134,354 research outputs found

    A Queer and Feminist Defense of Being Anonymous Online

    Get PDF
    From the earliest days of digital communities, online abuse has been connected to anonymity. While concerns around the impact of anonymity, particularly for women, people of color and LGBTQ folks, is legitimate, this paper argues that a flat rejection of digital anonymity is problematic, foreclosing certain forms of queer and feminist praxis. To make this case, I turn to the platform politics of Craigslist. Using Craigslist as a case study, I discuss the persistent stigma attached to online anonymity, before addressing specific tactics of online anonymity associated with queer and feminist values of privacy and mutual aid. Drawing on accounts of Craigslist users who saw anonymity as a protective form of control over their personal information, I outline ways in which anonymity is not solely an enabler for misogyny and homophobia, and can instead (or rather, also) be a subversive tool for self-expression and intimacy

    Ethical Issues in Conducting Qualitative Research in Online Communities

    Get PDF
    Increasingly, psychologists are extending their research to include online methods of data collection. Psychologists’ use of qualitative data obtained or generated online for research purposes poses unique challenges because of the “traceability” of quotes, often sensitive content of data and potential impact on both individuals and online communities. In this article, working within a framework that goes beyond “procedural ethics” to examine “ethics in practice,” ethical issues associated with conducting qualitative research within online communities are identified. These include tensions over public/private space, authorship versus human research participants, informed consent, anonymity and pseudonymity, covert research, deceptive research identities, reactions to being researched, and the quality of data obtained. Prior to conducting qualitative research in online communities, researchers have an ethical obligation to identify and weigh possible risks and benefits to both the community and community members. Sensitivity to the specific online community and continued ethical consideration throughout the conduct and reporting of the research are required

    The Impact of Anonymous Peripheral Contributions on Open Source Software Development

    Get PDF
    Online peer production communities such as open source software (OSS) projects attract both identified and anonymous peripheral contributions (APC) (e.g., defect reports, feature requests, or forum posts). While we can attribute identified peripheral contributions (IPC) to specific individuals and OSS projects need them to succeed, one cannot trace back anonymous peripheral contributions (APC), and they can have both positive and negative ramifications for project development. Open platforms and managers face a challenging design choice in deciding whether to allow APC and for which tasks or what type of projects. We examine the impact that the ratio between APC and IPC has on OSS project performance. Our results suggest that the OSS projects perform the best when they contain a uniform anonymity level (i.e., they contain predominantly APC or predominantly IPC). However, our results also suggest that OSS projects have lower performance when the ratio between APC and IPC nears one (i.e., they contain close to the same number of APC and IPC). Furthermore, our results suggest that these results differ depending on the type of application that a project develops. Our study contributes to the ongoing debate about the implications of anonymity for online communities and informs managers about the effect that anonymous contributions have on their projects

    4chan and /b/: An Analysis of Anonymity and Ephemerality in a Large Online Community

    No full text
    We present two studies of online ephemerality and anonymity based on the popular discussion board /b/ at 4chan.org: a website with over 7 million users that plays an influential role in Internet culture. Although researchers and practitioners often assume that user identity and data permanence are central tools in the design of online communities, we explore how /b/ succeeds despite being almost entirely anonymous and extremely ephemeral. We begin by describing /b/ and performing a content analysis that suggests the community is dominated by playful exchanges of images and links. Our first study uses a large dataset of more than five million posts to quantify ephemerality in /b/. We find that most threads spend just five seconds on the first page and less than five minutes on the site before expiring. Our second study is an analysis of identity signals on 4chan, finding that over 90% of posts are made by fully anonymous users, with other identity signals adopted and discarded at will. We describe alternative mechanisms that /b/ participants use to establish status and frame their interaction

    Cyberpsychology and Human Factors

    Get PDF
    The online environment has become a significant focus of the everyday behaviour and activities of individuals and organisations in contemporary society. The increasing mediation of communication has led to concerns about the potential risks and associated negative experiences which can occur to users, particularly children and young people. This is related to the emergence of the online environment as a location for criminal and abusive behaviour (e.g., harassment, sexual exploitation, fraud, hacking, malware). One of the key aspects of understanding online victimisation and engagement in criminal behaviours is the characteristics of online communication that are related to the affordances of the technologies, services and applications which constitute digital environments. The aim of this paper is to examine the influence of these characteristics on individual and group behaviour, as well as the associated opportunities for victimisation and criminal behaviour. These issues are of relevance for those involved in the design and implementation of technologies and services, as the ability to assess their potential use in this way can enhance strategies for improving the security of systems and users. It can also inform educational strategies for increasing user understanding of potential informational, privacy and personal risks, and associated steps to improve their security and privacy. Each of the main characteristics of mediated communication is examined, as well as their potential impact on individual and group behaviour, and associated opportunities for victimisation and offending. The article ends by considering the importance of recognising these issues when designing and implementing new technologies, services and applications

    Cross-disciplinary lessons for the future internet

    Get PDF
    There are many societal concerns that emerge as a consequence of Future Internet (FI) research and development. A survey identified six key social and economic issues deemed most relevant to European FI projects. During a SESERV-organized workshop, experts in Future Internet technology engaged with social scientists (including economists), policy experts and other stakeholders in analyzing the socio-economic barriers and challenges that affect the Future Internet, and conversely, how the Future Internet will affect society, government, and business. The workshop aimed to bridge the gap between those who study and those who build the Internet. This chapter describes the socio-economic barriers seen by the community itself related to the Future Internet and suggests their resolution, as well as investigating how relevant the EU Digital Agenda is to Future Internet technologists

    Net generation culture

    Get PDF
    • 

    corecore