2,495
Views
47
CrossRef citations to date
0
Altmetric
Articles

Challenging the techno-politics of anonymity: the case of cryptomarket users

&
Pages 497-512 | Received 02 Jan 2016, Accepted 05 May 2016, Published online: 20 May 2016

References

  • Abbink, K., & Sadrieh, A. (2009). The pleasure of being nasty. Economics Letters, 105(3), 306–308. doi:10.1016/j.econlet.2009.08.024
  • Amoore, L., & Hall, A. (2010). Border theatre: On the arts of security and resistance. Cultural Geographies, 17(3), 299–319. doi:10.1177/1474474010368604
  • Association of Internet Researchers. (2012). Ethical decision-making and internet research – recommendations from the AoIR ethics working committee (Version 2.0). Retrieved from http://aoir.org/reports/ethics2.pdf
  • Bajc, V. (2007). Surveillance in public rituals: Security meta-ritual and the 2005 U.S. Presidential Inauguration. American Behavioral Scientist, 50(12), 1648–1673. doi:10.1177/0002764207302473
  • Bancroft, A., & Scott Reid, P. (2015). Concepts of illicit drug quality among darknet market users: Purity, embodied experience, craft and chemical knowledge. International Journal of Drug Policy, Early Online. doi:10.1016/j.drugpo.2015.11.008
  • Barlow, J. P. (1996). A declaration of the independence of cyberspace. Retrieved from http://homes.eff.org/~barlow/Declaration-Final.html
  • Barratt, M. J. (2011). Discussing illicit drugs in public internet forums: Visibility, stigma, and pseudonymity. In Proceedings of the 5th International Conference on Communities and Technologies (pp. 159–168). Brisbane: C&T '11. doi:10.1145/2103354.2103376
  • Beer, D., & Burrows, R. (2010). Consumption, prosumption and participatory web cultures: An introduction. Journal of Consumer Culture, 10(1), 3–12. doi:10.1177/1469540509354009
  • Beer, D., & Burrows, R. (2013). Popular culture, digital archives and the new social life of data. Theory, Culture & Society, 30(4), 47–71. doi:10.1177/0263276413476542
  • Branwen, G. (2015). Silk road: Theory & practice. Retrieved from http://www.gwern.net/Silk%20Road
  • Çalışkan, E., Minárik, T., & Osula, A.-M. (2015). Technical and legal overview of the tor anonymity network. Tallinn: NATO Cooperative Cyber Defence Centre of Excellence.
  • Cobb, N. (2007). Governance through publicity: Anti-social behaviour orders, young people, and the problematization of the right to anonymity. Journal of Law and Society, 34(3), 342–373. doi: 10.1111/j.1467-6478.2007.00396.x
  • Coleman, E. G., & Golub, A. (2008). Hacker practice: Moral genres and the cultural articulation of liberalism. Anthropological Theory, 8(3), 255–277. doi:10.1177/1463499608093814
  • Department of Electronics and Information Technology. (2015). Draft national encryption policy. New Delhi: The Indian Ministry of Communications and Information Technology.
  • Duff, C. (2007). Towards a theory of drug use contexts: Space, embodiment and practice. Addiction Research & Theory, 15(5), 503–519. doi: 10.1080/16066350601165448
  • Durkheim, E. (1893). De la division du travail social. Paris: Les Presses universitaires de France.
  • Flint, J., & Nixon, J. (2006). Governing neighbours: Anti-social behaviour orders and new forms of regulating conduct in the UK. Urban Studies, 43(5–6), 939–955. doi:10.1080/00420980600676386
  • Froomkin, A. M. (1999). Legal issues in anonymity and pseudonymity. The Information Society, 15(2), 113–127. doi: 10.1080/019722499128574
  • Froomkin, A. M. (2015). From anonymity to identification. Journal of Self-Regulation and Regulation, 1, 121–138.
  • Gans, H. (1962). Urban villagers: Group and class in the Life of Italian-Americans. New York, NY: The Free Press.
  • Garrett, R. K. (2006). Protest in an information society: A review of literature on social movements and new ICTs. Information, Communication & Society, 9(2), 202–224. doi:10.1080/13691180600630773
  • Gilman, N., Goldhammer, J., & Weber, S. (2011). Deviant globalization: Black market economy in the 21st century. London: Bloomsbury Publishing.
  • Haggerty, K. D., & Ericson, R. V. (2000). The surveillant assemblage. The British Journal of Sociology, 51(4), 605–622. doi:10.1080/00071310020015280
  • Hales, T. C. (2014). The NSA Back Door to NIST. Notices of the AMS, 61(2), 190–192.
  • Hine, C. (2015). Ethnography for the Internet: Embedded, embodied and everyday. London: Bloomsbury Academic.
  • Hobbs, D. (2013). Lush Life: Constructing Organized Crime in the UK. Oxford: Oxford University Press.
  • Holt, T. J., Smirnova, O., Chua, Y. T., & Copes, H. (2015). Examining the risk reduction strategies of actors in online criminal markets. Global Crime, 16(2), 81–103. doi:10.1080/17440572.2015.1013211
  • Julian. (2015). Deanonymizing darknet data. Retrieved from http://atechdad.com/deanonymizing-darknet-data/
  • Karp, D. A. (1973). Hiding in pornographic bookstores: A reconsideration of the nature of urban anonymity. Urban Life and Culture, 1(4), 427–451.
  • Kennedy, H. (2006). Beyond anonymity, or future directions for internet identity research. New Media & Society, 8(6), 859–876. doi:10.1177/1461444806069641
  • Lee, A., & Cook, P. S. (2015). The conditions of exposure and immediacy: Internet surveillance and generation Y. Journal of Sociology, 51(3), 674–688. doi:10.1177/1440783314522870
  • Loader, I., Goold, B., & Thumala, A. (2015). Grudge spending: The interplay between markets and culture in the purchase of security. The Sociological Review, 63(4), 858–875. doi:10.1111/1467-954X.12329
  • Lysonski, S., & Durvasula, S. (2008). Digital piracy of MP3s: consumer and ethical predispositions. Journal of Consumer Marketing, 25(3), 167–178. doi:10.1108/07363760810870662
  • Maddox, A., Barratt, M. J., Allen, M., & Lenton, S. (2016). Constructive activism in the dark web: cryptomarkets and illicit drugs in the digital ‘demimonde’. Information, Communication & Society, 19(1), 111–126. doi:10.1080/1369118X.2015.1093531
  • Martin, J. (2014). Lost on the silk road: Online drug distribution and the ‘cryptomarket’. Criminology and Criminal Justice, 14(3), 351–367. doi:10.1177/1748895813505234
  • Marx, G. T. (1999). What’s in a name? Some reflections on the sociology of anonymity. The Information Society, 15(2), 99–112. doi: 10.1080/019722499128565
  • Milgram, S. (1970). The experience of living in cities. Science, 167(3924), 1461–1468. doi: 10.1126/science.167.3924.1461
  • Moore, D., & Rid, T. (2016). Cryptopolitik and the darknet. Survival, 58(1), 7–38. doi:10.1080/00396338.2016.1142085
  • Natanson, M. (1990). Anonymity: A study in the philosophy of Alfred Schutz. Human Studies, 13(1), 97–101. doi: 10.1007/BF00143042
  • O’Brien, J. (2001). Putting a face to a (screen) name: The first amendment implications of compelling ISPs to reveal the identities of anonymous internet speakers in online defamation cases. Fordham Law Review, 70, 2745–2776.
  • Ohm, P. (2010). Broken promises of privacy: Responding to the surprising failure of anonymization. UCLA Law Review, 57, 1701–1777.
  • Pfitzmann, A., & Hansen, M. (2010). Anonymity, unlinkability, unobservability, pseudonymity, and identity management-a consolidated proposal for terminology. Dresden: TU Dresden, Faculty of Computer Science, Institute of Systems Architecture.
  • Reader, B. (2012). Free press vs. free speech? The rhetoric of ‘civility’ in regard to anonymous online comments. Journalism & Mass Communication Quarterly, 89(3), 495–513. doi:10.1177/1077699012447923
  • Reid, F., & Harrigan, M. (2013). Security and privacy in social networks. In Y. Altshuler, Y. Elovici, A. B. Cremers, N. Aharony, & A. Pentland (Eds.), An analysis of anonymity in the bitcoin system (pp. 197–223). New York, NY: Springer. Retrieved from http://link.springer.com/chapter/10.1007/978-1-4614-4139-7_10
  • Rogaway, P. (2015). The moral character of cryptographic work. Retrieved from http://web.cs.ucdavis.edu/~rogaway/papers/moral-fn.pdf
  • Ruppert, E., Law, J., & Savage, M. (2013). Reassembling social science methods: The challenge of digital devices. Theory, Culture & Society, 30(4), 22–46. doi:10.1177/0263276413484941
  • Schreier, F., & Caparini, M. (2005). Privatising security: Law, practice and governance of private military and security companies. Geneva: Centre for the Democratic Control Armed Forces. Retrieved from http://www.dcaf.ch/content/download/34919/525055/version/1/file/op06_privatising-security.pdf
  • Scott, C. R. (2004). Benefits and drawbacks of anonymous online communication: legal challenges and communicative recommendations. Free Speech Yearbook, 41(1), 127–141. doi:10.1080/08997225.2004.10556309
  • Shilling, C., & Mellor, P. A. (2015). For a sociology of deceit: Doubled identities, interested actions and situational logics of opportunity. Sociology, 49(4), 607–623. doi:10.1177/0038038514546661
  • Simmel. (1903). The metropolis and mental life. In J. Farganis (Ed.), Readings in social theory: The classic tradition to post-modernism (pp. 149–157). New York, NY: McGraw Hill.
  • Skeggs, B., & Yuill, S. (2015). The methodology of a multi-model project examining how Facebook infrastructures social relations. Information, Communication & Society. doi:10.1080/1369118X.2015.1091026
  • Spender, D. (1995). Nattering on the net: Women, power and cyberspace. Melbourne: Spinifex Press. Retrieved from http://dl.acm.org/citation.cfm?id=525249
  • Spitter, M., Klaver, F., Koot, G., & van Staalduinen, M. (2015). Authorship analysis on dark marketplace forums. Proceedings of the IEEE European Intelligence & Security Informatics Conference (EISIC), Manchester.
  • Thompson, E. P. (1975). The crime of anonymity. In D. Hay, P. Linebaugh, J. G. Rule, E. Thompson, & C. Winslow (Eds.), Albion’s fatal tree: Crime and society in eighteenth-century England (pp. 255–344). London: Allen Lane.
  • UN Broadband Commission for Digital Development. (2015). Cyber violence against women and girls: A world-wide wake-up call. Geneva: Broadband Commission for Sustainable Development.
  • Van Hout, M. C., & Bingham, T. (2013a). ‘Silk Road’, the virtual drug marketplace: A single case study of user experiences. International Journal of Drug Policy, 24(5), 385–391. doi:10.1016/j.drugpo.2013.01.005
  • Van Hout, M. C., & Bingham, T. (2013b). ‘Surfing the silk road’: A study of users’ experiences. International Journal of Drug Policy, 24(6), 524–529. doi:10.1016/j.drugpo.2013.08.011
  • Van Hout, M. C., & Bingham, T. (2014). Responsible vendors, intelligent consumers: Silk Road, the online revolution in drug trading. International Journal of Drug Policy, 25(2), 183–189. doi:10.1016/j.drugpo.2013.10.009
  • Vickery, J. R. (2015). ‘I don’t have anything to hide, but … ’: the challenges and negotiations of social and mobile media privacy for non-dominant youth. Information, Communication & Society, 18(3), 281–294. doi:10.1080/1369118X.2014.989251
  • Viseu, A., Clement, A., & Aspinall, J. (2004). Situating privacy online. Information, Communication & Society, 7(1), 92–114. doi:10.1080/1369118042000208924
  • Watters, P. A., & Phair, N. (2012). Detecting illicit drugs on social media using automated social media intelligence analysis (ASMIA). In Y. Xiang, J. Lopez, C.-C. J. Kuo, & W. Zhou (Eds.), Cyberspace safety and security (pp. 66–76). Berlin: Springer Berlin Heidelberg. Retrieved from http://link.springer.com/chapter/10.1007/978-3-642-35362-8_7
  • Williams, D. (1986). The Rebecca riots: A study in agrarian discontent. Cardiff: University of Wales Press.
  • Wirth, L. (1938). Urbanism as a way of life. American Journal of Sociology, 44(1), 1–24. doi: 10.1086/217913

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.