Вы находитесь на странице: 1из 7

Joshua Coon

CST 373

5 April 2017

Ethics in Online Anonymity: An Annotated Bibliography

Clemmitt, Marcia. "The Dark Web." CQ Researcher 15 Jan. 2016: 49-72. Web. 14 Apr. 2017.

This source, from CQ Researcher, is a pillar in my research paper. It is chalk full of

detailed and current analysis of internet anonymity. It fits well into my research, because

it gives a full review and study of the issue at hand. For instance, it covers the

controversies surrounding online anonymity, the technologies background and history,

and cites helpful information from other sources.

Although not the only source, this source is a launching point for the rest of my research

and citations. It does not explicitly discuss the ethical issues of anonymity, but does

identify many issues that have deeply rooted ethical issues.

Robson, Mark. The Ethics of Anonymity. The Modern Language Review, vol. 103, no. 2, 2008,

pp. 350363., www.jstor.org/stable/20467777.

The Ethics of Anonymity takes a look at the literary uses of anonymity. Although not

fundamental to my research, this journal is a good source of information regarding

anonymity and its history.


Staedter, Tracy. "A More Anonymous Internet." MIT Technology Review. MIT Technology

Review, 1 May 2003. Web. 14 Apr. 2017.

Although nearly 15 years old, this article by Tracy Staedter offers some interesting uses

of anonymity for the sake of security. She writes about IBMs development of Idemix

which uses customer anonymity to prevent credit card fraud and identity theft. Since the

article was written, IBM has made improvements to its software, but the core principle

remains the same: use encryption to remain anonymous, and use anonymity to remain

safe and secure. I would like to explore this benefit of anonymity in my research paper. I

think it will have a good impact on the conclusions that I reach.

Wang, Zuoming. "Anonymity Effects and Implications in the Social Identity Model of

Deindividuation: From Crowd to Computer-Mediated Communication." Conference Papers --

International Communication Association, 2007 Annual Meeting, pp. 1-27. EBSCOhost,

search.ebscohost.com/login.aspx?direct=true&db=ufh&AN=26949746&site=ehost-live. 14 Apr.

2017.

This report is a fantastic source that focuses on the psychology contrast between crowd

and computer communication. It takes an interesting look at how humans tend to interact

and what causes them to interact in certain ways. I will certainly use this source for its

rich content regarding human psychology.


"The Secret Sauce." Wired, June 2014, p. 74. Computer Database,

go.galegroup.com/ps/i.do?p=CDB&sw=w&u=csumb_main&v=2.1&id=GALE%7CA370884937&it

=r&asid=49996547c88e99e7c594e72ece342482. 14 Apr. 2017.

This article by Wired Magazine explores the chilling insights that complete anonymity

can afford us. Anonymity has often been criticized for its potential to be lacking in truth.

While its accurate that anonymity could create a platform for dishonesty, the opposite is

also true. As the article writes, [t]he comfort of anonymity, it turns out, can foster truth.

This is another helpful perspective to online anonymity.

Akdeniz, Yaman. "Anonymity, Democracy, and Cyberspace." Social Research, vol. 69, no. 1,

Spring2002, pp. 223-237. EBSCOhost,

search.ebscohost.com/login.aspx?direct=true&db=ufh&AN=6869559&site=ehost-live. 14 Apr.

2017.

Anonymity, Democracy, and Cyberspace provides a well laid-out presentation of the

economic and cultural value of global communications networks and the benefits they

provide for individual freedom and collective democracy. The paper also makes the

case that the Internet does not create new privacy issues. Rather, it makes existing

onessuch as confidentiality, authentication, and integrity of the personal information

and correspondence circulateddifficult to control and secure. This is an interesting

perspective that calls into play what has already been established as law regarding

privacy issues.
Zipperer, John. "Anonymous Peering." Internet World, 1 Sept. 2001, p. 13. Computer Database,

go.galegroup.com.library2.csumb.edu:2048/ps/i.do?p=CDB&sw=w&u=csumb_main&v=2.1&it=r

&id=GALE%7CA78267847&asid=db6c919883cbd12a2fda180eb39be1d1. 14 Apr. 2017.

Anonymous Peering gives us a fresh perspective to anonymity. In particular,

institutional investments. The company Liquidnet deals with keeping investors

anonymous. The company serves large institutional investors, which regularly trade

huge amounts of shares but which suffer from the fact that other players can divine their

intentions and push up prices before the institutions can execute their trades. Yet again,

this is another source which sheds a good light on the power, usefulness, and general

benefit of online anonymity.

Kling, Rob, et al. "Assessing Anonymous Communication on the Internet: Policy Deliberations."

Information Society, vol. 15, no. 2, Apr-Jun, pp. 79-90. EBSCOhost. 14 Apr. 2017.

This excerpt from the academic journal, Assessing Anonymous Communication on the

Internet: Policy Deliberations, summarized its balanced approach to the issue of online

anonymity: Anonymous communication is neither intrinsically good nor intrinsically

good. There are situations in which anonymity is to be encouraged, desired, or at least

tolerated. Anonymous communication may help or encourage people to determine the

truth or falsity of allegations (in the case of journalism, for example); blow the whistle on

illegal or unethical behavior in an organization by reporting problems, violations, and

actions; obtain help from social service providers; protect their personal privacy; and

avoid persecution by oppressive regimes. Anonymity also carries risks. Because


accountability is diminished, it can be abused to send electronic junk mail; to deceive, as

well as impersonate others; to send hate mail; and to engage in illegal activities.

Organizations and online groups have the right to insist that their participants electronic

communications are not anonymous. In practice, some online groups insist that their

members be personally identifiable, while others encourage anonymous

communications.

Bodle, Robert (2013). The ethics of online anonymity or Zuckerberg vs. Moot. Acm Sigcas

Computers and Society pp. 22-35. 14 Apr. 2017.

This report builds an ethical argument that anonymity in networked digital

communications is indispensable as an enabler of other inalienable rights including

informational privacy and freedom of expression. I believe it will be a great source for

exploring various ethical frameworks to approach this issue. The author even explores

metaethics in relation to the topic on online anonymity. This is one of my top sources.

"How to stay anonymous online." Digit, 29 Aug. 2016. Computer Database,

go.galegroup.com.library2.csumb.edu:2048/ps/i.do?p=CDB&sw=w&u=csumb_main&v=2.1&it=r

&id=GALE%7CA464834877&asid=db4b82a3a1052bdd3089f0f8989da0bb. 14 Apr. 2017.

This source simply outlines a few ways that online anonymity can be achieved. Its short

and sweet, but gives good advice on various avenues for ensuring anonymity. I will

primarily use this source for general information on what online anonymity is and how my

readers might achieve it.


"The Future of the Internet." Discover, vol. 21, no. 11, Nov. 2000, p. 55. EBSCOhost,

search.ebscohost.com/login.aspx?direct=true&db=ulh&AN=3819816&site=ehost-live.

This article is 17 years old, so it is curious what its authors have said nearly two decades

ago. I will use their commentary for some fun contrast between what was imagined years

ago to what is a reality now.

Woo, Jisuk. "Internet Privacy and the Right Not to Be Identified." Conference Papers --

International Communication Association, 2005 Annual Meeting, New York, NY, pp. 1-40.

EBSCOhost,

search.ebscohost.com/login.aspx?direct=true&db=ufh&AN=18655383&site=ehost-live. 14 Apr.

2017.

This source recommends that deception regarding identity and identification might be

the most effective - and sometimes only practically viable - way of ensuring privacy in the

interactive environment. Its somewhat of a bold claim, but not one to be dismissed. One

good way that a careful user can insist that he or she is kept anonymous is by falsifying

personal information for the sake of security. For example, entering a fake name or

birthday. I intend to use this source as another perspective on the issue.

Froomkin, A. Michael. "Legal Issues in Anonymity and Pseudonymity." Information Society, vol.

15, no. 2, Apr-Jun99, pp. 113-127. EBSCOhost. 14 Apr 2017.


This source deals more closely with the dilemma regarding law enforcement. How might

we balance protecting online anonymity while also being protected from crime and

terror? A. Michael Froomkin explores this side of the coin a bit deeper than any of my

previous sources. His writings will have a significant role in my research paper due to his

reasonable assessment and concerns with online anonymity.

Park, Namsu. "One Step Back from Democracy: Adoption of Online Identification System in

Korea." Conference Papers -- International Communication Association, 2008 Annual Meeting,

pp. 1-24. EBSCOhost,

search.ebscohost.com/login.aspx?direct=true&db=ufh&AN=36956967&site=ehost-live. 14 Apr.

2017.

This source dives into the proposed legislation that would essentially institute the

opposite of web anonymity. It takes a close look at South Koreas bill calling for an online

identification system. The impacts to online interaction in the country would be

incredible. This source is great for building a case on the social effects that would occur

due to a complete exposure of the identities of all South Korean internet users. It is also

packed with helpful statistics and information relating to cybercrime.

"Total Privacy and Absolute Disclosure in the Blogosphere: How Anonymous Courtesan Blogs

Reveal All and Why." ETC: A Review of General Semantics, vol. 68, no. 3, July 2011, pp.

275-278. EBSCOhost,

search.ebscohost.com/login.aspx?direct=true&db=ufh&AN=64432722&site=ehost-live. 14 Apr.

2017.

Вам также может понравиться