Advertisement

Notion of Anonymity

Chapter
Part of the SpringerBriefs in Cybersecurity book series (BRIEFSCYBER)

Abstract

Stemming from the Greek word “anonymia”, the term anonymity/anonymous stands for “namelessness”, “not identified” or “of unknown name” (Oxford Dictionaries) and usually bears on a person’s appearance in public. Consequently, anonymity occurs if a person’s identity being involved in a not-transparent/not disclosed process is non-determinable since the acting person remains unknown to the other acting entities or makes no appearance towards the other participants or acts within the anonymous process without recognizable name (Bundesamt für Sicherheit in der Informationstechnik, 2001, https://www.bsi.bund.de/ContentBSI/Publikationen/Studien/anonym/wasistanonymitaet.html;jsessionid=97B15124E289CE809BB8CA90471E5F9A.2_cid241).

Keywords

Internet User Internet Service Provider Domain Name System Internet Protocol Address Online World 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. Adams T (2011) How the Internet created an age of rage. The Guardian. 24 July 2011. http://www.guardian.co.uk/technology/2011/jul/24/internet-anonymity-trolling-tim-adams. Accessed 31 Jan 2012
  2. Barnes SB (2006) A privacy paradox: Social Networking in the United States. First Monday 11(9). http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/1394/1312. Accessed 31 Jan 2012
  3. Bizer J (2000) Recht auf Anonymität—ein Rechtsprinzip der elektronischen Individualkommunikation, In: Sokol B (ed) Datenschutz und Anonymität. Toennes Satz + Druck GmbH, Düsseldorf. https://www.ldi.nrw.de/mainmenu_Service/submenu_Tagungsbaende/Inhalt/2000_Datenschutz_und_Anonymitaet/Datenschutz_und_Anonymitaet.pdf. Accessed 31 Jan 2012
  4. Brunst PW (2009) Anonymität im Internet—rechtliche und tatsächliche Rahmenbedingungen. Duncker and Humblot, BerlinGoogle Scholar
  5. Bundesamt für Sicherheit in der Informationstechnik (2001) Das Ende der Anonymität? Datenspuren in modernen Netzen. https://www.bsi.bund.de/ContentBSI/Publikationen/Studien/anonym/wasistanonymitaet.html;jsessionid=97B15124E289CE809BB8CA90471E5F9A.2_cid241. Accessed 31 Jan 2012
  6. Demut T, Rieke A (2000) Der Rewebber—Anonymität im World Wide Web. In: Sokol B (ed) Datenschutz und Anonymität. Toennes Satz + Druck GmbH, DüsseldorfGoogle Scholar
  7. Edelmann, B (2009) Running out of numbers: scarcity of ip addresses and what to do about it. Working Paper Harvard Business School. http://www.hbs.edu/research/pdf/09-091.pdf. Accessed 31 Jan 2012
  8. European Commission (2011b) Special eurobarometer 359: attitudes on data protection and electronic identity in the European union. Report. June 2011. http://ec.europa.eu/public_opinion/archives/ebs/ebs_359_en.pdf. Accessed 31 Jan 2012
  9. European Parliament (2010) Information and communication technologies and human rights. http://www.europarl.europa.eu/committees/en/studiesdownload.html?languageDocument=EN&file=31731. Accessed 31 Jan 2012
  10. Fox S (2000) Trust and privacy online: why americans want to rewrite the rules. The Pew Internet and American Life Project. http://www.pewinternet.org/~/media//Files/Reports/2000/PIP_Trust_Privacy_Report.pdf.pdf. Accessed 31 Jan 2012
  11. Froomkin AM (1995) Anonymity and Its enmities. Journal of Online Law. http://articles.umlaw.net/froomkin/Anonymity_Enmities.htm. Accessed 31 Jan 2012
  12. Glater JD (2006) Privacy for People Who Don’t Show Their Navels. The New York Times. 26 January 2006. http://www.nytimes.com/2006/01/25/technology/techspecial2/25privacy.html. Accessed 31 Jan 2012
  13. Holznagel B, Schumacher P (2011) Die Freiheit der Internetdienste. In: Kleinwächter W (ed) Grundrecht Internetfreiheit. Eurocaribe Druck Hamburg, BerlinGoogle Scholar
  14. Kabay ME (1998) Anonymity and pseudonymity in cyberspace: deindividuation, incivility and lawlessness versus freedom and privacy. http://www.mekabay.com/overviews/anonpseudo.pdf. Accessed 31 Jan 2012
  15. Landau S (2010) Surveillance or Security? The risks posed by new wiretapping technologies. The MIT Press, Cambridge and LondonGoogle Scholar
  16. Lehr W, Vest T, Lear E (2008) Running on empty: the challenge of managing Internet addresses. http://cfp.mit.edu/publications/CFP_Papers/Lehr%20Lear%20Vest%20TPRC08%20Internet%20Address%20Running%20on%20Empty.pdf. Accessed 31 Jan 2012
  17. Malin B, Sweeney L, Newton E (2003) Trail re-identification: learning who you are from where you have been. LIDAP-WP12. Carnegie Mellon University. Laboratory for International Data Privacy. http://dataprivacylab.org/dataprivacy/projects/trails/paper3.pdf. Accessed 31 Jan 2012
  18. Moore R (2011) Cybercrime: investigating high-technology computer crime, 2nd edn. Anderson Publishing, BurlingtonGoogle Scholar
  19. Nichols S (2001) Big Brother is Watching: An update on web bugs. http://www.sans.org/reading_room/whitepapers/threats/big-brother-watching-update-web-bugs_445. Accessed 31 Jan 2012
  20. Ofcom (2010) Media Literacy Matters, Online trust and privacy: People’s attitudes and behaviour. Research Document. http://stakeholders.ofcom.org.uk/binaries/research/media-literacy/trust-privacy.pdf. Accessed 31 Jan 2012
  21. Pfitzmann A (2000) Möglichkeiten und Grenzen von Anonymität. In: Sokol B (ed) Datenschutz und Anonymität. Toennes Satz + Druck GmbH, DüsseldorfGoogle Scholar
  22. Sammartino P (1990) The man who was William Shakespeare. Cornwall Books, New YorkGoogle Scholar
  23. Schwartz PM, Solove DJ (2011) The PII problem: privacy and a new concept of personally identifiable information. New York Univ Law Rev 86(6):1814–1894Google Scholar
  24. Shah RC, Kesan JP (2004) Recipes for cookies: how institutions shape communication technologies. http://www.governingwithcode.org/journal_articles/pdf/Recipe_For_Cookies.pdf. Accessed 31 Jan 2012
  25. Solove DJ (2007) The future of reputation: gossip, rumor, and privacy on the internet. Yale University Press, New HavenGoogle Scholar
  26. Solove DJ, Schwartz PM (2011) Information Privacy Law, 4th edn. Wolters Kluwer Law, New YorkGoogle Scholar
  27. Taddicken M (2012) Privacy, surveillance, and self-disclosure in the social web: exploring the user’s perspective via focus groups. In: Fuchs C, Boersma K, Albrechtslund A, Sandoval M (eds) Internet and Surveillance: The Challenges of Web 2.0 and Social Media. Routledge, New YorkGoogle Scholar
  28. Van Dijk G, Minocha S, Laing A (2007) Consumer, channels and communication: online and offline communication in serve consumption. Interact Comput 19:7–19CrossRefGoogle Scholar
  29. Wallace KA (1999) Anonymity. Ethics Inf Technol 1(1):23–35CrossRefGoogle Scholar
  30. Warschauer M (2008) Online communication. In: Carter R, Nunan D (eds) The Cambridge guide to teaching english to speakers of other languages. Cambridge University Press, CambridgeGoogle Scholar
  31. Weber RH (2009) Internet governance: regulatory challenges. Schulthess, ZurichGoogle Scholar
  32. Weber RH (2012a) International governance in a new media environment. In: Price ME, Verhulst SA (eds) Handbook of media law and policy: a socio-legal exploration. Routledge, New York (forthcoming)Google Scholar
  33. Weber RH, Heinrich UI (2011) IP Address allocation through the lenses of public goods and scarce resources theories. scripted 8(1): 69–92. http://www.law.ed.ac.uk/ahrc/script-ed/vol8-1/weber.pdf. Accessed 31 Jan 2012
  34. Weber RH, Schneider T (2009) Internet governance and Switzerland’s particular role in its processes. Schulthess, ZurichGoogle Scholar

Copyright information

© The Author(s) 2012

Authors and Affiliations

  1. 1.Law DepartmentUniversity of ZurichZurichSwitzerland

Personalised recommendations