ABSTRACT
This qualitative study examines privacy practices and concerns among contributors to open collaboration projects. We collected interview data from people who use the anonymity network Tor who also contribute to online projects and from Wikipedia editors who are concerned about their privacy to better understand how privacy concerns impact participation in open collaboration projects. We found that risks perceived by contributors to open collaboration projects include threats of surveillance, violence, harassment, opportunity loss, reputation loss, and fear for loved ones. We explain participants' operational and technical strategies for mitigating these risks and how these strategies affect their contributions. Finally, we discuss chilling effects associated with privacy loss, the need for open collaboration projects to go beyond attracting and educating participants to consider their privacy, and some of the social and technical approaches that could be explored to mitigate risk at a project or community level.
- Nazanin Andalibi, Oliver L. Haimson, Munmun De Choudhury and Andrea Forte. 2016. Understanding Social Media Disclosures of Sexual Abuse Through the Lenses of Support Seeking and Anonymity. In Proceedings of ACM Conference on Human Factors in Computing Systems (CHI 16). Google ScholarDigital Library
- Alexander Ardichvili, Vaughn Page and Tim Wentling. 2003. Motivation and barriers to participation in virtual knowledge-sharing communities of practice. Journal of knowledge management, 7, 64--77.Google ScholarCross Ref
- Man Ho Au, Apu Kapadia and Willy Susilo. 2012 of Conference. BLACR: TTP-free blacklistable anonymous credentials with reputation. In Proceedings of NDSS 2012.Google Scholar
- Eric P.S. Baumer, Phil Adams, Vera D. Khovanskaya, Tony C. Liao, Madeline E. Smith, Victoria Schwanda Sosik and Kaiton Williams. 2013 of Conference. Limiting, leaving, and (re)lapsing: an exploration of facebook non-use practices and experiences. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 3257--3266. Google ScholarDigital Library
- Yochai Benkler. 2002. Coase's Penguin, or, Linux and The Nature of the Firm. The Yale Law Journal, 112, 3. 369--446.Google ScholarCross Ref
- Yochai Benkler. 2006. The Wealth of Networks. Yale University Press, New Haven.Google Scholar
- Valerie Malhotra Bentz and Jeremy J Shapiro. 1998. Mindful inquiry in social research. Sage Publications.Google Scholar
- Virginia Braun and Victoria Clarke. 2006. Using thematic analysis in psychology. Qualitative Research in Psychology, 3, 2. 77--101.Google ScholarCross Ref
- Michael Brennan, Sadia Afroz and Rachel Greenstadt. 2012. Adversarial stylometry: Circumventing authorship recognition to preserve privacy and anonymity. ACM Transactions on Information and System Security (TISSEC), 15, 3. 12. Google ScholarDigital Library
- Amy Bruckman, Catalina Danis, Cliff Lampe, Janet Sternberg and Chris Waldron. 2006 of Conference. Managing deviant behavior in online communities. In Proceedings of CHI '06 Extended Abstracts on Human Factors in Computing Systems, 21--24. Google ScholarDigital Library
- Susan Bryant, Andrea Forte and Amy Bruckman. 2005. Becoming Wikipedian: transformation of participation in a collaborative online encyclopedia. In Proceedings of Group, 1--10. Google ScholarDigital Library
- Zoë Corbyn. 2015. Bassel Khartabil: fears for man who brought open internet to the Arab world The Guardian.Google Scholar
- K. Crowston, Li Q. Wei K., Eseryel Y. and Howison J. 2007. Self-organization of teams in free/libre open source software development. Information and Software Technology Journal: Special issue on Understanding the Social Side of Software Engineering, 49, 6. 564--575. Google ScholarDigital Library
- Roger Dingledine. 2014.A call to arms: Helping Internet services accept anonymous users. Tor Project Blog.Google Scholar
- Roger Dingledine, Nick Mathewson and Paul Syverson. 2004 of Conference. Tor: The second-generation onion router. In Proceedings of Usenix Security 2004. Google ScholarDigital Library
- Yulin Fang and Derrick Neufeld. 2009. Understanding sustained participation in open source software projects. Journal of Management Information Systems,25,4. 9--50. Google ScholarDigital Library
- Casey Fiesler, Jessica L Feuston and Amy S Bruckman. 2015. Understanding copyright law in online creative communities. Proceedings of CSCW, 116--129. Google ScholarDigital Library
- A. Forte and A. Bruckman. 2006. From Wikipedia to the Classroom: Exploring online publication and learning. In Proceedings of Int'l Conference of the Learning Sciences, 182--188. Google ScholarDigital Library
- Andrea Forte and Cliff Lampe. 2013. Defining, Understanding and Supporting Open Collaboration: Lessons from the Literature. American Behavioral Scientist, 57, 5. 535--547.Google ScholarCross Ref
- Graeme Horsman. 2015. The challenges surrounding the regulation of anonymous communication provision in the United Kingdom. Computers & Security, 56. 151--162. Google ScholarDigital Library
- Ruogu Kang, Stephanie Brown and Sara Kiesler. 2013. Why do people seek anonymity on the internet?: informing policy and design. In Proceedings of ACM Conference on Human Factors in Computing Systems (CHI 13), 2657--2666. Google ScholarDigital Library
- Sheharbano Khattak, David Fifield, Sadia Afroz, Mobin Javed, Srikanth Sundaresan, Vern Paxson, Steven J Murdoch and Damon McCoy. 2016. Do You See What I See? Differential Treatment of Anonymous Users. In Proceedings of Network and Distributed System Security Symposium.Google ScholarCross Ref
- Aniket Kittur and Robert Kraut. 2008. Harnessing the wisdom of crowds in Wikipedia: quality through coordination. In Proceedings of CSCW, 37--46. Google ScholarDigital Library
- Shyong Tony K Lam, Anuradha Uduwage, Zhenhua Dong, Shilad Sen, David R Musicant, Loren Terveen and John Riedl. 2011. WP: clubhouse?: an exploration of Wikipedia's gender imbalance. Proceedings of the 7th Int'l Symposium on Wikis and Open Collaboration, 1--10. Google ScholarDigital Library
- Gary T Marx. 1999. What's in a Name? Some Reflections on the Sociology of Anonymity. The Information Society, 15, 2. 99--112.Google ScholarCross Ref
- Amanda Menking and Ingrid Erickson. 2015. The Heart Work of Wikipedia: Gendered, Emotional Labor in the World's Largest Online Encyclopedia. Proceedings of CHI, 207--210. Google ScholarDigital Library
- Helen Nissenbaum. 2004. Privacy as Contexual Integrity. Washington Law Review.Google Scholar
- Oded Nov, Ofer Arazy and David Anderson. 2011. Dusting for science: motivation and participation of digital citizen science volunteers. Proceedings of 2011 iConference, 68--74. Google ScholarDigital Library
- Leysia Palen and Paul Dourish. 2003. Unpacking privacy for a networked world. Proceedings of CHI, 129--136. Google ScholarDigital Library
- Jon Penney. 2016. Chilling Effects: Online Surveillance and Wikipedia Use. Berkeley Technology Law Journal.Google Scholar
- Jenny Preece, Blair Nonnecke and Dorine Andrews. 2004. The top five reasons for lurking: improving community experiences for everyone. Computers in Human Behavior, 20, 2. 201--223.Google ScholarCross Ref
- Alfred Schutz. 1967. The Phenomenology of the Social World. Northwestern University Press.Google Scholar
- H. Jeff Smith, Sandra J. Milberg and Sandra J. Burke. 1996. Information Privacy: Measuring Individuals' Concerns about Organizational Practices. MIS Quarterly, 20, 2. 167--196. Google ScholarDigital Library
- Patrick P Tsang, Man Ho Au, Apu Kapadia and Sean W Smith. 2010. BLAC: Revoking repeatedly misbehaving anonymous users without relying on TTPs. ACM Transactions on Information and System Security (TISSEC), 13, 4. 1--30. Google ScholarDigital Library
- Zaher Yamak, Julien Saunier and Laurent Vercouter. 2016 of Conference. Detection of Multiple Identity Manipulation in Collaborative Projects. Proceedings of the 25th International Conference Companion on World Wide Web, 955--960. Google ScholarDigital Library
Index Terms
-
Privacy, Anonymity, and Perceived Risk in Open Collaboration: A Study of Tor Users and Wikipedians
-
Recommendations
-
Privacy, Anonymity, and Perceived Risk in Open Collaboration: A Study of Service Providers
CHI '19: Proceedings of the 2019 CHI Conference on Human Factors in Computing SystemsAnonymity can enable both healthy online interactions like support-seeking and toxic behaviors like hate speech. How do online service providers balance these threats and opportunities? This two-part qualitative study examines the challenges perceived ...
-
Anonymity, Privacy, Onymity, and Identity: A Modal Logic Approach
CSE '09: Proceedings of the 2009 International Conference on Computational Science and Engineering - Volume 03In this paper, we propose a taxonomy of privacy-related information-hiding/disclosure properties in terms of the modal logic of knowledge for multiagent systems. The properties considered here are anonymity, privacy, onymity, and identity. Intuitively, ...
-
Empirical Measurement of Perceived Privacy Risk
Personal data is increasingly collected and used by companies to tailor services to users, and to make financial, employment, and health-related decisions about individuals. When personal data is inappropriately collected or misused, however, ...
Comments