Real Name Verification Law on the Internet: A Poison or Cure for Privacy?

Published on Jan 1, 2013
· DOI :10.1007/978-1-4614-1981-5_11
Daegon Cho1
Estimated H-index: 1
(CMU: Carnegie Mellon University),
Daegon Cho8
Estimated H-index: 8
(CMU: Carnegie Mellon University)
Sources
Abstract
As the internet media has become more widely used over time, public opinions formed by internet discussions affect political and social issues more critically. While the internet space guarantees equal status for every participant and equal opportunity in terms of freedom of speech based on anonymity, baseless rumors, personal defamation, and privacy invasion against particular individuals and groups are more likely to happen rather than in the face-to-face offline communications. In order to prevent this undesirable effect, the South Korean government implemented Real Name Verification Law in July 2007 by which discussion participants should pass verification process in order to express their opinions in most websites. This study examines the effects of Real Name Verification Law in several aspects. By applying content analysis to abundant data of postings in a leading discussion forum that is subject to the law, the results suggest that Real Name Verification Law has a dampening effect on overall participation in the short-term, but the law did not affect the participation in the long term. Also, identification of postings had significant effects on reducing uninhibited behaviors, suggesting that Real Name Verification Law encouraged users’ behavioral changes in the positive direction to some extent. The impact is greater for Heavy User group than for Light and Middle User groups. Also, discussion participants with their real names showed more discreet behaviors regardless of the enforcement of the law. By analyzing the effect of this policy at the forefront of internet trends of South Korea, this paper can shed light on some useful implications and information to policy makers of other countries that may consider certain type of internet regulations in terms of privacy and anonymity.
Download
📖 Papers frequently viewed together
2012HICSS: Hawaii International Conference on System Sciences
29 Citations
References31
Newest
Mar 19, 2011 in CSCW (Conference on Computer Supported Cooperative Work)
#1Nicholas Diakopoulos (RU: Rutgers University)H-Index: 26
#2Mor Naaman (RU: Rutgers University)H-Index: 51
With the growth in sociality and interaction around online news media, news sites are increasingly becoming places for communities to discuss and address common issues spurred by news articles. The quality of online news comments is of importance to news organizations that want to provide a valuable exchange of community ideas and maintain credibility within the community. In this work we examine the complex interplay between the needs and desires of news commenters with the functioning of diffe...
210 CitationsSource
#1Keechang KimH-Index: 1
2 CitationsSource
#1Hiroaki Morio (Sapporo University)H-Index: 9
Communication on the Internet is often described as “anonymous”, yet the usage of the term is often confusing, even in academia. Three levels of anonymity, visual anonymity, dissociation of real and online identities, and lack of identifiability, are thought to have different effects on various components of interpersonal motivation. Specifically, we propose that cross-cultural differences in interpersonal motivation (autonomy vs. affiliation) are illustrated by choices individuals make when dec...
45 CitationsSource
#1Maria KarydaH-Index: 15
#2Spyros KokolakisH-Index: 18
5 CitationsSource
#1Daniel J. Solove (GW: George Washington University)H-Index: 29
Teeming with chatrooms, online discussion groups, and blogs, the Internet offers previously unimagined opportunities for personal expression and communication. But theres a dark side to the story. A trail of information fragments about us is forever preserved on the Internet, instantly available in a Google search. A permanent chronicle of our private livesoften of dubious reliability and sometimes totally falsewill follow us wherever we go, accessible to friends, strangers, dates, employers, ne...
245 Citations
#1Hwang Yong SukH-Index: 1
2 Citations
incantations of “privacy” are not nuanced enough to capture the problems involved. The 9/11 Commission Report, for example, recommends that, as government agencies engage in greater information sharing with each other and with businesses, they should “safeguard the privacy of individuals about whom information is shared.” But what does safeguarding “privacy” mean? Without an understanding of what the privacy problems are, how can privacy be addressed in a meaningful way? Many commentators have s...
767 CitationsSource
#1Alex Molassiotis (University of Manchester)H-Index: 72
#2Denise Cubbin (University of Nottingham)H-Index: 1
Summary The aim of this study was to determine the prevalence of complementary and alternative medicine (CAM) use among children with cancer who had received or were receiving treatment at a large hospital in the UK, including the identification of the most commonly used therapies and parental motives for doing so. Using a crosssectional survey design, questionnaires were sent to parents of paediatric patients diagnosed with cancer. Of the 49 respondents, 32.7% reported using some type of CAM. T...
221 CitationsSource
#1Tal Z. Zarsky (UM: University of Miami)H-Index: 1
Preamble . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1302 R I. Transparency . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1305 R I.1. What Is Transparency? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1305 R Required Opacity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ...
21 Citations
#1Daniel J. Solove (GW: George Washington University)H-Index: 29
THE DIGITAL PERSON: TECHNOLOGY AND PRIVACY IN THE INFORMATION AGE (ISBN: 0814798462) (NYU Press 2004) explores the social, political, and legal implications of the collection and use of personal information in computer databases. In the Information Age, our lives are documented in digital dossiers maintained by hundreds (perhaps thousands) of businesses and government agencies. These dossiers are composed of bits of our personal information, which when assembled together begin to paint a portrai...
312 Citations
Cited By8
Newest
Jul 4, 2016 in ACISP (Australasian Conference on Information Security and Privacy)
#1Youngbae Song (SKKU: Sungkyunkwan University)H-Index: 5
#2Hyoungshick Kim (SKKU: Sungkyunkwan University)H-Index: 20
Last. Jun Ho Huh (Honeywell)H-Index: 13
view all 3 authors...
This paper studies a potential risk of using real name verification systems that are prevalently used in Korean websites. Upon joining a website, users are required to enter their Resident Registration Number RRN to identify themselves. We adapt guessing theory techniques to measure RRN security against a trawling attacker attempting to guess victim's RRN using some personal information such as name, sex, and location that are publicly available e.g., on Facebook. We evaluate the feasibility of ...
2 CitationsSource
#1Nicholas Gamble (Monash University)H-Index: 3
#2Christopher Boyle (UNE: University of New England (United States))H-Index: 18
Last. Zoe Morris (Monash University)H-Index: 6
view all 3 authors...
Objective Telepsychology has the potential to revolutionise the provision of psychological service not only to those in remote locations, or with mobility issues, but also for those who prefer flexible access to services. Rapid developments in internet communications technology have yielded new and diverse methods of telepsychology. As a result, ethical regulatory and advisory guidelines for practice have often been developed and disseminated reactively. This article investigates how the core et...
21 CitationsSource
Jul 1, 2015 in ISA (Information Security and Assurance)
#1Hazel Webb (University of Portsmouth)
#2Nick Savage (University of Portsmouth)H-Index: 12
view all 3 authors...
This research identifies the balance of arguments relating for and against the use of online anonymity in society in the context of linking users to their true identity via real name policies. Survey results were extracted based on occupational status, focussing on both technology students and those in full time employment, which primarily consisted of staff at a High School. This provided a range of awareness and information (for instance with regard to online risk) of which is believed to infl...
Sep 24, 2014 in SecureComm (Security and Privacy in Communication Networks)
#1Chengcheng Shao (National University of Defense Technology)H-Index: 6
#2Liang Chen (National University of Defense Technology)H-Index: 2
Last. Xinwen Jiang (National University of Defense Technology)H-Index: 3
view all 4 authors...
Rumors and defamation are now becoming a main threat to Online Social Networks (OSNs). To prevent them, Real Name System (RNS) was proposed, but has been proved vulnerable by the data leakage in South Korea. In this paper, we propose a new identity model, Social Authentication Identity (SAI), to trace rumor-makers. In SAI, only a small number of users (called roots) are required to be authenticated by RNS. And the others are authenticated by vouching of friends, called social authentication. We ...
1 CitationsSource
Nov 15, 2013 in CloudCom (IEEE International Conference on Cloud Computing Technology and Science)
#1Chen Kan (National University of Defense Technology)H-Index: 1
#2Xiong Yue-shan (National University of Defense Technology)H-Index: 2
Last. Zhu Pei-dong (National University of Defense Technology)H-Index: 5
view all 3 authors...
The openness and anonymity of Internet allow people joining in without identity validation, resulting in a trustless environment and bringing about many security problems, such as privacy exposure, rumor spreading, deception and social panic making. The root of these problems is that users use pseudonyms instead of their real identities, thus they take no responsibility to their misbehaviors. To solve the problems and build a more credible environment, real name policy is promoted in some countr...
1 CitationsSource
#1Daegon ChoH-Index: 8
#1Daegon ChoH-Index: 2
Last. Alessandro AcquistiH-Index: 71
view all 2 authors...
We examine how online commenting is affected by different degrees of commenters’ identifiability: 1) real name accounts on social networking sites (or “real name-SNS accounts”; e.g., Facebook); 2) pseudonym accounts on social networking sites (or “pseudonym-SNS account”; e.g., Twitter); 3) pseudonymous accounts outside social networking sites (or “non-SNS accounts”; e.g., an online newspaper website’s account). We first construct a conceptual model of the relationship between the degree of ident...
16 CitationsSource
#1Robert Bodle (Mount St. Joseph University)H-Index: 2
This paper argues that anonymity in networked digital communications is indispensable as an enabler of other inalienable rights including informational privacy and freedom of expression. Yet, an alignment of industry norms, practices, ethics, and techno-social design asserts a persistent identity ecosystem, making online anonymity more difficult to achieve. This paper reappraises the democratic uses, affordances, and human rights dimensions of online anonymity in order to advance an ethical just...
10 CitationsSource
The paper relates the debate about real name policy on social networking platforms and online forums to online moderated consultation processes in the area of e-participation. It analyses the case of the second participatory budget of the German city of Gutersloh. Three major rationales for real name policy in e-participatory projects are identified: the possibility to restrict access, prevention of offensive communication, and the strengthening of a transparent democracy. The five major objecti...
3 CitationsSource