The right not to be identified: privacy and anonymity in the interactive media environment

This article explores how the development of information technology, especially interactive computers, changes the privacy environment as experienced by individuals and the policy implications of these changes. External entities, such as governments and commercial industries, that ‘invade’ people’s rights to be left alone are of less concern now than individuals who voluntarily give up their privacy by willingly providing personal information for other benefits on the internet. Also, in the interactive environment, intended and unintended activities of more diversified and less easily identifiable entities have become more of a threat to individual privacy. In this new environment, rather than ‘providing’ privacy for passive individuals, a more user-oriented, active approach is needed to help users to protect themselves from more diversified and unknown forces and potential loss of control. This article suggests that focusing on the right not to be identified on the network by allowing affirmative acts of secrecy and deception regarding identity and identification might be the most effective-and sometimes only practically viable-way of ensuring privacy in the interactive environment.

[1]  Jennifer Carlisle The privacy paradox , 2002, UBIQ.

[2]  Joseph Turow,et al.  Americans Online Privacy: The System Is Broken , 2003 .

[3]  P. Schwartz Privacy and Democracy in Cyberspace , 2000 .

[4]  A. Michael Froomkin,et al.  Legal Issues in Anonymity and Pseudonymity , 1999, Inf. Soc..

[5]  Harold C. Releya Technology and privacy: The new landscape , 1998 .

[6]  M. Ethan Katsh The electronic media and the transformation of law , 1989 .

[7]  Mark S. Ackerman,et al.  Beyond Concern: Understanding Net Users' Attitudes About Online Privacy , 1999, ArXiv.

[8]  J. Rubenfeld The Right of Privacy , 1989 .

[9]  A. Froomkin Flood Control on the Information Ocean: Living With Anonymity, Digital Cash, and Distributed Databases , 1996 .

[10]  Julie E. Cohen A Right to Read Anonymously: A Closer Look at , 1997 .

[11]  Daniel J. Solove The Virtues of Knowing Less: Justifying Privacy Protections Against Disclosure , 2003 .

[12]  Shaun B. Spencer,et al.  Reasonable Expectations and the Erosion of Privacy , 2002 .

[13]  Gavin Skok Establishing a Legitimate Expectation of Privacy in Clickstream Data , 2000 .

[14]  Julie E. Cohen Examined Lives: Informational Privacy and the Subject as Object , 2000 .

[15]  Jerry Kang Information Privacy in Cyberspace Transactions , 1998 .

[16]  James P. Nehf,et al.  Recognizing the Societal Value in Information Privacy , 2003 .

[17]  Katrin Schatz Byford,et al.  Privacy in Cyberspace: Constructing a Model of Privacy for the Electronic Communications Environment , 1998 .

[18]  Reginald Whitaker,et al.  The End of Privacy: How Total Surveillance Is Becoming a Reality , 1999 .

[19]  F. Bailey The Prevalence of Deceit , 1991 .

[20]  Laurie Thomas Lee The USA PATRIOT Act and Telecommunications: Privacy under Attack , 2003 .

[21]  J. W. DeCew In Pursuit of Privacy: Law, Ethics, and the Rise of Technology , 1997 .

[22]  Celia Lury,et al.  Cultural Rights: Technology, Legality and Personality.@@@The Panoptic Sort: A Political Economy of Personal Information. , 1993 .