The Information Society

special issue on "The Digital Individual"

volume 10, number 2, April-June 1994

edited by

Philip E. Agre
University of California, San Diego

This special issue of "The Information Society" explores the emergent phenomenon of the digital individual. The digital individual is the form of social identity that individuals acquire as their activities become influenced by -- and often mediated through -- digital representations of themselves. The articles in the special issue describe numerous aspects of the digital individual, from its construction within organizations to its construction in relation to individual others, and from the potential for new forms of social domination to the potential for new forms of social action.

Roger Clarke
Australian National University
"The Digital Persona and its Application to Data Surveillance"
Max Kilger
Queens College
"The Digital Individual"
Philip E. Agre
University of California, San Diego
"Surveillance and Capture: Two Models of Privacy"
Jonathan P. Allen
University of California, Irvine
"Mutual Control in the Newly Integrated Work Environments"
William C. Hill
Bell Communications Research
and
James D. Hollan
University of New Mexico
"History-Enriched Digital Objects: Prototypes and Policy Issues"
Single copies are available for US$25 including postage from the publisher:
Taylor and Francis
1900 Frost Road Suite 101
Bristol, Pennsylvania 19007
USA
phone: 1 (800) 821 8312
fax: +1 (215) 785 5515

The Digital Persona and its Application to Data Surveillance

Roger Clarke
Department of Commerce
Australian National University
Canberra ACT 0200
Australia
Roger.Clarke@anu.edu.au

Abstract: The digital persona is a model of the individual established through the collection, storage and analysis of data about that person. It is a very useful and even necessary concept for developing an understanding of the behaviour of the new, networked world. This paper introduces the notion, traces its origins and provides examples of its application. It is suggested that an understanding of many aspects of network behaviour will be enabled or enhanced by using the notion.

The digital persona is also a potentially threatening, demeaning, and perhaps socially dangerous phenomenon. One area in which its more threatening aspects require consideration is in data surveillance, the monitoring of people through their data. Data surveillance provides an economically efficient means of exercising control over the behaviour of individuals and societies. The manner in which the digital persona contributes to an understanding of particular dataveillance techniques such as computer matching and profiling is discussed, and risks inherent in monitoring of digital personae are outlined.


The Digital Individual

Max Kilger
Department of Sociology
Queens College
65-30 Kissena Blvd.
Flushing, New York 11367
USA
mnkqc@cunyvm.cuny.edu

Abstract: This paper discusses the concepts of virtual self and the digital individual as social entities that have real world implications. It examines how individuals use communication with others through face-to-face and digital channels to form images of themselves. The social nature of digital information is emphasized and examples of social objects within the digital realm are described. The criterion of engagement is suggested as a test for whether or not a virtual self is a social entity. The paper concludes with a discussion of how the digital individual might replace traditional forms of computerized identification.


Surveillance and Capture: Two Models of Privacy

Philip E. Agre
Department of Communication
University of California, San Diego
La Jolla, California 92093-0503
USA
pagre@weber.ucsd.edu

Abstract: Two models of privacy issues are contrasted. The surveillance model employs visual metaphors (e.g., "Big Brother is watching") and derives from historical experiences of secret police surveillance. The less familiar capture model employs linguistic metaphors and has deep roots in the practices of applied computing through which human activities are systematically reorganized to allow computers to track them in real time. The capture model is discussed with reference to systems in numerous domains.


Mutual Control in the Newly Integrated Work Environments

Jonathan P. Allen
Center for Research on Information Technology and Organizations
University of California, Irvine
Irvine, California 92717
USA
jpallen@ics.uci.edu

Abstract: How does an increase in the availability of detailed electronic information about behavior change organizations, and what kinds of choices influence those changes? This paper presents a model of mutual control, derived from studies of detailed information sharing in manufacturing, that describes one set of likely changes. According to the mutual control model, increasing pressures for tighter monitoring and control come from a mutual access to, and dependence on, shared electronic information that can be linked to the behavior of identifiable individuals and groups. The demands for greater monitoring and control from all directions in organizations, not simply upper management, is a finding which contrasts sharply with the traditional view of electronic surveillance, and its concern with regulating managerial excess. The mutual control model also highlights how current systems design ideals, uncritically followed, contribute to the widespread demand for monitoring and tighter control within organizations.


History-Enriched Digital Objects: Prototypes and Policy Issues

William C. Hill
Bell Communications Research
Morristown, New Jersey 07962
USA
willhill@bellcore.com

James D. Hollan
Department of Computer Science
University of New Mexico
Albuquerque, New Mexico 87113
USA
hollan@cs.unm.edu

Abstract: Recording on digital objects (e.g. reports, forms, source-code, manual pages, email, spreadsheets) the interaction events that comprise their use makes it possible on future occasions, when the objects are used again, to display graphical abstractions of the accrued histories as parts of the objects themselves. It also makes it possible to search for objects by their use, and under certain circumstances, to find people through objects used in common. Prototypes we've built to explore this idea (e.g. Edit Wear, Read Wear, Email Wear, and Vita Service) demonstrate the costs and benefits of using objects in the context of their interaction histories. The prototypes also raise issues concerning the nature, ownership and appropriate use of personal information.

Go back to the top of the page