Skip to main content

POST Identity and equality

While I was thinking about this, I happened on an article in The New Yorker that really made me think about the importance of virtual identities, the practical impact of personae. The article concerned X Anderson, the Chair of the University of Michigan’s department of philosophy and a "champion of the view that equality and freedom are mutually dependent”. Her thinking encapsulates and enlightens some of my long-held view on the need for transactional interaction via multiple virtual identities. She says that “people now have the freedom to have crosscutting identities in different domains". What she refers to her as domains are the different contexts in which transactions occur. As she goes on to day, "At church, I’m one thing. At work, I’m something else. I’m something else at home, or with my friends".

The ability to manage these separate identities and partition their use across domains is, she argues, utterly vital. The ability "to be able to slip in and adopt whatever values and norms are appropriate while retaining one’s identities in other domains” she says, “is what it is to be free”.

xxx

Comments

Popular posts from this blog

We could fix mobile security, you know. We don't, but we could

Earlier in the week I blogged about mobile banking security , and I said that in design terms it is best to assume that the internet is in the hands of your enemies. In case you think I was exaggerating… The thieves also provided “free” wireless connections in public places to secretly mine users’ personal information. From Gone in minutes: Chinese cybertheft gangs mine smartphones for bank card data | South China Morning Post Personally, I always use an SSL VPN when connected by wifi (even at home!) but I doubt that most people would ever go to this trouble or take the time to configure a VPN and such like. Anyway, the point is that the internet isn’t secure. And actually SMS isn’t much better, which is why it shouldn’t really be used for securing anything as important as home banking. The report also described how gangs stole mobile security codes – which banks automatically send to card holders’ registered mobile phones to verify online transactions – by using either a Trojan...