Search results for "anonymity"

showing 7 items of 17 documents

SecureBallot: A secure open source e-Voting system

2021

Abstract Voting is one of the most important acts through which a community can make a collective decision. In recent years, many works have focused on improving traditional voting mechanisms and, as a result, a wide range of electronic voting (e-Voting) systems have been proposed. Even though some approaches have achieved a proper level of usability, the main challenges of e-Voting are essentially still open: protect the privacy of participants, guarantee secrecy, anonymity, integrity, uniqueness, and authenticity of votes, while making e-Voting as trustful as voting. In order to address this issue, we present SecureBallot, a secure open-source e-Voting system that completely decouples the…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniComputer Networks and Communicationsbusiness.industryComputer scienceElectronic votingmedia_common.quotation_subjectComputingMilieux_LEGALASPECTSOFCOMPUTINGUsabilityCryptographyComputer securitycomputer.software_genreData Security e-Voting PrivacyComputer Science ApplicationsIdentification (information)Hardware and ArchitectureVotingSecrecybusinessFormal verificationcomputerAnonymitymedia_commonJournal of Network and Computer Applications
researchProduct

Cyber-Identities and Social Life in Cyberspace

2011

Information and communication technology gradually transform virtual communities to active meeting places for sharing information and for supporting human actions, feelings and needs. In this chapter the authors examine the conceptual definition of virtual community as found in the traditional cyberliterature and extend it to accommodate latest cybertrends. Similar to the ways that previous social and mass media dissolved social boundaries related to time and space, cyber-communities and social software seem to also dissolve the boundaries of identity. This, in turn, questions the trust, privacy and confidentiality of interaction. The authors present a way of classifying and viewing self-pr…

Social lifebusiness.industryInternet privacySociologyComputer securitycomputer.software_genrebusinessCyberspacecomputerPseudonymityAnonymity
researchProduct

VLPZ: The Vehicular Location Privacy Zone

2016

International audience; One of the key challenges in the success of vehicular ad hoc networks (VANETs) is to consider the location privacy of drivers. Although, the pseudonym changing approach is suggested by standardization development organizations such as IEEE and ETSI, the development of an effective pseudonym changing strategy is still an open issue. The existing pseudonym changing strategies are either not effective to protect against the pseudonyms linking attacks or can have a negative impact on the VANETs’ applications. To address these issues, this paper proposes a new pseudonym changing strategy based on the Vehicular Location Privacy Zone (VLPZ), which is a roadside infrastructu…

StandardizationComputer scienceWireless ad hoc networkSecurity.02 engineering and technologyPseudonymComputer securitycomputer.software_genre[SPI]Engineering Sciences [physics]0203 mechanical engineering0202 electrical engineering electronic engineering information engineeringVANETsGeneral Environmental ScienceLocation privacybiologybusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020302 automobile design & engineering020206 networking & telecommunicationsPseudonym ChangingTollMetric (mathematics)biology.proteinKey (cryptography)SecurityGeneral Earth and Planetary SciencesComputingMilieux_COMPUTERSANDSOCIETYbusinesscomputerAnonymityComputer network
researchProduct

On the dark side of lifestyle blogging : the case of negative anonyms

2018

The social reciprocity between bloggers and their readers included in lifestyle blogs is inspired by casual exchange of information, opinions, and emotional support. Despite the obvious positive connotations, the world of lifestyle blogging also has a darker side to it. A negative anonym is recognized by bloggers as a reader who comments behind a pseudonym and distributes critical or abusive comments targeted against bloggers’ physical appearance, personality, life choices, or commercial collaborations. Bloggers are often regarded as influencers of social media. In this study, however, the perspective is reversed as I explore some of the ways bloggers are influenced by their readers. peerRe…

bloggerslifestylebloggaajatlukijatvuorovaikutusanonymityinteractionblogsblogitreaders (role)negatiivisuusnegativityanonymiteettielämäntapa
researchProduct

Data from the GIPEyOP online election poll for the 2015 Spanish General election.

2020

Abstract The general elections of 2015 in Spain took place in the middle of the Great Recession after several years of austerity economic policies. This election caused a political earthquake that shook the Spanish party system. During the campaign of that election, GIPEyOP (Elections and Public Opinion Research Group from University of Valencia) conducted a survey to collect relevant data about the electorate beliefs, intentions and motivations. This article describes the data set attained, which comprises 71 variables after removing, to ensure full anonymity, those variables that would potentially allow respondents to be identified. Respondents answered a self-administered online question…

media_common.quotation_subjectComputer-assisted web interviewinglcsh:Computer applications to medicine. Medical informaticsPublic opinion03 medical and health sciencesPolitics0302 clinical medicineSocial ScienceVotingPolitical scienceGeneral electionlcsh:Science (General)Public opinion030304 developmental biologymedia_commonOnline surveys0303 health sciencesMultidisciplinarybusiness.industrySampling (statistics)Public relationsEleccionsAusteritySpanish General electionslcsh:R858-859.7Votingbusiness030217 neurology & neurosurgeryElection pollslcsh:Q1-390AnonymityData in Brief
researchProduct

Towards CCTV-aware Routing and Navigation for Privacy, Anonymity, and Safety - Feasibility Study in Jyväskylä

2021

AbstractIn order to withstand the ever-increasing invasion of privacy by CCTV cameras and technologies, on par CCTV-aware solutions must exist that provide privacy, safety, and cybersecurity features. We argue that a first important step towards such CCTV-aware solutions must be a mapping system (e.g., Google Maps, OpenStreetMap) that provides both privacy and safety routing and navigation options. Unfortunately, to the best of our knowledge, there are no mapping nor navigation systems that support CCTV-privacy and CCTV-safety routing options. At the same time, in order to move the privacy vs. safety debate related to CCTV surveillance cameras from purely subjective to data-driven and evide…

safetyComputer sciencePrivacy laws of the United StatesContext (language use)PedestrianprivacyComputer securitycomputer.software_genrelcsh:TelecommunicationDomain (software engineering)anti-surveillancelcsh:TK5101-6720yksityisyyskameravalvontakarttapalvelutcctv-aware technologymappingnavigationreititysanonymityNavigation systemvalvontajärjestelmätcctvroutingsurveillanceRouting (electronic design automation)anonymiteettiScale (map)yksilönsuojacomputerAnonymity2021 28th Conference of Open Innovations Association (FRUCT)
researchProduct

The use of the Dark Web as a COVID-19 information source : A three-country study

2022

The Dark Web (i.e., the anonymous web or Darknet) contains potentially harmful COVID-19-related information and content such as conspiracy theories and forged certificates. The Dark Web may particularly attract individuals who are suspicious about the pandemic, but there is no research concerning the use of the Dark Web as a COVID-19 information source. In this study, we investigated the role of COVID-19 skepticism, online activities, and loneliness in the use of the Dark Web platforms as a COVID-19 information source. The data (N = 3000) were gathered in April 2021 from 18 to 75-year-old respondents from Finland (n = 1000), Sweden (n = 1000) and the United Kingdom (n = 1000). The responden…

tiedonlähteetanonymityonline informationSociology and Political Sciencesocial mediaCOVID-19sosiaalinen mediaHuman Factors and ErgonomicsDark webkansainvälinen vertailupandemiatEducationanonyymiverkotluottamusBusiness and International Managementmisinformationverkkoaineistoanonymiteettirokotevastaisuus
researchProduct