Abstract
Anonymity is a form of nonidentifiability which I define as noncoordinatability of traits in a given respect. This definition broadens the concept, freeing it from its primary association with naming. I analyze different ways anonymity can be realized. I also discuss some ethical issues, such as privacy, accountability and other values which anonymity may serve or undermine. My theory can also conceptualize anonymity in information systems where, for example, privacy and accountability are at issue.
- William Bechtel. Attributing Responsibility to Computer Systems. Metaphilosophy 16 (4): 296-306, October 1985.Google ScholarCross Ref
- Justus Buchler. Metaphysics of Natural Complexes, 2nd expanded edition, edited by Kathleen Wallace and Armen Marsoobian, with Robert S. Corrington. SUNY Press, 1990. Hereafter, MNC.Google Scholar
- Keith Donnellan. Reference and Definite Description. Philosophical Review 75: 281-304, 1966. Reprinted in A.P. Martinich, editor, The Philosophy of Language. Oxford University Press, 236-248, 1985.Google ScholarCross Ref
- Lewis R. Gordon. Existential Dynamics of Theorizing Black Invisibility. In Lewis R. Gordon, editor, Existence in Black: An Anthology of Black Existential Philosophy. Routledge, 1997.Google Scholar
- Krystyna, Gorniak-Kocikowski. The Computer Revolution and the Problem of Global Ethics. Science and Engineering Ethics 2: 137-154, 1996.Google ScholarCross Ref
- Lucas D. Introna. The Web and the Other: Reflections on Ethics in a Mediated World. Paper presented at The Tangled Web Conference: Ethical Dilemmas of the Internet, August 7-9, 1998, Dartmouth College, Hanover, NH.Google Scholar
- Gary Marx. What's in a Name? Some reflections on the sociology of anonymity. The Information Society, Forum 15 (2): 99-112, 1999.Google Scholar
- James Moor. What Is Computer Ethics? Metaphilosophy 16 (4): 266-275, 272f., October 1985.Google ScholarCross Ref
- James Moor. Are there decisions computers should never make? Nature and System 1: 217-229, 1979.Google ScholarDigital Library
- Maurice Natanson. Anonymity: A Study in the Philosophy of Alfred Shutz. Indiana University Press, 1986.Google Scholar
- New York Times. New England Edition, pp. A1 & A11, August 15, 1998.Google Scholar
- Helen Nissenbaum. Accountability in a Computerized Society. Science and Engineering Ethics 2: 25-42, 1996.Google ScholarCross Ref
- Helen Nissenbaum. The Meaning of Anonymity in an Information Age. The Information Society, Forum 15 (2): 141-144, 1999.Google Scholar
- Plato. Republic. II, 359b-360e.Google Scholar
- Jeffrey H. Reiman. Privacy, Intimacy and Person-hood. Philosophy and Public Affairs 6 (1) (Fall): 26-44, 1976. Reprinted in Ferdinand David Schoeman, editor, Philosophical Dimensions of Privacy. Cambridge University Press, 300-316, 1984.Google Scholar
- Bertrand Russell. Descriptions. From Introduction to Mathematical Philosophy. George Allen and Unwin Ltd., 167-180, 1919. Reprinted in A.P. Martinich, editor, The Philosophy of Language. Oxford University Press, 213-219, 1985.Google Scholar
- Bertrand Russell. On Denoting. Reprinted in Robert C. Marsh, editor, Logic and Knowledge. Routledge, 39-56, 1956, 1988.Google Scholar
- John W. Snapper. On the Web, Plagiarism matters more than Copyright Piracy. Paper presented at The Tangled Web Conference: Ethical Dilemmas of the Internet, August 7-9, 1998, Dartmouth College, Hanover, NH.Google Scholar
- John W. Snapper. Responsibility for Computer-Based Errors. Metaphilosophy 16 (4): 289-295, October 1985.Google ScholarCross Ref
- P.F. Strawson. On Referring. In Anthony Flew, editor, Essays in Conceptual Analysis. Macmillan and Company, Ltd., 21-52, 1956. Reprinted in A.P. Martinich, editor, The Philosophy of Language. Oxford University Press, 220-235, 1985.Google Scholar
- Peter Szolovits. Sources of Error and Accountability it Computer Systems: Comments on 'Accountability in a Computerized Society'. Science and Engineering Ethics 2: 433-46, 1996.Google ScholarCross Ref
- D. Thompson. The Moral Responsibility of Many Hand. In Political Ethics and Public Office, 46-60. Harvard University Press, 1987.Google Scholar
- Jeroen van den Hoven. Prospects for Deweyan Democracy on the World Wide Web. Paper presented at The Tangled Web Conference: Ethical Dilemmas of the Internet, August 7-9, 1998 Dartmouth College, Hanover, NH.Google Scholar
Index Terms
- Anonymity
Recommendations
k-anonymity: a model for protecting privacy
Consider a data holder, such as a hospital or a bank, that has a privately held collection of person-specific, field structured data. Suppose the data holder wants to share a version of the data with researchers. How can a data holder release a version ...
Personalised anonymity for microdata release
Individual privacy protection in the released data sets has become an important issue in recent years. The release of microdata provides a significant information resource for researchers, whereas the release of person‐specific data poses a threat to ...
Personalized sensitive attribute anonymity based on P - sensitive k anonymity
ICIIP '16: Proceedings of the 1st International Conference on Intelligent Information ProcessingWith the development of science and technology, privacy protection has also been highly valued. Existing anonymity algorithms are only anonymous quasi-identifier to achieve privacy protection, but ignore the sensitive properties of the personalized ...
Comments