Knowledge

Anonymity

Source 📝

580:
explains: "David Chaum was very ahead of his time. He predicted in the early 1980s concerns that would arise on the internet 15 or 20 years later." There are some people though that consider anonymity in internet being a danger for our society as a whole. David Davenport, an assistant professor in the Computer Engineering Department of Bilkent University in Ankara, Turkey, considers that by allowing anonymous Net communication, the fabric of our society is at risk. "Accountability requires those responsible for any misconduct be identified and brought to justice. However, if people remain anonymous, by definition, they cannot be identified, making it impossible to hold them accountable." he says.
164: 27: 598:
communication as good. For example, message boards established outside companies, but for employees of such companies to vent their opinions on their employer, have sometimes been used in ways that at least the companies themselves were not happy about . Police use of anonymity is a complex issue, since the police often will want to know the identity of the tipper in order to get more information, evaluate the reliability or get the tipper as a witness. Is it ethical for police to identify the tipper if it has opened up an anonymous tipping hotline?
840:. As of February 2015, the treaty was signed -but not all ratified- by 31 states as well as the European Union. Japan was on 4 October 2012 the first to ratify the treaty. It creates an international regime for imposing civil and criminal penalties on Internet counterfeiting and copyright infringement. Although ACTA is intentionally vague, leaving signatories to draw precise rules themselves, critics say it could mean innocent travellers having their laptops searched for unlicensed music, or being jailed for carrying a 5456: 802:"(...) protections for anonymous speech are vital to democratic discourse. Allowing dissenters to shield their identities frees them to express critical minority views . . . Anonymity is a shield from the tyranny of the majority. . . . It thus exemplifies the purpose behind the Bill of Rights and of the First Amendment in particular: to protect unpopular individuals from retaliation . . . at the hand of an intolerant society." 844:. Infringers could be liable for the total loss of potential sales (implying that everyone who buys a counterfeit product would have bought the real thing). It applies to unintentional use of copyright material. It puts the onus on website owners to ensure they comply with laws across several territories. It has been negotiated secretively and outside established international trade bodies, despite EU criticisms. 573:
of a prior negative experience during which they did not maintain an anonymous presence. Such experiences include stalking, releasing private information by an opposing school political group, or tricking an individual into traveling to another country for a job that did not exist. Participants in this study stated that they were able to avoid their previous problems by using false identification online.
853: 498:(ISP), and this ISP can then provide information about what customer that IP address was leased to. This does not necessarily implicate a specific individual (because other people could be using that customer's connection, especially if the customer is a public resource, such as a library), but it provides regional information and serves as powerful circumstantial evidence. 287:
unsavory. Benefactors may not wish to identify themselves as capable of giving. A benefactor may wish to improve the world, as long as no one knows who did it, out of modesty, wishing to avoid publicity. Another reason for anonymous charity is a benefactor who does not want a charitable organization to pursue them for more donations, sometimes aggressively.
751:, and of the First Amendment in particular: to protect unpopular individuals from retaliation—and their ideas from suppression—at the hand of an intolerant society". The Supreme court explained that protecting anonymous political speech receives the highest protection however, this priority takes on new dimensions in the digital age. 478:
people who use the internet to interact with friends or known contacts. While these usernames can take on an identity of their own, they are sometimes separated and anonymous from the actual author. According to the University of Stockholm this is creating more freedom of expression, and less accountability.
1033:
have keys to a bank safe and that, one day, contents of the safe go missing (lock not violated). Without additional information, we cannot know for sure whether it was Alice, Bob or Carol who emptied the safe. Notably, each element in {Alice, Bob, Carol} could be the perpetrator with a probability of
605:
People may openly discuss personal stuff which would be embarrassing to tell many people about, such as sexual problems. Research shows that anonymous participants disclose significantly more information about themselves . People might also feel more open to sharing their personal work anonymously if
564:
is often attributed to relative Internet anonymity, due to the fact that potential offenders are able to mask their identities and prevent themselves from being caught. A principal in a high school stated that comments made on these anonymous site are "especially vicious and hurtful since there is no
230:
system was developed to allow secure anonymous transactions. Another example would be Enymity, which actually makes a purchase on a customer's behalf. When purchasing taboo goods and services, anonymity makes many potential consumers more comfortable with or more willing to engage in the transaction.
225:
Anonymous commercial transactions can protect the privacy of consumers. Some consumers prefer to use cash when buying everyday goods (like groceries or tools), to prevent sellers from aggregating information or soliciting them in the future. Credit cards are linked to a person's name, and can be used
138:
Anonymity may reduce the accountability one perceives to have for their actions, and removes the impact these actions might otherwise have on their reputation. This can have dramatic effects, both useful and harmful to various parties involved. Thus, it may be used for psychological tactics involving
129:
and other virtual communication, although recently some important service providers like Google try to discourage pseudonymity. Someone using a pseudonym would be strictly considered to be using "pseudonymity" not "anonymity", but sometimes the latter is used to refer to both (in general, a situation
601:
People in a country with a repressive political regime may use anonymity (for example Internet-based anonymity servers in other countries) to avoid persecution for their political opinions. Note that even in democratic countries, some people claim, rightly or wrongly, that certain political opinions
572:
Though Internet anonymity can provide a harmful environment through which people can hurt others, anonymity can allow for a much safer and relaxed internet experience. In a study conducted at Carnegie Mellon University, 15 out of 44 participants stated that they choose to be anonymous online because
159:
blocking. Additionally, the appropriateness of anonymous organizational communication varies depending on the use, with organizational surveys or assessments typically perceived as highly appropriate and firing perceived as highly inappropriate. Anonymity use and appropriateness have also been found
286:
Anonymous charity has long been a widespread and durable moral precept of many ethical and religious systems, as well as being in practice a widespread human activity. A benefactor may not wish to establish any relationship with the beneficiary, particularly if the beneficiary is perceived as being
53:
An important example for anonymity being not only protected, but enforced by law is the vote in free elections. In many other situations (like conversation between strangers, buying some product or service in a shop), anonymity is traditionally accepted as natural. There are also various situations
597:
People dependent on an organization, or afraid of revenge, may divulge serious misuse, which should be revealed. Anonymous tips can be used as an information source by newspapers, as well as by police departments, soliciting tips aimed at catching criminals. Not everyone will regard such anonymous
592:
says: "The regulation of anonymous and pseudonymous communications promises to be one of the most important and contentious Internet-related issues of the next decade". Anonymity and pseudonymity can be used for good and bad purposes. And anonymity can in many cases be desirable for one person and
509:
address the issue of IP tracking. In short, they work by encrypting packets within multiple layers of encryption. The packet follows a predetermined route through the anonymizing network. Each router sees the immediate previous router as the origin and the immediate next router as the destination.
493:
serve as virtual mailing addresses, which means that any time any resource on the Internet is accessed, it is accessed from a particular IP address, and the data traffic patterns to and from IP addresses can be intercepted, monitored, and analysed, even if the content of that traffic is encrypted.
58:
have been performed anonymously when benefactors do not wish to be acknowledged. A person who feels threatened might attempt to mitigate that threat through anonymity. A witness to a crime might seek to avoid retribution, for example, by anonymously calling a crime tipline. Criminals might proceed
339:
When it is necessary to refer to someone who is anonymous, it is typically necessary to create a type of pseudo-identification for that person. In literature, the most common way to state that the identity of an author is unknown is to refer to them as simply "Anonymous". This is usually the case
477:
Most commentary on the Internet is essentially done anonymously, using unidentifiable pseudonyms. However this has been widely discredited in a study by the University of Birmingham, which found that the number of people who use the internet anonymously is statistically the same as the number of
142:
In conversational settings, anonymity may allow people to reveal personal history and feelings without fear of later embarrassment. Electronic conversational media can provide physical isolation, in addition to anonymity. This prevents physical retaliation for remarks, and prevents negative or
640:
Anonymity can be used to protect a criminal performing many different crimes, for example slander, distribution of child pornography, illegal threats, racial agitation, fraud, intentional damage such as distribution of computer viruses, etc. The exact set of illegal acts varies from country to
378:, many painting workshops can be identified by their characteristic style and discussed and the workshop's output set in chronological order. Sometimes archival research later identifies the name, as when the "Master of Flémalle"—defined by three paintings in the Städelsches Kunstinstitut in 579:
is called the Godfathers of anonymity and he has a claim to be one of the great visionaries of contemporary science. In the early 1980s, while a computer scientist at Berkeley, Chaum predicted the world in which computer networks would make mass surveillance a possibility. As Dr. Joss Wright
45:
describes situations where the acting person's identity is unknown. Some writers have argued that namelessness, though technically correct, does not capture what is more centrally at stake in contexts of anonymity. The important idea here is that a person be non-identifiable, unreachable, or
806:
However, anonymous online speech is not without limits. It is clearly demonstrated in a case from 2008, one in which the defendant stated on a law-school discussion board that two women should be raped, an anonymous poster's comments may extend beyond free speech protections. In the case, a
593:
not desirable for another person. A company may, for example, not like an employee to divulge information about improper practices within the company, but society as a whole may find it important that such improper practices are publicly exposed. Good purposes of anonymity and pseudonymity:
362:
spelling, generally with a specific city designation, is traditionally used by scholars in the humanities to refer to an ancient writer whose name is not known, or to a manuscript of their work. Many such writers have left valuable historical or literary records: an incomplete list of such
1037:
If Carol has a definite alibi at the time of perpetration, then we may deduce that it must have been either Alice or Bob who emptied the safe. In this particular case, the perpetrator is not completely anonymous anymore, as both Alice and Bob now know "who did it" with a probability of 1.
683:
entities. A website nominally associated with the group describes it as "an internet gathering" with "a very loose and decentralized command structure that operates on ideas rather than directives". The group became known for a series of well-publicized publicity stunts and distributed
405:". This name is often modified to "Jane Doe" when the anonymity-seeker is female. The same names are also commonly used when the identification of a dead person is not known. The semi-acronym Unsub is used as law enforcement slang for "Unknown Subject of an Investigation". 602:
are persecuted. gives an overview of uses of anonymity to protect political speech. Every country has a limit on which political opinions are allowed, and there are always people who want to express forbidden opinions, like racial agitation in most democratic countries.
147:
behavior or discussion from tarnishing the reputation of the speaker. This can be beneficial when discussing very private matters, or taboo subjects or expressing views or revealing facts that may put someone in physical, financial, or legal danger (such as
273:
depicted a fictional collaboration by people who had never previously met and did not know who had recruited them. The anonymous purchase of a gun or knife to be used in a crime helps prevent linking an abandoned weapon to the identity of the perpetrator.
92:
The word anonymous was borrowed into English around 1600 from the Late Latin word "anonymus", from Ancient Greek ᾰ̓νώνῠμος (anṓnumos, "without name"), from ᾰ̓ν- (an-, "un-") with ὄνῠμᾰ (ónuma), Aeolic and Doric dialectal form of ὄνομᾰ (ónoma, "name").
947:, good looks, wealth or other unrelated or mildly related aspects of the people is the main reason for interest in their work, rather than the work itself) or to break into a field or area of interest normally dominated by males (as by the famous 827:
recognizes in Article. 8 (Title II: "Freedoms") the right of everyone to protection of personal data concerning him. The right to privacy is now essentially the individual's right to have and to maintain control over information about him.
282:
There are two aspects, one, giving to a large charitable organization obscures the beneficiary of a donation from the benefactor, the other is giving anonymously to obscure the benefactor both from the beneficiary and from everyone else.
769:(1953): "Once the government can demand of a publisher the names of the purchasers of his publications, the free press as we know it disappears. Then the spectre of a government agent will look over the shoulder of everyone who reads". 1707: 189:
Relative anonymity is often enjoyed in large crowds. Different people have different psychological and philosophical reactions to this development, especially as a modern phenomenon. This anonymity is an important factor in
1034:
1. However, as long as none of them was convicted with 100% certainty, we must hold that the perpetrator remains anonymous and that the attribution of the probability of 1 to one of the players has to remain undecided.
246:
Anonymity can also be used as a protection against legal prosecution. For example, when committing unlawful actions, many criminals attempt to avoid identification by the means of obscuring/covering their faces with
84:(called the "anonymity set"), "anonymity" of that element refers to the property of that element of not being identifiable within this set. If it is not identifiable, then the element is said to be "anonymous". 50:, or liberty. Over the past few years, anonymity tools used on the dark web by criminals and malicious users have drastically altered the ability of law enforcement to use conventional surveillance techniques. 2045:
Kelly, Brian (2012). "Investing in a Centralized Cybersecurity Infrastructure: Why "Hacktivism" can and should influence cybersecurity reform". Boston University Law Review 92 (5): 1663–1710. Retrieved May 2,
1429: 696:
Anonymity is perceived as a right by many, especially the anonymity in the internet communications. The partial right for anonymity is legally protected to various degrees in different jurisdictions.
510:
Thus, no router ever knows both the true origin and destination of the packet. This makes these services more secure than centralized anonymizing services (where a central point of knowledge exists).
2331: 310:
in most countries, passengers are not allowed to board flights unless they have identified themselves to airline or transportation security personnel, typically in the form of the presentation of an
1672: 1550: 807:
Connecticut federal court must apply a standard to decide whether the poster's identity should be revealed. There are several tests, however, that the court could apply when considering this issue.
654:
Even when the act is not illegal, anonymity can be used for offensive or disruptive communication. For example, some people use anonymity in order to say harmful things about other people, known as
59:
anonymously to conceal their participation in a crime. Anonymity may also be created unintentionally, through the loss of identifying information due to the passage of time or a destructive event.
4974: 625:
People can contribute to online social discussion with reduced risk of harm by online predators. Online predators include "criminals, hackers, scammers, stalkers, and malicious online vendors".
69:
The term "anonymous message" typically refers to a message that does not reveal its sender. In many countries, anonymous letters are protected by law and must be delivered as regular letters.
935:, where an artist or a group attempts to remain anonymous, for various reasons such as adding an element of mystique to themselves or their work, attempting to avoid what is known as the " 759: 5083: 1695: 2242: 125:
numbers, etc. A pseudonym enables the other party to link different messages from the same person and, thereby, to establish a long-term relationship. Pseudonyms are widely used in
1365: 688:
attacks on government, religious, and corporate websites. An image commonly associated with Anonymous is the "man without a head" represents leaderless organization and anonymity.
235:
use cards that personally identify the consumer engaging in each transaction (possibly for later solicitation, or for redemption or security purposes), or that act as a numerical
1495: 4145: 298:
Anonymity sometimes clashes with the policies and procedures of governments or private organizations. In the United States, disclosure of identity is required to be able to
2286:
Kristina Ringland, Internet User Anonymity, First Amendment Protections and Mobilisa: Changing The Cahill Test, 5 SHIDLER J. L. COM. & TECH. 16 (2009), available at <
5078: 459:, until the mid-19th century, most writers in Great Britain, especially the less well known, did not sign their names to their work in newspapers, magazines and reviews. 1644: 1426: 5128: 641:
country, but most countries have many laws forbidding certain "informational" acts, everything from high treason to instigation of rebellion, etc., to swindling.
545:
also offer the ability to create anonymous email accounts which do not require any personal information from the account holder. Other sites, however, including
619:
Pseudonymity can be used to experiment with role playing, for example a man posing as a woman in order to understand the feelings of people of different gender.
267:, groups of criminals may collaborate on a certain project without revealing to each other their names or other personally identifiable information. The movie 1563:
Anonymous Online Comments:The Law and Best Media Practices from Around the World, by Kyle A. Heatherly,* Anthony L. Fargo,** and Jason A. Mark***, March 2018
34:
center on February 10, 2008, donning masks, scarves, hoods, and sunglasses to obscure their faces, and gloves and long sleeves to protect them from leaving
5143: 5024: 1668: 323:
identification of anonymous authors by writing style is a potential risk, which is expected to grow as analytic techniques improve and computing power and
66:
that require persons detained to self-identify when requested by a law enforcement officer, when the person is reasonably suspected of committing a crime.
5355: 182:
With few perceived negative consequences, anonymous or semi-anonymous forums often provide a soapbox for disruptive conversational behavior. The term "
1889: 622:
Pseudonymity can be a tool for timid people to dare establish contacts which can be of value for them and others, e.g. through contact advertisements.
340:
with older texts in which the author is long dead and unable to claim authorship of a work. When the work claims to be that of some famous author the
5063: 2349: 727: 5320: 5259: 5148: 3594: 3262: 3185: 3474: 3006: 565:
way to trace their source and it can be disseminated widely. "Cyberbullying, as opposed to general bullying, is still a widely-debated area of
5014: 3084: 1976: 1082: 2249: 5093: 824: 412:
often feels a need to honor the remains of soldiers for whom identification is impossible. In many countries, such a memorial is named the
762:: "People are permitted to interact pseudonymously and anonymously with each other so long as those acts are not in violation of the law". 3725: 2401: 1357: 2288: 2187: 1797: 3190: 2273: 1768: 1519: 616:
People are more equal in anonymous discussions, factors like status, gender, etc., will not influence the evaluation of what they say.
2229: 1488: 900: 2429: 2029: 1576: 5103: 5019: 5009: 2537: 2208: 781:
and the subsequent new political climate. Although it is still difficult to oversee their exact implications, measures such as the
2110: 4293: 2164: 793:
are only few of the signs that the exercise of the right to the anonymous exchange of information is under substantial pressure.
155:
In work settings, the three most common forms of anonymous communication are traditional suggestion boxes, written feedback, and
2131: 101:
Sometimes a person may desire a long-term relationship (such as a reputation) with another party without necessarily disclosing
1325:"The effects of perceived anonymity and anonymity states on conformity and groupthink in online communities: A Knowledge study" 5335: 892: 743: 5158: 4964: 2092:
See TOMAS A. LIPINSKI, TO SPEAK OR NOT TO SPEAK: DEVELOPING LEGAL STANDARDS FOR ANONYMOUS SPEECH ON THE INTERNET 942 (2002)
1951: 1641: 668:
The border between illegal and legal but offensive use is not very sharp, and varies depending on the law in each country.
606:
they feel that their friends and family would harass them or disapprove of their work. Examples of such work could include
553:, ask users to sign in with their legal names. In the case of Google+, this requirement led to a controversy known as the 401:
In legal cases, a popularly accepted name to use when it is determined that an individual needs to maintain anonymity is "
5315: 5123: 5113: 5073: 4794: 4011: 3858: 1752: 1087: 1047: 837: 269: 2315: 5055: 5029: 4989: 3530: 3432: 1534: 778: 723: 102: 2475:
Gröndahl, Tommi; Asokan, N. (2020). "Text Analysis in Adversarial Settings: Does Deception Leave a Stylistic Trace?".
1922: 5232: 5153: 5138: 5034: 4898: 4824: 2325: 1544: 1466: 2379: 4921: 4789: 4140: 4016: 3863: 747:(1995) case: "Anonymity is a shield from the tyranny of the majority...It thus exemplifies the purpose behind the 5108: 5039: 5004: 3932: 1593:
Ohm, Paul (13 August 2009). "Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization".
815:
The right to internet anonymity is also covered by European legislation that recognizes the fundamental right to
345: 5330: 5310: 5264: 5227: 5133: 5088: 5237: 5068: 5043: 4450: 4150: 3579: 3566: 3147: 995: 1886: 1696:"Constitutionality of Cyberbullying Laws: Keeping the Online Playground Safe for Both Teens and Free Speech" 5098: 3283: 2910: 2862: 2530: 867:
The history of anonymous expression in political dissent is both long and with important effect, as in the
748: 644:
Anonymity can be used for online payments for criminals paying others to perform illegal acts or purchases.
5118: 4865: 4286: 3388: 2588: 1358:"Print Email Facebook Twitter More Judges admit to emotion in court but say they avoid bias in judgments" 1077: 413: 2446: 1733:
Kang et al. (2013). Why Do People Seek Anonymity on the Internet? Informing Policy and Design. CHI 2013.
105:
to that party. In this case, it may be useful for the person to establish a unique identifier, called a
3677: 2938: 2659: 2161:"U.S. Supreme Court decision "United States v. Rumely" 345 U.S. 41 (73 S.Ct. 543, 97 L.Ed. 770) (1953)" 2058: 2036:, by Jacob Palme, using much material from the paper "Usenet news and anon.penet.fi" by Mikael Berglund 765:
The right of individuals for "anonymous reading" was established in the U.S. Supreme Court decision in
525:(which pair up random users for a conversation) capitalized on a fascination with anonymity. Apps like 63: 17: 2345: 46:
untrackable. Anonymity is seen as a technique, or a way of realizing, a certain other values, such as
5350: 5294: 5274: 4999: 4959: 4536: 4120: 3989: 1092: 1052: 495: 368: 217:
to freely express themselves regarding the strategies they employ to perform their jobs objectively.
4091: 3947: 3484: 2773: 1974:
Self-disclosure in computer-mediated communication: The role of self-awareness and visual anonymity
968: 685: 349: 168: 2230:
mir Efrati, AutoAdmit Suit Update: Defendant "AK47" Responds, WALL ST. J.: LAW BLOG, Feb. 28, 2008
1973: 5345: 5340: 5212: 4994: 4746: 4695: 4556: 4551: 4260: 3830: 2523: 1860:
Oppliger, Rolf (2000). "Privacy protection and anonymity services for the World Wide Web (WWW)".
899:, ratification would likely have taken much longer as individuals worked through the issues. The 861: 3162: 903:, however, was not anonymous. If it had been unsigned, it might well have been less effective. 5386: 4984: 4979: 4926: 4407: 4279: 3848: 3757: 3524: 3395: 3252: 2881: 959:). Some seem to want to avoid the "limelight" of popularity and to live private lives, such as 754:
The right of individuals for "anonymous communication" was established by the decision in case
390:
methodically identified numerous early Renaissance Florentine and Sienese workshops under such
328: 2405: 2013: 1606: 5365: 4936: 4891: 4756: 3599: 2644: 2477: 2292: 2184: 2026: 1786: 887: 820: 718: 163: 26: 1765: 5184: 4969: 4705: 3887: 3619: 3354: 774: 613:
People may get more objective evaluation of their messages, by not showing their real name.
538: 424:
Most modern newspapers and magazines attribute their articles to individual editors, or to
8: 5401: 5269: 5254: 5204: 4941: 4840: 4526: 4440: 4247: 3984: 3974: 3897: 3872: 3195: 2929: 2905: 2426: 1573: 1247: 1224: 936: 589: 566: 311: 4652: 2204: 2102: 915:
express a very strong support for anonymous editing as one of the basic requirements of
139:
any respective party to purport or support or discredit any sort of activity or belief.
5480: 5441: 4819: 4761: 4685: 4597: 4587: 4510: 4424: 4402: 4316: 4110: 4053: 3817: 3497: 3290: 3172: 2852: 2826: 2702: 2593: 2504: 2486: 2160: 1842: 1409: 1193: 1165: 1062: 738: 705: 482:
is collaboratively written mostly by authors using either unidentifiable pseudonyms or
436: 118: 1873: 5411: 5194: 4799: 4617: 4592: 4505: 4412: 4392: 4356: 4336: 4321: 4196: 3962: 3451: 3331: 2725: 2691: 2686: 2321: 2267: 2139: 2009: 1846: 1602: 1540: 1513: 1413: 1169: 952: 904: 896: 868: 676: 395: 160:
to be significantly related to the quality of relationships with key others at work.
81: 2508: 1197: 679:(used as a mass noun) is a loosely associated international network of activist and 62:
In certain situations, however, it may be illegal to remain anonymous. For example,
5459: 5325: 5284: 5222: 5174: 4931: 4884: 4845: 4814: 4767: 4710: 4675: 4647: 4622: 4566: 4500: 4346: 4331: 4081: 3957: 3952: 3853: 3774: 3671: 3339: 3308: 3215: 3074: 2795: 2496: 1997: 1869: 1834: 1822: 1399: 1336: 1303: 1259: 1185: 1157: 1072: 1067: 472: 387: 191: 55: 4460: 2515: 836:
One of the most controversial international legal acts, regarding this subject is
5189: 5179: 4855: 4720: 4690: 4642: 4419: 4086: 4006: 4001: 3996: 3927: 3892: 3843: 3801: 3767: 3695: 3572: 3479: 3321: 3298: 3257: 3011: 2971: 2783: 2433: 2191: 2062: 2033: 1980: 1893: 1772: 1648: 1580: 1433: 1120: 1010: 948: 816: 722:
under the pseudonym "Publius" and "the Federal Farmer" spoke up in rebuttal. The
486:
identifiers, although a few have used identified pseudonyms or their real names.
264: 232: 176: 2313: 1947: 453:"people will often speak more honestly if they are allowed to speak anonymously" 5426: 5406: 5279: 4680: 4662: 4627: 4582: 4561: 4445: 3979: 3942: 3821: 3813: 3752: 3744: 3720: 3710: 3642: 3586: 3551: 3427: 3409: 3359: 3099: 3034: 2978: 2654: 2579: 1918: 1744: 964: 960: 790: 786: 661: 648: 629: 468: 375: 183: 126: 1427:
Donors Increasingly Make Their Big Gifts Anonymously, Chronicle Analysis Finds
1161: 651:
searching for children to abuse or a swindler searching for people to rip off.
226:
to discover other information, such as postal address, phone number, etc. The
186:" is sometimes used to refer to those who engage in such disruptive behavior. 5474: 5396: 5391: 5289: 5249: 5244: 4751: 4730: 4326: 4302: 3969: 3877: 3796: 3685: 3666: 3651: 3556: 3519: 3402: 3369: 3349: 3272: 3247: 3242: 3229: 3200: 3157: 3094: 3001: 2986: 2957: 2870: 2664: 2546: 1308: 1292:"Anonymous Communication in Organizations: Assessing Use and Appropriateness" 1291: 1030: 987: 916: 709: 655: 561: 534: 506: 430: 383: 303: 1838: 1189: 1176:
Nissenbaum, Helen (1999). "The Meaning of Anonymity in an Information Age".
704:
The tradition of anonymous speech is older than the United States. Founders
23:
Situation in which a person is non-identifiable, unreachable, or untrackable
5436: 5217: 4860: 4850: 4632: 4541: 4531: 4397: 4371: 4235: 4223: 4173: 4167: 4162: 4021: 3715: 3661: 3656: 3609: 3543: 3469: 3459: 3438: 3382: 3316: 3267: 3129: 3114: 3109: 3104: 3079: 3054: 3044: 2951: 2732: 2550: 2314:
Serge Gutwirth; Ronald Leenes; Paul de Hert Springer (September 11, 2014).
2194:, by Nicoll, C.; Prins, Corien; van Dellen, M.J.M, 2003, Tilburg University 1907: 932: 928: 841: 647:
Anonymity can be used to seek contacts for performing illegal acts, like a
542: 530: 522: 514: 490: 324: 122: 773:
The pressure on anonymous communication has grown substantially after the
5431: 4951: 4725: 4546: 4483: 4455: 4376: 4208: 4130: 3789: 3784: 3779: 3700: 3614: 3604: 3464: 3422: 3417: 3234: 3210: 3152: 3119: 3089: 3069: 3064: 3039: 3029: 2996: 2991: 2807: 2788: 2742: 2737: 2618: 2371: 1775:, by David Davenport, COMMUNICATIONS OF THE ACM April 2002/Vol. 45, No. 4 1458: 1115: 782: 607: 576: 425: 394:
as "Amico di Sandro" for an anonymous painter in the immediate circle of
260: 240: 199: 175:
center on February 10, 2008. Three of the protesters can be seen wearing
172: 73: 35: 31: 1620: 1264: 541:
let the user to explore the web anonymously. Some email providers, like
5416: 4804: 4637: 4488: 4361: 4341: 4201: 4184: 4125: 4105: 3762: 3690: 3637: 3633: 3561: 3377: 3344: 3277: 3180: 3124: 2946: 2900: 2857: 2812: 2763: 2696: 2676: 2639: 2613: 2569: 2564: 2065:. Brian Lehrer Live. Vimeo. February 9, 2011. Retrieved March 24, 2011. 1404: 1387: 1003: 940: 908: 882: 726:
has repeatedly recognized rights to speak anonymously derived from the
680: 483: 440: 320: 210:
are also considered to be an established effect of internet anonymity.
207: 203: 1341: 1324: 198:. This perceived anonymity can be compromised by technologies such as 4493: 4366: 4351: 4213: 4100: 3838: 3730: 3490: 3205: 2888: 2822: 2768: 2715: 2710: 2583: 1111: 976: 972: 895:. Without the public discourse on the controversial contents of the 479: 391: 379: 341: 236: 156: 106: 2500: 760:
United States District Court for the Northern District of California
295:
Attempts at anonymity are not always met with support from society.
76:, in reference to an arbitrary element (e.g., a human, an object, a 4700: 4230: 4218: 4179: 4157: 4048: 3937: 3882: 3705: 3504: 2964: 2917: 2876: 2847: 2835: 2778: 2758: 2720: 2681: 2491: 1014: 999: 956: 944: 872: 857: 713: 636:
There has always, however, also been a negative side of anonymity:
550: 546: 409: 402: 317:
On the other hand, some policies and procedures require anonymity.
114: 110: 77: 54:
in which a person might choose to withhold their identity. Acts of
2136:
of the U.S. District Court in the Northern District of California"
975:
attracted strong attention in the 1980s and 1990s), and by DJ duo
451:, but it speaks with a collective voice". Guardian considers that 4907: 4809: 4715: 4670: 4071: 4043: 3511: 3139: 2894: 2800: 2649: 2623: 2574: 1653: 1329:
Journal of the Association for Information Science and Technology
1278: 1057: 955:
who was actually a woman named Alice Bradley Sheldon, and likely
877: 554: 537:
let people share things anonymously or quasi-anonymously whereas
526: 307: 248: 47: 4271: 2841: 4240: 4115: 3225: 2671: 1018: 991: 980: 518: 256: 1388:"Clemency, A Neglected Aspect of Early Christian Philanthropy" 852: 5421: 4190: 3919: 3905: 3901: 2055: 885:. In the tradition of anonymous British political criticism, 664:
use anonymity to harm discussions in online social platforms.
359: 227: 214: 144: 1669:"Teen cyberbullying grows with "anonymous" social chat apps" 1439: 1436:
By Sam Kean (January 09, 2008) The Chronicle of Philanthropy
213:
Anonymity also permits highly trained professionals such as
5360: 2074:
McIntyre v. Ohio Elections Comm'n, 514 U.S. 334, 342 (1995)
1125: 983:, "anonymity is vital to him because graffiti is illegal". 912: 327:
grow. Authors may resist such identification by practicing
299: 252: 195: 4876: 1787:"Anonymity on the Internet: Why the Price May Be Too High" 16:
This article is about identification. For other uses, see
1204:
Matthews, Steve (2010). "Anonymity and the Social Self".
986:
Anonymity has been used in music by avant-garde ensemble
502: 149: 2205:"McIntyre v. Ohio Elections Comm'n, 514 U.S. 334 (1995)" 1766:
Anonymity on the Internet: Why the Price May Be Too High
306:
prevents disclosure of individual voting patterns. In
64:
24 of the U.S. states have "stop and identify" statutes
2185:
Digital Anonymity and the Law. Tensions and Dimensions
1887:
By the Water Cooler in Cyberspace, the Talk Turns Ugly
1825:(1999). "Legal Issues in Anonymity and Pseudonymity". 1657:. September 17, 2013. Retrieved on September 22, 2013. 583: 489:
However, the Internet was not designed for anonymity:
152:
activity, or unpopular, or outlawed political views).
130:
where the legal identity of the person is disguised).
1745:"Horizon: The defenders of anonymity on the internet" 922: 2545: 2134:
Columbia Insurance Company v. Seescandy.com, et al.
1948:"Nameless in Cyberspace: Anonymity on the Internet" 1908:"Nameless in Cyberspace, anonymity on the Internet" 1642:
Real names, real problems: Pseudonymity under siege
1248:"Tallinn, Hacking, and Customary International Law" 756:
Columbia Insurance Company v. Seescandy.com, et al.
447:fully adopts this policy, saying "Many hands write 5356:International Association of Privacy Professionals 259:or other hand coverings in order to not leave any 1355: 220: 5472: 5321:Computer Professionals for Social Responsibility 1896:, by Reed Abelson, New York Times, 29 April 2001 1349: 927:Anonymity is directly related to the concept of 891:were anonymously authored by three of America's 796:An above-mentioned 1995 Supreme Court ruling in 691: 971:(an anonymous sculptor whose exhibited work in 2474: 1445: 290: 4892: 4287: 2531: 785:, the European Cybercrime Convention and the 348:, an author claiming—and long believed—to be 334: 2083:Talley v. California, 362 U.S. 60, 64 (1960) 1009:This is frequently applied in fiction, from 831: 825:European Union Charter of Fundamental Rights 462: 2444: 1322: 1024: 494:This address can be mapped to a particular 4899: 4885: 4294: 4280: 2538: 2524: 1225:"Data Collection and the Regulatory State" 1175: 1083:On the Internet, nobody knows you're a dog 838:Anti-Counterfeiting Trade Agreement (ACTA) 419: 2490: 1983:. European Journal of Social Psychology, 1906:Wallace, Jonathan D. (December 8, 1999). 1784: 1666: 1403: 1340: 1307: 1263: 1148:Wallace, Kathleen A (1999). "Anonymity". 901:United States Declaration of Independence 847: 344:author is identified as "Pseudo-", as in 2289:"University of Washington School of Law" 1996: 1859: 1821: 1245: 1222: 1203: 994:(until 2004), costumed comedy rock band 856:Modern pasquinades glued to the base of 851: 162: 133: 25: 1905: 1742: 1364:. Australian Broadcasting Corporation. 1147: 455:. According to Ross Eaman, in his book 277: 194:, and behavior in situations such as a 5473: 2334:from the original on February 8, 2015. 2317:Reforming European Data Protection Law 2272:: CS1 maint: archived copy as title ( 2000:(1995). "Anonymity and its Enmities". 1518:: CS1 maint: archived copy as title ( 1021:, where a hidden identity is assumed. 5336:Electronic Privacy Information Center 4880: 4275: 2519: 2438: 2346:"EUR-Lex - 12012P/TXT - EN - EUR-Lex" 1928:from the original on 27 February 2012 1729: 1727: 1725: 1539:. Scarecrow Press, 2009. p. 73. 1532: 1385: 1323:Tsikerdekis, Michail (8 March 2013). 1289: 798:McIntyre v. Ohio Elections Commission 744:McIntyre v. Ohio Elections Commission 428:. An exception is the Markker weekly 1803:from the original on 10 January 2024 1693: 671: 628:People can avoid becoming famous by 5316:Center for Democracy and Technology 2445:Hattenstone, Simon (17 July 2003). 2138:. Legal.web.aol.com. Archived from 1592: 1469:from the original on March 24, 2018 1088:Personally identifiable information 1048:List of anonymously published works 584:Arguments for and against anonymity 13: 2382:from the original on 9 August 2016 1862:Future Generation Computer Systems 1743:Radford, Mike (3 September 2014). 1722: 1296:Management Communication Quarterly 103:personally identifying information 14: 5492: 4301: 2402:"The Infrastructure of Democracy" 2352:from the original on 17 June 2016 2105:McIntyre v. Ohio Elections Comm'n 1794:Michigan Technological University 1710:from the original on 28 June 2013 1675:from the original on 4 March 2016 1572:Jacob Palme and Mikael Berglund, 1150:Ethics and Information Technology 923:Anonymity and pseudonymity in art 810: 630:publishing their work anonymously 386:. The 20th-century art historian 5455: 5454: 4922:Right of access to personal data 4790:Concentration of media ownership 3186:Democratic Republic of the Congo 2107:" (93–986), 514 U.S. 334 (1995)" 2056:"Gabriella Coleman on Anonymous" 1755:from the original on 2015-02-14. 1667:Armerding, Taylor (2014-03-24). 1553:from the original on 2015-02-08. 1356:Carbonell, Rachel (2016-09-28). 1206:American Philosophical Quarterly 1114:: "anonymous". Derived from the 699: 2468: 2419: 2394: 2364: 2338: 2320:. Springer, 2014. p. 406. 2307: 2280: 2235: 2222: 2211:from the original on 2016-07-06 2197: 2178: 2167:from the original on 2013-06-08 2163:. Law.cornell.edu. 1953-03-09. 2153: 2124: 2113:from the original on 2012-12-01 2095: 2086: 2077: 2068: 2049: 2039: 2020: 1990: 1966: 1954:from the original on 1 May 2016 1940: 1899: 1880: 1853: 1815: 1785:Davenport, David (April 2002). 1778: 1759: 1736: 1687: 1660: 1634: 1613: 1586: 1566: 1557: 1526: 1501:from the original on 2015-07-14 1481: 1451: 1420: 1386:Caner, Daniel F. (2018-06-26). 1368:from the original on 2016-09-29 979:(1993-2021). For street artist 735:anonymous political campaigning 346:Pseudo-Dionysius the Areopagite 96: 5331:Electronic Frontier Foundation 5311:American Civil Liberties Union 5265:Privacy-enhancing technologies 2103:"U.S. Supreme Court decision " 1379: 1316: 1283: 1272: 1246:Ghappour, Ahmed (2017-01-01). 1239: 1223:Ghappour, Ahmed (2017-09-01). 1216: 1141: 1105: 919:as conducted on the Internet. 352:, an early Christian convert. 221:Anonymity, commerce, and crime 1: 1874:10.1016/S0167-739X(99)00062-X 1135: 996:The Radioactive Chicken Heads 823:, freedom of impression. The 692:Legal protection of anonymity 501:Anonymizing services such as 109:. Examples of pseudonyms are 2404:. 2006-05-11. Archived from 87: 7: 5056:Data protection authorities 4906: 1694:King, Alison (April 2010). 1574:"Anonymity on the Internet" 1078:Online disinhibition effect 1041: 414:Tomb of the Unknown Soldier 291:Issues facing the anonymous 10: 5497: 5260:Social networking services 3849:Imperial, royal, and noble 2425:Depictions, text in Dutch 1533:Eaman, Ross (2009-10-12). 1446:Gröndahl & Asokan 2020 466: 335:Referring to the anonymous 15: 5450: 5374: 5351:Global Network Initiative 5303: 5295:Virtual assistant privacy 5275:Privacy-invasive software 5203: 5167: 5054: 4950: 4914: 4833: 4777: 4739: 4661: 4610: 4575: 4519: 4476: 4469: 4433: 4385: 4309: 4256: 4064: 4036: 3933:Imperial, royal and noble 3918: 3829: 3810: 3743: 3632: 3542: 3450: 3368: 3330: 3307: 3224: 3171: 3138: 3053: 3020: 2937: 2926: 2821: 2751: 2632: 2606: 2557: 2027:Anonymity on the Internet 1583:, Jacob Palme's Home Page 1093:Anonymity (social choice) 1053:List of anonymous masters 832:International legislation 496:Internet Service Provider 463:Anonymity on the Internet 80:), within a well-defined 4866:Society of the Spectacle 2774:Maiden and married names 1536:The A to Z of Journalism 1309:10.1177/0893318905279191 1290:Scott, Craig R. (2005). 1098: 1025:Mathematics of anonymity 969:De Onbekende Beeldhouwer 686:denial-of-service (DDoS) 457:The A to Z of Journalism 350:Dionysius the Areopagite 167:Protesters of the group 5346:Future of Privacy Forum 5341:European Digital Rights 4747:Influence of mass media 4552:Narcotizing dysfunction 4261:Category:Lists of names 2432:1 November 2010 at the 2427:Retrieved 23 June 2017. 1972:Joinson, A. N. (2001). 1839:10.1080/019722499128574 1827:The Information Society 1190:10.1080/019722499128592 1178:The Information Society 1162:10.1023/A:1010066509278 862:Talking Statues of Rome 767:United States v. Rumely 737:was established in the 420:Anonymity and the press 270:The Thomas Crown Affair 5387:Cellphone surveillance 5304:Advocacy organizations 4927:Expectation of privacy 4408:Freedom of information 3191:Eritrean and Ethiopian 1229:Connecticut Law Review 881:, or scurrilous as in 864: 848:Anonymity and politics 610:or vocal performances. 439:run their leaders, or 329:adversarial stylometry 179: 39: 5366:Privacy International 4937:Right to be forgotten 4795:Exploitation of women 4121:Galton–Watson process 3726:Ancient Tamil country 3148:Australian Aboriginal 2478:ACM Computing Surveys 2002:Journal of Online Law 1700:Vanderbilt Law Review 1124:, meaning "without a 1031:Alice, Bob, and Carol 888:The Federalist Papers 855: 821:freedom of expression 775:2001 terrorist attack 719:The Federalist Papers 467:Further information: 166: 134:Psychological effects 30:Protesters outside a 29: 3888:Post-nominal letters 3007:Indigenous Taiwanese 2447:"Something to spray" 1998:Froomkin, A. Michael 1823:Froomkin, A. Michael 382:— was identified as 278:Anonymity in charity 5402:Global surveillance 5270:Privacy engineering 5255:Personal identifier 5205:Information privacy 4942:Post-mortem privacy 4841:Advanced capitalism 4527:Cult of personality 4441:Advanced capitalism 4248:Surnames by country 3873:Pre-nominal letters 2930:Surnames by country 2109:. Law.cornell.edu. 1265:10.1017/aju.2017.59 1128:" or "namelessness" 1002:(1998–present) and 965:J. D. Salinger 937:cult of personality 590:A. Michael Froomkin 569:in several states. 312:identification card 121:, student numbers, 119:credit card numbers 5442:Personality rights 4762:Semiotic democracy 4686:Civil disobedience 4598:Media manipulation 4588:Crowd manipulation 4511:Tabloid journalism 4425:Media transparency 4403:Media independence 4317:24-hour news cycle 4111:Endonym and exonym 4054:Calendar of saints 4037:Related traditions 3811:Manners of address 3173:Sub-Saharan Africa 2594:Nobiliary particle 2190:2015-02-08 at the 2061:2012-01-28 at the 2032:2008-02-21 at the 1979:2007-02-21 at the 1892:2016-07-04 at the 1771:2015-03-19 at the 1647:2013-09-20 at the 1579:2008-02-21 at the 1432:2008-01-21 at the 1405:10.3390/rel9080229 1063:Data anonymization 1029:Suppose that only 865: 779:World Trade Center 739:U.S. Supreme Court 706:Alexander Hamilton 560:The prevalence of 437:British newspapers 180: 40: 5468: 5467: 5412:Mass surveillance 4874: 4873: 4800:Freedom of speech 4618:Theodor W. Adorno 4606: 4605: 4593:Managing the news 4413:Freedom of speech 4393:Media development 4357:News broadcasting 4337:Independent media 4322:Alternative media 4269: 4268: 4197:Personal identity 4032: 4031: 3739: 3738: 3680: 3628: 3627: 3589: 3582: 3575: 3533: 3514: 3507: 3500: 3493: 3441: 3412: 3405: 3398: 3391: 3293: 3286: 2981: 2974: 2967: 2960: 2752:By life situation 2705: 1621:"Anonymous email" 1342:10.1002/asi.22795 953:James Tiptree, Jr 911:, and other U.S. 905:John Perry Barlow 897:U.S. Constitution 869:Letters of Junius 672:Anonymous (group) 396:Sandro Botticelli 5488: 5458: 5457: 5326:Data Privacy Lab 5285:Privacy software 4932:Right to privacy 4901: 4894: 4887: 4878: 4877: 4846:Culture industry 4815:Social influence 4768:The Lonely Crowd 4711:Political satire 4676:Call-out culture 4653:Jacques Rancière 4648:Marshall McLuhan 4623:Jean Baudrillard 4567:Viral phenomenon 4501:Public relations 4474: 4473: 4347:Mainstream media 4332:Electronic media 4296: 4289: 4282: 4273: 4272: 4082:Anthropomorphism 3827: 3826: 3775:Buddhist surname 3676: 3585: 3578: 3571: 3531:Hispanic America 3529: 3510: 3503: 3496: 3489: 3437: 3408: 3401: 3396:African-American 3394: 3387: 3305: 3304: 3289: 3282: 3253:Ashkenazi Jewish 3058:and Western Asia 3023:and Central Asia 2977: 2970: 2963: 2956: 2935: 2934: 2796:Placeholder name 2701: 2645:Double-barrelled 2540: 2533: 2526: 2517: 2516: 2512: 2494: 2463: 2462: 2460: 2458: 2442: 2436: 2423: 2417: 2416: 2414: 2413: 2398: 2392: 2391: 2389: 2387: 2368: 2362: 2361: 2359: 2357: 2342: 2336: 2335: 2311: 2305: 2303: 2301: 2300: 2291:. Archived from 2284: 2278: 2277: 2271: 2263: 2261: 2260: 2254: 2248:. Archived from 2247: 2239: 2233: 2226: 2220: 2219: 2217: 2216: 2201: 2195: 2182: 2176: 2175: 2173: 2172: 2157: 2151: 2150: 2148: 2147: 2128: 2122: 2121: 2119: 2118: 2099: 2093: 2090: 2084: 2081: 2075: 2072: 2066: 2053: 2047: 2043: 2037: 2024: 2018: 2017: 1994: 1988: 1970: 1964: 1963: 1961: 1959: 1944: 1938: 1937: 1935: 1933: 1927: 1912: 1903: 1897: 1884: 1878: 1877: 1857: 1851: 1850: 1819: 1813: 1812: 1810: 1808: 1802: 1791: 1782: 1776: 1763: 1757: 1756: 1740: 1734: 1731: 1720: 1719: 1717: 1715: 1691: 1685: 1684: 1682: 1680: 1664: 1658: 1638: 1632: 1631: 1629: 1627: 1617: 1611: 1610: 1590: 1584: 1570: 1564: 1561: 1555: 1554: 1530: 1524: 1523: 1517: 1509: 1507: 1506: 1500: 1493: 1485: 1479: 1478: 1476: 1474: 1455: 1449: 1443: 1437: 1424: 1418: 1417: 1407: 1383: 1377: 1376: 1374: 1373: 1353: 1347: 1346: 1344: 1335:(5): 1001–1015. 1320: 1314: 1313: 1311: 1287: 1281: 1276: 1270: 1269: 1267: 1243: 1237: 1236: 1220: 1214: 1213: 1201: 1173: 1145: 1129: 1109: 1073:Internet privacy 1068:Friend-to-friend 1006:(2015–present). 893:Founding Fathers 728:First Amendment. 724:US Supreme Court 567:Internet freedom 473:Internet privacy 388:Bernard Berenson 233:loyalty programs 192:crowd psychology 177:Guy Fawkes masks 5496: 5495: 5491: 5490: 5489: 5487: 5486: 5485: 5471: 5470: 5469: 5464: 5446: 5370: 5299: 5199: 5163: 5050: 5044:amended in 2020 4946: 4910: 4905: 4875: 4870: 4856:Media franchise 4829: 4773: 4735: 4691:Culture jamming 4657: 4643:Walter Lippmann 4602: 4571: 4515: 4465: 4429: 4420:Media pluralism 4381: 4305: 4300: 4270: 4265: 4252: 4087:Personification 4060: 4028: 3914: 3816: 3812: 3806: 3802:Theophoric name 3735: 3640: 3624: 3538: 3446: 3364: 3326: 3303: 3232: 3220: 3167: 3134: 3057: 3049: 3022: 3016: 2928: 2922: 2817: 2784:Posthumous name 2747: 2628: 2602: 2553: 2544: 2501:10.1145/3310331 2471: 2466: 2456: 2454: 2443: 2439: 2434:Wayback Machine 2424: 2420: 2411: 2409: 2408:on May 11, 2006 2400: 2399: 2395: 2385: 2383: 2370: 2369: 2365: 2355: 2353: 2344: 2343: 2339: 2328: 2312: 2308: 2298: 2296: 2287: 2285: 2281: 2265: 2264: 2258: 2256: 2252: 2245: 2243:"Archived copy" 2241: 2240: 2236: 2227: 2223: 2214: 2212: 2203: 2202: 2198: 2192:Wayback Machine 2183: 2179: 2170: 2168: 2159: 2158: 2154: 2145: 2143: 2130: 2129: 2125: 2116: 2114: 2101: 2100: 2096: 2091: 2087: 2082: 2078: 2073: 2069: 2063:Wayback Machine 2054: 2050: 2044: 2040: 2034:Wayback Machine 2025: 2021: 1995: 1991: 1981:Wayback Machine 1971: 1967: 1957: 1955: 1946: 1945: 1941: 1931: 1929: 1925: 1910: 1904: 1900: 1894:Wayback Machine 1885: 1881: 1858: 1854: 1820: 1816: 1806: 1804: 1800: 1789: 1783: 1779: 1773:Wayback Machine 1764: 1760: 1741: 1737: 1732: 1723: 1713: 1711: 1692: 1688: 1678: 1676: 1665: 1661: 1649:Wayback Machine 1639: 1635: 1625: 1623: 1619: 1618: 1614: 1595:UCLA Law Review 1591: 1587: 1581:Wayback Machine 1571: 1567: 1562: 1558: 1547: 1531: 1527: 1511: 1510: 1504: 1502: 1498: 1491: 1489:"Archived copy" 1487: 1486: 1482: 1472: 1470: 1457: 1456: 1452: 1444: 1440: 1434:Wayback Machine 1425: 1421: 1384: 1380: 1371: 1369: 1354: 1350: 1321: 1317: 1288: 1284: 1277: 1273: 1244: 1240: 1221: 1217: 1146: 1142: 1138: 1133: 1132: 1118:word ἀνωνυμία, 1110: 1106: 1101: 1044: 1027: 1011:The Lone Ranger 949:science fiction 925: 850: 834: 817:data protection 813: 702: 694: 674: 662:Internet trolls 586: 475: 465: 443:, anonymously. 422: 337: 293: 280: 265:organized crime 223: 136: 127:social networks 99: 90: 24: 21: 12: 11: 5: 5494: 5484: 5483: 5466: 5465: 5463: 5462: 5451: 5448: 5447: 5445: 5444: 5439: 5434: 5429: 5427:Search warrant 5424: 5419: 5414: 5409: 5407:Identity theft 5404: 5399: 5394: 5389: 5384: 5378: 5376: 5372: 5371: 5369: 5368: 5363: 5358: 5353: 5348: 5343: 5338: 5333: 5328: 5323: 5318: 5313: 5307: 5305: 5301: 5300: 5298: 5297: 5292: 5287: 5282: 5280:Privacy policy 5277: 5272: 5267: 5262: 5257: 5252: 5247: 5242: 5241: 5240: 5235: 5230: 5220: 5215: 5209: 5207: 5201: 5200: 5198: 5197: 5192: 5187: 5182: 5177: 5171: 5169: 5165: 5164: 5162: 5161: 5159:United Kingdom 5156: 5151: 5146: 5141: 5136: 5131: 5126: 5121: 5116: 5111: 5106: 5101: 5096: 5091: 5086: 5081: 5076: 5074:European Union 5071: 5066: 5060: 5058: 5052: 5051: 5049: 5048: 5047: 5046: 5032: 5030:United Kingdom 5027: 5022: 5017: 5012: 5007: 5002: 4997: 4992: 4990:European Union 4987: 4982: 4977: 4972: 4967: 4962: 4956: 4954: 4948: 4947: 4945: 4944: 4939: 4934: 4929: 4924: 4918: 4916: 4912: 4911: 4904: 4903: 4896: 4889: 4881: 4872: 4871: 4869: 4868: 4863: 4858: 4853: 4848: 4843: 4837: 4835: 4831: 4830: 4828: 4827: 4822: 4817: 4812: 4807: 4802: 4797: 4792: 4787: 4781: 4779: 4775: 4774: 4772: 4771: 4764: 4759: 4754: 4749: 4743: 4741: 4737: 4736: 4734: 4733: 4728: 4723: 4718: 4713: 4708: 4703: 4698: 4693: 4688: 4683: 4681:Cancel culture 4678: 4673: 4667: 4665: 4663:Counterculture 4659: 4658: 4656: 4655: 4650: 4645: 4640: 4635: 4630: 4628:Edward Bernays 4625: 4620: 4614: 4612: 4608: 4607: 4604: 4603: 4601: 4600: 4595: 4590: 4585: 4583:Catch and kill 4579: 4577: 4573: 4572: 4570: 4569: 4564: 4562:Sensationalism 4559: 4554: 4549: 4544: 4539: 4534: 4529: 4523: 4521: 4517: 4516: 4514: 4513: 4508: 4503: 4498: 4497: 4496: 4486: 4480: 4478: 4471: 4467: 4466: 4464: 4463: 4458: 4453: 4451:Bipartisanship 4448: 4446:American Dream 4443: 4437: 4435: 4431: 4430: 4428: 4427: 4422: 4417: 4416: 4415: 4410: 4400: 4395: 4389: 4387: 4383: 4382: 4380: 4379: 4374: 4369: 4364: 4359: 4354: 4349: 4344: 4339: 4334: 4329: 4324: 4319: 4313: 4311: 4307: 4306: 4299: 4298: 4291: 4284: 4276: 4267: 4266: 4264: 4263: 4257: 4254: 4253: 4251: 4250: 4245: 4244: 4243: 4238: 4233: 4228: 4227: 4226: 4211: 4206: 4205: 4204: 4194: 4187: 4182: 4177: 4170: 4165: 4160: 4155: 4154: 4153: 4148: 4143: 4135: 4134: 4133: 4123: 4118: 4113: 4108: 4103: 4098: 4097: 4096: 4095: 4094: 4079: 4074: 4068: 4066: 4062: 4061: 4059: 4058: 4057: 4056: 4046: 4040: 4038: 4034: 4033: 4030: 4029: 4027: 4026: 4025: 4024: 4019: 4017:Ecclesiastical 4009: 4004: 3999: 3994: 3993: 3992: 3987: 3977: 3972: 3967: 3966: 3965: 3960: 3955: 3950: 3945: 3940: 3930: 3924: 3922: 3916: 3915: 3913: 3912: 3911: 3910: 3909: 3908: 3895: 3885: 3875: 3870: 3869: 3868: 3867: 3866: 3864:Ecclesiastical 3856: 3851: 3846: 3835: 3833: 3824: 3808: 3807: 3805: 3804: 3799: 3794: 3793: 3792: 3782: 3777: 3772: 3771: 3770: 3765: 3760: 3753:Christian name 3749: 3747: 3741: 3740: 3737: 3736: 3734: 3733: 3728: 3723: 3718: 3713: 3708: 3703: 3698: 3693: 3688: 3683: 3682: 3681: 3669: 3664: 3659: 3654: 3648: 3646: 3643:Southeast Asia 3630: 3629: 3626: 3625: 3623: 3622: 3617: 3612: 3607: 3602: 3597: 3592: 3591: 3590: 3583: 3576: 3567:Eastern Slavic 3564: 3559: 3554: 3548: 3546: 3540: 3539: 3537: 3536: 3535: 3534: 3522: 3517: 3516: 3515: 3508: 3501: 3494: 3482: 3477: 3472: 3467: 3462: 3456: 3454: 3448: 3447: 3445: 3444: 3443: 3442: 3430: 3425: 3420: 3415: 3414: 3413: 3406: 3399: 3392: 3380: 3374: 3372: 3366: 3365: 3363: 3362: 3357: 3352: 3347: 3342: 3336: 3334: 3328: 3327: 3325: 3324: 3319: 3313: 3311: 3302: 3301: 3296: 3295: 3294: 3287: 3275: 3270: 3265: 3260: 3255: 3250: 3245: 3239: 3237: 3222: 3221: 3219: 3218: 3213: 3208: 3203: 3198: 3193: 3188: 3183: 3177: 3175: 3169: 3168: 3166: 3165: 3160: 3155: 3150: 3144: 3142: 3136: 3135: 3133: 3132: 3127: 3122: 3117: 3112: 3107: 3102: 3097: 3092: 3087: 3082: 3077: 3072: 3067: 3061: 3059: 3051: 3050: 3048: 3047: 3042: 3037: 3032: 3026: 3024: 3018: 3017: 3015: 3014: 3009: 3004: 2999: 2994: 2989: 2984: 2983: 2982: 2975: 2968: 2961: 2949: 2943: 2941: 2932: 2924: 2923: 2921: 2920: 2915: 2914: 2913: 2908: 2898: 2891: 2886: 2885: 2884: 2874: 2867: 2866: 2865: 2860: 2855: 2845: 2838: 2832: 2830: 2819: 2818: 2816: 2815: 2810: 2805: 2804: 2803: 2793: 2792: 2791: 2786: 2776: 2771: 2766: 2761: 2755: 2753: 2749: 2748: 2746: 2745: 2740: 2735: 2730: 2729: 2728: 2718: 2713: 2708: 2707: 2706: 2694: 2689: 2684: 2679: 2674: 2669: 2668: 2667: 2662: 2657: 2647: 2642: 2636: 2634: 2630: 2629: 2627: 2626: 2621: 2616: 2610: 2608: 2604: 2603: 2601: 2600: 2599: 2598: 2597: 2596: 2586: 2572: 2567: 2561: 2559: 2555: 2554: 2547:Personal names 2543: 2542: 2535: 2528: 2520: 2514: 2513: 2470: 2467: 2465: 2464: 2437: 2418: 2393: 2378:. 2012-02-11. 2363: 2337: 2326: 2306: 2279: 2234: 2221: 2196: 2177: 2152: 2123: 2094: 2085: 2076: 2067: 2048: 2038: 2019: 1989: 1965: 1939: 1919:CATO Institute 1898: 1879: 1868:(4): 379–391. 1852: 1833:(2): 113–127. 1814: 1777: 1758: 1735: 1721: 1706:(3): 845–884. 1686: 1659: 1633: 1612: 1601:: 1701, 2010. 1585: 1565: 1556: 1545: 1525: 1480: 1450: 1438: 1419: 1378: 1348: 1315: 1282: 1271: 1238: 1215: 1139: 1137: 1134: 1131: 1130: 1103: 1102: 1100: 1097: 1096: 1095: 1090: 1085: 1080: 1075: 1070: 1065: 1060: 1055: 1050: 1043: 1040: 1026: 1023: 961:Thomas Pynchon 943:(in which the 924: 921: 849: 846: 833: 830: 812: 811:European Union 809: 791:data retention 787:European Union 783:US Patriot Act 771: 770: 763: 758:(1999) of the 752: 749:Bill of Rights 701: 698: 693: 690: 673: 670: 666: 665: 659: 652: 649:Child grooming 645: 642: 634: 633: 626: 623: 620: 617: 614: 611: 603: 599: 585: 582: 513:Sites such as 469:Anonymous post 464: 461: 421: 418: 376:history of art 336: 333: 292: 289: 279: 276: 222: 219: 135: 132: 98: 95: 89: 86: 22: 9: 6: 4: 3: 2: 5493: 5482: 5479: 5478: 5476: 5461: 5453: 5452: 5449: 5443: 5440: 5438: 5435: 5433: 5430: 5428: 5425: 5423: 5420: 5418: 5415: 5413: 5410: 5408: 5405: 5403: 5400: 5398: 5397:Eavesdropping 5395: 5393: 5392:Data security 5390: 5388: 5385: 5383: 5380: 5379: 5377: 5373: 5367: 5364: 5362: 5359: 5357: 5354: 5352: 5349: 5347: 5344: 5342: 5339: 5337: 5334: 5332: 5329: 5327: 5324: 5322: 5319: 5317: 5314: 5312: 5309: 5308: 5306: 5302: 5296: 5293: 5291: 5290:Secret ballot 5288: 5286: 5283: 5281: 5278: 5276: 5273: 5271: 5268: 5266: 5263: 5261: 5258: 5256: 5253: 5251: 5250:Personal data 5248: 5246: 5243: 5239: 5236: 5234: 5231: 5229: 5226: 5225: 5224: 5221: 5219: 5216: 5214: 5211: 5210: 5208: 5206: 5202: 5196: 5193: 5191: 5188: 5186: 5183: 5181: 5178: 5176: 5173: 5172: 5170: 5166: 5160: 5157: 5155: 5152: 5150: 5147: 5145: 5142: 5140: 5137: 5135: 5132: 5130: 5127: 5125: 5122: 5120: 5117: 5115: 5112: 5110: 5107: 5105: 5102: 5100: 5097: 5095: 5092: 5090: 5087: 5085: 5082: 5080: 5077: 5075: 5072: 5070: 5067: 5065: 5062: 5061: 5059: 5057: 5053: 5045: 5041: 5038: 5037: 5036: 5035:United States 5033: 5031: 5028: 5026: 5023: 5021: 5018: 5016: 5013: 5011: 5008: 5006: 5003: 5001: 4998: 4996: 4993: 4991: 4988: 4986: 4983: 4981: 4978: 4976: 4973: 4971: 4968: 4966: 4963: 4961: 4958: 4957: 4955: 4953: 4949: 4943: 4940: 4938: 4935: 4933: 4930: 4928: 4925: 4923: 4920: 4919: 4917: 4913: 4909: 4902: 4897: 4895: 4890: 4888: 4883: 4882: 4879: 4867: 4864: 4862: 4859: 4857: 4854: 4852: 4849: 4847: 4844: 4842: 4839: 4838: 4836: 4832: 4826: 4823: 4821: 4818: 4816: 4813: 4811: 4808: 4806: 4803: 4801: 4798: 4796: 4793: 4791: 4788: 4786: 4783: 4782: 4780: 4776: 4770: 4769: 4765: 4763: 4760: 4758: 4757:Mediatization 4755: 4753: 4752:Media studies 4750: 4748: 4745: 4744: 4742: 4738: 4732: 4731:Strike action 4729: 4727: 4724: 4722: 4719: 4717: 4714: 4712: 4709: 4707: 4704: 4702: 4699: 4697: 4696:Demonstration 4694: 4692: 4689: 4687: 4684: 4682: 4679: 4677: 4674: 4672: 4669: 4668: 4666: 4664: 4660: 4654: 4651: 4649: 4646: 4644: 4641: 4639: 4636: 4634: 4631: 4629: 4626: 4624: 4621: 4619: 4616: 4615: 4613: 4609: 4599: 4596: 4594: 4591: 4589: 4586: 4584: 4581: 4580: 4578: 4574: 4568: 4565: 4563: 4560: 4558: 4555: 4553: 4550: 4548: 4545: 4543: 4540: 4538: 4535: 4533: 4530: 4528: 4525: 4524: 4522: 4518: 4512: 4509: 4507: 4504: 4502: 4499: 4495: 4492: 4491: 4490: 4487: 4485: 4482: 4481: 4479: 4475: 4472: 4468: 4462: 4461:Pensée unique 4459: 4457: 4454: 4452: 4449: 4447: 4444: 4442: 4439: 4438: 4436: 4432: 4426: 4423: 4421: 4418: 4414: 4411: 4409: 4406: 4405: 4404: 4401: 4399: 4396: 4394: 4391: 4390: 4388: 4384: 4378: 4375: 4373: 4370: 4368: 4365: 4363: 4360: 4358: 4355: 4353: 4350: 4348: 4345: 4343: 4340: 4338: 4335: 4333: 4330: 4328: 4327:Digital media 4325: 4323: 4320: 4318: 4315: 4314: 4312: 4308: 4304: 4303:Media culture 4297: 4292: 4290: 4285: 4283: 4278: 4277: 4274: 4262: 4259: 4258: 4255: 4249: 4246: 4242: 4239: 4237: 4234: 4232: 4229: 4225: 4222: 4221: 4220: 4217: 4216: 4215: 4212: 4210: 4207: 4203: 4200: 4199: 4198: 4195: 4193: 4192: 4188: 4186: 4183: 4181: 4178: 4176: 4175: 4171: 4169: 4166: 4164: 4161: 4159: 4156: 4152: 4149: 4147: 4144: 4142: 4139: 4138: 4136: 4132: 4129: 4128: 4127: 4124: 4122: 4119: 4117: 4114: 4112: 4109: 4107: 4104: 4102: 4099: 4093: 4090: 4089: 4088: 4085: 4084: 4083: 4080: 4078: 4075: 4073: 4070: 4069: 4067: 4063: 4055: 4052: 4051: 4050: 4047: 4045: 4042: 4041: 4039: 4035: 4023: 4020: 4018: 4015: 4014: 4013: 4010: 4008: 4005: 4003: 4000: 3998: 3995: 3991: 3988: 3986: 3983: 3982: 3981: 3978: 3976: 3973: 3971: 3968: 3964: 3961: 3959: 3956: 3954: 3951: 3949: 3946: 3944: 3941: 3939: 3936: 3935: 3934: 3931: 3929: 3926: 3925: 3923: 3921: 3917: 3907: 3903: 3899: 3896: 3894: 3891: 3890: 3889: 3886: 3884: 3881: 3880: 3879: 3876: 3874: 3871: 3865: 3862: 3861: 3860: 3857: 3855: 3852: 3850: 3847: 3845: 3842: 3841: 3840: 3837: 3836: 3834: 3832: 3828: 3825: 3823: 3819: 3815: 3809: 3803: 3800: 3798: 3797:Mandaean name 3795: 3791: 3788: 3787: 3786: 3783: 3781: 3778: 3776: 3773: 3769: 3766: 3764: 3761: 3759: 3758:Biblical name 3756: 3755: 3754: 3751: 3750: 3748: 3746: 3742: 3732: 3729: 3727: 3724: 3722: 3719: 3717: 3714: 3712: 3709: 3707: 3704: 3702: 3699: 3697: 3694: 3692: 3689: 3687: 3684: 3679: 3675: 3674: 3673: 3670: 3668: 3665: 3663: 3660: 3658: 3655: 3653: 3650: 3649: 3647: 3644: 3639: 3635: 3631: 3621: 3618: 3616: 3613: 3611: 3608: 3606: 3603: 3601: 3598: 3596: 3593: 3588: 3584: 3581: 3577: 3574: 3570: 3569: 3568: 3565: 3563: 3560: 3558: 3555: 3553: 3550: 3549: 3547: 3545: 3541: 3532: 3528: 3527: 3526: 3523: 3521: 3518: 3513: 3509: 3506: 3502: 3499: 3495: 3492: 3488: 3487: 3486: 3483: 3481: 3478: 3476: 3473: 3471: 3468: 3466: 3463: 3461: 3458: 3457: 3455: 3453: 3449: 3440: 3436: 3435: 3434: 3431: 3429: 3426: 3424: 3421: 3419: 3416: 3411: 3407: 3404: 3400: 3397: 3393: 3390: 3386: 3385: 3384: 3381: 3379: 3376: 3375: 3373: 3371: 3367: 3361: 3358: 3356: 3353: 3351: 3348: 3346: 3343: 3341: 3338: 3337: 3335: 3333: 3329: 3323: 3320: 3318: 3315: 3314: 3312: 3310: 3306: 3300: 3297: 3292: 3288: 3285: 3284:Ancient Greek 3281: 3280: 3279: 3276: 3274: 3271: 3269: 3266: 3264: 3261: 3259: 3256: 3254: 3251: 3249: 3246: 3244: 3241: 3240: 3238: 3236: 3231: 3230:North America 3227: 3223: 3217: 3214: 3212: 3209: 3207: 3204: 3202: 3199: 3197: 3194: 3192: 3189: 3187: 3184: 3182: 3179: 3178: 3176: 3174: 3170: 3164: 3161: 3159: 3156: 3154: 3151: 3149: 3146: 3145: 3143: 3141: 3137: 3131: 3128: 3126: 3123: 3121: 3118: 3116: 3113: 3111: 3108: 3106: 3103: 3101: 3098: 3096: 3093: 3091: 3088: 3086: 3083: 3081: 3078: 3076: 3073: 3071: 3068: 3066: 3063: 3062: 3060: 3056: 3052: 3046: 3043: 3041: 3038: 3036: 3033: 3031: 3028: 3027: 3025: 3021:Northern Asia 3019: 3013: 3010: 3008: 3005: 3003: 3000: 2998: 2995: 2993: 2990: 2988: 2985: 2980: 2976: 2973: 2969: 2966: 2962: 2959: 2955: 2954: 2953: 2950: 2948: 2945: 2944: 2942: 2940: 2936: 2933: 2931: 2925: 2919: 2916: 2912: 2909: 2907: 2904: 2903: 2902: 2899: 2897: 2896: 2892: 2890: 2887: 2883: 2880: 2879: 2878: 2875: 2873: 2872: 2871:Nom de guerre 2868: 2864: 2861: 2859: 2856: 2854: 2851: 2850: 2849: 2846: 2844: 2843: 2839: 2837: 2834: 2833: 2831: 2828: 2824: 2820: 2814: 2811: 2809: 2806: 2802: 2799: 2798: 2797: 2794: 2790: 2787: 2785: 2782: 2781: 2780: 2777: 2775: 2772: 2770: 2767: 2765: 2762: 2760: 2757: 2756: 2754: 2750: 2744: 2741: 2739: 2736: 2734: 2731: 2727: 2724: 2723: 2722: 2719: 2717: 2714: 2712: 2709: 2704: 2700: 2699: 2698: 2695: 2693: 2690: 2688: 2685: 2683: 2680: 2678: 2675: 2673: 2670: 2666: 2663: 2661: 2658: 2656: 2653: 2652: 2651: 2648: 2646: 2643: 2641: 2638: 2637: 2635: 2631: 2625: 2622: 2620: 2617: 2615: 2612: 2611: 2609: 2605: 2595: 2592: 2591: 2590: 2587: 2585: 2581: 2578: 2577: 2576: 2573: 2571: 2568: 2566: 2563: 2562: 2560: 2558:Personal name 2556: 2552: 2548: 2541: 2536: 2534: 2529: 2527: 2522: 2521: 2518: 2510: 2506: 2502: 2498: 2493: 2488: 2484: 2480: 2479: 2473: 2472: 2452: 2448: 2441: 2435: 2431: 2428: 2422: 2407: 2403: 2397: 2381: 2377: 2376:The Economist 2373: 2367: 2351: 2347: 2341: 2333: 2329: 2327:9789401793858 2323: 2319: 2318: 2310: 2295:on 2010-06-22 2294: 2290: 2283: 2275: 2269: 2255:on 2015-02-09 2251: 2244: 2238: 2231: 2225: 2210: 2206: 2200: 2193: 2189: 2186: 2181: 2166: 2162: 2156: 2142:on 2012-04-15 2141: 2137: 2135: 2127: 2112: 2108: 2106: 2098: 2089: 2080: 2071: 2064: 2060: 2057: 2052: 2042: 2035: 2031: 2028: 2023: 2015: 2011: 2007: 2003: 1999: 1993: 1987:(2), 177-192. 1986: 1982: 1978: 1975: 1969: 1953: 1949: 1943: 1924: 1920: 1916: 1909: 1902: 1895: 1891: 1888: 1883: 1875: 1871: 1867: 1863: 1856: 1848: 1844: 1840: 1836: 1832: 1828: 1824: 1818: 1799: 1795: 1788: 1781: 1774: 1770: 1767: 1762: 1754: 1750: 1746: 1739: 1730: 1728: 1726: 1709: 1705: 1701: 1697: 1690: 1674: 1670: 1663: 1656: 1655: 1650: 1646: 1643: 1640:Tynan, Dan. " 1637: 1622: 1616: 1608: 1604: 1600: 1596: 1589: 1582: 1578: 1575: 1569: 1560: 1552: 1548: 1546:9780810870673 1542: 1538: 1537: 1529: 1521: 1515: 1497: 1490: 1484: 1468: 1464: 1463:The Economist 1460: 1454: 1448:, p. 16. 1447: 1442: 1435: 1431: 1428: 1423: 1415: 1411: 1406: 1401: 1397: 1393: 1389: 1382: 1367: 1363: 1359: 1352: 1343: 1338: 1334: 1330: 1326: 1319: 1310: 1305: 1301: 1297: 1293: 1286: 1280: 1275: 1266: 1261: 1257: 1253: 1249: 1242: 1234: 1230: 1226: 1219: 1211: 1207: 1199: 1195: 1191: 1187: 1184:(2): 141–44. 1183: 1179: 1171: 1167: 1163: 1159: 1155: 1151: 1144: 1140: 1127: 1123: 1122: 1117: 1113: 1108: 1104: 1094: 1091: 1089: 1086: 1084: 1081: 1079: 1076: 1074: 1071: 1069: 1066: 1064: 1061: 1059: 1056: 1054: 1051: 1049: 1046: 1045: 1039: 1035: 1032: 1022: 1020: 1016: 1012: 1007: 1005: 1001: 997: 993: 989: 988:The Residents 984: 982: 978: 974: 970: 966: 962: 958: 954: 950: 946: 942: 938: 934: 930: 920: 918: 917:open politics 914: 910: 906: 902: 898: 894: 890: 889: 884: 880: 879: 874: 870: 863: 860:, one of the 859: 854: 845: 843: 839: 829: 826: 822: 818: 808: 804: 803: 799: 794: 792: 788: 784: 780: 776: 768: 764: 761: 757: 753: 750: 746: 745: 740: 736: 733:The right to 732: 731: 730: 729: 725: 721: 720: 715: 711: 710:James Madison 707: 700:United States 697: 689: 687: 682: 678: 669: 663: 660: 657: 656:cyberbullying 653: 650: 646: 643: 639: 638: 637: 631: 627: 624: 621: 618: 615: 612: 609: 604: 600: 596: 595: 594: 591: 581: 578: 574: 570: 568: 563: 562:cyberbullying 558: 556: 552: 548: 544: 540: 536: 532: 528: 524: 520: 516: 511: 508: 504: 499: 497: 492: 487: 485: 481: 474: 470: 460: 458: 454: 450: 449:The Economist 446: 445:The Economist 442: 438: 434: 432: 431:The Economist 427: 426:news agencies 417: 415: 411: 406: 404: 399: 397: 393: 389: 385: 384:Robert Campin 381: 377: 372: 370: 366: 361: 357: 353: 351: 347: 343: 332: 330: 326: 322: 318: 315: 313: 309: 305: 304:secret ballot 302:, though the 301: 296: 288: 284: 275: 272: 271: 266: 262: 258: 254: 250: 244: 242: 239:, for use in 238: 234: 229: 218: 216: 211: 209: 206:behavior and 205: 201: 197: 193: 187: 185: 178: 174: 170: 165: 161: 158: 153: 151: 146: 140: 131: 128: 124: 120: 116: 112: 108: 104: 94: 85: 83: 79: 75: 70: 67: 65: 60: 57: 51: 49: 44: 37: 33: 28: 19: 5437:Human rights 5381: 4952:Privacy laws 4861:Post-Fordism 4851:Mass society 4820:Transparency 4784: 4766: 4633:Noam Chomsky 4611:Philosophers 4557:Recuperation 4542:Media circus 4532:Dumbing down 4398:Media policy 4372:Social media 4236:Signum manus 4224:Royal cypher 4189: 4174:Nomen nescio 4172: 4168:Nomenclature 4163:Naming taboo 4076: 3975:Professional 3818:of authority 3768:Saint's name 3433:Scandinavian 3055:Muslim world 2893: 2869: 2840: 2692:Occupational 2551:anthroponymy 2482: 2476: 2469:Bibliography 2455:. Retrieved 2451:The Guardian 2450: 2440: 2421: 2410:. Retrieved 2406:the original 2396: 2384:. Retrieved 2375: 2366: 2354:. Retrieved 2340: 2316: 2309: 2297:. Retrieved 2293:the original 2282: 2257:. Retrieved 2250:the original 2237: 2224: 2213:. Retrieved 2199: 2180: 2169:. Retrieved 2155: 2144:. Retrieved 2140:the original 2133: 2126: 2115:. Retrieved 2104: 2097: 2088: 2079: 2070: 2051: 2041: 2022: 2005: 2001: 1992: 1984: 1968: 1956:. Retrieved 1942: 1930:. Retrieved 1914: 1901: 1882: 1865: 1861: 1855: 1830: 1826: 1817: 1805:. Retrieved 1793: 1780: 1761: 1748: 1738: 1712:. Retrieved 1703: 1699: 1689: 1677:. Retrieved 1662: 1652: 1636: 1624:. Retrieved 1615: 1598: 1594: 1588: 1568: 1559: 1535: 1528: 1503:. Retrieved 1483: 1471:. Retrieved 1462: 1453: 1441: 1422: 1395: 1391: 1381: 1370:. Retrieved 1361: 1351: 1332: 1328: 1318: 1299: 1295: 1285: 1274: 1255: 1252:AJIL Unbound 1251: 1241: 1232: 1228: 1218: 1209: 1205: 1181: 1177: 1153: 1149: 1143: 1119: 1107: 1036: 1028: 1008: 985: 941:hero worship 933:pseudonymity 929:obscurantism 926: 886: 876: 866: 842:generic drug 835: 814: 805: 801: 797: 795: 772: 766: 755: 742: 741:decision in 734: 717: 703: 695: 675: 667: 635: 587: 575: 571: 559: 515:Chatroulette 512: 500: 491:IP addresses 488: 476: 456: 452: 448: 444: 429: 423: 407: 400: 373: 364: 355: 354: 342:pseudonymous 338: 325:text corpora 319: 316: 297: 294: 285: 281: 268: 261:fingerprints 245: 224: 212: 188: 181: 154: 141: 137: 123:bank account 100: 97:Pseudonymity 91: 71: 68: 61: 52: 42: 41: 36:fingerprints 5432:Wiretapping 5144:Switzerland 5129:South Korea 5119:Philippines 5109:Netherlands 5104:Isle of Man 5025:Switzerland 5005:New Zealand 4740:In academia 4726:Review bomb 4547:Media event 4484:Advertising 4456:Consumerism 4377:State media 4209:Proper name 4131:Name change 3985:Educational 3963:Substantive 3902:decorations 3785:Jewish name 3780:Dharma name 3745:By religion 3410:Hongkongese 3235:Australasia 3075:Azerbaijani 2808:Regnal name 2789:Temple name 2619:Middle name 2607:By sequence 2584:Matrilineal 2580:Patrilineal 2485:(3): 1–36. 1714:11 February 1258:: 224–228. 883:pasquinades 608:fan fiction 577:David Chaum 321:Stylometric 255:, and wear 241:data mining 200:photography 173:Scientology 74:mathematics 32:Scientology 5417:Panopticon 5040:California 4915:Principles 4805:Media bias 4706:Occupation 4638:Guy Debord 4520:Techniques 4489:Propaganda 4386:Principles 4362:News media 4342:Mass media 4202:Identifier 4185:Onomastics 4126:Legal name 4106:Deadnaming 4002:Diplomatic 3958:Subsidiary 3953:Hereditary 3844:Diplomatic 3763:Papal name 3672:Indonesian 3638:South Asia 3634:Indosphere 3600:Macedonian 3573:Belarusian 3480:Portuguese 3322:Lithuanian 3216:Zimbabwean 3012:Vietnamese 2972:Generation 2939:East Asian 2927:By culture 2901:Stage name 2858:Hypocorism 2823:Pseudonyms 2813:Slave name 2764:Birth name 2716:Teknonymic 2697:Patronymic 2677:Matronymic 2640:Diminutive 2614:First name 2570:Given name 2565:Birth name 2492:1902.08939 2457:29 January 2412:2012-11-22 2299:2015-02-08 2259:2015-02-08 2215:2016-07-27 2171:2012-11-22 2146:2012-11-22 2132:"Decision 2117:2012-11-22 2008:. art. 4. 1807:10 January 1505:2015-02-08 1459:"About us" 1398:(8): 229. 1372:2016-09-28 1302:(2): 157. 1235:(5): 1733. 1136:References 1004:Marshmello 998:, and DJs 909:Joichi Ito 681:hacktivist 484:IP address 441:editorials 392:sobriquets 208:conformity 204:Groupthink 171:outside a 5481:Anonymity 5382:Anonymity 5218:Financial 5195:Workplace 5185:Education 5094:Indonesia 5064:Australia 5020:Sri Lanka 5015:Singapore 4960:Australia 4785:Anonymity 4494:Fake news 4470:Deception 4367:Old media 4352:New media 4214:Signature 4101:Call sign 4077:Anonymity 4012:Religious 3938:Chivalric 3859:Religious 3854:Judiciary 3839:Honorific 3822:of honour 3721:Sinhalese 3711:Pakistani 3696:Malaysian 3691:Cambodian 3595:Kashubian 3587:Ukrainian 3552:Bulgarian 3491:Praenomen 3428:Icelandic 3299:Hungarian 3100:Pakistani 3035:Mongolian 2889:Ring name 2882:Heteronym 2848:Nicknames 2769:Code name 2721:Toponymic 2711:Sobriquet 2687:Mononymic 2682:Metonymic 2624:Last name 2372:"ACTA up" 1847:205509626 1473:March 25, 1414:150143742 1392:Religions 1212:: 351–63. 1170:249867120 1156:: 23–35. 1121:an-onymia 1112:Adjective 977:Daft Punk 973:Amsterdam 789:rules on 677:Anonymous 480:Knowledge 380:Frankfurt 358:, in its 237:pseudonym 169:Anonymous 157:Caller ID 115:nicknames 111:pen names 107:pseudonym 88:Etymology 43:Anonymity 18:Anonymous 5475:Category 5460:Category 5375:See also 5228:Facebook 5223:Internet 5175:Consumer 5149:Thailand 4834:Synonyms 4825:Violence 4701:Graffiti 4434:Ideology 4231:Khelrtva 4219:Monogram 4180:Misnomer 4158:Namesake 4092:National 4049:Name day 4007:Judicial 3997:Business 3990:Honorary 3980:Academic 3970:Military 3943:Courtesy 3928:Academic 3893:Academic 3883:Emeritus 3686:Javanese 3667:Filipino 3652:Balinese 3620:Suffixes 3557:Croatian 3520:Romanian 3505:Cognomen 3403:Canadian 3389:American 3370:Germanic 3355:Scottish 3273:Georgian 3263:Estonian 3248:Armenian 3243:Albanian 3201:Ghanaian 3158:Hawaiian 3095:Mandaean 3002:Okinawan 2987:Japanese 2958:Courtesy 2918:Username 2911:Mononyms 2877:Pen name 2863:Monarchs 2836:Art name 2779:Necronym 2759:Aptronym 2672:Eponymic 2633:By trait 2509:67856540 2430:Archived 2380:Archived 2350:Archived 2332:Archived 2268:cite web 2209:Archived 2188:Archived 2165:Archived 2111:Archived 2059:Archived 2030:Archived 1977:Archived 1952:Archived 1923:Archived 1915:cato.org 1890:Archived 1798:Archived 1769:Archived 1753:Archived 1749:BBC News 1708:Archived 1673:Archived 1645:Archived 1577:Archived 1551:Archived 1514:cite web 1496:Archived 1467:Archived 1430:Archived 1366:Archived 1362:ABC News 1198:19684983 1042:See also 1015:Superman 1000:Deadmau5 957:JT LeRoy 945:charisma 913:bloggers 873:Voltaire 858:Pasquino 714:John Jay 547:Facebook 410:military 403:John Doe 369:Anonymus 356:Anonymus 308:airports 78:computer 5238:Twitter 5190:Medical 5180:Digital 5099:Ireland 5084:Germany 5069:Denmark 4995:Germany 4985:England 4980:Denmark 4908:Privacy 4810:Privacy 4716:Protest 4671:Boycott 4537:Framing 4151:Surname 4072:Acronym 4065:Related 4044:Baptism 3678:Chinese 3662:Burmese 3657:Bengali 3610:Serbian 3580:Russian 3525:Spanish 3512:Agnomen 3475:Occitan 3470:Italian 3460:Catalan 3452:Romance 3439:Swedish 3383:English 3340:Cornish 3317:Latvian 3291:Cypriot 3268:Finnish 3181:Ashanti 3140:Oceania 3130:Turkish 3110:Persian 3105:Pashtun 3080:Bengali 3045:Tibetan 2952:Chinese 2895:Shikona 2801:Notname 2733:Patrial 2726:Surname 2703:Surname 2650:Epithet 2589:Affixes 2575:Surname 2386:13 June 2356:13 June 2014:2715621 1958:13 June 1679:13 June 1654:ITWorld 1626:22 July 1607:1450006 1279:Nymwars 1058:Notname 951:author 878:Candide 800:reads: 777:on the 555:nymwars 551:Google+ 535:Whisper 527:Yik Yak 374:In the 365:Anonymi 249:scarves 150:illegal 56:charity 48:privacy 5233:Google 5154:Turkey 5139:Sweden 5124:Poland 5114:Norway 5079:France 5010:Russia 4970:Canada 4965:Brazil 4778:Issues 4576:Others 4241:Tughra 4146:Middle 4116:Family 3920:Titles 3906:medals 3904:, and 3898:Orders 3878:Suffix 3831:Styles 3790:Hebrew 3716:Sindhi 3701:Indian 3615:Slovak 3605:Polish 3544:Slavic 3465:French 3423:Gothic 3418:German 3332:Celtic 3309:Baltic 3258:Basque 3226:Europe 3211:Yoruba 3153:Fijian 3120:Somali 3115:Sindhi 3090:Coptic 3085:Berber 3070:Arabic 3065:Afghan 3030:Kalmyk 2997:Manchu 2992:Korean 2979:Titles 2743:Virtue 2738:Unisex 2660:Common 2655:Animal 2507:  2324:  2012:  1845:  1605:  1543:  1412:  1196:  1168:  1019:Batman 1017:, and 992:Jandek 981:Banksy 716:wrote 712:, and 539:Random 531:Secret 523:Tinder 521:, and 519:Omegle 367:is at 257:gloves 215:judges 5422:PRISM 5245:Email 5168:Areas 5134:Spain 5089:India 5000:Ghana 4975:China 4477:Forms 4310:Media 4191:-onym 4141:Given 4137:List 4022:Papal 3948:False 3562:Czech 3498:Nomen 3485:Roman 3378:Dutch 3360:Welsh 3345:Irish 3278:Greek 3163:Māori 3125:Tatar 3040:Sakha 2947:Amami 2665:Plant 2505:S2CID 2487:arXiv 2253:(PDF) 2246:(PDF) 2046:2013. 1932:2 May 1926:(PDF) 1911:(PDF) 1843:S2CID 1801:(PDF) 1790:(PDF) 1499:(PDF) 1492:(PDF) 1410:S2CID 1194:S2CID 1166:S2CID 1116:Greek 1099:Notes 939:" or 360:Latin 263:. In 253:masks 231:Many 228:ecash 184:troll 145:taboo 5361:NOYB 4721:Punk 4506:Spin 3814:List 3731:Thai 3641:and 3350:Manx 3233:and 3206:Igbo 2906:List 2853:list 2842:Bugō 2827:list 2549:and 2459:2018 2453:. UK 2388:2016 2358:2016 2322:ISBN 2304:> 2274:link 2010:SSRN 1960:2016 1934:2018 1809:2024 1716:2013 1681:2016 1628:2024 1603:SSRN 1541:ISBN 1520:link 1475:2018 1126:name 549:and 543:Tuta 533:and 505:and 471:and 435:All 408:The 300:vote 196:riot 5213:Law 3706:Lao 3196:Ewe 2965:Art 2497:doi 1870:doi 1835:doi 1651:." 1400:doi 1337:doi 1304:doi 1260:doi 1256:111 1186:doi 1158:doi 931:or 875:'s 871:or 588:As 557:. 507:Tor 503:I2P 251:or 82:set 72:In 5477:: 5042:, 3900:, 3228:, 2503:. 2495:. 2483:52 2481:. 2449:. 2374:. 2348:. 2330:. 2270:}} 2266:{{ 2228:A 2207:. 2004:. 1985:31 1950:. 1921:. 1917:. 1913:. 1866:16 1864:. 1841:. 1831:15 1829:. 1796:. 1792:. 1751:. 1747:. 1724:^ 1704:63 1702:. 1698:. 1671:. 1599:57 1597:. 1549:. 1516:}} 1512:{{ 1494:. 1465:. 1461:. 1408:. 1394:. 1390:. 1360:. 1333:64 1331:. 1327:. 1300:19 1298:. 1294:. 1254:. 1250:. 1233:49 1231:. 1227:. 1210:47 1208:. 1202:; 1192:. 1182:15 1180:. 1174:; 1164:. 1152:. 1013:, 990:, 967:, 963:, 907:, 819:, 708:, 529:, 517:, 416:. 398:. 371:. 331:. 314:. 243:. 202:. 117:, 113:, 4900:e 4893:t 4886:v 4295:e 4288:t 4281:v 3820:/ 3645:) 3636:( 2829:) 2825:( 2582:/ 2539:e 2532:t 2525:v 2511:. 2499:: 2489:: 2461:. 2415:. 2390:. 2360:. 2302:. 2276:) 2262:. 2232:, 2218:. 2174:. 2149:. 2120:. 2016:. 2006:1 1962:. 1936:. 1876:. 1872:: 1849:. 1837:: 1811:. 1718:. 1683:. 1630:. 1609:. 1522:) 1508:. 1477:. 1416:. 1402:: 1396:9 1375:. 1345:. 1339:: 1312:. 1306:: 1268:. 1262:: 1200:. 1188:: 1172:. 1160:: 1154:1 658:. 632:. 433:. 38:. 20:.

Index

Anonymous

Scientology
fingerprints
privacy
charity
24 of the U.S. states have "stop and identify" statutes
mathematics
computer
set
personally identifying information
pseudonym
pen names
nicknames
credit card numbers
bank account
social networks
taboo
illegal
Caller ID

Anonymous
Scientology
Guy Fawkes masks
troll
crowd psychology
riot
photography
Groupthink
conformity

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.