skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Search for: All records

Award ID contains: 1921260

Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

  1. Across various domains of social life, organizational reliance on personal data and exposure to unanticipated financial hardship have transformed Americans’ life chances and access to opportunities. This article examines an area where they intersect: the hardship caused by breakdowns in information systems. I focus on the case of identity theft, showing how that event—experienced by tens of millions of Americans annually—contributes to economic insecurity. To do so, I first develop a theory of insecurity that links feelings of precariousness to breaches of trust at three levels: interpersonal, organizational, and systemic. Drawing on an original qualitative study of identity theft resolution, I find that most victims worried about their financial lives because they could no longer count on certain people, organizations, or systems. Beneath this commonality, race and class informed feelings of insecurity and associated coping strategies following identity theft. Low-income people and people of color tended to direct suspicion at personal networks and report ending relationships and informal assistance. In contrast, middle- and upper-income and White individuals disproportionately blamed organizations and demanded their protection. These findings—along with the trust-based theory that helped make them visible—have important implications for the study of insecurity, inequality, and trust in the information age. 
    more » « less
  2. Systems drawing on databases of personal information increasingly shape life experiences and outcomes across a range of settings, from consumer credit and policing to immigration, health, and employment. How do these systems identify and reidentify individuals as the same unique persons and differentiate them from others? This article advances a general sociological theory of personal identification that extends and improves earlier work by theorists like Goffman, Mauss, Foucault, and Deleuze. Drawing on examples from an original ethnographic study of identity theft and a wide range of social scientific literature, our theory treats personal identification as a historically evolving organizational practice. In doing so, it offers a shared language, a set of concepts for sensitizing researchers’ attention to important aspects of personal identification that often get overlooked while also facilitating comparisons across historical periods, cultural contexts, substantive domains, and technological mediums. 
    more » « less