her landmark essay “Mapping the Margins: Intersectionality, Identity Politics, and Violence against Women of Color” with a normative claim about coalitions. She suggests that we should reconceptualize identity groups as “in fact coalitions,” or at least as “potential coalitions waiting to be formed.” In this essay, I explore this largely overlooked claim by combining philosophical analysis with archival research I conducted at the Gay, Lesbian, Bisexual and Transgender Historical Society Archive in San Francisco about (...)
    Direct download (2 more)  
     
    My bibliography  
     
    Export citation  
  18. David Bell & Gill Valentine (eds.) (1994). Mapping Desire: Geographies of Sexualities. Routledge.score: 38.0
    Discover the truth about sex in the city (and the country). Mapping Desire explores the places and spaces of sexuality from body to community, from the "cottage" to the Barrio, from Boston to Jakarta, from home to cyberspace. Mapping Desire is the first book to explore sexualities from a geographical perspective. The nature of place and notions of space are of increasing centrality to cultural and social theory. Mapping Desires presents the rich and diverse world of contemporary sexuality, exploring how (...)
    Direct download  
     
    My bibliography  
     
    Export citation  
  19. Linda Alcoff (ed.) (2006). Identity Politics Reconsidered. Palgrave Macmillan.score: 38.0
    Based on the ongoing work of the agenda-setting Future of Minority Studies national research project, Identity Politics Reconsidered reconceptualizes the scholarly and political significance of social identity. It focuses on the deployment of “identity” within ethnic-, women’s-, disability-, and gay and lesbian studies in order to stimulate discussion about issues that are simultaneously theoretical and practical, ranging from ethics and epistemology to political theory and pedagogical practice. This collection of powerful essays by both well-known and emerging scholars (...)
     
    My bibliography  
     
    Export citation  
  20. Claudia Card (1992). Lesbian Ethics and the Journal Lesbian Ethics: A Review. Hypatia 7 (4):207 - 211.score: 36.0
    Lesbian Ethics, a U.S. journal of lesbian culture, has offered highly readable philosophical essays, reviews, discussions, and other nonfiction since late 1984 (twelve issues to date). It provides a forum in which the meaning of "lesbian" takes shape from self concepts formed in cooperative interaction and thus lays the ground-work for lesbians becoming publicly recognized as the foremost interpreters of lesbian identity and history.
    Direct download (5 more)  
     
    My bibliography  
     
    Export citation  
  21. Naomi Scheman (1992). Jewish Lesbian Writing: A Review Essay. Hypatia 7 (4):186 - 194.score: 36.0
    Recent writing by Jewish lesbians is characterized by challenging and evocative reflection on themes of home and identity, family and choice, tradition and transformation. This essay is a personal journey through some of this writing. An exploration of the obvious and troubling tensions between lesbian or feminist and Jewish identities leads to the paradoxical but ultimately unsurprising suggestion that lesbian identity and eroticism can provide a route of return to and affirmation of Jewish identity.
    Direct download (5 more)  
     
    My bibliography  
     
    Export citation  
  22. Elizabethe Payne (2010). Sluts: Heteronormative Policing in the Stories of Lesbian Youth. Educational Studies 46 (3):317-336.score: 34.0
    The power of compulsory heterosexuality regulates the sexuality of adolescent lesbians as strongly as it does their heterosexual peers. Marked with a sexual(ized) identity, young Southern lesbians in this life history study made claim to moral high ground by consistently identifying with the hegemonic good girl construct and by participating in the naming of women whose sexual behavior demonstrated a disregard for the ?rules.? The good girl/bad girl, the virgin/slut binaries, played significant roles in their identity (...)
    Direct download (2 more)  
     
    My bibliography  
     
    Export citation  
  23. Elizabeth Victor (2013). Agency, Identity, and Narrative: Making Sense of the Self in Same-Sex Divorce. APA Newsletter on Philosophy and Lesbian, Gay, Bisexual, and Transgender Issues 12 (2):16-19.score: 30.0
  24. Ann Ferguson (1991). Sexual Democracy: Women, Oppression and Revolution. Westview.score: 30.0
    This is a book in feminist theory and social and political philosophy. Many of the chapters are versions of earlier papers published as journal articles and as book chapters. It presents a multi-systems theory of social domination, discussing three main ones: economic class, gender and (social) race. It presents a maerialist feminist theory of gender and sexuality and discusses lesbian identity as well as issues of motherhood.
     
    My bibliography  
     
    Export citation  
  25. Margaret A. Simons (1999). Beauvoir and The Second Sex: Feminism, Race, and the Origins of Existentialism. Rowman & Littlefield.score: 30.0
    In a compelling chronicle of her search to understand Beauvoir's philosophy in The Second Sex, Margaret A. Simons offers a unique perspective on Beauvoir's wide-ranging contribution to twentieth-century thought. She details the discovery of the origins of Beauvoir's existential philosophy in her handwritten diary from 1927; uncovers evidence of the sexist exclusion of Beauvoir from the philosophical canon; reveals evidence that the African-American writer Richard Wright provided Beauvoir with the theoretical model of oppression that she used in The Second Sex; (...)
    Direct download (2 more)  
     
    My bibliography  
     
    Export citation  
  26. Raquel Platero (2007). Love and the State: Gay Marriage in Spain. [REVIEW] Feminist Legal Studies 15 (3):329-340.score: 28.0
    On 30 June 2005, the Spanish Parliament approved Law 13/2005, which amends the Civil Code to permit same-sex marriage. This formal equality measure put Spain in the spotlight of the international media. It is the culmination of a series of developments spanning from the last years of the Franco regime (which ended in 1975), through the enactment of anti-discrimination measures in 1995, to the recent fight for kinship recognition. It also follows a recent shift, from 1998 to 2005, towards the (...)
    No categories
    Direct download (4 more)  
     
    My bibliography  
     
    Export citation  
  27. Simone Gozzano (2012). Type-Identity Conditions for Phenomenal Properties. In Simone Gozzano & Christopher S. Hill (eds.), New Perspective on Type Identity. The Mental and the Physical. Cambridge University Press. 111.score: 27.0
    In this essay I shall argue that the crucial assumptions of Kripke's argument, i.e. the collapse of the appearance/reality distinction in the case of phenomenal states and the idea of a qualitatively identical epistemic situation, imply an objective principle of identity for mental-state types. This principle, I shall argue, rather than being at odds with physicalism, is actually compatible with both the type-identity theory of the mind and Kripke's semantics and metaphysics. Finally, I shall sketch a version of (...)
    Direct download (4 more)  
     
    My bibliography  
     
    Export citation  
  28. Adam Henschke (2010). Did You Just Say What I Think You Said? Talking About Genes, Identity and Information. Identity in the Information Society 3 (3):435-456.score: 27.0
    Genetic information is becoming increasingly used in modern life, extending beyond medicine to familial history, forensics and more. Following this expansion of use, the effect of genetic information on people’s identity and ultimately people’s quality of life is being explored in a host of different disciplines. While a multidisciplinary approach is commendable and necessary, there is the potential for the multidisciplinarity to produce conceptual misconnection. That is, while experts in one field may understand their use of a term like (...)
    Direct download (11 more)  
     
    My bibliography  
     
    Export citation  
  29. Adrian Rahaman & Martina Angela Sasse (2010). A Framework for the Lived Experience of Identity. Identity in the Information Society 3 (3):605-638.score: 27.0
    This paper presents a framework for the design of human-centric identity management systems. Whilst many identity systems over the past few years have been labelled as human-centred, we argue that the term has been appropriated by technologists to claim moral superiority of their products, and by system owners who confuse administrative convenience with benefits for users. The framework for human-centred identity presented here identifies a set of design properties that can impact the lived experience of the individuals (...)
    Direct download (10 more)  
     
    My bibliography  
     
    Export citation  
  30. Vanessa Paz Dennen (2009). Constructing Academic Alter-Egos: Identity Issues in a Blog-Based Community. [REVIEW] Identity in the Information Society 2 (1):23-38.score: 27.0
    Choosing to interact with others in an online forum provides an opportunity for exploring one’s own identity. With each new group joined, a person must make decisions about self-presentation and react to an audience. Such decisions continue as social interactions occur and relationships develop. This paper discusses how bloggers who have affiliated with each other to form a loosely knit community develop largely pseudonymous identities along with norms surrounding the development and performance of identity. The study is ethnographic (...)
    Direct download (4 more)  
     
    My bibliography  
     
    Export citation  
  31. Colin Gavaghan (2010). A Whole New... You? 'Personal Identity', Emerging Technologies and the Law. Identity in the Information Society 3 (3):423-434.score: 27.0
    In this article, I argue that lawmakers must abandon their previous reluctance to engage with questions of personal identity (PI). While frequently seen as an esoteric subject, of limited interest outside of academic philosophy departments, I attempt to show that, in fact, assumptions about PI—and its durability in the face of certain psychological or genetic changes—underpin many current legal rules. This is most perhaps obviously exemplified with regard to reproductive technologies. Yet the Parfitian challenge to identify a victim of (...)
    Direct download (10 more)  
     
    My bibliography  
     
    Export citation  
  32. Thierry Nabeth (2009). Social Web and Identity: A Likely Encounter. [REVIEW] Identity in the Information Society 2 (1):1-5.score: 27.0
    The Web 2.0, with online social technologies such as social networking services, blogs, wikis, or microbloging, has brought the vision of the Internet as a social landscape in which people are engaged in a multitude of social activities. This editorial of the special issue ‘Social Web and Identity’ discusses the importance of identity in the context of the Social Web, introducing the different papers of this special issue and the different aspects associated to these online identities. The topics (...)
    Direct download (6 more)  
     
    My bibliography  
     
    Export citation  
  33. Hanna Krasnova, Oliver Günther, Sarah Spiekermann & Ksenia Koroleva (2009). Privacy Concerns and Identity in Online Social Networks. Identity in the Information Society 2 (1):39-63.score: 27.0
    Driven by privacy-related fears, users of Online Social Networks may start to reduce their network activities. This trend can have a negative impact on network sustainability and its business value. Nevertheless, very little is understood about the privacy-related concerns of users and the impact of those concerns on identity performance. To close this gap, we take a systematic view of user privacy concerns on such platforms. Based on insights from focus groups and an empirical study with 210 subjects, we (...)
    Direct download (6 more)  
     
    My bibliography  
     
    Export citation  
  34. Ernesto Schwartz-Marín & Irma Silva-Zolezzi (2010). “The Map of the Mexican's Genome”: Overlapping National Identity, and Population Genomics. [REVIEW] Identity in the Information Society 3 (3):489-514.score: 27.0
    This paper explores the intersections between national identity and the production of medical/population genomics in Mexico. The ongoing efforts to construct a Haplotype Map of Mexican genetic diversity offers a unique opportunity to illustrate and analyze the exchange between the historic-political narratives of nationalism, and the material culture of genomic science. Haplotypes are central actants in the search for medically significant SNP’s (single nucleotide polymorphisms), as well as powerful entities involved in the delimitation of ancestry, temporality and variability (www.hapmap.org). (...)
    Direct download (11 more)  
     
    My bibliography  
     
    Export citation  
  35. Giulio Galiero & Gabriele Giammatteo (2009). Trusting Third-Party Storage Providers for Holding Personal Information. A Context-Based Approach to Protect Identity-Related Data in Untrusted Domains. Identity in the Information Society 2 (2):99-114.score: 27.0
    The never ending growth of digital information and the availability of low-cost storage facilities and networks capacity is leading users towards moving their data to remote storage resources. Since users’ data often holds identity-related information, several privacy issues arise when data can be stored in untrusted domains. In addition digital identity management is becoming extremely complicated due to the identity replicas proliferation necessary to get authentication in different domains. GMail and Amazon Web Services, for instance, are two (...)
    Direct download (6 more)  
     
    My bibliography  
     
    Export citation  
  36. Tarvi Martens (2010). Electronic Identity Management in Estonia Between Market and State Governance. Identity in the Information Society 3 (1):213-233.score: 27.0
    The present paper summarizes the development of the national electronic Identity Management System (eIDMS) in Estonia according to a conceptual framework developed in an European comparative research project outlined in the first chapter of this special issue. Its main function is to amend the picture of the European eIDMS landscape by presenting a case with high involvement of the private sector and thereby checking the generalizations from the comparisons of Austria, Belgium, Germany and Spain, presented by Kubicek and Noack (...)
    Direct download (6 more)  
     
    My bibliography  
     
    Export citation  
  37. D. Barnard-Wills & D. Ashenden (2010). Public Sector Engagement with Online Identity Management. Identity in the Information Society 3 (3):657-674.score: 27.0
    The individual management of online identity, as part of a wider politics of personal information, privacy, and dataveillance, is an area where public policy is developing and where the public sector attempts to intervene. This paper attempts to understand the strategies and methods through which the UK government and public sector is engaging in online identity management. The analysis is framed by the analytics of government (Dean 2010) and governmentality (Miller and Rose 2008). This approach draws attention to (...)
    Direct download (10 more)  
     
    My bibliography  
     
    Export citation  
  38. Teemu Rissanen (2010). Electronic Identity in Finland: ID Cards Vs. Bank IDs. [REVIEW] Identity in the Information Society 3 (1):175-194.score: 27.0
    This chapter describes the introduction and diffusion of the Finnish Electronic Identity Card (FINEID card). FINEID establishes an electronic identity (eID), based on the civil registry and placed on an identity chip card issued by Finnish government to Finnish citizens and permanent residents from age 18 and older. It is a non-mandatory electronic identity card introduced in 1999 in order to replace the older citizen ID card. It serves as a travel document and is intended to (...)
    Direct download (6 more)  
     
    My bibliography  
     
    Export citation  
  39. Hidehito Gomi (2010). A Persistent Data Tracking Mechanism for User-Centric Identity Governance. Identity in the Information Society 3 (3):639-656.score: 27.0
    Identity governance is an emerging concept for fine-grained conditional disclosure of identity information and enforcement of corresponding data handling policies. Although numerous technologies underlying identity management have been developed, people still have difficulty obtaining a clear picture of how their identity information is maintained, used, and propagated. An identity management framework is described for tracking the history of how a person’s identity information is handled after it is transferred across domains of control and for (...)
    Direct download (9 more)  
     
    My bibliography  
     
    Export citation  
  40. Theodora Varvarigou & Vassiliki Andronikou (2009). Identity Management in GRID Computing and Service Oriented Architectures: Research and Practice. [REVIEW] Identity in the Information Society 2 (2):95-98.score: 27.0
    Today, Service-Oriented Architecture (SOA) and Grid and Cloud computing comprise the key technologies in distributed systems. In systems following the SOA approach, functionalities are delivered and consumed as services. Given the variety of resources (i.e. data, computing capabilities, applications, etc) as well as the variation of user-requested Quality of Service (e.g., high performance, fast access, low cost, high media resolution, etc), there is a need for advanced user management, trust establishment and service management mechanisms which adjust, monitor and evaluate service (...)
    Direct download (6 more)  
     
    My bibliography  
     
    Export citation  
  41. Matteo Gaeta, Juergen Jaehnert, Kleopatra Konstanteli, Sergio Miranda, Pierluigi Ritrovato & Theodora Varvarigou (2009). Federated Identity Management in Mobile Dynamic Virtual Organizations. Identity in the Information Society 2 (2):115-136.score: 27.0
    Over the past few years, the Virtual Organization (VO) paradigm has been emerging as an ideal solution to support collaboration among globally distributed entities (individuals and/or organizations). However, due to rapid technological and societal changes, there has also been an astonishing growth in technologies and services for mobile users. This has opened up new collaborative scenarios where the same participant can access the VO from different locations and mobility becomes a key issue for users and services. The nomadicity and mobility (...)
    Direct download (6 more)  
     
    My bibliography  
     
    Export citation  
  42. Ian Angell (2008). As I See It: Enclosing Identity. [REVIEW] Identity in the Information Society 1 (1):23-37.score: 27.0
    This article claims that an ‘enclosure of the commons’ is underway, which reaches far beyond intellectual property, to a point where, through profiling, ‘identity’ has itself become enclosed property that can be owned by another. With a detour through the natures of both money and innovation, this paper looks at the imperative driving ‘intellectual property rights.’ By introducing the notion of biopiracy, it shows how ‘invasion of privacy’ is justified, and ends with “a world of rapacious, state-aided ‘privatization’” of (...)
    Direct download (4 more)  
     
    My bibliography  
     
    Export citation  
  43. Lothar Fritsch, Kristin Skeide Fuglerud & Ivar Solheim (2010). Towards Inclusive Identity Management. Identity in the Information Society 3 (3):515-538.score: 27.0
    The article argues for a shift of perspective in identity management (IDM) research and development. Accessibility and usability issues affect identity management to such an extent that they demand a reframing and reformulation of basic designs and requirements of modern identity management systems. The rationale for the traditional design of identity management systems and mechanisms has been security concerns as defined in the field of security engineering. By default the highest security level has been recommended and (...)
    Direct download (8 more)  
     
    My bibliography  
     
    Export citation  
  44. Ruth Halperin & James Backhouse (2008). A Roadmap for Research on Identity in the Information Society. Identity in the Information Society 1 (1):71-87.score: 27.0
    As research into identity in the information society gets into its stride, with contributions from many scholarly disciplines such as technology, social sciences, the humanities and the law, a moment of intellectual stocktaking seems appropriate. This article seeks to provide a roadmap of research currently undertaken in the field of identity and identity management showing how the area is developing and how disparate contributions relate to each other. Five different perspectives are proposed through which work in the (...)
    Direct download (4 more)  
     
    My bibliography  
     
    Export citation  
  45. David Murakami Wood & Rodrigo Firmino (2009). Empowerment or Repression? Opening Up Questions of Identification and Surveillance in Brazil Through a Case of 'Identity Fraud'. Identity in the Information Society 2 (3):297-317.score: 27.0
    A real but typical case of identity fraud is used to open up the complex web of identification systems in Brazil. It is argued that identification has two poles related to the nature of citizenship—repression and inclusion—and that reactions from citizens to new identification schemes can be attributed to how they view the purpose of the cards in these terms. In Brazil, a sense of inclusion and citizenship based on a fear of anonymity and exclusion predominates leading to widespread (...)
    Direct download (5 more)  
     
    My bibliography  
     
    Export citation  
  46. Andrea J. Baker (2009). Mick or Keith: Blended Identity of Online Rock Fans. [REVIEW] Identity in the Information Society 2 (1):7-21.score: 27.0
    This paper discusses the “blended identity” of online rock fans to show that the standard dichotomy between anonymous and real life personas is an inadequate description of self-presentation in online communities. Using data from an ethnographic, exploratory study of an online community and comparison groups including interviews, an online questionnaire, fan discussion boards, and participant/observation, the research analyzes fan identity online and then offline. Rolling Stones fans often adopt names that illustrate their allegiance to the band, along with (...)
    Direct download (4 more)  
     
    My bibliography  
     
    Export citation  
  47. David G. W. Birch (2008). Psychic ID: A Blueprint for a Modern National Identity Scheme. [REVIEW] Identity in the Information Society 1 (1):189-201.score: 27.0
    The issue of identity cards is hotly debated in many countries, but it often seems to be an oddly backward-looking debate that presumes outdated “Orwellian” architectures. In the modern world, surely we should be debating the requirements for national identity management schemes, in which identity cards may or may not be a useful implementation, before we move on to architecture. If so, then, what should a U.K. national identity management scheme for the 21st century look like? (...)
    Direct download (3 more)  
     
    My bibliography  
     
    Export citation  
  48. Sébastien Canard, Eric Malville & Jacques Traoré (2009). A Client-Side Approach for Privacy-Preserving Identity Federation. Identity in the Information Society 2 (3):269-295.score: 27.0
    Providing Single Sign-On (SSO) between service providers and enabling service providers to share user personal attributes are critical for both users to benefit from a seamless access to their services, and service providers to realize new business opportunities. Today, however, the users have several independent, partial identities spread over different service providers. Providing SSO and attribute sharing requires that links (federations) are established between (partial) identities. In SAML 2.0 (Maler et al. 2003), the links between identities are stored and managed (...)
    Direct download (4 more)  
     
    My bibliography  
     
    Export citation  
  49. Åke Grönlund (2010). Electronic Identity Management in Sweden: Governance of a Market Approach. [REVIEW] Identity in the Information Society 3 (1):195-211.score: 25.0
    This paper reviews the history and current status of electronic identities (eID) and eID management in Sweden, including an outlook for the future. The paper is based on official policy documents, technical documentation, presentations by key experts, and comments from government agencies and independent experts. The future perspective is based on the October 2009 public investigation (SOU 2009:86) by the E-delegation. It is concluded that the E-delegation proposal, while still pending political decision, is a major step forward in terms of (...)
    Direct download (6 more)  
     
    My bibliography  
     
    Export citation  
  50. James Giles (1993). The No-Self Theory: Hume, Buddhism, and Personal Identity. Philosophy East and West 43 (2):175-200.score: 24.0
    The problem of personal identity is often said to be one of accounting for what it is that gives persons their identity over time. However, once the problem has been construed in these terms, it is plain that too much has already been assumed. For what has been assumed is just that persons do have an identity. A new interpretation of Hume's no-self theory is put forward by arguing for an eliminative rather than a reductive view of (...)
    Direct download (5 more)  
     
    My bibliography  
     
    Export citation  
1 — 50 / 1000