Advertisement

Ethics and Information Technology

, Volume 12, Issue 1, pp 43–55 | Cite as

Practical versus moral identities in identity management

  • Noëmi Manders-Huits
Original Paper

Abstract

Over the past decade Identity Management has become a central theme in information technology, policy, and administration in the public and private sectors. In these contexts the term ‘Identity Management’ is used primarily to refer to ways and methods of dealing with registration and authorization issues regarding persons in organizational and service-oriented domains. Especially due to the growing range of choices and options for, and the enhanced autonomy and rights of, employees, citizens, and customers, there is a growing demand for systems that enable the regulation of rights, duties, responsibilities, entitlements and access of innumerable people simultaneously. ‘Identity Management’ or ‘Identity Management Systems’ have become important headings under which such systems are designed and implemented. But there is another meaning of the term ‘identity management’, which is clearly related and which has gained currency. This second construal refers to the need to manage our moral identities and our identity related information. This paper explores the relation between the management of our (moral) identities and ‘Identity Management’ as conceptualized in IT discourse.

Keywords

Ethics and information technology Identity Values in design Identity management Profiling Ambient intelligence Identification Self-identity Nominal identity Identity construction Self-informative identity 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ayres, I. (2007). Super crunchers: Why thinking-by-numbers is the new way to be smart. New York: Bantam Dell.Google Scholar
  2. Baumann, Z. (1993). Postmodern ethics. Oxford: Wiley-Blackwell.Google Scholar
  3. Berlin, I. (1969). Four essays on liberty. Oxford: Oxford University Press.Google Scholar
  4. Blanchette, J.-F., & Johnson, D. G. (2002). Data retention and the panoptic society: The social benefits of forgetfulness. The Information Society: An International Journal, 18(1), 33–45.Google Scholar
  5. Borowski, E. J. (1976). Identity and personal identity. Mind, 85(340), 481–502.CrossRefGoogle Scholar
  6. Bransen, J. (1996). Identification and the idea of an alternative of oneself. European Journal of Philosophy, 4(1), 1–16.CrossRefGoogle Scholar
  7. Bransen, J. (2000). Alternatives of oneself recasting some of our practical problems. Philosophy and Phenomenological Research, 60(2), 381–400.CrossRefGoogle Scholar
  8. Bransen, J. (2008). Personal identity management. In C. Mackenzie & K. Atkins (Eds.), Practical identity and narrative agency (pp. 101–120). New York: Routledge.Google Scholar
  9. Brey, P. (2004). Disclosive computer ethics. In R. A. Spinello & H. T. Tavani (Eds.), Readings in CyberEthics (pp. 55–66). Sudbury, MA: Jones and Bartlett.Google Scholar
  10. Chaum, D. (1984). A new paradigm for individuals in the information age. IEEE Symposium on Security and Privacy, 1984, 99–106.Google Scholar
  11. Cocking, D., & Kennett, J. (1998). Friendship and the self. Ethics, 108, 502–527.CrossRefGoogle Scholar
  12. Cocking, D., & Matthews, S. (2001). Unreal friends. Ethics and Information Technology, 2, 223–231.CrossRefGoogle Scholar
  13. Copp, D. (2002). Social unity and the identity of persons. The Journal of Political Philosophy, 10, 365–391.CrossRefGoogle Scholar
  14. Coven, V. (2003). A history of statistics in the social sciences. Gateway, available at http://www.grad.usask.ca/gateway/art_Coven_spr_03.pdf. Last retrieved Jun 15 2009.
  15. Davis, S. (2009). A conceptual analysis of identity. In I. Kerr, V. Steeves, & C. Lucock (Eds.), Lessons from the identity trail (pp. 205–218). New York: Oxford University Press.Google Scholar
  16. de Hert, P. (2008). Beyond identity? Identity in the Information Society, 1, 123–133.CrossRefGoogle Scholar
  17. De Vries, K. (2010). Identity, profiling algorithms and a world of ambient intelligence. Ethics and Information Technology, 12(1). doi:  10.1007/s10676-009-9215-9.
  18. DeGrazia, D. (2005). Human identity and bioethics. Cambridge: Cambridge University Press.CrossRefGoogle Scholar
  19. Erikson, E. (1968). Identity: Youth and crisis. New York: Norton.Google Scholar
  20. Flanagan, M., Howe, D., & Nissenbaum, H. (2008). Embodying values in technology: Theory and practice. In J. van den Hoven & J. Weckert (Eds.), Information technology and moral philosophy. Cambridge: Cambridge University Press.Google Scholar
  21. Friedman, B. (Ed.). (1997). Human values and the design of computer technology. New York: Cambridge University Press and CSLI, Stanford University.Google Scholar
  22. Friedman, B., & Kahn, P. (2003). Human values, ethics, and design. In J. Jacko & A. Sears (Eds.), The human–computer interaction handbook (pp. 1177–1201). Mahwah, NJ: Lawrence Erlbaum Associates.Google Scholar
  23. Gandy, O. (1993). The panoptic sort: A political economy of personal information. Boulder: Westview Press.Google Scholar
  24. Gates, H.-L. (1992). Statistical stigmata. In D. Cornell, et al. (Eds.), Deconstruction and the possibility of justice (pp. 330–345). New York: Routledge.Google Scholar
  25. Gergen, K. (1998). Erzahlung, Moralische Identitat und Historisches Bewusstsein. Eine sozialkonstruktionistische Darstellung. In J Straub (Ed.), Identitat und Historisches Bewusstsein (pp. 170–202). Suhrkamp, Frankfurt. (English version “Narrative, moral identity and historical consciousness: A social constructionist account” available at http://www.swarthmore.edu/x21118.xml).
  26. Gigerenzer, G. (2007). Gut feelings: The intelligence of the unconscious. New York: Penguin.Google Scholar
  27. Gigerenzer, G., et al. (1989). The empire of chance: How probability changed science and everyday life. Cambridge: Cambridge University Press.Google Scholar
  28. Glover, J. (1988). I: The philosophy and psychology of personal identity. Goldman: Penguin Press.Google Scholar
  29. Glymour, C. (2004). The automation of discovery. Dædalus, 133, 69–77.CrossRefGoogle Scholar
  30. Goffman, E. (1956). The presentation of self in everyday life. New York: Doubleday.Google Scholar
  31. Goffman, E. (1963). Stigma: Notes on the management of spoiled identity. Englewood Cliffs, NJ: Prentice-Hall.Google Scholar
  32. Hacking, I. (1986). Making up people. In T. C. Heller, M. Sosna, & D. E. Wellbery (Eds.), Reconstructing individualism: Autonomy, individuality, and the self in western thought (pp. 222–236). Stanford: Stanford University Press.Google Scholar
  33. Hacking, I. (1987). Was there a probabilistic revolution 1800–1930? In Lorenz. Krüger, et al. (Eds.), The probabilistic revolution: Volume 1, ideas in history. Cambridge: MIT Press.Google Scholar
  34. Hand, D. J. (1998). Data mining, statistics and more? The American Statistician, 52, 112–118.CrossRefGoogle Scholar
  35. Harre, R. (1983). Personal being. Oxford: Blackwell.Google Scholar
  36. Heesterbeek, T. (2008). U wordt verdacht. Session report of the Rathenau Technology Festival “Het Glazen Lichaam” (02-02-2008), available at http://www.scisa.eu/downloadfile.asp?ID=1362 last retrieved Jun 15 2009.
  37. Heidegger, M. (1927). Sein und Zeit. Tubingen: Max Niemeyer.Google Scholar
  38. Hildebrandt, M. (2006). Privacy and identity. In E. Claes, A. Duff, & S. Gutwirth (Eds.), Privacy and the criminal law (pp. 43–57). Intersentia: Antwerpen.Google Scholar
  39. Hildebrandt, M. (2008). Profiling and the identity of European citizens. In M. Hildebrandt & S. Gutwirth (Eds.), Profiling the European citizen. Cross disciplinary perspectives (pp. 303–326). Dordrecht: Springer.Google Scholar
  40. Kamler, H. (1994). Identification and character–A book on psychological development. Albany: State University of New York Press.Google Scholar
  41. Kierkegaard (alias Anti-Climacus), S. (1849). The sickness unto death. Copenhagen: Copenhagen University Bookseller Reitzel’s Press. In H. V. Hong, & E. H. Hong (Eds.) (1978) Kierkegaard’s writings (Vol. 6). Princeton, NJ: Princeton University Press.Google Scholar
  42. Korsgaard, C. M. (1989). Personal identity and the unity of agency: A Kantian response to parfit. Philosophy & Public Affairs, 18(2), 103–131.Google Scholar
  43. Korsgaard, C. M. (2009). Self-constitution: Agency, identity, and integrity. Oxford: Oxford University Press.Google Scholar
  44. Leibniz, W. G. (1969). Discourse on metaphysics. Dordrecht: Loemker.Google Scholar
  45. Lessig, L. (1999). Code and other laws of cyberspace. New York: Basic Books.Google Scholar
  46. MacIntyre, A. (1984). After virtue (2nd ed.). Notre Dame: University of Notre Dame Press.Google Scholar
  47. Manders-Huits, N., & Zimmer, M. (2009). Values and pragmatic action: The challenges of introducing ethical intelligence in technical design communities. International Review of Information Ethics, 10, 37–44.Google Scholar
  48. Mead, G. H. (1913). The social self. Journal of Philosophy, Psychology and Scientific Methods, 10, 374–380.CrossRefGoogle Scholar
  49. Mead, G. H. (1934). Edited by W. Morris, Mind, self, and society: From the standpoint of a social behaviorist. Chicago: University of Chicago Press.Google Scholar
  50. Mill, J. S. (1972). Edited by H. B. Acton, On liberty. London: Everyman Edition.Google Scholar
  51. Nagel, T. (1998). Concealment and exposure. Philosophy & Public Affairs, 27(1), 3–30.CrossRefGoogle Scholar
  52. Nissenbaum, H. (2001). How computer systems embody values. IEEE Computer, 120, 118–119.Google Scholar
  53. O’Reilly, T. (2005). What is web 2.0. O’Reilly network. http://www.oreillynet.com/pub/a/oreilly/tim/news/2005/09/30/what-is-web-20.html. Last retrieved Jun 15 2009.
  54. Parfit, D. (1984). Reasons and persons. Oxford: Oxford University Press.Google Scholar
  55. Perry, J. (2010). On knowing one’s self. In S. Gallagher (Ed.), Oxford handbook of the self. Oxford: Oxford University Press.Google Scholar
  56. Quetelet, A. (1842). Sur l’homme et le développement de ses facultés ou Essai de physique sociale. Paris: Bachelier, 1835 (Trans: R. Chambers) A Treatise on Man and the Development of his Faculties. Edinburgh.Google Scholar
  57. Quetelet, A. (1984). Research on the propensity for crime at different ages. 1831 (Trans: S. F. Sylvester), Anderson, Cincinnati.Google Scholar
  58. Raab, C. (2009). Identity: Difference and categorization. In I. Kerr, C. Lucock, & V. Steeves (Eds.), Lessons from the identity trail: Anonymity, privacy and identity in a networked society. Oxford: Oxford University Press.Google Scholar
  59. Ricoeur, P. (1992) Soi-Meme Comme un Autre. Paris: Editions du Seuil, 1990 (Trans: Kathleen Blamey), Oneself as another. Chicago: University of Chicago Press.Google Scholar
  60. Schechtman, M. (1996). The constitution of selves. Ithaca: Cornell University Press.Google Scholar
  61. Shoemaker, D. W. (2010). Self-exposure and exposure of the self: Informational privacy and the presentation of identity. Ethics and Information Technology, 12(1). doi: 10.1007/s10676-009-9186-x.
  62. Solove, D. (2004). The digital person. Technology and privacy in the information age. New York: New York University Press.Google Scholar
  63. Strawson, G. (2004). Against narrativity. Ratio (New Series) XVII, 4, 428–452.Google Scholar
  64. Sunstein, C. (2001). The daily we. Is the internet really a blessing for democracy? Boston Review. Available at: http://www.bostonreview.net/BR26.3/sunstein.html.
  65. Sunstein, C. (2007). Republic.com 2.0. Princeton: Princeton University Press.Google Scholar
  66. Taylor, C. (1989). Sources of the self: The making of the modern identity. Cambridge: Harvard University Press.Google Scholar
  67. Tewari, F. R. (2005). Identity management defined: How to position enterprises into the identity management framework. Master Thesis, Erasmus University Rotterdam, The Netherlands.Google Scholar
  68. Van den Hoven, J. (1998). Privacy and the varieties of informational wrongdoing. Australian Journal of Professional and Applied Ethics, 1(1), 30–43, reprinted in J. Weckert (Ed.). (2007). Computer ethics. The international library of essays in public and professional ethics (pp. 317–330). London: Ashgate.Google Scholar
  69. Van den Hoven, J., & Manders-Huits, N. (2006). Identiteitsmanagement en Morele Identificatie. Algemeen Nederlands Tijdschrift voor Wijsbegeerte, 98(2), 111–127.Google Scholar
  70. Velleman, J. D. (2001). The genesis of shame. Philosophy & Public Affairs, 30, 27–52.CrossRefGoogle Scholar
  71. Velleman, J. D. (2005). The self as narrator. In John. Christman & Joel. Anderson (Eds.), Autonomy and the challenges to liberalism: New essays. Cambridge NY: Cambridge University Press.Google Scholar
  72. Velleman, J. D. (2006). Self to self. Cambridge: Cambridge University Press.CrossRefGoogle Scholar
  73. Velleman, J. D. (2008). Bodies, selves. American Imago, 65(3), 405–426.CrossRefGoogle Scholar
  74. Wilson, J., Peebles, R., et al. (2006). Surfing for thinness: A pilot study of pro-eating disorder website usage in adolescents with eating disorders. Pediatrics, 6(118), e1635–e1643.CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media B.V. 2010

Authors and Affiliations

  1. 1.Department of Technology, Policy, and ManagementPhilosophy Section Delft University of TechnologyDelftThe Netherlands

Personalised recommendations