skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Title: The Sociology of Personal Identification
Systems drawing on databases of personal information increasingly shape life experiences and outcomes across a range of settings, from consumer credit and policing to immigration, health, and employment. How do these systems identify and reidentify individuals as the same unique persons and differentiate them from others? This article advances a general sociological theory of personal identification that extends and improves earlier work by theorists like Goffman, Mauss, Foucault, and Deleuze. Drawing on examples from an original ethnographic study of identity theft and a wide range of social scientific literature, our theory treats personal identification as a historically evolving organizational practice. In doing so, it offers a shared language, a set of concepts for sensitizing researchers’ attention to important aspects of personal identification that often get overlooked while also facilitating comparisons across historical periods, cultural contexts, substantive domains, and technological mediums.  more » « less
Award ID(s):
1921260
PAR ID:
10342287
Author(s) / Creator(s):
;
Date Published:
Journal Name:
Sociological Theory
Volume:
39
Issue:
4
ISSN:
0735-2751
Page Range / eLocation ID:
265 to 292
Format(s):
Medium: X
Sponsoring Org:
National Science Foundation
More Like this
  1. Abstract Compensatory control theory (CCT) provides a framework for understanding the mechanisms at play when one's personal control is challenged. The model suggests that believing the world is a structured and predictable place is fundamental, insofar as it provides the foundation upon which people can believe they are able to exert control over their environment and act agentically towards goals. Because of this, CCT suggests, when personal control is threatened people try to reaffirm the more foundational belief in structure/predictability in the world, so that they then have a strong foundation to reestablish feelings of personal control and pursue their goals. This review seeks to understand how the basic assumptions of these compensatory control processes unfold in different cultural contexts. Drawing on research and theorizing from cultural psychology, we propose that cultural models of self and agency, culturally prevalent modes of control, and culture‐specific motivations all have implications for compensatory control processes. Culture determines, in part, whether or not personal control deprivation is experienced as a threat to perceiving an orderly world, how/whether individuals respond to low personal control, and the function that responses to restore a sense of order in the world serve. A theoretical model of compensatory control processes across cultures is proposed that has implications for how people cope with a wide range of personal and societal events that potentially threaten their personal control. 
    more » « less
  2. Across various domains of social life, organizational reliance on personal data and exposure to unanticipated financial hardship have transformed Americans’ life chances and access to opportunities. This article examines an area where they intersect: the hardship caused by breakdowns in information systems. I focus on the case of identity theft, showing how that event—experienced by tens of millions of Americans annually—contributes to economic insecurity. To do so, I first develop a theory of insecurity that links feelings of precariousness to breaches of trust at three levels: interpersonal, organizational, and systemic. Drawing on an original qualitative study of identity theft resolution, I find that most victims worried about their financial lives because they could no longer count on certain people, organizations, or systems. Beneath this commonality, race and class informed feelings of insecurity and associated coping strategies following identity theft. Low-income people and people of color tended to direct suspicion at personal networks and report ending relationships and informal assistance. In contrast, middle- and upper-income and White individuals disproportionately blamed organizations and demanded their protection. These findings—along with the trust-based theory that helped make them visible—have important implications for the study of insecurity, inequality, and trust in the information age. 
    more » « less
  3. To make computer science (CS) more equitable, many educational efforts are shifting foci from access and content understanding to include identification, agency, and social change. As part of these efforts, we look at how learners perceive themselves in relation to what they believe CS is and what it means to participate in CS. Informed by three design lenses, unblackboxing, culturally responsive computing, and creative production, we designed a physical computing kit and activities. Drawing from qualitative analysis of interviews, artifacts, and observation of six young people in a weeklong summer workshop, we report on the experiences of two young Black women designers. We found that using these materials young people were able to: leverage personal goals and prior experiences in computing work; feel as if they were figuring out computing systems; and recognize computational technologies as created by people for particular purposes. We observed that while the mix of materials and activities created some frustration for participants, it also prompted processes of community building and inquiry. We discuss implications for design of computational tools in equity-centered CS education and pose seamfulness as an emergent heuristic when designing for learning that engages young people with the social, not just material, systems of computing. 
    more » « less
  4. null (Ed.)
    In this paper, we describe and analyze a workshop developed for a work training program called DataWorks. In this workshop, data workers chose a topic of their interest, sourced and processed data on that topic, and used that data to create presentations. Drawing from discourses of data literacy; epistemic agency and lived experience; and critical race theory, we analyze the workshops’ activities and outcomes. Through this analysis, three themes emerge: the tensions between epistemic agency and the context of work, encountering the ordinariness of racism through data work, and understanding the personal as communal and intersectional. Finally, critical race theory also prompts us to consider the very notions of data literacy that undergird our workshop activities. From this analysis, we ofer a series of suggestions for approaching designing data literacy activities, taking into account critical race theory. 
    more » « less
  5. What would happen if we designed CAD systems like a weaver designs cloth? Drawing from our ongoing collaborations with weavers, we suggest four rules to bring these qualities to your own practice: follow the materials, privilege the present and personal, form kinships with the past, and design systems of notations. 
    more » « less