3. Critically assess the ways in which constructions of identity have been extended and/or altered by information and communication technologies.
Introduction
Constructions of identity have been extended and altered by information and communication technologies (IT and CT), and identity can now be constructed in ways like never before. Free availability of site content and online chat mediums make it easier for users to expand their exposure to new things and reconsider their identities. In an effort to thoroughly cover the related issues, this webliography presents sources addressing inter-connected issues relating to identity construction in the following order: the digital revolution and new (techno-) culture, tools for interpersonal communication, chat identities and the mask of text-based communication, women’s online identities, electronic communities, and weblogs.
General impact of IT and CT on identity constructions
Kelly proposes that technological advances have created a culture separate from, but not independent of, science and art: A “third culture” which seeks and values novelty as opposed to truth (science) and expression of the human condition and beauty (art). He presents this third culture as inherently reforming nerd status – from unappealing to highly desirable and respectable – bringing into question the (re)construction of the nerd identity. Kelly suggests the components of nerd culture, and therefore nerd identity also, such as the contribution of new words to the English language, the pursuit of novelty, online expression, and experience in virtual reality (VR). It is these components that have altered the construction of the nerd identity, and that provide ways for information and communication technologies (IT and CT) to extend individuals’ identity construction.
London's book review of Negroponte’s 1995
Being Digital briefly explores the translation of the physical to the virtual in a discussion of the impact of the contemporary technological revolution-turned-culture on “the future of human social life, work, entertainment and commerce.” He sheds light on the digital areas of “electronic communities”, the growing prevalence of e-mail, and the generational social divide caused by the techno-culture revolution and its unequal distribution of the commodity that is information, of which the younger generation enjoys more. This divide inherently involves a change in identity construction – i.e. our constructions of identity have been extended to include our relationship with technology, and, hence, the prevalence of IT and CT have altered sociological dynamics, redefining generational social differences and interpersonal communication.
The mask of electronic text-based communication
Carlstrom thoroughly explains the construction of text-based worlds (MUDs). She explains the things that can be created in these worlds (namely rooms, objects, character names and descriptions, and pets), how they are created, and what they (can) do. This article illustrates the potential of CT to extend and facilitate identity exploration and construction through freedom of expression. The construction of MUD characters is a means for exploring and experimenting with interaction via different characters that may or may not be accurate representations of the actual user. This exploration and experimentation leads the user to new experiences which may affect their identity.
Baker reports a study of 18 couples, the comprising partners of which had their first encounters online. Baker’s aim was to trace the process that begins with meeting in cyberspace and later offline. Baker reports differences perceived by participants between their partners’ online and offline identities and appearance; namely, shyness and physical appearance. Implicit in the differences between online and offline impressions/identities are the constituents of a user’s online identity; for example, a picture of themselves, their username, user-profile, and so forth. Depending on the extent of internet use, the empowerment of the user and their increased ability for self-determination and control over what is presented of themselves to others may result in dramatic identity shape-shifting as increasingly more of the user’s identity may be constructed in, and derived from, cyberspace.
Kearns reports the online felony committed to a 14 year old boy by university student Galen Baughman in Bloomington, Indiana, USA in 2003, and the ensuing investigation and arrest of Baughman. An undercover investigator assumed the boy’s online identity in interactions with Baughman, who mistook the investigator for the 14 year old, and sent him pornographic material. The undercover investigator assuming the 14 year old boy’s online identity highlights the fundamental aspects of constructing an identity online: reportedly the investigator signed in to the chat medium (unspecified in the article) with the boy’s username and password, and mimicked the boy’s language responses. This illustrates that text-based communication provides an easily manipulated mask behind which may be a user (e.g. an undercover investigator) who is vastly different from the identity purported (e.g. a 14 year old boy). CT thus enables easy construction of different identities, interactions under which may facilitate identity-altering self-exploration.
Arnold and Miller offer an insightful report of a small study which investigated female academics’ online identities, referring to issues of authenticity (the ‘person factor’), credibility (of work) and authority (of their voice and perspective). An influential overtone was the acceptability of the online female identity construction to both the viewer and creator. That acceptability of women’s online representation is an issue reflects online gender struggles; i.e. reactions to the legacy of women’s oppression. The research uncovered participants’ perception of the internet as empowering and providing new freedom; for example, building homepages reportedly allows for exploration, expression, and renewal of respondents’ identities. Respondents reported an increased sense of security, worth, and control in expressing their work and opinions online, suggesting that the internet is altering female academics’ identity constructions. Also, the internet extends expressions of identity, by way of increased accessibility of academics’ work, which was previously restricted to conferences and journal publications. “Women who have been struggling not to be in the minority or invisible in their positions in academia, can now become visible” as a result of a building of confidence that occurred online behind a text-based mask.
‘Maskless’ personal expression and exploration online
In discussing the development of women-targeted sites,
Brown highlights definitions of womanhood: the constituents of traditional definitions, Brown refers to as “fluff” -- a term encompassing beauty, sex and housekeeping tips, horoscopes, and celebrity gossip. An arguably ideal definition includes independence (e.g. DIY tips), worldly awareness, financial capability and autonomy, and intelligence. The essay’s own implicit definition of womanhood is mixed, and reflects the struggles involved in developing a consensual definition. Without the internet this development may have come later or progressed slower, as Brown writes that women have been exposed to issues and ideas they “never really saw before the Web”. The implications of this are alterations of female identity constructions, and the acceleration of these alterations.
Bruckman illustrates the diversity of form and content of internet communities. As identity influences membership to communities, community membership influences identity construction. Electronic communities are yet another means for self-exploration and, hence, another extension to the development of users’ identity constructions. The nature of electronic communities is, in many cases, different from offline communities, in terms of both content and members. Online communities provide new avenues for self-exploration and -discovery, and this is another way in which IT and CT both extend and alter users’ identity constructions.
Blood provides an account of the increasingly prevalent weblog: its origins, developments and purposes. She clarifies that the original weblog was exclusive to the html-proficient internet user, and its purpose was to analytically scrutinize the content of websites and online articles. The exclusivity and the content restrictions of weblogs rapidly receded with the introduction of the free-form interface blogger.com provided and the bandwagon-jumping of a broad clientele. Blood highlights the potential for a weblog to be a facility, not only for self-expression, but also for self-discovery. This is an illustration of the weblog as an extension of identity construction, as it inherently allows for the user to be exposed to issues and ideas they may not encounter offline.
References
Arnold, Jill & Miller, Hugh. Same Old Gender Plot? Women Academics’ Identities on the Web, May 2000,
http://ess.ntu.ac.uk/miller/cyberpsych/gendplot.html, accessed 29th August 2004.
Baker, Andrea. “Cyberspace Couples Finding Romance Online Then Meeting for the First Time in Real Life” CMC Magazine, July 1998,
http://www.december.com/cmc/mag/1998/jul/baker.html, accessed 22nd August 2004.
Blood, Rebecca. “Weblogs: A History and Perspective” Rebecca’s Pocket, 7 September 2000,
http://www.rebeccablood.net/essays/weblog_history.html, accessed 25th August 2004.
Brown, Janelle. What Happened to the Women’s Web?, 25th August 2000,
http://dir.salon.com/tech/feature/2000/08/25/womens_web/index.html, accessed 29th August 2004.
Bruckman, Amy. Finding One’s Own in Cyberspace, 1996,
http://www.fragment.nl/mirror/various/Bruckman_A.1996.Finding_ones_own.html, accessed 25th August 2004.
Carlstrom, Eva-Lise. Better Living Through Language, 15th May 1992,
http://ftp.game.org/pub/mud/text/research/communicative.txt, accessed 26th August 2004.
Kearns, Colin. “Student Arrested for Child Porn”, U-Wire, 17th April 2003,
http://www.idsnews.com/story.php?id=16228, accessed 26th August 2004.
Kelly, Kevin. The Third Culture, 26th February 1998,
http://www.edge.org/3rd_culture/kelly/, accessed 28th August 2004.
London, Scott. Being Digital by Nicholas Negroponte, 1995,
http://www.scottlondon.com/reviews/negroponte.html, accessed August 27th 2004.