Authenticity, Digital Media, and Person Identity Verification
Authenticity, Digital Media, and Person Identity Verification
Introduction
In the early days of the internet, screens were objects people could hide behind.
Interaction was primarily with strangers, and one had relative freedom to engage in iden-
tity performances that others could hardly call into question. However, the rise of so-
cial media has shifted the dynamics of digitally mediated interaction such that an online
presence ties directly to a nameable and knowable person. People are held to account for
who they are online, and patrolled for performances that seem disingenuous. Situated at
the intersection of identity and digitality, this paper draws on in-depth interviews with
American adults (N = 25) to address authenticity on social media from an identity theory
perspective.
Given the prevalence of social media usage and its integration into social, personal,
and professional life, it is of both theoretical and empirical benefit to tease out the rules
and processes of digitally mediated interaction.1 Rather than catapult into entirely new
understandings of sociality, however, there is wisdom in drawing on established theoret-
ical traditions that have meticulously charted interaction and identity processes. Hence,
this chapter deals with the very issues that concerned early symbolic interactionists: how
identities are formed, operate within, and push against, societal structures (Becker, 1960,
1964; Goffman, 1955, 1959; Snow and Anderson, 1987). The social structures of interest
here, however, are digitally mediated ones, and these germinal issues take on renewed
1. See Pew Research for latest statistics on internet, mobile, and social media use (Smith, 2017: http://www.
pewresearch.org/fact-tank/2017/01/12/evolution-of-technology/).
Jenny L. Davis, Authenticity, Digital Media, and Person Identity Verification. In: Identities in Everyday Life.
Edited by Jan E. Stets and Richard T. Serpe, Oxford University Press (2019). © Oxford University Press.
DOI: 10.1093/oso/9780190873066.003.0006
94 | A u t h e n t i c i t y
import as technological changes usher in new social contexts for which the rules of inter-
action are still uncertain.
Identity theory, with its rigorous research program and sharp conceptual precision,
brings the classic ideas of self-in-society to bear on the burgeoning field of social media
studies. Identity theory predicts and explains the relationship between social structures,
Burke, 2014b), while addressing structural and perceptual issues more extensively than
interaction (Stets and Serpe, 2013). An interactionist approach to social media, through
an empirical investigation of authenticity, thus helps round out the identity theory re-
search program.
Beyond theoretical concerns, understanding authenticity in the context of so-
Identity Theory
Rooted prominently in the tradition of George Herbert Mead (1934), identity theory
takes a structural symbolic interactionist approach, depicting identity as a structurally
embedded interactive process (Burke and Stets, 2009; Stets and Burke, 2014a; Stryker,
1980; Stryker and Burke, 2000). “Identity” is defined as the internalized set of meanings
associated with the roles people play, the groups in which they hold membership, and
the traits that define them as persons (Burke and Stets, 2009). These are role, group, and
person identities, respectively.
Identity theory accounts for both a structure of the self as well as processes of iden-
tity negotiation and maintenance. The self is made up of multiple identities (person, role,
and group) hierarchically organized (Brenner, Serpe and Stryker, 2014; Burke and Stets,
2009; Serpe and Stryker, 2011; Stets and Serpe, 2013). When the situation allows, people
are more likely to call forth the identities that are relatively salient to them (Owens,
Robinson, and Smith-Lovin, 2010; Serpe and Stryker, 2011; Stryker, 2000). Once an iden-
tity is activated, verification processes begin.
96 | A u t h e n t i c i t y
Identity theory assumes that people try to maintain stable definitions of self. Thus,
once a given identity is activated, people work to verify the meanings they hold for that
identity (Burke and Stets, 2009). Identity verification is modeled on a cybernetic feedback
loop (Burke, 1991) that contains four component parts: an identity standard, percep-
tual inputs, a comparator, and behavioral outputs (Burke and Stets, 2009). The identity
Methods
I use data from a larger project about “digitally mediated ecologies,” or the span of
platforms, devices, and practices that people employ to communicate, work, learn, and
98 | A u t h e n t i c i t y
live. An ecological approach to digital media studies recognizes that digital technologies
are an integral part of everyday life, enmeshed with built environments and face-to-face
interactions (Jurgenson, 2012). Specific social platforms and digital devices, though dis-
tinct in design, purpose, norms, and affordances (Papacharissi, 2009), operate in tandem
to create holistic communication environments for those who use them. Thus, rather
and perceptions about the effects of social media on the self, interpersonal relationships,
professional life, and political life. Participants were asked about their own experiences
and given the opportunity to “theorize” about social media as a cultural force. Data for
the present chapter come primarily from queries about the self, including how people
see themselves, the degree to which self and identity are accurately portrayed on var-
Analysis
Identity theory conceptualizes authenticity as the affective outcome associated with
person identity verification (Stets and Burke, 2014b). In a parallel literature from dig-
ital media studies, authenticity has emerged as a significant theme in people’s narratives
about their own and others’ social media practices. Working backwards from the way
people talk about authenticity regarding social media, we can learn how people verify
(or struggle to verify) person identities in the context of social media ecologies. Out of
the data, two key principles of authenticity emerge: curation and triangulation. Together,
these constitute a practice of authenticity in which performances are selective, but not
overly crafted, and remain cohesive across platforms, settings, and networks.
Participants constructed and adjusted their own reported practices by anticipating
and interpreting reflected appraisals (i.e., how they thought others viewed/would view
them). Participants also divulged appraisals of others in their networks (i.e., how they
evaluated others’ identity performances). Including appraisals of others into this study
brings one’s evaluation of others into sharper focus in identity theory. Reflected appraisals
have been more of the focus in the identity feedback loop on the input side. Evaluations of
others would be on the output side, as one adjusts one’s behavior and behavioral meanings
100 | A u t h e n t i c i t y
given others’ behavior and their meanings (Stets and Burke, 2014a). This divergence is
theoretically and empirically meaningful, as participants’ appraisals of others reveal the
interaction consequences for those whose authenticity comes into question.
In each interview, I asked participants about their person identities by prompting
them with “What is it important for others to know about who you are as a person?” and
Curation
Social media is characterized by an abundance of content. Platforms are designed in ways
that promote sharing, while internet-connected mobile devices make it seamless to pro-
duce images, video, and text. Digital curation is the process of selective discernment,
characterized by decisions about what to include and what to omit (Davis, 2017). For
participants in the sample, these decisions are effectively represented in the normative
practices of demure and display. Demure refers to norms of performative restraint; display
refers to moves that signal identity and reveal imperfection.
Demure
In efforts to verify person identity meanings and achieve feelings of authenticity,
participants noted that subtlety is key. In contrast with role and group identities, which
may be explicitly articulated, characteristics of the self—i.e., person identities—are
A u t h e n t i c i t y , D i g i ta l M e d i a , and V e r i f i c at i o n | 101
content, especially as it relates to core aspects of the self. Mary, a 32-year-old nurse
practitioner, identifies strongly as “kind,” but is careful not to express this part of her-
self too explicitly. She says, “If I went and did something nice like help the homeless,
I wouldn’t post it on Facebook. It wouldn’t be necessary. It would feel like I was just
looking for attention instead of doing it [helping the homeless] because that’s what
I’m not going to tell people I’m nice, I just want that to come across. I’m not going
to tell people my music is good or that I’m a good artist, I just want to share my
stuff. And sometimes I don’t share my stuff. I could make music all this week and
never share it just because I feel like creating itself is important. I feel really lucky
that I can create and that’s just for me.
Across social media platforms, all but two participants report “lurking” (i.e., looking
at others’ content) far more frequently than they post content themselves. Two participants
do report posting to archival platforms (Facebook and Instagram) frequently, but reflex-
ively note that other people probably “hide” them, acknowledging the social norm of de-
mure and the social consequence of sharing too much. “I post like 10 things a day,” Stuart
says; “I’m sure people are like ‘oh great, this guy posted another article, who gives a shit,
Hide!’ ” Two other participants, though generally conscious of limiting the content they
post and share, have been chastised at certain points for over-sharing. “My younger sister
was horrified that I tried to post two pictures on Instagram in one night. That’s apparently
not how you do it. I guess there’s a hard one-picture-per-day rule,” says Leigh, a 33-year-
old working in higher education. And Kevin (38-year-old IT worker) says a friend once
told him, “You post too much [on Facebook] man, I had to hide you. It’s just too much.”
Kevin now reports a concerted effort to limit his content sharing.
Norms of demure speak to the importance of restraint in digitally mediated identity
performances. Participants censure those who post “too much” and are generally careful
about the frequency of their own posts, reflecting on perceived negative evaluations from
others in their networks. However, too much filtering can imply an overly crafted image
(Uski and Lampinen, 2016), leading participants to balance the information they omit
against the information they include.
Display
With the principle of display, documentation is “proof ” that something happened, evi-
dence of who a person is, and an opportunity to expose (at least minor) imperfections,
establishing self-meanings in an ostensibly natural and organic way. That is, while demure
indicates that people ought not share too much, display is all about creating an exhibit
of the self (Hogan, 2010). As with demure, participants comment critically on others’
practices of display and incorporate norms of display into their own practices.
A u t h e n t i c i t y , D i g i ta l M e d i a , and V e r i f i c at i o n | 103
Hannah, a 21-year-old college student who identifies as “funny” and “caring,” regularly
takes humorous and upbeat pictures and shares them across platforms:
Facebook is like a repository for big events and notable occasions. Then I also snap
pictures of random funny things to send to people on Snapchat. I don’t have to
post pictures, but I like to show people what I’m doing, and I like to share things
that will make people laugh, or make them think.
Harold, a 34-year-old human resources (HR) worker, reports that the content he shares
on Facebook is “more authentic” than how he presents in face-to-face interaction:
Although Harold is unique among participants in his statement that his presence on
Facebook is “more genuine” than the presentation he puts forth in other parts of his life,
the importance of sharing core aspects of the self, and the related desire for affirming feed-
back, is common among the sample. “I like getting ‘Likes’ on what I post,” says one partic-
ipant; “If I share something and nobody responds, it makes me kind of sad,” says another.
Not only do participants include content that “signals” identity, they also remove
content that diverges from their projected identity meanings “My mom posts these like
tragic articles to my [Facebook] Wall,” says Kara, a 37-year-old stay-at-home mother of
two. She continues:
K: It’s fine if she wants to call and tell me about these sad articles she’s reading, or
even send them in a message, but I take them down when she posts them to
my Wall.
104 | A u t h e n t i c i t y
Similarly, Kevin (38-year-old IT worker), who defines himself as “progressive but not
politically affiliated,” says:
Display thus includes producing content, sharing content, and regulating other-generated
content, too.
Although social media platforms let users carefully craft their displays, there remains
a normative practice of incorporating personal imperfections, warding off accusations of
effortful identity performance. “My friends give me a hard time because I’m too ‘put to-
gether’ on Snapchat,” reflects Sharon, a 21-year-old college student. “They’re like, ‘you
look too good in these pictures!’ ” “Looking too good” can suggest an overly manufac-
tured image, one that does not accurately reflect the self. This may be a particularly sen-
sitive issue for those whose person identities include a “carefree” attitude. For example,
21-year-old Hannah and 29-year-old Caitlin both identify as “laid-back” and make a
point of displaying unflattering images on Facebook. Hannah explains: “I may look at a
picture and think eeesh I don’t look good in that one, but I’ll post it anyway, or if someone
else posted it I’ll leave it up. That’s what I look like, so it should be up there.”
Including unflattering images can be an important way to show that a person is
“authentically” presenting via social media, as can keeping (rather than deleting) content
that does not get the desired response. These are ways of displaying effortlessness, and
while they may or may not elicit identity-affirming feedback, they are key to avoiding
non-verifying feedback, such as accusations of “trying too hard.” Nicole (61-year-old real
estate agent) recounts how her identity as “confident” is reflected in the way she responds
to (lack of) engagement from others:
If I posted something and nobody responded to it, I would probably not notice at
first, but then maybe I would go ‘hey, why did nobody respond to that?’ I guess
I would feel bad for half a second, but I wouldn’t take it down or anything. If
I thought it was relevant to post then it should be up there. But maybe that’s just
the ‘Nicole confidence.’ I think I’m great, I don’t need other people to validate that.
Indeed, participants negatively evaluate people who exclude unflattering images or who
take down content that does not garner affirmative feedback. “I know this person who, if
she posts something on Facebook and Instagram and doesn’t get like a specific number
A u t h e n t i c i t y , D i g i ta l M e d i a , and V e r i f i c at i o n | 105
of ‘Likes’ or comments she will take it down, like if people weren’t into it, she pretends it
never happened. That’s a lot of effort,” says Terry (35-year-old IT worker).
Of note, participants do not report un-friending or un-following those who violate
principles of display, as they do with those who violate principles of demure. However,
the violation may result in reduced identity feedback nonetheless. This is because when
Triangulation
The second broad principle of authenticity is triangulation. In general, triangulation refers
to two or more pieces of evidence pointing towards the same conclusion. Within the social
media literature, triangulation refers to a clear connection between identity performances
across multiple online and offline venues, including various social media platforms and
physically bounded built environments (Davis, 2014). Identity performances across
venues must point to, and reflect, a cohesive story of the self. Triangulation includes
consistency across multiple platforms and between these platforms and the face-to-
face interactions that occur in physical co-presence. Triangulating the self, then, entails
maintaining consistent performances on Facebook, Twitter, Instagram, and Snapchat,
which reflect and reinforce performances in the coffee shop, the workplace, the pub, and
the home.
This is not to say that “authentic” performances must be identical, but rather that
successful triangulation reveals an underlying self that is plainly identifiable across digital
platforms, physical meeting places, and diverse networks. Using the language of identity
theory, this underlying self represents a cohesive person identity—e.g., kind, tenacious,
generous, ambitious, etc. While each situation may call out a new group or role iden-
tity (Thoits, 2003), and while the expectations associated with group and role identities
can diverge and conflict, the person identity is embedded across situations and across
networks. Triangulation captures the need to construct a unified set of person identity
meanings, even among varied networks, platforms, and settings (Davis, 2014; Tian,
2017). As with the component parts of curation, participants demarcate their own au-
thentic practices while questioning the authenticity of those who fail to triangulate.
Although participants say that their social media presence represents a definitively
partial image of the self, they also report that their practices generate an authentic por-
trayal that resonates across contexts and situations. As articulated by Ashley (32-year-old
nurse):
106 | A u t h e n t i c i t y
I hardly post to Facebook or Instagram and I only use Snapchat with like five
people, so it would be hard for someone to really know what was going on in my
life or get to know me by looking at my social media, but they would know the
type of person I am.
I: And what kind of person would they see?
Participants further reference diverse audiences and distinct norms about how
to engage on different platforms. They note, however, that despite assorted styles and
sensibilities, coherent person identity meanings emerge. Daniele (31-year-old small busi-
ness owner) explains:
Snapchat is for sending select people pictures of my kids, Facebook I’ll post like
big events, travel, things I’m doing, and on Twitter I’ll make a quick comment or
a joke, but I think I always come across happy, fun, and positive, which is how
I think of myself in general, and how I want other people to think of me.
I’m more vulgar on Twitter and more innocuous on Facebook because my mom
reads that. I also don’t share the ins-and-outs of my every day on any platform. But
if someone knew me online and then met me in person, they would probably say
“yeah, that’s right, that’s him.”
For participants, an authentic performance is one that weaves a solid thread across
settings. While each setting may call forth its own norms of information sharing and its
own appropriate sensibilities, person identity meanings remain relatively constant.
Reinforcing the significance of stable person identity meanings, participants point
to examples of others who seem inconsistent, and question the authenticity of those they
name. Sam, a 21-year-old college student, says that Instagram is “the worst for staging.”
He recounts:
I have friends who post long depressing status updates on Facebook and then post
pictures [on Instagram] of themselves on mountain tops with the sun shining, like
their life is great. But I know it’s not [great], I know they are going through a hard
time. So, I mostly ignore the mountaintop pics.
Similarly, Madison (24-year-old college student) recalls a friend who “obviously puts a
ton of effort into her looks and appearance,” but posted a “goofy camping photo as her
Facebook profile pic”:
A u t h e n t i c i t y , D i g i ta l M e d i a , and V e r i f i c at i o n | 107
M: All of her Instagram pictures are perfectly crafted, and she’s totally put together
in most of her Facebook pictures. Even on Snapchat she’s totally posed. Of course,
in person, she’s always done up perfectly. Then she puts this goofy camping pic-
ture up? That’s not her. She’s like, trying too hard to look like she’s not trying, or
like she doesn’t care, but we can look at her other feeds and we can see how she is
For Sam and Madison, their friends’ identity performances do not resonate across
platforms, nor do they reflect face-to-face interactions. These performances thus do not
triangulate into a coherent self, and so suffer evaluations of inauthenticity.
As with violations of curation (i.e., demure and display), reduced identity-
relevant feedback is a central consequence for those who fail to adequately triangulate.
In response to her friend’s divergent profile image, Madison makes a point to avoid
“Liking” or commenting on the picture and reports non-engagement as a general
tactic for responding to “inauthentic” content. In this vein, Sam dismisses his friends’
“happy” Instagram pictures as an attempt to “put up a front.” In turn, participants ac-
tively perform consistent selves across platforms and networks, triangulating evidence
that they are, authentically, “kind,” “funny,” “laid-back,” etc. Such tactics are appar-
ently central to obtaining identity-relevant feedback and achieving person identity
verification.
Conclusion
Identity theory posits that the outcome of person identity verification is the feeling of
authenticity, while failure to verify person identities results in feelings of inauthenticity
(Stets and Burke, 2014b). This theoretical framing maps productively onto social media
studies, for which authenticity is a key construct. In the context of multimedia commu-
nication, people engage socially and professionally both online and face-to-face, amid
vast networks, on devices that are always potentially documenting, and through a suite
of platforms, on which documented material may be archived and easily spread. These
conditions make authenticity particularly fragile (Davis, 2012), and people who engage in
a digitally connected environment develop patterned ways of verifying person identities
and thereby achieving the authenticity component of self-esteem.
From participants’ narratives, two principles of authenticity emerge: curation and
triangulation. That is, persons are expected to share selectively, share accurately, allow
for imperfection, and present an underlying core self that spans networks and contexts.
Participants report engaging in practices that represent these guiding principles, while
making note of those in their networks who fall short.
108 | A u t h e n t i c i t y
Acknowledgment
Sincere thanks to Madeline Johnson (University of Cambridge), whose contributions to
research design and data collection were integral to this project.
References
Alexander, Norman C. (1977). “Situated Identities and Social Influence.” Sociometry, 40(3), pp. 225–233.
Becker, Howard S. (1960). “Notes on the Concept of Commitment.” American Journal of Sociology, 66(1),
pp. 32–40.
A u t h e n t i c i t y , D i g i ta l M e d i a , and V e r i f i c at i o n | 109
Becker, Howard S. (1964). “Personal Change in Adult Life.” Sociometry, 27(1), pp. 40–53.
Berger, Peter T., and Thomas L. Luckmann. (1966). The Social Construction of Reality: A Treatise in the
Sociology of Knowledge. New York: Penguin.
Brenner, Philip S., Richard T. Serpe, and Sheldon Stryker. (2014). “The Causal Ordering of Prominence
and Salience in Identity Theory: An Empirical Examination.” Social Psychology Quarterly, 77(3), pp.
231–252.
Bucher, Taina. (2012). “Want to Be on the Top? Algorithmic Power and the Threat of Invisibility.” New
Portwood-Stacer, Laura. (2013). “Media Refusal and Conspicuous Non-consumption: The Performative
and Political Dimensions of Facebook Abstention.” New Media and Society, 5(7), pp. 1041–1057.
Rainie, Lee, and Barry Wellman. (2012). Networked: The New Social Operating System. Cambridge,
MA: MIT Press.
Reinecke, Leonard, and Sabine Trepte. (2014). “Authenticity and Well-Being on Social Network Sites: A
Two-Wave Longitudinal Study on the Effects of Online Authenticity and the Positivity Bias in SNS
Communication.” Computers in Human Behavior, 30, pp. 95–102.
Trilling, Lionel. (1972). Sincerity and Authenticity. Cambridge, MA: Harvard University Press.
Turner, Ralph H. (1978). “The Role and the Person.” American Journal of Sociology, 84(1), pp. 1–23.
Uski, Suvi, and Airi Lampinen. (2016). “Social Norms and Self-Presentation on Social Network Sites: Profile
Work in Action.” New Media and Society, 18(3), pp. 447–464.
Zhao, Shanyang, Sherri Grasmuck, and Jason Martin. (2008). “Identity Construction on Facebook: Digital
Empowerment in Anchored Relationships.” Computers in Human Behavior, 24(5), pp. 1816–1836.