메뉴 건너뛰기




Volumn 2, Issue 1, 1996, Pages

Addressing anonymous messages in cyberspace

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER CRIME; COPYRIGHTS; COSTS; ELECTRONIC COMMUNITIES; INFORMATION SERVICES; LAW ENFORCEMENT; LAWS AND LEGISLATION; MONITORING; ONLINE SYSTEMS; PROBLEM SOLVING; PUBLIC POLICY; REGULATORY COMPLIANCE; SECURITY OF DATA; SOCIAL ASPECTS;

EID: 3242742592     PISSN: 10836101     EISSN: None     Source Type: Journal    
DOI: 10.1111/j.1083-6101.1996.tb00183.x     Document Type: Review
Times cited : (15)

References (36)
  • 1
    • 84876662814 scopus 로고    scopus 로고
    • note
    • When I refer to nationality here, I mean to allude to the possibility of detection of accents.
  • 2
    • 84876653022 scopus 로고    scopus 로고
    • note
    • If speakers desire otherwise, however, with the possibility of sending visual images and audio messages, they can choose to reveal more about themselves.
  • 3
    • 10444238420 scopus 로고
    • Postcard from cyberspace: The cutting edge, the helsinki incident and the right to anonymity
    • Feb. 22
    • See e.g., Daniel Akst, Postcard from Cyberspace: The Cutting Edge, The Helsinki Incident and the Right to Anonymity, L.A. TIMES, Feb. 22, 1995, at D1.
    • (1995) L.A. Times
    • Akst, D.1
  • 4
    • 84876626764 scopus 로고
    • Computer jokes and threats ignite debate on anonymity
    • Dec. 31, 1994, at 1.4362 U.S. 60
    • Peter H. Lewis, Computer Jokes and Threats Ignite Debate on Anonymity, N.Y. TIMES, Dec. 31, 1994, at 1.4362 U.S. 60 (1960).
    • (1960) N.Y. Times
    • Lewis, P.H.1
  • 5
    • 0009297186 scopus 로고
    • Comment, the constitutional right to anonymity: Free speech, disclosure and the devil
    • See e.g., Comment, The Constitutional Right to Anonymity: Free Speech, Disclosure and the Devil, 70 YALE L.J. 1084 (1961); Note, Disclosure as a Legislative Device, 76 HARV. L. REV. 1273 (1963).
    • (1961) Yale L.J. , vol.70 , pp. 1084
  • 6
    • 4043176468 scopus 로고
    • See e.g., Comment, The Constitutional Right to Anonymity: Free Speech, Disclosure and the Devil, 70 YALE L.J. 1084 (1961); Note, Disclosure as a Legislative Device, 76 HARV. L. REV. 1273 (1963).
    • (1963) Harv. L. Rev. , vol.76 , pp. 1273
  • 7
    • 84876630226 scopus 로고    scopus 로고
    • 1995 WL 227810 (U.S. 1995) (holding unconstitutional a state law that made it a crime to distribute anonymously any "political communication")
    • 1995 WL 227810 (U.S. 1995) (holding unconstitutional a state law that made it a crime to distribute anonymously any "political communication").
  • 8
    • 84937298954 scopus 로고
    • Anonymity, autonomy and accountability: Challenges to the first amendment in cyberspace
    • Two recent works that do give some attention to this topic include Anne Branscomb, Anonymity, Autonomy and Accountability: Challenges to the First Amendment in Cyberspace, 104 YALE L.J. 1639 (1995), and George P. Long, III, Note, Who Are You? Identity and Anonymity in Cyberspace, 55 U. PITT. L. REV. 1177 (1994). Both works focus primarily on how anonymity ought to be preserved online, without satisfactorily examining the justifications for its preservation.
    • (1995) Yale L.J. , vol.104 , pp. 1639
    • Branscomb, A.1
  • 9
    • 0000494796 scopus 로고
    • Note, who are you? Identity and anonymity in cyberspace
    • Two recent works that do give some attention to this topic include Anne Branscomb, Anonymity, Autonomy and Accountability: Challenges to the First Amendment in Cyberspace, 104 YALE L.J. 1639 (1995), and George P. Long, III, Note, Who Are You? Identity and Anonymity in Cyberspace, 55 U. PITT. L. REV. 1177 (1994). Both works focus primarily on how anonymity ought to be preserved online, without satisfactorily examining the justifications for its preservation.
    • (1994) U. Pitt. L. Rev. , vol.55 , pp. 1177
    • Long III, G.P.1
  • 10
    • 4043176468 scopus 로고
    • Disclosure as a legislative device
    • classifying the effects of disclosure into these three categories
    • See Note, Disclosure as a Legislative Device, 76 HARV. L. REV. 1273 (1963) (classifying the effects of disclosure into these three categories).
    • (1963) Harv. L. Rev. , vol.76 , pp. 1273
  • 11
    • 84876635393 scopus 로고
    • Outside counsel: Computer libel questions in stratton v.Prodigy
    • Dec 13
    • See Robert B. Charles, Outside Counsel: Computer Libel Questions in Stratton v.Prodigy, N.Y. L. J., Dec 13, 1994, at 1. In this case, the readers did not know that the person was actually anonymous; he had used someone else's user name.
    • (1994) N.Y. L. J.
    • Charles, R.B.1
  • 12
    • 4043173643 scopus 로고
    • Evidence for the role of the justice motive in status generalization processes
    • June
    • John H. Ellard & Douglas D. Bates, Evidence for the Role of the Justice Motive in Status Generalization Processes, SOC. JUST. RES., June 1990, at 115, 117.
    • (1990) Soc. Just. Res. , pp. 115
    • Ellard, J.H.1    Bates, D.D.2
  • 15
    • 84876620687 scopus 로고    scopus 로고
    • note
    • Of course, the message itself, for example, its command of the English language, may reveal some status characteristics.
  • 17
    • 84876651324 scopus 로고    scopus 로고
    • Cyber-security bugs UW
    • (Madison, Wisconsin)(describing an incident where someone impersonated a professor and sent out a racist message under his name to 20,000 users nationwide)
    • See Stacey Anderson, Cyber-Security Bugs UW, CAPITAL TIMES (Madison, Wisconsin)(describing an incident where someone impersonated a professor and sent out a racist message under his name to 20,000 users nationwide).
    • Capital Times
    • Anderson, S.1
  • 19
    • 4043084383 scopus 로고
    • Hate groups use tools of the electronic trade
    • Mar. 13
    • Keith Schneider, Hate Groups Use Tools of the Electronic Trade, N.Y. TIMES, Mar. 13, 1995, at A12.
    • (1995) N.Y. Times
    • Schneider, K.1
  • 20
    • 84876632831 scopus 로고
    • Crossing the line on the info highway: He put his ugly fantasy on the internet
    • Mar. 11, (describing the story of a college student who described his fantasy of raping a fellow dorm mate on the Internet)
    • Cf. Megan Garvey, Crossing the Line on the Info Highway: He Put His Ugly Fantasy on the Internet, WASH. POST, Mar. 11, 1995 (describing the story of a college student who described his fantasy of raping a fellow dorm mate on the Internet).
    • (1995) Wash. Post
    • Garvey, M.1
  • 21
    • 84876624180 scopus 로고    scopus 로고
    • Consider, for example, the current trend of "political correctness." Many university students on American campuses today are unwilling to express their ideas for fear that they will be ridiculed or labeled as "politically incorrect."
    • Consider, for example, the current trend of "political correctness." Many university students on American campuses today are unwilling to express their ideas for fear that they will be ridiculed or labeled as "politically incorrect."
  • 22
    • 84876662526 scopus 로고    scopus 로고
    • discussing, for example, self-identified former members of the Church of Scientology who criticize and post official church documents anonymously because they fear retribution from the Church
    • See Lewis, supra note 3, at 1 (discussing, for example, self-identified former members of the Church of Scientology who criticize and post official church documents anonymously because they fear retribution from the Church).
    • Supra Note , vol.3 , pp. 1
    • Lewis1
  • 24
    • 84876637448 scopus 로고    scopus 로고
    • recounting that Hamilton and Madison wrote the Federalist papers; Madison, the Letters of Pacifus defending Washington's proclamation of neutrality; and Chief Justice Marshall, as a "friend of the Republic," a defense of certain Supreme Court decisions
    • See Comment, supra note 5, at 1085 (recounting that Hamilton and Madison wrote the Federalist papers; Madison, the Letters of Pacifus defending Washington's proclamation of neutrality; and Chief Justice Marshall, as a "friend of the Republic," a defense of certain Supreme Court decisions).
    • Supra Note , vol.5 , pp. 1085
  • 25
    • 84876625679 scopus 로고    scopus 로고
    • All things Considered
    • All Things Considered, supra note 16.
    • Supra Note , vol.16
  • 26
    • 84876662526 scopus 로고    scopus 로고
    • "Hundreds of people each day, for instance, use the cloak of electronic anonymity to share their deepest secrets about drug addition, childhood sexual abuse or other sensitive topics with sympathetic strangers on electronic bulletin boards or computer-network chat rooms."
    • See Lewis, supra note 3, at 1 ("Hundreds of people each day, for instance, use the cloak of electronic anonymity to share their deepest secrets about drug addition, childhood sexual abuse or other sensitive topics with sympathetic strangers on electronic bulletin boards or computer-network chat rooms.")
    • Supra Note , vol.3 , pp. 1
    • Lewis1
  • 27
    • 84876616009 scopus 로고    scopus 로고
    • alleged libel
    • e.g., Charles, supra note 9, at 1 (alleged libel).
    • Supra Note , vol.9 , pp. 1
    • Charles1
  • 28
    • 84876650436 scopus 로고    scopus 로고
    • and accompanying text
    • The most popular anonymous remailer already does clearly label all of its resent messages as anonymous. See infra notes 31-33 and accompanying text.
    • Infra Notes , vol.31-33
  • 29
    • 84876652536 scopus 로고    scopus 로고
    • See Long, supra note 7, at 1202.
    • Supra Note , vol.7 , pp. 1202
    • Long1
  • 30
    • 84876653409 scopus 로고    scopus 로고
    • note
    • In his note on anonymity in Cyberspace, George Long incorrectly asserts that "One could 'kill'all messages that are anonymously originated." Id. In fact, one can only kill anonymously sent messages if one knows elements of the anonymous headers in advance.
  • 31
    • 84876630087 scopus 로고    scopus 로고
    • note
    • I do not mean to suggest here that being "shielded from responsibility" is necessarily a negative quality. As discussed above, this shield or protection serves important purposes.
  • 33
    • 84876617636 scopus 로고    scopus 로고
    • See id
    • See id.
  • 34
    • 84876595970 scopus 로고    scopus 로고
    • For example, an address could be "an115@anon.penet.fi"
    • For example, an address could be "an115@anon.penet.fi".
  • 35
    • 84876603933 scopus 로고    scopus 로고
    • Other anonymous sites include, for example, "alumni.caltech. edu", "soda.berkeley.edu", or "mead.u.washington.edu." See Long, supra note 7, at 1213.
    • Supra Note , vol.7 , pp. 1213
    • Long1
  • 36
    • 84876603352 scopus 로고    scopus 로고
    • note
    • It is possible, however, that a hacker would change every header that indicated anonymity to a random header. Cybercops would then have to search for the hacker.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.