Choosing who you want to be. Identity management in online communities.

PDF Download

ABSTRACT: This paper seeks to explore the different ways people modify their identities online in order to demonstrate that the ability to alter or mask ones identity online is crucial for free and open discussions within online communities and networks.

Keywords: Social Media, Identity, Impression Management, Performance of Identity, Identity Deception

The internet provides many people around the world access to personal networks, and social communities they may not have been able to be exposed to otherwise. Part of the nature of online networks and communities is the ability to manage the identity that you project to others you interact with. The ability to choose the identity you show online, is crucial to many of these communities and the anonymity provided by the internet often allows for more free and open discussions. This paper will look at various ways people manage their online identities to argue that it is crucial that anonymity is protected online. This paper will examine a case of online character creation in a game, it will look at identity management by simply omitting information, it will explore the idea of identity performance, and finally it will look into the idea of purposefully deceiving others and projecting an entirely false identity. Even where there are examples of online anonymity causing certain problems within communities, the benefits of anonymity are shown to outweigh the few problems caused by it.

The ability to choose your public identity online is an important aspect of online communities and networks. The degree of anonymity allowed by the internet allows people to connect in ways they may not have had the chance, or skills, to do in the physical world. In the early days of the internet, Multi User Dungeons (MUDs) were a common online gaming platform which allowed users from all over the world to connect and play games against each other. In these environments, players often crafted identities or character which the other players would see, often with very few clues to the player’s true identity. Turkle (1994, pp 161-164) describes how important an online alter ego is to a MUD user, Peter. She describes Peter as a sickly recluse whose only friend is more reclusive than he is, and who has suffered from health problems since he was a child. However, in the MUD, Peter has created a character which is an idealised version of himself. Through this online persona Peter learnt ‘what he knows of politics, of economics, of the differences between capitalism and welfare state socialism’ (Turkle, 1994, p.162’. The MUD was also the only place that Peter ever knew romance or intimacy as he met and courted a female user of the MUD at an online ‘wedding’ of two fellow MUD users (Turkle, 1994, p.162). Peter’s online identity allowed for him to connect to people all over the world and learn and experience things he may never have otherwise been able to.

The example of Peter in the MUD, is an example of almost complete anonymity. It is also an example from a time where the internet was only accessed by relatively few people when compared to current times. In modern times, it is becoming harder to be completely anonymous in many online communities and networks as many sites, like Facebook, insist on using your real identity, and websites are collecting more and more data about their users, making it difficult to remain entirely anonymous. Despite this, it is still important for members of online communities and networks to have control over the identity they project online. Donath and Boyd (2004) discuss how on social network sites, where many online communities and networks form, it is very difficult to deceive others regarding your identity. By displaying your network of connections, you are essentially verifying your personal identity (2004, p. 3). However, even in a community or network where you must use your true identity, you still have control over the identity others see. Many people who live in the public eye, like politicians, famous athletes, celebrities, and prominent business people take great care to manage the impression they present in communities both offline and online. The idea of impression management predates online communities and even the internet. The idea was presented by Erving Goffman as early as 1959 who argued that people are strategic about the image they portray to others. Rosenberg and Egbert’s 2011 study show that the traditionally theoretical frameworks to study impression management, such as those presented by Goffman, are still valid when discussing identity in online communities. Another example of impression management is outlined by DeCamp, Koenig, and Chisolm (2013) who discuss the challenges of physicians who are trying to manage their professional and personal identities in their online networks. DeCamp et al. discuss possible solutions such as having separate profiles for professional and personal networks (which is quite common) and the possible psychological or physical burden on maintaining two online identities. The solution they propose is that physicians maintain one profile, but before they post anything reflect on whether the content ‘is appropriate for a physician in a public space’ (DeCamp et al. 2013 p.582). This approach is suggested as it is seen as being the more honest approach in that the physician is not hiding anything from his patients who may be in his network online. However, the simple act of censoring oneself is in itself an act of crafting one’s identity to one that they want the network or communities they are a part of online.

The examples used thus far are examples of what Pearson describes as the performance of identity in social networks (2009). Pearson likens crafting and displaying of one’s identity to a performance. This performance includes front-stage performance, which is the observable or public, identity, and the back-stage which is the more intimate and relaxed, or private, identity. Pearson describes the online space as ”suspended between the private and the public” in that online identities often include intimate details of oneself, but are also publicly available. Schwartz and Halegous (2013) take the concept of identity performance and discuss it in the context of location. They discuss how the act of ‘checking in’ to a location on social media is part of one’s identity performance as it is an act which crafts ones online identity. Where one ‘checks in’ tell ones network a lot about them (or the ‘them’ they want their network to see). Someone who regularly checks in to bars, restaurants, and night clubs wants their network to know they have an active social life. Similarly, someone who checks in at the airport each time they go on a holiday want their network to see them as adventurous and well-travelled. Whether the identity performance is one of carefully selecting what personal information will be publicly available, or one of selectively allowing your network to see where you have been, it is a performance which allows one to shape their online identity to one they wish others to see.

So far, this paper has explored ideas of enhancing ones ‘real world’ identity to create an online persona. This approach is relatively benign, and not particularly dishonest. However, some do use deception and create false identities online. As early as the 1990s, when the internet was still in its infancy, Donath was writing about the challenges faced by UseNet groups by people performing identity deception (1999). Of these deceptions ‘Some are quite harmful to individuals or to the community; others are innocuous, benefitting the performer without injuring the group. Some are clearly deceptions, meant to provide a false impression; others are more subtle identity manipulations, similar to the adjustments in self-presentation we make in many real world situations’ (Donath, 1999). Some examples of deceptions which can be harmful to a community are trolls, who purposefully look to bait other members of an online community into contentious discussions. This behaviour can be particularly damaging as it undermines the social cohesion of the group. It can also lead to legitimate new comers to the group to be considered a troll due to the naivety of their questions, which is a stigma that can be hard to shake (Donath, 1999). Other examples of malicious identity concealment provided by Donath include category deception and impersonation, both of which can be harmful as information from an unqualified source may be interpreted as having come from a reliable source due to the deception.

However, despite there being a degree of malicious identity deception in online communities, there are very legitimate times where one may need to remain completely anonymous. One such example highlighted by Donath is system administrators using pseudonyms when asking for help online as they are too embarrassed to admit they don’t have the answer. Another example is people discussing very personal matters such as illness, or mental health issues, who may wish to conceal their identity (Donath, 1999). In another example of a situation where concealing your identity is desirable, if harmless, is in the case of Reddit’s r/Gonewild subreddit as discussed by van der Nagel and Frith. The r/Gonewild subreddit provides an anonymous, safe and secure medium for people to post provocative pictures of themselves online without the risk of being identified and shamed (van der Nagel and Frith, 2015). Whilst some may see this as pornography and perhaps exploitative, and as such see its existence as an argument against online anonymity, measures are taken to ensure the photos being posted are legitimately of the person posting them, and that consent to publish the images has been given (van der Nagel and Frith, 2015). These examples of identity deception or concealment are benign, and are arguably beneficial to the communities or individuals involved.

Further to the relatively benign, and one could argue, relatively low importance examples above, there is one another example of where online identity deception is crucial to the rights and safety of those participating in the deception. In many parts of the world, people live under very repressive regimes. The internet is often heavily monitored, and in most instance anything you post online can be traced back to you. Motahari, Ziavras, and Jones go into detail discussing how many measures taken for anonymity online, are often insufficient (2010). However, there are tools available which can effectively mask ones identity. Jardine discusses the use of the deep web browser ‘Tor’ by political activists in both liberal and repressed countries to express their political views and disseminate information which may otherwise be censored (2016). For some in these repressive regimes, the ability to use identity deception in online communities is literally a matter of life and death.

There are many ways one can modify their identity in an online network or community. In most cases, this modification is minor, such as the socially awkward gamer creating a character which is an ideal version of himself or someone carefully managing who is visible within their networks so as to ensure their desired identity is supported by their networks or even a physician choosing carefully what they post on their private social networks to ensure they come across as professional. These example of ‘identity performance’ are not attempts to completely deceive others in their networks or communities, but merely a means of enhancing one’s identity in a desirable manner. This type of identity modification is also known as impression management, and has been utitlised by people well before the rise of online communities In other situations identity is not so much modified, but more created. In these cases we see identity deception taking place. In some cases these deceptions are malicious and damaging to the network or community. Examples of malicious identity deception include trolling, impersonating others online, or falsely claiming expertise in an area where one has none. However, in many cases identity deception is done in a more benign manner. These cases include merely not wanting to admit you don’t know an answer, or a desire to post provocative photos of yourself for people to see, but not wanting to be identified. In some rare cases, such as that of political activists, identity deception can be as serious as life and death. It is clear that despite the few examples of how being able to create or modify your identity can be harmful, overall it is crucial to the maintenance of online networks and communities that people have the choice of how they wish to be seen online.

 

 

 

 

 

 

 

 

 

 

 

 

References:

 

DeCamp, M., Koenig, T. W., & Chisolm, M. S. (2013). Social Media and Physicians’ Online Identity Crisis. JAMA. 310 (6). 581-582. Retrieved from https://jamanetwork-com.dbgw.lis.curtin.edu.au/journals/jama/fullarticle/1728725.

 

Donath, J. (1999). Identity and Deception in the Virtual Community. In P. Kollock, & M. A. Smith (Eds.), Communities in Cyberspace (pp. 29-59). New York: Routledge.
http://smg.media.mit.edu/people/Judith/Identity/IdentityDeception.html

 

Donath, J., & Boyd, d. (2004). Public Displays of Connection. BT Technology Journal, 22(4), 71-82.
DRAFT http://smg.media.mit.edu/papers/Donath/socialnetdisplay.draft.pdf

 

Goffman, E. (1959). The presentation of self in everyday life. New York: Anchor Books.

 

Jardine, E. (2016). Tor, what is it good for? Political repression and the use of online anonymity-granting technologies. new media & society 20(2), 435-452. Retrieved from http://journals.sagepub.com/doi/10.1177/1461444816639976

 

Motahari, S. Ziavras, S. G. & Jones, Q. (2010). Online Anonymity Protection in Computer-Mediated Communication, IEEE Transactions on information forensics and security 5(3), 570-580. Retrieved from http://ieeexplore.ieee.org.dbgw.lis.curtin.edu.au/stamp/stamp.jsp?tp=&arnumber=5475253

 

Pearson, E. (2009). All the World Wide Web’s a stage: The performance of identity in online social networks. First Monday. 14(3). http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/viewArticle/2162/2127

 

Rosenberg, J. & Egbert, N. (2011). Online Impression Management: Personality Traits and Concerns for Secondary Goalsas Predictors of Self-Presentation Tactics on Facebook. Journal of Computer-Mediated Communication. 17 (1). Pp1-18.

 

Schwartz, R. & Halegoua, G. R. (2014) The Spatial Self: Location based identity performance on social media. New media & society. 17 (10). 1643-1660. Retrieved from http://journals.sagepub.com.dbgw.lis.curtin.edu.au/doi/pdf/10.1177/1461444814531364

 

Turkle, S. (1994). Constructions and reconstructions of self in virtual reality: Playing in the MUDs. Mind, Culture, and Activity. 1(3). 158-167. Retrieved from https://www.tandfonline.com/doi/abs/10.1080/10749039409524667

 

Van Der Nagel, E. and Frith, J. (2015). Anonymity, pseudonymity, and the agency of online identity: Examining the social practices of r/Gonewild. First Monday, 20(3), Retrieved from http://www.ojphi.org/ojs/index.php/fm/article/view/5615/4346

 

9 thoughts on “Choosing who you want to be. Identity management in online communities.

  1. Hi Jeffrey, I liked how you presented a broad spectrum of use of identity performance in your paper. It acknowledged the good, the bad and the ugly, without criticism and without suggesting radical solutions to the bad and ugly, that would ultimately negatively affect the good that identity performance brings to many online. In fact, your paper brings to light a greater number of positive and innocent circumstances to the practice of self-presentation. Thank you for a helpful and balanced perspective. Alice.

    1. Thank you Alice,

      While I was arguing that identity modification is a crucial to open discussion online, I wanted to acknowledge there were negative ways some modify their identities, but stress the positives outweigh the negatives.

      I’m glad you enjoyed it.

  2. Hi Jeffrey,

    I like your article, it’s well written, you put your point across very well and it is backed up with some great references and research.

    One point you raise stood out to me. I’ve read van der Nagel and Frith’s Reddit’s r/Gonewild article before, and they spoke on how Reddit r/Gonewild protects their anonymous users. They have it as part of submission requirement that with the image to be uploaded it has to include a handwritten sign with Reddit username, a mention of the site, and the date (van der Nagel and Frith, 2015, para. 30). This ensures that only images taken willingly and for the express purpose of uploading to r/Gonewild are submitted. This is a good idea as it ensures that no one is exploited and having personal images of themselves uploaded by vengeful partners or people looking to cause harm. Sadly, I don’t think a lot of websites now offer any form of protection for users wanting to stay anonymous. Everything is becoming easier to get out into the open if people dig deep enough.

    So you mention that being anonymous is crucial to identity, either through the awkward gamer or physician through impression management, but I could see how were the gamer’s real life situation to get out things might become difficult for him. So do you have any suggestions on how users might be able to further protect their identity, or how the sites they use could work towards protecting their users identity?

    Cheers,
    Peter

    1. Hi Peter,

      I think the onus is on the platform used to allow people the option to protect their identities. Bear in mind, it’s not always appropriate to stay completely anonymous, however it is important to communities for people to manage their online identity to at least a small extent.

  3. Hi Jeffrey

    Thank you for the insightful arguments presented in your paper. I certainly found Turkle’s example of Peter very interesting. Like you, I have addressed the issue of online identity within my paper, and I found that much of the analysis that you have outlined in your paper to add a deep perspective of the reasoning behind the use of alternative identities online, particularly the process of impression management, rather than the extreme measure of a completely alternative persona.

    I do wonder about the act of “checking in’ on social media, whether it is actually an innocent act of interacting with friends about their activities, or if the function is more manipulated by some users who may be feeling the need for addtional attention and status within their group of online friends, hence the ‘check-in’ at locations or events that might draw extra attention and expressions of approval from these friends, rather than checking in at sometihng less exciting such as school, work or a doctor’s waiting room.

    While it is important for people to be able to express their views freely online, without the fear of arrest or being labelled as a possible state threat, there are also many that fear that even researching, reading and watching material that may be deemed dangerous or inappropriate by the state will place them at risk of serious repercussion.

    Thanks again

    RMarkham

  4. Hi Jeff,

    As mentioned in a previous comment, I read another interesting article, entitled “Me, myself and I” (Vasalou & Joinson, 2009) which investigated whether people customise their avatars for different online interactions, and how people draw attention to different attributes within the context of the application. People make themselves look more attractive in dating apps for example, and interestingly the most accurate reflection of self were blog users that strive for authenticity and appearing as an authority or expert. But all avatars include some aspect of our self, because without some part of our ‘true selves’ in our online presentation (whether that’s a physical attribute, our beliefs and values, or our personality) we’d be looking at pathological multiplicity (multiple personalities), which comes up in the Turkle articles that we both referenced. I thought it was interesting that Turkle’s notion of identity are still evident in the social media, gaming and online communities and platforms that we see today.

    I think my paper highlights your point that there are times when people should have the right to conceal their identity, for self-preservation or to explore different aspects of self.

    Vasalou, A. and Joinson, A. (2009). “Me, myself and I: The role of interactional context on self-presentation through avatars”. In Computers in Human Behavior 25(2009), 510-520. DOI: 10.1016/j.chb.2008.11.007

  5. Hi Jeffrey,

    I often find it very overwhelming thinking about how much of my information is available online. Even if you take precautions to make accounts private etc. this information is still out there. I remember using the web as a kid and going on chat rooms and creating a username and profile picture that had nothing to do with my real name (usually about bubble gum and rainbows). I wonder how this anonymity changes the way we make and keep friends online. I don’t use chat rooms anymore and only talk to my friends that I see in person on a regular basis. Maybe this would be different if the web had continued to be mostly anonymous interactions.

    Thanks for an interesting read!
    Madeleine

    1. Hi Madeleine,

      I also remember chatting anonymously on IRC chat clients just as the internet was starting to become more widespread in the 1990’s (I’m probably showing my age here). I often assumed that my conversation were anonymous, but I wonder how anonymous it really was? Could these conversation be traced back to our IP addresses? I imagine someone with the knowledge and motivation could have at the time.

      Perhaps these days we’re just more aware of the fact we are being tracked online due to the amount of media coverage internet privacy issues get.

      Just some food for thought – thanks for the comment 🙂

      Jeff

  6. Hi Jeffrey,

    Firstly, I found this to be a well written paper. And secondly, it is interesting to read your perspective on how people alter their identity online. It seems our papers have a similar focus.

    Given the focus within your paper on how anonymity is of importance, how do you feel then about those that choose to utilise the TOR network in order to be also geographically anonymous?

    As you state “despite there being a degree of malicious identity deception in online communities, there are very legitimate times where one may need to remain completely anonymous.”

    In addition to political activist whereby it might be life or death, so therefore they use it as a form of identity deception.

    Therefore, given the TOR network can be used as a means of identity deception, I would be interested in hearing your thoughts on the possible repercussions that are inherent when those that use TOR as a means of identity deception when undertaking illegal actions.

    I raise this question as I believe there are plenty of positive reasons for modifying ones identity online, as you state, “the socially awkward gamer creating a character which is an ideal version of himself”.

    However, I would be interested in your thoughts on further negative aspects of identity modification.

    – Nathan

Comments are closed.