The Content and Context of Identity in a Digital Society

Our team has undertaken a study designed to explore the context and content of IT identity in a digital society. The work involves conducting semi-structured, reflective interviews—based on the results of a 20 Statements exercise—and analysis based on grounded theory. Our initial findings indicate that our participants have complex relationships with a range of IT that has become embedded in their daily lives, and provide evidence in support of IT’s role as a medium, determinant, and consequent of identity. Further, we see the emergence of weak and strong IT identities and the emergence of a weak antiIT identity. By iterating on our processes and reflecting on our results, we have been able to tune our methods and inform future recruitment goals. Moving forward, we expect that expanding the diversity in our group of participants will reveal greater insights into the ways that participation in a digital society influences the formation and expression of one’s role, group, personal, and IT (or anti-IT) identities.

[1]  Alan R. Dennis,et al.  Individual Swift Trust and Knowledge-Based Trust in Face-to-Face and Virtual Team Members , 2009, J. Manag. Inf. Syst..

[2]  Martin H. Levinson Alone Together: Why We Expect More from Technology and Less from Each Other , 2011 .

[3]  Alicia D. Cast,et al.  A Theory of Self-Esteem , 2002 .

[4]  P. Burke,et al.  A sociological approach to self and identity , 2003 .

[5]  Lin Yan,et al.  Writing to the unknown: bloggers and the presence of backpackers , 2011, Inf. Technol. People.

[6]  N. Hoffart Basics of Qualitative Research: Techniques and Procedures for Developing Grounded Theory , 2000 .

[7]  L. Floridi Information: A Very Short Introduction , 2010 .

[8]  Na Liu,et al.  Understanding the Influence of Social Identity on Social Support Seeking Behaviors in Virtual Healthcare Community , 2010, ICIS.

[9]  M. Kuhn,et al.  An empirical investigation of self-attitudes. , 1954 .

[10]  Jason Bennett Thatcher,et al.  Mobile Devices and the Self: Developing the Concept of Mobile Phone Identity , 2013 .

[11]  W. Swann,et al.  Self-verification: The search for coherence , 2003 .

[12]  P. Burke,et al.  Trust and commitment through self-verification. , 1999 .

[13]  Ulrike Schultze,et al.  Performing embodied identity in virtual worlds , 2014, Eur. J. Inf. Syst..

[14]  Viswanath Venkatesh,et al.  Unified Theory of Acceptance and Use of Technology: A Synthesis and the Road Ahead , 2016, J. Assoc. Inf. Syst..

[15]  Ritu Agarwal,et al.  Electronic Health Records Assimilation and Physician Identity Evolution: An Identity Theory Perspective , 2012, Inf. Syst. Res..

[16]  Susan Clayton,et al.  Environmental Identity: A Conceptual and an Operational Definition. , 2003 .

[17]  Cathy Urquhart,et al.  Putting the ‘theory’ back into grounded theory: guidelines for grounded theory studies in information systems , 2009, Inf. Syst. J..

[18]  Varun Grover,et al.  Me, My Self, and I(T): Conceptualizing Information Technology Identity and its Implications , 2015, MIS Q..

[19]  Ute Hillmer Technology Acceptance in Mechatronics: The Influence of Identity on Technology Acceptance , 2009 .

[20]  Peter Burke,et al.  The Roots of Identity Theory , 2009 .

[21]  S. Stryker Symbolic Interactionism: A Social Structural Version , 1980 .

[22]  P. Burke,et al.  The Past, Present, and Future of an Identity Theory* , 2000 .

[23]  Rosío Alvarez,et al.  Examining technology, structure and identity during an Enterprise System implementation , 2008, Inf. Syst. J..

[24]  Peter Burke,et al.  The Link between Identity and Role Performance , 1981 .

[25]  Roger Martin,et al.  Social Entrepreneurship: The Case for Definition , 2007 .

[26]  Ritu Agarwal,et al.  Adoption of Electronic Health Records in the Presence of Privacy Concerns: The Elaboration Likelihood Model and Individual Persuasion , 2009, MIS Q..

[27]  Mireille Gettler-Summa,et al.  Expectable use: An important facet of IT usage , 2016, J. Strateg. Inf. Syst..

[28]  Koen Luyckx,et al.  Introduction: Toward an Integrative View of Identity , 2011 .

[29]  Emmanuelle Vaast,et al.  Speaking as one, but not speaking up: Dealing with new moral taint in an occupational online community , 2015, Inf. Organ..