The Online Construction of Personal Identity through Trust and Privacy

Abstract: Constructing a personal identity is an activity much more complex than elaborating a series of online profiles, which are only digital hints of the Self. The construction of our personal identity is a context-mediated activity. Our hypothesis is that young people are enabled, as digital natives and social network users, to co-construct the “context of communication” in which their narrative identities will be interpreted and understood. In particular, the aim of this paper is to show that such “context of communication”, which can be seen as the hermeneutical counterpart of the “networked publics” elaborated by Danah Boyd, emerges out of the tension between trust and privacy. In other terms, it is, on the one hand, the outcome of a web of trustful relations and, on the other, the framework in which the informational norms regulating teens’ expectations of privacy protection are set and evaluated. However, these expectations can be frustrated, since the information produced in such contexts can be disembedded and re-contextualized across time. The general and widespread use of information technology is, in fact, challenging our traditional way of thinking about the world and our identities in terms of stable and durable structures; they are reconstituted, instead, into novel forms.

[1]  Jannis Kallinikos,et al.  The Consequences of Information: Institutional Implications of Technological Change , 2007 .

[2]  Paul Virilio Speed and Politics: An Essay on Dromology , 1986 .

[3]  P. Burke The classical foundations of modern historiography , 1994 .

[4]  Leon J. Goldstein The End of History and the Last Man , 1993 .

[5]  Seounmi Youn Determinants of Online Privacy Concern and Its Influence on Privacy Protection Behaviors Among Young Adolescents , 2009 .

[6]  A. Lenhart,et al.  Teens, privacy and online social networks: How teens manage their online identities and personal information in the age of MySpace , 2007 .

[7]  Giovanni Sartor,et al.  Privacy, Reputation, and Trust: Some Implications for Data Protection , 2006, iTrust.

[8]  P. Valkenburg,et al.  The Effects of Instant Messaging on the Quality of Adolescents’ Existing Friendships: A Longitudinal Study , 2009 .

[9]  Anind K. Dey,et al.  Understanding and Using Context , 2001, Personal and Ubiquitous Computing.

[10]  Susan B. Barnes,et al.  A privacy paradox: Social networking in the United States , 2006, First Monday.

[11]  H. Nissenbaum Privacy as contextual integrity , 2004 .

[12]  Emmanuel Lévinas,et al.  Totalité et infini : essai sur l'extériorité , 1971 .

[13]  E. Lévinas Totalité et infini , 1961 .

[14]  D. Konstan,et al.  The classical foundations of modern historiography , 1990 .

[15]  Luciano Floridi,et al.  A Look into the Future Impact of ICT on Our Lives , 2006, Inf. Soc..

[16]  P. Ricœur Soi même comme un autre , 1990 .

[17]  Sandra Galindo Palfrey, J.; Gasser, U. Born Digital: Understanding the First Generation of Digital Natives. New York, NY: Basic books, 2008 , 2009 .

[18]  Massimo Durante Rethinking human identity in the age of autonomic computing: the philosophical idea of trace , 2013, Law, Human Agency and Autonomic Computing.

[19]  Jonny Holmström The Consequences of Information: Institutional Implications of Technological Change , 2008 .

[20]  Jannis Kallinikos,et al.  The Consequences of Information: Institutional Implications of Technological Change , 2007 .

[21]  Luciano Floridi,et al.  The Method of Levels of Abstraction , 2008, Minds and Machines.

[22]  Corey A Ciocchetti E-Commerce and Information Privacy: Privacy Policies as Personal Information Protectors , 2007 .

[23]  Zoran Despotovic,et al.  Reputation and Trust , 2009, Encyclopedia of Database Systems.

[24]  Bernhard Debatin,et al.  Facebook and Online Privacy: Attitudes, Behaviors, and Unintended Consequences , 2009, J. Comput. Mediat. Commun..

[25]  Massimo Durante,et al.  What Model of Trust for Networked Cooperation? Online Social Trust in the Production of Common Goods (Knowledge Sharing) , 2008 .

[26]  Zeynep Tufekci Can You See Me Now? Audience and Disclosure Regulation in Online Social Network Sites , 2008 .

[27]  Rino Falcone,et al.  Socio‐Cognitive Model of Trust: Basic Ingredients , 2010 .

[28]  E. Lévinas Autrement qu'être ou au-delà de l'essence , 1974 .

[29]  S. Herring,et al.  Questioning the Generational Divide : Technological Exoticism and Adult Constructions of Online Youth Identity , 2007 .

[30]  Helen Nissenbaum,et al.  Will Security Enhance Trust Online, or Supplant It? , 2004 .

[31]  J. Moor What Is Computer Ethics?* , 1985, The Ethics of Information Technologies.

[32]  M. Foucault,et al.  The Order of Things , 2017 .

[33]  Anthony D. Miyazaki,et al.  Protecting children's privacy online: How parental mediation strategies affect website safeguard effectiveness , 2008 .

[34]  Jeffrey O. Kephart,et al.  The Vision of Autonomic Computing , 2003, Computer.

[35]  Choton Basu,et al.  Born Digital - Understanding the First Generation of Digital Natives , 2008 .

[36]  Kirstie Ball,et al.  Surveillance Society: Monitoring Everyday Life , 2001 .

[37]  Luciano Floridi,et al.  Information ethics, its nature and scope , 2006, CSOC.

[38]  Justin W. Patchin,et al.  Personal information of adolescents on the Internet: A quantitative content analysis of MySpace. , 2008, Journal of adolescence.

[39]  Donald Davidson,et al.  Subjective, Intersubjective, Objective , 2003 .

[40]  M. Castells Communication Power: Mass Communication, Mass Self-Communication and Power Relationships in the Network Society , 2009, Media and Society.

[41]  E.,et al.  Self-Discrepancy : A Theory Relating Self and Affect , 2022 .

[42]  D. Boyd Social Network Sites as Networked Publics: Affordances, Dynamics, and Implications , 2010 .

[43]  N. Luhmann Trust and Power , 1979 .

[44]  Daniel J. Solove The Future of Reputation: Gossip, Rumor, and Privacy on the Internet , 2007 .

[45]  Alice E. Marwick,et al.  Youth, Privacy and Reputation (Literature Review) , 2010 .

[46]  Clay Shirky Here Comes Everybody: The Power of Organizing Without Organizations , 2008 .

[47]  K. Shadan,et al.  Available online: , 2012 .

[48]  M. Foucault,et al.  Power/Knowledge: Selected Interviews and Other Writings 1972-1977 , 1980 .

[49]  R. Hepburn,et al.  BEING AND TIME , 2010 .

[50]  L. Floridi The Ontological Interpretation of Informational Privacy , 2005, Ethics and Information Technology.

[51]  J. Kristeva,et al.  Strangers to Ourselves , 1996, Canadian Theatre Review.

[52]  F. H. Adler Cybernetics, or Control and Communication in the Animal and the Machine. , 1949 .

[53]  Rino Falcone,et al.  Socio-Cognitive Model of Trust , 2005, Encyclopedia of Information Science and Technology.

[54]  D. Boyd Why Youth (Heart) Social Network Sites: The Role of Networked Publics in Teenage Social Life , 2007 .

[55]  J. Haidt The emotional dog and its rational tail: a social intuitionist approach to moral judgment. , 2001, Psychological review.

[56]  H. Gadamer,et al.  Truth and Method , 1960 .

[57]  V. Steeves,et al.  Closing the Barn Door: The Effect of Parental Supervision on Canadian Children's Online Privacy , 2008 .

[58]  John G. Palfrey The Public and the Private at the United States Border with Cyberspace , 2008 .

[59]  Mireille Hildebrandt,et al.  The Philosophy of Law Meets the Philosophy of Technology: Autonomic Computing and Transformations of Human Agency , 2011 .

[60]  Emily Christofides,et al.  Information Disclosure and Control on Facebook: Are They Two Sides of the Same Coin or Two Different Processes? , 2009, Cyberpsychology Behav. Soc. Netw..

[61]  Clay Shirky,et al.  Here Comes Everybody , 2017 .