Abstract
Virtual environments are becoming more and more accepted, and part of the everyday online experience for many users. This offers new potential for both surveillance and data mining. Some of the techniques used are discussed in this paper.
However, such activities may in many countries conflict with the legal framework in place, for example with the German Federal Data Protection Act (Datenschutzgesetz). This point is illustrated by means of comparisons with real-world collection of personal data scenarios such as telephone tapping or video surveillance.
The original version of this chapter was revised: The copyright line was incorrect. This has been corrected. The Erratum to this chapter is available at DOI: 10.1007/978-3-642-02312-5_25
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Toavs, D.: Emerging Media: Its Effect on Organizations. Talk at DNI Open Source Conference (2008), http://blog.wired.com/defense/files/OSC-TOAVS.ppt
Chinese gamer sentenced to life, http://news.bbc.co.uk/1/hi/technology/4072704.stm
MDY v. Blizzard, http://virtuallyblind.com/category/active-lawsuits/mdy-v-blizzard/
Inside Club Penguin and its Child Safety Program (PlayNoEvil Game Security News & Analysis), http://playnoevil.com/serendipity/index.php?/archives/1461-FEATURE-ARTICLE-Inside-Club-Penguin-and-its-Child-Safety-Program.html
Dodds, C.: Avatars and the Invisible Omniscience: The panoptical model within virtual worlds. RMIT University (2007), http://iconinc.com.au/christo/C.Dodds_Exegesis.pdf
Chevalier Encryption HUD, http://www.xstreetsl.com/modules.php?name=Marketplace&file=item&ItemID=385445&affiliate=10824e9e2587b0d00069c4efba3212
Warren, S.D., Brandeis, L.D.: The Right to Privacy (1890), http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Privacy_brand_warr2.html
Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data, http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:31995L0046:EN:HTML
Blizzard Privacy Policy, http://www.worldofwarcraft.com/legal/
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Cikic, S., Lehmann-Grube, F., Sablatnig, J. (2009). Surveillance and Datenschutz in Virtual Environments. In: Sorell, M. (eds) Forensics in Telecommunications, Information and Multimedia. e-Forensics 2009. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 8. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-02312-5_24
Download citation
DOI: https://doi.org/10.1007/978-3-642-02312-5_24
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-02311-8
Online ISBN: 978-3-642-02312-5
eBook Packages: Computer ScienceComputer Science (R0)