Abstract
As the internet media has become more widely used over time, public opinions formed by internet discussions affect political and social issues more critically. While the internet space guarantees equal status for every participant and equal opportunity in terms of freedom of speech based on anonymity, baseless rumors, personal defamation, and privacy invasion against particular individuals and groups are more likely to happen rather than in the face-to-face offline communications. In order to prevent this undesirable effect, the South Korean government implemented Real Name Verification Law in July 2007 by which discussion participants should pass verification process in order to express their opinions in most websites. This study examines the effects of Real Name Verification Law in several aspects. By applying content analysis to abundant data of postings in a leading discussion forum that is subject to the law, the results suggest that Real Name Verification Law has a dampening effect on overall participation in the short-term, but the law did not affect the participation in the long term. Also, identification of postings had significant effects on reducing uninhibited behaviors, suggesting that Real Name Verification Law encouraged users’ behavioral changes in the positive direction to some extent. The impact is greater for Heavy User group than for Light and Middle User groups. Also, discussion participants with their real names showed more discreet behaviors regardless of the enforcement of the law. By analyzing the effect of this policy at the forefront of internet trends of South Korea, this paper can shed light on some useful implications and information to policy makers of other countries that may consider certain type of internet regulations in terms of privacy and anonymity.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
‘Dog Shit Girl’ case has changed public sentiment in favor of Real Name Verification Law, as discussed more specifically in Sect. 2.
- 2.
- 3.
Second: Singapore (88%), 3rd: Netherlands (85%), USA (60%) (at the end of 2008).
- 4.
When a girl riding a South Korean subway refused to clean up her dog’s excrement, a witness took pictures of her and posted them on a popular website, along with an account of her misbehavior. Within hours, she and her dog were recognized everywhere they went. Within hours, she was labeled “dog-shit-girl” and her pictures and parodies were everywhere on the cyberspace. Within days, her identity and her past were revealed. Request for information about her parents and relatives started popping up and people started to recognize her by the dog and the bag she was carrying as well as her watch, clearly visible in the original picture. All mentions of privacy invasion were shouted down with accusations of being related to the girl.(Source:http://boingboing.net/2005/06/29/woman_doesnt{\_}clean{\_}u.html)
- 5.
It is not an exaggerated statement that almost all frequently-visited websites by South Korean people came to be laid under this restriction
- 6.
Resident registration number is equivalent to social security number in the US. This is a 13-digit number issued to all residents of South Korean citizens. It is used to identify people in various private transactions such as in banking and employment. It is also used extensively for online identification purposes.
- 7.
http://agora.media.daum.net/ According to the official announcement of the portal operator, the total number of postings in all categories of forums was 784,107 by 74,949 participants in the period April 1, 2008–June 18, 2008, and the number unique visitors were 7.9 million in April, 2008
- 8.
- 9.
- 10.
Most discussion board systems automatically block writings with well-known swear words by their own filtering algorithm, so it is common for participants to use these words in a slightly different way. These words were regarded as homogeneous words to the original swear words in this paper.
- 11.
Two independent coders rated each set of postings on the basis of the provided standards, and cross-checked for coding reliability. Both coders are Ph.D students in social science fields in the US, whose native language is Korean.
- 12.
After sorting by the number of postings in the given period, every tenth of participants are selected.
- 13.
Some websites including Facebook.com hold their own policy in terms of using users’ real names rather than their nicknames.
- 14.
“Impersonating anyone or anything is not permitted. To encourage people to use their real names on Facebook, we limit the number of times names can be changed.”, “Your account was disabled because the name under which it was registered was fake. We do not allow users to register with fake names, to impersonate any person or entity, or to falsely state or otherwise misrepresent themselves or their affiliations. In addition, Facebook accounts are intended for use by single individuals, so groups, clubs, businesses, or other types of organizations are not permitted to maintain accounts.” (excerpt from Help Center at Facebook.com)
- 15.
- 16.
The update to Facebook’s comments box plugin was intended to make comments more relevant. Users to a particular site see comments from Facebook friends first and Facebook added public information about users next to their names. (http://www.pcmag.com/article2/0,2817,2381630,00.asp)
References
Acquisti A, Dingledine R, Syverson R (2003) On the economics of anonymity. In: Camp J Wright R (eds) Financial cryptography (FC’03). Springer-Verlag, LNCS
Cohen JE (1996) The right to read anonymously: a closer look at “copyright management” in cyberspace. Conn L Rev 28:981
Cohen JE (2000) Examined lives: information privacy and the subject as object Stan L Rev 52:1373–1398
Danielson P (1996) Pseudonyms, Mailbots, and virtual letterheads: the evolution of computer-mediated ethics In: Ess C (ed) Philosophical perspectives on computer-mediated communication. State University of New York Press, Albany
Diakopoulos N, Naaman M (2011) Towards quality discourse in online news comments. In: Proceedings of the ACM 2011 conference on computer supported cooperative work
Froomkin MA (1995) Anonymity and its enemies. J Online L Art 4
Froomkin MA (1996) Flood control on the information ocean: living with anonymity, digital cash, and distributed database. J Law Commerce 15(2):395–507
Goldberg I (2000) A pseudonymous communications infrastructure for the internet. PhD thesis
Jessup LM, Connolly T, Galegher J (1990) The effects of anonymity on GDSS group process with an idea-generating task. MIS Quarterly 14:3: 313–321
Hwang Y (2007) Critical approach to the implementation of real-name system on bulletin board of the internet: exploring right of anonymous communication, (in Korean). Media Soc 15(2):97–130
Kahai SS, Sosik JJ, Avolio BJ (2003) Effects of leadership style, anonymity, and rewards on creativity relevant processes and outcomes in an electronic meeting system context. Leader Q 14:499–524
Karyda M, Kokolakis S (2008) Privacy perceptions among members of online communities. In: Acquisti A, Gritzalis S, Lambrinoudakis C and De Capitani di Vimercati, S (eds) Digital Privacy: theory, technologies and practices. Auerbach Publications, Boca Raton pp 253–266
Kim K (2009) The technical, legal and business issues of the real-name-verification requirement (in Korean). Hum Right Justice 7:78–97
Marx G (1999) What’s in a name? some reflections on the sociology of anonymity. Inform Soc 15(2)
McLeod PL, Baron RS, Marti MW, Yoon K (1997) The eyes have it: Minority influence in face-to-face and computer-mediated groups. J Appl Psychol 82:706–718
Morio H, Buchholz C (2009) How anonymous are you online? examining online social behaviors from a cross-cultural perspective. AI Soc 23:297–307
Myers DG, Lamm H (1976) The group polarization phenomenon. Psychol Bulletin 83: 602–627
Myung J (2003) Trace of the implementation of real-name system on the internet bulletin board in a public institution (in Korean). Center Law Inform Soc 5:2–13
Park CS, Go MK, Ki S (2008) The impact of anonymity on behavior of comments in online discussion board, manuscript
Pfitzmann A, Koehntopp M (2001) Anonymity, unobservability, and pseudonymity—a proposal for terminology. In: Hannes Federrath (ed) Designing privacy enhancing technologies - Proceedings of the International Workshop on Design Issues in Anonymity and Unobservability vol 2009 of LNCS Springer, New York, NY
Pinsonneault A, Barki H, Gallupe RB, Hoppen N (1999) Electronic brainstorming: the illusion of productivity. Inform Syst Res 10(2):110–133
Postmes T, Spears R, Lea M (1998) Breaching or building social boundaries: side-effects of computer- mediated communication. Comm Res 25(6):689–715
Postmes T, Spears R (1998) Deindividuation and antinormative behavior: a meta-analysis. Psychol Bulletin 123:238–259
Reicher SD, Spears R, Postmes T (1995) A social identity model of deindividuation phenomena. European Rev Soc Psychol 6:161–198
Reidenbach RE, Robin DP, Dawson L (1991) An Application and extension of a multidimensional ethics scale to selected marketing practices and marketing groups. J Acad Market Sci 19(2):83–92
Siegel J, Dubrovsky V, Kiesler S, McGuire TW (1986) Group processes in computer-mediated communication. Organ Behav Hum Decis Process 37:157–187
Spears R, Lea M, Lee S (1990) De-individuation and group polarisation in computer-mediated communication. British J Soc Psychol 29:121–134
Sproull L, Kiesler S (1986) Reducing social context cues: electronic mail in organizational communication. Manag Sci 32(11):1492–1512
Solove DJ (2004) The digital person: technology and privacy in the information age. New York University Press, New York
Solove DJ (2006) A taxonomy of privacy Univ Penn Law Rev 154(3):477–560
Solove DJ (2007) The future of reputation: gossip, rumor, and privacy on the internet Yale University Press New Haven, CT
Woo JW, Nah HS, Choi JM. (2010) An empirical analysis of the effect of real name system on internet bulletin boards South Korea J Pub Admin 48(1):78–96
Walther JB (1992) Interpersonal effects in computer-mediated communication. Comm Res 19(1):52–90
Wood A, Smith M (2001) Online communication: linking technology, identity, and culture. Mahwah NJ, Erlbaum
Zarsky TZ (2004) Thinking outside the box: considering transparency, anonymity, and pseudonymity as overall solutions to the problems of information privacy in the internet society, 58. Univ Miami Law Rev 991:1028–1032
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer Science+Business Media New York
About this paper
Cite this paper
Cho, D. (2013). Real Name Verification Law on the Internet: A Poison or Cure for Privacy?. In: Schneier, B. (eds) Economics of Information Security and Privacy III. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-1981-5_11
Download citation
DOI: https://doi.org/10.1007/978-1-4614-1981-5_11
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4614-1980-8
Online ISBN: 978-1-4614-1981-5
eBook Packages: Computer ScienceComputer Science (R0)