Endre søk
RefereraExporteraLink to record
Permanent link

Direct link
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annet format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annet språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf
Privacy for Reporters of Human Rights Abuses: Identity and Anonymity in Mobile Networks
Karlstads universitet, Fakulteten för ekonomi, kommunikation och IT, Avdelningen för datavetenskap. (Datavetenskap)ORCID-id: 0000-0002-9980-3473
Karlstads universitet, Fakulteten för ekonomi, kommunikation och IT, Avdelningen för datavetenskap. Karlstads universitet, Fakulteten för ekonomi, kommunikation och IT, Centrum för HumanIT. (PriSec)ORCID-id: 0000-0002-6938-4466
2011 (engelsk)Inngår i: Mobile Technologies for Conflict Management / [ed] Marta Poblet, Heidelberg: Springer Science+Business Media B.V., 2011, s. 181-199Kapittel i bok, del av antologi (Fagfellevurdert)
Abstract [en]

Until the last decade, the process of gathering data to detect violations of human rights was usually a difficult and slow process since collection of testimonials from victims and witnesses depended on the physical contact with the local population where the abuses were taking place. However, the seemingly ubiquitous presence of mobile telephones and future prospects of the fast expansion of such networks especially into the poorest parts of the world created a new and fast communication channel for presenting testimonials of abuses of human rights. Nevertheless, new communication channels also impose new challenges to protect the users’ privacy. The right to privacy is fundamental for individuals reporting violations of human rights without the fear of persecution or harassment by other individuals or abusive governments. This chapter outlines the challenges involved in protecting users’ privacy in such scenarios, and list possible sources of identification in a mobile network that could be used to identify the sender of a message. Then, we elicit privacy requirements that need to be met and show how privacy-enhancing technologies can be used to fulfill these requirements.

sted, utgiver, år, opplag, sider
Heidelberg: Springer Science+Business Media B.V., 2011. s. 181-199
Serie
Law Governance and Technology, ISSN 2352-1902 ; 2
HSV kategori
Identifikatorer
URN: urn:nbn:se:kau:diva-12112DOI: 10.1007/978-94-007-1384-0_13ISI: 000293100300013OAI: oai:DiVA.org:kau-12112DiVA, id: diva2:508844
Tilgjengelig fra: 2012-03-09 Laget: 2012-03-09 Sist oppdatert: 2018-06-04bibliografisk kontrollert

Open Access i DiVA

Fulltekst mangler i DiVA

Andre lenker

Forlagets fulltekst

Personposter BETA

Martucci, LeonardoFischer-Hübner, Simone

Søk i DiVA

Av forfatter/redaktør
Martucci, LeonardoFischer-Hübner, Simone
Av organisasjonen

Søk utenfor DiVA

GoogleGoogle Scholar

doi
urn-nbn

Altmetric

doi
urn-nbn
Totalt: 291 treff
RefereraExporteraLink to record
Permanent link

Direct link
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annet format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annet språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf