Lovin’ loggin’ in

Dave Kearns remarks on the vast gulf between the identity-based behavior of teens and adult business folks. He quotes danah boyd’s ruminations on ephemeral profiles: “Forgot your IM password? Sign up again. Forgot your email address? Create a new one. Forgot your login? Time for a change. …. Some teens chew through IM handles like candy; their nicks are things like “o-so-funny” rather than the first name, last name standard that seems to pervade professional worlds.”

Certain aspects of this behavior gap aren’t limited to teens. Until this decade, I had never had an email account that wasn’t handed to me by an employer, so all my handles were boring. But when my mom finally got email, she was free to have fun with it, and named it whimsically. Also, a young miss of my acquaintance, seven years old, has an account at Webkinz and visits it daily. She also changes her password daily. For fun. Huh??

(My own xmlgrrl handle got started, in case you’re wondering, when I found myself on a cruise ship with a nascent business-center capability in the late 90’s, and they were temporarily giving out net access for free. What a concept! I tried to telnet into my home machine to send email (“Guess where I’m writing this from?”) but failed, and the attendant suggested I create an account at one of the free service providers. I ended up doing that, but all the obvious logins seemed to be taken. Having created a bracelet with charms that spelled out “xmlgrrl” as a joke on one of our shore excursions, I hit on this as a handle that was unlikely to be used already. Bingo.)

But as danah points out, “While losing passwords is common amongst adults as well, starting over happily isn’t.” I certainly don’t consider it fun to set up new accounts over and over, and I bet teens wouldn’t either if they were, say, applying for a pile of entry-level jobs over the web. Lots of people get new personal email accounts — very unhappily — to stem the tide of spam.

Dave ponders: “Perhaps – some time in the not so distant future – they’ll be clamoring for a way that they can unite all of their “identities” – but only if they can guarantee that they alone can see the consolidated material.”

If a person is is going to ask for assistance from a service on the web in doing this consolidation, that service will necessarily have to know something about her (otherwise she might as well keep everything in her head like she does now, her brain being the only existing consolidation point), but federation through the exchange of pseudonyms keeps it to a minimum. In this way, consolidation corresponds pretty well with the federation portion of the taxonomy I had drawn up a little while back. I’ve refined it to focus in on the relevant bit:

Identity taxonomy, refined and focused

Whether people have URL-based identifiers or some other kind, they’re just as likely to have more than one than only one. It would certainly be Bad for a worldwide-scalable identity system to make everyone get exactly one. So far, quite a lot of people — not just teens — using the network for non-business reasons are comfortable creating and playing with many identities for themselves. As soon as they’ve invested something significant (perhaps, as danah notes, involving a mobile device, or just inputting data that they really really don’t want to have to input again) in enough of them, consolidation will become attractive indeed.

No tags for this post.

3 Comments to “Lovin’ loggin’ in”

  1. Bob DuCharme 5 January 2007 at 5:58 am #

    Hi Eve,

    Kids today are actually discouraged from using their real names in their IM handle, as part of “cyber-safety,” or whatever the hell they call that yearly talk that they get at school. I found this out after telling my younger daughter that she was lucky that she got her FirstnameLastname AIM name before anyone else, and that using some combination of our pet names and the word “soccer” (or whatever she was using) would make it more difficult for her friends to know who was IMing them. “They TOLD us at SCHOOL not to use our real names.”

    Of course, judging from the encryption literature, as an Alice and a Bob she and I have to mostly worry more about the Eves of the world, but I doubt that this is covered in the cyber-safety talks. (I just noticed that we even have our own Wikipedia page: http://en.wikipedia.org/wiki/Alice_and_Bob)

    Bob

  2. Eve 5 January 2007 at 7:17 am #

    Hi Bob! Interesting… This practice makes sense as a first-line defense against various kinds of malice. Social engineering can probably easily overcome it, though, I would think — the point of an IM handle being to give it to people. If blacklisting doesn’t work, abandoning an identity is what you’d have to do to cut an unwanted relationship. Hopefully we can do better than that eventually.

    If you’re bringing Alice to the XML Summer School this year, perhaps we three should arrange for a live demonstration of intercepted communication and take pictures. :-)

  3. Robin Wilton 17 January 2007 at 8:56 am #

    Hmmm. Know anyone called Trent or Mallet?