Abstract
Stemming from the Greek word “anonymia”, the term anonymity/anonymous stands for “namelessness”, “not identified” or “of unknown name” (Oxford Dictionaries) and usually bears on a person’s appearance in public. Consequently, anonymity occurs if a person’s identity being involved in a not-transparent/not disclosed process is non-determinable since the acting person remains unknown to the other acting entities or makes no appearance towards the other participants or acts within the anonymous process without recognizable name (Bundesamt für Sicherheit in der Informationstechnik, 2001, https://www.bsi.bund.de/ContentBSI/Publikationen/Studien/anonym/wasistanonymitaet.html;jsessionid=97B15124E289CE809BB8CA90471E5F9A.2_cid241).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
“Persecuted groups and sects from time to time throughout history have been able to criticize oppressive practices and laws either anonymously or not at all.”: Talley v. California, 362 U.S. 60 (1960).
- 2.
Oxfordians are the supporters of the Oxfordian theory of Shakespearean authorship whereby Edward de Vere, 17th Earl of Oxford (1550–1604), wrote the writings traditionally attributed to William Shakespeare.
- 3.
Stratfordians are of the opinion that the actor William Shakespeare wrote all the works attributed to him.
- 4.
The text of this subchapter is partly based on Weber 2012a.
- 5.
A relevant example in connection with anonymous acting online is the whistle-blowing Internet platform Wikileaks providing capacity for anonymously publishing submissions of private, secret, and classified media thereby following their goal of bringing “important news and information to the public” (http://wikileaks.org/About.html). Having released a number of significant documents in the past the entity sees itself as assistance to peoples of all countries who wish to reveal unethical behaviour in their governments and institutions.
- 6.
The Internet uses IP addresses to identify computers. Their addresses and names (then called host names) were initially stored on a centralized and monolithic file maintained by the Stanford Research International Network Information Center (SRI-NIC) on their NIC name server. By 1984, these addresses had become very complicated to use. That led people to translate these numbers into words and to organize them in the generic domains by the Domain Name System (DNS); for further details see Weber and Schneider 2009, pp. 19–21.
- 7.
In 1989, the US Department of Commerce concluded a contract with the Department of Post and Telecommunications’ Information Science Institute at the University of Southern California, establishing the Internet Assigned Numbers Association (IANA). Although IANA’s tasks were transferred to a great extent to the Internet Corporation for Assigned Names and Numbers (ICANN), IANA among other things is still responsible for the global coordination of the Internet Protocol addressing system allocating IP addresses from the pools of unallocated addresses to the Regional Internet Registries (RIR) according to their needs; for further details see Weber and Heinrich 2011, pp. 78–80.
- 8.
At the beginning of the Internet, a single authority combined both service areas and distributed the information through the RFC series.
- 9.
At the present time there are five RIRs in operation, namely the American Registry for Internet Numbers (ARIN) for North America and Parts of the Caribbean, the RIPE Network Coordination Centre (RIPE NCC) for Europe, the Middle East and Central Asia, the Asia–Pacific Network Information Centre (APNIC) for Asia and the Pacific region, the Latin American and Caribbean Internet Addresses Registry (LACNIC) for Latin America and Parts of the Caribbean Region and the African Network Information Centre (AfriNIC) for Africa.
- 10.
That is why Internet users intending to visit a company webpage will mostly be redirected to the respective country page although having entered another top-level domain; businesses use this automatic onward transfer for selling products in different countries at different prices.
- 11.
The announcement of the IP address is essential for enabling their locating by the respective web page operator and for knowing where to “send” the requested information to.
- 12.
The pseudonym he/she is appearing with on the Internet.
- 13.
“Cookies” are strings of data introduced by the company Netscape whereby the name was a term already in use in computer science for describing a piece of data held by an intermediary.
- 14.
Social structures such as social networking sites, blogs and wikis made up for individuals (or organisations) that offer possibilities for participation and collaboration.
References
Adams T (2011) How the Internet created an age of rage. The Guardian. 24 July 2011. http://www.guardian.co.uk/technology/2011/jul/24/internet-anonymity-trolling-tim-adams. Accessed 31 Jan 2012
Barnes SB (2006) A privacy paradox: Social Networking in the United States. First Monday 11(9). http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/1394/1312. Accessed 31 Jan 2012
Bizer J (2000) Recht auf Anonymität—ein Rechtsprinzip der elektronischen Individualkommunikation, In: Sokol B (ed) Datenschutz und Anonymität. Toennes Satz + Druck GmbH, Düsseldorf. https://www.ldi.nrw.de/mainmenu_Service/submenu_Tagungsbaende/Inhalt/2000_Datenschutz_und_Anonymitaet/Datenschutz_und_Anonymitaet.pdf. Accessed 31 Jan 2012
Brunst PW (2009) Anonymität im Internet—rechtliche und tatsächliche Rahmenbedingungen. Duncker and Humblot, Berlin
Bundesamt für Sicherheit in der Informationstechnik (2001) Das Ende der Anonymität? Datenspuren in modernen Netzen. https://www.bsi.bund.de/ContentBSI/Publikationen/Studien/anonym/wasistanonymitaet.html;jsessionid=97B15124E289CE809BB8CA90471E5F9A.2_cid241. Accessed 31 Jan 2012
Demut T, Rieke A (2000) Der Rewebber—Anonymität im World Wide Web. In: Sokol B (ed) Datenschutz und Anonymität. Toennes Satz + Druck GmbH, Düsseldorf
Edelmann, B (2009) Running out of numbers: scarcity of ip addresses and what to do about it. Working Paper Harvard Business School. http://www.hbs.edu/research/pdf/09-091.pdf. Accessed 31 Jan 2012
European Commission (2011b) Special eurobarometer 359: attitudes on data protection and electronic identity in the European union. Report. June 2011. http://ec.europa.eu/public_opinion/archives/ebs/ebs_359_en.pdf. Accessed 31 Jan 2012
European Parliament (2010) Information and communication technologies and human rights. http://www.europarl.europa.eu/committees/en/studiesdownload.html?languageDocument=EN&file=31731. Accessed 31 Jan 2012
Fox S (2000) Trust and privacy online: why americans want to rewrite the rules. The Pew Internet and American Life Project. http://www.pewinternet.org/~/media//Files/Reports/2000/PIP_Trust_Privacy_Report.pdf.pdf. Accessed 31 Jan 2012
Froomkin AM (1995) Anonymity and Its enmities. Journal of Online Law. http://articles.umlaw.net/froomkin/Anonymity_Enmities.htm. Accessed 31 Jan 2012
Glater JD (2006) Privacy for People Who Don’t Show Their Navels. The New York Times. 26 January 2006. http://www.nytimes.com/2006/01/25/technology/techspecial2/25privacy.html. Accessed 31 Jan 2012
Holznagel B, Schumacher P (2011) Die Freiheit der Internetdienste. In: Kleinwächter W (ed) Grundrecht Internetfreiheit. Eurocaribe Druck Hamburg, Berlin
Kabay ME (1998) Anonymity and pseudonymity in cyberspace: deindividuation, incivility and lawlessness versus freedom and privacy. http://www.mekabay.com/overviews/anonpseudo.pdf. Accessed 31 Jan 2012
Landau S (2010) Surveillance or Security? The risks posed by new wiretapping technologies. The MIT Press, Cambridge and London
Lehr W, Vest T, Lear E (2008) Running on empty: the challenge of managing Internet addresses. http://cfp.mit.edu/publications/CFP_Papers/Lehr%20Lear%20Vest%20TPRC08%20Internet%20Address%20Running%20on%20Empty.pdf. Accessed 31 Jan 2012
Malin B, Sweeney L, Newton E (2003) Trail re-identification: learning who you are from where you have been. LIDAP-WP12. Carnegie Mellon University. Laboratory for International Data Privacy. http://dataprivacylab.org/dataprivacy/projects/trails/paper3.pdf. Accessed 31 Jan 2012
Moore R (2011) Cybercrime: investigating high-technology computer crime, 2nd edn. Anderson Publishing, Burlington
Nichols S (2001) Big Brother is Watching: An update on web bugs. http://www.sans.org/reading_room/whitepapers/threats/big-brother-watching-update-web-bugs_445. Accessed 31 Jan 2012
Ofcom (2010) Media Literacy Matters, Online trust and privacy: People’s attitudes and behaviour. Research Document. http://stakeholders.ofcom.org.uk/binaries/research/media-literacy/trust-privacy.pdf. Accessed 31 Jan 2012
Pfitzmann A (2000) Möglichkeiten und Grenzen von Anonymität. In: Sokol B (ed) Datenschutz und Anonymität. Toennes Satz + Druck GmbH, Düsseldorf
Sammartino P (1990) The man who was William Shakespeare. Cornwall Books, New York
Schwartz PM, Solove DJ (2011) The PII problem: privacy and a new concept of personally identifiable information. New York Univ Law Rev 86(6):1814–1894
Shah RC, Kesan JP (2004) Recipes for cookies: how institutions shape communication technologies. http://www.governingwithcode.org/journal_articles/pdf/Recipe_For_Cookies.pdf. Accessed 31 Jan 2012
Solove DJ (2007) The future of reputation: gossip, rumor, and privacy on the internet. Yale University Press, New Haven
Solove DJ, Schwartz PM (2011) Information Privacy Law, 4th edn. Wolters Kluwer Law, New York
Taddicken M (2012) Privacy, surveillance, and self-disclosure in the social web: exploring the user’s perspective via focus groups. In: Fuchs C, Boersma K, Albrechtslund A, Sandoval M (eds) Internet and Surveillance: The Challenges of Web 2.0 and Social Media. Routledge, New York
Van Dijk G, Minocha S, Laing A (2007) Consumer, channels and communication: online and offline communication in serve consumption. Interact Comput 19:7–19
Wallace KA (1999) Anonymity. Ethics Inf Technol 1(1):23–35
Warschauer M (2008) Online communication. In: Carter R, Nunan D (eds) The Cambridge guide to teaching english to speakers of other languages. Cambridge University Press, Cambridge
Weber RH (2009) Internet governance: regulatory challenges. Schulthess, Zurich
Weber RH (2012a) International governance in a new media environment. In: Price ME, Verhulst SA (eds) Handbook of media law and policy: a socio-legal exploration. Routledge, New York (forthcoming)
Weber RH, Heinrich UI (2011) IP Address allocation through the lenses of public goods and scarce resources theories. scripted 8(1): 69–92. http://www.law.ed.ac.uk/ahrc/script-ed/vol8-1/weber.pdf. Accessed 31 Jan 2012
Weber RH, Schneider T (2009) Internet governance and Switzerland’s particular role in its processes. Schulthess, Zurich
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2012 The Author(s)
About this chapter
Cite this chapter
Weber, R.H., Heinrich, U.I. (2012). Notion of Anonymity. In: Anonymization. SpringerBriefs in Cybersecurity. Springer, London. https://doi.org/10.1007/978-1-4471-4066-5_1
Download citation
DOI: https://doi.org/10.1007/978-1-4471-4066-5_1
Published:
Publisher Name: Springer, London
Print ISBN: 978-1-4471-4065-8
Online ISBN: 978-1-4471-4066-5
eBook Packages: Computer ScienceComputer Science (R0)