Privacy, Anonymity, and Perceived Risk in Open Collaboration: A Study of Tor Users and Wikipedians

@article{Forte2017PrivacyAA,
  title={Privacy, Anonymity, and Perceived Risk in Open Collaboration: A Study of Tor Users and Wikipedians},
  author={Andrea Forte and Nazanin Andalibi and R. Greenstadt},
  journal={Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing},
  year={2017}
}
This qualitative study examines privacy practices and concerns among contributors to open collaboration projects. We collected interview data from people who use the anonymity network Tor who also contribute to online projects and from Wikipedia editors who are concerned about their privacy to better understand how privacy concerns impact participation in open collaboration projects. We found that risks perceived by contributors to open collaboration projects include threats of surveillance… Expand
Privacy, Anonymity, and Perceived Risk in Open Collaboration: A Study of Service Providers
TLDR
This two-part qualitative study examines the challenges perceived by open collaboration service providers in allowing anonymous contributions to their projects and explores misalignment between policies aiming to serve contributors and the privacy practices of contributors themselves. Expand
Effects of Anonymity on Comment Persuasiveness in Wikipedia Articles for Deletion Discussions
TLDR
This study focuses on Wikipedia Articles for Deletion discussions as an example of online collaborative communities to study the relationship between anonymity and persuasiveness in this context and finds that in Wikipedia AfD discussions, more identifiable users tend to be more persuasive. Expand
The Politics of Privacy Theories: Moving from Norms to Vulnerabilities
TLDR
This paper draws on HCI and privacy literature to understand the limitations of commonly used theories and examine their assumptions, politics, strengths, and weaknesses, and advocates vulnerability as a core concept for privacy theorizing. Expand
Anonymity, User Engagement, Quality, and Trolling on Q&A Sites
In online question and answer (Q&A) communities, people ask questions and share answers at all levels of topic sensitivity. Identity options within these communities range from anonymity to realExpand
"It was a shady HIT": Navigating Work-Related Privacy Concerns on MTurk
TLDR
Survey of Amazon Mechanical Turk workers finds that many comply with privacy-invasive information requests for a range of reasons, including benefits outweighing costs, fears of losing access to work, and contributing to scientific research. Expand
"People Are Either Too Fake or Too Real": Opportunities and Challenges in Tie-Based Anonymity
TLDR
It is shown that while users are more comfortable in self-disclosure, they still have specific practices and strategies to avoid or allow identification, and participants come to expect both negativity and support in response to posts. Expand
Social Support, Reciprocity, and Anonymity in Responses to Sexual Abuse Disclosures on Social Media
TLDR
It is argued that anonymity is an essential factor in designing social technologies that facilitate support seeking and provision in socially stigmatized contexts, and implications for social media site design are provided. Expand
People Who Can Take It: How Women Wikipedians Negotiate and Navigate Safety
TLDR
Analysis shows Wikipedia functions as both a multidimensional and porous space encompassing a spectrum of safety, which requires experienced women Wikipedians to employ sophisticated tactics related to identity management, boundary management, and emotion work to navigate this space. Expand
Addressing Anonymous Abuses: Measuring the Effects of Technical Mechanisms on Reported User Behaviors
TLDR
The results show that revocable anonymity schemes would particularly deter the intended uses of anonymous networks, particularly those directly compromising free expression. Expand
Tor Users Contributing to Wikipedia: Just Like Everybody Else?
TLDR
Although Wikipedia has taken steps to block contributions from Tor users since as early as 2005, it is demonstrated that these blocks have been imperfect and that tens of thousands of attempts to edit on Wikipedia through Tor have been successful. Expand
...
1
2
3
4
...

References

SHOWING 1-10 OF 39 REFERENCES
Why do people seek anonymity on the internet?: informing policy and design
TLDR
A key finding of this research is the very large variation in interviewees' past experiences and life situations leading them to seek anonymity, and how they tried to achieve it. Expand
Information Privacy: Measuring Individuals' Concerns About Organizational Practices
TLDR
An instrument that identifies and measures the primary dimensions of individuals' concers about organizational information privacy practices, and was rigorously tested and validated across several heterogenous populations, providing a high degree of confidence in the scales' validity, reliability, and generalizability. Expand
Limiting, leaving, and (re)lapsing: an exploration of facebook non-use practices and experiences
TLDR
Results from a questionnaire of over 400 Internet users, focusing specifically on Facebook and those users who have left the service, show the lack of a clear, binary distinction between use and non-use and reveal numerous complex and interrelated motivations and justifications. Expand
Understanding Social Media Disclosures of Sexual Abuse Through the Lenses of Support Seeking and Anonymity
TLDR
This paper uses mixed methods to understand abuse-related posts on reddit and uses quantitative methods to investigate the use of "throwaway" accounts, which provide greater anonymity, and reports on factors associated with support seeking and first-time disclosures. Expand
Chilling Effects: Online Surveillance and Wikipedia Use
This article discusses the results of the first empirical study providing evidence of regulatory “chilling effects” of Wikipedia users associated with online government surveillance. The studyExpand
What's in a Name? Some Reflections on the Sociology of Anonymity
  • G. Marx
  • Computer Science, Sociology
  • Inf. Soc.
  • 1999
TLDR
This article identifies a number of major rationales and contexts for anonymity and identifiability and suggests a principle of truth in the nature of naming, which holds that those who use pseudonyms on the Internet in personal communications have an obligation to indicate they are doing so. Expand
The challenges surrounding the regulation of anonymous communication provision in the United Kingdom
  • G. Horsman
  • Political Science, Computer Science
  • Comput. Secur.
  • 2016
TLDR
For anonymous communication applications such as Yik Yak, reliance should be placed upon sufficient data retention periods in order to assist the investigation of criminal behaviour and offender identification. Expand
Managing deviant behavior in online communities
TLDR
This panel brings together experts from media theory, computer- supported collaborative learning (CSCL), computer-supported cooperative work (CSCW), and online entertainment to explore current issues in this complex research area. Expand
Unpacking "privacy" for a networked world
TLDR
A model of privacy as a dynamic, dialectic process is outlined, and three tensions that govern interpersonal privacy management in everyday life are discussed, and these are used to explore select technology case studies drawn from the research literature. Expand
Do You See What I See? Differential Treatment of Anonymous Users
TLDR
This study methodically enumerate and characterize, in the context of Tor, the treatment of anonymous users as second-class Web citizens, and develops a methodology to distinguish censorship events from incidental failures such as those caused by packet loss or network outages. Expand
...
1
2
3
4
...