Tuesday, October 23, 2007

Key visual materials 2




The creation of MySpace allows people to create a social network while maintaining an online identity for themselves. One can post their personal profile telling as much about themselves as they would like in the given space. Myspace is available to everyone above the age of 14.This friend network allow users to search and add people to their friends list whether they know them or not. Users can manage their pages and make it fit their personality. Also, on this network friends can leave comments to their friends. Users can choose what kind of online identity they have, either very open and revealing or keeping personal information to a minimum.

Monday, October 22, 2007

Key visual materials



You've got mail(1998)

Director: Nora Ephron

Genre: Romantic comedy


Like Sleepless in Seattle(1993), this film is about two people falling in love who don't really know each other. This time, however, Ephron manipulates the romance by putting it on a techno setting. The film takes some of the late 20th century's most prominent trends - the anonymity created by email and chat rooms, the rise of coffee bars and chain shops, the slow disapperance of the corner shops- and Ephron puts them into a romantic comedy. The film id full of modern squeals, clicking keyboards, coffee bars and plenty of jokes about cybersex.

Sunday, October 21, 2007

Key quotes

1."Some critics have expressed an anxiety that Web pages may lead people to manipulate their public identities more than has been possible with traditional media. Howard Rheingold has argued that ‘the authenticity of relationships [and identities] is always in question in cyberspace, because of the masking and distancing of the medium, in a way that it is not in question in real life’ (Rheingold nd). Hugh Miller notes that in personal home pages ‘information about the self is explicitly stated and can be managed by the person making the communication’ (Miller 1995). This is, of course, not so easy in the direct face-to-face interaction. John Buten, with a certain degree of technological determinism, comments that ‘the Web might encourage conscious and deliberate social practices of self presentation’ (e-mail message, 9/11/96). Clearly, different media and modes of communication facilitate and inhibit different patterns of behaviour. We do not present ourselves in any kind of writing in the same way as we do in face-to-face interaction. Michael Jaffe et al. note that ‘a person "manages identity" by deliberately exhibiting and withholding pieces of social information, for the purpose of influencing the perceptions of others towards that person... This is an easier task when cues are limited to verbal text... than when they include graphics and vocal information, as in FTF [face-to-face] communication’ (Jaffe et al. 1995).
Chandler, Daniel (1998), "“Personal Home Pages and the Construction of Identities on the Web.” http://www.aber.ac.uk/media/Documents/short/webident.html

2. "Other groups in cyberspace encourage or even require that you assume an imaginary persona, as in the fantasy worlds of MOOs, MUDs, and other game environments. In multimedia chat communities, you have no choice but to wear an imaginative looking avatar to represent yourself. Many other environments fall somewhere in between reality and fantasy. You could get away with pretending to be someone very different than who you are, or you could alter just a few features - like your name, occupation, or physical appearance - while retaining your other true characteristics. No one will know, especially in text-only environments. In fact, you don't know for sure if other people are altering their identities, or how many people are altering their identities. This power to alter oneself often interlocks with dissociation and valence. Hidden positive and negative parts of oneself may seek expression in an imaginary identity that comes to life online. "
Suler, J.R. (2002). Identity Management in Cyberspace. Journal of Applied Psychoanalytic Studies, 4, 455-460.
http://www-usr.rider.edu/~suler/psycyber/identitymanage.html

3."These features are especially important for constructing online identity. First, the lack of technical expertise needed to create or maintain blogs makes the application more accessible regardless of gender and age. Next, the ability to archive blog posts creates a way to scaffold on previous impressions and expressions; thus, constructing identity can be a continual process for adolescents, and one to which they can refer. Finally, when blog software offers ways to provide feedback or link to other bloggers, this can foster a sense of peer group relationships, another important aspect for the developing adolescent. In short, weblogs represent a new medium for computer-mediated communication and may offer insight into the ways in which adolescents present themselves online, especially in terms of self-expression and peer group relationships, both of which impact the construction of identity. "
Huffaker, D. A., and Calvert, S. L. (2005). Gender, identity, and language use in teenage blogs. Journal of Computer-Mediated Communication, 10(2), article 1.http://jcmc.indiana.edu/vol10/issue2/huffaker.html

4."In fact, the opportunity for Net users to take on radically different identities to the one they present in 'real life' could have positive consequences, as we will see later. The fact that an individual has so much selective control over their online identity, particularly in the case of personal web pages, can be of great interest to researchers -- we can study a person's online persona in comparison to their identity in 'real life'. We can thus suggest which aspects of their 'real-life' identity the individual would like to actively project, and which they would rather suppress, based on what they display (or don't display) on the Net. "
Littler, Daniel (1998). The Impact of the Internet on the Expression and Perception of Social Identities."
http://www.newmediastudies.com/resourc2.htm


5."The future of online anonymity depends on how an identity management infrastructure is developed. Law enforcement officials often express their opposition to online anonymity and pseudonymity, which they view as an open invitation to criminals who wish to disguise their identities. Therefore, they call for an identity management infrastructure that would irrevocably tie online identity to a person's legal identity; in most such proposals, the system would be developed in tandem with a secure national identity document. Online civil rights advocates, in contrast, argue that there is no need for a privacy-invasive system because technological solutions, such as reputation management systems, are already sufficient and are expected to grow in their sophistication and utility."
http://en.wikipedia.org/wiki/Online_identity From Wikipedia, the free encyclopedia

Links

1.Baker, P. (2001) Moral Panic and Alternative Identity Construction in Usenet. Journal of Computer-Mediated Communication, 7 (1) October.http://jcmc.indiana.edu/vol7/issue1/baker.html

2.Miller, Hugh (June 1995): ‘The Presentation of Self in Electronic Life: Goffman on the Internet’ [WWW document] URL http://www.ntu.ac.uk/soc/psych/miller/goffman.htm (paper presented at Embodied Knowledge and Virtual Space conference, Goldsmiths’ College, University of London, June 1995)

3.Bechar-Israeli, H. (1995). From bonehead to clonehead:Nicknames, Play, and Identity on Internet Relay Chat. Journal of Computer-Mediated Communication, 1(2). http://jcmc.indiana.edu/vol1/issue2/bechar.html

4.Huffaker, D. A., and Calvert, S. L. (2005). Gender, identity, and language use in teenage blogs. Journal of Computer-Mediated Communication, 10(2), article 1.http://jcmc.indiana.edu/vol10/issue2/huffaker.html

5.Littler, Daniel (1998). The Impact of the Internet on the Expression and Perception of Social Identities.http://www.newmediastudies.com/resourc2.htm

6.Chandler, Daniel (1998), “Personal Home Pages and the Construction of Identities on the Web.http://www.aber.ac.uk/media/Documents/short/webident.html

7.Suler, J.R. (2002). Identity Management in Cyberspace. Journal of Applied Psychoanalytic Studies, 4, 455-460.http://www-usr.rider.edu/~suler/psycyber/identitymanage.html

8.http://en.wikipedia.org/wiki/Online_identity From Wikipedia, the free encyclopedia

Annotated bibliography

1.Chandler, Daniel (1998), “Personal Home Pages and the Construction of Identities on the Web.”

2.Cherny, L. and Weise, E. R., eds. Wired Women: Gender and New Realities in Cyberspace. Seattle: Seal Press, 1996.

3.Filiciak, M. “Hyperidentities: Postmodern identity practices in massively multiplayer online role-playing games.” In The Video Game Theory Reader, ed. J.M.P. Wolf and B. Perron, 87-102. New York: Routledge, 2004.

4.Jones, Steven G. (Ed.) Virtual Culture: Identity and Communication in Cybersociety. London: Sage, 1997.

5.Murphy, S. “‘Live in your world, play in ours’: the Spaces of Video Game Identity.” The Journal of Visual Culture 3 no. 2 (2004): 223 – 238.

6.Simpson, B. (2005). “Identity Manipulation in Cyberspace as a Leisure Option: Play and the Exploration of Self.” Information & Communications Technology Law, 14(2): 115 - 131.

7.Schau, H.J. & Gilly, M. (2003). “We Are What We Post? Self-Presentation in Personal Web Space.” Journal of Consumer Research. 30 (December)

8.Suler, J.R. (2002). Identity Management in Cyberspace. Journal of Applied Psychoanalytic Studies, 4, 455-460.

9.Turkle, Sherry. (1999, November). “Cyberspace and Identity.” Contemporary Sociology. 28(6): 643-648.

10.Grodin, Debra & Thomas R Lindlof (Eds.) (1996): Constructing the Self in a Mediated World. Thousand Oaks, CA: Sage

11.Turkle, Sherry (1996a): Life on the Screen: Identity in the Age of the Internet. London: Weidenfeld & Nicolson

12.Turkle, Sherry (1996c): ‘Parallel Lives: Working on Identity in Virtual Space’. In Grodin & Lindlof (Eds.), op. cit., pp. 156-175

These are the collection of references of identity online and online identity, I think these items must be useful, because they talk about the online identities comprehensibly. Different author talk about the topic from different angles help me to understand in greater depth about the topic.

Friday, October 19, 2007

Limitations

Is there any limitation when we recognize peoples identity through Internet?

It is difficult to recognize people's identity through Internet because,
-Individual may contain different identities
-it is not comprehensive that we just pick some of their common elements to analyze how they construct their identities
-Limited information is provided through internet it may reduce them to less than what they really are.

Online identities and the law

We all know that online identities raise numerous unresolved legal questions: Can the online identity be protected by right of publicity or trademark law? Does it have rights (independent of the person or persons who created it?)

How people construct their identities on personal website?

How people construct their identities on personal website?

-By showing their personal information,e.g pofile
-By decorating their weblogs
-By showing their interests in the weblogs
-By using their “language, e.g Professional terms ,Foul language


Here I am give an example: Archie's blog
Name: Archie
Gender: Male
Age: 23
Education: Computer Engineering (CUHK fresh graduate)













-That bitch...You are from a securities company, so what did u do ? security guard ? It's totally different from System Specitalist.Her intonation shows that she acutually thought so...


1.Identity card
-He is playing a particular identity card
-He wish others to see them as more superior (highly educated)
e.g. Archie: by stereotyping the graduates from Youth Pre-employment training program (展翅計劃)
<同我in條友係展翅既,報Admin assistant ~> office boy你放個F.5 同我一齊玩,咁我掟廿餅野去讀engine,通3年頂未好Xon居 ?
到條友吹,complete sentence都construct唔到


2.Made a powerful new territory by using foul language
->To repudiate the common impressions of the some people towards the university students/graduates (they should not use foul language)
He used a lot of foul language in his blog to create new identities and culture change .


3.Different identities can be contradictory and seemingly impossible
->Archie wishes others to recognize him as a highly educated person, at the same time, he shows a “rebel” identity.

What is online identities?

What is online identities?
-Reflexive biography
-Have a concept of a person
-Keep the on-going “story” about the self

Online identity is a social identities that the network users establish in the internet, some people will use the real name and someone not.In cyberspace, there is no face to face contract, so people are free to redefine themselves as they wish, some users prefer to identify themselves by means of pseudonyms, which reveal varying amounts of personally identifiable information.

Why this topic interest me?

Who am I? Is this real? What does it all mean?
These not just a questions that a philosophy professor might use to challege their students. They're also the problem everyone faces in the cyberspace.

Should you use your real identity in your online discussion groups, blogs, or instant messages? Or should you manufacture a false ID?

In Cyberspace ,there are no face-to-face contact , it is difficult to recognize peoples identity, so people usually pick more elements such as cultural resources to construct their identity and to pull off discourse. There are different kinds of online context, such as blog, Internet forum, massively multi player online games. This topic interest me, because i am interest about how people construct their self- identities through the internet.

I took personal blog as an example, while blogs have become more and more popular. Today these online blog allow people to create an online identity in no time. All people can sign up to create a blog on a certain website, such as Livejournal, Xanga, and Blogger. Users are free to post whatever they would like after they has created an account for themselves. Creating an online identity is simple. Through their computer one can be whomever he likes to be. Some people choose to use their real name so other people can able to recognize who they are and if they are reading their blog. But bloggers usually choose to use a fake name to protect their personal information. However, it is easy for people to post a lot of personal facts while blogging. An individual can be as open about information as they wish, but some may hide behind their blogs as strangers will not know the difference. Pseudonym allows users to hide their identities online, but still lets them build reputation with their username. Users can hide behind their computers saying whatever it is they want to say with little consequences. These days it is easy to maintain blogs and by doing so one is creating an online identity for themselves whether intentional or no.

I think the online identities and communities in cyberspace is interesting, and different people have a very different attitude to this issue. So it is worth for me to study depth on this topic.