Anonymization

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

Within the last decade, the Internet has developed as a phenomenon encompassing social, cultural, economic and legal facets. It has become common practice to use the Internet for both the retrieval and provision of information, with the result that the Internet has become a valuable tool in everyday life. Many Internet participants are unaware that they leave data tracks on every website they pass; surfing on the World Wide Web is far from being an anonymous activity of no consequence. In recent years a number of networking techniques have been initiated in order to accommodate the netizen’s wish for anonymous communication and the protection of their privacy in the online world. Anonymization explores the legal framework developed to help protect netizens’ privacy and their wish for anonymous communication over the Internet. It debates the value in helping to protect anonymity over a network which sees an increasing number of cybercrimes, and explores governmental interventions into anonymity requests, and whether requests should only be legal if a sufficiently legitimized public interest is given. Table of Contents Cover Anonymization ISBN 9781447140658 eISBN 9781447140665 Contents Abstract Chapter 1 Notion of Anonymity 1.1 Term and Meaning of Anonymity 1.2 Underlying Motivations of Anonymity 1.3 Characteristics of Communication 1.3.1 Real World 1.3.2 Particularities of the Online World References Chapter 2 Anonymity Challenges in the Internet 2.1 Risks for Anonymous Use of Internet Services 2.1.1 Information Gathered by IP Addresses 2.1.2 Storage of Recorded Data 2.1.3 Insufficien Data Security Measures 2.2 Technical Implementation of Anonymizing Services 2.2.1 Privacy Enhancing Technologies in General 2.2.2 Anonymizing Networking Techniques 2.2.3 Virtue of Anonymizing Services References Chapter 3 Legal Foundations of Anonymity 3.1 International Legal Framework 3.1.1 United Nations 3.1.2 OECD 3.1.3 Council of Europe 3.1.4 European Union 3.2 Concretization of the Human Rights Protection Regime 3.2.1 Correlations of Anonymity and Privacy 3.2.2 Protection Regime of Privacy References Chapter 4 Limitations of Anonymization 4.1 Factual Reasons for State Interventions 4.2 State Supervision in the Public Interest in General 4.2.1 Legitimate State Interests 4.2.2 Legal Bases for State Interventions 4.3 Combating Cybercrime 4.3.1 Subject Matter of Protection 4.3.2 Global Cybersecurity Agenda 4.3.3 Cybercrime Convention of Council of Europe 4.3.4 EU Agenda 4.4 Supervising Internet Traffi by Trojan Horse Software 4.4.1 Use of Trojan Horse Software by the German Government 4.4.2 Use of Trojan Horse Software by Other Governments 4.4.3 Concluding Legal Assessment 4.5 Enforcement of Copyright References Chapter 5 Outlook

Author(s): Rolf H. Weber, Ulrike I. Heinrich
Series: SpringerBriefs in Cybersecurity
Edition: 2012
Publisher: Springer
Year: 2012

Language: English
Commentary: Bookmarks, cover, pagination
Pages: 82