Abstract
Over the past decade Identity Management has become a central theme in information technology, policy, and administration in the public and private sectors. In these contexts the term ‘Identity Management’ is used primarily to refer to ways and methods of dealing with registration and authorization issues regarding persons in organizational and service-oriented domains. Especially due to the growing range of choices and options for, and the enhanced autonomy and rights of, employees, citizens, and customers, there is a growing demand for systems that enable the regulation of rights, duties, responsibilities, entitlements and access of innumerable people simultaneously. ‘Identity Management’ or ‘Identity Management Systems’ have become important headings under which such systems are designed and implemented. But there is another meaning of the term ‘identity management’, which is clearly related and which has gained currency. This second construal refers to the need to manage our moral identities and our identity related information. This paper explores the relation between the management of our (moral) identities and ‘Identity Management’ as conceptualized in IT discourse.
Similar content being viewed by others
References
Ayres, I. (2007). Super crunchers: Why thinking-by-numbers is the new way to be smart. New York: Bantam Dell.
Baumann, Z. (1993). Postmodern ethics. Oxford: Wiley-Blackwell.
Berlin, I. (1969). Four essays on liberty. Oxford: Oxford University Press.
Blanchette, J.-F., & Johnson, D. G. (2002). Data retention and the panoptic society: The social benefits of forgetfulness. The Information Society: An International Journal, 18(1), 33–45.
Borowski, E. J. (1976). Identity and personal identity. Mind, 85(340), 481–502.
Bransen, J. (1996). Identification and the idea of an alternative of oneself. European Journal of Philosophy, 4(1), 1–16.
Bransen, J. (2000). Alternatives of oneself recasting some of our practical problems. Philosophy and Phenomenological Research, 60(2), 381–400.
Bransen, J. (2008). Personal identity management. In C. Mackenzie & K. Atkins (Eds.), Practical identity and narrative agency (pp. 101–120). New York: Routledge.
Brey, P. (2004). Disclosive computer ethics. In R. A. Spinello & H. T. Tavani (Eds.), Readings in CyberEthics (pp. 55–66). Sudbury, MA: Jones and Bartlett.
Chaum, D. (1984). A new paradigm for individuals in the information age. IEEE Symposium on Security and Privacy, 1984, 99–106.
Cocking, D., & Kennett, J. (1998). Friendship and the self. Ethics, 108, 502–527.
Cocking, D., & Matthews, S. (2001). Unreal friends. Ethics and Information Technology, 2, 223–231.
Copp, D. (2002). Social unity and the identity of persons. The Journal of Political Philosophy, 10, 365–391.
Coven, V. (2003). A history of statistics in the social sciences. Gateway, available at http://www.grad.usask.ca/gateway/art_Coven_spr_03.pdf. Last retrieved Jun 15 2009.
Davis, S. (2009). A conceptual analysis of identity. In I. Kerr, V. Steeves, & C. Lucock (Eds.), Lessons from the identity trail (pp. 205–218). New York: Oxford University Press.
de Hert, P. (2008). Beyond identity? Identity in the Information Society, 1, 123–133.
De Vries, K. (2010). Identity, profiling algorithms and a world of ambient intelligence. Ethics and Information Technology, 12(1). doi: 10.1007/s10676-009-9215-9.
DeGrazia, D. (2005). Human identity and bioethics. Cambridge: Cambridge University Press.
Erikson, E. (1968). Identity: Youth and crisis. New York: Norton.
Flanagan, M., Howe, D., & Nissenbaum, H. (2008). Embodying values in technology: Theory and practice. In J. van den Hoven & J. Weckert (Eds.), Information technology and moral philosophy. Cambridge: Cambridge University Press.
Friedman, B. (Ed.). (1997). Human values and the design of computer technology. New York: Cambridge University Press and CSLI, Stanford University.
Friedman, B., & Kahn, P. (2003). Human values, ethics, and design. In J. Jacko & A. Sears (Eds.), The human–computer interaction handbook (pp. 1177–1201). Mahwah, NJ: Lawrence Erlbaum Associates.
Gandy, O. (1993). The panoptic sort: A political economy of personal information. Boulder: Westview Press.
Gates, H.-L. (1992). Statistical stigmata. In D. Cornell, et al. (Eds.), Deconstruction and the possibility of justice (pp. 330–345). New York: Routledge.
Gergen, K. (1998). Erzahlung, Moralische Identitat und Historisches Bewusstsein. Eine sozialkonstruktionistische Darstellung. In J Straub (Ed.), Identitat und Historisches Bewusstsein (pp. 170–202). Suhrkamp, Frankfurt. (English version “Narrative, moral identity and historical consciousness: A social constructionist account” available at http://www.swarthmore.edu/x21118.xml).
Gigerenzer, G. (2007). Gut feelings: The intelligence of the unconscious. New York: Penguin.
Gigerenzer, G., et al. (1989). The empire of chance: How probability changed science and everyday life. Cambridge: Cambridge University Press.
Glover, J. (1988). I: The philosophy and psychology of personal identity. Goldman: Penguin Press.
Glymour, C. (2004). The automation of discovery. Dædalus, 133, 69–77.
Goffman, E. (1956). The presentation of self in everyday life. New York: Doubleday.
Goffman, E. (1963). Stigma: Notes on the management of spoiled identity. Englewood Cliffs, NJ: Prentice-Hall.
Hacking, I. (1986). Making up people. In T. C. Heller, M. Sosna, & D. E. Wellbery (Eds.), Reconstructing individualism: Autonomy, individuality, and the self in western thought (pp. 222–236). Stanford: Stanford University Press.
Hacking, I. (1987). Was there a probabilistic revolution 1800–1930? In Lorenz. Krüger, et al. (Eds.), The probabilistic revolution: Volume 1, ideas in history. Cambridge: MIT Press.
Hand, D. J. (1998). Data mining, statistics and more? The American Statistician, 52, 112–118.
Harre, R. (1983). Personal being. Oxford: Blackwell.
Heesterbeek, T. (2008). U wordt verdacht’. Session report of the Rathenau Technology Festival “Het Glazen Lichaam” (02-02-2008), available at http://www.scisa.eu/downloadfile.asp?ID=1362 last retrieved Jun 15 2009.
Heidegger, M. (1927). Sein und Zeit. Tubingen: Max Niemeyer.
Hildebrandt, M. (2006). Privacy and identity. In E. Claes, A. Duff, & S. Gutwirth (Eds.), Privacy and the criminal law (pp. 43–57). Intersentia: Antwerpen.
Hildebrandt, M. (2008). Profiling and the identity of European citizens. In M. Hildebrandt & S. Gutwirth (Eds.), Profiling the European citizen. Cross disciplinary perspectives (pp. 303–326). Dordrecht: Springer.
Kamler, H. (1994). Identification and character–A book on psychological development. Albany: State University of New York Press.
Kierkegaard (alias Anti-Climacus), S. (1849). The sickness unto death. Copenhagen: Copenhagen University Bookseller Reitzel’s Press. In H. V. Hong, & E. H. Hong (Eds.) (1978) Kierkegaard’s writings (Vol. 6). Princeton, NJ: Princeton University Press.
Korsgaard, C. M. (1989). Personal identity and the unity of agency: A Kantian response to parfit. Philosophy & Public Affairs, 18(2), 103–131.
Korsgaard, C. M. (2009). Self-constitution: Agency, identity, and integrity. Oxford: Oxford University Press.
Leibniz, W. G. (1969). Discourse on metaphysics. Dordrecht: Loemker.
Lessig, L. (1999). Code and other laws of cyberspace. New York: Basic Books.
MacIntyre, A. (1984). After virtue (2nd ed.). Notre Dame: University of Notre Dame Press.
Manders-Huits, N., & Zimmer, M. (2009). Values and pragmatic action: The challenges of introducing ethical intelligence in technical design communities. International Review of Information Ethics, 10, 37–44.
Mead, G. H. (1913). The social self. Journal of Philosophy, Psychology and Scientific Methods, 10, 374–380.
Mead, G. H. (1934). Edited by W. Morris, Mind, self, and society: From the standpoint of a social behaviorist. Chicago: University of Chicago Press.
Mill, J. S. (1972). Edited by H. B. Acton, On liberty. London: Everyman Edition.
Nagel, T. (1998). Concealment and exposure. Philosophy & Public Affairs, 27(1), 3–30.
Nissenbaum, H. (2001). How computer systems embody values. IEEE Computer, 120, 118–119.
O’Reilly, T. (2005). What is web 2.0. O’Reilly network. http://www.oreillynet.com/pub/a/oreilly/tim/news/2005/09/30/what-is-web-20.html. Last retrieved Jun 15 2009.
Parfit, D. (1984). Reasons and persons. Oxford: Oxford University Press.
Perry, J. (2010). On knowing one’s self. In S. Gallagher (Ed.), Oxford handbook of the self. Oxford: Oxford University Press.
Quetelet, A. (1842). Sur l’homme et le développement de ses facultés ou Essai de physique sociale. Paris: Bachelier, 1835 (Trans: R. Chambers) A Treatise on Man and the Development of his Faculties. Edinburgh.
Quetelet, A. (1984). Research on the propensity for crime at different ages. 1831 (Trans: S. F. Sylvester), Anderson, Cincinnati.
Raab, C. (2009). Identity: Difference and categorization. In I. Kerr, C. Lucock, & V. Steeves (Eds.), Lessons from the identity trail: Anonymity, privacy and identity in a networked society. Oxford: Oxford University Press.
Ricoeur, P. (1992) Soi-Meme Comme un Autre. Paris: Editions du Seuil, 1990 (Trans: Kathleen Blamey), Oneself as another. Chicago: University of Chicago Press.
Schechtman, M. (1996). The constitution of selves. Ithaca: Cornell University Press.
Shoemaker, D. W. (2010). Self-exposure and exposure of the self: Informational privacy and the presentation of identity. Ethics and Information Technology, 12(1). doi:10.1007/s10676-009-9186-x.
Solove, D. (2004). The digital person. Technology and privacy in the information age. New York: New York University Press.
Strawson, G. (2004). Against narrativity. Ratio (New Series) XVII, 4, 428–452.
Sunstein, C. (2001). The daily we. Is the internet really a blessing for democracy? Boston Review. Available at: http://www.bostonreview.net/BR26.3/sunstein.html.
Sunstein, C. (2007). Republic.com 2.0. Princeton: Princeton University Press.
Taylor, C. (1989). Sources of the self: The making of the modern identity. Cambridge: Harvard University Press.
Tewari, F. R. (2005). Identity management defined: How to position enterprises into the identity management framework. Master Thesis, Erasmus University Rotterdam, The Netherlands.
Van den Hoven, J. (1998). Privacy and the varieties of informational wrongdoing. Australian Journal of Professional and Applied Ethics, 1(1), 30–43, reprinted in J. Weckert (Ed.). (2007). Computer ethics. The international library of essays in public and professional ethics (pp. 317–330). London: Ashgate.
Van den Hoven, J., & Manders-Huits, N. (2006). Identiteitsmanagement en Morele Identificatie. Algemeen Nederlands Tijdschrift voor Wijsbegeerte, 98(2), 111–127.
Velleman, J. D. (2001). The genesis of shame. Philosophy & Public Affairs, 30, 27–52.
Velleman, J. D. (2005). The self as narrator. In John. Christman & Joel. Anderson (Eds.), Autonomy and the challenges to liberalism: New essays. Cambridge NY: Cambridge University Press.
Velleman, J. D. (2006). Self to self. Cambridge: Cambridge University Press.
Velleman, J. D. (2008). Bodies, selves. American Imago, 65(3), 405–426.
Wilson, J., Peebles, R., et al. (2006). Surfing for thinness: A pilot study of pro-eating disorder website usage in adolescents with eating disorders. Pediatrics, 6(118), e1635–e1643.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Manders-Huits, N. Practical versus moral identities in identity management. Ethics Inf Technol 12, 43–55 (2010). https://doi.org/10.1007/s10676-010-9216-8
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10676-010-9216-8