SlideShare a Scribd company logo
ANONYMITY IN THE DIGITAL
AGE
GABRIEL ALFONSO ALONSO
FLORIDA INTERNATIONAL
UNIVERSITY
CGS-3095 SPRING 2018
INTRODUCTION
• Anonymous global communication is possible
• Brings new possibilities and inconveniences
• Discuss the good and bad of anonymity
• Optimize the good and bad of anonymity
• Anonymity effects on different cultures
HOW IT WORKS
• Soft and hardened anonymity
• Not provide any personal information
• Safe from social repercussion
• Hardened defends from IP tracking
REASONS FOR ANONYMITY
• Sharing of compromising information
• Sharing of personal information without sharing identity
• Freedom of expression
• Sharing an unpopular opinion
• Cyber-crimes
SIGNIFICANCE
• Free discourse of ideas
• Impedes shunning of ideas
• Sharing unpopular opinions without personal repercussions
• Protects privacy and personal information
OPTIMIZATION
• Culture where every idea is considered valid
• Listening to the other side
• Cultivate a more accepting society
• Increase cyber-security of companies and individual
SOCIAL IMPLICATIONS
• Freedom of expression for the development of society
• Ostracizing a group of people is dangerous
• Internet as a melting pot of ideas
• Non-politically correct discussions
• Cyber-bullying
ETHICAL IMPLICATIONS
• High risk of sharing personal information
• Jeopardizing your well-being
• People should learn to deal with anonymous
• Anonymity as a means to cyber-crime
GLOBAL IMPLICATIONS
• Unknown nationalities
• More diverse exchange of ideas
• Also increased disagreements
• Chinese Government getting rid of anonymity
CONCLUSIONS
• Good and bad ramifications
• The benefits shall not be stripped from the people
• Freedom of speech improves society
• With anonymity we can speak our minds

More Related Content

Similar to Individual+presentation

Social Networking - Arber Hoxhallari
Social Networking - Arber HoxhallariSocial Networking - Arber Hoxhallari
Social Networking - Arber Hoxhallari
Arber Hoxhallari
 
Social media
Social mediaSocial media
Social media
divyanshu_vishal
 
Social media
Social mediaSocial media
Social media
DivyanshuVishal
 
Joakim Jardenberg's presentation
Joakim Jardenberg's presentationJoakim Jardenberg's presentation
Joakim Jardenberg's presentation
dxfswe
 
1. goldsmiths short course the attention economy - 13th february
1. goldsmiths short course   the attention economy - 13th february1. goldsmiths short course   the attention economy - 13th february
1. goldsmiths short course the attention economy - 13th february
Royal Holloway, University of London
 
AI & Democracy
AI & DemocracyAI & Democracy
AI & Democracy
George Tilesch
 
Digital Citizenship Redefined
Digital Citizenship RedefinedDigital Citizenship Redefined
Digital Citizenship Redefined
ConnectSafely
 
Lecture 2 Social Web 2017 (Guest Lecture By Dr. Giulia Ranzini)
Lecture 2 Social Web 2017 (Guest Lecture By Dr. Giulia Ranzini)Lecture 2 Social Web 2017 (Guest Lecture By Dr. Giulia Ranzini)
Lecture 2 Social Web 2017 (Guest Lecture By Dr. Giulia Ranzini)
Davide Ceolin
 
Global networks
Global networksGlobal networks
Global networks
Golden Success College
 
Brokerage 2007 keynote norman lewis
Brokerage 2007 keynote norman lewisBrokerage 2007 keynote norman lewis
Brokerage 2007 keynote norman lewis
imec.archive
 
Perempuan dan Kesalihan Digital
Perempuan dan Kesalihan DigitalPerempuan dan Kesalihan Digital
Perempuan dan Kesalihan Digital
Ismail Fahmi
 
Chp 05 anonymity, security, privacy and civil liberties (shared)
Chp 05   anonymity, security, privacy and civil liberties (shared)Chp 05   anonymity, security, privacy and civil liberties (shared)
Chp 05 anonymity, security, privacy and civil liberties (shared)
YUSRA FERNANDO
 
Phillip Andrews A New Renaissance.pdf
Phillip Andrews A New Renaissance.pdfPhillip Andrews A New Renaissance.pdf
Phillip Andrews A New Renaissance.pdf
International Innovation Centers
 
CYBER BULLYING.pptx
CYBER BULLYING.pptxCYBER BULLYING.pptx
CYBER BULLYING.pptx
2058cdtAryankrpal
 
Post industrial information technology
Post industrial information technologyPost industrial information technology
Post industrial information technology
Peterus Balan
 
Diplomacy in Cyberspace
Diplomacy in CyberspaceDiplomacy in Cyberspace
Diplomacy in Cyberspace
Aleks Krotoski
 
Cultures of the Internet 2014
Cultures of the Internet 2014Cultures of the Internet 2014
1. goldsmiths short course The Attention Economy - 1st may
1. goldsmiths short course   The Attention Economy - 1st may1. goldsmiths short course   The Attention Economy - 1st may
1. goldsmiths short course The Attention Economy - 1st may
Royal Holloway, University of London
 
Risk Assessment of Social Media Use v3.01
Risk Assessment of Social Media Use v3.01Risk Assessment of Social Media Use v3.01
Risk Assessment of Social Media Use v3.01
overcertified
 
Here Comes Everybody & Cognitive Surplus Review
Here Comes Everybody & Cognitive Surplus ReviewHere Comes Everybody & Cognitive Surplus Review
Here Comes Everybody & Cognitive Surplus Review
Kristenstan
 

Similar to Individual+presentation (20)

Social Networking - Arber Hoxhallari
Social Networking - Arber HoxhallariSocial Networking - Arber Hoxhallari
Social Networking - Arber Hoxhallari
 
Social media
Social mediaSocial media
Social media
 
Social media
Social mediaSocial media
Social media
 
Joakim Jardenberg's presentation
Joakim Jardenberg's presentationJoakim Jardenberg's presentation
Joakim Jardenberg's presentation
 
1. goldsmiths short course the attention economy - 13th february
1. goldsmiths short course   the attention economy - 13th february1. goldsmiths short course   the attention economy - 13th february
1. goldsmiths short course the attention economy - 13th february
 
AI & Democracy
AI & DemocracyAI & Democracy
AI & Democracy
 
Digital Citizenship Redefined
Digital Citizenship RedefinedDigital Citizenship Redefined
Digital Citizenship Redefined
 
Lecture 2 Social Web 2017 (Guest Lecture By Dr. Giulia Ranzini)
Lecture 2 Social Web 2017 (Guest Lecture By Dr. Giulia Ranzini)Lecture 2 Social Web 2017 (Guest Lecture By Dr. Giulia Ranzini)
Lecture 2 Social Web 2017 (Guest Lecture By Dr. Giulia Ranzini)
 
Global networks
Global networksGlobal networks
Global networks
 
Brokerage 2007 keynote norman lewis
Brokerage 2007 keynote norman lewisBrokerage 2007 keynote norman lewis
Brokerage 2007 keynote norman lewis
 
Perempuan dan Kesalihan Digital
Perempuan dan Kesalihan DigitalPerempuan dan Kesalihan Digital
Perempuan dan Kesalihan Digital
 
Chp 05 anonymity, security, privacy and civil liberties (shared)
Chp 05   anonymity, security, privacy and civil liberties (shared)Chp 05   anonymity, security, privacy and civil liberties (shared)
Chp 05 anonymity, security, privacy and civil liberties (shared)
 
Phillip Andrews A New Renaissance.pdf
Phillip Andrews A New Renaissance.pdfPhillip Andrews A New Renaissance.pdf
Phillip Andrews A New Renaissance.pdf
 
CYBER BULLYING.pptx
CYBER BULLYING.pptxCYBER BULLYING.pptx
CYBER BULLYING.pptx
 
Post industrial information technology
Post industrial information technologyPost industrial information technology
Post industrial information technology
 
Diplomacy in Cyberspace
Diplomacy in CyberspaceDiplomacy in Cyberspace
Diplomacy in Cyberspace
 
Cultures of the Internet 2014
Cultures of the Internet 2014Cultures of the Internet 2014
Cultures of the Internet 2014
 
1. goldsmiths short course The Attention Economy - 1st may
1. goldsmiths short course   The Attention Economy - 1st may1. goldsmiths short course   The Attention Economy - 1st may
1. goldsmiths short course The Attention Economy - 1st may
 
Risk Assessment of Social Media Use v3.01
Risk Assessment of Social Media Use v3.01Risk Assessment of Social Media Use v3.01
Risk Assessment of Social Media Use v3.01
 
Here Comes Everybody & Cognitive Surplus Review
Here Comes Everybody & Cognitive Surplus ReviewHere Comes Everybody & Cognitive Surplus Review
Here Comes Everybody & Cognitive Surplus Review
 

Recently uploaded

Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
LucaBarbaro3
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStrDeep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
saastr
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
Shinana2
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
HarisZaheer8
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 

Recently uploaded (20)

Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStrDeep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 

Individual+presentation

  • 1. ANONYMITY IN THE DIGITAL AGE GABRIEL ALFONSO ALONSO FLORIDA INTERNATIONAL UNIVERSITY CGS-3095 SPRING 2018
  • 2. INTRODUCTION • Anonymous global communication is possible • Brings new possibilities and inconveniences • Discuss the good and bad of anonymity • Optimize the good and bad of anonymity • Anonymity effects on different cultures
  • 3. HOW IT WORKS • Soft and hardened anonymity • Not provide any personal information • Safe from social repercussion • Hardened defends from IP tracking
  • 4. REASONS FOR ANONYMITY • Sharing of compromising information • Sharing of personal information without sharing identity • Freedom of expression • Sharing an unpopular opinion • Cyber-crimes
  • 5. SIGNIFICANCE • Free discourse of ideas • Impedes shunning of ideas • Sharing unpopular opinions without personal repercussions • Protects privacy and personal information
  • 6. OPTIMIZATION • Culture where every idea is considered valid • Listening to the other side • Cultivate a more accepting society • Increase cyber-security of companies and individual
  • 7. SOCIAL IMPLICATIONS • Freedom of expression for the development of society • Ostracizing a group of people is dangerous • Internet as a melting pot of ideas • Non-politically correct discussions • Cyber-bullying
  • 8. ETHICAL IMPLICATIONS • High risk of sharing personal information • Jeopardizing your well-being • People should learn to deal with anonymous • Anonymity as a means to cyber-crime
  • 9. GLOBAL IMPLICATIONS • Unknown nationalities • More diverse exchange of ideas • Also increased disagreements • Chinese Government getting rid of anonymity
  • 10. CONCLUSIONS • Good and bad ramifications • The benefits shall not be stripped from the people • Freedom of speech improves society • With anonymity we can speak our minds