Identity Shift and over one million other books are available for Amazon Kindle. Learn more
Qty:1
  • List Price: $24.95
  • Save: $5.82 (23%)
FREE Shipping on orders over $35.
Only 2 left in stock (more on the way).
Ships from and sold by Amazon.com.
Gift-wrap available.
Add to Cart
FREE Shipping on orders over $35.
Condition: Used: Good
Comment: This book has already been loved by someone else. It MIGHT have some wear and tear on the edges, have some markings in it, or be an ex-library book. Over-all it is still a good book at a great price! (if it is supposed to contain a CD or access code, that may be missing)
Access codes and supplements are not guaranteed with used items.
Add to Cart
Have one to sell? Sell on Amazon
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See this image

Identity Shift: Where Identity Meets Technology in the Networked-Community Age Paperback – November 22, 2011

ISBN-13: 978-1118181133 ISBN-10: 1118181131 Edition: 1st

Buy New
Price: $19.13
46 New from $1.63 59 Used from $0.01 1 Collectible from $9.98
Amazon Price New from Used from
eTextbook
"Please retry"
Paperback
"Please retry"
$19.13
$1.63 $0.01

Free%20Two-Day%20Shipping%20for%20College%20Students%20with%20Amazon%20Student



Frequently Bought Together

Identity Shift: Where Identity Meets Technology in the Networked-Community Age + Transforming Business: Big Data, Mobility, and Globalization
Price for both: $36.78

Buy the selected items together

Customers Who Bought This Item Also Bought

If you buy a new print edition of this book (or purchased one in the past), you can buy the Kindle edition for only $2.99 (Save 82%). Print edition purchase must be sold by Amazon. Learn more.


Shop the new tech.book(store)
New! Introducing the tech.book(store), a hub for Software Developers and Architects, Networking Administrators, TPMs, and other technology professionals to find highly-rated and highly-relevant career resources. Shop books on programming and big data, or read this week's blog posts by authors and thought-leaders in the tech industry. > Shop now

Product Details

  • Paperback: 240 pages
  • Publisher: Wiley; 1 edition (November 22, 2011)
  • Language: English
  • ISBN-10: 1118181131
  • ISBN-13: 978-1118181133
  • Product Dimensions: 0.7 x 6 x 8.7 inches
  • Shipping Weight: 12.8 ounces (View shipping rates and policies)
  • Average Customer Review: 4.5 out of 5 stars  See all reviews (2 customer reviews)
  • Amazon Best Sellers Rank: #1,505,158 in Books (See Top 100 in Books)

Editorial Reviews

Amazon.com Review




Q&A with the Authors
Author Allison Cerra
Many individuals are wary of technology because of the perceived invasion of privacy. How can our use of technology, which may put us at risk, help protect us?
Christina: Technology can help protect us by giving us tools and capabilities to fill in the blindspots it sometimes creates. For example, one of the key challenges facing the parents we studied was their inability to keep an eye on their kids’ online activities and communications as kids and their devices become more mobile. Services like Kajeet or My Mobile Watchdog allow parents to keep track of their kids, monitor their text messages, and receive alerts when kids exchange information that's out of bounds or with unknown people. Even social media has been used to help spread the word when a child goes missing. Recently, some parents were able to track down their college student who'd gone missing in Malaysia using Facebook. From half-way around the world, they were able to make contact with locals who found their son hiking in a national park.

Beyond the safety issue, technology can help by using our context and preferences to deliver timely information so we can make better decisions. Diabetics could have an app on their phone that pushes low-glycemic options from the menu as soon as they enter a restaurant. Technology multiplies all the options and information surrounding us, but it can also help us cut through the clutter to get what we need.

In Identity Shift, you discuss the differences as one matures through the life stages (teen, emerging adult, parent, etc.) as the individual approaches technology. What about generational differences (Baby Boomers, GenX, Millennials)? Can you expand on the implication technology might have as viewed through a generational lens?
Allison: Generations are interesting in that, like the human beings that represent them, they are mortal. When the last GenX'er dies, my entire generation will cease to exist. That’s powerful and, when you add that to the fact that what makes a generation are the cultural defining moments that bind us together during our formative years, you have a powerful cocktail that helps explain why many find identification with their generation irresistible. Attitudes toward technology are no different. To understand how a generation values technology, you have to first understand how a generation perceives its identity. Boomers are the consummate idealists, therefore technology serves their purpose of reinvention. Xers are the ultimate survivalists. For them, technology is about adaptation to their environment. And, Millennials are the perennial collaborators. For them, technology is about unification. Our study reveals these unique perspectives when exploring generational attitudes, but it exposes even more interesting nuances when comparing what happens as one experiences rites of passage through maturity. For example, Millennials may share a common understanding in how they approach technology. But, a Millennial just graduating college has very different perspectives and priorities compared to one who is a recent parent. In our book, we explore how maturational forces create shifts in our worldview and how technology serves to support or confuse the identity we seek to create.

A significant part of the research that went into this book involved observing individuals’ use of technology in their home environments. What surprised you the most about this ethnography study?
Author Christina James
Allison: What I found most revealing is that we as human beings are not rational as much as we rationalize. What I mean is, what we think, say, do and value can often be in conflict with each other. And, to feel better with the cognitive dissonance that results, we delude ourselves with convenient excuses to rationalize our seemingly inexplicable behavior. The fact that we can unknowingly be self-deceived raises a bevy of issues and complexities when exploring the identity topic. But, it is in these gray areas where technology providers and marketers can perhaps find the most opportunity, simply by understanding the tension points and conflicts that occur naturally as consumers respond to their environment.

Technology and social media are constantly evolving, and yet they align with the consumer-based 3-P Model of Identity you discuss in your book. Can you give us some examples of new Web 2.0 trends or technologies and how they relate to research findings discussed in the book?
Christina: A key trend shaping new service creation will be identity management across all three areas we talk about in the book – presentation, preference and protection. That management isn’t going to be about just hiding personal data, but about giving consumers insight and control and allowing them to use it for their own purposes. There are companies like Reputation.com and Personal.com, which aim to pull information about consumers into a central repository where they can get a dashboard of their virtual selves. They try to help consumers answer key questions. What image of me exists online? How do I manage and change it so it lines up with the image I want to present? How do I monitor what people know about me and my kids so we can protect ourselves? How do I get information to the right people if I decide I want them to have access?

Sharing data appropriately is a big part of consumer control. If I have my data in a secure place, I can then share it with trusted parties – to get recommendations, discover new services and products from friends, and streamline commerce online and on mobile. An application like Spotify is a basically a central depot for music preferences that helps people access their content across devices, but also lets them exchange likes and dislikes with friends, which leads to new content discovery and increased content consumption. Bringing clarity and cohesion to our identities online will facilitate more exchange and create new revenue opportunities across all aspects of our lives – not just music and media.

What are the implications of the research you conducted for service providers and other companies catering to online consumers? What can they take away from your book?
Allison: Just about anyone can take something away from this book. Thanks in no small part to the dozens of ethnography respondents who graciously and selflessly invited us into their homes and lives, the reader will likely catch glimpses of him/herself in the stories of these subjects. For marketers and other providers, what is clear is that trust is the intangible currency of the networked-community age. Gaining or losing trust becomes a mercurial process as the relationship between consumer and company evolves. Those marketers able to offer more targeted services to consumers while navigating the trust fault line stand to gain. It is at this fascinating intersection where individual identity meets company identity that defines the unique boundaries for providers based on the permissions a user is willing to proffer in a given situation. It certainly is rich with nuance. But, then again, aren’t we all as human beings?


From the Back Cover

Explore the intersection of technology and identity

Does technology cause a shift in how we perceive our relationships and ourselves?

To find the answer, global communications leader Alcatel-Lucent commissioned an extensive research study. Subjects crossed geographic, generational, socioeconomic, and cultural boundaries. Hundreds of hours of documented observation and interviews with real people led to the fascinating conclusions in these pages. While technology will never define us, this study reveals how profoundly it influences the way we define ourselves.

In this book, you will:

  • Explore the 3-P Model, a construct of identity derived from the presentation of one's self-image, how one approaches the protection of things valued, and preferences among the virtual world's myriad choices

  • Understand how technology affects trust

  • Delve into the universal laws of learned helplessness, illusion, and recall

  • Examine how technology affects identity at different stages of life

  • Meet the real people whose views and experiences shaped this book


More About the Authors

Discover books, learn about writers, read author blogs, and more.

Customer Reviews

4.5 out of 5 stars
5 star
1
4 star
1
3 star
0
2 star
0
1 star
0
See both customer reviews
Share your thoughts with other customers

Most Helpful Customer Reviews

2 of 2 people found the following review helpful By Jeremy Bailenson on January 26, 2012
Format: Paperback Verified Purchase
This book is a must read for anyone who seeks to understand the market forces involved with consumer behavior in virtual worlds. Perhaps the most comprehensive published study that exists (certainly the most detailed one I have seen), Identity Shift finds reason in the sea of competing psychological forces behind decisions we make online--e.g., privacy vs. accessibility, enjoyment vs. addiction--by qualitatively and quantitatively asking thousands of consumers what they want, and then watching what they do. It's a great combination of statistics that back up claims mined from qualitative interviews.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
Format: Paperback
The authors undertake an ambitious, interdisciplinary exploration of various ways in which the use of digital technology and social networking can affect how people present themselves to others, protect their personal information and privacy, and maintain their on-line personal identities. In undertaking their exploration of the subject of personal identity on-line, the authors try to combine ideas and insights taken from market research, psychological and sociological studies, media stories, interviews with various professionals, a study of more than 60 people observed in 30 households, and a review of attitudes and behaviors of more than 5000 on-line consumers.

The authors propose a model of how people: (1) construct and present their identities on-line; (2) protect information valuable to them and their families when interacting on-line; (3) consider and evaluate their options, and make decisions about products and opportunities that appear on-line; and (4) decide whether, and how, to trust companies and other people that they interact with on-line. The proposed model is interesting and thought-provoking, but it does not appear to be fully developed or rigorously tested.

Some readers might find the book to be a bit technical for casual reading. However, a reader does not need to have formal training or experience in digital technology or the social sciences to understand the observations, comments, and arguments presented by the authors. On the other hand, professionals interested in the topics explored in the book will not find a detailed or rigorous presentation of the methodology or results of the study of the 30 households or the review of the attitudes and behaviors of more than 5000 on-line consumers relied on by the authors.
Read more ›
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again

Customer Images

Search