The Causality Test of Network Technical Anonymity and Perceptive Anonymity

被引:0
|
作者
Chen, Xi [1 ]
Li, Yujie [1 ]
机构
[1] Yunnan Univ, Sch Business Management & Tourism Management, Kunming, Peoples R China
关键词
network anonymity; technical anonymity; perceptive anonymity;
D O I
10.14257/ijfgcn.2016.9.3.25
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
In order to discuss different types of network anonymity and the correlations among them, this paper separates network anonymity into two variables on the basis of subject object dichotomy. One is network technical anonymity, referring to the amount of information concealed that lead to difficulties in identifying the subject; the other is perceptive anonymity, which means how anonymous one perceive him/herself has been. Then the author explores how to measure these variables and set up a test model to see if there is any causal relation between them. The data was collected from Sina Weibo, and it is intended for empirical test. This thesis proved that there is an obvious causal relation between the two types of anonymity.
引用
收藏
页码:279 / 287
页数:9
相关论文
共 50 条
  • [1] Technical challenges of network anonymity
    Kesdogan, D
    Palmer, C
    [J]. COMPUTER COMMUNICATIONS, 2006, 29 (03) : 306 - 324
  • [2] Evaluation indicators and model of network technical anonymity
    [J]. 1600, Science and Engineering Research Support Society, 20 Virginia Court, Sandy Bay, Tasmania, Australia (06):
  • [3] Evaluation Indicators and Model of Network Technical Anonymity
    Chen, Xi
    Li, Gang
    [J]. INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2013, 6 (04): : 181 - 192
  • [4] Tor network anonymity evaluation based on node anonymity
    Cui, Jun
    Huang, Changqi
    Meng, Huan
    Wei, Ran
    [J]. CYBERSECURITY, 2023, 6 (01)
  • [5] Tor network anonymity evaluation based on node anonymity
    Jun Cui
    Changqi Huang
    Huan Meng
    Ran Wei
    [J]. Cybersecurity, 6
  • [6] An architecture for an anonymity network
    Rennhard, M
    Rafaeli, S
    Mathy, L
    Plattner, B
    Hutchison, D
    [J]. PROCEEDINGS OF THE TENTH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, 2001, : 165 - 170
  • [7] Quo vadis network anonymity?
    Kesdogan, Dogan
    [J]. 2018 INTERNATIONAL CONFERENCE ON PROMISING ELECTRONIC TECHNOLOGIES (ICPET 2018), 2018, : 74 - 79
  • [8] Impact of Network Topology on Anonymity and Overhead in Low-Latency Anonymity Networks
    Diaz, Claudia
    Murdoch, Steven J.
    Troncoso, Carmela
    [J]. PRIVACY ENHANCING TECHNOLOGIES, 2010, 6205 : 184 - +
  • [9] ANONYMITY IN REFEREEING - MAYBE BUT ANONYMITY IN AUTHORSHIP - NO
    GARFIELD, E
    [J]. CURRENT CONTENTS, 1976, (11): : 5 - 7
  • [10] Optimizing Anonymity and Performance in a Mix Network
    Jee, Mathieu
    Piotrowska, Ania M.
    Halpin, Harry
    Marina, Ninoslav
    [J]. FOUNDATIONS AND PRACTICE OF SECURITY, FPS 2021, 2022, 13291 : 53 - 62