Abstract
The current literature and experience of online activism assumes two basic uses of the Internet for social movements: straightforward extensions of offline organising and fund-raising using online media to improve efficiency and reach, or “hacktivism” using technical knowledge to illegally deface or disrupt access to online resources. We propose a third model which is non-violent yet proves commitment to a cause by enabling a group of activists to temporarily or permanently sacrifice valuable online identities such as email accounts, social networking profiles, or gaming avatars. We describe a basic cryptographic framework for enabling such a protest, which provides an additional property of binding solidarity which is not normally possible offline.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Blodgett, B.M.: And the Ringleaders Were Banned: An Examination of Protest in Virtual Worlds. In: C & T 2009: Proceedings of the Fourth International Conference on Communities and Technologies, pp. 135–144. ACM, New York (2009)
Costanza-Chock, S.: Mapping the Repertoire of Electronic Contention. In: Opel, A., Pompper, D. (eds.) Representing Resistance: Media, Civil Disobedience and the Global Justice Movement (2003)
Denning, D.: Activism, Hacktivism, and Cyberterrorism: The Internet as a Tool for Influencing Foreign Policy. In: Networks and Netwars: The Future of Terror, Crime, and Militancy (2001)
Denning, D.: A View of Cyberterrorism Five Years Later. In: Himma, K. (ed.) Internet Security: Hacking, Counterhacking, and Society (2007)
Desmedt, Y.: Some Recent Research Aspects of Threshold Cryptography. In: Okamoto, E. (ed.) ISW 1997. LNCS, vol. 1396, pp. 158–173. Springer, Heidelberg (1998)
Critical Art Ensemble. Electronic Civil Disobedience and Other Unpopular Ideas. Autonomedia (1996)
Kelly Garrett, R.: Protest in an Information Society: A Review of Literature on Social Movements and New ICTs. Information, Communication and Society 9, 202–224 (2006)
Kracher, B., Martin, K.: A Moral Evaluation of Online Business Protest Tactics and Implications for Stakeholder Management. Business and Society Review (2009)
Kreimer, S.: Technologies of Protest: Insurgent Social Movements and the First Amendment in the Era of the Internet. University of Pennsylvania Law Review (2001)
Lane, J.: Digital Zapatistas. The Drama Review 47 (2003)
Laurie, B., Clayton, R.: “Proof of Work” Proves Not to Work. In: The Third Annual Workshop on the Economics of Inforomation Security (2004)
Manion, M., Goodrum, A.: Terrorism or Civil Disobedience: Toward a Hacktivist Ethic. SIGCAS Comput. Soc. 30(2), 14–19 (2000)
McPhillips, F.: Internet Activism: Towards a Framework for Emergent Democracy. International Association for Development of the Information Society Journal on WWW/Internet (2006)
Neumayer, C., Raffl, C.: Facebook for Global Protest: The Potential and Limits of Social Software for Grassroots Activism. In: Community Informatics Conference: ICTs for Social Inclusion: What is the Reality (2008)
Rolfe, B.: Building an Electronic Repertoire of Contention. Social Movement Studies 4, 65–74 (2005)
Sunstein, C.: Echo Chambers. Princeton University Press (2001)
Thomas, J.: Ethics of Hacktivism. Information Security Reading Room (2001)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Bonneau, J. (2014). Digital Immolation. In: Christianson, B., Malcolm, J. (eds) Security Protocols XVIII. Security Protocols 2010. Lecture Notes in Computer Science, vol 7061. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-45921-8_6
Download citation
DOI: https://doi.org/10.1007/978-3-662-45921-8_6
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-45920-1
Online ISBN: 978-3-662-45921-8
eBook Packages: Computer ScienceComputer Science (R0)