scholarly journals Identity

M/C Journal ◽  
1998 ◽  
Vol 1 (3) ◽  
Author(s):  
Felicity Meakins

Identity is two-faced. In fact, identity is many-faced. Since the work of Goffman on the theory of face, we have come to recognise the flucuating and diverse nature of our identities. Context has become highly relevant. In my own experience, my identity adjusts to various social situations and people. One moment, I am a linguistics student paying more attention to how people speak than to what they are saying -- a tactic guaranteed to irritate the imperturbable. In this face, I frequent the library at lunchtime only to emerge lugging a pile of books and periodicals. The next moment I find myself wearing dresses (well, occasionally) and lipstick, frolicking about the Arts scene feigning an air of infinite wisdom about some obscurity or other. Finally, I don the baggies, yellow glasses and an air of cool unconcern as I sit on my bike at the top of a steep drop-off, contemplating the promise of blood, mud, scars and facial reconstructions. In all these guises, I expend great energy ensuring that various friends only see one of these faces, adjusting my appearance and language accordingly. Mixed parties, of course, present an ultimate dilemma -- which face will I reveal this time!? Of course, this fluidity of face shift is not merely a personality quirk. We all constantly adopt different faces, depending on particular social contexts. We dress differently, adjust the modulation of our voices, and skillfully change the topics of our conversations as we interact in our changing environments. We are not merely two-faced, but many-faced. In this issue of M/C, the writers pull on their 'social commentator' faces to deal with various aspects of identity. M/C guest writer Jonathan Lillie takes a constructionist approach to identity, considering Manuel Castells's idea of a collective identity. He highlights problems with models which fail to identify the individual within the mass, proposing that even within an identity constructed by the dominant instutions, a person may adopt some aspects of a resistance identity. Lillie recognises the Internet as an ideal outlet for resistance identities. Continuing with the Internet theme, Axel Bruns discusses the display of personal identity within the Internet community. He describes how the disembodied nature of online identity means that some form of outside feedback to the presentation of individual personality is needed to realise a user's identity. The effect of this phenomenon is, Bruns suggests, that in computer-mediated communication the Cartesian 'cogito ergo sum' must be rephrased. Adam Dodd looks at computer fighting games and the transfer of player identity onto the characters onscreen. He suggests that in this projection, we demonstrate a willingness to forget ourselves and become an arrangement of coloured lights, happily turning our friends into quivering bloody masses. Linguistically, we can't separate the "I" at the controller from the "I" onscreen. Yet Dodd believes that we still never fail to distinguish between the violence of the computer microworld and that of everyday 'reality'. P. David Marshall considers the confession and its relationship to the self, suggesting that while confession demands an audience, the protestant reformations of self internalised this audience. However, Marshall believes that this audience has recently re-emerged in television programmes such as Ricki Lake, which he dubs the 'public confessional' of television talkshows. This type of confession is exemplified with his own confession concerning a Pat Rafter obsession. Also writing on identity and confession, Heather Wolffram examines the motives behind the current "scholarly striptease", proposing that academics are revealing their identities to vindicate their politics. Adrienne Rich is one academic rejecting the shroud of objectivity, identifying herself as a lesbian in order to speak with more authority on the subject. Wolffram also describes the self-promotion factor of these public confessions. Nick Caldwell turns the focus to a very different kind of assumption of identity. He observes that with the advent of sufficient processor power, many computer users are now using their machines to take on the look and feel of older home computers from a time before Microsoft established its stranglehold on the market. The reason behind this phenomenon, Caldwell offers, is not so much a nostalgia for the good old days, but the desire for computers with an identity beyond the slick and soulless design of Windows. Finally, Kirsty Leishman also looks at an area of rebellion against the mainstream. Taking her cue from a recent newsgroup debate, she reviews the adolescent nature of zines -- publications on the low- and no-budget end of the market. By nature, she finds, zines are both revolutionary in their questioning of institutional publishing industry wisdom, and evolutionary in their aim to develop the zine medium as well as the individual identities of their creators -- qualities which are also at the very heart of the adolescent quest for personal identity. As you can see, cultural criticism has approached problems of identity from many angles. So please slip on your critical reader face, and send us your comments on any of these articles! Citation reference for this article MLA style: Felicity Meakins. "Editorial: 'Identity'." M/C: A Journal of Media and Culture 1.3 (1998). [your date of access] <http://www.uq.edu.au/mc/9810/edit.php>. Chicago style: Felicity Meakins, "Editorial: 'Identity'," M/C: A Journal of Media and Culture 1, no. 3 (1998), <http://www.uq.edu.au/mc/9810/edit.php> ([your date of access]). APA style: Felicity Meakins. (199x) Editorial: 'identity'. M/C: A Journal of Media and Culture 1(3). <http://www.uq.edu.au/mc/9810/edit.php> ([your date of access]).

Author(s):  
Annisa Nur Muslimah Koswara

AbstractInformation and Communication Technology facilitates to accsess global information thorugh internet. This facility is indicated to increase growth of plagiarism actions. Asosiasi Penyelenggara Jasa Internet Indonesia (APJI) survey has published that the penetration of using internet Indonesia increase about 132,7 millons and 69,8% using by students in 2016. This research is purposed to find out and measure the strength of influence on easily accesing informastion through internet to the tendency of plagiarism action in student. This research is based on computer mediated communication theory consequently this research examine 3 (three) variables, indenpendent variables (the easiness of accessing information through internet), dependent variables (the tendency of plagiarim actions in writing scientifi papers, and interverning variabel (the social contexts of students). This method uses quantitative method and regression analyze tehnic. Then this method uses propotional strata sampling technic, so this research sample about 55 students. This research result verifies the influence power of easiness accessing information to the tendency of plagiarism action in students is weakness about 19.9%. This result happens because of interverning variable (student social contexts). In this result, we can say that the sophisticated of communication and information technology not directly present implications toward negative actions because the individual which determine to use this techologies.AbstrakKehadiran teknologi komunikasi dan informatika, semakin memudahkan akses informasi global melalui internet. Kemudahan ini disinyalir bisa menyuburkan praktik-praktik plagiarisme. Sementara penetrasi penggunaan internet Indonesia berdasarkan hasil survei Asosiasi Penyelenggara Jasa Internet Indonesia (APJI) 2016 menunjukan peningkatan sebesar 132,7 Juta dan 69,8% dimanfaatkan oleh pelajar. Tujuan penelitian ini untuk mengetahui dan mengukur seberapa kuat pengaruh kemudahan akses informasi melalui internet terhadap tindakan plagiarisme dalam penulisan karya tulis di kalangan pelajar. Penelitian ini mengacu pada teori computer mediated communication sehingga terdapat 3 (tiga) variabel, yaitu variabel independen : kemudahan akses informasi melalui internet, variabel dependen : kecenderungan tindakan plagiarisme dalam penulisan karya tulis, dan variabel interverning : konteks sosial pelajar. Metode penelitian ini mengunakan metode kuantitatif dengan teknik analisis regresi linier berganda. Penelitian ini mengunakan teknik sampling strata proposional, sampel penelitian ini berjumlah 55 pelajar. Hasil penelitian ini menunjukan bahwa terdapat pengaruh langsung yang signifikan antara kemudahan mengakses informasi digital melalui internet dengan kecenderungan tindakan plagiarisme, tapi lemah sebesar 19.9%. Hal ini dikarenakan adanya variabel interverning yang perlu diperhatikan. Variabel interverning itu adalah konteks sosial pelajar. Dengan demikian, dapat dikatakan bahwa kehadiran teknologi informasi dan komunikasi yang mutakhir tidak serta merta secara langsung berimplikasi pada tindakan-tindakan negatif karena individu yang menentukan penggunaan teknologi-teknologi tersebut.


Author(s):  
Jakub Čapek ◽  
Sophie Loidolt

AbstractThis special issue addresses the debate on personal identity from a phenomenological viewpoint, especially contemporary phenomenological research on selfhood. In the introduction, we first offer a brief survey of the various classic questions related to personal identity according to Locke’s initial proposal and sketch out key concepts and distinctions of the debate that came after Locke. We then characterize the types of approach represented by post-Hegelian, German and French philosophies of the nineteenth and twentieth centuries. We argue that whereas the Anglophone debates on personal identity were initially formed by the persistence question and the characterization question, the “Continental” tradition included remarkably intense debates on the individual or the self as being unique or “concrete,” deeply temporal and—as claimed by some philosophers, like Sartre and Foucault—unable to have any identity, if not one externally imposed. We describe the Continental line of thinking about the “self” as a reply and an adjustment to the post-Lockean “personal identity” question (as suggested by thinkers such as MacIntyre, Ricœur and Taylor). These observations constitute the backdrop for our presentation of phenomenological approaches to personal identity. These approaches run along three lines: (a) debates on the layers of the self, starting from embodiment and the minimal self and running all the way to the full-fledged concept of person; (b) questions of temporal becoming, change and stability, as illustrated, for instance, by aging or transformative life-experiences; and (c) the constitution of identity in the social, institutional, and normative space. The introduction thus establishes a structure for locating and connecting the different contributions in our special issue, which, as an ensemble, represent a strong and differentiated contribution to the debate on personal identity from a phenomenological perspective.


2021 ◽  
Author(s):  
Georgia Marie Metcalfe

Computer mediated communication (CMC) is becoming increasingly prevalent and relied upon as the Internet facilitates the rapid growth of global networks and expands communication boarders. Today, many individuals rely on CMC for professional purposes, such as connecting long distance with co-workers to collaborate and advance workplace tasks. These individuals often rely on professional online collaborative programs that allow them to connect with colleagues across cities, provinces, and around the world. Relying on CMC for the transmittal of important electronic messages places it at the forefront for understanding how technical communication devices and networks function. This also requires an understanding of how ambiguity with online conversations can be decreased through the use of the Internet. However, what professional collaborative programs currently lack is a singular professional software that integrates both collaborative on-screen practices and online chatting capabilities with visual icons; or professional emoticons. The following research aims to investigate the communicative value of emoticons within a structured sentence via a study involving professional communication graduate students from Ryerson University and senior marketing communication professionals from a marketing agency in Toronto, Canada. Using concepts from critical visual methodology and a theoretical framework of visual semiotics, emoticons will be examined to see whether or not these pictorial symbols act in a similar fashion to punctuation symbols within a given sentence structure. The goal of this research was to investigate the use and meaning derived from emoticons in relation to grammatical punctuation for sentence structures in online communication environments. Specific emoticons were selected and used to measure participants‘ interpretation of each symbol within the particular context of a given sentence.


1998 ◽  
Vol 3 (3) ◽  
pp. 21-33 ◽  
Author(s):  
Thomas Kvan ◽  
Robert West ◽  
Alonso H. Vera

This paper proposes a methodology to evaluate the effects of computer-mediated communication on collaboratively solving design problems. When setting up a virtual design community, choices must be made between a variety of tools, choices dictated by budget, bandwidth, ability and availability. How do you choose between the tools, which is useful and how will each affect the outcome of the design exchanges you plan? A commonly used method is to analyze the work done and to identify tools which support this type of work. In general, research on the effects of computer-mediation on collaborative work has concentrated mainly on social-psychological factors such as deindividuation and attitude polarization, and used qualitative methods. In contrast, we propose to examine the process of collaboration itself, focusing on separating those component processes which primarily involve individual work from those that involve genuine interaction. Extending the cognitive metaphor of the brain as a computer, we view collaboration in terms of a network process, and examine issues of control, coordination, and delegation to separate sub-processors. Through this methodology we attempt to separate the individual problem-solving component from the larger process of collaboration. There is a long history of research into the role and application of computers to communication and collaboration from which has arisen a variety of tools to facilitate work done in groups. Holtham (1994) traces this history from the 1960s through to the 1990s, from addressing basic issues of computer communication through commercial implementation and diversified applications of the tools. Little of this research has focused on the work of designers, with no commercial systems available specifically for the design professions. Research has tended instead to look at typical office work, with particular attention to group work in formal and informal but coherent groups. This research provides a rich and useful heritage for investigations of design collaboration, but the findings have to be interpreted with the recognition that design work differs from typical office work in one substantial aspect � the use of graphics is central to design communication and this places a significant and different burden on the computer-supported communication when compared to textual interactions.


Author(s):  
Adam N. Joinson ◽  
Carina B. Paine

This article examines the extant research literature on self-disclosure and the Internet, in particular by focusing on disclosure in computer-mediated communication and web-based forms – both in surveys and in e-commerce applications. It also considers the links between privacy and self-disclosure, and the unique challenges (and opportunities) that the Internet poses for the protection of privacy. Finally, the article proposes three critical issues that unite the ways in which we can best understand the links between privacy, self-disclosure, and new technology: trust and vulnerability, costs and benefits, and control over personal information. Central to the discussion is the notion that self-disclosure is not simply the outcome of a communication encounter: rather, it is both a product and process of interaction, as well as a way of regulating interaction dynamically. By adopting a privacy approach to understanding disclosure online, it becomes possible to consider not only media effects that encourage disclosure, but also the wider context and implications of such communicative behaviours.


2013 ◽  
pp. 198-223
Author(s):  
Darren D. Chadwick ◽  
Chris Fullwood ◽  
Caroline J. Wesson

This chapter provides insight into the nature of online engagement by people with intellectual disabilities, the extent and quality of this engagement in terms of the access that people have, and how people with intellectual disabilities present themselves in the online world. The authors of this chapter provide an overview of the extant literature on intellectual disability, identity, and the Internet. The chapter begins by outlining issues around Internet use and access by people with intellectual disabilities, including potential barriers. It then moves on to address online behaviour and the potential benefits of Internet use for people with intellectual disabilities. The chief focus of the chapter follows, describing the manner in which computer mediated communication affects how people with intellectual disabilities present themselves in the online world as well as considering the role that family members and supporters play in the development and management of people’s online identities. Finally, the chapter introduces future directions for research into intellectual disability, identity, and the Internet.


Author(s):  
Helen Joanne Wall ◽  
Linda K. Kaye

The growth in computer-mediated communication has created real challenges for society; in particular, the internet has become an important resource for “convincing” or persuading a person to make a decision. From a cybersecurity perspective, online attempts to persuade someone to make a decision has implications for the radicalisation of individuals. This chapter reviews multiple definitions and theories relating to decision making to consider the applicability of these to online decision making in areas such as buying behaviour, social engineering, and radicalisation. Research investigating online decision making is outlined and the point is made that research examining online research has a different focus than research exploring online decision making. The chapter concludes with some key questions for scholars and practitioners. In particular, it is noted that online decision making cannot be explained by one single model, as none is sufficient in its own capacity to underpin all forms of online behaviour.


2012 ◽  
pp. 944-959 ◽  
Author(s):  
Stepan Konecny

Mass media often presents a warped image of the Internet as an unreliable environment in which nobody can be trusted. In this entry, the authors describe lying on the Internet both in the context of lying in the real world and with respect to the special properties of computer-mediated communication (CMC). They deal with the most frequent motives for lying online, such as increasing one’s attractiveness or experimenting with identities. They also take into account the various environments of the Internet and their individual effects on various properties of lying. The current methods for detecting lies and the potential for future computer-linguistic analysis of hints for lying in electronic communication are also considered.


Author(s):  
Darren D. Chadwick ◽  
Chris Fullwood ◽  
Caroline J. Wesson

This chapter provides insight into the nature of online engagement by people with intellectual disabilities, the extent and quality of this engagement in terms of the access that people have, and how people with intellectual disabilities present themselves in the online world. The authors of this chapter provide an overview of the extant literature on intellectual disability, identity, and the Internet. The chapter begins by outlining issues around Internet use and access by people with intellectual disabilities, including potential barriers. It then moves on to address online behaviour and the potential benefits of Internet use for people with intellectual disabilities. The chief focus of the chapter follows, describing the manner in which computer mediated communication affects how people with intellectual disabilities present themselves in the online world as well as considering the role that family members and supporters play in the development and management of people’s online identities. Finally, the chapter introduces future directions for research into intellectual disability, identity, and the Internet.


Author(s):  
Robert Andrew Dunn

Modern identity has been shaped by technology, which has in turn shaped theories in understanding identity. How one communicates who they are to others is given limitless possibilities by the advent of the Internet and computer-mediated environments. Thus, identity theory today must take into account computer-mediated communication theory and research. Such research indicates four ways in which identity is affected by technology. First, researchers have discussed the differences between an individual’s true identity and the virtual identity he or she presents, via self-selected text and images, to an online world. Second, researchers have discussed how the Internet can provide both protective anonymity for those who seek it and cathartic disclosure for those who need it. Third, researchers have discussed ways in which users pursue both reflective virtual lives online and role-play with identities, often multiple identities. Fourth, researchers have conducted experiments that reflect the impact that virtual identity has on the practice of communication and the impact communication has on the presentation of the self.


Sign in / Sign up

Export Citation Format

Share Document