Background: Advanced media technologies have become an integral part of people's daily lives, providing them with new tools and environments for the formation and enactment of their identities. To date, the literature acknowledges that media technologies, such as social networking sites, are used to form and enact online identities, and that these platforms can simultaneously pose challenges to individuals' identity work. However, we know little about the precise online identity work strategies that individuals employ in response to the challenges they face over time. Objective: This paper examines the online identity work dynamics of Instagram micro-influencers, for whom social network sites enable and guide them in forming and enacting their online identities on a daily basis. The study was guided by the following research question: what are the challenges that Instagram micro-influencers perceive online and what are the online identity work strategies that they employ in response to these challenges over time? Methods: This study employs an extreme case approach to rigorously explore the lives of seven micro-influencers on Instagram. We combine in-depth data from narrative interviews, longitudinal data from online autobiographical narratives revealed through the participants' Instagram timelines, and follow-up interviews. Results: Our analysis revealed three main themes that highlight the challenges that Instagram micro-influencers face online: (1) amplified social expectations, (2) feelings of inauthenticity, and, as a result thereof, (3) psychological distress. We found that these challenges were viewed as catalysts for their online identity work processes. We identified three key online identity work strategies that the Instagram micro-influencers employed in response over time: (1) experimenting with their online identities, followed by either (2) segmenting between their online and offline identities, or (3) adding identities through online multiplicity. Conclusion: Our research provides new insights into how individuals may respond to the challenge of managing their online identities over time by engaging in different online identity work strategies. This study highlights the importance of designing online media technologies that enable individuals to cope with online challenges. We emphasize the need to design online spaces for (1) the expression of authentic identities, (2) community building, and (3) online multiplicity.
This white paper is presented by the Ethics Working Group of the uNLock Consortium This white paper presents findings of the Ethics Working Group, from the conceptual phase of investigation into the ethical issues of the uNLock solution, providing identity management solutions for sharing and presentation of medical COVID-19 credentials (test results) in the context of healthcare institutions. We have provided an outline of direct and indirect stakeholders for the uNLock solution and mapped values, benefits, and harms to the respective stakeholders. The resulting conceptual framework has allowed us to lay down key norms and principles of Self Sovereign Identity (SSI) in the specific context of uNLock solution. We hope that adherence to these norms and principles could serve as a groundwork for anticipatory mitigation of moral risk and hazards stemming from the implementation of uNLock solution and similar solutions. Our findings suggest that even early stage of conceptual investigation in the framework of Value Sensitive Design (VSD), reveals numerous ethical issues. The proposed implementation of the uNLock app in the healthcare context did not proceed further than prototype stage, thus our investigation was limited to the conceptual stage, and did not involve the practical implementation of VSD method involving translation of norms and values into engineering requirements. Nevertheless, our findings suggest that the implementation of VSD method in this context is a promising approach that helps to identify moral conflicts and risks at a very early stage of technological development of SSI solutions. Furthermore, we would like to stress that in the light of our findings it became painfully obvious that hasty implementation of medical credentials system without thorough ethical assessment, risks creating more ethical issues rather than addressing existing ones.
In this article, we elaborate on the role of dialogical learning in identity formation in the context of environmental education. First, we distinguish this kind of learning from conditioning and reproductive learning. We also show that identity learning is not self-evident and we point out the role of emotions. Using Dialogical Self Theory, we then suggest that individuals do not have an “identity hierarchy” but a dialogical self that attaches meaning to experiences in both conscious and unconscious ways. We describe the learning process that enables the dialogical self to develop itself, and we elaborate on the characteristics of a good dialogue. We conclude with some remarks expanding room for a dialogue that would foster identity learning. https://doi.org/10.3390/resources5010011 https://www.linkedin.com/in/helenkopnina/
MULTIFILE
Fashion has become inextricably linked with digital culture. Digital media have opened up new spaces of fashion consumption that are unprecedented in their levels of ubiquity, immersion, fluidity, and interactivity. The virtual realm continuously needs us to design and communicate our identity online. Unfortunately, the current landscape of digitised fashion practices seems to lack the type of self-governing attitude and urgency that is needed to move beyond commercially mandated platforms and systems that effectively diminish our digital agency. As transformative power seems to be the promise of the virtual, there is an inherent need to critically assess how digital representation of fashion manifests online, especially when these representations become key mediators within our collective and individual public construction of self. A number of collectives and practitioners that actively shape a counter movement, organized bottom up rather than through capital, are questioning this interdependence, applying inverted thinking and experimenting with alternative modes of engagement. Starting from the research question ‘How can critical fashion practitioners introduce and amplify digital agency within fashion’s virtual landscape through new strategies of aesthetic engagement?’, this project investigates the implications of fashion’s increasing shift towards the virtual realm and the ramifications created for digital agency. It centers on how identity is understood in the digital era, whether subjects have full agency while expected to construct multiple selves, and how online environments that enact as playgrounds for our identities might attribute to a distorted sense of self. By using the field of critical fashion as its site, and the rapidly expanding frontier of digital counter practices as a lens, the aim of this project is to contribute to larger changes within an increasingly global and digital society, such as new modes of consumerism, capital and cultural value.
A research theme examining diversity and inclusion in video games, using an intersectional perspective and typically addressing issues related to the representation of gender, race, and LGBTQ+ people, but also touching broader topics such as class, age, geographic privilege, physical and neurodiversity, the (unevenly distributed) impacts of the climate crisis, and other aspects of identity.
This project addresses the fundamental societal problem that encryption as a technique is available since decades, but has never been widely adopted, mostly because it is too difficult or cumbersome to use for the public at large. PGP illustrates this point well: it is difficult to set-up and use, mainly because of challenges in cryptographic key management. At the same time, the need for encryption has only been growing over the years, and has become an urgent problem with stringent requirements – for instance for electronic communication between doctors and patients – in the General Data Protection Regulation (GDPR) and with systematic mass surveillance activities of internationally operating intelligence agencies. The interdisciplinary project "Encryption for all" addresses this fundamental problem via a combination of cryptographic design and user experience design. On the cryptographic side it develops identity-based and attribute-based encryption on top of the attribute-based infrastructure provided by the existing IRMA-identity platform. Identity-based encryption (IBE) is a scientifically well-established technique, which addresses the key management problem in an elegant manner, but IBE has found limited application so far. In this project it will be developed to a practically usable level, exploiting the existing IRMA platform for identification and retrieval of private keys. Attribute-based encryption (ABE) has not reached the same level of maturity yet as IBE, and will be a topic of further research in this project, since it opens up attractive new applications: like a teacher encrypting for her students only, or a company encrypting for all employees with a certain role in the company. On the user experience design side, efforts will be focused on making these encryption techniques really usable (i.e., easy to use, effective, efficient, error resistant) for everyone (e.g., also for people with disabilities or limited digital skills). To do so, an iterative, human-centred and inclusive design approach will be adopted. On a fundamental level, scientific questions will be addressed, such as how to promote the use of security and privacy-enhancing technologies through design, and whether and how usability and accessibility affect the acceptance and use of encryption tools. Here, theories of nudging and boosting and the unified theory of technology acceptance and use (known as UTAUT) will serve as a theoretical basis. On a more applied level, standards like ISO 9241-11 on usability and ISO 9241-220 on the human-centred design process will serve as a guideline. Amongst others, interface designs will be developed and focus groups, participatory design sessions, expert reviews and usability evaluations with potential users of various ages and backgrounds will be conducted, in a user experience and observation laboratory available at HAN University of Applied Sciences. In addition to meeting usability goals, ensuring that the developed encryption techniques also meet national and international accessibility standards will be a particular point of focus. With respect to usability and accessibility, the project will build on the (limited) usability design experiences with the mobile IRMA application.