Thursday, December 13, 2007

eassy

Name:Chan Man Ka, Misa Student no:1093200
Online identities and communities
Who am I? Is this real? What does it all mean? These not just a questions that a philosophy professor might use to challenge their students. They're also the problem everyone faces in the cyberspace.

Should you use your real identity in your online discussion groups, blogs, or instant messages? Or should you manufacture a false ID?In Cyberspace, there is no face-to-face contact; it has opened up previously unimagined possibilies for communication between individuals and “communities”. Such communication had an impact upon how we view ourselves and others, and has forced a re-evaluation of what “communication”, “community” and “identity” mean. There are different kinds of online context, such as blog, Internet forum, massively multi player online games.

In face-to-face interaction an individual’s physical characteristic from skin color to vocal pattern, help convey racial identity. Lacking such physical cues on computer network, one might predict that discrimination on the basic of race, age, gender, sexuality, class status and group membership would disappear. Indeed, some participants use the lack of physical cues to claim any identity they want. In online interactions, participants are reduced to textual resources. It is difficult to recognize people’s identity, so people usually pick more elements such as cultural resources to construct their identity and to pull off discourse. In this essay, I would like to talk about how people construct their self- identities through their personal blog.

I took personal blog as an example, while blogs have become more and more popular. Nowadays these online blog allow people to create their online identity. All people can free to sign in and create a blog on a certain website, such as Livejournal, Xanga, and Blogger. Users are free to post whatever they would like after they have created an account for themselves. Creating an online identity is very easy. Through the internet, people can become whoever he likes to be. Some people will like to use their real name so other people can easy to recognize who they are and if they are reading their blog. But many people are likely to choose to use a fake name to protect their personal information. However, it is easy for people to post a lot of personal facts while blogging. An individual can be as open about information as they wish, but some may hide behind their blogs as strangers will not know the difference. Pseudonym allows users to hide their identities online, but it still lets them to build up their reputation with their username. Users can hide behind their computers saying whatever it is they want to say with little consequences. These days it is easy to maintain blogs and by doing so one is creating an online identity for themselves whether intentional or no.

In these essays, 8 Xanga weblogs are chosen for presenting the analysis. I would focus on different elements in their weblogs for the analysis to show that how people constructing their identities, and pull off Discourse. I will divided into 4 groups, such as University graduates, PolyU Dance Society members,
Secondary students and others.

First, let talk about the university graduates. They try to build up their online identities by showing their personal information. Such as their Profile, by decorating their weblogs, such as the Photos, by showing their interests in the weblogs, such as the Content and Blogrings joined and by using their “language”, such as Professional terms and Foul language.


1. Name: Archie
Gender: Male
Age: 23
Education: Computer Engineering (CUHK fresh graduate)
http://www.xanga.com/SolitArchie

In Archie Xanga, he said that he go to a company to had an interview, the staff ask him, “You are from a securities company, so what did u do? Security guard? It's totally different from System Specialists.” He criticizes the staff and said in his blog, “Her intonation shows that she acutually thought so...” “That’s Bitch, how come she cannot distinguish the securities Limited and security. Shit!!!!!!!!””

2. Name: Ming Lai
Gender: Female
Age: 22
Education: Psychology (CUHK fresh graduate)
http://www.xanga.com/minicheers

She said that in her blog “ I have a master interview in CUHK, this interview is too easy for me and I can give fluent replies, so I can receive the first round offer within one week. “
“I have receive the Japanese language examination result, the result is 85+65+171=321/400, the examination is difficult, but I still can get over 300 marks, over 80%!!!!!” by Ming Lai.

These two universities graduates, they are playing a particular identity card, and through their language and words, they wish others to see them as more superior, they are highly educated. Their photo also show that they are university graduates.
E.g. Archie is stereotyping the graduates from Youth Pre-employment training program by said that “during the group discussion part, my group member is come from Youth Pre-employment training program; he employed the admin assistant, office boy. I don’t know why they will arrange a From.5 student in the same group with me? Shit! This guy English…..Shit!!! He even cannot speak a complete sentence. Waste my time!!!!!!”

Archie and Ming lai are made a powerful new territory by using foul language,
They are try to repudiate the common impressions of the some people towards the university students/graduates, people will think that a university students , they all are highly educated , they should not use foul language. They try to challenge this norm and create new identities and culture change. Different identities can be contradictory and seemingly impossible. It is ironic that Archie wishes others to recognize him as a highly educated person, at the same time, he shows a “rebel” identity.
Discourse
Through the Cultural resources they drawn in constructing their identities and pull off a discourse: Language + Profile + Photos + Content + Blogrings joined + Comments leave by others (identities and behaviours are recognized) = Discourse. It show that Archie and Ming Lai is in power. In opposite, people who are not belong to their group or those who possess lower educational level are being marginalized.

Secondly, I would like to talk about another group, the PolyU Dance Society members. They try to construct their online identities by decorating their weblogs, such as Icons and Pictures, Color and Background. By showing their interests in the weblogs, such as Photos and Blogrings joined By using their own words. Such as use particular “language” to communicate with their groups.
1. Name: Roberta
Gender: Female
Age: 21
Education: PolyU
http://www.xanga.com/robertashum




2. Name: Rinkee
Gender: Female
Age: 19
Education: Texiles and Clothing (PolyU)
http://www.xanga.com/rinkybao


Poly U Dance society members using their own words, such as Mark dance, flat out, Front back, these words only they understand, while other people don’t understand. Also, they post a lot of their team photo and use some fast-beat dance song as background music. All these things can show their team spirit. They want to demonstrate their membership of a particular group; they are member s of Dance society. They used the cultural recourses to exclude outsiders.

Discourse
Through Cultural resources PolyU dance society drawn in constructing their identities and pull off a discourse: Language( Mark dance, flat out) + Profile + Photos (female) + Content + Team spirit + Blogrings joined + Comments leave by their friends (identities and behaviours are recognized)= Discourse

In this case, dance society members are in power, they are using the particular language to communicate with their members. All of the “non-dance society member” are marginalized. People not in the group may not know what happen or not understand through reading their diaries.

Thirdly, let us talk about the secondary students, they would like to construct their online identities, by decorating their weblogs, such as Icons and pictures, using vivid color and colorful background. By showing their interests in the weblogs, such as the Brand name and the cartoons they like. And by using their own words, they will use the particular “language” to communicate with their groups. Such as they like to use the double words (pig pig, dog dog, SOR AR = sorry,)

1. Name: Ling
Gender: Female
Age: 15
Education: F.3
http://www.xanga.com/Xxluv_lingxX

2.Name: Man
Gender: Female
Age: 15
Education: F.3
http://www.xanga.com/dreamwin
3. Name: Brian
Gender: Male
Age: 14
Education: F.2
http://www.xanga.com/abc_1874


Discourse
Language + Icon/Pictures + Color + Background + Content + Comments leave by their friends (identities and behaviours are recognized) = Discourse

From the view of secondary school students, the students (Ling’s and Man’s friend) are in power, people who are not belong to the group are being marginalized, They are doing the culture (use particular “language”) in order to communicate (they are trendy in the group they belong to) with the people around them and playing the Identity Card. But from the view of “us”, we are in power, and Ling’s and Man’s friend are being marginalized, we may think they are immature and tease them.

Identity challenges do not occur often. However, when participants dispute an author’s perspective they often challenge the author’s identity. Though disagreements come in various forms, one recurrent practice for disputing an author’s arguments involves challenges to an author’s identity…respondents’ challenges to an author’s identity dispute the social position from which the author make his/her claim.

Name: Kumi
Gender: Female
Age: Unknown
http://www.xanga.com/richladies


People challenged the identity constructed by the author (how she wishes others to see her). Participants can be free when establishing an online identity, because there are no physical characteristic available.

Kumi said in her blog, “ Many people said that they would like to be my boyfriend.” “ Many people jealous that I am rich!!!!!” “I don’t know why I am so pretty?” “Pretty bring a lot of trouble to me!!!”

But many viewers challenge the identity constructed by Kumi,the pretty girl, through the comment on her blog, by said that, “ Shit, what a ugly gir??” ,”Are you crazy? I don’t think you are pretty!!!” ‘

“A born beauty!!’ by Kumi

Even people challenge the author identity, does this author exist or not? Is this a trick? We can see that in the comments part of this Xanga, some viewers said that “Is this Xanga fake? I think this girl may fool by someone!” “This girl is so poor; I don’t think these dairies are writing by this girl!’

We all know that we are difficult to recognize people’s identity through internet, so we should take an non-essentialist view, it can help us to recognize people more comprehensive. Sometimes, people may marginalize other people in the process of building up their own identities; even it is not their intentions. When people build up their own identities, they always positioned themselves as in power, and otherize other people.


Limitation
There also have some limitation when I doing this research paper. All individuals may contain different identities. I just pick up some of their common elements, such as their language, decoration on their blog, their interests etc, to analyze how they construct their identities. The limited information is provided through their blog, it may easy reduce them to less than what they really are.

References
1 Archie’s Xanga
 http://www.xanga.com/SolitArchie
2 Ming Lai’s Xanga
 http://www.xanga.com/minicheers
3 Chris’s Xanga
 http://www.xanga.com/chris728
4 Roberta’s Xanga
 http://www.xanga.com/robertashum
5 Rinkee’s Xanga
 http://www.xanga.com/rinkybao
6 Anna’s Xanga
 http://www.xanga.com/loving_anna
7 Ling’s Xanga
 http://www.xanga.com/Xxluv_lingxX
8 Man’s Xanga
 http://www.xanga.com/dreamwin
9 Brian’s Xanga
 http://www.xanga.com/abc_1874
10 Rich Ladies’s Xanga
 http://www.xanga.com/richladies


Annotated Bibliography

1.Chandler, Daniel (1998), “Personal Home Pages and the Construction of Identities on the Web.”2.Cherny, L. and Weise, E. R., eds. Wired Women: Gender and New Realities in Cyberspace. Seattle: Seal Press, 1996.3.Filiciak, M. “Hyperidentities: Postmodern identity practices in massively multiplayer online role-playing games.” In The Video Game Theory Reader, ed. J.M.P. Wolf and B. Perron, 87-102. New York: Routledge, 2004.4.Jones, Steven G. (Ed.) Virtual Culture: Identity and Communication in Cybersociety. London: Sage, 1997.5.Murphy, S. “‘Live in your world, play in ours’: the Spaces of Video Game Identity.” The Journal of Visual Culture 3 no. 2 (2004): 223 – 238.6.Simpson, B. (2005). “Identity Manipulation in Cyberspace as a Leisure Option: Play and the Exploration of Self.” Information & Communications Technology Law, 14(2): 115 - 131.7.Schau, H.J. & Gilly, M. (2003). “We Are What We Post? Self-Presentation in Personal Web Space.” Journal of Consumer Research. 30 (December)8.Suler, J.R. (2002). Identity Management in Cyberspace. Journal of Applied Psychoanalytic Studies, 4, 455-460.9.Turkle, Sherry. (1999, November). “Cyberspace and Identity.” Contemporary Sociology. 28(6): 643-648.10.Grodin, Debra & Thomas R Lindlof (Eds.) (1996): Constructing the Self in a Mediated World. Thousand Oaks, CA: Sage11.Turkle, Sherry (1996a): Life on the Screen: Identity in the Age of the Internet. London: Weidenfeld & Nicolson12.Turkle, Sherry (1996c): ‘Parallel Lives: Working on Identity in Virtual Space’. In Grodin & Lindlof (Eds.), op. cit., pp. 156-175

Tuesday, October 23, 2007

Key visual materials 2




The creation of MySpace allows people to create a social network while maintaining an online identity for themselves. One can post their personal profile telling as much about themselves as they would like in the given space. Myspace is available to everyone above the age of 14.This friend network allow users to search and add people to their friends list whether they know them or not. Users can manage their pages and make it fit their personality. Also, on this network friends can leave comments to their friends. Users can choose what kind of online identity they have, either very open and revealing or keeping personal information to a minimum.

Monday, October 22, 2007

Key visual materials



You've got mail(1998)

Director: Nora Ephron

Genre: Romantic comedy


Like Sleepless in Seattle(1993), this film is about two people falling in love who don't really know each other. This time, however, Ephron manipulates the romance by putting it on a techno setting. The film takes some of the late 20th century's most prominent trends - the anonymity created by email and chat rooms, the rise of coffee bars and chain shops, the slow disapperance of the corner shops- and Ephron puts them into a romantic comedy. The film id full of modern squeals, clicking keyboards, coffee bars and plenty of jokes about cybersex.

Sunday, October 21, 2007

Key quotes

1."Some critics have expressed an anxiety that Web pages may lead people to manipulate their public identities more than has been possible with traditional media. Howard Rheingold has argued that ‘the authenticity of relationships [and identities] is always in question in cyberspace, because of the masking and distancing of the medium, in a way that it is not in question in real life’ (Rheingold nd). Hugh Miller notes that in personal home pages ‘information about the self is explicitly stated and can be managed by the person making the communication’ (Miller 1995). This is, of course, not so easy in the direct face-to-face interaction. John Buten, with a certain degree of technological determinism, comments that ‘the Web might encourage conscious and deliberate social practices of self presentation’ (e-mail message, 9/11/96). Clearly, different media and modes of communication facilitate and inhibit different patterns of behaviour. We do not present ourselves in any kind of writing in the same way as we do in face-to-face interaction. Michael Jaffe et al. note that ‘a person "manages identity" by deliberately exhibiting and withholding pieces of social information, for the purpose of influencing the perceptions of others towards that person... This is an easier task when cues are limited to verbal text... than when they include graphics and vocal information, as in FTF [face-to-face] communication’ (Jaffe et al. 1995).
Chandler, Daniel (1998), "“Personal Home Pages and the Construction of Identities on the Web.” http://www.aber.ac.uk/media/Documents/short/webident.html

2. "Other groups in cyberspace encourage or even require that you assume an imaginary persona, as in the fantasy worlds of MOOs, MUDs, and other game environments. In multimedia chat communities, you have no choice but to wear an imaginative looking avatar to represent yourself. Many other environments fall somewhere in between reality and fantasy. You could get away with pretending to be someone very different than who you are, or you could alter just a few features - like your name, occupation, or physical appearance - while retaining your other true characteristics. No one will know, especially in text-only environments. In fact, you don't know for sure if other people are altering their identities, or how many people are altering their identities. This power to alter oneself often interlocks with dissociation and valence. Hidden positive and negative parts of oneself may seek expression in an imaginary identity that comes to life online. "
Suler, J.R. (2002). Identity Management in Cyberspace. Journal of Applied Psychoanalytic Studies, 4, 455-460.
http://www-usr.rider.edu/~suler/psycyber/identitymanage.html

3."These features are especially important for constructing online identity. First, the lack of technical expertise needed to create or maintain blogs makes the application more accessible regardless of gender and age. Next, the ability to archive blog posts creates a way to scaffold on previous impressions and expressions; thus, constructing identity can be a continual process for adolescents, and one to which they can refer. Finally, when blog software offers ways to provide feedback or link to other bloggers, this can foster a sense of peer group relationships, another important aspect for the developing adolescent. In short, weblogs represent a new medium for computer-mediated communication and may offer insight into the ways in which adolescents present themselves online, especially in terms of self-expression and peer group relationships, both of which impact the construction of identity. "
Huffaker, D. A., and Calvert, S. L. (2005). Gender, identity, and language use in teenage blogs. Journal of Computer-Mediated Communication, 10(2), article 1.http://jcmc.indiana.edu/vol10/issue2/huffaker.html

4."In fact, the opportunity for Net users to take on radically different identities to the one they present in 'real life' could have positive consequences, as we will see later. The fact that an individual has so much selective control over their online identity, particularly in the case of personal web pages, can be of great interest to researchers -- we can study a person's online persona in comparison to their identity in 'real life'. We can thus suggest which aspects of their 'real-life' identity the individual would like to actively project, and which they would rather suppress, based on what they display (or don't display) on the Net. "
Littler, Daniel (1998). The Impact of the Internet on the Expression and Perception of Social Identities."
http://www.newmediastudies.com/resourc2.htm


5."The future of online anonymity depends on how an identity management infrastructure is developed. Law enforcement officials often express their opposition to online anonymity and pseudonymity, which they view as an open invitation to criminals who wish to disguise their identities. Therefore, they call for an identity management infrastructure that would irrevocably tie online identity to a person's legal identity; in most such proposals, the system would be developed in tandem with a secure national identity document. Online civil rights advocates, in contrast, argue that there is no need for a privacy-invasive system because technological solutions, such as reputation management systems, are already sufficient and are expected to grow in their sophistication and utility."
http://en.wikipedia.org/wiki/Online_identity From Wikipedia, the free encyclopedia

Links

1.Baker, P. (2001) Moral Panic and Alternative Identity Construction in Usenet. Journal of Computer-Mediated Communication, 7 (1) October.http://jcmc.indiana.edu/vol7/issue1/baker.html

2.Miller, Hugh (June 1995): ‘The Presentation of Self in Electronic Life: Goffman on the Internet’ [WWW document] URL http://www.ntu.ac.uk/soc/psych/miller/goffman.htm (paper presented at Embodied Knowledge and Virtual Space conference, Goldsmiths’ College, University of London, June 1995)

3.Bechar-Israeli, H. (1995). From bonehead to clonehead:Nicknames, Play, and Identity on Internet Relay Chat. Journal of Computer-Mediated Communication, 1(2). http://jcmc.indiana.edu/vol1/issue2/bechar.html

4.Huffaker, D. A., and Calvert, S. L. (2005). Gender, identity, and language use in teenage blogs. Journal of Computer-Mediated Communication, 10(2), article 1.http://jcmc.indiana.edu/vol10/issue2/huffaker.html

5.Littler, Daniel (1998). The Impact of the Internet on the Expression and Perception of Social Identities.http://www.newmediastudies.com/resourc2.htm

6.Chandler, Daniel (1998), “Personal Home Pages and the Construction of Identities on the Web.http://www.aber.ac.uk/media/Documents/short/webident.html

7.Suler, J.R. (2002). Identity Management in Cyberspace. Journal of Applied Psychoanalytic Studies, 4, 455-460.http://www-usr.rider.edu/~suler/psycyber/identitymanage.html

8.http://en.wikipedia.org/wiki/Online_identity From Wikipedia, the free encyclopedia

Annotated bibliography

1.Chandler, Daniel (1998), “Personal Home Pages and the Construction of Identities on the Web.”

2.Cherny, L. and Weise, E. R., eds. Wired Women: Gender and New Realities in Cyberspace. Seattle: Seal Press, 1996.

3.Filiciak, M. “Hyperidentities: Postmodern identity practices in massively multiplayer online role-playing games.” In The Video Game Theory Reader, ed. J.M.P. Wolf and B. Perron, 87-102. New York: Routledge, 2004.

4.Jones, Steven G. (Ed.) Virtual Culture: Identity and Communication in Cybersociety. London: Sage, 1997.

5.Murphy, S. “‘Live in your world, play in ours’: the Spaces of Video Game Identity.” The Journal of Visual Culture 3 no. 2 (2004): 223 – 238.

6.Simpson, B. (2005). “Identity Manipulation in Cyberspace as a Leisure Option: Play and the Exploration of Self.” Information & Communications Technology Law, 14(2): 115 - 131.

7.Schau, H.J. & Gilly, M. (2003). “We Are What We Post? Self-Presentation in Personal Web Space.” Journal of Consumer Research. 30 (December)

8.Suler, J.R. (2002). Identity Management in Cyberspace. Journal of Applied Psychoanalytic Studies, 4, 455-460.

9.Turkle, Sherry. (1999, November). “Cyberspace and Identity.” Contemporary Sociology. 28(6): 643-648.

10.Grodin, Debra & Thomas R Lindlof (Eds.) (1996): Constructing the Self in a Mediated World. Thousand Oaks, CA: Sage

11.Turkle, Sherry (1996a): Life on the Screen: Identity in the Age of the Internet. London: Weidenfeld & Nicolson

12.Turkle, Sherry (1996c): ‘Parallel Lives: Working on Identity in Virtual Space’. In Grodin & Lindlof (Eds.), op. cit., pp. 156-175

These are the collection of references of identity online and online identity, I think these items must be useful, because they talk about the online identities comprehensibly. Different author talk about the topic from different angles help me to understand in greater depth about the topic.

Friday, October 19, 2007

Limitations

Is there any limitation when we recognize peoples identity through Internet?

It is difficult to recognize people's identity through Internet because,
-Individual may contain different identities
-it is not comprehensive that we just pick some of their common elements to analyze how they construct their identities
-Limited information is provided through internet it may reduce them to less than what they really are.