Skip to main content
Log in

Identity as an emerging field of study

Areas of research and the cross-disciplinary challenge

  • Schwerpunkt
  • Published:
Datenschutz und Datensicherheit - DuD Aims and scope Submit manuscript

Abstract

With the introduction of digital media, publicly available networks and the development of the Information Society, identity has become a pressing contemporary issue with wide ranging impli-cations. This article outlines diverse areas of identity-related research and reviews the relevant literature on offer. Analysis of the research to date leads to the conclusion that cross-disciplinary approach is called for if we are to achieve a comprehensive understanding of Identity in the Information Society.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

Literature

  1. Alpert, S. A. (2003). „Protecting medical privacy: Challenges in the age of genetic information.“ Journal of Social Issues 59(2): 301–22.

    Article  Google Scholar 

  2. Backhouse, J. (1996). Information @ Risk. Information Strategy, The Economist. 3: 33–5.

    Google Scholar 

  3. Backhouse, J., Ed. (2005). Structured account of approaches on interoperability, FIDIS WP4, Del 4.2.

  4. Barrett, M., S. Sahay, et al. (2001). „Information technology and social transformation: GIS for forestry management in India.“ Information Society 17(1): 5–20.

    Article  Google Scholar 

  5. Barrett, M. and G. Walsham (1999). „Electronic trading and work transformation in the London Insurance Market.“ Information Systems Research 10(1): 1–22.

    Google Scholar 

  6. Bresson, E. and J. Stern (2001). Efficient revocation in group signatures. Public Key Cryptography, Proceedings. 1992: 190–206.

    Article  MathSciNet  Google Scholar 

  7. Caughey, M. (2004). „Keeping attorneys from trashing identities: Malpractice as backstop protection for clients under the united states judicial conference’s policy on electronic court records.“ Washington Law Review 79(1): 407–35.

    Google Scholar 

  8. Foreman, P. and D. A. Whetten (2002). „Members’ identification with multiple-identity organizations.“ Organization Science 13(6): 618–35.

    Article  Google Scholar 

  9. Hardey, M. (2002). „Life beyond the screen: embodiment and identity through the internet.“ Sociological Review 50(4): 570–85.

    Article  Google Scholar 

  10. Hirose, S. and S. Yoshida (2001). A user authentication scheme with identity and location privacy. Information Security and Privacy, Proceedings. 2119: 235–46.

    Article  Google Scholar 

  11. Hoffman, D. L., T. P. Novak, et al. (1999). „Information privacy in the marketspace: Implications for the commercial uses of anonymity on the Web.“ Information Society 15(2): 129–39.

    Article  Google Scholar 

  12. Hogg, M. A. and D. J. Terry (2000). „Social identity and self categorization processes in organizational contexts.“ Academy of Management Review 25: 121–40.

    Article  Google Scholar 

  13. Hoogensen, G. and S. V. Rottem (2004). „Gender identity and the subject of security.“ Security Dialogue 35(2): 155–71.

    Article  Google Scholar 

  14. Karreman, D. and M. Alvesson (2004). „Cages in tandem: Management control, social identity, and identification in a knowledge-intensive firm.“ Organization 11(1): 149–75.

    Article  Google Scholar 

  15. Lamb, R. and E. Davidson (2005). „Information and communication technology challenges to scientific professional identity.“ Information Society 21(1): 1–24.

    Article  Google Scholar 

  16. Lehning, P. B. (2001). „European Citizenship: Towards a European Identity?“ Law and Philosophy 20(3): 239–82.

    Google Scholar 

  17. Liebenau, J. and J. Backhouse (1990). Understanding Information: An Introduction. Basingstoke and London, Macmillan Press.

    Google Scholar 

  18. Nabeth, T. and M. Hildebrandt, Eds. (2005). D 2.1 Inventory of topics and clusters, FIDIS WP2, to be published at www.fidis.net in 2005.

  19. Nabeth, T., Ed. (2005). FIDIS Wiki of the Identity Domain, FIDIS WP2, working document available at http://www.calt.insead.edu/fidis/.

  20. Phillips, D. J. (1998). „The social construction of a secure, anonymous electronic payment system: frame alignment and mobilization around Ecash.“ Journal of Information Technology 13(4): 273–83.

    Article  Google Scholar 

  21. Robison, W. L. (1997). „Privacy and personal identity.“ Ethics & Behavior 7(3): 195–205.

    Article  Google Scholar 

  22. Stamper, R., K. Liu, et al. (2000). „Understanding the roles of signs and norms in organizations—a semiotic approach to information systems design.“ Behaviour and Information Technology 19(1): 15–28.

    Article  Google Scholar 

  23. Tambyah, S. K. (1996). Life on the net: The reconstruction of self and community. Advances in Consumer Research. 23: 172–7.

    Google Scholar 

  24. Terry, W. D. (2000). „Electronic identity theft.“ Communications of the ACM 43(5): 12–3.

    Google Scholar 

  25. Williams, M. C. (1998). „Identity and the politics of security.“ European Journal of International Relations 4(2): 204–25.

    Article  Google Scholar 

Download references

Authors

Additional information

Dr Ruth Halperin Research Fellow, London School of Economics and Political Science. Research focus on the Social aspects of Identity in the Information Society

Rights and permissions

Reprints and permissions

About this article

Cite this article

Halperin, R. Identity as an emerging field of study. DuD 30, 533–537 (2006). https://doi.org/10.1007/s11623-006-0137-y

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11623-006-0137-y

Keywords

Navigation