Identity
Discussion Digital effigy “As we use information systems... data is collected about us. … This data
…can be transported very easily and therefore traded and collected together
and it can form what might be called a digital effigy of ourselves that other
people can read and act upon” (Monk, 1998). In every day life we connect with systems on a daily basis. Credit cards
record information on purchasing habits, travel and location. A security camera
may photograph you. Any time you buy something it is possible your details will
end up on a database. Your information can be scrutinized, categorised, passed
on (with or without your knowledge) for profit or marketing purposes. The Internet has created a global database that stores and allows easy use of
personal information. Digital effigies have been created that are continually
being updated, used and possibly abused. There are issues relating to this digital data collection. How long is it
kept and for what reason, is it legal? Does it infringe your personal rights? Virtual Identity “On the Internet, nobody knows you’re a dog” (Turkel 1995).
“In the physical world there is an inherent unity to
the self, for the body provides a … definition of identity…The virtual world
is different. It is composed of information rather than matter… The
inhabitants of this ...space are ... free from the body’s unifying anchor” (Donath, 1999) In the virtual world you are who you want to be and
anonymous. You are not inhibited by your physical appearance, race gender or any
disabilities. Virtual identities are created out of your imagination. If you are
female you can assume a virtual male identity, be any age, and from any social
background. For many this ability to create identities separate from their
real life self is liberating and allows them to socialise on line in a way that
would be impossible in the real world. “As more people spend more time in
these virtual spaces, some go so far as to challenge the idea of giving any
priority to [real life] at all” (Turkel 1995) Whilst this anonymity and freedom can be beneficial, and
most surfers are now aware that a person’s virtual identity may be different
from real life, it can still come as a shock when a long term, virtual
confident, turns out to be of a different gender. A
"woman", who over a number of years, had given advice to other
grateful women within a chat room, only to be unmasked as a man. This news was
greeted with shock by many women who felt they had been violated (Stone, 1991). There are also dangers associated with virtual
identities, with many unsavoury individuals masquerading behind them with the
aim of luring vulnerable people into meetings. Fortunately however, awareness of
this is growing, and there are now several websites similar to that provided by
Thames Valley Police providing guidance and help to children using
chatrooms. (ThamesValleyPolicy.UK, n.d).] Biotechnology Advances
in biotechnology have altered another view of identity. With our understanding
that a Cyborg is derived from a merging of a system and an organism, this
suggests one merged entity. However, Cartwright (1997) describes how an
executed prisoner’s body was donated to medicine, cut into thin slices, and
detailed 3D images of all the anatomical structures of the body then compiled.
The point made is that this project produced two separate
identities – the preserved human slices and the derived 3D digitised images,
both created from an organism and technology, and both referred to as separate
identities. There is another example of this creation of separate identities in
biotechnology. An ultrasound scan of an
unborn baby is described as a Cyborg foetus and that prospective parents relate
to this ultrascan as if it would a separate entity from the unborn baby itself (Mitchell and Georges,
1998).
Go on to Conclusion Return to Cyborg Overview
|