Artificial Intelligence and Law

, Volume 12, Issue 1–2, pp 137–157 | Cite as

Anonymity and software agents: An interdisciplinary challenge

  • Frances Brazier
  • Anja Oskamp
  • Corien Prins
  • Maurice Schellekens
  • Niek Wijngaards
Article

Abstract

Software agents that play a role in E-commerce and E-government applications involving the Internet often contain information about the identity of their human user such as credit cards and bank accounts. This paper discusses whether this is necessary: whether human users and software agents are allowed to be anonymous under the relevant legal regimes and whether an adequate interaction and balance between law and anonymity can be realised from both the perspective of Computer Systems and the perspective of Law.

Keywords

software agents privacy anonymity pseudoanonymity security legal aspects agent identity 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Anderson, R. 2001Security Engineering: A Guide to Building Dependable Distributed SystemsNew YorkWiley Computer PublishingGoogle Scholar
  2. Bellifemine, F., Poggi, A., Rimassa, G. 2001Developing Multi-Agent Systems with a FIPA-Compliant Agent FrameworkSoftware: Practice and Experience31103128Google Scholar
  3. Bentham, J. (1791). Panopticon, Dublin.Google Scholar
  4. Brazier, F. M. T., Kubbe, O., Oskamp, A., Wijngaards, N. J. E. 2002

    Are Law-Abiding Agents Realistic?

    Sartor, G.Cevenini, C. eds. Proceedings of the workshop on the Law of Electronic Agents (LEA02)BolognaCirsfid151155
    Google Scholar
  5. Brazier, F. M. T., Oskamp, A., Prins, J. E. J., Schellekens, M. H. M., Wijngaards, N. J. E. 2003

    Are anonymous agents realistic?

    Oskamp, A.Weitzenboeck, E. eds. Proceedings of the LEA 2003: The Law and Electronic AgentsNRCCLEdinburgh6979
    Google Scholar
  6. Brazier, F., Oskamp, A., Prins, C., Schellekens, M. and Wijngaards, N. (2004). Law-Abiding & Integrity on the Internet: A Case for Agents, AI& Law journal, in this special issue.Google Scholar
  7. Castelfranchi, C. 2001

    Again on Agents? Autonomy: A Homage to Alan Turing

    Castelfranchi, C.Lespérance, Y. eds. Intelligent Agents VII, Lecture Notes in Artificial IntelligenceSpringer-VerlagBerlin, HeidelbergIn3393421986
    Google Scholar
  8. Ekker, A. (2003). Comment about Voorzieningenrechter Rechtbank Haarlem 11 September 2003 (Pessers/Lycos) Computerrecht 22: 363–367.Google Scholar
  9. FIPA, (2001). FIPA agent platform, http://www.fipa.org/.Google Scholar
  10. Froomkin, A. M. (1995). Anonymity and Its Enmities. Journal Online Law art. 4, June.Google Scholar
  11. Froomkin, A. M. 1996Flood Control on the Information Ocean: Living With Anonymity, Digital Cash, and Distributed DatabasesJournal of Law and Commerce15395479Google Scholar
  12. Gabber, E., Gibbons, P., Matias, Y., Mayer, A. 1997

    How to Make Personalized Web Browsing Simple, Secure, and Anonymous

    Hirschfeld, R. eds. Financial Cryptography, Proceedings of the First International Conference, FC ’97Springer-VerlagBerlin1732
    Google Scholar
  13. Goldschlag, D. M., Reed, M. G., Syverson, P. F. 1999Onion Routing for Anonymous and Private Internet ConnectionsCommunications of the ACM423941Google Scholar
  14. Grijpink, J. H. A. M. and Prins, J. E. J. (2001). New Rules for Anonymous Electronic Transactions? An Exploration of the Private Law Implications of Digital Anonymity. Journal of Information, Law and Technology, 2.Google Scholar
  15. Grijpink, J. H. A. M., Prins, J. E. J. 2003

    New Rules for Anonymous Electronic Transactions? An Exploration of the Private Law Implications of Digital Anonymity

    Nicoll, C.Prins, J. E. J.Dellen, M. J. M. eds. Digital Anonymity and the LawT. M. C. Asser PressDen Haag249269Tensions and Dimensions. (Information Technology & Law Series, 2)
    Google Scholar
  16. He, M., Leung, H-F. 2002Agents in E-Commerce: State of the ArtKnowledge and Information Systems4257282Google Scholar
  17. Martin, D. (1998). Internet Anonymising Techniques. In: login: Magazine,May, http://www.usenix.org/publications/login/1998-5/martin.html Google Scholar
  18. Martin, D., Cheyer, A., Moran, D. 1999The Open Agent Architecture: A Framework for Building Distributed Software SystemsApplied Artificial Intelligence1391128Google Scholar
  19. Nicoll, C., Prins, J. E. J. 2003

    Anonymity: Challenges for Politics and Law.

    Nicoll, C.Prins, J. E. J.Dellen, M. J. M. eds. Digital Anonymity and the Law. Tensions and Dimensions.T. M. C. Asser PressDen Haag287297(Information Technology & Law Series, 2)
    Google Scholar
  20. Nicoll, C., Prins, J. E. J., Dellen, M. J. M. 2003Digital anonymity and the law: tensions and dimensions, TM. C. Asser PressThe HagueGoogle Scholar
  21. Nwana, H., Ndumu, D., Lyndon, L., Collis, J. 1999ZEUS: A Toolkit and Approach for Building Distributed Multi-Agent SystemsAssociation for Computing MachinerySeattle, Washington360361Google Scholar
  22. Reiter, M. K., Rubin, A.D. 1998Crowds: Anonymity for Web TransactionsACM Transactions on Information and System Security16692Google Scholar
  23. Reiter, M. K., Rubin, A. D. 1999Anonymity Loves Company: Anonymous Web Transactions with CrowdsCommunications of the ACM423238Google Scholar
  24. Rieke, A., Demuth, T. 2001

    JANUS: Server Anonymity in the World Wide Web.

    Gattiker, U. E. eds. Conference Proceedings EICAR International ConferenceMünchenDeutschland195208
    Google Scholar
  25. Sims, A. 2003

    Court Assisted means of Revealing Identity on the Internet.

    Nicoll, C.Prins, J. E. J.Dellen, M. J. M. eds. Digital Anonymity and the Law. Tensions and Dimensions.T. M. C. Asser PressDen Haag271286(Information Technology & Law Series, 2)
    Google Scholar
  26. Steenbruggen, W. A. M. 2002Annotatie bij Voorzieningenrechter Rb. Utrecht 9 juli 2002Computerrecht21297298(Teleatlas/Planet Media Group).Google Scholar
  27. Tanenbaum, A. S., Steen, M. 2002Distributed Systems: Principles and ParadigmsNew JerseyPrentice-HallGoogle Scholar
  28. Voermans, W. J. M. 1995Sturen in de mist..., maar dan met radar. Een onderzoek naar praktisch haalbare vormen van computerondersteuning bij het ontwerpen van regelingenTjeenk WillinkZwolleGoogle Scholar
  29. Wijngaards, N. J. E., Overeinder, B. J., Steen, M., Brazier, F. M. T. 2002Supporting Internet-Scale Multi-Agent SystemsData and Knowledge Engineering41229245Google Scholar
  30. Wong, H. and Sycara, K. (2000). A Taxonomy of Middle-agents for the Internet. In Proceedings of the Fourth International Conference on Multi-Agent Systems ICMAS’2000, 149–161. IEEE Computer Society: Boston, MA, USA. Google Scholar
  31. The Council of the European Communities, Council Directive 91/250/EEC of 14 May 1991 on the legal protection of computer programs, Official Journal L 122 , 17/05/1991, 42–46.Google Scholar

Copyright information

© Springer 2004

Authors and Affiliations

  • Frances Brazier
    • 1
  • Anja Oskamp
    • 2
  • Corien Prins
    • 3
  • Maurice Schellekens
    • 3
  • Niek Wijngaards
    • 1
  1. 1.Intelligent Interactive Distributed Systems, Faculty of SciencesVrije Universiteit AmsterdamAmsterdamThe Netherlands
  2. 2.Computer and Law Institute, Faculty of LawVrije Universiteit AmsterdamAmsterdamThe Netherlands
  3. 3.TILT, Tilburg Institute for Law, Technology and Society, Faculty of LawTilburg UniversityTilburgThe Netherlands

Personalised recommendations