Skip to main content

Digital Immolation

New Directions for Online Protest

  • Conference paper
Book cover Security Protocols XVIII (Security Protocols 2010)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7061))

Included in the following conference series:

  • 396 Accesses

Abstract

The current literature and experience of online activism assumes two basic uses of the Internet for social movements: straightforward extensions of offline organising and fund-raising using online media to improve efficiency and reach, or “hacktivism” using technical knowledge to illegally deface or disrupt access to online resources. We propose a third model which is non-violent yet proves commitment to a cause by enabling a group of activists to temporarily or permanently sacrifice valuable online identities such as email accounts, social networking profiles, or gaming avatars. We describe a basic cryptographic framework for enabling such a protest, which provides an additional property of binding solidarity which is not normally possible offline.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Blodgett, B.M.: And the Ringleaders Were Banned: An Examination of Protest in Virtual Worlds. In: C & T 2009: Proceedings of the Fourth International Conference on Communities and Technologies, pp. 135–144. ACM, New York (2009)

    Google Scholar 

  2. Costanza-Chock, S.: Mapping the Repertoire of Electronic Contention. In: Opel, A., Pompper, D. (eds.) Representing Resistance: Media, Civil Disobedience and the Global Justice Movement (2003)

    Google Scholar 

  3. Denning, D.: Activism, Hacktivism, and Cyberterrorism: The Internet as a Tool for Influencing Foreign Policy. In: Networks and Netwars: The Future of Terror, Crime, and Militancy (2001)

    Google Scholar 

  4. Denning, D.: A View of Cyberterrorism Five Years Later. In: Himma, K. (ed.) Internet Security: Hacking, Counterhacking, and Society (2007)

    Google Scholar 

  5. Desmedt, Y.: Some Recent Research Aspects of Threshold Cryptography. In: Okamoto, E. (ed.) ISW 1997. LNCS, vol. 1396, pp. 158–173. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  6. Critical Art Ensemble. Electronic Civil Disobedience and Other Unpopular Ideas. Autonomedia (1996)

    Google Scholar 

  7. Kelly Garrett, R.: Protest in an Information Society: A Review of Literature on Social Movements and New ICTs. Information, Communication and Society 9, 202–224 (2006)

    Article  Google Scholar 

  8. Kracher, B., Martin, K.: A Moral Evaluation of Online Business Protest Tactics and Implications for Stakeholder Management. Business and Society Review (2009)

    Google Scholar 

  9. Kreimer, S.: Technologies of Protest: Insurgent Social Movements and the First Amendment in the Era of the Internet. University of Pennsylvania Law Review (2001)

    Google Scholar 

  10. Lane, J.: Digital Zapatistas. The Drama Review 47 (2003)

    Google Scholar 

  11. Laurie, B., Clayton, R.: “Proof of Work” Proves Not to Work. In: The Third Annual Workshop on the Economics of Inforomation Security (2004)

    Google Scholar 

  12. Manion, M., Goodrum, A.: Terrorism or Civil Disobedience: Toward a Hacktivist Ethic. SIGCAS Comput. Soc. 30(2), 14–19 (2000)

    Article  Google Scholar 

  13. McPhillips, F.: Internet Activism: Towards a Framework for Emergent Democracy. International Association for Development of the Information Society Journal on WWW/Internet (2006)

    Google Scholar 

  14. Neumayer, C., Raffl, C.: Facebook for Global Protest: The Potential and Limits of Social Software for Grassroots Activism. In: Community Informatics Conference: ICTs for Social Inclusion: What is the Reality (2008)

    Google Scholar 

  15. Rolfe, B.: Building an Electronic Repertoire of Contention. Social Movement Studies 4, 65–74 (2005)

    Article  Google Scholar 

  16. Sunstein, C.: Echo Chambers. Princeton University Press (2001)

    Google Scholar 

  17. Thomas, J.: Ethics of Hacktivism. Information Security Reading Room (2001)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Bonneau, J. (2014). Digital Immolation. In: Christianson, B., Malcolm, J. (eds) Security Protocols XVIII. Security Protocols 2010. Lecture Notes in Computer Science, vol 7061. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-45921-8_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-45921-8_6

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-45920-1

  • Online ISBN: 978-3-662-45921-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics