Filters








355,525 Hits in 2.7 sec

Does Anonymity Increase the Chance to Get Feedback? [article]

Malte Paskuda, Myriam Lewkowicz
2016 arXiv   pre-print
To generate a hypothesis about the effects of anonymity on user participation in online communities, comments on Youtube were analysed for effects of the change from allowing pseudonyms to Google+ with  ...  Small differences were detected, leading to the hypothesis that the option to remain anonymous leads to a less active environment for getting feedback, with less polite and less rude comments on the expense  ...  Another study will look at environments that use different identity models but are related, like discussion boards for similar topics (for example 4chans /g/ and Hacker News).  ... 
arXiv:1604.05572v1 fatcat:f63f7z6qznexjnsdoa67yhqhm4

The Digital Self: Through the Looking Glass of Telecopresent Others

Shanyang Zhao
2005 Symbolic interaction  
Others communicate their attitudes toward us not merely in the expressions they give, but more important, in the expressions they "give off" (Goffman 1959).  ...  Just as we find out how we look from the reflections we see in the mirror, we learn who we are by interpreting how others respond to us.  ...  Acknowledgments: I would like to thank the four anonymous reviewers for their very helpful comments and suggestions.  ... 
doi:10.1525/si.2005.28.3.387 fatcat:e5ame2zfabal5lmh7hclfwpokq

A New k-Anonymous Message Transmission Protocol [chapter]

Gang Yao, Dengguo Feng
2005 Lecture Notes in Computer Science  
The goal is usually to guarantee full anonymity: an adversary looking at the communication patterns should not learn anything about the origin or destination of a particular message. k-anonymity k-anonymity  ...  A member in a group may sends different message to different member in another group at one time.  ...  We are looking into techniques for distributing the data and signatories in a decentralized way.  ... 
doi:10.1007/978-3-540-31815-6_31 fatcat:xab6w3is25cozmasmcepcj6v6e

Nobody Cares, Lah!" The Phenomenon of Flaming on YouTube in Malaysia

Revathy Amadera Lingam, Norizah Aripin
2016 Journal of Business and Social Review in Emerging Economies  
Findings of the study will help understand the views of YouTube community in Malaysia on flaming. The study may further help understand the issue of flaming on other social media sites.  ...  The main idea of this research is to look at the phenomenon of flaming on YouTube.  ...  These days, even the smallest computers can communicate with one another with the presence of the Internet and makes computer communications is easier than ever.  ... 
doi:10.26710/jbsee.v2i1.20 fatcat:qyxsclbpibh6vpxpldvmk5yrwu

Page 42 of Printers' Circular and Stationers' and Publishers' Gazette Vol. 25, Issue 3 [page]

1890 Printers' Circular and Stationers' and Publishers' Gazette  
A good artist, transferrer, or pressman might wish to accept another situation; but, before answering an anonymous advertisement, he must consider whether his communication will not reach his own employer  ...  , who may be looking for addi- tional help; and, vice versa, an employer’s answer to an anonymous advertisement by one seeking a situa- tion may find its way into the hands of the very man he desires to  ... 

Digital self-harm: Prevalence, motivations and outcomes for teens who cyberbully themselves

Edgar Pacheco, Neil Melhuish
2020 Figshare  
Teenagers' top reasons for this behaviour were: making a joke, wanting to show resilience, looking for friends' sympathy, and seeking reassurance of friendship.  ...  Digital self-harm is broadly defined here as the anonymous online posting or sharing of mean or negative online content about oneself.  ...  Another American study (see Patchin & Hinduja, 2017) found that around 6% of students have anonymously posted online mean content about themselves at any point in time.  ... 
doi:10.6084/m9.figshare.12003927.v2 fatcat:3yvynv675rdlbif2sgscyt4w7q

Apparatus of Absence: Anonymity from Print to Algorithms

SREEPRIYA BALAKRISHNAN
2019 Media Watch  
In another direction, the anonymous communication research landscape has been very voluminous and fertile in computer engineering and has come to look at the many nuanced ways in which the web technically  ...  scientific milieu rather than look at anonymity as a mere technology induced moral question.  ... 
doi:10.15655/mw/2019/v10i1/49569 fatcat:bwhkd6klyra2zb6hjkiwfqbkgm

Road Network-based Location Privacy Protection

Chen Wen
2015 International Journal of Security and Its Applications  
The traditional location privacy protection means mainly employs reliable central server framework, and it mainly applies the anonymous region meeting the k-anonymity at the anonymous server to replace  ...  The experiment proves that the algorithm can reduce the communication cost effectively and improve the application safety.  ...  anonymous location, and it is applied for measuring the communication cost between the location server and location anonymity device.  ... 
doi:10.14257/ijsia.2015.9.12.21 fatcat:ven75xpr5na5zmgsflezznpkum

On the Impact of Cross-Layer Information Leakage on Anonymity in Crowds

Andriy Panchenko
2015 Proceedings of the 11th ACM Symposium on QoS and Security for Wireless and Mobile Networks - Q2SWinet '15  
In the light of the entire communication stack, even if the network addresses are perfectly anonymized, information leakage at one of the other layers can completely wipe out the entire effort.  ...  Common anonymizers focus only on a part of the users' personal identification information, namely on the network addresses of the communicating parties.  ...  Thus, when assessing the degree of anonymity, it is not acceptable to neglect information from the other layers, such as the application layer, even if the communicated information looks innocent at first  ... 
doi:10.1145/2815317.2815325 dblp:conf/mswim/Panchenko15 fatcat:koreofb6fvbbnbqqk52zub3ayy

Page 360 of The Idler; An Illustrated Monthly Magazine Vol. 1, Issue [page]

1892 The Idler; An Illustrated Monthly Magazine  
He utterly refuses to look at an anonymous letter. With an unselfishness that is as noble as it is rare, he even lavishes on me those anonymous epistles addressed to himself alone.  ...  I have a pile of letters a foot thick from him, and when I look at the heap I wish I had his talent of industry.  ... 

Information leaks in structured peer-to-peer anonymous communication systems

Prateek Mittal, Nikita Borisov
2008 Proceedings of the 15th ACM conference on Computer and communications security - CCS '08  
Our study therefore motivates the search for new approaches to P2P anonymous communication.  ...  We analyze information leaks in the lookup mechanisms of structured peer-to-peer anonymous communication systems and how these leaks can be used to compromise anonymity.  ...  We are also grateful to George Danezis, Matthew Wright, and the anonymous reviewers for their comments on earlier versions of this paper.  ... 
doi:10.1145/1455770.1455805 dblp:conf/ccs/MittalB08 fatcat:hnq7qwpk7vf4rler7aczftak7m

Literature Survey on Secure Multiparty Anonymous Data Sharing
IJARCCE - Computer and Communication Engineering

Reshma Scaria, Lekshmi Priya S, Sushitha Susan Joseph
2015 IJARCCE  
The popularity of internet as a communication medium whether for personal or business requires anonymous communication in various ways.  ...  Businesses also have legitimate reasons to make communication anonymous and avoid the consequences of identity revelation.  ...  To differentiate anonymous ID assignment from anonymous communication, consider a situation where parties wish to display their data collectively, but anonymously, in slots on a third party site.  ... 
doi:10.17148/ijarcce.2015.4166 fatcat:rvvzbxejgrgclgys4qiuwxbfey

Information Leaks in Structured Peer-to-Peer Anonymous Communication Systems

Prateek Mittal, Nikita Borisov
2012 ACM Transactions on Privacy and Security  
Our study therefore motivates the search for new approaches to P2P anonymous communication.  ...  We analyze information leaks in the lookup mechanisms of structured peer-to-peer anonymous communication systems and how these leaks can be used to compromise anonymity.  ...  We are also grateful to George Danezis, Matthew Wright, and the anonymous reviewers for their comments on earlier versions of this paper.  ... 
doi:10.1145/2133375.2133380 fatcat:shml7zzyffgzxg4j6dnmukf7fy

Symmetric Disclosure: a Fresh Look at k-Anonymity [article]

Ewa J. Infeld
2014 arXiv   pre-print
We analyze how the sparsity of a typical aggregate social relation impacts the network overhead of online communication systems designed to provide k-anonymity.  ...  We can reduce the associated overhead by having both parties in a communication specify both the origin and the target sets of the communication.  ...  Suppose that we are looking at a group V i , with |V i | nodes.  ... 
arXiv:1407.6350v1 fatcat:7hotn746hzgbzggeqf7eiuihjq

Lurking, anonymity and participation in computer conferencing [chapter]

John Pearson
2000 IFIP Advances in Information and Communication Technology  
These data revealed that the network was used extensively for private mail but only to a limited extent for public conferencing except for one conference where trainee teachers were able to use an anonymous  ...  The reasons for limited participation by trainee teachers in conferences, and the ways in which access to an anonymous account influenced participation on the network, are discussed drawing on interview  ...  PARTICIPATING ANONYMOUSLY-THE MARY SMITH ACCOUNT The suggestion for a Course Comments conference, and an anonymous account which could be used to contribute messages, arose at a campus meeting three months  ... 
doi:10.1007/978-0-387-35499-6_8 fatcat:uly4znsadfcorjohz3ufyhssba
« Previous Showing results 1 — 15 out of 355,525 results