Monday, February 19, 2007

QotW5: The Power of Online Identities


To many, the Internet is God sent. It has made our lives so convenient and has drastically changed the way we live. Shopping has been taken online, socializing and meeting new people can be done online, even such a personal and high security activity like banking can be done online today. However, can we really go about doing all our activities via this medium, which disallows us from seeing or knowing for sure whom the other party across the net really is? Perhaps what is lurking at the back of our minds while we lead our virtual lives today, is the question of identity – The online identity. This paper will discuss the issues of reputation and deception with regards to the freedom and ease of creating online identities.

In the physical world, it is easy to recognize and acknowledge people as themselves when we see them due to their physical attributes. However when interacting online, people need to create a certain character or personality to create a presence. In instances where Internet users rather not use their real identities, they create for themselves an online identity, which is a “social identity that network users establish in online communities” (“Online Identity”, 2007). Two types of online identities are pseudonyms and avatars. In lieu of their real names, Internet users use pseudonyms, which are like aliases that people use online. These pseudonyms “reveal varying amounts of personally identifiable information” of the users (“Online Identity”, 2007). Avatars on the other hand, are not names or words but icon-sized graphic images that Internet users can use to represent themselves visually.

Identity plays a key role in virtual communities (Donath, 1996). Everyone of us who owns an email account, owns an online identity. With blogs, forums, and social networks like Friendster and Myspace, being all the rage these days, many people are taking on different online identities when they enter different online sites. This is because, usernames are needed when signing up for an account at a new website and the information required to be given is often the user’s email address. The username is the equivalent to one’s name and email address the equivalent to one’s home address of sort. Thus, one can easily adopt a brand new identity by merely creating another account with a different username.

So, what exactly is the danger of people having the freedom of creating multiple different identities for themselves? I believe the main purpose to that is none other than to deceive. Owning a “fake” online identity gives us the power to trick others into believing what we want them to believe or perceive us to be. Examples of false identities are rampent in IRC chatrooms. Most people log onto IRC and join chatrooms, identitiable only by their nicknames or pseudonyms. Such pseudonyms can be considered what is termed as, conventional signals. According to Donath (1996), “Conventional signals are open to deception” where the user of that particular pseudonym need not possess the trait in order to make the signal which in this case, is his or her own chat room nickname. A nickname like “Boy_19” would suggest the user to be a 19-year-old male, and “Ballerina_87”, a 20-year-old female who loves ballet. However, all these attributes we assume to be true may be merely a scam and part of the other party’s plan to trick or deceive us.


Because of the bad reputation IRC has earned itself, thanks to the “baddies” preying on impressionable young girls seeking fun online, it is the first thing that comes to mind when we speak of deception and online identities. What doesn’t occur to us however is that problems pertaining to false online identities and deception are not only pertinent to IRC chat rooms; web logs, forums and online social networks are not spared either. The one online identity I am most familiar with would have to be the identity reflected via my very own personal blog.

My blog is essentially the tangible version of my character and personality. It reflects so much of me, and I guess you can say, “Sam, I can read you like an open book!” when you browse through my blog. Like most bloggers, my blog consists of my photographs, memories, experiences, my likes and dislikes, and even personal thoughts. Important dates, people, places and activities are also listed in there. It has come to a point where one wouldn’t even need to meet me to know me. It is simply because of that, I am aware that my online identity could easily be stolen. What reputation I have built, and image that I have established, could be destroyed by someone armed with a computer and the luxury of some free time.

On top of reading my profile and blog entries, a third party could find out even more about me by reading my friends’ blogs, which I have linked to mine as well as skim though my tag board which displays interaction between my friends and I. With all the essential information about me, that identity “thief” could pose as me at other online sites or forums that I frequent. The danger here, lies in the scary fact that while posing as me, these thieves could interact with my friends online and in turn retrieve even more of my personal information. With the information obtained, “reputation theft” would be as simple as ABC.

“As a new and specialized form of identity theft, "reputation theft" could occur when someone successfully hijacks the reputational characteristics of another” (Kaye, 2004; Newitz, 2003). With that, the thief could assume my identity and practice “reputation theft” in one of the forums I frequent and also possibly pull off a Troll under my identity.

Identity deception is exactly what the game of trolling is about, “albeit one that is played without the consent of most of the players. The troll attempts to pass as a legitimate participant, sharing the group's common interests and concerns” and is made to leave when the newsgroup members have identified him as one (Donath, 1996). As I have established a reputation in some of the forums I frequent, it would be a nightmare to find my identity stolen and end up being accused of trolling. As Donath (1996) has stated, “being branded a troll is quite damaging to one's online reputation.” Besides being labeled a troll, the reputation that I have established in those forums would be destroyed and I would have to go through the trouble and agony of creating a brand new account with a brand new username and start building up my reputation from scratch again.

This situation may be hypothetical but should not be dismissed as ideas of an overly imaginative or paranoid person. In the virtual world, these concerns are definitely relevant and thus, we should look out for our safety and learn to protect our identities and ourselves while we continue to dwell in cyberspace.
________________________________________________________________

References

Donath, J.S. (1996) “Identity and Deception in the Virtual Community” Retrieved February 16, 2007 from http://smg.media.mit.edu/people/Judith/Identity/IdentityDeception.html


Masum, H and Zhang, Y.C. (2004) “Manifesto for the Reputation Society” Retrieved February 16, 2007 from http://smg.media.mit.edu/people/Judith/Identity/IdentityDeception.html

Newitz, A. (2003) "Defenses lacking at social network sites," Retrieved
February 19, 2007, from http://www.securityfocus.com/news/7739

Online identity. (2007, February 15). In Wikipedia, The Free Encyclopedia. Retrieved 09:28, February 17, 2007, from http://en.wikipedia.org/w/index.php?title=Online_identity&oldid=108207999

Thursday, February 8, 2007

QotW4: No Such Thing As a Free Lunch? Get Free Gifts Instead!

We humans are a skeptical bunch and choose to believe that there is no such thing as a free lunch in this world. What people give, they expect double in return – be wary of others! That is the way we have been taught by our parents and society to believe since the day we could decipher words and meanings. Could the human race be turning so cold, selfish and unfeeling? Are we turning into creatures devoid of the need to be interdependent or bonded to each other? Or are we simply afraid of losing out? This paper will discuss the gift economy, its mechanics, limitations, and its effects on our lives.

With the advancement in technology, more people are tuning in to the virtual world and spending even more of their time there. When more people get together online, they slowly discover that many others out there in the virtual space share their very same interests. When that happens, people start to form virtual communities and forums, which are the equivalent of the many interest groups we see in reality. Interaction in such virtual communities and forums is part of a gift economy. According to Rheingold (1993), a gift economy is a place “in which help and information is offered without the expectation of any direct, immediate quid-pro-quo.” This gifting is deemed as altruistic without the implicit expectation of reciprocation and thus, is not to be confused with the concept of a gift transaction.

It is easy to confuse the concept of “gift transaction” and a “commodity transaction” as there is only a very fine line that sets them apart. In order to explain this, we first need to know exactly what a gift is. Carrier (1991) defines a gift as the obligatory transfer of inalienable objects or services between related and mutually obligated transactors. The important factor that sets these two concepts apart is the existance of a “relationship” between the giver and the receiver. A friend who gifts does not expect anything in return but the friendship/relationship is sustained by the genuine desire, on the part of the receiver to give back. A “commodity transaction” however, consists of no obligation at all after the exchange is consummated (Kollock, 1999). In essence, “gifts are exchanged between individuals who are part of an ongoing interdependent relationship [while] in a commodities transaction, the individuals are self-interested, independent actors” (Carrier, 1991).

As stated earlier on, online communities are a huge part of today’s gift economy. I personally enjoy participating in discussions in several forums and online communities. Being a part of these communities allows me free access to a pool of information which is relevent to my life and also provides me with a sense of belonging. One of the online communities I frequent is DanceForums.




At DanceForums, dance enthusiasts from all over the world come together to discuss their common passion – Dance. Dancers post questions or updates in the dance scene, which are then responded to by other members of the forum. People can interact and learn more from each other about via discussions in the forum. After all, the gift economy, in this case, forums, can be viewed as an outlet where people can come together "to learn, to understand, to change and take charge of the world" (Pollard, 2005). At DanceForums, there are even subgroups to accommodate the different dance genres. The genres range from a diverse mix of classical ballet, hip hop, Irish, jazz, all the way to belly dancing. People can seek help with choreography, dance music, and even discuss dancewear brands. Such discussions are very useful as the suggestions and advice contributed are mostly the result of experience. Often, the people who contribute the most are more recognized in the forum and are well respected by other members. These people who are more highly involved in contributing to the forum by “offering advice and information [also] seem to receive more help more quickly when they ask for something” (Wellman & Gulia, 1997; Rheingold, 1993).

As we can already see, a gift economy really works in a cycle, which has the contributor on the receiving end too at some point in time. For the relationships that exist among members of an online community to thrive, people need to both give and take. After all, it all boils down to ‘synergy’, where the sum of the parts adds up to more than the whole. By balancing giving and taking, the gift economy can be taken to a higher and more promising level.



References

Bandura, Albert (editor). 1995. Self-Efficacy in Changing Societies. Cambridge: Cambridge University Press.

Kollock, Peter (1999). 'The Economies of Online Cooperation; Gifts and Public Goods in Cyberspace" Retrieved February 8, 2007 from http://www.sscnet.ucla.edu/soc/faculty/kollock/papers/economies.htm

Pollard, Dave (2005). "The Gift Economy" Retrieved February 8, 2007 from http://blogs.salon.com/0002007/2005/04/17.html

Rheingold, Howard. 1993. The Virtual Community: Homesteading on the Electronic Frontier. New York: Addison-Wesley.

Wikipedia (2007). Gift economy. Retrieved February 8, 2007 from http://en.wikipedia.org/wiki/Gift_economy