Abstract
This chapter surveys the traditional ethical and privacy issues including security, anonymity and the analysis of how these issues are influenced by computer technology. This dialog also looks at privacy and the protection of civil rights. But in the absence of and agreed upon set of civil liberties by scholars, the discussion focuses on the following four accepted categories: (i) criminal justice that includes police powers, personal liberty, and the right to a fair trial; (ii) basic freedoms of speech, assembly, association, movement, and no discrimination; (iii) freedom of information; and (iv) communications and privacy. With the rapid advances in computer technology, and in particular the advent of the Internet mobile telecommunication technologies, the reader is challenged and brought into the discussion of finding ways, best practices, and in some cases protocols and frameworks to protect these civil liberties. The chapter ends with a challenge to the reader to find a fitting ethical framework to protect us and our ethical and social values against the avalanche of these technologies. What should be included in it? Is there a need for a legal framework also? The reader is prompted!
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Auden WH (1995) “The Unknown Citizen.” Literature: an introduction to fiction, poetry, and drama, 6th edn. In: Kennedy XJ, Dana G (eds). Harper Collins, New York, pp 611–612
Privacy Lost: The Demise of Privacy in America. http://dorothyseeseonline.tripod.com/newsline/id3.html
Moyers and Company. Big Brother’s Prying Eyes, June 14, 2013. https://billmoyers.com/episode/big-brothers-prying-eyes/
Snooper’s Charter passes into law—what it means. https://www.ft.com/content/40d2ede4-adac-11e6-9cb3-bb8207902122
Katherine M (2000) Big brother in the flesh: new technology could make us all a part of the collective, permanently supervised from above, Edition. Las Vegas Weekly
McClure S, Scambray J (2000) Forget the firewall: guard your garbage against ‘dumpster diving’ hackers. LISTSERV @ SecurityFocus.com
Eisenberg D “Who Is Reading Your Bills?” A court ruling on privacy riles the FCC. http://www.cnn.com/ALLPOLITICS/time/1999/08/30/privacy.html
Possessed: the dangers of the digital home. https://www.ft.com/content/bd8e187e-7799-11e7-a3e8-60495fe6ca71
Seven G (1990) Lex luthor and the legion of doom/hackers presents: identifying, attacking, defeating, and bypassing physical security and intrusion detection systems. Lod/H Tech J 1(3)
Will R (2000) Sites targeted for privacy violations. USA Today
Mason R (1991) Four ethical issues of the information age. In: Dejoie R, Fowler G, Paradice D (eds) Ethical issues in information systems. Boyd & Fraser, Boston, MA
Landon K (1996) Markets and piracy. Commun ACM 39(9):92–95
Second Amended Verified Original Petition and Application for TRO and Temporary Injunction. Universal Image, Inc. v. Yahoo, Inc. http://www.tomwbell.com/netlaw/universal/yahoo.html
Further Reading
Auden WH (1995) The unknown citizen. In: Kennedy XJ, Gioia D (eds) Literature: an introduction to fiction, poetry, and drama, 6th edn. Harper Collins, New York, pp 611–612
Eisenberg D. Who is reading your bills? A court ruling on privacy riles the FCC. http://www.cnn.com/ALLPOLITICS/time/1999/08/30/privacy.html
Garrison T (1999) Latest surveillance leaves nothing to chance: exploring the dark side of the digital home. Realty Times. February 10, 1999. http://realtytimes.com/rtnews/rtipages/19990210digitalhomes.htm
Lynch I (2000) Snooping bill to become law by November [27-07-2000]. http://www.vnunet.com
McClure S, Scambray J (2000) Forget the firewall: guard your garbage against ‘Dumpster Diving’ hackers. LISTSERV@SecurityFocus.com. Friday, 7 July, 2000
Mieszkowski K (2000) Big brother in the flesh: new technology could make us all a part of the collective, permanently supervised from above, September 21, 2000 Edition. http://www.lasvegasweekly.com
Privacy lost: the demise of privacy in America. http://dorothyseeseonline.tripod.com/newsline/id3.html
Rachels J (1991) Why privacy is important. In: Dejoice R, Flower G, Radice PA (eds) Ethical issues in information systems. Boyd & Fraser, Boston
Schiesel S (1997) On the web, new threats to young are seen. New York Times, March 7, 1997
Spying on employees: big brother has his eye on you … snooping sister is supervising you. http://www.successunlimited.co.uk/related/snoop.htm
Tactics of a high-tech detective. New York Times. http://www.takedown.com/coverage/tactics.html
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Kizza, J.M. (2019). Anonymity, Security, Privacy, and Civil Liberties. In: Ethical and Secure Computing. Undergraduate Topics in Computer Science. Springer, Cham. https://doi.org/10.1007/978-3-030-03937-0_4
Download citation
DOI: https://doi.org/10.1007/978-3-030-03937-0_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-03936-3
Online ISBN: 978-3-030-03937-0
eBook Packages: Computer ScienceComputer Science (R0)