privacy and anonymity
Recently Published Documents


TOTAL DOCUMENTS

98
(FIVE YEARS 24)

H-INDEX

9
(FIVE YEARS 2)

2021 ◽  
Vol 14 (8) ◽  
pp. 361
Author(s):  
Olli-Pekka Hilmola

Since the inauguration of cryptocurrencies, Bitcoin has been under pressure from competing tokens. As Bitcoin is a public open ledger blockchain coin, it has its weaknesses in privacy and anonymity. In the recent decade numerous coins have been initiated as privacy coins, which try to tackle these weaknesses. This research compares mostly mature privacy coins to Bitcoin, and comparison is made from a price perspective. It seems that Bitcoin is leading privacy coins in price terms, and correlation is typically high and positive. From the earlier crypto market peak of 2017–18, only a very small number of coins are showing positive returns in 2021. It is typical that many privacy coins have lost substantial amounts of their value (ranging 80–90%) or that they do not exist anymore at all. Only Horizen and Monero have shown long-term sustainability in their value; however, their price changes follow that of Bitcoin very closely. The role of privacy coins in the future remains as an open issue.


2021 ◽  
Vol 17 (1) ◽  
Author(s):  
Felix Gille ◽  
Caroline Brall

AbstractPublic trust is paramount for the well functioning of data driven healthcare activities such as digital health interventions, contact tracing or the build-up of electronic health records. As the use of personal data is the common denominator for these healthcare activities, healthcare actors have an interest to ensure privacy and anonymity of the personal data they depend on. Maintaining privacy and anonymity of personal data contribute to the trustworthiness of these healthcare activities and are associated with the public willingness to trust these activities with their personal data. An analysis of online news readership comments about the failed care.data programme in England revealed that parts of the public have a false understanding of anonymity in the context of privacy protection of personal data as used for healthcare management and medical research. Some of those commenting demanded complete anonymity of their data to be willing to trust the process of data collection and analysis. As this demand is impossible to fulfil and trust is built on a false understanding of anonymity, the inability to meet this demand risks undermining public trust. Since public concerns about anonymity and privacy of personal data appear to be increasing, a large-scale information campaign about the limits and possibilities of anonymity with respect to the various uses of personal health data is urgently needed to help the public to make better informed choices about providing personal data.


2021 ◽  
Vol 25 (2) ◽  
pp. 61-76
Author(s):  
Przemysław Pukocz

The paper discusses proposals for implementing the COVID-19 digital Vaccination Passport based on Blockchain that protects privacy. Since the end of the last year, after the commencement of vaccination against COVID-19, there has been an intense discussion on the form of introducing such a tool and the consequences of its implementation. This discussion is taking place in many European countries. One element of this discussion was the safety and anonymity of the massively verified data of persons on vaccinations in various areas of society functioning. These issues are being resolved by the proposed digital Vaccination Passport system. This system uses two major methods: Blockchain and hash functions, which allow you to maintain security, privacy, and anonymity at the same time. To improve the intuitiveness and simplicity of the system operation, the QR code technology was proposed in the passport verification process. The system has been implemented and tested in the Amazon AWS cloud computing environment. A reference architecture based on Blockchain for the AWS environment was proposed, dedicated to large and demanding application solutions. In addition, the cloud environment offers access to many tools that were used in the system’s implementation, significantly increasing the security of the entire solution.


2021 ◽  
Vol 21 (3) ◽  
pp. 1-19
Author(s):  
Shehzad Ashraf Chaudhry ◽  
Azeem Irshad ◽  
Khalid Yahya ◽  
Neeraj Kumar ◽  
Mamoun Alazab ◽  
...  

The advancements in the internet of things (IoT) require specialized security protocols to provide unbreakable security along with computation and communication efficiencies. Moreover, user privacy and anonymity has emerged as an integral part, along with other security requirements. Unfortunately, many recent authentication schemes to secure IoT-based systems were either proved as vulnerable to different attacks or prey of inefficiencies. Some of these schemes suffer from a faulty design that happened mainly owing to undue emphasis on privacy and anonymity alongside performance efficiency. This article aims to show the design faults by analyzing a very recent hash functions-based authentication scheme for cloud-based IoT systems with misunderstood privacy cum efficiency tradeoff owing to an unadorned design flaw, which is also present in many other such schemes. Precisely, it is proved in this article that the scheme of Wazid et al. cannot provide mutual authentication and key agreement between a user and a sensor node when there exists more than one registered user. We then proposed an improved scheme and proved its security through formal and informal methods. The proposed scheme completes the authentication cycle with a minor increase in computation cost but provides all security goals along with privacy.


2021 ◽  
Vol 1 (1) ◽  
pp. 9-30
Author(s):  
Sydney Hanover ◽  

Governmental and corporate spying are no longer a surprising facet of everyday life in the digital age. In this paper, I expand upon the implications at stake in debates on autonomy, privacy, and anonymity, and I arrive at a definition of anonymity involving the flow between traits and the inability to connect them based on deliberate non- publication on a structurally social level. I argue that cultivating the space to remain anonymous is useful for distanced association with oneself in the purely private internal sphere, furthering a more fully examined inner association not based on a future already predicted or prematurely acted upon. The privilege of anonymity is a precondition for genuine self-relation. Later, I argue doubly against the “nothing to hide” argument, i.e., if one has nothing to hide, one has nothing to fear. Firstly, the actionability and fabrication of data make it such that it is always at risk of being interpreted as unsafe. Secondly, this argument is predicated on hiddenness as negative, which I answer with an analysis of the functionality of anonymity concerning personal growth.


2021 ◽  
Vol 4 (2) ◽  
pp. 01-10
Author(s):  
Issa Salmi

Introduction: Nurses should be committed to undertake continuing professional development (CPD) courses to advance nursing practice and guarantee lifelong learning. Online CPD programs may allow nurses to fulfil the demand for specialty competency. Aim: This study focuses on utilising online (CPD) activities to develop cardiac nurses’ ability to perform advanced clinical skills. Method: The study was conducted in one of the largest accredited teaching hospitals in South Australia. The department is staffed by a specialised multi-professional team, some of whom have completed specialised cardiac post-graduation diploma courses in order to meet the complex needs of cardiac patients. To keep the team abreast of the latest developments in practice, the in-service education department at local study setting runs several CPD programs for the cardiology department via varied learning modes, such as online CPD programs, classroom learning and bedside-based learning. The nursing team maintains advanced clinical skills through online CPD, orientation programs, and in-service classroom-based courses. Regarding online CPD courses, electrocardiography interpretation and underwater sealing draining management courses are mandatory courses which all registered nurses must complete while working in medical or surgical cardiac wards. Results: The interview process was conducted in five stages: 1. Determining the type of the interview where in such types of qualitative studies the researcher should focus on the fundamental question of the phenomenological inquiry throughout the unstructured, in-depth interview process. 2. Making initial contact where the researcher established a rapport with the participant and prepared them mentally by giving them the participant information sheet. 3. Context of the interview where interviews be conducted in a quiet room in the School of Nursing in order to maintain participant privacy and anonymity, participants requested to conduct the interviews in their work setting. Nonetheless, the researcher ensured that participant privacy and anonymity was upheld. 4. Selecting the lived experience where Each participant was interviewed once. Interview duration was 15 to 30 minutes. The interviews started with a grand tour question. Grand tour questions are very broad questions asked by the interviewer at the early stage of an interview to obtain a description of the event or experience. 5. All interviews were concluded by thanking the participant and offering them the choice to have a copy of their interview transcript to verify what they had said. The researcher wrote an interview summary after listening to the interviews on the same day. The summary was prepared to help the researcher evaluate the amount of data gathered and identify whether the point of data saturation was reached. In addition, writing the summary helped the researcher reflect on the interview and gain an understanding of the participant experience Conclusion This study explained the process of data collection, describing the setting, nature of participants and process of data collection using phenomenological interview. As the human experience is complex, gathering in-depth data should be systematic to ensure that the researcher has obtained the most sufficient data to explore the essence of the experience.


2020 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Daniel Dupuis ◽  
Kimberly Gleason

Purpose The purpose of this study is to describe the opportunities and limitations of cryptocurrencies as a tool for money laundering through six currently available “open doors” (exchange mechanisms). The authors link the regulatory dialectic paradigm to know your customer and anti-money laundering evasion techniques, highlight six tactics to launder funds with virtual assets and investigate potential law enforcement and regulatory alternates used to reduce the incidence of money laundering with digital coins. Design/methodology/approach The methodology used is the analysis of significant recent events and the availability of “fintech” crime-fighting tools and a literature review focusing on the application of the regulatory dialectic to innovations in existing crypto-asset markets that make them compelling to money launderers. Findings The authors examine the illicit use of cryptocurrency through Kane’s regulatory dialectic paradigm, identify a number of avenues for crypto to fiat exchange that are still available for those seeking to launder money using digital coins, review recently “closed doors” and make recommendations regarding the regulation of crypto-related markets that may assist in making them less desirable for potential criminals. Research limitations/implications The research is constrained by the state of the market for crypto to fiat exchange as of time of writing; the technology and products to launder money using these open doors is continually changing (as predicted by the regulatory dialectic). Social implications The regulatory dialectic predicts that regulatory response is reactive and often increasingly burdensome or oppressive. There is continuous innovation in the cryptocurrency market, which seeks to preserve privacy and anonymity with which regulators seek to keep up. From a social perspective, the response of bank regulators worldwide to existing open doors for crypto to fiat exchange used for money laundering may prove costly to individuals engaging in legitimate transactions, as well as financial criminals and may also erode the ability of individuals to maintain privacy regarding their financial information. Originality/value To the authors’ knowledge, there are yet no broad overview regarding the feasibility of money laundering across crypto-related assets within the paradigm of the regulatory dialectic.


2020 ◽  
Vol 5 (2) ◽  
pp. e002149 ◽  
Author(s):  
Bilikisu Elewonibi ◽  
Ryoko Sato ◽  
Rachel Manongi ◽  
Sia Msuya ◽  
Iqbal Shah ◽  
...  

IntroductionStudies on the determinants of contraceptive use often consider distance to the nearest health facility offering contraception as a key explanatory variable. Women, however, may not seek contraception from the nearest facility, rather opting for a more distant facility with better quality services or to ensure greater privacy and anonymity.MethodsThe dataset used include the name of facility where each women obtained contraception, measures of facility quality, and the distance between each woman’s home and 39 potential facilities she might visit. We use a conditional-multinomial logit model to estimate the determinants of her facility choice to visit and how women tradeoff travelling longer distances to use higher quality facilities.ResultsOnly 33% of woman who received contraception from a health facility used their nearest facility. While the nearest facility was 1.2 km away, the average distance to facility used was 2.9 km, indicating women are willing to travel significantly longer distances for higher quality. Women prefer facilities that specialise in providing contraception, provide a large range of methods, do not suffer from stock outs and do not charge fees. Furthermore, on average, women are willing to travel an additional 2 km for a facility that offers more family planning methods, 4.7 km for a facility without one additional health service, 9 km for a facility without fees for contraception and 11 km for a facility not experiencing stock out of an additional contraception.ConclusionOur results suggest that quality of services provided is an important driver of facility choice in addition to distance to facility.


Sign in / Sign up

Export Citation Format

Share Document