fbpx
Wikipedia

Anonymous post

An anonymous post, is an entry on a textboard, anonymous bulletin board system, or other discussion forums like Internet forum, without a screen name or more commonly by using a non-identifiable pseudonym. Some online forums such as Slashdot do not allow such posts, requiring users to be registered either under their real name or utilizing a pseudonym. Others like JuicyCampus, AutoAdmit, 2channel, and other Futaba-based imageboards (such as 4chan) thrive on anonymity. Users of 4chan, in particular, interact in an anonymous and ephemeral environment that facilitates rapid generation of new trends.

History of online anonymity

Online anonymity can be traced to Usenet newsgroups in the late 1990s where the notion of using invalid emails for posting to newsgroups was introduced. This was primarily used for discussion on newsgroups pertaining to certain sensitive topics. There was also the introduction of anonymous remailers which were capable of stripping away the sender's address from mail packets before sending them to the receiver. Online services which facilitated anonymous posting sprang up around mid-1992, originating with the cypherpunk group.[1]

The precursor to Internet forums like 2channel and 4chan were textboards like Ayashii World and Amezou World that provided the ability for anonymous posts in Japan. These "large-scale anonymous textboards" were inspired by the Usenet culture and were primarily focused on technology, unlike their descendants.[2]

Today, image boards receive tremendous Internet traffic from all parts of the world. In 2011, on 4chan's most popular board, /b/, there were roughly 35,000 threads and 400,000 posts created per day. At that time, that level of content was on par with YouTube. Such high traffic suggests a broad demand from Internet users for anonymous content sharing sites.[3]

Levels of anonymity

Anonymity on the Internet can pertain to both the utilization of pseudonyms or requiring no authentication at all (also called "perfect anonymity") for posting on a website.[4] Online anonymity is also limited by IP addresses. For example, WikiScanner associates anonymous Wikipedia edits with the IP address that made the change and tries to identify the entity that owns the IP address. On other websites, IP addresses may not be publicly available, but they can be obtained from the website administrators only through legal intervention. They might not always be traceable to the poster.[5]

Techniques

Utilizing pseudonyms allow people to post without revealing their real identity. Pseudonyms, however, are still prone to being tracked to the user's IP address.[6] To avoid being tracked to an IP address, it is possible to post via a public computer where the IP address would usually be under the purview of the public workspace such as a coffee shop, and hence cannot be traced to the individual user.[6] Adversarial stylometry can be employed to resist identification by writing style.

Memes

Another way people are posting anonymously online is through the use of memes. One popular meme is the Confession Bear meme. People use Confession Bear to post everything from funny and embarrassing stories to very troubled thoughts.[7]

Technology

There are services described as anonymizers which aim to provide users the ability to post anonymously by hiding their identifying information. Anonymizers are essentially proxy servers which act as an intermediary between the user who wants to post anonymously and the website which logs user information such as IP addresses. The proxy server is the only computer in this network which is aware of the user's information and provides its own information to anonymize the poster.[8] Examples of such anonymizers include Tor and I2P, which employ techniques such as onion and garlic routing (respectively) to provide enhanced encryption to messages that travel through multiple proxy servers.[6]

Applications like PGP utilizing techniques like private-key and public-key encryptions are also utilized by users to post content in Usenet groups and other online forums.[9]

Legal standards and regulations

China

The revised draft of the Chinese government's "Internet Information Services"[10] proposes that "Internet information service providers, including microblogs, forums, and blogs, that allow users to post information on the Internet should ensure users are registered with their real identities".[11] Starting October 1, 2017, it will require Internet users to identify themselves with their real names to use comments sections on news and social media websites.[12]

The Philippines

The Philippine government passed the Cybercrime Prevention Act on 12 September 2012, which among other things grants the Department of Justice the ability to "block access to 'computer data' that is in violation of the Act; in other words, a website hosting criminally libelous speech could be shut down without a court order".[13]

United Kingdom

Under the Defamation Act 2013, in an action against a website operator, on a statement posted on the website, it is a defense to show that it was not the operator who posted the statement on the website. The defense is defeated if it was not possible for the claimant to identify the person who posted the statement.

United States

In the United States, the right to speak anonymously online is protected by the First Amendment and various other laws. These laws restrict the ability of the government and civil litigants to obtain the identity of anonymous speakers. The First Amendment says that "Congress shall make no law ... abridging the freedom of speech, or of the press".[14] This protection has been interpreted by the U.S. Supreme Court to protect the right to speak anonymously offline.

For example, in McIntyre v. Ohio Elections Commission, the Supreme Court overturned an Ohio law banning the distribution of anonymous election pamphlets, claiming that an "author's decision to remain anonymous ... is an aspect of the freedom of speech protected by the First Amendment" and that "anonymous pamphleteering is not a pernicious, fraudulent practice, but an honorable tradition of advocacy and of dissent", as well as a "shield" against the so-called tyranny of the majority.[15] Various courts have interpreted these offline protections to extend to the online world.[16]

Identifying the author of an anonymous post may require a Doe subpoena. This involves gaining access to the IP address of the poster via the hosting website. The courts can then order an ISP to identify the subscriber to whom it had assigned said IP address. Requests for such data are almost always fruitful, though providers will often effect a finite term of data retention (in accordance with the privacy policy of each—local law may specify a minimum and/or maximum term). The usage of IP addresses has, in recent times, been challenged as a legitimate way to identify anonymous users.[17][18]

On March 21, 2012, the New York State Senate introduced the bill numbered S.6779 (and A.8668) labeled as the "Internet Protection Act". It proposes the ability of a website administrator of a New York–based website to take down anonymous comments unless the original author of the comment agrees to identify themselves on the post.[19]

In online communities

Online communities vary with their stances on anonymous postings. Wikipedia allows anonymous editing in most cases, but does not label users, instead identifying them by their IP addresses. Other editors commonly refer to these users with neutral terms such as "anons" or "IPs".[20]

Many online bulletin boards require users to be signed in to write—and, in some cases, even to read—posts. 2channel and other Futaba-based image boards take an opposite stance, encouraging the anonymity, and in the case of English-language Futaba-based websites, calling those who use usernames and tripcodes "namefags" and "richeys", respectively.[21] As required by law, even communities such as 4chan do require the logging of IP addresses of such anonymous posters.[citation needed] Such data, however, can only be accessed by the particular site administrator.

Slashdot discourages anonymous posting by displaying "Anonymous Coward" as the author of each anonymous post. The mildly derogatory term is meant to chide anonymous contributors into logging in.[22][23]

Ramifications

Effects on users

The effects of posting online anonymously has been linked to the online disinhibition effect in users whilst been categorized into either benign or toxic disinhibition.[24] Disinhibition can result in misbehavior but can also improve user relationships. It may also result in greater disclosure among Internet users, allowing more emotional closeness and openness in a safe social context.[25]

Anonymous computer communication has also been linked to accentuate self-stereotyping.[26] Although it has been linked to notable effects in gender differences, only when the topic bears similarity and fits with the gender stereotype.[26]

A 2015 study suggested that anonymous news comment sections are more susceptible to uncivil comments, especially those directed at other users. Anonymous news comment section users are also more likely to be impolite by either being sarcastic and casting aspersions.[27]

With regard to a recent hostile subpoena in California, commentators have asked if there will be a "Layfield & Barrett effect" chilling job review posting free speech.[28][29] On May 2, 2016, through its lawyers, Layfield and Barrett and partner Phil Layfield issued a subpoena on Glassdoor seeking the online identities of former employees who posted extremely critical and negative reviews. Glassdoor executives have stated that they will fight the subpoena as they have fought off other efforts to disclose anonymous identities in the recent past.[30] Other litigants in California have won their right to anonymously post negative job reviews but the law remains hotly contested.[31][32]

Effects on online communities

The conditions for deindividuation, such as "anonymity, reduced self-awareness, and reduced self-regulation," fosters creations of online communities much in the same way that they might be employed offline.[33] This is evident in proliferation of communities such as Reddit or 4chan which utilize total anonymity or pseudonymity, or tools such as Informers (which add anonymity to non anonymous social media like Facebook or Twitter), to provide its users the ability to post varied content. The effect of disinhibition has been seen to be beneficial in "advice and discussion threads by providing a cover for more intimate and open conversations".[3]

The "ephemerality", or short-lived nature, of posts that exist on some anonymous image boards such as 4chan create a fast-paced environment. As of 2009, threads on 4chan had a median lifespan of 3.9 minutes.[3]

There is also research suggesting that content that gets posted in such communities also tends to be more deviant in nature than would be otherwise.[34] The ability to post anonymously has also been linked to the proliferation of pornography in newsgroups and other online forums wherein users utilize sophisticated mechanisms such as mentioned in technology.[9]

See also

References

  1. ^ Rigby, Karina, "Anonymity on the Internet Must Be Protected"
  2. ^ "Ayashii World"
  3. ^ a b c Bernstein, Michael (2011). . Proceedings of the Fifth International AAAI Conference on Weblogs and Social Media. Archived from the original on 2015-10-21. Retrieved 17 November 2017.
  4. ^ Furukawa, Hideki,"Q&A With the Founder of Channel 2" January 9, 2013, at the Wayback Machine, The Online Journalism Review, August 22, 2008
  5. ^ "Just how do websites track or monitor our activity?"
  6. ^ a b c . Archived from the original on 2009-04-02. Retrieved 2009-03-17.
  7. ^ Vickery, Jacqueline Ryan (January 2, 2014). "The curious case of Confession Bear: the reappropriation of online macro-image memes". Information, Communication & Society. 17 (3): 301–325. doi:10.1080/1369118X.2013.871056. S2CID 146575682.
  8. ^ Confinet Ltd. "Anonymous Surfing", AnonIC.org, 2004
  9. ^ a b Mehta, Michael & Plaza, Dwaine (April 3, 1997). "Chapter 3: Pornography in Cyberspace: An Exploration of What's in Usenet". In Keisler, Sara (ed.). Culture of the Internet. Lawrence Eribaum Associates. pp. 53–69. ISBN 0805816364.
  10. ^ "Internet Information Services (revised draft)", June 7, 2012
  11. ^ "China Proposes Strengthening Internet Guidelines", Reuters, June 7, 2012
  12. ^ China to ban anonymous online comments – China’s latest society and culture news
  13. ^ Jillian C. York, "A Dark Day for the Philippines as Government Passes Cybercrime Act", Electronic Frontier Foundation, October 3, 2012
  14. ^ First Amendment to the U.S. Constitution
  15. ^ McIntyre v. Ohio Elections Commission, 514 U.S. 334 (1995).
  16. ^ See, e.g., Doe v. Cahill, 884 A.2d 451 (Del. 2005); Krinsky v. Doe 6, 159 Cal. App. 4th 1154 (2008).
  17. ^ Keith Wagstaff, "You Are Not an IP Address, Rules Judge". Time. May 7, 2012.
  18. ^ "US Court of Appeals: An IP address isn't enough to identify a pirate".
  19. ^ New York State Senate Bill no. S.6779, March 21, 2012.
  20. ^ Dwight Silverman, "What's Online", Houston Chronicle, July 7, 2000, page 2.
  21. ^ Page, Lewis. "Anonymous hackers' Wikileaks 'infowar'". The Register. The Register. from the original on 28 June 2011. Retrieved 20 July 2011.
  22. ^ Stephen Shankland, "Andover.Net Scoops Up Seminal Slashdot Site", CNet News, June 29, 1999. (Stating that the term "Anonymous Coward" was popularized by Slashdot.)
  23. ^ Gosain, Sanjay (2003). "Looking through a Window on Open Source Culture". Systèmes d'Information et Management. 8 (1): 22.
  24. ^ Suler, John (2004). "The Online Disinhibition Effect". CyberPsychology & Behavior. 7 (3): 321–326. doi:10.1089/1094931041291295. PMID 15257832.
  25. ^ Ben-Ze'e v, Aaron (July 2003). "Privacy, emotional closeness, and openness in cyberspace". Computers in Human Behavior. 19 (4): 451–467. doi:10.1016/s0747-5632(02)00078-x.
  26. ^ a b Postmas; et al. (2002). "Behavior Online: Does Anonymous Computer Communication Reduce Gender Inequality?". Personality and Social Psychology Bulletin. 28 (8): 1073–1083. doi:10.1177/01461672022811006. S2CID 145697214.
  27. ^ Rowe, I. (2015). "Civility 2.0: a comparative analysis of incivility in online political discussion". Information, Communication & Society. 18 (2): 121–138. doi:10.1080/1369118X.2014.940365. S2CID 5829176.
  28. ^ http://lawandmore.typepad.com/law_and_more/2016/05/anonymous-posting-will-there-be-a-layfield-barrett-effect.html Law and More: Deconstructing What Happens In Law, May 17, 2016, Anonymous Posting - Will there be a Layfield & Barrett Effect?
  29. ^ http://speechwriting-ghostwriting.typepad.com/speechwriting_ghostwritin/2016/05/glassdoor-will-layfield-barrett-subpoena-scare-off-employees-from-ranting.html Jane Genova, Speechwriter-Ghostwriter Blog, May 16, 2016, "Glassdoor - Will Layfield & Barrett Subpoena Scare Off Employees from Ranting?"
  30. ^ http://www.therecorder.com/id=1202749188614/Glassdoor-Fights-Subpoena-Seeking-Identity-of-Commenter?slreturn=20160422220341 The Recorder, Feb. 8, 2016, "Glassdoor Fights Subpoena Seeking Identity of Commenter"
  31. ^ http://www.dmlp.org/threats/krinsky-v-doe-6 Digital Media Law Project, Krinsky v. Doe, 2008
  32. ^ http://www.lexology.com/library/detail.aspx?g=52db6564-e0f4-42eb-abec-c8f109de42a5 Lexicology.com, March 24, 2016, "Opinions, Everyone's Got One".
  33. ^ Myers, David (1987). ""Anonymity is Part of the Magic": Individual Manipulation of Computer-Mediated Communication Contexts". Qualitative Sociology. Springer. 10 (3): 251–266. doi:10.1007/bf00988989. S2CID 144685973.
  34. ^ Suler, John (2009). "The Bad Boys of Cyberspace: Deviant Behavior in a Multimedia Chat Community". CyberPsychology & Behavior. 1 (3): 275–294. doi:10.1089/cpb.1998.1.275.

External links

  • "Privacy for People Who Don't Show Their Navels"

anonymous, post, anonymous, post, entry, textboard, anonymous, bulletin, board, system, other, discussion, forums, like, internet, forum, without, screen, name, more, commonly, using, identifiable, pseudonym, some, online, forums, such, slashdot, allow, such, . An anonymous post is an entry on a textboard anonymous bulletin board system or other discussion forums like Internet forum without a screen name or more commonly by using a non identifiable pseudonym Some online forums such as Slashdot do not allow such posts requiring users to be registered either under their real name or utilizing a pseudonym Others like JuicyCampus AutoAdmit 2channel and other Futaba based imageboards such as 4chan thrive on anonymity Users of 4chan in particular interact in an anonymous and ephemeral environment that facilitates rapid generation of new trends Contents 1 History of online anonymity 2 Levels of anonymity 3 Techniques 3 1 Memes 3 2 Technology 4 Legal standards and regulations 4 1 China 4 2 The Philippines 4 3 United Kingdom 4 4 United States 5 In online communities 6 Ramifications 6 1 Effects on users 6 2 Effects on online communities 7 See also 8 References 9 External linksHistory of online anonymity EditOnline anonymity can be traced to Usenet newsgroups in the late 1990s where the notion of using invalid emails for posting to newsgroups was introduced This was primarily used for discussion on newsgroups pertaining to certain sensitive topics There was also the introduction of anonymous remailers which were capable of stripping away the sender s address from mail packets before sending them to the receiver Online services which facilitated anonymous posting sprang up around mid 1992 originating with the cypherpunk group 1 The precursor to Internet forums like 2channel and 4chan were textboards like Ayashii World and Amezou World that provided the ability for anonymous posts in Japan These large scale anonymous textboards were inspired by the Usenet culture and were primarily focused on technology unlike their descendants 2 Today image boards receive tremendous Internet traffic from all parts of the world In 2011 on 4chan s most popular board b there were roughly 35 000 threads and 400 000 posts created per day At that time that level of content was on par with YouTube Such high traffic suggests a broad demand from Internet users for anonymous content sharing sites 3 Levels of anonymity EditAnonymity on the Internet can pertain to both the utilization of pseudonyms or requiring no authentication at all also called perfect anonymity for posting on a website 4 Online anonymity is also limited by IP addresses For example WikiScanner associates anonymous Wikipedia edits with the IP address that made the change and tries to identify the entity that owns the IP address On other websites IP addresses may not be publicly available but they can be obtained from the website administrators only through legal intervention They might not always be traceable to the poster 5 Techniques EditUtilizing pseudonyms allow people to post without revealing their real identity Pseudonyms however are still prone to being tracked to the user s IP address 6 To avoid being tracked to an IP address it is possible to post via a public computer where the IP address would usually be under the purview of the public workspace such as a coffee shop and hence cannot be traced to the individual user 6 Adversarial stylometry can be employed to resist identification by writing style Memes Edit Another way people are posting anonymously online is through the use of memes One popular meme is the Confession Bear meme People use Confession Bear to post everything from funny and embarrassing stories to very troubled thoughts 7 Technology Edit There are services described as anonymizers which aim to provide users the ability to post anonymously by hiding their identifying information Anonymizers are essentially proxy servers which act as an intermediary between the user who wants to post anonymously and the website which logs user information such as IP addresses The proxy server is the only computer in this network which is aware of the user s information and provides its own information to anonymize the poster 8 Examples of such anonymizers include Tor and I2P which employ techniques such as onion and garlic routing respectively to provide enhanced encryption to messages that travel through multiple proxy servers 6 Applications like PGP utilizing techniques like private key and public key encryptions are also utilized by users to post content in Usenet groups and other online forums 9 Legal standards and regulations EditMain article Doe subpoena China Edit The revised draft of the Chinese government s Internet Information Services 10 proposes that Internet information service providers including microblogs forums and blogs that allow users to post information on the Internet should ensure users are registered with their real identities 11 Starting October 1 2017 it will require Internet users to identify themselves with their real names to use comments sections on news and social media websites 12 The Philippines Edit The Philippine government passed the Cybercrime Prevention Act on 12 September 2012 which among other things grants the Department of Justice the ability to block access to computer data that is in violation of the Act in other words a website hosting criminally libelous speech could be shut down without a court order 13 United Kingdom Edit Under the Defamation Act 2013 in an action against a website operator on a statement posted on the website it is a defense to show that it was not the operator who posted the statement on the website The defense is defeated if it was not possible for the claimant to identify the person who posted the statement United States Edit In the United States the right to speak anonymously online is protected by the First Amendment and various other laws These laws restrict the ability of the government and civil litigants to obtain the identity of anonymous speakers The First Amendment says that Congress shall make no law abridging the freedom of speech or of the press 14 This protection has been interpreted by the U S Supreme Court to protect the right to speak anonymously offline For example in McIntyre v Ohio Elections Commission the Supreme Court overturned an Ohio law banning the distribution of anonymous election pamphlets claiming that an author s decision to remain anonymous is an aspect of the freedom of speech protected by the First Amendment and that anonymous pamphleteering is not a pernicious fraudulent practice but an honorable tradition of advocacy and of dissent as well as a shield against the so called tyranny of the majority 15 Various courts have interpreted these offline protections to extend to the online world 16 Identifying the author of an anonymous post may require a Doe subpoena This involves gaining access to the IP address of the poster via the hosting website The courts can then order an ISP to identify the subscriber to whom it had assigned said IP address Requests for such data are almost always fruitful though providers will often effect a finite term of data retention in accordance with the privacy policy of each local law may specify a minimum and or maximum term The usage of IP addresses has in recent times been challenged as a legitimate way to identify anonymous users 17 18 On March 21 2012 the New York State Senate introduced the bill numbered S 6779 and A 8668 labeled as the Internet Protection Act It proposes the ability of a website administrator of a New York based website to take down anonymous comments unless the original author of the comment agrees to identify themselves on the post 19 In online communities EditOnline communities vary with their stances on anonymous postings Wikipedia allows anonymous editing in most cases but does not label users instead identifying them by their IP addresses Other editors commonly refer to these users with neutral terms such as anons or IPs 20 Many online bulletin boards require users to be signed in to write and in some cases even to read posts 2channel and other Futaba based image boards take an opposite stance encouraging the anonymity and in the case of English language Futaba based websites calling those who use usernames and tripcodes namefags and richeys respectively 21 As required by law even communities such as 4chan do require the logging of IP addresses of such anonymous posters citation needed Such data however can only be accessed by the particular site administrator Slashdot discourages anonymous posting by displaying Anonymous Coward as the author of each anonymous post The mildly derogatory term is meant to chide anonymous contributors into logging in 22 23 Ramifications EditEffects on users Edit The effects of posting online anonymously has been linked to the online disinhibition effect in users whilst been categorized into either benign or toxic disinhibition 24 Disinhibition can result in misbehavior but can also improve user relationships It may also result in greater disclosure among Internet users allowing more emotional closeness and openness in a safe social context 25 Anonymous computer communication has also been linked to accentuate self stereotyping 26 Although it has been linked to notable effects in gender differences only when the topic bears similarity and fits with the gender stereotype 26 A 2015 study suggested that anonymous news comment sections are more susceptible to uncivil comments especially those directed at other users Anonymous news comment section users are also more likely to be impolite by either being sarcastic and casting aspersions 27 With regard to a recent hostile subpoena in California commentators have asked if there will be a Layfield amp Barrett effect chilling job review posting free speech 28 29 On May 2 2016 through its lawyers Layfield and Barrett and partner Phil Layfield issued a subpoena on Glassdoor seeking the online identities of former employees who posted extremely critical and negative reviews Glassdoor executives have stated that they will fight the subpoena as they have fought off other efforts to disclose anonymous identities in the recent past 30 Other litigants in California have won their right to anonymously post negative job reviews but the law remains hotly contested 31 32 Effects on online communities Edit The conditions for deindividuation such as anonymity reduced self awareness and reduced self regulation fosters creations of online communities much in the same way that they might be employed offline 33 This is evident in proliferation of communities such as Reddit or 4chan which utilize total anonymity or pseudonymity or tools such as Informers which add anonymity to non anonymous social media like Facebook or Twitter to provide its users the ability to post varied content The effect of disinhibition has been seen to be beneficial in advice and discussion threads by providing a cover for more intimate and open conversations 3 The ephemerality or short lived nature of posts that exist on some anonymous image boards such as 4chan create a fast paced environment As of 2009 threads on 4chan had a median lifespan of 3 9 minutes 3 There is also research suggesting that content that gets posted in such communities also tends to be more deviant in nature than would be otherwise 34 The ability to post anonymously has also been linked to the proliferation of pornography in newsgroups and other online forums wherein users utilize sophisticated mechanisms such as mentioned in technology 9 See also EditAnonymous social media Anonymous Online Speakers v United States District Court for the District of Nevada In re Anonymous Online Speakers 611 F 3d 653 2010 McIntyre v Ohio Elections Commission 514 U S 334 1995 John DoeReferences Edit Rigby Karina Anonymity on the Internet Must Be Protected Ayashii World a b c Bernstein Michael 2011 4chan and b An Analysis of Anonymity and Ephemerality in a Large Online Community Proceedings of the Fifth International AAAI Conference on Weblogs and Social Media Archived from the original on 2015 10 21 Retrieved 17 November 2017 Furukawa Hideki Q amp A With the Founder of Channel 2 Archived January 9 2013 at the Wayback Machine The Online Journalism Review August 22 2008 Just how do websites track or monitor our activity a b c A Technical Guide to Anonymous Blogging Archived from the original on 2009 04 02 Retrieved 2009 03 17 Vickery Jacqueline Ryan January 2 2014 The curious case of Confession Bear the reappropriation of online macro image memes Information Communication amp Society 17 3 301 325 doi 10 1080 1369118X 2013 871056 S2CID 146575682 Confinet Ltd Anonymous Surfing AnonIC org 2004 a b Mehta Michael amp Plaza Dwaine April 3 1997 Chapter 3 Pornography in Cyberspace An Exploration of What s in Usenet In Keisler Sara ed Culture of the Internet Lawrence Eribaum Associates pp 53 69 ISBN 0805816364 Internet Information Services revised draft June 7 2012 China Proposes Strengthening Internet Guidelines Reuters June 7 2012 China to ban anonymous online comments China s latest society and culture news Jillian C York A Dark Day for the Philippines as Government Passes Cybercrime Act Electronic Frontier Foundation October 3 2012 First Amendment to the U S Constitution McIntyre v Ohio Elections Commission 514 U S 334 1995 See e g Doe v Cahill 884 A 2d 451 Del 2005 Krinsky v Doe 6 159 Cal App 4th 1154 2008 Keith Wagstaff You Are Not an IP Address Rules Judge Time May 7 2012 US Court of Appeals An IP address isn t enough to identify a pirate New York State Senate Bill no S 6779 March 21 2012 Dwight Silverman What s Online Houston Chronicle July 7 2000 page 2 Page Lewis Anonymous hackers Wikileaks infowar The Register The Register Archived from the original on 28 June 2011 Retrieved 20 July 2011 Stephen Shankland Andover Net Scoops Up Seminal Slashdot Site CNet News June 29 1999 Stating that the term Anonymous Coward was popularized by Slashdot Gosain Sanjay 2003 Looking through a Window on Open Source Culture Systemes d Information et Management 8 1 22 Suler John 2004 The Online Disinhibition Effect CyberPsychology amp Behavior 7 3 321 326 doi 10 1089 1094931041291295 PMID 15257832 Ben Ze e v Aaron July 2003 Privacy emotional closeness and openness in cyberspace Computers in Human Behavior 19 4 451 467 doi 10 1016 s0747 5632 02 00078 x a b Postmas et al 2002 Behavior Online Does Anonymous Computer Communication Reduce Gender Inequality Personality and Social Psychology Bulletin 28 8 1073 1083 doi 10 1177 01461672022811006 S2CID 145697214 Rowe I 2015 Civility 2 0 a comparative analysis of incivility in online political discussion Information Communication amp Society 18 2 121 138 doi 10 1080 1369118X 2014 940365 S2CID 5829176 http lawandmore typepad com law and more 2016 05 anonymous posting will there be a layfield barrett effect html Law and More Deconstructing What Happens In Law May 17 2016 Anonymous Posting Will there be a Layfield amp Barrett Effect http speechwriting ghostwriting typepad com speechwriting ghostwritin 2016 05 glassdoor will layfield barrett subpoena scare off employees from ranting html Jane Genova Speechwriter Ghostwriter Blog May 16 2016 Glassdoor Will Layfield amp Barrett Subpoena Scare Off Employees from Ranting http www therecorder com id 1202749188614 Glassdoor Fights Subpoena Seeking Identity of Commenter slreturn 20160422220341 The Recorder Feb 8 2016 Glassdoor Fights Subpoena Seeking Identity of Commenter http www dmlp org threats krinsky v doe 6 Digital Media Law Project Krinsky v Doe 2008 http www lexology com library detail aspx g 52db6564 e0f4 42eb abec c8f109de42a5 Lexicology com March 24 2016 Opinions Everyone s Got One Myers David 1987 Anonymity is Part of the Magic Individual Manipulation of Computer Mediated Communication Contexts Qualitative Sociology Springer 10 3 251 266 doi 10 1007 bf00988989 S2CID 144685973 Suler John 2009 The Bad Boys of Cyberspace Deviant Behavior in a Multimedia Chat Community CyberPsychology amp Behavior 1 3 275 294 doi 10 1089 cpb 1998 1 275 External links Edit Privacy for People Who Don t Show Their Navels Retrieved from https en wikipedia org w index php title Anonymous post amp oldid 1135385879, wikipedia, wiki, book, books, library,

article

, read, download, free, free download, mp3, video, mp4, 3gp, jpg, jpeg, gif, png, picture, music, song, movie, book, game, games.