logo

(PDF) Understanding online anonymity

9 Pages1883 Words46 Views
   

Added on  2021-04-24

(PDF) Understanding online anonymity

   Added on 2021-04-24

ShareRelated Documents
(PDF) Understanding online anonymity_1
Table of ContentsIntroduction................................................................................................................................2Problem Action Consequences Techniques...............................................................................2Identified ethical problems.....................................................................................................2Reason for the ethical problems.............................................................................................2People responsible..................................................................................................................3People affected.......................................................................................................................3Strategies to counter the issue................................................................................................3Better action............................................................................................................................4Other actions...........................................................................................................................4Person to take the best action.................................................................................................4Implications of the best action................................................................................................4Consequences to the stake holders.........................................................................................5References..................................................................................................................................51
(PDF) Understanding online anonymity_2
IntroductionIn the report, the ethical issue that has been discussed here is illegal surveillance ofuser data despite anonymity. The usage of World Wide Web to hide the personal informationof an individual from the websites they have visited is known as anonymous web browsing.By sending the web activity information through a number of routers, a user can easilybrowse the web anonymously. But this does not guarantee server anonymity as the data isvulnerable to traffic analysis (Jardine, 2015). An ethical issue rises here against the trackingof data without the authorization of the user. It raises an ethical issue about personalinformation privacy as the data from the browser plugins and cookies can be used to track theuser even if the user has hidden his or her IP address.Problem Action Consequences TechniquesIdentified ethical problemsDespite the usage of proxy sites and anonymous servers, the internet users arerepeatedly monitored by government authorities in the name of protection. Cyber criminalshave misused the anonymity provided by the proxy servers to perform illegal activities butthe consequences of their action has trickled down on the common public. Without properauthorization from the users, the authorities collect personal information to get hold of thecriminals which has created an ethical issue (Kandpal & Singh, 2013). The ethical dilemmaoccurs when the question rises about whether the remote monitoring of the publicinformation to catch a handful of criminals is justifiable or not.Reason for the ethical problemsA common misconception is that anonymity helps to encourage disinhibitionand is often abused by cyber criminals to get into dishonest activities. As the proxy is not2
(PDF) Understanding online anonymity_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
CO4515 - Trends in Cybercrime
|10
|2226
|183

Hackers Without Borders: A Legal Response
|11
|2715
|251

Assignment | Cyber Security
|23
|2174
|14

Ethical Hacking: OS Vulnerabilities and Penetration Testing
|12
|2002
|39

Computer Crime: Definition, Correlation, and Criminal Activity
|6
|1263
|88

Personal Privacy and Security: Threats, Solutions, and Ethical Conduct in IT Security Profession
|20
|1848
|225