An Investigation of the Factors that Predict an Internet User's Perception of Anonymity on the Web

نویسندگان

  • Shruti Devaraj
  • Myrtede Alfred
  • Kapil Chalil Madathil
  • Anand K. Gramopadhye
چکیده

The growth of the Internet as a means of communication has sparked a need for researchers to investigate the issues surrounding different social behaviors associated with Internet use. Of particular interest is the importance of a user's perception of anonymity. The independent variables for the study were demographic information, social networking habits and prior negative experience. The dependent variable for this study was perception of online anonymity. Data for this analysis were taken from the Pew Research Center's Internet & American Life Project's July 2013 Pew Internet Anonymity Survey. A binomial logistic regression analysis was performed to predict perception of anonymity on the Web. Results indicated that gender, income level, education level, social networking habits and compromised identity are significant in predicting one's perception of anonymity on the web. Age and prior negative experience were not significant predictors. Differences in technological proficiency and access to the web are two factors believed to have contributed to these results, particularly those related to demographics. The findings from this research could be used to help target demographics with the education and support needed to protect their identity on the web. This study also offers insight about who are more likely to attempt to use the web anonymously and will help further identify the patterns of behavior associated with anonymous web use. This paper calls for further studies to analyze to what extent do the opinions and experiences of friends and relatives impact an individual's perception of anonymity.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Anomaly-based Web Attack Detection: The Application of Deep Neural Network Seq2Seq With Attention Mechanism

Today, the use of the Internet and Internet sites has been an integrated part of the people’s lives, and most activities and important data are in the Internet websites. Thus, attempts to intrude into these websites have grown exponentially. Intrusion detection systems (IDS) of web attacks are an approach to protect users. But, these systems are suffering from such drawbacks as low accuracy in ...

متن کامل

The influential factors on the quality of electronic service in sport from Esteghlal club fans point of view

The purpose of the present research is investigation of the theoretical relationship between the main variables of online exercise performance and their impact upon rendering service quality via internet. The statistical population was included of all fans of Tehran Esteghlal sport club, who electronically and via web site purchased the fans products and received information through club media....

متن کامل

Internet Banking Law: An Iranian Perspective Problems and Prospects of Introducing Islamic Microfinance in Azerbaijan Republic

Bank supervision and monetary policy are strategic concepts in the economy of countries. Development of electronic communications, especially in online and international spheres, has largely threatened financial services in view of security and illegal access to banking networks. Anonymity and identity theft has endangered electronic commerce by crimes like phishing, fraud and different types...

متن کامل

Semantic Constraint and QoS-Aware Large-Scale Web Service Composition

Service-oriented architecture facilitates the running time of interactions by using business integration on the networks. Currently, web services are considered as the best option to provide Internet services. Due to an increasing number of Web users and the complexity of users’ queries, simple and atomic services are not able to meet the needs of users; and to provide complex services, it requ...

متن کامل

Some observations on a lightweight authentication scheme with capabilities of anonymity and trust in Internet of Things (IoT)

Over the last years‎, ‎the concept of Internet of Things (IoT) leads to a revolution in the communications of humans and things. ‎Security and efficiency could be the main challenges of that communication‎‎. ‎‎On the other hand, ‎ authenticity and confidentiality are two important goals to provide desired security in an information system‎, including IoT-based applications. An Authentication an...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015