000 | 02768nam a22004695i 4500 | ||
---|---|---|---|
001 | 978-1-4471-4066-5 | ||
003 | DE-He213 | ||
005 | 20140220083237.0 | ||
007 | cr nn 008mamaa | ||
008 | 120425s2012 xxk| s |||| 0|eng d | ||
020 |
_a9781447140665 _9978-1-4471-4066-5 |
||
024 | 7 |
_a10.1007/978-1-4471-4066-5 _2doi |
|
050 | 4 | _aQA75.5-76.95 | |
072 | 7 |
_aUBL _2bicssc |
|
072 | 7 |
_aLAW099000 _2bisacsh |
|
082 | 0 | 4 |
_a343.0999 _223 |
100 | 1 |
_aWeber, Rolf H. _eauthor. |
|
245 | 1 | 0 |
_aAnonymization _h[electronic resource] / _cby Rolf H. Weber, Ulrike I. Heinrich. |
264 | 1 |
_aLondon : _bSpringer London, _c2012. |
|
300 |
_aVII, 73p. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSpringerBriefs in Cybersecurity, _x2193-973X |
|
505 | 0 | _aNotion of Anonymity -- Anonymity Challenges in the Internet -- Legal Foundations of Anonymity -- Limitations of Anonymity -- Outlook. | |
520 | _aWithin the last decade, the Internet has developed as a phenomenon encompassing social, cultural, economic and legal facets. It has become common practice to use the Internet for both the retrieval and provision of information, with the result that the Internet has become a valuable tool in everyday life. Many Internet participants are unaware that they leave data tracks on every website they pass; surfing on the World Wide Web is far from being an anonymous activity of no consequence. In recent years a number of networking techniques have been initiated in order to accommodate the netizen’s wish for anonymous communication and the protection of their privacy in the online world. Anonymization explores the legal framework developed to help protect netizens’ privacy and their wish for anonymous communication over the Internet. It debates the value in helping to protect anonymity over a network which sees an increasing number of cybercrimes, and explores governmental interventions into anonymity requests, and whether requests should only be legal if a sufficiently legitimized public interest is given. | ||
650 | 0 | _aComputer science. | |
650 | 0 |
_aComputers _xLaw and legislation. |
|
650 | 1 | 4 | _aComputer Science. |
650 | 2 | 4 | _aLegal Aspects of Computing. |
650 | 2 | 4 | _aEuropean Law. |
650 | 2 | 4 | _aPublic International Law. |
700 | 1 |
_aHeinrich, Ulrike I. _eauthor. |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer eBooks | |
776 | 0 | 8 |
_iPrinted edition: _z9781447140658 |
830 | 0 |
_aSpringerBriefs in Cybersecurity, _x2193-973X |
|
856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-1-4471-4066-5 |
912 | _aZDB-2-SCS | ||
999 |
_c100762 _d100762 |