Advertisement

Anonymity, Security, Privacy, and Civil Liberties

  • Joseph Migga Kizza
Chapter
Part of the Texts in Computer Science book series (TCS)

Abstract

This chapter surveys the traditional ethical and privacy issues including security, anonymity, and the analysis of how these issues are influenced by computer technology. This dialog also looks at privacy and the protection of civil rights. But in the absence of and agreed upon set of civil liberties by scholars, the discussion focuses on the following four accepted categories: (1) criminal justice that includes police powers, personal liberty, and the right to a fair trial; (2) basic freedoms of speech, assembly, association, movement, and no discrimination; (3) freedom of information; and (4) communications and privacy. With the rapid advances in computer technology, and in particular the advent of the Internet mobile telecommunication technologies, the reader is challenged and brought into the discussion of finding ways, best practices, and in some cases protocols and frameworks to protect these civil liberties. The chapter ends with a challenge to the reader to find a fitting ethical framework to protect us and our ethical and social values against the avalanche of these technologies. What should be included in it? Is there a need for a legal framework also? The reader is prompted!

Keywords

Hash Function Personal Information Online Social Network Privacy Protection Civil Liberty 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    Detweiler L Identity, privacy, and anonymity on the internet. http://www.fwn.rug.nl/fennema/marko/archive/privacy.txt
  2. 2.
    Seven G Lex Luthor and the Legion of Doom/Hackers presents: identifying, attacking, defeating, and bypassing physical security and intrusion detection systems. The Lod/H Tech J. http:/underground.org/publications/lod/lod-1.3.html
  3. 3.
    Lowe DV Security overview: introduction. http://www.compclass.com/∼vincent/fin4/fin4.htmlGoogle Scholar
  4. 4.
    Scherphier A CS596 client–server programming security. http://www.sdsu.edu/∼turtle/cs596/security.htmlGoogle Scholar
  5. 5.
    Durlak J Privacy and security. Communications for tomorrow. http://renda.colunato.yorku.ca/com4tom/1296.html
  6. 6.
    Rodger W (2000) Sites targeted for privacy violations. USA Today, 13 June 2000Google Scholar
  7. 7.
    Mason R (1991) Four ethical issues of the information age. In: Dejoie R, Fowler G, Paradice D (eds) Ethical issues in information systems. Boyd & Fraser, BostonGoogle Scholar
  8. 8.
    Johnson D (1995) Computer ethics, 2nd edn. Prentice Hall, Englewood CliffsGoogle Scholar
  9. 9.
    Landon K (1996) Markets and piracy. Commun ACM 39(9):92–95CrossRefGoogle Scholar
  10. 10.
    Second amended verified original petition and application for TRO and temporary injunction. Universal Image, Inc. v. Yahoo, Inc. http://www.tomwbell.com/netlaw/universal/yahoo.html

Further Reading

  1. Rachels J (1991) Why privacy is important. In: Dejoice R, Flower G, Radice PA (eds) Ethical issues in information systems. Boyd & Fraser, BostonGoogle Scholar
  2. Schiesel S (1997) On the web, new threats to young are seen. New York Times, 7 March 1997Google Scholar
  3. Tactics of a high-tech detective. New York Times. http://www.takedown.com/coverage/tactics.html

Copyright information

© Springer-Verlag London 2013

Authors and Affiliations

  • Joseph Migga Kizza
    • 1
  1. 1.Department of Computer Science and EngineeringUniversity of TennesseeChattanoogaUSA

Personalised recommendations