Fragm entation of identity through structural holes in em ail contacts
danah boyd, Jeff Potter, Fernanda Viegas
This is the first half of a paper submitted for Keith Hampton’s “Social Networks” course; the second half is focused on the visualizations and w ill be added later, due to obfuscation issues.
Abstract
Burt (1993) suggests that there are a number of advantages to maintaining structural holes in one's social networks, including controlling access to resources and maintaining personal privacy. Since structural holes segment an individual’s social network into unconnected clusters, the individual is able to portray a socially appropriate facet of hirself 1 to each cluster separately, without feeling constrained by the combined social norms. This is significantly advantageous for marginalized individuals who fear retribution should certain aspects of their identity be m ade available in other contexts. I n order to continue to maintain separate social personas, an individual must also explicitly maintain the developed structural holes. While structural holes can be simply maintained in the physical world by associating particular physical environm ents with particular ties, this does not directly translate to the digital world. Due to aggregation of persistent data across most digital environments connected via search engines, location becomes meaningless in the virtual world because it’s impossible to keep digital contexts from converging. Multiple online personas, usually maintained via separate email addresses, present a temporary solution. By associating a particular facet of one’s identity with an email address, and maintaining all appropriate social ties via that address, an individual is able to build a context around an email address. Not only is this time consuming, but it’s also a hassle since most systems are built to help you elim inate m ultiple contexts. Yet, even with the inconvenience, the opportunity for control of personal information motivates many to explicitly manage multiple addresses. As
1 When reflecting on identity, gendered pronouns convey a tremendous amount of unintended meaning. At this
juncture, there is no consensus on which non-gendered pronouns are most acceptable, although there are approximately 25 different publicly used variations. For the purpose of this paper, we have chosen to use a set that is the most comfortable and least derivative of traditional pronouns – s/ he, hir, and hirself (all of which combine the traditional male and female pronouns). Miller, Casey, and Kate Swift. 1980. The Handbook of Nonsexist Writing For Writers, Editors and Speakers. New York: Lippincott & Crowell. Williams, John. 2001. “Gender -Neutral Pronoun FAQ.” Version 0.9.10, October 29. http: / / www.aetherlumina.com/ gnp/