a r t i c l e
i n f o
Article history:
Available online 14 August 2013
Keywords:
Anonymity
Tor
Hidden services
Unethical content
Censorship
a b s t r a c t
Deindividuation theory informs us that anonymity is likely to beget unethical or violent behavior. Since
2002, Tor has implemented hidden services that allow users to host platforms anonymously and these
have behaved accordingly with deindividuation theory: the services are used mostly for unethical content. This article realizes the rst systematic analysis of users behavior on Tor hidden services. After classifying 1171 services into 23 categories, and carrying out a content analysis of 2165 posts, the article
concludes that unethical content is quantitatively and qualitatively more preponderant than ethical content. The advantages of anonymity to store and access this ethical content do not balance the negative
impacts caused by the unethical content. Freedom of expression and the lack of censorship, if theoretically praiseworthy, are overshadowed by what users have done with it: using Tor hidden services in
unethical ways. Unethical content is undesirable by its very nature of affecting people negatively, which
should lead us to reconsider the development of the Tor hidden services. For users simply wishing to stay
anonymous and to act ethically, the use of Tor and of web services located in countries with a morally
balanced legal system are sufcient. The support for the further development of Tor hidden services
should hence stop, which would not hinder the functioning of Tor as an anonymity provider to those
needing it.
2013 Elsevier Ltd. All rights reserved.
1. Introduction
In June 2007, Tariq Biasi, 23, blogged criticisms of the Syrian
policy on the use of their intelligence services. He argued that Syrian intelligence authorities focused on domestic spying instead of
focusing more appropriately on foreign military sources (Spitzer,
2009). Not long later, the Syrian intelligence services arrested
and questioned him. They charged him 6 months following his arrest with undermining national sentiment and publishing false
information (Spitzer, 2009). A year after his arrest, in May 2008,
a court sentenced him to 3 years in prison. The case of Tariq Biasi
is not uncommon, and is a reality for many activists who put their
life in jeopardy by criticizing the authorities of the country they
live in. For activists like Biasi, remaining anonymous can be a matter of avoiding life-threateningconsequences. Furthermore, for
many activists, remaining anonymous is not enough; they also
need to ensure that their writings will not be suppressed by
authoritarian regimes. For instance, in 2010, while Tunisians, Libyans, and Egyptians were successfully toppling their authoritarian
regimes, they were circumventing censorship in their own coun-
2806
services, which can be advantageous if one does not seek to broadcast their ideas to a large public audience, but which also constitutes a hindrance for researchers.
Following Tors technical efforts to offer solutions to protect a
users anonymity and to circumvent state censorship, it is fair to
ask: What do users do with their anonymity on hidden services?
What type of content do users generate? How do they behave on
Tor hidden services?
No previous studies have looked systematically at the content
available on the Tor hidden services. Opponents to unrestrained
free speech often invoke the threats to national security and to
the weakest members of society that a complete censor free society represents (Gelber, 2002; Stone, 2009). On the web, threats
to individuals and unethical behaviors already take place. For instance slander damaging peoples reputation and disturbing their
mental equanimity. But victims can at least attempt legal actions
as a remedy to remove this damaging content (Levmore & Nussbaum, 2010). With hidden services, this is not possible. In this article, looking at the behavior of individuals acting under the
condition of anonymity reveals what users have done with this
anonymity. Unfortunately, the study of 1171 sites, and a content
analysis of 2165 posts showthat unethical content and behaviors
overshadow ethical ones, quantitatively but also qualitatively.
The viciousness of stances and content dwarf the low benecial
impact that hidden services have.
This article is divided into four parts. Firstly, the article provides
a short literature review that supports the elaboration of two
hypotheses the research addresses: content on Tor hidden services
relates to challenging the State authority in order to establish a
democratic order; and, content on Tor hidden services challenges
ethics. Secondly, the methodology is explained. Thirdly, the article
presents the results of the research in detail. And fourthly, the article delves into a discussion of the implications of the results for Tor
hidden services.
2. Research context and two hypotheses
Hidden services differ from the web technically speaking in two
ways: they cannot be shutdown hence preventing censorship, and
they guarantee the complete anonymity of the users of the services, unlike the web, as the users use Tor to access the services.
On the web, anonymity, understood as the noncoordinatability
of traits (Wallace, 1999), is supercial. A trait can be a persons facial features, their name, or their IP address. When these traits are
linked together, a person can be recognized and is therefore no
longer anonymous. Various agents (e.g. law enforcement agencies
and Internet service providers) have the possibility to coordinate an
IP address to a persons identity. When using Tor, this possibility
does not exist. It is not possible to know a users IP address.
Furthermore, hidden services evade censorship at two different
levels. A site on the web has at least two features: the IP address of
the server, and the name associated with the IP address. A law
enforcement agency wishing to ban or enforce the ban of certain
online content can try to bring either of these features down. For
the former, the law enforcement agency can rst ban the IP address
at the level of the Internet service provider. It can also use the IP
address to localise the server, and disconnect it or remove the content directly from the server if located within its jurisdiction. For
the name associated with the IP address, law enforcement agencies
can, again if it is located under its jurisdiction, delete the entry in
the authoritative Domain Name Server that a user needs to contact
to obtain the match between the name and the IP address. The
architecture of the web is hence prone to censorship and hidden
services remove these two weaknesses. In Torhidden services,
the server hosting the content gives his name generated from its
public key to introduction points. These points do not know either
the IP of the server or its location, but know the circuit that links to
the server. When someone requests the website, the request goes
rst to a distributed hash table that contains the location (still by
circuit rather than by real IP) of the introduction points. The query
is then re-routed towards the server. Hidden services hence can
prevent anyone from censoring content on them, as it is impossible
to know under which jurisdiction the service hosting the service is
located. On Tor hidden services, anonymity also means that it is
not possible to nd the administrator of the service in contrast to
the web.
These technical differences between the web and Tor hidden
services are critical for a few people. The arrest of the Syrian blogger Tariq Biasi presented in the introduction epitomized what writers and leaders of subversive movements require: an environment
free of censorship and where the authors cannot be easily identied if they are located in a country where their writings can put
them into jeopardy. Tor hidden services offer such an environment.
The rst of two hypotheses considered is therefore positive in considering what the development of Tor hidden services brings to
society:
H1. Content on hidden services relates to challenging the State
authority in order to establish a democratic order.
If the rst hypothesis H1 is valid, it will form a strong argument
to justify the praiseworthiness of the use of Tor hidden services.
Challenging the States decision without fearing repression is an
essential component of democracy, and Tor hidden services would
support this purpose. But anonymity, as implemented by Tor hidden services, may further nurture less praiseworthy sentiments
within individuals, leading to content of a completely different
nature.
Anonymity has two consequences. The rst one is to minimize
accountability (Wallace, 1999). The second one, less trivial, is to
protect informational privacy. Privacy has an inherent value that
serves to remove pressure to conform, to be free from censure
and ridicule, to promote autonomy and to promote human relations (Gavison, 1980). People are more likely to conform and to
censor themselves when under the watch of others. But the promotion of non-conformity can also result in expressions of values
undermining and threatening the weakest members of societies,
with hate speech or child pornography surging up on networks.
The legal expert Ruth Gavison notes that criminals and con artists
need this privacy for their offenses (Gavison, 1980). What are the
effects of ensuring the anonymity of usersand non-censurability
of material on hidden services?
We have no account of the effects of anonymity on the hidden
web or of users behaviors. On the other hand, accounts exist in the
eld of psychology of the effects of anonymity on self-interested
unethical behavior in laboratory conditions (Nogami, 2009). An
unethical behavior is a behavior affecting another individual negatively in their interests, welfare or expectations of others, but it
does not have to affect the instigator of the behavior positively
(Brass, Buttereld, & Skaggs, 1998, p. 32). A self-interested unethical behavior is on the other hand carried out for the sole purpose
of affecting the actor positively in his own interests. In one experiment, the researcher Tatsuya Nagomi tested self-interested unethical behavior with regards to money. She asked four groups of
students to ip a coin twice and away from her gaze and to come
back totell her the result. She told the rst group of students that
their results would be identiable; the second that they would
be identiable and that they would have a reward if they obtained
two times tails; the third group that their results would be anonymous; and the fourth one that their results would be anonymous
and that they would receive a reward if they obtained two times
tails. Both groups that were not identiable obtained a much
higher number of two times tails than the two identiable ones,
regardless of the reward (17 percentage points higher in average).
She concluded that anonymity fosters self-interested unethical
behavior.
The experiment empirically demonstrated what the philosopher Plato had imagined 24 centuries earlier with the rings of
Gyges. He imagined a ring that can make a person invisible. One
such ring is given to a just person, and another to an unjust person. He writes:
No man would keep his hands off what was not his own when
he could safely take what he liked out of the market, or go into
houses and lie with any one at his pleasure, or kill or release
from prison whom he would, and in all respects be like a God
among men. Then the actions of the just would be as the actions
of the unjust; they would both come at last to the same point
(Plato, 2000, p. 34).
2807
2808
The different categories for the services and posts found were
created empirically following data collection. The different
categories of content were used to classify the content of the
1171 services, as well as the content of the discussions on the forums. All content was parsed into 23 categories (e.g. weapons,
drugs), which are listed in Appendix A. Nine categories were used
to describe unethical content, while 13 categories describe ethical
content, and one category was reserved for content of unknown
type.
3.3. Analytical instruments
Firstly, in order to determine if ethical services and unethical
services differ quantitatively, the frequency of ethical and unethical
posts as a proportion of all posts was calculated. The quantitative
analysis was used in order to be able to assess if one category of
services was more preponderant than the other, and to what
extent.
Secondly, a content analysis of representative examples was
carried out to gauge the qualitative relevance of the content about
subversion, and the relevance of the difference between ethical
and unethical content. The mixture of quantitative and qualitative
data which was used to ensure that the inferences drawn are valid
is not unusual in the eld of studying online communications
(Hara, Bonk, & Angeli, 2000; Henri, 1992). There is no single approach to content analysis, but the method is particularly well suited for comparing and categorizing sets of data (Schwandt, 1997).
As the primary aim of content analysis in the context of this research is to differentiate between three categories subversive,
ethical and unethical content the method is appropriate. The categorizing of the topics into 23 categories identied asethical or
unethical is insufcient to comprehensively describe the available
content on Tor hidden services. All unethical topics can be discussed in a certain manner that may still be regarded as ethical.
For instance, drug consumption is unethical. But academic studies
on drug uses will strive to approach the topic so it is considered
within ethical boundaries. Furthermore, people who have been
subject to trauma, for instance child abuse, can feel more condent
talking about the topic on Tor hidden services as they are anonymous this is what the psychologist John Suler referred to as benign disinhibition (Suler, 2004).
Content analysis can grasp and reveal the psychological and social elements of users interactions on Tor hidden services. More
specically, it can answer the following questions: do users show
signs of disinhibition? And if yes, is it a type of benign (ethical)
or malign (unethical) disinhibition? Suler, who rst explained reasons for disinhibition online, acknowledged that the distinction between the two concepts can be complex (Suler, 2004). One could
use lists of words to try to categorize a post as being neutral, or
as a case of benign or malign disinhibition. Researchers, such as
Goodwin and Goodwin (1992), have developed frameworks to look
for verbal markers which could be used to categorize the text
depending on the display of polite, rude, or aggressive makers.
But this is not sufcient. The context of the post, for instance a user
politely requesting crude photos of cannibalism, must still be taken
further into account to assess the ethicality of the post. Suler
reached a similar conclusion that merely looking at hostile words
was insufcient for separating benign disinhibition from malign
disinhibition (Suler, 2004).
The main criterion to identify benign disinhibition is the sharing
of personal information in an attempt to better understand and
develop oneself (Suler, 2004). Such a criterion requires an in-depth
analysis of the content of the posts. Naturally, judging peoples
intention only from their own written words online to determine
if they truly engaged in a psychological process of self-reection
is dependent on the person making the judgment. By analyzing
the content and highlighting the thought process behind categorizing behaviors as malign or benign, the rationales behind the judgment should become clear and convincing. As not all 2165 posts
could be analyzed in-depth, a few examples were chosen in function of two criteria: rstly, in function of the most quantitatively
relevant categories that emerged from the rst variable, and secondly, in function of identied recurring themes within theposts.
4. Results
Of the 1171 services surveyed, quantitatively the most representative one belongs to the list of unethical services: it concerns
child pornography (18%). Adding unethical services up, they represented 45% of all listed services, representing an essential portion
of what is present on hidden services Appendix A details the full
results. A few of the categories within unethical services are substantially shocking with for instance talks of cannibalism, of child
abuses, or the category black market which includes woman trafcking and the sale of organs. Assuming that the sale of organs
advertised on hidden services really takes place, the repercussions
on humans lives are far reaching. As it is impossible for law
enforcement agencies to know the location of the posters, it will
prove difcult to shut down the services, to stop the transactions
from happening, and to arrest the individuals behind potentialhuman atrocities. Tor hidden services are hence used in this context
to help support violators of human rights. This is in contrast to
the context for the rst hypothesis content challenging the
States authority to improve human rights.
Furthermore, by simply looking at the list of available services,
there is little evidence that Tor hidden services are used by political
activists at all. There are very few dedicated places to discuss politics (2% of the surveyed services), and it must be noted that the
standard of discussion is rather poor. The posts in these services
are very short, in general no longer than two lines, many consisting
of discussing conspiracy theories in the US, or being very provocative with racist stances. Social movements to subvert authoritarian
regimes do not represent a signicant part of dedicated forums on
the subject, but users could still discuss the topic on general forums.
Yet, on forums, the number of posts in the subversion category
also represents a low average at 1.6% of all the posts across the three
forums (see Appendix A for the details of the distribution). The
posts are quantitatively few, and on top of that, they are short
and are not comparable to the blog posts of political dissidents such
as Tariq Biasi mentioned in the introduction. Many posts are only
provocative discussions that lack in-depth or real political ground.
The following anti-Semitist snippet translated from Das ist Deutschland hier posted between 12 July 2012 and 25 July 2012 illustrates this provocativeness and the lack of real political debate:
war-for-victory: Heil my comrades. We must go to war against
the Turks. Sieg Heil!
adolfs-son: Yes we must massacre the Turks. Sieg Heil from
Bochum
white-power: Im in and join the war from Frankfurt
bernd: ha ha! Look at it kids: three idiots. Wage your imaginary
war you psychos, then well lock you in jail, and society will
simply have spared three psychos. Then the three of you can
ght in your cell with other idiots. Stop with the kid shit and
act like grown men. Really. Grow up.
berndi: Siegheil Siegheil Peeeennniiiissss XDDD
lars: Sieg Heil Comrades fuck all jews Sieg heil Berlin
for-it::)
again::)
2809
2810
better and more appealing choice for them is to use the web in
combination with Tor. Yet, this does not explain per se the poor
quality of the debate on political issues, or the very restricted range
of political issues being debated. The users interests on Tor hidden
services are clearly not on political issues, or on debating them
freeof any slurs. Taking a step further, it is becoming apparent that
the value of Tor hidden services may not lie in keeping the moral
high ground. The analysis of the posts on the forums will exemplify
this point.
In the three forums surveyed, unethical topics far outnumbered
ethical topics. Unethical topics are quantitatively more numerous
than ethical topics, representing 86%, 67% and 62% of all topics
for Das ist Deutschland hier, talk, and OnionForum respectively.
As mentioned in the methodology section, users can address
unethical topics in a sensitive manner. But this does not appear
to happen often. For OnionForum and the German forum, it happened only in 2% of the unethical discussions. On talk, it occurred
a bit more frequently, in 16% of cases.
Three main themes can be distinguished on the three forums,
and which are worth dwelling into: ethical topics, drugs, and child
pornography. Regarding ethical topics, the quality of the content is
in itself disappointing by its banality. The following non-exclusive
list of topics discussed illustrates this: how to survive an apocalyptic event, the Olympics, Jennifer Lopez, the weather forecast, shipping of items, platforms for online poker, global warming, Atlantis,
chemistry, pit-bull ghts, UFOs, albino cockroaches, tea, getting a
girlfriend, poetry, the sinking boat Concordia, the difference of
strength between an elephant and a ant, and purpose of life. This
is an excerpt of such banal conversation on talk posted on 4 July
2012:
m15: What tea do you like to drink? I always mix and match,
but I always include chamomile.
talk
OnionForum 2.0
1. Drugs (44%)
1. Child pornography
(50%)
2. Racial discrimination
(24%)
3. Other unethical topic
(11%)
4. Pornography (6%)
1. Racial discrimination
(19%)
2. Other unethical topic
(19%)
3. Pornography (17%)
5. Hacking (4%)
4. Child pornography
(13%)
5. Hacking (8%)
6. Drugs (8%)
7. Hit man (7%)
8. Black market (7%)
9. Weapons (2%)
majority of the type of discussions on the topic (99%). The following is an excerpt from such a conversation in a thread with 121 responses entitled Why the fuck people are pedophiles?:
t45: Its because, like all sexual deviates, they are morally
bankrupt.
t4b: Yes of course. And why is that? Because God says so. And
why does God exist? Because the bible says so. And why does
the bible say so? Because god created the bible. And how do
we know that is true. Because the bible says so.
t4d: Do you hear voices in your head?
t4 g: Fuck you all Pedos are motherfuckers
t4u@t4 g: No, they are daughterfsckers.
t5f: Why are we even discussing if its right or wrong? In the
end the Pedos will not get of Tor and they will have fucked up
image boards of young girls and boys because they can, and
they will.
t5 g: I discuss it because I want the nazi scumbags, religious
scumbags, puritan scumbags and the like to know their place,
and want to make it very clear what kind of scum they (you)
are.
t5 l: Wait. Nazis were okay with pedo. As long as the result was
blonde no one had issues!
These posts, again, are not very interesting from a utilitarian or
psychological viewpoint. Other posts of general nature can be a lot
more unethical, not only in the slurs but also in their extreme content. The following excerpts posted on talk under the thread title
Young pedo are a perfect example of it:
s0d: As a 17 year old pedole, I dont know if theres anyone like
me I can talk to, I mean, sure theres a bunch of old, or violent
assholesm but I dont know if theres any other underage pedos
like me, thoughts?
s7j I am 45 and have loved adult cock as a child 615 and then
little girls and boys 311 since I can remember. Ive fucked
them, been naked with them outside literally in public. Granted
it was late at night but we had fun going nearly every place we
wanted and left our clothes at home. At one point we even
played truth or dare and got nearly caught doing so.
w5i 17 yr pedo here, u aint alone but u were a little harsh w/the
violent assholes because idk why but something about the
tears, screaming, pain, blood, RAPE of younglings gets my pepe
tingling:D
2811
2812
hidden services are scarce, and that the unethical content trumps
the utilityof any ethical one.
5. Discussion
The unethical content on Tor hidden services can have several
negative impacts. The consumption of child pornography, as already mentioned, may incite the user to become an abuser himself. Similarly, racist speech can nurture incitation to racist action.
An example of such a leap from speech to action happened on 5
August 2012. Wade M. Page was part of a hate group who used
music as a medium for their racist feelings. On 5 August 2012,
Page opened re and killed six people in a Sikh temple in the
US. Two scholars researching hate groups, Robert Futrell and Pete
Simi, explained Pages action by saying: when extremist ideas endure, so does the potential for extremist actions (Futrell & Simi,
2012). Hidden services is similarly a medium used to broadcast
these unethical considerations, and which can foster an individuals thought about committing such acts, especially as he receives support from a communityof like-minded individuals, be
they trolls or not.
On the other hand, the benets from Tor hidden services are
scant. We have seen that blogs are scarce, and those who express
their opinion tend do so using offensive language, often with very
short statements. One could have expected the use of hidden services as a place for benign disinhibition and where political dissidents express their ideas (and support for more open
government, or democracy) in a coherent and comprehensive manner, free of the fear of censorship or repression. But this is not the
case, and as this analysis of public content has shown, it is predominantly used to evade repression from the state, but for matters
that are highly unethical. Dissidents may still use hidden services
such as social network platforms (e.g. with the service mul.tiver.se)
to hold condential and anonymous discussions, for instance to
coordinate their actions without fear of a third party eavesdropping. A plausible explanation for the lack of content from politicaldissidents is the lack of outreach and easy dissemination of content
on hidden services. By posting content online on a server that is located in a democratic state and that supports their movement, a
political dissident does not need to hide the location of the server,
as he already deems the state as unlikely to censor his content by
his very act of posting it there.
The depiction of content available on Tor hidden services brings
us to re-consider what is the role of the services. At the moment,
the hidden services act as a protector of unethical content rather
than as the promoter of a censor-free place for ethical content.
By looking closely into it, one notices that Tor hidden services
are mainly used to evade law enforcement agencies, but not from
non-democratic states, but from liberal ones with laws that have
strong moral and ethical grounds.
Tor hidden services do not promote more anonymity for the
user than Tor itself does. For users wishing to be anonymous, it
is sufcient to use Tor on the web, and the content posted online
will not be attributable to the poster. No one will be able to nd
the IP address of the poster, ensuring the users anonymity. If the
hidden services do not promote more anonymity for the users
than Tor itself, it does however promote a censor-free environment by protecting the hosts location and identity. But we
should note that Tor hidden services are not the only way that
individuals can ensure that some unethical content will not be
censored: users can use servers located in countries with a strong
and very exible jurisprudence on understanding free speech. The
US is such an example. Users wishing to post even racist or Nazi
stances can do so freely on US-based services, and can moreover
remain anonymous if they wish to do so by simply using Tor.
2813
Category
Unethical services
Child
206
28 (6%)
pornography
(18%)
Hacking
77 (7%) 16 (4%)
42 (11%)
8 (2%)
427
(32%)
37
(3%)
25
(2%)
49
(4%)
Black market
70 (6%) 14 (3%)
52 (13%)
Pornography
(excluding
child
pornography)
Drugs
General forum
with unethical
topics
Hit man
Weapons
68 (6%) 35 (8%)
10 (2%)
50 (4%) 16 (4%)
15 (1%) 39 (9%)
141 (35%)
20 (5%)
6 (0%)
91
(7%)
15 (1%) 15 (3%)
11 (1%) 5 (1%)
0 (0%)
13 (3%)
0 (0%)
11
(0%)
207
(16%)
853
(65%)
Racial
8 (1%)
discrimination
Subtotal
520
(45%)
40 (9%)
32 (8%)
208 (47%)
318 (80%)
76 (17%)
5 (1%)
73
(6%)
0 (0%)
File sharing
Informatics
136
7 (2%)
(12%)
72 (6%) 33 (7%)
51 (4%) 50 (11%)
Bitcoin
29 (2%) 10 (2%)
31 (8%)
Everything
27 (2%) 0 (0%)
0 (0%)
Search engine
27 (2%) 0 (0%)
0 (0%)
99
(8%)
0 (0%)
153
(12%)
19
(1%)
35
(3%)
10
(1%)
9 (0%)
Ethical services
Ethical and
specic topic
(other)
Personal
164
(14%)
0 (0%)
35 (9%)
8 (2%)
Anarchism
Energy politics
Communism
Subtotal
2 (0%)
1 (0%)
0 (0%)
242 (53%)
0 (0%)
0 (0%)
0 (0%)
83 (20%)
0 (0%)
0 (0%)
Unknown
Total
5 (0%)
4 (0%)
1 (0%)
554
(47%)
97 (8%)
1171
450 (100%)
(100%)
0 (0%)
4 (0%)
401 (100%)
0 (0%)
69
(5%)
0 (0%)
0 (0%)
0 (0%)
467
(35%)
0 (0%)
1320
(100%)
2814
References
Acquisti, A., & Grossklags, J. (2007). What can behavioral economics teach us about
privacy? In A. Acquisti & S. D. C. d. Vimercati (Eds.). Digital privacy: Theory,
technologies and practices (pp. 363377). Auerbach Publications.
Barlow, J. P. (1996). A declaration of the independence of cyberspace. In. Davos,
Switzerland: EFF.
BBC News (2013). Cispa bill on cyber security passed by the US House. In BBC News.
Bleich, E. (2011). Balancing public values The big picture. In The freedom to be
racist: How the United States and Europe struggle to preserve freedom and combat
racism. Oxford Scholarship Online.
Braithwaite, J. (1989). Crime, shame and reintegration. New York: Cambridge
University Press.
Brass, D. J., Buttereld, K. D., & Skaggs, B. C. (1998). Relationships and unethical
behavior: A social network perspective. Academy of Management Review, 23(1),
1431.
Citron, D. K. (2010). Civil rights in our information age. In S. Levmore & M. C.
Nussbaum (Eds.), The offensive internet. Cambridge, Massachusetts, London:
Harvard University Press.
Dingledine, R., Mathewson, N., & Syverson, P. (2004). Tor: The second-generation
onion router. Paul Syverson, 117.
Endrass, J., Urbaniok, F., Hammermeister, L. C., Benz, C., Elbert, T., Laubacher, A.,
et al. (2009). The consumption of internet child pornography and violent and
sex offending. BMC Psychiatry, 9(43), 17.
Freyd, J. J., Klest, B., & Allard, C. B. (2005). Betrayal trauma: Relationship to physical
health, psychological distress, and a written disclosure intervention. Journal of
Trauma & Dissociation, 6(3), 83104.
Futrell, R., & Simi, P. (2012). The sound of hate. New York: The New York Times.
Gavison, R. (1980). Privacy and the limits of law. The Yale Law Journal, 89(3),
421471.
Gelber, K. (2002). Speaking back: The free speech versus hate speech debate.
Amsterdam: John Benjamins Publishing Co..
Goodwin, C., & Goodwin, M. H. (1992). Assessments and construction of context. In
A. Duranti & C. Goodwin (Eds.), Rethinking context: Language as an interactive
phenomenon. Cambridge: Cambridge University Press.
Hara, N., Bonk, C. J., & Angeli, C. (2000). Content analysis of online discussion in an
applied educational psychology course. Instructional Science, 28, 115152.
Henri, F. (1992). Computer conferencing and content analysis. In A. R. Kaye (Ed.),
Collaborative learning through computer conferencing: The Najaden papers
(pp. 115136). New York: Springer.
ITU (2012). Internet users. In ITU (Ed.). Geneva: ITU.
Leiter, B. (2010). Cleaning cyber-cesspools: Google and free speech. In S. Levmore &
M. C. Nussbaum (Eds.), The offensive internet. Cambridge, Massachusetts,
London: Harvard University Press.
Lessig, L. (2006). Code (2 ed.). New York: Perseus Books Group.
Levmore, S., & Nussbaum, M. C. (2010). The offensive internet. Cambridge,
Massachusetts, London: Harvard University Press.
Nogami, T. (2009). Reexamination of the association between anonymity and selfinterested unethical behavior in adults. The Psychological Record, 59, 259272.
Park, J., Ahn, B., Myung, R., Lim, K., Lee, W., & Cha, M. (2011). Revolution 2.0 in
Tunisia and Egypt: Reactions and sentiments in the online world. In The 5th
international AAAI conference on weblogs and social media. Barcelona: ICWSM.
Plato (2000). The republic. London: Dover Publications.
2815
Tor Project (2011). Tax return ling instructions Form 990. In Tor Project (Vol.
2012).
Tor Project (2012). Tor Metrics Portal: Users. In (Vol. 2012).
The United States of America v. Marc Peter Willems, Michael Evron, Jonathan
Colbeck, Ryan Rawls, Jonathan Dugan, Brian Colbeck, Charles Bigras, George
Matzek (2011). United States District Court for the Central District of California.
Wallace, K. (1999). Anonymity. Ethics and Information Technology, 1, 2335.
Youmans, W. L., & York, J. C. (2012). Social media and the activist toolkit: User
agreements, corporate interests, and the information infrastructure of modern
social movements. Journal of Communication, 62, 315329.
Zimbardo, P. G. (1969). The human choice: Individuation, reason and order, versus
deindividuation, impulse and chaos. In W. J. A. D. Levine (Ed.). Nebraska
Symposium on Motivation (Vol. 17, pp. 237307). Lincoln: University of
Nebraska Press.