If a blogger remains anonymous, I don’t think it would affect my reading of that blog. In fact, I have visited blogs where the writer/s are anonymous (duh, who hasn’t) and where the writers had their names out there and I never flinched a bit. I found both blogs to be somewhat credible in their specific field and I actually thought the blog with the anonymous writer added more of a “community” feel to the blog. The readers of the blog would always joke about what the writer may look like, and then a picture of him was posted on the blog and the readers all freaked out since they finally got a chance to see the real writer. I found it funny to read and was actually more inclined to come back and read that particular blog. While it’s not like the other blog is at all dry and bland, I did enjoy the community feel the blog with the anonymous writer had. I also enjoy reading an anonymous blogger because I know, in the back of my mind, that the blogger is not afraid to publish what is on his or her mind since he or she doesn’t really have to “own up” to what they post. If a name is attached to the writing, then the writer may feel inclined to tone it down a bit since anyone can find it and trace it back. Especially for job interviews, for example, it probably wouldn’t be too hard to find something that the interviewee published with the name attached.
Cadwalladr, Carole. “We Are Anonymous: Inside the Hacker World of Lulzsec, Anonymous and the Global Cyber Insurgency by Parmy Olson – review.” The Observer. 17 Aug. 2013. Web. 26 Sept. 2013. <http://www.theguardian.com/technology/2013/aug/18/we-are-anonymous-parmy-olson-review>
The article discusses the recent rise in popularity of an anonymous hacker group know as “Anonymous”. Masked behind the internet, this group of individuals attack specific companies and groups to help raise awareness of controversial social issues surrounding these groups. Their methods are often questionable and extreme, but it is usually done for a good cause. The group has evolved from simple 4chan hackers to a global organization that coordinates attacks against powers like the North Korean propaganda accounts. The article brings up a good point about cyber terrorism. While it might not be a big deal in some countries, it could land you in prison in America. Anonymity on the internet gives people the courage to do crazy things they wouldn’t normally do online. What’s more interesting is that groups like Anonymous attract so many people because they know the risk of getting in trouble is much lower. In a sense, they lose their own individuality and become a part of a greater mass. While one or two members might get caught, the idea of Anonymous will always remain on the internet. It’s one of the very reasons why I feel that anonymity is too strong of a privilege to give people.
Johnson, Deborah G. “Ethics Online.” Communications of the ACM. JAN 1997: 60-65. Web. 19 Sep. 2013. <http://delivery.acm.org/10.1145/250000/242875/p60-johnson.pdf?ip=184.108.40.206>.
This article brings several important aspects of online anonymity to the foreground. In an age of technology changing an updating in such a rapid pace, how do we keep up with laws and security online? We feel free to share information, thoughts, ideas, and even our own creations like formatting codes, but how can we protect what is “ours” when it can be so easily replicated online? Furthermore, how do we protect our own identity when it, like these smaller properties, can also easily be replicated online? Because people are able to post online under anonymous or pseudonyms, security is not guaranteed, and neither is good human ethics. Anyone can post something on the web and attribute it to another person’s name, whether they are aware of it or not. For this reason, establishing a sense of trust on the internet is extremely difficult, because you can never be sure the person you are communicating with is actually who you believe it to be, and likewise, the information you come across may not be as reliable as you would think. The speed and distance that information can travel online has pros and cons, but in the case of stolen information or things that should be kept private, it is definitely a curse.