Anonymity and closely related terms in the cyberspace: An analysis by example
نویسنده
چکیده
Anonymity is generally conceived to be an integral part of user’s right to privacy. Without anonymity, many online activities would become prone to eavesdropping, making them potentially risky to use. This work highlights on the different aspects closely related to anonymity and argues that it is rather a multifaceted and contextual concept. To support this argumentation, the paper examines as a dual case study the ways anonymity is conceptualised in the case of two well-established but dissimilar protocols employed in the cyberspace on a wide-scale; that is, SIP and Kerberos ones. By surveying the research done for preserving anonymity (and privacy in general) in the context of the aforementioned protocols several useful observations emerge. Our aim is to contribute towards acquiring a comprehensive view of this particular research area, mainly by examining how anonymity is put to work in practice. As a result, the work at hand can also be used as a reference for anyone interested in grasping the diverse facets of this constantly developing research field. a 2014 Elsevier Ltd. All rights reserved.
منابع مشابه
Applying Stylometric Analysis Techniques to Counter Anonymity in Cyberspace
Due to the ubiquitous nature and anonymity abuses in cyberspace, it’s difficult to make criminal identity tracing in cybercrime investigation. Writeprint identification offers a valuable tool to counter anonymity by applying stylometric analysis technique to help identify individuals based on textual traces. In this study, a framework for online writeprint identification is proposed. Variable l...
متن کاملUdk: 343.9 Phenomenal Exploration into Impact of Anonymity on Law and Order in Cyberspace
While information systems provide modern society with great convenience, it also poses new problems in maintaining social order. One of its negative influences is the anonymity of cyberspace, which makes identity tracing a noteworthy predicament which poses obstacles in detection and investigations. It has been found that cyber anonymity has critical impacts on criminal motivation, and the phen...
متن کاملBehavioral Considerations in Developing Web Information Systems: User-centered Design Agenda
The current paper explores designing a web information retrieval system regarding the searching behavior of users in real and everyday life. Designing an information system that is closely linked to human behavior is equally important for providers and the end users. From an Information Science point of view, four approaches in designing information retrieval systems were identified as system-...
متن کاملContent Analysis of Eating Disorders Metaphorical Posts in Cyberspace
People with eating disorders express their eating pathology through metaphors. This research was conducted to explain and categorize eating disorder metaphorical posts in cyberspace. The method of this qualitative study was conventional and directed text content analysis, which was carried out by Shannon's entropy method in the period of September 2019 to May 2022. The population of this study ...
متن کاملExamples of Patients' Rights in the Light of the Normative Hierarchy of International Law
Background and Aim: The Right to Health as an Example of Human Rights Entered the International Law Literature as a General Principle After the Adoption of the Universal Declaration of Human Rights and the Covenant on Economic, Social and Cultural Rights. This Principle has Developed Over the Years in Terms of Instances, and From Within it Have Emerged Instances That are Closely Related to the ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- J. Inf. Sec. Appl.
دوره 19 شماره
صفحات -
تاریخ انتشار 2014