Cyber-Identities and Social Life in Cyberspace

نویسندگان

  • Eleni Berki
  • Mikko Jäkälä
چکیده

Information and communication technology gradually transform virtual communities to active meeting places for sharing information and for supporting human actions, feelings and needs. In this chapter the authors examine the conceptual definition of virtual community as found in the traditional cyberliterature and extend it to accommodate latest cybertrends. Similar to the ways that previous social and mass media dissolved social boundaries related to time and space, cyber-communities and social software seem to also dissolve the boundaries of identity. This, in turn, questions the trust, privacy and confidentiality of interaction. The authors present a way of classifying and viewing self-presentation regarding cyber-identity management in virtual communities. It is based on the characteristics that cyber-surfers prefer to attribute to themselves and accordingly present themselves to others. In so doing, the authors coin the terms for five distinct phenomena, namely nonymity, anonymity, eponymity, pseudonymity and polynymity. They subsequently compare and contrast these terms, summarising information from their investigation, and outlining emerging questions and issues for a future research agenda.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Civil Responsibility of Government in the Cyberspace: Looking at the Cyber Ethics

Background: Given the appropriateness of cyberspace and its interconnectedness, each country is expected to minimize the possibility of harmful actions by securing and continuously monitoring the Internet and the virtual world. Of course, part of this goal will be achieved through the adoption of appropriate national laws and, in part, through proper education of citizens and the development of...

متن کامل

Providing a Desirable Model for Implementing Social Network Policies in Iran (With a social and ethical responsibility approach based on the explanation of its related factors)

Purpose: Cyber social networks and cyberspace are like a double-edged sword that brings favorable and unfavorable consequences. The advantages cannot prevent us from neglecting its dangerous disadvantages that disregard the ethical principles and community values. The present research has been carried out to explain the factors related to the implementation of cyber social network policies in I...

متن کامل

A Review on Cyberspace Security: Lessons for Islamic Republic of Iran

Today governments face a threat by cyber attacks capable of disrupting communicative, economic and vital services that cause severe damages and losses. It has been years that Islamic republic of Iran benefits from cyberspace in different military and civilian sectors. Sensitive national centers such as nuclear facilities and Ministry of Oil have been targeted by individuals, groups and governme...

متن کامل

Udk: 343.9 Phenomenal Exploration into Impact of Anonymity on Law and Order in Cyberspace

While information systems provide modern society with great convenience, it also poses new problems in maintaining social order. One of its negative influences is the anonymity of cyberspace, which makes identity tracing a noteworthy predicament which poses obstacles in detection and investigations. It has been found that cyber anonymity has critical impacts on criminal motivation, and the phen...

متن کامل

Modern Prevention: The Role of Virtual Media in Addiction Prevention in Cyber Space

Objective: The attractiveness and expansion of the virtual space among strata of society and the functions of this platform in the commission of drug offenses have prompted authorities to take advantage of this context to develop drug prevention programs. Of course, the functions of this space at the present moment are considered among the effective factors in the tendency towards addiction and...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016