<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">A Formal Framework for Identity in Cyber and Other Universes</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Albert</forename><surname>Esterline</surname></persName>
							<email>esterlin@ncat.edu</email>
							<affiliation key="aff0">
								<orgName type="department">Department of Computer Science</orgName>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Jules</forename><surname>Chenou</surname></persName>
							<email>jchenou@ncat.edu</email>
							<affiliation key="aff1">
								<orgName type="department">Department of Electrical and Computer Engineering College of Engineering North Carolina Agricultural</orgName>
								<orgName type="institution">technical State University Greensboro</orgName>
								<address>
									<postCode>27411</postCode>
									<settlement>North Carolina</settlement>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">A Formal Framework for Identity in Cyber and Other Universes</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">32D124080A05EA893A1E7F88E489DFD5</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-25T05:24+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>We present preliminary work on a framework for constructing identities that takes as its point of departure Barwise's channel theory, founded on category theory, and allied work on situation semantics. The framework takes actions relating to identity as fundamental. Actions and events are situations, although situations can include larger context. Identity-related situations are classified under (identity) types, which can be fused. Identity-related activity is partitioned according to the 'form of life' involved into (identity) environments, similar to Barwise's classifications. An identity-related action is often based on another identity-related action as a resource, and all these actions may reference events in an individual's life. The result is a layered picture of identity-related situations. Identities retain references to the situations from which they are constructed, so provenance, context, and narrative detail are retained. The category-theoretical constructs of Barwise's channel theory, however, must be relaxed when identity in multiple environments is considered.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>This paper presents preliminary work on a framework for constructing identities that takes its point of departure work by Barwise and his associates on the "flow of information" and situations. Barwise's channel theory is an application of an area of abstract mathematics known as category theory, which addresses the form of mathematical theories and interrelates their structures. Channel theory gives an account of how x being P carries the information that y is Q, where x and y are "tokens" and P and Q are "types," x and P being in one classification system, y and Q being in another. Barwise and his associates also developed situation semantics, which accounts for the meaning of an expression as the relation between situations, viz., between an utterance (situation) and a described situation. Channel theory and situation semantics were two parts of a coherent program, and situation theory was developed as mathematical support for situation semantics.</p><p>The framework sketched here takes actions relating to identity, both judgments and assertions, as fundamental. Actions are events (with an agent), and events are basically situations, although situations can include larger regions of space and time and generally accommodate context. Identity-related situations are classified under (identity) types, which can be fused. Identity-related activity is partitioned according to the 'form of life' involved into environments, similar to Barwise's classifications. An identity-related action is often based on another identityrelated action as a resource, and all these actions may reference events in an individual's life. The result is a layered picture of identity-related situations, and this layering was part of the motivation for situation semantics.</p><p>Identities in this framework retain references to the situations from which they are constructed, so provenance, context, and narrative detail are retained.</p><p>Multiple identities are easily accommodated yet fusion results in constraints that converge to real-life individuals behind the perspectives that arise in the environment, somewhat as a genotype is behind phenotypes.</p><p>It turns out that the category-theoretical constructs of Barwise's channel theory must be relaxed when identity in multiple environments is considered. We explain the reasons for this and sketch what needs to be done to recover the category-theoretic foundation.</p><p>The next two sections provide brief introductions to category theory and channel theory. Section 4 introduces the technical notion of a situation. Section 5 introduces the notion of identity as a type in a classification (system), that is, an environment, which involves a coherent set of practices and standards used to identify and characterize individuals. Different environments provide different perspectives on a given person, but note that the same idrelevant situation (or id-situation) may be classified under several types since it may involve several individuals. Section 5 concludes with a sketch of three environments. Section 6 reconciles identification-relevant actions (idactions) that are first person assertions with third-person identifications and characterizations in terms of the notion of theory of mind from developmental psychology. Section 7 introduces resource situations as meta-representations in an id-situation, and it introduces referenced events as realworld facts that are the background content of the idsituations. The next section analyzes examples where identities (as types in environments) are fused. Finally, Section 9 considers how this framework can be expressed in category-theoretic terms similar to channel theory.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Category Theory</head><p>A category 𝒞 consists of a class of objects and a class of morphisms (or arrows or maps) between the objects. Each morphism f has a unique source object 𝑎 and target object b; we write 𝑓: 𝑎 → 𝑏. The composition of 𝑓: 𝑎 → 𝑏 and 𝑔: 𝑏 → 𝑐 is written as 𝑔 ∘ 𝑓 and is required to be associative: if in addition ℎ: 𝑐 → 𝑑, then ℎ ∘ (𝑔 ∘ 𝑓) = (ℎ ∘ 𝑔) ∘ 𝑓. It is also required that, for every object x, there exists a morphism 1 𝑥 : 𝑥 → 𝑥 (the identity morphism for x) such that, for every morphism 𝑓: 𝑎 → 𝑏, we have 1 𝑏 ∘ 𝑓 = 𝑓 = 𝑓 ∘ 1 𝑎 . It follows from these properties that there is exactly one identity morphism for every object. A functor from one category to another is a structure-preserving mapping, preserving the identity and composition of morphisms. More exactly, if 𝒞 and 𝒟 are categories, then a functor F from 𝒞 to 𝒟 is a mapping that associates with each object 𝑥 ∈ 𝒞 an object, 𝐹(𝑥) ∈ 𝒟 and, with each morphism : 𝑥 → 𝑦 ∈ 𝒞 , a morphism 𝐹(𝑓): 𝐹(𝑥) → 𝐹(𝑦) ∈ 𝒟 such that 𝐹(𝑖𝑑 𝑥 ) = 𝑖𝑑 𝐹𝑥 for every object x ∈ C and 𝐹(𝑔 ∘ 𝑓) = 𝐹(𝑔) ∘ 𝐹(𝑓) for all morphisms f: x → y and g: y → z .</p><p>In category theory, a commutative diagram is a diagram of objects (as vertices) and morphisms (arrows between objects) such that all directed paths in the diagram with the same start and end points lead to the same result by composition.</p><p>The classic presentation of category theory is (MacLane 1998). Two reasonably comprehensive and rigorous texts that are not too sophisticated for someone with a strong undergraduate math background are (Simmons 2011) and <ref type="bibr" target="#b0">(Awodey 2010)</ref>. A light introduction is provided by <ref type="bibr" target="#b9">(Lawvere and Schanuel 2009)</ref>. <ref type="bibr" target="#b11">(Pierce 1991)</ref> and <ref type="bibr" target="#b1">(Barr and Wells 1990)</ref> are texts addressed specifically to computer scientists; <ref type="bibr" target="#b5">(Fiadeiro 2005)</ref> addresses category theory in the context of software engineering.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Channel Theory</head><p>The point of departure for channel theory is the notion of a classification, which consists of a set of individuals ("tokens"), a set of types, and a binary relation indicating that a given token is of a given type. <ref type="bibr" target="#b3">Barwise and Seligman (Barwise and Seligman 1997)</ref> presented a framework for the "flow of information" in (generally implicit) categorytheoretic terms. They address the question, "How is it that information about any component of a system carries information about other components of the system?" They define a classification A to be a structure with non-empty sets 𝑡𝑦𝑝(𝑨) of types and 𝑡𝑜𝑘(𝑨) of tokens as well as a binary relation ⊨ A between 𝑡𝑜𝑘(𝑨) and 𝑡𝑦𝑝(𝑨) such that, for 𝑎 ∈ 𝑡𝑜𝑘(𝑨) and 𝛼 ∈ 𝑡𝑦𝑝(𝑨), 𝑎 ⊨ 𝐴 𝛼 indicates that a is of type α. The theory does not limit what a or α might be (as long as it makes sense for a to be of type α). It could be that a is an object and α a property (monadic firstorder relation), or a might be a situation and α a type of situation; often, different tokens of a classification amount to the same physical system across different time points and types are instantaneous partial state descriptions of the system.</p><p>For classifications A and C, an infomorphism f from A to C is a pair of functions (𝑓 ∧ , 𝑓 ∨ ), 𝑓 ∧ : 𝑡𝑦𝑝(𝑨) → 𝑡𝑦𝑝(𝑪), and 𝑓 ∨ : 𝑡𝑜𝑘(𝑪) → 𝑡𝑜𝑘(𝑨) satisfying, for all tokens 𝑐 ∈ 𝑡𝑜𝑘(𝑪) and all types 𝛼 ∈ 𝑡𝑦𝑝(𝑨), 𝑓 ∨ (𝑐) ⊨ 𝐴 𝛼 iff 𝑐 ⊨ 𝐶 𝑓 ∧ (𝛼) That is, the image of token c (under 𝑓 ∨ ) is classified to be of type α if and only if c is classified to be of the type that is of the image of α (under 𝑓 ∨ ). Intuitively, an infomorphism is a part-to-whole, A-to-C, informational relationship. Figure <ref type="figure">1</ref>.a shows function pairs (𝑓 ∧ , 𝑓 ∨ ) and (𝑔 ∧ , 𝑔 ∨ ), each depicted in Figure <ref type="figure">1</ref>.b as a single infomorphism with codomain C, while f has domain A and g domain B.</p><p>Information (not the "amount" of information, as per Shannon) is assumed to "flow" among the components of a system. Components may, but need not, be distant from one another in time and space, and they may be very different things. The system is "distributed" in this sense (not necessarily in the sense in which that term is used in computer science).</p><p>For exemplar, the students, classrooms, scheduling system, and attendance records at a school together form a distributed system.</p><p>An information channel is a family of infomorphisms with a common codomain, called the core. Essentially, a channel consists of a set {A 1 ,...,A n } of classifications that represent the parts of the distributed system, a classification C (the core) that represents the system as a whole, and a set of infomorphisms {f 1 ,...,f n } from each of the parts onto C. Tokens in C are the connections of the system: a given token c in C connects the tokens it is related to by means of {f 1 ,...,f n }. Parts {A 1 ,...,A n } carry information about each other as long as they all are part of C. In category-theoretic terms, the core is the sum (or colimit) of the parts. Figure <ref type="figure">2</ref> shows the sense in which the core is a universal construction, making it unique.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Figure 1. (a) shows infomorphisms f (with domain A) and g (domain B) with common comdain C as function pairs. (b) is the single-arrow view.</head><p>Figure <ref type="figure">2</ref>: A core (universal cocone) (𝒇 𝒊 ∶ 𝓐 𝒊 → 𝓒) 𝒊∈𝑰 is a family of informorphisms with a common codomain 𝓒; if (𝒉 𝒊 ∶ 𝓐 𝒊 → 𝓓) 𝒊∈𝑰 is a another such familywith a common codomain 𝓓 then there exists a unique informorphism 𝝃: 𝓒 → 𝓓 such that for all 𝒊 ∈ 𝑰, 𝒉 𝒊 = 𝝃 ∘ 𝒇 𝒊 .</p><p>A distributed system D is a collection of elements that carry information about each other. Formally, D consists of an indexed class 𝑐𝑙𝑎(𝐷) of classifications together with a class 𝑖𝑛𝑓(𝐷) of infomorphisms whose domains and codomains are all in 𝑐𝑙𝑎(𝐷). An information channel K covers distributed system D if and only if 𝑐𝑙𝑎(𝐷) are the classifications of the channel and, for every infomorphism 𝑓 in 𝑖𝑛𝑓(𝐷), there are infomorphisms from both the domain and codomain of 𝑓 to the core of K such that the diagram formed by these three infomorphisms commutes.</p><p>Basically, all classifications in D are "informational parts" of the core whose channel covers D.</p><p>Turning to regularities in a classification's type, let A be a classification and Γ and ∆ be sets of types in A. A token a of A satisfies the "sequent" 〈Γ,∆〉 provided that, if a is of every type in Γ, then it is of some type in ∆. If every token of A satisfies 〈Γ,∆〉, then Γ is said to entail ∆ and 〈Γ,∆〉 is called a constraint supported by A. The set of all constraints supported by A is called the complete theory of A, denoted by Th(A). These constraints are system regularities, and it is by virtue of regularities among connections that information about some components of a distributed system carries information about other components. These regularities are relative to the analysis of the distributed system in terms of information channels. Barwise and Seligman's summary statement of their analysis of information flow, restricted to the simple case of a systems with two components, a and b, is as follows.</p><p>Suppose that the token a is of type α. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Situations</head><p>Channel theory is neutral about what tokens are, for example, objects (or object states) or system states. One alternative, which is quite common and natural, is to take tokens to be situations. Situation semantics, articulated in Barwise and Perry's Situations and Attitudes <ref type="bibr" target="#b2">(Barwise and Perry 1984)</ref>, attempted to provide a solid theoretical foundation for reasoning about commonsense and real world situations and was complemented by Barwise's other work in channel theory. Situation theory provides the mathematical foundations to situation semantics and was developed by Barwise and others, including Devlin in Logic and Information <ref type="bibr" target="#b4">(Devlin 1991)</ref>.</p><p>According to Devlin, a situation is some part of the ongoing happenings in the world and allows situation theory to handle context. Situations include not only connected space-time regions but also spatially disconnected (e.g., telephone calls) and temporally disconnected situations (e.g., multi-day sporting events).</p><p>Situation theory introduces the notion of an infon as the basic item of information. We assume as given sets A of individuals, R of properties and relations, L of spatial locations, and T of temporal locals. The general form of an infon, then, is 〈〈𝑅 𝑛 , 𝑎 1, … , 𝑎 𝑛 , 𝑙, 𝑡, 𝑖〉〉, where 𝑅 𝑛 ∈ 𝑅 is an n-place relation, 𝑎 1 , … , 𝑎 𝑛 ∈ 𝐴 are objects appropriate for the corresponding argument places of 𝑅 𝑛 , 𝑙 ∈ 𝐿, 𝑡 ∈ 𝑇, and 𝑖 ∈ {0,1} is the polarity. A polarity of 1 indicates that the objects are thus related in l at t; a polarity of 0 indicates otherwise. Where s is a situation and σ an infon, it might be that s supports σ, that is, that σ holds in s.</p><p>A real situation (according to Devlin) is a part of reality (and considered a single entity) that supports an indefinite number of infons, while an abstract situation is a set of infons. Real situations are tokens for us. An abstract situation for us is a type. If abstract situation s is the set {𝜎 1 , … , 𝜎 𝑚 } of infons and we identify the classification as I, then, for real situation r, 𝑟 ⊨ 𝑰 𝑠 if and only if r supports all infons in s.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">Identity as Classification</head><p>We take an identity to be a classification in the sense of channel theory, where types are abstract situations tokens are real situations.</p><p>The similarity between situations and events has been frequently noted (cf., e.g., <ref type="bibr" target="#b8">Kratzer 2011)</ref>, and actions are a kind of event (where one can identify an agent). We take situations as they relate to identity (what we call id-situations) to be those that include identity-relevant actions (what we call id-actions).</p><p>An (identity) environment is a coherent set of practices and standards used to identify and to characterize individuals.</p><p>This notion of environment relates to Wittgenstein's observation that "to imagine a language means to imagine a form of life" (Wittgenstein 1991, §19) if we extend this observation to cover not only grammatical utterances but any action that has significance by virtue of social convention. Below, we sketch some environments by which one establishes what we call online identity, physiological identity, or social identity. Our analysis to date is modest, and the example environments are concrete. The 'forms of life' involve id-actions that are overt and subject to conventions that have evolved to sanction (sometimes legally) evidence for identity.</p><p>Different environments provide different perspectives on a given person. The question of how these perspectives are fused into a single identity is deferred to Section 8. How one partitions identity-related activity into environments is somewhat arbitrary, and our example environments could easily be partitioned finer. Indeed, we mention fusing identities within each of these environments.</p><p>The same id-situation may be classified under several types, as when an action relates to the identities of several different individuals. One generally tries to identify idsituations that relate to as few distinct identities as possible although some events inherently involve multiple players.</p><p>Some id-actions amount to asserting an identity (which is a first-person perspective) while others identify or characterize an individual distinct from the identifying or characterizing agent. We handle both these perspectives within a given environment.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.1">Online Identity</head><p>Our first example of an identity environment is that in which we establish online identities in a rather narrow sense. Here we can look at the FOAF properties that have Person (or, more broadly, Agent) as domain. This includes, for example, mbox (a person's email address) and workplaceHomepage. As per FOAF (and the Semantic Web in general), resources are generally identified with URIs. A type is associated with a pattern that (in the first instance) is a URI. As a situation type, such a type is a context in which the URI is used (e.g., a given email address is used in the 'To' field of an email). Tokens are situations where someone engages in an online activity or reflects on such an activity. Such a situation is classified as of a given type if the activity involved makes use of the URI in question. The situation could involve an individual asserting their identity (as in the 'From' field of an email) or characterizing an individual (as in the 'To' field of an email or when someone analyzes the content of an email).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.2">Physiological Identity</head><p>Another identity environment is that in which one establishes what we refer to as physiological identity. Types here relate to the physical features of a person that may figure in their identification or characterization, such things as fingerprints, iris patterns, photographs of faces, and recordings of voices. Thus, for example, we have a situation type in which a given fingerprint pattern is used for identification of an individual. A token here is a situation in which one uses physical evidence for identification or characterization.</p><p>Perhaps the more common cases are where one identifies or characterizes an individual, but there are notable cases where one asserts one's identity (e.g., "shows one's face"). To ground the notion of a pattern and relate it to officially sanctioned evidence, we distinguish an instance of a pattern that is preserved by an authority (such as a law-enforcement agency) and accepted as a standard against which other instances of the pattern may be compared for authenticity. Examples of such standards include, for example, the images that the FBI keeps of convicted criminals' fingerprints. The pattern instantiated by such a standard may also be instantiated, for example, on a doorknob (in, say, a crime scene investigation), but it is also instantiated in the texture of the thumb of an actual person. Note that a standard need not be pictorial. For example, an iris pattern may be stored as a multitude of properties and distributions in computer memory.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.3">Social Identity</head><p>Our final example of an identity environment is where we establish what we call (in a narrow sense) social identities, concerned with social aspects of a person that may figure in an attempt to identify or characterize them. Paradigmatic examples come from historical research. A token here is a situation in which one uses social evidence for identifying or characterizing an individual. Types include such things as the observing a given name in a given military roster or a church record. A name is to be understood in terms of its denotation independent of language and variants within the same language. Thus, for example, 'Charlemagne', 'Carolus Magnus', and 'Karl der Große' all count as the same name. On the other hand, a phrase structured as a proper name (e.g., "John Smith") often (if not usually) denotes different individuals in different circumstances and may not denote a real individual in any circumstance (e.g., "Lieutenant Kijé"). A definite description is a way of identifying an individual based on characteristics that are distinguishing in the context in which they are used. Extended discourse can provide rich characterization of an individual, who is denoted with various linguistic devices, including proper name, definite descriptions, and anaphoric pronouns. While examples of actions relevant to social identity that come readily to mind generally involve identifying or characterizing an individual, there are notable cases of asserting social identity (e.g., as per Shelley, "My name is Ozymandias, king of kings: Look on my works, ye Mighty, and despair!").</p><p>Note that physiological identity lacks the conventional or social nature of the other two. In some standard sense of "identity," it is quite common for people to have multiple online identities, and FBI Associate Director Mark Felt was revealed to be the character Deep Throat only 31 years after Watergate. In contrast, perspectives that apparently have a life of their own do not arise with physiological evidence unless the person himself undergoes radical change.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6">Identity Environments and Theory of Mind</head><p>We have maintained that, for a given identity environment, there are id-actions that are assertions of identity and others that identify or characterize an individual distinct from the identifying agent. That the same 'form of life' is involved in both aspects (when the identity environment is held constant) is supported by research in developmental psychology addressing what is known as theory of mind (ToM) <ref type="bibr" target="#b6">(Flavell 2004)</ref>, the human ability to attribute mental states <ref type="bibr">(beliefs, desires, intentions, etc.)</ref> to oneself and others and to understand that others have mental states different from one's own. One area covered by ToM research is false belief. For example, a child watches as a puppet sees a cookie put in one of two boxes and leaves. Someone moves the cookie to the other box. When the puppet then returns, the older child, but not the younger, says the puppet will look in the original box. This is because only the older child has a notion of false belief, here that the puppet may falsely believe that the cookie is in the box where it saw the cookie placed. Other areas of ToM research include perspective taking, pretend play, and recognizing the referents of words.</p><p>A quite comprehensive coverage of ToM is presented by Alvin Goldman in Simulating Minds <ref type="bibr" target="#b7">(Goldman 2008</ref>). Goldman uses the term "mindreading" for representing another as having a certain mental state, and he covers the two main accounts of mindreading. According to theory theory (TT), one uses a naïve psychological theory to guide one's assignments of mental states, while according to simulation theory (ST), one tries to replicate others' mental states and project the resulting pretend states onto them. The simulation advocated by ST is not like the computational simulation of, say, a weather system, but rather is replication (or duplication).</p><p>Regarding identity-relevant actions, what is known of ToM suggests that, in identifying or characterizing an individual distinct from the agent doing the identifying or characterizing, the agent uses the ToM relevant to the identity environment in question. According to TT, all states of the mindreader are meta-representations, none of which are attributed to the target, although the contents of the final state are <ref type="bibr" target="#b7">(Goldman 2008)</ref>. When an agent identifies or characterizes another individual, this action generally involves a meta-representation by the agent of an identity-relevant action by that individual.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="7">Resource Situations and Referenced Events</head><p>The denotations of the meta-representations invoked by TT are essentially what Devlin identifies as resource situations. For example, the utterance "The dog I saw yesterday is back" carries information about the presence of a dog and does so by reference to a previous situation (in which the same dog was present). Regarding idactions, when one inspects an email, for example, and notes that it is from someone, the id-action is the inspection and the resource situation is the sending of the email. When an id-action asserts identity, no resource situation is generally needed, but when it identifies or characterizes an individual, it generally (but not always) references a resource situation. An example of the latter that does not involve a resource situation is taking a picture of an individual. Taking a picture, however, can be a resource situation for any number of id-situations because that id-action leaves an enduring object.</p><p>Another component in many id-situations is what we call the referenced event (or, sometimes, the referenced state), a real-world fact that is the background content of the id-situation. For example, the content of an email often makes reference to one or more events, fingerprints on the doorknob may relate to someone opening the door at a certain time, and analyzing a passage in a chronicle usually involves reading about events that happened in the society being chronicled. Frequently, a referenced event is what a resource situation is about. It may also be what an assertion of identity is about (as in, e.g., a confession). An id-action often involves a referenced event without a resource situation as when someone describes another's personality, background, or work. When an object is provided for reference, we take the referenced 'event' to be the event producing the object. For example, when a mug shot is attached to an email, the referenced event is the subject posing for the mug shot (which includes provenance and topic information missing in the bare picture).</p><p>For establishing identity, sometimes we focus on the idsituation itself, sometime on resource situation, and sometimes on the referenced event. Times and spatial locations are often details that bind together events to form a coherent picture, and these parameters are relevant to all three of these aspects. These details, however, are often lacking for some or all of these aspects. In such cases, sometimes we can impose a non-metric (and possibly only partial) temporal order on situations and events and determine relative locations.</p><p>Spatial and temporal inclusion and overlap relations are also often indicated.</p><p>RichardIII Soc , giving the super-type, say, RichardIII, we thereby relate ref 3 and ref 4 , in effect inferring a new, more specific event, say, ref 34 , that (unlike ref 3 ) involves a specific day and (unlike ref 4 ) involves a specific location. Where e is an event, let prop(e) be a statement in some sufficiently well-defined language whose sense is e. Then we have prop(ref 34 ) ⇒ prop(ref 3 ) ∧ prop(ref 4 ), where ⇒ and ∧ are the usual truth-functional material implication and conjunction connectives. Also note that the referenced event in (iv) helps us rule out such things as a reburial.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="9">Category-theoretic View of Identity Fusion</head><p>For a systematic account of the interrelation and fusion of identities, we would like something like Barwise and Seligman's information channels. The "parts" would be the identity environments, and an infomorphism f from classification A to classification B would at least include the type function 𝑓 ∧ : 𝑡𝑦𝑝(𝐴) �⎯⎯� 𝑡𝑦𝑝(𝐵). The token function, however, is problematic, as we shall see. The core C of such an "identity channel" would compose the types of the various identity environments (not necessarily as a sum), and it would support the following. Suppose that id-situation o 0 in environment E 0 is of identity type T 0 and that id-situation o 1 in environment E 1 is of identity type T 1 . If the translation T 0 ′ of T 0 entails the translation T 1 ′ of T 1 in the theory Th(C), then o 0 being of type T 0 carries the information that o 1 is type T 1 .</p><p>The problem is that not every token (i.e., id-situation) in one "part" (i.e., environment) can be related to some idsituation in some fixed other environment, nor is there a guarantee that an id-situation in one environment relates to at most one in the other environment For example, perhaps I inspect an email from Ed@Acme.com to Al@Acme.com. There is no reason to expect any id-actions relating to Ed's or Al's physical aspects; on the other hand, there might be several such id-actions. Resource situations and referenced events do not help here since they might simply be missing from the record for a given environment or duplicated with trivial changes.</p><p>We are forced to accept not functions between sets of tokens but rather relations between sets of tokens: for a given identity environment (i.e., classification) A, where C denotes the core, the relation 𝑓 ∨ : 𝑡𝑜𝑘(𝐶) ⟷ 𝑡𝑜𝑘(𝐴) in general relates some elements in tok(C) to multiple elements in tok(A) and relates some to no element in tok(A) (when the id-situations are "missing"). This requires us to relax the sum construction. The "core" is no longer unique, that is, the construction is no longer universal. We have, then, a cocone, but not a universal cocone (which is a sum). The token relations have to be constructed ad hoc for each environment. Some indication of how this is done was given in the above discussion, where, for various cases, we referred to various combinations of the idsituations, resource situations, and referenced events. The type function can remain a total function 𝑓 ∧ : 𝑡𝑦𝑝(𝐴) → 𝑡𝑦𝑝(𝐶) and must be such that the type of an id-situation in a given environment is reflected in its type in the core. We call such a function-relation pair (𝑓 ∧ , 𝑓 ∨ ) an id-map, denoted by undecorated 𝑓: 𝐴 → 𝐶. Instead of an information channel, we might refer to an identity channel.</p><p>Each identity proposition c |= γ in the core C can be given a confidence indicating that some identity proposition in one identity environment is evidence for some identity proposition in another environment. (Fig. <ref type="figure">3</ref> shows a variation with domains A i , A j , and A k , associated identity propositions a i |= α i , a j |= α j , and a k |= α k , respectively, and id-maps f i , f j , and f k , respectively.) Confidence in a core proposition is less than certainty since tokens corresponding to the connection token are "missing" in some environments. Note, however, that some environments may contribute more tokens, which would generally increase confidence. Fig. <ref type="figure">3</ref>. An identity channel with corresponding identity propositions for the "parts" and the "whole" (core). The confidence in the core proposition is the confidence that a proposition in a part carries the information expressed by any of the corresponding propositions in the other parts.</p><p>As mentioned, the partition of identity activity into environments is somewhat arbitrary. In particular, there is a general-to-specific hierarchy of environments. Fusion of identity types, therefore, is often a multistage process as one moves up this hierarchy on multiple branches. Indeed, in our sketches of three environments, we noted fusions within the environments. Since what are parts in Fig. <ref type="figure">3</ref> could themselves be cores in subsumed identity channels, we would typically associate a confidence less than 1.0 with the identity propositions associated with these parts.</p><p>Fusing types generally reduces confidence in identity propositions since fusion is an inductive process. On the other hand, fusion generally increases confidence in the identification of the players in the referenced events and asserted identities. For example, fusing the identity types relating to the email fom and picture of John Doe in Section 8 results in an identity proposition with confidence less than 1.0 but increases the confidence that we have put our finger on a particular person. The theory associated with the core of an identity channel can be thought of as merged constraints that pick out a noumenal individual (a sort of genotype) behind the id-situations that arise (collectively forming various phenotypes) from its interactions with the various environments. As we fuse more and more of the identity types, these constraints progressively narrow the field. Such increase in one aspect accompanied by a decrease in a mirror aspect is characteristic of Galois connections in category theory.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="10.">Conclusion and Future Work</head><p>We presented preliminary work on a framework for constructing identities that takes as its point of departure Barwise's channel theory, founded on category theory, and allied work on situation semantics and situation theory. The framework takes actions relating to identity, both judgments and assertions, as fundamental. Actions are events (with an agent), and events are basically situations, although situations can include larger regions of space and time and generally accommodate context. Identity-related situations are classified under (identity) types, which can be fused. Identity-related activity is partitioned according to the 'form of life' involved into (identity) environments, similar to Barwise's classifications. An identity-related action is often based on another identity-related action as a resource, and all these actions may reference events in an individual's life. The result is a layered picture of identityrelated situations, which is easily accommodated in situation theory. The category-theoretical constructs of Barwise's channel theory, however, must be relaxed when identity in multiple environments is considered. We explained the reasons for this and sketched what needs to be done to recover the category-theoretic foundation.</p><p>Identities in this framework retain references to the situations from which they are constructed, so provenance, context, and narrative detail are retained. The role of the "spectator," as well as those of the "subject" and "sample" (data or evidence), are acknowledged <ref type="bibr" target="#b13">(Stevenage et al. 2012)</ref>. The point of view here is that of an investigator assembling and analyzing evidence for identities. At this point, however, we do not focus on how identities may be discovered or constructed but rather focus on the structure of the evidence and the structure of the process by which identities may be induced from the evidence. Category theory is an ideal tool here since it is ultimate mathematics for representing and reasoning about structure.</p><p>We note that how individuals construct their identities in online settings has become an active area of research <ref type="bibr">(Poletti and Rak 2014)</ref>. We also suggest that our framework, being neutral regarding how identities are discovered or constructed, can be useful across a range of interests, including personal and group identity as addressed in psychology and the social sciences <ref type="bibr" target="#b13">(Vignoles et al. 2011</ref>).</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head></head><label></label><figDesc>Then a's being of type α carries the information that b is of type β, relative to channel C, if a and b are connected in C and if the translation α′ of α entails the translation β′ of β in the theory Th(C), where C is the core of 𝐶.(Barwise and  Seligman 1997, p.35)    </figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head></head><label></label><figDesc>Suppose we have environments A and B with id-maps f: A → C and g: B → C. Suppose also that c |= γ in the core has a certain confidence p ∈ [0, 1]. Let 𝑎 = 𝑔 ∨ (𝑐), 𝑏 = 𝑓 ∨ (𝑐), and 𝑔 ∧ (𝛼) = 𝑓 ∧ (𝛽) = 𝛾. Then a |= α carries the information that b |= β with confidence p (and vice versa).</figDesc></figure>
		</body>
		<back>
			<div type="annex">
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="8">Fusing Identity Types</head><p>Often the more interesting issues that arise regarding identity relate to fusing identities from several identity environments. Suppose we do the following. (i) We observe an email from John.Doe@Acme.com that states that he was at Joe's Bar at 11:00 PM on the eleventh (ii) We observe a picture of the inside of Joe's Bar taken at 11:00 PM on the eleventh that contains a face that closely matches the face in a picture labeled 'John Doe.' Call the situation that involves the id-action in (i) o 1 and the situation that involves the id-action in (ii) o 2 . Note that both involve a resource situation: in o 1 , it is the action of sending the email, and in o 2 it is the action of taking and labeling John's picture. The id-situation in (i) is of type, say, JohnDow OL , a type in the online environment, and we assert the identity proposition (1) o 1 |= JohnDow OL The id-situation in (ii) is of type, say, JohnDow Phy , a type in the physiological environment, and we assert the identity proposition (2) o 2 |= JohnDow Phy Apparently, there is a common referenced event, ref, of John Doe being at Joe's Bar at 11:00 PM on the eleventh.</p><p>If we judge that ref is indeed a common referenced event, we thereby fuse JohnDoe OL and JohnDoe Phy , forming the super-type, say, JohnDoe, and o 1 and o 2 are then taken as evidence for ref by way of propositions (1) and ( <ref type="formula">2</ref>). Now suppose the eleventh was a Saturday, and suppose we have the following. (i′) We observe an email from John.Doe@Acme.com that states that he was at Joe's Bar at 11:00 PM on the fourth (ii′) We observe a picture of the inside of Joe's Bar taken at 11:00 PM on the eighteenth that contains a face that closely matches the face in a picture labeled 'John Doe.' Call the situation that involves the id-action in (i′) o 1a and the situation that involves the id-action in (ii) o 2a . Both involve resource situations similar to those in o 1 and o 2 , respectively. The referenced event for o 1a , call it ref 1 , is John being in the bar at 11:00 PM on the fourth, and the referenced event for o 2a , call it ref 2 , is John being there at 11:00 on the eighteenth. We assert the following. (1′) o 1a |= JohnDow OL (2′) o 2a |= JohnDow Phy Id-situations (i′) and (ii′) may be further evidence, by way of propositions (1′) and (2′), for fusing JohnDow OL and JohnDow Phy . Fusing the identity types produces an additional correspondence between the referenced event ref, ref 1 , and ref 2 in that they involve the same identity type. These referenced events (and hence, indirectly, idsituations (i), (ii), (i′), and (ii′)) may provide evidence regarding John Doe's habit of visiting Joe's Bar Saturday evenings. A large number of diverse id-situations relating to a single, fused identity may allow us to build up not just a history of an individual but even a full-blown identity.</p><p>As another example, suppose we do the following. (iii) We determine that the DNA from skeletal remains found beneath a car park in Leicester match the DNA from the blood on a garment known to have been worn by Richard III. (iv) We read in a chronicle that Richard III was hastily buried at a certain location near medieval Leicester. Call the id-situation that involves the id-action in (iii) o 3 and the id-situation that involves the id-action in (iv) o 4 . Note that o 4 , but not o 3 , involves a resource situation, namely, the situation in which the chronicler wrote about Richard III's burial. The id-situation in (iii) is of type, say, RichardIII Phy , while that in (iv) is of type, say, RichardIII Soc , and we assert </p></div>			</div>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<monogr>
		<author>
			<persName><forename type="first">S</forename><surname>Awodey</surname></persName>
		</author>
		<title level="m">Category Theory</title>
				<meeting><address><addrLine>Oxford, UK</addrLine></address></meeting>
		<imprint>
			<publisher>Press</publisher>
			<date type="published" when="2010">2010</date>
		</imprint>
	</monogr>
	<note>2nd Ed.</note>
</biblStruct>

<biblStruct xml:id="b1">
	<monogr>
		<author>
			<persName><forename type="first">M</forename><surname>Barr</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Wells</surname></persName>
		</author>
		<title level="m">Category Theory for Computing Science</title>
				<meeting><address><addrLine>Upper Saddle River, NJ</addrLine></address></meeting>
		<imprint>
			<publisher>Prentice Hall</publisher>
			<date type="published" when="1990">1990</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<monogr>
		<author>
			<persName><forename type="first">J</forename><surname>Barwise</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Perry</surname></persName>
		</author>
		<title level="m">Situations and Attitudes</title>
				<meeting><address><addrLine>Cambridge, MA</addrLine></address></meeting>
		<imprint>
			<publisher>MIT Press</publisher>
			<date type="published" when="1984">1984</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Information Flow: The Logic of Distributed Systems</title>
		<author>
			<persName><forename type="first">J</forename><surname>Barwise</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Seligman</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="s">Cambridge Tracts in Theoretical Computer Science</title>
		<imprint>
			<biblScope unit="volume">44</biblScope>
			<date type="published" when="1997">1997</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<monogr>
		<title level="m" type="main">Logic and Information</title>
		<author>
			<persName><forename type="first">K</forename><surname>Devlin</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1991">1991</date>
			<publisher>Cambridge University Press</publisher>
			<pubPlace>Cambridge, UK</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<monogr>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">L</forename><surname>Fiadeiro</surname></persName>
		</author>
		<title level="m">Categories for Software Engineering</title>
				<meeting><address><addrLine>Berlin</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Theory-of-Mind Development: Retrospect and Prospect</title>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">H</forename><surname>Flavell</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Merrill-Palmer Quarterly</title>
		<imprint>
			<biblScope unit="volume">50</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="274" to="290" />
			<date type="published" when="2004">2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Simulating Minds: The Philosophy</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">I</forename><surname>Goldman</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Psychology, and Neuroscience of Mindreading (Philosophy of Mind)</title>
				<meeting><address><addrLine>Oxford</addrLine></address></meeting>
		<imprint>
			<publisher>Oxford University Press</publisher>
			<date type="published" when="2008">2008</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<monogr>
		<title level="m" type="main">Situations in Natural Language Semantics. The Stanford Encyclopedia of Philosophy</title>
		<author>
			<persName><forename type="first">A</forename><surname>Kratzer</surname></persName>
		</author>
		<editor>Edward N. Zalta</editor>
		<imprint>
			<date type="published" when="2011">2011</date>
			<pubPlace>Stanford, CA</pubPlace>
		</imprint>
		<respStmt>
			<orgName>CSLI, Stanford University</orgName>
		</respStmt>
	</monogr>
	<note>Fall 2011 Edition</note>
</biblStruct>

<biblStruct xml:id="b9">
	<monogr>
		<author>
			<persName><forename type="first">F</forename><forename type="middle">W</forename><surname>Lawvere</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">H</forename><surname>Schanuel</surname></persName>
		</author>
		<title level="m">Conceptual Mathematics. A First Introduction to Categories</title>
				<meeting><address><addrLine>Cambridge</addrLine></address></meeting>
		<imprint>
			<publisher>Cambridge University Press</publisher>
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
	<note>2 nd Ed</note>
</biblStruct>

<biblStruct xml:id="b10">
	<monogr>
		<title level="m" type="main">Categories for the Working Mathematician</title>
		<author>
			<persName><forename type="first">S</forename><surname>Maclane</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1998">1998</date>
			<publisher>Springer-Verlag</publisher>
			<pubPlace>New York</pubPlace>
		</imprint>
	</monogr>
	<note>2nd Ed.</note>
</biblStruct>

<biblStruct xml:id="b11">
	<monogr>
		<title level="m" type="main">Basic Category Theory for Computer Scientists</title>
		<author>
			<persName><forename type="first">B</forename><forename type="middle">C</forename><surname>Pierce</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1991">1991</date>
			<publisher>MIT Press</publisher>
			<pubPlace>Cambridge, MA</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">identity technologies</title>
		<author>
			<persName><forename type="first">J</forename></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">An Introduction to Category Theory</title>
				<editor>
			<persName><forename type="first">H</forename><surname>Simmons</surname></persName>
		</editor>
		<meeting><address><addrLine>Madisson, WI; Cambridge, UK</addrLine></address></meeting>
		<imprint>
			<publisher>Cambridge University Press</publisher>
			<date type="published" when="2011">2014. 2011</date>
		</imprint>
	</monogr>
	<note>Constructing the Self Online</note>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Introduction: Toward an Integrative View of Identity</title>
		<author>
			<persName><forename type="first">S</forename><surname>Stevenage</surname></persName>
		</author>
		<ptr target="http://www.southampton" />
	</analytic>
	<monogr>
		<title level="m">Philosophical Investigations: The German Text, with a Revised English Translation</title>
				<editor>
			<persName><forename type="first">G</forename><forename type="middle">E M</forename><surname>Anscombe</surname></persName>
		</editor>
		<meeting><address><addrLine>Southampton, UK; Hoboken, NJ</addrLine></address></meeting>
		<imprint>
			<publisher>Wiley-Blackwell</publisher>
			<date type="published" when="1991">2012. 2011. 1991</date>
			<biblScope unit="volume">3</biblScope>
		</imprint>
		<respStmt>
			<orgName>University of Southampton</orgName>
		</respStmt>
	</monogr>
	<note>Annual Report 2012, Super-Identity Project</note>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
