Businesses, government entities, and other organizations often want to collect data from people to assist with decision making processes. This data may include opinions, views, or votes from people on a wide variety of topics or issues. However, many people may feel uncomfortable when giving their true opinions on certain topics for fear of judgment or discrimination. For example, an employer may want to survey employees to determine their opinion on a certain company policy. However, many people may be reluctant to give their true opinion for fear of offending others or in extreme circumstances, even losing their job. In a further example, a professor may wish to survey his or her students to help determine a more effective teaching method. However, students may be reluctant to give their true opinion in fear that it may negatively affect their grade.
Many polls and surveys are done electronically. Electronic polls that typically target specific individuals for polling often require some sort of login Identification (ID) and/or password to ensure that only the desired individuals participate in the poll. Doing so, however, allows the identity of a participant to be associated with his or her response. Though a poll initiator or someone conducting a poll may claim to not view the association between a participant and their responses, it may sometimes be difficult for participants to trust that the poll initiators will make sure that is the case.
The accompanying drawings illustrate various embodiments of the principles described herein and are a part of the specification. The illustrated embodiments are merely examples and do not limit the scope of the claims.
Throughout the drawings, identical reference numbers designate similar, but not necessarily identical, elements.
As mentioned above, businesses, government entities, and other organizations often want to collect data from people to assist with decision making processes. This data may include opinions, views, or votes from people on a wide variety of topics or issues. Opinions may be solicited and received by paper or electronically. However, many people may feel uncomfortable when giving their true opinions on certain topics for fear of judgment or discrimination.
Many polls and surveys are performed electronically. Electronic polls that target specific individuals for polling often require some sort of login Identification (ID) and password to ensure that only the desired individuals participate in the poll. Doing so, however, allows the identity of a participant to be tied with their response. Though a poll initiator or someone conducting a poll may claim to not view the association between a participant and their responses, it may sometimes be difficult for participants to trust that the poll initiators will make sure that is the case.
In light of these and other difficulties, the present specification relates to a polling method which ensures the privacy of the participant's responses. According to one illustrative embodiment, a computerized anonymizing system may receive from a poll initiator a list of participants. In the list of participants, each potential participant in a poll may be associated with at least one address for a mode of communication. Upon receipt of the list of participants, the computerized anonymizing system may generate at least one random character string for each participant on the list. The computerized anonymizing system may then send the generated random character strings to each participant on the list, with each random character string being sent to the address of a mode of communication associated with each participant. The computerized anonymizing system may also shuffle the list of random character strings assigned to each participant and send the list of the shuffled random character strings to the poll initiator.
The poll initiator may then use the list of random character strings to create a login access allowing participants to access a computerized poll. The computerized poll may be accessed by participants using the random character strings received from the computerized anonymizing system through the designated modes of communication. In this way, the participants may anonymously complete and submit the poll.
By using a computerized anonymizing system embodying principles described herein, the poll initiator may only see the responses as coming from random character strings. The poll initiator may have no way to link a random character string to a particular participant. Using this system may provide participants with the peace of mind that their responses are securely anonymous. It may also provide the poll initiator with a more accurate poll result.
In the following description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the present systems and methods. It will be apparent, however, to one skilled in the art that the present apparatus, systems and methods may be practiced without these specific details. Reference in the specification to “an embodiment,” “an example” or similar language means that a particular feature, structure, or characteristic described in connection with the embodiment or example is included in at least that one embodiment, but not necessarily in other embodiments. The various instances of the phrase “in one embodiment” or similar phrases in various places in the specification are not necessarily all referring to the same embodiment.
Throughout the present specification and the appended claims, the term “computerized anonymizing system” will refer to a system embodying principles described herein that anonymizes login data for participants of a poll. The term “poll” will refer to any poll, survey, questionnaire, vote, or form that requires participant input.
Throughout the present specification and the appended claims, the term “poll initiator” will refer to one who uses the computerized anonymizing system to set up a poll to be taken by a set of participants. The term “participant” will refer to one who takes, completes, or submits a poll.
Throughout the present specification and the appended claims, the term “mode of communication” will refer to a device or method of communication such as email, a cell phone, a physical letter, etc. The term “address” when applied to a mode of communication will refer to whatever means is used by the applied mode of communication to identify individual units. For example, the address for a cell phone would be a cell phone number; and the address for an email would be an email address.
Referring now to the figures,
The computer readable storage medium may be used to hold the polling software (104) and any additional storage space (106) needed. The storage medium (102) may be a type of memory including but not limited to a hard disk, flash memory, or firmware. The polling software (104) may contain computer readable code for algorithms and user interfaces used to accomplish the various tasks associated with the computerized anonymizing system (100). The additional storage space (106) may be used to store variables and other important data associated with the purposes of the computerized anonymizing system (100).
The poll initiator interface (112) includes the software and hardware which allows a poll initiator (114) to interact with the computerized anonymizing system, for example by providing a list of participants to the computerized anonymizing system, or receiving from the computerized anonymizing system a list of randomized login data for the participants. The participant output interface (116) may include hardware and software to provide data to participants (118-1, 118-2, 118-3) through one or more modes of communication. This data may include random character strings used to access a computerized poll.
In one embodiment, the computerized anonymizing system (100) may be embodied on an internet server. Personal computers operated by both the poll initiator (114) and the poll participants (118-1, 118-2, 118-3) may be used to access the computerized anonymizing system (100) via the server. For example, a poll initiator (114) may use his or her personal computer (120) to interface with the computerized anonymizing system (100) through the poll initiator interface (112). A poll participant (118-1, 118-2, 118-3) may receive an email from the computerized anonymizing system sent by the participant output interface (116) which the participant (118-1, 118-2, 118-3) may access from his or her personal computer.
As mentioned above, a computerized anonymizing system (100) may be configured to receive a list of participants (118-1, 118-2, 118-3) from the poll initiator (114).
Upon receipt of such a list of participants (200), a computerized anonymizing system (100,
According to one illustrative embodiment, each contact pair (206) in the list of participants (200) may be assigned a random character strings (214). In one embodiment, if there are at least two random character strings assigned to a participant, one string from the random character string set (214) may be assigned to one address (202) for a mode of communication, and another string from the random character string pair (214) may be assigned to an address (204) for another mode of communication.
Using the example mentioned above in which one mode of communication is email and the other mode of communication is a mobile phone, each participant from the participant list may be assigned a random character string set. The email address (302) for a participant may be associated with a first random character string (304) from the assigned random character string set and the phone number (306) for the participant may be associated with a second random character string (308) from the random character string set. In one embodiment, data that indicates the assignment of random character strings to a particular participant may remain encrypted on the computerized anonymizing system unless it becomes necessary to access the data (e.g., subpoenaed by a court) In such embodiments, the poll initiator may not have sufficient privileges in the system to decrypt and access this data.
In addition to providing the poll initiator (402) with the list of random character strings, each participant (418) may receive the one or more character strings (410, 412) assigned to him or her by the computerized anonymizing system (406). The computerized anonymizing system (406) may send at least one random character string (410, 412) through one mode of communication to its corresponding participant (418). If more than one random character string is assigned to each user and the computerized anonymizing system (406) is provided with at least two addresses for a participant (418), the computerized anonymizing system may send one random character string (410) to one address and another random character string (412) to another address. In certain embodiments, these addresses may correspond to different modes of communication. For example, in
As mentioned above, upon receipt of a list of random character strings (408), the poll initiator (402) may set up access to a computerized poll.
The participant table (504) may be configured to allow a poll initiator (402,
After the computerized anonymizing system has received the participant list and created at least one random character string for each participant (418,
In one embodiment, a participant may be allowed to access the computerized poll for a set amount of time after the poll opens. This may allow the participant to view their responses or change their responses if the poll has not yet been finalized. In some embodiments, the participant may have access to the final results of the poll.
The above described user interfaces which are illustrated in
In sum, a poll initiator may use a third party computerized anonymizing system. A computerized anonymizing system may be configured to receive from a poll initiator a list of participants. The list of participants may include for each participant an address for at least one mode of communication. The computerized anonymizing system may then assign a random character string to each participant. Each random character string may be sent to each participant through the associated mode of communication. A list of all of the random character strings assigned to each participant may be sent to the poll initiator. The poll initiator may use the list of random character strings to set up access for the poll participants. The poll initiator may have no way of associating the random character strings with the poll participants. The participants may then access the poll with the random character strings received through the two modes of communication. Upon access, the participants may complete and submit the poll.
Using a computerized anonymizing system embodying principles described herein may assure participants that their poll responses are anonymous. This in turn will make it more likely that the poll indicates the true views, votes, or opinions of the participants.
The preceding description has been presented only to illustrate and describe embodiments and examples of the principles described. This description is not intended to be exhaustive or to limit these principles to any precise form disclosed. Many modifications and variations are possible in light of the above teaching.
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/US2009/057565 | 9/18/2009 | WO | 00 | 9/23/2011 |