696,464 Hits in 3.6 sec

Towards Measuring Anonymity [chapter]

Claudia Díaz, Stefaan Seys, Joris Claessens, Bart Preneel
2003 Lecture Notes in Computer Science  
This paper introduces an information theoretic model that allows to quantify the degree of anonymity provided by schemes for anonymous connections.  ...  The model is shown to be very useful for evaluating the level of privacy a system provides under various attack scenarios, for measuring the amount of information an attacker gets with a particular attack  ...  Therefore, it is not useful to measure the robustness of the system towards attacks.  ... 
doi:10.1007/3-540-36467-6_5 fatcat:nr35okzrenan7ikykwl3gkmlmq

Revisiting a combinatorial approach toward measuring anonymity

Benedikt Gierlichs, Carmela Troncoso, Claudia Diaz, Bart Preneel, Ingrid Verbauwhede
2008 Proceedings of the 7th ACM workshop on Privacy in the electronic society - WPES '08  
Recently, Edman et al. proposed the system's anonymity level [10], a combinatorial approach to measure the amount of additional information needed to reveal the communication pattern in a mix-based anonymous  ...  s approach fails to capture the anonymity loss caused by subjects sending or receiving more than one message.  ...  A COMBINATORIAL APPROACH TO MEASURING ANONYMITY In [10] Edman et al. present an anonymity metric that measures the amount of information needed to reveal the full set of relationships between the inputs  ... 
doi:10.1145/1456403.1456422 dblp:conf/wpes/GierlichsTDPV08 fatcat:s6dhtf47pffxtijikp3lxysqoa

Towards Measuring Resilience in Anonymous Communication Networks

Fatemeh Shirazi, Claudia Diaz, Joss Wright
2015 Proceedings of the 14th ACM Workshop on Privacy in the Electronic Society - WPES '15  
Existing anonymity metrics [7, 8] are of limited practical use for low-latency anonymous communication networks, as their security is typically evaluated towards nonglobal adversaries [9] .  ...  Most prior work on anonymous communications has focused, to a large extent, on achieving, measuring, and attacking anonymity properties.  ...  ACN users conceal the destination of their communications towards local observers (e.g., their ISP), as well as their identity towards the destination (e.g., a website).  ... 
doi:10.1145/2808138.2808152 dblp:conf/wpes/ShiraziDW15 fatcat:ewhfitbnyzgkfpsfvtxazxkorm

Towards a Privacy Diagnosis Centre: Measuring k-Anonymity

Mohammad Reza Zare Mirakabad, Aman Jantan, Stéphane Bressan
2008 International Symposium on Computer Science and its Applications  
" In this paper we focus on anonymity and, in particular, k-anonymity. The algorithms that we propose leverage two properties of k-anonymity that we exp ress in the form of two lemmas.  ...  "is my data sufficiently anonymous? ", "which information. if available from an outside source, threatens the anonymity ofmy data ?  ...  We make a concrete step towards this idea by presenting and evaluating several algorithms for measuring k-anonymity and k-anonymity with 8suppression.  ... 
doi:10.1109/csa.2008.44 fatcat:zbb2fbkcmvgntlrgcshdzbd5za

A three-dimensional approach towards measuring sender anonymity

Neeraj Jaggi, Umesh MarappaReddy, Rajiv Bagai
2011 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)  
We then propose a new isolation measure, based upon presence of outliers in a distribution, and show that this measure is critical towards quantifying the overall anonymity provided by the system.  ...  We provide justification for three distinct aspects of anonymity, important from the perspectives of a user, a system designer, and an attacker, leading to a three-dimensional approach towards measuring  ...  Information theoretic measures towards quantifying the degree of anonymity are discussed in [13] , [10] .  ... 
doi:10.1109/infcomw.2011.5928958 fatcat:i6if23en5rb3dahnkizrzrnowe

BIG-MIX: A Mapping-Based Approach Towards Measuring Anonymity

Tianbo Lu, Cheng Wang, Xiaofeng Du, Yang Li
2016 International Journal of Database Theory and Application  
make anonymity assessment on anonymous P2P networks with the use of mapping.  ...  Anonymous P2P technology is a good way to solve the above problems. The ultimate goal of all anonymous P2P systems is to obtain the anonymity.  ...  combinatorial approach to measure anonymity as follows: BIG-MIX Anonymity Method The BIG -MIX System Model An anonymous P2P communication system is a peer-to-peer distributed application in which  ... 
doi:10.14257/ijdta.2016.9.7.19 fatcat:6dgpla6hifhi7ag4odiz3a5es4

Support for Anonymous as vicarious dissent: Testing the social banditry framework

Giovanni A. Travaglino
2017 Group Processes & Intergroup Relations  
Anonymous.  ...  To test the social banditry framework, two studies investigate attitudes toward Anonymous, a group of hackers who challenge the status quo using online tactics such as trolling.  ...  The resulting four-fold typology encompasses Anonymous. Attitudes toward Anonymous were measured using nine items.  ... 
doi:10.1177/1368430217722037 fatcat:muoxaplrefeljhhqfxtgd4nimm

Predictors of Anonymous Cyber Aggression: The Role of Adolescents' Beliefs About Anonymity, Aggression, and the Permanency of Digital Content

Michelle F. Wright
2014 Cyberpsychology, Behavior, and Social Networking  
All findings are discussed in the context of adolescents' positive attitudes toward ACA, and an appeal for additional research is made to understand more about anonymity in cyberspace.  ...  In addition, higher levels of attitudes toward the permanency of digital content, confidence with not getting caught, beliefs about anonymity, and normative beliefs regarding cyber aggression were related  ...  This measure asked adolescents how often (1 = ''never''; 5 = ''all the time'') they remained anonymous while engaging in aggressive behaviors through SNS, IM, e-mail, chatrooms and mobile phones.  ... 
doi:10.1089/cyber.2013.0457 pmid:24724731 fatcat:mxv2mxufj5bdtamekchd5xoohy

Anonymity as an instructional scaffold in peer assessment: its effects on peer feedback quality and evolution in students' perceptions about peer assessment skills

Tijs Rotsaert, Ernesto Panadero, Tammy Schellens
2017 European Journal of Psychology of Education  
The findings suggest that anonymity can be a valuable scaffold to ease students' importance level towards anonymity and their associated need for practice.  ...  Both students' evolution in peer feedback quality as well as their perceptions were measured.  ...  Students' perceptions towards anonymity, interpersonal variables, and conceptions towards peer assessment (RQ3) These variables were measured before the intervention (henceforth, Measurement Time 1), after  ... 
doi:10.1007/s10212-017-0339-8 fatcat:3btas2bkxrfxjkgyny54n5ld2y

Motivations and Attitudes of Men Towards Sperm Donation: Whom to Donate and Why?

João Areias, Jorge Gato, Mariana Moura-Ramos
2021 Sexuality Research & Social Policy  
For this study, we deployed an online survey to explore men's motivations for donating and their attitudes toward anonymity and donating for specific groups.  ...  The results mostly indicated altruistic reasons for donating, positive attitudes toward anonymity, and a greater willingness to donate to infertile women.  ...  Motivations to Donate, Attitudes toward Anonymity, and Attitudes toward Donating for Specific Groups To measure the motivations to donate, attitudes toward anonymity, and feelings toward donating for specific  ... 
doi:10.1007/s13178-020-00531-0 pmid:33527001 pmcid:PMC7838658 fatcat:irut4ssukndtxd7h37b3nfe2ra

Quantifying and Measuring Anonymity [chapter]

Steven J. Murdoch
2014 Lecture Notes in Computer Science  
MEASURING ANONYMITY Claudia Diaz, Stefaan Seys, Joris Claessens, Bart Preneel (2002) Entropy = 3.2 Normalized entropy = 0.7 0" 0.1" 0.2" 0.3" 0.4" 0.5" 0.6" 1" 2" 3" 4" 5" 6" 7" 8" 9" 10"11"12"13"14"15"16"17"18"19"20"21"22"23"24"25  ...  Rubin (1997) THE DISADVANTAGES OF FREE MIX ROUTES AND HOW TO OVERCOME THEM Oliver Berthold, Andreas Pfitzmann, Ronny Standtke (2001) TOWARDS AN INFORMATION THEORETIC METRIC FOR ANONYMITY Andrei Serjantov  ... 
doi:10.1007/978-3-642-54568-9_1 fatcat:wysuej74jrctbpoayufcguhjwy

Unveiling User Characteristics in Virtual Communities and the Impact on E-Commerce

Yong Jin Kim, Jaeki Song
2004 International Conference on Information Systems  
Hence, we hypothesize Hypothesis 1a: Self-identity positively influences attitude toward anonymity. Hypothesis 1b: Self-identity positively influences attitude toward social presence.  ...  Hypothesis 2: Individual users' favorable attitude toward anonymity has a positive influence on their satisfaction.  ...  A2 Being part of an anonymous discussion where there is less social inhibition is extremely beneficial.  ... 
dblp:conf/icis/KimS04 fatcat:gpkt53ch2vfwhl6pybbhtc55ha

Attacking others online: The formation of cyberbullying in late adolescence

Christopher P. Barlett, Douglas A. Gentile
2012 Psychology of Popular Media Culture  
This model predicted that cyberbullying is a function of positive attitudes toward cyberbullying, which are formed by attitudes toward strength and anonymity that exists in aggressing against others in  ...  Participants completed measures of cyberbullying and cyber-victimization at Wave 1, and again two months later.  ...  Finally, one limitation is that we had to create our own measures to assess positive attitudes toward cyberbullying, cyberbullying reinforce-ment, strength differential, and anonymity attitudes.  ... 
doi:10.1037/a0028113 fatcat:jgyuijyytndn5bsufxi42zfowq

Preventing child abuse and neglect: a national evaluation of Parents Anonymous groups

Margaret L Polinsky, Lisa Pion-Berlin, Sandra Williams, Tanya Long, Angela M Wolf
2010 Child welfare  
Results indicated that Parents Anonymous participation contributes to child maltreatment reduction.  ...  This evaluation assessed whether participation in Parents Anonymous mutual support groups was associated with child maltreatment prevention.  ...  Acknowledgments: We extend deep gratitude to the Parents Anonymous Inc. accredited organizations, groups, group facilitators, and parents who made this study possible.  ... 
pmid:21877563 fatcat:nvomursrobhy5gaptlyzckvihy

An Experimental Study of the Factors Influencing Non-Work Related Use of IT Resources at Workplace

Dong Zhang, Lih-Bin Oh, Hock-Hai Teo
2006 Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06)  
It applies the Theory of Planned Behavior (TPB) to investigate the effects of online anonymity, workplace privacy and punishment level in Acceptable Use Policy on the intention to misuse IT resources.  ...  The level of online anonymity present was found to be a significant predictor of the intention to misuse IT resources in both scenarios while workplace privacy significantly affects the behavioral intention  ...  Hence, this single question was adapted to measure attitude toward ethical behavior.  ... 
doi:10.1109/hicss.2006.56 dblp:conf/hicss/ZhangOT06 fatcat:kaefbvezy5as3gw62ap66coyka
« Previous Showing results 1 — 15 out of 696,464 results