Skip to main content
Top

2015 | OriginalPaper | Chapter

An Investigation of the Factors that Predict an Internet User’s Perception of Anonymity on the Web

Authors : Shruti Devaraj, Myrtede Alfred, Kapil Chalil Madathil, Anand K. Gramopadhye

Published in: Human Aspects of Information Security, Privacy, and Trust

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The growth of the Internet as a means of communication has sparked a need for researchers to investigate the issues surrounding different social behaviors associated with Internet use. Of particular interest is the importance of a user’s perception of anonymity. The independent variables for the study were demographic information, social networking habits and prior negative experience. The dependent variable for this study was perception of online anonymity. Data for this analysis were taken from the Pew Research Center’s Internet & American Life Project’s July 2013 Pew Internet Anonymity Survey. A binomial logistic regression analysis was performed to predict perception of anonymity on the Web. Results indicated that gender, income level, education level, social networking habits and compromised identity are significant in predicting one’s perception of anonymity on the web. Age and prior negative experience were not significant predictors. Differences in technological proficiency and access to the web are two factors believed to have contributed to these results, particularly those related to demographics. The findings from this research could be used to help target demographics with the education and support needed to protect their identity on the web. This study also offers insight about who are more likely to attempt to use the web anonymously and will help further identify the patterns of behavior associated with anonymous web use. This paper calls for further studies to analyze to what extent do the opinions and experiences of friends and relatives impact an individual’s perception of anonymity.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
go back to reference Abhyankar, A.: Social Networking Sites. Samvad, SIBM (2011) Abhyankar, A.: Social Networking Sites. Samvad, SIBM (2011)
go back to reference Ackeman, M.S., Cranor, L.F., Reagle, J.: Privacy in E-Commerce: Examining User Scenarios and Privacy Preferences. In: Proceedings of 1st ACM Conference on Electronic Commerce, pp. 1–8 (1999) Ackeman, M.S., Cranor, L.F., Reagle, J.: Privacy in E-Commerce: Examining User Scenarios and Privacy Preferences. In: Proceedings of 1st ACM Conference on Electronic Commerce, pp. 1–8 (1999)
go back to reference Bakshy, E, Rosenn, I., Marlow, C., Adamic, L.: The role of social networks in information diffusion. In: WWW 2012 – Session: Information Diffusion in Social Networks (2012) Bakshy, E, Rosenn, I., Marlow, C., Adamic, L.: The role of social networks in information diffusion. In: WWW 2012 – Session: Information Diffusion in Social Networks (2012)
go back to reference Berendt, B.: Privacy In E-Commerce: Stated Preferences Vs Actual Behavior. Commun. ACM 48(4), 101–106 (2005)CrossRef Berendt, B.: Privacy In E-Commerce: Stated Preferences Vs Actual Behavior. Commun. ACM 48(4), 101–106 (2005)CrossRef
go back to reference Bimber, B.: Measuring the gender gap on the internet. Soc. Sci. Q. 81(3), 868–876 (2000) Bimber, B.: Measuring the gender gap on the internet. Soc. Sci. Q. 81(3), 868–876 (2000)
go back to reference Boyd, D.M., Ellison, N.B.: Social networking sites: definition, history and scholarship. J. Comput. Mediated Inf. 13(1), 210–230 (2007)CrossRef Boyd, D.M., Ellison, N.B.: Social networking sites: definition, history and scholarship. J. Comput. Mediated Inf. 13(1), 210–230 (2007)CrossRef
go back to reference Chalil Madathil, K., Greenstein, JUST, Nines, DAM, Juan, K., Gramopadhye, O.K.: An investigation of the informational needs of Ovarian cancer patients and their supporters. In: Proceedings of the Human Factors and Ergonomics Society’s International Annual Meeting, San Diego, CA, September 2013 Chalil Madathil, K., Greenstein, JUST, Nines, DAM, Juan, K., Gramopadhye, O.K.: An investigation of the informational needs of Ovarian cancer patients and their supporters. In: Proceedings of the Human Factors and Ergonomics Society’s International Annual Meeting, San Diego, CA, September 2013
go back to reference Chen, K., Rea, A.: Protecting personal information online: a survey of user privacy concerns and control techniques. J. Comput. Inf. Syst. 44(4), 85–92 (2004) Chen, K., Rea, A.: Protecting personal information online: a survey of user privacy concerns and control techniques. J. Comput. Inf. Syst. 44(4), 85–92 (2004)
go back to reference Clark, J., Van Borscht, P.C., Adams, C.: Usability of anonymous web browsing: an examination of tor interfaces and deploy ability. In: Proceedings of the 3rd Symposium on Usable Privacy and Security, pp. 41–51. ACM, July 2007 Clark, J., Van Borscht, P.C., Adams, C.: Usability of anonymous web browsing: an examination of tor interfaces and deploy ability. In: Proceedings of the 3rd Symposium on Usable Privacy and Security, pp. 41–51. ACM, July 2007
go back to reference DiMaggio, P., Hargittai, E.: From the ‘digital divide’to ‘digital inequality’: studying internet use as penetration increases. Princeton University Center for Arts and Cultural Policy Studies, Working Paper Series number, 15 (2001) DiMaggio, P., Hargittai, E.: From the ‘digital divide’to ‘digital inequality’: studying internet use as penetration increases. Princeton University Center for Arts and Cultural Policy Studies, Working Paper Series number, 15 (2001)
go back to reference Fraune, M., Juang, K., Greenstein, J.S., Chalil Madathil, K., Koikkara, R.: Employing user-created pictures to enhance the recall of system-generated mnemonic phrases and security of Passwords. In: Proceedings of the Human Factors and Ergonomics Society’s International Annual Meeting, San Diego, CA (2013) Fraune, M., Juang, K., Greenstein, J.S., Chalil Madathil, K., Koikkara, R.: Employing user-created pictures to enhance the recall of system-generated mnemonic phrases and security of Passwords. In: Proceedings of the Human Factors and Ergonomics Society’s International Annual Meeting, San Diego, CA (2013)
go back to reference Gefen, D., Straub, D.: Gender differences in the perception and use of e-mail: an acceptance of the technology acceptance model. MIS Q. /December 21, 389–400 (1997)CrossRef Gefen, D., Straub, D.: Gender differences in the perception and use of e-mail: an acceptance of the technology acceptance model. MIS Q. /December 21, 389–400 (1997)CrossRef
go back to reference Hargittai, E., Shafer, S.: Differences In Actual And Perceived Online Skills: The Role Of Gender. Social Science Quarterly 87(2), 432–448 (2006)CrossRef Hargittai, E., Shafer, S.: Differences In Actual And Perceived Online Skills: The Role Of Gender. Social Science Quarterly 87(2), 432–448 (2006)CrossRef
go back to reference Holt, D.T., Crocker, M.: Prior negative experiences: their impacts on computer training outcomes. Comput. Educ. 35(4), 295–308 (2000)CrossRef Holt, D.T., Crocker, M.: Prior negative experiences: their impacts on computer training outcomes. Comput. Educ. 35(4), 295–308 (2000)CrossRef
go back to reference Kang, R., Brown, S., Kiesler, S.: Why do people seek anonymity on the internet? informing policy and design. CHI 2013, April 27–May 2 2013 Kang, R., Brown, S., Kiesler, S.: Why do people seek anonymity on the internet? informing policy and design. CHI 2013, April 27–May 2 2013
go back to reference Lehman, D.: Protecting kids’ privacy is costly, Computer World, April, p. 97 (2007) Lehman, D.: Protecting kids’ privacy is costly, Computer World, April, p. 97 (2007)
go back to reference Lin, J.C., Lu, H.: Towards an understanding of the behavioral intention to use a web site. Int. J. Inf. Manage. 20(3), 197–208 (2000)CrossRef Lin, J.C., Lu, H.: Towards an understanding of the behavioral intention to use a web site. Int. J. Inf. Manage. 20(3), 197–208 (2000)CrossRef
go back to reference Marx, G.T.: what’s in a name? some reflections on the sociology of anonymity. Inf. Soc. 15(2), 99–112 (1999)CrossRef Marx, G.T.: what’s in a name? some reflections on the sociology of anonymity. Inf. Soc. 15(2), 99–112 (1999)CrossRef
go back to reference Porter, C.E., Donthu, N.: Using the technology acceptance model to explain how attitudes determine internet usage: the role of perceeived access barriers and demographics. J. Bus. Res. 59(9), 999–1007 (2006)CrossRef Porter, C.E., Donthu, N.: Using the technology acceptance model to explain how attitudes determine internet usage: the role of perceeived access barriers and demographics. J. Bus. Res. 59(9), 999–1007 (2006)CrossRef
go back to reference Rezgui, A., Bouguettaya, A., Eltoweissy, M.Y.: Privacy on the web: facts, challenges and solutions. IEEE Secur. Priv. 1(6), 40–49 (2003)CrossRef Rezgui, A., Bouguettaya, A., Eltoweissy, M.Y.: Privacy on the web: facts, challenges and solutions. IEEE Secur. Priv. 1(6), 40–49 (2003)CrossRef
go back to reference Rezgui, A., Ouzzani, M., Bouguettaya, A., Medjahed, B.: Preserving privacy in web services ACM 1-58113-593-9/02/001 (2002) Rezgui, A., Ouzzani, M., Bouguettaya, A., Medjahed, B.: Preserving privacy in web services ACM 1-58113-593-9/02/001 (2002)
go back to reference Subrahmanyam, K., Reich, S.M., Waechter, N., Espinoza, G.: Online and offline social networks: use of social networking sites by emerging adults. J. Appl. Dev. Psychol. 29, 420–433 (2008)CrossRef Subrahmanyam, K., Reich, S.M., Waechter, N., Espinoza, G.: Online and offline social networks: use of social networking sites by emerging adults. J. Appl. Dev. Psychol. 29, 420–433 (2008)CrossRef
go back to reference Sweeney, J.C., Soutar, G.N., Mazzoral, T.: Factors influencing word of mouth effectiveness: receiver perspectives. Eur. J. Mark. 42(3/4), 344–364 (2008)CrossRef Sweeney, J.C., Soutar, G.N., Mazzoral, T.: Factors influencing word of mouth effectiveness: receiver perspectives. Eur. J. Mark. 42(3/4), 344–364 (2008)CrossRef
go back to reference Traynor, M.: Anonymity and the internet. Comput. Internet Lawyer 22, 2 (2005) Traynor, M.: Anonymity and the internet. Comput. Internet Lawyer 22, 2 (2005)
go back to reference Turner, E., Dasgupta, S.: Privacy on the web: an examination of user concerns, technology and implications for business organizations and organization. Inf. Syst. Manage. 20(1), 8–19 (2003)CrossRef Turner, E., Dasgupta, S.: Privacy on the web: an examination of user concerns, technology and implications for business organizations and organization. Inf. Syst. Manage. 20(1), 8–19 (2003)CrossRef
go back to reference Wismer, A., Chalil Madathil, K., Koikkara, R., Juang, K., Greenstein, J.S.: Evaluating the usability of CAPTCHAs on a mobile device with voice and touch input. In: Proceedings of the Human Factors and Ergonomics Society 56th Annual Meeting, Boston, MA (2012) Wismer, A., Chalil Madathil, K., Koikkara, R., Juang, K., Greenstein, J.S.: Evaluating the usability of CAPTCHAs on a mobile device with voice and touch input. In: Proceedings of the Human Factors and Ergonomics Society 56th Annual Meeting, Boston, MA (2012)
Metadata
Title
An Investigation of the Factors that Predict an Internet User’s Perception of Anonymity on the Web
Authors
Shruti Devaraj
Myrtede Alfred
Kapil Chalil Madathil
Anand K. Gramopadhye
Copyright Year
2015
DOI
https://doi.org/10.1007/978-3-319-20376-8_28

Premium Partner