Within the last decade, the Internet has developed as a phenomenon encompassing social, cultural, economic and legal facets. It has become common practice to use the Internet for both the retrieval and provision of information, with the result that the Internet has become a valuable tool in everyday life. Many Internet participants are unaware that they leave data tracks on every website they pass; surfing on the World Wide Web is far from being an anonymous activity of no consequence. In recent years a number of networking techniques have been initiated in order to accommodate the netizen’s wish for anonymous communication and the protection of their privacy in the online world. Anonymization explores the legal framework developed to help protect netizens’ privacy and their wish for anonymous communication over the Internet. It debates the value in helping to protect anonymity over a network which sees an increasing number of cybercrimes, and explores governmental interventions into anonymity requests, and whether requests should only be legal if a sufficiently legitimized public interest is given.
Table of Contents
Cover
Anonymization
ISBN 9781447140658 eISBN 9781447140665
Contents
Abstract
Chapter 1 Notion of Anonymity
1.1 Term and Meaning of Anonymity
1.2 Underlying Motivations of Anonymity
1.3 Characteristics of Communication 1.3.1 Real World
1.3.2 Particularities of the Online World
References
Chapter 2 Anonymity Challenges in the Internet
2.1 Risks for Anonymous Use of Internet Services
2.1.1 Information Gathered by IP Addresses
2.1.2 Storage of Recorded Data
2.1.3 Insufficien Data Security Measures
2.2 Technical Implementation of Anonymizing Services
2.2.1 Privacy Enhancing Technologies in General
2.2.2 Anonymizing Networking Techniques
2.2.3 Virtue of Anonymizing Services
References
Chapter 3 Legal Foundations of Anonymity
3.1 International Legal Framework
3.1.1 United Nations
3.1.2 OECD
3.1.3 Council of Europe
3.1.4 European Union
3.2 Concretization of the Human Rights Protection Regime
3.2.1 Correlations of Anonymity and Privacy
3.2.2 Protection Regime of Privacy
References
Chapter 4 Limitations of Anonymization
4.1 Factual Reasons for State Interventions
4.2 State Supervision in the Public Interest in General
4.2.1 Legitimate State Interests
4.2.2 Legal Bases for State Interventions
4.3 Combating Cybercrime 4.3.1 Subject Matter of Protection
4.3.2 Global Cybersecurity Agenda
4.3.3 Cybercrime Convention of Council of Europe
4.3.4 EU Agenda
4.4 Supervising Internet Traffi by Trojan Horse Software 4.4.1 Use
of Trojan Horse Software by the German Government
4.4.2 Use of Trojan Horse Software by Other Governments
4.4.3 Concluding Legal Assessment
4.5 Enforcement of Copyright
References
Chapter 5 Outlook
Author(s): Rolf H. Weber, Ulrike I. Heinrich
Series: SpringerBriefs in Cybersecurity
Edition: 2012
Publisher: Springer
Year: 2012
Language: English
Commentary: Bookmarks, cover, pagination
Pages: 82