E-Governments and the Environment of Anonymity Proposal

Exclusively available on Available only on IvyPanda® Made by Human No AI

Summary: Responsibility and Cyber society

The invention of the Internet and the following increase in the online communication process has posed a range of questions to the people engaging in these new activities, the principles of communication, and the effects of anonymity being the key ones. Though the lack of responsibility, which online communication presupposes, seemed to be leading only to minor issues, such as interpersonal conflicts, the effects of various forms of cybersecurity breach, from cyberbullying to cyber terrorism, may reach a tremendous scale and have just as huge an effect on the security of the state as they do on the privacy of online users.

While the incorporation of the cybersecurity principles into the framework of the online communication processes is fraught with a range of difficulties, the Internet users can still be introduced to the phenomenon of cyber ethics and made to follow the basic principles thereof. The advocacy of the key cyber ethics principles should be carried out with the minimum intrusion of the existing e-government, though, as the principles of responsibility must be fostered in users as opposed to the fear of being punished for breaking the laws of online communication.

The issue of anonymity is likely to impede the process of cybersecurity enhancement, as it blocks the development of social and personal responsibility in users from occurring. The environment of complete anonymity, which a range of forums offers their users, leads to reducing the fear of being punished for the actions that are considered wrong in real-life communication. As a result, the phenomena of cyberbullying, cyber-attacks, and even cyber-terrorism or the calls for the latter occur online.

Introduction: Problem Background

Being a member of the 21st-century society means being exposed to the influence of modern media in general and the Internet in particular. Though being a relatively new invention, the Internet has become part and parcel of nearly every person’s life; as a result, the transfer of social activities into the virtual environment occurred. Consequently, the people partaking in online conversations are just as vulnerable to offensive actions from other chat participants as they are in real life. In fact, in the virtual reality, the threat is even higher, as the anonymity of online conversations relieves most people of any responsibility in their online communication. While some infringements of the Internet users’ rights may be light or moderate (e.g., cyberbullying, trolling, etc.), others may, in fact, be very harmful (e.g., various attacks, including sniffers, probes, a variety of malware, Internet infrastructure attacks, denial of services attacks, remote to local attacks, user to root attacks, etc. (Prasad et al. 22)).

More importantly, cyber-attacks may be linked directly to terrorist attacks, leading to the malfunctioning of the existing e-government services and the exposure of the cyber community members to not only virtual but also physical threats to their wellbeing and the stability of their country.

The concept of cyber resilience has recently been promoted as the answer to the existing cybersecurity issues. Defined as the “ability to prepare, respond, adapt and recover from a cyber attack” (“15-060MR ASIC Issues Major Cyber Resilience Report” para. 2), cyber resilience seems to be the ultimate solution to the current concerns. However, the adoption of the cyber resilience norms may be hampered by several factors, the anonymity of online users being the key one.

The creation of e-governments and the consequent transfer of the existing legislation into the cyber environment may be viewed as a major breakthrough in the specified area. As a rule, e-governments bolster the promotion of legal regulations and laws in the cybersociety. Nevertheless, the framework of e-governments operation still needs improvements. The invention of the cyber resilience strategy allowed for the required alterations, yet it has invited a range of questions, specifically, the ones concerning the role of government and individuals in cybersociety.

Problem Statement: Cyber Resilience and Anonymity

The implementation of the cyber resilience principles will require that online users and the participants of cyber communication should acquire a sense of social and personal responsibility in not only conversing on the corresponding government sites but also in their business communication and social interactions carried out online. Seeing that the latter are characterized by their anonymity, the process of introducing online users to the concept of political, social, and personal responsibility may become quite complicated, as the process of information sharing triggers no legal repercussions for anonymous users of forums and chats. Inspired by the lack of control over the virtual communication process, people may abuse the opportunities that modern information technologies offer them.

On the one hand, the subject matter could be addressed by tightening the control over the information flow within the specified environment. By enhancing online security and demanding user identification with the help of real-life IDs, one will be capable of limiting the problem of cyber attacks to a minimum, as the consequences for disrupting online safety will be dire in the specified scenario. On the other hand, introducing online users to the necessity to provide their personal data for registration may be fraught with even more deplorable outcomes in case of information leakage.

Therefore, fostering personal and social responsibility in users by enhancing the need for reasonable behavior, the threats of bullying and the need to report on the instances of possible threats, including calls for the disruption of the current political system, suggestions for committing terrorist acts, etc., can be viewed as the basis for developing cyber resilience. However, anonymity, which online communication is characterized by, may hamper the introduction of the aforementioned concepts into the lives of online users.

Consequently, there is a strong need for the location of the methods of establishing social and personal responsibility within the online environment, which will allow for cyber resilience. It is suggested that a study of people’s online behavior under the influence of specific factors, including the advocacy of specific ethical and legal principles and a flexible system of e-government supervision of the key conflicts, will allow for galvanizing the process of cyber resilience development and reducing the threat of cyber attacks and even cyber terrorism.

Importance of Topic: Enhancing Security Worldwide

Although the significance of the Internet as the tool for enhancing political and social activity is often underestimated, it admittedly has a major impact on the development of certain social and political moods. In other words, the Internet can be – and, in fact, often is – used as a tool for manipulating people’s opinions concerning a specific issue, shaping their expectations, creating the illusion of a threat, spurring political activism, etc. Therefore, the Internet in general and the exposure to cyber fraud may affect people’s lives in both social and political aspects, from the development of a biased opinion on a certain event to the choices made in the process of voting.

The latter issue is especially troubling, as it displays the power of online users locating the existing loopholes in cybersecurity to affect not only people but also states on a variety of levels, including the political one. To be more specific, the wellbeing of not only certain citizens but also the entire state is jeopardized with the rejuvenation of the exiting tools for breaking cybersecurity. With an increase in the popularity of a specific site that promotes values contradictory to the democratic ones, people may be tricked into participating in the activities that disrupt the order. Herein the importance of the topic lies; it is essential to check whether the principles of social and personal responsibility may be enhanced by the e-government members in online users so that the slightest threats should be identified easily and prevented in as efficient and expeditious a manner as possible.

Literature Review: Online Opportunities and Threats

Although information technologies have received a major boost only recently, the issue regarding cybersecurity and the safety of people as individuals and the citizens of a specific state has already been discussed from a variety of perspectives. More importantly, a range of tools for addressing the subject matter has been suggested. Unfortunately, none of the strategies that have been adopted so far can possibly become the silver bullet that will promote safety across the Internet.

Threats

Although the threats that people face when participating in online communication are often overlooked, the severity thereof is, nevertheless, very big. The list of possible threats that an Internet user may be exposed to is truly enormous.

Cyber attacks

Often viewed as the worst-case scenario in online communication, CA are traditionally defined as an “attack initiated from a computer against a website, computer system or individual computer (collectively, a computer) that compromises the confidentiality, integrity or availability of the computer or information stored on it” (Farbat, MacCarthy and Raysman 1).

The Internet of Things

Despite being by far the greatest innovation in the development of the Internet and the related technologies, the Internet of Things (IoT) poses a variety of threats to the personal security of users and the safety of the state, as it allows for even closer contact between the software and the user.

Hacktivism

The concept that has emerged comparatively recently, hacktivism has already become an integral part of the general list of threats, which one may encounter in the course of online communication.

There are other efficient methods of undermining the security of online users apart from using direct methods of invading people’s privacy. By introducing people to biased information and distorting facts, malefactors become capable of manipulating the former’s opinions and, therefore, shape their vision of the current political, economic, and social situation.

E-government

In fact, the very phenomenon of e-government has been around for a while; emerging in the 1980s, the concept is traditionally defined in the following way:

Most of them agree to define Electronic government as government use of information communication technologies to offer for citizens and businesses the opportunity to interact and conduct business with government by using different electronic media such as telephone touchpad, fax, smart cards, self-service kiosks, e-mail / Internet, and EDI (Almarabeh & Ali 30).

First introduced in the 1990s, the phenomenon, however, can also be described from a different perspective. To be more specific, the role of government agencies could be enhanced to a much greater degree. Therefore, the subject matter can be defined as the “use of information and communication technologies (ICT) – such as Wide

Area Networks, the Internet, and mobile computing – by government agencies” (Almarabeh and Ali 30). Even though the notion of transferring governmental activities into the sphere of virtual reality sounds quite promising in terms of facilitating user safety, the endeavors that have been made so far do not meet the required standards.

On the one hand, the authority of e-governments contributes to the elimination of a physical threat to individuals, as well as the threats related to identity theft, disruption of the social and political life, etc.

On the other hand, an increase in the influence of e-governments on the Internet may lead to the creation of a range of impediments to free communication and, thus, deprive online users of an opportunity to engage in conversations with the same ease.

Cybersecurity

The issue of cybersecurity, in its turn, is also quite old – the necessity to protect users from online attacks has emerged since the exposure of computer users to the Internet. Apart from the safety of Internet users, the so-called critical infrastructures (Miron and Muita 34), is jeopardized by the increase in cyberbullying and cyber attacks, both socially and politically oriented ones. Much to the credit of scholars, authorities, and the Internet users, the issue has been looked into and researched quite thoroughly. A range of tools has been developed for preventing cyber attacks, as well as fighting them efficiently.

More importantly, the link between cyber security and responsibility has recently been identified; as a result, a range of tools for addressing the issue have emerged over the past few years. By putting a stronger emphasis on the maturity of the frameworks, within which the security models are applied, one will be capable of handling the threat, Miron and Muita claim: “Given that cyber security is a global priority and a shared responsibility, there should be adequate motivation to develop more comprehensive critical infrastructure definitions and cyber security capability maturity models” (Miron and Muita 34).

Cyber attacks have also been studied and classified so that the measures aimed at prevention thereof should be efficient and timely. For instance, among the most common models that have been developed lately, the current Internet governance model suggested and implemented by the European Union deserves to be mentioned. The specified tool creates a paradigm for online interactions, which dictates specific rules for the users of certain sites and, thus, defines the behavioral patterns, which the participants of the conversation adopt.

However, even the advocacy of the latest model of online communication into the framework of the virtual reality presupposes dealing with major problems, the necessity to update the technology being the key one. Therefore, the design of new approaches towards enhancing online security of the Internet users must be created. Certain drafts of the supposed model have already been created; however, researches have shown that users need to be active in spotting the possible source of danger as well as the corresponding officials. Thence the need to develop the strategy that will incorporate an appropriate behavioral model required for online users to comply with emerges.

Unfortunately, with the growth of information technology and the advances made in the specified realm, the evolution of malware and the increase in the threat to people’s cyber security increases as well. In order to spur the process of cyber security development, one must incorporate not only the process of raising awareness, but also the program allowing for the development of personal and social responsibility in online users, one will have to alter the existing patterns of the users’ behavior; consequently, the very environment of online communication must be changed slightly. Specifically, a rigid set of standards concerning the ethics of online communication must be incorporated into the framework of people’s online interactions.

Cyber resilience

The provision of cyber security is getting increasingly complicated due to the cyber crime rates increase. However, the phenomenon known as cyber resilience may become the defining factor in enhancing the safety of the Internet users. Cyber resilience is essential to developing the approach, which will allow for reducing the threat of a cyber attack to a minimum, as well as responding to a cyber attack in an efficient and expeditious manner.

Personal Responsibility

The idea of introducing online users to personal responsibility is not new. The first attempts started in 2008, when the factors affecting the security of online users’ data became especially discouraging. However, the process has been hampered quite a few times due to the differences in the tools for enhancing personal responsibility in the society and the ones that are applicable to virtual reality. Researchers report that certain ethical principles for proper communication can be instilled in the specified environment; however, according to the recent studies, the creation of cyberspace has led to the emergence of new challenges to the communication process, including the issues such as cyber terrorism, cyber espionage, cyber fraud, cyber vandalism, etc. (Farjami 149).

Attitudes and Anonymity

Unfortunately, the introduction of the concept of personal responsibility into the Internet is fraught with a range of complexities, the anonymity factor being the key one. A recent study has revealed that the specified factor contributes to a significant drop in the conscious activity rates among online users, thus, triggering their unwillingness to assume any kind of responsibility for their actions (Jackson and Valentine 196).

According to Jackson and Valentine, the specified phenomenon is quite easy to understand, yet the irresponsibility, which comes with anonymity, needs to be addressed. Indeed, anonymity does give online users a sense of permissiveness, leading to a lack of restraint in their actions and the following inclination to engage in the activities that are considered antisocial and even downright threatening to the members of the society in real life.

More importantly, anonymity triggers the need to challenge the existing social rules, which affects the security of online users to a considerable degree, as the examples of 4chan and the sites of the like show (Bernstein et al. 51). The lack of responsibility concerning the information provided in forums like 4chan leads to prompting the people, who are convinced by the online malefactors, to take certain actions: “4chan’s users move between other tools and interaction venues to organize both online and offline action” (Bernstein et al. 36). Therefore, the lack of care about the information delivered by the Internet users may trigger a major political and social change with deplorable consequences. A 2011 study of the effects of complete anonymity on users in the realm of absence of basic rules for social conduct has revealed that the effects of eliminating any social boundaries can be dire. Apart from subjecting themselves to a variety of cyber threats, the users, who refuse from complying with the basic principles of the ethics of communication may succumb to breaking cyber security themselves (Bernstein et al. 51).

Internet Ethics

The enhancement of the basic ethics principles as a tool for fighting with cyber threats, as well as spreading awareness regarding the subject matter, seem rather obvious steps to take, yet they are neglected for several reasons. First and most obvious, the idea of preaching to cyber bullies and hacktivists, not to mention cyber terrorists, is rather flawed and can hardly be considered efficient. As far as ordinary users are concerned, the aforementioned anonymity factor shapes their attitudes greatly, therefore, preventing the basic ethical principles from being instilled in the cyberspace.

Bystanders

The necessity to enhance responsibility becomes especially obvious when considering the issue of bystanders. A recent study has shown that, when witnessing a certain breach of the Internet security rules, be it an instance of cyber bullying or a terrorism threat, most people, who are not involved in the conversation directly, prefer to neglect the specified phenomenon and disregard the instances of online rights infringement, cyber bullying, cyber terrorism threats, etc. The authors of the study explained the specified phenomenon from the perspective of anonymity and the lack of social and personal responsibility that triggers: “While peers have been reported to be present in 85% to 88% of traditional bullying situations, they have been found to intervene 11% to 25% of the time” (Price et al 2).

Nevertheless, teaching cyber ethics to online users has been returning quite positive effects so far. It is quite remarkable that, with strong ethical principles at the basis of the online communication concept, people are willing to comply with the basic principles of proper communication code even in the environment of a complete anonymity. As a recent study shows, the need to avoid ethically questionable behavior becomes intrinsic as long as the corresponding values are promoted among users:

The high volume of comments indicates the highly contested nature of abortion debates in the UK and the extent to which certain individual readers feel the need to engage themselves in this high profile and very public debate centering on social values, ethics and moral responsibility. (Jackson and Valentine 195)

While the experiment described in the case study mentioned above occurred on a comparatively small scale, it is suggested that, by raising awareness regarding the threat of cyber attacks, one will be capable of promoting resilience in cyberspace and online communication. The enhancement of cyber ethics principles may become the basis for developing personal responsibility among users even in the environment, which involves complete anonymity. Moreover, the incorporation of the cyber ethics principles is likely to reduce the necessity for the e-government to exert its force on the Internet communities and, therefore, contribute to a balanced approach towards online communication and its supervision.

Theoretical Framework

As far as the theory for the study to be based on is concerned, it is suggested that the Theory of Social Behavior should be used as the basis for the study. Apart from the specified approach, it will be required to adopt the framework that the Theory of Planned Behavior suggests. According to the existing definition, the theory in question allows for a detailed analysis of the factors that shape people’s behavior by analyzing the subject matter from the position of an individual, who is subjected to the influence of certain factors and is supposed to respond in the manner that is considered acceptable within the given community. At this point, the Theory of Reasoned Action should be brought up.

Having served as the basis for the development of TBP, TRA allows one to “focus on theoretical constructs concerned with individual motivational factors as determinants of the likelihood of performing a specific behavior” (Montano and Kasprzyk 68). Therefore, the TBP framework presupposes that an individual should produce the response that will be rewarded as an adequate one within a certain community. In other words, the theory under analysis serves perfectly well as the foundation for understanding the reasons for people to ignore cyber crimes and misbehavior to the point where their indifference turns into an approval. The theory in question helps realize that the people, who are exposed to cyber bulling in any of its forms, should be viewed as victims, yet pose a tangible threat to the sustainability of the economic and political state of a certain community.

Last, but definitely not least, the Interpersonal Adaption Theory must be mentioned. There is no need to stress that people prefer to pattern their behavior based on the behavioral patterns that can be observed in a specific environment, which the people in question have been planted in. The specified theory is especially significant for the study, as it will allow for understanding not only why a range of online users prefer not to inform the e-government authorities about the breach of cyber security, but also succumb to the negative behavioral patterns shown by others and are very likely to follow the example set by the cyber bullies and cyber malefactors.

According to the key tenets of the theory in question, social norms and values are defined not by the principles that have been adopted by the corresponding authority and are supposed to be followed, but the behavior types that the members of the specified community display in their everyday communication. As a result, though the key principles of online security may demand that the users should follow the ethical norms and principles prescribed by the local authorities, the actual interaction occurs based on the premises created by users themselves.

The Interpersonal Adaption Theory, therefore, allows for understanding the key principles of the mechanism set out by the people breaking cyber security. As it has been emphasized above, informing the corresponding authorities and taking precaution measures is the first logical step to be taken by the participants of an online conversation when observing an instance of cyber security breach. However, most people prefer to detach themselves from the occurrence, therefore, defying any personal responsibility whatsoever. The Interpersonal Adaption Theory sheds some light on the phenomenon, explaining the nature of the latter.

In addition, the Interpersonal Adaption Theory will help locate the reasons for people to adopt the behavioral patterns suggested by the frauds and cyber bullies, turning from the members of an online community to the threat of its security. Though not fully developed yet and based on the premises for a range of other behavioral theories, the Interpersonal Adaption Theory explains the actions that people take based on their expectations, desires and requirements. Therefore, it will be possible to identify the reasons for people to respond to cyber security breach positively and support the malefactors, cyber bullies and other people contributing to the disruption of the existing cyber security system.

Methodology: Qualitative Research

Seeing that the study is aimed at determining the relationships between the key variables as opposed to quantifying the latter, it is reasonable to suggest that a qualitative research design should be adopted in order to deliver the results. Seeing that the results of the study will be carried out based on the observations of the target groups, it will be reasonable to adopt the grounded theory approach. Based on the implications of an experiment carried out in the course of the study, conclusions concerning the efficacy of e-government regulations on the provision of cyber security, the significance of the anonymity factor in defining the rates of the threat of a cyber attack, the possibility of the Internet users to withstand the breach of cyber security and refuse from participating in the latter, as well as the related issues, will be made.

Moreover, the specified design of the research presuppose that the theory concerning the methods of controlling online users’ behavior and setting the boundaries that they will feel obliged to comply with even in the environment of complete anonymity should be developed. Therefore, it is assumed that the grounded theory approach should be determined as the research design for the given study.

It should be born in mind, though, that the analysis of the subject matter will also require a thorough study of the existing sources on cyber security, e-governments, their influence on cyber security, the specifics of anonymous online communication, etc. Thus, it is recommended that a mixed research design should be used and that the general research approach should be incorporated into the methodology. Whereas it is important to determine the theoretical framework for addressing the current security issue and prevent cyber attacks and all kinds of cybercrime, including both fraud and misdemeanor, from happening, carrying out an analysis of the actions that have already been taken is also an essential step towards eliminating the peril in question.

As far as the experiment is concerned, it is suggested that two groups (Group A and Group B) should be introduced to an online image board with a forum for the discussion of various topics related to current social and political issues. Group A will be exposed immediately to a rather controversial topic, where quite aggressive messages concerning the issue in question and calling for an immediate social or political action, will be provided. Group B, in its turn, will have to operate in the same environment, yet will be made to read the rules according to which the forum works prior to participating in the discussion. The latter will incorporate the responses that break the code of conduct suggested in the forum rules in a very aggressive manner. After both groups spend an hour of communicating on the forum in question, their messages will be analyzed based on several criteria, such as aggression, willingness to share personal information, breach of certain societal norms, etc. The information retrieved in the course of the analysis of the participants’ responses on the forum will be coded correspondingly so that the behavioral patterns accepted among the study participants could be located fast and efficiently. Out of all messages that will be posted by the study participants on the above-mentioned forum, twenty samples will be taken so that an objective result could be obtained.

Potential Outcomes and Study Expectations

It is expected that the study will provide implications for the further research as well. While the given research is aimed primarily at determining the factors that shape the users’ behavior, as well as testing the significance of cyber ethics for enhancing cyber security, it is also desirable to identify the key tools for creating strong ethical principles, which the participants of online conversations will be inclined to follow. It can be suggested that a role model should be introduced to the people, who take part in online communication. In other words, the principle of a transformative leadership approach, which requires an introduction of a role model for users to follow, should be considered a possibility and a topic for the follow-up study.

As far as the potential outcomes of the research are concerned, it is assumed that the study will result in proving the fact that the cyber activities that break the existing regulations are the result of not anonymity, but the lack of strong ethical principles for online communication to be based on. It would be wrong to deny the significance of the anonymity factor; nevertheless, the latter must be one of the factors and not the key reason for cyber abuse to continue. The anonymity issue, therefore, will presumably be downplayed; instead of viewing it as a cause, the study will consider it one of the factors that define the problems of cyber security.

Specifically, it is assumed that the Group A, which will not be provided with detailed explanations concerning the ethical principles that the forum communication process is based on, will be exposed to the threat of a cyber attack and cyber bullying to a much greater degree than Group B, which will be given a careful explanation of the ethical premises, which the forum is based on. It is also suggested that some of the Group A participants may eventually start supporting the radical and aggressive opinions posted on the forum by the research members. Group B, in its turn, is believed to demonstrate a much greater resilience towards the expressive and impulsive cues voiced on the forum.

As far as the anonymity issue is concerned, it is expected that the research participants (both Group A and Group B members) should display a much more emotional response to the aggressive and provocative messages before they are provided with the information concerning cyber resilience. The latter, in its turn, is expected to contribute to the development of a coping mechanism in the study participants and the design of the behavioral pattern that will allow them to refrain from experiencing negative emotions in the course of online communication. More importantly, the provision of the instructions on dealing with cyber attacks and cyber bullying is expected to prevent the research participants from supporting the “rebels” in their socially and politically questionable suggestions.

Description of Proposed Chapters

The study will consist of five key chapters, i.e., the introduction section, the literature review, the experiment, the analysis of the experiment, and the conclusions. Each section will incorporate a separate conclusion and a set of references used. The introduction and the conclusion, however, are not going to have the summary sections.

The introduction will include a brief history of the problem, the overview of the current situation and the list of the key concepts that will be used throughout the study. In addition, the research hypothesis will be provided along with the aforementioned definitions. Moreover, the introduction will incorporate a detailed background on the cyber security issue and the existing threats to the safety of online users and their states. The methodology section, in its turn, will describe the key tools for carrying out the research, including the theories for the research to be based on, the means of data collection, etc.

The first chapter of the study will describe the course of the experiment and provide a profound account of the process. Specifically, the topic of the online discussion, the cues suggested to the participants to respond to emotionally, as well as the description of the participants’ forum activity, will be offered in the specified chapter. More importantly, the gradual introduction of the key factors, which supposedly shape the attitude of the conversation participants and provoke them for aggression and lack of concern for their security, will be described thoroughly in the chapter. Thus, a better understanding of the irritants, which the Internet users have to deal with on a regular basis, will be provided.

The second chapter will incorporate a careful analysis of the experiment outcomes and a theoretical foil for the analysis of the study results. Several samples will be selected for the further coding procedure and analyzed carefully based on the tenets of the three theories listed above. The analysis results will be provided in appendices.

The third chapter will include the analysis of the information retrieved in the second chapter. The three above-mentioned theories will be applied to the results in order to identify the degree, to which anonymity shapes the process of online communication and supposedly undermines cyber security of the conversation participants. Moreover, the chapter will presuppose that the assumptions concerning the role of e-government in the process of cyber security enhancement should be made and that the reasons for maintaining user anonymity on the Internet should be provided.

The conclusion, which will follow the third chapter, will restate the hypothesis and include the list of the key results, which will be obtained in the course of the research. Moreover, the conclusion will list the key recommendations for the participants of online communication on the subject of online security and the safety of both personal data and one’ social and political beliefs. The conclusion will also incorporate the recommendations subsection, in which several pieces of advice on enhancing cyber security and at the same time retaining anonymity will be provided.

Works Cited

.” Australian Services and Investments Commission. 2015. Web.

Bernstein, Michael, Andres Monroy-Hernandez, Drew Harry, Paul Andre, Katrina Panovich and Greg Vargas. “4chan and /b/: An Analysis of Anonymity and Ephemerality in a Large Online Community.” Proceedings of the Fifth International AAAI Conference on Weblogs and Social Media. New York, NY: Association for the Advancement of Artificial Intelligence, 2014. 50–56. Print.

Farbat, Vince, Bridget MacCarthy and Richard Raysman. Cyber Attacks: Prevention and Proactive Responses. London, UK: Practical Law Publishing, 2011. Print.

Farjami, Seyed Mahmood. “Is There a Place for Cyberethics? A Conceptual Look at the Effects of Cybertechnology on Ethics and Communications in Cyberspace.” Asian Social Science 8.4. (2012), 148–152. Print.

Jackson, Lucy and Gill Valentine. “Emotion And Politics in a Mediated Public Sphere: Questioning Democracy, Responsibility and Ethics in a Computer Mediated World.” Geoforum 52.1 (2014), 193–202. Print.

Miron, Walter and Kevin Muita. “Cyber security Capability Maturity Models for Providers of Critical Infrastructure.” Technology Innovation Management Review 4.10 (2014), 33–39. Print.

Montano, Daniel E. and Danuto Kasprzyk. “Theory of Reasoned Action, Theory of Planned Behavior, and the Integrated Behavioral Model.” Health Behavior and Health Education Theory, Research, and Practice. New York, NY: Jossey–Bass, 2008. 67–96. Print.

Prasad, K. Munivara, A. Rama Mohan Reddy and Viswanadha Jyothsna. ” IP Traceback for Flooding Attacks on Internet Threat Monitors (ITM) Using Honeypots.” International Journal of Network Security & Its Applications (IJNSA) 4.1 (2012), 13–27. Print.

Price, Deborah, Deborah Green, Barbara Spears, Margaret Scrimgeour, Alan Barnes, Ruth Geer, and Bruce Johnson. “A Qualitative Exploration of Cyber-Bystanders and Moral Engagement.” Australian Journal of Guidance and Counseling 41.1 (2014), 1–17. Print.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2020, June 9). E-Governments and the Environment of Anonymity. https://ivypanda.com/essays/e-governments-and-the-environment-of-anonymity/

Work Cited

"E-Governments and the Environment of Anonymity." IvyPanda, 9 June 2020, ivypanda.com/essays/e-governments-and-the-environment-of-anonymity/.

References

IvyPanda. (2020) 'E-Governments and the Environment of Anonymity'. 9 June.

References

IvyPanda. 2020. "E-Governments and the Environment of Anonymity." June 9, 2020. https://ivypanda.com/essays/e-governments-and-the-environment-of-anonymity/.

1. IvyPanda. "E-Governments and the Environment of Anonymity." June 9, 2020. https://ivypanda.com/essays/e-governments-and-the-environment-of-anonymity/.


Bibliography


IvyPanda. "E-Governments and the Environment of Anonymity." June 9, 2020. https://ivypanda.com/essays/e-governments-and-the-environment-of-anonymity/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
No AI was involved: only quilified experts contributed.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment
1 / 1