105,368 research outputs found

    Seeking Anonymity in an Internet Panopticon

    Full text link
    Obtaining and maintaining anonymity on the Internet is challenging. The state of the art in deployed tools, such as Tor, uses onion routing (OR) to relay encrypted connections on a detour passing through randomly chosen relays scattered around the Internet. Unfortunately, OR is known to be vulnerable at least in principle to several classes of attacks for which no solution is known or believed to be forthcoming soon. Current approaches to anonymity also appear unable to offer accurate, principled measurement of the level or quality of anonymity a user might obtain. Toward this end, we offer a high-level view of the Dissent project, the first systematic effort to build a practical anonymity system based purely on foundations that offer measurable and formally provable anonymity properties. Dissent builds on two key pre-existing primitives - verifiable shuffles and dining cryptographers - but for the first time shows how to scale such techniques to offer measurable anonymity guarantees to thousands of participants. Further, Dissent represents the first anonymity system designed from the ground up to incorporate some systematic countermeasure for each of the major classes of known vulnerabilities in existing approaches, including global traffic analysis, active attacks, and intersection attacks. Finally, because no anonymity protocol alone can address risks such as software exploits or accidental self-identification, we introduce WiNon, an experimental operating system architecture to harden the uses of anonymity tools such as Tor and Dissent against such attacks.Comment: 8 pages, 10 figure

    Unweaving the Web: Beginning to think theologically about the Internet

    Get PDF
    This is the author's version of the book.This book discusses features of the Internet that are new and theologically challenging and how these features affect the way we think about place, time, and identity

    Exploring Challenges in Conducting E-Mental Health Research Among Asian American Women

    Get PDF
    In this discussion paper, we explore the challenges of conducting e-mental health intervention research among Asian American women and propose a model for addressing these barriers. Based on an extensive literature review, we identify two main types of barriers to conducting e-mental health intervention research among Asian American women: recruitment barriers and adherence barriers. Recruitment barriers are further subcategorized into those related to (1) stigmatized cultural beliefs about mental illness and mental health services; (2) lack of awareness about mental health services; and (3) language barrier. As to adherence barriers, the two identified subtypes concern (1) acuity and severity of mental health condition; and (2) lack of time. In order to enhance recruitment and adherence in e-mental health intervention research among the studied population, we formulate the following three main research strategies, namely: (1) considering the cultural and social contexts of Asian American women in the development of e-mental health interventions; (2) determining appropriate program length; and (3) conducting feasibility studies to test e-mental health interventions. We suggest that nurse researchers integrate our proposed model in conducting e-mental health interventions among Asian American women. Our proposed model also implies that nurses play an important role in encouraging Asian American women’s acceptance of and adherence to e-mental health interventions. In order to overcome the obstacles to conducting e-mental health research among Asian American women, we recommend that nurses familiarize themselves with credible, relevant, and evidence-based e-mental health resources and integrate online mental health services and information within their nursing practice

    Cross-disciplinary lessons for the future internet

    Get PDF
    There are many societal concerns that emerge as a consequence of Future Internet (FI) research and development. A survey identified six key social and economic issues deemed most relevant to European FI projects. During a SESERV-organized workshop, experts in Future Internet technology engaged with social scientists (including economists), policy experts and other stakeholders in analyzing the socio-economic barriers and challenges that affect the Future Internet, and conversely, how the Future Internet will affect society, government, and business. The workshop aimed to bridge the gap between those who study and those who build the Internet. This chapter describes the socio-economic barriers seen by the community itself related to the Future Internet and suggests their resolution, as well as investigating how relevant the EU Digital Agenda is to Future Internet technologists

    Anonymity In Cyberspace: Judicial and Legislative Regulations

    Get PDF
    Historically, the scope of constitutional protections for fundamental rights has evolved to keep pace with new social norms and new technology. Internet speech is on the rise. The First Amendment protects an individual’s right to speak anonymously, but to what extent does it protect a right to anonymous online speech? This question is difficult because the government must balance the fundamental nature of speech rights with the potential dangers associated with anonymous online speech, including defamation, invasion of privacy, and intentional infliction of emotional distress. While lower courts have held that there is a right to anonymous online speech, they have not yet adopted a common standard. Meanwhile, to simplify the confusion and protect the rights of those who are injured by anonymous online speech, state legislatures are seeking to restrict some or all anonymous online-speech rights. This Note explores the history of speech regulation, with a special focus on the history of anonymous online speech, and the justifications for protecting speech rights. It then discusses the judicial standards under which courts require disclosure of anonymous speakers and the current legislative proposals to restrict speech rights. Next, this Note suggests that legislatures should not restrict speech rights, and should instead expand the remedies available to those injured by harmful speech. This Note also suggests that courts should adopt a summary judgment standard that requires plaintiffs to provide evidence demonstrating that the anonymous speaker has committed a tort before requiring the speaker to disclose his or her identity

    Cyberpsychology and Human Factors

    Get PDF
    The online environment has become a significant focus of the everyday behaviour and activities of individuals and organisations in contemporary society. The increasing mediation of communication has led to concerns about the potential risks and associated negative experiences which can occur to users, particularly children and young people. This is related to the emergence of the online environment as a location for criminal and abusive behaviour (e.g., harassment, sexual exploitation, fraud, hacking, malware). One of the key aspects of understanding online victimisation and engagement in criminal behaviours is the characteristics of online communication that are related to the affordances of the technologies, services and applications which constitute digital environments. The aim of this paper is to examine the influence of these characteristics on individual and group behaviour, as well as the associated opportunities for victimisation and criminal behaviour. These issues are of relevance for those involved in the design and implementation of technologies and services, as the ability to assess their potential use in this way can enhance strategies for improving the security of systems and users. It can also inform educational strategies for increasing user understanding of potential informational, privacy and personal risks, and associated steps to improve their security and privacy. Each of the main characteristics of mediated communication is examined, as well as their potential impact on individual and group behaviour, and associated opportunities for victimisation and offending. The article ends by considering the importance of recognising these issues when designing and implementing new technologies, services and applications

    Hanging out with offline friends in an online context : how the experience of "partial anonymity" impacts on identity management : a thesis presented in partial fulfilment of the requirements for the degree of Master of Science in Psychology at Massey University, Albany, New Zealand

    Get PDF
    Instant Messaging has increased in popularity since 1999 and is now often used by adolescents to communicate with friends already known in their offline social networks. Instant Messaging can he thought of as a hybrid between chat rooms and email. Chat rooms are conducted in "real time" but are an open network in that anyone can have access to interacting with one another. Email is asynchronous and yet it is also a more personal, "closed network" where communicators must generally exchange addresses before they can communicate. When email is used for social reasons communicators generally know each other offline already. Instant Messaging is both synchronous like chat rooms, and can be used as a closed social network, like email. One of the distinguishing characteristics of MSN Instant Messenger (IM) when used between friends is the experience of knowing the other communicator both offline and online. This situation offers the anonymity traditionally experienced online while acknowledging that communicators bring offline knowledge of each other to their online interaction. Thus, the overall relationship is not conducted under conditions of anonymity like that experienced with chat rooms, MUD's and newsgroups. Online anonymity, in these forums, has been implicated in negative behaviours such as "flaming" and deception which are largely attributed to deindividuation. This research investigates how offline knowledge, which presumably acknowledges the other communicator as an individual, impacts on the experience of hanging out online. Adolescent girls construct identity through friendships and this research is concerned with identity constructions when friendships are maintained between both online and offline contexts. The research design was based on an ethnographic approach to the study of the Internet. Eight adolescent girls (aged 13-17) were interviewed both online through IM and in a more traditional face-to-face context. Data analysis was informed by positioning theory (Davies & Harré. 1990) to provide a coherent understanding around how identities are continuously constructed and transformed by contextual criterion. Analysis revealed that 1M fulfils adolescent motivations toward social connection and expressing personal autonomy which are both important in the process of identity formation. Instant Messaging is constructed as a space which allows the girls to balance these motivations in a way which helps them to maintain a positive self-image. The anonymity experienced online is tempered by offline knowledge of each other. This produces an environment of "partial anonymity". This study examines the experience of partial anonymity and the distinct advantages arising from the lack of online social cues. Control and protection are integral advantages which allow the girls to balance teenage motivations, thus informing their sense of self in largely positive ways. This becomes evident in how they demonstrate commitment to their friendships and negotiate disclosure, trust and risk. Findings are discussed in relation to contemporary social identity theories which have been applied to computer-mediated communication. Partial anonymity changes how adolescents use technology to construct and preserve a positive self-image. Adolescents understand the flow between contexts and the resulting negotiations around evolving socialisation standards
    • 

    corecore