Anonymous mechanisms in group decision support systems communication

Abstract Using group decision support systems (GDSS) as a backdrop, this paper looks at the issues surrounding anonymity, with particular emphasis on how it may be achieved. Ensuring anonymity requires more than simple encryption. Anonymity is viewed as a composite of three types of anonymity—environmental, content-based and procedural. Each type is investigated and procedures developed to improve the anonymity of the system. Behavioral and operational costs are identified for each of the three types of anonymity. For some meetings, the benefits of supporting anonymous communication may not justify the costs. Mechanisms providing complete procedural anonymity in various system configurations are presented. It is shown that five separate mechanisms can be used to provide procedural anonymity. The impact of relaxing each of these mechanisms is also investigated. Even though a system provides anonymity, participants may be skeptical. This skepticism can reduce the overall efficiency of the group. For this reason it is important to be able to convince groups that their comments are indeed anonymous. The issue of how to convince individuals that their anonymity is secure is discussed and a partial solution to this problem is presented.

[1]  Arjen K. Lenstra,et al.  Factoring With Two Large Primes , 1990, EUROCRYPT.

[2]  Alan R. Dennis,et al.  A conceptual framework of anonymity in Group Support Systems , 1992 .

[3]  Leonard M. Jessup,et al.  The Effects of Anonymity on GDSS Group Process with an Idea-Generating Task , 1990, MIS Q..

[4]  David Chaum,et al.  Achieving Electronic Privacy , 1992 .

[5]  K. H. Price Decision responsibility, task responsibility, identifiability, and social loafing , 1987 .

[6]  Dorothy E. Denning,et al.  Cryptography and Data Security , 1982 .

[7]  E. Diener Deindividuation, self-awareness, and disinhibition. , 1979 .

[8]  Gilles Brassard,et al.  Modern cryptology , 2006 .

[9]  David Chaum,et al.  Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.

[10]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[11]  Kitty Klein,et al.  The Subject-Experimenter Contract: A Reexamination of Subject Pool Contamination , 1990 .

[12]  H. Lenstra,et al.  Factoring integers with the number field sieve , 1993 .

[13]  J. Valacich,et al.  Effects of anonymity and evaluative tone on idea generation in computer-mediated groups , 1990 .

[14]  Jay F. Nunamaker,et al.  Facilitating Group Creativity: Experience with a Group Decision Support System , 1987, J. Manag. Inf. Syst..

[15]  J. Valacich,et al.  Group Size and Anonymity Effects on Computer-Mediated Idea Generation , 1992 .

[16]  Arto Salomaa,et al.  Public-Key Cryptography , 1991, EATCS Monographs on Theoretical Computer Science.

[17]  Philip R. Zimmermann,et al.  The official PGP user's guide , 1996 .

[18]  Andrew B. Whinston,et al.  Incentives and Computing Systems for Team-Based Organizations , 1995 .

[19]  William K. Graham,et al.  Tasks and Task Consequences as Factors in Individual and Group brainstorming , 1975 .

[20]  Dorothy E. Denning The Clipper Encryption System , 1993 .

[21]  Thomas Beth,et al.  Public-Key Cryptography: State of the Art and Future Directions , 1992, Lecture Notes in Computer Science.

[22]  M. Diehl,et al.  Productivity loss in brainstorming groups: Toward the solution of a riddle. , 1987 .

[23]  Lai Lai Tung,et al.  The effects of dialectical inquiry, devil's advocacy, and consensus inquiry methods in a GSS environment , 1993, Inf. Manag..

[24]  Bezalel Gavish,et al.  CM 3 , Looking into the Third and Fourth Dimensions of GDSS , 1994 .

[25]  Robert Albanese,et al.  Rational Behavior in Groups: The Free-Riding Tendency , 1985 .

[26]  Bruce Schneier,et al.  Applied cryptography (2nd ed.): protocols, algorithms, and source code in C , 1995 .

[27]  Jay F. Nunamaker,et al.  Supporting the Search for Competitive Advantage , 1991, J. Manag. Inf. Syst..

[28]  Sara Kiesler,et al.  Social psychological aspects of computer-mediated communication , 1984 .

[29]  Leonard M. Adleman,et al.  Open problems in number theoretic complexity, II , 1994, ANTS.

[30]  Carl Pomerance,et al.  The Quadratic Sieve Factoring Algorithm , 1985, EUROCRYPT.

[31]  T. Elgamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.

[32]  T. Kuran,et al.  Mitigating the tyranny of public opinion: Anonymous discourse and the ethic of sincerity , 1993 .

[33]  Starr Roxanne Hiltz,et al.  Experiments in group decision making, 3: disinhibition, deindividuation, and group process in pen name and real name computer conferences , 1989, Decis. Support Syst..

[34]  John H. Gerdes,et al.  Voting mechanisms and their implications in a GDSS environment , 1997, Ann. Oper. Res..

[35]  N. Kerr,et al.  Dispensability of member effort and group motivation losses: Free-rider effects , 1983 .

[36]  Leonard Michael Jessup,et al.  Decision Making in an Automated Environment: The Effects of Anonymity and Proximity with a Group Decision Support System* , 1991 .

[37]  David R. Seibold,et al.  Implications for problem‐solving groups of empirical research on ‘brainstorming’: A critical review of the literature , 1978 .

[38]  David R. Seibold,et al.  Potential inhibitory effects of group participation on brainstorming performance , 1977 .

[39]  Arjen K. Lenstra,et al.  On the Factorization of RSA-120 , 1993, CRYPTO.

[40]  Sead Muftic Security Mechanisms for Computer Networks , 1988, Comput. Networks.

[41]  Bezalel Gavish,et al.  CM3 : a distributed group decision support system , 1995 .

[42]  T. Connolly,et al.  Toward Atheory of Automated Group Work , 1990 .

[43]  Jay F. Nunamaker,et al.  Information technology for negotiating groups: generating options for mutual gain , 1991 .

[44]  Victor H. Vroom,et al.  The consequences of social interaction in group problem solving , 1969 .

[45]  L. Festinger,et al.  Some consequences of de-individuation in a group , 1952 .

[46]  L. R. Anderson,et al.  Effect of perceived expertness upon creativity of members of brainstorming groups. , 1969, The Journal of applied psychology.

[47]  Myron Hatcher,et al.  A video conferencing system for the United States Army: Group decision making in a geographically distributed environment , 1992, Decis. Support Syst..