|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-1-4471-4066-5 |
003 |
DE-He213 |
005 |
20220113102514.0 |
007 |
cr nn 008mamaa |
008 |
120425s2012 xxk| s |||| 0|eng d |
020 |
|
|
|a 9781447140665
|9 978-1-4471-4066-5
|
024 |
7 |
|
|a 10.1007/978-1-4471-4066-5
|2 doi
|
050 |
|
4 |
|a K564.C6
|
072 |
|
7 |
|a UBL
|2 bicssc
|
072 |
|
7 |
|a LAW099000
|2 bisacsh
|
072 |
|
7 |
|a UBL
|2 thema
|
082 |
0 |
4 |
|a 343.0999
|2 23
|
100 |
1 |
|
|a Weber, Rolf H.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
245 |
1 |
0 |
|a Anonymization
|h [electronic resource] /
|c by Rolf H. Weber, Ulrike I. Heinrich.
|
250 |
|
|
|a 1st ed. 2012.
|
264 |
|
1 |
|a London :
|b Springer London :
|b Imprint: Springer,
|c 2012.
|
300 |
|
|
|a VII, 73 p.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a SpringerBriefs in Cybersecurity,
|x 2193-9748
|
505 |
0 |
|
|a Notion of Anonymity -- Anonymity Challenges in the Internet -- Legal Foundations of Anonymity -- Limitations of Anonymity -- Outlook. .
|
520 |
|
|
|a Within the last decade, the Internet has developed as a phenomenon encompassing social, cultural, economic and legal facets. It has become common practice to use the Internet for both the retrieval and provision of information, with the result that the Internet has become a valuable tool in everyday life. Many Internet participants are unaware that they leave data tracks on every website they pass; surfing on the World Wide Web is far from being an anonymous activity of no consequence. In recent years a number of networking techniques have been initiated in order to accommodate the netizen's wish for anonymous communication and the protection of their privacy in the online world. Anonymization explores the legal framework developed to help protect netizens' privacy and their wish for anonymous communication over the Internet. It debates the value in helping to protect anonymity over a network which sees an increasing number of cybercrimes, and explores governmental interventions into anonymity requests, and whether requests should only be legal if a sufficiently legitimized public interest is given.
|
650 |
|
0 |
|a Computers-Law and legislation.
|
650 |
|
0 |
|a Information technology-Law and legislation.
|
650 |
|
0 |
|a Law-Europe.
|
650 |
|
0 |
|a International law.
|
650 |
1 |
4 |
|a Legal Aspects of Computing.
|
650 |
2 |
4 |
|a European Law.
|
650 |
2 |
4 |
|a Public International Law.
|
700 |
1 |
|
|a Heinrich, Ulrike I.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9781447140672
|
776 |
0 |
8 |
|i Printed edition:
|z 9781447140658
|
830 |
|
0 |
|a SpringerBriefs in Cybersecurity,
|x 2193-9748
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/978-1-4471-4066-5
|z Texto Completo
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|