In this Book

summary
Identity Technologies is a substantial contribution to the fields of autobiography studies, digital studies, and new media studies, exploring the many new modes of self-expression and self-fashioning that have arisen in conjunction with Web 2.0, social networking, and the increasing saturation of wireless communication devices in everyday life.
            This volume explores the various ways that individuals construct their identities on the Internet and offers historical perspectives on ways that technologies intersect with identity creation. Bringing together scholarship about the construction of the self by new and established authors from the fields of digital media and auto/biography studies, Identity Technologies presents new case studies and fresh theoretical questions emphasizing the methodological challenges inherent in scholarly attempts to account for and analyze the rise of identity technologies. The collection also includes an interview with Lauren Berlant on her use of blogs as research and writing tools.

Table of Contents

restricted access Download Full Book
  1. Cover
  2. p. C
  3. restricted access
    • Download PDF Download
  1. Title Page, Copyright Page
  2. pp. i-iv
  3. restricted access
    • Download PDF Download
  1. Contents
  2. pp. v-vi
  3. restricted access
    • Download PDF Download
  1. Acknowledgments
  2. pp. vii-2
  3. restricted access
    • Download PDF Download
  1. Introduction: Digital Dialogues
  2. Anna Poletti and Julie Rak
  3. pp. 3-22
  4. restricted access
    • Download PDF Download
  1. Foundations
  1. Beyond Anonymity, or Future Directions for Internet Identity Research
  2. Helen Kennedy
  3. pp. 25-41
  4. restricted access
    • Download PDF Download
  1. Cyberrace
  2. Lisa Nakamura
  3. pp. 42-54
  4. restricted access
    • Download PDF Download
  1. Becoming and Belonging: Performativity, Subjectivity, and the Cultural Purposes of Social Networking
  2. Rob Cover
  3. pp. 55-69
  4. restricted access
    • Download PDF Download
  1. Virtually Me: A Toolbox about Online Self-Presentation
  2. Sidonie Smith and Julia Watson
  3. pp. 70-96
  4. restricted access
    • Download PDF Download
  1. Identity Affordances
  1. Adultery Technologies
  2. Melissa Gregg
  3. pp. 99-111
  4. restricted access
    • Download PDF Download
  1. Facebook and Coaxed Affordances
  2. Aimée Morrison
  3. pp. 112-131
  4. restricted access
    • Download PDF Download
  1. Archiving Disaster and National Identity in the Digital Realm: The September 11 Digital Archive and the Hurricane Digital Memory Bank
  2. Courtney Rivard
  3. pp. 132-143
  4. restricted access
    • Download PDF Download
  1. Life Bytes: Six-Word Memoir and the Exigencies of Auto/tweetographies
  2. Laurie McNeill
  3. pp. 144-164
  4. restricted access
    • Download PDF Download
  1. Mediated Communities
  1. Negotiating Identities/Queering Desires: Coming Out Online and the Remediation of the Coming-Out Story
  2. Mary L. Gray
  3. pp. 167-197
  4. restricted access
    • Download PDF Download
  1. “Treat Us Right!”: Digital Publics, Emerging Biosocialities, and the Female Complaint
  2. Olivia Banner
  3. pp. 298-216
  4. restricted access
    • Download PDF Download
  1. Cyber-Self: In Search of a Lost Identity?
  2. Alessandra Micalizzi
  3. pp. 217-228
  4. restricted access
    • Download PDF Download
  1. Homeless Nation: Producing Legal Subjectivities through New Media
  2. Suzanne Bouclin
  3. pp. 229-244
  4. restricted access
    • Download PDF Download
  1. Reflections
  1. Autobiography and New Communication Tools
  2. Philippe Lejeune, translated by Katherine Durnin
  3. pp. 247-258
  4. restricted access
    • Download PDF Download
  1. The Blog as Experimental Setting: An Interview with Lauren Berlant
  2. Anna Poletti and Julie Rak
  3. pp. 259-272
  4. restricted access
    • Download PDF Download
  1. Contributors
  2. pp. 273-278
  3. restricted access
    • Download PDF Download
  1. Index
  2. pp. 279-286
  3. restricted access
    • Download PDF Download
  1. Series Page
  2. pp. 287-292
  3. restricted access
    • Download PDF Download
Back To Top

This website uses cookies to ensure you get the best experience on our website. Without cookies your experience may not be seamless.