Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Anonymity

Encyclopedia of Mobile Phone Behavior
Where a user of a communication channel protects his or her identity from being shared with another user or with a third party.
Published in Chapter:
An Exploration of Intrusive Mobile Phone Behavior
Emma Short (University of Bedfordshire, UK) and Isabella McMurray (University of Bedfordshire, UK)
Copyright: © 2015 |Pages: 11
DOI: 10.4018/978-1-4666-8239-9.ch077
Abstract
Technological advances in mobile phones, changing tariffs, and cultural and individual differences have influenced the explosion in communication between individuals through online applications with a mobile phone. Positive benefits include the ability to make contact anytime, anywhere. However, there are also drawbacks. Instant, remote access has opened the door to intrusive behaviors (also known as cyberstalking) by mobile devices. This article provides a brief overview of cyberstalking laws alongside a review of empirical studies exploring cyberstalking, drawing on the authors' own previous study and others in the field. Intrusive behavior is prevalent to the point of becoming a social norm despite recipients reporting being distressed; there is still a higher level of acceptance of online harassment than there is for offline harassment. Future research and interventions should focus on exploring the social norms of this behavior and raising awareness of the effect of unwanted contact by online, often mobile devices.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Peer-to-Peer Social Networks
State of being unknown or unacknowledged to the others.
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
Using Audience Response Systems in the Classroom
A feature of an ARS that can protect the identity of a participant. The default state is ‘anonymity’, but it is possible to collect unique keypad identifiers if the response of a specific individual or group is required (e.g. for attendance or testing).
Full Text Chapter Download: US $37.50 Add to Cart
Digital Terrorism Attack: Types, Effects, and Prevention
Restraining oneself from revealing their true identity.
Full Text Chapter Download: US $37.50 Add to Cart
A Qualitative Insight Into the Personal Factors Impacting Online Impulse Behavior
A situation where a customer does not want to disclose its identity.
Full Text Chapter Download: US $37.50 Add to Cart
A Virtual Community for Mobile Agents
The degree to which a software system or component allows for or supports anonymous transactions.
Full Text Chapter Download: US $37.50 Add to Cart
Troll Farm: Anonymity as a Weapon for Online Character Assassination
As used in this chapter, the condition wherein an online commentator's actual identity is not made available. In addition to pure anonymity, where no identifying information is provided, this also would include situations where the commentator uses a pseudonym or an avatar for self-representation.
Full Text Chapter Download: US $37.50 Add to Cart
Cyberbullying: Negative Interaction Through Social Media
The quality of being unknown or unacknowledged.
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
Research Ethics Among Undergraduates of the Social Sciences
Anonymity is guaranteed in a research project when neither the researchers nor the readers of the findings can link a given response with a given respondent’ ( Babbie, 2020 ).
Full Text Chapter Download: US $37.50 Add to Cart
Anonymous Communications in Computer Networks
State of being not identifiable among other items belonging to a set. This set is called anonymity set .
Full Text Chapter Download: US $37.50 Add to Cart
Privacy-Enhancing Technologies
The property that a user cannot be identified within the total user population, nor her interactions be tracked.
Full Text Chapter Download: US $37.50 Add to Cart
Agents and Payment Systems in E-Commerce
The degree to which a software system or component allows for or supports anonymous transactions.
Full Text Chapter Download: US $37.50 Add to Cart
Business Ethics in the Information Age: The Transformations and Challenges of E-Business
The condition of being able to keep one’s identity private from others when engaged in a transaction.
Full Text Chapter Download: US $37.50 Add to Cart
Troll Farm: Anonymity as a Weapon for Online Character Assassination
As used in this chapter, the condition wherein an online commentator's actual identity is not made available. In addition to pure anonymity, where no identifying information is provided, this also would include situations where the commentator uses a pseudonym or an avatar for self-representation.
Full Text Chapter Download: US $37.50 Add to Cart
The Nature of Cyberbullying Among Youths
The quality of being unknown or unacknowledged.
Full Text Chapter Download: US $37.50 Add to Cart
Cyber-Identities and Social Life in Cyberspace
Anonymity is the state of not being known by any name. Anonymity is defined as freedom from identification and implies lack of distinctiveness. An unnamed person is someone, who is unacknowledged as the doer of something because of a lack of distinctive features.
Full Text Chapter Download: US $37.50 Add to Cart
Youths and Cyberbullying: Description, Theories, and Recommendations
Full Text Chapter Download: US $37.50 Add to Cart
Cyberbullying: Prevalence, Characteristics, and Consequences
The quality of being unknown or unacknowledged.
Full Text Chapter Download: US $37.50 Add to Cart
Trends in Government e-Authentication: Policy and Practice
Authenticating without disclosure of identity, thereby providing privacy of one’s identity.
Full Text Chapter Download: US $37.50 Add to Cart
Security of Mobile Code
Anonymity is when agents’ actions and data are anonymous for hosts and other agents
Full Text Chapter Download: US $37.50 Add to Cart
Information Security and Privacy in Medical Application Scenario
The property of not being identifiable that is personal identity, or personally identifiable information of that person that can be used to identify that person is not known.
Full Text Chapter Download: US $37.50 Add to Cart
Identity Theories and Technology
Withholding identifiable information about oneself from others.
Full Text Chapter Download: US $37.50 Add to Cart
Cyberbullying: The Dark Side of Digital Interactions
The quality of being unknown or unacknowledged.
Full Text Chapter Download: US $37.50 Add to Cart
Exploring Affordances and Limitations of 3D Virtual Worlds in Psychoeducational Group Counseling
It is the condition when acting person’s real identity is not known. In virtual environment, people usually use a nickname to ensure the anonymity.
Full Text Chapter Download: US $37.50 Add to Cart
Terminological Obfuscation in Online Research
Under-theorized in social science research, anonymity generally refers to not knowing “the identity” of another person. Often a vague and imprecise notion of “anonymity” is cited as the reason why people are hostile and “flame” each other in online interaction. Although identity is acknowledged as complex, anonymity remains undefined. If anonymity is not defined in research, then it is difficult to know which aspects of missing identity cause hostile interaction.
Full Text Chapter Download: US $37.50 Add to Cart
Privacy and Anonymity in Mobile Ad Hoc Networks
The state of being not identifiable within a set of subjects.
Full Text Chapter Download: US $37.50 Add to Cart
Digital Ethics
A situation in which an acting person’s identity remains unknown to others.
Full Text Chapter Download: US $37.50 Add to Cart
Web Search Privacy Evaluation Metrics
Anonymity measures the ability of a system or process to protect the identity of individuals. It can be quantified using metrics such as k-anonymity and l-diversity, which evaluate the degree to which personal information can be linked to specific individuals.
Full Text Chapter Download: US $37.50 Add to Cart
Managing IS Security and Privacy
The privacy goal of the inability to identify a user’s identity when that user is performing an action or using a resource of a given system.
Full Text Chapter Download: US $37.50 Add to Cart
A P2P Architecture for Social Networking
State of being unknown or unacknowledged to the others.
Full Text Chapter Download: US $37.50 Add to Cart
Information Security and Privacy in Medical Application Scenario
The property of not being identifiable that is personal identity, or personally identifiable information of that person that can be used to identify that person is not known.
Full Text Chapter Download: US $37.50 Add to Cart
Privacy in the Digital World
Anonymity is the state of being not identifiable within a set of subjects (users), known as the anonymity set. To enable anonymity of a subject (user), there always has to be an appropriate set of subjects with potentially the same attributes.
Full Text Chapter Download: US $37.50 Add to Cart
Agent-Based Social Networks
State of being unknown or unacknowledged to the others.
Full Text Chapter Download: US $37.50 Add to Cart
Terminological Obfuscation in Online Research
Under-theorized in social science research, anonymity generally refers to not knowing “the identity” of another person. Often a vague and imprecise notion of “anonymity” is cited as the reason why people are hostile and “flame” each other in online interaction. Although identity is acknowledged as complex, anonymity remains undefined. If anonymity is not defined in research, then it is difficult to know which aspects of missing identity cause hostile interaction.
Full Text Chapter Download: US $37.50 Add to Cart
Cybercrime and Private Health Data: Review, Current Developments, and Future Trends
Anonymity and thus anonymous data is any information from which the person to whom the data relates cannot be identified, whether by the company processing the data or by any other person.
Full Text Chapter Download: US $37.50 Add to Cart
The Intersection of Cybercrime and the Blockchain
Describes situations where the acting person's name is unknown.
Full Text Chapter Download: US $37.50 Add to Cart
Gender Differences and Cultural Orientation in E-Collaboration
Function to enable group members to contribute comments without being identified.
Full Text Chapter Download: US $37.50 Add to Cart
Secure Routing with Reputation in MANET
Aims at hiding an entity’s identity completely.
Full Text Chapter Download: US $37.50 Add to Cart
Ethical Issues in Research Conducted With the Participation of Children
Anonymity is a key concern of much social research, often deemed essential, a self-evident principle for protecting research participants from possible harm (Moore, 2012).
Full Text Chapter Download: US $37.50 Add to Cart
Group Size Effects in Electronic Brainstorming
A condition where individual contributions to a brainstorming session are not attributed to individual participants.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR