Bertrand du Castel
 
 
 Timothy M. Jurgensen
                    
MIDORI
PRESS
Cover
Prelude
a b c d e f g
Contents
i ii iii iv
Dieu et mon droit
1 2 3 4 5 6
1 Tat Tvam Asi
7 8 9 10 1 2 3 4 5 6 7 8 9 20 1 2 3 4 5 6 7 8 9 30 1 2 3 4 5 6 7 8
2 Mechanics of Evolution
9 40 1 2 3 4 5 6 7 8 9 50 1 2 3 4 5 6 7 8 9 60 1 2 3 4 5 6 7 8 9 70 1 2
3 Environment
3 4 5 6 7 8 9 80 1 2 3 4 5 6 7 8 9 90 1 2 3 4 5 6 7 8 9 100 1 2
4 Physiology of the Individual
3 4 5 6 7 8 9 110 1 2 3 4 5 6 7 8 9 120 1 2 3 4 5 6 7 8 9 130 1 2 3 4 5 6 7 8 9 140
5 Fabric of Society
1 2 3 4 5 6 7 8 9 150 1 2 3 4 5 6 7 8 9 160 1 2 3 4 5 6 7 8 9 170 1 2 3 4 5 6 7 8 9 180 1 2 3 4 5 6
6 The Shrine of Content
7 8 9 190 1 2 3 4 5 6 7 8 9 200 1 2 3 4 5 6 7 8 9 210 1 2 3 4 5 6
7 In His Own Image
7 8 9 220 1 2 3 4 5 6 7 8 9 230 1 2 3 4 5 6 7 8 9 240 1 2 3 4 5 6 7 8
8 In Search of Enlightenment
9 250 1 2 3 4 5 6 7 8 9 260 1 2 3 4 5 6 7 8 9 270 1 2 3 4 5 6 7 8 9 280 1 2 3 4 5 6 7 8 9 290 1 2
9 Mutation
3 4 5 6 7 8 9 300 1 2 3 4 5 6 7 8 9 310 1 2 3 4 5 6 7 8 9 320 1 2 3 4 5 6 7 8 9 330 1 2 3 4 5 6 7 8 9 340
10 Power of Prayer
1 2 3 4 5 6 7 8 9 350 1 2 3 4 5 6 7 8 9 360 1 2 3 4 5 6 7 8 9 370 1 2 3 4 5 6 7 8 9 380
11 Revelation
1 2 3 4 5 6 7 8 9 390 1 2 3 4 5 6 7 8 9 400 1 2 3 4
Bibliograpy
5 6 7 8 9 410 1 2 3 4 5 6 7 8 9 420
Index
1 2 3 4 5 6 7 8 9 430 1 2 3 4 5 6 7 8 9 440 1 2 3 4 5 6 7 8 9 450 1 2 3 4 5 6

COMPUTER THEOLOGY

other becomes extinct. Symbiotic and parasitic interactions entail the differentiation of symbiotes on the one hand and parasite from host on the other. It is in the guise of predatory interactions that we best see the full gamut of identity’s facets.

Perhaps the way to begin an overview of identity is to consider the lack of it; a concept that we refer to as anonymity. Consider the interaction of predator and prey in the physical ecosystem. An interaction technique used by both is that of stealth. The predator may use stealth as it approaches its potential prey, while the prey in turn may use stealth as a means to avoid detection by the predator. As a facet of identity within social ecosystems, stealth is metaphorically consistent with anonymity. However, the equivalence breaks down when we consider not just the prelude to an interaction, and perhaps the interaction itself, but also the consequences of an interaction. We noted in Chapter 3 the ability of animals like the arctic hare to disguise or to eliminate their forensic wakes within the physical ecosystem. In other words, they are able to minimize the consequences of interactions that leave evidence of the interaction for others to find; however, further interactions could leave traces. Within a social ecosystem, we suggest a definition of anonymity as the complete lack of characteristics through which a member of a group can be distinguished. To achieve true anonymity, an interaction in which an anonymous person participates must have no forensic characteristics that can point to the specific person. As a side effect of this definition, it would seem obvious that no level of identity-derived trust can be ascribed to an anonymous entity.

Anonymity is central to the confluence of the concepts of identity and privacy, also a multi-faceted concept. In particular, we apply the term to both freedom-of-action as well as control-of-information. Within social ecosystems, there is a natural tendency to conclude that anonymity is an effective agent of privacy. The tendency derives from our experiences with social ecosystems in the small and with our observations of physical ecosystem interactions. However, we observe that within the existing social orders, achieving true anonymity is difficult if not impossible. Consequently, suggesting it as a foundation of privacy is perhaps a bit of wishful thinking. Rather, we suggest the consideration of additional facets of identity that might be of better use in obtaining the privacy that we seek. We will try to draw out these opportunities as we consider some rather simple examples.

With respect to social ecosystems, identity is about grouping people together according to some criteria and then distinguishing each person found in a specific group. At least two distinct approaches can be considered in providing these mechanisms. One method is to specify a group, add people into it and provide some mechanism to establish uniqueness of each individual within that group. This is the approach we use when we create the Social Security System, the Texas Driver License or your favorite airline frequent flyer program. Each group operates independently of the others and hence each is responsible for distinguishing its individual members, usually by assigning some unique identifier to each person within that group. The net result of this approach is that a person may belong to lots of groups and consequently have many unique identifiers; essentially, one from each group. We will ascribe the term experiential identity to this form of identification. We arrive at the term by observing that historically, within the realm of small social ecosystems such as the family, clan or tribe we tend to make use of this facet of identity to denote the life experiences of a person. Note that in this setting we don’t suggest that this mechanism is used to establish the uniqueness of the individual within the family, clan or tribe grouping. This is actually accomplished through a different mechanism that we’ll consider below. Rather, experiential identity is strongly related to the concept of reputation and hence to the association of trust to identity. The concept of reputation derives from the concept of trust established through causality and process that we discussed in Chapters 7 and 8. The examples we have suggested are

 

9 Mutation

305

© Midori Press, LLC, 2008. All rights reserved for all countries. (Inquiries)

The contents of ComputerTheology: Intelligent Design of the World Wide Web are presented for the sole purpose of on-line reading to allow the reader to determine whether to purchase the book. Reproduction and other derivative works are expressly forbidden without the written consent of Midori Press. Legal deposit with the US Library of Congress 1-33735636, 2007.

 

ComputerTheology
Intelligent Design of the World Wide Web
Bertrand du Castel and Timothy M. Jurgensen
Midori Press, Austin Texas
1st Edition 2008 (468 pp)
ISBN 0-9801821-1-5

Book available at Midori Press (regular)
Book available at Midori Press (signed)
Book available at Amazon (regular)