Anonymity, Security, and Privacy

  • Joseph Migga Kizza
Part of the Undergraduate Texts in Computer Science book series (UTCS)


Social, economic, and technological advances have dramatically increased the amount of information any one individual possesses. Increasing demand for information and easier access to it have also created challenges. We have come to learn that information is a treasure in itself: The more you have, the better. Having valuable intellectual, economic, and social information creates enormous opportunities and advantages for an individual because information has become a vital resource in this information age.


Block Cipher Privacy Protection Stream Cipher Social Security Number Software Piracy 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Detweiler, L. “ Identity, Privacy, and Anonymity on the Internet.” Available:
  2. 2.
    Seven, Gary. “Lex Luthor and The Legion of Doom/Hackers Presents: Identifying, Attacking, Defeating, and Bypassing Physical Security and Intrusion Detection Systems.” The Lod/H Technical Journal. Available: http:/
  3. 3.
    Lowe, D. V. “Security Overview: Introduction.” Available:—vincent/fin4/fin4.html
  4. 4.
    Fahn, Paul. “Answers to Frequently Asked Questions About Today’s Cryptography.” Available:
  5. 5.
    Scherphier, A. “CS596 Client-Server Programming Security.” Available:
  6. 6.
    Durlak, Jerry. “ Privacy and Security.” Communications for Tomorrow. Available:
  7. 7.
    Mason, Richard. “Four Ethical Issues of the Information Age.” In R. Dejoie, G. Fowler, and D. Paradice (eds.), Ethical Issues in Information Systems. Boston: Boyd & Fraser, 1991.Google Scholar
  8. 8.
    Johnson, Deborah. Computer Ethics, 2nd ed. Englewood Cliffs, NJ: Prentice Hall, 1995.Google Scholar
  9. 9.
    Landon, Kenneth. “Markets and Piracy,” Communications of the ACM, 39 (9), 1996, pp. 92–95.CrossRefGoogle Scholar
  10. 10.
    Markoff, John. “A Most-Wanted Cyberthief Is Caught in His Own Web.” New York Times, February 15, 1995.Google Scholar
  11. 11.
    New Report Documents Threat to Youth from Alcohol and Tobacco Web Sites.“ Center for Media Education. Available:

Further Reading

  1. Rachels, James. “Why Privacy Is Important.” In R. Dejoice, G. Flower, and P.A. Radice (eds.), Ethical Issues in Information Systems. Boston: Boyd & Fraser, 1991.Google Scholar
  2. Schiesel, Seth. “On the Web, New Threats to Young Are Seen.” New York Times, March 7, 1997.Google Scholar
  3. “Tactics of a High-Tech Detective.” New York Times. Available:

Copyright information

© Springer Science+Business Media New York 1998

Authors and Affiliations

  • Joseph Migga Kizza
    • 1
  1. 1.Department of Computer Science and Electrical EngineeringUniversity of Tennessee at ChattanoogaChattanoogaUSA

Personalised recommendations