Search Results

There are 46684 results for: content related to: To Reveal or Not to Reveal: A Theoretical Model of Anonymous Communication

  1. To Identify or Not to Identify: A Theoretical Model of Receiver Responses to Anonymous Communication

    Communication Theory

    Volume 17, Issue 1, February 2007, Pages: 61–91, Stephen A. Rains and Craig R. Scott

    Version of Record online : 28 FEB 2007, DOI: 10.1111/j.1468-2885.2007.00288.x

  2. Navigating the Unknown: Towards a Positive Conception of Anonymity

    The Southern Journal of Philosophy

    Volume 51, Issue 3, September 2013, Pages: 320–344, Julie Ponesse

    Version of Record online : 1 SEP 2013, DOI: 10.1111/sjp.12035

  3. The Ties That Blind: Conceptualizing Anonymity

    Journal of Social Philosophy

    Volume 45, Issue 3, Fall 2014, Pages: 304–322, Julie Ponesse

    Version of Record online : 25 AUG 2014, DOI: 10.1111/josp.12066

  4. Hilbert-order based spatial cloaking algorithm in road network

    Concurrency and Computation: Practice and Experience

    Volume 25, Issue 1, January 2013, Pages: 143–158, Yong-Ki Kim, Amina Hossain, Al-Amin Hossain and Jae-Woo Chang

    Version of Record online : 7 MAY 2012, DOI: 10.1002/cpe.2844

  5. Effects of Source and Participant Anonymity and Difference in Initial Opinions in an EMS Context

    Decision Sciences

    Volume 29, Issue 2, March 1998, Pages: 427–458, Surinder S. Kahai, Bruce J. Avolio and John J. Sosik

    Version of Record online : 7 JUN 2007, DOI: 10.1111/j.1540-5915.1998.tb01583.x

  6. Mobile anonymity of dynamic groups in vehicular networks

    Security and Communication Networks

    Volume 1, Issue 3, May/June 2008, Pages: 219–231, Yong Xi, Weisong Shi and Loren Schwiebert

    Version of Record online : 30 MAY 2008, DOI: 10.1002/sec.28

  7. In defence of anonymity: Rejoining the criticism

    British Educational Research Journal

    Volume 35, Issue 3, June 2009, Pages: 431–445, Anthony Kelly

    Version of Record online : 2 JAN 2013, DOI: 10.1080/01411920802044438

  8. Rape, Defendant Anonymity and Evidence-Based Policy Making

    The Modern Law Review

    Volume 76, Issue 1, January 2013, Pages: 109–133, Philip N.S. Rumney and Rachel Anne Fenton

    Version of Record online : 2 JAN 2013, DOI: 10.1111/1468-2230.12004

  9. Compliance or Obscurity? Online Anonymity as a Consequence of Fighting Unauthorised File-sharing

    Policy & Internet

    Volume 2, Issue 4, December 2010, Pages: 77–105, Stefan Larsson and Måns Svensson

    Version of Record online : 10 AUG 2012, DOI: 10.2202/1944-2866.1044

  10. You have free access to this content
    Anonymity and Self-Disclosure on Weblogs

    Journal of Computer-Mediated Communication

    Volume 12, Issue 4, July 2007, Pages: 1428–1451, Hua Qian and Craig R. Scott

    Version of Record online : 23 AUG 2007, DOI: 10.1111/j.1083-6101.2007.00380.x

  11. The effects of perceived anonymity and anonymity states on conformity and groupthink in online communities: A Wikipedia study

    Journal of the American Society for Information Science and Technology

    Volume 64, Issue 5, May 2013, Pages: 1001–1015, Michail Tsikerdekis

    Version of Record online : 8 MAR 2013, DOI: 10.1002/asi.22795

  12. The pursuit of self-interest and rule breaking in an anonymous situation

    Journal of Applied Social Psychology

    Volume 43, Issue 4, April 2013, Pages: 909–916, Tatsuya Nogami and Fujio Yoshida

    Version of Record online : 3 APR 2013, DOI: 10.1111/jasp.12056

  13. Privacy in Electronic Communications

    Network Security: Current Status and Future Directions

    Alf Zugenmaier, Joris Claessens, Pages: 419–440, 2006

    Published Online : 14 JUN 2006, DOI: 10.1002/9780470099742.ch24

  14. PCM: a privacy-preserving detection mechanism in mobile ad hoc networks

    Security and Communication Networks

    Volume 3, Issue 2-3, March - June 2010, Pages: 167–184, Bo Zhu, Kui Ren, Lingyu Wang and Mourad Debbabi

    Version of Record online : 30 JUN 2009, DOI: 10.1002/sec.122

  15. A survey of anonymity in wireless communication systems

    Security and Communication Networks

    Volume 2, Issue 5, September/October 2009, Pages: 427–444, Hui Chen, Yang Xiao, Xiaoyan Hong, Fei Hu and Jiang (Linda) Xie

    Version of Record online : 30 DEC 2008, DOI: 10.1002/sec.78

  16. You have free access to this content
    The Effects of Anonymity on Self-Disclosure in Blogs: An Application of the Online Disinhibition Effect

    Journal of Computer-Mediated Communication

    Volume 18, Issue 3, April 2013, Pages: 283–302, Erin E. Hollenbaugh and Marcia K. Everett

    Version of Record online : 22 FEB 2013, DOI: 10.1111/jcc4.12008

  17. You have free access to this content
    A Multi-Layer Dynamic Model for Customer Experience Analytics

    Bell Labs Technical Journal

    Volume 18, Issue 4, March 2014, Pages: 19–32, Sining Chen, Tin Kam Ho, Avinash Vyas, Jin Cao and Jeffrey Spiess

    Version of Record online : 26 FEB 2014, DOI: 10.1002/bltj.21643

  18. Mobility changes anonymity: new passive threats in mobile ad hoc networks

    Wireless Communications and Mobile Computing

    Volume 6, Issue 3, May 2006, Pages: 281–293, Xiaoyan Hong, Jiejun Kong and Mario Gerla

    Version of Record online : 2 MAY 2006, DOI: 10.1002/wcm.395

  19. Biometric Security and Privacy Using Smart Identity Management and Interoperability: Validation and Vulnerabilities of Various Techniques

    Review of Policy Research

    Volume 29, Issue 1, January 2012, Pages: 63–89, Harry Wechsler

    Version of Record online : 19 JAN 2012, DOI: 10.1111/j.1541-1338.2011.00538.x

  20. User identification and anonymization in 802.11 wireless LANs

    Security and Communication Networks

    Volume 5, Issue 1, January 2012, Pages: 15–27, Dingbang Xu, Yu Wang, Xinghua Shi and Xiaohang Yin

    Version of Record online : 15 FEB 2011, DOI: 10.1002/sec.296