{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T09:49:58Z","timestamp":1725702598542},"publisher-location":"New York, NY","reference-count":35,"publisher":"Springer New York","isbn-type":[{"type":"print","value":"9781461419808"},{"type":"electronic","value":"9781461419815"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-1-4614-1981-5_11","type":"book-chapter","created":{"date-parts":[[2012,9,24]],"date-time":"2012-09-24T22:57:39Z","timestamp":1348527459000},"page":"239-261","source":"Crossref","is-referenced-by-count":2,"title":["Real Name Verification Law on the Internet: A Poison or Cure for Privacy?"],"prefix":"10.1007","author":[{"given":"Daegon","family":"Cho","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,7,27]]},"reference":[{"key":"11_CR1","volume-title":"Financial cryptography (FC\u201903)","author":"A Acquisti","year":"2003","unstructured":"Acquisti A, Dingledine R, Syverson R (2003) On the economics of anonymity. In: Camp J Wright R (eds) Financial cryptography (FC\u201903). Springer-Verlag, LNCS"},{"key":"11_CR2","first-page":"981","volume":"28","author":"JE Cohen","year":"1996","unstructured":"Cohen JE (1996) The right to read anonymously: a closer look at \u201ccopyright management\u201d in cyberspace. Conn L Rev 28:981","journal-title":"Conn L Rev"},{"key":"11_CR3","first-page":"1373","volume":"52","author":"JE Cohen","year":"2000","unstructured":"Cohen JE (2000) Examined lives: information privacy and the subject as object Stan L Rev 52:1373\u20131398","journal-title":"Examined lives: information privacy and the subject as object Stan L Rev"},{"key":"11_CR4","volume-title":"Pseudonyms, Mailbots, and virtual letterheads: the evolution of computer-mediated ethics In: Ess C (ed) Philosophical perspectives on computer-mediated communication","author":"P Danielson","year":"1996","unstructured":"Danielson P (1996) Pseudonyms, Mailbots, and virtual letterheads: the evolution of computer-mediated ethics In: Ess C (ed) Philosophical perspectives on computer-mediated communication. State University of New York Press, Albany"},{"doi-asserted-by":"crossref","unstructured":"Diakopoulos N, Naaman M (2011) Towards quality discourse in online news comments. In: Proceedings of the ACM 2011 conference on computer supported cooperative work","key":"11_CR5","DOI":"10.1145\/1958824.1958844"},{"unstructured":"Froomkin MA (1995) Anonymity and its enemies. J Online L Art 4","key":"11_CR6"},{"issue":"2","key":"11_CR7","first-page":"395","volume":"15","author":"MA Froomkin","year":"1996","unstructured":"Froomkin MA (1996) Flood control on the information ocean: living with anonymity, digital cash, and distributed database. J Law Commerce 15(2):395\u2013507","journal-title":"J Law Commerce"},{"unstructured":"Goldberg I (2000) A pseudonymous communications infrastructure for the internet. PhD thesis","key":"11_CR8"},{"issue":"3","key":"11_CR9","doi-asserted-by":"publisher","first-page":"313","DOI":"10.2307\/248893","volume":"14","author":"LM Jessup","year":"1990","unstructured":"Jessup LM, Connolly T, Galegher J (1990) The effects of anonymity on GDSS group process with an idea-generating task. MIS Quarterly 14:3: 313\u2013321","journal-title":"MIS Quarterly"},{"issue":"2","key":"11_CR10","first-page":"97","volume":"15","author":"Y Hwang","year":"2007","unstructured":"Hwang Y (2007) Critical approach to the implementation of real-name system on bulletin board of the internet: exploring right of anonymous communication, (in Korean). Media Soc 15(2):97\u2013130","journal-title":"Media Soc"},{"key":"11_CR11","doi-asserted-by":"publisher","first-page":"499","DOI":"10.1016\/S1048-9843(03)00049-3","volume":"14","author":"SS Kahai","year":"2003","unstructured":"Kahai SS, Sosik JJ, Avolio BJ (2003) Effects of leadership style, anonymity, and rewards on creativity relevant processes and outcomes in an electronic meeting system context. Leader Q 14:499\u2013524","journal-title":"Leader Q"},{"unstructured":"Karyda M, Kokolakis S (2008) Privacy perceptions among members of online communities. In: Acquisti A, Gritzalis S, Lambrinoudakis C and De Capitani di Vimercati, S (eds) Digital Privacy: theory, technologies and practices. Auerbach Publications, Boca Raton pp 253\u2013266","key":"11_CR12"},{"key":"11_CR13","first-page":"78","volume":"7","author":"K Kim","year":"2009","unstructured":"Kim K (2009) The technical, legal and business issues of the real-name-verification requirement (in Korean). Hum Right Justice 7:78\u201397","journal-title":"Hum Right Justice"},{"doi-asserted-by":"crossref","unstructured":"Marx G (1999) What\u2019s in a name? some reflections on the sociology of anonymity. Inform Soc 15(2)","key":"11_CR14","DOI":"10.1080\/019722499128565"},{"key":"11_CR15","doi-asserted-by":"publisher","first-page":"706","DOI":"10.1037\/0021-9010.82.5.706","volume":"82","author":"PL McLeod","year":"1997","unstructured":"McLeod PL, Baron RS, Marti MW, Yoon K (1997) The eyes have it: Minority influence in face-to-face and computer-mediated groups. J Appl Psychol 82:706\u2013718","journal-title":"J Appl Psychol"},{"key":"11_CR16","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1007\/s00146-007-0143-0","volume":"23","author":"H Morio","year":"2009","unstructured":"Morio H, Buchholz C (2009) How anonymous are you online? examining online social behaviors from a cross-cultural perspective. AI Soc 23:297\u2013307","journal-title":"AI Soc"},{"key":"11_CR17","doi-asserted-by":"publisher","first-page":"602","DOI":"10.1037\/0033-2909.83.4.602","volume":"83","author":"DG Myers","year":"1976","unstructured":"Myers DG, Lamm H (1976) The group polarization phenomenon. Psychol Bulletin 83: 602\u2013627","journal-title":"Psychol Bulletin"},{"key":"11_CR18","first-page":"2","volume":"5","author":"J Myung","year":"2003","unstructured":"Myung J (2003) Trace of the implementation of real-name system on the internet bulletin board in a public institution (in Korean). Center Law Inform Soc 5:2\u201313","journal-title":"Center Law Inform Soc"},{"unstructured":"Park CS, Go MK, Ki S (2008) The impact of anonymity on behavior of comments in online discussion board, manuscript","key":"11_CR19"},{"key":"11_CR20","volume-title":"Designing privacy enhancing technologies - Proceedings of the International Workshop on Design Issues in Anonymity and Unobservability vol 2009 of LNCS Springer","author":"A Pfitzmann","year":"2001","unstructured":"Pfitzmann A, Koehntopp M (2001) Anonymity, unobservability, and pseudonymity\u2014a proposal for terminology. In: Hannes Federrath (ed) Designing privacy enhancing technologies - Proceedings of the International Workshop on Design Issues in Anonymity and Unobservability vol 2009 of LNCS Springer, New York, NY"},{"issue":"2","key":"11_CR21","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1287\/isre.10.2.110","volume":"10","author":"A Pinsonneault","year":"1999","unstructured":"Pinsonneault A, Barki H, Gallupe RB, Hoppen N (1999) Electronic brainstorming: the illusion of productivity. Inform Syst Res 10(2):110\u2013133","journal-title":"Inform Syst Res"},{"issue":"6","key":"11_CR22","doi-asserted-by":"publisher","first-page":"689","DOI":"10.1177\/009365098025006006","volume":"25","author":"T Postmes","year":"1998","unstructured":"Postmes T, Spears R, Lea M (1998) Breaching or building social boundaries: side-effects of computer- mediated communication. Comm Res 25(6):689\u2013715","journal-title":"Comm Res"},{"key":"11_CR23","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1037\/0033-2909.123.3.238","volume":"123","author":"T Postmes","year":"1998","unstructured":"Postmes T, Spears R (1998) Deindividuation and antinormative behavior: a meta-analysis. Psychol Bulletin 123:238\u2013259","journal-title":"Psychol Bulletin"},{"key":"11_CR24","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1080\/14792779443000049","volume":"6","author":"SD Reicher","year":"1995","unstructured":"Reicher SD, Spears R, Postmes T (1995) A social identity model of deindividuation phenomena. European Rev Soc Psychol 6:161\u2013198","journal-title":"European Rev Soc Psychol"},{"issue":"2","key":"11_CR25","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1007\/BF02726000","volume":"19","author":"RE Reidenbach","year":"1991","unstructured":"Reidenbach RE, Robin DP, Dawson L (1991) An Application and extension of a multidimensional ethics scale to selected marketing practices and marketing groups. J Acad Market Sci 19(2):83\u201392","journal-title":"J Acad Market Sci"},{"key":"11_CR26","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1016\/0749-5978(86)90050-6","volume":"37","author":"J Siegel","year":"1986","unstructured":"Siegel J, Dubrovsky V, Kiesler S, McGuire TW (1986) Group processes in computer-mediated communication. Organ Behav Hum Decis Process 37:157\u2013187","journal-title":"Organ Behav Hum Decis Process"},{"key":"11_CR27","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1111\/j.2044-8309.1990.tb00893.x","volume":"29","author":"R Spears","year":"1990","unstructured":"Spears R, Lea M, Lee S (1990) De-individuation and group polarisation in computer-mediated communication. British J Soc Psychol 29:121\u2013134","journal-title":"British J Soc Psychol"},{"issue":"11","key":"11_CR28","doi-asserted-by":"publisher","first-page":"1492","DOI":"10.1287\/mnsc.32.11.1492","volume":"32","author":"L Sproull","year":"1986","unstructured":"Sproull L, Kiesler S (1986) Reducing social context cues: electronic mail in organizational communication. Manag Sci 32(11):1492\u20131512","journal-title":"Manag Sci"},{"key":"11_CR29","volume-title":"The digital person: technology and privacy in the information age","author":"DJ Solove","year":"2004","unstructured":"Solove DJ (2004) The digital person: technology and privacy in the information age. New York University Press, New York"},{"issue":"3","key":"11_CR30","doi-asserted-by":"publisher","first-page":"477","DOI":"10.2307\/40041279","volume":"154","author":"DJ Solove","year":"2006","unstructured":"Solove DJ (2006) A taxonomy of privacy Univ Penn Law Rev 154(3):477\u2013560","journal-title":"A taxonomy of privacy Univ Penn Law Rev"},{"unstructured":"Solove DJ (2007) The future of reputation: gossip, rumor, and privacy on the internet Yale University Press New Haven, CT","key":"11_CR31"},{"issue":"1","key":"11_CR32","first-page":"78","volume":"48","author":"JW Woo","year":"2010","unstructured":"Woo JW, Nah HS, Choi JM. (2010) An empirical analysis of the effect of real name system on internet bulletin boards South Korea J Pub Admin 48(1):78\u201396","journal-title":"An empirical analysis of the effect of real name system on internet bulletin boards South Korea J Pub Admin"},{"issue":"1","key":"11_CR33","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1177\/009365092019001003","volume":"19","author":"JB Walther","year":"1992","unstructured":"Walther JB (1992) Interpersonal effects in computer-mediated communication. Comm Res 19(1):52\u201390","journal-title":"Comm Res"},{"key":"11_CR34","doi-asserted-by":"crossref","DOI":"10.4324\/9781410601872","volume-title":"Online communication: linking technology, identity, and culture","author":"A Wood","year":"2001","unstructured":"Wood A, Smith M (2001) Online communication: linking technology, identity, and culture. Mahwah NJ, Erlbaum"},{"key":"11_CR35","first-page":"1028","volume":"991","author":"TZ Zarsky","year":"2004","unstructured":"Zarsky TZ (2004) Thinking outside the box: considering transparency, anonymity, and pseudonymity as overall solutions to the problems of information privacy in the internet society, 58. Univ Miami Law Rev 991:1028\u20131032","journal-title":"Univ Miami Law Rev"}],"container-title":["Economics of Information Security and Privacy III"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4614-1981-5_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,7]],"date-time":"2019-05-07T15:25:41Z","timestamp":1557242741000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-1-4614-1981-5_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,7,27]]},"ISBN":["9781461419808","9781461419815"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-1-4614-1981-5_11","relation":{},"subject":[],"published":{"date-parts":[[2012,7,27]]}}}