Vous êtes sur la page 1sur 14

North American Philosophical Publications

ANONYMITY AND THE SOCIAL SELF


Author(s): Steve Matthews
Source: American Philosophical Quarterly, Vol. 47, No. 4 (OCTOBER 2010), pp. 351-363
Published by: University of Illinois Press on behalf of the North American Philosophical
Publications
Stable URL: http://www.jstor.org/stable/25734161 .
Accessed: 24/09/2014 01:56

Your use of the JSTOR archive indicates your acceptance of the Terms & Conditions of Use, available at .
http://www.jstor.org/page/info/about/policies/terms.jsp

.
JSTOR is a not-for-profit service that helps scholars, researchers, and students discover, use, and build upon a wide range of
content in a trusted digital archive. We use information technology and tools to increase productivity and facilitate new forms
of scholarship. For more information about JSTOR, please contact support@jstor.org.

University of Illinois Press and North American Philosophical Publications are collaborating with JSTOR to
digitize, preserve and extend access to American Philosophical Quarterly.

http://www.jstor.org

This content downloaded from 192.148.223.119 on Wed, 24 Sep 2014 01:56:14 AM


All use subject to JSTOR Terms and Conditions
AMERICAN PHILOSOPHICAL QUARTERLY
Volume 47, Number 4, October 2010

ANONYMITY AND THE SOCIAL SELF

Steve Matthews
He told me he spent most of his life working on a
research project for the government trying to find out
who financed the pyramids. He worked on it 30 years and
they paid him an incredible amount of money ... he told
them he was pretty sure it was a guy named Eddie.
-Steven Wright

The other one, the one called Borges, is the one things happen to.
-Jorge Luis Borges, Borges and I

I. INTRODUCTION in what they mean and in our purposes for


securing them. A lot has been written about
W e will analyze the concept of anonymity, privacy, and deservedly so; there is reason to
along with cognate notions, and their relation think anonymity, and its cognates, important
to privacy, with a view to developing an as well. 2
understanding of how we control our identity The concept of privacy will be important
in public and why such control is important in to this analysis because it represents a central
developing and maintaining our social selves. value that anonymity targets. Privacy will be
We will take anonymity to be representative construed as being about the proper manage-
of a suite of techniques of nonidentijiability ment of the boundary between a person and
that persons use to manage and protect their the public domain. This boundary can be
privacy. At the core of these techniques is the physical, or it can be a metaphorical bound-
aim of being untrackable; this means that oth- ary where the control at issue is over personal
ers lack the information they would need either information. This suggests that we manage
to intrude physically upon me or to discover our identities on different fronts: the face-
some private facts about me. to-face context of social interaction and the
Anonymity often enough goes together informational context. Anonymity and other
with privacy, but not always. Consider a techniques of nonidentifiability function as
person walking down a foreign street. It is not the gatekeepers of the boundary between our
a physically private situation but no one there private selves and the public domain, and for
knows who you are. 1 On the other hand, when that reason they are important to the control
I cast a postal vote, this act is both private we have over others' perceptions of, and
and anonymous. Privacy and anonymity beliefs about us.
seem to go together because of the way each Having control over one's identifiability,
protects something importantly personal, but of course, has normative implications. If, in
their coming apart suggests a difference both one social context, we present a picture of
©20 10 by the Board of Trustees of the University of Illinois

This content downloaded from 192.148.223.119 on Wed, 24 Sep 2014 01:56:14 AM


All use subject to JSTOR Terms and Conditions
352 /AMERICAN PHILOSOPHICAL QUARTERLY

ourselves that radically dissociates from a ity, certainly. We construe it here as about
picture we present in a different social con- the control and management of the boundary
text, quite clearly this is morally ambivalent separating our physical and informational
territory. On the one hand, it enables us to self-presentations from public access. (We
protect ourselves in morally permissible will assume this position on privacy, not argue
ways-consider, for example, institutions for it. 3) When we desire anonymity, it is to
like Alcoholics Anonymous-and on the avoid being tracked down and to avoid being
other hand, it permits a range of moral vices, identified as the person who otherwise occu-
for it also shields us from accountability for pies a certain social position or role. As we
wrongdoing. However, we will not dwell too will see, one may give up privacy yet retain
much on the vices. We will focus instead on anonymity, and one may lose anonymity and
the importance of the separation between retain privacy.
the private and the public as facilitated by The way anonymity was just described
anonymity and other such techniques of might make it seem as though it always gives
control. At the micro level, situations arise rise to a state that is chosen. This is not true.
where such separation is morally permissible, There is a loose partition between desiring
even desirable, as when we publicly express one's anonymity and simply being anony-
appreciation for the less-than-palatable meal mous without really thinking too much about
we have just been served, or simply when the it, and there is another very important range
social situation makes it appropriate for us to of cases we must unfortunately ignore here
keep to ourselves thoughts we know others that we might describe as forced anonymity.
will not accept. These normative features of Think of cases of political disappearance, or
protection and reticence are developed in two cases of refugees in detention who cannot be
final sections. A reflection on fame illumi- named, and so on. We will be focusing mainly
nates the value of the control the nonfamous on the first kind of case, and to a lesser extent
can usually expect. The famous often have the second kind of case. 4
little control over their public persona, which Defining the condition of privacy is a
then comes to infiltrate their sense of who useful first step in seeing why anonymity at
they really are. They find it hard to integrate least seems to go with it. Privacy's condition
their public and private narratives, to recon- involves the choice and control we typically
cile these diverging views of themselves. In exercise to free ourselves from public access
a final section, we consider the importance of (including "informational" access). As a
the divide between our private thoughts and condition, then, privacy is not captured by a
their public expression. Maintaining control physical description alone, but is inherently
here, it is argued, provides an important normative. An elderly person may reluctantly
normative source for the construction of the not be able to avoid living a solitary existence.
social self. But so understood, far from being in a
condition of privacy, his separation is the
2. PRIVACY AND ANONYMITY source of some other morally wretched
SEEM TO Go TOGETHER state; at the very least he is not in a condition
Anonymity and privacy are often men- whereby he exercises his privacy. His solitary
tioned in the same breath, and indeed these condition is not a sufficient condition of his
concepts do come together in very many privacy, but rather supplies the conditions
circumstances, but not always. Our concept for his neglect and misery. Separation from
of privacy is wider and messier than anonym- public access is a necessary condition of

This content downloaded from 192.148.223.119 on Wed, 24 Sep 2014 01:56:14 AM


All use subject to JSTOR Terms and Conditions
ANONYMITY AND THE SOCIAL SELF I 353

privacy, but in addition, this separation must barrier between one's physical self and
be understood as autonomously chosen and others-a door, wall, curtain, partition,
controlled by that person. Privacy, seen as an building, and so on-and on the other
aspect of autonomy, is something we achieve hand it means whatever control mechanism
in a context where its possession is part of may be put in place preventing leakage of
how a community respects its citizens. That is one's personal information-for example,
why our elderly citizen does not have privacy, encryption software, passwords, locked
for he has not chosen his separation from the filing cabinets, secret numbers, and so on.
rest of us. A person who chooses anonymity regulates
There are many occasions where we con- such boundaries, thereby preventing others
duct ourselves so as to remain anonymous from connecting her name with her identity
and thereby retain privacy. An anonymous and in that way ensures her privacy. For
letter sent to a newspaper, an anonymously example, someone who writes an unsigned
written short story, a financial contribution letter to a newspaper thereby ensures her
to a political party: in each case withholding anonymity and her privacy. Anonymity and
or obscuring one's identity also has the effect privacy go together here, but this is not always
of ensuring one's privacy. Conversely, there the case.
are many occasions in which actions we take
to ensure privacy automatically ensure ano- 3· PRIVACY AND ANONYMITY
nymity. A silent number blocks unsolicited SOMETIMES COME APART
phone access to my home; privacy provi- 3.1 Physical Privacy without Anonymity
sions and laws prevent my name from being We may know quite a bit about the man
disclosed by my bank, employer, or Internet who lives a solitary existence on an island-
service provider; physical or technological his name, his history, in short, who he is-yet
barriers of various sorts undermine the ef- he may have all the control he needs to secure
forts of criminals and fraudsters to acquire his desire to be left alone. Such a person has
my identifying details. In these cases our physical privacy, despite us having much
efforts at ensuring privacy thereby ensure personal information about him, including
our anonymity. where he is. Or in general consider the many
There are also many occasions where our kinds of recluse-celebrity, survivalist, or
failures to protect our privacy go hand in hermit-who enjoy their physical privacy
hand with the absence of anonymity: when in spite of the fact that the wider public may
the marketing person phones and addresses know a good deal of their history. In 1953,
me by name, for example, or when the local for example, Greta Garbo purchased an
newspaper identifies me as the person cap- apartment inNew York City and lived the rest
tured on surveillance television. Being identi- of her life there. She became so well known
fied by name blows my cover and threatens for craving a private existence that the line
my hitherto private condition. "I want to be alone"-from one of her movie
Privacy in Western contemporary societies roles-was attributed to her public identity.
is normally achieved by a person who Tellingly, she later commented, "I never said
determines for herself the boundary that 'I want to be alone.' I only said 'I want to be
separates her and her social world. The let alone.' There is all the difference." And
word "boundary" here marks two different Garbo's observation here is perfectly apt-in
ways in which access may be given. On the a sense she knows she cannot be alone; not
one hand, the boundary may be a physical in Manhattan, particularly as her address

This content downloaded from 192.148.223.119 on Wed, 24 Sep 2014 01:56:14 AM


All use subject to JSTOR Terms and Conditions
354 /AMERICAN PHILOSOPHICAL QUARTERLY

was not secret. Nevertheless, her lack of relinquished their physical privacy while
anonymity was compatible with her attempts retaining their anonymity. They participated
at privacy. on the implied condition of anonymity. This
was lost once Humphreys noted down the
3.2 Anonymity without Physical Privacy license plate numbers and gained the names
The famous case of Laud Humphreys and addresses. At that point they could be,
serves as a key example of anonymity and many in fact were, tracked down.
without physical privacy. Humphreys's fame
stems from research work he did to earn his 3.3 Anonymity without Informational
sociology doctorate in the late 1960s. This Privacy
work was later published as a monograph. 5 Let us imagine a fictional example, though
There, Humphreys describes the experiences not one that is particularly unrealistic. A
he had viewing male-to-male encounters in person who has traveled to a foreign city
public toilets. These practices, known as may find herself in conversation with a
tearooming within the subculture, involve stranger. The traveler may reveal all sorts of
a third man, the watchqueen, who gains intimate and personal details about herself,
voyeuristic pleasure while also acting as including details about her character, her
a lookout for "police, wise teenagers, or personal circumstances and inclinations, and
unsuspecting passers-by" (Humphreys 1970, so on. In short, in the course of a few hours
p. x). Thus, Humphreys was enabled, as of conversation, she may reveal much more
watchqueen, to make close observations of information to this stranger than she would
all this behavior while remaining a trusted ever consider disclosing at home, where it
participant. Although he disclosed his real would be guarded fiercely as a matter of
purpose to some of the men, almost all were strict informational privacy. She discloses the
oblivious to it. At this stage of his research, information in this context precisely because
he was able to note down many of the license she knows it is practically impossible for
plate numbers of the tearoom participants, this stranger to make the link between the
later using them to trace their names and information and who she is. In this third case,
addresses via help from friendly police then, a person loses informational privacy
who gave him access to license registers. while retaining anonymity.
Around one year later Humphreys contacted
the men and arranged to interview them on 3.4 Informational Privacy without
the pretext of a social health survey. The Anonymity
questionnaire for this survey made it possible Others might know nothing about you
for Humphreys to develop a detailed profile except your name. Suppose you commit a
of these men. In order to carry out this burglary while in a foreign place, and in the
survey work, Humphreys disguised himself course of the burglary you accidentally leave
and proceeded to interview his "subjects" behind an item of clothing that contains
in order to generate a more complete profile your name tag (imagine it came off in a
of their identities, the purpose being to see struggle with the victim). Because it is a
what kind of individuals would lead such a foreign place, you might have high levels
double life. of informational privacy. Still, the police in
This case raises many issues; however, this situation might have all that is needed
my purpose for using it is to show how the to go on to track you down. Admittedly, it
concepts of anonymity and physical privacy might depend on what name you possess.
may come apart. The tearoom participants Smith from London might still retain

This content downloaded from 192.148.223.119 on Wed, 24 Sep 2014 01:56:14 AM


All use subject to JSTOR Terms and Conditions
ANONYMITY AND THE SOCIAL SELF I 355

enough of what matters in anonymity, but 4· ANONYMITY


not if you have a name like "Engelbert Privacy and anonymity come apart because
Humperdinck"-that is, a name like, but not whereas privacy is a matter of negotiating
identical with, "Engelbert Humperdinck." the boundary that separates a person from
Of course, if you were the real Engelbert public access, anonymity aims at preventing
Humperdinck, the famous performer, you a link being made between two dissociated
might have problems. On the other hand, self-presentations. If the having of privacy
you might avoid being caught after all, since requires a door between a person and society,
"Engelbert Humperdinck" was in fact the anonymity is like a key for opening and clos-
stage name for Arnold George Dorsey, and ing the door. What does this mean?
presumably "Arnold George Dorsey" was As a first pass, strictly etymologically an
the name on this person's passport. anonymous presentation is "without a name."
It is ironic, then, that a person intent on Presupposed here is that someone, or an item
preserving his anonymity may not be too of someone such as a letter, is presented, and
perturbed at the revelation of his name, if it is it is presumed that this person has determined
James Smith, say. 6 If a junior police officer's that there shall be no disclosure of his iden-
tip-off that Smith from London is the man tifying name; he will voluntarily remain in
you are after, then his report to headquarters the state of namelessness. Is this right? The
will be somewhat anticlimactic. And for that problem with that analysis is that it fails to
reason we find the Steven Wright quote at get at several highly significant aspects of
the start not just funny but philosophically anonymity: nonidenti.fiability, unreachability,
astute. Notwithstanding the cliched detective and untrackability. Nonidentifiability gets
novel plot where the revealed name does us a tiny bit of the way to what we want;
all the anonymity-removing work, often unreachability gets us close to what we want;
the absence or presence of a person's name and untrackability gets us closest.
is simply one more piece of the evidential
jigsaw we construct in generating knowledge 4.1 Unreachability
of who someone is. Being identifiable Not disclosing my name is one technique I
requires enough descriptive content for the might use to remain nonidentifiable. Yet the
identification to be worth having. reason not being identifiable does not yet
Summing up the four cases: a person can get to the heart of the matter is because that
be unperturbed by, or resigned to, the loss of condition does not seem like a particularly
his anonymous status while fiercely protecting rational end to have. But clearly it provides
his physical privacy (as seen in recluse-type for a rational end, and as Helen Nissenbaum
cases); a person may be willing to give up has argued, that end, often enough, is to be
physical privacy while fiercely guarding his what she calls unreachable. Being unreach-
anonymous status (as seen in tearoom trade- able, being in a state which ensures that oth-
type cases); a person may disclose private in- ers may not get at, or to us, is what we aim
formation confident in the knowledge this will at; not being identified is the means to being
not compromise his social standing elsewhere unreachable; and preventing disclosure of
(the foreign visitor case); and finally, as we just my name is a key method of achieving the
saw, one might lose, or at least increase, the means. (There are other methods that we get
risk oflosing, anonymity from a single clue left to presently.)
at some scene in which the surrounding social Nissenbaum (1999, p. 142) argues that
context has to that point guaranteed high levels when we are unreachable, we have a safe
of informational privacy.

This content downloaded from 192.148.223.119 on Wed, 24 Sep 2014 01:56:14 AM


All use subject to JSTOR Terms and Conditions
356 I AMERICAN PHILOSOPHICAL QUARTERLY

way "to act, transact, and participate without larly frequents a certain restroom is reach-
accountability." We have "freedom of thought able by others there; they can identify that
and expression" that would otherwise be person with a description that uniquely picks
stifled in a public climate. In addition, it al- him out, and they can physically contact that
lows us to reach out for help in cases where a person. However, it remains true that a tea-
stigmatized problem would inhibit us. Being room participant is unable to contact other
unreachable, she says further, may offer re- participants in their social capacity outside
spite from unwanted commercial solicitations this context. So perhaps we should claim that
and support for institutions like peer review, what is at stake in anonymity is sometimes
whistle-blowing, or voting. In describing unreachability qua _ _ , where " _ _ " is
anonymity, she says its value filled out with one's social identity. This is
lies not in the capacity to be unnamed, but in close to what we want.
the possibility of acting or participating while If namelessness is not the important factor,
remaining out of reach, remaining unreachable. those in this second kind of case have an im-
... Where society places high value on the types perfect kind of anonymity. Their namelessless
of expression and transaction that anonymity pro- does not prevent them from being reached in
tects, it must necessarily enable unreachability. In the subculture. What they regard as critically
other words, this unreachability is precisely what important is that they not be trackable from
is at stake in anonymity. (Nissenbaum, p. 142) the subculture to the outside, or vice versa.
Indeed, Humphreys pointed out that many
4.2 Untrackability
participants parked their cars a considerable
Let us add two additions to Nissenbaum's
distance from their tearoom destination. In
analysis. First, and Nissenbaum would no
the light of this, we should say that it is pos-
doubt agree, the expression "what is at stake"
sible to remain anonymous even though a
cannot mean that unreachability is the value
person is reachable, at least to some degree.
that attaches to anonymity, and that is because
Being untrackable is the important core
being out of reach can provide the conditions
in both the letter writer and the tearoomer
under which villains can operate. Unreach-
cases. This, we can say, is what is at stake
ability is not constitutive of some value, then,
in anonymity-either not being able to be
but provides for the conditions under which
physically tracked down, or untrackability
the values she nominates are secured.
qua _ _ , where "_ _ " is filled out by one's
The second qualification is about what it
social identity. In untrackability qua _ _ ,
means to be unreachable. Consider two ba-
others are rendered unable to connect a piece
sic kinds of case. Take the anonymous letter
of information they have about someone to
writer. In this case the letter writer has no
who that person is in some fuller sense.
physical contact with any other person, and no
A variation of untrackability qua _ _ oc-
other person knows or is able to know who the
curs when others have two (or more) pieces of
letter writer is. No other person can get to her
personal information, and for all they know
physically, or find out who she is and then track
these information fragments are about the
her down. She has near perfect anonymity.
same person, but they cannot put the informa-
The second kind of case might be exempli-
tion together. You might know me very well,
fied by the Humphreys's tearoom scenario
and you might also have read the anonymous
in which a participant's anonymity does not
letter I sent to the newspaper yet not know it
guarantee physical unreachability but does
was I who sent it. Or someone might know
permit ignorance of his social identity. The
a person as a tearoomer and might also have
anonymous tearoom participant who regu-

This content downloaded from 192.148.223.119 on Wed, 24 Sep 2014 01:56:14 AM


All use subject to JSTOR Terms and Conditions
ANONYMITY AND THE SOCIAL SELF/ 357

heard about, but not visually encountered, understood by those around us, our social
a certain Councillor Smith from interstate, identities, let us say. For such purposes your
without concluding the tearoomer is Smith. social identity may be understood intuitively
Anonymity in these cases is realized so long as who you are in society. This is by no means
as others do not aggregate pieces of personal straightforward both conceptually (see n. 1)
information that are then assigned to a single and practically as well, for consider that infor-
identifiable person. mation about this identity lies fragmented in
From the point of view of the agent seek- the minds, pages, and computers of a society.
ing anonymity, there can be spectacular It rarely, if ever, comes together in one place.
untrackability failures. Consider this famous But suppose it could; what information are
example: we talking about? The difficulty here is to
An old Abbe, talking among a party of intimate find a sense of "social person" thick enough
friends, happened to say, "A priest has strange to make plausible the idea that we might, with
experiences; why, ladies, my first penitent was good reason, wish to protect it. In the tearoom
a murderer." Upon this, the principal nobleman scenario, a participant's experience of another
of the neighbourhood enters the room. "Ah, person is limited by a physical description one
Abbe, here you are; do you know ladies, I was might be able to provide of that person and a
the Abbe's first penitent, and I promise you my capacity for recognition. "The Italian guy with
confession astonished him!" 7 the moustache" or "the little guy who was here
So there can be damage to reputation in losses yesterday" are not social representations in the
of anonymity, albeit deserved in some cases, thick sense that ought to interest us. Those self
but great harm can result when the successful presentations, evidently, are not thought by the
exercise of a technique of anonymity causes tearoomers as worth protecting.
disastrous personal decisions to be made- What, then, are the social features that
consider modern Oedipus-type cases that would motivate our wishing to protect our-
result in societies which maintain legal restric- selves in these kinds of cases? In such cases
tions on genetic information as part of adoption a subcultural activity exposes a person to
or gamete donor programs. 8 The Guardian condemnation by a hostile majority, and
(U.K.) newspaper in 2003 reported a case of so the importance of not being tracked is a
siblings who were adopted out into families measure of a person's vulnerability to this
in their local area and who subsequently met hostility. My sense of vulnerability depends
and had a sexual relationship. Such cases are on two factors: the likelihood of my being
not isolated and underscore the risk factor for tracked down, and how much I have to lose
institutionalized regimes of anonymity. once others have ascertained who I am. I
To sum up: in what follows we will un- will have more to lose when my subcultural
derstand untrackability (a term capturing adventures are revealed to a wider public
the sense generated by all cases above) as opposed to, or at least antagonistic toward,
the important, let us say, structural aim of those activities. Parents, teachers, ministers,
anonymity. This gets closest to what we want or police discovered tearooming would be
once all cases are in. vulnerable for this reason, for in the public
mind the role does not fit the activity. In such
5· WHAT ANONYMITY PROTECTS cases, the loss of anonymity makes one a tar-
Choosing to be anonymous often aims get for humiliation, ostracism, physical harm,
at protecting our reputations, which are an loss of employment, loss of relationships, or
aspect of our morally inflected identities as perhaps all of the above.

This content downloaded from 192.148.223.119 on Wed, 24 Sep 2014 01:56:14 AM


All use subject to JSTOR Terms and Conditions
358 I AMERICAN PHILOSOPHICAL QUARTERLY

This observation should be understood 6. OTHER CONTROLS OVER SELF


independently of any moral position we may PRESENTATION
take with respect to the activity to which the
We can aim at suppressing information that
majority bears hostility. A morally obnoxious
identifies us, or we can mislead others con-
activity-say, persistently and anonymously
cerning our identity. The first aim corresponds
spreading pernicious rumors about one's
with techniques that are often a matter of what
work colleagues-will attract hostile treat-
we do not do; we aim at nonidentifiability
ment, just as a morally neutral or even heroic
typically by omission. We keep our heads
activity might also--say secretly organizing
down, we do not go out, and in general we
political resistance within a society poisoned
remain unobtrusive by, for example, not wear-
by fascist sentiments. In both kinds of case,
ing a name tag, not using a credit card, not
the vulnerable anonymous participant has
signing a letter, not running the car through a
something to lose-in the one case it is de-
checkpoint, and so on. There are also at least
served, and in the other the exposure would
possible cases where identifying information
be disastrous. is removed completely. Consider the myth
These two kinds of case are unusual and of the Ring of Gyges described in Plato's
extreme and may obscure a more central Republic by the protagonist Glaucon. 9 Gyges
point raised by other "everyday" cases.
was a shepherd in the service of the king of
The reason why someone might wish to
Lydia (an area in the west of modem Turkey)
quarantine knowledge of, say, their atten-
who discovers a magical ring with the power
dance at AA meetings is to maintain the
to make him invisible. He eventually finds his
integrity of a social identity they regard as way to the king's residence, whereupon, with
valuable in multiple respects. Particularly
the help of the ring, he seduces the queen and
within an intolerant society, a breach to
kills the king. Glaucon argues that anyone-
one's anonymous status may cause damage
even the most apparently just person-would
to one's reputation far out of proportion to cave in to temptation if they could commit
what is deserved. It is plausible to think that
crimes with the help of such a device. Invis-
many such cases ought to attract a level of
ibility enables physical escape, but it also
compassion and forgiveness of those who
ensures untrackability; it confers near perfect
are rendered vulnerable to public hostility anonymity. Glaucon's tale reminds us that
by some socially stigmatized characteristic anonymity presents moral dangers as well as
or foible that they choose to exclude from
goods. .
their public persona.
Second, we can take steps to prevent our
The purpose of your anonymity is to protect
exposure by misleading others about who we
against others being able to track you down
are. By adopting a pseudonym, or by putting
to your physical self, or being able to follow
on a physical disguise, we create a fictional,
an information trail that connects a piece of
or even stolen, identity. The pseudonym need
information they have about someone to you
not be intentionally deceptive; for example,
(a potentially vulnerable, socially identifiable
it was, apparently, common knowledge that
person). As noted above, anonymity is a key
"Lewis Carroll" was the pen name used by the
that locks the door of privacy. It is a very
English mathematician and author Charles
important one, but it is also one of a set that
Dodgson. A disguise is a self-presentation
may serve a similar protective function. Let
designed to deceive others in relation to who
us consider some other keys.
I am, though perhaps not everyone around

This content downloaded from 192.148.223.119 on Wed, 24 Sep 2014 01:56:14 AM


All use subject to JSTOR Terms and Conditions
ANONYMITY AND THE SOCIAL SELF I 359

me-e.g., consider the Santa Claus outfit. is hardly likely to say, "the guy looks remark-
(Kathleen Wallace credits John Weckert with ably like Mickey Mouse."
this example. See her 1999, p. 24.) Wigs,
beards, spectacles, makeup, tattoos, padding, 7· A REFLECTION ON FAME
or clothes at odds with my normal visual ap- Keeping control over the social self is often
pearance can each play a role here. The visual centrally about managing privacy, a practice
is, of course, central, but it is not the only occurring on two fronts, the physical and the
mode for misleading others about one's iden- informational. This task can become inflated
tity; consider, e.g., the imitation of another's in the case of famous persons. The Borges
voice over the phone. Alterations such as quote at the start is the opening sentence from
radical weight loss or gain or plastic surgery a vignette called "Borges and I," in which he
provide a more permanent ongoing new iden- reflects on his sense of himself through lived
tity. Adopting an unfamiliar mannerism-a experience as compared with the famous
limp, an accent, and so on-may do the trick, writer Borges, a social identity in the public
as might simply impersonating someone else consciousness. Borges has lost control over
by claiming to be him, in which there is no this public persona to the point where he no
change to physical appearance or manner. longer feels fully comfortable identifying
And, finally, the use of a double dilutes the with that person. He finds it hard to reconcile
possibility of true identification. Saddam his everyday experiences with the public
Hussein, for instance, was said to have up to presentation of Borges, the famous literary
six imitators. In this method the chances of figure. He writes:
genuine identification drop because of the I walk through the streets of Buenos Aires and
increase in false positive identifications, and stop for a moment, perhaps mechanically now,
because knowledge of the existence of cop- to look at the arch of an entrance hall and the
ies undermines the confidence others may grillwork on the gate; I know of Borges from the
have that the real person is easily identified. mail and see his name on a list of professors or
Somewhat like money, if you print a lot of it in a biographical dictionary. I like hourglasses,
you devalue the currency. maps, eighteenth-century typography, the taste
We should ask when such techniques are of coffee and the prose of Stevenson; he shares
deceptive, and when not. Humberstone dis- these preferences, but in a vain way that turns
them into the attributes of an actor. ... I am
tinguishes between afalse suggestion and a
destined to perish, definitively, and only some
suppressed truth as revealed in the example
instant of myself can survive in him. Little by
of the disguise. He says: little, I am giving over everything to him.. . .
A realistic blond wig or false beard may lead I shall remain in Borges, not in myself (if it is
the bank teller to form false beliefs as to the true that I am someone), but I recognize myself
normal appearance of the person pointing the less in his books than in many others or in the
gun, while a Mickey Mouse mask is unlikely laborious strumming of a guitar.... I do not
to. (1995, p. 505) know which of us has written this page.10
The robber in the mask has suppressed his This displays a carefully observed insight
identity to prevent being tracked; the robber into a kind of alienation arising from the
in the wig has falsely represented his appear- feedback that occurs between a social self
ance. As Humberstone notes, it is stretching partly captured by public consciousness (the
things a bit to regard our masked robber as famous self) and the everyday lived self. A
deceiving the teller about his appearance. central part of the problem under discussion is
When later asked for a description, our teller

This content downloaded from 192.148.223.119 on Wed, 24 Sep 2014 01:56:14 AM


All use subject to JSTOR Terms and Conditions
360 /AMERICAN PHILOSOPHICAL QUARTERLY

that of determining the character of the social jurisprudence literature and were motivated
self by correctly choosing which of its parts by the fear that publication of private infor-
must be publicly suppressed or manipulated. mation might be harmful. 11 The management
For the famous person the problem must be of identity under conditions of fame must be
greatly heightened. To fail to correctly control least responsive to the techniques for non-
one's public image in these cases risks inter- identifiability. It is no surprise that some are
nal identification with features of the famous driven into reclusion where at least physical
character portrayed publicly. One's famous privacy can be secured.
self may contain character traits that are
tempting or repellent. Or it may be that one's 8. PRIVATE THOUGHTS, DISCLOSURE,
own pre-fame character traits come to seem AND THE SOCIAL SELF
either more or less attractive when viewed This essay has been addressed largely to the
through the prism of one's public identity. In question concerning the nature of anonymity
Borges's case his earlier preferences come to as a key example of the techniques persons
seem vain when viewed this way. His internal use to control their social presentation. We
struggle consists in becoming alienated from finish with a further thought about the nor-
aspects of his private self that have become mativity of these techniques by considering
public property. In the end he fears that it will the effect of their removal, or at least their
all be public property-"only some instant of partial removal. To illuminate this effect it
myself can survive in him." is useful to focus on those cases in which
It may not be clear whether the fictional we attempt to control the boundary between
preferences assigned to one's famous identity our private thoughts and public expressions.
that one later comes to adopt really belong (The other techniques focus on control over
to one's "lived" self if they only got there by the boundary between a physical self or an
the circuitous route of fame. Thus, one might identifying physical item like a name tag, and
well be tempted by the "preferences" of her knowledge of who someone is.) My thoughts
famous counterpart if that is what is in the are not identifiable simply when I do not dis-
public mind. Think here, for example, of the close them to other people, and so the reserve
famous rock star, movie actor, or television exercised by not speaking my thoughts func-
personality who gradually comes to internal- tions as a key technique for controlling the
ize the attributes publicly assigned to them. social self. (We may also create impressions
This seems a likely explanation, in part at via facial expressions and body language
any rate, for the extravagant, and ultimately in order that others infer false beliefs about
tragic, lifestyles of some. what we are thinking or feeling.) It is very
Fame causes both the loss of physical pri- plausible to think that all of us, on some oc-
vacy, with its stares and autograph hunters, casions, do not reveal our private thoughts
as well as the loss of informational privacy. and thereby put on false social faces. Such
Yet as Borges brings out, the case of fame deceptions may of course involve morally
is further complicated by the fact that one's serious consequences; but a culture in which
social identity has a tendency to become reticent dispositions are not discouraged is
fictionalized and to develop a life of its own, surely on balance better than one in which
regardless of any technique one may practice. all or most of our thoughts are available for
It is no wonder that celebrity fame often leads scrutiny by a curious public. As Nagel has
to courtroom defamation action, and indeed pointed out, such techniques are important
early accounts of privacy issued from the for us to maintain social harmony. 12 It is

This content downloaded from 192.148.223.119 on Wed, 24 Sep 2014 01:56:14 AM


All use subject to JSTOR Terms and Conditions
ANONYMITY AND THE SOCIAL SELF/ 361

simply that moulding our social identity is an fordance is then given to one's conversational
important facet of social interaction and that partner for respectful disengagement from a
process may take place because it is generally certain subject matter. This innermost zone
known that we have private thoughts about of privacy is an important location where we
which it may be best to leave where they are, may maintain a certain kind of social self-
as unspoken expressions. The effect of the one for whom thoughts can be had without
removal of this privacy, ironically, would be the fear of censure. The effect of losing or im-
to increase our hypocrisy. This, at any rate, pairing the mental boundary of privacy would
is the way Nagel sees it. He writes: ultimately lead to more social uniformity.
the idea that everything is fair game and that
life is always improved by more exposure, 9· CONCLUSION
more frankness, and more consensus is a seri- Our social selves can be fragile things
ous mistake. The attempt to impose it leads, when exposed to ridicule, embarrassment,
moreover, to the kind of defensive hypocrisy losses to privacy, and invasive intrusions
and mendacity about one's true feelings that is from outside generally. Part of this stems
made unnecessary by a regime of reticence. If from the fact that not all of our attributes
your impure or hostile or politically disaffected are under our control, and even some vol-
thoughts are everyone's business, you will have
untary aspects get interpreted by others in
reason to express pure and benevolent and
the wrong way. Even at the best of times,
patriotic ones instead. Again, we can see this
economy at work in our present circumstances: we do not have full control over the identi-
The decline of privacy brings on the rise of ties we create for public consumption. What
hypocrisy.(1998,p. 14) we have attempted to do here is develop an
understanding of how anonymity (and its
It was earlier claimed that privacy is centrally
cognates) fit together with the values we
about controlling the boundary between a
attach to controlling which parts of us are
person and the public domain, and that we
in the public eye and which are not, includ-
manage our identities either face-to-face or
ing the connection to private lives. Thus,
in the context of controlling what personal
an anonymous technique represents an
information is available to others. The present
important procedural value when linked to
discussion suggests that in the face-to-face
a value like privacy or indeed when in the
context the boundary marking off a private
service of attending to the fragility of our
zone from others may move inside the head.
social selves.
The control techniques here consist of either
simply keeping silent or of the use of words Centre for Applied Philosophy and
that imply one would like to keep a thought Public Ethics, Charles Sturt University
quarantined from the public exchange. Af-

NOTES

My thanks to Daniel Cohen, Morgan Luck, Graeme McLean, and especially Jeanette Kennett and Larry
May, who provided very helpful written comments on earlier drafts.
1. The locution "knows who you are" (and similar) arises here and several other places in the current
work. Our intuitive grasp of what this means disguises a significant difficulty in providing a full and
illuminating explication of what it is to know who someone is. One problem is the contextual relativity
of sentences like "S knows who P is." The truth of the sentence typically depends on the purposes of
those with an interest in knowing who P is. Compare, for example, the purposes of the police officer

This content downloaded from 192.148.223.119 on Wed, 24 Sep 2014 01:56:14 AM


All use subject to JSTOR Terms and Conditions
362 /AMERICAN PHILOSOPHICAL QUARTERLY

searching for a wanted man with the purposes of the waiter searching for a man who just ordered a
drink. Another problem, in light of the distinction made familiar by Donnellan ( 1966), arises because P
in the above sentence can be a description with a referential or an attributive use. "The man third from
the left" might mean "that man there, third from the left" or it might mean, attributively, "the man third
from the left, whoever he turns out to be." To provide a satisfying account of knowing who someone
is turns out, then, to be quite a complicated business, and so, since providing one here would upset the
flow and balance of our central interest, we will have to do with the intuitive grasp. Two authors who
have attempted an analysis of the notion are Steven Boer and William Lycan in their book, Knowing
Who. (See also Bertolet [1990] and Hintikka and Hintikka [1989].) Readers who know this work will
appreciate the reluctance to pursue the technical matters here.
2. There is very little philosophical literature analyzing the concept of anonymity. Two articles that do
address it are Helen Nissenbaum, "The Meaning of Anonymity in an Information Age," The Information
Society 15 (1999), pp. 141-144, and Kathleen A. Wallace, "Anonymity," Ethics and Information
Technology 1 (1999), pp. 23-35. Each of these accounts has significant merit, and although there are
minor points of disagreement, we will not engage either of them here, except in passing. The issues
raised here focus on the connection between anonymity and the construction of our social selves, a
different emphasis to these writers.
3. For an argument, see Matthews (2008).
4. I thank Larry May for drawing attention to this third range of cases.
5. Humphreys ( 1970). The central purpose of the research was to explore the dissociation that occurs
between an identity prepared for the risky business of anonymous homosexual sex and one's socially
constructed, often conservative, identity, who must wear a "breastplate of righteousness" in order to
compensate for one's alternative activities. My interest in the case here is as an example where physical
privacy is given up while care is given to retain anonymity.
6. According to the U.S. Census Bureau, Population Division, 2005, the most common surname by
quite a long way is "Smith," followed by "Johnson," "Jones," then "Brown"; the most common female
first name is "Mary." For males, "John" comes in second after "James."
7. van den Hoven (2008, p. 309) also mentions this case. The quoted example originally comes from
a story by Thackeray.
8. The issue has been around for some time in the bioethics literature. See, for example, McWhinnie
(2001).
9. Plato (1955, 2.359a-2.360d).
10. Jorge Luis Borges, "Borges and I," from Labyrinths, ed. Donald A Yates and James E. Irby (New
York: New Directions, 1962). This is an abbreviated version of Borges's story, though the original is less
than a page long. The proffered interpretation of the story is for present purposes and does not really
do it full philosophical justice. A fuller treatment would consider the question of who is referred to in
the story by "I" and by "Borges" and of how many separable literary entities to which each answers.
There are also questions concerning literary convention, self-parody, and the playful use of "I" in first
person-narration, all of which would also bear analysis in the light of this famous piece.
11. In particular, see Godkin (1880) and Brandeis and Brandeis (1890).
12. Nagel (1998). Szabados and Soifer (2004, p. 194) make a similar point. See also Velleman (2001,
p. 50).

This content downloaded from 192.148.223.119 on Wed, 24 Sep 2014 01:56:14 AM


All use subject to JSTOR Terms and Conditions
ANONYMITY AND THE SOCIAL SELF/ 363

REFERENCES
Bertolet, Rod. 1990. What Is Said: A Theory of Indirect Speech Reports (Dordrecht, The Netherlands:
Kluwer).
Boer, Steven E., and William G. Lycan. 1986. Knowing Who (Cambridge, Mass.: MIT Press).
Borges, Jorge Luis. 1962. "Borges and I," in Labyrinths: Selected Stories and Other Writings, ed. Donald
A Yates and James E. Irby (New York: New Directions).
Donnellan, K. 1966. "Reference and Definite Descriptions," Philosophical Review, vol. 75, pp.
281-304.
Godkin, E. 1880. "Libel and its Legal Remedy," Journal of Social Science, vol. 12, pp. 69-83.
Hintikka, J., and M. B. Hintikka. 1989. "Quine on Who's Who," in his The Logic of Epistemology and
the Epistemology of Logic: Selected Essays (Dordrecht, The Netherlands: Kluwer).
Humberstone, Lloyd. 1995. "Names and Pseudonyms," Philosophy, vol. 70, pp. 487-512.
Humphreys, Laud. 1970. Tearoom Trade: Impersonal Sex in Public Places (Chicago: Aldine).
McWhinnie, A. 2001. "Gamete Donation and Anonymity: Should Offspring from Donated Gametes
Continue to Be Denied Knowledge of Their Origins and Antecedents?" Human Reproduction, vol.
16, pp. 807-817.
Matthews, Steve. 2008. "Privacy, Separation, and Control," The Monist, vol. 91, pp. 130-150
Nagel, Thomas. 1998. "Concealment and Exposure," Philosophy and Public Affairs, vol. 27, pp.
3-30.
Nissenbaum, Helen. 1999. "The Meaning of Anonymity in an Information Age," The Information
Society, vol. 15, pp. 141-144.
Plato. 1955. The Republic, trans. H. D.P. Lee (Harmondsworth, U.K.: Penguin).
Szabados, Bela, and Eldon Soifer. 2004. Hypocrisy: Ethical Investigations (London: Broadview).
van den Hoven, M. J. 2008. "Information Technology, Privacy, and the Protection of Personal Data,"
in Information Technology and Moral Philosophy, ed. Jeroen van den Hoven and John Weckert
(Cambridge: Cambridge University Press).
Velleman, J. David. 2001. "The Genesis of Shame," Philosophy and Public Affairs, vol. 30, pp.
27-42.
Wallace, Kathleen A. 1999. "Anonymity," Ethics and Information Technology, vol. 1, pp. 23-35.
Warren, S., and L. Brandeis. 1890. "The Right to Privacy," Harvard Law Review, vol. 4, pp. 193-
220.

This content downloaded from 192.148.223.119 on Wed, 24 Sep 2014 01:56:14 AM


All use subject to JSTOR Terms and Conditions

Vous aimerez peut-être aussi