Abstract:
In this paper we first develop models of privacy and anonymity from an examination of various categories of data and the motivations of the various persons and groups inv...Show MoreMetadata
Abstract:
In this paper we first develop models of privacy and anonymity from an examination of various categories of data and the motivations of the various persons and groups involved. We point out where specific risk-reduction tools and methods apply and where they do not. We also examine whether the desire for privacy and anonymity favors lawful or criminal activities. Then we propose methods, including legislation, which are needed to ensure that everyone's data privacy requirements might be met. We examine who benefits from anonymity and privacy and who do not, and how to take advantage of the benefits of privacy without providing undue opportunities for criminality.
Published in: 2015 12th International Conference & Expo on Emerging Technologies for a Smarter World (CEWIT)
Date of Conference: 19-20 October 2015
Date Added to IEEE Xplore: 03 December 2015
Electronic ISBN:978-1-4673-7865-9