Anonymity, Security, Privacy and Civil Liberties Introduction Anonymity Security Privacy Ethical and Social Issues Ethical and Social...J.M.Kizza
Introduction The danger for misuse is real Information has increased in value Information can also be a liability The demand for information is high due to: High digitalization of info & increasing bandwidth. Declining costs of digital communication. Increased miniaturization Portable computers Other communications equipment. Greater public awareness The danger for misuse is real
Anonymity Absence of identity There are three types of identity: Pseudo – know by a pseudo-name Untraceable – no name association Anonymity with a pseudo address No name association Address association Anonymity on the Internet Anonymous servers Anonymous users There is no 100% anonymity on the internet
Advantages and Disadvantages of Anonymity Used by or as a form of whistle-blowing National security Prevent intimidation and fear of reprisal Security of individuals Disadvantages Criminals Dispute resolution Circumventing the law Cyber-stalking
Security Means to prevent unauthorized access Consists of: Confidentiality - to prevent unauthorized disclosure of information to third parties. Integrity - to prevent unauthorized modification of files and maintain the status quo Availability -: to prevent unauthorized withholding of information from those who need it when they need it.
Security… Physical security – guaranteed by: Physical Access Controls Deterrence Prevention Detection Response Physical Access Controls Authenticate the user Information Security Controls Cryptography Authentication Audit Operational Policies and guidelines
Privacy Human value Consists of: Right to control external influences Solitude - right to be alone Anonymity – right to have no public identity Intimacy – right not to be monitored Right to control personal information: Reserve – right to control one’s information
Types of Privacy Personal Privacy Informational Privacy Personal space Physical searches Video recording Surveillance Informational Privacy Personal information Financial information Medical information Internet Institutional Privacy
Value of Privacy Considered valuable Value eroding because inability to guarantee Three attributes Personal identity Autonomy Social Relationships Information gathering Buying and selling information We provide some of this information Internet crawlers
Privacy Violations Intrusion – wrongful entry, seizing or acquiring Misuse of Information – selling of our information Interception of Information – eavesdropping Surveillance Information Matching
Ways We Give Out Information Rewards or Loyalty Programs Body Scanners Digital Video Recorders Automobile “Black Boxes” Enhanced 911 Service RFIDs Implanted Chips Medical information Replace credit cards Cookies Biometrics Spyware
Privacy Protection and Civil Liberties Most accepted set of civil liberties Criminal Justice Police powers Person liberty Right to fair trail Basic freedoms Speech Assembly Association Movement No Discrimination Freedom of information Communications and privacy
Privacy Protection and Civil Liberties Safeguards Technical Use of software and technical safeguards Contractual Contacts Special information – publications Must have actions and enforcement to be effective Legal Laws Enforcement of the laws