scispace - formally typeset
Search or ask a question
Author

Nikos Sotirakopoulos

Bio: Nikos Sotirakopoulos is an academic researcher from Universities UK. The author has contributed to research in topics: The Internet & Anonymity. The author has an hindex of 1, co-authored 1 publications receiving 13 citations.

Papers
More filters
Journal ArticleDOI
TL;DR: It is argued that online anonymity should not be conceptualized in absolute terms but as an inherently fluid and transitional condition that characterizes any kind of social interaction online.
Abstract: Whenever we navigate the Web, we leave a trace through our IP address, which can in turn be used to establish our identity – for instance, by cross-checking it with a user’s Internet subscription. By using software such as VPN and Tor, however, it might be possible to avoid leaving such traces. A lively debate among policymakers, security professionals, hacker communities, and human rights associations has recently ensued regarding the question if such anonymity is acceptable and in which form. This article introduces the Crosscurrent special section dedicated to this topic by providing a brief overview of this debate and by pointing to the necessity of considering online anonymity from multiple, interrelated perspectives. By taking into account both technical and social dimensions, we argue that online anonymity should not be conceptualized in absolute terms but as an inherently fluid and transitional condition that characterizes any kind of social interaction online.

27 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: In this paper, the authors argue that experiences with disconnection are often reduced to "experiences with emptiness" and that disconnection has recently come to the forefront of public discussions as an antidote to an increasing saturation with digital technologies.
Abstract: Disconnection has recently come to the forefront of public discussions as an antidote to an increasing saturation with digital technologies. Yet, experiences with disconnection are often reduced to...

26 citations

Proceedings ArticleDOI
30 Jun 2016
TL;DR: End-to-end encryption provides some advantages over link encryption by eliminating data exposure behind the encrypting devices, but it also carries with it some disadvantages, it is less transparent to users, key management is more complex, traffic information cannot be encrypted and the encryption burden is decentralized to the endpoints.
Abstract: Federal Standard 1037C defines end-to-end encryption as: " The encryption of information at its origin and decryption at its intended destination without any intermediate decryption." As a practical matter, it's often encryption performed between the network and transport layers. It provides some advantages over link encryption by eliminating data exposure behind the encrypting devices. However, it also carries with it some disadvantages, it is less transparent to users, key management is more complex, traffic information cannot be encrypted and it is more resource-intensive as the encryption burden is decentralized to the endpoints.

24 citations

Journal ArticleDOI
TL;DR: This editorial outlines two key limits in current thinking about disconnection: first, the universalist discourse of disconnection, which contrasts with the reality of a profound inequality of access to both connection and disconnection across the globe, and the fact that connectivity not only involves digital media users but also those who are materially not connected to the network.
Abstract: This editorial introduces a themed section aimed to spark further reflections on the limits and boundaries of disconnection as a form of critique, activism and response to the pervasiveness of digital devices, platforms, and infrastructures. We outline two key limits in current thinking about disconnection: first, the universalist discourse of disconnection, which contrasts with the reality of a profound inequality of access to both connection and disconnection across the globe, and second, the fact that connectivity not only involves digital media users but also those who are materially not connected to the network. This introduction also reflects on the changing meanings of being connected and disconnected to digital networks and platforms at a time when the Covid-19 pandemic forces many people around the world to remain physically separated from others due to lockdown and quarantine measures.

20 citations

Journal ArticleDOI
TL;DR: In this article, a qualitative analysis approach using purpose sampling methods, including 21 semi-structured interviews with prevention experts, compliance officers and convicted cybercriminals, resulted in the determination of concrete money-laundering methods involving the employment of online platforms provided by companies and institutions in different economic sectors.
Abstract: This study aims to illustrate and determine how illegally obtained funds are laundered through online platforms and companies in different economic sectors in the digital age.,A qualitative analysis approach using purpose sampling methods, including 21 semi-structured interviews with prevention experts, compliance officers and convicted cybercriminals, resulted in the determination of concrete money-laundering methods involving the employment of online platforms provided by companies and institutions in different economic sectors.,The current study focuses on various companies in different economic segments that mitigate cyber laundering and the anti-money laundering measures that can be adopted. Therefore, this paper provides a detailed discussion and analysis on how money launderers avoid being detected. Both preventive and criminal perspectives are taken into consideration.,By identifying the gaps in the current anti-money-laundering mechanisms, it will provide compliance officers, legislators and law enforcement agencies with an in-depth insight into how cyber laundering operates in various economic sectors.

12 citations