[SIGCIS-Members] Identity Systems on Computer Networks

Meg Leta Jones Meg.Jones at georgetown.edu
Thu Jan 21 06:37:20 PST 2021


Hi David,
You might find Practicing privacy on other networks: network structures,
economic arrangements, and identity strategies before cookies
<https://www-tandfonline-com.proxy.library.georgetown.edu/doi/full/10.1080/24701475.2020.1747344>
published
recently in Internet Histories valuable.  I'm really interested in your
project and hope you'll keep us/me updated!
Meg

On Wed, Jan 20, 2021 at 6:22 PM Kyra Ocean Rehn <disksurfing at gmail.com>
wrote:

> Hey Cass,
>
> That’s great! Looking forward to hearing about your efforts as well.
>
> It’s been a few years so I’ll need to locate/de-scatter the resources and
> send them over once I do.
>
> I’m glad that there’s interest as I was so thrilled when I discovered it
> all—especially in that there was some research on identity happening
> concurrently with nascent online culture.
>
> Be well,
> KO ▋
>
> ĸyra oceaɴ reнɴ〈KEER-a REN〉
> Artist⌁Researcher⌁Strategist⌁Curator
> *↯* kyraocean.com   *↯* softdetours.com
> On 20 Jan 2021, 15:10 -0800, Cassius Adair <ca2594 at nyu.edu>, wrote:
>
> Hi D.K., I'm really interested in seeing these materials too! I'm writing
> about this material from a trans perspective-- I've done a little work on
> anonymizing servers on Usenet, but I'm really curious about the FidoNet
> stuff especially!
>
> Thanks so much,
> Cass
>
> On Wed, Jan 20, 2021 at 5:04 PM D.K. Rehn <disksurfing at gmail.com> wrote:
>
>> Hi David,
>>
>> Interesting topic! I’m looking forward to hearing more and seeing your
>> resource pool.
>>
>> I can share a few things including:
>>
>> • a collection of discussions/newsletters from when FidoNet SysOps were
>> heavily debating the enforcement of "real name" policies in the early 1990s
>>
>> • several journal articles also from the BBS era exploring how beneficial
>> handles ("second lives" as one author declared) were for LGBTQ, at-risk,
>> and bullied youth to freely explore their authentic self
>>
>> I’ll reach out directly soon.
>>
>> KO ▋
>>
>> ĸyra oceaɴ reнɴ〈KEER-a REN〉
>> Artist⌁Researcher⌁Strategist⌁Curator
>> *↯* kyraocean.com
>> <https://urldefense.proofpoint.com/v2/url?u=https-3A__kyraocean.com&d=DwMFaQ&c=slrrB7dE8n7gBJbeO0g-IQ&r=YoVxr4qH9Mu53Kf1Z11YQQ&m=Z-OC5l3zJrHSjj1HIHBy5RSEpdMQv6cMWUk52uYqYIc&s=z8TWuQDxgI6qWAXJ005Kd3hFfBgF6PUQnyDyx7qTrmQ&e=>
>>  *↯* softdetours.com
>> <https://urldefense.proofpoint.com/v2/url?u=https-3A__softdetours.com&d=DwMFaQ&c=slrrB7dE8n7gBJbeO0g-IQ&r=YoVxr4qH9Mu53Kf1Z11YQQ&m=Z-OC5l3zJrHSjj1HIHBy5RSEpdMQv6cMWUk52uYqYIc&s=aD7AyP6tcPdLwTl1dXZpllP53mEfQQLhTTYcRLcIkD8&e=>
>> On 20 Jan 2021, 14:25 -0800, D. Schmudde <d at schmud.de>, wrote:
>>
>> Hello all -
>>
>> I am interested in learning more about the history of identity systems
>> on computer networks. From finger to CompuServe IDs to Twitter handles.
>> Any advice for resources?
>>
>> I am most interested in the design trade-offs made for each system.
>> Priorities may include memorability, ease of administration, anonymity,
>> user flexibility, findability, uniqueness, and cultural issues that
>> relate to self identification or identification in society.
>>
>> Any research that pertains to these issues is much appreciated. While I
>> have your attention, I'll also ask if anybody would like to anecdotally
>> share any particularly absurd or well-conceived identity systems they
>> have encountered.
>>
>> Many thanks!
>>
>> /David
>>
>> --
>> w: http://schmud.de
>> e: d at schmud.de
>> t: @dschmudde
>>
>> _______________________________________________
>> This email is relayed from members at sigcis.org, the email discussion
>> list of SHOT SIGCIS. Opinions expressed here are those of the member
>> posting and are not reviewed, edited, or endorsed by SIGCIS. The list
>> archives are at http://lists.sigcis.org/pipermail/members-sigcis.org/
>> and you can change your subscription options at
>> http://lists.sigcis.org/listinfo.cgi/members-sigcis.org
>>
>> _______________________________________________
>> This email is relayed from members at sigcis.org, the email discussion
>> list of SHOT SIGCIS. Opinions expressed here are those of the member
>> posting and are not reviewed, edited, or endorsed by SIGCIS. The list
>> archives are at
>> https://urldefense.proofpoint.com/v2/url?u=http-3A__lists.sigcis.org_pipermail_members-2Dsigcis.org_&d=DwICAg&c=slrrB7dE8n7gBJbeO0g-IQ&r=YoVxr4qH9Mu53Kf1Z11YQQ&m=Z-OC5l3zJrHSjj1HIHBy5RSEpdMQv6cMWUk52uYqYIc&s=vIMo4AtFL9Z16UjnjVjpRGaRBKwEtSrR9fUhzNK4tKE&e=
>> and you can change your subscription options at
>> https://urldefense.proofpoint.com/v2/url?u=http-3A__lists.sigcis.org_listinfo.cgi_members-2Dsigcis.org&d=DwICAg&c=slrrB7dE8n7gBJbeO0g-IQ&r=YoVxr4qH9Mu53Kf1Z11YQQ&m=Z-OC5l3zJrHSjj1HIHBy5RSEpdMQv6cMWUk52uYqYIc&s=uf850AfNleUrjaF2JUJI45-kr2x8O6e_0UowRdQ4skc&e=
>
> _______________________________________________
> This email is relayed from members at sigcis.org, the email discussion
> list of SHOT SIGCIS. Opinions expressed here are those of the member
> posting and are not reviewed, edited, or endorsed by SIGCIS. The list
> archives are at http://lists.sigcis.org/pipermail/members-sigcis.org/ and
> you can change your subscription options at
> http://lists.sigcis.org/listinfo.cgi/members-sigcis.org



-- 

Meg Leta Jones, J.D., Ph.D.

Communication, Culture & Technology Associate Professor

Ethics Lab Faculty Fellow

Science, Technology, & International Affairs Core Faculty

Institute for Technology Law & Policy Affiliate Faculty

Georgetown University

Meg.Jones at Georgetown.edu

MegLeta.com <http://megleta.com/>

iSPYLab.net

Author of *Ctrl + Z: The Right to Be Forgotten
<http://nyupress.org/books/9781479881703/>* (NYU Press, 2016)
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.sigcis.org/pipermail/members-sigcis.org/attachments/20210121/ee96162b/attachment.htm>


More information about the Members mailing list