Unmasking the Teen Cyberbully: a First Amendment-Compliant Approach to Protecting Child Victims of Anonymous, School-Related Internet Harassment Benjamin A

Total Page:16

File Type:pdf, Size:1020Kb

Unmasking the Teen Cyberbully: a First Amendment-Compliant Approach to Protecting Child Victims of Anonymous, School-Related Internet Harassment Benjamin A The University of Akron IdeaExchange@UAkron Akron Law Review Akron Law Journals November 2017 Unmasking the Teen Cyberbully: A First Amendment-Compliant Approach to Protecting Child Victims of Anonymous, School-Related Internet Harassment Benjamin A. Holden Please take a moment to share how this work helps you through this survey. Your feedback will be important as we plan further development of our repository. Follow this and additional works at: http://ideaexchange.uakron.edu/akronlawreview Part of the Constitutional Law Commons, First Amendment Commons, and the Internet Law Commons Recommended Citation Holden, Benjamin A. (2017) "Unmasking the Teen Cyberbully: A First Amendment-Compliant Approach to Protecting Child Victims of Anonymous, School-Related Internet Harassment," Akron Law Review: Vol. 51 : Iss. 1 , Article 1. Available at: http://ideaexchange.uakron.edu/akronlawreview/vol51/iss1/1 This Article is brought to you for free and open access by Akron Law Journals at IdeaExchange@UAkron, the institutional repository of The nivU ersity of Akron in Akron, Ohio, USA. It has been accepted for inclusion in Akron Law Review by an authorized administrator of IdeaExchange@UAkron. For more information, please contact [email protected], [email protected]. Holden: Unmasking the Teen Cyberbully UNMASKING THE TEEN CYBERBULLY: A FIRST AMENDMENT-COMPLIANT APPROACH TO PROTECTING CHILD VICTIMS OF ANONYMOUS, SCHOOL-RELATED INTERNET HARASSMENT By: Benjamin A. Holden* I. Introduction and Overview ............................................ 2 II. Minors and The First Amendment ................................. 9 A. The First Amendment and Minors Generally ....... 10 B. The First Amendment and The Student Speech Cases ..................................................................... 10 C. The First Amendment and The Child Protection Cases ..................................................................... 12 1. Ginsberg v. New York: “Variable Obscenity” . 13 2. Prince v. Massachusetts: “‘Protect the welfare of children’ . ‘safeguarded from abuses’” ........ 14 3. Erznoznik v. Jacksonville: “Arbitrary” content discrimination disallowed ................................ 14 4. Brown v. EMA: No “historical warrant” banning or regulating video games................................ 15 D. Tinker Meets the Cyberbully ................................ 16 III. Cyberbullying: Forum, Prevalence, Frequency, & Solutions ...................................................................... 17 A. The Cyberbully’s Playground: A Brief History of Facebook ............................................................... 18 B. Other Social Media Websites (and Apps) Used for Anonymous Cyberbullying ................................... 19 C. Prevalence and Frequency Studies........................ 21 D. Cyberbully Victims: Real-World Examples ......... 24 IV. The Law Of Unmasking In Civil Suits Under the First Amendment ................................................................. 27 A. Framing the Issue .................................................. 27 B. Mechanics of Unmasking ..................................... 29 C. Cyberbully Unmasking Litigation ........................ 31 1 Published by IdeaExchange@UAkron, 2017 1 Akron Law Review, Vol. 51 [2017], Iss. 1, Art. 1 2 AKRON LAW REVIEW [51:1 1. Doe v. Individuals ............................................ 32 2. Juzwiak v. Doe ................................................. 33 3. A.Z. v. Doe ....................................................... 34 4. Wilson v. Doe ................................................... 35 5. Thomas M. Cooley Law School v. Doe ............ 36 6. Hadley v. Doe .................................................. 36 V. Toward A New Standard: The Cyberbully Unmasking Test .............................................................................. 37 A. A Constitutionally Valid Unmasking Standard Based on Child Protection .................................... 38 1. Tinker’s Cyber Reach Presumed by Most Courts............................................................... 38 2. Applicability of Child Protection Cases to Cyberbullying .................................................. 40 B. The Cyberbully Unmasking Test .......................... 42 C. Constitutional Analysis of the Cyberbully Unmasking Test .................................................... 46 1. Is Ginsberg Limited to Obscenity? .................. 46 2. Applicable Standard ........................................ 47 3. Compelling Government Interest .................... 48 4. Narrow Tailoring/Least Restrictive Means ..... 48 D. Applying the Cyberbully Unmasking Test to Five Actual Cases.......................................................... 49 1. Case 1: People v. Marquan .............................. 49 2. Case 2: A.Z. v. Doe .......................................... 50 3. Case 3: Juzwiak v. Doe .................................... 50 4. Case 4: Doe v. Individuals ............................... 52 5. Case 5: Wilson v. Doe ...................................... 52 6. Other Relevant Cases ....................................... 52 VI. Conclusion ................................................................... 53 I. INTRODUCTION AND OVERVIEW Americans have the right under the U.S. Constitution to speak 1 anonymously. However, this right is not absolute. It is subject to a * Teaching Assistant Professor in the College of Media at the University of Illinois, with research focus on the impact of social media on the First Amendment. Follow him on Twitter @BenHolden. The author was previously the director of the Donald W. Reynolds National Center for Courts & Media at the National Judicial College, where work on this article began. Many thanks to the NJC faculty and staff, and to Al Stavitsky, dean of the Reynolds School of Journalism at the University of Nevada-Reno, and to the many students (some of whom are now lawyers) who provided research http://ideaexchange.uakron.edu/akronlawreview/vol51/iss1/1 2 Holden: Unmasking the Teen Cyberbully 2017] UNMASKING THE TEEN CYBERBULLY 3 developing body of law which allows a judge to order the involuntary disclosure, during pre-trial discovery in civil cases,2 of the identity of anonymous speakers.3 Courts and scholars have struggled, as the law of the Internet has developed, with line-drawing between the right to anonymity and the right to be free from tortious or harassing conduct on the Web.4 The problem is more acute for teens, whose social universe is often more “virtual”5 than real. Thanks to smartphones and other mobile support and/or social media trend advice, including: Megan McKisson, Kristin Stallion, Audra Parton, Gillian Griffith, Farah Chalisa, Mariah Schaefer, Sharmenley Edouard, Joy Holden, Raytrevius Peterson, Teagan Vogel and Mary Leahy. Thanks for IT support from Meghan Smith. Finally, the author thanks his wife Melanie Slaton, his Berkeley Law School crush and the best public school district lawyer in Georgia, for her ideas, editing and insights. 1. McIntyre v. Ohio Elections Comm’n, 514 U.S. 334, 341-42 (1995); but see id. at 371-85 (Scalia, J., dissenting) (arguing that no such anonymity right exists under the First Amendment in McIntyre); see also id. at 358-71 (Thomas, J., concurring) (concurring in, but rejecting, the reasoning of the majority opinion while refuting some of Justice Scalia’s historical presumptions of the Founding Fathers as to the right to speak anonymously in political pamphlets and political argument generally). 2. The most relevant type of cases in the context of unmasking are speech-related torts, such as defamation and harassment. The word “harassment” in the title of this Article is used generically to include all speech-related torts, including without limitation, civil harassment under state law, defamation, intentional infliction of emotional distress, negligent infliction of emotional distress, false light, and public disclosure of private facts. 3. This is accomplished via a civil subpoena requesting the Internet Protocol address of the computer that sent the offending message, as a discovery demand in a lawsuit. See Dendrite Int’l, Inc. v. Doe No. 3, 775 A.2d 756 (2001); Doe v. Cahill, 884 A.2d 451 (Del. 2005); Indep. Newspaper v. Brodie, 966 A.2d 432 (Md. 2009); Maxon v. Ottawa Publ’g Co., 929 N.E.2d 666 (Ill. App. 2010); John Doe No. 1 v. Reed, 130 S. Ct. 2811 (2010). 4. See generally Nathaniel Gleicher, Note, John Doe Subpoenas: Toward a Consistent Legal Standard, 118 YALE L.J. 320 (2008); Michael S. Vogel, Unmasking ‘John Doe’ Defendants: The Case Against Excessive Hand-Wringing Over Legal Standards, 83 OR. L. REV. 795 (2004); Caroline E. Strickland, Note, Applying McIntyre v. Ohio Elections Commission to Anonymous Speech on the Internet and the Discovery of John Doe’s Identity, 58 WASH & LEE L. REV. 1537 (2001); Kristina Ringland, Internet User Anonymity, First Amendment Protections and Mobilisa: Changing the Cahill Test, 5 SHIDLER J.L. COM. & TECH. 16 (2009); Legal Protections for Anonymous Speech, Digital Media Law Project’s Legal Guide, http://www.citmedialaw.org/legal-guide/legal-protections- anonymous-speech [http://perma.cc/M4P2-F8MV] (last visited Mar. 30, 2016); Jason A. Martin, et al., Anonymous Speakers and Confidential Sources: Using Shield Laws When They Overlap, 16 COMM. L. & POL’Y 89 (2011). 5. Gina Cerasiotis, Parents Struggling to Drag Kids from Virtual World to Real World, HERALD SUN (Sept. 16, 2017) http://www.heraldsun.com.au/news/parents-struggling-to-drag-kids- from-virtual-world-into-real-world/news-story/bd9494f69889898b5a058b20d6a6c5de
Recommended publications
  • Albuquerque Citizen, 06-26-1908 Hughes & Mccreight
    University of New Mexico UNM Digital Repository Albuquerque Citizen, 1891-1906 New Mexico Historical Newspapers 6-26-1908 Albuquerque Citizen, 06-26-1908 Hughes & McCreight Follow this and additional works at: https://digitalrepository.unm.edu/abq_citizen_news Recommended Citation Hughes & McCreight. "Albuquerque Citizen, 06-26-1908." (1908). https://digitalrepository.unm.edu/abq_citizen_news/2799 This Newspaper is brought to you for free and open access by the New Mexico Historical Newspapers at UNM Digital Repository. It has been accepted for inclusion in Albuquerque Citizen, 1891-1906 by an authorized administrator of UNM Digital Repository. For more information, please contact [email protected]. TRAIN ARRIVALS WEATHER FORECAST . No. i 5 P- - No 4 5. 50 p. m ..; - No. 7 Jo. Si p. m. ? '' PeuTtr, Cfllj.. J111 26. -T- oa! local No. 8 6.40 p. m. shiwerj. Sittirdii inerilli fair. f - No. p m. Albuouemje Citizen 9114$ WE GET THE NEWS FIRST VOLUME 23. ALBUUUEHQDE. NEW MEXICO. FRIDAY, JUNE 2G. 1908. NUMBER 152 ENTHUSIASTIC RECTI MYSTERY HAS NARROW AN INSAN E NOTABLE MEN ASSEMBLE DEATH OF YOUTH ESCAPE FROM HANGS HIMSELF GREETS DELEbK ANDREWS TO HONOR GRDVER CLEVELAND AT INKWELL FLAMES INJAIL Citizens of Albuquerque Joi Extend- Body of Health Seeker From Fire Starting In tFurniture Native Brooded Over Murder President Roosevelt and Governors of ing Thanks of the Commuiucy for His St. Louis Found In Brush Store Spreads to Restaur of Child Because He Several States Attend Funeral Ser- Northwest of the ant. Meat Market Thought Himself to Ability to Secure Irrigation Congress Statesman-- City. and Hall. Blame for Death. vices at Princeton for Dead Appropriation and Additional Fund Simple Ritual of Presbyterian for New Federal Building Crowds HIS COMPANION BOY Wild CANDLE USED ROPeITt Church Constitutes Extent of Serv- Meet Delegate at the Train.
    [Show full text]
  • Keek Named Official Video App of Find Your Grind and Learn to Ride at Sundance Film Festival
    KEEK NAMED OFFICIAL VIDEO APP OF FIND YOUR GRIND AND LEARN TO RIDE AT SUNDANCE FILM FESTIVAL Mobile Video Social Network Provides Once in a Lifetime Opportunity for Snowboard Enthusiasts to Learn to Ride with Pro Snowboarder Luke “Dingo” Trembath and More at Sundance Film Festival NEW YORK, NY (January 5, 2015)— Keek, Inc. (TSXV: KEK; OTCQX: KEEKF) announced today that it has been named the official social video app of Find Your Grind and Learn to Ride at Sundance Film Festival taking place on January 23‐24th, 2015. Keek will be documenting the entire event, providing behind‐the‐ scenes content in addition to sponsoring the Learn to Ride Sundance Contest where one lucky winner and a guest will win a 4‐day VIP trip to Park City Utah for the Sundance Film Festival. Key influencers and celebrities will be “keeking” their experiences on and off the slopes. The Learn To Ride series is a true “bucket list” VIP event, allowing celebrities and media to pair up with professional snowboard athletes to “learn to ride” with the best! This premiere event at Sundance has been voted “most coveted” by Vanity Fair for four years and counting. Past celebrity attendees have included: Lil’ Jon, Krysten Ritter, Kellan Lutz, Adrian Grenier and Alessandra. This year, for the first time ever, talented young adults and children battling chronic illnesses will hit the slopes in their newly gifted Oakley gear, receiving private lessons from pro snowboard athletes. The Keek Learn to Ride Sundance Contest was designed to attract Winter‐lovers and snowboard enthusiasts, alike.
    [Show full text]
  • Prettylittleliars: How Hashtags Drive the Social TV Phenomenon
    Salve Regina University Digital Commons @ Salve Regina Pell Scholars and Senior Theses Salve's Dissertations and Theses Summer 6-2013 #PrettyLittleLiars: How Hashtags Drive The Social TV Phenomenon Melanie Brozek Salve Regina University, [email protected] Follow this and additional works at: https://digitalcommons.salve.edu/pell_theses Part of the American Popular Culture Commons, Film and Media Studies Commons, and the Television Commons Brozek, Melanie, "#PrettyLittleLiars: How Hashtags Drive The Social TV Phenomenon" (2013). Pell Scholars and Senior Theses. 93. https://digitalcommons.salve.edu/pell_theses/93 This Article is brought to you for free and open access by the Salve's Dissertations and Theses at Digital Commons @ Salve Regina. It has been accepted for inclusion in Pell Scholars and Senior Theses by an authorized administrator of Digital Commons @ Salve Regina. For more information, please contact [email protected]. #PrettyLittleLiars: How Hashtags Drive The Social TV Phenomenon By Melanie Brozek Prepared for Dr. Esch English Department Salve Regina University May 10, 2013 Brozek 2 #PrettyLittleLiars: How Hashtags Drive The Social TV Phenomenon ABSTRACT: Twitter is used by many TV shows to promote discussion and encourage viewer loyalty. Most successfully, ABC Family uses Twitter to promote the teen drama Pretty Little Liars through the use of hashtags and celebrity interactions. This study analyzes Pretty Little Liars’ use of hashtags created by the network and by actors from the show. It examines how the Pretty Little Liars’ official accounts engage fans about their opinions on the show and encourage further discussion. Fans use the network- generated hashtags within their tweets to react to particular scenes and to hopefully be noticed by managers of official show accounts.
    [Show full text]
  • What Is Gab? a Bastion of Free Speech Or an Alt-Right Echo Chamber?
    What is Gab? A Bastion of Free Speech or an Alt-Right Echo Chamber? Savvas Zannettou Barry Bradlyn Emiliano De Cristofaro Cyprus University of Technology Princeton Center for Theoretical Science University College London [email protected] [email protected] [email protected] Haewoon Kwak Michael Sirivianos Gianluca Stringhini Qatar Computing Research Institute Cyprus University of Technology University College London & Hamad Bin Khalifa University [email protected] [email protected] [email protected] Jeremy Blackburn University of Alabama at Birmingham [email protected] ABSTRACT ACM Reference Format: Over the past few years, a number of new “fringe” communities, Savvas Zannettou, Barry Bradlyn, Emiliano De Cristofaro, Haewoon Kwak, like 4chan or certain subreddits, have gained traction on the Web Michael Sirivianos, Gianluca Stringhini, and Jeremy Blackburn. 2018. What is Gab? A Bastion of Free Speech or an Alt-Right Echo Chamber?. In WWW at a rapid pace. However, more often than not, little is known about ’18 Companion: The 2018 Web Conference Companion, April 23–27, 2018, Lyon, how they evolve or what kind of activities they attract, despite France. ACM, New York, NY, USA, 8 pages. https://doi.org/10.1145/3184558. recent research has shown that they influence how false informa- 3191531 tion reaches mainstream communities. This motivates the need to monitor these communities and analyze their impact on the Web’s information ecosystem. 1 INTRODUCTION In August 2016, a new social network called Gab was created The Web’s information ecosystem is composed of multiple com- as an alternative to Twitter.
    [Show full text]
  • Russell Hubright
    September 2019 Forest Management Chief Russell Hubright Every work day a relatively small segment of the South Carolina Forestry Commission’s workforce ventures onto private property at the request of the owners. These natural resource professionals, known as Project Foresters in our agency, are in the woods performing field work that will enable them to develop forest management plans that are Success Story: Discovery Trail Signs at HSF Page 9 tailored to the landowners’ objectives. Depending on the complexity of the plan, producing the finished product may take as little as a few hours or as much as a week. So, why does the Forestry Commission (https://sref.info/resources/publications/ Hugo’s 30th Anniversary employ foresters who spend such a incremental-economic-impact-of-a- Pages 12 significant part of their time writing south-carolina-forestry-commission- forest management plans? As with forester) showed that for every $1 all services that our agency provides, spent on the salary and expenses of a the answer is that these plans result in Project Forester each year, more than significant public benefit. Another way $24 of additional economic activity is of putting it is that the investment that generated. South Carolina taxpayers are making And we all know that the economic through funding this work has a positive impact of forestry in South Carolina cost-benefit ratio. In fact, a 2016 study is significant - $21 billion annually, conducted by Scott Phillips and Dr. #1 cash crop, #1 export from the port Employee Spotlight: Allison Doherty Tom Straka of Clemson University of Charleston and #2 manufacturing Page 21 September 2019 1 Faifield/Newberry/Union Project Forester Chase Folk meets with a Newberry county landowner about his forest management objectives.
    [Show full text]
  • Dating App 20140708.Key
    From ‘Like’ to Love: How Brands Can Woo Users on Messaging and Dating Apps 7/10/14 Dating goes digital The generation accustomed to communicating at all times is coming of age and bringing the same attitude to their romantic lives. ! “ I think in the time I was in a relationship, all dating communication went exclusively to text. You can’t call anybody anymore. If you call someone, they’re like ‘What? Are you on fire? Then quit wasting my time. Text me that [stuff].’” – Aziz Ansari, Comedian Credit: Comedy Central © 2013 IPG Media Lab. Proprietary & Confidential 2 We heart mobile dating apps Online dating services and apps are an increasingly common way to meet potential mates: • 1 in 3 single Americans have used an online dating service • 1 in 6 couples married in the last three years met online ! Graph Sources: marketingland.com/founders-whisper-tinder-75424; www.internetlivestats.com ! ! Sources: www.pewinternet.org/2013/10/21/online-dating-relationships/ cp.match.com/cppp/media/CMB_Study.pdf © 2013 IPG Media Lab. Proprietary & Confidential 3 Dating apps moved to mobile as messaging apps began to proliferate © 2013 IPG Media Lab. Proprietary & Confidential 4 But it’s not just dating apps Dating apps, social networks, and messaging apps are blurring as people seek, create, and document new relationships: • Glimpse connects people based on their Instagram photos • LinkedUp turns the professional site into a dating platform • Kik users share usernames instead of digits on multiple platforms © 2013 IPG Media Lab. Proprietary & Confidential 5 What’s going on here? As we noted in our white paper on Messaging Apps , messaging platforms are fighting for consumers and introducing new features to increase audience engagement.
    [Show full text]
  • The Many Shades of Anonymity: Characterizing Anonymous Social Media Content
    Proceedings of the Ninth International AAAI Conference on Web and Social Media The Many Shades of Anonymity: Characterizing Anonymous Social Media Content Denzil Correay, Leandro Araújo Silvaz, Mainack Mondaly, Fabrício Benevenutoz, Krishna P. Gummadiy y Max Planck Institute for Software Systems (MPI-SWS), Germany z Federal University of Minas Gerais (UFMG), Brazil Abstract While anonymous online forums have been in existence since the early days of the Internet, in the past, such forums Recently, there has been a significant increase in the popu- larity of anonymous social media sites like Whisper and Se- were often devoted to certain sensitive topics or issues. In cret. Unlike traditional social media sites like Facebook and addition, its user population was relatively small and limited Twitter, posts on anonymous social media sites are not as- to technically sophisticated users with specific concerns or sociated with well-defined user identities or profiles. In this requirements to be anonymous. On the other hand, anony- study, our goals are two-fold: (i) to understand the nature mous social media sites like Whisper1 and Secret2 provide a (sensitivity, types) of content posted on anonymous social generic and easy-to-use platform for lay users to post their media sites and (ii) to investigate the differences between thoughts in relative anonymity. Thus, the advent and rapidly content posted on anonymous and non-anonymous social me- growing adoption of these sites provide us with an oppor- dia sites like Twitter. To this end, we gather and analyze ex- tunity for the first time to investigate how large user popu- tensive content traces from Whisper (anonymous) and Twitter lations make use of an anonymous public platform to post (non-anonymous) social media sites.
    [Show full text]
  • Some Mobile Apps Add Anonymity to Social Networking
    Log in / Create an account Search Subscribe Topics+ The Download Magazine Events More+ Connectivity Some Mobile Apps Add Anonymity to Social Networking Social-networking apps that eschew real names are gaining ground. by Rachel Metz February 6, 2014 On social networks like Facebook, Twitter, and LinkedIn, most people do not communicate freely, for fear of the repercussions. For just over a decade, Facebook has enforced the idea of an authentic online identity tied to each user of a social network. This might be fine for sharing news of a promotion or new baby with friends, but sometimes you’d probably like to post a status update that won’t go on your permanent record. This urge might explain why millions of people, many of them under the age of 25, are flocking to a free smartphone app called Whisper, which lets you share thoughts—a few lines of text set against a background image—without adding your real name. Secret, a newer free app for the iPhone that shares posts anonymously through your existing social networks, is based on the same idea. After years spent filling social networks like Facebook and Twitter with the minutiae of our lives, we’ve left permanent, heavily curated trails of personal data in our wake—over 1.2 billion of them on Facebook alone, judging by its user count. New apps allow us to continue being social without worrying about the repercussions of sharing the most personal confessions. “Facebook is more like the global social network; it’s like our communication layer to the world,” says Anthony Rotolo, an assistant professor at Syracuse University, who studies social networks.
    [Show full text]
  • Social Construction of Privacy: Reddit Case Study
    Social Construction of Privacy: Reddit Case Study December 13, 2020 A Thesis Prospectus Submitted to the Faculty of the School of Engineering and Applied Science University of Virginia ² Charlottesville, Virginia In Partial Fulfillment of the Requirements of the Degree Bachelor of Science, School of Engineering Rajiv Sarvepalli 1 1 INTRODUCTION In the technological age of today, privacy becomes a more and more valuable commod- ity. With so many companies that live off the idea that information is money, it becomes increasingly concerning the amount of an individual’s information that is public. It is public in every sense of the word, not just to a group of people, but to the whole world. Consider the constant data scandals that plague our technological world. Whether it is Facebook, Google, or governments, someone is always getting caught selling, collecting, or losing data that many consider infringes on their privacy. Therefore, as stewards of these technologies, we must develop preemptive ways of protecting the privacy of the individual in an information-based world focused on the collective. The heterogeneous nature of society, especially with respect to privacy, makes the perspective vary greatly from person to person. This study shall focus on Reddit, an anonymous social media since individuals within anonymous social media communities tend to view anonymity as some form of privacy and therefore tend to care about in some manner about privacy. In order to understand the perspective and definitions of privacy, privacy needs to be analyzed in the context of a society. The conundrum of our information society is the constant complaints of lack of privacy, yet no privacy-invasive companies change their conduct.
    [Show full text]
  • Characterizing Anonymous Social Media Content
    The Many Shades of Anonymity: Characterizing Anonymous Social Media Content Denzil Correa†, Leandro Araújo Silva‡, Mainack Mondal†, Fabrício Benevenuto‡, Krishna P. Gummadi† † Max Planck Institute for Software Systems (MPI-SWS), Germany ‡ Federal University of Minas Gerais (UFMG), Brazil Abstract While anonymous online forums have been in existence since the early days of the Internet, in the past, such forums Recently, there has been a significant increase in the popu- larity of anonymous social media sites like Whisper and Se- were often devoted to certain sensitive topics or issues. In cret. Unlike traditional social media sites like Facebook and addition, its user population was relatively small and limited Twitter, posts on anonymous social media sites are not as- to technically sophisticated users with specific concerns or sociated with well-defined user identities or profiles. In this requirements to be anonymous. On the other hand, anony- study, our goals are two-fold: (i) to understand the nature mous social media sites like Whisper1 and Secret2 provide a (sensitivity, types) of content posted on anonymous social generic and easy-to-use platform for lay users to post their media sites and (ii) to investigate the differences between thoughts in relative anonymity. Thus, the advent and rapidly content posted on anonymous and non-anonymous social me- growing adoption of these sites provide us with an oppor- dia sites like Twitter. To this end, we gather and analyze ex- tunity for the first time to investigate how large user popu- tensive content traces from Whisper (anonymous) and Twitter lations make use of an anonymous public platform to post (non-anonymous) social media sites.
    [Show full text]
  • Proceedings of the Nebraska State Bar Association House of Delegates Meeting, 1959 Joseph C
    Nebraska Law Review Volume 39 | Issue 1 Article 2 1960 Proceedings of the Nebraska State Bar Association House of Delegates Meeting, 1959 Joseph C. Tye Nebraska State Bar Association Follow this and additional works at: https://digitalcommons.unl.edu/nlr Recommended Citation Joseph C. Tye, Proceedings of the Nebraska State Bar Association House of Delegates Meeting, 1959, 39 Neb. L. Rev. 1 (1960) Available at: https://digitalcommons.unl.edu/nlr/vol39/iss1/2 This Article is brought to you for free and open access by the Law, College of at DigitalCommons@University of Nebraska - Lincoln. It has been accepted for inclusion in Nebraska Law Review by an authorized administrator of DigitalCommons@University of Nebraska - Lincoln. PRESIDENT JOSEPH C. TYE 1959 OFFICERS OF THE NEBRASKA STATE BAR ASSOCIATION President JOSEPH C. TYE Kearney Chairman of the House of Delegates RICHARD E. HUNTER Hastings Secretary-Treasurer GEORGE H. TuRNER Lincoln EXECUTIVE COUNCIL Joseph C. Tye ------------------------------------------------------------------------------------Kearney Paul H. Bek ....................---------------------------------------------------------------------- Seward Thomas F. Colfer .................................----------------------------....--------- McCook Alfred G. Ellick ----------------------...........................------------------------ - ------- Om aha John R. Fike ----------------------------------------------------------------------------------------Omaha Clarence E. Haley ------------------------------------------------------------------------Hartington
    [Show full text]
  • 2007 URMIA Journal
    URMIA Journal 2007–08 Denver UNIVERSITY RISK MANAGEMENT AND INSURANCE ASSOCIATION 5692 Cover_NoSpine.indd 1 12/17/2010 4:05:49 PM The mountains they are silent folk They stand afar—alone, And the clouds that kiss their brows at night Hear neither sigh nor groan. Each bears him in his ordered place As soldiers do, and bold and high They fold their forests round their feet And bolster up the sky. —HAMLIN GARLAND (1860–1940), “THE MOUNTAINS ARE A LONELY FOLK” Front cover: Rocky Mountains, Colorado Denver: host city for the 2007 URMIA Conference. 5692 Cover_NoSpine.indd 2 12/17/2010 4:06:27 PM URMIAURMIA JournalJournal 2007–08 University Risk Management and Insurance Association OFFICERS President Ellen M. Shew Holland, ARM University of Denver (303) 871-2327 [email protected] President-Elect Vincent E. Morris, CPCU, ARM, AIC, CRM, CIC Wheaton College (630) 752-5013 [email protected] Secretary Anita C. Ingram, MBA, ARM Southern Methodist University (214) 768-4047 [email protected] Treasurer Margaret Tungseth, CPA, MBA Concordia College (218) 299-3327 [email protected] Downtown Denver, Colorado Parliamentarian Photo credit: Denver Metro Convention & Visitors Bureau Gary W. Langsdale, ARM Pennsylvania State University (814) 865-6308 [email protected] Immediate Past President Allen J. Bova, MBA, ARM, DRM Cornell University (607) 277-1188 [email protected] DIRECTORS Julie C. Baecker, AIC, ARM (’10) University of Alaska (907) 450-8153 [email protected] Mary Breighner, CPCU, DRM (’09) FM Global (513) 742-9516 [email protected] Steve Bryant, CRM, ARM (’09) Texas Tech University System (806) 742-0212 [email protected] Mary Dewey, ARM, CIC, CPCU, DRM (’08) University of Vermont (802) 656-8453 [email protected] Jill Laster, ARM, DRM (’08) Texas Christian University (817) 257-6798 [email protected] Marjorie F.
    [Show full text]