Essays about: "Physical anonymity"

Showing result 1 - 5 of 10 essays containing the words Physical anonymity.

  1. 1. Navigating Anonymity in Online Communities: A Multilevel Perspective : Examining user experiences and perceptions of online anonymity in the Fishbrain enthusiast community

    University essay from Uppsala universitet/Människa-datorinteraktion

    Author : Md. Shadman Rahman; [2023]
    Keywords : Online anonymity; Enthusiast community; Fishbrain platform; Online Communities; Social media platforms; Macro and micro-level structures; Factual anonymity; Social group anonymity; Physical anonymity; Deductive thematic analysis; User behavior; Privacy concerns; User perceptions;

    Abstract : This study examines the intricate dynamics of online anonymity in the context of Fishbrain, a platform for fishing enthusiasts. By conducting semi-structured interviews with ten Fishbrain users, I scrutinized the experiences and understanding of online anonymity through a deductive thematic analysis approach. READ MORE

  2. 2. Face-to-face over the Internet : Facing the hard truth with physical attendance in a post-pandemic society

    University essay from Karlstads universitet/Fakulteten för humaniora och samhällsvetenskap (from 2013)

    Author : Kevin Nermark; [2023]
    Keywords : event attendance; remote participation; hybrid spaces; digital marketing; strategic communication; event planning.; eventdeltagande; deltagande på avstånd; hybridutrymmen; digital marknadsföring; strategisk kommunikation; eventplanering.;

    Abstract : This research is based on a pilot study, conducted on a marketer from an unnamed company within the tech industry (the anonymity is used because of the integrity of the interview subjects of both the pilot study and this study). The company deals with B2B (Business to business) transactions, and the marketing in this is somewhat different from the typical B2C (business to consumer) type of marketing. READ MORE

  3. 3. On the Viability of Digital Cash in Offline Payments

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Joakim Holgersson; John Enarsson; [2022]
    Keywords : Digital cash; offline payments; anonymous payments; digital coin; electronic coin ; Digitala kontanter; offlinebetalningar; anonyma betalningar; digitala mynt; elektroniska mynt;

    Abstract : Background. As the financial systems around the world become more digitized with the use of a card and mobile payments - we see a decrease in willingness to accept cash payments in many countries. These digital payments require a stable network connection to be processed in real-time. READ MORE

  4. 4. ICT Services and Gender-based Violence in Ethiopia : A Study of Four Organisations’ Implementation of ICT Services During the “Shadow Pandemic” of COVID-19

    University essay from Malmö universitet/Institutionen för konst, kultur och kommunikation (K3)

    Author : Cecilia Emilsson; [2022]
    Keywords : Ethiopia; shadow pandemic; gender-based violence; ICT services;

    Abstract : The term “shadow pandemic” arose along with the spread of the COVID-19 pandemic globally, referring to the parallel increase of gender-based violence (GBV) as a result of lockdowns, preventive measures and economic hardships in almost every nation worldwide, including Ethiopia, with one of the highest rates of GBV in the world. With limited physical access to essential services and support, information and communication(ICT) services became an important factor to rely on. READ MORE

  5. 5. Preserving Security and Privacy: a WiFi Analyzer Application based on Authentication and Tor

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Alexandra Kolonia; Rebecka Forsberg; [2020]
    Keywords : Network security; Privacy; Anonymity; Onion routing; Tor Organization; Wi-Fi data collection; Nätverkssäkerhet; Sekretess; Anonymitet; Lök-routing; Tor Organisation; Wifidatainsamling;

    Abstract : Numerous mobile applications have the potential to collect and share userspecific information on top of the essential data handling. This is made possible through poor application design and its improper implementation. READ MORE