Cyber Law - Articles PDF

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 4

CYBER LAW

ASSIGNMENT - 2

ON

ANONYMITY IN CYBERSPACE Vs. PRIVACY

SUBMITTED TO: SUBMITTED BY:

Prof. Sambhabi Patnaik Anamika


162014
BBA.llb (a)
1. Why Do People Seek Anonymity on the Internet?
Albrechtsen, E. A qualitative study of users’ view on information security. Computers &
Security 26, 4 (2007), 276–289.

In this research we set out to discover why and how people seek anonymity in their
online interactions. Our goal is to inform policy and the design of future Internet
architecture and applications. A key finding of our research is the very large variation
in interviewees’ past experiences and life situations leading them to seek anonymity,
and how they tried to achieve it. The results suggest implications for the design of
online communities,challenges for policy, and ways to improve anonymity tools and
educate users about the different routes and threats to anonymity on the Internet.

2 . Anonymity in Cyberspace: Finding the Balance between Privacy and


Security
AKDENIZ, Anonymity, Democracy and Cyberspace (Social Research), Vol. 69, N°1 (Spring
2002), p. 5; M. WASIK, Crime and the Computer (Oxford, Rendon Press Oxford), [1998]

This paper seeks to explore and analyse anonymity in cyberspace. It shows that the
balance between privacy of internet users and security of nations can be achieved. It
starts by presenting the concept and several types of anonymity. It focuses on the
internet and how anonymity can be achieved, and why it is an essential tool for free
speech. The paper will also describe proposals to outlaw anonymity over the internet,
since it has often been tied to criminal activity by law enforcement bodies.

2. The right not to be identified: privacy and anonymity in the interactive


media environment
Volume: 8 issue: 6, page(s): 949-967
Issue published: December 1, 2006

This article explores how the development of information technology, especially


interactive computers, changes the privacy environment as experienced by individuals
and the policy implications of these changes. This article suggests that focusing on the
right not to be identified on the network by allowing affirmative acts of secrecy and
deception regarding identity and identification might be the most effective-and
sometimes only practically viable-way of ensuring privacy in the interactive
environment.

3. Anonymity, democracy, and cyberspace


Cite as: Akdeniz, Y., Anonymity, Democracy, and Cyberspace, Social Research,
(2002) 69(1), Spring, pp 180-194.

There are major concerns about the vehicle the Internet provides for personal
snooping not only by commercial institutions but also (and more seriously) by
governmental organisations and law enforcement bodies all keeping track of
individual usage of the Internet for the purposes of marketing, policing or otherwise.
With the rapid growth of the Internet as the newest medium for global
communications, and for commerce, comes the need to review the interaction of
conflicting demands for respect for privacy, freedom of expression and the detection
and punishment of crime.

4. Anonymity and Democracy: Absence as Presence in the Public Sphere

Published online by Cambridge University Press: 04 July 2018, pp. iii-v

Although anonymity is a central feature of liberal democracies, campaign funding,


publishing political texts, masked protests, and graffiti has so far not been
conceptually grounded in democratic theory. Rather, it is treated as a self-explanatory
concept related to privacy. To overcome this omission, this article develops a complex
understanding of anonymity in the context of democratic theory.

5. Anonymity in Cyberspace: Finding the Balance

George F. du Pont,Criminalization of True Anonymity in Cyberspace, The, 7


Mich.Telecomm.&Tech.L. Rev.191 (2001).Available
at:http://repository.law.umich.edu/mttlr/vol7/iss1/4

Anonymity in cyberspace is a major concern for the global community. The


introduction, growth and utilisation of information and communication technologies
(ICTs) have been accompanied by an increase in criminal activities. With respect to
cyberspace, identities are easily cloaked in anonymity. Accordingly, this paper seeks
to address and analyse the following issues. Firstly, it starts by presenting the concept
and several types of anonymity. Secondly, it focuses on the Internet and how it can be
achieved, and why it is an essential tool for free speech. The paper will also describe
proposals to outlaw anonymity over the Internet, since it has often been tied to
criminal activity by law enforcement bodies. Finally, the paper concludes that total
anonymity may be possible through the use of privacy-enhancing technologies.
Moreover, educated legislators can criminalize most true anonymity in cyberspace
and still pass security.

6. Anonymity In Cyberspace: Judicial and Legislative Regulations


Sophia Qasir, Anonymity In Cyberspace: Judicial and Legislative Regulations, 81 Fordham L. Rev.
3651 (2013).

Internet speech is on the rise. The First Amendment protects an individual’s right to
speak anonymously, but to what extent does it protect a right to anonymous online
speech? This question is difficult because the government must balance the
fundamental nature of speech rights with the potential dangers associated with
anonymous online speech, including defamation, invasion of privacy, and intentional
infliction of emotional distress.
8 . The right not to be identified: privacy and anonymity in the interactive
media environment Volume: 8 issue: 6, page(s): 949-967 Issue published: December 1, 2006

This article explores how the development of information technology, especially


interactive computers, changes the privacy environment as experienced by individuals
and the policy implications of these changes. External entities, such as governments
and commercial industries, that ‘invade’ people’s rights to be left alone are of less
concern now than individuals who voluntarily give up their privacy by willingly
providing personal information for other benefits on the internet.

9.Going dark: anonymising technology in cyberspace

Bellaby, R.W. Going dark: anonymising technology in cyberspace. Ethics Inf Technol 20, 189–204
(2018). https://doi.org/10.1007/s10676-018-9458-4

Anonymising technologies are cyber-tools that protect people from online


surveillance, hiding who they are, what information they have stored and what
websites they are looking at, the user’s identity and activity is protected from the
watchful eyes of the intelligence community. This represents a clear challenge to
intelligence actors as it prevents them access to information that many would argue
plays a vital part in locating and preventing threats from being realised.

10 .k-ANONYMITY: A MODEL FOR PROTECTING PRIVACY

International Journal of Uncertainty, Fuzziness and Knowledge-Based SystemsVol. 10, No. 05, pp.
557-570 (2002)

The subjects of the data of the data holder,such as a hospital or a bank, that has a
privately held collection of person-specific cannot be re-identified while the data
remain practically useful? The solution provided in this paper includes a formal
protection model named k-anonymity and a set of accompanying policies for
deployment. This paper also examines re-identification attacks that can be realized on
releases that adhere to k-anonymity unless accompanying policies are respected.

You might also like