Skip to main content

Anonymity, Security, Privacy, and Civil Liberties

  • Chapter
  • First Online:
  • 1677 Accesses

Part of the book series: Undergraduate Topics in Computer Science ((UTICS))

Abstract

This chapter surveys the traditional ethical and privacy issues including security, anonymity and the analysis of how these issues are influenced by computer technology. This dialog also looks at privacy and the protection of civil rights. But in the absence of and agreed upon set of civil liberties by scholars, the discussion focuses on the following four accepted categories: (i) criminal justice that includes police powers, personal liberty, and the right to a fair trial; (ii) basic freedoms of speech, assembly, association, movement, and no discrimination; (iii) freedom of information; and (iv) communications and privacy. With the rapid advances in computer technology, and in particular the advent of the Internet mobile telecommunication technologies, the reader is challenged and brought into the discussion of finding ways, best practices, and in some cases protocols and frameworks to protect these civil liberties. The chapter ends with a challenge to the reader to find a fitting ethical framework to protect us and our ethical and social values against the avalanche of these technologies. What should be included in it? Is there a need for a legal framework also? The reader is prompted!

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   34.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Auden WH (1995) “The Unknown Citizen.” Literature: an introduction to fiction, poetry, and drama, 6th edn. In: Kennedy XJ, Dana G (eds). Harper Collins, New York, pp 611–612

    Google Scholar 

  2. Privacy Lost: The Demise of Privacy in America. http://dorothyseeseonline.tripod.com/newsline/id3.html

  3. Moyers and Company. Big Brother’s Prying Eyes, June 14, 2013. https://billmoyers.com/episode/big-brothers-prying-eyes/

  4. Snooper’s Charter passes into law—what it means. https://www.ft.com/content/40d2ede4-adac-11e6-9cb3-bb8207902122

  5. Katherine M (2000) Big brother in the flesh: new technology could make us all a part of the collective, permanently supervised from above, Edition. Las Vegas Weekly

    Google Scholar 

  6. McClure S, Scambray J (2000) Forget the firewall: guard your garbage against ‘dumpster diving’ hackers. LISTSERV @ SecurityFocus.com

    Google Scholar 

  7. Eisenberg D “Who Is Reading Your Bills?” A court ruling on privacy riles the FCC. http://www.cnn.com/ALLPOLITICS/time/1999/08/30/privacy.html

  8. Possessed: the dangers of the digital home. https://www.ft.com/content/bd8e187e-7799-11e7-a3e8-60495fe6ca71

  9. Seven G (1990) Lex luthor and the legion of doom/hackers presents: identifying, attacking, defeating, and bypassing physical security and intrusion detection systems. Lod/H Tech J 1(3)

    Google Scholar 

  10. Will R (2000) Sites targeted for privacy violations. USA Today

    Google Scholar 

  11. Mason R (1991) Four ethical issues of the information age. In: Dejoie R, Fowler G, Paradice D (eds) Ethical issues in information systems. Boyd & Fraser, Boston, MA

    Google Scholar 

  12. Landon K (1996) Markets and piracy. Commun ACM 39(9):92–95

    Article  Google Scholar 

  13. Second Amended Verified Original Petition and Application for TRO and Temporary Injunction. Universal Image, Inc. v. Yahoo, Inc. http://www.tomwbell.com/netlaw/universal/yahoo.html

Further Reading

  1. Auden WH (1995) The unknown citizen. In: Kennedy XJ, Gioia D (eds) Literature: an introduction to fiction, poetry, and drama, 6th edn. Harper Collins, New York, pp 611–612

    Google Scholar 

  2. Eisenberg D. Who is reading your bills? A court ruling on privacy riles the FCC. http://www.cnn.com/ALLPOLITICS/time/1999/08/30/privacy.html

  3. Garrison T (1999) Latest surveillance leaves nothing to chance: exploring the dark side of the digital home. Realty Times. February 10, 1999. http://realtytimes.com/rtnews/rtipages/19990210digitalhomes.htm

  4. Lynch I (2000) Snooping bill to become law by November [27-07-2000]. http://www.vnunet.com

  5. McClure S, Scambray J (2000) Forget the firewall: guard your garbage against ‘Dumpster Diving’ hackers. LISTSERV@SecurityFocus.com. Friday, 7 July, 2000

    Google Scholar 

  6. Mieszkowski K (2000) Big brother in the flesh: new technology could make us all a part of the collective, permanently supervised from above, September 21, 2000 Edition. http://www.lasvegasweekly.com

  7. Privacy lost: the demise of privacy in America. http://dorothyseeseonline.tripod.com/newsline/id3.html

  8. Rachels J (1991) Why privacy is important. In: Dejoice R, Flower G, Radice PA (eds) Ethical issues in information systems. Boyd & Fraser, Boston

    Google Scholar 

  9. Schiesel S (1997) On the web, new threats to young are seen. New York Times, March 7, 1997

    Google Scholar 

  10. Spying on employees: big brother has his eye on you … snooping sister is supervising you. http://www.successunlimited.co.uk/related/snoop.htm

  11. Tactics of a high-tech detective. New York Times. http://www.takedown.com/coverage/tactics.html

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Joseph Migga Kizza .

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Kizza, J.M. (2019). Anonymity, Security, Privacy, and Civil Liberties. In: Ethical and Secure Computing. Undergraduate Topics in Computer Science. Springer, Cham. https://doi.org/10.1007/978-3-030-03937-0_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-03937-0_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-03936-3

  • Online ISBN: 978-3-030-03937-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics