SlideShare uma empresa Scribd logo
1 de 24
“Assessing the value of
anonymous communication
online”
Robert Bodle, PhD (USC)
Associate Professor of Communication and New
Media Studies, College of Mount St. Joseph
Anonymity as political freedom

              Khaled Mohamed Saeed (1982-2010)
Anonymity as political freedom




   Wael Ghonim
Tahrir Square 1/25/11
Insights
-anonymity instrumental in organizing protest

-human lives at risk

-online anonymity more difficult to achieve due to a fixed
user identity ecosystem
Fixed user identity ecosystem
                             Real Name Only Policy:
                             “Impersonating anyone or
                             anything is not permitted.”




“Essentially, we are moving beyond
the point of no return” (Solis, 2010)
Defining anonymity online
Basic conditions –

   1) an anonymous action is not linkable to
   someone’s identity

   2) two anonymous actions by the same person, are
   not linkable to each other (Clarke, Gauvin, Adams,
   2009)


Or, “nonidentifiability by virtue of noncoordinatability of
traits” (Wallace, 2008).
Facebook coordinates our traits


mashups
widgets
social games
social plug-ins



                  The “Like” button
A culture of sharing . . .




                     Sharing one's 'social graph'
One condition - ID is attached
                             Why?
                             Safety?

                             Civility?

                             Market incentive?




“Essentially, we are moving beyond
the point of no return” (Solis, 2010)
Facebook claims real names =
safety
“When everyone uses their real first and last
names, people can know who they're
connecting with. This helps keep our community
safe.”

“We take the safety of our community very
seriously. That's why we remove fake accounts
from the site as we find them.” (Facebook Help
Center)
the most vulnerable people are far
LESS safe when identifiable
  -a dissident who fears imprisonment, torture, and death

  -a gay teen who wants to reach out online without fear of
  their family finding out

  -a whistleblower who fears retribution

  -a person of faith who could be subject to religious
  persecution

  -a battered wife seeking shelter

  -a parent who wants their child to navigate safely online
“The Civilizing Effect” of real
names
                     “People behave a lot better
                     when they have their real
                     names down” - Randi
                     Zuckerberg, Marketing
                     Director of Facebook.
“The Civilizing Effect” of real
names
                     The connection between
                     civility and use of real
                     names is refuted by recent
                     studies on use of
                     pseudonyms online (Boniel-
                     Nissam & Barak, 2011;
                     Cho, 2011; Disqus, 2012).
Double edged attributes of
anonymity
The same attributes that have antisocial
outcomes also have beneficial ones . . .

•Minimizes accountability
•Disinhibition
•Deindividuation
Minimizes accountability

tempts criminals to act w/impunity
offers safety from reprisal
masks failure/builds confidence
Disinhibition

stupid, abusive, vile, hateful, dishonest speech
uninhibited public opinion
experimentation
intimacy
honest self disclosure
therapeutic value




                              “Anonymity is authenticity”
                              (Poole aka “Moot” 2011)
Deindividuation Effects

                              antinormative
                              behavior
                              group norms
                              community ID
                              high participation




Anonymous Collective Action
Human rights dimensions of
anonymity
              Anonymity supports fundamental
              freedoms and rights online

              •Privacy
              •Right to assemble
              •Freedom of expression
Democratic Rights and Freedoms

Anonymity enables political
expression that is “uninhibited,
robust, and wide-open” (Supreme
Court Justice Brennan, NY Times
v. Sullivan, 1960)

And . . .

“Protection from the tyranny of the
majority” (de Tocqueville 1835)

                          The authors used the pseudonym "Publius"
Democratic Rights and Freedoms

First Amendment protection of
anonymous communication
tolerates offensive speech to
allow for robust political debate,
including . . .

 “differences of opinion, scathing
dissent, and the risk of disorder”
(Bollinger, 2009).
Protect rights and freedoms online
and offline

                    Demand social media sites, services
                    provide:
                             -privacy
                             -pseudonyms
                             -anonymity
                             -freedom from surveillance

                    With global implications . . .
Thank you for your attention.

robert_bodle@mail.msj.edu

http://twitter.com/robertbodle
“Assessing the value of
anonymous communication
online”
Robert Bodle, PhD (USC)
Associate Professor of Communication and New
Media Studies, College of Mount St. Joseph

Mais conteúdo relacionado

Mais procurados

Manipulation Through Mass Media
Manipulation Through Mass MediaManipulation Through Mass Media
Manipulation Through Mass MediaIulia Bilbie
 
Communication Theories - Knowledge Gap & Modernization Theory
Communication Theories - Knowledge Gap & Modernization Theory Communication Theories - Knowledge Gap & Modernization Theory
Communication Theories - Knowledge Gap & Modernization Theory Alyssa G. Lobo
 
Use and Gratification Model
Use and Gratification ModelUse and Gratification Model
Use and Gratification ModelDavid Phillips
 
Here Comes Everybody by Clay Shirky
Here Comes Everybody by Clay ShirkyHere Comes Everybody by Clay Shirky
Here Comes Everybody by Clay ShirkyLaurenAParr
 
media effects and theories
media effects and theoriesmedia effects and theories
media effects and theoriesafi123
 
Completed Portfolio for Linkedin
Completed Portfolio for LinkedinCompleted Portfolio for Linkedin
Completed Portfolio for LinkedinMatthew Darrington
 
Understanding influence in social media
Understanding influence in social media Understanding influence in social media
Understanding influence in social media Pulsar Platform
 
Social Influence: From the Two-step flow of communication to digital influence
Social Influence: From the Two-step flow of communication to digital influenceSocial Influence: From the Two-step flow of communication to digital influence
Social Influence: From the Two-step flow of communication to digital influenceMatthew J. Kushin, Ph.D.
 
Social media presentation
Social media presentationSocial media presentation
Social media presentationRukayat Oloko
 
Are Filter Bubbles Real?
Are Filter Bubbles Real?Are Filter Bubbles Real?
Are Filter Bubbles Real?Axel Bruns
 
The right contexts for virtual ethnography
The right contexts for virtual ethnographyThe right contexts for virtual ethnography
The right contexts for virtual ethnographydavidbrake
 
COM 101 Chapter 1
COM 101 Chapter 1COM 101 Chapter 1
COM 101 Chapter 1Val Bello
 
The uses and gratification theory
The uses and gratification theoryThe uses and gratification theory
The uses and gratification theorysophypurchon
 

Mais procurados (20)

Manipulation Through Mass Media
Manipulation Through Mass MediaManipulation Through Mass Media
Manipulation Through Mass Media
 
Communication Theories - Knowledge Gap & Modernization Theory
Communication Theories - Knowledge Gap & Modernization Theory Communication Theories - Knowledge Gap & Modernization Theory
Communication Theories - Knowledge Gap & Modernization Theory
 
Elaine kasket
Elaine kasketElaine kasket
Elaine kasket
 
Use and Gratification Model
Use and Gratification ModelUse and Gratification Model
Use and Gratification Model
 
Privacy: why we should care
Privacy: why we should carePrivacy: why we should care
Privacy: why we should care
 
Week2
Week2Week2
Week2
 
Here Comes Everybody by Clay Shirky
Here Comes Everybody by Clay ShirkyHere Comes Everybody by Clay Shirky
Here Comes Everybody by Clay Shirky
 
media effects and theories
media effects and theoriesmedia effects and theories
media effects and theories
 
Completed Portfolio for Linkedin
Completed Portfolio for LinkedinCompleted Portfolio for Linkedin
Completed Portfolio for Linkedin
 
2015 gv salzburg
2015 gv salzburg2015 gv salzburg
2015 gv salzburg
 
Understanding influence in social media
Understanding influence in social media Understanding influence in social media
Understanding influence in social media
 
Social Influence: From the Two-step flow of communication to digital influence
Social Influence: From the Two-step flow of communication to digital influenceSocial Influence: From the Two-step flow of communication to digital influence
Social Influence: From the Two-step flow of communication to digital influence
 
Social media presentation
Social media presentationSocial media presentation
Social media presentation
 
Are Filter Bubbles Real?
Are Filter Bubbles Real?Are Filter Bubbles Real?
Are Filter Bubbles Real?
 
Clay shirky
Clay shirkyClay shirky
Clay shirky
 
The right contexts for virtual ethnography
The right contexts for virtual ethnographyThe right contexts for virtual ethnography
The right contexts for virtual ethnography
 
COM 101 Chapter 1
COM 101 Chapter 1COM 101 Chapter 1
COM 101 Chapter 1
 
Two step flow of information
Two step flow of informationTwo step flow of information
Two step flow of information
 
The uses and gratification theory
The uses and gratification theoryThe uses and gratification theory
The uses and gratification theory
 
Sm
SmSm
Sm
 

Semelhante a Online anonymity

Cepe11 bodle upload
Cepe11 bodle uploadCepe11 bodle upload
Cepe11 bodle uploadRobert Bodle
 
Social Media and Anonymity
Social Media and AnonymitySocial Media and Anonymity
Social Media and AnonymityPaul Honke
 
Social Networking
Social NetworkingSocial Networking
Social Networkingguest1b0960
 
Dynamics of Online Identity Creation - Katerina Dineva @ Glocal: Inside Socia...
Dynamics of Online Identity Creation - Katerina Dineva @ Glocal: Inside Socia...Dynamics of Online Identity Creation - Katerina Dineva @ Glocal: Inside Socia...
Dynamics of Online Identity Creation - Katerina Dineva @ Glocal: Inside Socia...NewMediaMK
 
Designing Effective Science Communication
Designing Effective Science CommunicationDesigning Effective Science Communication
Designing Effective Science CommunicationJennifer Briselli
 
Fys social media_debate_paper
Fys social media_debate_paperFys social media_debate_paper
Fys social media_debate_papertshoe
 
Citizen (Online / Social) Media Ethics
Citizen (Online / Social) Media EthicsCitizen (Online / Social) Media Ethics
Citizen (Online / Social) Media EthicsICT Watch - Indonesia
 
Fys social media_debate_paper
Fys social media_debate_paperFys social media_debate_paper
Fys social media_debate_papertshoe
 
Social media Hurting Society
Social media Hurting SocietySocial media Hurting Society
Social media Hurting Societyemmaclare88
 
Cyberbullying jaffe ryan
Cyberbullying jaffe ryanCyberbullying jaffe ryan
Cyberbullying jaffe ryanshjaffe
 
Facebook and bullying
Facebook and bullyingFacebook and bullying
Facebook and bullyingdelmount
 
Social Media Paper
Social Media Paper Social Media Paper
Social Media Paper handleyrr
 
The Handwriting on the Wall: The Pros and Cons of Social Media Use Among Teens
The Handwriting on the Wall: The Pros and Cons of Social Media Use Among TeensThe Handwriting on the Wall: The Pros and Cons of Social Media Use Among Teens
The Handwriting on the Wall: The Pros and Cons of Social Media Use Among TeensProphetik Soul Branding + Design
 
Reputation & risk: sexting, trolling and girlfriend revenge sites
Reputation & risk: sexting, trolling and girlfriend revenge sitesReputation & risk: sexting, trolling and girlfriend revenge sites
Reputation & risk: sexting, trolling and girlfriend revenge sitesRob Jewitt
 
Mac Social Media And The New Publicness
Mac Social Media And The New PublicnessMac Social Media And The New Publicness
Mac Social Media And The New PublicnessRob Jewitt
 

Semelhante a Online anonymity (20)

Cepe11 bodle upload
Cepe11 bodle uploadCepe11 bodle upload
Cepe11 bodle upload
 
Social Media and Anonymity
Social Media and AnonymitySocial Media and Anonymity
Social Media and Anonymity
 
Social Networking
Social NetworkingSocial Networking
Social Networking
 
Dynamics of Online Identity Creation - Katerina Dineva @ Glocal: Inside Socia...
Dynamics of Online Identity Creation - Katerina Dineva @ Glocal: Inside Socia...Dynamics of Online Identity Creation - Katerina Dineva @ Glocal: Inside Socia...
Dynamics of Online Identity Creation - Katerina Dineva @ Glocal: Inside Socia...
 
Designing Effective Science Communication
Designing Effective Science CommunicationDesigning Effective Science Communication
Designing Effective Science Communication
 
Defining Censorship
Defining CensorshipDefining Censorship
Defining Censorship
 
Fys social media_debate_paper
Fys social media_debate_paperFys social media_debate_paper
Fys social media_debate_paper
 
Citizen (Online / Social) Media Ethics
Citizen (Online / Social) Media EthicsCitizen (Online / Social) Media Ethics
Citizen (Online / Social) Media Ethics
 
Fys social media_debate_paper
Fys social media_debate_paperFys social media_debate_paper
Fys social media_debate_paper
 
Social media Hurting Society
Social media Hurting SocietySocial media Hurting Society
Social media Hurting Society
 
Cyberbullying jaffe ryan
Cyberbullying jaffe ryanCyberbullying jaffe ryan
Cyberbullying jaffe ryan
 
Facebook and bullying
Facebook and bullyingFacebook and bullying
Facebook and bullying
 
Social Media Paper
Social Media Paper Social Media Paper
Social Media Paper
 
The Handwriting on the Wall: The Pros and Cons of Social Media Use Among Teens
The Handwriting on the Wall: The Pros and Cons of Social Media Use Among TeensThe Handwriting on the Wall: The Pros and Cons of Social Media Use Among Teens
The Handwriting on the Wall: The Pros and Cons of Social Media Use Among Teens
 
Fys rp
Fys rpFys rp
Fys rp
 
Jacey
JaceyJacey
Jacey
 
Reputation & risk: sexting, trolling and girlfriend revenge sites
Reputation & risk: sexting, trolling and girlfriend revenge sitesReputation & risk: sexting, trolling and girlfriend revenge sites
Reputation & risk: sexting, trolling and girlfriend revenge sites
 
Mac Social Media And The New Publicness
Mac Social Media And The New PublicnessMac Social Media And The New Publicness
Mac Social Media And The New Publicness
 
Sm
SmSm
Sm
 
Selina Rust Libel
Selina Rust LibelSelina Rust Libel
Selina Rust Libel
 

Mais de Robert Bodle

Mais de Robert Bodle (15)

Com 310 last class
Com 310 last classCom 310 last class
Com 310 last class
 
Com 310 memes
Com 310 memesCom 310 memes
Com 310 memes
 
Business ethics talk
Business ethics talkBusiness ethics talk
Business ethics talk
 
Bodle research
Bodle researchBodle research
Bodle research
 
Bodle research
Bodle researchBodle research
Bodle research
 
Com 315 week11.2
Com 315 week11.2Com 315 week11.2
Com 315 week11.2
 
Com 315 week11.1
Com 315 week11.1Com 315 week11.1
Com 315 week11.1
 
Ir11 bodle final
Ir11 bodle finalIr11 bodle final
Ir11 bodle final
 
Com354 week.7
Com354  week.7Com354  week.7
Com354 week.7
 
VisCom mweek1
VisCom mweek1VisCom mweek1
VisCom mweek1
 
Word pressintheclassroom
Word pressintheclassroomWord pressintheclassroom
Word pressintheclassroom
 
Photographers
PhotographersPhotographers
Photographers
 
Composition
CompositionComposition
Composition
 
Composition
CompositionComposition
Composition
 
Excel Talk
Excel TalkExcel Talk
Excel Talk
 

Último

New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 

Último (20)

New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 

Online anonymity

  • 1. “Assessing the value of anonymous communication online” Robert Bodle, PhD (USC) Associate Professor of Communication and New Media Studies, College of Mount St. Joseph
  • 2. Anonymity as political freedom Khaled Mohamed Saeed (1982-2010)
  • 3. Anonymity as political freedom Wael Ghonim
  • 5. Insights -anonymity instrumental in organizing protest -human lives at risk -online anonymity more difficult to achieve due to a fixed user identity ecosystem
  • 6. Fixed user identity ecosystem Real Name Only Policy: “Impersonating anyone or anything is not permitted.” “Essentially, we are moving beyond the point of no return” (Solis, 2010)
  • 7. Defining anonymity online Basic conditions – 1) an anonymous action is not linkable to someone’s identity 2) two anonymous actions by the same person, are not linkable to each other (Clarke, Gauvin, Adams, 2009) Or, “nonidentifiability by virtue of noncoordinatability of traits” (Wallace, 2008).
  • 8. Facebook coordinates our traits mashups widgets social games social plug-ins The “Like” button
  • 9. A culture of sharing . . . Sharing one's 'social graph'
  • 10. One condition - ID is attached Why? Safety? Civility? Market incentive? “Essentially, we are moving beyond the point of no return” (Solis, 2010)
  • 11. Facebook claims real names = safety “When everyone uses their real first and last names, people can know who they're connecting with. This helps keep our community safe.” “We take the safety of our community very seriously. That's why we remove fake accounts from the site as we find them.” (Facebook Help Center)
  • 12. the most vulnerable people are far LESS safe when identifiable -a dissident who fears imprisonment, torture, and death -a gay teen who wants to reach out online without fear of their family finding out -a whistleblower who fears retribution -a person of faith who could be subject to religious persecution -a battered wife seeking shelter -a parent who wants their child to navigate safely online
  • 13. “The Civilizing Effect” of real names “People behave a lot better when they have their real names down” - Randi Zuckerberg, Marketing Director of Facebook.
  • 14. “The Civilizing Effect” of real names The connection between civility and use of real names is refuted by recent studies on use of pseudonyms online (Boniel- Nissam & Barak, 2011; Cho, 2011; Disqus, 2012).
  • 15. Double edged attributes of anonymity The same attributes that have antisocial outcomes also have beneficial ones . . . •Minimizes accountability •Disinhibition •Deindividuation
  • 16. Minimizes accountability tempts criminals to act w/impunity offers safety from reprisal masks failure/builds confidence
  • 17. Disinhibition stupid, abusive, vile, hateful, dishonest speech uninhibited public opinion experimentation intimacy honest self disclosure therapeutic value “Anonymity is authenticity” (Poole aka “Moot” 2011)
  • 18. Deindividuation Effects antinormative behavior group norms community ID high participation Anonymous Collective Action
  • 19. Human rights dimensions of anonymity Anonymity supports fundamental freedoms and rights online •Privacy •Right to assemble •Freedom of expression
  • 20. Democratic Rights and Freedoms Anonymity enables political expression that is “uninhibited, robust, and wide-open” (Supreme Court Justice Brennan, NY Times v. Sullivan, 1960) And . . . “Protection from the tyranny of the majority” (de Tocqueville 1835) The authors used the pseudonym "Publius"
  • 21. Democratic Rights and Freedoms First Amendment protection of anonymous communication tolerates offensive speech to allow for robust political debate, including . . . “differences of opinion, scathing dissent, and the risk of disorder” (Bollinger, 2009).
  • 22. Protect rights and freedoms online and offline Demand social media sites, services provide: -privacy -pseudonyms -anonymity -freedom from surveillance With global implications . . .
  • 23. Thank you for your attention. robert_bodle@mail.msj.edu http://twitter.com/robertbodle
  • 24. “Assessing the value of anonymous communication online” Robert Bodle, PhD (USC) Associate Professor of Communication and New Media Studies, College of Mount St. Joseph

Notas do Editor

  1. To understant