Search results

1 – 10 of over 7000
Article
Publication date: 2 November 2015

Stephanie Winkler and Sherali Zeadally

The purpose of this paper is to examine the possible explanations for the slow adoption and development of online anonymity technology. The ability to remain anonymous while…

2334

Abstract

Purpose

The purpose of this paper is to examine the possible explanations for the slow adoption and development of online anonymity technology. The ability to remain anonymous while engaging in different activities, online is increasingly sought after by consumers with privacy concerns. Currently, the only way to maintain online anonymity is through the use of technology. This paper reviews and analyzes the tools currently available to consumers to maintain online anonymity. There are only four tools available to consumers to ensure online anonymity: anonymous remailers, rewebbers, The Onion Router (Tor) and the Invisible Internet Project (I2P). These tools provide the protection needed for an Internet user to remain anonymous but suffer from a lack of usability and adoption.

Design/methodology/approach

The authors have selected a few specific online anonymity technologies based on the following criteria: the technology satisfies our full anonymity definition, the technology is currently available for public use and the technology has been academically researched.

Findings

Few anonymity technologies are available for public use that offer the ability for full online anonymity, and these technologies are difficult for the average computer user to operate. Further research is still needed to help determine what the average user wants to see in an anonymity technology as well as ways to help users integrate the technology into their commodity software (such as Web browsers). Future online anonymity technologies should enable the user to decide when, how and with whom their information is shared if it is shared at all with ease and simplicity.

Originality/value

The authors identify, explain and analyze publicly available online anonymity technologies in terms of their usability. The authors identified ways as to how online anonymity technology can be improved to increase public adoption. The authors make pertinent recommendations on how the design and development of online anonymity technology can be improved in the future.

Details

International Journal of Pervasive Computing and Communications, vol. 11 no. 4
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 1 July 2004

Stefanos Gritzalis

This paper presents a state‐of‐the‐art review of the Web privacy and anonymity enhancing security mechanisms, tools, applications and services, with respect to their architecture…

3066

Abstract

This paper presents a state‐of‐the‐art review of the Web privacy and anonymity enhancing security mechanisms, tools, applications and services, with respect to their architecture, operational principles and vulnerabilities. Furthermore, to facilitate a detailed comparative analysis, the appropriate parameters have been selected and grouped in classes of comparison criteria, in the form of an integrated comparison framework. The main concern during the design of this framework was to cover the confronted security threats, applied technological issues and users' demands satisfaction. GNUnet's Anonymity Protocol (GAP), Freedom, Hordes, Crowds, Onion Routing, Platform for Privacy Preferences (P3P), TRUSTe, Lucent Personalized Web Assistant (LPWA), and Anonymizer have been reviewed and compared. The comparative review has clearly highlighted that the pros and cons of each system do not coincide, mainly due to the fact that each one exhibits different design goals and thus adopts dissimilar techniques for protecting privacy and anonymity.

Details

Information Management & Computer Security, vol. 12 no. 3
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 30 January 2009

Rami Puzis, Dana Yagil, Yuval Elovici and Dan Braha

The purpose of this paper is to model and study the effectiveness of an attack on the anonymity of Internet users by a group of collaborating eavesdroppers.

1371

Abstract

Purpose

The purpose of this paper is to model and study the effectiveness of an attack on the anonymity of Internet users by a group of collaborating eavesdroppers.

Design/methodology/approach

The paper is based on an analysis of the Internet topology. The study is based on two methods for choosing nodes that contribute the most to the detection of as many communicating Internet users as possible.

Findings

The paper illustrates that it is possible to compromise the anonymity of many Internet users when eavesdropping on a relatively small number of nodes, even when the most central ones are protected from eavesdropping.

Research limitations/implications

It is assumed that the Internet users under attack are not using any anonymity enhancing technologies, but nodes can be protected from eavesdropping. It proposes a measure of the success of an attack on Internet users' anonymity, for a given deployment of collaborating eavesdroppers in the Internet.

Practical implications

The paper shows that several, and not necessarily the most prominent, collaborating nodes can compromise the anonymity of a considerable portion of Internet users. This study also emphasizes that when trying to completely compromise the anonymity of Internet users, an eavesdroppers' deployment strategy that considers eavesdroppers' collaboration can result in substantial resource saving compared to choosing a set of the most prominent nodes.

Originality/value

The paper proposes a new measure of anonymity level in the network, based on the linkability of the Internet users. This paper is the first to present results of a non‐trivial Group Betweenness optimization strategy in large complex networks.

Details

Internet Research, vol. 19 no. 1
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 14 August 2017

Stephen Cory Robinson

The viability of online anonymity is questioned in today’s online environment where many technologies enable tracking and identification of individuals. In light of the…

Abstract

Purpose

The viability of online anonymity is questioned in today’s online environment where many technologies enable tracking and identification of individuals. In light of the shortcomings of the government, industry and consumers in protecting anonymity, it is clear that a new perspective for ensuring anonymity is needed. Where current stakeholders have failed to protect anonymity, some proponents argue that economic models exist for valuation of anonymity. By placing a monetary value on anonymity through Rawls’ concept of primary goods, it is possible to create a marketplace for anonymity, therefore allowing users full control of how their personal data is used. This paper aims to explore the creation of a data marketplace, offering users the possibility of engaging with companies and other entities to sell and auction personal data. Importantly, participation in a marketplace does not sacrifice one’s anonymity, as there are different levels of anonymity in online systems.

Design/methodology/approach

The paper uses a conceptual framework based on the abstractions of anonymity and data valuation.

Findings

The manuscript constructs a conceptual foundation for exploring the development and deployment of a personal data marketplace. By suggesting features allowing individuals’ control of their personal data, and properly establishing monetary valuation of one’s personal data, it is argued that individuals will undertake a more proactive management of personal data.

Originality/value

An overview of the available services and products offering increased anonymity is explored, in turn, illustrating the beginnings of a market response for anonymity as a valuable good. By placing a monetary value on individuals’ anonymity, it is reasoned that individuals will more consciously protect their anonymity in ways where legislation and other practices (i.e. privacy policies, marketing opt-out) have failed.

Details

Digital Policy, Regulation and Governance, vol. 19 no. 5
Type: Research Article
ISSN: 2398-5038

Keywords

Article
Publication date: 9 November 2015

Nili Steinfeld

– The purpose of this paper is to examine how users in an anonymous virtual environment react to an offer to trade in access to their social network profile.

1777

Abstract

Purpose

The purpose of this paper is to examine how users in an anonymous virtual environment react to an offer to trade in access to their social network profile.

Design/methodology/approach

The experiment was conducted in Second Life (SL). Participants were offered varied sums of money in exchange for access to their Facebook profile, effectively undermining their anonymity.

Findings

Even in an anonymous environment, money plays a role in users’ decisions to disclose their offline identity, but a closer look at the findings reveals that users also use deception to enjoy the benefits of the offer without paying the costs. The results illustrate three types of users according to the strategies they employ: abstainers, traders, and deceivers.

Research limitations/implications

The implications to the field of online information disclosure lie at the ability to illustrate and distinguish between the different strategies users choose with regard to online information disclosure, as the study design simulates a common information disclosure trade offer in online environments.

Originality/value

Unlike previous studies that focussed on trades with specific pieces of information, this study examines willingness to sell access to a user’s entire profile, by thus better simulating online services conduct. This is also the first privacy experiment conducted in the anonymous environment of SL, and the first to study deception as a privacy protection strategy.

Details

Online Information Review, vol. 39 no. 7
Type: Research Article
ISSN: 1468-4527

Keywords

Article
Publication date: 2 May 2017

Perri Reynolds and Angela S.M. Irwin

The purpose of this paper is to critically analyse research surrounding the anonymity of online transactions using Bitcoin and report on the feasibility of law enforcement bodies…

7118

Abstract

Purpose

The purpose of this paper is to critically analyse research surrounding the anonymity of online transactions using Bitcoin and report on the feasibility of law enforcement bodies tracing illicit transactions back to a user’s real-life identity.

Design/methodology/approach

The design of this paper follows on from the approach taken by Reid and Harrigan (2013) in determining whether identifying information may be collated with external sources of data to identify individual users. In addition to conducting a detailed literature review surrounding the anonymity of users, and the potential ability to track transactions through the blockchain, four Bitcoin exchange services are examined to ascertain whether information provided at the sign-up stage is sufficiently verified and reliable. By doing so, this research tests the ability for law enforcement to reasonably rely upon this information when attempting to prosecute individuals. Additionally, by submitting fake information for verification, the plausibility of these services accepting fraudulent or illegitimate information is also tested.

Findings

It may be possible to identify and prosecute bad actors through the analysis of transaction histories by tracing them back to an interaction with a Bitcoin exchange. However, the compliance and implementation of anti-money laundering legislation and customer identification security standards are insufficiently used within some exchange services, resulting in more technologically adept, or well-funded, criminals being able to circumvent identification controls and continue to transact without revealing their identities. The introduction of and compliance with know-your customer and customer due diligence legislation is required before law enforcement bodies may be able to accurately rely on information provided to a Bitcoin exchange. This paper highlights the need for research to be undertaken to examine the ways in which criminals are circumventing identity controls and, consequently, financing their illicit activities.

Originality/value

By ascertaining the types of information submitted by users when exchanging real currency for virtual currency, and seeing whether this information may be accepted despite being fraudulent in nature, this paper elucidates the reliability of information that law enforcement bodies may be able to access when tracing transactions back to an individual actor.

Details

Journal of Money Laundering Control, vol. 20 no. 2
Type: Research Article
ISSN: 1368-5201

Keywords

Article
Publication date: 4 November 2014

Pin Luarn and Ai-Yun Hsieh

The purpose of this paper is to extend a traditional communication theory, spiral of silence, to explore the effects of user anonymity and member familiarity on opinion expression…

1780

Abstract

Purpose

The purpose of this paper is to extend a traditional communication theory, spiral of silence, to explore the effects of user anonymity and member familiarity on opinion expression behaviour in a virtual environment.

Design/methodology/approach

A laboratory experiment method was used to manipulate user anonymity, member familiarity, and opinion congruity to measure the willingness to express opinions concerning controversial topics.

Findings

A total of 147 participants were recruited in the experiment. The results revealed that anonymous users in virtual communities and users in groups comprising familiar members are more willing to express inconsistent opinions than non-anonymous users and users in groups containing unfamiliar members, respectively. In addition, anonymous and non-anonymous users as well as users in groups comprising familiar members and those in groups containing unfamiliar members are equally willing to express consistent opinions.

Originality/value

This is the first study to verify the effect of user anonymity and member familiarity on the willingness to express opinions in online social communities. The findings have crucial implications regarding how governments and businesses can stimulate creativity and feedback through virtual communities.

Details

Online Information Review, vol. 38 no. 7
Type: Research Article
ISSN: 1468-4527

Keywords

Article
Publication date: 19 September 2008

Tessie Schepman, Marian Koren, Aleksandra Horvat, Dejana Kurtovic and Ivana Hebrang Grgic

The purpose of this paper is to document a joint research project aimed at investigating the existing library practices regarding protection of personal data, in view of…

727

Abstract

Purpose

The purpose of this paper is to document a joint research project aimed at investigating the existing library practices regarding protection of personal data, in view of computerization of libraries and its consequences, and awareness of the privacy (anonymity) of the library users that was carried out simultaneously in The Netherlands and Croatia in the autumn of 2007.

Design/methodology/approach

The research was a continuation of an ongoing cooperation between The Netherlands Public Library Association and the Department of Information Sciences, University of Zagreb. A questionnaire was developed based on previously conducted interviews with librarians and survey of recent literature on anonymity. It was carried out online via a special link on the web site of The Netherlands Public Library Association and sent by e‐mail to selected libraries in Croatia.

Findings

Replies obtained from 65 Dutch and 33 Croatian libraries of all types have been compared and commented in the paper. The research shows that despite existing differences in library facilities librarians in both countries have not yet become fully aware of all aspects of privacy issues that new services provided by the new technology have brought about, nor received adequate training or taken appropriate measures.

Research limitations/implications

Further research on library practices regarding data protection and measures and steps to be taken by libraries in order to improve the present inadequacies can be envisaged in future.

Originality/value

The paper provides information on data security issues in Dutch and Croatian libraries.

Details

New Library World, vol. 109 no. 9/10
Type: Research Article
ISSN: 0307-4803

Keywords

Article
Publication date: 30 March 2023

Zhiyun Zhang, Ziqiong Zhang and Zili Zhang

Online reviewers' identity information is an essential cue by which consumers judge reviews on ecommerce platforms. However, few studies have explored how prior anonymous reviews…

Abstract

Purpose

Online reviewers' identity information is an essential cue by which consumers judge reviews on ecommerce platforms. However, few studies have explored how prior anonymous reviews and focal reviews affect reviewers' preference for anonymity. The purpose of this paper is to investigate why reviewers seek anonymity in terms of prior anonymous reviews and focal reviews.

Design/methodology/approach

Based on restaurant reviews collected from meituan.com, one of the largest group-buying ecommerce platforms in China, this study employed logistic regression to examine how prior anonymous reviews and focal reviews are associated with reviewers' preference for anonymity.

Findings

Results show that the volume and sequence of prior anonymous review are positively associated with the likelihood of reviewers' preference for anonymity, whereas focal review valence is negatively correlated with this preference. Focal review length is positively correlated with reviewers' preference for anonymity but negatively moderates the roles of review valence and prior anonymous reviews on this preference.

Originality/value

This study expands the information disclosure literature by exploring determinants of user identity disclosure from a reviewer perspective. This research also offers a methodological contribution by employing a more accurate measure to calculate reviewers' preference for anonymity, enhancing the empirical results. Lastly, this work supplements the online review literature on how prior anonymous reviews and focal reviews are associated with reviewers' identity disclosure.

Details

Aslib Journal of Information Management, vol. 76 no. 3
Type: Research Article
ISSN: 2050-3806

Keywords

Article
Publication date: 1 October 2003

David Nicholas, Paul Huntington, Peter Williams and Barrie Gunter

The authors propose a concept of “search disclosure” to assist in the understanding of the willingness of a user to moderate their digital information seeking behaviour as a…

Abstract

The authors propose a concept of “search disclosure” to assist in the understanding of the willingness of a user to moderate their digital information seeking behaviour as a result of the perceived anonymity afforded at the point of searching and information consumption. Differences in the way people search for health information on touch‐screen kiosks, the Internet and digital interactive television are thought to result partly from the anonymity of the place in which the search is conducted. Data have been drawn from 11 independent studies, involving questionnaire, interview and log analysis methods across the three digital information platforms. These studies were all funded by the Department of Health as part of the evaluation of the national roll‐out of digital information and advice services to the consumer. Search disclosure is important in not only providing an understanding of existing consumer search behaviour but also in helping to design personalised online services, such as the electronic patient record. The data presented are speculative in nature and further work is being conducted to gather more robust data.

Details

Journal of Documentation, vol. 59 no. 5
Type: Research Article
ISSN: 0022-0418

Keywords

1 – 10 of over 7000