104,038 research outputs found

    Cyberpsychology and Human Factors

    Get PDF
    The online environment has become a significant focus of the everyday behaviour and activities of individuals and organisations in contemporary society. The increasing mediation of communication has led to concerns about the potential risks and associated negative experiences which can occur to users, particularly children and young people. This is related to the emergence of the online environment as a location for criminal and abusive behaviour (e.g., harassment, sexual exploitation, fraud, hacking, malware). One of the key aspects of understanding online victimisation and engagement in criminal behaviours is the characteristics of online communication that are related to the affordances of the technologies, services and applications which constitute digital environments. The aim of this paper is to examine the influence of these characteristics on individual and group behaviour, as well as the associated opportunities for victimisation and criminal behaviour. These issues are of relevance for those involved in the design and implementation of technologies and services, as the ability to assess their potential use in this way can enhance strategies for improving the security of systems and users. It can also inform educational strategies for increasing user understanding of potential informational, privacy and personal risks, and associated steps to improve their security and privacy. Each of the main characteristics of mediated communication is examined, as well as their potential impact on individual and group behaviour, and associated opportunities for victimisation and offending. The article ends by considering the importance of recognising these issues when designing and implementing new technologies, services and applications

    Dovetail: Stronger Anonymity in Next-Generation Internet Routing

    Full text link
    Current low-latency anonymity systems use complex overlay networks to conceal a user's IP address, introducing significant latency and network efficiency penalties compared to normal Internet usage. Rather than obfuscating network identity through higher level protocols, we propose a more direct solution: a routing protocol that allows communication without exposing network identity, providing a strong foundation for Internet privacy, while allowing identity to be defined in those higher level protocols where it adds value. Given current research initiatives advocating "clean slate" Internet designs, an opportunity exists to design an internetwork layer routing protocol that decouples identity from network location and thereby simplifies the anonymity problem. Recently, Hsiao et al. proposed such a protocol (LAP), but it does not protect the user against a local eavesdropper or an untrusted ISP, which will not be acceptable for many users. Thus, we propose Dovetail, a next-generation Internet routing protocol that provides anonymity against an active attacker located at any single point within the network, including the user's ISP. A major design challenge is to provide this protection without including an application-layer proxy in data transmission. We address this challenge in path construction by using a matchmaker node (an end host) to overlap two path segments at a dovetail node (a router). The dovetail then trims away part of the path so that data transmission bypasses the matchmaker. Additional design features include the choice of many different paths through the network and the joining of path segments without requiring a trusted third party. We develop a systematic mechanism to measure the topological anonymity of our designs, and we demonstrate the privacy and efficiency of our proposal by simulation, using a model of the complete Internet at the AS-level

    ‘Unfettered expression of thought’? Experiences of anonymous online role play

    Get PDF
    Advocates suggest that anonymity allows all learners to have an equal voice in a learning environment, and that it encourages participation. This paper explores tutors’ and learners’ experiences of an anonymous, synchronous role play activity conducted using online discussion forums. A qualitative study was undertaken to investigate the experiences of five groups of learners and four tutors. Data were obtained from an online questionnaire and interviews with students and tutors. The findings reveal a huge diversity in responses to the activity. Learners’ emotions before the activity ranged from ‘confident’ to ‘panic’. Afterwards many stated that ‘anonymity’ was the best thing about the activity, suggesting that it ‘loosened inhibitions’ and allowed ‘unfettered expression of thought’. At the same time, some respondents admitted trying to guess the identity of participants, and played their roles with varying degrees of conviction and engagement. Some participants may even have refrained from playing any part in the activity, hiding behind their anonymity. For tutors issues of control were significant and issues of facilitation were raised, although inappropriate behaviour was rare. This study has revealed the diversity of learners’ responses to online role play, and the generally positive attitude towards anonymity. It also highlights the potential for anonymity to contribute to inequality in participation and raises the question of whether genuine anonymity can be useful or achievable. Key findings with significance for future implementation of similar role play activities are presented here

    Constrained Communication with Multiple Agents: Anonymity, Equal Treatment, and Public Good Provision

    Get PDF
    This paper studies information transmission subject to anonymity requirements and communication in public good provision without transfers. The structure of informative equilibria under anonymity or in public good provision can di€er substantially from that of direct one-to-one communication, and in particular we distinguish i) informational distortion caused by the intrinsic divergence of preferences between the decision maker and each agent; and ii) informational distortion caused by the decision maker's weak response to each agent's message due to the equal treatment of all agents that results from anonymity or the nature of public goods. We examine the interaction between these two types of distortion and demonstrate that they may partly offset one another. Information transmission and welfare can be enhanced by introducing the second type of distortion through anonymity when the first type of distortion is severe. In public good provision where the intrinsic preference divergence between the utilitarian decision maker and each agent is absent, as the number of agents becomes larger the quality of communication diminishes and informative equilibria converge to the one that can be played by letting each agent report a binary message (e.g. "yes" or "no") even if their preferences and the decision are continuous.Cheap Talk, Anonymous Communication, Equal Treatment, Public Good Provision.

    Youth and intimate media cultures: gender, sexuality, relationships, and desire as storytelling practices in social networking sites

    Get PDF
    This paper investigates how young people give meaning to gender, sexuality, relationships, and desire in the popular social networking site (SNS) Netlog. In arguing how SNSs are important spaces for intimate politics, the extent to which Netlog is a space that allows contestations of intimate stories and a voicing of difference is questioned. These intimate stories should be understood as self-representational media practices; young people make sense of their intimate stories in SNSs through media cultures. Media cultures reflect how audiences and SNS institutions make sense of intimacy. This paper concludes that intimate stories as media practices in the SNS Netlog are structured around creativity, anonymity, authenticity, performativity, bricolage and intertextuality. The intimate storytelling practices focusing on creativity, anonymity, bricolage and intertextuality are particularly significant for a diversity of intimacies to proliferate
    • 

    corecore