5 Matching Annotations
- Oct 2017
-
Local file Local file
-
atrendthatshecallsa‘modernexampleofatragedyofthecommons.’[33]Justasintheclassicversion,subjectswhoprotecttheirdatacontinuetoreapthecollectivebenefits(suchasinmedicine)ofdataleftinthecommons,yetthosebenefitsarethreatenedandwilldegenerateasdatasubjectsoptout.Othersstrikeadifferentwarning,arguingthattheanonymizationofidentityleadstocrowdbehaviourandsubjectstakinglessresponsibilityforwhattheysayanddoandincreasesthelikelihoodoftheirmisbehaving.[34]Boththeargumentsforandagainstanonymizationasasolutionpresumethatwhatisatissueisprotectingthe‘datadoubles’ofcitizensubjects.
-
Numerousformsofanonymizationalsoexist,suchasthosethatinvolveexpostfactoremovalofmetadata,whichgovernmentsorbusinessesdowhensharingdatawiththirdparties.Thisisdistinctfromanonymity,whichinvolvesactionsthatavoididentificationbyusingpseudonymsorencryptionsuchasPGP(PrettyGoodPrivacy).Theseactionsperformtherighttoactwithoutbeingidentified.
-
Thatthesedemandshaveemergedinthespanofonlyafewyearsatteststowhatwecallthe‘closings’ofcyberspace.ThesedemandsandtheirclosingsareeffectsofthewayinwhichactingthroughtheInternethasresignifiedquestionsofvelocity,extensity,anonymity,andtraceability.Velocitycallsforregularandongoingvigilanceaboutrapidlychangingtechnologies,protocols,practices,platforms,andrulesaboutbeingdigital;extensitycallsforawarenessofwhereandtowhomdigitalactionsreach;anonymitycallsforlimitingandprotectingexposureandbeingcautiousaboutthepresumedidentitiesofothers;andtraceabilitycallsformanaginghowactionsaretracked,analysed,manipulated,andsortedbyunknownothersandforunknowablepurposes.Allofthesedemandsspringnotfromparticipating,connecting,andsharingalonebuttherelationsbetweenandamongbodiesactingthroughtheInternet,whichismadeupofconventionsconfiguredbytheactionsofdispersedanddistributedauthorities.Itistotheseconfiguringactions,whichwecalltheclosingsofcyberspace,thatweturntointhenextchapter,withafocusonfiltering,tracking,andnormalizing.
-
Itiswellnighimpossibletomakedigitalutteranceswithoutatrace;onthecontrary,oftentheforceofadigitalspeechactdrawsitsstrengthfromthetracesthatitleaves.Aswesaidinchapter2,eachofthesequestionsraisedbydigitalactscanarguablybefoundinothertechnologiesofspeechacts—thetelegraph,megaphone,radio,andtelephonecometomindimmediately.Butitiswhentakentogetherthatwethinkdigitalactsresignifythesequestionsandcombinetomakethemdistinctfromspeechacts,intermsofboththeconventionsbywhichtheybecomepossibleandtheeffectsthattheyproduce.
-
- Sep 2017
-
Local file Local file
-
Ifwedistinguishprivacyfromanonymity,werealizethatanonymityontheInternethasspawnedanewpoliticaldevelopment.Ifprivacyistherighttodeterminewhatonedecidestokeeptoherselfandwhattosharepublicly,anonymityconcernstherighttoactwithoutbeingidentified.ThesecondconcernsthevelocityofactingthroughtheInternet.Forbetterorforworse,itisalmostpossibletoperformanactontheInternetfasterthanonecanthink.ThethirdconcernstheextensityofactingthroughtheInternet.ThenumberofaddresseesanddestinationsthatarepossibleforactingthroughtheInternetisstaggering.So,too,aretheboundaries,borders,andjurisdictionsthatanactcantraverse.Thefourthconcernstraceability.IfitisperformedontheInternet,anactcanbetracedinwaysthatarepracticallyimpossibleoutsidetheInternet.Takentogether,anonymity,velocity,extensity,andtraceabilityarequestionsthatareresignifiedbybodiesactingthroughtheInternet
-