Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2998181.2998273acmconferencesArticle/Chapter ViewAbstractPublication PagescscwConference Proceedingsconference-collections
research-article
Public Access

Privacy, Anonymity, and Perceived Risk in Open Collaboration: A Study of Tor Users and Wikipedians

Published: 25 February 2017 Publication History

Abstract

This qualitative study examines privacy practices and concerns among contributors to open collaboration projects. We collected interview data from people who use the anonymity network Tor who also contribute to online projects and from Wikipedia editors who are concerned about their privacy to better understand how privacy concerns impact participation in open collaboration projects. We found that risks perceived by contributors to open collaboration projects include threats of surveillance, violence, harassment, opportunity loss, reputation loss, and fear for loved ones. We explain participants' operational and technical strategies for mitigating these risks and how these strategies affect their contributions. Finally, we discuss chilling effects associated with privacy loss, the need for open collaboration projects to go beyond attracting and educating participants to consider their privacy, and some of the social and technical approaches that could be explored to mitigate risk at a project or community level.

References

[1]
Nazanin Andalibi, Oliver L. Haimson, Munmun De Choudhury and Andrea Forte. 2016. Understanding Social Media Disclosures of Sexual Abuse Through the Lenses of Support Seeking and Anonymity. In Proceedings of ACM Conference on Human Factors in Computing Systems (CHI 16).
[2]
Alexander Ardichvili, Vaughn Page and Tim Wentling. 2003. Motivation and barriers to participation in virtual knowledge-sharing communities of practice. Journal of knowledge management, 7, 64--77.
[3]
Man Ho Au, Apu Kapadia and Willy Susilo. 2012 of Conference. BLACR: TTP-free blacklistable anonymous credentials with reputation. In Proceedings of NDSS 2012.
[4]
Eric P.S. Baumer, Phil Adams, Vera D. Khovanskaya, Tony C. Liao, Madeline E. Smith, Victoria Schwanda Sosik and Kaiton Williams. 2013 of Conference. Limiting, leaving, and (re)lapsing: an exploration of facebook non-use practices and experiences. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 3257--3266.
[5]
Yochai Benkler. 2002. Coase's Penguin, or, Linux and The Nature of the Firm. The Yale Law Journal, 112, 3. 369--446.
[6]
Yochai Benkler. 2006. The Wealth of Networks. Yale University Press, New Haven.
[7]
Valerie Malhotra Bentz and Jeremy J Shapiro. 1998. Mindful inquiry in social research. Sage Publications.
[8]
Virginia Braun and Victoria Clarke. 2006. Using thematic analysis in psychology. Qualitative Research in Psychology, 3, 2. 77--101.
[9]
Michael Brennan, Sadia Afroz and Rachel Greenstadt. 2012. Adversarial stylometry: Circumventing authorship recognition to preserve privacy and anonymity. ACM Transactions on Information and System Security (TISSEC), 15, 3. 12.
[10]
Amy Bruckman, Catalina Danis, Cliff Lampe, Janet Sternberg and Chris Waldron. 2006 of Conference. Managing deviant behavior in online communities. In Proceedings of CHI '06 Extended Abstracts on Human Factors in Computing Systems, 21--24.
[11]
Susan Bryant, Andrea Forte and Amy Bruckman. 2005. Becoming Wikipedian: transformation of participation in a collaborative online encyclopedia. In Proceedings of Group, 1--10.
[12]
Zoë Corbyn. 2015. Bassel Khartabil: fears for man who brought open internet to the Arab world The Guardian.
[13]
K. Crowston, Li Q. Wei K., Eseryel Y. and Howison J. 2007. Self-organization of teams in free/libre open source software development. Information and Software Technology Journal: Special issue on Understanding the Social Side of Software Engineering, 49, 6. 564--575.
[14]
Roger Dingledine. 2014.A call to arms: Helping Internet services accept anonymous users. Tor Project Blog.
[15]
Roger Dingledine, Nick Mathewson and Paul Syverson. 2004 of Conference. Tor: The second-generation onion router. In Proceedings of Usenix Security 2004.
[16]
Yulin Fang and Derrick Neufeld. 2009. Understanding sustained participation in open source software projects. Journal of Management Information Systems,25,4. 9--50.
[17]
Casey Fiesler, Jessica L Feuston and Amy S Bruckman. 2015. Understanding copyright law in online creative communities. Proceedings of CSCW, 116--129.
[18]
A. Forte and A. Bruckman. 2006. From Wikipedia to the Classroom: Exploring online publication and learning. In Proceedings of Int'l Conference of the Learning Sciences, 182--188.
[19]
Andrea Forte and Cliff Lampe. 2013. Defining, Understanding and Supporting Open Collaboration: Lessons from the Literature. American Behavioral Scientist, 57, 5. 535--547.
[20]
Graeme Horsman. 2015. The challenges surrounding the regulation of anonymous communication provision in the United Kingdom. Computers & Security, 56. 151--162.
[21]
Ruogu Kang, Stephanie Brown and Sara Kiesler. 2013. Why do people seek anonymity on the internet?: informing policy and design. In Proceedings of ACM Conference on Human Factors in Computing Systems (CHI 13), 2657--2666.
[22]
Sheharbano Khattak, David Fifield, Sadia Afroz, Mobin Javed, Srikanth Sundaresan, Vern Paxson, Steven J Murdoch and Damon McCoy. 2016. Do You See What I See? Differential Treatment of Anonymous Users. In Proceedings of Network and Distributed System Security Symposium.
[23]
Aniket Kittur and Robert Kraut. 2008. Harnessing the wisdom of crowds in Wikipedia: quality through coordination. In Proceedings of CSCW, 37--46.
[24]
Shyong Tony K Lam, Anuradha Uduwage, Zhenhua Dong, Shilad Sen, David R Musicant, Loren Terveen and John Riedl. 2011. WP: clubhouse?: an exploration of Wikipedia's gender imbalance. Proceedings of the 7th Int'l Symposium on Wikis and Open Collaboration, 1--10.
[25]
Gary T Marx. 1999. What's in a Name? Some Reflections on the Sociology of Anonymity. The Information Society, 15, 2. 99--112.
[26]
Amanda Menking and Ingrid Erickson. 2015. The Heart Work of Wikipedia: Gendered, Emotional Labor in the World's Largest Online Encyclopedia. Proceedings of CHI, 207--210.
[27]
Helen Nissenbaum. 2004. Privacy as Contexual Integrity. Washington Law Review.
[28]
Oded Nov, Ofer Arazy and David Anderson. 2011. Dusting for science: motivation and participation of digital citizen science volunteers. Proceedings of 2011 iConference, 68--74.
[29]
Leysia Palen and Paul Dourish. 2003. Unpacking privacy for a networked world. Proceedings of CHI, 129--136.
[30]
Jon Penney. 2016. Chilling Effects: Online Surveillance and Wikipedia Use. Berkeley Technology Law Journal.
[31]
Jenny Preece, Blair Nonnecke and Dorine Andrews. 2004. The top five reasons for lurking: improving community experiences for everyone. Computers in Human Behavior, 20, 2. 201--223.
[32]
Alfred Schutz. 1967. The Phenomenology of the Social World. Northwestern University Press.
[33]
H. Jeff Smith, Sandra J. Milberg and Sandra J. Burke. 1996. Information Privacy: Measuring Individuals' Concerns about Organizational Practices. MIS Quarterly, 20, 2. 167--196.
[34]
Patrick P Tsang, Man Ho Au, Apu Kapadia and Sean W Smith. 2010. BLAC: Revoking repeatedly misbehaving anonymous users without relying on TTPs. ACM Transactions on Information and System Security (TISSEC), 13, 4. 1--30.
[35]
Zaher Yamak, Julien Saunier and Laurent Vercouter. 2016 of Conference. Detection of Multiple Identity Manipulation in Collaborative Projects. Proceedings of the 25th International Conference Companion on World Wide Web, 955--960.

Cited By

View all
  • (2024)Countering underproduction of peer produced goodsNew Media & Society10.1177/14614448241248139Online publication date: 16-May-2024
  • (2024)Privacy for Groups Online: Context MattersProceedings of the ACM on Human-Computer Interaction10.1145/36869458:CSCW2(1-23)Online publication date: 8-Nov-2024
  • (2024)On Being an Expert: Habitus as a Lens for Understanding Privacy ExpertiseProceedings of the ACM on Human-Computer Interaction10.1145/36373798:CSCW1(1-25)Online publication date: 26-Apr-2024
  • Show More Cited By

Index Terms

  1. Privacy, Anonymity, and Perceived Risk in Open Collaboration: A Study of Tor Users and Wikipedians

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CSCW '17: Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing
    February 2017
    2556 pages
    ISBN:9781450343350
    DOI:10.1145/2998181
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 25 February 2017

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. identity
    2. privacy
    3. risk
    4. social computing
    5. tor
    6. wikipedia

    Qualifiers

    • Research-article

    Funding Sources

    Conference

    CSCW '17
    Sponsor:
    CSCW '17: Computer Supported Cooperative Work and Social Computing
    February 25 - March 1, 2017
    Oregon, Portland, USA

    Acceptance Rates

    CSCW '17 Paper Acceptance Rate 183 of 530 submissions, 35%;
    Overall Acceptance Rate 2,235 of 8,521 submissions, 26%

    Upcoming Conference

    CSCW '25

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)327
    • Downloads (Last 6 weeks)52
    Reflects downloads up to 24 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Countering underproduction of peer produced goodsNew Media & Society10.1177/14614448241248139Online publication date: 16-May-2024
    • (2024)Privacy for Groups Online: Context MattersProceedings of the ACM on Human-Computer Interaction10.1145/36869458:CSCW2(1-23)Online publication date: 8-Nov-2024
    • (2024)On Being an Expert: Habitus as a Lens for Understanding Privacy ExpertiseProceedings of the ACM on Human-Computer Interaction10.1145/36373798:CSCW1(1-25)Online publication date: 26-Apr-2024
    • (2023)Taboo and Collaborative Knowledge Production: Evidence from WikipediaProceedings of the ACM on Human-Computer Interaction10.1145/36100907:CSCW2(1-25)Online publication date: 4-Oct-2023
    • (2023)Increasing Participation in Peer Production Communities with the Newcomer HomepageProceedings of the ACM on Human-Computer Interaction10.1145/36100717:CSCW2(1-26)Online publication date: 4-Oct-2023
    • (2023)“I Did Watch ‘The Handmaid's Tale’”: Threat Modeling Privacy Post-roe in the United StatesACM Transactions on Computer-Human Interaction10.1145/358996030:4(1-34)Online publication date: 12-Sep-2023
    • (2023)Batching of Tasks by Users of Pseudonymous Forums: Anonymity Compromise and ProtectionProceedings of the ACM on Measurement and Analysis of Computing Systems10.1145/35793357:1(1-41)Online publication date: 2-Mar-2023
    • (2023)Anonymous Online Support: Investigations of Identity and Heterogeneous Groups in Online Recovery SupportExtended Abstracts of the 2023 CHI Conference on Human Factors in Computing Systems10.1145/3544549.3583947(1-8)Online publication date: 19-Apr-2023
    • (2023)User Data Privacy Protection in Industrial ApplicationIntelligent Industrial Internet Systems10.1007/978-981-99-5732-3_6(101-121)Online publication date: 21-Nov-2023
    • (2023)What Makes a Technology Privacy Enhancing? Laypersons’ and Experts’ Descriptions, Uses, and Perceptions of Privacy Enhancing TechnologiesInformation for a Better World: Normality, Virtuality, Physicality, Inclusivity10.1007/978-3-031-28032-0_20(229-250)Online publication date: 10-Mar-2023
    • Show More Cited By

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media