Already a member? Log in

Sign up with your...

or

Sign Up with your email address

Add Tags

Duplicate Tags

Rename Tags

Share It With Others!

Save Link

Sign in

Sign Up with your email address

Sign up

By clicking the button, you agree to the Terms & Conditions.

Forgot Password?

Please enter your username below and press the send button.
A password reset link will be sent to you.

If you are unable to access the email address originally associated with your Delicious account, we recommend creating a new account.

ADVERTISEMENT

Links 1 through 10 of 20 by Viviane Tang tagged identity

In other words, campus sexual culture in its dominant, heteronormative form is kinda f#%@ed up. Sexual desire is wrapped up in public humiliation, drunkenness, and yes, I’ll say the word, patriarchy. It’s not that I don’t get how such things can be sexy, how humiliation and domination in conditions of inequality can be turned into pleasure. But what is interesting is the very conflation of that pleasure with both profit and publicness, a visual pornification of power inequities so beautifully symbolized by the booty cam at Yale or the drunk college “chix” porn site.

Share It With Others!

Human beings and their relationships are complex and nuanced, so the software that attempts to describe them must accomodate a wide range of expression.

Share It With Others!

Not every good sex educator or person you can trust to talk with about sexuality online and get reliable information from has one kind or set of credentials, nor one kind of experience or background. There are formal and informal routes into doing sex ed as your gig, and a lot of different avenues into the field. But even with our diversity, there are some common threads and some typical ways you can figure whose information and help you can trust and whose you probably shouldn't.

Share It With Others!

But I do take exception when someone creates false credentials in order to dupe the gullible. I worked hard to get a doctorate in sex education and many of my colleagues, whether they have academic credentials or not, have dedicated years of their lives to learn about sexuality in order to provide good information. I feel a lot of anger when someone pretends to have done the work in order to make it seem as if they know what they’re talking about....It also upsets me when people misrepresent sexwork. Usually, people make it seem as if it’s much a much worse career than it might be, especially when they want to ban it. But it’s also problematic when people glorify it because it creates a misrepresentation of the challenges and difficulties that sexworkers face. In turn, this romanticizes the profession and makes it more likely that people will decide to try it out without knowing how to protect themselves.

Share It With Others!

The refreshed Twitter Rules that are a part of the new Terms of Service spell out a number of different reasons why you may find your Twitter account terminated. Everything from inappropriate content and squatting to selling usernames could be cause for you to get the boot.

Share It With Others!

I would argue that to keep an active and continued presence on Facebook or similar social networks is not a trivial activity, but an important part of a necessary strategy to feel safe and sustained and understood in our daily lives. This argument takes its cues from the work of sociologists Anthony Giddens, Alain Touraine and Ulrich Beck, and particularly the work they have done to describe the ways we act and behave to maintain stable self-identities.

Share It With Others!

Just in case you’d like to contribute to some academic research about butch/femme identities, Esther Rothblum, Professor of Women’s Studies at San Diego State University, is conducting phone surveys about butch/femme identities, including women who use these terms and women who don’t.

Share It With Others!

Attempts to crisply articulate the requirements in creating a privacy-protecting identity layer for the Internet, and sets out a formal model for such a layer, defined through the set of services the layer must provide. It aims at combining the ideas set out in the Laws of Identity and related papers, extended discussions and blog posts from the open identity community, the formal principles of Information Protection that have evolved in Europe, research on Privacy Enhancing Technologies (PETs), outputs from key working groups and academic conferences, and deep experience with EU government digital identity initiatives. The paper is the outcome of a year-long collaboration between Dr. Kai Rannenberg, Dr. Reinhard Posch and Kim Cameron.

Share It With Others!

In a study involving 130 people, the researchers found that 28 percent of the people who knew and were trusted by the study's participants could guess the correct answers to the participant's secret questions.

Share It With Others!

Being online is like being in public. Nearly anything that gets posted can come back to haunt you. When you post it yourself, this isn’t such a big deal — after all, it’s your fault if you post something like the “fatty paycheck” tweet, the Twitter update that resulted in Cisco Systems Inc. revoking a job offer.

Problems start when what’s online isn’t accurate, isn’t yours, or worse, isn’t yours anymore. When your online identity — including your content (written, video, or images) or even your brand — gets hijacked it can hurt you in the same way that the “fatty paycheck” hurt the job candidate for Cisco. When data posted online won’t go away or even when someone lies and steals your online identity, getting it back can be difficult.

Share It With Others!

ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT