Results 321 to 330 of about 695,630 (383)
Some of the next articles are maybe not open access.

Lightweight and Anonymity-Preserving User Authentication Scheme for IoT-Based Healthcare

IEEE Internet of Things Journal, 2021
Internet of Things (IoT) produces massive heterogeneous data from various applications, including digital health, smart hospitals, automated pathology labs, and so forth.
Mehedi Masud   +5 more
semanticscholar   +1 more source

Beyond Anonymity: Network Affordances, under Deindividuation, Improve Social Media Discussion Quality

Social Science Research Network, 2021
The online sphere allows people to be personally anonymous while simultaneously being socially identifiable. Twitter users can use a pseudonym but signal allegiance to a political party in their profile (e.g., #MAGA).
Kokil Jaidka   +4 more
semanticscholar   +1 more source

What's in a "Username"? The Effect of Perceived Anonymity on Herding in Crowdfunding

Information systems research, 2021
This research investigates whether and how predecessors’ usernames—as evaluated from a perspective of perceived anonymity—affect successors’ herding momentum through the varying extent of perceived source credibility.
Yang Jiang   +3 more
semanticscholar   +1 more source

Anonymity Services Tor, I2P, JonDonym: Classifying in the Dark (Web)

IEEE Transactions on Dependable and Secure Computing, 2020
Traffic Classification (TC) is an important tool for several tasks, applied in different fields (security, management, traffic engineering, R&D).
Antonio Montieri   +3 more
semanticscholar   +1 more source

Anonymity, User Engagement, Quality, and Trolling on Q&A Sites

Proc. ACM Hum. Comput. Interact., 2021
In online question and answer (Q&A) communities, people ask questions and share answers at all levels of topic sensitivity. Identity options within these communities range from anonymity to real name.
Cheng Guo, Kelly E. Caine
semanticscholar   +1 more source

A Dive into the Dark Web: Hierarchical Traffic Classification of Anonymity Tools

IEEE Transactions on Network Science and Engineering, 2020
Privacy-preserving protocols and tools are increasingly adopted by Internet users nowadays. These mechanisms are challenged by the process of traffic classification (TC) which, other than being an important workhorse for several network management tasks,
Antonio Montieri   +4 more
semanticscholar   +1 more source

Anonymity and Alcoholics Anonymous

JAMA: The Journal of the American Medical Association, 1983
To the Editor.— The recent letter by David—, MD, of New York in the Nov 12, 1982, issue ofThe Journal(1982;248:2237) stating that "in accordance with AA [Alcoholics Anonymous] tradition, I can only sign my first name" is not correct. There is certainly the tradition that in meetings persons only give their first names, but there is absolutely no ...
openaire   +2 more sources

Anonymity and Online Self-Disclosure: A Meta-Analysis

Communication Reports, 2019
When an individual is anonymous online, they may communicate more boldly than they would in a face-to-face situation—a phenomenon called the online disinhibition effect. While much is known about the toxic effects of online disinhibition, social effects (
Cathlin V. Clark-Gordon   +3 more
semanticscholar   +1 more source

Against Anonymity

Bioethics, 2014
AbstractIn ‘New Threats to Academic Freedom’ Francesca Minerva argues that anonymity for the authors of controversial articles is a prerequisite for academic freedom in the Internet age. This argument draws its intellectual and emotional power from the author's account of the reaction to the on‐line publication of ‘ After‐birth abortion: why should the
openaire   +2 more sources

Home - About - Disclaimer - Privacy