Skip to main content

Real Name Verification Law on the Internet: A Poison or Cure for Privacy?

  • Conference paper
  • First Online:
Economics of Information Security and Privacy III

Abstract

As the internet media has become more widely used over time, public opinions formed by internet discussions affect political and social issues more critically. While the internet space guarantees equal status for every participant and equal opportunity in terms of freedom of speech based on anonymity, baseless rumors, personal defamation, and privacy invasion against particular individuals and groups are more likely to happen rather than in the face-to-face offline communications. In order to prevent this undesirable effect, the South Korean government implemented Real Name Verification Law in July 2007 by which discussion participants should pass verification process in order to express their opinions in most websites. This study examines the effects of Real Name Verification Law in several aspects. By applying content analysis to abundant data of postings in a leading discussion forum that is subject to the law, the results suggest that Real Name Verification Law has a dampening effect on overall participation in the short-term, but the law did not affect the participation in the long term. Also, identification of postings had significant effects on reducing uninhibited behaviors, suggesting that Real Name Verification Law encouraged users’ behavioral changes in the positive direction to some extent. The impact is greater for Heavy User group than for Light and Middle User groups. Also, discussion participants with their real names showed more discreet behaviors regardless of the enforcement of the law. By analyzing the effect of this policy at the forefront of internet trends of South Korea, this paper can shed light on some useful implications and information to policy makers of other countries that may consider certain type of internet regulations in terms of privacy and anonymity.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    ‘Dog Shit Girl’ case has changed public sentiment in favor of Real Name Verification Law, as discussed more specifically in Sect. 2.

  2. 2.

    http://www.strategyanalytics.com/default.aspx?mod=PressReleaseViewer{\&}a0=4748

  3. 3.

    Second: Singapore (88%), 3rd: Netherlands (85%), USA (60%) (at the end of 2008).

  4. 4.

    When a girl riding a South Korean subway refused to clean up her dog’s excrement, a witness took pictures of her and posted them on a popular website, along with an account of her misbehavior. Within hours, she and her dog were recognized everywhere they went. Within hours, she was labeled “dog-shit-girl” and her pictures and parodies were everywhere on the cyberspace. Within days, her identity and her past were revealed. Request for information about her parents and relatives started popping up and people started to recognize her by the dog and the bag she was carrying as well as her watch, clearly visible in the original picture. All mentions of privacy invasion were shouted down with accusations of being related to the girl.(Source:http://boingboing.net/2005/06/29/woman_doesnt{\_}clean{\_}u.html)

  5. 5.

    It is not an exaggerated statement that almost all frequently-visited websites by South Korean people came to be laid under this restriction

  6. 6.

    Resident registration number is equivalent to social security number in the US. This is a 13-digit number issued to all residents of South Korean citizens. It is used to identify people in various private transactions such as in banking and employment. It is also used extensively for online identification purposes.

  7. 7.

    http://agora.media.daum.net/ According to the official announcement of the portal operator, the total number of postings in all categories of forums was 784,107 by 74,949 participants in the period April 1, 2008–June 18, 2008, and the number unique visitors were 7.9 million in April, 2008

  8. 8.

    http://www.chosun.com/

  9. 9.

    http://www.freezone.co.kr/

  10. 10.

    Most discussion board systems automatically block writings with well-known swear words by their own filtering algorithm, so it is common for participants to use these words in a slightly different way. These words were regarded as homogeneous words to the original swear words in this paper.

  11. 11.

    Two independent coders rated each set of postings on the basis of the provided standards, and cross-checked for coding reliability. Both coders are Ph.D students in social science fields in the US, whose native language is Korean.

  12. 12.

    After sorting by the number of postings in the given period, every tenth of participants are selected.

  13. 13.

    Some websites including Facebook.com hold their own policy in terms of using users’ real names rather than their nicknames.

  14. 14.

    “Impersonating anyone or anything is not permitted. To encourage people to use their real names on Facebook, we limit the number of times names can be changed.”, “Your account was disabled because the name under which it was registered was fake. We do not allow users to register with fake names, to impersonate any person or entity, or to falsely state or otherwise misrepresent themselves or their affiliations. In addition, Facebook accounts are intended for use by single individuals, so groups, clubs, businesses, or other types of organizations are not permitted to maintain accounts.” (excerpt from Help Center at Facebook.com)

  15. 15.

    http://techcrunch.com/2008/12/17/myspace-quietly-begins-encouraging-users-to-use-their-real-names/

  16. 16.

    The update to Facebook’s comments box plugin was intended to make comments more relevant. Users to a particular site see comments from Facebook friends first and Facebook added public information about users next to their names. (http://www.pcmag.com/article2/0,2817,2381630,00.asp)

References

  1. Acquisti A, Dingledine R, Syverson R (2003) On the economics of anonymity. In: Camp J Wright R (eds) Financial cryptography (FC’03). Springer-Verlag, LNCS

    Google Scholar 

  2. Cohen JE (1996) The right to read anonymously: a closer look at “copyright management” in cyberspace. Conn L Rev 28:981

    Google Scholar 

  3. Cohen JE (2000) Examined lives: information privacy and the subject as object Stan L Rev 52:1373–1398

    Google Scholar 

  4. Danielson P (1996) Pseudonyms, Mailbots, and virtual letterheads: the evolution of computer-mediated ethics In: Ess C (ed) Philosophical perspectives on computer-mediated communication. State University of New York Press, Albany

    Google Scholar 

  5. Diakopoulos N, Naaman M (2011) Towards quality discourse in online news comments. In: Proceedings of the ACM 2011 conference on computer supported cooperative work

    Google Scholar 

  6. Froomkin MA (1995) Anonymity and its enemies. J Online L Art 4

    Google Scholar 

  7. Froomkin MA (1996) Flood control on the information ocean: living with anonymity, digital cash, and distributed database. J Law Commerce 15(2):395–507

    Google Scholar 

  8. Goldberg I (2000) A pseudonymous communications infrastructure for the internet. PhD thesis

    Google Scholar 

  9. Jessup LM, Connolly T, Galegher J (1990) The effects of anonymity on GDSS group process with an idea-generating task. MIS Quarterly 14:3: 313–321

    Article  Google Scholar 

  10. Hwang Y (2007) Critical approach to the implementation of real-name system on bulletin board of the internet: exploring right of anonymous communication, (in Korean). Media Soc 15(2):97–130

    Google Scholar 

  11. Kahai SS, Sosik JJ, Avolio BJ (2003) Effects of leadership style, anonymity, and rewards on creativity relevant processes and outcomes in an electronic meeting system context. Leader Q 14:499–524

    Article  Google Scholar 

  12. Karyda M, Kokolakis S (2008) Privacy perceptions among members of online communities. In: Acquisti A, Gritzalis S, Lambrinoudakis C and De Capitani di Vimercati, S (eds) Digital Privacy: theory, technologies and practices. Auerbach Publications, Boca Raton pp 253–266

    Google Scholar 

  13. Kim K (2009) The technical, legal and business issues of the real-name-verification requirement (in Korean). Hum Right Justice 7:78–97

    Google Scholar 

  14. Marx G (1999) What’s in a name? some reflections on the sociology of anonymity. Inform Soc 15(2)

    Google Scholar 

  15. McLeod PL, Baron RS, Marti MW, Yoon K (1997) The eyes have it: Minority influence in face-to-face and computer-mediated groups. J Appl Psychol 82:706–718

    Article  Google Scholar 

  16. Morio H, Buchholz C (2009) How anonymous are you online? examining online social behaviors from a cross-cultural perspective. AI Soc 23:297–307

    Article  Google Scholar 

  17. Myers DG, Lamm H (1976) The group polarization phenomenon. Psychol Bulletin 83: 602–627

    Article  Google Scholar 

  18. Myung J (2003) Trace of the implementation of real-name system on the internet bulletin board in a public institution (in Korean). Center Law Inform Soc 5:2–13

    Google Scholar 

  19. Park CS, Go MK, Ki S (2008) The impact of anonymity on behavior of comments in online discussion board, manuscript

    Google Scholar 

  20. Pfitzmann A, Koehntopp M (2001) Anonymity, unobservability, and pseudonymity—a proposal for terminology. In: Hannes Federrath (ed) Designing privacy enhancing technologies - Proceedings of the International Workshop on Design Issues in Anonymity and Unobservability vol 2009 of LNCS Springer, New York, NY

    Google Scholar 

  21. Pinsonneault A, Barki H, Gallupe RB, Hoppen N (1999) Electronic brainstorming: the illusion of productivity. Inform Syst Res 10(2):110–133

    Article  Google Scholar 

  22. Postmes T, Spears R, Lea M (1998) Breaching or building social boundaries: side-effects of computer- mediated communication. Comm Res 25(6):689–715

    Article  Google Scholar 

  23. Postmes T, Spears R (1998) Deindividuation and antinormative behavior: a meta-analysis. Psychol Bulletin 123:238–259

    Article  Google Scholar 

  24. Reicher SD, Spears R, Postmes T (1995) A social identity model of deindividuation phenomena. European Rev Soc Psychol 6:161–198

    Article  Google Scholar 

  25. Reidenbach RE, Robin DP, Dawson L (1991) An Application and extension of a multidimensional ethics scale to selected marketing practices and marketing groups. J Acad Market Sci 19(2):83–92

    Article  Google Scholar 

  26. Siegel J, Dubrovsky V, Kiesler S, McGuire TW (1986) Group processes in computer-mediated communication. Organ Behav Hum Decis Process 37:157–187

    Article  Google Scholar 

  27. Spears R, Lea M, Lee S (1990) De-individuation and group polarisation in computer-mediated communication. British J Soc Psychol 29:121–134

    Article  Google Scholar 

  28. Sproull L, Kiesler S (1986) Reducing social context cues: electronic mail in organizational communication. Manag Sci 32(11):1492–1512

    Article  Google Scholar 

  29. Solove DJ (2004) The digital person: technology and privacy in the information age. New York University Press, New York

    Google Scholar 

  30. Solove DJ (2006) A taxonomy of privacy Univ Penn Law Rev 154(3):477–560

    Article  Google Scholar 

  31. Solove DJ (2007) The future of reputation: gossip, rumor, and privacy on the internet Yale University Press New Haven, CT

    Google Scholar 

  32. Woo JW, Nah HS, Choi JM. (2010) An empirical analysis of the effect of real name system on internet bulletin boards South Korea J Pub Admin 48(1):78–96

    Google Scholar 

  33. Walther JB (1992) Interpersonal effects in computer-mediated communication. Comm Res 19(1):52–90

    Article  Google Scholar 

  34. Wood A, Smith M (2001) Online communication: linking technology, identity, and culture. Mahwah NJ, Erlbaum

    Google Scholar 

  35. Zarsky TZ (2004) Thinking outside the box: considering transparency, anonymity, and pseudonymity as overall solutions to the problems of information privacy in the internet society, 58. Univ Miami Law Rev 991:1028–1032

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Daegon Cho .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer Science+Business Media New York

About this paper

Cite this paper

Cho, D. (2013). Real Name Verification Law on the Internet: A Poison or Cure for Privacy?. In: Schneier, B. (eds) Economics of Information Security and Privacy III. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-1981-5_11

Download citation

  • DOI: https://doi.org/10.1007/978-1-4614-1981-5_11

  • Published:

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4614-1980-8

  • Online ISBN: 978-1-4614-1981-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics