Free Essay

Cyberspace and Identity Critique

In:

Submitted By nour856
Words 684
Pages 3
A critique of “cyberspace and Identity” by Sherry Turkle

Identity is a very crucial word that has a major role in building one’s distinct personality. Your identity can be shaped by many different factors or experiences, and the things that could have the most impact are family, friends and the internet. Nowadays, with the introduction of cyberspace and the technological evolution, virtual world is taking over society. And as a consequence, this advancement of technology has contributed to the development of multiple identities that many of us users have probably experienced and noticed the difference. In the text, “cyberspace and identity” (1999), the author Sherry Turkle talks about how multiple identities are created and rapidly spreading. She claims that through the internet people have expressed many different sides of their personalities as a person takes the role of many personas.
In the essay “cyberspace and Identity” (1999), Sherry Turkle claims that the creation of cyberspace communication has resulted in putting together multiple identities. She concentrated her argument on how she sees society today with the existence and influence of the virtual world. As well, the writer talks in her composition about our current reality and the physiological impact that are taking place when dealing with the virtual world. She presents her argument with four different statements. She begins her discussion by the textual description; she claims that people in this world can express themselves more freely, as people goes from one virtual environment to another, their identity and personality change. Then, she states that the online identity is a moratorium, and she argues that online communication expands one’s range in real life persona. Lastly, she states that cyberspace can lead us to multiple identities and what we are while communicating online can be projected on our reality.
Furthermore, the author presents her text in a logical way with organized ideas. Turkle divides her essay into four different main ideas. She states that when most people are in the virtual world, they assume different identities based on what they desire to be. She progressively introduces her issue and finally gives her opinion about the topic. Moreover, Turkle gives reliable examples to support her own arguments on the subject. She argues that online life can reflect our personality freely and that people can try out new identities with virtual communication, she says: “the online exercise of playing with identity and trying out new identities is perhaps most explicit in role playing virtual communities where participation literally brings with the creation of a persona”
Secondly, she states that “cyberspace has a range of psychological effects and that virtual social life can rework the notion of moratorium”. She also quotes Erick Ericsson “if our culture no longer offers an adolescent moratorium, virtual communities often do” (1991). Then, as an example, she introduces the thirty year old man who had an issue with being unable of confrontation and how cyberspace helped him change. Finally wrapping up the text with her own opinion: “it is fashionable to think that we have passed from a psychoanalytic culture to a computer culture...” These examples elucidate very logically her claim as she elaborates her main points. Turkle used in her text real life examples that can be comprehended by the reader. She was able to convince the readers with her claim that people can express multiple identities via internet using reliable and valid supports.
In my opinion, I agree with the author’s claim that through cyberspace one can have multiple identities and thus one can express himself/herself freely. Because when communicating online, people can have more time to think what they want to say and express themselves more freely and can be who they want to be, also no one is there to judge them.
In conclusion, cyberspace communication is part of our life. In this virtual world people can have multiple identities where they can express themselves, and this communication allows many people o step up from the virtual world into reality and they are able to unite the virtual world identity with the real life identity.

Similar Documents

Premium Essay

Ethics

...Ethics in Cyberspace: Have We Seen This Movie Before? DR. THOMAS DONALDSON Monday, February 5, 2001 Wilder Pavilion, Adamian Academic Center Bentley College Waltham, Massachusetts Presenters Njeru Salesio Kinyua: Nduati Paul Njaaga: Toroitich Patrick Kiplimo: Lemuel Mangla: Bryan Egessa: 046485 015118 049063 090716 090524 Introduction       Dr. Donaldson begins by stating that his topic, ethics in cyberspace, should be approached with considerable humility. Internet has dramatically affected our lives while frustrating our attempts to understand it and therefore we should be mindful that in the past, great intellects have been undone by the appearance of new phenomena. He gives an example of Adam Smith’s where he devoted only one paragraph to the topic of the emerging phenomenon of the business corporation. He did so because he believed corporations were never going to amount to much. Professor Smith was profoundly wrong. Dr. Donaldson says he may be profoundly wrong also as he ventures into cyberspace to untangle its ethical implications. “In my attempt I am most concerned to separate the old from the new, that is, to discern which value changes we're encountering are really old stuff, like a movie we've seen before but with a different cast, and what is fundamentally new. “ An answer to this question should help us, in turn, to discover how, if at all, the internet promises to change our values and what ethical controversies...

Words: 3009 - Pages: 13

Free Essay

Pop Culture

...by Earl Lewis, George Lipsitz, Peggy Pascoe, George Sánchez, and Dana Takagi 1. Border Matters: Remapping American Cultural Studies, by José David Saldívar 2. The White Scourge: Mexicans, Blacks, and Poor Whites in Texas Cotton Culture, by Neil Foley 3. Indians in the Making: Ethnic Relations and Indian Identities around Puget Sound, by Alexandra Harmon 4. Aztlán and Viet Nam: Chicano and Chicana Experiences of the War, edited by George Mariscal 5. Immigration and the Political Economy of Home: West Indian Brooklyn and American Indian Minneapolis, by Rachel Buff 6. Epic Encounters: Culture, Media, and U.S. Interests in the Middle East,1945–2000, by Melani McAlister 7. Contagious Divides: Epidemics and Race in San Francisco’s Chinatown, by Nayan Shah 8. Japanese American Celebration and Conflict: A History of Ethnic Identity and Festival, 1934–1990, by Lon Kurashige 9. American Sensations: Class, Empire, and the Production of Popular Culture, by Shelley Streeby 10. Colored White: Transcending the Racial Past, by David R. Roediger 11. Reproducing Empire: Race, Sex, Science, and U.S. Imperialism in Puerto Rico, by Laura Briggs 12. meXicana Encounters: The Making of Social Identities on the Borderlands, by Rosa Linda Fregoso 13. Popular Culture in the Age of White Flight, by Eric Avila 14. Ties That Bind: The Story of an Afro-Cherokee Family in Slavery and Freedom, by Tiya Miles 15. Cultural Moves: African Americans and the Politics of Representation, by Herman S. Gray Cultural...

Words: 98852 - Pages: 396

Free Essay

Code

...Department at the Perseus Books Group, 11 Cambridge Center, Cambridge MA 02142, or call (617) 252-5298, (800) 255-1514 or e-mail special.markets@perseusbooks.com. CIP catalog record for this book is available from the Library of Congress. ISBN-10: 0–465–03914–6 ISBN-13: 978–0–465–03914–2 06 07 08 09 / 10 9 8 7 6 5 4 3 2 1 Code version 1.0 FOR CHARLIE NESSON, WHOSE EVERY IDEA SEEMS CRAZY FOR ABOUT A YEAR. Code version 2.0 TO WIKIPEDIA, THE ONE SURPRISE THAT TEACHES MORE THAN EVERYTHING HERE. C O N T E N T S Preface to the Second Edition Preface to the First Edition Chapter 1. Code Is Law Chapter 2. Four Puzzles from Cyberspace PART I: “REGULABILITY” ix xiii 1 9 Chapter 3. Is-Ism: Is the Way It Is the Way It Must Be? Chapter 4. Architectures of Control Chapter 5. Regulating Code PART II: REGULATION BY CODE 31 38 61 Chapter 6. Cyberspaces Chapter 7. What Things Regulate Chapter 8. The Limits in Open Code PART III: LATENT AMBIGUITIES 83 120 138 Chapter 9. Translation Chapter 10. Intellectual Property Chapter 11. Privacy Chapter 12. Free Speech Chapter 13. Interlude PART IV: COMPETING SOVEREIGNS 157 169 200 233 276 Chapter 14. Sovereignty Chapter 15. Competition Among Sovereigns 281 294 PART V: RESPONSES Chapter 16. The Problems We...

Words: 190498 - Pages: 762

Free Essay

Critically Discuss to What Extent, If Any, Technological Progress Has Undermined the Ability of the Law of Armed Conflict to Regulate the Conduct of Hostilities. Support Your Answer with Reference to Practical Examples

...Advances in technology and weaponry have revolutionised warfare since time immemorial, where inventions such as the chariot, canon powder and the airplane effectively changed the landscape of warfare.1 The law of armed conflict (LOAC) that exists today has developed as a reaction to the atrocities committed in the past; the four Geneva Conventions and the Additional Protocols of 1977 originated as responses to the increased suffering of civilians in armed conflict due in part to developments of weapon technology.2 The legal instruments to regulate the application of these advances in technology can barely keep up with challenges resulting from the rapidness of the advancement of contemporary military technologies. Moreover, recent technological advances raise the prospect of upheavals in practice so fundamental that they challenge assumptions underlying long-established international laws of war.3 This is because advances in technology have dramatically affected the weapons and tactics of future armed conflict, the “places” where conflicts are fought, the “actors” by whom they are fought, and the “means and methods” by which they are fought.4 These changes stress the fundamental principles of the LOAC, thus undermining its ability to regulate the conduct of hostilities; namely, by posing challenges to the principles of distinction, proportionality, military necessity and unnecessary suffering. This essay aims to assess the impact technology has had upon the LOACs...

Words: 3294 - Pages: 14

Premium Essay

Engineer

...as faster and easier accessibility. As it is another mode of commercial and personal transaction and one that is heavily dependent on interaction through computers and automatic agents rather than face-to-face meetings, which increases distance and allows anonymity, it is another avenue for crimes to perpetuate. “Computer Crime” encompasses crimes committed against the computer, the materials contained therein such as software and data, and its uses as a processing tool. These include hacking, denial of service attacks, unauthorized use of services and cyber vandalism. “Cyber Crime” describes criminal activities committed through the use of electronic communications media. One of the greatest concerns is with regard to cyber-fraud and identity theft through such methods as phishing, pharming, spoofing and through the abuse of online surveillance technology. There are also many other forms of criminal behaviour perpetrated through the use of information technology such as harassment, defamation, pornography, cyber terrorism, industrial espionage and some regulatory offences. The existing criminal laws in most countries can and do cover computer-related crimes or electronically perpetrated crimes. Offences against the computer are relatively new as they arise from and in relation to the digital age, which threatens the functionality of the computer as an asset of a borderless information society. New laws are required in order to nurture and protect an orderly and vibrant digital...

Words: 24175 - Pages: 97

Premium Essay

Challenges to Criminal Law Makers

...as faster and easier accessibility. As it is another mode of commercial and personal transaction and one that is heavily dependent on interaction through computers and automatic agents rather than face-to-face meetings, which increases distance and allows anonymity, it is another avenue for crimes to perpetuate. “Computer Crime” encompasses crimes committed against the computer, the materials contained therein such as software and data, and its uses as a processing tool. These include hacking, denial of service attacks, unauthorized use of services and cyber vandalism. “Cyber Crime” describes criminal activities committed through the use of electronic communications media. One of the greatest concerns is with regard to cyber-fraud and identity theft through such methods as phishing, pharming, spoofing and through the abuse of online surveillance technology. There are also many other forms of criminal behaviour perpetrated through the use of information technology such as harassment, defamation, pornography, cyber terrorism, industrial espionage and some regulatory offences. The existing criminal laws in most countries can and do cover computer-related crimes or electronically perpetrated crimes. Offences against the computer are relatively new as they arise from and in relation to the digital age, which threatens the functionality of the computer as an asset of a borderless information society. New laws are required in order to nurture and protect an orderly and vibrant digital...

Words: 24175 - Pages: 97

Premium Essay

Locating Topics of Interest

...NORTHCENTRAL UNIVERSITY ASSIGNMENT COVER SHEET Learner: Terry L Green THIS FORM MUST BE COMPLETELY FILLED IN Please Follow These Procedures: If requested by your mentor, use an assignment cover sheet as the first page of the word processor file. The assignment header should include the Learner’s last name, first initial, course code, dash, and assignment number (DoeJXXX0000-1) justified to the left and the page number justified to the right. Keep a Photocopy or Electronic Copy of Your Assignments: You may need to re-submit assignments if your mentor has indicated that you may or must do so. Academic Integrity: All work submitted in each course must be the Learner’s own. This includes all assignments, exams, term papers, and other projects required by the faculty mentor. The known submission of another person’s work represented as that of the Learner’s without properly citing the source of the work will be considered plagiarism and will result in an unsatisfactory grade for the work submitted or for the entire course, and may result in academic dismissal. | | BTM8102-8 | Kris Iyer, PhD | | | Business Research Methodology | GreenTBTM8102-2 | | | <Add Learner comments here> ------------------------------------------------- ------------------------------------------------- ------------------------------------------------- Faculty Use Only ------------------------------------------------- <Faculty comments here> ...

Words: 2699 - Pages: 11

Free Essay

Blogging

...THE “BLOG” EXPERIENCE: WHEN FREEDOM BECOMES INVASION INTRODUCTION Francois Voltaire, one of France’s most famous philosophers became well-known for this often quoted phrase: “I may disagree with what you have to say, but I shall defend, to the death, your right to say it.” The phrase summarizes the spirit of the freedom of speech – one of the inventions of the 18th century Enlightenment, a time when discussions among the upper class were construed as constituting the public sphere. Although they belonged to the sophisticated members of society, their conversations highlighted social equality and everyone was given the chance to speak and be demanded to listen. With free and frank conversations, people became acquainted with points of view that were not familiar; they discovered strengths and weaknesses in their personal arguments, and subsequently became moderate in the expression of their views taking into consideration the arguments of others. With this small light ignited in the intellectual realm, the idealism of free communication of thoughts and opinions spread and became one of the trademarks of democratic societies. During the next century, John Stuart Mill affirmed that societies progress when people freely express themselves because errors and misconceptions are exposed, and alternatives were proposed. These sentiments became the backbone of the United Nations’ Declaration of Human Rights, adopted in 1948...

Words: 11752 - Pages: 48

Premium Essay

Bibliography

...Bibliography for Social Network Sites related thesis Aaltonen, S,, Kakderi, C,, Hausmann, V, and Heinze, A. (2013). Social media in Europe: Lessons from an online survey. In proceedings of the 18th UKAIS Annual Conference: Social Information Systems. (pp. Availalable online). USIR. , and 2013, , in: , 19-20 March 2013, Worcester College, Oxford, UK. (conference paper) Acquisti, Alessandro, and Gross, Ralph. (2006). Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook.In Golle, P. and Danezis, G. (Eds.), Proceedings of 6th Workshop on Privacy Enhancing Technologies. (pp. 36--58).Cambridge, U.K. Robinson College. June 28-30. (conference paper) Acquisti, Alessandro, and Gross, Ralph. (2009). Predicting Social Security numbers from public data. Proceedings of the National Academy of Sciences, 106 (27), 10975-10980. (journal article) Adamic, Lada, Buyukkokten,Orkut, and Eytan Adar. (2003). A social network caught in the Web. First Monday, 8 (6). (journal article) Adrien Guille, Hakim Hacid, Cécile Favre, and Djamel A. Zighed. (2013). Information diffusion in online social networks: a survey. SIGMOD Record, 42 (2). (journal article) Agarwal, S., and Mital, M.. (2009). Focus on Business Practices: An Exploratory Study of Indian University Students' Use of Social Networking Web Sites: Implications for the Workplace. Business Communication Quarterly. (journal article) Ahmed OH, Sullivan SJ, Schneiders AG, and McCrory P. (2010). iSupport:...

Words: 18938 - Pages: 76

Free Essay

Anthrax Vaccine as a Component of the Strategic National Stockpile: a Dilemma for Homeland Security

...NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS ANTHRAX VACCINE AS A COMPONENT OF THE STRATEGIC NATIONAL STOCKPILE: A DILEMMA FOR HOMELAND SECURITY by Thomas L. Rempfer December 2009 Thesis Advisor: Second Reader: Stanley Supinski Dean Lynch Approved for public release; distribution is unlimited THIS PAGE INTENTIONALLY LEFT BLANK REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instruction, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302, and to the Office of Management and Budget, Paperwork Reduction Project (0704-0188) Washington DC 20503. 1. AGENCY USE ONLY (Leave blank) 4. TITLE AND SUBTITLE 2. REPORT DATE December 2009 3. REPORT TYPE AND DATES COVERED Master’s Thesis 5. FUNDING NUMBERS Anthrax Vaccine as a Component of the Strategic National Stockpile: A Dilemma for Homeland Security 6. AUTHOR(S) Thomas L. Rempfer 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Naval Postgraduate School Monterey, CA 93943-5000...

Words: 3672 - Pages: 15

Premium Essay

Feminism

...Contribution to the Women’s Movement 3.4 Marxist Feminism 3.4.1 Foundations of Marxist Feminism 3.4.2 Other Key Elements in Marxist Feminism 3.4.3 Limitations of Marxist Feminism 3.4.4 Contribution to the Women’s Movement 3.5 Psychoanalytic Feminism 3.5.1 The Beginnings of Psychoanalytic Feminism – Countering Freudian Theories 3.5.2 Explanation by other Theorists 3.5.3 Limitations of Psychoanalytic Feminism 3.5.4 Contribution to the Women’s Movement 3.6 Radical feminism 3.6.1 Definition 3.6.2 The influences that shaped Radical Feminism 3.6.3 What are the variations of Radical Feminism? 3.6.3.1 Radical- Libertarian Feminism 3.6.3.2 Radical-Cultural Feminism 3.6.4 Radical Feminism – Its Structure 3.6.5 The Outcomes of the Movement 3.6.6 Critiques of Radical Feminism 3.6.7 Contribution to the Women’s Movement 3.7 Postmodern Feminism 3.7.1 Postmodern Thought 3.7.2 Postmodern rethinking of psychological explanation of gender 3.7.3 Postmodern Feminist 3.7.4 Limitations of Postmodern feminism 3.7.5 Contribution to the women’s Movement 3.8 Black Feminism and Womanism 3.8.1 The Beginnings of Black Feminism 3.9 Cyber Feminism 3.9.1 Origin of Cyber Feminism 3.9.2 Definition of the 100 Anti Thesis 3.9.3 Cyber art and its relation to Cyber feminism 3.9.4 Cyber Feminism – Practical Manifestation 3.9.5 Cyber Feminism challenges and its future 3.10 Let Us Sum up 3.11 Answers to Check Your Progress 3.12 Unit End Questions 3.13 References 3.1 INTRODUCTION The second half of the twentieth century...

Words: 17769 - Pages: 72

Premium Essay

50 Key Concepts in Gender Studies

...50 Key Concepts in Gender Studies Jane Pilcher & Imelda Whelehan Fifty Key Concepts in Gender Studies i Recent volumes include: Key Concepts in Social Research Geoff Payne and Judy Payne Key Concepts in Medical Sociology Jonathan Gabe, Mike Bury and Mary Ann Elston Forthcoming titles include: Key Concepts in Leisure Studies David Harris Key Concepts in Critical Social Theory Nick Crossley Key Concepts in Urban Studies Mark Gottdiener The SAGE Key Concepts series provide students with accessible and authoritative knowledge of the essential topics in a variety of disciplines. Cross-referenced throughout, the format encourages critical evaluation through understanding. Written by experienced and respected academics, the books are indispensable study aids and guides to comprehension. JANE PILCHER AND IMELDA WHELEHAN Fifty Key Concepts in Gender Studies SAGE Publications London • Thousand Oaks • New Delhi iii © Jane Pilcher and Imelda Whelehan 2004 All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, transmitted or utilized in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without permission in writing from the Publishers. SAGE Publications Ltd 1 Oliver’s Yard 55 City Road London EC1Y 1SP SAGE Publications Inc 2455 Teller Road Thousand Oaks, California 91320 SAGE Publications India Pvt Ltd B-42 Panchsheel Enclave Post Box 4109 New Delhi 100 017 British Library...

Words: 86432 - Pages: 346

Premium Essay

Business 101

...Research Dilemmas in Management and Business Studies John Mendy University of Lincoln, UK jmendy@lincoln.ac.uk Abstract: This paper examines some of the philosophical and practical dilemmas that are faced by researchers in management and business studies – in the context of the epistemological and ontological assumptions introduced. The relevant methodological frameworks to be used stem from Strauss and Quinn (1997). The importance of employee language and organisational discourses are presented from the empirical data on “Aspects of Organisational Culture and Change” in Lincolnshire and Nottinghamshire to demonstrate the epistemological and ontological dilemmas faced by researchers in organisational analysis. Symbolic interactionism and stories are also used to highlight the importance of speech actors within an organisational change context in order to surface some of these dilemmas in business studies in general and management research in particular. These two provide alternative positions to Strauss and Quinn’s “maintained” analysis of how organisations and managers implement change interventions and employees’ reactions to these. Amongst some of my principal objectives is to demonstrate what can be contributed when researchers focus on what can be considered credible and valid knowledge that can be generalised in organisational and management studies. Keywords: language, methodological dilemmas, epistemology, theory and practice. 1. Introduction This paper focuses on...

Words: 7930 - Pages: 32

Free Essay

Branches of Computers

...dramatic cultural, economic, social and educational differences; individual circumstances depend largely on where a person is born and raised. More than 800 million adults (two-thirds of them women) still lack basic literacy skills; at the other end of the spectrum, the use of information and communication technologies (ICT) is skyrocketing. Notwithstanding the immense diversity in living environments, an unprecedented and unifying global media culture has developed that challenges and often surpasses such traditional forms of socialization as family and school. This complex cultural situation—in which young people are struggling to find direction in their lives or simply to survive, to improve their living conditions, and to develop their identities—has been given various names. Some call it the information or informational age, while others prefer the term technoculture1 or technocapitalism, global media culture, or simply globalization, referring to the dialectic process in which the global and the local exist as “combined and mutually implicating principles”.2 Labels such as...

Words: 11163 - Pages: 45

Premium Essay

Industry

...the social has, as a result, eroded to such an extent that it is no longer possible to understand the difference, while others question the need for this distinction. For instance, in queer and transgender theory and feminist cultural studies, theorists have sought to make strange the ‘sex/gender’ distinction. The key argument made is that biology is no less a cultural construct than gender socialization into masculinity and femininity. While the point is that biology, like gender, is thought to be socially constructed, that does not mean that there is no such thing as biology. While it is notoriously difficult if not impossible to identify exactly what is driven by biology or by culture, identity scholars insist that this is not the central question that needs to be asked. Instead, identity...

Words: 8766 - Pages: 36