Difference between revisions of "Cybernaut"

From Danton's Real Life Userguide
Jump to: navigation, search
(Internet users according to Wikipedia)
 
Line 23: Line 23:
 
The Wikipedia article points out that users employ the user interface to access a system, and that such users may need to identify themselves, for purposes of accounting, security or resource management. To identify himself or herself the user has an account (a user account) and a username (also called screen name, handle, nickname, or nick), and in most cases also a password. This process of identification is often referred to as authentication.
 
The Wikipedia article points out that users employ the user interface to access a system, and that such users may need to identify themselves, for purposes of accounting, security or resource management. To identify himself or herself the user has an account (a user account) and a username (also called screen name, handle, nickname, or nick), and in most cases also a password. This process of identification is often referred to as authentication.
  
This dry description thus does reveal one key characteristic of the Cybernaut, which is ambiguous identity. The username may be the Cybernaut's real name, but it may just as easily any sort of pseudonym or "virtual identity". The Cybernaut may thus hide being a façade of anonymity, which provides a certain liberty or even irresponsibility. At the same time, the Cybernaut may have multiple identities, either on separate systems, or even on the same system, using [[Sockpuppet]]s which permit a single individual to appear as several different persons.
+
This dry description thus does reveal one key characteristic of the Cybernaut, which is ambiguous identity. The username may be the Cybernaut's real name, but it may just as easily any sort of pseudonym or "virtual identity". The Cybernaut may thus hide being a façade of anonymity, which provides a certain liberty or even irresponsibility. At the same time, the Cybernaut may have multiple identities, either on separate systems, or even on the same system, using Sockpuppets which permit a single individual to appear as several different persons.
  
 
The Wikipedia article goes on to observe that "users" tend to be people who use a system without having the complete technical expertise required to run or fully to understand the system. Such users are called "end-users." Registered users are also "real users," as opposed to intrusive hackers, who are illegal users of the system. The typical Cybernaut is a skilled interet user but lacking advanced technical expertise, and who logs onto legitimate, authorised user accounts.
 
The Wikipedia article goes on to observe that "users" tend to be people who use a system without having the complete technical expertise required to run or fully to understand the system. Such users are called "end-users." Registered users are also "real users," as opposed to intrusive hackers, who are illegal users of the system. The typical Cybernaut is a skilled interet user but lacking advanced technical expertise, and who logs onto legitimate, authorised user accounts.

Latest revision as of 16:18, 16 August 2010