Digital Identity Research Papers - Academia.edu (original) (raw)
Il rapporto tra scienza giuridica e tecnologie informatiche rappresenta una questione ormai ineludibile per chiunque intenda misurarsi con le istanze della società digitale. I due autori si confrontano su temi attuali e decisivi relativi... more
Il rapporto tra scienza giuridica e tecnologie informatiche rappresenta una questione ormai ineludibile per chiunque intenda misurarsi con le istanze della società digitale. I due autori si confrontano su temi attuali e decisivi relativi all’informatica giuridica e al diritto dell’informatica, esaminando l’impatto della tecnologia sulla società nel suo complesso, sulla persona e i suoi diritti, sugli istituti e sugli strumenti del diritto. Le tematiche spaziano dalla problematica tutela dei dati personali e del right to be forgotten al riconoscimento dei diritti digitali, dal governo di dati e algoritmi alle questioni poste dall’intelligenza artificiale e dalla blockchain, dall’affermarsi pervasivo di documenti informatici, firme elettroniche e contratti telematici alla complessa protezione di opere digitali e beni informatici, dalla necessità di un’amministrazione digitale e aperta all’emersione di nuove geometrie di potere, dagli inediti bilanciamenti tra interessi ai difficili equilibri in tema di responsabilità, dalla diffusione endemica della criminalità informatica ai nuovi e cupi scenari della guerra cibernetica. L’obiettivo del volume è quello di proporre al lettore alcuni punti di osservazione privilegiati per riflettere sul destino della scienza giuridica nell’era tecnologica, avvalendosi anche dell’analisi di significativi casi di studio: regolare la dimensione digitale della vita umana costituisce una sfida impegnativa ma inevitabile, cui il diritto è chiamato a rispondere.
Digital identity management is an essential competence for university teaching staff in the process of researching. The aim of the present research is to describe a set of actions to improve the digital identity management of the... more
Digital identity management is an essential competence for university teaching staff in the process of researching. The aim of the present research is to describe a set of actions to improve the digital identity management of the university teacher as researcher. These actions are aimed at teachers who belong to the area of Education Sciences, and most of them are part of postgraduate programs. The actions described intend to promote the creation and curation of digital profiles that contribute to shaping the digital identity. The outcomes of these actions allow appreciating an increasing number of digital profiles on ResearchGate y Google Scholar. Besides, the development of the competence digital identity management will directly impact on greater visibility and scientific reputation of each researcher, which will improve both digital and offline prestige of the university.
Recent research in adults has made great use of the gaze cuing paradigm to understand the behavior of the follower in joint attention episodes. We implemented a gaze leading task to investigate the initiatorthe other person in these... more
Recent research in adults has made great use of the gaze cuing paradigm to understand the behavior of the follower in joint attention episodes. We implemented a gaze leading task to investigate the initiatorthe other person in these triadic interactions. In a series of gaze-contingent eye-tracking studies, we show that fixation dwell time upon and reorienting toward a face are affected by whether that individual face shifts its eyes in a congruent or an incongruent direction in response to the participant's eye movement. Gaze leading also biased affective responses toward the faces and attended objects. These findings demonstrate that leading the eyes of other individuals alters how we explore and evaluate our social environment.
Gender and technology might seem unrelated on first sight because technology is often considered a neutral other that does not have anything to do with gender. Yet, taking a closer look at the language we use to talk about technology, at... more
Gender and technology might seem unrelated on first sight because technology is often considered a neutral other that does not have anything to do with gender. Yet, taking a closer look at the language we use to talk about technology, at the images we rely on to represent technology, its uses and users, it becomes clear that gender stereotypes are more present than ever in the context of technology. Rather than subverting traditional gender roles, technology often reinforces and re-inscribes stereotypical behavior and ideas. Analyzing Apple iPad/iPhone advertisements, this paper will uncover some of the gender biases present in popular techno-narratives.
Construction of virtual identities in social networks is a spontaneous and well pondered process where attention to all the information available becomes essential. Identities are projected using this information. The aim of this... more
Construction of virtual identities in social networks is a spontaneous and well pondered process where attention to all the information available becomes essential. Identities are projected using this information. The aim of this paper is to define which fragments of this information are the most commonly present in user profiles. Besides, understanding aspects of identity that are the most conjectured. For the data analysis, a quantitative methodology with a questionnaire as a collection technique was used with a sample of 521 people between Spain and Argentina. The analysis of the empirical data has allowed some reflections on the importance of the features social networks offer to its users, as well as on how crucial image is in fingerprints and identity description, and digital action implementation.La construcción de las identidades virtuales en las redes sociales es un proceso espontáneo y ponderado donde la atención sobre toda la información disponible se hace esencial,...
Distribution électronique Cairn.info pour ERES. © ERES. Tous droits réservés pour tous pays.
For most people, privacy is just one of those rights that is debated in the context of cyberspace and big data, something threatened by the commercial platforms, in name defended by the government, but not something of fundamental... more
For most people, privacy is just one of those rights that is debated in the context of cyberspace and big data, something threatened by the commercial platforms, in name defended by the government, but not something of fundamental importance. In this article it is argued, that privacy (and the shared privacy in intimacy) is far more important, that it affects our inner world, our imagination, our ‘forum internum’. Privacy and autonomy are cornerstones of our identity, in the formation of who we are, in our learning and freedom to make mistakes, change our mind and grow, it's an essential factor in the agency of our selfhood.
This is not how privacy was seen historically, but lately the importance of privacy as an enabling factor in personal growth and creativity has been recognized, and this is impacting the importance and rank of the right of privacy among other human rights. It emerges as an essential right, a fundamental necessity.
This short paper describes a small, ongoing case study exploring how the affordances of a media sharing Web 2.0 application (VoiceThread) can be evaluated for its pedagogical value. Web 2.0 technologies emerge so quickly it is difficult... more
This short paper describes a small, ongoing case study exploring how the affordances of a media sharing Web 2.0 application (VoiceThread) can be evaluated for its pedagogical value. Web 2.0 technologies emerge so quickly it is difficult for educators to gauge their actual value in practical terms. In many cases the latest Web 2.0 technologies are superseded almost before they emerge from their beta testing phase. Rather than focusing on the individual characteristics or details of the technology itself, this case study uses a new learning design framework (the Digital Artefacts for Learner Engagement framework: DiAL-e) to chart the affordances and uses which educators might find valuable. The tool has been used as the basis of an on-line pilot project for the Joint Information Service Committee in the UK (JISC) in which academics from further and higher education have been learning how to harness the potential of digital artefacts and Web 2.0 tools to enhance teaching and student le...
I diritti di traduzione, di memorizzazione elettronica, di riproduzione e di adattamento totale o parziale con qualsiasi mezzo (compresi i microfilm e le copie fotostatiche) sono riservati per tutti i Paesi. Le fotocopie per uso personale... more
I diritti di traduzione, di memorizzazione elettronica, di riproduzione e di adattamento totale o parziale con qualsiasi mezzo (compresi i microfilm e le copie fotostatiche) sono riservati per tutti i Paesi. Le fotocopie per uso personale del lettore possono essere effettuate nei limiti del 15% di ciascun volume/fascicolo di periodico dietro pagamento alla SIAE del compenso previsto dall'art. 68, commi 4 e 5, della legge 22 aprile 1941 n. 633. Le fotocopie effettuate per finalità di carattere professionale, economico o commerciale o comunque per uso diverso da quello personale possono essere effettuate a seguito di specifica autorizzazione rilasciata da CLEARedi, Centro Licenze e Autorizzazioni per le Riproduzioni Editoriali,
This paper reports on an investigation into the online visibility of work undertaken in South Africa in the field of poverty alleviation. An experiment with Google searches was undertaken, motivated by concerns about the visibility of... more
This paper reports on an investigation into the online visibility of work undertaken in South Africa in the field of poverty alleviation. An experiment with
Google searches was undertaken, motivated by concerns about the visibility of South African research and development work, particularly in a context where social
inequality is extreme and poverty such a critical issue. Aware that much attention – through research and the practice of development work – is being paid to
poverty alleviation1
, the authors set out to examine whether that work could be found easily, and what the nature of the search results would be. Significant sums
of public money are invested in research, which should result in the production and dissemination of locally generated knowledge as a public good grounded in
local realities. A great deal of national and international funding is also spent. Thus, research published online should inform and reflect on national and regional
development practice, while contributing perspectives from the South to the global corpus of poverty research. Research to understand poverty and inform the design
and targeting of poverty alleviation programmes needs to be freely available and actively shared in order for it to accumulate value. In this regard it is argued that
there are exponentially beneficial linkages between research, scholarly publication and social development, which originate with local knowledge production and
are amplified by the availability and discoverability of that research. Availability and discoverability add breadth and depth to the potential use, value and impact
of the knowledge produced
This article utilizes postqualitative inquiry, providing two critical readings – one from a critical-cultural poststructural perspective (rooted in intersectionality theory) and one from a critical posthumanist perspective – of one... more
This article utilizes postqualitative inquiry, providing two critical readings – one from a critical-cultural poststructural perspective (rooted in intersectionality theory) and one from a critical posthumanist perspective – of one student’s relationship to race, class, and ethnicity across distributed social media spaces. The act of tagging-untagging as described by Miranda is central to unpacking the two critical readings offered in this article. How students understand, articulate, and potentially unpack race, ethnicity, and class in the digital age requires college student educators to move beyond traditional developmental theories, exploring and engaging the ambiguity of these socially constructed concepts in a technologically mediated world. This article advocates that discussions of race, ethnicity, and class in the 21st century must account for digital social media spaces as well as new forms of inquiry - reading and plugging data into multiple theoretical perspectives.
This paper builds on research directions from 'activity theory'and 'learning design'to provide 'facilitation'for students standing within decision making related to selection of web 2.0 tools and university... more
This paper builds on research directions from 'activity theory'and 'learning design'to provide 'facilitation'for students standing within decision making related to selection of web 2.0 tools and university provided web-based applications for supporting students activities within problem and project based learning. In the area of problem and project based learning, facilitation is the core term and the teacher often has the role as facilitator or moderator instead of a teacher teaching. Technology adoption for learning activities needs facilitation ...
Blogging, tweeting, commenting a Facebook status, pinning, online networking, online dating, liking and disliking or even friending have become integral part of our language and activities on the Web. All these activities produce what... more
Blogging, tweeting, commenting a Facebook status, pinning, online networking, online dating, liking and disliking or even friending have become integral part of our language and activities on the Web. All these activities produce what researchers call ‘digital footprints’. These digital footprints are disparate, spread, fragmented and incomplete. Nevertheless the collection of these digital footprints and their display enable peoples, companies or even search-engines, to re-form the online identities of Internet-users. The aim of this study is to explore the online identity of media students in France and in the United-Kingdom, in order to ascertain if they are aware of the complexity of online identity. The purpose of this study is also to get a better understanding of the students’ constructions of online identities and more precisely their constructions of professional online presences. To do so, a creative research method is used. The latter consists of allowing the participants of the experiments to construct a model, which represent their online identity with Lego bricks and figures. This method led to a variety of findings, such as the media students’ awareness of having an online identity, online identity as a reflexive project and online identity management as a complex activity.
How have online communities affected the ways their users construct, view, and define their identity? In this paper, we will approach this issue by considering two philosophical sets of problems related to personal identity: the... more
How have online communities affected the ways their users construct, view, and define their identity? In this paper, we will approach this issue by considering two philosophical sets of problems related to personal identity: the "Characterization Question" and the "Self-Other Relations Question." Since these queries have traditionally brought out different problems around the concept of identity, here we aim at rethinking them in the framework of online communities. To do so, we will adopt an externalist and cognitive point of view on online communities, describing them as virtual cognitive niches. We will evaluate and agree with the Attachment Theory of Identity, arguing that there is continuity between offline and online identity and that usually the latter contributes to the alteration of the former. Finally, we will discuss ways users can enact self-reflection on online frameworks, considering the impact of the Filter Bubble and the condition of Bad Faith.
This chapter highlights opportunities in the digital space for student affairs professionals. A blended approach, grounded in the new technology competency recently added in the ACPA and NASPA student affairs professional competencies, is... more
This chapter highlights opportunities in the digital space for student affairs professionals. A blended approach, grounded in the new technology competency recently added in the ACPA and NASPA student affairs professional competencies, is proposed for student affairs professionals’ digital identity development. It includes the awareness of one's digital identity, formation of a digital decision-making model, and utilization of personal learning networks.
21 Outono Árabe: A Primavera que não chegou à Síria e ao Irão Catarina Guedes Barroso 33 CAPÍTULO 2 | Comunidades, Identidade e Redes Sociais 45 Do Nickelodeon às redes sociais: Um estudo de caso Ana Paula Ferreira 47 A neo-tribalização... more
21 Outono Árabe: A Primavera que não chegou à Síria e ao Irão Catarina Guedes Barroso 33 CAPÍTULO 2 | Comunidades, Identidade e Redes Sociais 45 Do Nickelodeon às redes sociais: Um estudo de caso Ana Paula Ferreira 47 A neo-tribalização de uma sociedade individualizada: Novas formas de organização social nas sociedades contemporâneas Miguel Pinto 61 Imortalidade digital: A preservação da memória Vera Alves Sousa 71 CAPÍTULO 3 | Vigilância e Controle na Era da Informação 77 As questões da vigilância e do controlo na Web 2.0: O pensamento de Foucault e as dinâmicas do mundo contemporâneo Célia Maria Carvalho Gouveia 79 O direito de ser esquecido: Considerações sobre a noção de vigilância Priscila Sofia Andrade 91 A Web 2.0 na perspectiva foucaultiana Rubens Borges da Silva Júnior 99 CAPÍTULO 4 | Sociedade, Internet e Literacias Digitais 107 Dinâmicas da Sociedade em Rede e seus impactos Fátima Tchumá Camará 109 Televisão e literacias digitais dos espectadores: O caso (paradoxal) dos talk shows Marcos Andrade Oliveira 117 Literacias: Uma abordagem geral Maria João Vicente 129 Os tablets e smartphones como média emergentes: Um futuro já demasiado presente? Miguel Crespo 137 Fóruns de discussão online: Uma 'nova' forma de relacionamento social Rui Manuel Sebastião Mendes 145 Internet Comunicação em Rede 4 Ana Pinto Martinho O termo Open Government veio tomar outra importância e repercussão quando Barack Obama, Presidente dos EUA, o puxou para a ribalta ao lançar a Open Government Inititive 9 , em 2009, pouco tempo depois de entrar em funções, fazendo eco do compromisso com a transparência que salientou durante toda a sua campanha para as eleições presidenciais. 8 Em Portugal não, no entanto, algo parecido com o FOIA norte-americano. 9 www.whitehouse.gov/open " " 14 www.whitehouse.gov/open 15 www.data.gov/ Para além do Reino Unido, já citado, são muitos os países e regiões da União Europeia que já lançaram plataformas de dados abertos como é da França, da Austrália, do País Basco (em Espanha), do Piemonte (em Itália), da Holanda e mais recentemente Portugal, onde foi lançada a versão beta do portal "dados.gov.pt" 19 . Em Portugal foi também lançado, no site do governo, «O meu movimento» 20 . Uma plataforma onde os cidadãos podem criar um movimento sobre um tema da sua escolha. O movimento que tiver mais votos, num determinado tempo, tem uma audiência com o primeiro-ministro. A observar que, apesar de as petições estarem instituidas na Constituição portuguesa, o governo português optou por criar uma plataforma sem ligação a este tipo de possibilidade, ao contrário do que acontece na 16 www.performance.gov/ 17
Although researchers have discussed the existence of a virtual self, or embodiment of human characteristics within an avatar, little known about how the virtual self influences a player’s behavior within a virtual environment. To better... more
Although researchers have discussed the existence of a virtual self, or embodiment of human characteristics within an avatar, little known about how the virtual self influences a player’s behavior within a virtual environment. To better understand this relationship, World of Warcraft game players were asked to complete personality-rating scales for both themselves and their avatars. In addition, in-world behavior was recorded and then analyzed using a behavioral assessment checklist. Results suggested a relationship between personality and behavior within the domain of agreeableness. Based on these findings, the researchers discuss implications for the construct known as the virtual self, as well as the inclusion of psychological systems design into the overall game design process.► We examine the relationship between personality and behavior in a virtual environment (VE). ► The emergence of a virtual self as a psychological component of VE software appears to exist. ► Results indicate a relationship along the domain of agreeableness.
Introduzione 23 Il web e la nuova responsabilità ecologica e relazionale dell'umano Fausto Pagnotta PRIMA PARTE RICONOSCERSI IN RETE Capitolo 1 37 Fare spazio alla relazione. Appunti per un'ecologia del digitale Sergio Manghi Capitolo 2... more
Introduzione 23 Il web e la nuova responsabilità ecologica e relazionale dell'umano Fausto Pagnotta PRIMA PARTE RICONOSCERSI IN RETE Capitolo 1 37 Fare spazio alla relazione. Appunti per un'ecologia del digitale Sergio Manghi Capitolo 2 49 Prove d'amore: i sentimenti degli adolescenti nella Rete Maura Franchi Capitolo 3 59 Giovani e media digitali: tra emozioni e nuove pratiche relazionali Cosimo Marco Scarcelli Capitolo 4 69 Il selfie: strategie per la costruzione e la condivisione di identità possibili Gian Luca Barbieri Capitolo 5 79 La Rete delle Lingue e la tutela delle identità Davide Astori © Edizioni Centro Studi Erickson S.p.A.-Tutti i diritti riservati SECONDA PARTE IL CORPO NELL'ERA DIGITALE Capitolo 6 Il corpo in codice e il riduzionismo informazionale Giuseppe O. Longo Capitolo 7 Il corpo digitale e l'identità al tempo dei social network Giuseppe Lavenia e Stefania Stimilli Capitolo 8 Il web come nuovo spazio comunicativo sulla salute e sulla medicina Fausto Pagnotta Capitolo 9 Raccontare il corpo nel web: tra supporto sociale e paradossi Cristina Lonardi Capitolo 10 Tra Rete e corpo. Problemi e soluzioni a una mobilità statica Francesco Chiampo Capitolo 11 Dal corpo pulsionale al soggetto della relazione nell'adolescenza tecnomediata Fabio Vanni TERZA PARTE RISCOPRIRE LA RELAZIONE EDUCATIVA Capitolo 12 Le sfide dell'università nell'era digitale: alcune considerazioni preliminari Maria Cristina Ossiprandi Capitolo 13 Passione, etica e relazione nell'apprendimento in Rete Lavinia Bianchi e Alberto Quagliata © Edizioni Centro Studi Erickson S.p.A.-Tutti i diritti riservati Capitolo 14 Media education di qualità. Analisi della letteratura su un problema sottovalutato Damiano Felini Capitolo 15 La scuola, le ICT e l'approccio comunitario Stefania Mazza Capitolo 16 L'insegnante di oggi di fronte agli studenti digitali: il progetto «Web, generazioni in corsa… e ruolo dei genitori» Donatella Calestani Capitolo 17 La cultura mediale e i suoi effetti nell'era digitale: fra una visione «apocalittica» e una «integrata» Maria Grazia Ferrari QUARTA PARTE FAKE NEWS, CYBERBULLISMO, DIGITAL HOOK: CONOSCERLI PER PREVENIRLI Capitolo 18 (Cyber)Bellum omnium contra omnes. Strategie educative di prevenzione alla guerra cognitiva in Rete Roberto Trinchero Capitolo 19 Bullismo e cyberbullismo: fenomeni relazionali nel rapporto diretto e online Elena Buccoliero Capitolo 20 Cyberbullismo e cyberviolenza: prospettive di prevenzione e di intervento per fenomeni sociali Debora Veluti © Edizioni Centro Studi Erickson S.p.A.-Tutti i diritti riservati Capitolo 21
The proliferation of social media has led to an abundance of self-expression online in the form of identity narratives. The online cultural phenomena of digital identity has been explored using many different methods, one of these methods... more
The proliferation of social media has led to an abundance of self-expression online in the form of identity narratives. The online cultural phenomena of digital identity has been explored using many different methods, one of these methods is through the analysis of digital narratives.1 ‘Digital identity narratives’ is a term used to analyze identity narratives that are presented on social media platforms such as weblogs and social networking websites.
The #WalkMyWorld project was an open, social media experiment developed to provide preservice and in-service teachers and K–12 students with an opportunity to focus on developing media literacies and civic engagement in online spaces. The... more
The #WalkMyWorld project was an open, social media experiment developed to provide preservice and in-service teachers and K–12 students with an opportunity to focus on developing media literacies and civic engagement in online spaces. The study employed a basic interpretative qualitative study approach (Merriam, 2002) to examine how online social environments can be used as a vehicle to engage educators in the creation and sharing of online content, as it relates to multimodal meaning making, social scholarship, and identity construction. For this study, identity construction was identified as visually representing an aspect of an individual’s life using any preferred medium, and sharing it through Twitter using the #WalkMyWorld hashtag. Results suggest three different categories in which participants viewed the activity of identity construction: (a) embraced similar identities, (b) established separate identities, or (c) resisted creating an online identity. As educators engage students with reading and writing digital content within social and connected learning environments, it is important to consider the creation and curation of an individual’s digital identity in social scholarship practices.
- by Julie Wise and +1
- •
- Digital Literacy, Digital Media, New Literacies, Social Media
Az identitás értelmezéseinél általában előnyben részesítjük az érzékszerveink által közvetlenül elérhető makroszkopikus objektumokra vonatkozó tapasztalatainkat és az ily módon azonosítható relációkat, tulajdonságokat. Évtizedes viták... more
Az identitás értelmezéseinél általában előnyben részesítjük az érzékszerveink által közvetlenül elérhető makroszkopikus objektumokra vonatkozó tapasztalatainkat és az ily módon azonosítható relációkat, tulajdonságokat. Évtizedes viták zajlanak például a - közvetlen érzéki hozzáférést nélkülöző - mikrofizika által tanulmányozott létezők identitásának problémájáról, megoldások helyett számos paradox következménnyel. Efféle dilemmák az emberi világtól se idegenek - világosan megmutatkoznak például a humán genetika körül zajló diszkussziókban. Egy ezekhez némileg hasonló kérdéskört tanulmányozunk: a digitális technikák által létrehozott és kezelt létezőknek a jellemzésével próbálkozunk, különös tekintettel az identitás lehetséges értelmezéseire. A tulajdonképpeni cél pedig a digitális kommunikációs és kulturális technikák emberi identitásra gyakorolt hatásainak a bemutatása, a személyes identitás sajátos változatának az ún. e-személyiség fogalmának bevezetése és rövid jellemzése lesz
Several factors contribute to an individual's experiences in computer-based environments. Previous research shows one such fact or, the degree to which users feel connected to a virtual environment, influences the actions of individuals... more
Several factors contribute to an individual's experiences in computer-based environments. Previous research shows one such fact or, the degree to which users feel connected to a virtual environment, influences the actions of individuals within the environment . Additional factors, such as people's personality and the personality of their avatar, influence behaviors in virtual environments . The current study focused on the role of presence as it affects behavior within the virtual environment. Presence has been defined as the psychological state where virtual experiences feel authentic. However, the degree to which presence acts as a mediating variable in virtual environments is not well understood. The current study employed a combination of survey instruments and direct observ ation to explore the relationships among personality of self and avatar, presence, and behaviors within a virtual environment. Findings indicated that participant scores in the domain of agreeableness were a significant predictor of agreeable behavior in the virtual environment. However, with the exception of negat ive effect s (e.g., dizziness), presence does not appear to influence behavior. Overall implication s for these findings are discussed.
Thinspiration images, meant to inspire weight-loss, proliferate online through platforms that encourage the circulation of user-generated content. Despite numerous alarmist critiques in mass media about thinspiration and various academic... more
Thinspiration images, meant to inspire weight-loss, proliferate online through platforms that encourage the circulation of user-generated content. Despite numerous alarmist critiques in mass media about thinspiration and various academic studies investigating ‘pro-anorexia’ sites, surprisingly little attention has been given to the processes of creation and the symbolic potential of thinspiration. This thesis analyzes the formal hybridity of thinspiration, and its use as an expressive medium. The particularities of thinspiration (including its visual characteristics, creative processes, and exhibition) may be considered carefully constructed instances of self- representation, hinging on the expression of beliefs regarding the mind and body. While these beliefs are deeply entrenched in popular body management discourse, they also tend to rely on traditional dualist ideologies. Rather than simply emphasizing slenderness or reiterating standard assumptions about beauty, thinspiration often evokes pain and sadness, and employs truisms about the transcendence of flesh and rebellion against social constraints. By harnessing individualist discourse and the values of mind/body dualism, thinspiration becomes a space in which people struggling with disordered eating and body image issues may cast themselves as active agents—contrary to the image of eating disorders proffered by popular and medical discourse.
Research concerning computer hackers generally focuses on how to stop them; far less attention is given to the texts they create. Phrack, an online hacker journal that has run almost continuously since 1985, is an important touchstone in... more
Research concerning computer hackers generally focuses on how to stop them; far less attention is given to the texts they create. Phrack, an online hacker journal that has run almost continuously since 1985, is an important touchstone in hacker literature, widely read by both hackers and telephone and network security professionals. But beyond its instantiation as a compendium of illicit technical knowledge, Phrack was, above all, a rhetorical publication. The files in each issue of Phrack created a shared rhetorical vision concerning the place of the hacker underground within society and in relation to law enforcement officials, as well as what it means to be a hacker. This essay examines two important events in the evolution of the hacker movement through the lens of Phrack—Operation Sundevil and the arrest of Kevin Mitnick. How these events were framed in Phrack both shaped and reflected emerging shifts in hacker collective identity.
20' talk at the MECCSA PGN 2016 Conference at University Of Leicester, June 2016.
À l’ère du numérique – avec l’apparition de nouveaux écrans, de supports de diffusion et de plateformes cinéphiles en ligne – les comportements des spectateurs ont radicalement évolué, passant de l’unité offerte par la salle obscure à une... more
À l’ère du numérique – avec l’apparition de nouveaux écrans, de supports de diffusion et de plateformes cinéphiles en ligne – les comportements des spectateurs ont radicalement évolué, passant de l’unité offerte par la salle obscure à une activité morcelée dans le temps par la multiplication de pratiques médiatisés. Cet article abordera les enjeux de ce nouveau rapport du spectateur au temps avant et après le moment critique de la séance de cinéma, en étudiant le cas du site Vodkaster.com et de ses usages.
La identidad digital es la piedra angular de la transformación digital de América Latina y el Caribe (ALC). Es un aspecto cada vez más relevante en el sistema de identidad de las personas, cuyos cimientos son los registros civiles de... more
La identidad digital es la piedra angular de la transformación digital de América Latina y el Caribe (ALC). Es un aspecto cada vez más relevante en el sistema de identidad de las personas, cuyos cimientos son los registros civiles de calidad. Conforma un instrumento esencial para la inclusión y la reducción de costos de transacción en toda la economía, contribuyendo así a mejorar la calidad de los servicios tanto del sector público como del privado. Este documento brinda un panorama general de la identidad digital, mostrando costos/beneficios y ventajas/desventajas de las distintas alternativas de implementación. En particular, se incluye una mirada profunda de dos experiencias bastante distintas, la de Estonia y la de España.
Governments and businesses alike are coming to understand that national and global economies should us the Internet as a medium for innovation and economic growth. A critical component that has been left to service providers to establish... more
Governments and businesses alike are coming to understand that national and global economies should us the Internet as a medium for innovation and economic growth. A critical component that has been left to service providers to establish and manage is that of digital identities of online clients and customers. Lack of regulation and effective methods of management has resulted in greater concerns over privacy, security, and productivity in online environments, thus hindering the development and use of the full potential of the Internet. This paper attempts to explore the role of a government initiated digital identity management system in supporting the creation of a stronger digital economy. The author provides an overview of the identity management infrastructure development initiatives in Gulf Cooperation Council (GCC) countries and briefly examines their potential to revolutionize and transform existing economic models. The author argues that the new smart identity cards produced in these countries may serve as secure tokens that connect digital and physical identity, create trustworthy environments, and strengthen confidence in online transactions critical to the growth of the digital economy.
Reflecting on the thousands of diverse research studies of social media representation and digital privacy, this article presents a comprehensive summary of online personal strategies. First, the evolution of academic concepts about... more
Reflecting on the thousands of diverse research studies of social media representation and digital privacy, this article presents a comprehensive summary of online personal strategies. First, the evolution of academic concepts about digital identity and the online self is summarised. Then, the article investigates the key dynamics of personal strategies and control issues in detail with ideas, experiences, stories and metaphors taken from 60 qualitative interviews from Central and Eastern Europe and Southeast Asia. According to the key findings of this article, the universal patterns of online personal strategies follow mostly conscious decisions, resulting in users maintaining 70% control of their digital footprints. However, the remaining 30% of online activities are unconscious floating with digital dynamics and resulting in a wide range of non-expected consequences from identity theft to kidnapping. In summary, an intercultural and intergenerational model highlights the complexi...
Considerable scholarly discussion has been given to the idea that we are moving toward a state of “posthumanism.” This essay examines some possible implications of a posthuman existence, specifically as it relates to that most basic of... more
Considerable scholarly discussion has been given to the idea that we are moving toward a state of “posthumanism.” This essay examines some possible implications of a posthuman existence, specifically as it relates to that most basic of human needs—sexuality. I explore the spiritual aspects of sexuality to see what is lost and what is gained in technologically mediated forms of sexuality. To that end, I consider the interplay between sexual behavior and our conceptions of the sacred, how technologies are changing our views of—and realities concerning—our bodies, and the potential for a sacred posthuman sexuality.
One of the most intriguing aspects of our augmented futures is how we will experience new social paradigms attached to bodily representation and identification. Digital and virtual space provide infinite possibilities for developing... more
One of the most intriguing aspects of our augmented futures is how we will experience new social paradigms attached to bodily representation and identification. Digital and virtual space provide infinite possibilities for developing alternative manifestations and tools to express personal and social selves, but how we imagine these opportunities versus what we actually create are often two different things. There are two roadblocks to achieving such a transcendental experience. The first relates to existing gender-role cultures and biases, while the second is whether we will be able to let go of the intrepid role the body plays as an identity-defining-space.
This research explores literacy teachers’ perceptions of integrating information communication technologies (ICTs) into literacy instruction. To this end, a national survey of 1,441 literacy teachers in the United States was conducted.... more
This research explores literacy teachers’ perceptions of integrating information communication technologies (ICTs)
into literacy instruction. To this end, a national survey of 1,441 literacy teachers in the United States was conducted.
The survey provided data concerning the types and levels of reported availability and use of ICTs, beliefs about the
importance of integrating ICTs into literacy instruction, and perceived obstacles to doing so. The analysis of data
included descriptive statistics, an exploratory factor analysis, and a path analysis used to test a model hypothesizing a
relation between teachers’ perceived importance of technology and reported levels of integration. Results revealed
relatively low levels of curricular integration, consistent perceptions about obstacles to integration, and technological
rather than curricular definitions of ICTs and of integration. The path analysis suggested several characteristics and
influences associated with higher levels of integration and use. The findings advance understanding of the extent to
which ICTs are being integrated into literacy instruction and what factors should be considered toward profitably
increasing integration consistent with expanding definitions of literacy.
El actual modelo cultural basado en el desarrollo de las tecnologías de la información y la comunicación genera realidades sociales que afectan a las motivaciones del ser humano. De modo que en la actualidad se hace precisa una revisión... more
El actual modelo cultural basado en el desarrollo de las tecnologías de la información y la comunicación genera realidades sociales que afectan a las motivaciones del ser humano. De modo que en la actualidad se hace precisa una revisión de la jerarquía de las necesidades de Maslow dirigiéndola hacia un modelo que contemple las dimensiones que a día de hoy conforman la personalidad del individuo: la real y la virtual. Este artículo plantea un nuevo modelo motivacional, que complementa al anterior, adaptado al contexto espacio temporal contemporáneo en el que las tecnologías están inmersas en nuestra forma de vida.
SOCMINT (Social Media Intelligence) hace referencia a la obtención de Inteligencia basada en redes sociales, gracias a técnicas y tecnologías que permiten a las empresas o gobiernos monitorear plataformas como Facebook o Twitter de cara a... more
SOCMINT (Social Media Intelligence) hace referencia a la obtención de Inteligencia basada en redes sociales, gracias a técnicas y tecnologías que permiten a las empresas o gobiernos monitorear plataformas como Facebook o Twitter de cara a la obtención de información relevante.
El progreso de la tecnología, las conexiones multidispositivo al alcance de cualquier usuario, y el rápido crecimiento de la actividad en el entorno digital, ha formado conjuntos de datos masivos que contienen información detallada y en tiempo real completamente procesable, generando así Inteligencia.
Con el uso de SOCMINT, los analistas pueden revisar y compilar grandes volúmenes de contenido en tiempo real para asesorar a gobiernos, proteger la Seguridad, y resolver investigaciones de carácter criminal, entre otras aplicaciones, como el estudio de tendencias, o la monitorización de comportamientos.
SOCMINT es un recurso más dentro de la Ciberinteligencia, y complementa los métodos tradicionales de recopilación de Inteligencia y datos en el entorno digital.
Estas técnicas incluyen la monitorización de contenido, como mensajes o fotografías, y otros datos que se generan cuando un usuario se registra y utiliza una red social. Esta información involucra a personas o grupos, e incluye información generada de forma pública o privada.
Este tipo de investigaciones incluye herramientas para recopilar, filtrar y analizar una amplia gama de datos, e interpretarlos de cara a un posterior análisis.
A lo largo de este módulo analizaremos los factores que afectan a la Identidad Digital, los protocolos de protección de ésta frente a posibles ataques, las principales herramientas para monitorizar las redes sociales, y casos de estudio en los que SOCMINT ha contribuido a la generación de Inteligencia para la resolución de casos.
2013): Reimagining cultural identity: transcultural and translingual communication in virtual third-space environments, Language, Culture and Curriculum,
This article examines cultural anxieties surrounding the life and death of online data. Through the examination of a wide range of discourses, including “lifestyle” news articles, online user comments, essays and books by novelists and... more
This article examines cultural anxieties surrounding the life and death of online data. Through the examination of a wide range of discourses, including “lifestyle” news articles, online user comments, essays and books by novelists and engineers, and the websites of information management services, I argue that death online—defined as the persistence of informatic remainders after the death of the human user—reveals how networked data are constructed as both an authentic duplicate of identity and as a threat to personal identity that must be managed. Because humans are understood as finite and mortal, while data are immortal and everlasting, the “life” formed out of online data is understood as beyond any possible control of the user. With the death of the user, the perceived connection between the user and data is revealed as a contingency rather than a necessity. Information is produced as autonomous. It is nearly identical to yet separate from the user; it belongs to nobody except, perhaps, the network itself.
As extensively debated, nowadays it is possible to recognize that digital is an essential substance that constitutes the basis of our cultural production as well as virtual identity. In fact, virtual identity should not be... more
As extensively debated, nowadays it is possible to recognize that digital is an essential substance that constitutes the basis of our cultural production as well as virtual identity. In fact, virtual identity should not be seen exclusively as a proliferation of the self in social networks in form of profile or avatar. Instead, it lies in the very deep substance of digital: the fact that every person is translated from the physics of oxygen and carbon to the physics of electron, and the logic of bits. For this reason become necessary to question what the digital is. Thus, it becomes necessary to entail an ontological perspective toward digital. The research presented here combines the idea of digital identity with digital ontology. Exposing issues like visual representation and materiality, it aims to provide the conceptual tools for an understanding of the digital nature.
This paper proposes to understand diplomacy as a form of impression management. Drawing on Erving Goffman’s dramaturgy, I show how diplomats seek to repair sudden cracks in the fragile international ... more
This paper proposes to understand diplomacy as a form of impression management. Drawing on Erving Goffman’s dramaturgy, I show how diplomats seek to repair sudden cracks in the fragile international order. I analyse Greenland’s and the Faroes’ puzzling ability to continue controversial seal and whale hunting despite massive international regulation and criticism. In diplomatic negotiations, the two former Danish colonies use post-colonial embarrassment and irony to push Denmark into negotiating an exemption to the EU’s ban on seal products in 2009 and defend pilot whale hunting in the Faroes. Analysing diplomacy as impression management implies, first, that diplomacy cannot be seen as a one-to-one reflection of the relative capabilities or identities of the involved states. Rather, diplomacy should be understood as a social world of its own, abiding to its own rules, norms and codes of conduct. Its inhabitants may represent national interests but they also defend particular views of cosmos and they are saving face. Second, a focus on face- work and social order may help explain both the “conformist” bias of diplomacy and the way it may enable contestation of hierarchies.