An analysis of tools for online anonymity
Author:
Winkler Stephanie,Zeadally Sherali
Abstract
Purpose
– The purpose of this paper is to examine the possible explanations for the slow adoption and development of online anonymity technology. The ability to remain anonymous while engaging in different activities, online is increasingly sought after by consumers with privacy concerns. Currently, the only way to maintain online anonymity is through the use of technology. This paper reviews and analyzes the tools currently available to consumers to maintain online anonymity. There are only four tools available to consumers to ensure online anonymity: anonymous remailers, rewebbers, The Onion Router (Tor) and the Invisible Internet Project (I2P). These tools provide the protection needed for an Internet user to remain anonymous but suffer from a lack of usability and adoption.
Design/methodology/approach
– The authors have selected a few specific online anonymity technologies based on the following criteria: the technology satisfies our full anonymity definition, the technology is currently available for public use and the technology has been academically researched.
Findings
– Few anonymity technologies are available for public use that offer the ability for full online anonymity, and these technologies are difficult for the average computer user to operate. Further research is still needed to help determine what the average user wants to see in an anonymity technology as well as ways to help users integrate the technology into their commodity software (such as Web browsers). Future online anonymity technologies should enable the user to decide when, how and with whom their information is shared if it is shared at all with ease and simplicity.
Originality/value
– The authors identify, explain and analyze publicly available online anonymity technologies in terms of their usability. The authors identified ways as to how online anonymity technology can be improved to increase public adoption. The authors make pertinent recommendations on how the design and development of online anonymity technology can be improved in the future.
Subject
General Computer Science,Theoretical Computer Science
Reference48 articles.
1. Acquisti, A.
,
Dingledine, R.
and
Syverson, P.
(2003), “On the economics of anonymity”,
7th International Conference on Financial Cryptography
, Guadeloupe, 27-30 January, pp. 84-102. 2. Adam, R.
(1991), “Laws for the lawless: ethics in (information) science”,
Journal of Information Science
. Vol. 17 No. 6, pp. 357-372. 3. Anthes, G.
(2015), “Data brokers are watching you”,
Communications of the AMC
, Vol. 58 No. 1, pp. 28-30. 4. Backes, M.
,
Kate, A.
,
Manoharan, P.
,
Meiser, S.
and
Mohammadi, E.
(2013), “ANOA: a framework for analyzing anonymous communication protocols unified definitions and analysis of anonymity properties”,
IEEE 26th Computer Security Foundations Symposium (CSF
), New Orleans, LA, 26-28 June, pp. 163-178. 5. Beato, F.
,
Cristofaro, E.D.
and
Rasmussen, K.B.
(2014), “Undetectable communication: the online social networks case”, 2014 Twelfth Annual Conference on Privacy, Security, and Trust (PST), Toronto, ON, 23-24 July, pp. 19-26.
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
|
|