"I'd be so much more comfortable posting anonymously": Identified versus anonymous participation in student discussion boards
Academic staff members encourage university students to use online student discussion boards within learning management systems to ask and answer questions, share information and engage in discussion. We explore the impact of anonymity on student posting behaviour. An online survey was completed by...
| Main Authors: | Roberts, Lynne, Rajah-Kanagasabai, C. |
|---|---|
| Format: | Journal Article |
| Published: |
ASCILITE
2013
|
| Online Access: | http://ascilite.org.au/ajet/submission/index.php/AJET/article/view/452 http://hdl.handle.net/20.500.11937/32043 |
Similar Items
The worth of anonymous feedback
by: Dreher, Heinz, et al.
Published: (2006)
by: Dreher, Heinz, et al.
Published: (2006)
Cryptanalysis of two anonymous buyer-seller watermarking protocols and an improvement for true anonymity
by: Goi, , BM, et al.
Published: (2004)
by: Goi, , BM, et al.
Published: (2004)
Anonymous: a social movement
by: Knight, William
Published: (2018)
by: Knight, William
Published: (2018)
Internet anonymity practices in computer crime
by: Armstrong, Helen, et al.
Published: (2003)
by: Armstrong, Helen, et al.
Published: (2003)
Practical fair anonymous undeniable signatures
by: Han, Song, et al.
Published: (2004)
by: Han, Song, et al.
Published: (2004)
Anonymous feedback in e-learning systems
by: Dreher, Heinz
Published: (2005)
by: Dreher, Heinz
Published: (2005)
The introduction of broker anonymity on the New Zealand Exchange
by: Poskitt, Russell, et al.
Published: (2011)
by: Poskitt, Russell, et al.
Published: (2011)
Get rid of yourself: toward an aesthetics of anonymity
by: Eckersley, David
Published: (2019)
by: Eckersley, David
Published: (2019)
A tracable proactive anonymous electronic cash
by: Chang, Yu Cheng, et al.
Published: (2000)
by: Chang, Yu Cheng, et al.
Published: (2000)
Balancing data utility versus information loss in data-privacy protection using k-Anonymity
by: Esmeel, Thamer Khalil, et al.
by: Esmeel, Thamer Khalil, et al.
Notions of anonymous existence in Martin-Löf type theory
by: Kraus, Nicolai, et al.
Published: (2016)
by: Kraus, Nicolai, et al.
Published: (2016)
Student evaluation surveys: anonymous comments that offend or are unprofessional
by: Tucker, Beatrice
Published: (2014)
by: Tucker, Beatrice
Published: (2014)
Increasing Data Anonymity using AES and Privacy Technique
by: Thamer Khalil, Esmeel, et al.
Published: (2019)
by: Thamer Khalil, Esmeel, et al.
Published: (2019)
A secure, anonymous and verifiable E-Voting system
by: Ooi, Elynn
Published: (2020)
by: Ooi, Elynn
Published: (2020)
The removal of donor anonymity in the UK: the silencing of claims by would-be parents
by: Turkmendag Brunsnes, Ilke
Published: (2009)
by: Turkmendag Brunsnes, Ilke
Published: (2009)
A comparison of clustering algorithms for data anonymization / Zahra Mahmoud
by: Zahra, Mahmoud
Published: (2019)
by: Zahra, Mahmoud
Published: (2019)
Adaptive method to improve web recommendation system for anonymous users
by: Almurtadha, Yahya Mohammed
Published: (2011)
by: Almurtadha, Yahya Mohammed
Published: (2011)
Towards a Privacy Diagnosis Centre : Measuring k-anonymity
by: Mirakabad, Mohammad Reza Zare, et al.
Published: (2008)
by: Mirakabad, Mohammad Reza Zare, et al.
Published: (2008)
A Hybrid Method For K-Anonymization Using Clustering Technique
by: Abd.Rahim, Y, et al.
Published: (2011)
by: Abd.Rahim, Y, et al.
Published: (2011)
AdaptAnon: adaptive anonymity for service queries in mobile opportunistic networks
by: Radenkovic, Milena, et al.
Published: (2013)
by: Radenkovic, Milena, et al.
Published: (2013)
A conceptual anonymity model to ensure privacy for sensitive network data
by: Arafat, N.H.M., et al.
Published: (2021)
by: Arafat, N.H.M., et al.
Published: (2021)
Increasing data anonymity using privacy techniques and advanced encryption standard
by: Thamer, Khalil Esmeel
Published: (2020)
by: Thamer, Khalil Esmeel
Published: (2020)
Cryptanalysis of a generalized anonymous buyer-seller watermarking protocol of IWDW 2004
by: Goi, , BM, et al.
Published: (2005)
by: Goi, , BM, et al.
Published: (2005)
Cryptanalysis of two non-anonymous buyer-seller watermarking protocols for content protection
by: Goi, Bok Min, et al.
Published: (2007)
by: Goi, Bok Min, et al.
Published: (2007)
A Quest for Meaning: Facing Uncertainty, Anonymity, the Hidden and the Unknown Space in Azeroth
by: Platell, Annabelle Norma Marye
Published: (2019)
by: Platell, Annabelle Norma Marye
Published: (2019)
Anonymous mutual authentication protocol for RFID tag without back-end database
by: Han, Song, et al.
Published: (2007)
by: Han, Song, et al.
Published: (2007)
Conventionalised impoliteness towards perceived ESL users on an anonymous imageboard / Mohamad Ammar Rosli
by: Mohamad Ammar , Rosli
Published: (2019)
by: Mohamad Ammar , Rosli
Published: (2019)
When 'nothing' means so much
by: Abdul Wahid, Mohd Ridwan
Published: (2016)
by: Abdul Wahid, Mohd Ridwan
Published: (2016)
“Anonymous collectivity” and “sly civility”: postcolonial defiance in a satirical short story by Aziz Nesin
by: Mehrvand, Ahad, et al.
Published: (2018)
by: Mehrvand, Ahad, et al.
Published: (2018)
Enhanced slicing-based anonymization approach for privacy-preserving data publishing with improved data utility
by: Mohammed Mahfoudh, Khamis Binjubeir
Published: (2024)
by: Mohammed Mahfoudh, Khamis Binjubeir
Published: (2024)
HOOPOE: High performance and efficient anonymous handover authentication protocol for flying out of zone UAVs
by: Khalid, Haqi, et al.
Published: (2023)
by: Khalid, Haqi, et al.
Published: (2023)
A genetic similarity algorithm for searching the Gene Ontology terms and annotating anonymous protein sequences
by: M. Othman, Razib, et al.
Published: (2008)
by: M. Othman, Razib, et al.
Published: (2008)
Collaborative healthcare information systems in privacy preservation based on K-anonymization model / Asmaa Hatem Rashid
by: Rashid, Asmaa Hatem
Published: (2014)
by: Rashid, Asmaa Hatem
Published: (2014)
Securing anonymous authenticated announcement protocol for group signature in internet of vehicle / Nur Afiqah Suzelan Amir
by: Nur Afiqah , Suzelan Amir
Published: (2021)
by: Nur Afiqah , Suzelan Amir
Published: (2021)
Predicting self-reported research misconduct and questionable research practices in university students using an augmented Theory of Planned Behavior
by: Rajah-Kanagasabai, C., et al.
Published: (2015)
by: Rajah-Kanagasabai, C., et al.
Published: (2015)
Privacy-preserving fractal healthcare information system model based on K-anonymization to improve collaboration among physicians
by: Jarallah, Luma Fawaz
Published: (2017)
by: Jarallah, Luma Fawaz
Published: (2017)
Profiling online self-representation for cyber forensics: Anonymity and ageism in cyberspace / Dianne Lee Mei Cheong and Louis Sanzogni
by: Cheong, Dianne Lee Mei, et al.
Published: (2016)
by: Cheong, Dianne Lee Mei, et al.
Published: (2016)
The role of moral disengagement, anonymity perception, online disinhibition, and empathy in predicting cyberbullying perpetration among Chinese young adults
by: Abdullah, Haslinda, et al.
Published: (2024)
by: Abdullah, Haslinda, et al.
Published: (2024)
UTMGO : a tool for searching a group of semantically related gene ontology terms and application to annotation of anonymous protein sequence
by: Deris, Safaai, et al.
Published: (2006)
by: Deris, Safaai, et al.
Published: (2006)
Buru Island: Still much more to reveal
by: Hearman, Vannessa
Published: (2020)
by: Hearman, Vannessa
Published: (2020)
Similar Items
-
The worth of anonymous feedback
by: Dreher, Heinz, et al.
Published: (2006) -
Cryptanalysis of two anonymous buyer-seller watermarking protocols and an improvement for true anonymity
by: Goi, , BM, et al.
Published: (2004) -
Anonymous: a social movement
by: Knight, William
Published: (2018) -
Internet anonymity practices in computer crime
by: Armstrong, Helen, et al.
Published: (2003) -
Practical fair anonymous undeniable signatures
by: Han, Song, et al.
Published: (2004)