[Air-L] online anonymity - readings

Alessandro Acquisti acquisti at andrew.cmu.edu
Tue Nov 20 08:23:57 PST 2012


Thank you Kornelia!

-alessandro

(with apologies for brevity and typos)

---
Alessandro Acquisti
Associate Professor
Heinz College, Carnegie Mellon University
http://www.heinz.cmu.edu/~acquisti/


> -----Original Message-----
> From: air-l-bounces at listserv.aoir.org [mailto:air-l-bounces at listserv.aoir.org]
> On Behalf Of Kornelia Trytko
> Sent: 20 November 2012 11:15
> To: air-l at listserv.aoir.org
> Subject: Re: [Air-L] online anonymity - readings
> 
> Sorry, that's my list (at least for now) :)
> 
> 
> 
> Akdeniz, Y. (2002). Anonymity, democracy, and cyberspace.* Social Research:
> An International Quarterly, 69*(1), 223-237.
> 
> Allen, C. (1999). Internet anonymity in contexts.* The Information Society,
> 15*(2), 145-146.
> 
> Bernstein, M. S., Monroy-Hernández, A., Harry, D., André, P., Panovich, K., &
> Vargas, G. (2011). 4chan and/b: An analysis of anonymity and ephemerality in
> a large online community. *5th International Conference on Weblogs and
> Social Media (ICWSM), Barcelona, Spain, *
> 
> Bezilla, R. (1978). *A discussion of selected aspects of privacy, confidentiality,
> and anonymity in computerized conferencing* New Jersey Institute of
> Technology, Computer & Information Science Department.
> 
> boyd, d. (2012). The politics of real names.* Communications of the ACM,
> 55*(8), 29-31.
> 
> Brunton, F., & Nissenbaum, H. (2011). Vernacular resistance to data collection
> and analysis: A political theory of obfuscation.* First Monday,
> 16*(5)
> 
> Campbell, J. E. (2004). *Getting it on online: Cyberspace, gay male sexuality,
> and embodied identity* Haworth Press, Inc.
> 
> Carey, R. F., & Burkell, J. (2007). Revisiting the four horsemen of the
> infopocalypse: Representations of anonymity and the internet in Canadian
> newspapers.* First Monday, 12*(8)
> 
> Christopherson, K. M. (2007). The positive and negative implications of
> anonymity in internet social interactions: “On the internet, nobody knows
> you’re a dog”.* Computers in Human Behavior, 23*(6), 3038-3056.
> 
> Coleman, J. B. (2005). Digital photography and the internet, rethinking privacy
> law.* J.Intell.Prop.L., 13*, 205.
> 
> Cooper, J. E. (2006). Freedom of speech and philosophical citizenship in
> Spinoza's theologico-political treatise.* Law, Culture and the Humanities, 2
> *(1), 91.
> 
> Danet, B. (1998). Text as mask: Gender, play, and performance on the
> internet. In S. Jones (Ed.), *Cybersociety 2.0: Revisiting computer-mediated
> communication and community* () Sage Publications, Inc.
> 
> Davenport, D. (2002). Anonymity on the internet: Why the price may be too
> high.* Communications of the ACM, 45*(4), 33-35.
> 
> De Hert, P. (2003). The case of anonymity in western political philosophy:
> Benjamin Constant’s refutation of republican and utilitarian arguments
> against anonymity. In C. Nicoll, J. E. J. Prins & M. J. M. van Dellen (Eds.),
> *Digital anonymity and the law: Tensions and dimensions.* (pp.
> 47-97). the Hague: TMC Asser Press.
> 
> De Villiers, N. (2009). Confessions of a masked philosopher: Anonymity and
> identification in Foucault and Guibert.* Symploke, 16*(1-2), 75-91.
> 
> Diakopoulos, N., & Naaman, M. (2011). Towards quality discourse in online
> news comments. *Proceedings of the ACM 2011 Conference on Computer
> Supported Cooperative Work, *pp. 133-142.
> 
> Dibbell, J. (2010). Radical opacity.* Technology Review, 16*(16), 2.
> 
> DJ Pangburn. (2011). *Digital activism from anonymous to occupy wall
> street: A conversation with gabriella coleman.* Retrieved 11/09, 2011, from
> http://www.deathandtaxesmag.com/157192/digital-activism-from-
> anonymous-to-occupy-wall-street-a-conversation-with-gabriella-coleman/
> 
> Donath, J. S. (1999). Identity and deception in the virtual community. In M. A.
> Smith , & P. Kollock (Eds.), *Communities in cyberspace* (pp. 29-59).
> London: Routledge.
> 
> Dreyfus, H. L. (1999). *Kierkegaard on the internet: Anonymity vrs.
> commitment in the present age* HL Dreyfus.
> 
> Dreyfus, H. L. (2001). *On the internet*. London: Routledge.
> 
> Farrall, K. (2012). Online collectivism, individualism and anonymity in East
> Asia.* Surveillance & Society, 9*(4), 424-440.
> 
> Froomkin, A. M. (1999). Legal issues in anonymity and pseudonymity.* The
> Information Society, 15*(2), 113-127.
> 
> Froomkin, A. M. (2011). *Lessons learned too well. *Unpublished
> manuscript.
> 
> Fuchs, C., Albrechtslund, A., Boersma, K., & Sandoval Gomez, M. (Eds.).
> (2011). *Internet & surveillance*. London: Routledge.
> 
> Grosser, B. (2011). *How the technological design of facebook homogenizes
> identity and limits personal representation.* Retrieved 02/13, 2012, from
> http://bengrosser.com/blog/how-the-technological-design-of-facebook-
> homogenizes-identity-and-limits-personal-representation/
> 
> György, P. (2002). A tale of cookies (dr. jekyll and mr. hyde).* Social
> Research: An International Quarterly, 69*(1), 239-245.
> 
> Hiltz, S. R., Turoff, M., & Johnson, K. (1985). *Mode of communication and
> the "risky shift": A controlled experiment with computerized conferencing
> and anonymity in a large corporation* Computer & Information Science
> Department, New Jersey Institute of Technology.
> 
> Hoffman, D. L., Novak, T. P., & Peralta, M. A. (1999). Information privacy in
> the marketspace: Implications for the commercial uses of anonymity on the
> web.* The Information Society, 15*(2), 129-139.
> 
> Joinson, A. N. (2001). Self‐disclosure in computer‐mediated communication:
> The role of self‐awareness and visual anonymity.* European Journal of Social
> Psychology, 31*(2), 177-192.
> 
> Jøsang, A., Ismail, R., & Boyd, C. (2007). A survey of trust and reputation
> systems for online service provision.* Decision Support Systems, 43*(2), 618-
> 644.
> 
> Kahai, S. S. (2009). Anonymity and counter-normative arguments in
> computer-mediated discussions.* Group & Organization Management,
> 34*(4), 449-478.
> 
> Kelly, A. (2009). In defence of anonymity: Rejoining the criticism.*British
> Educational Research Journal, 35 *(3), 431-445.
> 
> Kennedy, H. (2006). Beyond anonymity, or future directions for internet
> identity research.* New Media & Society, 8*(6), 859.
> 
> Kerr, I., Steeves, V. M., & Lucock, C. (Eds.). (2009). *Lessons from the identity
> trail: Anonymity, privacy and identity in a networked society*.
> Oxford: Oxford University Press.
> 
> Kirkpatrick, D. (2011). *The facebook effect: The inside story of the company
> that is connecting the world*. New York: Simon and Schuster.
> 
> Kling, R. (1996). Beyond outlaws, hackers and pirates: Ethical issues in the
> work of information and computer science professionals. In R. Kling (Ed.),
> *Computerization and controversy: Value conflicts and social choices* (). San
> Diego:
> Academic Press.
> 
> Kling, R. (1996). Information technologies and the shifting balance between
> privacy and social control. In R. Kling (Ed.), *Computerization and
> controversy: Value conflicts and social choices* (). San Diego: Academic
> Press.
> 
> Kling, R., Lee, Y., Teich, A., & Frankel, M. S. (1999). Assessing anonymous
> communication on the internet: Policy deliberations.* The Information
> Society, 15*(2), 79-90.
> 
> Knuttila, L. (2011). User unknown: 4chan, anonymity and contingency.* First
> Monday, 16*(10-3), 11.11.2012.
> 
> Kovács, A. (2002). Public identity in defining the boundaries of public and
> private: The example of latent anti-semitism.* Social Research: An
> International Quarterly, 69*(1), 179-194.
> 
> Lampe, C., & Resnick, P. (2004). Slash (dot) and burn: Distributed moderation
> in a large online conversation space. *Proceedings of the SIGCHI Conference
> on Human Factors in Computing Systems, *pp. 543-550.
> 
> Lea, M., Spears, R., & de Groot, D. (2001). Knowing me, knowing you:
> Anonymity effects on social identity processes within groups.* Personality
> and Social Psychology Bulletin, 27*(5), 526-537.
> 
> Lee, Y. C. (2006). Internet and anonymity.* Society, 43*(4), 5-7.
> 
> Leshed, G. (2009). Silencing the clatter: Removing anonymity from a
> corporate online community.* Online Deliberation: Design, Research, and
> Practice, *, 243-251.
> 
> Levmore, S., & Nussbaum, M. C. (Eds.). (2010). *The offensive Internet.
> speech, privacy, and reputation*. Cambridge: Harvard University Press.
> 
> Linstone, H. A., Turoff, M., & Helmer, O. (1975). *The delphi method:
> Techniques and applications* Addison-Wesley Publishing Company,
> Advanced Book Program.
> 
> Lovink, G., (2012). *Networks without a cause*. Cambridge: Polity
> 
> Marx, G. (2004). Internet anonymity as a reflection of broader issues
> involving technology and society.* Asia-Pacific Review, 11*(1), 142-166.
> 
> Marx, G. T. (1999). What's in a name? some reflections on the sociology of
> anonymity.* The Information Society, 15*(2), 99-112.
> 
> Mispel, M. *The ‘Strategic Value’of online anonymity. *Unpublished
> manuscript.
> 
> Narayanan, A., & Shmatikov, V. (2009). De-anonymizing social networks.
> *Security
> and Privacy, 2009 30th IEEE Symposium on, *pp. 173-187.
> 
> Nicoll, C., & Prins, J. (2003). Anonymity: Challenges for politics and law.
> (pp. 287-297) TMC Asser Press.
> 
> Nissenbaum, H. (1999). The meaning of anonymity in an information age.*
> The Information Society, 15*(2), 141-144.
> 
> Nogami, T. (2010). Reexamination of the association between anonymity and
> self-interested unethical behavior in adults.* The Psychological Record,
> 59*(2), 7.
> 
> Nozawa, S. (2012). The gross face and virtual fame: Semiotic mediation in
> Japanese virtual communication.* First Monday, 17*(3-5)
> 
> O’Dair, S. (2009). Laboring in anonymity.* Symploke, 16*(1-2), 7-19.
> 
> Ohm, P. (2010). Broken promises of privacy: Responding to the surprising
> failure of anonymization.* UCLA Law Review, 57*, 20.11.2012.
> 
> Plato, . (1975). *The republic* (Desmond Lee Trans.). (Second (revised) ed.).
> Harmondsworth: Penguin Books.
> 
> Qian, H., & Scott, C. R. (2007). Anonymity and Self‐Disclosure on
> weblogs.*Journal of Computer‐Mediated Communication, 12 *(4), 1428-
> 1451.
> 
> Rains, S. A., & Scott, C. R. (2007). To identify or not to identify: A theoretical
> model of receiver responses to anonymous communication.*Communication
> Theory, 17 *(1), 61-91.
> 
> Robards, B. (2010). Negotiating identity and integrity on social network sites
> for educators.* International Journal for Educational Integrity, 6*(2)
> 
> 
> Robards, B. (2010). Negotiating identity and integrity on social network sites
> for educators.* International Journal for Educational Integrity, 6*(2)
> 
> 
> Ruesch, M. A., & Märker, O. Real name policy in E-participation. *CeDEM12
> Conference for E-Democracy and Open Government, *Danube-University
> Krems, Austria. pp. 109.
> 
> Saks, M. J., & Ostrom, T. M. (1973). Anonymity in letters to the editor.*The
> Public Opinion Quarterly, 37 *(3), 417-422.
> 
> Singh, A. (2009). Anonymity, authorship, and blogger ethics.* Symploke,
> 16*(1-2), 21-35.
> 
> Solove, D. (2006). A brief history of information privacy law.* **Proskauer on
> Privacy, PLI, *, 20.11.2012.
> 
> Teich, A., Frankel, M. S., Kling, R., & Lee, Y. (1999). Anonymous
> communication policies for the internet: Results and recommendations of
> the AAAS conference.* The Information Society, 15*(2), 71-77.
> 
> Tufekci, Z. (2008). Can you see me now? audience and disclosure regulation
> in online social network sites.* Bulletin of Science, Technology & Society,
> 28*(1), 20-36.
> 
> Wallace, J. D. (1999). *Nameless in cyberspace: Anonymity on the internet
> *Cato Institute.
> 
> Wallace, K. A. (2008). Online anonymity. In K. E. Himma, & H. T. Tavani (Eds.),
> *The handbook of information & computer ethics* (). Hoboken: Wiley.
> 
> Wayner, P. (1999). Technology for anonymity: Names by other nyms.* The
> Information Society, 15*(2), 91-97.
> 
> West, P., & Burkell, J. *Names, nyms, addresses and reputations: The
> experience of anonymity in the wired world. *Unpublished manuscript.
> 
> Woo, J. (2006). The right not to be identified: Privacy and anonymity in the
> interactive media environment.* New Media & Society, 8*(6), 949.
> 
> Yum, Y., & Hara, K. (2005). Computer‐Mediated relationship development: A
> Cross‐Cultural comparison.* Journal of Computer‐Mediated Communication,
> 11*(1), 133-152.
> 
> Zabuzhko, O. (2002). Publicity and media under communism and after: The
> destruction of privacy.* Social Research: An International Quarterly, 69*(1),
> 35-47.
> 
> Zdravomyslova, E., & Voronkov, V. (2002). The informal public in soviet
> society: Double morality at work.* Social Research: An International
> Quarterly, 69*(1), 49-69.
> 
> Zhuo, J. (2010). Where anonymity breeds contempt.* The New York Times,
> *, A27.
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 2012/11/20 Kornelia Trytko <ktrytko.ntu at gmail.com>
> 
> > Der all,
> >
> > thank you so much for your suggestions concerning online anonymity. I
> > haven't got too many cues about the discursive construction/media
> > representations of this issue but I guess I should take it as a
> > promising sign of an unexplored area :) I’m attaching a list of papers
> > on various aspects of online anonymity that might be of interest to some of
> you.
> >
> >  Thanks again,
> >
> > Kornelia Trytko
> > PhD candidate,
> > Nottingham Trent University
> >
> >
> >
> _______________________________________________
> The Air-L at listserv.aoir.org mailing list is provided by the Association of
> Internet Researchers http://aoir.org Subscribe, change options or
> unsubscribe at: http://listserv.aoir.org/listinfo.cgi/air-l-aoir.org
> 
> Join the Association of Internet Researchers:
> http://www.aoir.org/




More information about the Air-L mailing list