Who owns your identity on the social web




















Eichhorn does lightly gesture to a kind of universal human right, one that runs counter to the whims of companies that use data. For some, this belief might reflect a distinctly American approach to the rest of the world. More plausibly, she cites the right to be forgotten , which is the nickname of both data privacy regulations in Europe and movements against naming minors in the media.

We also have the right to stay as we are. In some cases, retaining our sense of self across chasms that might destroy it is more important than having a rebellious phase. Are all photos documentary? This explains the prevalence of disappearing photos, like Instagram stories and Snapchat. Jurgenson is also a sociologist for Snap Inc. It also explains photos of food, which are rarely artful or worth saving. For Jurgenson, taking social photos changes the way vision works—a process that began with the advent of cameras and is still evolving today.

Teen-agers are cyborgs, and their phones are mechanical eyes that help them interpret their experience. If anything, he fears the prevalence of death.

He cites Wolfgang Schivelbusch, a German scholar who wrote about the effect of the railway on human perception. It would, indeed, be stunning if we were able to see painful moments from the past—the ones we meditate on for years—as dead and embalmed. In recent decades, identity has exploded as a political theme; identity groups, especially marginalised ones, sought recognition and respect precisely as bearers of an identity. Hence the faultline I mentioned. Over the years and around the world, taxi drivers, putting their expertise to the test, have sized me up.

Puzzled by the combination of my accent and my appearance, once our ride is under way, taxi drivers regularly ask me where I was born. What they mean to ask is where my family came from originally. The answer to the question of origins is that I come from two families in two places pretty far apart. My mother was English, a countrywoman at heart, who in the s was working for an anti-racist organisation in London that supported colonial students.

It was called Racial Unity. That was how she met my father, a law student from Ghana then the Gold Coast. You might say she practised what she preached. My father raised us with stories of his family, and one of the names he gave me, Akroma-Ampin, was that of the illustrious 18th-century general who founded his lineage. I could have told those taxi drivers I had no family at all. Hearing my name, he brightened and took my hand warmly.

And precisely because social identities continue to be shadowed by that precursor sense of an innermost self, the dance on the borderlines of identity can be delicate.

Shaun King, the Black Lives Matters activist, speaks, dresses and wears his hair in ways that are marked as black. Mostly, people have. But there are limit cases. In the real world, the German model Martina Adam has announced that she has transitioned to black with the help of melanin-promoting hormones and various filler injections and, citing a baptismal ceremony she underwent in Kenya, is to be called Malaika Kubwa.

The public response was no more supportive than that which greeted the retired baseball great Sammy Sosa when he dramatically whitened his once dark visage. Dolezal now says she identifies as black, but not as African American. Identity norms are enforced in myriad ways, and the work that goes into entrenching them reveals their vulnerability. No doubt many middle-class women were and are perfectly happy as managers of households and primary caregivers for children. While many of their features look enticing, such as a common logon system, it is imperative that we evaluate the risks associated with these platforms before we dive in.

Consider new ways of protecting your website from third party risks, leveraging certification and tokenization solutions to protect user identities. This extra step may not seem favorable at first, but it certainly will in the event your organization is breached through third party identification services. Bring your own identity , by Merritt Maxim. Other Related Articles: Authentication. Get in touch to better understand how our solutions secure ecommerce and billions of transactions worldwide.

September Throughout the last decade, social media has played a vital part in our lives and has significantly shaped the younger generations.

Risks Not so fast… There has been a lot of research and topic around the pros and cons of leveraging a common digital identity system, and it is clear there are a number of critical risks that must be considered when using a social media company to handle user authentication.

Resolutions Ideas have popped up from time to time to create a central digital identity management authority outside of social media platforms across the web, however that also poses a risk as it could act as a single point of failure. A good example is Sidebar, which is developing personalized TV experiences driven by use of multiple streams of real-time data. If I want the convenience and delight of innovative, screen-based experiences, I have to get over my queasiness about surrendering data.

For most digital natives, and a rapidly growing number of the rest of us, I think that line has been crossed. Folks who dislike disclosure, sharing, transparency and living in public may never wind up sampling the tasty Kool-Aid of new media fun and wind up outside the conversation entirely. This strikes me as similar in spirit to efforts like the Electronic Frontier Foundation, the open source movement, and Creative Commons. I for one am grateful to these idealistic geeks who formulate deep technical solutions premised upon user empowerment, rather than regulation or technophobia.

What do you think about the future of the virtual self. Do you want to own or control your own digital data?



0コメント

  • 1000 / 1000