To see the other types of publications on this topic, follow the link: Algorithmic identity.

Journal articles on the topic 'Algorithmic identity'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Algorithmic identity.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Cheney-Lippold, John. "A New Algorithmic Identity." Theory, Culture & Society 28, no. 6 (2011): 164–81. http://dx.doi.org/10.1177/0263276411424420.

Full text
Abstract:
Marketing and web analytic companies have implemented sophisticated algorithms to observe, analyze, and identify users through large surveillance networks online. These computer algorithms have the capacity to infer categories of identity upon users based largely on their web-surfing habits. In this article I will first discuss the conceptual and theoretical work around code, outlining its use in an analysis of online categorization practices. The article will then approach the function of code at the level of the category, arguing that an analysis of coded computer algorithms enables a supplement to Foucauldian thinking around biopolitics and biopower, of what I call soft biopower and soft biopolitics. These new conceptual devices allow us to better understand the workings of biopower at the level of the category, of using computer code, statistics and surveillance to construct categories within populations according to users’ surveilled internet history. Finally, the article will think through the nuanced ways that algorithmic inference works as a mode of control, of processes of identification that structure and regulate our lives online within the context of online marketing and algorithmic categorization.
APA, Harvard, Vancouver, ISO, and other styles
2

Karizat, Nadia, Dan Delmonaco, Motahhare Eslami, and Nazanin Andalibi. "Algorithmic Folk Theories and Identity: How TikTok Users Co-Produce Knowledge of Identity and Engage in Algorithmic Resistance." Proceedings of the ACM on Human-Computer Interaction 5, CSCW2 (2021): 1–44. http://dx.doi.org/10.1145/3476046.

Full text
Abstract:
Algorithms in online platforms interact with users' identities in different ways. However, little is known about how users understand the interplay between identity and algorithmic processes on these platforms, and if and how such understandings shape their behavior on these platforms in return. Through semi-structured interviews with 15 US-based TikTok users, we detail users' algorithmic folk theories of the For You Page algorithm in relation to two inter-connected identity types: person and social identity. Participants identified potential harms that can accompany algorithms' tailoring content to their person identities. Further, they believed the algorithm actively suppresses content related to marginalized social identities based on race and ethnicity, body size and physical appearance, ability status, class status, LGBTQ identity, and political and social justice group affiliation. We propose a new algorithmic folk theory of social feeds-The Identity Strainer Theory-to describe when users believe an algorithm filters out and suppresses certain social identities. In developing this theory, we introduce the concept of algorithmic privilege as held by users positioned to benefit from algorithms on the basis of their identities. We further propose the concept of algorithmic representational harm to refer to the harm users experience when they lack algorithmic privilege and are subjected to algorithmic symbolic annihilation. Additionally, we describe how participants changed their behaviors to shape their algorithmic identities to align with how they understood themselves, as well as to resist the suppression of marginalized social identities and lack of algorithmic privilege via individual actions, collective actions, and altering their performances. We theorize our findings to detail the ways the platform's algorithm and its users co-produce knowledge of identity on the platform. We argue the relationship between users' algorithmic folk theories and identity are consequential for social media platforms, as it impacts users' experiences, behaviors, sense of belonging, and perceived ability to be seen, heard, and feel valued by others as mediated through algorithmic systems.
APA, Harvard, Vancouver, ISO, and other styles
3

Packer, Jeremy. "Homeland Subjectivity: The Algorithmic Identity of Security." Communication and Critical/Cultural Studies 4, no. 2 (2007): 211–15. http://dx.doi.org/10.1080/14791420701296588.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kotliar, Dan M. "The return of the social: Algorithmic identity in an age of symbolic demise." New Media & Society 22, no. 7 (2020): 1152–67. http://dx.doi.org/10.1177/1461444820912535.

Full text
Abstract:
This article explores the socio-algorithmic construction of identity categories based on an ethnographic study of the Israeli data analytics industry. While algorithmic categorization has been described as a post-textual phenomenon that leaves language, social theory, and social expertise behind, this article focuses on the return of the social—the process through which the symbolic means resurface to turn algorithmically produced clusters into identity categories. I show that such categories stem not only from algorithms’ structure or their data, but from the social contexts from which they arise, and from the values assigned to them by various individuals. I accordingly argue that algorithmic identities stem from epistemic amalgams—complex blends of algorithmic outputs and human expertise, messy data flows, and diverse inter-personal factors. Finally, I show that this process of amalgamation arbitrarily conjoins quantitative clusters with qualitative labels, and I discuss the implausibility of seeing named algorithmic categories as explainable.
APA, Harvard, Vancouver, ISO, and other styles
5

James, Keith, and Jacob Eisenberg. "Personal Identity and Group Identity Influences on Algorithmic and Original Task Performance." Creativity Research Journal 16, no. 1 (2004): 91–103. http://dx.doi.org/10.1207/s15326934crj1601_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Lee, Angela Y., Hannah Mieczkowski, Nicole B. Ellison, and Jeffrey T. Hancock. "The Algorithmic Crystal: Conceptualizing the Self through Algorithmic Personalization on TikTok." Proceedings of the ACM on Human-Computer Interaction 6, CSCW2 (2022): 1–22. http://dx.doi.org/10.1145/3555601.

Full text
Abstract:
This research examines how TikTok users conceptualize and engage with personalized algorithms on the TikTok platform. Using qualitative methods, we analyzed 24 interviews with TikTok users to explore how algorithmic personalization processes inform people's understanding of their identities as well as shape their orientation to others. Building on insights from our qualitative data and previous scholarship on algorithms and identity, we propose a novel conceptual model to understand how people think about and interact with personalized algorithmic systems. Drawing on the metaphor of crystals and their properties, the algorithmic crystal framework is an analytic frame that captures user understandings of how personalized algorithms (1) interact with user identity by reflecting user self-concepts that are both multifaceted and dynamic and (2) shape perspectives on others encountered through the algorithm, by orienting users to recognize parts of themselves refracted in other users and to experience ephemeral, diffracted connections with groups of similar others. We describe how the algorithmic crystal framework can extend theory and inform new lines of research around the implications of algorithms in self-concept development and social life.
APA, Harvard, Vancouver, ISO, and other styles
7

Researcher. "ALGORITHMIC IDENTITY AND THE FRAGMENTATION OF CULTURAL CONSENSUS: EXPLORING THE POLITICS OF BELONGING AND SOCIAL COHESION IN AI-MEDIATED SOCIETIES." International Journal of Politics, Culture, and Society (IJPCS) 2, no. 1 (2025): 1–9. https://doi.org/10.5281/zenodo.15608656.

Full text
Abstract:
The rapid integration of artificial intelligence (AI) into digital platforms has reconfigured societal dynamics, influenced not only economic and political systems but also reshaping identities and perceptions of belonging. This paper interrogates how algorithmic governance and AI-driven personalization contribute to the fragmentation of cultural consensus in contemporary societies. It explores how AI mediates social cohesion, often creating algorithmic echo chambers, identity silos, and digital tribalism. Drawing upon prior literature and emerging developments as of this study offers a conceptual framework that situates algorithmic identity within the broader discourse of political polarization, digital capitalism, and civic engagement. It calls for a renewed focus on algorithmic transparency, collective digital ethics, and inclusive design as mechanisms to rebuild social trust and reimagine digital citizenship.
APA, Harvard, Vancouver, ISO, and other styles
8

Holmes, Martin. "Algorithmic Determination of Japanese Ethnic Identity Based on Name." Journal of the Japanese Association for Digital Humanities 3, no. 1 (2018): 73–97. http://dx.doi.org/10.17928/jjadh.3.1_73.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Muchitsch, Veronika. "“Genrefluid” Spotify Playlists and Mediations of Genre and Identity in Music Streaming." IASPM Journal 13, no. 3 (2023): 48–65. http://dx.doi.org/10.5429/2079-3871(2023)v13i3.5en.

Full text
Abstract:
Recent popular discourse has claimed that music and listeners’ tastes are becoming increasingly “genrefluid” in popular music culture, and this idea has been linked to the logics of music streaming services. This article analyzes the Spotify-curated playlist Lorem, which has been presented by the company as a primary illustration of “genrefluid” music curation and listening, to investigate Spotify’s mediations of genre and identity at the intersections of media discourse, genre metadata, and curated sound. I discuss how the idea of genrefluidity links post-genre and post-identity discourses to the technocultural logics of algorithmic recommendation. At the same time, Spotify’s mediation of genre remediates earlier hegemonic associations between genre and identity in popular music culture. This article concludes that musical categorization in music streaming does not transcend genre and identity but is characterized by ambivalent mappings of genre and identity mediated by the logics of algorithmic technologies.
APA, Harvard, Vancouver, ISO, and other styles
10

Sujatha Lakshmi Narra. "Human-AI Collaboration in Identity Security: When Should AI Decide?" Journal of Computer Science and Technology Studies 7, no. 7 (2025): 191–97. https://doi.org/10.32996/jcsts.2025.7.7.17.

Full text
Abstract:
The integration of artificial intelligence into identity and access management presents both transformative opportunities and significant challenges for contemporary security frameworks. This article examines the critical question of decision authority allocation in AI-augmented security environments: determining when automated systems should independently make access determinations versus when human expertise remains essential. Through analysis of implementation case studies across financial services and healthcare sectors, the research identifies patterns of successful collaboration between algorithmic and human components of security ecosystems. The investigation reveals that optimal security outcomes emerge from thoughtfully designed frameworks that dynamically assign decision authority based on contextual risk factors, rather than static delegation models. Ethical dimensions receive particular attention, with privacy considerations, algorithmic fairness, and accountability mechanisms identified as critical success factors beyond technical implementation details. The article concludes with evidence-based recommendations for organizations implementing collaborative security models.
APA, Harvard, Vancouver, ISO, and other styles
11

Coitinho, Denis, and André Luiz Olivier da Silva. "Algorithmic injustice and human rights." Filosofia Unisinos 25, no. 1 (2024): 1–17. http://dx.doi.org/10.4013/fsu.2024.251.09.

Full text
Abstract:
The central goal of this paper is to investigate the injustices that can occur with the use of new technologies, especially Artificial Intelligence (AI), focusing on the issues concerning respect to human rights and the protection of victims and the most vulnerable. We aim to study the impacts of AI in daily life and the possible threats to human dignity imposed by it, such as discrimination based on prejudices, identity-oriented stereotypes, and unequal access to health services. We characterize such cases as algorithmic injustices. In the final part of the text, we propose some strategies to confront this specific type of injustice.
APA, Harvard, Vancouver, ISO, and other styles
12

Li, Jian. "Reconstructing Identity and Negotiating Meaning: De-institutionalized Pathways of Religious Identity in the Digital Age." Studies on Religion and Philosophy 1, no. 2 (2025): 63–74. https://doi.org/10.71204/t8f71s03.

Full text
Abstract:
Buddhism for China’s digital‑native youth now unfolds less in monasteries than on the endlessly scrolling timelines of Douyin, Bilibili, and WeChat, where Zen‑style décor ads, three‑second tea ceremonies, and pastel Amituofo memes appear as algorithmic coincidences. How, in the absence of ritual apprenticeship or clerical authority, do such fragmented, commercialised encounters coalesce into a felt conviction of “being Buddhist”? This paper answers by fusing the lived‑religion turn to everyday practice, Wellman’s networked individualism, and cultural‑schema theory with Mahāyāna categories of upāya (skillful means), pratītyasamutpāda (dependent origination), and anātman (non‑self). The resulting De‑Institutionalised Buddhist Identity Construction (DBIC) model specifies a four‑phase, recursive mechanism: (1) Ambient Contact delivers unsolicited Buddhist stimuli via platform algorithms and lifestyle branding; (2) Schema Resonance activates dormant scripts of karma, compassion, or serenity; (3) Peer Legitimation supplies micro‑affirmations through influencer cues and chat‑thread encouragement; and (4) Ritual Bricolage converts resonance into modular, self‑curated practices—five‑minute metta sessions, virtual incense burns, eco‑vegetarian “compassion meals.” Each practice leaves digital traces that intensify subsequent exposures, forming feedback loops that echo dependent‑origination logic. Five propositions render the model empirically testable, linking exposure patterns, network structure, bricolage diversity, and identity stability. By reframing narrative coherence as a functional rather than ontological yardstick—valid if it reduces dukkha and fosters altruism—the study challenges authenticity debates rooted in Western selfhood assumptions. It also coins algorithmic soteriology, suggesting recommender systems can, when aligned with upāya, serve as inadvertent pedagogues. Implications span temple strategy (from gatekeeping to curated digital pathways), mental‑health practice, and policy design that balances religious expression with protection against pseudo‑spiritual commodification. Although grounded in Chinese Buddhism, DBIC offers a transferable lens on post‑institutional religiosity across platformised faith traditions.
APA, Harvard, Vancouver, ISO, and other styles
13

Mérai, László. "Values of rational functions in small subgroups of finite fields and the identity testing problem from powers." International Journal of Number Theory 16, no. 02 (2019): 219–31. http://dx.doi.org/10.1142/s1793042120500128.

Full text
Abstract:
Motivated by some algorithmic problems, we give lower bounds on the size of the multiplicative groups containing rational function images of low-dimensional affine subspaces of a finite field [Formula: see text] considered as a linear space over a subfield [Formula: see text]. We apply this to the recently introduced algorithmic problem of identity testing of “hidden” polynomials [Formula: see text] and [Formula: see text] over a high degree extension of a finite field, given oracle access to [Formula: see text] and [Formula: see text].
APA, Harvard, Vancouver, ISO, and other styles
14

Lim, Elisha. "Personal Identity Economics: Facebook and the Distortion of Identity Politics." Social Media + Society 7, no. 2 (2021): 205630512110174. http://dx.doi.org/10.1177/20563051211017492.

Full text
Abstract:
This article examines Facebook’s role in the treatment of marginalized identity as currency. Recent examples of solidarity statements and corporate social responsibility rhetoric treat disenfranchised racial and gender identities as value-added competitive market quantities to boost brands. This trend also incentivizes marginalized actors to capitalize on their own disenfranchisement in pursuit of visibility and career advancement. The resulting identity politicking replaces communal care, grassroots social ties, solidarity, and interdependence with isolating market competition. This article diverges from scholars who trouble the differential value of identity—by troubling the valuation of identity itself. Facebook normalizes identity as private property in what I call a transition from identity politics to “personal identity economics.” I coin this concept and break it down into the following four factors: (1) The optimization of difference beginning in the 1970s, (2) Facebook’s algorithmic invasion of market logic into intimate aspects of life starting in the mid 2000s, (3) Ads Manager’s economization of identity into legible economic units, and (4) neoliberal corporate social responsibility rhetoric of “social good” as a profitable asset.
APA, Harvard, Vancouver, ISO, and other styles
15

Hristova, Stefka. "Training for the Algorithmic Machine." Media and Communication 9, no. 2 (2021): 119–29. http://dx.doi.org/10.17645/mac.v9i2.3773.

Full text
Abstract:
In thinking about the ubiquity of algorithmic surveillance and the ways our presence in front of a camera has become engaged with the algorithmic logics of testing and replicating, this project summons Walter Benjamin’s seminal piece <em>The Work of Art in the Age of Its Technological Reproducibility </em>with its three versions, which was published in the United States under the editorial direction of Theodore Adorno. More specifically, it highlights two of the many ways in which the first and second versions of Benjamin’s influential essay on technology and culture resonate with questions of photography and art in the context of facial recognition technologies and algorithmic culture more broadly. First, Benjamin provides a critical lens for understanding the role of uniqueness and replication in a technocratic system. Second, he proposes an analytical framework for thinking about our response to visual surveillance through notions of training and performing a constructed identity—hence, being intentional about the ways we visually present ourselves. These two conceptual frameworks help to articulate our unease with a technology that trains itself using our everyday digital images in order to create unique identities that further aggregate into elaborate typologies and to think through a number of artistic responses that have challenged the ubiquity of algorithmic surveillance. Taking on Benjamin’s conceptual apparatus and his call for understanding the politics of art, I focus on two projects that powerfully critique algorithmic surveillance. Leo Selvaggio’s URME (you are me) Personal Surveillance Identity Prosthetic<em> </em>offers a critical lens through the adoption of algorithmically defined three-dimensional printed faces as performative prosthetics designed to be read and assessed by an algorithm. Kate Crawford and Trevor Paglen’s project Training Humans is the first major exhibition to display a collection of photographs used to train an algorithm as well as the classificatory labels applied to them both by artificial intelligence and by the freelance employees hired to sort through these images.
APA, Harvard, Vancouver, ISO, and other styles
16

Lestari, Putri Ayu, and Hagar Yehia Abd Elfattah. "Media, Gender, and Identity: Challenges and Strategies for Equitable Representation." Sinergi International Journal of Communication Sciences 3, no. 2 (2025): 73–86. https://doi.org/10.61194/ijcs.v3i2.652.

Full text
Abstract:
This narrative review explores the current state of gender representation across traditional and digital media platforms. The study aims to synthesize existing literature to understand how gender roles are portrayed, how structural systems influence representation, and what strategies can mitigate disparities. Employing a narrative method, this review analyzed peer-reviewed articles and grey literature sourced from Scopus, Web of Science, and Google Scholar, using a combination of Boolean search strategies to ensure a comprehensive dataset. Findings show that traditional media continues to depict women in stereotypical roles, while non-binary identities remain underrepresented or mischaracterized. In digital media, influencers reinforce aspirational gender norms, yet also create opportunities for visibility and activism. Intersectional research reveals that individuals with overlapping marginalized identities face compounded misrepresentation. Structural barriers—such as media ownership, editorial bias, and algorithmic filtering—sustain these portrayals. Comparative studies underscore the influence of national policy and cultural context on gender narratives. This study concludes that integrated interventions are essential to promoting authentic and diverse gender representations. Media literacy education, inclusive regulatory frameworks, and algorithmic reforms are key to disrupting entrenched inequalities. Further research should focus on longitudinal impacts and explore culturally specific media contexts to enrich global understanding.
APA, Harvard, Vancouver, ISO, and other styles
17

Duguay, Stefanie. "TikTok’s Queer Potential: Identity, Methods, Movements." Social Media + Society 9, no. 1 (2023): 205630512311575. http://dx.doi.org/10.1177/20563051231157594.

Full text
Abstract:
This commentary piece considers TikTok’s queer potential in terms of the platform’s use and subversion for the purposes of queer movements and worldmaking. It considers how TikTok’s affordances, features, and algorithmic functionalities both facilitate and hamper the expression of lesbian, gay, bisexual, transgender, queer and other diverse (LGBTQ+) identities and the formation of queer publics. As such, it proposes that queer methodologies, invoking multiple approaches infused with an ethics of care and attention to platform specificity, can be applied to examine the hurdles TikTok poses for LGBTQ+ people as well as how individuals appropriate the app for their purposes. By considering how queer identities, publics, and methods play out on TikTok, it becomes possible to locate the app’s existing and potential role in the realization of queer movements and futures.
APA, Harvard, Vancouver, ISO, and other styles
18

G. R, Usha. "Generative Poetry and Social Media: Exploring Creativity and Identity in the Algorithmic Age." Shanlax International Journal of Arts, Science and Humanities 12, S4.May (2025): 169–75. https://doi.org/10.34293/sijash.v12is4.may.9178.

Full text
Abstract:
Generative poetry, created using artificial intelligence (AI) and algorithmic models, has emerged as a transformative form of creative expression in the digital age. This paper explores how generative poetry intersects with social media to influence creative practices and personal identity. It compares two AI-based poetry generators—OpenAI’s ChatGPT and Google’s Verse by Verse—to evaluate their stylistic tendencies, creative depth, and user engagement. The study employs a mixed-methods approach, combining qualitative analysis of generated poems and user feedback with quantitative measures of engagement on social media platforms. Findings suggest that generative poetry fosters creative experimentation and democratizes poetic expression while raising questions about authenticity and authorship. The paper concludes that while generative poetry expands creative boundaries, it also challenges traditional notions of poetic identity and authorship.
APA, Harvard, Vancouver, ISO, and other styles
19

Fahim, Hasina. "From Habbo Hotel to TikTok: Navigating Through Complexities of Online Identity and Struggles of Belonging." Teaching Anthropology 12, no. 1 (2023): 61–64. http://dx.doi.org/10.22582/ta.v12i1.702.

Full text
Abstract:
In this reflective piece, I explore my experience with different social media platforms and how they have shaped my identity as a first-generation Afghan immigrant in Finland. Using autoethnographic methods, I draw from personal memories and experiences to examine how each platform has influenced my online identity and aided me in navigating the intricacies of online behaviour. Through this intimate exploration, I question the relationship between algorithmic identity and personal identity, offering a personal perspective on the impact of social media in the lives of individuals with close relationships to online platforms.
APA, Harvard, Vancouver, ISO, and other styles
20

Chen, Jiwen. "Reconciling Cultural Identity in the Age of AI: Dual Dilemmas and Pedagogical Strategies." Innovative Applications of AI 2, no. 2 (2025): 152–58. https://doi.org/10.70695/aa1202502a03.

Full text
Abstract:
As embodied AI technologies advance, the logic of cultural identity production has shifted from the conventional binary framework of 'society-individual' to a more complex ternary interactive ecosystem of 'human-machine-culture'. This study critically examines the double alienation facing cultural identity construction in the age of intelligence: on the one hand, the systematic dissolution of cultural subjectivity by technological power networks; on the other, the adaptive restructuring of educational systems required to safeguard and promote cultural diversity. Using an interdisciplinary perspective that combines critical philosophy of technology with cultural ecology, this research analyses how algorithmic power dominates the mechanisms of cultural meaning production, revealing the resulting alienation of cultural identity. In response to these challenges, this paper proposes three specific educational pathways to address the cultural identity crisis of the intelligent age: First, promoting the ecological transformation of algorithmic literacy education, emphasizing a shift from mere technical tool cognition to a value orientation of power critique and ecological governance; Second, reconstructing a human-machine collaborative space for cultural negotiation, activating the dynamic re-production of cultural meaning through technological mediation and achieving continuous meaning making; Finally, constructing a dynamic governance network involving diverse technological communities, aiming to enhance institutional resilience and embed ethical antibodies that collectively resist the cultural homogenisation risks posed by technological systems. These strategies not only offer new directions for addressing current dilemmas in cultural identity construction, but also propose practical and feasible ways for educational systems to better adapt to the new technological environment.
APA, Harvard, Vancouver, ISO, and other styles
21

Lutz, Nina, and Cecilia Aragon. ""We're not all construction workers": Algorithmic Compression of Latinidad on TikTok." Proceedings of the ACM on Human-Computer Interaction 8, CSCW2 (2024): 1–31. http://dx.doi.org/10.1145/3687019.

Full text
Abstract:
The Latinx diaspora in the United States is a rapidly growing and complex demographic who face intersectional harms and marginalizations in sociotechnical systems and are currently underserved in CSCW research. While the field understands that algorithms and digital content are experienced differently by marginalized populations, more investigation is needed about how Latinx people experience social media and, in particular, visual media. In this paper, we focus on how Latinx people experience the algorithmic system of the video-sharing platform TikTok. Through a bilingual interview and visual elicitation study of 19 Latinx TikTok users and 59 survey participants, we explore how Latinx individuals experience TikTok and its Latinx content. We find Latinx TikTok users actively use platform affordances to create positive and affirming identity content feeds, but these feeds are interrupted by negative content (i.e. violence, stereotypes, linguistic assumptions) due to platform affordances that have unique consequences for Latinx diaspora users. We discuss these implications on Latinx identity and representation, introduce the concept of algorithmic identity compression, where sociotechncial systems simplify, flatten, and conflate intersection identities, resulting in compression via the loss of critical cultural data deemed unnecessary by these systems and designers of them. This study explores how Latinx individuals are particularly vulnerable to this in sociotechnical systems, such as, but not limited to, TikTok.
APA, Harvard, Vancouver, ISO, and other styles
22

Chokly, Kit. "Today’s Gender Is No: Genderbot’s Algorithmic Platform Resistance." TOPIA: Canadian Journal of Cultural Studies 48 (March 1, 2024): 155–73. http://dx.doi.org/10.3138/topia-2023-0028.

Full text
Abstract:
Genderbot was a Twitterbot that used a word replacement algorithm to tweet a new, detailed “gender” every six hours. Through its thousands of tweets, this bot formed a shared space on Twitter where trans life was possible—an important, if small, act of resistance within Twitter’s broader trans hostility. This article uses intimacy as a framework to theorize the delegitimization of trans identities built into and reinforced through Twitter’s structure as well as Genderbot’s algorithmic resistance to these forces. Following trans of colour algorithmic operations of the cut, shift, and stitch, Genderbot actively supported trans life as not just possible but pleasurable, making joyful trans relations possible within Twitter’s networked public. Recognizing these relations challenges the “joy deficit” in studies of trans experience and presents the possibilities and limitations of small forms of algorithmic resistance against platforms’ capitalist modulation of identity.
APA, Harvard, Vancouver, ISO, and other styles
23

Anicich, Eric M. "Flexing and floundering in the on-demand economy: Narrative identity construction under algorithmic management." Organizational Behavior and Human Decision Processes 169 (March 2022): 104138. http://dx.doi.org/10.1016/j.obhdp.2022.104138.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Dentz, René. "Memory, Freedom, and Identity: Challenges to “Virtual Consciousness”." Revista Iberoamericana de Bioética, no. 25 (July 15, 2024): 01–13. http://dx.doi.org/10.14422/rib.i25.y2024.005.

Full text
Abstract:
This comprehensive text explores the intricate interplay of memory, virtuality, consciousness, and personhood in shaping the human experience. Memory is depicted as a core process integral to identity formation, transcending mere recollection to become a reflective exercise in self-discovery. The advent of the digital age raises concerns about the impact of virtual connections on authentic encounters and the preservation of individual autonomy amid algorithmic homogenizations. In examining consciousness and experience, the inseparability of life and consciousness is emphasized, alongside the significance of corporeality in self-awareness. Abduction is proposed as a mode of creative reasoning that expands our comprehension of the human mind and its relationship with the universe. Furthermore, the text delves into the notion of personhood, highlighting the complexity of identity formation through interaction with the world, others, and history. Through a reflective and pluralistic approach, traditional conceptions of being are challenged, inviting a deeper understanding of the multifaceted human condition.
APA, Harvard, Vancouver, ISO, and other styles
25

Popowich, Sam. "Proxying the Data Body: Artificial Intelligence, Federated Identity, and Machinic Subjection." Journal of Contemporary Issues in Education 15, no. 1 (2020): 35–50. http://dx.doi.org/10.20355/jcie29410.

Full text
Abstract:
Academic libraries have recently seen a shift from self-management of user-authentication of licensed resources themselves, to cloud-based implementations of "federated identity" technologies. Such technologies aim to solve the problems of fragile access to licensed resources while also better protecting publishers' intellectual property. However, federated identity systems raise a host of issues regarding privacy, surveillance, machinic subjection, and algorithmic governance. This paper traces the development of federated identity systems out of earlier authentication processes, shows how such systems use artificial intelligence techniques to create a trackable "data body" for each student, and then analyzes this whole procedure through the critical theories of Maurizio Lazzarato and Bernard Stiegler. In conclusion, the article argues that the emergent nature of the "data body" creates ambiguity between the hyper-control of contemporary technologies and the possibility of resisting them.
APA, Harvard, Vancouver, ISO, and other styles
26

Zhang, Xun. "Negotiating visibility and voice: Gender identity expression, platform governance, and the limits of digital citizenship on social media." Advances in Social Behavior Research 16, no. 4 (2025): None. https://doi.org/10.54254/2753-7102/2025.23621.

Full text
Abstract:
This study explores the intersection of gender identity expression, platform governance, and digital citizenship on contemporary social media platforms. Drawing on qualitative interviews and content analysis of transgender and nonbinary users across Twitter, TikTok, and Instagram, the research investigates how algorithmic visibility and content moderation policies shape the online experiences of marginalized gender communities. The findings reveal that non-cisnormative content is often algorithmically deprioritized, receiving significantly less engagement compared to binary-conforming posts. Additionally, transgender and nonbinary users report disproportionately high rates of shadowbanning and content removals, with limited success in appealing these decisions. These governance practices, although framed as neutral, reproduce existing social hierarchies and hinder the ability of marginalized users to participate fully in digital discourse. By incorporating visual and statistical data, including the widely circulated Genderbread Person model and user-generated platform metrics, this study highlights the limitations of current digital architectures. It argues for inclusive governance models that acknowledge gender diversity and enable genuine digital citizenship. Recommendations include the implementation of multi-gender label systems, participatory review frameworks, and policy reforms aimed at enhancing representational equity. Ultimately, the study calls for a rethinking of algorithmic governance to support more democratic and intersectional forms of expression in the digital age.
APA, Harvard, Vancouver, ISO, and other styles
27

Malik, Nasir Iqbal, Mian Muhammad Ramzan, Zainab Malik, and Iqra Tariq. "The Rise of Reels: Analyzing the Communicative Power of Short-Form Videos on Social Media." Qlantic Journal of Social Sciences 6, no. 2 (2025): 138–45. https://doi.org/10.55737/qjss.vi-ii.25350.

Full text
Abstract:
The rapid growth of short-form video platforms like YouTube Shorts, Meta's Facebook and Instagram Reels, and TikTok has completely changed digital communication and user engagement. This study explores these formats' communicative potential, focusing on how algorithmic delivery, visual storytelling, and condensing affect public discourse, behavior, and cultural trends. Using theories of communication, media studies, and digital sociology, the study investigates how these platforms are used for activism, entertainment, identity formation, and information sharing. This study uses a qualitative thematic content analysis of 50 short-form videos from major platforms to identify important communicative strategies, such as performed authenticity, heightened multimodality, and narrative compression. According to research, these features, which are enhanced by algorithmic curation, play a major role in user engagement and the platform's usefulness for a range of objectives, including digital activism and entertainment. The findings demonstrate that these videos serve as powerful tools of influence and narrative construction in addition to being entertainment artefacts in a participatory, algorithm-driven media environment, calling for revised media literacy frameworks.
APA, Harvard, Vancouver, ISO, and other styles
28

Rodrigue, Tonny Kerley de Alencar. "Digital Influencers' Visual Narratives and Algorithmic Power: Identi-ty Construction and Impulsive Consumption on Social Networks." International Journal of Scientific Management and Tourism 10, no. 6 (2024): e1196. http://dx.doi.org/10.55905/ijsmtv10n6-012.

Full text
Abstract:
This study explores how visual narratives created by digital influencers, combined with personalized algorithmic recommendations, influence impulsive buying behavior and identity construction on social commerce platforms. Through a qualitative approach, in-depth interviews were conducted with active social commerce consumers and methodological triangulation was used. The results indicate that impulsive purchases are not merely reactions to visual stimuli, but part of a broader strategy of self-expression and social validation. Additionally, algorithms play an active role in amplifying these behaviors by customizing recommendations that align with consumers’ identity aspirations. The research reveals that impulsive consumption in digital environments is driven by cultural, technological, and social factors, suggesting that social commerce platforms not only facilitate consumption but also serve as spaces for identity experimentation. These findings offer new theoretical insights into the role of consumption in digital identity formation and practical implications for brands seeking to engage consumers in a more authentic and personalized manner.
APA, Harvard, Vancouver, ISO, and other styles
29

Kawashima, Toru. "The Role of TikTok in Shaping Cultural Identity Among Young ACGN Fans in Japan." Studies in Social Science & Humanities 3, no. 12 (2024): 21–25. https://doi.org/10.56397/sssh.2024.12.04.

Full text
Abstract:
TikTok has become a significant platform for cultural expression and identity formation, particularly among young ACGN (Anime, Comics, Games, Novels) fans in Japan. This paper examines how TikTok influences cultural identity through creative expression, community building, and the hybridization of traditional and contemporary Japanese cultural elements. The platform’s interactive features and algorithmic recommendations foster personalized engagement, enabling fans to participate in and shape the cultural narrative of ACGN fandom. While TikTok democratizes access to content creation and global connections, it also presents challenges, such as the commodification of ACGN culture and superficial engagement with its deeper narratives. By analyzing TikTok’s dual role as a medium for cultural affirmation and a driver of digital trends, this study highlights its impact on the evolving cultural identity of Japanese youth in an increasingly interconnected world.
APA, Harvard, Vancouver, ISO, and other styles
30

Bahrami, Armita, Luan D. Truong, and Jae Y. Ro. "Undifferentiated Tumor: True Identity by Immunohistochemistry." Archives of Pathology & Laboratory Medicine 132, no. 3 (2008): 326–48. http://dx.doi.org/10.5858/2008-132-326-uttibi.

Full text
Abstract:
Abstract Context.—“Undifferentiated tumor” refers to a heterogeneous group of neoplasms with little or no evidence of differentiation on routine light microscopic morphology. Objective.—To identify the true identity of undifferentiated tumors by immunohistochemical analysis. Data Sources.—Review of the pertinent literature and the authors' experience. Conclusions.—For treatment and prognostic evaluation, it is crucial to delineate whether an undifferentiated neoplasm is epithelial, mesenchymal, melanocytic, or hematopoietic in nature. Application of a screening panel to demonstrate the expression of markers of major lineages is fundamental for determination of the broad category of neoplasia. Because poorly differentiated carcinomas and in particular sarcomatoid carcinomas are known to be heterogeneous in their antigen expression, several epithelial markers in combination may be required to establish the carcinomatous nature of tumor. A diagnostic misinterpretation as a consequence of occasional aberrant or unexpected antigen expression is best avoided by using a broad panel that includes both antibodies that are anticipated to be positive and those that are expected to be negative. In this treatise, the immunohistochemical dissection of undifferentiated tumors on the basis of their morphologic features is outlined, supplemented with algorithmic immunohistochemical analysis for each morphologic category of small round cell tumors, carcinomatous tumors, sarcomatous (or sarcoma-like) tumors, and tumors with histologically overlapping features, including hematolymphoid malignancies, melanoma, and sarcomas with epithelioid appearance. The utility of several organ- or tissue-specific markers in the context of undifferentiated tumors is reviewed.
APA, Harvard, Vancouver, ISO, and other styles
31

Zakaria, Zulhadi. "Face Recognition Technology: Benefits, Applications, and Challenges." International Journal of Scientific Research and Management (IJSRM) 13, no. 03 (2025): 2096–102. https://doi.org/10.18535/ijsrm/v13i03.ec05.

Full text
Abstract:
Facial recognition technology has emerged as a vital innovation in the field of biometric identity verification, offering benefits such as enhanced security and user convenience. This paper explores its various applications, including public safety, access control, and consumer devices. Despite the advantages, significant challenges such as algorithmic bias, lighting variations, and privacy concerns remain, requiring further research and technological advancements.
APA, Harvard, Vancouver, ISO, and other styles
32

Bajič, Blaž. "The YouTubable Climb." Svetovi: revija za etnologijo, antropologijo in folkloristiko 3, no. 1 (2025): 37–56. https://doi.org/10.4312/svetovi.3.1.37-56.

Full text
Abstract:
The article examines how social media, particularly YouTube, frame the representation of identity, place, and performance. Social media, with their reliance on algorithmic infrastructures, transform these representations into (hy-per)versions of the self, nonplaces, and performances of performances. The very fact of being produced, circulated and consumed via social media places them in the broader context of late capitalism.
APA, Harvard, Vancouver, ISO, and other styles
33

Susana Hamu Eti and Yanti Rosalinah. "An Analysis of Gen Z’s Digital Slang: Patterns from TikTok Comment Sections." IDEAS: Journal on English Language Teaching and Learning, Linguistics and Literature 12, no. 2 (2025): 3250–62. https://doi.org/10.24256/ideas.v12i2.5911.

Full text
Abstract:
The digital communication landscape has undergone a profound transformation, with social media platforms like TikTok emerging as critical sites for linguistic innovation. This research examines the intricate mechanisms of digital slang generation among Generation Z, exploring the complex interplay between technological architecture, user creativity, and sociocultural dynamics. Employing a qualitative content analysis approach, the study investigates linguistic practices within TikTok comment sections, focusing on slang formation mechanisms, algorithmic dissemination, and cultural identity functions. The research reveals sophisticated linguistic strategies including zeroidation, diphthongization, lexical shifts, and code-mixing, demonstrating how Gen Z actively reconstructs communication paradigms. The platform's algorithmic recommendation system facilitates unprecedented rapid language evolution, with slang terms transitioning from marginal usage to widespread adoption within hours. Digital slang serves multifaceted purposes: creating humor, signaling contemporaneity, facilitating social relations, and establishing intimate group identities. The study highlights the tension between linguistic innovation and preservation, suggesting that digital platforms are not passive mediums but active agents in linguistic transformation. By providing a nuanced sociolinguistic lens, the research contributes crucial insights into how digital technologies reshape communicative landscapes and generational identity construction in the 21st century. Keywords: Digital Slang, Gen Z, TikTok, Linguistic Innovation, Social Media Communication
APA, Harvard, Vancouver, ISO, and other styles
34

Mohammad Sajjad Hussain. "Algorithmic Management of Workers through Food Delivery Platforms in India." Journal of Extreme Anthropology 8, no. 2 (2025): 74–106. https://doi.org/10.5617/jea.11784.

Full text
Abstract:
This study explores the role of algorithmic management in India’s food delivery industry, specifically focusing on platforms like Swiggy and Zomato, which act more like employers than mere intermediaries. By harnessing extensive data, these platforms automate decision-making processes and influence work dynamics through surveillance, control, and ongoing performance assessments. Based on 25 months of field research in Hyderabad, including six months working as a delivery worker and conducting interviews with platform employees, this research reveals often overlooked elements of algorithmic governance. It examines how fleet managers, geo-fencing, food preparation times, and monitoring practices are utilized to optimize labour and exert control. The findings also indicate that real-time identity checks, adherence to dress codes, and location tracking contribute to a form of surveillance that is both remote and continuous. By placing food delivery platforms in the context of broader discussions around digital labour, control, and automation, this research illustrates how algorithmic management not only automates management functions but also heightens job insecurity through the reintroduction of piece-rate pay. It challenges the perception of these platforms as neutral facilitators, highlighting their direct involvement in shaping and regulating the labour process.
APA, Harvard, Vancouver, ISO, and other styles
35

Das, Dipto, Carsten Østerlund, and Bryan Semaan. ""Jol" or "Pani"?: How Does Governance Shape a Platform's Identity?" Proceedings of the ACM on Human-Computer Interaction 5, CSCW2 (2021): 1–25. http://dx.doi.org/10.1145/3479860.

Full text
Abstract:
In this paper, we explore how sociotechnical systems support and impede the identity performances and identity expression of communities that have experienced a long history of colonialism, where colonization is the practice through which a foreign power reshapes the social structures and systems of other societies. We conducted a trace ethnography among members of a specific digital platform-Bengali Quora (BnQuora). BnQuora is part of the question and answer (Q&A) platform Quora, where people with this particular ethnolinguistic identity come together to engage in conversations about their identities; identities which were shaped through a long history of colonization in the Global South. In drawing on a conceptual framework that brings together identity performativity, governance, content moderation, and surveillance, we find that the sociotechnical mechanisms of governance that mediate people's performances on the BnQuora platform give rise to a kind of platform identity-certain identities are privileged while others are pushed to the margins based on linguistic practices, nationalities, and religious affiliations. We illustrate this through the themes of moderators as prison guards, collective surveillance as enforcing a majority identity, algorithmic coloniality, and staging as self-imprisonment. Finally, we discuss the ways in which governance shapes a platform's identity and can create, strengthen, and reinforce coloniality.
APA, Harvard, Vancouver, ISO, and other styles
36

Riplinger, Lauren, Jordi Piera-Jiménez, and Julie Pursley Dooling. "Patient Identification Techniques – Approaches, Implications, and Findings." Yearbook of Medical Informatics 29, no. 01 (2020): 081–86. http://dx.doi.org/10.1055/s-0040-1701984.

Full text
Abstract:
Objectives: To identify current patient identification techniques and approaches used worldwide in today’s healthcare environment. To identify challenges associated with improper patient identification. Methods: A literature review of relevant peer-reviewed and grey literature published from January 2015 to October 2019 was conducted to inform the paper. The focus was on: 1) patient identification techniques and 2) unintended consequences and ramifications of unresolved patient identification issues. Results: The literature review showed six common patient identification techniques implemented worldwide ranging from unique patient identifiers, algorithmic approaches, referential matching software, biometrics, radio frequency identification device (RFID) systems, and hybrid models. The review revealed three themes associated with unresolved patient identification: 1) treatment, care delivery, and patient safety errors, 2) cost and resource considerations, and 3) data sharing and interoperability challenges. Conclusions: Errors in patient identification have implications for patient care and safety, payment, as well as data sharing and interoperability. Different patient identification techniques ranging from unique patient identifiers and algorithms to hybrid models have been implemented worldwide. However, no current patient identification techniques have resulted in a 100% match rate. Optimizing algorithmic matching through data standardization and referential matching software should be studied further to identify opportunities to enhance patient identification techniques and approaches. Further efforts to improve patient identity management include adoption of patients’ photos at registration, naming conventions, and standardized processes for recording patients’ demographic data attributes.
APA, Harvard, Vancouver, ISO, and other styles
37

Aradau, Claudia, and Tobias Blanke. "Governing others: Anomaly and the algorithmic subject of security." European Journal of International Security 3, no. 1 (2017): 1–21. http://dx.doi.org/10.1017/eis.2017.14.

Full text
Abstract:
AbstractAs digital technologies and algorithmic rationalities have increasingly reconfigured security practices, critical scholars have drawn attention to their performative effects on the temporality of law, notions of rights, and understandings of subjectivity. This article proposes to explore how the ‘other’ is made knowable in massive amounts of data and how the boundary between self and other is drawn algorithmically. It argues that algorithmic security practices and Big Data technologies have transformed self/other relations. Rather than the enemy or the risky abnormal, the ‘other’ is algorithmically produced as anomaly. Although anomaly has often been used interchangeably with abnormality and pathology, a brief genealogical reading of the concept shows that it works as a supplementary term, which reconfigures the dichotomies of normality/abnormality, friend/enemy, and identity/difference. By engaging with key practices of anomaly detection by intelligence and security agencies, the article analyses the materialisation of anomalies as specific spatial ‘dots’, temporal ‘spikes’, and topological ‘nodes’. We argue that anomaly is not simply indicative of more heterogeneous modes of othering in times of Big Data, but represents a mutation in the logics of security that challenge our extant analytical and critical vocabularies.
APA, Harvard, Vancouver, ISO, and other styles
38

Mandal, Bipasha, and Smriti Singh. "Becoming Human: Exploring ‘Nomadic Subjectivity’ in Kazuo Ishiguro’s Klara and the Sun (2021)." Journal of Posthumanism 5, no. 1 (2025): 13–23. https://doi.org/10.33182/joph.v5i1.3459.

Full text
Abstract:
Our contemporary time is assaulted with crises that reveal itself to us in urgency. In a rapidly technologised world, there is an ontological shift concerning the identity formation of humans since the boundaries between the human and the artificial are becoming increasingly nebulous in the postmodern time. The presence of various simulacra further complicates the existential notion of identity, especially because algorithmic systems are improving at emulating humans. Against this epistemological upheaval, Kazuo Ishiguro in Klara and the Sun (2021) asks compelling questions about identity and the changing human condition. While existing scholarship on the novel predominantly addresses the machine question, research on nonhuman subjectivity and identity is lacking. This article bridges this gap by examining the novel through Rosi Braidotti’s concept of the nomadic subject, arguing that Klara’s identity is fluid and continually evolving, embodying a transformative approach to subjectivity in the posthuman era.
APA, Harvard, Vancouver, ISO, and other styles
39

Preetham Kumar Dammalapati. "Societal Impacts of Effective Cloud Identity Management: A Technical Perspective." Journal of Computer Science and Technology Studies 7, no. 5 (2025): 408–16. https://doi.org/10.32996/jcsts.2025.7.5.51.

Full text
Abstract:
Cloud identity management has evolved from a purely technical concern into a fundamental pillar of digital society, creating profound impacts that extend far beyond organizational boundaries. Modern cloud-based identity and access management systems serve as critical infrastructure enabling access to essential services including healthcare, education, government benefits, and financial services. These systems incorporate advanced technical mechanisms such as multi-factor authentication, single sign-on, zero trust architecture, and artificial intelligence-driven fraud detection to establish secure and inclusive digital environments. The transformation to cloud-based architectures addresses traditional limitations of on-premises systems while introducing new capabilities for digital inclusion through device-agnostic authentication, accessibility-first design, and multilingual support. However, this evolution presents significant challenges including privacy concerns arising from data aggregation, potential government surveillance, and algorithmic bias in automated decision-making systems. Strategic implementation through public-private partnerships, investment in open source components, and adoption of emerging technologies such as quantum-resistant cryptography and distributed ledger integration shapes the societal impact of these systems. The technical decisions made in designing and implementing cloud identity infrastructure have far-reaching implications for social equity, democratic participation, and economic opportunity in an increasingly digital world.
APA, Harvard, Vancouver, ISO, and other styles
40

Piotrowski, Ryszard. "FREEDOM OF INDEPENDENT SPEECH AND DEBATE – VANISHING POINT IN AN ALGORITHMIC DEMOCRACY." Studia Iuridica 99 (2024): 591–602. http://dx.doi.org/10.31338/2544-3135.si.2024-99.34.

Full text
Abstract:
The new technologies are fundamentally changing the culture of human rights, including the right to freedom of speech, by lowering the level of sensitivity to their violation and making people gradually accustomed to systemic restrictions not only on the right to privacy but also on the sovereignty of the nation. The dependence on new information and communication technologies is transforming the constitutional identity of the democratic state ruled by law, without formally changing the existing constitution. In a situation where any kind of fictitious reality may be fashioned using AI algorithms, the freedom of speech, as a reflection of freedom of thought, comes under acute threats.
APA, Harvard, Vancouver, ISO, and other styles
41

Shkodzinsky, Oleh, and Mykhailo Lutskiv. "Automated ai-based proctoring for online testing in e-learning system." Scientific journal of the Ternopil national technical university 107, no. 3 (2022): 76–85. http://dx.doi.org/10.33108/visnyk_tntu2022.03.076.

Full text
Abstract:
Based on the analysis of existing on the market algorithmic solutions for identity verification during knowledge control in electronic learning systems, the requirements for the target system were formed. The main algorithms and approaches to the detection and recognition of faces were considered, as a result of which an effective combination of algorithms was chosen. The system of photo fixation and identity verification during knowledge control in LMS ATutor was designed and implemented. Its effectiveness was verified on the basis of a sample of test passes during its work in the real conditions of the educational process. Conclusions were made regarding the feasibility of implementation.
APA, Harvard, Vancouver, ISO, and other styles
42

Myles, David, Stefanie Duguay, and Lucia Flores Echaiz. "Mapping the social implications of platform algorithms for LGBTQ+ communities." Journal of Digital Social Research 5, no. 4 (2023): 1–30. http://dx.doi.org/10.33621/jdsr.v5i4.162.

Full text
Abstract:
LGBTQ+ communities were among the first to appropriate the Internet to experiment with their identities and socialize outside of mainstream society. Recently, those platforms have implemented algorithmic systems that curate, exploit, and predict user practices and identities. Yet, the social implications that platform algorithms raise for LGBTQ+ communities remain largely unexplored. Drawing from critical platform studies, science and technology studies, as well as gender and sexuality studies, this paper maps the main issues that platform algorithms raise for LGBTQ+ users and analyzes their implications for social justice and equity. To do so, it identifies and discusses public controversies through a review and analysis of journalistic articles. Our analysis points to five important algorithmic issues that affect the lives of LGBTQ+ users in ways that require additional scrutiny from researchers, policymakers, and tech developers alike: the ability for sorting algorithms to identify, categorize, and predict the sexual orientation and/or gender identity of users; the role that recommendation algorithms play in mediating LGBTQ+ identities, kinship, and cultures; the development of automated anti-LGBTQ+ speech detection/filtering software and the collateral harm caused to LGBTQ+ users; the power struggles over the nature and types of visibility afforded to LGBTQ+ issues online; and the overall enactment of cisheteronormative biases by platform affordances.
APA, Harvard, Vancouver, ISO, and other styles
43

Zhang, Xu Sheng. "Reconstructing the Subjective Identity of Artificial Intelligence in the AI Era: From Instrumental Rationality to Ethical Entity." Humanities and Social Science Research 8, no. 3 (2025): p44. https://doi.org/10.30560/hssr.v8n3p44.

Full text
Abstract:
As artificial intelligence (AI) technology advances at an unprecedented pace, it is evolving from a mere instrument into a “quasi-subject.” This transformation inevitably reshapes the traditional human–machine relationship and gives rise to profound social and ethical challenges. From the dual perspectives of value philosophy and social ethics, this paper examines the trajectory by which AI shifts from being an “objectified tool” to a “constrained subject.” We propose a theoretical model of a “human-led finite subject,” laying a conceptual foundation for situating AI’s quasi-subjective role within social ethics. By analyzing possible directions for constructing AI subjectivity and the ethical dilemmas it faces, we outline a human–machine ecological symbiosis model grounded in algorithmic justice.
APA, Harvard, Vancouver, ISO, and other styles
44

SEITAKHMETOVA, Natalya, and Sholpan ZHANDOSSOVA. "THE INFLUENCE OF DIGITALIZATION ON RELIGIOUS IDENTITY: SOCIO-POLITICAL CONTEXT." Eurasian Research Journal 7, no. 1 (2025): 63–73. https://doi.org/10.53277/2519-2442-2025.1-04.

Full text
Abstract:
This study aims to explore the process of religious identity formation in the context of increasing digitalization and changes in the socio-political environment. The findings show a shift in religious authority structures; the traditional hierarchies are being replaced by new decentralized digital networks and user-generated content. From the present study, it becomes clear that social media and other digital communication tools help form hybrid religious identities, combining traditional religious practices and the new digital culture. Three ways in which digitalization affects religious identity are through virtual community formation, algorithmic content curation and interactive ritual practices. The study also examines how socio-political factors, such as the state regulation of digital spaces and content, influence the digital expression of religious identity. The comparison of cultures reveals different trends in the adoption of digital religious practices in various political systems and cultural environments. Quantitative and qualitative methods, including analysis, synthesis, historical-formal methods and generalization, were used in this study to analyze the relationship between digital technologies and religious identity formation. The study analyzed the advantages and disadvantages of Internet-mediated religious practices in various churches while making specific reference to the Republic of Kazakhstan. Thus, the results show how the development of technology influences modern religious identity and interpersonal religious relations and, therefore, contributes to the discussion of digital religion and social change.
APA, Harvard, Vancouver, ISO, and other styles
45

Zhang, Yue. "Algorithm-Driven Identity Politics: Role of Social Media in Polarisation and Mobilisation." BCP Social Sciences & Humanities 23 (December 31, 2024): 42–51. https://doi.org/10.54691/p2wv0f03.

Full text
Abstract:
This is an essay that explores the role of recommendation algorithms in the communication of identity politics and their sociological and political implications, focusing on how the phenomena of filter bubbles and information cocoons reshape users' information exposure and cognitive structures. By combining Baudrillard's theory of mimetic environments, Bourdieu's theory of cultural capital, and Mead's theory of symbolic interaction, the article reveals how recommender algorithms reinforce group identities and exacerbate social divisions through selective pushing of information. In addition, the proliferation of disinformation exhibits higher dissemination efficiency in algorithm-driven environments, posing challenges to the openness and inclusiveness of the public sphere. The article calls for multi-dimensional interventions in technological design, policy regulation and public education to mitigate the masking effect of algorithmic communication and the negative impact of disinformation, and to provide solution paths for building a pluralistic and open digital public sphere. This article aims to provide theoretical support for understanding the double-edged sword effect of recommendation algorithms in identity politics and practical suggestions for the governance and optimisation of digital society.
APA, Harvard, Vancouver, ISO, and other styles
46

Rajat Kumar Gupta. "Augmenting cloud identity security: AI-assisted threat modeling for enhanced vulnerability detection." World Journal of Advanced Engineering Technology and Sciences 15, no. 1 (2025): 1921–30. https://doi.org/10.30574/wjaets.2025.15.1.0449.

Full text
Abstract:
This article examines the emerging integration of artificial intelligence with traditional threat modeling approaches for cloud-based identity systems. As organizations increasingly migrate identity infrastructure to cloud environments, security professionals face unprecedented complexity in identifying and mitigating potential vulnerabilities. The article explores how AI-assisted threat modeling can enhance the detection of sophisticated attack vectors while addressing the ethical implications of automated security analysis. Through examination of implementation cases across financial services, healthcare, and public sector applications, the article identifies patterns of successful human-AI collaboration in security contexts. Particular attention is given to regulatory compliance requirements and the mitigation of algorithmic bias in security decision-making processes. The article demonstrates that AI-augmented threat modeling, when implemented with appropriate ethical guardrails, offers significant advantages in scenario simulation, pattern recognition, and predictive analysis compared to conventional methods. This article contributes to the evolving discourse on responsible AI deployment in critical security infrastructure and provides a framework for security practitioners to effectively leverage AI capabilities while maintaining human oversight.
APA, Harvard, Vancouver, ISO, and other styles
47

Wöll, Stephen. "Beyond the Artifact: Unfolding Medieval, Algorithmic, and Unruly Lives of Maps." Thematic Issue: The Social Lives of Maps, Volume 1 92-93 (August 10, 2022): 54–71. http://dx.doi.org/10.7202/1091244ar.

Full text
Abstract:
Found on the walls of ancient caves in northern France, the earliest known maps do not depict the earth but the brightest stars of the milky way. Although we know little about the people who painted these maps, we know that they, like us, looked for answers and meaning. Mapping as material testimony of this desire signals a basic function of human placemaking. Discarding the biographical shallowness of cartography, this paper investigates how maps might assume social agency. Since spaces are (socially) constructed not only of sight but also of memories, affect, or tactile experiences, I investigate how maps enter spatiotemporal relationships and become agents of social critique by asking: When do maps exceed their role as material artifacts by interfacing with mental geographies of individuals or societal structures? Unfolding the social lives of maps, the paper proposes, demonstrates their ability to exceed traditionally assumed utilitarian roles as lifeless transmitters of ‘objective’ facts, instead revealing cartographic assemblages of identity, memory, trauma, and protest.
APA, Harvard, Vancouver, ISO, and other styles
48

Freed, Joanne Lipson. "Spreading Oneself in the Novelistic Character System: Algorithmic Forms and Tommy Orange's There There." Studies in the Novel 57, no. 2 (2025): 217–33. https://doi.org/10.1353/sdn.2025.a959555.

Full text
Abstract:
Abstract: This essay advances an alternate model of the novelistic character system through a reading of There There (2018), the debut novel by contemporary Cheyenne writer Tommy Orange. Departing from prevailing understandings of the character system that are predicated on the metaphor of finite space or resources, There There invites its readers to approach the text like an algorithm would, looking for the meaningful patterns that constitute Native identity but that may not be recognizable on the scale of the individual life; in this way, the aggregate data of the many supports, rather than threatens, the individuation of the one. I conclude by reflecting on the implications of There There 's deployment of algorithmic forms for the success of the novel's anticolonial politics: although in some ways the a posteriori logic of algorithmic classification supports Orange's stated aim of depicting Native Americans as a "present-tense people," I suggest it is potentially incompatible with a politics of sovereignty.
APA, Harvard, Vancouver, ISO, and other styles
49

Shen, Zhengyu, Yunxuan Hu, and Yunlu Yin. "Algorithm‐Generated Identity Labeling Promotes Identity‐Consistent Product Preferences." Psychology & Marketing, January 30, 2025. https://doi.org/10.1002/mar.22195.

Full text
Abstract:
ABSTRACTA surging amount of companies have employed algorithms to generate identity labels for consumers, aiming to attract their interest and boost their engagement in marketing activities. However, it remains unclear whether consumers' social and product preferences may be shaped by the identity labels generated by the platform, depending on the source of these labels (i.e., whether identity labels are generated by algorithms or humans). Three studies covering different scenarios involving various identity labels and their corresponding identity‐consistent products show that algorithm‐generated (vs. human‐generated) identity labels enhance consumers' preferences for identity‐consistent products. We further demonstrate that this effect occurs because consumers exposed to algorithm‐generated identity labels exhibit a heightened expected accuracy of algorithmic predictions and a stronger strength of identification, which subsequently fosters their identity‐consistent product preferences. Our findings advance the understanding of consumer responses to algorithm‐generated information and offer valuable insights for companies to leverage algorithmic technology to nudge consumer behavior.
APA, Harvard, Vancouver, ISO, and other styles
50

Peters, Uwe. "Algorithmic Political Bias in Artificial Intelligence Systems." Philosophy & Technology 35, no. 2 (2022). http://dx.doi.org/10.1007/s13347-022-00512-8.

Full text
Abstract:
Abstract Some artificial intelligence (AI) systems can display algorithmic bias, i.e. they may produce outputs that unfairly discriminate against people based on their social identity. Much research on this topic focuses on algorithmic bias that disadvantages people based on their gender or racial identity. The related ethical problems are significant and well known. Algorithmic bias against other aspects of people’s social identity, for instance, their political orientation, remains largely unexplored. This paper argues that algorithmic bias against people’s political orientation can arise in some of the same ways in which algorithmic gender and racial biases emerge. However, it differs importantly from them because there are (in a democratic society) strong social norms against gender and racial biases. This does not hold to the same extent for political biases. Political biases can thus more powerfully influence people, which increases the chances that these biases become embedded in algorithms and makes algorithmic political biases harder to detect and eradicate than gender and racial biases even though they all can produce similar harm. Since some algorithms can now also easily identify people’s political orientations against their will, these problems are exacerbated. Algorithmic political bias thus raises substantial and distinctive risks that the AI community should be aware of and examine.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!