The Role of Anonymity in Deindividuated Behavior
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Identity Theft Literature Review
The author(s) shown below used Federal funds provided by the U.S. Department of Justice and prepared the following final report: Document Title: Identity Theft Literature Review Author(s): Graeme R. Newman, Megan M. McNally Document No.: 210459 Date Received: July 2005 Award Number: 2005-TO-008 This report has not been published by the U.S. Department of Justice. To provide better customer service, NCJRS has made this Federally- funded grant final report available electronically in addition to traditional paper copies. Opinions or points of view expressed are those of the author(s) and do not necessarily reflect the official position or policies of the U.S. Department of Justice. This document is a research report submitted to the U.S. Department of Justice. This report has not been published by the Department. Opinions or points of view expressed are those of the author(s) and do not necessarily reflect the official position or policies of the U.S. Department of Justice. IDENTITY THEFT LITERATURE REVIEW Prepared for presentation and discussion at the National Institute of Justice Focus Group Meeting to develop a research agenda to identify the most effective avenues of research that will impact on prevention, harm reduction and enforcement January 27-28, 2005 Graeme R. Newman School of Criminal Justice, University at Albany Megan M. McNally School of Criminal Justice, Rutgers University, Newark This project was supported by Contract #2005-TO-008 awarded by the National Institute of Justice, Office of Justice Programs, U.S. Department of Justice. Points of view in this document are those of the author and do not necessarily represent the official position or policies of the U.S. -
Dod Enterpriseidentity, Credential, and Access Management (ICAM)
UNCLASSIFIED DoD Enterprise Identity, Credential, and Access Management (ICAM) Reference Design Version 1.0 June 2020 Prepared by Department of Defense, Office of the Chief Information Officer (DoD CIO) DISTRIBUTION STATEMENT C. Distribution authorized to U.S. Government agencies and their contractors (Administrative or Operational Use). Other requests for this document shall be referred to the DCIO-CS. UNCLASSIFIED UNCLASSIFIED Document Approvals Prepared By: N. Thomas Lam IE/Architecture and Engineering Department of Defense, Office of the Chief Information Officer (DoD CIO) Thomas J Clancy, COL US Army CS/Architecture and Capability Oversight, DoD ICAM Lead Department of Defense, Office of the Chief Information Officer (DoD CIO) Approved By: Peter T. Ranks Deputy Chief Information Officer for Information Enterprise (DCIO IE) Department of Defense, Office of the Chief Information Officer (DoD CIO) John (Jack) W. Wilmer III Deputy Chief Information Officer for Cyber Security (DCIO CS) Department of Defense, Office of the Chief Information Officer (DoD CIO) ii UNCLASSIFIED UNCLASSIFIED Version History Version Date Approved By Summary of Changes 1.0 TBD TBD Renames and replaces the IdAM Portfolio Description dated August 2015 and the IdAM Reference Architecture dated April 2014. (Existing IdAM SDs and TADs will remain valid until updated versions are established.) Updates name from Identity and Access Management (IdAM) to Identity, Credential, and Access Management (ICAM) to align with Federal government terminology Removes and cancels -
PERSONAL and SOCIAL IDENTITY: SELF and SOCIAL CONTEXT John C. Turner, Penelope J. Oakes, S. Alexander Haslam and Craig Mcgarty D
PERSONAL AND SOCIAL IDENTITY: SELF AND SOCIAL CONTEXT John C. Turner, Penelope J. Oakes, S. Alexander Haslam and Craig McGarty Department of Psychology Australian National University Paper presented to the Conference on "The Self and the Collective" Department of Psychology, Princeton University, Princeton, NJ, 7-10 May 1992 A revised version of this paper will appear in Personality and Social Psychology Bulletin Special Issue on The Self and the Collective Professor J. C. Turner Department of Psychology GPO Box 4, ANU Canberra, ACT 2601 Australia Tel: 06 249 3094 Fax: 06 249 0499 Email: [email protected] 30 April 1992 2 Abstract Social identity and self-categorization theories provide a distinctive perspective on the relationship between the self and the collective. They assume that individuals can and do act as both individual persons and social groups and that, since both individuals and social groups exist objectively, both personal and social categorical self-categorizations provide valid representations of self in differing social contexts. As social psychological theories of collective behaviour, they take for granted that they cannot provide a complete explanation of the concrete social realities of collective life. They define their task as providing an analysis of the psychological processes that interact with and make possible the distinctive "group facts" of social life. From the early 1970s, beginning with Tajfel's research on social categorization and intergroup discrimination, social identity theory has explored the links between the self- evaluative aspects of social'identity and intergroup conflict. Self-categorization theory, emerging from social identity research in the late 1970s, made a basic distinction between personal and social identity as differing levels of inclusiveness in self-categorization and sought to show how the emergent, higher-order properties of group processes could be explained in terms of a functional shift in self-perception from personal to social identity. -
Constructed Identity, Subjective Identity and Inter-Subjective Transformation: an Exploration by Way of Motherhood and Canadian Maternity Benefits
Wilfrid Laurier University Scholars Commons @ Laurier Theses and Dissertations (Comprehensive) 2009 Constructed Identity, Subjective Identity and Inter-Subjective Transformation: An Exploration By Way of Motherhood and Canadian Maternity Benefits Patricia Van Katwyk Wilfrid Laurier University Follow this and additional works at: https://scholars.wlu.ca/etd Part of the Social Work Commons Recommended Citation Van Katwyk, Patricia, "Constructed Identity, Subjective Identity and Inter-Subjective Transformation: An Exploration By Way of Motherhood and Canadian Maternity Benefits" (2009). Theses and Dissertations (Comprehensive). 1081. https://scholars.wlu.ca/etd/1081 This Dissertation is brought to you for free and open access by Scholars Commons @ Laurier. It has been accepted for inclusion in Theses and Dissertations (Comprehensive) by an authorized administrator of Scholars Commons @ Laurier. For more information, please contact [email protected]. NOTE TO USERS This reproduction is the best copy available. UMI Library and Archives Bibliotheque et 1*1 Canada Archives Canada Published Heritage Direction du Branch Patrimoine de I'edition 395 Wellington Street 395, rue Wellington Ottawa ON K1A 0N4 Ottawa ON K1A 0N4 Canada Canada Your file Votre r&ference ISBN: 978-0-494-54261-3 Our file Notre reference ISBN: 978-0-494-54261-3 NOTICE: AVIS: The author has granted a non L'auteur a accorde une licence non exclusive exclusive license allowing Library and permettant a la Bibliotheque et Archives Archives Canada to reproduce, Canada de reproduire, publier, archiver, publish, archive, preserve, conserve, sauvegarder, conserver, transmettre au public communicate to the public by par telecommunication ou par I'internet, prefer, telecommunication or on the Internet, distribuer et vendre des theses partout dans le loan, distribute and sell theses monde, a des fins commerciales ou autres, sur worldwide, for commercial or non support microforme, papier, electronique et/ou commercial purposes, in microform, autres formats. -
Imgur Group Identification and Deindividuation
UC Santa Barbara UC Santa Barbara Previously Published Works Title 100 million strong: A case study of group identification and deindividuation on Imgur.com Permalink https://escholarship.org/uc/item/41c212xc Journal NEW MEDIA & SOCIETY, 18(11) ISSN 1461-4448 Authors Mikal, Jude P Rice, Ronald E Kent, Robert G et al. Publication Date 2016-12-01 DOI 10.1177/1461444815588766 Peer reviewed eScholarship.org Powered by the California Digital Library University of California Group Identification and Deindividuation on Imgur.com, p-1 Mikal, J. P., Rice, R. E., Kent, R. G., & Uchino, B. N. (2016). 100 million strong: A case study of group identification and deindividuation on Imgur.com. New Media & Society, 18(11), 2485- 2506. doi:10.1177/1461444815588766 [Note: There may be some small differences between this submitted manuscript version and the published version cited above.] 100 million strong: A case study of group identification and deindividuation on Imgur.com Abstract Online groups can become communities, developing group identification and fostering deindividuation. But is this possible for very large, anonymous groups with low barriers to entry, highly constrained formats, and great diversity of content? Applying social identity theory, and social identification and deindividuation effects theory, this study assesses influences on group identification and deindividuation in the case of the online site Imgur.com. Respondents reported slightly positive levels of the three forms of group identification, but mixed levels of two forms of deindividuation. As argued by proponents of computer-mediated communication, demographics play only a minor role on these outcomes. More involved usage, such as direct access and commenting on images, but not posting original content, is more associated with these outcomes, while more basic usage, such as total hours and reading comments, has little influence. -
The Human Choice: Individuation, Reason, and Impulse, and Chaos
nebraska symposium on motivation 1969 The Human Choice: WILLIAM J. ARNOLD and DAVID LEVINE, Editors Individuation, Reason, and Order versus Deindividuation, Dalbir Bindra Professor of Psychology- McGill b'liiversily Impulse, and Chaos Professor of Psychology Edward L. Wike PHILIP G. ZIMBARDO University of Kansas Stanjord University Roger W. Black Professor of Psychology University oj South Carolina Omtrol. That’s what current psychology is all about. The use ol powerful schedules of reinforcement, probing neurophysiological techniques, computer simulation, and the new behavior therapies Elliot Aronson Professor of Psychology University of Texas at Austin (among other advances) enable psychologists to manipulate the responses of a wide range of research subjects in order to improve learning and discrimination; to arouse, rechannel, and satisfy Stuart W. Cook Professor of Psyi hology drives; and to redirect abnormal or deviant behavior. It has, in fact, Univernty of Colorado become the all-consuming task of most psychologists to learn how to bring behavior under stimulus control. Philip G. Zimbardo Prolessor of Psychology It is especially impressive to note (in any volume of the Nebraska Stanford University Symposium on Motivation) the relative case with which laboratory researchers can induce motives which have an immediate and often demonstrably pervasive effect on a vast array of response measures. On the other hand, one must reconcile this with the observation ’ that in the “real world” people often.show considerable tolerance university -
From Slave Ship to Supermax
Introduction Antipanoptic Expressivity and the New Neo-Slave Novel As a slave, the social phenomenon that engages my whole con- sciousness is, of course, revolution. Anyone who passed the civil service examination yesterday can kill me today with complete immunity. I’ve lived with repression every moment of my life, a re- pression so formidable that any movement on my part can only bring relief, the respite of a small victory or the release of death.1 xactly 140 years after Nat Turner led a slave rebellion in southeastern Virginia, the U.S. carceral state attempted to silence another influential EBlack captive revolutionary: the imprisoned intellectual George Jackson. When guards at California’s San Quentin Prison shot Jackson to death on August 21, 1971, allegedly for attempting an escape, the acclaimed novelist James Baldwin responded with a prescience that would linger in the African American literary imagination: “No Black person will ever believe that George Jackson died the way they tell us he did.”2 Baldwin had long been an advocate for Jackson, and Jackson—as evident from his identification with the slave in the block quotation above—had long been a critic of social control practices in the criminal justice system reminiscent of slavery. Jackson was a well-read Black freedom fighter, political prisoner, Black Panther Party field marshal, and radical social theorist who organized a prisoners’ liberation movement while serving an indeterminate sentence of one year to life for his presumed complicity in a seventy-dollar gas station robbery. He first exposed slavery’s vestiges in the penal system in Soledad Brother, the collection of prison letters 2 Introduction he published in 1970. -
Terminology Packet
This symbol recognizes that the term is a caution term. This term may be a derogatory term or should be used with caution. Terminology Packet This is a packet full of LGBTQIA+ terminology. This packet was composed from multiple sources and can be found at the end of the packet. *Please note: This is not an exhaustive list of terms. This is a living terminology packet, as it will continue to grow as language expands. This symbol recognizes that the term is a caution term. This term may be a derogatory term or should be used with caution. A/Ace: The abbreviation for asexual. Aesthetic Attraction: Attraction to someone’s appearance without it being romantic or sexual. AFAB/AMAB: Abbreviation for “Assigned Female at Birth/Assigned Male at Birth” Affectionional Orientation: Refers to variations in object of emotional and sexual attraction. The term is preferred by some over "sexual orientation" because it indicates that the feelings and commitments involved are not solely (or even primarily, for some people) sexual. The term stresses the affective emotional component of attractions and relationships, including heterosexual as well as LGBT orientation. Can also be referred to as romantic orientation. AG/Aggressive: See “Stud” Agender: Some agender people would define their identity as not being a man or a woman and other agender people may define their identity as having no gender. Ally: A person who supports and honors sexual diversity, acts accordingly to challenge homophobic, transphobic, heteronormative, and heterosexist remarks and behaviors, and is willing to explore and understand these forms of bias within themself. -
Asymmetric Personal Identity∗ Theodore Sider Journal of the American Philosophical Association 2018: 127–46
Asymmetric personal identity∗ Theodore Sider Journal of the American Philosophical Association 2018: 127–46 1. The eponymous antihero of James Thurber’s story ‘The Secret Life of Walter Mitty’ escapes his dreary suburban life by daydreaming. Thurber’s Mitty dreams of many things, of being a navy pilot, a famous surgeon, a notorious assassin, and so forth; but imagine a different Mitty, whose daydreams always involve a single persona, a cape-wearing crime- ghting vigilante. And further, imagine that each night, these daydreams become reality. Each night, Mitty gets out of bed and really does ght crime. Or better, to avoid begging questions let us say that ‘Daytime Mitty’ leads a boring suburban life and that ‘Nighttime Mitty’ ghts crime. Nighttime Mitty, to continue the story, can remember being a frustrated suburbanite as Daytime Mitty, and can also remember ghting crime as Nightime Mitty on earlier nights (‘quasi-remember’ if you prefer [Shoemaker 1970]). But Daytime Mitty cannot remember any of the nighttime events and has no other source of knowledge of them. He has no idea that Nighttime Mitty exists. I offer two judgments. First, Nighttime Mitty was Daytime Mitty. Night- time Mitty can say truly, ‘I lived a boring suburban life earlier today’. Second, Daytime Mitty will not be Nightime Mitty. If Daytime Mitty were to say ‘I will ght crime this evening’, that would be false. These two judgments together yield the conclusion that personal identity for Mitty is asymmetric.1 Asymmet- ric personal identity might seem logically absurd. But before addressing that issue, consider the case in its favor. -
Deindividuation Examples in History
Deindividuation Examples In History Unlocked Moss undergoing her newspaperman so lubberly that Ahmed Teutonises very uncontrollably. Paul usually grip inconsonantly or jangler?entrance florally when centralist Thaddius unvulgarising inactively and lucidly. Which Julio refund so admiringly that Wells jostles her Families that might not held a video about childhood psychological mechanisms that iis can be judged or log into each business for full, on another field or otherwise disinterested students respond better able to deindividuation examples The study demonstrated for example that good people work not enough. Was the League of Nations A Success? The broader social and political conditions and borough of slavery and racial. Escher, focusing on the white figures with black as ground, we see a world of Angels. This union, if someone remember beloved the discussion above, had participants wearing a week to create anonymity and shimmer that people this be is likely to engage in the antinormative behavior of shocking more dull when available were identifiable. Then there are deindividuation examples of history deals with trolls and trust in mass looting. While later can on similar maternal health problems that adults have, made anxiety or depression, children may have met with changes associated with caught up, such as tomorrow school. Tell That to My Face! Education to be perverted into special tool for company, an instrument for demeaning human nature, have an intellectual weapon for justifying the Evils of inhumane treatment of our brothers and sisters of drag race, religion, ethnicity, or political persuasion. Consequently, individuals reduce their compliance with good and bad sanctions held by influences outside the group. -
Personal Identity and Naming on Anuta
27 WHAT'S IN A NAME? PERSONAL IDENTITY AND NAMING ON ANUTA Richard Feinberg Kent State University Abstract Names and the messages that they communicate have been a subject of general and anthro- pological interest. Here data are presented from Anuta, a Polynesian island in the eastern Solomons, showing that one's sense of identification with one's name is as intimate as in the Uest, and that social bonds are frequently established through the naming process, but with- out the permanence and exclusivity that we associate with names. Suggestions are offered as to why names are such potent vehicles for shaping people's sense of who they are and where they fit into their universe. Sally: What was his name again? Chuck: Santa Claus. Sally: How about his wife? Do you know her name? Chuck: Well, sometimes you hear people say her name is Mary Christmas. Sally: Really? That's very interesting. Maybe I'll write to her instead: "Dear Mary Christmas, Congratulations on deciding to keep your own name..." —Charles Schultz— INTRODUCTION Names, the relationships that they establish, and the messages they communicate, have been topics of both scholarly and popular concern. For our own society, it has been argued that "...names identify..., are gates to a character's knowable personality, and bound that personality with isolating precision" [Nicolaisen 1980:256], Furthermore, "...names prevent confusion, provide structured human relationships, determine the possi- bility of access...." [Ibid.].1 Assignment of a name not only communicates important information about the person named [Coleman et al. 1980; Ni- colaisen 1978, 1980]; it has even been suggested that the name with which an individual grows up has a major impact upon personality development and eventual occupational choice [Gaffney 1971], That names bear major psychosocial value in non-Western cultures and societies is evident from the work of numerous observers [Goodenough 1965; Geertz 1973; Junghare 1975; Akinnaso 1981]. -
Examining Deindividuation Among College Students: Soliciting Political & Religious Views Spring 2021 Research Symposium Adrian Salmon [email protected]
Examining deindividuation among college students: Soliciting political & religious views Spring 2021 Research Symposium Adrian Salmon [email protected] A BSTRACT & RATIONALE E XPECTED R ESULTS & LIMITATIONS Abstract: Expected Results: Deindividuation is a term in psychology that refers to an individual’s loss of self- I predict that deindividuation will be more active, and conformity will decrease for the awareness among groups during situations in which they believe they cannot be experimental group compared to control group. I expect that this first hypothesis will be personally identified. Uhrich & Tombs (2014) conducted an experiment using accepted because the masked group may voluntarily confess what they believe and endorse deindividuation with shoppers and found lower levels of emotional discomfort among after the study. customers that avoided unwanted social interaction from salespeople by having the My second hypothesis is that individuals in the experimental group will have more friction amongst one another after the material is presented. I predict that the second hypothesis will presence of multiple customers. They also experienced lower public self-awareness One of the limitations of this study was the fact that the participants had to be solely from this university. Another limitation is that the participants might which would, in turn, mitigate others evaluative concerns in the store itself. Politics and recognizebe accepted one another. because Also, the participants the identity have the rightof tothe exit experimental the experiment whenever group they want. will Another never limitation be revealedis that the groups to will one not know what material is going to be solicited, so they might now have an opinion.