Skip to main content
Log in

Practical versus moral identities in identity management

  • Original Paper
  • Published:
Ethics and Information Technology Aims and scope Submit manuscript

Abstract

Over the past decade Identity Management has become a central theme in information technology, policy, and administration in the public and private sectors. In these contexts the term ‘Identity Management’ is used primarily to refer to ways and methods of dealing with registration and authorization issues regarding persons in organizational and service-oriented domains. Especially due to the growing range of choices and options for, and the enhanced autonomy and rights of, employees, citizens, and customers, there is a growing demand for systems that enable the regulation of rights, duties, responsibilities, entitlements and access of innumerable people simultaneously. ‘Identity Management’ or ‘Identity Management Systems’ have become important headings under which such systems are designed and implemented. But there is another meaning of the term ‘identity management’, which is clearly related and which has gained currency. This second construal refers to the need to manage our moral identities and our identity related information. This paper explores the relation between the management of our (moral) identities and ‘Identity Management’ as conceptualized in IT discourse.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  • Ayres, I. (2007). Super crunchers: Why thinking-by-numbers is the new way to be smart. New York: Bantam Dell.

    Google Scholar 

  • Baumann, Z. (1993). Postmodern ethics. Oxford: Wiley-Blackwell.

    Google Scholar 

  • Berlin, I. (1969). Four essays on liberty. Oxford: Oxford University Press.

    Google Scholar 

  • Blanchette, J.-F., & Johnson, D. G. (2002). Data retention and the panoptic society: The social benefits of forgetfulness. The Information Society: An International Journal, 18(1), 33–45.

    Google Scholar 

  • Borowski, E. J. (1976). Identity and personal identity. Mind, 85(340), 481–502.

    Article  Google Scholar 

  • Bransen, J. (1996). Identification and the idea of an alternative of oneself. European Journal of Philosophy, 4(1), 1–16.

    Article  Google Scholar 

  • Bransen, J. (2000). Alternatives of oneself recasting some of our practical problems. Philosophy and Phenomenological Research, 60(2), 381–400.

    Article  Google Scholar 

  • Bransen, J. (2008). Personal identity management. In C. Mackenzie & K. Atkins (Eds.), Practical identity and narrative agency (pp. 101–120). New York: Routledge.

    Google Scholar 

  • Brey, P. (2004). Disclosive computer ethics. In R. A. Spinello & H. T. Tavani (Eds.), Readings in CyberEthics (pp. 55–66). Sudbury, MA: Jones and Bartlett.

    Google Scholar 

  • Chaum, D. (1984). A new paradigm for individuals in the information age. IEEE Symposium on Security and Privacy, 1984, 99–106.

    Google Scholar 

  • Cocking, D., & Kennett, J. (1998). Friendship and the self. Ethics, 108, 502–527.

    Article  Google Scholar 

  • Cocking, D., & Matthews, S. (2001). Unreal friends. Ethics and Information Technology, 2, 223–231.

    Article  Google Scholar 

  • Copp, D. (2002). Social unity and the identity of persons. The Journal of Political Philosophy, 10, 365–391.

    Article  Google Scholar 

  • Coven, V. (2003). A history of statistics in the social sciences. Gateway, available at http://www.grad.usask.ca/gateway/art_Coven_spr_03.pdf. Last retrieved Jun 15 2009.

  • Davis, S. (2009). A conceptual analysis of identity. In I. Kerr, V. Steeves, & C. Lucock (Eds.), Lessons from the identity trail (pp. 205–218). New York: Oxford University Press.

    Google Scholar 

  • de Hert, P. (2008). Beyond identity? Identity in the Information Society, 1, 123–133.

    Article  Google Scholar 

  • De Vries, K. (2010). Identity, profiling algorithms and a world of ambient intelligence. Ethics and Information Technology, 12(1). doi: 10.1007/s10676-009-9215-9.

  • DeGrazia, D. (2005). Human identity and bioethics. Cambridge: Cambridge University Press.

    Book  Google Scholar 

  • Erikson, E. (1968). Identity: Youth and crisis. New York: Norton.

    Google Scholar 

  • Flanagan, M., Howe, D., & Nissenbaum, H. (2008). Embodying values in technology: Theory and practice. In J. van den Hoven & J. Weckert (Eds.), Information technology and moral philosophy. Cambridge: Cambridge University Press.

    Google Scholar 

  • Friedman, B. (Ed.). (1997). Human values and the design of computer technology. New York: Cambridge University Press and CSLI, Stanford University.

    Google Scholar 

  • Friedman, B., & Kahn, P. (2003). Human values, ethics, and design. In J. Jacko & A. Sears (Eds.), The human–computer interaction handbook (pp. 1177–1201). Mahwah, NJ: Lawrence Erlbaum Associates.

    Google Scholar 

  • Gandy, O. (1993). The panoptic sort: A political economy of personal information. Boulder: Westview Press.

    Google Scholar 

  • Gates, H.-L. (1992). Statistical stigmata. In D. Cornell, et al. (Eds.), Deconstruction and the possibility of justice (pp. 330–345). New York: Routledge.

    Google Scholar 

  • Gergen, K. (1998). Erzahlung, Moralische Identitat und Historisches Bewusstsein. Eine sozialkonstruktionistische Darstellung. In J Straub (Ed.), Identitat und Historisches Bewusstsein (pp. 170–202). Suhrkamp, Frankfurt. (English version “Narrative, moral identity and historical consciousness: A social constructionist account” available at http://www.swarthmore.edu/x21118.xml).

  • Gigerenzer, G. (2007). Gut feelings: The intelligence of the unconscious. New York: Penguin.

    Google Scholar 

  • Gigerenzer, G., et al. (1989). The empire of chance: How probability changed science and everyday life. Cambridge: Cambridge University Press.

    Google Scholar 

  • Glover, J. (1988). I: The philosophy and psychology of personal identity. Goldman: Penguin Press.

  • Glymour, C. (2004). The automation of discovery. Dædalus, 133, 69–77.

    Article  Google Scholar 

  • Goffman, E. (1956). The presentation of self in everyday life. New York: Doubleday.

    Google Scholar 

  • Goffman, E. (1963). Stigma: Notes on the management of spoiled identity. Englewood Cliffs, NJ: Prentice-Hall.

    Google Scholar 

  • Hacking, I. (1986). Making up people. In T. C. Heller, M. Sosna, & D. E. Wellbery (Eds.), Reconstructing individualism: Autonomy, individuality, and the self in western thought (pp. 222–236). Stanford: Stanford University Press.

    Google Scholar 

  • Hacking, I. (1987). Was there a probabilistic revolution 1800–1930? In Lorenz. Krüger, et al. (Eds.), The probabilistic revolution: Volume 1, ideas in history. Cambridge: MIT Press.

    Google Scholar 

  • Hand, D. J. (1998). Data mining, statistics and more? The American Statistician, 52, 112–118.

    Article  Google Scholar 

  • Harre, R. (1983). Personal being. Oxford: Blackwell.

    Google Scholar 

  • Heesterbeek, T. (2008). U wordt verdacht. Session report of the Rathenau Technology Festival “Het Glazen Lichaam” (02-02-2008), available at http://www.scisa.eu/downloadfile.asp?ID=1362 last retrieved Jun 15 2009.

  • Heidegger, M. (1927). Sein und Zeit. Tubingen: Max Niemeyer.

    Google Scholar 

  • Hildebrandt, M. (2006). Privacy and identity. In E. Claes, A. Duff, & S. Gutwirth (Eds.), Privacy and the criminal law (pp. 43–57). Intersentia: Antwerpen.

    Google Scholar 

  • Hildebrandt, M. (2008). Profiling and the identity of European citizens. In M. Hildebrandt & S. Gutwirth (Eds.), Profiling the European citizen. Cross disciplinary perspectives (pp. 303–326). Dordrecht: Springer.

    Google Scholar 

  • Kamler, H. (1994). Identification and character–A book on psychological development. Albany: State University of New York Press.

    Google Scholar 

  • Kierkegaard (alias Anti-Climacus), S. (1849). The sickness unto death. Copenhagen: Copenhagen University Bookseller Reitzel’s Press. In H. V. Hong, & E. H. Hong (Eds.) (1978) Kierkegaard’s writings (Vol. 6). Princeton, NJ: Princeton University Press.

  • Korsgaard, C. M. (1989). Personal identity and the unity of agency: A Kantian response to parfit. Philosophy & Public Affairs, 18(2), 103–131.

    Google Scholar 

  • Korsgaard, C. M. (2009). Self-constitution: Agency, identity, and integrity. Oxford: Oxford University Press.

    Google Scholar 

  • Leibniz, W. G. (1969). Discourse on metaphysics. Dordrecht: Loemker.

    Google Scholar 

  • Lessig, L. (1999). Code and other laws of cyberspace. New York: Basic Books.

    Google Scholar 

  • MacIntyre, A. (1984). After virtue (2nd ed.). Notre Dame: University of Notre Dame Press.

    Google Scholar 

  • Manders-Huits, N., & Zimmer, M. (2009). Values and pragmatic action: The challenges of introducing ethical intelligence in technical design communities. International Review of Information Ethics, 10, 37–44.

    Google Scholar 

  • Mead, G. H. (1913). The social self. Journal of Philosophy, Psychology and Scientific Methods, 10, 374–380.

    Article  Google Scholar 

  • Mead, G. H. (1934). Edited by W. Morris, Mind, self, and society: From the standpoint of a social behaviorist. Chicago: University of Chicago Press.

  • Mill, J. S. (1972). Edited by H. B. Acton, On liberty. London: Everyman Edition.

  • Nagel, T. (1998). Concealment and exposure. Philosophy & Public Affairs, 27(1), 3–30.

    Article  Google Scholar 

  • Nissenbaum, H. (2001). How computer systems embody values. IEEE Computer, 120, 118–119.

    Google Scholar 

  • O’Reilly, T. (2005). What is web 2.0. O’Reilly network. http://www.oreillynet.com/pub/a/oreilly/tim/news/2005/09/30/what-is-web-20.html. Last retrieved Jun 15 2009.

  • Parfit, D. (1984). Reasons and persons. Oxford: Oxford University Press.

    Google Scholar 

  • Perry, J. (2010). On knowing one’s self. In S. Gallagher (Ed.), Oxford handbook of the self. Oxford: Oxford University Press.

    Google Scholar 

  • Quetelet, A. (1842). Sur l’homme et le développement de ses facultés ou Essai de physique sociale. Paris: Bachelier, 1835 (Trans: R. Chambers) A Treatise on Man and the Development of his Faculties. Edinburgh.

  • Quetelet, A. (1984). Research on the propensity for crime at different ages. 1831 (Trans: S. F. Sylvester), Anderson, Cincinnati.

  • Raab, C. (2009). Identity: Difference and categorization. In I. Kerr, C. Lucock, & V. Steeves (Eds.), Lessons from the identity trail: Anonymity, privacy and identity in a networked society. Oxford: Oxford University Press.

    Google Scholar 

  • Ricoeur, P. (1992) Soi-Meme Comme un Autre. Paris: Editions du Seuil, 1990 (Trans: Kathleen Blamey), Oneself as another. Chicago: University of Chicago Press.

  • Schechtman, M. (1996). The constitution of selves. Ithaca: Cornell University Press.

    Google Scholar 

  • Shoemaker, D. W. (2010). Self-exposure and exposure of the self: Informational privacy and the presentation of identity. Ethics and Information Technology, 12(1). doi:10.1007/s10676-009-9186-x.

  • Solove, D. (2004). The digital person. Technology and privacy in the information age. New York: New York University Press.

    Google Scholar 

  • Strawson, G. (2004). Against narrativity. Ratio (New Series) XVII, 4, 428–452.

    Google Scholar 

  • Sunstein, C. (2001). The daily we. Is the internet really a blessing for democracy? Boston Review. Available at: http://www.bostonreview.net/BR26.3/sunstein.html.

  • Sunstein, C. (2007). Republic.com 2.0. Princeton: Princeton University Press.

    Google Scholar 

  • Taylor, C. (1989). Sources of the self: The making of the modern identity. Cambridge: Harvard University Press.

    Google Scholar 

  • Tewari, F. R. (2005). Identity management defined: How to position enterprises into the identity management framework. Master Thesis, Erasmus University Rotterdam, The Netherlands.

  • Van den Hoven, J. (1998). Privacy and the varieties of informational wrongdoing. Australian Journal of Professional and Applied Ethics, 1(1), 30–43, reprinted in J. Weckert (Ed.). (2007). Computer ethics. The international library of essays in public and professional ethics (pp. 317–330). London: Ashgate.

  • Van den Hoven, J., & Manders-Huits, N. (2006). Identiteitsmanagement en Morele Identificatie. Algemeen Nederlands Tijdschrift voor Wijsbegeerte, 98(2), 111–127.

    Google Scholar 

  • Velleman, J. D. (2001). The genesis of shame. Philosophy & Public Affairs, 30, 27–52.

    Article  Google Scholar 

  • Velleman, J. D. (2005). The self as narrator. In John. Christman & Joel. Anderson (Eds.), Autonomy and the challenges to liberalism: New essays. Cambridge NY: Cambridge University Press.

    Google Scholar 

  • Velleman, J. D. (2006). Self to self. Cambridge: Cambridge University Press.

    Book  Google Scholar 

  • Velleman, J. D. (2008). Bodies, selves. American Imago, 65(3), 405–426.

    Article  Google Scholar 

  • Wilson, J., Peebles, R., et al. (2006). Surfing for thinness: A pilot study of pro-eating disorder website usage in adolescents with eating disorders. Pediatrics, 6(118), e1635–e1643.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Noëmi Manders-Huits.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Manders-Huits, N. Practical versus moral identities in identity management. Ethics Inf Technol 12, 43–55 (2010). https://doi.org/10.1007/s10676-010-9216-8

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10676-010-9216-8

Keywords

Navigation