Дисертації з теми "User anonymity"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-28 дисертацій для дослідження на тему "User anonymity".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте дисертації для різних дисциплін та оформлюйте правильно вашу бібліографію.
Pajunen, Mihkel. "An Evaluation of User Attitudes Towards Anonymity in Bitcoin." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-14120.
Повний текст джерелаBoldyreva, Alexandra. "Public-key encryption in the multi-user setting : privacy, anonymity and efficiency /." Diss., Connect to a 24 p. preview or request complete full text in PDF format. Access restricted to UC campuses, 2004. http://wwwlib.umi.com/cr/ucsd/fullcit?p3137232.
Повний текст джерелаAbreu, Giovanna Oliveira Lima de. "A soberania dos dados versus a autonomia do usuário: Big Data, Internet das Coisas e as estratégias afirmativas do anonimato." Universidade Federal da Paraíba, 2015. http://tede.biblioteca.ufpb.br:8080/handle/tede/7897.
Повний текст джерелаMade available in DSpace on 2016-02-18T18:09:26Z (GMT). No. of bitstreams: 1 arquivototal.pdf: 1029536 bytes, checksum: c6402b495142035de9a42bf1bf610cc9 (MD5) Previous issue date: 2015-05-29
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior - CAPES
The interaction between society and technology in the context of mediated ambience, enhanced by processes and tools such as Big Data and Internet of Things are the basis of scientific advances that are gradually transforming our daily lives. With the Big Data phenomenon we are able to capture a massive quantity of data, creating endless possibilities of connections and control. The Internet of Things, in turn, is related to embedded devices networks that communicate with each other in an automated way to help make our lives more efficient and more vulnerable too. In the era of pervasive computing and datafication, any attempt to safeguard our data seems insufficient. So, this study presents a reflection on the existing oppositeness between the ideas of freedom as an essential attribute for online information sharing and the sovereignty imposed by the data control, besides we also examine the implications of this surveillance on the user autonomy. To understand the links between the mediations, the network and the members of this interconnected system, we adopted the Actor-Network Theory (LATOUR, 2012). This theory of social also inserts itself as the methodology, laying the foundations for guiding this study. Another important point is to understand the conceptual differences between surveillance, control and monitoring (LEMOS, 2009). The work, divided into two parts and their respective chapters, also includes the analysis of some attempts of resistance to this control imposed on members of the interconnected public sphere, and it points out the paradoxes concerning, particularly, to anonymity, one of the main forms of opposition to the monitoring state established in the net. Since we are in the middle of a still in progress process, accurate and airtight conclusions are not possible. However, if we are not able to set limits to the new digital society, then we run a risk of seeing vital rights, essential to the proper functioning of society, wrecked in the name of innovation and convenience.
A interação entre sociedade e tecnologia presente no contexto da midiatização, potencializada por processos e ferramentas como o Big Data e a Internet das Coisas são a base de avanços científicos que vêm, paulatinamente, transformando o nosso cotidiano. Com o fenômeno do Big Data capta-se uma torrente de dados, gerando infinitas possibilidades de conexões e controle. A Internet das Coisas, por sua vez, está relacionada às redes de dispositivos embarcados que se comunicam uns com os outros de forma automatizada para ajudar a tornar nossas vidas mais eficientes, porém mais vulneráveis. Na era da computação pervasiva e da dataficação, qualquer tentativa de salvaguardar nossos dados parece insuficiente. Assim, este estudo traz uma reflexão sobre o oposicionismo entre as ideias de liberdade como atributo essencial para o compartilhamento de informações online e a soberania conquistada através do controle dos dados, além de examinar as implicações da vigilância sobre a autonomia do usuário. Para compreender os vínculos entre as mediações, a rede e os integrantes desse sistema interconectado, adotamos a Teoria Ator-Rede (LATOUR, 2012). Essa teoria do social insere-se também como metodologia, lançando os princípios norteadores para elaboração da pesquisa. Outro ponto relevante é a compreensão das diferenças conceituais entre as ações de vigilância, controle e monitoramento (LEMOS, 2009). O trabalho, dividido em duas partes e seus respectivos capítulos, conta ainda com a análise de algumas tentativas de resistência ao controle imposto aos integrantes da esfera pública interconectada, e com apontamentos às antinomias referentes, em específico, ao anonimato, uma das principais formas de oposição ao monitoramento instaurado na rede. Por estarmos diante de um processo em franco desenvolvimento, conclusões exatas e certeiras não são possíveis. Todavia, se não formos, desde já, capazes de estabelecer limites para essa nova sociedade digital, então correremos o risco de vermos naufragar direitos vitais para o bom funcionamento da sociedade em prol da inovação e da conveniência.
Hoang, Van-Hoan. "Securing data access and exchanges in a heterogeneous ecosystem : An adaptive and context-sensitive approach." Thesis, La Rochelle, 2022. http://www.theses.fr/2022LAROS009.
Повний текст джерелаCloud-based data storage and sharing services have been proven successful since the last decades. The underlying model helps users not to expensively spend on hardware to store data while still being able to access and share data anywhere and whenever they desire. In this context, security is vital to protecting users and their resources. Regarding users, they need to be securely authenticated to prove their eligibility to access resources. As for user privacy, showing credentials enables the service provider to detect sharing-related people or build a profile for each. Regarding outsourced data, due to complexity in deploying an effective key management in such services, data is often not encrypted by users but service providers. This enables them to read users’ data. In this thesis, we make a set of contributions which address these issues. First, we design a password-based authenticated key exchange protocol to establish a secure channel between users and service providers over insecure environment. Second, we construct a privacy-enhancing decentralized public key infrastructure which allows building secure authentication protocols while preserving user privacy. Third, we design two revocable ciphertext-policy attribute-based encryption schemes. These provide effective key management systems to help a data owner to encrypt data before outsourcing it while still retaining the capacity to securely share it with others. Fourth, we build a decentralized data sharing platform by leveraging the blockchain technology and the IPFS network. The platform aims at providing high data availability, data confidentiality, secure access control, and user privacy
Kaymaz, Feyyat [Verfasser]. "User-Anonymität in Mobile Payment Systemen. Ein Referenzmodell zur Gestaltung der User-Anonymität in Mobile Payment Systemen / Feyyat Kaymaz." Kassel : Kassel University Press, 2011. http://d-nb.info/1023408163/34.
Повний текст джерелаPoole, Catherine G. "Dissociative Anonymity: Performative Photography and the Use of Uncanny Disguise." Scholarship @ Claremont, 2016. http://scholarship.claremont.edu/scripps_theses/787.
Повний текст джерелаČervinka, Zbyněk. "Rozšíření pro webový prohlížeč zaměřené na ochranu soukromí." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2018. http://www.nusl.cz/ntk/nusl-385976.
Повний текст джерелаKhan, Ahsan Ahmad. "Effect of data caching on systemwide anonymity with users sending and receiving multiple messages." Thesis, Wichita State University, 2012. http://hdl.handle.net/10057/5411.
Повний текст джерелаThesis (M.S.)--Wichita State University, College of Engineering, Dept. of Electrical Engineering and Computer Science
Douglas, Judson. "Remote Internet elections and the use of blind digital signatures to protect voter anonymity /." Available to subscribers only, 2005. http://proquest.umi.com/pqdweb?did=1075709441&sid=22&Fmt=2&clientId=1509&RQT=309&VName=PQD.
Повний текст джерелаScalpato, Lauren Ann. "Overcoming Anonymity: The Use of Autobiography in the Works Of Jane Austen and Charlotte Bronte." Thesis, Boston College, 2004. http://hdl.handle.net/2345/452.
Повний текст джерелаIn nineteenth-century England, women were struggling to find an outlet for the intelligence, emotions, and creativity that the patriarchal society around them continuously stifled. For women such as Jane Austen and Charlotte Brontë, writing served as an opportunity to defy restrictive social structures and offered a needed public voice. By expressing their own thoughts and frustrations, Austen and Brontë helped to overcome the anonymity imposed upon women of their time, as they illuminated the female experience. The following paper takes a look at the ways in which Austen and Brontë imparted autobiographical elements to their female characters, as both authors underwent important catharses and inspired the women around them. To this day, their literature provides critical insight into the troubled existence of the nineteenth-century woman, while revealing their own struggles with their constricted identities
Thesis (BA) — Boston College, 2004
Submitted to: Boston College. College of Arts and Sciences
Discipline: English
Discipline: College Honors Program
Ma, Yingying. "Impact of social media use on political participation : narcissism, perceived anonymity and social norms as mediators." HKBU Institutional Repository, 2019. https://repository.hkbu.edu.hk/etd_oa/677.
Повний текст джерелаDahlberg, Nadia, and Jonathan Bryskhe. "”När jag använder TOR blir jag en helt annan person” : En kvalitativ intervjustudie om motiven bakom användningen av Tor Browser och The Dark Web." Thesis, Högskolan för lärande och kommunikation, Högskolan i Jönköping, HLK, Medie- och kommunikationsvetenskap, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-35330.
Повний текст джерелаLindin, Anders. "Meddelandemotor för anonym kommunikation." Thesis, Örebro universitet, Institutionen för naturvetenskap och teknik, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:oru:diva-51571.
Повний текст джерелаThis report describes the workflow to investigate and develop a solution proposal for how a messaging engine could be implemented in TeamTags partly already implemented system. Small parts of the implementation that was introduced during the project is also presented.
Vance, Anthony Osborn. "Trusting IT Artifacts: How Trust Affects our Use of Technology." unrestricted, 2009. http://etd.gsu.edu/theses/available/etd-04292009-142512/.
Повний текст джерелаTitle from file title page. Detmar W. Straub, committee chair; Mikko Siponen, A. Faye Borthick, Arun Rai, Michel Kalika, committee members. Description based on contents viewed July 14, 2009. Includes bibliographical references.
Mesnil, Marie. "Repenser le droit de la reproduction au prisme du projet parental." Thesis, Sorbonne Paris Cité, 2015. http://www.theses.fr/2015USPCB217.
Повний текст джерелаStarting from the concept of "parental project", we aim to deconstruct the traditional roles of women in reproductive matters from a legal standpoint. Gender stereotypes, especially those related to gendered division of labour, are indeed sustained by the current reproductive legal framework. The parental project is a concept introduced by law regulating the new reproductive technologies and yet, the analysis of legal aspects of medically assisted reproduction (MAR) stresses how gender stereotypes are in fact strengthened. The legal criteria to access MAR methods are defined based on Nature and comparing French and Swiss legal frameworks shows there are no fixed rules and thus, that references to Nature are not unbiased. Moreover, when it comes to rules of filiation, the naturalistic framework is further reinforced: on the one hand, when the parental project is carried out within the legal framework, filiation is established based on general law, corroborating the gendered legal basis of filiation; on the other hand, parental projects outside of the naturalistic framework are marginalized, and if nowadays filiation should also be recognized for children born in such conditions, it is only because of legal and jurisprudential developments. In spite of this, we think that the concept of "parental project" should promote, within the legal framework of reproduction, both gender equality and reproductive autonomy. Based on the principle of sex-equality and reproductive autonomy, our proposals aim to change dispositions regarding filiation and reproductive medical acts so that they could improve gender equality and reproductive autonomy. In particular, MAR should be addressed by the general law of filiation in order to make of will the main basis of parentage. Likewise, promoting autonomy in reproductive medical acts cannot proceed without rights of the health care users. Finally this research in reproductive law could be seen as a striking example of how law could foster gender equality and individual autonomy in society
Chang, Pei-Yu, and 張培禹. "A Study on Smart-card-based User Authentication Schemes Preserving User Anonymity." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/6grgv4.
Повний текст джерела國立臺中科技大學
資訊工程系碩士班
100
With the rapid development of computer network technologies, users can easily access remote servers’ resources over public but insecure channels anytime anywhere. When accessing remote services over distributed networks, user authentication plays an important role to prevent resources or services from being accessed by unauthorized users. For personal privacy, it is essential to protect the user’s identity because user anonymity has received much attention in recent year. Therefore, many user authentication schemes using smart cards have been proposed to solve the issue of user anonymity while achieving mutual authentication and key agreement. However, most of them are vulnerable to some security threats because they do not thoroughly consider the security concerns. In this thesis, there are two main subjects. First, we discuss characteristics and requirements of smart-card-based user authentication schemes preserving user anonymity and propose an improvement of Wang et al.’s scheme. In addition, more and more applications are implemented in multi-server environment because computer network technologies have grown spectacularly. Thereupon, we propose a robust and novel dynamic-ID-based authentication scheme ensuring user anonymity for multi-server environment using smart cards. The proposed schemes not only comply with all security requirements but also suit applications in the resource-limited devices while preserving user anonymity.
Lai, Chung-Fa, and 賴俊發. "New Password-based Remote Authentication Mechanism with User Anonymity." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/73217462379204636184.
Повний текст джерела國立臺灣科技大學
資訊管理系
99
With the development of Internet and World Wide Web, more and more people access digital information, use services and finish business transaction via Internet. However, there are more and more security information issues, such as Internet fraud, transaction data leakage and private information exposure. Therefore, user authentication mechanism indeed is the keystone for developing electronic transaction. In 1981, Lamport first proposed a remote user authentication mechanism with a password table and claimed that the proposed mechanism is still secure even though an attacker intercepts the communications between a user and a remote system. In 2009, Wang et al. proposed a dynamic ID-based remote user authentication scheme without any verification table which provides user anonymity and resists stolen-verifier and DOS attacks. However, Khan et al. pointed out that Wang et al.’s scheme cannot achieve user anonymity. Further, Khan et al. proposed an improved scheme to overcome the mentioned weakness. However, we find that Khan et al’s scheme is insecure, because the remote server needs to maintain a verifier table for authenticating users. It results in stolen verifier and denial of service attacks. In this paper, we first propose a remote authentication mechanism that can improve Wang et al’s and Khan et al’s mechanism. The proposed mechanism achieves user anonymity, mutual authentication, and session key establishment and provides resistance to a replay attack, a denial of service attack, and a stolen verifier attack. Due to variety of electronic services, a user can only register with single account management center, and then the user can access different services. In this paper, we also propose a remote authentication mechanism for single sign-on. In the proposed mechanism, a user needs to register with a key distribution center. After verification for the user, the key distribution center will issue a smart card to the user, in which the smart card contains some information, such as authentication token. After that, the user can use the smart card to login to the remote server for accessing services or resources. The proposed mechanism can achieve user anonymity, mutual authentication, and session key establishment. It also supplies user single sign-on and resistance to a replay attack, a denial of service attack, and a stolen verifier attack.
Lin, Chun-Hong, and 林俊宏. "On the Study of User Anonymity and ID-theft." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/544y8k.
Повний текст джерела國立臺中科技大學
資訊工程系碩士班
101
When a user wants to access a remote server over a public channel, the authentication mechanism is required. However, the messages in the communication of a user to a server may be suffered to interception or tampering. There are many authentication mechanisms can prevent these types of attacks nowadays. In many business situations, the user may hope that no other people can know he/her commercial activities or personal whereabouts. For the situation of message exchange without anonymity and the exchanged message containing a fixed particular information about user ID, a malicious user can easily use the fixed particular information to track the business activities of the user by eavesdropping to the message exchanges. This type of fixed particular information can be: Name, ID number, Credit card number, etc, or information derived from the mentioned data. When a legitimate but malicious user learned that another user''s fixed particular information, the malicious user can use this information to do an illegal action, such as frauds or other criminal acts, without the agreement of legitimate user. We call this type of attacks ID-theft attacks. Therefore, in message exchanges, you must avoid to include this type of information. It can prevent the leakage of your commercial activities or personal whereabouts. When user sending a fixed particular message on the public channel, may be easily dictionary attacked to get the user secret information. Thus, we must keep the sending message dynamic as well as possible that cannot learn such a fixed information from sending message. Recently, people pay more and more attention on the user anonymity. Since, there is no mechanism to learn whether does a scheme achieving the user anonymity or not. In our study, we would define a mechanism to give a user anonymity level. We classified user anonymity into three types: (1) The Type 1 User Anonymity: None else including server, can learn user ID. (2) The Type 2 User Anonymity: None else not including server, can learn user ID. (3) The Type 3 User Anonymity: None else not including server and other legal users, can learn user ID. The ID-theft prevention must achieve the property that none else can use a user''s exchanged informations to substitute the user to do illegal action, without agreement of the user.
Chuang, Shu-Chuan, and 莊淑娟. "A Study of Authentication Schemes with User Anonymity for Wireless Networks." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/75052146951548293592.
Повний текст джерела國立暨南國際大學
資訊管理學系
94
The use of anonymous channel tickets was proposed for authentication in wireless environments to provide user anonymity and to probably reduce the overhead of re-authentications. In 2004, Zhu and Ma proposed an authentication scheme with user anonymity based on the use of a one-way hash function and smart cards. Recently, Yang et al. also proposed a secure and efficient authentication protocol for anonymous channels in wireless systems without employing asymmetric cryptosystems. In this thesis, we will show that Zhu-Ma’s scheme fails to preserve user anonymity. We also find that Yang et al.’s scheme is vulnerable to guessing attacks performed by malicious visited networks. Via the proposed guessing attack, the secret keys of users may be revealed to visited networks. We will further propose a new practical authentication scheme preserving the same merits of their scheme. The proposed scheme has additional merits including: no verification table in the home network, free of time synchronization between mobile stations and visited networks, and without obsolete anonymous tickets left in visited networks. The proposed scheme is developed based on a secure one-way hash function and simple operations. The soundness of the authentication protocol is proved by using VO logic.
Jung-Lu-Chu and 朱榮祿. "On the Authentication Protocols with User Anonymity and its Applications on RFID." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/16193693987780493275.
Повний текст джерела吳鳳技術學院
光機電暨材料研究所
96
Radio Frequency Identification (RFID) is an important technology for automated identification of objects and people. Until now, there are many papers proposed to enhance the security of the RFID system. However, some have deficiency of computation overhead and some are even insecure. In several applications such as E-passport, etc., the privacy is an important requirement beside security. Furthermore, nearly all of the tags are with low computation capability and insufficient of memory such that most of the authentication protocols are not suit for RFID systems. Therefore, how to develop simple authentication protocols for RFID system to ensure security and privacy is an important issue. In this thesis, based on a simple one-way hash function, we propose a remote authentication protocol for RFID system. The proposed protocol is secure and with the merit of anonymity that protects user’s privacy. The proposed system is simple and with very low computation overhead which is suit for RFID system. Finally, the system is realized with hardware and software implementation.
Hsieh, JyhShin, and 謝志欣. "On The Security of Mobile IP Registration Protocol and User Anonymity in Mobile Communications." Thesis, 2000. http://ndltd.ncl.edu.tw/handle/56282676980735319654.
Повний текст джерела國立中興大學
資訊科學研究所
88
In recent years, the increasing development of the network technology increases the popularity of wireless and mobile communications. The communicative media of the wireless and mobile communication is unlike that of the wired networks. It is open to everyone. The information through wireless and mobile communications may easily be eavesdropped, modified, and forged. Therefore many security requirements and concerns need to be conferred and re-designed for such new network environments. In this thesis we concern about two topics. One is on the security of Mobile IP registration protocol. When a mobile node gets a new IP address, it must register to the home agent to update the mobility binding. The process is called registration. In this part we will study the security of the registration process. The other is about user anonymity and privacy. We will study how to use anonymity to protect user identity and private data. In mobile communications, a mobile node must get a care-of address form the foreign agent and register the care-of address to the home agent through the foreign agent. In the first part of the thesis, we will first demonstrate that the registration protocols are not secure. Because the original registration protocol of Mobile IP will suffer from a possible replay attack and the registration protocol of Sufatrio and Lam will suffer from TCP splicing attack. Then, we suggest a new scheme using some skill of the anonymity combine with the framework of Sufatrio and Lam’s protocol. In our scheme we can avoid registration protocol from attacks and provide higher security and performances of registration protocol. Anonymity can protect a user’s identify against eavesdropping during mobile communications. It can further protect the user’s privacy. In the second part of the thesis, we study the security issues of systems providing anonymity, such as GSM, CDPD, and the improved GSM(called Traveling alias ) and propose an anonymity scheme. Besides providing the anonymity, our system has the following characteristics: It can protect illegal intruders form outside or inside of the Visitor Location Register(VLR). The computing complexity of the user’s machine is low. And it has better performance compared with GSM or Traveling alias.
Chuang, Yun-Hsin, and 莊允心. "Provably Secure ID-based Mutual Authentication and Key Agreement with User Anonymity for Various Environments." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/59366345270474338456.
Повний текст джерела國立彰化師範大學
數學系所
98
Since Internet and wireless networks have gained popularity around the world, there are many situations that mobile users need to remote access resources distributed in several servers. In the past, many schemes have been proposed to solve the issue of user authentication for multi-server environment and low-power mobile devices. However, most of these schemes have suffered from many attacks because these schemes did not provide formal security analysis. Mutual authentication and key agreement (MAKA) between mobile users and roaming agents is a primary security issue for many commercial mobile networks. For personal privacy, to develop a MAKA with anonymity for roaming services in global mobility networks to protect user’s identity has received much attention. Recently many schemes with user anonymity have been proposed to address this issue. However, most of those schemes were demonstrated to suffer from several security weaknesses and did not achieve user’s anonymity. In this thesis, we firstly show the security weaknesses of two dynamic ID-based user authentication and key agreement schemes for multi-server environment. Afterwards, we construct a security model for multi-server environment and then propose a generalized ID-based MAKA scheme based on bilinear maps for mobile multi-server environment. Our scheme can be used for both general users with a long validity period and anonymous users with a short validity period. Under the presented security model, we show that our scheme is secure against all known attacks. Performance analysis is given to demonstrate that the proposed scheme is well suitable for low-power mobile devices. In this thesis, we also propose a novel MAKA with anonymity for roaming services in the global mobility network. Under the hash function and the public-key cryptosystem assumptions, we adopt the BAN logic to prove that the proposed scheme can withstand all known attacks. We also demonstrate that the proposed scheme provides the secrecy of the session key, user anonymity of user’s identity, as well as mutual authentication.
Hsieh, Ai-yun, and 謝艾芸. "Speech or silence: The effect of user anonymity and member familiarity on the willingness to express opinions in virtual communities." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/tum9cu.
Повний текст джерела國立臺灣科技大學
企業管理系
103
This study extended a traditional communication theory, spiral of silence, to explore the effects of user anonymity and member familiarity on opinion expression behavior in a virtual environment. A laboratory experiment method was used to manipulate user anonymity, member familiarity, and opinion congruity to measure the willingness to express opinions concerning controversial topics. A total of 147 participants were recruited in the experiment. The results revealed that anonymous users in virtual communities and users in groups comprising familiar members are more willing to express inconsistent opinions than nonanonymous users and users in groups containing unfamiliar members, respectively. In addition, anonymous and nonanonymous users as well as users in groups comprising familiar members and those in groups containing unfamiliar members are equally willing to express consistent opinions. This is the first study to verify the effect of user anonymity and member familiarity on the willingness to express opinions in online social communities. The findings have crucial implications regarding how governments and businesses can stimulate creativity and feedback through virtual communities.
Mahmoud, Mohamed Mohamed Elsalih Abdelsalam. "Efficient Packet-Drop Thwarting and User-Privacy Preserving Protocols for Multi-hop Wireless Networks." Thesis, 2011. http://hdl.handle.net/10012/5905.
Повний текст джерелаHu, Chia-Hsuan, and 胡珈瑄. "THE CAUSES AND EFFECTS OF USERS ONLINE ANONYMITY CONCERN." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/29711744612192104437.
Повний текст джерела大同大學
事業經營學系(所)
98
Compared to ways of face-to-face communication in the past, the internet exists with the nature of anonymity in addition to being convenient, easy-to-use, and free of time and place. Online anonymity improves online communication, protects personnel privacy in order to benefit the freedom of speech on specific issues, but it brings about some negative effects, such as getting rid of responsibility and network crimes. Hence, it is a must to understand the causes and consequences of online anonymity concern. Past research on online anonymity mostly has focused on using experimental method or situational manipulation to examine the effects of anonymity. To the knowledge of the authors, there have been no studies that have advanced an integrated framework to discuss the causes and consequences of online anonymity concern. This study is to make a breakthrough in the lack of the extant research on online anonymity in terms of an integrated research in order to explain the antecedents and the consequences of anonymity adoption behavior of online users. Since users with online experiences are targeted to be the research subjects, using online questionnaires is an appropriate sampling method. After two-month’s collection, a total of 360 questionnaires were returned, and the valid questionnaires were 345 after 15 invalid copies deducted. AMOS 6.0 and Structural Equation Modeling were used to measure path effects and hypothesis testing in order to analyze the causes and consequences of online anonymity concern. The findings reveal that, for online users, the three motivations of Computer-mediated Communication Apprehension, Privacy Protection and Attention to Social Comparison Information have significantly positive effects on anonymity concern. Among them, privacy protection concerns online users most. Next, on the positive effect of anonymity concern, the communication satisfaction outweighs the self-disclosure, while the negative effect of deindividuation excels that of the self-awareness.
Davis, Sarah Margaret. "What's in a name?: students' use of anonymity within next-generation classroom networks." Thesis, 2005. http://hdl.handle.net/2152/2411.
Повний текст джерелаLee, Chieh-yu, and 李婕瑜. "Twitter turns heads in Japan! The Effects of Relational Mobility, Anonymity and the Intention of Sharing Information on Japanese Twitter Users." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/6yu5g9.
Повний текст джерела國立中山大學
行銷傳播管理研究所
103
Titter is the most prevalent social media in Japan and Japanese is the second most used language on Twitter. In order to look into the intense Twitter usage and high self-disclosure on Twitter in Japan, this study explores the Twitter environment to comprehend its anonymity function and abundant information. This study furthers such investigation by expanding Relational Mobility theory and examining their correlations with self-disclosure to delve into Japanese Twitter users’ self-disclosure level. Furthermore, this study explores the international awareness of users, which was neglected in previous social networking researches, to understand the role of users’ international awareness on Twitter users’ behavior. After exploring the correlations between the level of self-disclosure and three factors(Relational Mobility, anonymity and the intention of sharing information), this study examines the commitment between users and the usage on Twitter. A pilot was conducted before the official research in order to select the questionnaire items. Using a general population sample (N=335), the study reveals relational mobility and the intention of sharing information influencing the degree which individuals self-disclose on Twitter. This result also found self-disclosure influence the level of commitment and commitment can influence usage.
Yen-HsuanSung and 宋彥萱. "The Umbrella under the Dome of Stigma: A Discourse Analysis on Users’ Needs for Perceived Anonymity and Virtual Diagnosis of a Taiwanese HIV/AIDS Forum." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/z4c5h8.
Повний текст джерела國立成功大學
外國語文學系
104
With the advances in Internet technology, there is a dramatic increase of reliance on online healthcare consultation, especially for stigmatized diseases or health conditions. While the search for health information on disease prevention or treatment and social support are two commonly documented functions of most health forums, those of HIV/AIDS are not well explored. To fill this gap, the present study examined discourse patterns by users of an HIV/AIDS forum based in Taiwan, with a comparison of those by users of other health forum, including syphilis, teen pregnancy, tuberculosis (TB), and cancer. With this comparative approach, we aim to see the psychosocial characteristics of users of the HIV/AIDS forum and their perception of the forum’s functions. By examining 82 users’ postings on the HIV/AIDS forum and a total of 216 postings on the other four medical consultation forums, our analysis manifests the following five discourse patterns. (1) Compared to the other four forums, users of the HIV/AIDS forum displayed the highest need for diagnosing or confirming their HIV infection status (i.e. 89%, as compared to 48% for diagnosing a syphilis infection status, 34% for TB infection, 30% for pregnancy status, and 2% for cancer status). (2) Such a strong need for an online diagnosis perceived by the HIV/AIDS forum users might appear to be “redundant” or “ungrounded”, as 20% of their posting actually revealed that their “HIV negative status” (i.e. they are HIV free) were already confirmed by previous tests. (3) About 54% of the suspected HIV transmission routes described in the users’ postings are sex-related behaviors, and 42% are routes which are generally not considered as possible ones. (4) Compared to the other four forums, users of the HIV/AIDS forum also displayed a highest preference for formulating their usernames which do not carry a sense of human name (59%, e.g. “1234567” or “小酒館/Small Inn”) or a sense of gender (61%, e.g. “匿名者/Anonymous Person” or “TMAC”), but convey a sense of emotional turmoil (34%, e.g. “煎熬/Suffering” or “日也想夜也想/Worry Day And Night”). (5) While the majority of the 82 usernames of the HIV/AIDS forum are “genderless” (61%), the rest of them are more constructed with a masculine sense (33%, e.g. “阿虎/A-hu” or “Sam”) than a feminine sense (6%, e.g. “Fay” or “Daisy”). Also the psychosocial features of users of the HIV/AIDS forum revealed in our study showed that they were: (1) mainly (male) individuals worrying about HIV transmission via sexual behavior, and (2) individuals with a high HIV/AIDS literacy, strong need for perceived anonymity, strong feeling of being HIV positive, and (3) individuals with a unanimous goal of looking for virtual diagnosis. These findings may shed a light for medical professionals in public health regarding HIV/AIDS prevention for high-risk groups of different social backgrounds. With the above discourse findings in compared the HIV/AIDS forum with four medical consultation forums based in Taiwan, we argued that multiple levels of stigma rooted in Taiwanese society toward “abnormal” sexual behaviors (e.g. homo, excessive, pre-marital sex), infectious disease (e.g. AIDS, syphilis, or TB), or relatively high mortality disease (e.g. AIDS or cancer) have driven individuals with “high HIV/AIDS literacy,” “a strong need for perceived anonymity” and “a strong feeling of being HIV positive” (even to the point of being “an AIDS worried-well or AIDS phobia”) to look for “virtual diagnosis” on the HIV/AIDS forum. In other words, unlike the functions of providing health information or social support of other health forums observed in previous studies, that of the HIV/AIDS forum perceived by users in our study is the “umbrella” that frees them from disclosing any social identity, shields them from tremendous stigma, and reassures them with a virtual diagnosis. This study contributes to the field of Internet health discourse in the following way. It demonstrates how the strong stigma associated with HIV/AIDS may drive its potential sufferers to construct language use as a way to protect their social identity, to reveal their anxiety, and also to serve their needs for medical help.