105,368 research outputs found
Seeking Anonymity in an Internet Panopticon
Obtaining and maintaining anonymity on the Internet is challenging. The state
of the art in deployed tools, such as Tor, uses onion routing (OR) to relay
encrypted connections on a detour passing through randomly chosen relays
scattered around the Internet. Unfortunately, OR is known to be vulnerable at
least in principle to several classes of attacks for which no solution is known
or believed to be forthcoming soon. Current approaches to anonymity also appear
unable to offer accurate, principled measurement of the level or quality of
anonymity a user might obtain.
Toward this end, we offer a high-level view of the Dissent project, the first
systematic effort to build a practical anonymity system based purely on
foundations that offer measurable and formally provable anonymity properties.
Dissent builds on two key pre-existing primitives - verifiable shuffles and
dining cryptographers - but for the first time shows how to scale such
techniques to offer measurable anonymity guarantees to thousands of
participants. Further, Dissent represents the first anonymity system designed
from the ground up to incorporate some systematic countermeasure for each of
the major classes of known vulnerabilities in existing approaches, including
global traffic analysis, active attacks, and intersection attacks. Finally,
because no anonymity protocol alone can address risks such as software exploits
or accidental self-identification, we introduce WiNon, an experimental
operating system architecture to harden the uses of anonymity tools such as Tor
and Dissent against such attacks.Comment: 8 pages, 10 figure
Recommended from our members
The politics of anonymity: Poland's media discourse on anonymous communication online
Online anonymity has been an important element in scholarly debates on the role of the internet in modern day democracy. Proponents of the right to anonymity argue that it helps secure users' privacy, autonomy and freedom of speech. Critics, on the other hand, see the act of withdrawing identity information as a way to limit or avoid responsibility for one's actions.
Despite large amount of evidence that the role of anonymity on the internet is diverse and context sensitive,
researchers have observed a unidirectional trend towards its limitation or even complete elimination. The process, which might be called de-anonymisation of online spaces, is influenced by what Lessig (2006) described as four main forces shaping internetâs architecture: law, technology, market and social norms. But it also features at the level of discourse, which so far has received very little academic attention. The meanings, values and power struggles underlying the debate on online anonymity have also been largely ignored in Central and Eastern European contexts.
In order to close this gap, this study examines a case from Poland, in which an identity of an anonymous blogger was revealed by a mainstream newspaper. It also investigates the broader characteristics of the coverage of online anonymity in the Polish press. By employing content and discourse analyses, and drawing on the work of critical internet scholars, it offers first empirical evidence that newspapers in Poland can be agents of de-anonymisation. Specifically, the findings reveal the debate on online anonymity is characterised by four key conflicts: 1) a conflict over the status of journalists and internet users in online deliberation; 2) a conflict over the vision of the digital public sphere; 3) a conflict over Poland's democratisation process; and 4) a conflict of values underlying perceptions of online anonymity
Unweaving the Web: Beginning to think theologically about the Internet
This is the author's version of the book.This book discusses features of the Internet that are new and theologically challenging and how these features affect the way we think about place, time, and identity
Exploring Challenges in Conducting E-Mental Health Research Among Asian American Women
In this discussion paper, we explore the challenges of conducting e-mental health intervention research among Asian American women and propose a model for addressing these barriers. Based on an extensive literature review, we identify two main types of barriers to conducting e-mental health intervention research among Asian American women: recruitment barriers and adherence barriers. Recruitment barriers are further subcategorized into those related to (1) stigmatized cultural beliefs about mental illness and mental health services; (2) lack of awareness about mental health services; and (3) language barrier. As to adherence barriers, the two identified subtypes concern (1) acuity and severity of mental health condition; and (2) lack of time. In order to enhance recruitment and adherence in e-mental health intervention research among the studied population, we formulate the following three main research strategies, namely: (1) considering the cultural and social contexts of Asian American women in the development of e-mental health interventions; (2) determining appropriate program length; and (3) conducting feasibility studies to test e-mental health interventions. We suggest that nurse researchers integrate our proposed model in conducting e-mental health interventions among Asian American women. Our proposed model also implies that nurses play an important role in encouraging Asian American womenâs acceptance of and adherence to e-mental health interventions. In order to overcome the obstacles to conducting e-mental health research among Asian American women, we recommend that nurses familiarize themselves with credible, relevant, and evidence-based e-mental health resources and integrate online mental health services and information within their nursing practice
Cross-disciplinary lessons for the future internet
There are many societal concerns that emerge as a consequence of Future Internet (FI) research and development. A survey identified six key social and economic issues deemed most relevant to European FI projects. During a SESERV-organized workshop, experts in Future Internet technology engaged with social scientists (including economists), policy experts and other stakeholders in analyzing the socio-economic barriers and challenges that affect the Future Internet, and conversely, how the Future Internet will affect society, government, and business. The workshop aimed to bridge the gap between those who study and those who build the Internet. This chapter describes the socio-economic barriers seen by the community itself related to the Future Internet and suggests their resolution, as well as investigating how relevant the EU Digital Agenda is to Future Internet technologists
Anonymity In Cyberspace: Judicial and Legislative Regulations
Historically, the scope of constitutional protections for fundamental rights has evolved to keep pace with new social norms and new technology. Internet speech is on the rise. The First Amendment protects an individualâs right to speak anonymously, but to what extent does it protect a right to anonymous online speech? This question is difficult because the government must balance the fundamental nature of speech rights with the potential dangers associated with anonymous online speech, including defamation, invasion of privacy, and intentional infliction of emotional distress. While lower courts have held that there is a right to anonymous online speech, they have not yet adopted a common standard. Meanwhile, to simplify the confusion and protect the rights of those who are injured by anonymous online speech, state legislatures are seeking to restrict some or all anonymous online-speech rights.
This Note explores the history of speech regulation, with a special focus on the history of anonymous online speech, and the justifications for protecting speech rights. It then discusses the judicial standards under which courts require disclosure of anonymous speakers and the current legislative proposals to restrict speech rights. Next, this Note suggests that legislatures should not restrict speech rights, and should instead expand the remedies available to those injured by harmful speech. This Note also suggests that courts should adopt a summary judgment standard that requires plaintiffs to provide evidence demonstrating that the anonymous speaker has committed a tort before requiring the speaker to disclose his or her identity
Ethics in Online Research; Evaluating the ESRC Framework for Research Ethics Categorisation of Risk
[No abstract][No keywords]
Cyberpsychology and Human Factors
The online environment has become a significant focus of the everyday behaviour and activities of individuals and organisations in contemporary society. The increasing mediation of communication has led to concerns about the potential risks and associated negative experiences which can occur to users, particularly children and young people. This is related to the emergence of the online environment as a location for criminal and abusive behaviour (e.g., harassment, sexual exploitation, fraud, hacking, malware). One of the key aspects of understanding online victimisation and engagement in criminal behaviours is the characteristics of online communication that are related to the affordances of the technologies, services and applications which constitute digital environments. The aim of this paper is to examine the influence of these characteristics on individual and group behaviour, as well as the associated opportunities for victimisation and criminal behaviour. These issues are of relevance for those involved in the design and implementation of technologies and services, as the ability to assess their potential use in this way can enhance strategies for improving the security of systems and users. It can also inform educational strategies for increasing user understanding of potential informational, privacy and personal risks, and associated steps to improve their security and privacy. Each of the main characteristics of mediated communication is examined, as well as their potential impact on individual and group behaviour, and associated opportunities for victimisation and offending. The article ends by considering the importance of recognising these issues when designing and implementing new technologies, services and applications
Hanging out with offline friends in an online context : how the experience of "partial anonymity" impacts on identity management : a thesis presented in partial fulfilment of the requirements for the degree of Master of Science in Psychology at Massey University, Albany, New Zealand
Instant Messaging has increased in popularity since 1999 and is now often used by adolescents to communicate with friends already known in their offline social networks. Instant Messaging can he thought of as a hybrid between chat rooms and email. Chat rooms are conducted in "real time" but are an open network in that anyone can have access to interacting with one another. Email is asynchronous and yet it is also a more personal, "closed network" where communicators must generally exchange addresses before they can communicate. When email is used for social reasons communicators generally know each other offline already. Instant Messaging is both synchronous like chat rooms, and can be used as a closed social network, like email. One of the distinguishing characteristics of MSN Instant Messenger (IM) when used between friends is the experience of knowing the other communicator both offline and online. This situation offers the anonymity traditionally experienced online while acknowledging that communicators bring offline knowledge of each other to their online interaction. Thus, the overall relationship is not conducted under conditions of anonymity like that experienced with chat rooms, MUD's and newsgroups. Online anonymity, in these forums, has been implicated in negative behaviours such as "flaming" and deception which are largely attributed to deindividuation. This research investigates how offline knowledge, which presumably acknowledges the other communicator as an individual, impacts on the experience of hanging out online. Adolescent girls construct identity through friendships and this research is concerned with identity constructions when friendships are maintained between both online and offline contexts. The research design was based on an ethnographic approach to the study of the Internet. Eight adolescent girls (aged 13-17) were interviewed both online through IM and in a more traditional face-to-face context. Data analysis was informed by positioning theory (Davies & Harré. 1990) to provide a coherent understanding around how identities are continuously constructed and transformed by contextual criterion. Analysis revealed that 1M fulfils adolescent motivations toward social connection and expressing personal autonomy which are both important in the process of identity formation. Instant Messaging is constructed as a space which allows the girls to balance these motivations in a way which helps them to maintain a positive self-image. The anonymity experienced online is tempered by offline knowledge of each other. This produces an environment of "partial anonymity". This study examines the experience of partial anonymity and the distinct advantages arising from the lack of online social cues. Control and protection are integral advantages which allow the girls to balance teenage motivations, thus informing their sense of self in largely positive ways. This becomes evident in how they demonstrate commitment to their friendships and negotiate disclosure, trust and risk. Findings are discussed in relation to contemporary social identity theories which have been applied to computer-mediated communication. Partial anonymity changes how adolescents use technology to construct and preserve a positive self-image. Adolescents understand the flow between contexts and the resulting negotiations around evolving socialisation standards
- âŠ