Skip to main content

Anonymity, Security, Privacy, and Civil Liberties

  • Chapter
  • First Online:
Ethics in Computing

Part of the book series: Undergraduate Topics in Computer Science ((UTICS))

  • 4080 Accesses

Abstract

This chapter surveys the traditional ethical and privacy issues including security, anonymity and the analysis of how these issues are influenced by computer technology. This dialog also looks at privacy and the protection of civil rights. But in the absence of and agreed upon set of civil liberties by scholars, the discussion focuses on the following four accepted categories: (i) criminal justice that includes police powers, personal liberty, and the right to a fair trial; (ii) basic freedoms of speech, assembly, association, movement, and no discrimination; (iii) freedom of information; and (iv) communications and privacy. With the rapid advances in computer technology, and in particular the advent of the Internet mobile telecommunication technologies, the reader is challenged and brought into the discussion of finding ways, best practices and in some cases protocols and frameworks to protect these civil liberties. The chapter ends with a challenge to the reader to find a fitting ethical framework to protect us and our ethical and social values against the avalanche of these technologies. What should be included in it? Is there a need for a legal framework also? The reader is prompted!

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Detweiler L. Identity, privacy, and anonymity on the Internet. http://www.fwn.rug.nl/fennema/marko/archive/privacy.txt

  2. Seven G. Lex Luthor and the legion of doom/hackers presents: identifying, attacking, defeating, and bypassing physical security and intrusion detection systems. Lod/H Tech J. http://underground.org/publications/lod/lod-1.3.html

  3. Lowe DV. Security overview: introduction. http://www.compclass.com/~vincent/fin4/fin4.html

  4. Scherphier A. CS596 Client–server programming security. http://www.sdsu.edu/~turtle/cs596/security.html

  5. Durlak J. Privacy and security. Commun Tomorrow. http://renda.colunato.yorku.ca/com4tom/1296.html

  6. Rodger W (2000) Sites targeted for privacy violations. USA Today, June 13, 2000

    Google Scholar 

  7. Mason R (1991) Four ethical issues of the information age. In: Dejoie R, Fowler G, Paradice D (eds) Ethical issues in information systems. Boyd & Fraser, Boston

    Google Scholar 

  8. Johnson DJ (2009) Computer ethics, 4th edn. Pearson Education, Upper Saddle River

    Google Scholar 

  9. Landon K (1996) Markets and piracy. Commun ACM 39(9):92–95

    Article  Google Scholar 

  10. Second amended verified original petition and application for TRO and temporary injunction. Universal Image, Inc. v. Yahoo, Inc. http://www.tomwbell.com/netlaw/universal/yahoo.html

Further Reading

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Kizza, J.M. (2016). Anonymity, Security, Privacy, and Civil Liberties. In: Ethics in Computing. Undergraduate Topics in Computer Science. Springer, Cham. https://doi.org/10.1007/978-3-319-29106-2_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-29106-2_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-29104-8

  • Online ISBN: 978-3-319-29106-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics