Professional Documents
Culture Documents
1. Introduction: Sheffield Cyber-Identities In 1980s Sheffield, England, Barbara Andrews, and I were first alerted to the importance of identity practices in cyberspace. A group of women were talking about what brought them to the municipally-funded Women's Technology Training Workshop: "What brought me on this course is, like what this other woman said, you could get into "modern." You'd been at home, your kids were growing up, and you start feeling you'd been left behind. It felt like an opportunity to get into the Twentieth Century." "That's how it is with technology. I think that any change for the better is going to improve life. Computers are a relatively new thing, and there's an opportunity there for women. We're getting in at the beginning of something..." (Hakken with Andrews 1993:18). 2. Identity, Anthropology, and Social Science in the 1980s and 90s In their "identity work, automated information technologies (AITs) had assumed an important place. These working class women were "presenting themselves (Goffman 1972), but they were also exploring alternativescreating their own third way, as another put it, neither working class hero nor Sloan Ranger. This creation was collective, carried out in talk with other people.
to free themselves from corporate masters, ethnographers like Landsgaard (1992) and Wynn (1988) allied themselves with the powerful professionalizing project of Computer Science, busily recreating all previous knowledge in its own image. In such ways, many analyses bought in to the Computer Revolution idea, especially its more personal, identity aspects.
broadly distributed. In social formations that fetishize the individual and in which power is distributed, determining legitimacy is a central activity. Cyberspace supposedly holds new implications for agency. Sandy Stone focuses on a central change in how identity practices are, in Habermas (1990) terminology, redeemed. Older forms of agency required physical presence, but in cyberspace, a represented presenceeven a cyborg who redeems through talkis sufficient. Living on the net means legitimacy is less often gained in real life; instead, the relationship between agency and authorizing body [becomes] a discursive one. Eventually this produces a subjectivity that could fairly unproblematically inhabit the virtual spaces of the nets (pp.96-7). The result is allegedly widespread crossing of identity boundaries. In Engineering Culture, a book centered on identity among privileged workers (1992), Gideon Kunda critiques this shift in agency. His computer engineers have increasing difficulty locating a boundary between themselves and their organization: they work long hours and have less and less of a "life" away from work. Concluding that they are losing any capacity to think independently, Kunda sees their form of work as a profound threat to democratic agency. Like Mark Slouka (1996), he doubts whether ethical agency is even possible in cyberspace.
comparative studies of computing, which made me acutely aware of how easily diversity correlated with social class and/or geography could be misframed as new patterns. The extent of technological enchantment and determinism also made me skeptical, reinforced by arguments that changes like those described above began long before widespread computing (e.g. Giddens 1991). Turkle implies that childrens projections onto computers "informate" (to use Zuboff's (1988) term) new social agencies. I see this rather differently: that, so far, computers mostly reflect visions from outside the technology itself, creating at most a secondary self. Analysts like Pfaffenberger (1988) focus on why the personal computer "revolution" wasn't one, how on-line information systems failed to create substantial new forms of democratic agency. Indeed, once it is accepted that the relationship between culture and identity is complex, evidence of complexity of individual level identity processes is no longer necessarily evidence of change in social formation type. To make the case that cyberspace is really different on identity grounds, one must demonstrate that a substantial difference actually exists, not just its potential. Computing is a medium by and large not yet the message. 4.2 Non-western identity change in cyberspace? My 1999 conclusion was primarily based on Western cyberspace ethnography. Most of those who participate in the Committee on the Anthropology of Science, Technology, and Computing of the American Anthropological Association do their work in American institutions, perhaps because of the applied orientation discussed above. Similarly, few of those doing community computing in minority communities have chosen to focus on cultural difference as a matter of interest rather than as a source of problems to be overcome. While some take study of techno-science in non-Western nations as a serious topic, their research focuses typically on traditional rather than cyberspace topics.3 Initially, thinking about computing in non-Westerns contexts centered on two questions. One was framed in traditional economic development terms: as computing became even more widespread, would it broaden the north-South divide, as a consequence, for example, of less developed telecommunications infrastructures and fewer skilled engineers (e.g., Allwood 1992)? The second question followed: Would AITs have so much of the West built into them that the non-West would be permanently handicapped in their ability to use them (Hill et. al., 1998)? 5. Non-Western Cyber-Identity Ethnography This second question broadened comparative study of the cultural dynamics of computing and began the ethnography of cyber-identity in non-Western geographic contexts. This ethnography suggests dynamics different from Western ones. Does understanding these differences suggest how to enter cyberspace without replicating, or even increasing, inequalities?
everyday life, as when Trinis use the Internet to contest the dissolving of relations in dispersed families or to intensify offline relationships (p. 82). Miller and Slater find no reason to suppose that these encountersconstruct new identities in relation to cyberspace rather than projecting older spatial identities through new media and interactions (p.85). [W]e cannot exclude spatial and even national identities from Internet Studies, either on the basis of theoretical assumptions about disembedding or on the basis of extrapolations from exclusively US and European experiences Trini-ness as a project defined and pursued over a particular history,[T]he Internet is being understood and used to an unexpected extent in relation precisely to those projects that might be understood as representing Trinidad. [and are] important to those we studied.(pp. 86-7). This notion, that pre-existing cultural tendencies are what non-Western surfers manifest most while on the net, also comes across in Nuria Soehartos, Internet and Indonesia in its Chaotic Period: The Net Makes it Work, the Net Makes it Worse (2001). The Internet had a crucial, identity role in the nations recent political transformation, in that helped dissatisfied Indonesians pursue a common goal: the dethroning of President Soeharto and the destruction of the New Order. At first, this seemed to constitute a unique identity project: Because this common goal was held so widely in Indonesia, and because the Internet was aperhaps themedium through which this goal was promoted and organized, information posted on the Internet in Indonesia before the resignation of Soeharto was widely regarded as credible and accurate. Further, credibility was inversely linked to normal identity markers: [T]he anonymity of the Internet and the fear of the authorities ensured that no one knew the source of the information posted or the identity of its author. The sharing of a common goal generated a degree of trust between Indonesians, and it was this trust that was the foundation of the reputation for veracity that the Internet enjoyed. After Soehartos resignation, however, the identity project fell apart, and the Internet lost its reputation; The net made it worse. In sum, while the trust and belief generated between parties via the Internet can carry over into everyday life and motivate individuals to action, such mobilizability is not permanent. In Cyber-Maroc: Uncritical Globalization and Cosmopolitan Desire among Moroccan e-Migrants (2001), Stephen William Foster identifies another Internetconnected change in identity: ...[A] new generation of Moroccan e-migrantspursuing transnational narratives and practices of self that suggest an important shift in their historical consciousness They spend a great deal of time in cybercafes, refiguring themselves and their social milieu beyond significant economic hardship. Cyber-Maroc is being constructed by educated but unemployed diplomes chromiers. Like Trinis, [t]heir avid crossing of national and linguistic boundaries does not sacrifice their identity as MoroccanTheir rhetoric of self participates in a globalization that makes its own expanding inequalities yet allows the Moroccans to represent their mission as rooted cosmopolitanism.
Miller and Slater worry about idealization of Trinidad on the Internet, and Foster has strong misgivings about Cyber-Maroc, where . sociability is being displaced and deflected[T]his redefinition is being embraced by Moroccans uncritically, not only because it seems to afford more connection and a greater density of interaction, but also because it seems to promise more specific, pragmatic consequences[They are choosing] a transnational, transactional cosmopolitanism that is less the obliteration of national boundaries or geographical isolation and more a matter of arranging an escape and affording at least the illusion of social repositioning and economic advantage. Foster sees them often losing themselves uncritically in cyber-space, in an infinite realm of otherness, of possibility. Their e-migration is problematic, producing an arrest as much as a transformation
To Landzelius, cyberactivism is transformative of subaltern identity because, by enabling real-time dialogue links across ethnic and national lines. This sustains community, a position she share with both Howard Reingold and George Soros. John Sherry focuses on the cyberactivism of a community/technology development project called Dine CARE in another relatively marginal group, the Navajo in Americas Southwest (1996?). Sherry is less sanguine than Nelson and Landzelius about either the utility of AITs to support new cultural identity projects or their inherently transformative impact. He is particularly insightful about the ways in which AITs marginalize the Dine/Navajo in ostensibly open competitions for public resources. One example is reinforcing a Western modernist predilection for discursive redemption through precise, written logic, in contrast to a Navaho preference for face-to-face talk: In Navajo, computersserved to inhibit local discourses by appealing to disembodied objectivity[which] resulted in a systematic erosion of the anecdotal evidence of elders, medicine people, or concerned Navajo citizens (1996?: 4). Yet Sherry also sees important opportunity: In spite of all the troubles describe above, Dine CARE members displayed far more creativity and ingenuity in assimilating and reframing technical discourse, documentary practices, and technology than most discussion of hegemony seem to acknowledge is possible (p.26). In particular, the absence of space for culturally-preferred types of discourse prompted indigenous creation of alternative spaces for appropriate Dine utterances. Indeed, the very heterogeneity of an AIT-mediated audience, containing non-Dine as well as Dine, broadened Dine identity. Like Miller and Slater, Sherry finds in this material important food for identity anthropology. While acknowledging that anthropology has perhaps outgrown its concern with authenticity, many ethnographers still regard the local need to accommodate to a Western audience as a distinct threat to local practice.[Y]et the use of foreign media, even for constructions which may appeal to a foreign audience, do not necessarily imply a complete abandonment of local systems of discourse (p. 27-8). Sherry concludes, [T]he politics of the cultural process lies as much in the ability to make ones voice heard as it does [sic] in ones access to information (p. 32). This assessment of marginals Internetting is more consistent with my own work on identity in Western cyberspaces than is the computopianism of Nelson and Landzelius. It brings into focus the distinctive topology of cyberspace, its ability to support one identity without necessarily undermining others. My student John Backman experienced this while helping to get African-American community people from Upstate New York painlessly into surfing the Net. After several hours, these previous non-users were highly satisfied with both the number and value of the sites they located, concluding our people are well represented on the net. While statistically suspect, this conclusion highlights the potential of the net to collective identity projects for marginal peoples, if they have means and know where to look.
5.3 Diasporas
Diasporas, those geographically separated from a native land but still connected to it, have been a third focus of non-Western Internet Identity study. In The Second Self in the Third World (n.d.), Bryan Pfaffenberger documents how different senses of history and discourses over identity structure very different assessments of similar
technical practices. Technology offers a rich terrain for cultural reproduction to Tamils in London. Miller and Slater make a similar argument about the dynamics of cultural identity when discussing the use of the Internet by UK-based Trinidadians. It has changed their relationship not only to individuals...but also to their sense of being a Diaspora Trinidadian. A stage on which to perform Trini-ness, Internet chat eliminates the class distinctions so characteristic of other performances and thereby feels especially inclusive (p. 93). Miller and Slater are at pains to historicize this phenomenon. Before, in the mid90s, Trinis were likely to behave like others in user groups, including flaming. They did this under a necessarily more general Caribbean identity. However, with new utilities like ICQ, which allow more differentiated ecologies of discourse, and with greater numbers on line, this behavior has been replaced by the highly nationalistic Trinidadian behaviors discussed above. Jon Andersons analyzes somewhat different Internet uses among Diaspora Arabs (1997) that migrate existing discussions on-line, highlight the concerns of Diaspora communities in their home cultures and in political and religious issues of their home societies, offer cultural profiles, political news and commentary and religious witness, and [are] usually in advance of more official voices. For Anderson, The most striking feature of the Internet in this regard is spontaneous, unofficial representation. What this activity marks is an increasingly public, unmoderated (and not infrequently immoderate) representation that additional participants can join on their own authority and interest plus ability to use the technology. So, while an increase in communication afforded by the Internet is, in the first instance, a migration of existing messages, it especially enables messages heretofore expressed in much more limited settings -- say of coffee houses, university dormitories, political cells -- to find more public outlets and thus to change the balance of who and what is published. Like Nelson and Landzelius, Anderson sees the opening of these new channels as broadening political discourse. New groups emerge around discoursed opened up and made more public: [S]uch groups proliferate on the Internet whence political dialogue, too, can be carried on from a distance but without the distractions of distance. He concludes from this more generally that The Internet is preeminently a realm of publication, less a new consciousness than a forum greatly extended by an additional medium with its own properties, felicities and barriers to entry that have the effect of greatly expanding the range and number of persons who can participate at the same time that participation is nearly world-wide and nearly instantaneousBy comparison to the asymmetrical arrangements of broadcasting, on the Internet barriers to access are very little higher for senders than for receivers, and those are coming down all over.
unleashed, but this is more a matter of rhetorical figure (Nelson) or of hopeful potential (Landzelius) than of ethnographically demonstrated pattern. Others, like Miller and Slater and Foster, are more negative, even compputropian (Hakken with Andrews 1993). Miller and Slater, Pfaffenberger, and Anderson emphasize continuity. For them, the Internet constitutes a new terrain onto which essentially prior identity and other social processes are projected. There is some change, but it is more contextual than transformational. Soehartos and Millers and Slaters analyses deeply situate Internetting in time, tracing how the dynamics of one period transform quickly into something else, even their opposite. All Cyberians claims to be different should be respected, but also understood in context. There is no support here for the notion of a technology-induced globalization of identity dynamics. While cosmopolitanism may sometimes be extended, it may, as in Trinidad, have already been substantial. Conversely, it may be morphed, as in what Miller and Slater call glocalization, the globalizing of local space. Less evident in the non-Western materials are the individually-oriented concerns of the Western ethnographers, such as identity expansion, dispersion or change in agency. Agency is at issue, but it is the agency of groupssubalterns, marginals, and Diasporas rather than of individuals. Perhaps most conspicuous by its absence in the non-West is concern with greater self-consciousness about identity. This may well be a consequence of the more marked identity that is already an all but necessary consequence of colonial status. I believe the ethnography reviewed here reinforces an anthropological inclination to expect Western identity discourses to have a strong individualistic inclination, while Eastern ones are more collective. However, the identity concerns of Sheffield workers had a substantial collective element, suggesting that higher individualism is associated with higher social status as much as geography. As with the Western materials, I reach two overall conclusions: 1) AITs/Internet use has not as yet led to massive change in identity dynamics in the non-Western World, but 2) Internet use on occasion involved new dynamics in social formation reproduction, and its potential in this regard remains substantial 6. Conclusions Changes in identity were widely trumpeted revolutionary social consequences of automated information technologies. On the whole, the emerging studies of nonWestern Internet identity dynamics are no more supportive of the transformationist position than were the earlier Western ones. Non-Western studies demonstrate both similar potentials and somewhat different dynamics. Even at the height of the hysteria over the new economy, the case for the transformative impacts of computing were to me less than compelling. My skeptical position prepared me for the dot.com, dot.tele, and dot.edu collapses, still the main event in new millennium economics. What can we conclude about the relevance of these comparisons to nonWesterners trying to develop coherent postures toward the Western AIT juggernaut? In his cyberspace anthropology manifesto, Arturo Escobar hopes for an alternative to mindless Western cheerleading for technology-led development: Are there different possibilities for Third World societiesother ways of participating in the technocultural conversations and process that are reshaping
the world? How can social movements in Asia, Africa, and Latin American articulate policies that allow them to participate in cyberculture without fully submitting to the rules of the game? Will most social groups in the Third World be in a position even to know about the possibilities afforded by the new technologies? An especially important question is whether Third World governments will be interested in constructing the technological imaginaries that will be required for access to the new technologies from the perspective of more autonomous design. Asserting that : There will not be a genuine social transformation without transforming the relation between society and the technologies it incorporates (p.138), Escobar identifies the deeper concern of cyberspace anthropology: Identifying ways to compute that foster truly different cultural dynamics, AITs that actually reinforce, rather than undermine, cyberspaces vast potentials. This papers original goal was to consider the implications of Western studies of Internet identity for non-Western anthropology. I could not do this without also addressing what ethnographers had to say about non-Western contexts, following Escobars ensuing charge, To start paying attention to Third World technological innovation is a first step towards gaining technological self-esteem. He then moves on to more pointed issues, whether the new technologies can be conceptualized in ways that do not reduce them to their role in economic development, [that instead address] what cyberculture means from different third World perspectives (p. 139). These two questions seem to me still a good starting point for indigenous anthropologies of identity in non-Western cyberspaces. As imagined worlds, protocyberspaces are especially cultural. Both Western and non-western anthropological cybernauts see studies of computing as rich arenas in which cultures already studied at great length are themselves reproduced on new terrain. I hope to have demonstrated here how, though such studies, we have something important to learn. In particular, we are better positioned to evaluate the Cyberspace identity claims skewed toward Western experience. Similarly, the degree of similarity or difference of computing in different cultural contexts is an obvious terrain for testing the extent of cultural mediation of technology, a core problem in the anthropology of techno-science. References cited Allwood, Carl Martin 1992 Constraints on the usability of computers. Unpublished ms., Department of Psychology, University Goeteborg, Sweden. Anderson, Jon 1997 Globalizing politics and religion in the Muslim world. The Journal of Electronic Publishing 3(1). Available at: http://www.press.umich.edu/jep/archive/Anderson.html. Appadurai, Arjun 1996 Modernity at Large: The Cultural Dimensions of Globalization. Minneapolis: University of Minnesota Press. Batteau Allen 1998 The limitations of thematic approaches in the study of organizational cultures. Available at http://anthro.wayne.edu/ablimit.html.
Bourdieu, Pierre 1978 Outline of a theory of practice Cambridge: Cambridge University Press Castells, Manuel 1989 The informational city: Information technology, economic restructuring, and the urban-regional process. Oxford: Basil Blackwell. Cherney, Lynn 1999 Conversation and Community: Chat in a Virtual World. ?:C S L I Publications. Escobar, Arturo 1994 Welcome to Cyberia: Notes on the anthropology of cyberculture. Current Anthropology 35(3):211-31. Foster, Stephen William 2001 Cyber-Maroc: Uncritical Globalization and Cosmopolitan Desire among Moroccan e-Migrants. Paper presented to the Annual Meeting, American Ethnological Society, Montreal. Gatewood, John 1991 My PC and me: Personal computers and academic routines. Paper presented to the annual meeting, American Anthropological Association, Chicago. Giddins, Anthony. 1991 Modernity and self-identity. Palo Alto: Stanford University Press. Goffman, Erving 1972 Presentation of Self in Everyday Life. New York: Doubleday & Company. Habermas, Juergen 1990 Legitimation Crisis. Boston: Beacon. Hakken, David 1999. Cyborgs@Cyberspace?: An Ethnographer Looks to the Future. New York: Routledge. -----, with Barbara Andrews 1993 Computing myths, class realities: An ethnography of technology and working people in Sheffield, England. Boulder, CO: Westview Press. Harvey, David 1995 "Cartographies of knowledge: Space, time, and public discourses in contemporary capitalism." Paper presented to the annual meeting, American Anthropological Association, Washington, D.C. Helmreich, Stefan 1998 Silicon Second Nature: Culturing Artificial Life in a Digital World. Berkeley: University of California Press. Hess, David. 1992 Introduction: The new ethnography and the anthropology of science and technology In Knowledge and society: The anthropology of science and technology Hess, David, and Linda Layne, eds. (pp. 1-26). Greenwich, CT: JAI Press Hill, Carole, Karen Loch, Detmar Straub, & Kamal El-Sheshai 1998: A Qualitative Assessment of Arab Culture and Information Technology Transfer, Journal of Global Information Management 6(3):29-38.
Jules-Rosette, Bennetta 1990 Terminal signs: Computers and social change in Africa. Berlin: Mouton de Gruyter. Kunda, Gideon 1992 Engineering Culture. Philadelphia: Temple University Press. Lave, Jean, and Etienne Wenger 1994 Situated Learning: Legitimate Peripheral Participation. Cambridge: Cambridge University Press. Lundsgaarde, Henry 1992 Knowledge engineering and ethnography. Paper presented to the annual meeting, American Anthropological Association, San Francisco. Miller, Daniel, and Don Slater 1999 The Internet: An Ethnographic Approach. Berg Nelson, Diane 1996 Maya Hackers and the Cyberspatialized Nation-State: Modernity, Ethnonostalgia, and a Lizard Queen in Guatemala. Cultural Anthropology 11(3):287-308. Pfaffenberger, B. 1988. The social meaning of the personal computer: Or, why the personal computer revolution was no revolution. Anthropological Quarterly 61(1):39-47. n.d. The second self in the Third World. Unpublished MS, University of Virginia. Sapir, David 1991 Shareware and computer utilities for dictionary development. Paper presented to the annual meeting, American Anthropological Association, Washington, DC. Sherry, John 1996? Disputing the health of Navajo forests: The politics of representation in novel performance spaces. Unpublished ms., Microsoft Corporation. Slouka, Mark 1996 War of the Worlds: Cyberspace and the High-Tech Assault on Reality. Basic. Soeharto, Nuria 2001 Internet and Indonesia in its Chaotic Period: The Net Makes it Work, the Net Makes it Worse. Paper Presented to the 100th Annual Meeting, American Anthropological association, Washington, D.C. Stokes, Martin, Shirley Ardener, and Jonathan Webber Eds. 1994 Ethnicity, Identity, and Music: The Musical Construction of Place. Berg Publishers, Inc. Stone, Allereque 1995 The war of desire and technology at the close of the mechanical age. Cambridge: MIT Press. Susser, Ida and Thomas C. Patterson, Eds., 2001 Cultural Diversity in the United States: A Critical Reader. Oxford: Blackwell. Turkle, Sherry
1980 Computer as Rorschach. Society 172(12):15-24. 1984 The second self: Computers and the human spirit. New York: Simon & Schuster. 1995 Life on the screen: Identity in the age of the Internet. New York: Simon & Schuster. Wenger, Etienne, William M. Snyder, Richard McDermott 2002 Cultivating Communities of Practice: A Guide to Managing Knowledge. Boston: Harvard Business School Publishing. Wynn, Eleanor 1988 Use of anthropology in information technology. Central Issues in Anthropology 7(2):57-78. Young, Iris 2000 Inclusion and Democracy. Oxford: Oxford University Press. Landzelius, Kyra n.d. Going Native on the Net: Situating Indigeneity and Anthropology in the HyperModern Moment. Unpublished MS. Zuboff 1989 In the Age of the Smart Machine : The Future of Work and Power. New York: Basic.
After completing the Sheffield research alluded to above, I began to formulate a comparative project on computing in Bulgaria, where production of an indigenous PC was indicative of a tradition in computing almost as long as American or British ones. This project was obviated by the events of the late 1980s, which greatly disrupted computing, along with many other things.
2
I arrived at my notion of the properties of such entities via a dialectic between data from empirical investigation, ethnographic and laboratory, and a kind of logical deduction regarding what properties any such entities must have in order to be compatible with culture as we know it. I argued for focusing on the cyborgic rather than simply biological characteristics of all carriers of culture, including those who will carry cyberculture. It also critiqued the cyberspace ethnography of ethnologists like Dawkins and philosophers like Dennett precisely in terms of their impoverished general ethnography, the consequences of presuming that cultures are consistent, imposed cognitive orders rather than mazeways for handling diverse practices.
3
For those wanting a broad ethnography of computing, it is a substantial problem that so few cultural anthropologists have advocated effectively for studying computing among "third" let alone "second" world peoples, David Hess (Hess 1992) and Benetta Jules-Rosette (1990) being partial exceptions. The anomalous disinterest of computing anthropologists in computing cross-culturally is doubtless tied to the general anthropological ambivalence to technology (one prescription for which is the re-centering on cyborgs as the carriers of culture). The STS disinterest is perhaps most closely connected to the "expertise" problem: the reluctance of natural scientists to take seriously those without advanced credentials in their field. In relation to "Third World" computing, this reluctance has racist implications.