Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Privacy for Reporters of Human Rights Abuses: Identity and Anonymity in Mobile Networks
Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. (Datavetenskap)
Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT. (PriSec)
2011 (English)In: Mobile Technologies for Conflict Management / [ed] Marta Poblet, Heidelberg: Springer Science+Business Media B.V., 2011, 181-199 p.Chapter in book (Refereed)
Abstract [en]

Until the last decade, the process of gathering data to detect violations of human rights was usually a difficult and slow process since collection of testimonials from victims and witnesses depended on the physical contact with the local population where the abuses were taking place. However, the seemingly ubiquitous presence of mobile telephones and future prospects of the fast expansion of such networks especially into the poorest parts of the world created a new and fast communication channel for presenting testimonials of abuses of human rights. Nevertheless, new communication channels also impose new challenges to protect the users’ privacy. The right to privacy is fundamental for individuals reporting violations of human rights without the fear of persecution or harassment by other individuals or abusive governments. This chapter outlines the challenges involved in protecting users’ privacy in such scenarios, and list possible sources of identification in a mobile network that could be used to identify the sender of a message. Then, we elicit privacy requirements that need to be met and show how privacy-enhancing technologies can be used to fulfill these requirements.

Place, publisher, year, edition, pages
Heidelberg: Springer Science+Business Media B.V., 2011. 181-199 p.
Series
Law Governance and Technology, ISSN 2352-1902 ; 2
National Category
Computer Systems
Identifiers
URN: urn:nbn:se:kau:diva-12112DOI: 10.1007/978-94-007-1384-0_13ISI: 000293100300013OAI: oai:DiVA.org:kau-12112DiVA: diva2:508844
Available from: 2012-03-09 Created: 2012-03-09 Last updated: 2016-10-14Bibliographically approved

Open Access in DiVA

No full text

Other links

Publisher's full text

Search in DiVA

By author/editor
Martucci, LeonardoFischer-Hübner, Simone
By organisation
Department of Computer ScienceCentre for HumanIT
Computer Systems

Search outside of DiVA

GoogleGoogle Scholar

Altmetric score

Total: 273 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf