The Digital Individualwriting

surveillancedigital-rightsprivacyrresocial-computingauto-importedrre-post
4 min read · Edit on Pyrite

Source

Automatically imported from: http://commons.somewhere.com:80/rre/1994/The.Digital.Individual.html

Content

This web service brought to you by Somewhere.Com, LLC.

The Digital Individual

``` The Information Society

special issue on "The Digital Individual"

volume 10, number 2, June 1994

edited by

Philip E. Agre University of California, San Diego

This special issue of The Information Society explores the emergent phenomenon of the digital individual. The digital individual is the form of social identity that individuals acquire as their activities become influenced by -- and often mediated through -- digital representations of themselves. The articles in the special issue describe numerous aspects of the digital individual, from its construction within organizations to its construction in relation to individual others, and from the potential for new forms of social domination to the potential for new forms of social action.

contents

Roger Clarke Australian National University "The Digital Persona and its Application to Data Surveillance"

Max Kilger Queens College "The Digital Individual"

Philip E. Agre University of California, San Diego "Surveillance and Capture: Two Models of Privacy"

Jonathan P. Allen University of California, Irvine "Mutual Control in the Newly Integrated Work Environments"

William C. Hill Bell Communications Research and James D. Hollan University of New Mexico "History-Enriched Digital Objects: Prototypes and Policy Issues"

single copies are available for US$25 including postage from the publisher:

Taylor and Francis 1900 Frost Road Suite 101 Bristol, Pennsylvania 19007 USA

phone: 1 (800) 821 8312 fax: +1 (215) 785 5515

The Digital Persona and its Application to Data Surveillance

Roger Clarke Department of Commerce Australian National University Canberra ACT 0200 Australia Internet: Roger.Clarke@anu.edu.au

Abstract: The digital persona is a model of the individual established through the collection, storage and analysis of data about that person. It is a very useful and even necessary concept for developing an understanding of the behaviour of the new, networked world. This paper introduces the notion, traces its origins and provides examples of its application. It is suggested that an understanding of many aspects of network behaviour will be enabled or enhanced by using the notion.

The digital persona is also a potentially threatening, demeaning, and perhaps socially dangerous phenomenon. One area in which its more threatening aspects require consideration is in data surveillance, the monitoring of people through their data. Data surveillance provides an economically efficient means of exercising control over the behaviour of individuals and societies. The manner in which the digital persona contributes to an understanding of particular dataveillance techniques such as computer matching and profiling is discussed, and risks inherent in monitoring of digital personae are outlined.

The Digital Individual

Max Kilger Department of Sociology Queens College 65-30 Kissena Blvd. Flushing, New York 11367 USA Internet: mnkqc@cunyvm.cuny.edu

Abstract: This paper discusses the concepts of virtual self and the digital individual as social entities that have real world implications. It examines how individuals use communication with others through face-to-face and digital channels to form images of themselves. The social nature of digital information is emphasized and examples of social objects within the digital realm are described. The criterion of engagement is suggested as a test for whether or not a virtual self is a social entity. The paper concludes with a discussion of how the digital individual might replace traditional forms of computerized identification.

Surveillance and Capture: Two Models of Privacy

Philip E. Agre Department of Communication University of California, San Diego La Jolla, California 92093-0503 USA Internet: pagre@weber.ucsd.edu

Abstract: Two models of privacy issues are contrasted. The surveillance model employs visual metaphors (e.g., "Big Brother is watching") and derives from historical experiences of secret police surveillance. The less familiar capture model employs linguistic metaphors and has deep roots in the practices of applied computing through which human activities are systematically reorganized to allow computers to track them in real time. The capture model is discussed with reference to systems in numerous domains.

Mutual Control in the Newly Integrated Work Environments

Jonathan P. Allen Center for Research on Information Technology and Organizations University of California, Irvine Irvine, California 92717 USA Internet: jpallen@ics.uci.edu

Abstract: How does an increase in the availability of detailed electronic information about behavior change organizations, and what kinds of choices influence those changes? This paper presents a model of mutual control, derived from studies of detailed information sharing in manufacturing, that describes one set of likely changes. According to the mutual control model, increasing pressures for tighter monitoring and control come from a mutual access to, and dependence on, shared electronic information that can be linked to the behavior of identifiable individuals and groups. The demands for greater monitoring and control from all directions in organizations, not simply upper management, is a finding which contrasts sharply with the traditional view of electronic surveillance, and its concern with regulating managerial excess. The mutual control model also highlights how current systems design ideals, uncritically followed, contribute to the widespread demand for monitoring and tighter control within organizations.

History-Enriched Digital Objects: Prototypes and Policy Issues

William C. Hill Bell Communications Research Morristown, New Jersey 07962 USA Internet: willhill@bellcore.com

James D. Hollan Department of Computer Science University of New Mexico Albuquerque, New Mexico 87113 USA Internet: hollan@cs.unm.edu Abstract: Recording on digital objects (e.g. reports, forms, source-code, manual pages, email, spreadsheets) the interaction events that comprise their use makes it possible on future occasions, when the objects are used again, to display graphical abstractions of the accrued histories as parts of the objects themselves. It also makes it possible to search for objects by their use, and under certain circumstances, to find people through objects used in common. Prototypes we've built to explore this idea (e.g. Edit Wear, Read Wear, Email Wear, and Vita Service) demonstrate the costs and benefits of using objects in the context of their interaction histories. The prototypes also raise issues concerning the nature, ownership and appropriate use of personal information. Keywords human computer interface, interaction history, organizational computing, history-enriched digital objects, computer supported cooperative work, visualization, social aspects of technology. ```

This web service brought to you by Somewhere.Com, LLC.