SlideShare a Scribd company logo
1 of 24
“Assessing the value of
anonymous communication
online”
Robert Bodle, PhD (USC)
Associate Professor of Communication and New
Media Studies, College of Mount St. Joseph
Anonymity as political freedom

              Khaled Mohamed Saeed (1982-2010)
Anonymity as political freedom




   Wael Ghonim
Tahrir Square 1/25/11
Insights
-anonymity instrumental in organizing protest

-human lives at risk

-online anonymity more difficult to achieve due to a fixed
user identity ecosystem
Fixed user identity ecosystem
                             Real Name Only Policy:
                             “Impersonating anyone or
                             anything is not permitted.”




“Essentially, we are moving beyond
the point of no return” (Solis, 2010)
Defining anonymity online
Basic conditions –

   1) an anonymous action is not linkable to
   someone’s identity

   2) two anonymous actions by the same person, are
   not linkable to each other (Clarke, Gauvin, Adams,
   2009)


Or, “nonidentifiability by virtue of noncoordinatability of
traits” (Wallace, 2008).
Facebook coordinates our traits


mashups
widgets
social games
social plug-ins



                  The “Like” button
A culture of sharing . . .




                     Sharing one's 'social graph'
One condition - ID is attached
                             Why?
                             Safety?

                             Civility?

                             Market incentive?




“Essentially, we are moving beyond
the point of no return” (Solis, 2010)
Facebook claims real names =
safety
“When everyone uses their real first and last
names, people can know who they're
connecting with. This helps keep our community
safe.”

“We take the safety of our community very
seriously. That's why we remove fake accounts
from the site as we find them.” (Facebook Help
Center)
the most vulnerable people are far
LESS safe when identifiable
  -a dissident who fears imprisonment, torture, and death

  -a gay teen who wants to reach out online without fear of
  their family finding out

  -a whistleblower who fears retribution

  -a person of faith who could be subject to religious
  persecution

  -a battered wife seeking shelter

  -a parent who wants their child to navigate safely online
“The Civilizing Effect” of real
names
                     “People behave a lot better
                     when they have their real
                     names down” - Randi
                     Zuckerberg, Marketing
                     Director of Facebook.
“The Civilizing Effect” of real
names
                     The connection between
                     civility and use of real
                     names is refuted by recent
                     studies on use of
                     pseudonyms online (Boniel-
                     Nissam & Barak, 2011;
                     Cho, 2011; Disqus, 2012).
Double edged attributes of
anonymity
The same attributes that have antisocial
outcomes also have beneficial ones . . .

•Minimizes accountability
•Disinhibition
•Deindividuation
Minimizes accountability

tempts criminals to act w/impunity
offers safety from reprisal
masks failure/builds confidence
Disinhibition

stupid, abusive, vile, hateful, dishonest speech
uninhibited public opinion
experimentation
intimacy
honest self disclosure
therapeutic value




                              “Anonymity is authenticity”
                              (Poole aka “Moot” 2011)
Deindividuation Effects

                              antinormative
                              behavior
                              group norms
                              community ID
                              high participation




Anonymous Collective Action
Human rights dimensions of
anonymity
              Anonymity supports fundamental
              freedoms and rights online

              •Privacy
              •Right to assemble
              •Freedom of expression
Democratic Rights and Freedoms

Anonymity enables political
expression that is “uninhibited,
robust, and wide-open” (Supreme
Court Justice Brennan, NY Times
v. Sullivan, 1960)

And . . .

“Protection from the tyranny of the
majority” (de Tocqueville 1835)

                          The authors used the pseudonym "Publius"
Democratic Rights and Freedoms

First Amendment protection of
anonymous communication
tolerates offensive speech to
allow for robust political debate,
including . . .

 “differences of opinion, scathing
dissent, and the risk of disorder”
(Bollinger, 2009).
Protect rights and freedoms online
and offline

                    Demand social media sites, services
                    provide:
                             -privacy
                             -pseudonyms
                             -anonymity
                             -freedom from surveillance

                    With global implications . . .
Thank you for your attention.

robert_bodle@mail.msj.edu

http://twitter.com/robertbodle
“Assessing the value of
anonymous communication
online”
Robert Bodle, PhD (USC)
Associate Professor of Communication and New
Media Studies, College of Mount St. Joseph

More Related Content

What's hot

Manipulation Through Mass Media
Manipulation Through Mass MediaManipulation Through Mass Media
Manipulation Through Mass MediaIulia Bilbie
 
Communication Theories - Knowledge Gap & Modernization Theory
Communication Theories - Knowledge Gap & Modernization Theory Communication Theories - Knowledge Gap & Modernization Theory
Communication Theories - Knowledge Gap & Modernization Theory Alyssa G. Lobo
 
Use and Gratification Model
Use and Gratification ModelUse and Gratification Model
Use and Gratification ModelDavid Phillips
 
Privacy: why we should care
Privacy: why we should carePrivacy: why we should care
Privacy: why we should careShushan Harutyunyan
 
Here Comes Everybody by Clay Shirky
Here Comes Everybody by Clay ShirkyHere Comes Everybody by Clay Shirky
Here Comes Everybody by Clay ShirkyLaurenAParr
 
media effects and theories
media effects and theoriesmedia effects and theories
media effects and theoriesafi123
 
Completed Portfolio for Linkedin
Completed Portfolio for LinkedinCompleted Portfolio for Linkedin
Completed Portfolio for LinkedinMatthew Darrington
 
Understanding influence in social media
Understanding influence in social media Understanding influence in social media
Understanding influence in social media Pulsar Platform
 
Social Influence: From the Two-step flow of communication to digital influence
Social Influence: From the Two-step flow of communication to digital influenceSocial Influence: From the Two-step flow of communication to digital influence
Social Influence: From the Two-step flow of communication to digital influenceMatthew J. Kushin, Ph.D.
 
Social media presentation
Social media presentationSocial media presentation
Social media presentationRukayat Oloko
 
Are Filter Bubbles Real?
Are Filter Bubbles Real?Are Filter Bubbles Real?
Are Filter Bubbles Real?Axel Bruns
 
The right contexts for virtual ethnography
The right contexts for virtual ethnographyThe right contexts for virtual ethnography
The right contexts for virtual ethnographydavidbrake
 
COM 101 Chapter 1
COM 101 Chapter 1COM 101 Chapter 1
COM 101 Chapter 1Val Bello
 
The uses and gratification theory
The uses and gratification theoryThe uses and gratification theory
The uses and gratification theorysophypurchon
 

What's hot (20)

Manipulation Through Mass Media
Manipulation Through Mass MediaManipulation Through Mass Media
Manipulation Through Mass Media
 
Communication Theories - Knowledge Gap & Modernization Theory
Communication Theories - Knowledge Gap & Modernization Theory Communication Theories - Knowledge Gap & Modernization Theory
Communication Theories - Knowledge Gap & Modernization Theory
 
Elaine kasket
Elaine kasketElaine kasket
Elaine kasket
 
Use and Gratification Model
Use and Gratification ModelUse and Gratification Model
Use and Gratification Model
 
Privacy: why we should care
Privacy: why we should carePrivacy: why we should care
Privacy: why we should care
 
Week2
Week2Week2
Week2
 
Here Comes Everybody by Clay Shirky
Here Comes Everybody by Clay ShirkyHere Comes Everybody by Clay Shirky
Here Comes Everybody by Clay Shirky
 
media effects and theories
media effects and theoriesmedia effects and theories
media effects and theories
 
Completed Portfolio for Linkedin
Completed Portfolio for LinkedinCompleted Portfolio for Linkedin
Completed Portfolio for Linkedin
 
2015 gv salzburg
2015 gv salzburg2015 gv salzburg
2015 gv salzburg
 
Understanding influence in social media
Understanding influence in social media Understanding influence in social media
Understanding influence in social media
 
Social Influence: From the Two-step flow of communication to digital influence
Social Influence: From the Two-step flow of communication to digital influenceSocial Influence: From the Two-step flow of communication to digital influence
Social Influence: From the Two-step flow of communication to digital influence
 
Social media presentation
Social media presentationSocial media presentation
Social media presentation
 
Are Filter Bubbles Real?
Are Filter Bubbles Real?Are Filter Bubbles Real?
Are Filter Bubbles Real?
 
Clay shirky
Clay shirkyClay shirky
Clay shirky
 
The right contexts for virtual ethnography
The right contexts for virtual ethnographyThe right contexts for virtual ethnography
The right contexts for virtual ethnography
 
COM 101 Chapter 1
COM 101 Chapter 1COM 101 Chapter 1
COM 101 Chapter 1
 
Two step flow of information
Two step flow of informationTwo step flow of information
Two step flow of information
 
The uses and gratification theory
The uses and gratification theoryThe uses and gratification theory
The uses and gratification theory
 
Sm
SmSm
Sm
 

Similar to Online anonymity

Cepe11 bodle upload
Cepe11 bodle uploadCepe11 bodle upload
Cepe11 bodle uploadRobert Bodle
 
Social Media and Anonymity
Social Media and AnonymitySocial Media and Anonymity
Social Media and AnonymityPaul Honke
 
Social Networking
Social NetworkingSocial Networking
Social Networkingguest1b0960
 
Dynamics of Online Identity Creation - Katerina Dineva @ Glocal: Inside Socia...
Dynamics of Online Identity Creation - Katerina Dineva @ Glocal: Inside Socia...Dynamics of Online Identity Creation - Katerina Dineva @ Glocal: Inside Socia...
Dynamics of Online Identity Creation - Katerina Dineva @ Glocal: Inside Socia...NewMediaMK
 
Designing Effective Science Communication
Designing Effective Science CommunicationDesigning Effective Science Communication
Designing Effective Science CommunicationJennifer Briselli
 
Fys social media_debate_paper
Fys social media_debate_paperFys social media_debate_paper
Fys social media_debate_papertshoe
 
Citizen (Online / Social) Media Ethics
Citizen (Online / Social) Media EthicsCitizen (Online / Social) Media Ethics
Citizen (Online / Social) Media EthicsICT Watch - Indonesia
 
Fys social media_debate_paper
Fys social media_debate_paperFys social media_debate_paper
Fys social media_debate_papertshoe
 
Social media Hurting Society
Social media Hurting SocietySocial media Hurting Society
Social media Hurting Societyemmaclare88
 
Cyberbullying jaffe ryan
Cyberbullying jaffe ryanCyberbullying jaffe ryan
Cyberbullying jaffe ryanshjaffe
 
Facebook and bullying
Facebook and bullyingFacebook and bullying
Facebook and bullyingdelmount
 
Social Media Paper
Social Media Paper Social Media Paper
Social Media Paper handleyrr
 
The Handwriting on the Wall: The Pros and Cons of Social Media Use Among Teens
The Handwriting on the Wall: The Pros and Cons of Social Media Use Among TeensThe Handwriting on the Wall: The Pros and Cons of Social Media Use Among Teens
The Handwriting on the Wall: The Pros and Cons of Social Media Use Among TeensProphetik Soul Branding + Design
 
Reputation & risk: sexting, trolling and girlfriend revenge sites
Reputation & risk: sexting, trolling and girlfriend revenge sitesReputation & risk: sexting, trolling and girlfriend revenge sites
Reputation & risk: sexting, trolling and girlfriend revenge sitesRob Jewitt
 
Mac Social Media And The New Publicness
Mac Social Media And The New PublicnessMac Social Media And The New Publicness
Mac Social Media And The New PublicnessRob Jewitt
 

Similar to Online anonymity (20)

Cepe11 bodle upload
Cepe11 bodle uploadCepe11 bodle upload
Cepe11 bodle upload
 
Social Media and Anonymity
Social Media and AnonymitySocial Media and Anonymity
Social Media and Anonymity
 
Social Networking
Social NetworkingSocial Networking
Social Networking
 
Dynamics of Online Identity Creation - Katerina Dineva @ Glocal: Inside Socia...
Dynamics of Online Identity Creation - Katerina Dineva @ Glocal: Inside Socia...Dynamics of Online Identity Creation - Katerina Dineva @ Glocal: Inside Socia...
Dynamics of Online Identity Creation - Katerina Dineva @ Glocal: Inside Socia...
 
Designing Effective Science Communication
Designing Effective Science CommunicationDesigning Effective Science Communication
Designing Effective Science Communication
 
Defining Censorship
Defining CensorshipDefining Censorship
Defining Censorship
 
Fys social media_debate_paper
Fys social media_debate_paperFys social media_debate_paper
Fys social media_debate_paper
 
Citizen (Online / Social) Media Ethics
Citizen (Online / Social) Media EthicsCitizen (Online / Social) Media Ethics
Citizen (Online / Social) Media Ethics
 
Fys social media_debate_paper
Fys social media_debate_paperFys social media_debate_paper
Fys social media_debate_paper
 
Social media Hurting Society
Social media Hurting SocietySocial media Hurting Society
Social media Hurting Society
 
Cyberbullying jaffe ryan
Cyberbullying jaffe ryanCyberbullying jaffe ryan
Cyberbullying jaffe ryan
 
Facebook and bullying
Facebook and bullyingFacebook and bullying
Facebook and bullying
 
Social Media Paper
Social Media Paper Social Media Paper
Social Media Paper
 
The Handwriting on the Wall: The Pros and Cons of Social Media Use Among Teens
The Handwriting on the Wall: The Pros and Cons of Social Media Use Among TeensThe Handwriting on the Wall: The Pros and Cons of Social Media Use Among Teens
The Handwriting on the Wall: The Pros and Cons of Social Media Use Among Teens
 
Fys rp
Fys rpFys rp
Fys rp
 
Jacey
JaceyJacey
Jacey
 
Reputation & risk: sexting, trolling and girlfriend revenge sites
Reputation & risk: sexting, trolling and girlfriend revenge sitesReputation & risk: sexting, trolling and girlfriend revenge sites
Reputation & risk: sexting, trolling and girlfriend revenge sites
 
Mac Social Media And The New Publicness
Mac Social Media And The New PublicnessMac Social Media And The New Publicness
Mac Social Media And The New Publicness
 
Sm
SmSm
Sm
 
Selina Rust Libel
Selina Rust LibelSelina Rust Libel
Selina Rust Libel
 

More from Robert Bodle

Com 310 last class
Com 310 last classCom 310 last class
Com 310 last classRobert Bodle
 
Com 310 memes
Com 310 memesCom 310 memes
Com 310 memesRobert Bodle
 
Business ethics talk
Business ethics talkBusiness ethics talk
Business ethics talkRobert Bodle
 
Bodle research
Bodle researchBodle research
Bodle researchRobert Bodle
 
Bodle research
Bodle researchBodle research
Bodle researchRobert Bodle
 
Com 315 week11.2
Com 315 week11.2Com 315 week11.2
Com 315 week11.2Robert Bodle
 
Com 315 week11.1
Com 315 week11.1Com 315 week11.1
Com 315 week11.1Robert Bodle
 
Ir11 bodle final
Ir11 bodle finalIr11 bodle final
Ir11 bodle finalRobert Bodle
 
Com354 week.7
Com354  week.7Com354  week.7
Com354 week.7Robert Bodle
 
VisCom mweek1
VisCom mweek1VisCom mweek1
VisCom mweek1Robert Bodle
 
Word pressintheclassroom
Word pressintheclassroomWord pressintheclassroom
Word pressintheclassroomRobert Bodle
 
Photographers
PhotographersPhotographers
PhotographersRobert Bodle
 

More from Robert Bodle (15)

Com 310 last class
Com 310 last classCom 310 last class
Com 310 last class
 
Com 310 memes
Com 310 memesCom 310 memes
Com 310 memes
 
Business ethics talk
Business ethics talkBusiness ethics talk
Business ethics talk
 
Bodle research
Bodle researchBodle research
Bodle research
 
Bodle research
Bodle researchBodle research
Bodle research
 
Com 315 week11.2
Com 315 week11.2Com 315 week11.2
Com 315 week11.2
 
Com 315 week11.1
Com 315 week11.1Com 315 week11.1
Com 315 week11.1
 
Ir11 bodle final
Ir11 bodle finalIr11 bodle final
Ir11 bodle final
 
Com354 week.7
Com354  week.7Com354  week.7
Com354 week.7
 
VisCom mweek1
VisCom mweek1VisCom mweek1
VisCom mweek1
 
Word pressintheclassroom
Word pressintheclassroomWord pressintheclassroom
Word pressintheclassroom
 
Photographers
PhotographersPhotographers
Photographers
 
Composition
CompositionComposition
Composition
 
Composition
CompositionComposition
Composition
 
Excel Talk
Excel TalkExcel Talk
Excel Talk
 

Recently uploaded

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 

Recently uploaded (20)

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 

Online anonymity

  • 1. “Assessing the value of anonymous communication online” Robert Bodle, PhD (USC) Associate Professor of Communication and New Media Studies, College of Mount St. Joseph
  • 2. Anonymity as political freedom Khaled Mohamed Saeed (1982-2010)
  • 3. Anonymity as political freedom Wael Ghonim
  • 5. Insights -anonymity instrumental in organizing protest -human lives at risk -online anonymity more difficult to achieve due to a fixed user identity ecosystem
  • 6. Fixed user identity ecosystem Real Name Only Policy: “Impersonating anyone or anything is not permitted.” “Essentially, we are moving beyond the point of no return” (Solis, 2010)
  • 7. Defining anonymity online Basic conditions – 1) an anonymous action is not linkable to someone’s identity 2) two anonymous actions by the same person, are not linkable to each other (Clarke, Gauvin, Adams, 2009) Or, “nonidentifiability by virtue of noncoordinatability of traits” (Wallace, 2008).
  • 8. Facebook coordinates our traits mashups widgets social games social plug-ins The “Like” button
  • 9. A culture of sharing . . . Sharing one's 'social graph'
  • 10. One condition - ID is attached Why? Safety? Civility? Market incentive? “Essentially, we are moving beyond the point of no return” (Solis, 2010)
  • 11. Facebook claims real names = safety “When everyone uses their real first and last names, people can know who they're connecting with. This helps keep our community safe.” “We take the safety of our community very seriously. That's why we remove fake accounts from the site as we find them.” (Facebook Help Center)
  • 12. the most vulnerable people are far LESS safe when identifiable -a dissident who fears imprisonment, torture, and death -a gay teen who wants to reach out online without fear of their family finding out -a whistleblower who fears retribution -a person of faith who could be subject to religious persecution -a battered wife seeking shelter -a parent who wants their child to navigate safely online
  • 13. “The Civilizing Effect” of real names “People behave a lot better when they have their real names down” - Randi Zuckerberg, Marketing Director of Facebook.
  • 14. “The Civilizing Effect” of real names The connection between civility and use of real names is refuted by recent studies on use of pseudonyms online (Boniel- Nissam & Barak, 2011; Cho, 2011; Disqus, 2012).
  • 15. Double edged attributes of anonymity The same attributes that have antisocial outcomes also have beneficial ones . . . •Minimizes accountability •Disinhibition •Deindividuation
  • 16. Minimizes accountability tempts criminals to act w/impunity offers safety from reprisal masks failure/builds confidence
  • 17. Disinhibition stupid, abusive, vile, hateful, dishonest speech uninhibited public opinion experimentation intimacy honest self disclosure therapeutic value “Anonymity is authenticity” (Poole aka “Moot” 2011)
  • 18. Deindividuation Effects antinormative behavior group norms community ID high participation Anonymous Collective Action
  • 19. Human rights dimensions of anonymity Anonymity supports fundamental freedoms and rights online •Privacy •Right to assemble •Freedom of expression
  • 20. Democratic Rights and Freedoms Anonymity enables political expression that is “uninhibited, robust, and wide-open” (Supreme Court Justice Brennan, NY Times v. Sullivan, 1960) And . . . “Protection from the tyranny of the majority” (de Tocqueville 1835) The authors used the pseudonym "Publius"
  • 21. Democratic Rights and Freedoms First Amendment protection of anonymous communication tolerates offensive speech to allow for robust political debate, including . . . “differences of opinion, scathing dissent, and the risk of disorder” (Bollinger, 2009).
  • 22. Protect rights and freedoms online and offline Demand social media sites, services provide: -privacy -pseudonyms -anonymity -freedom from surveillance With global implications . . .
  • 23. Thank you for your attention. robert_bodle@mail.msj.edu http://twitter.com/robertbodle
  • 24. “Assessing the value of anonymous communication online” Robert Bodle, PhD (USC) Associate Professor of Communication and New Media Studies, College of Mount St. Joseph

Editor's Notes

  1. To understant