Systems drawing on databases of personal information increasingly shape life experiences and outcomes across a range of settings, from consumer credit and policing to immigration, health, and employment. How do these systems identify and reidentify individuals as the same unique persons and differentiate them from others? This article advances a general sociological theory of personal identification that extends and improves earlier work by theorists like Goffman, Mauss, Foucault, and Deleuze. Drawing on examples from an original ethnographic study of identity theft and a wide range of social scientific literature, our theory treats personal identification as a historically evolving organizational practice. In doing so, it offers a shared language, a set of concepts for sensitizing researchers’ attention to important aspects of personal identification that often get overlooked while also facilitating comparisons across historical periods, cultural contexts, substantive domains, and technological mediums.
more »
« less
Identity Theft, Trust Breaches, and the Production of Economic Insecurity
Across various domains of social life, organizational reliance on personal data and exposure to unanticipated financial hardship have transformed Americans’ life chances and access to opportunities. This article examines an area where they intersect: the hardship caused by breakdowns in information systems. I focus on the case of identity theft, showing how that event—experienced by tens of millions of Americans annually—contributes to economic insecurity. To do so, I first develop a theory of insecurity that links feelings of precariousness to breaches of trust at three levels: interpersonal, organizational, and systemic. Drawing on an original qualitative study of identity theft resolution, I find that most victims worried about their financial lives because they could no longer count on certain people, organizations, or systems. Beneath this commonality, race and class informed feelings of insecurity and associated coping strategies following identity theft. Low-income people and people of color tended to direct suspicion at personal networks and report ending relationships and informal assistance. In contrast, middle- and upper-income and White individuals disproportionately blamed organizations and demanded their protection. These findings—along with the trust-based theory that helped make them visible—have important implications for the study of insecurity, inequality, and trust in the information age.
more »
« less
- Award ID(s):
- 1921260
- PAR ID:
- 10441992
- Publisher / Repository:
- SAGE Publications
- Date Published:
- Journal Name:
- American Sociological Review
- Volume:
- 88
- Issue:
- 5
- ISSN:
- 0003-1224
- Format(s):
- Medium: X Size: p. 844-871
- Size(s):
- p. 844-871
- Sponsoring Org:
- National Science Foundation
More Like this
-
-
Social identity theory posits that individuals perceive the in-group as a homogenous entity comprised of depersonalized individuals, and this theory has provided a foundation to understand intergroup processes for many years. Cross-cultural research has suggested social identity theory may not apply to East Asians, who conceptualize their in-groups differently than those in from Western cultures. Specifically, Yuki and colleagues contend that East Asians perceive in-groups as networks wherein each individual is connected through personal ties, rather than homogenous entity comprised of depersonalized individuals. Furthermore, prior research has shown that East Asians are more likely to trust out-group members with potential personal connections, similarly to how they trust actual in-group members. This reflects their group boundary perception based on personal linkages rather than categorical membership. Conversely, individuals from Western cultures tend to trust in-group members more than out-group members, regardless of potential personal connections. Our preregistered study (N = 332 Japanese and 345 American university students) aimed to conceptually replicate key findings that support Yuki's account and expand upon the theory in the context of intergroup cooperation. Overall, we failed to find evidence for the network-based and category-based cooperation and trust among Japanese and Americans, respectively. Consequently, our results highlight the need for further experimental investigation and validation of Yuki and colleagues' theoretical framework.more » « less
-
Despite ample research in professional identity development in engineering, there is a gap in the literature regarding how professional identities relate to the personal identities of individuals in these contexts. This paper examines literature on personal identity and uses findings from an interpretive phenomenological analysis (IPA) investigation on identity transitions of students as they enter the workplace. The findings, based on interviews with seven participants, highlight how the individuals felt an elevated sense of significance in relation to their personal identities when entering the workplace, but they also concealed moments of insecurity when performing their engineering roles. I discuss the importance of examining personal identity in engineering contexts, both in the interest of advancing psychological identity theory and in the aim of supporting outcomes related to personal identity.more » « less
-
Abstract This study analyzes household energy insecurity in the United States during the first year of the COVID-19 pandemic. Previous research is limited by mostly cross-sectional research designs that do not allow scholars to study the persistency of this specific type of material hardship. We fill this gap by analyzing data from an original, nationally-representative, panel survey of low-income households. We find high levels of energy insecurity during the first year of the COVID-19 pandemic, especially during the initial months when the economic dislocation was at its height, and that many low-income households experienced it on multiple occasions during this period. We also identify disparities: households with people of color, very low-income, children aged five years and younger, with someone who relies on an electronic medical device, and those living in deficient housing conditions were more likely to experience energy insecurity. Households with these characteristics were also more likely to suffer from energy insecurity on a persistent basis through the first year of the pandemic.more » « less
-
Research on keystroke dynamics has the good potential to offer continuous authentication that complements conventional authentication methods in combating insider threats and identity theft before more harm can be done to the genuine users. Unfortunately, the large amount of data required by free-text keystroke authentication often contain personally identifiable information, or PII, and personally sensitive information, such as a user's first name and last name, username and password for an account, bank card numbers, and social security numbers. As a result, there are privacy risks associated with keystroke data that must be mitigated before they are shared with other researchers. We conduct a systematic study to remove PII's from a recent large keystroke dataset. We find substantial amounts of PII's from the dataset, including names, usernames and passwords, social security numbers, and bank card numbers, which, if leaked, may lead to various harms to the user, including personal embarrassment, blackmails, financial loss, and identity theft. We thoroughly evaluate the effectiveness of our detection program for each kind of PII. We demonstrate that our PII detection program can achieve near perfect recall at the expense of losing some useful information (lower precision). Finally, we demonstrate that the removal of PII's from the original dataset has only negligible impact on the detection error tradeoff of the free-text authentication algorithm by Gunetti and Picardi. We hope that this experience report will be useful in informing the design of privacy removal in future keystroke dynamics based user authentication systems.more » « less
An official website of the United States government
