Feeds

Just who are you and why does it matter?

World's latest endangered species: our private lives

Beginner's guide to SSL certificates

Book review After a year spent watching people use the internet, and questioning more than 5,000 of them, two Alcatel Lucent staff have distilled into a modest-sized book their conclusions on how we balance online privacy with web identities.

Identity Shift, written by Allison Cerra and Christine James, paints a picture of America's netizens - who they think they are and how they go about sharing that identity - but then gets sidetracked while trying to understand brand identities and, finally, the security issues surrounding identity.

Those sidetracks mean there isn't space within the sub-200-page book to discuss the philosophical questions about identity. In fact philosophy is notably absent from the list of disciplines from which the authors claim to draw. Instead the book concerns itself with psychological questions about why people feel the need to control their identity online, and how they go about doing it.

One's online identity is increasingly important. We're told, with the aid of copious footnotes, 17 per cent of stateside couples who tied the knot in the last three years met on a dating site, so how one appears on a computer screen can have an overwhelming impact on one's life.

And there is a feeling that control is slipping away - ten per cent of the 5,000 people surveyed for the study admitted having Google Alerts set up to warn them when information was posted about themselves. Even allowing for a connected demographic, that's a staggering figure.

Almost a third admitted actively seeking out faked social networking accounts set up using their details or images, though how many have ever found such a thing isn't reported. Certainly the anecdotal evidence is compelling: during the interviews and observations preceding the survey (involving 30 households) the researchers met several girls who'd found their photographs adorning profile pages of unknown people all over the world, which has got to be pretty freaky.

How children are developing in this world is a prime topic for the book, which draws comparisons to the early days of teenagers being allowed to drive cars - given the freedom to go places, and do things, outside the parental control.

It also points out that Facebook has become an easily measurable gauge of popularity, and notes how youngsters with lots of Facebook friends gain the confidence to become the centre of attention they appear to be while those lacking cyber relationships often end up withdrawing from physical contacts in response.

Who do you trust - and do you love them enough to open your wallet?

Even the data on how users perceive brand identities is interesting, if diverting. For example: 62 per cent of the survey said they'd pay a premium to buy a product from a brand they trust, as opposed to 11 per cent who'd pay extra to buy from a brand they love. This isn't new, cellular operators have long known that they are trusted despite being barely liked and certainly not loved, but it's interesting to see figures to prove it.

The book also takes a long look at why people trust those brands or trust the internet at all. The conclusion being that in many cases trust emerges from their inability to do anything about it. Netizens can't prevent identity theft, so they just ignore it and deal with the consequences until they are provided with simple tools to manage security (such as switching on Wi-Fi encryption) - but then they won't bother using them and certainly don't let this worry them either.

But all this stuff about brands and security demonstrates the biggest failing of the book. There are lengthy discussions on the problems caused by, for example, friends posting content inappropriate to one's work on one's Facebook wall, but the focus is on how that makes everyone feel rather than on why the problem exists in the first place.

In the real world one has a handful of identities, presenting that which seems most appropriate in the context, but social networks insist that one has only one account and therefore only one identity, and thus conflicts arise. Google, in particular, seems unable to grasp this basic premise, insisting that one's YouTube, GMail and Google+ identities should share a common root even if they are used for entirely different things.

Facebook and LinkedIn do provide a duopoly that many people have found convenient for separating their personal and professional identities respectively. Perhaps the inhabitants of the Googleplex don't have private lives worth separating, but the researchers compiling Identity Shift don't bring up the issue of how users could present multiple personas online, perhaps because users aren't really doing that yet.

Identity Shift, published by Wiley, takes on the question of how people are presenting themselves in cyberspace, but then gets sidetracked considering how brands should present themselves and how worried internet users are about the security of their identity.

The book covers how users slot their sense of identity into the existing technology, without asking how the technology could better deal with users' sense of identity. ®

Security for virtualized datacentres

More from The Register

next story
Phones 4u slips into administration after EE cuts ties with Brit mobe retailer
More than 5,500 jobs could be axed if rescue mission fails
Apple CEO Tim Cook: TV is TERRIBLE and stuck in the 1970s
The iKing thinks telly is far too fiddly and ugly – basically, iTunes
Israeli spies rebel over mass-snooping on innocent Palestinians
'Disciplinary treatment will be sharp and clear' vow spy-chiefs
Huawei ditches new Windows Phone mobe plans, blames poor sales
Giganto mobe firm slams door shut on Microsoft. OH DEAR
Phones 4u website DIES as wounded mobe retailer struggles to stay above water
Founder blames 'ruthless network partners' for implosion
Found inside ISIS terror chap's laptop: CELINE DION tunes
REPORT: Stash of terrorist material found in Syria Dell box
OECD lashes out at tax avoiding globocorps' location-flipping antics
You hear that, Amazon, Google, Microsoft et al?
Show us your Five-Eyes SECRETS says Privacy International
Refusal to disclose GCHQ canteen menus and prices triggers Euro Human Rights Court action
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.