internet-etiquette

On his analysis, Fontana (2014) asked simple but yet difficult to answer questions: ‘Where is that data stored? Who owns it? Who has access to it? And who is liable for its protection, unintended release or stealth aggregation’. He addressed that 25 billion devices to be connected by 2020; nevertheless, privacy and anonymity are two of the century biggest concerns. While anonymity armed with honesty is good for survey, justice and legal engagements where it encourage the criticizing, voting, performance evaluation for improvement or investigation purposes, applications like SnapChat, Secret App, Tinder and Tor are a fertilized soil of good and evil alike.

AlQassemi (2014) from UAE argues on “State” website that anonymity is dangerous and important at the same time; nonetheless, it needs ‘a delicate balance to be struck in order to protect individuals’ freedoms online and prevent misuse of the Internet’.

Applebaum (2014) reflected an important point of view of linking the cyberspace to offline world when he states that ‘anyone who writes online should be as responsible for his words as if he were speaking them aloud’.

It’s about responsibility which comes with real identity (Clapperton, 2013).

Indeed, MENA internet users comply to the charter of the human rights and principles of the internet resumed by iGmena’s (no date) in “Click Rights”: ‘everyone has the right to privacy online’ including the right to encryption, and online anonymity; not to forget self-assessment and transparency, ‘based on principles of openness, inclusive participation and accountability’ of information posted. These are ethical principles that apply on individuals and groups. The bottom line, ‘people are a product of what they read, learn, understand and experience’ iGmena (no date).

Cook (2010) claims that protecting the people’s domain of privacy without fear of been penalized and encouraging constructive behavior in online discussions are far progressive ‘than trying to chain people to their names’.

On the other hand, internet lawmakers should protect the end users identities and secure their communications as sacrosanct, because ‘if they do not, the Internet will become a universal tool of oppression instead of a tool of empowerment’ Rodrigues (2013).

Few months ago, anonymity has been discussed at Internet Governance 2014 (IGF2014). However, the cyberwar, to reveal or conceal identity, thus far without a definite winner between privacy activists, human rights defenders on internet, advocacy organizations and MENA’s governments.

So how to behave yourself on the internet?

Reference List

This post was originally prepared as part of HIVOS INTRODUCTION TO INTERNET GOVERNANCE 1410 (B), FINAL ASSIGNMENT.

Published by Rami Alhames

Syrian in blood and Identity, Brazilian in Heart and Liberty. Community Manager, Editor, Writer and Translator of Portuguese, Arabic and English.

Leave a comment