J.Nathan Matias takes a clear-eyed look at The Real Name Fallacy, the belief that forcing users to communicate using real names will improve online conduct. In my experience, the biggest problems come on platforms like Twitter where it's a mix of real and pseudonymous users.
Roughly half of US adult victims of online harassment already know who their attacker is, according a nationally-representative study by Pew’s Maeve Duggan in 2014 . The study covered a range of behaviors from name calling to threats and domestic abuse. Even if harassment related to protected identities could be “solved” in one effort to move to ‘real names’, more than half of US harassment victims, over 16 million adults, would be unaffected.
Conflict, harassment, and discrimination are social and cultural problems, not just online community problems. In societies including the US where violence and mistreatment of women, people of color, and marginalized people is common, we can expect similar problems in people’s digital interactions . Lab and field experiments continue to show the role that social norms play in shaping individual behavior; if the norms favor harassment and conflict, people will be more likely to follow. While most research and design focuses on changing the behavior of individuals, we may achieve better results by focusing on changing climates of conflict and prejudice [17,16].
• The real name fallacy (The Coral Project via Medium)
Image: Harikrishnan Tulsidas
For years, libraries across America have paid to subscribe to lynda.com for online learning content; four years ago, lynda.com became a division of Linkedin, and this year, the company has informed libraries that they're migrating all lynda.com users to Linkedin Learning, which would be fine, except Linkedin only allows you to access Linkedin Learning if […]
I’ve never been able to get into Doctor Who, but I loves me some David Tennant. His performances in Broadchurch (Not that crappy American Gracepoint remake nonsense, mind you), Jessica Jones and, most recently, Good Omens, have been absolutely amazing. There’s something about him that draws the eye and makes you believe in what he’s […]
In a new paper for IEEE Security, a trio of researchers (two from Cambridge, one from private industry) identify a de-anonymizing attack on Iphones that exploits minute differences in sensor calibration: an Iphone user who visits a webpage running the attack code can have their phone uniquely identified in less than a second, through queries […]
If your office works at all, it uses Microsoft Office. Those icons for Word, PowerPoint, and Outlook are as familiar around some workplaces as the coffee machine. So familiar, in fact, that they get taken for granted – and rarely used to their full potential. Whether you need a crash course in the essential tools […]
It’s a great time to be a maker. 3D printers are on store shelves for anyone to buy, and coder kits like Arduino and Raspberry Pi are letting kids as young as 9 or 10 dive into the Internet of Things. Here are a few examples of our favorite tech toys, all priced low enough […]
Want to make a hit? The right software is out there for anyone, but any music producer will tell you that finding the right sound can still take time and talent. Still, the right tools are a great shortcut, which makes this Synth & Sound Pack Bundle absolutely priceless. And now that it’s on sale […]