{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,23]],"date-time":"2026-03-23T22:34:38Z","timestamp":1774305278818,"version":"3.50.1"},"reference-count":66,"publisher":"Elsevier BV","issue":"4","license":[{"start":{"date-parts":[[1998,10,1]],"date-time":"1998-10-01T00:00:00Z","timestamp":907200000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Decision Support Systems"],"published-print":{"date-parts":[[1998,10]]},"DOI":"10.1016\/s0167-9236(98)00057-8","type":"journal-article","created":{"date-parts":[[2002,7,25]],"date-time":"2002-07-25T12:07:13Z","timestamp":1027598833000},"page":"297-328","source":"Crossref","is-referenced-by-count":27,"title":["Anonymous mechanisms in group decision support systems communication"],"prefix":"10.1016","volume":"23","author":[{"given":"B.","family":"Gavish","sequence":"first","affiliation":[]},{"suffix":"Jr.","given":"J.H.","family":"Gerdes","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0167-9236(98)00057-8_BIB1","doi-asserted-by":"crossref","unstructured":"L.M. Adleman, K.S. McCurley, Open problems in number theoretic complexity, II, in: L.M. Adleman, M. Huang (Eds.), Algorithmic Number Theory, Lecture Notes in Computer Science, No. 877, Springer-Verlag, Berlin, pp. 291\u2013322.","DOI":"10.1007\/3-540-58691-1_70"},{"key":"10.1016\/S0167-9236(98)00057-8_BIB2","first-page":"30","article-title":"Internet's rise spark copyright concerns","volume":"18","author":"Afzali","year":"1995","journal-title":"Nashville Business Journal"},{"key":"10.1016\/S0167-9236(98)00057-8_BIB3","unstructured":"S.L. Ain, Hon. Justice, Stratton Oakmont, vs. Prodigy Servs., Index No. 31063\/94, Supreme Court of New York, Nassau County, May 24, 1995."},{"key":"10.1016\/S0167-9236(98)00057-8_BIB4","doi-asserted-by":"crossref","first-page":"244","DOI":"10.5465\/amr.1985.4278118","article-title":"Rational behavior in groups: the free riding tendency","volume":"10","author":"Albanese","year":"1985","journal-title":"Academy of Management Review"},{"issue":"4","key":"10.1016\/S0167-9236(98)00057-8_BIB5","doi-asserted-by":"crossref","first-page":"487","DOI":"10.1287\/orsc.6.4.487","article-title":"Incentives and computing systems for team-based organizations","volume":"6","author":"Barua","year":"1995","journal-title":"Organization Science"},{"key":"10.1016\/S0167-9236(98)00057-8_BIB6","unstructured":"Th. Beth, M. Frisch, G.J. Simmons, Public-Key Cryptography: State of the Art and Future Directions, Lecture Notes in Computer Science, No. 578, Springer-Verlag, Berlin."},{"issue":"3","key":"10.1016\/S0167-9236(98)00057-8_BIB7","first-page":"355","article-title":"Costs and benefits of reviewer anonymity: a survey of journal editors and manuscript reviewers","volume":"8","author":"Bornstein","year":"1993","journal-title":"Journal of Social Behavior and Personality"},{"key":"10.1016\/S0167-9236(98)00057-8_BIB8","unstructured":"G. Brassard, Modern cryptology, Lecture Notes in Computer Science, No. 325, Springer-Verlag, Berlin, 1988."},{"key":"10.1016\/S0167-9236(98)00057-8_BIB9","unstructured":"W. Brauer, G. Rozenberg, A. Salomaa (Eds.), Public-key Cryptography, EATCS Monographs on Theoretical Computer Science, Springer-Verlag, Berlin, 1990."},{"key":"10.1016\/S0167-9236(98)00057-8_BIB10","doi-asserted-by":"crossref","unstructured":"J.P. Buhler, H.W. Lenstra Jr., C. Pomerance, Factoring integers with the number field sieve, in: A.K. Lenstra, H.W. Lenstra Jr. (Eds.), The Development of the Number Field Sieve, Lecture Notes in Math, No. 1554, Springer-Verlag, Berlin, 1993, pp. 50\u201394.","DOI":"10.1007\/BFb0091539"},{"issue":"2","key":"10.1016\/S0167-9236(98)00057-8_BIB11","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1145\/358549.358563","article-title":"Untraceable electronic mail, return addresses, and digital pseudonyms","volume":"24","author":"Chaum","year":"1981","journal-title":"Communications of the ACM"},{"key":"10.1016\/S0167-9236(98)00057-8_BIB12","doi-asserted-by":"crossref","unstructured":"D. Chaum, Achieving electronic privacy, Scientific American (1992) 96\u2013101.","DOI":"10.1038\/scientificamerican0892-96"},{"key":"10.1016\/S0167-9236(98)00057-8_BIB13","unstructured":"Chubby vs. CompuServe, 776 F. Supp. 135, 139, S.D. New York, Oct. 29, 1991."},{"key":"10.1016\/S0167-9236(98)00057-8_BIB14","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1037\/h0027034","article-title":"Effect of perceived expertness upon creativity of members of brainstorming groups","volume":"53","author":"Collaros","year":"1969","journal-title":"Journal of Applied Psychology"},{"issue":"6","key":"10.1016\/S0167-9236(98)00057-8_BIB15","doi-asserted-by":"crossref","first-page":"689","DOI":"10.1287\/mnsc.36.6.689","article-title":"Effects of anonymity and evaluative tone on idea generation in computer-mediated groups","volume":"36","author":"Connolly","year":"1990","journal-title":"Management Science"},{"key":"10.1016\/S0167-9236(98)00057-8_BIB16","unstructured":"L. Cottrell, Mixmaster and Remailer Attacks, http:\/\/www.obscura.com\/loki\/remailer-essay.html, July 5, 1997."},{"key":"10.1016\/S0167-9236(98)00057-8_BIB17","unstructured":"D.E.R. Denning, Cryptography and Data Security, Reading, PA, Addison-Wesley, 1982."},{"key":"10.1016\/S0167-9236(98)00057-8_BIB18","first-page":"319","article-title":"The clipper encryption system","volume":"81","author":"Denning","year":"1993","journal-title":"American Scientist"},{"issue":"1","key":"10.1016\/S0167-9236(98)00057-8_BIB19","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1080\/07421222.1991.11517909","article-title":"Supporting the search for competitive advantage","volume":"8","author":"Dennis","year":"1991","journal-title":"Journal of Management Information Systems"},{"key":"10.1016\/S0167-9236(98)00057-8_BIB20","doi-asserted-by":"crossref","unstructured":"T. Denny, B. Dodson, A.K. Lenstra, M.S. Manasse, On the factorization of RSA-120, in: D.R. Stinson (Ed.), Advances in Cryptology\u2014Crypto '93, Springer-Verlag, Berlin, 1994, pp. 166\u2013174.","DOI":"10.1007\/3-540-48329-2_15"},{"issue":"3","key":"10.1016\/S0167-9236(98)00057-8_BIB21","doi-asserted-by":"crossref","first-page":"497","DOI":"10.1037\/0022-3514.53.3.497","article-title":"Productivity loss in brainstorming groups: toward the solution of a riddle","volume":"53","author":"Diehl","year":"1987","journal-title":"Journal of Personality and Social Psychology"},{"key":"10.1016\/S0167-9236(98)00057-8_BIB22","doi-asserted-by":"crossref","first-page":"1160","DOI":"10.1037\/0022-3514.37.7.1160","article-title":"Deindividuation, self-awareness, and disinhibition","volume":"37","author":"Diener","year":"1979","journal-title":"Journal of Personality and Social Psychology"},{"key":"10.1016\/S0167-9236(98)00057-8_BIB23","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","article-title":"A public-key cryptosystem and a signature scheme based on discrete logarithms","volume":"IT 31","author":"El Gamal","year":"1985","journal-title":"IEEE Transactions on Information Theory"},{"key":"10.1016\/S0167-9236(98)00057-8_BIB24","doi-asserted-by":"crossref","first-page":"382","DOI":"10.1037\/h0057906","article-title":"Some consequences of deindividuation in a group","volume":"47","author":"Festinger","year":"1952","journal-title":"Journal of Abnormal and Social Psychology"},{"key":"10.1016\/S0167-9236(98)00057-8_BIB25","unstructured":"FIPS Publication 185, Federal Information Processing Standards Publication\u2014Escrowed Encryption Standard (EES), U.S. Department of Commerce, Technology Administration, National Institute of Standards and Technology, U.S. Government Printing Office, Washington, DC, 1994."},{"key":"10.1016\/S0167-9236(98)00057-8_BIB26","unstructured":"FIPS Publication 186, Federal Information Processing Standards Publication\u2014Digital Signature Standard (DES), U.S. Department of Commerce, Technology Administration, National Institute of Standards and Technology, U.S. Government Printing Office, Washington, DC, 1994."},{"key":"10.1016\/S0167-9236(98)00057-8_BIB27","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1023\/A:1018931801461","article-title":"CM3, voting mechanisms and their implications","volume":"71","author":"Gavish","year":"1997","journal-title":"Annals of OR"},{"key":"10.1016\/S0167-9236(98)00057-8_BIB28","unstructured":"B. Gavish, J. Gerdes, Implications of Wireless GDSS, Working Paper, 1996."},{"key":"10.1016\/S0167-9236(98)00057-8_BIB29","unstructured":"B. Gavish, J. Gerdes, J. Kalvenes, Reward Allocation Mechanisms in an Anonymous GDSS Environment, submitted for publication."},{"key":"10.1016\/S0167-9236(98)00057-8_BIB30","doi-asserted-by":"crossref","unstructured":"B. Gavish, J. Gerdes, S. Sridhar, CM3, Looking into the Third and Fourth Dimensions of GDSS, Integration: Information and Collaboration Models, NATO ASI Series, 1994, pp. 269\u2013299.","DOI":"10.1007\/978-94-011-1132-4_17"},{"key":"10.1016\/S0167-9236(98)00057-8_BIB31","doi-asserted-by":"crossref","first-page":"722","DOI":"10.1080\/07408179508936789","article-title":"CM3, a distributed group decision support system","volume":"27","author":"Gavish","year":"1995","journal-title":"IIE Transactions"},{"key":"10.1016\/S0167-9236(98)00057-8_BIB32","unstructured":"B. Gavish, J. Kalvenes, Economic issues in group decision support systems, Proceedings of the First INFORMS Conference on Information Systems and Technology, 1996, pp. 8\u201317."},{"key":"10.1016\/S0167-9236(98)00057-8_BIB33","unstructured":"B. Gavish, J. Kalvenes, An economic model of group decision support systems, Proceedings of the 4th International Conference on Telecommunication Systems\u2014Modeling and Analysis, 1996, pp. 319\u2013329."},{"key":"10.1016\/S0167-9236(98)00057-8_BIB34","unstructured":"B. Gavish, J. Kalvenes, The gains from cooperation in a group decision support system environment, Proceedings of the 4th Industrial Engineering Research Conference, 1995, pp. 410\u2013414."},{"key":"10.1016\/S0167-9236(98)00057-8_BIB35","unstructured":"B. Gavish, J. Kalvenes, Anonymous rewarding in group decision support systems and its implications, Working paper, Owen Graduate School of Management, Vanderbilt University, 1996."},{"key":"10.1016\/S0167-9236(98)00057-8_BIB36","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1080\/00224545.1975.9923234","article-title":"Tasks and task consequences as factors in individual and group brainstorming","volume":"95","author":"Harari","year":"1975","journal-title":"Journal of Social Psychology"},{"key":"10.1016\/S0167-9236(98)00057-8_BIB37","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1016\/0167-9236(92)90008-D","article-title":"A video conferencing system for the United States Army","volume":"8","author":"Hatcher","year":"1992","journal-title":"Decision Support Systems"},{"issue":"2","key":"10.1016\/S0167-9236(98)00057-8_BIB38","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1016\/0167-9236(89)90008-0","article-title":"Experiments in group decision making: disinhibition, deindividuation, and group process in pen name and real name computer conferences","volume":"5","author":"Hiltz","year":"1989","journal-title":"Decision Support Systems"},{"key":"10.1016\/S0167-9236(98)00057-8_BIB39","first-page":"327","article-title":"Implications for problem solving groups of empirical research on brainstorming: a critical review of the literature","volume":"43","author":"Jablin","year":"1978","journal-title":"Central States Speech Journal"},{"key":"10.1016\/S0167-9236(98)00057-8_BIB40","doi-asserted-by":"crossref","first-page":"112","DOI":"10.1080\/10510977709367930","article-title":"Potential inhibitory effects of group participation on brainstorming performance","volume":"28","author":"Jablin","year":"1977","journal-title":"Central States Speech Journal"},{"key":"10.1016\/S0167-9236(98)00057-8_BIB41","unstructured":"I.L. Janis, Groupthink, Houghton Mifflin, Boston, 1982."},{"issue":"3","key":"10.1016\/S0167-9236(98)00057-8_BIB42","doi-asserted-by":"crossref","first-page":"313","DOI":"10.2307\/248893","article-title":"The effects of anonymity on GDSS group process with an idea-generating task","volume":"14","author":"Jessup","year":"1990","journal-title":"Management Information Systems Quarterly"},{"issue":"3","key":"10.1016\/S0167-9236(98)00057-8_BIB43","doi-asserted-by":"crossref","first-page":"333","DOI":"10.1177\/1046496490213003","article-title":"Toward a theory of automated group work: the deindividuating effects of anonymity","volume":"21","author":"Jessup","year":"1990","journal-title":"Small Group Research"},{"key":"10.1016\/S0167-9236(98)00057-8_BIB44","doi-asserted-by":"crossref","unstructured":"L.M. Jessup, D.A. Tansik, Decision making in an automated environment: the effect of anonymity and proximity on group process and outcome with a group decision support system, Decision Sciences 22 (2) 266\u2013279.","DOI":"10.1111\/j.1540-5915.1991.tb00346.x"},{"key":"10.1016\/S0167-9236(98)00057-8_BIB45","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1037\/0022-3514.44.1.78","article-title":"Dispensability of member effort and group motivation losses: free-rider effects","volume":"44","author":"Kerr","year":"1983","journal-title":"Personality and Social Psychology Bulletin"},{"issue":"10","key":"10.1016\/S0167-9236(98)00057-8_BIB46","doi-asserted-by":"crossref","first-page":"1123","DOI":"10.1037\/0003-066X.39.10.1123","article-title":"Social psychological aspects of computer-mediated communication","volume":"39","author":"Kiesler","year":"1984","journal-title":"American Psychologist"},{"issue":"3","key":"10.1016\/S0167-9236(98)00057-8_BIB47","doi-asserted-by":"crossref","first-page":"166","DOI":"10.1207\/s15328023top1703_6","article-title":"The subject\u2013experimenter contract: a reexamination of subject pool contamination","volume":"17","author":"Klein","year":"1990","journal-title":"Teaching of Psychology"},{"issue":"11","key":"10.1016\/S0167-9236(98)00057-8_BIB48","first-page":"205","article-title":"Electronic meeting support\u2014meeting makeovers","volume":"13","author":"Kranz","year":"1994","journal-title":"PC Magazine"},{"issue":"1","key":"10.1016\/S0167-9236(98)00057-8_BIB49","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1007\/BF02393282","article-title":"Mitigating the tyranny of public opinion: anonymous discourse and the ethic of sincerity","volume":"4","author":"Kuran","year":"1993","journal-title":"Constitutional Political Economy"},{"key":"10.1016\/S0167-9236(98)00057-8_BIB50","doi-asserted-by":"crossref","unstructured":"A.K. Lenstra, Factoring with two large primes, in: I.B. Damgard (Ed.), Advances in Cryptology\u2014Eurocrypt '90, Springer-Verlag, Berlin, 1991, pp. 72\u201382.","DOI":"10.1007\/3-540-46877-3_7"},{"key":"10.1016\/S0167-9236(98)00057-8_BIB51","doi-asserted-by":"crossref","unstructured":"A.K. Lenstra, H.W. Lenstra Jr., M.S. Manasse, J.M. Pollard, The number field sieve, in: A.K. Lenstra, H.W. Lenstra Jr. (Eds.), The Development of the Number Field Sieve, Lecture Notes in Mathematics, No. 1554, Springer-Verlag, Berlin, 1993, pp. 11\u201342.","DOI":"10.1007\/BFb0091537"},{"key":"10.1016\/S0167-9236(98)00057-8_BIB52","unstructured":"S. Muftic, Security Mechanisms for Computer Networks, Ellis Horwood, Chichester, England, 1989."},{"issue":"4","key":"10.1016\/S0167-9236(98)00057-8_BIB53","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1080\/07421222.1987.11517775","article-title":"Facilitating group creativity with GDSS","volume":"3","author":"Nunamaker","year":"1987","journal-title":"Journal of Management Information Systems"},{"issue":"10","key":"10.1016\/S0167-9236(98)00057-8_BIB54","doi-asserted-by":"crossref","first-page":"1325","DOI":"10.1287\/mnsc.37.10.1325","article-title":"Information technology for negotiating groups: generating options for mutual gain","volume":"37","author":"Nunamaker","year":"1991","journal-title":"Management Science"},{"key":"10.1016\/S0167-9236(98)00057-8_BIB55","doi-asserted-by":"crossref","unstructured":"C. Pomerance, The quadratic sieve factoring algorithm, Lecture Notes in Computer Science, No. 209, Springer-Verlag, Berlin, 1985, pp. 169\u2013182.","DOI":"10.1007\/3-540-39757-4_17"},{"issue":"3","key":"10.1016\/S0167-9236(98)00057-8_BIB56","doi-asserted-by":"crossref","first-page":"330","DOI":"10.1016\/0749-5978(87)90020-3","article-title":"Decision responsibility, task responsibility, identifiability, and social loafing","volume":"40","author":"Price","year":"1987","journal-title":"Organizational Behavior and Human Decision Processes"},{"key":"10.1016\/S0167-9236(98)00057-8_BIB57","unstructured":"J. Quittner, Unmasked on the Net, Time, New York, March 6, 1995, 72\u201373."},{"key":"10.1016\/S0167-9236(98)00057-8_BIB58","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","article-title":"A method for obtaining digital signatures and public-key cryptosystems","volume":"2","author":"Rivest","year":"1978","journal-title":"Communications of the ACM"},{"issue":"11","key":"10.1016\/S0167-9236(98)00057-8_BIB59","first-page":"191","article-title":"Conferencing software\u2014let's interface","volume":"13","author":"Salemi","year":"1994","journal-title":"PC Magazine"},{"key":"10.1016\/S0167-9236(98)00057-8_BIB60","doi-asserted-by":"crossref","unstructured":"A. Salomaa, Public-key cryptography, Springer-Verlag, Berlin, 1990.","DOI":"10.1007\/978-3-662-02627-4"},{"key":"10.1016\/S0167-9236(98)00057-8_BIB61","unstructured":"B. Schneier, Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd edn., Wiley, January, 1996."},{"issue":"1","key":"10.1016\/S0167-9236(98)00057-8_BIB62","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1016\/0378-7206(93)90023-M","article-title":"The effects of dialectical inquiry, devil's advocacy and consensus inquiry methods in a GSS environment","volume":"25","author":"Tung","year":"1993","journal-title":"Information and Management"},{"issue":"1","key":"10.1016\/S0167-9236(98)00057-8_BIB63","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1177\/1046496492231004","article-title":"Group size and anonymity effects on computer-mediated idea generation","volume":"23","author":"Valacich","year":"1992","journal-title":"Small Group Research"},{"issue":"3","key":"10.1016\/S0167-9236(98)00057-8_BIB64","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1007\/BF00126264","article-title":"A conceptual framework of anonymity in group support systems","volume":"1","author":"Valacich","year":"1992","journal-title":"Group Decision and Negotiation"},{"issue":"1","key":"10.1016\/S0167-9236(98)00057-8_BIB65","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1016\/0030-5073(69)90033-6","article-title":"The consequences of social interaction in group problem-solving","volume":"4","author":"Vroom","year":"1969","journal-title":"Organizational Behavior and Human Performance"},{"key":"10.1016\/S0167-9236(98)00057-8_BIB66","unstructured":"P. Zimmerman, The Official PGP User's Guide, MIT Press, 1995."}],"container-title":["Decision Support Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167923698000578?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167923698000578?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,1,10]],"date-time":"2020-01-10T19:55:13Z","timestamp":1578686113000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167923698000578"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998,10]]},"references-count":66,"journal-issue":{"issue":"4","published-print":{"date-parts":[[1998,10]]}},"alternative-id":["S0167923698000578"],"URL":"https:\/\/doi.org\/10.1016\/s0167-9236(98)00057-8","relation":{},"ISSN":["0167-9236"],"issn-type":[{"value":"0167-9236","type":"print"}],"subject":[],"published":{"date-parts":[[1998,10]]}}}