Anonymity and Helping
30
Citation
9
Reference
10
Related Paper
Citation Trend
Abstract:
Summary Three field experiments, with 233 SSs in all, tested the effect of anonymity on helping. All three studies demonstrated that relatively identifiable Ss were significantly more likely to offer nonemergency help than were anonymous Ss. The third study also showed that only anonymous Ss were more likely to help a victim similar to themselves than one who was dissimilar. Anonymity, therefore, seemed to encourage norm violation.Anonymity is less discussed in the IETF than for instance security
[RFC3552] or privacy [RFC6973]. This can be attributed to the fact
anonymity is a hard technical problem or that anonymizing user data is
not of specific market interest. It remains a fact that 'most
internet users would like to be anonymous online at least
occasionally' [Pew]. This document aims to break down the different
meanings and implications of anonymity on a mediated computer network.
Cite
Citations (0)
Popularity
Cite
Citations (3)
A summary is not available for this content so a preview has been provided. Please use the Get access link above for information on how to access this content.
Content (measure theory)
Information loss
Cite
Citations (0)
In recent years, several mobile applications allowed individuals to anonymously share information with friends and contacts, without any persistent identity marker. The functions of these "tie-based" anonymity services may be notably different than other social media services. We use semi-structured interviews to qualitatively examine motivations, practices and perceptions in two tie-based anonymity apps: Secret (now defunct, in the US) and Mimi (in China). Among the findings, we show that: (1) while users are more comfortable in self-disclosure, they still have specific practices and strategies to avoid or allow identification; (2) attempts for deidentification of others are prevalent and often elaborate; and (3) participants come to expect both negativity and support in response to posts. Our findings highlight unique opportunities and potential benefits for tie-based anonymity apps, including serving disclosure needs and social probing. Still, challenges for making such applications successful, for example the prevalence of negativity and bullying, are substantial.
Negativity effect
Identification
Cite
Citations (19)
Anonymous channels guaranteeing anonymity of senders such as Tor are effective for whistle-blowing and other privacy sensitive scenarios. However, there is a risk of being abused for illegal activities. As a countermeasure to illegal activities using an anonymous channel, it is natural to construct an accountable anonymous channel which can revoke anonymity of senders when an unlawful message was sent out from them. In this paper, we point out that an accountable anonymous channel THEMIS does not provide anonymity in a perfect way and there is a possibility that attackers can identify senders even if messages are not malicious. Feasibility of tracing senders is analyzed by using simulation. Moreover, we give a simple remedy of the flaw in THEMIS.
Traceability
Countermeasure
Cite
Citations (1)
In 2006, Miranda et al. proposed an anonymity scheme to achieve peers' anonymity in Peer-to-Peer. (P2P) reputation systems. In this paper, we show that this scheme can not achieve peers' anonymity in two cases. We also propose an improvement which solves the problem and improves the degree of anonymity.
Reputation system
Cite
Citations (0)
This paper examines some of the issues relating to the protection of privacy on-line, specifically whether anonymity is a necessary and proportionate response to the issues raised. The subject is considered in the light of the relationship between anonymity and privacy, the application of existing data protection law, current proposals and the possibility that increased anonymous use of the Internet and World Wide Web may, itself, create further regulatory challenges.
Privacy software
Privacy Protection
Cite
Citations (5)
With the worldwide growth of open telecommunication networks and in particular the Internet, the privacy and security concerns of people using these networks have increased. On the one hand, users are concerned about their privacy, and desire to anonymously access the network. On the other hand, some organizations are concerned about how this anonymous access might be abused. This paper intends to bridge these conflicting interests, and proposes a solution for revocable anonymous access to the Internet. Moreover, the paper presents some legal background and motivation for such a solution. However, the paper also indicates some difficulties and disadvantages of the proposed solution, and suggests the need for further debate on the issue of online anonymity.
Bridge (graph theory)
Hacker
Cite
Citations (45)
I cannot help but notice few women subscribe to absolutist views of electronic privacy and anonymity. Can it be that only people who play life on the easiest setting find unrestricted privacy and anonymity a great idea?
Cite
Citations (0)
Social networking sites allow people to create, broadcast, and interpret the self in new and evolving ways. While early online social media studies praised the Internet for providing an anonymous space in which to experiment with identity, more recent research suggests that social networking sites have become not anonymous, as they compel users to perform identity in new ways. Through a novel application of affordance theory, this paper argues that instead of attempting to apply outdated definitions of privacy to social networking spaces, we should instead be discussing our right to anonymity. I argue that privacy is immaterial due to the fact that from the moment we log in and interact with a social media interface, we have shared some type of personal information with someone. Anonymity, on the other hand, is defined as the unlinkability of our many identifications. Thus, instead of attempting to define ideas such as “personal” and “private,” we should instead fight for the separation of selves, both at the social and institutional level.
Affordance
Cite
Citations (13)