The Stolen Identifier: an Inquiry into the Nature of Identification and the Ontological Status of Information Systems
نویسندگان
چکیده
Based on real-world examples of identity theft, and particularly a recent incident in Sweden, this paper explores the nature of identification from a social ontology point of view. This is contrasted with the traditional representational view, which is shown unable to handle critical aspects related to institutional control of identifiers and identity. Specifically, the paper shows that identification and the definition and allocation of identifiers is an institutional and political rather than scientific process, and that since “identity” in itself is a social construct, the process of identification depends on the institutional context in which the objects to identify exist as valid institutional facts. These institutional objects are often originally generated by the use of information systems, which means that genuine real-world institutional objects and their identifiers can be found within these information systems. This implies that the representational view of information systems with a sharp distinction between the real world outside the information system and the system itself (only seen as a model or perceived state of that real world) cannot be maintained.
منابع مشابه
Iterative learning identification and control for dynamic systems described by NARMAX model
A new iterative learning controller is proposed for a general unknown discrete time-varying nonlinear non-affine system represented by NARMAX (Nonlinear Autoregressive Moving Average with eXogenous inputs) model. The proposed controller is composed of an iterative learning neural identifier and an iterative learning controller. Iterative learning control and iterative learning identification ar...
متن کاملارزیابی تطبیقی کارایی ساختار فراداده نظامهای شناسگر دیجیتالی
The main solution to the problems of persistency and uniqueness in identification of digital objects in a web environment is provided by using digital identifiers instead of URL. The main basis of this solution is resolution mechanism that is used in digital identifier systems. Resolution is the use of indirect names instead of URLs; what worked for the DNS (Domain Name System) in stabilizing i...
متن کاملAn inquiry into the concept of information poverty
Background and Aim: The purpose of this paper is to examine the concept of information poverty, its levels and its causes in society Methods: The article is a review-analytical paper. Results: The findings show that information poverty is part of the larger problem of poverty and results from socioeconomic, educational and infrastructural issues. Information poverty can be discussed at mac...
متن کاملSTLR: a novel danger theory based structural TLR algorithm
Artificial Immune Systems (AIS) have long been used in the field of computer security and especially in Intrusion Detection systems. Intrusion detection based on AISs falls into two main categories. The first generation of AIS is inspired from adaptive immune reactions but, the second one which is called danger theory focuses on both adaptive and innate reactions to build a more biologically-re...
متن کاملInvestigation of the Status of IoT-Based Health Information Systems in a Three-Dimensional Conceptual Framework
Introduction: The ability to transfer data over the Internet of Things (IoT) to make right and timely decisions through accurate data collection has provided incredible interactive power and has resulted in an intelligent world with automated decision-making capability. The objective of this study was to investigate the status of IoT-based health information systems in a three-dimensional conce...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2011