Anonymity on Social Networks


Many users of social networks choose to mask their real identities. This may be done via anonymity (providing no name at all) or pseudonymity (providing a false name).

Some people who may prefer an anonymous or pseudonymous persona include, but are not limited to:

  • Individuals with medical conditions who want to discuss symptoms and treatment without creating a public record of their condition
  • Bloggers and activists engaging in political discourse, especially on controversial issues
  • Teachers and childcare workers
  • Medical professionals, including mental health professionals
  • Law enforcement agents, prosecutors, parole and probation officers, judges, and other court employees
  • Victims of stalking, sexual assault, and domestic violence
  • Children and youth
  • Jobseekers

In fact, anonymity is a useful tool for anyone who prefers to keep a strict separation between an online persona and an off-line identity. It can also be abused by individuals trying to shield their identities while engaging in illegal activities. 

Typically, users who prefer to engage in social networks without divulging their true identity will create profiles using a false name as well as a false email address. If you are considering a pseudonymous profile, refer to the terms of service for the social networking site. Providing false or incomplete information violates the terms of service of some social networking sites. Users should consider using software that masks IP addresses, such as TOR.  Users should also remember to delete all cookies after visiting a social networking site. See PRC’s discussion of cookies in PRC Fact Sheet 18: Privacy and the Internet -- Cookies.

Bear in mind that it is difficult to truly separate online and off-line identities. It is possible to divulge identifying information through status updates, group memberships, photographs, friend networks and other indicators. In fact, numerous studies have shown that anonymized data can often still be linked to specific individuals.

Read more about anonymization issues:


要查看或添加评论,请登录

NarrowSearch Solutions的更多文章

  • Warrants

    Warrants

    Warrants Warrant is an order of a court which authorizes a law enforcement officer to arrest and bring a person before…

  • Records

    Records

    Crimes & Criminal Records Crime is an act or omission that the law makes punishable. It can also be the breach of a…

  • TAX SEASON TIPS TO PROTECT YOUR PRIVACY

    TAX SEASON TIPS TO PROTECT YOUR PRIVACY

    Tax season officially began on Jan. 1, which means you may soon be receiving “information returns” in your mailbox.

  • DEEP INSERT ATM SKIMMERS MAY POSE A RISK TO YOUR MONEY

    DEEP INSERT ATM SKIMMERS MAY POSE A RISK TO YOUR MONEY

    Most of us have heard about ATM skimmers. They are card readers attached to an ATM that can steal the data off your…

    1 条评论
  • The Social Security Death Master File

    The Social Security Death Master File

    SSA maintains a Death Master File (DMF). The DMF contains records of deaths that have been reported to SSA from various…

  • Can I change my Social Security number?

    Can I change my Social Security number?

    The Social Security Administration (SSA) will issue a new number only in certain very extreme cases. A new SSN may be…

  • Can a school or college use my Social Security number as an identification number?

    Can a school or college use my Social Security number as an identification number?

    Publicly-funded schools and those that receive federal funding must comply with the Family Educational Rights and…

  • How Social Media Networks Can Get You Fired

    How Social Media Networks Can Get You Fired

    Employers are increasingly monitoring what employees post on social networking sites. In fact, many companies have…

  • PRIVACY WHEN YOU PAY: CREDIT, DEBIT, CASH AND MORE...

    PRIVACY WHEN YOU PAY: CREDIT, DEBIT, CASH AND MORE...

    1. Introduction Once you decide to buy something, you then must determine how to pay for it.

  • PRIVACY WHEN YOU PAY: CREDIT, DEBIT, CASH AND MORE....

    PRIVACY WHEN YOU PAY: CREDIT, DEBIT, CASH AND MORE....

    1. Introduction Once you decide to buy something, you then must determine how to pay for it.

社区洞察

其他会员也浏览了