Search results for "anonymity"
showing 7 items of 17 documents
SecureBallot: A secure open source e-Voting system
2021
Abstract Voting is one of the most important acts through which a community can make a collective decision. In recent years, many works have focused on improving traditional voting mechanisms and, as a result, a wide range of electronic voting (e-Voting) systems have been proposed. Even though some approaches have achieved a proper level of usability, the main challenges of e-Voting are essentially still open: protect the privacy of participants, guarantee secrecy, anonymity, integrity, uniqueness, and authenticity of votes, while making e-Voting as trustful as voting. In order to address this issue, we present SecureBallot, a secure open-source e-Voting system that completely decouples the…
Cyber-Identities and Social Life in Cyberspace
2011
Information and communication technology gradually transform virtual communities to active meeting places for sharing information and for supporting human actions, feelings and needs. In this chapter the authors examine the conceptual definition of virtual community as found in the traditional cyberliterature and extend it to accommodate latest cybertrends. Similar to the ways that previous social and mass media dissolved social boundaries related to time and space, cyber-communities and social software seem to also dissolve the boundaries of identity. This, in turn, questions the trust, privacy and confidentiality of interaction. The authors present a way of classifying and viewing self-pr…
VLPZ: The Vehicular Location Privacy Zone
2016
International audience; One of the key challenges in the success of vehicular ad hoc networks (VANETs) is to consider the location privacy of drivers. Although, the pseudonym changing approach is suggested by standardization development organizations such as IEEE and ETSI, the development of an effective pseudonym changing strategy is still an open issue. The existing pseudonym changing strategies are either not effective to protect against the pseudonyms linking attacks or can have a negative impact on the VANETs’ applications. To address these issues, this paper proposes a new pseudonym changing strategy based on the Vehicular Location Privacy Zone (VLPZ), which is a roadside infrastructu…
On the dark side of lifestyle blogging : the case of negative anonyms
2018
The social reciprocity between bloggers and their readers included in lifestyle blogs is inspired by casual exchange of information, opinions, and emotional support. Despite the obvious positive connotations, the world of lifestyle blogging also has a darker side to it. A negative anonym is recognized by bloggers as a reader who comments behind a pseudonym and distributes critical or abusive comments targeted against bloggers’ physical appearance, personality, life choices, or commercial collaborations. Bloggers are often regarded as influencers of social media. In this study, however, the perspective is reversed as I explore some of the ways bloggers are influenced by their readers. peerRe…
Data from the GIPEyOP online election poll for the 2015 Spanish General election.
2020
Abstract The general elections of 2015 in Spain took place in the middle of the Great Recession after several years of austerity economic policies. This election caused a political earthquake that shook the Spanish party system. During the campaign of that election, GIPEyOP (Elections and Public Opinion Research Group from University of Valencia) conducted a survey to collect relevant data about the electorate beliefs, intentions and motivations. This article describes the data set attained, which comprises 71 variables after removing, to ensure full anonymity, those variables that would potentially allow respondents to be identified. Respondents answered a self-administered online question…
Towards CCTV-aware Routing and Navigation for Privacy, Anonymity, and Safety - Feasibility Study in Jyväskylä
2021
AbstractIn order to withstand the ever-increasing invasion of privacy by CCTV cameras and technologies, on par CCTV-aware solutions must exist that provide privacy, safety, and cybersecurity features. We argue that a first important step towards such CCTV-aware solutions must be a mapping system (e.g., Google Maps, OpenStreetMap) that provides both privacy and safety routing and navigation options. Unfortunately, to the best of our knowledge, there are no mapping nor navigation systems that support CCTV-privacy and CCTV-safety routing options. At the same time, in order to move the privacy vs. safety debate related to CCTV surveillance cameras from purely subjective to data-driven and evide…
The use of the Dark Web as a COVID-19 information source : A three-country study
2022
The Dark Web (i.e., the anonymous web or Darknet) contains potentially harmful COVID-19-related information and content such as conspiracy theories and forged certificates. The Dark Web may particularly attract individuals who are suspicious about the pandemic, but there is no research concerning the use of the Dark Web as a COVID-19 information source. In this study, we investigated the role of COVID-19 skepticism, online activities, and loneliness in the use of the Dark Web platforms as a COVID-19 information source. The data (N = 3000) were gathered in April 2021 from 18 to 75-year-old respondents from Finland (n = 1000), Sweden (n = 1000) and the United Kingdom (n = 1000). The responden…