Why Do People Seek Anonymity on the Internet?
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
1 Introduction
1 Introduction I. THE PROBLEM OF ANONYMITY NONYMOUS WRITING IS both an old and a new phenomenon. Before the Renaissance most writing was anonymous; many of the Aearly poems in anthologies are ascribed to ‘ Anon ’ . The medieval auctor (the term from which the word ‘ author ’ derives) was generally little more than a scribe, transcribing earlier texts. The name of the writer was irrelevant to the readers of a text, so it was immaterial that generally he was anonymous. 1 The identifi cation or naming of authors has been associated with the development of printing, and then subsequently with the role of copyright in ascribing property rights to them and the birth of the Romantic Author as a heroic fi gure at the end of the eighteenth century. 2 But even then a high proportion of novels were anonymous; between 1770 and 1800 over 70 per cent of novels were published without a named author, and during the 1820s the proportion rose to nearly 80 per cent. 3 There has certainly been a marked decline in anonymous writing in the late nineteenth and twentieth centuries, though some notable writers in this period have always, or sometimes, used pseudonyms (see section IV of this chapter and chapter 2 , section II), among them George Orwell (the pseudonym of Eric Blair), Sylvia Plath and Doris Lessing. The Internet is responsible for the revival of anonymous writing and indeed for many of the problems now associated with it. Many blogs are written under a pseudonym, though often the identity of the author is well known, as with Paul Staines, the author of the Guido Fawkes political blog. -
Lapp 1 the Victorian Pseudonym and Female Agency Research Thesis
Lapp 1 The Victorian Pseudonym and Female Agency Research Thesis Presented in partial fulfillment of the requirements for graduation with research distinction in English in the undergraduate colleges of The Ohio State University by Anna Lapp The Ohio State University April 2015 Project Advisor: Professor Robyn Warhol, Department of English Lapp 2 Chapter One: The History of the Pseudonym Anonymity disguises information. For authors, disguised or changed names shrouds their circumstance and background. Pseudonyms, or pen names, have been famously used to disguise one’s identity. The word’s origin—pseudṓnymon—means “false name”. The nom de plume allows authors to conduct themselves without judgment attached to their name. Due to an author’s sex, personal livelihood, privacy, or a combination of the three, the pen name achieves agency through its protection. To consider the overall protection of the pseudonym, I will break down the components of a novel’s voice. A text is written by a flesh-and-blood, or actual, author. Second, an implied author or omnipresent figure of agency is present throughout the text. Finally, the narrator relates the story to the readers. The pseudonym offers freedom for the actual author because the author becomes two-fold—the pseudonym and the real person, the implied author and the actual author. The pseudonym can take the place of the implied author by acting as the dominant force of the text without revealing the personal information of the flesh-and-blood author. Carmela Ciuraru, author of Nom de Plume: A (Secret) History of Pseudonyms, claims, “If the authorial persona is a construct, never wholly authentic (now matter how autobiographical the material), then the pseudonymous writer takes this notion to yet another level, inventing a construct of a construct” (xiii-xiv). -
Freedom of Expression, Encryption, and Anonymity: Civil Society and Private Sector Perceptions
Freedom of Expression, Encryption, and Anonymity: Civil Society and Private Sector Perceptions Joint collaboration to inform the work of the UN Special Rapporteur on the promotion and protection of the right to freedom of opinion and expression Research Team World Wide Web Foundation Renata Avila Centre for Internet and Human Rights at European University Viadrina Ben Wagner Thomas Behrndt Oficina Antivigilância at the Institute for Technology and Society - ITS Rio Joana Varon Lucas Teixeira Derechos Digitales Paz Peña Juan Carlos Lara 2 About the Research In order to swiftly provide regional input for the consultation of the United Nations Special Rapporteur on the protection and promotion of the right to opinion and expression, the World Wide Web Foundation1, in partnership with the Centre for Internet and Human Rights at European University Viadrina, Oficina Antivigilância2 at the Institute for Technology and Society - ITS Rio3 in Brazil, and Derechos Digitales4 in Latin America, have conducted collaborative research on the use of encryption and anonymity in digital communications. The main goal of this initiative was to collect cases to highlight regional peculiarities from Latin America and a few other countries from the Global South, while debating the relationships within encryption, anonymity, and freedom of expression. This research was supported by Bertha Foundation.5 The core of the research was based on two different surveys focused on two target groups. The first was a series of interviews among digital and human rights organizations as well as potential users of the technologies to determine the level of awareness about both the anonymity and encryption technologies, to collect perceptions about the importance of these technologies to protect freedom of expression, and to have a brief overview of the legal framework and corporate practices in their respective jurisdictions. -
Names in Toni Morrison's Novels: Connections
INFORMATION TO USERS This manuscript has been reproduced from the microfilm master. UMI films the text directly from the original or copy submitted. Thus, some thesis and dissertation copies are in typewriter face, while others may be from any type of computer printer. The quality or this reproduction is dependent upon the quaUty or the copy submitted. Broken or indistinct print, colored or poor quality illustrations and photographs, print bleedthrough, substandard margins, and improper alignment can adversely affect reproduction. In the unlikely. event that the author did not send UMI a complete manuscript and there are missing pages, these will be noted. Also, if unauthorized copyright material had to be removed, a note will indicate the deletion. Oversize materials (e.g., maps, drawings, charts) are reproduced by sectioning the original, beginning at the upper left-hand comer and continuing from left to right in equal sections with small overlaps. Each original is also photographed in one exposure and is included in reduced form at the back of the book. Photographs included in the original manuscript have been reproduced xerographically in this copy. Higher quality 6" x 9" black and white photographic prints are available for any photographs or illustrations appearing in this copy for an additional charge. Contact UMI directly to order. UMI A. Bell & Howell Information Company 300 North Zeeb Road. Ann Arbor. Ml48106·1346 USA 313!761·4700 8001521·0600 .. -------------------- ----- Order Number 9520522 Names in Toni Morrison's novels: Connections Clayton, Jane Burris, Ph.D. The University of North Carolina at Greensboro, 1994 Copyright @1994 by Clayton, Jane Burris. -
Don't Feed the Trolls: a Cautionary Tale
Don’t Feed the Trolls: others (Linux, of course). In fact, the phrase originated as a reference to the A Cautionary Tale comic book the Fantastic Four, as one of the characters could turn himself DANA SAMUEL into a Human Torch. Chat participants would use the HTML‐styled, bracketed annotation to insult other participants online. In Eddo Stern’s Best. Flame War. Ever. we are presented with an online argu‐ <flame on> You’re pretty stupid for ment over seemingly insignificant not knowing what MMPORPG means. game‐playing topics that grows quickly Go look it up on Wiki. </flame off> out of proportion and out of the realm of online experience. Two collaged When the internet opened to the animated masks – each an amalgam of commercial world, and more people heraldry, knighthood, pixilated joined these groups, more language warriors, fantasy species, castles, and jargon was developed to describe shields and symbols – animate a flame the goings‐on in these communities. A war that actually took place online “troll” is one who writes nasty flames over the role‐playing game Everquest, just to make others angry and to be an MMPORPG. annoying. “Meat‐puppets” and “sock‐ Did I just make you feel like a total puppets” are those who are deceptive “newb”? about their identities or their true Online games, discussion boards and allegiances on a discussion board. communities have developed their How all very “D&D.” own language since these online It’s said, by several theorists, that worlds were first populated in people can be more uninhibited online, research and academia, and then, later they can change their personality, role‐ (post‐cold war, after the military had play and morph into who they no need for such a specialized perceive themselves to be. -
CS 508 102 NOTE Definition of Flaming, Which Asserts Both a Behavioral and Reproductions Supplied by EDRS Are the Best That
DOCUMENT RESUME ED 355 572 CS 508 102 AUTHOR Thompsen, Philip A. TITLE A Social Influence Model of Flaming in Computer-Mediated Communication. PUB DATE Feb 93 NOTE 9p.; Paper presented at the Annual Meeting of the Western States Communication Association (64th, Albuquerque, NM, February 12-16, 1993). PUB TYPE Speeches/Conference Papers (150) -- Viewpoints (Opinion/Position Papers, Essays, etc.) (120) EDRS PRICE MFO1 /PCO1 Plus Postage. DESCRIPTORS Communication Research; Definitions; *Electronic Mail; Higher Education; Interpersonal Communication; Models; *Social Influences IDENTIFIERS *Communication Behavior; Computer Mediated Communication; *Flaming (Computei Mediated Communication) ABSTRACT This paper explores the phenomenon of "flaming," which has been typically cited as an antisocial effect of computer-mediated communication. The paper discusses the diverse range of conceptual and operational definitions of flaming found in the literature. The paper offers a four-point critique of previous theoretical explanations of flaming, and suggests an alternative definition of flaming, which asserts both a behavioral and interpretive dimension to flaming. Drawing from the work of J. Fulk, J. Schmitz, and C. W. Steinfield, the paper then develops a social influence model of flaming that provides.a more flexible and powerful approach than previous theories, while yielding potentially useful insights to guide future research. A figure representing the model is included. (Contains 56 references.)(RS) *********************************************************************** -
Literature Review.Docx
HOW COMPUTER-MEDIATED COMMUNICATION CAN CONFUSE EMOTIONS IN DIVERSE TEAMS by Adam Bartek Submitted in partial fulfillment of the requirements for Departmental Honors in the Department of Information Systems and Supply Chain Management Texas Christian University Fort Worth, Texas May 2, 2014 ii HOW COMPUTER-MEDIATED COMMUNICATION CAN CONFUSE EMOTIONS IN DIVERSE TEAMS Project Approved: Supervising Professor: Beata Jones, Ph.D. Department of Information Systems and Supply Chain Management Charles Greer, Ph.D. Department of Management, Entrepreneurship, and Leadership David Preston, Ph.D. Department of Information Systems and Supply Chain Management iii ABSTRACT This study focused on how various forms of CMC (Computer-mediated communication) were perceived and analyzed in a team setting by different genders and members of different generational groups. Specifically, the aspects of flaming, emoticons, and conflict resolution were examined in detail. Hypotheses concerning flaming were mixed as while all participants disliked flaming, baby boomer-age respondents were more tolerant of it. However, all hypotheses concerning emoticon usage were not supported. Neither gender specifically supported emoticon usage. Also, younger generations were not as supportive of emoticon usage in a team setting as expected. Finally, mixed results were found for hypotheses concerning conflict resolution. While male respondents were more comfortable with conflict over CMC, there was no significantly higher level of comfort concerning conflict and CMC for younger generations. Implications and possible avenues for future research are also discussed. iv ACKNOWLEDGEMENTS This paper would not exist without the assistance and help of numerous professors, advisors, family, and friends. In particular, the guidance of the thesis committee was greatly appreciated. -
The Anonymity Heuristic: How Surnames Stop Identifying People When They Become Trademarks
Volume 124 Issue 2 Winter 2019 The Anonymity Heuristic: How Surnames Stop Identifying People When They Become Trademarks Russell W. Jacobs Follow this and additional works at: https://ideas.dickinsonlaw.psu.edu/dlr Part of the Behavioral Economics Commons, Civil Law Commons, Comparative and Foreign Law Commons, Economic Theory Commons, Intellectual Property Law Commons, Law and Economics Commons, Law and Psychology Commons, Legal Writing and Research Commons, Legislation Commons, Other Law Commons, Phonetics and Phonology Commons, Psychiatry and Psychology Commons, Psycholinguistics and Neurolinguistics Commons, and the Semantics and Pragmatics Commons Recommended Citation Russell W. Jacobs, The Anonymity Heuristic: How Surnames Stop Identifying People When They Become Trademarks, 124 DICK. L. REV. 319 (2020). Available at: https://ideas.dickinsonlaw.psu.edu/dlr/vol124/iss2/3 This Article is brought to you for free and open access by the Law Reviews at Dickinson Law IDEAS. It has been accepted for inclusion in Dickinson Law Review by an authorized editor of Dickinson Law IDEAS. For more information, please contact [email protected]. \\jciprod01\productn\D\DIK\124-2\DIK202.txt unknown Seq: 1 28-JAN-20 14:56 The Anonymity Heuristic: How Surnames Stop Identifying People When They Become Trademarks Russell Jacobs ABSTRACT This Article explores the following question central to trade- mark law: if a homograph has both a surname and a trademark interpretation will consumers consider those interpretations as intrinsically overlapping or the surname and trademark as com- pletely separate and unrelated words? While trademark jurispru- dence typically has approached this question from a legal perspective or with assumptions about consumer behavior, this Article builds on the Law and Behavioral Science approach to legal scholarship by drawing from the fields of psychology, lin- guistics, economics, anthropology, sociology, and marketing. -
I Give Permission for Public Access to My Thesis and for Any Copying to Be Done at the Discretion of the Archives Librarian And/Or the College Librarian
1 I give permission for public access to my thesis and for any copying to be done at the discretion of the archives librarian and/or the College librarian. Emily Merritt 06/22/12 An Analysis of the Discourse of Internet Trolling: A Case Study of Reddit.com Student presenter: Emily Rose Merritt Project advisor: Esther Castro-Cuenca With the proliferation of social media and community discussion and forum websites, interest in understanding and explaining communication on the Internet (with an emphasis on language-based communication) is on the rise. Over time, new genres of interaction have developed that take place primarily or exclusively in online communication, and with them has developed the need to investigate the structure of these interactions, what their function is within conversations and communities, what their place is within certain Internet discourses, and over time what effects they have on communication on and offline. Thus far many of these genres have been deemed at best disruptive and at worst anti-social, but when studied from a judgment-free point of view show high levels of complexity and offer us excellent opportunities to understand how the Internet is shaping and being shaped by new kinds and contexts of communication. One of these genres of interaction that has gained significant fame on some very popular forums and discussion sites is called trolling. Trolling occurs on discussion sites or message boards when a user intentionally posts erroneous or inflammatory information with the intention of provoking a strong reaction out of other users. The objective of this study is to understand the complexities of trolling, as well as some of its functions and outcomes in anonymous online communication. -
Online Flaming
INSIGHTS Building parent-school partnerships WORDS Catherine Gerhardt Online Flaming So what is online flaming? Catherine Gerhardt gives us the lowdown plus practical tips for parents to recognise the signs and how to respond should your child be affected. A friend of mine lives with avid teenage contribute to online flaming: the of the responsibility that comes with gamers, and she was horrified to discover apparent anonymity and invisibility of the privilege of using the technology. In recently the language and the insults the Internet, the lag between sending a most cases parents have either supplied that her children were exposed to while message and getting feedback, and the the device or pay the bills for usage – engaging in a popular online game with minimum authority that seems to exist in that means you have the responsibility their friends. digital spaces. and the right to control it. Mutual respect Flame wars have become a major As parents we often complain that is required here, having password control online annoyance. When people start we can’t keep up with the technology does not give you permission to spy, and a flame war they are deliberately trying our kids are using, however many of us your child needs to know they are being to stir up trouble, start a fight and get a agree that we want to be their first point monitored. reaction. Flaming is all too common on of call if things go wrong. Parents can Let me tell you the story of another multi-player gaming sites, chat rooms, be their child’s strongest asset in the friend of mine who had been line of defence against negative online message forums and social media sites. -
Uncovering Flaming Events on News Media in Social Media Praboda Rajapaksha, Reza Farahbakhsh, Noel Crespi, Bruno Defude
Uncovering flaming events on news media in social media Praboda Rajapaksha, Reza Farahbakhsh, Noel Crespi, Bruno Defude To cite this version: Praboda Rajapaksha, Reza Farahbakhsh, Noel Crespi, Bruno Defude. Uncovering flam- ing events on news media in social media. IPCCC 2019: 38th International Performance Computing and Communications Conference, Oct 2019, Londres, United Kingdom. pp.1-9, 10.1109/IPCCC47392.2019.8958759. hal-02363443 HAL Id: hal-02363443 https://hal.archives-ouvertes.fr/hal-02363443 Submitted on 14 Nov 2019 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Uncovering Flaming Events on News Media in Social Media Praboda Rajapaksha, Reza Farahbakhsh, Noel Crespi, Bruno Defude To cite this version: Praboda Rajapaksha, Reza Farahbakhsh, Noel Crespi, Bruno Defude. Uncovering Flaming Events on News Media in Social Media. International Performance Computing and Communications Conference, Oct 2019, London, United Kingdom. hal-02363443 HAL Id: hal-02363443 https://hal.archives-ouvertes.fr/hal-02363443 Submitted on 14 Nov 2019 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. -
Netiquette (Adapted for Web Design 1) We Expect Other Drivers to Observe the Rules of the Road
Netiquette (Adapted for Web Design 1) We expect other drivers to observe the rules of the road. The same is true as we travel through cyberspace. That's where netiquette, a term allegedly coined from either network etiquette or Internet etiquette comes in handy. To guide you through your online communications, keep these pointers in mind: 1.Avoid writing e-mail or posting messages in blogs, newsgroups, forums, chat rooms and other online venues using all capital letters. IT LOOKS LIKE YOU'RE SHOUTING! Not only that, it's difficult to read. 2.When you talk with someone, the tone and inflections of your voice convey great meaning. For informal written conversations (avoid when a professional tone is required), you can add personality and humor to your messages with smileys, also known as emoticons. These are expressions you create using the characters on your keyboard. Below are some of the more popular smileys. Can you guess what they mean? Go to the end of this page to find out. 3.Keep your written communications focused. This is true whether sending e-mail or posting messages online. Few people like reading lengthy text on a computer screen. Many people now receive e-mail on mobile phones and other portable devices. Tiny screens make reading e- mail challenging. 4.To shorten messages for informal written conversations (avoid when a professional tone is required), use common abbreviations: < BTW > means By the Way. A < G > enclosed in brackets indicates grinning. < IMHO > means In My Humble Opinion. A good one to keep handy in case you're worried about offending someone is < ROTFL > measn Rolling on the Floor Laughing.