A New Algorithmic Identity

  title={A New Algorithmic Identity},
  author={John Cheney-Lippold},
  journal={Theory, Culture \& Society},
  pages={164 - 181}
Marketing and web analytic companies have implemented sophisticated algorithms to observe, analyze, and identify users through large surveillance networks online. These computer algorithms have the capacity to infer categories of identity upon users based largely on their web-surfing habits. In this article I will first discuss the conceptual and theoretical work around code, outlining its use in an analysis of online categorization practices. The article will then approach the function of code… Expand
Algorithms, advertising and the intimacy of surveillance
ABSTRACT This article develops the notion of the intimacy of surveillance, a characteristic of contemporary corporate marketing and dataveillance fueled by the accumulation of consumers’ economicallyExpand
Making it personal: web users and algorithmic personalisation
It is argued that algorithmic personalisation demands that web users’ identities be constituted as both a stable and fixable ‘single identity’, but also as recursively reworkable, dividualised and endlessly expressable entities. Expand
Data orientalism: on the algorithmic construction of the non-Western other
Research on algorithms tends to focus on American companies and on the effects their algorithms have on Western users, while such algorithms are in fact developed in various geographical locationsExpand
The return of the social: Algorithmic identity in an age of symbolic demise
It is argued that algorithmic identities stem from epistemic amalgams—complex blends of algorithmic outputs and human expertise, messy data flows, and diverse inter-personal factors. Expand
Algorithmic inference, political interest, and exposure to news and politics on Facebook
ABSTRACT The visibility of news and politics in a Facebook newsfeed depends on the actions of a diverse set of actors: users, their friends, content publishers such as news organizations,Expand
Beyond data as representation: The performativity of Big Data in surveillance
The article discusses problems of representative views of data and elaborates a concept of the performativity of data. It shows how data used for surveillance contributes in creating suspectExpand
From algorithmic disengagement to algorithmic activism: Charting social media users' responses to news filtering algorithms
  • Seong-Jae Min
  • Psychology, Computer Science
  • Telematics Informatics
  • 2019
The focus on users shifts the understanding of algorithms from a technical force to a social and personal one and suggests human psychology and capacity determine meaningful technology use. Expand
Agent, Gatekeeper, Drug Dealer
Algorithmic personas are proposed as a conceptual framework that describes the new roles that algorithmic systems take on in the social world as they face new challenges around the ethics and politics of algorithmic platforms such as YouTube. Expand
Economies of Character (or, Character in the Age of Big Data)
Abstract In the age of big data, character becomes a newly foregrounded object – and product – of scrutiny. New credit scoring methods, which draw on big data analytics, claim to paint rich,Expand
Technologies of attribution: characterizing the citizen-consumer in surveillance performance
Many accounts of surveillance and its subjective effects tend to focus on privacy. Along with this focus comes the assumption that surveillance’s objects are simply facts and attributes,Expand


The demographics of web search
The research combines three data sources: the query log of a major US-based web search engine, profile information provided by 28 million of its users, and US-census information including detailed demographic information aggregated at the level of ZIP code, which creates a powerful user modeling tool. Expand
Cybertypes: Race, Ethnicity, and Identity on the Internet
From the Publisher: Cyberspace entices us with the promise of an online utopia—a web of fluid identities and infinite possibilities. When we look for signs of freedom online—anywhere from chat roomExpand
Niche Envy: Marketing Discrimination in the Digital Age
We have all been to Web sites that welcome us by name, offering us discounts, deals, or special access to content. For the most part, it feels good to be wanted--to be valued as a customer. But if weExpand
Software-sorted geographies
This paper explores the central role of computerized code in shaping the social and geographical politics of inequality in advanced societies. The central argument is that, while such processes areExpand
Surveillance as social sorting : privacy, risk, and digital discrimination
Part One: Orientations 1. Surveillance as Social Sorting: Computer Codes and Mobile Bodies 2. Theorizing Surveillance: The Case of the Workplace 3. Biometrics and the Body as Information: NormativeExpand
Software Studies: a lexicon
This collection of short expository, critical, and speculative texts offers a field guide to the cultural, political, social, and aesthetic impact of software. Computing and digital media areExpand
Brands: Meaning and Value in Media Culture
Drawing on rich empirical material, this revealing book builds up a critical theory, arguing that brands have become an important tool for transforming everyday life into economic value.When brandingExpand
Protocol, or, How Control Exists after Decentralization
Alexander Galloway argues that the founding principle of the Net is control, not freedom, and that the controlling power lies in the technical protocols that make network connections (and disconnections) possible. Expand
Biometric borders: Governing mobilities in the war on terror
This article proposes the concept of the biometric border in order to signal a dual-faced phenomenon in the contemporary war on terror: the turn to scientific technologies and managerial expertise inExpand
Control and Freedom: Power and Paranoia in the Age of Fiber Optics
How has the Internet, a medium that thrives on control, been accepted as a medium of freedom? Why is freedom increasingly indistinguishable from paranoid control? In Control and Freedom, Wendy HuiExpand