138,963 research outputs found

    Nameless in Cyberspace: Anonymity on the Internet

    Get PDF
    Proposals to limit anonymous communications on the Internet would violate free speech rights long recognized by the Supreme Court. Anonymous and pseudonymous speech played a vital role in the founding of this country. Thomas Paine's Common Sense was first released signed, "An Englishman." Alexander Hamilton, John Jay, James Madison, Samuel Adams, and others carried out the debate between Federalists and Anti-Federalists using pseudonyms. Today, human rights workers in China and many other countries have reforged the link between anonymity and free speech. Given the importance of anonymity as a component of free speech, the cost of banning anonymous Internet speech would be enormous. It makes no sense to treat Internet speech differently from printed leaflets or books

    Green on What Side of the Fence? Librarian Perceptions of Accepted Author Manuscripts

    Get PDF
    INTRODUCTION There is a growing body of accepted author manuscripts (AAMs) in national, professional, and institutional repositories. This study seeks to explore librarian attitudes about AAMs and in what contexts they should be recommended. Particular attention is paid to differences between the attitudes of librarians whose primary job responsibilities are within the field of scholarly communications as opposed to the rest of the profession. METHODS An Internet survey was sent to nine different professional listservs, asking for voluntary anonymous participation. RESULTS This study finds that AAMs are considered an acceptable source by many librarians, with scholarly communications librarians more willing to recommend AAMs in higher-stakes contexts such as health care and dissertation research. DISCUSSION Librarian AAM attitudes are discussed, with suggestions for future research and implications for librarians

    Cyberspace: The Final Frontier, for Regulation?

    Get PDF
    This article will discuss the concept of anonymity on the Internet and argue for its protection. Part II provides background information on the Internet and illustrates the prominence the Internet has in today\u27s global society. Part III discusses the concept of anonymity and its importance in our daily communications and how these principles necessarily extend to online communication. Part IV outlines the purported justifications for regulating Internet content, which is followed by Part V discussing current and attempted regulations of the Internet. This article then argues for the full protection of online anonymous speech as mandated by fundamental principles of free speech, the traditions of our right to remain anonymous, and our notions of privacy. Finally, Part VII concludes by maintaining that self regulation of the Internet is preferable to intrusive governmental regulation

    Electronic Anonymous Communications: Considerations for Higher Education Administrators

    Get PDF
    Communications via electronic technology have expanded to encompass daily life for most higher education students, faculty, staff, and administrators. The Pew Research Center reports that nearly 100% of undergraduate and graduate students access the Internet (Smith, Rainie, & Zikuhr, 2011). Computers, cell phones, and tablets are an integral part of university life and student communications using social media websites, text messaging, online chat, and websites are widespread. Electronic communications can be categorized as websites, application, or social media. A subset of these electronic communications, characterized as anonymous, may present a particular challenge to those working in higher education institutions. Created to provide students an opportunity for free speech and expression, anonymous electronic communications offer mockers, bullies, and other tormentors a nameless venue to critique, harass, and verbally abuse other students. The anonymous behavior has expanded and escalated to threats of rape, murder, campus bombing, and other acts of violence, some of which occurs among groups communicating in real time. The impact in the classroom and on student life is an important consideration for campus administrators today, especially with the proliferation of cyberbullying. Although there may be little that can be done to control participation, administrators can benefit from understanding the availability and nature of anonymous electronic communications and the influence they can have on all aspects of student life. Further, an appreciation of the modes and effects can inform policy and decision making to provide the most beneficial student services management

    Stay Awhile and Listen: User Interactions in a Crowdsourced Platform Offering Emotional Support

    Get PDF
    Internet and online-based social systems are rising as the dominant mode of communication in society. However, the public or semi-private environment under which most online communications operate under do not make them suitable channels for speaking with others about personal or emotional problems. This has led to the emergence of online platforms for emotional support offering free, anonymous, and confidential conversations with live listeners. Yet very little is known about the way these platforms are utilized, and if their features and design foster strong user engagement. This paper explores the utilization and the interaction features of hundreds of thousands of users on 7 Cups of Tea, a leading online platform offering online emotional support. It dissects the level of activity of hundreds of thousands of users, the patterns by which they engage in conversation with each other, and uses machine learning methods to find factors promoting engagement. The study may be the first to measure activities and interactions in a large-scale online social system that fosters peer-to-peer emotional support

    Monitoring Anonymous P2P File-Sharing Systems

    Get PDF
    2 PagesInternational audienceAnonymous communications have been exponentially growing, where more and more users are shifting to a privacy-preserving Internet and anonymising their peer-to-peer communications. Anonymous systems allow users to access different services while preserving their anonymity. We aim to characterise these anonymous systems, with a special focus in the I2P network. Current statistics service for the I2P network do not provide values about the type of applications deployed in the network nor the geographical localisation of users. Our objective is to determine the number of users in the network, the number of anonymous applications, and the type of those applications. We also explore the possibility of inferring which group of users is responsible for the activity of an anonymous application. Thus, we improve the current I2P statistics and get better insights of the network

    Corporate Cybersmear: Employers File John Doe Defamation Lawsuits Seeking the Identity of Anonymous Employee Internet Posters

    Get PDF
    Communications systems are now wide open and fully accessible, with no limits in range, scope or geography. Targeted audiences are accessible with pinpoint accuracy. Messages reach millions of readers with one click. There is a chat room for everyone. Most importantly, there is no limit on content. Therefore, employees can register their dissatisfaction by posting a message in a chat room. Moreover, the identity of the posting employee is not easily discoverable due to anonymous and pseudonymous communications capabilities. The nature of these online messages is qualitatively different from real-world communications. By way of example, newspapers have a responsibility regarding the veracity of the content that they print. Sponsors of online bulletin board services do not bear the same level of responsibility. In cyberspace chatrooms, everyone is a publisher; there are no editors. Online messages reflect this, too. The culture of online communications is vastly different from traditional discourse, in that the former tolerates and even encourages the use of hyperbole, crudeness, acronyms, misspellings, and misuse of language. It is a fast and loose atmosphere, emphasizing speed rather than accuracy. This is the current environment in which anonymous employees post negative statements about their employers. The questions raised in this article relate to management\u27s response, in the form of John Doe lawsuits, to this recent spate of negative Internet postings by employees. The emergence of the Internet as the medium of choice for such communications raises a myriad of questions that are new to courts. Questions arise regarding the extent to which employers may control the speech of current employees or former employees and, as a corollary to this, the extent to which such speech is protected, as well as whether this attempted speech control violates public policy. Such suits have just begun to reach the courts, and their resolution will form the contours of employee freedom of speech in the Internet age. John Doe suits implicate constitutional and common law issues ranging from the First Amendment to privacy, defamation, breach of employment agreement, and trade secret laws. Such suits involve statutes as well, including whistle-blower protections and Strategic Litigation Against Public Participation ( SLAPP ) laws. Negative postings by employees also correlate to general economic conditions. During the current two year downturn in the financial markets, for example, there has been a tremendous increase in such postings. Employers have just begun to reply to these allegedly defamatory postings--in the form of John Doe lawsuits. Because it is difficult to discern who is speaking in cyberspace, plaintiffs often file a lawsuit listing John Doe as the defendant. Plaintiffs then invoke the power of a subpoena to compel the Internet Service Provider ( ISP ) or Bulletin Board Service ( BBS ) on which the posting was made to identify the poster, thereby unmasking these anonymous and pseudonymous individuals. It is worth noting that plaintiffs have an alternative course of action, in that they could investigate the postings and discover for themselves who is posting the messages. It is not clear whether any more effort or expense is involved in this strategy than immediately invoking the assistance--and the power--of the judicial system. But it is fair to say that involving the judicial system at this earliest stage is a coercive, and effective, strategy

    Corporate Cybersmear: Employers File John Doe Defamation Lawsuits Seeking the Identity of Anonymous Employee Internet Posters

    Get PDF
    Communications systems are now wide open and fully accessible, with no limits in range, scope or geography. Targeted audiences are accessible with pinpoint accuracy. Messages reach millions of readers with one click. There is a chat room for everyone. Most importantly, there is no limit on content. Therefore, employees can register their dissatisfaction by posting a message in a chat room. Moreover, the identity of the posting employee is not easily discoverable due to anonymous and pseudonymous communications capabilities. The nature of these online messages is qualitatively different from real-world communications. By way of example, newspapers have a responsibility regarding the veracity of the content that they print. Sponsors of online bulletin board services do not bear the same level of responsibility. In cyberspace chatrooms, everyone is a publisher; there are no editors. Online messages reflect this, too. The culture of online communications is vastly different from traditional discourse, in that the former tolerates and even encourages the use of hyperbole, crudeness, acronyms, misspellings, and misuse of language. It is a fast and loose atmosphere, emphasizing speed rather than accuracy. This is the current environment in which anonymous employees post negative statements about their employers. The questions raised in this article relate to management\u27s response, in the form of John Doe lawsuits, to this recent spate of negative Internet postings by employees. The emergence of the Internet as the medium of choice for such communications raises a myriad of questions that are new to courts. Questions arise regarding the extent to which employers may control the speech of current employees or former employees and, as a corollary to this, the extent to which such speech is protected, as well as whether this attempted speech control violates public policy. Such suits have just begun to reach the courts, and their resolution will form the contours of employee freedom of speech in the Internet age. John Doe suits implicate constitutional and common law issues ranging from the First Amendment to privacy, defamation, breach of employment agreement, and trade secret laws. Such suits involve statutes as well, including whistle-blower protections and Strategic Litigation Against Public Participation ( SLAPP ) laws. Negative postings by employees also correlate to general economic conditions. During the current two year downturn in the financial markets, for example, there has been a tremendous increase in such postings. Employers have just begun to reply to these allegedly defamatory postings--in the form of John Doe lawsuits. Because it is difficult to discern who is speaking in cyberspace, plaintiffs often file a lawsuit listing John Doe as the defendant. Plaintiffs then invoke the power of a subpoena to compel the Internet Service Provider ( ISP ) or Bulletin Board Service ( BBS ) on which the posting was made to identify the poster, thereby unmasking these anonymous and pseudonymous individuals. It is worth noting that plaintiffs have an alternative course of action, in that they could investigate the postings and discover for themselves who is posting the messages. It is not clear whether any more effort or expense is involved in this strategy than immediately invoking the assistance--and the power--of the judicial system. But it is fair to say that involving the judicial system at this earliest stage is a coercive, and effective, strategy
    • …
    corecore