skip to main content
10.1145/2998181.2998273acmconferencesArticle/Chapter ViewAbstractPublication PagescscwConference Proceedingsconference-collections
research-article
Public Access

Privacy, Anonymity, and Perceived Risk in Open Collaboration: A Study of Tor Users and Wikipedians

Published:25 February 2017Publication History

ABSTRACT

This qualitative study examines privacy practices and concerns among contributors to open collaboration projects. We collected interview data from people who use the anonymity network Tor who also contribute to online projects and from Wikipedia editors who are concerned about their privacy to better understand how privacy concerns impact participation in open collaboration projects. We found that risks perceived by contributors to open collaboration projects include threats of surveillance, violence, harassment, opportunity loss, reputation loss, and fear for loved ones. We explain participants' operational and technical strategies for mitigating these risks and how these strategies affect their contributions. Finally, we discuss chilling effects associated with privacy loss, the need for open collaboration projects to go beyond attracting and educating participants to consider their privacy, and some of the social and technical approaches that could be explored to mitigate risk at a project or community level.

References

  1. Nazanin Andalibi, Oliver L. Haimson, Munmun De Choudhury and Andrea Forte. 2016. Understanding Social Media Disclosures of Sexual Abuse Through the Lenses of Support Seeking and Anonymity. In Proceedings of ACM Conference on Human Factors in Computing Systems (CHI 16). Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Alexander Ardichvili, Vaughn Page and Tim Wentling. 2003. Motivation and barriers to participation in virtual knowledge-sharing communities of practice. Journal of knowledge management, 7, 64--77.Google ScholarGoogle ScholarCross RefCross Ref
  3. Man Ho Au, Apu Kapadia and Willy Susilo. 2012 of Conference. BLACR: TTP-free blacklistable anonymous credentials with reputation. In Proceedings of NDSS 2012.Google ScholarGoogle Scholar
  4. Eric P.S. Baumer, Phil Adams, Vera D. Khovanskaya, Tony C. Liao, Madeline E. Smith, Victoria Schwanda Sosik and Kaiton Williams. 2013 of Conference. Limiting, leaving, and (re)lapsing: an exploration of facebook non-use practices and experiences. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 3257--3266. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Yochai Benkler. 2002. Coase's Penguin, or, Linux and The Nature of the Firm. The Yale Law Journal, 112, 3. 369--446.Google ScholarGoogle ScholarCross RefCross Ref
  6. Yochai Benkler. 2006. The Wealth of Networks. Yale University Press, New Haven.Google ScholarGoogle Scholar
  7. Valerie Malhotra Bentz and Jeremy J Shapiro. 1998. Mindful inquiry in social research. Sage Publications.Google ScholarGoogle Scholar
  8. Virginia Braun and Victoria Clarke. 2006. Using thematic analysis in psychology. Qualitative Research in Psychology, 3, 2. 77--101.Google ScholarGoogle ScholarCross RefCross Ref
  9. Michael Brennan, Sadia Afroz and Rachel Greenstadt. 2012. Adversarial stylometry: Circumventing authorship recognition to preserve privacy and anonymity. ACM Transactions on Information and System Security (TISSEC), 15, 3. 12. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Amy Bruckman, Catalina Danis, Cliff Lampe, Janet Sternberg and Chris Waldron. 2006 of Conference. Managing deviant behavior in online communities. In Proceedings of CHI '06 Extended Abstracts on Human Factors in Computing Systems, 21--24. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Susan Bryant, Andrea Forte and Amy Bruckman. 2005. Becoming Wikipedian: transformation of participation in a collaborative online encyclopedia. In Proceedings of Group, 1--10. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Zoë Corbyn. 2015. Bassel Khartabil: fears for man who brought open internet to the Arab world The Guardian.Google ScholarGoogle Scholar
  13. K. Crowston, Li Q. Wei K., Eseryel Y. and Howison J. 2007. Self-organization of teams in free/libre open source software development. Information and Software Technology Journal: Special issue on Understanding the Social Side of Software Engineering, 49, 6. 564--575. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Roger Dingledine. 2014.A call to arms: Helping Internet services accept anonymous users. Tor Project Blog.Google ScholarGoogle Scholar
  15. Roger Dingledine, Nick Mathewson and Paul Syverson. 2004 of Conference. Tor: The second-generation onion router. In Proceedings of Usenix Security 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Yulin Fang and Derrick Neufeld. 2009. Understanding sustained participation in open source software projects. Journal of Management Information Systems,25,4. 9--50. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Casey Fiesler, Jessica L Feuston and Amy S Bruckman. 2015. Understanding copyright law in online creative communities. Proceedings of CSCW, 116--129. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. A. Forte and A. Bruckman. 2006. From Wikipedia to the Classroom: Exploring online publication and learning. In Proceedings of Int'l Conference of the Learning Sciences, 182--188. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Andrea Forte and Cliff Lampe. 2013. Defining, Understanding and Supporting Open Collaboration: Lessons from the Literature. American Behavioral Scientist, 57, 5. 535--547.Google ScholarGoogle ScholarCross RefCross Ref
  20. Graeme Horsman. 2015. The challenges surrounding the regulation of anonymous communication provision in the United Kingdom. Computers & Security, 56. 151--162. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Ruogu Kang, Stephanie Brown and Sara Kiesler. 2013. Why do people seek anonymity on the internet?: informing policy and design. In Proceedings of ACM Conference on Human Factors in Computing Systems (CHI 13), 2657--2666. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Sheharbano Khattak, David Fifield, Sadia Afroz, Mobin Javed, Srikanth Sundaresan, Vern Paxson, Steven J Murdoch and Damon McCoy. 2016. Do You See What I See? Differential Treatment of Anonymous Users. In Proceedings of Network and Distributed System Security Symposium.Google ScholarGoogle ScholarCross RefCross Ref
  23. Aniket Kittur and Robert Kraut. 2008. Harnessing the wisdom of crowds in Wikipedia: quality through coordination. In Proceedings of CSCW, 37--46. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Shyong Tony K Lam, Anuradha Uduwage, Zhenhua Dong, Shilad Sen, David R Musicant, Loren Terveen and John Riedl. 2011. WP: clubhouse?: an exploration of Wikipedia's gender imbalance. Proceedings of the 7th Int'l Symposium on Wikis and Open Collaboration, 1--10. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Gary T Marx. 1999. What's in a Name? Some Reflections on the Sociology of Anonymity. The Information Society, 15, 2. 99--112.Google ScholarGoogle ScholarCross RefCross Ref
  26. Amanda Menking and Ingrid Erickson. 2015. The Heart Work of Wikipedia: Gendered, Emotional Labor in the World's Largest Online Encyclopedia. Proceedings of CHI, 207--210. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Helen Nissenbaum. 2004. Privacy as Contexual Integrity. Washington Law Review.Google ScholarGoogle Scholar
  28. Oded Nov, Ofer Arazy and David Anderson. 2011. Dusting for science: motivation and participation of digital citizen science volunteers. Proceedings of 2011 iConference, 68--74. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Leysia Palen and Paul Dourish. 2003. Unpacking privacy for a networked world. Proceedings of CHI, 129--136. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Jon Penney. 2016. Chilling Effects: Online Surveillance and Wikipedia Use. Berkeley Technology Law Journal.Google ScholarGoogle Scholar
  31. Jenny Preece, Blair Nonnecke and Dorine Andrews. 2004. The top five reasons for lurking: improving community experiences for everyone. Computers in Human Behavior, 20, 2. 201--223.Google ScholarGoogle ScholarCross RefCross Ref
  32. Alfred Schutz. 1967. The Phenomenology of the Social World. Northwestern University Press.Google ScholarGoogle Scholar
  33. H. Jeff Smith, Sandra J. Milberg and Sandra J. Burke. 1996. Information Privacy: Measuring Individuals' Concerns about Organizational Practices. MIS Quarterly, 20, 2. 167--196. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Patrick P Tsang, Man Ho Au, Apu Kapadia and Sean W Smith. 2010. BLAC: Revoking repeatedly misbehaving anonymous users without relying on TTPs. ACM Transactions on Information and System Security (TISSEC), 13, 4. 1--30. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Zaher Yamak, Julien Saunier and Laurent Vercouter. 2016 of Conference. Detection of Multiple Identity Manipulation in Collaborative Projects. Proceedings of the 25th International Conference Companion on World Wide Web, 955--960. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Privacy, Anonymity, and Perceived Risk in Open Collaboration: A Study of Tor Users and Wikipedians

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image ACM Conferences
      CSCW '17: Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing
      February 2017
      2556 pages
      ISBN:9781450343350
      DOI:10.1145/2998181

      Copyright © 2017 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 25 February 2017

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      CSCW '17 Paper Acceptance Rate183of530submissions,35%Overall Acceptance Rate2,235of8,521submissions,26%

      Upcoming Conference

      CSCW '24

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader