1997
DOI: 10.2139/ssrn.17990
|View full text |Cite
|
Sign up to set email alerts
|

A Right to Read Anonymously: A Closer Look at "Copyright Management" In Cyberspace

Abstract: Originally published 28 Conn. L. Rev. 981 (1996).It has become commonplace to say that we have entered the age of information. The words conjure up images of a reader's paradise -an era of limitless access to information resources and unlimited interpersonal communication. In truth, however, the new information age is turning out to be as much an age of information about readers as an age of information for readers. The same technologies that have made vast amounts of information accessible in digital form are… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
44
0
3

Year Published

2003
2003
2020
2020

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 61 publications
(47 citation statements)
references
References 0 publications
0
44
0
3
Order By: Relevance
“…We limited our choices to those we anticipated would be particularly relevant to home-based computing (and could be instantiated through prototypes), most commonly discussed, and those that other researchers had emphasized in research similar to our own, then examined these through the lens of technologies that are currently being developed for use in the home. We began with privacy as seclusion, or "the right to be left alone" [9]. A constantly "on" monitoring system in the home, for example, would violate this construct if there were no location where a person could choose to be free from monitoring (e.g., if there were a visitor).…”
Section: Initial Privacy Framework and Related Workmentioning
confidence: 99%
“…We limited our choices to those we anticipated would be particularly relevant to home-based computing (and could be instantiated through prototypes), most commonly discussed, and those that other researchers had emphasized in research similar to our own, then examined these through the lens of technologies that are currently being developed for use in the home. We began with privacy as seclusion, or "the right to be left alone" [9]. A constantly "on" monitoring system in the home, for example, would violate this construct if there were no location where a person could choose to be free from monitoring (e.g., if there were a visitor).…”
Section: Initial Privacy Framework and Related Workmentioning
confidence: 99%
“…There could be variety of reasons that allow this phenomenon to occur including self-confidence, fear of revenge or other social reactions. For example, message boards established outside online communities, but for users of such community to vent their opinions on the user, have sometimes been used in ways that at least the communities themselves were not supportive about it [13], or for privacy and security related concerns [5,9]. …”
Section: Edit Activity (Rq1)mentioning
confidence: 99%
“…On the other hand, opponent groups argue that it is more likely that defamation, threat, insulting words, and slander can occur under an anonymous communication environment (Cohen, 1996). According to classical deindividuation theory, anonymity in the group can lead to reduced selfawareness and influence of social norms that ultimately correspond to antinormative behaviors .…”
Section: Deindividuationmentioning
confidence: 99%