Skip to main content
Log in

Anonymity and software agents: An interdisciplinary challenge

  • Published:
Artificial Intelligence and Law Aims and scope Submit manuscript

Abstract

Software agents that play a role in E-commerce and E-government applications involving the Internet often contain information about the identity of their human user such as credit cards and bank accounts. This paper discusses whether this is necessary: whether human users and software agents are allowed to be anonymous under the relevant legal regimes and whether an adequate interaction and balance between law and anonymity can be realised from both the perspective of Computer Systems and the perspective of Law.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  • R. Anderson (2001) Security Engineering: A Guide to Building Dependable Distributed Systems New York Wiley Computer Publishing

    Google Scholar 

  • F. Bellifemine A. Poggi G. Rimassa (2001) ArticleTitleDeveloping Multi-Agent Systems with a FIPA-Compliant Agent Framework Software: Practice and Experience 31 IssueID2 103–128

    Google Scholar 

  • Bentham, J. (1791). Panopticon, Dublin.

  • F. M. T. Brazier O. Kubbe A. Oskamp N. J. E. Wijngaards (2002) Are Law-Abiding Agents Realistic? G. Sartor C. Cevenini (Eds) Proceedings of the workshop on the Law of Electronic Agents (LEA02) Bologna Cirsfid 151–155

    Google Scholar 

  • F. M. T. Brazier A. Oskamp J. E. J. Prins M. H. M. Schellekens N. J. E. Wijngaards (2003) Are anonymous agents realistic? A. Oskamp E. Weitzenboeck (Eds) Proceedings of the LEA 2003: The Law and Electronic Agents NRCCL Edinburgh 69–79

    Google Scholar 

  • Brazier, F., Oskamp, A., Prins, C., Schellekens, M. and Wijngaards, N. (2004). Law-Abiding & Integrity on the Internet: A Case for Agents, AI& Law journal, in this special issue.

  • C. Castelfranchi (2001) Again on Agents? Autonomy: A Homage to Alan Turing C. Castelfranchi Y. Lespérance (Eds) Intelligent Agents VII, Lecture Notes in Artificial Intelligence Springer-Verlag Berlin, HeidelbergIn 339–342

    Google Scholar 

  • Ekker, A. (2003). Comment about Voorzieningenrechter Rechtbank Haarlem 11 September 2003 (Pessers/Lycos) Computerrecht 22: 363–367.

  • FIPA, (2001). FIPA agent platform, http://www.fipa.org/.

  • Froomkin, A. M. (1995). Anonymity and Its Enmities. Journal Online Law art. 4, June.

  • A. M. Froomkin (1996) ArticleTitleFlood Control on the Information Ocean: Living With Anonymity, Digital Cash, and Distributed Databases Journal of Law and Commerce 15 395–479

    Google Scholar 

  • E. Gabber P. Gibbons Y. Matias A. Mayer (1997) How to Make Personalized Web Browsing Simple, Secure, and Anonymous R. Hirschfeld (Eds) Financial Cryptography, Proceedings of the First International Conference, FC ’97 Springer-Verlag Berlin 17–32

    Google Scholar 

  • D. M. Goldschlag M. G. Reed P. F. Syverson (1999) ArticleTitleOnion Routing for Anonymous and Private Internet Connections Communications of the ACM 42 IssueID2 39–41

    Google Scholar 

  • Grijpink, J. H. A. M. and Prins, J. E. J. (2001). New Rules for Anonymous Electronic Transactions? An Exploration of the Private Law Implications of Digital Anonymity. Journal of Information, Law and Technology, 2.

  • J. H. A. M. Grijpink J. E. J. Prins (2003) New Rules for Anonymous Electronic Transactions? An Exploration of the Private Law Implications of Digital Anonymity C. Nicoll J. E. J. Prins M. J. M. Dellen Particlevan (Eds) Digital Anonymity and the Law T. M. C. Asser Press Den Haag 249–269

    Google Scholar 

  • M. He H-F. Leung (2002) ArticleTitleAgents in E-Commerce: State of the Art Knowledge and Information Systems 4 257–282

    Google Scholar 

  • Martin, D. (1998). Internet Anonymising Techniques. In: login: Magazine,May, http://www.usenix.org/publications/login/1998-5/martin.html

  • D. Martin A. Cheyer D. Moran (1999) ArticleTitleThe Open Agent Architecture: A Framework for Building Distributed Software Systems Applied Artificial Intelligence 13 IssueID1–2 91–128

    Google Scholar 

  • C. Nicoll J. E. J. Prins (2003) Anonymity: Challenges for Politics and Law. C. Nicoll J. E. J. Prins M. J. M. Dellen Particlevan (Eds) Digital Anonymity and the Law. Tensions and Dimensions. T. M. C. Asser Press Den Haag 287–297

    Google Scholar 

  • C. Nicoll J. E. J. Prins M. J. M. Dellen Particlevan (2003) Digital anonymity and the law: tensions and dimensions, T M. C. Asser Press The Hague

    Google Scholar 

  • H. Nwana D. Ndumu L. Lyndon J. Collis (1999) ZEUS: A Toolkit and Approach for Building Distributed Multi-Agent Systems SeriesTitleProceedings of the Third International Conference on Autonomous Agents (Autonomous Agents’99) Association for Computing Machinery Seattle, Washington 360–361

    Google Scholar 

  • M. K. Reiter A.D. Rubin (1998) ArticleTitleCrowds: Anonymity for Web Transactions ACM Transactions on Information and System Security 1 IssueID1 66–92

    Google Scholar 

  • M. K. Reiter A. D. Rubin (1999) ArticleTitleAnonymity Loves Company: Anonymous Web Transactions with Crowds Communications of the ACM 42 IssueID2 32–38

    Google Scholar 

  • A. Rieke T. Demuth (2001) JANUS: Server Anonymity in the World Wide Web. U. E. Gattiker (Eds) Conference Proceedings EICAR International Conference München Deutschland 195–208

    Google Scholar 

  • A. Sims (2003) Court Assisted means of Revealing Identity on the Internet. C. Nicoll J. E. J. Prins M. J. M. Dellen Particlevan (Eds) Digital Anonymity and the Law. Tensions and Dimensions. T. M. C. Asser Press Den Haag 271–286

    Google Scholar 

  • W. A. M. Steenbruggen (2002) ArticleTitleAnnotatie bij Voorzieningenrechter Rb. Utrecht 9 juli 2002 Computerrecht 21 297–298

    Google Scholar 

  • A. S. Tanenbaum M. Steen Particlevan (2002) Distributed Systems: Principles and Paradigms New Jersey Prentice-Hall

    Google Scholar 

  • W. J. M. Voermans (1995) Sturen in de mist..., maar dan met radar. Een onderzoek naar praktisch haalbare vormen van computerondersteuning bij het ontwerpen van regelingen Tjeenk Willink Zwolle

    Google Scholar 

  • N. J. E. Wijngaards B. J. Overeinder M. Steen Particlevan F. M. T. Brazier (2002) ArticleTitleSupporting Internet-Scale Multi-Agent Systems Data and Knowledge Engineering 41 IssueID(2–3) 229–245

    Google Scholar 

  • Wong, H. and Sycara, K. (2000). A Taxonomy of Middle-agents for the Internet. In Proceedings of the Fourth International Conference on Multi-Agent Systems ICMAS’2000, 149–161. IEEE Computer Society: Boston, MA, USA.

  • The Council of the European Communities, Council Directive 91/250/EEC of 14 May 1991 on the legal protection of computer programs, Official Journal L 122 , 17/05/1991, 42–46.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Niek Wijngaards.

Additional information

This paper is an extended and fully revised version of Brazier, Kubbe, Oskamp and Wijngaards (2002) and Brazier, Oskamp, Prins, Schellekens and Wijngaards (2003).

Rights and permissions

Reprints and permissions

About this article

Cite this article

Brazier, F., Oskamp, A., Prins, C. et al. Anonymity and software agents: An interdisciplinary challenge. Artif Intell Law 12, 137–157 (2004). https://doi.org/10.1007/s10506-004-6488-5

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10506-004-6488-5

Keywords

Navigation