who and how am i online

36
Who and how am I online? Personal identity management for professional development 19 May2011

Upload: jisc-ssbr

Post on 22-Nov-2014

827 views

Category:

Education


0 download

DESCRIPTION

Presentation by George Roberts on 'Who and how am I online? Personal identity management for professional development – from the end-user’s perspective' at the LLLWFD ID Management assembly, Birmingham, May 2011

TRANSCRIPT

Page 1: Who and how am I online

Who and how am I online?

Personal identity management for professional development

19 May2011

Page 2: Who and how am I online

Who and how am I online?

From here to Facebook19 May2011

Page 3: Who and how am I online

Who and how am I online?

From Facebook to Eternity19 May2011

Page 4: Who and how am I online

Who and how am I online?

You are what you like19 May2011

Page 5: Who and how am I online

Aims• Identify tools (mediational means) developed by the JISC Institutional

Innovation Programme, which have the capacity to be deployed in personal identity projects.

• Articulate the concept of personal identity projects, which may take many forms, within which identity management issues arise:– Personal, e.g.

• Career change• Immigration and nationalisation• Education, formal and informal• Rehab• Life coaching• Sport and physical culture• New entitlements

– Practical, e.g.• Authentication and access control, privacy, confidentiality, security, market ptotection• Licence to practice/professionalisation

Page 6: Who and how am I online

Professional practice• Values-based

– UK PSF• Respect for individual learners• Commitment to incorporating the process and outcomes of relevant

research, scholarship and/or professional practice• Commitment to development of learning communities• Commitment to encouraging participation in higher education,

acknowledging diversity and promoting equality of opportunity• Commitment to continuing professional development and evaluation

of practice– Roberts (2011)

• emergent, instrumental and interpersonal • compassion, determination, resourcefulness, respect and solidarity • Participatory, user-centred design, student-centred learning

Page 7: Who and how am I online

Objectives• Articulate y/our own understanding of the nature

of human identity and how this is worked out in online/digital environments

• Explain y/our own online professional development practices in terms of identity projects or in the context of identity projects

• Explain steps that might be taken to better manage our online identity practice

• Build on the concept of multiple hybrid identities in order to more effectively represent our self to different audiences in different spheres

Page 8: Who and how am I online

Why? Symptomatic momentsTechnologically mediated practices impacting on identity and through which identity and rights need to be asserted•Digital Rights Management: Ian Kearns (2002), Code Red: iTunes, Spotify•Software sorting: society (Graham 2005)•Algorithms: People like you…:

– Amazon market information, Google/Facebook targeted ads, loyalty cards; credit card fraud detection,

– Data analytics in process-driven applications such as identifying and alerting people to risk of non-progression, in order that interventions might be made if required (JISC MCMS 2010)

•Cognitive science– Neuroplasticity– Neuromarketing: EmSense, the leader in quantitative neurometrics, …

have made direct brain activity measurement easier and scalable

Page 9: Who and how am I online

Associative, personalised links

• Associative, personalised links, …, are largely missing from both the theory and the practice of e-learning [and the Web].

Wendy Hall, Alt-C (2003)

Page 10: Who and how am I online

DRM Code Red• Technology to manage rights precedes the social, legislative or

philosophical establishment and/or protection of those rights.• Asserted rights (privilege) are given shape in DRM technologies in

advance of legislation and then either quietly grandfathered in or subsequently enacted.

• You have to submit some piece of identity, maybe embedded in hardware, implying right to use the device, to view or listen to the film or music, to which you have acquired limited rights. – You don’t buy a song, you acquire limited rights for a fee– See also Lessig and Creative Commons

• In the case of DRM these rights are in respect to copyright material.• Embraces everything from Pirate Bay through Pirates of the

Caribbean to academic publishing.(Kearns 2002)

Page 11: Who and how am I online

Software sorting• … central role of computerized code in shaping the social

and geographical politics of inequality in advanced societies. (Graham 2005)

In respect to market participation, the invisible hand gets a little help

• [W]hen you interact with a service online or by phone there may be software in action that mediates how you experience the service: by sorting you. Live in a high income postcode? Get routed to a sales person more quickly than if your IP address makes you look as if you come from a less promising area. On record as an awkward customer or "time-waster"? Then wait in the queue.

(Schmoller 2007)

Page 12: Who and how am I online

Amazon algorithms

• People like you

• "Algorithms are what make our site run, (and) such a unique place to shop. It's through algorithms that we're able to do things like make recommendations and tell you what customers who bought this item also bought," said Amazon spokeswoman Patty Smith.Read more: http://news.cnet.com/2100-1017-965068.html#ixzz1MlptErEd

Page 13: Who and how am I online

Neuromarketing• The EmSense neuromarketing database, now the

world’s largest, recently exceeded the 50,000 respondent milestone. These respondents draw from over 10 countries, including India and China. EmSense also collected eye-tracking data from 12,000 respondents, while 3,000 more were studied in actual retail environments as they completed typical shopping journeys.

• “The key advantage of a large database is that it provides rich norms, the element market researchers most desire. [my emphasis] [link]

Page 14: Who and how am I online

Facebook? Google?

• … don’t even go there

Page 15: Who and how am I online

Wendy Hall warns…

• Corporations, through loyalty cards and other sources of information already hold your portfolio.

• Suggests that new web technologies can help us individuals to manage our digital identity.

But, can they?

Page 16: Who and how am I online

Social/participatory media

• User-generated content

• Profiles, and semi-persistent public commentary on these profiles, and a traversable publicly articulated social (and now location aware) network displayed in relation to profiles (danah boyd)

• “… a literacy of participation” (Mike Wesch)

Page 17: Who and how am I online

Applications in

• Immigration and nationality• Education• Employment• Social order and control• Resilience• Health• Defence, war and security

Page 18: Who and how am I online

Via Helen Keegan

Page 19: Who and how am I online

Identity as a topic

• Social psychological

– “Weak”– “Strong”– Economic actor– Habitus

Page 20: Who and how am I online

Weak identity constructs

• Authentication, access, permissions

– Permissions tied to a token• Log-in, access to computer systems, credit cards

– Permissions tied to a (token tied to a) body• Passport, Drivers Licence

– To what extent is the token “tied” to the body?

Page 21: Who and how am I online

Strong identity constructs

• Gender, age, nationality, social class, embodiment, sexuality, trade, profession, taste, domestic circumstances, parentage, offspring

• To what extent are these individual “essentials” and to what extent are these social “ideals”

Page 22: Who and how am I online

Trust, security, confidentiality

Page 23: Who and how am I online

Economic actor• The problem of “identity theft”– Or misassignment

• Can this apply to other agencies?– Political actors? (Cyber war)– Domestic actors? (Cyber crimes and misdemeanours)

• What it it about “us” that might be compromised?

Page 24: Who and how am I online

Habitus

• Concept associated with and developed by Bourdieu– Also largely responsible for social capital theory

• The human phenotype expressing genetic and cultural inheritance in social context(s)

• Digital habitus

Page 25: Who and how am I online

Identity Projects• Identity projects do not just take place in the individual.

National identity projects are entered into regularly in response to immigration, social order and other cultural entitlements.

• Identity projects may “... involve efforts to acquire the attributes of an existing social identity...” Such an identity may be “real or mythical”. Or, conversely “There might very well be cases where an individual’s problem is to retain a given social identity against various destructive influences.” (Harre 1983)

• Digital Identity Projects• Identity projects are social and contextual: there is a formal

relationship between identity and unity/community.

Page 26: Who and how am I online

Via Helen Keegan

Page 27: Who and how am I online

• Policy documents concerned with lifelong learning records, access and authentication ( EDUCAUSE 2010, p.15ff; MIAP 2008) shows that:

– A unified, autonomous and continuous self is the basic constituent of the individual’s relationship with state authority, education, the law and commerce (Scollon 2003).

– This common-sense of the self incorporates two important components: • personal biography (the events or trajectory of one’s life)• And affective factors (feelings, emotions)

Page 28: Who and how am I online

Hybridity• Identity components• Reconfigurable• Multiple identities– MPD?

• Examples– Anglo-Welsh, and any other hyphenated descriptor– Learner-Teacher– Benevolent-Oppressor (colonial/parental)

• Identity politics

Page 29: Who and how am I online

It is not just about logging in

• I am a person with an institutional identity• I have an ATHENS/Shibboleth identity• I have access to propositional knowledge• I can grant/subvert access controls• I belong!• I can have this “belonging” taken away

Page 30: Who and how am I online

Conflated meanings at the institutional (and demonic) level

• Weak and strong identity clash in institutions and policy

• Public discourses on:– National identity– Immigration– Participation and progression– Plagiarism

Page 31: Who and how am I online

for example• The Unique Learner Number under the Managing Information

Across Partners (MIAP) Model, will further develop sub/superordinate relationships between institutions and individuals (MIAP 2008)

• the service is only indirectly aimed at “people” as common-sense of the self

• it is directly aimed at corporate persons known as “prescribed persons” (MIAP 2008 ..services/lrs/LRS_Perscribed_Organisations_List.htm) such as OFSTED, UCAS, the QCA and institutional providers of education.

• Common-sense selves – people – are entered into the system through “Learner Registration Bodies”, where only designated “superusers” are given access to the LRS.

• The itemisation of benefits of MIAP leads with the “learner”. But does it really put the learner first or anywhere near the centre of its purpose?” (MIAP 2008 ..benefits/)

Page 32: Who and how am I online

Via Patsy Clarke

Page 33: Who and how am I online

Discussion

• What do you do online? – work, learn, shop, civic engagement, play, etc

• What applications and/or websites do you use– Do you use multiple sites for any category of activity?

• What of your online activity can be said to have an overt element of identity projection

• Of those sites you use that do NOT have an overt element of identity projection, nevertheless, what might they “say about you”?

Page 34: Who and how am I online

Discussion

• What on-line tools (mediational means) do you use in your personal professional development practice?– Why these?

• What on-line tools (mediational means) do you use in the personal professional development practice, which you develop with others?– What are the barriers to adoption?

Page 35: Who and how am I online

Discussion• What tools (mediational means) developed by

the JISC Institutional Innovation Programme have the capacity to be deployed in personal identity projects?– Why these?

• Domains– Learning design– Mentoring– Assessment– Employment– Portfolios

Page 36: Who and how am I online

References

• Kearns, Ian. 2002. Code Red: Progressive politics in the digital age. London: IPPR.

• Graham, Steve. 2005. “Software-sorted geographies.” Progress in Human Geography 29 (5): 562-580. http://www.dur.ac.uk/geography/research/research_projects/?mode=pdetail&pdetail=39455

• Schmoller, Seb. The software-sorted society. Fortnightly Mailing. http://fm.schmoller.net/2007/01/the_softwaresor.html .